Search Results
2. SECURITY PATTERN DETECTION IN SOFTWARE CODE USING MACHINE LEARNING ALGORITHMS
![restricted_to_institution](/assets/restricted_to_institution_icon-7d7fc9806cb362d0af51e67b7302f7f9dbd0e97c4946cdf9449c0a7bd69f8c7d.png)
Restricted (Penn State Only)
3. Communicating Privacy-Utility Trade-Offs of Differential Privacy Through Analogical Reasoning
![restricted_to_institution](/assets/restricted_to_institution_icon-7d7fc9806cb362d0af51e67b7302f7f9dbd0e97c4946cdf9449c0a7bd69f8c7d.png)
Restricted (Penn State Only)