BLACKOUT presentation (ACM CCS 2025)
Secure Systems
BLACKOUT presentation (ACM CCS 2025)
16:20
SoK: Unintended Interactions among Machine Learning Defenses and Risks
Secure Systems
SoK: Unintended Interactions among Machine Learning Defenses and Risks
18:19
GrOVe: Ownership Verification of Graph Neural Networks using Embeddings
Secure Systems
GrOVe: Ownership Verification of Graph Neural Networks using Embeddings
14:54
Modelling Blinded Memory with F*
Secure Systems
Modelling Blinded Memory with F*
33:10
On the Robustness of Dataset Inference, TMLR 2023
Secure Systems
On the Robustness of Dataset Inference, TMLR 2023
10:22
Effective Writing Style Transfer via Combinatorial Paraphrasing
Secure Systems
Effective Writing Style Transfer via Combinatorial Paraphrasing
19:20
Improving Toxic Language Classification Despite Data Scarcity
Secure Systems
Improving Toxic Language Classification Despite Data Scarcity
4:54
Watermarking for Federated Learning
Secure Systems
Watermarking for Federated Learning
4:15
CloSe project workshop 2015 - Crowcroft
Secure Systems
CloSe project workshop 2015 - Crowcroft
1:04:59
CloSe project workshop 2015 - Tsudik
Secure Systems
CloSe project workshop 2015 - Tsudik
1:03:58