865 results on '"Michael Backes"'
Search Results
152. Graph Unlearning.
153. Towards a Principled Approach for Dynamic Analysis of Android's Middleware.
154. ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine Learning Models.
155. Inference Attacks Against Graph Neural Networks.
156. Mental Models of Adversarial Machine Learning.
157. Get a Model! Model Hijacking Attack Against Machine Learning Models.
158. Who Controls the Internet?: Analyzing Global Threats using Property Graph Traversals.
159. ARTist: The Android Runtime Instrumentation and Security Toolkit.
160. LUNA: Quantifying and Leveraging Uncertainty in Android Malware Analysis through Bayesian Machine Learning.
161. Efficient and Flexible Discovery of PHP Application Vulnerabilities.
162. A Novel Approach for Reasoning about Liveness in Cryptographic Protocols and Its Application to Fair Exchange.
163. How the Web Tangled Itself: Uncovering the History of Client-Side Web (In)Security.
164. Identifying Personal DNA Methylation Profiles by Genotype Inference.
165. Seamless In-App Ad Blocking on Stock Android.
166. Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security.
167. Comparing the Usability of Cryptographic APIs.
168. Linking Amplification DDoS Attacks to Booter Services.
169. Keep me Updated: An Empirical Study of Third-Party Library Updatability on Android.
170. Deemon: Detecting CSRF with Dynamic Analysis and Property Graphs.
171. walk2friends: Inferring Social Links from Mobility Profiles.
172. A Stitch in Time: Supporting Android Developers in WritingSecure Code.
173. The ART of App Compartmentalization: Compiler-based Library Privilege Separation on Stock Android.
174. Reconciling Privacy and Utility in Continuous-Time Diffusion Networks.
175. Adversarial Examples for Malware Detection.
176. ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models.
177. MBeacon: Privacy-Preserving Beacons for DNA Methylation Data.
178. Privacy Analysis of Deep Learning in the Wild: Membership Inference Attacks against Transfer Learning.
179. Dynamic Backdoor Attacks Against Machine Learning Models.
180. Stealing Links from Graph Neural Networks.
181. BadNL: Backdoor Attacks Against NLP Models.
182. When Machine Unlearning Jeopardizes Privacy.
183. How many winning tickets are there in one DNN?
184. Adversarial Examples and Metrics.
185. BAAAN: Backdoor Attacks Against Autoencoder and GAN-Based Machine Learning Models.
186. Don't Trigger Me! A Triggerless Backdoor Attack Against Deep Neural Networks.
187. A new measure for overfitting and its implications for backdooring of deep learning.
188. Everything About You: A Multimodal Approach towards Friendship Inference in Online Social Networks.
189. PrivSyn: Differentially Private Data Synthesis.
190. Backdoor smoothing: Demystifying backdoor attacks on deep neural networks.
191. Simulating the Large-Scale Erosion of Genomic Privacy Over Time.
192. A Survey on Routing in Anonymous Communication Protocols.
193. On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis.
194. Privacy in Epigenetics: Temporal Linkability of MicroRNA Expression Profiles.
195. Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability Notification.
196. What Cannot Be Read, Cannot Be Leveraged? Revisiting Assumptions of JIT-ROP Defenses.
197. You Get Where You're Looking for: The Impact of Information Sources on Code Security.
198. SoK: Lessons Learned from Android Security Research for Appified Software Platforms.
199. Delegatable Functional Signatures.
200. Detecting Hardware-Assisted Virtualization.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.