Adversarial Attacks On ML Systems
Is Feature Selection Secure against Training Data Poisoning?
Information Systems: A Manager's Guide to Harnessing Technology
Computer Systems Security
Computer Systems Security
Introduction to EECS II: Digital Communication Systems
Computer Systems Security
Crowdsourcing/non-market strategies
Navigating Internet´s Course
Algorithmic Crowdsourcing