A Framework for Practical Anonymous Credentials from LatticesJonathan BootleVadim Lyubashevskyet al.2023CRYPTO 2023
URET: Universal Robustness Evaluation Toolkit (for Evasion)Kevin EykholtTaesung Leeet al.2023USENIX Security 2023
Not All Data are Created Equal: Data and Pointer Prioritization for Scalable Protection Against Data-Oriented AttacksSalman AhmedHans Liljestrandet al.2023USENIX Security 2023
Probabilistic Attention-to-Influence Neural Models for Event SequencesXiao ShouDebarun Bhattacharjyaet al.2023ICML 2023
Unifying Molecular and Textual Representations via Multi-task Language ModellingDimitrios ChristofidellisGiorgio Giannoneet al.2023ICML 2023
Biases in Evaluation of Molecular Optimization Methods and Bias Reduction StrategiesHiroshi KajinoKohei Miyaguchiet al.2023ICML 2023