27 results on '"Warren HE"'
Search Results
2. Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts.
3. The Ekiden Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts.
4. Generating Adversarial Examples with Adversarial Networks.
5. Practical Black-Box Attacks on Deep Neural Networks Using Efficient Query Mechanisms.
6. Do I Get the Privacy I Need? Benchmarking Utility in Differential Privacy Libraries.
7. Cracking ShadowCrypt: Exploring the Limitations of Secure I/O Systems in Internet Browsers.
8. Unified Power Frequency Model Framework.
9. Proof of Luck: an Efficient Blockchain Consensus Protocol.
10. Decision Boundary Analysis of Adversarial Examples.
11. Spatially Transformed Adversarial Examples.
12. Black-box Attacks on Deep Neural Networks via Gradient Estimation.
13. Characterizing Attacks on Deep Reinforcement Learning.
14. Adversarial Example Defense: Ensembles of Weak Defenses are not Strong.
15. The Emperor's New Password Manager: Security Analysis of Web-based Password Managers.
16. ShadowCrypt: Encrypted Web Applications for Everyone.
17. Generating Adversarial Examples with Adversarial Networks.
18. Spatially Transformed Adversarial Examples.
19. Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contract Execution.
20. Data-Confined HTML5 Applications.
21. Reducing attack surfaces for intra-application communication in android.
22. Exploring the Space of Black-box Attacks on Deep Neural Networks.
23. Proof of Luck: an Efficient Blockchain Consensus Protocol.
24. Adversarial Example Defenses: Ensembles of Weak Defenses are not Strong.
25. ASPIRE: Iterative Specification Synthesis for Security.
26. Clickjacking Revisited: A Perceptual View of UI Security.
27. Proof of Luck: an Efficient Blockchain Consensus Protocol.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.