Zobrazeno 1 - 10
of 29
pro vyhledávání: '"Ramzan, Zulfikar"'
Autor:
Barrett, Clark, Boyd, Brad, Burzstein, Elie, Carlini, Nicholas, Chen, Brad, Choi, Jihye, Chowdhury, Amrita Roy, Christodorescu, Mihai, Datta, Anupam, Feizi, Soheil, Fisher, Kathleen, Hashimoto, Tatsunori, Hendrycks, Dan, Jha, Somesh, Kang, Daniel, Kerschbaum, Florian, Mitchell, Eric, Mitchell, John, Ramzan, Zulfikar, Shams, Khawaja, Song, Dawn, Taly, Ankur, Yang, Diyi
Publikováno v:
Foundations and Trends in Privacy and Security 6 (2023) 1-52
Every major technical invention resurfaces the dual-use dilemma -- the new technology has the potential to be used for good as well as for harm. Generative AI (GenAI) techniques, such as large language models (LLMs) and diffusion models, have shown r
Externí odkaz:
http://arxiv.org/abs/2308.14840
Autor:
Ramzan, Zulfikar Amin, 1975
Thesis (Ph.D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2001.
Includes bibliographical references (p. 188-200).
by Zulfikar Amin Ramzan.
Ph.D.
Includes bibliographical references (p. 188-200).
by Zulfikar Amin Ramzan.
Ph.D.
Externí odkaz:
http://hdl.handle.net/1721.1/86580
Autor:
Ramzan, Zulfikar Amin, 1975
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1999.
Includes bibliographical references (leaves 82-86).
by Zulfikar Amin Ramzan.
S.M.
Includes bibliographical references (leaves 82-86).
by Zulfikar Amin Ramzan.
S.M.
Externí odkaz:
http://hdl.handle.net/1721.1/80561
Publikováno v:
Security Protocols (9783642049033); 2009, p177-180, 4p
Autor:
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Qing, Sihan, Imai, Hideki, Wang, Guilin, Stamm, Sid, Ramzan, Zulfikar
Publikováno v:
Information & Communications Security (978-3-540-77047-3); 2008, p495-506, 12p
Publikováno v:
Public Key Cryptography - PKC 2006; 2006, p257-273, 17p
Autor:
Yoshiura, Hiroshi, Sakurai, Kouichi, Rannenberg, Kai, Murayama, Yuko, Kawamura, Shinichi, Kempf, James, Wood, Jonathan, Ramzan, Zulfikar, Gentry, Craig
Publikováno v:
Advances in Information & Computer Security; 2006, p196-211, 16p
Publikováno v:
Advances in Cryptology - CRYPTO 2006; 2006, p308-325, 18p
Publikováno v:
Advances in Cryptology - CRYPTO 2006; 2006, p142-159, 18p
Publikováno v:
Proceedings of the 12th ACM Conference: Computer & Communications Security; 11/ 7/2005, p299-309, 11p