19 results on '"Robert H. Deng"'
Search Results
2. Distributional Black-Box Model Inversion Attack with Multi-Agent Reinforcement Learning.
3. A Survey of Protocol Fuzzing.
4. SOCI^+: An Enhanced Toolkit for Secure OutsourcedComputation on Integers.
5. A Survey of Secure Computation Using Trusted Execution Environments.
6. EvilScreen Attack: Smart TV Hijacking via Multi-channel Remote Control Mimicry.
7. SIMC 2.0: Improved Secure ML Inference Against Malicious Clients.
8. Prove You Owned Me: One Step beyond RFID Tag/Mutual Authentication.
9. Hercules: Boosting the Performance of Privacy-preserving Federated Learning.
10. An efficient and secure scheme of verifiable computation for Intel SGX.
11. VerifyTL: Secure and Verifiable Collaborative Transfer Learning.
12. When Program Analysis Meets Bytecode Search: Targeted and Efficient Inter-procedural Analysis of Modern Android Apps in BackDroid.
13. Pocket Diagnosis: Secure Federated Learning against Poisoning Attack in the Cloud.
14. Privacy-preserving Medical Treatment System through Nondeterministic Finite Automata.
15. Boosting Privately: Privacy-Preserving Federated Extreme Boosting for Mobile Crowdsensing.
16. Lightning-Fast and Privacy-Preserving Outsourced Computation in the Cloud.
17. SCLib: A Practical and Lightweight Defense against Component Hijacking in Android Applications.
18. When Human cognitive modeling meets PINs: User-independent inter-keystroke timing attacks.
19. SecComp: Towards Practically Defending Against Component Hijacking in Android Applications.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.