Junjie Shen, Jun Yeon Won, Zeyuan Chen and Qi Alfred Chen (UC Irvine)
Demo #9: Attacking Multi-Sensor Fusion based Localization in High-Level Autonomous Driving
View More Papers
Shadow Attacks: Hiding and Replacing Content in Signed PDFs
Christian Mainka (Ruhr University Bochum), Vladislav Mladenov (Ruhr University Bochum), Simon Rohlmann (Ruhr University Bochum)
Read MorePractical Non-Interactive Searchable Encryption with Forward and Backward Privacy
Shi-Feng Sun (Monash University, Australia), Ron Steinfeld (Monash University, Australia), Shangqi Lai (Monash University, Australia), Xingliang Yuan (Monash University, Australia), Amin Sakzad (Monash University, Australia), Joseph Liu (Monash University, Australia), Surya Nepal (Data61, CSIRO, Australia), Dawu Gu (Shanghai Jiao Tong University, China)
Read MoreOn the Insecurity of SMS One-Time Password Messages against...
Zeyu Lei (Purdue University), Yuhong Nan (Purdue University), Yanick Fratantonio (Eurecom & Cisco Talos), Antonio Bianchi (Purdue University)
Read MoreWhen DNS Goes Dark: Understanding Privacy and Shaping Policy...
Vijay k. Gurbani and Cynthia Hood ( Illinois Institute of Technology), Anita Nikolich (University of Illinois), Henning Schulzrinne (Columbia University) and Radu State (University of Luxembourg)
Read More