Filter dates
Overview
- access logs
- access patterns
- prefetching
- web mining
- privacy policies
Publications
Information Flow Control in Machine Learning through Modular Model Architecture.
USENIX Security Symposium
Information Flow Control in Machine Learning through Modular Model Architecture.
CoRR
Union Buster: A Cross-Container Covert-Channel Exploiting Union Mounting.
CSCML
Guessing Outputs of Dynamically Pruned CNNs Using Memory Access Patterns.
IEEE Comput. Archit. Lett.
Location Leakage from Network Access Patterns.
CNS
Case Study: Disclosure of Indirect Device Fingerprinting in Privacy Policies.
CoRR