Search

Your search keyword '"Asokan, N"' showing total 21 results

Search Constraints

Start Over You searched for: Author "Asokan, N" Remove constraint Author: "Asokan, N" Language undetermined Remove constraint Language: undetermined
21 results on '"Asokan, N"'

Search Results

1. Real-Time Adversarial Perturbations Against Deep Reinforcement Learning Policies: Attacks and Defenses

2. Do Transformers know symbolic rules, and would we know if they did?

Catalog

Books, media, physical & digital resources

3. Conflicting Interactions Among Protection Mechanisms for Machine Learning Models

4. On the Effectiveness of Dataset Watermarking in Adversarial Settings

5. Towards cryptographically-authenticated in-memory data structures

6. On the Robustness of Dataset Inference

7. A little goes a long way: Improving toxic language classification despite data scarcity

9. Extraction of Complex DNN Models: Real Threat or Boogeyman?

10. All You Need is 'Love': Evading Hate-speech Detection

11. D��oT: A Federated Self-learning Anomaly Detection System for IoT

12. LookAhead: Augmenting Crowdsourced Website Reputation Systems With Predictive Modeling

13. OmniShare: Securely Accessing Encrypted Cloud Storage from Multiple Authorized Devices

15. The Company You Keep

16. AuDI: Toward Autonomous IoT Device-Type Identification Using Periodic Communication

17. Game Theoretical Modelling of Network/Cybersecurity

18. Protecting the stack with PACed canaries

19. PRADA: Protecting Against DNN Model Stealing Attacks

20. All You Need is 'Love'

21. 'Make Sure DSA Signing Exponentiations Really are Constant-Time'