Zobrazeno 1 - 10
of 24
pro vyhledávání: '"Tsankov, Petar"'
Autor:
Guldimann, Philipp, Spiridonov, Alexander, Staab, Robin, Jovanović, Nikola, Vero, Mark, Vechev, Velko, Gueorguieva, Anna, Balunović, Mislav, Konstantinov, Nikola, Bielik, Pavol, Tsankov, Petar, Vechev, Martin
The EU's Artificial Intelligence Act (AI Act) is a significant step towards responsible AI development, but lacks clear technical interpretation, making it difficult to assess models' compliance. This work presents COMPL-AI, a comprehensive framework
Externí odkaz:
http://arxiv.org/abs/2410.07959
Publikováno v:
In: Maglogiannis I., Macintyre J., Iliadis L. (eds) Artificial Intelligence Applications and Innovations. AIAI 2021. IFIP Advances in Information and Communication Technology, vol 627. Springer, Cham
In the last years, AI systems, in particular neural networks, have seen a tremendous increase in performance, and they are now used in a broad range of applications. Unlike classical symbolic AI systems, neural networks are trained using large data s
Externí odkaz:
http://arxiv.org/abs/2108.06159
Reliable evaluation of adversarial defenses is a challenging task, currently limited to an expert who manually crafts attacks that exploit the defense's inner workings or approaches based on an ensemble of fixed attacks, none of which may be effectiv
Externí odkaz:
http://arxiv.org/abs/2102.11860
Recent work introduces zkay, a system for specifying and enforcing data privacy in smart contracts. While the original prototype implementation of zkay (v0.1) demonstrates the feasibility of the approach, its proof-of-concept implementation suffers f
Externí odkaz:
http://arxiv.org/abs/2009.01020
Autor:
Tsankov, Petar, Dan, Andrei, Cohen, Dana Drachsler, Gervais, Arthur, Buenzli, Florian, Vechev, Martin
Permissionless blockchains allow the execution of arbitrary programs (called smart contracts), enabling mutually untrusted entities to interact without relying on trusted third parties. Despite their potential, repeated security concerns have shaken
Externí odkaz:
http://arxiv.org/abs/1806.01143
Computer networks are hard to manage. Given a set of high-level requirements (e.g., reachability, security), operators have to manually figure out the individual configuration of potentially hundreds of devices running complex distributed protocols s
Externí odkaz:
http://arxiv.org/abs/1611.02537
Access-control requirements for physical spaces, like office buildings and airports, are best formulated from a global viewpoint in terms of system-wide requirements. For example, "there is an authorized path to exit the building from every room." In
Externí odkaz:
http://arxiv.org/abs/1605.01769
Publikováno v:
In Digital Investigation March 2017 20 Supplement:S75-S82
Autor:
Tsankov, Petar
Publikováno v:
Правна мисъл / Legal Studies. XLIV(2):94-97
Externí odkaz:
https://www.ceeol.com/search/article-detail?id=10008
Publikováno v:
Proceedings of the 18th USENIX Symposium on Networked System Design and Implementation
Network analysis and verification tools are often a godsend for network operators as they free them from the fear of introducing outages or security breaches. As with any complex software though, these tools can (and often do) have bugs. For the oper
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6bc5ad58a5be10216f4a7de75bb968e7
https://doi.org/10.3929/ethz-b-000491509
https://doi.org/10.3929/ethz-b-000491509