Cherlynn Cha (ExpressVPN)
Detection-as-Code: Build threat detections the way you build software
View More Papers
UI-CTX: Understanding UI Behaviors with Code Contexts for Mobile...
Jiawei Li (Beihang University & National University of Singapore), Jiahao Liu (National University of Singapore), Jian Mao (Beihang University), Jun Zeng (National University of Singapore), Zhenkai Liang (National University of Singapore)
Read MoreMagmaw: Modality-Agnostic Adversarial Attacks on Machine Learning-Based Wireless Communication...
Jung-Woo Chang (University of California, San Diego), Ke Sun (University of California, San Diego), Nasimeh Heydaribeni (University of California, San Diego), Seira Hidano (KDDI Research, Inc.), Xinyu Zhang (University of California, San Diego), Farinaz Koushanfar (University of California, San Diego)
Read MoreBitShield: Defending Against Bit-Flip Attacks on DNN Executables
Yanzuo Chen (The Hong Kong University of Science and Technology), Yuanyuan Yuan (The Hong Kong University of Science and Technology), Zhibo Liu (The Hong Kong University of Science and Technology), Sihang Hu (Huawei Technologies), Tianxiang Li (Huawei Technologies), Shuai Wang (The Hong Kong University of Science and Technology)
Read MoreAutomating Remediation: Accelerating Mean Time to Response for Externally...
Johnathan Wilkes, John Anny (Palo Alto Networks)
Read More