Search

Your search keyword '"Reiter, Michael"' showing total 1,740 results

Search Constraints

Start Over You searched for: Author "Reiter, Michael" Remove constraint Author: "Reiter, Michael"
1,740 results on '"Reiter, Michael"'

Search Results

1. CrudiTEE: A Stick-and-Carrot Approach to Building Trustworthy Cryptocurrency Wallets with TEEs

2. A General Framework for Data-Use Auditing of ML Models

3. Automated Immunophenotyping Assessment for Diagnosing Childhood Acute Leukemia using Set-Transformers

4. On CR maps from the sphere into the tube over the future light cone II: Higher dimensions

5. On Orchestrating Parallel Broadcasts for Distributed Ledgers

6. Concealing Backdoor Model Updates in Federated Learning by Trigger-Optimized Data Poisoning

7. Delphi: Efficient Asynchronous Approximate Agreement for Distributed Oracles

8. On CR maps between hyperquadrics and Winkelmann hypersurfaces

9. Mudjacking: Patching Backdoor Vulnerabilities in Foundation Models

10. Mendata: A Framework to Purify Manipulated Training Data

11. FATE: Feature-Agnostic Transformer-based Encoder for learning generalized embedding spaces in flow cytometry data

12. The Impact of Exposed Passwords on Honeyword Efficacy

14. Explainable Techniques for Analyzing Flow Cytometry Cell Transformers

15. Group-based Robustness: A General Framework for Customized Robustness in the Real World

16. EESMR: Energy Efficient BFT-SMR for the masses

17. Formally Verifying a Rollback-Prevention Protocol for TEEs

18. Removal of Organic Micropollutants from Urban Wastewater

19. The Unique Chain Rule and Its Applications

20. Bernoulli honeywords

23. On highly degenerate CR maps of spheres

24. Distance-Aware Private Set Intersection

25. Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks

26. Automated Identification of Cell Populations in Flow Cytometry Data with Transformers

27. Optimally Hiding Object Sizes with Constrained Padding

28. On CR maps from the sphere into the tube over the future light cone

29. Coordinating Followers to Reach Better Equilibria: End-to-End Gradient Descent for Stackelberg Games

42. Deceiving ML-Based Friend-or-Foe Identification for Executables

Catalog

Books, media, physical & digital resources