Login / Signup

A Hardest Attacker for Leaking References.

René Rydhof Hansen
Published in: ESOP (2004)
Keyphrases
  • sensitive information
  • databases
  • multiscale
  • neural network
  • real world
  • machine learning
  • information retrieval
  • training data
  • user interface
  • information retrieval systems