Items where Year is 2019

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Item Type | No Grouping
Jump to: A | B | C | D | E | F | G | H | J | K | M | N | O | P | R | S | T | V | W | Y | Z
Number of items: 81.

A

Aggarwal, Divesh and Döttling, Nico and Nielsen, Jesper Buus and Obremski, Maciej and Purwanto, Erick
(2019) Continuous Non-Malleable Codes in the 8-Split-State Model.
In: EUROCRYPT.
Conference: EuroCrypt - International Conference on the Theory and Application of Cryptographic Techniques

Antonioli, Daniele and Tippenhauer, Nils Ole and Rasmussen, Kasper
(2019) Nearby Threats: Reversing, Analyzing, and Attacking Google’s 'Nearby Connections' on Android.
In: Proceedings of the Network and Distributed System Security Symposium (NDSS).
Conference: NDSS - Network and Distributed System Security Symposium

Antonioli, Daniele and Tippenhauer, Nils Ole and Rasmussen, Kasper Bonne
(2019) The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation Of Bluetooth BR/EDR.
In: Usenix Security Symposium.
Conference: USENIX-Security - Usenix Security Symposium

B

Backes, Michael and Döttling, Nico and Hanzlik, Lucjan and Kluczniak, Kamil and Schneider, Jonas
(2019) Ring Signatures: Logarithmic Size, No Setup -- from Standard Assumptions.
In: IACR Eurocrypt 2019.
Conference: EuroCrypt - International Conference on the Theory and Application of Cryptographic Techniques

Backes, Michael and Hanzlik, Lucjan and Herzberg, Amir and Kate, Aniket and Pryvalov, Ivan
(2019) Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains without Trusted Setup.
Proceedings of the 22nd edition of the International Conference on Practice and Theory of Public Key Cryptography (PKC 2019).
(In Press)

Backes, Michael and Hanzlik, Lucjan and Schneider-Bensch, Jonas
(2019) Membership Privacy for Fully Dynamic Group Signatures.
In: ACM CCS 2019.
Conference: CCS - ACM Conference on Computer and Communications Security
(In Press)

Bhattacharyya, Apratim and Fritz, Mario and Schiele, Bernt
(2019) Bayesian Prediction of Future Street Scenes using Synthetic Likelihoods.
In: International Conference on Representation Learning (ICLR).
Conference: None | Not Set

Brahmakshatriya, Ajay and Kedia, Piyus and Nemati, Hamed and McKee, Derrick and Bhatu, Pratik and Garg, Deepak and Lal, Akash and Rastogi, Aseem
(2019) CONFLLVM: Compiler-Based Information Flow Control in Low-Level Code.
In: Proceedings of the Fourteenth EuroSys Conference 2019, March 25-28, 2019, Dresden, Germany.
Conference: EuroSys - Eurosys Conference

Brakerski, Zvika and Döttling, Nico and Garg, Sanjam and Malavolta, Giulio
(2019) Leveraging Linear Decryption: Rate-1 Fully-Homomorphic Encryption and Time-Lock Puzzles.
In: TCC 2019.
Conference: TCC - Theory of Cryptography Conference
(In Press)

Breitenbacher, Dominik and Homoliak, Ivan and Aung, Yan Lin and Tippenhauer, Nils Ole and Elovici, Yuval
(2019) HADES-IoT: A Practical Host-Based Anomaly Detection System for IoT Devices.
In: AsiaCCS.
Conference: None | Not Set

C

Cascudo, Ignacio and Damgård, Ivan and David, Bernardo and Döttling, Nico and Dowsley, Rafael and Giacomelli, Irene
(2019) Efficient UC Commitment Extension with Homomorphism for Free (and Applications).
In: ASIACRYPT 2019.
Conference: ASIACRYPT - International Conference on the Theory and Application of Cryptology and Information Security
(In Press)

Chakraborty, Dhiman and Bugiel, Sven and Jha, Atul Ananad
(2019) Poster: TGX: Secure SGX enclave management using TPM.
In: NDSS Symposium 2019, February 24-27, 2019, San Diego, CA, USA.
Conference: NDSS - Network and Distributed System Security Symposium

Chakraborty, Dhiman and Hammer, Christian and Bugiel, Sven
(2019) Secure Multi-Execution in Android.
In: 34th ACM/SIGAPP Symposium On Applied Computing.
Conference: None | Not Set

Chakraborty, Dhiman and Hanzlik, Lucjan and Bugiel, Sven
(2019) simTPM: User-centric TPM for Mobile Devices.
In: Usenix Security Symposium, Santa Clara, CA, USA.
Conference: USENIX-Security - Usenix Security Symposium

Chakraborty, Dhiman and Hanzlik, Lucjan and Bugiel, Sven
(2019) simTPM: User-centric TPM for Mobile Devices (Technical Report).
arxiv.org.

Cohn-Gordon, Katriel and Cremers, Cas and Gjøsteen, Kristian and Jacobsen, Hakon and Jager, Tibor
(2019) Highly Efficient Key Exchange Protocols with Optimal Tightness: Enabling real-world deployments with theoretically sound parameters.
In: 39th International Cryptology Conference (CRYPTO 2019), August 18-22, 2019, Santa Barbara.
Conference: CRYPTO - Advances in Cryptology
(In Press)

Cremers, Cas and Dehnel-Wild, Martin
(2019) Component-Based Formal Analysis of 5G-AKA: Channel Assumptions and Session Confusion.
In: Network and Distributed Systems Security (NDSS) Symposium 2019, 24-27 February 2019, San Diego, CA, USA.
Conference: NDSS - Network and Distributed System Security Symposium
(In Press)

Cremers, Cas and Hirschi, Lucca
(2019) Improving Automated Symbolic Analysis of Ballot Secrecy for E-voting Protocols: A Method Based on Sufficient Conditions.
In: 4th IEEE European Symposium on Security and Privacy, June 17-19, 2019, Stockholm.
Conference: EuroS&P - IEEE European Symposium on Security and Privacy

Cremers, Cas and Jackson, Dennis
(2019) Prime, Order Please! Revisiting Small Subgroup and Invalid Curve Attacks on Protocols using Diffie-Hellman.
In: 32nd IEEE Computer Security Foundations Symposium, June 25-28, 2019, Hoboken, NJ, USA.
Conference: CSF - IEEE Computer Security Foundations Symposium (was CSFW)

D

Dawoud, Abdallah and Bugiel, Sven
(2019) DroidCap: OS Support for Capability-based Permissions in Android.
In: NDSS Symposium 2019.
Conference: NDSS - Network and Distributed System Security Symposium

Dax, Alexander and Tangermann, Sven and Künnemann, Robert and Backes, Michael
(2019) How to wrap it up - A formally verified proposal for the use of authenticated wrapping in PKCS#11.
In: Computer Security Foundations Symposium, Hobuken, NJ.
Conference: CSF - IEEE Computer Security Foundations Symposium (was CSFW)
(In Press)

Degott, Christian and Pereira Borges Jr., Nataniel and Zeller, Andreas
(2019) Learning User Interface Element Interactions.
In: ACM SIGSOFT International Symposium on Software Testing and Analysis, July 15-19, 2019, Beijing, China.
Conference: ISSTA - International Symposium on Software Testing and Analysis

Döttling, Nico and Garg, Sanjam and Goyal, Vipul and Malavolta, Giulio
(2019) Laconic Conditional Disclosure of Secrets and Applications.
In: FOCS 2019.
Conference: FOCS - IEEE Symposium on Foundations of Computer Science
(In Press)

Döttling, Nico and Garg, Sanjam and Hajiabadi, Mohammad and Liu, Kevin and Malavolta, Giulio
(2019) Rate-1 Trapdoor Functions from the Diffie-Hellman Problem.
In: ASIACRYPT 2019.
Conference: ASIACRYPT - International Conference on the Theory and Application of Cryptology and Information Security
(In Press)

Döttling, Nico and Garg, Sanjam and Ishai, Yuval and Malavolta, Giulio and Mour, Tamer and Ostrovsky, Rafail
(2019) Trapdoor Hash Functions and Their Applications.
In: CRYPTO 2019.
Conference: CRYPTO - Advances in Cryptology

Döttling, Nico and Lai, Russell and Malavolta, Giulio
(2019) Incremental Proofs of Sequential Work.
In: EUROCRYPT.
Conference: EuroCrypt - International Conference on the Theory and Application of Cryptographic Techniques
(Unpublished)

E

Eskandarian, Saba and Cogan, Jonathan and Birnbaum, Sawyer and Brandon, Peh Chang Wei and Franke, Dillon and Fraser, Forest and Garcia, Gaspar and Gong, Eric and Nguyen, Hung T. and Sethi, Taresh K. and Subbiah, Vishal and Backes, Michael and Pellegrino, Giancarlo and Boneh, Dan
(2019) Fidelius: Protecting User Secrets from Compromised Browsers.
In: S&P 2019.
Conference: S&P - IEEE Symposium on Security and Privacy

F

Fass, Aurore and Backes, Michael and Stock, Ben
(2019) HideNoSeek: Camouflaging Malicious JavaScript in Benign ASTs.
In: ACM Conference on Computer and Communications Security (CCS 2019).
Conference: CCS - ACM Conference on Computer and Communications Security

Fass, Aurore and Backes, Michael and Stock, Ben
(2019) JStap: A Static Pre-Filter for Malicious JavaScript Detection.
In: Annual Computer Security Applications Conference (ACSAC 2019).
Conference: ACSAC - Annual Computer Security Applications Conference

Fischer, Jonas and Vreeken, Jilles
(2019) Sets of Robust Rules, and How to Find Them.
In: ECMLPKDD.
Conference: ECML PKDD - European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Database (PKDD and ECML combined from 2008)

G

Ghaeini, Hamid Reza and Chan, Matthew and Bahmani, Raad and Brasser, Ferdinand and Garcia, Luis and Zhou, Jianying and Sadeghi, Ahmad-Reza and Tippenhauer, Nils Ole and Zonouz, Saman
(2019) PAtt: Physics-based Attestation of Control Systems.
In: Proceedings of International Symposium on Research in Attacks, Intrusions and Defenses (RAID).
Conference: RAID - International Symposium on Recent Advances in Intrusion Detection

Grosse, Kathrin and Trost, Thomas A. and Mosbach, Marius and Backes, Michael
(2019) Adversarial Initialization - when your network performs the way I want -.
ArXiv e-prints.

H

Hagestedt, Inken and Zhang, Yang and Humbert, Mathias and Berrang, Pascal and Haixu, Tang and XiaoFeng, Wang and Backes, Michael
(2019) MBeacon: Privacy-Preserving Beacons for DNA Methylation Data.
In: 26th Annual Network and Distributed System Security Symposium (NDSS 2019).
Conference: NDSS - Network and Distributed System Security Symposium

Hessel, Stefan and Möllers, Frederik
(2019) Gute Vorsätze für 2019: Die DSGVO verstehen und umsetzen.
Forum der Psychotherapeutenkammer des Saarlandes (72). pp. 8-11.

Hessel, Stefan and Sorge, Christoph
(2019) Saarbrücker Tabelle für Geldentschädigung bei Persönlichkeitsrechtsverletzungen.
In: juris Praxiskommentar BGB. Maximilian Herberger, Michael Martinek, Helmut Rüßmann, Stephan Weth, Markus Würdinger.

Heule, Marijn J.H. and Kiesl, Benjamin and Biere, Armin
(2019) Encoding Redundancy for Satisfaction-Driven Clause Learning.
In: 25th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2019).
Conference: TACAS - Tools and Algorithms for Construction and Analysis of Systems

Heule, Marijn J.H. and Kiesl, Benjamin and Biere, Armin
(2019) Strong Extension-Free Proof Systems.
Journal of Automated Reasoning. ISSN 0168-7433

Huang, Jie and Pereira Borges Jr., Nataniel and Bugiel, Sven and Backes, Michael
(2019) Up-To-Crash: Evaluating Third-Party Library Updatability on Android.
In: 4th IEEE European Symposium on Security and Privacy.
Conference: EuroS&P - IEEE European Symposium on Security and Privacy

J

Jackson, Daniel and Cremers, Cas and Cohn-Gordon, Katriel and Sasse, Ralf
(2019) Seems Legit: Automated Analysis of Subtle Attacks on Protocols that use Signatures.
In: 26th ACM Conference on Computer and Communications Security, November 11th-15th, 2019, London, UK.
Conference: CCS - ACM Conference on Computer and Communications Security
(In Press)

K

Kaltenpoth, David and Vreeken, Jilles
(2019) We Are Not Your Real Parents: Telling Causal from Confounded by MDL.
In: Proceedings of the 2019 SIAM International Conference on Data Mining (SDM).
Conference: SDM - SIAM International Conference on Data Mining

Ke, Qiuhong and Fritz, Mario and Schiele, Bernt
(2019) Time-Conditioned Action Anticipation in One Shot.
In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
Conference: CVPR - IEEE Conference on Computer Vision and Pattern Recognition

Kiesl, Benjamin and Seidl, Martina
(2019) QRAT Polynomially Simulates \forall-Exp+Res.
In: International Conference on Theory and Applications of Satisfiability Testing, July 7 - 12, Lisbon.
Conference: SAT - International Conference on Theory and Applications of Satisfiability Testing
(In Press)

Krombholz, Katharina and Busse, Karoline and Pfeffer, Katharina and Smith, Matthew and von Zezschwitz, Emanuel
(2019) "If HTTPS Were Secure, I Wouldn't Need 2FA" - End User and Administrator Mental Models of HTTPS.
In: S&P 2019.
Conference: S&P - IEEE Symposium on Security and Privacy

Künnemann, Robert and Esiyok, Ilkan and Backes, Michael
(2019) Automated Verification of Accountability in Security Protocols.
In: Computer Security Foundations Symposium.
Conference: CSF - IEEE Computer Security Foundations Symposium (was CSFW)
(In Press)

Künnemann, Robert and Garg, Deepak and Backes, Michael
(2019) Causality & Control flow.
In: 4th Workshop on Formal Reasoning about Causation, Responsibility, & Explanations in Science & Technology.
Conference: None | Not Set
(In Press)

M

Marnau, Ninja
(2019) Comments on the “Draft Ethics Guidelines for Trustworthy AI” by the High-Level Expert Group on Artificial Intelligence.
European Commission AI HLEG Stakeholders' Consultation
.

Marnau, Ninja
(2019) Datenschutzrecht und Brexit.
In: Brexit - Privat- und wirtschaftsrechtliche Folgen, 2. Aufl. (Hrsg. Kramme / Baldus / Schmidt-Kessel). Nomos. ISBN 978-3-8487-5438-0
(In Press)

Marnau, Ninja
(2019) Kommentierung der §§64, 70, 71, 74 BDSG.
In: Gola/Heckman (Hrsg.) Bundesdatenschutzgesetz, Kommentar, 13. Aufl. C.H.Beck. ISBN 978-3-406-72878-5
(In Press)

Marnau, Ninja
(2019) Stellungnahme gegenüber dem Landtag des Freistaats Sachen in der Anhörung zur Drucksache 6/16724 „Gesetz zur Neuordnung der Informationssicherheit im Freistaat Sachsen“.
CISPA, Landtag des Freistaats Sachsen
.

Marnau, Ninja
(2019) Stellungnahme gegenüber dem Landtag des Saarlandes in der Anhörung zur Drucksache 16/761 „Informationssicherheitsgesetz Saarland – IT-SiG SL“ sowie Änderung weiterer Vorschriften.
CISPA, Landtag des Saarlandes
.

Marnau, Ninja
(2019) Überwachung by Design.
Privacy in Germany (PinG) Journal, 2019/2. ISSN 2197-1862
(In Press)

Marnau, Ninja and Sorge, Christoph
(2019) From Law to Engineering: A Computer Science Perspective on Privacy & Data Protection.
In: González-Fuster, G., van Brakel, R. and P. De Hert (forthcoming) Research Handbook on Privacy and Data Protection Law. Values, Norms and Global Politics. Edward Elgar Publishing.
(In Press)

Marx, Alexander and Vreeken, Jilles
(2019) Approximating Algorithmic Conditional Independence for Discrete Data.
In: Proceedings of the First AAAI Spring Symposium Beyond Curve Fitting: Causation, Counterfactuals, and Imagination-based AI.
Conference: AAAI - National Conference of the American Association for Artificial Intelligence

Marx, Alexander and Vreeken, Jilles
(2019) Identifiability of Cause and Effect using Regularized Regression.
In: Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD).
Conference: SIGKDD - ACM International Conference on Knowledge Discovery and Data Mining

Marx, Alexander and Vreeken, Jilles
(2019) Telling Cause from Effect by Local and Global Regression.
Knowledge and Information Systems.
(In Press)

Marx, Alexander and Vreeken, Jilles
(2019) Testing Conditional Independence on Discrete Data using Stochastic Complexity.
In: Proceedings of the 22nd International Conference on Artificial Intelligence and Statistics (AISTATS).
Conference: AISTATS - International Conference on Artificial Intelligence and Statistics

Mathis, Björn and Gopinath, Rahul and Mera, Michaël and Kampmann, Alexander and Höschele, Matthias and Zeller, Andreas
(2019) Parser-Directed Fuzzing.
In: 40th ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2019), Sat 22 - Wed 26 June 2019, Phoenix, Arizona, United States.
Conference: PLDI - ACM-SIGPLAN Conference on Programming Language Design and Implementation
(In Press)

Maximov, Maxim and Leal-Taixe, Laura and Fritz, Mario and Ritschel, Tobias
(2019) Deep Appearance Maps.
In: International Conference on Computer Vision (ICCV).
Conference: ICCV - IEEE International Conference on Computer Vision

Musch, Marius and Steffens, Marius and Roth, Sebastian and Stock, Ben and Johns, Martin
(2019) ScriptProtect: Mitigating Unsafe Third-Party JavaScript Practices.
In: AsiaCCS.
Conference: None | Not Set

N

Naseri, Mohammad and Pereira Borges Jr., Nataniel and Zeller, Andreas and Rouvoy, Romain
(2019) AccessiLeaks: Investigating Privacy Leaks Exposed by the Android Accessibility Service.
In: PETS 2019 - The 19th Privacy Enhancing Technologies Symposium, 16-20, Stockholm, Sweden.
Conference: None | Not Set
(In Press)

Nguyen, Duc Cuong and Derr, Erik and Backes, Michael and Bugiel, Sven
(2019) Short Text, Large Effect: Measuring the Impact of User Reviews on Android App Security & Privacy.
In: Proceedings of the IEEE Symposium on Security & Privacy, May 2019, May 2019, San Francisco, CA, USA.
Conference: S&P - IEEE Symposium on Security and Privacy

O

Orekondy, Tribhuvanesh and Schiele, Bernt and Fritz, Mario
(2019) Knockoff Nets: Stealing Functionality of Black-Box Models.
In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
Conference: CVPR - IEEE Conference on Computer Vision and Pattern Recognition

P

Pereira Borges Jr., Nataniel and Zeller, Andreas
(2019) Why does this App need this Data? Automatic Tightening of Resource Access.
2019 IEEE 12th International Conference on Software Testing, Verification and Validation (ICST).

R

Rahman, Tahleen and Surma, Bartlomiej and Backes, Michael and Zhang, Yang
(2019) Fairwalk: Towards Fair Graph Embedding.
In: The 28th International Joint Conference on Artificial Intelligence.
Conference: IJCAI - International Joint Conference on Artificial Intelligence

S

Salem, Ahmed and Zhang, Yang and Humbert, Mathias and Berrang, Pascal and Fritz, Mario and Backes, Michael
(2019) ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models.
In: 26th Annual Network and Distributed System Security Symposium (NDSS 2019).
Conference: NDSS - Network and Distributed System Security Symposium

Sattar, Hosnieh and Pons-Moll, Gerard and Fritz, Mario
(2019) Fashion is Taking Shape: Understanding Clothing Preference Based on Body Shape From Online Sources.
In: IEEE Winter Conference on Applications of Computer Vision (WACV).
Conference: WACV - IEEE Workshop on Applications of Computer Vision

Shetty, Rakshith and Schiele, Bernt and Fritz, Mario
(2019) Not Using the Car to See the Sidewalk: Quantifying and Controlling the Effects of Context in Classification and Segmentation.
In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
Conference: CVPR - IEEE Conference on Computer Vision and Pattern Recognition

Speicher, Patrick and Steinmetz, Marcel and Hoffmann, Jörg and Backes, Michael and Künnemann, Robert
(2019) Towards Automated Network Mitigation Analysis.
In: The 34th ACM/SIGAPP Symposium On Applied Computing, Limassol, Cyprus.
Conference: None | Not Set

Speicher, Patrick and Steinmetz, Marcel and Hoffmann, Jörg and Backes, Michael and Künnemann, Robert
(2019) Towards Automated Network Mitigation Analysis (extended version).
In: Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing.
Conference: None | Not Set

Steffens, Marius and Rossow, Christian and Johns, Martin and Stock, Ben
(2019) Don’t Trust The Locals: Investigating the Prevalence of Persistent Client-Side Cross-Site Scripting in the Wild.
In: NDSS Symposium 2019.
Conference: NDSS - Network and Distributed System Security Symposium

Steil, Julian and Hagestedt, Inken and Huang, Michael Xuelin and Bulling, Andreas
(2019) Privacy-aware eye tracking using differential privacy.
In: Proceedings of the 11th ACM Symposium on Eye Tracking Research & Applications, ETRA 2019, Denver , CO, USA, June 25-28, 2019.
Conference: None | Not Set

Steinmetz, Marcel and Torralba, Àlvaro
(2019) Bridging the Gap Between Abstractions and Critical-Path Heuristics via Hypergraphs.
In: Proceedings of the 29th International Conference on Automated Planning and Scheduling (ICAPS'19), Berkeley, CA, USA, 2019..
Conference: None | Not Set

Suchan, Alexander and von Zezschwitz, Emanuel and Krombholz, Katharina
(2019) Stop to Unlock - Improving the Security of Android Unlock Patterns.
In: Workshop on Usable Security and Privacy (USEC) 2019.
Conference: None | Not Set

T

Tambe, Amit and Aung, Yan Lin and Sridharan, Ragav and Ochoa, Martin and Tippenhauer, Nils Ole and Shabtai, Asaf and Elovici, Yuval
(2019) Detection of Threats to IoT Devices using Scalable VPN-forwarded Honeypots.
In: ACM Conference on Data and Application Security and Privacy (CODASPY).
Conference: None | Not Set
(In Press)

Tiefenau, Christian and von Zezschwitz, Emanuel and Häring, Maximilian and Krombholz, Katharina and Smith, Matthew
(2019) A Usability Evaluation of Let's Encrypt and Certbot: Usable Security Done Right.
In: CCS 19, London, UK.
Conference: CCS - ACM Conference on Computer and Communications Security

Tramèr, Florian and Dupré, Pascal and Gili, Rusak and Pellegrino, Giancarlo and Boneh, Dan
(2019) AdVersarial: Perceptual Ad Blocking meets Adversarial Machine Learning.
In: CCS 19.
Conference: CCS - ACM Conference on Computer and Communications Security

V

van Schaik, Stephan and Milburn, Alyssa and Österlund, Sebastian and Frigo, Pietro and Maisuradze, Giorgi and Razavi, Kaveh and Bos, Herbert and Giuffrida, Cristiano
(2019) RIDL: Rogue In-flight Data Load.
In: 40th IEEE Symposium on Security and Privacy, 20-22 May 2019, San Francisco, USA.
Conference: S&P - IEEE Symposium on Security and Privacy

W

Walla, Sebastian and Rossow, Christian
(2019) MALPITY: Automatic Identification and Exploitation of Tarpit Vulnerabilities in Malware.
In: 4th IEEE European Symposium on Security and Privacy, 17-19 June 2019, Stockholm, Sweden.
Conference: EuroS&P - IEEE European Symposium on Security and Privacy
(In Press)

Y

Yu, Ning and Davis, Larry and Fritz, Mario
(2019) Attributing Fake Images to GANs: Learning and Analyzing GAN Fingerprints.
In: International Conference on Computer Vision (ICCV).
Conference: ICCV - IEEE International Conference on Computer Vision

Z

Zhang, Yang
(2019) Language in Our Time: An Empirical Analysis of Hashtags.
In: The Web Conference 2019.
Conference: WWW - International World Wide Web Conference

Zhao, Qingchuan and Zuo, Chaoshun and Pellegrino, Giancarlo and Zhiqiang, Li
(2019) Geo-locating Drivers: A Study of Sensitive Data Leakage in Ride-Hailing Services.
In: NDSS Symposium 2019.
Conference: NDSS - Network and Distributed System Security Symposium

This list was generated on Tue Nov 12 00:02:06 2019 CET.