Ben Nassi (Ben-Gurion University of the Negev), Elad Feldman (Ben-Gurion University of the Negev), Aviel Levy (Ben-Gurion University of the Negev), Yaron Pirutin (Ben-Gurion University of the Negev), Asaf Shabtai (Ben-Gurion University of the Negev), Ryusuke Masuoka (Fujitsu System Integration Laboratories) and Yuval Elovici (Ben-Gurion University of the Negev)
Demo #8: Identifying Drones Based on Visual Tokens
View More Papers
Generation of CAN-based Wheel Lockup Attacks on the Dynamics...
Alireza Mohammadi (University of Michigan-Dearborn), Hafiz Malik (University of Michigan-Dearborn) and Masoud Abbaszadeh (GE Global Research)
Read MoreTowards a TEE-based V2V Protocol for Connected and Autonomous...
Mohit Kumar Jangid (Ohio State University) and Zhiqiang Lin (Ohio State University)
Read MoreAn In-Depth Analysis on Adoption of Attack Mitigations in...
Ruotong Yu (Stevens Institute of Technology, University of Utah), Yuchen Zhang, Shan Huang (Stevens Institute of Technology)
Read MoreDetecting Obfuscated Function Clones in Binaries using Machine Learning
Michael Pucher (University of Vienna), Christian Kudera (SBA Research), Georg Merzdovnik (SBA Research)
Read More