Machine Unlearning in Computer Vision: Foundations and ApplicationsSijia LiuYang Liuet al.2024CVPR 2024
Efficient Skip Connections Realization for Secure Inference on Encrypted DataNir DruckerItamar Zimerman2023CSCML 2023
Graph Representation Learning based Vulnerable Target Identification in Ransomware AttacksWenqi WeiMu Qiaoet al.2022Big Data 2022
PUF-derived IoT identities in a zero-knowledge protocol for blockchainMiguel ÁNgel Prada-delgadoIluminada Baturoneet al.2020IoT
IPV: A system for identifying privacy vulnerabilities in datasetsAris Gkoulalas-DivanisStefano Braghin2016IBM J. Res. Dev
Mezzo TLS 1.3 Protocol, Suitable for Transmitting Already-Encrypted DataNir DruckerShai Gueron2024CSCML 2024