A Utility-Preserving De-Identification Approach with Relation Extraction FilteringLiubov NedoshivinaAnisa Halimiet al.2023PETS 2023
Efficient Skip Connections Realization for Secure Inference on Encrypted DataNir DruckerItamar Zimerman2023CSCML 2023
Benchmarking the Effect of Poisoning Defenses on the Security and Bias of Deep Learning ModelsNathalie Baracaldo AngelFarhan Ahmedet al.2023S&P 2023
Fashion Faux Pas: Implicit Stylistic Fingerprints for Bypassing Browsers' Anti-Fingerprinting DefensesXu LinFrederico Araujoet al.2023S&P 2023
Facilitating Federated Genomic Data Analysis by Identifying Record Correlations while Ensuring PrivacyLeonard DervishiXinyue Wanget al.2023NDSS 2023
Privacy preserving population stratification for collaborative genomic researchLeonard DervishiWenbiao Liet al.2023NDSS 2023
Graph Representation Learning based Vulnerable Target Identification in Ransomware AttacksWenqi WeiMu Qiaoet al.2022Big Data 2022