877 results on '"Michael Backes"'
Search Results
152. Precise and Scalable Detection of Double-Fetch Bugs in OS Kernels.
153. The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators.
154. JaSt: Fully Syntactic Detection of Malicious (Obfuscated) JavaScript.
155. PRIMA: Privacy-Preserving Identity and Access Management at Internet-Scale.
156. Stackelberg Planning: Towards Effective Leader-Follower State Space Search.
157. Privacy-Preserving Similar Patient Queries for Combined Biomedical Data.
158. Node-Level Membership Inference Attacks Against Graph Neural Networks.
159. Bilingual Problems: Studying the Security Risks Incurred by Native Extensions in Scripting Languages.
160. Graph Unlearning.
161. Towards a Principled Approach for Dynamic Analysis of Android's Middleware.
162. ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine Learning Models.
163. Inference Attacks Against Graph Neural Networks.
164. Mental Models of Adversarial Machine Learning.
165. Get a Model! Model Hijacking Attack Against Machine Learning Models.
166. Who Controls the Internet?: Analyzing Global Threats using Property Graph Traversals.
167. ARTist: The Android Runtime Instrumentation and Security Toolkit.
168. LUNA: Quantifying and Leveraging Uncertainty in Android Malware Analysis through Bayesian Machine Learning.
169. Efficient and Flexible Discovery of PHP Application Vulnerabilities.
170. A Novel Approach for Reasoning about Liveness in Cryptographic Protocols and Its Application to Fair Exchange.
171. How the Web Tangled Itself: Uncovering the History of Client-Side Web (In)Security.
172. Identifying Personal DNA Methylation Profiles by Genotype Inference.
173. Seamless In-App Ad Blocking on Stock Android.
174. Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security.
175. Comparing the Usability of Cryptographic APIs.
176. Linking Amplification DDoS Attacks to Booter Services.
177. Keep me Updated: An Empirical Study of Third-Party Library Updatability on Android.
178. Deemon: Detecting CSRF with Dynamic Analysis and Property Graphs.
179. walk2friends: Inferring Social Links from Mobility Profiles.
180. A Stitch in Time: Supporting Android Developers in WritingSecure Code.
181. The ART of App Compartmentalization: Compiler-based Library Privilege Separation on Stock Android.
182. Reconciling Privacy and Utility in Continuous-Time Diffusion Networks.
183. Adversarial Examples for Malware Detection.
184. ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models.
185. MBeacon: Privacy-Preserving Beacons for DNA Methylation Data.
186. Privacy Analysis of Deep Learning in the Wild: Membership Inference Attacks against Transfer Learning.
187. Dynamic Backdoor Attacks Against Machine Learning Models.
188. Stealing Links from Graph Neural Networks.
189. BadNL: Backdoor Attacks Against NLP Models.
190. When Machine Unlearning Jeopardizes Privacy.
191. How many winning tickets are there in one DNN?
192. Adversarial Examples and Metrics.
193. BAAAN: Backdoor Attacks Against Autoencoder and GAN-Based Machine Learning Models.
194. Don't Trigger Me! A Triggerless Backdoor Attack Against Deep Neural Networks.
195. A new measure for overfitting and its implications for backdooring of deep learning.
196. Everything About You: A Multimodal Approach towards Friendship Inference in Online Social Networks.
197. PrivSyn: Differentially Private Data Synthesis.
198. Backdoor smoothing: Demystifying backdoor attacks on deep neural networks.
199. Simulating the Large-Scale Erosion of Genomic Privacy Over Time.
200. A Survey on Routing in Anonymous Communication Protocols.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.