Cherlynn Cha (ExpressVPN)
Detection-as-Code: Build threat detections the way you build software
View More Papers
Secure Transformer Inference Made Non-interactive
Jiawen Zhang (Zhejiang University), Xinpeng Yang (Zhejiang University), Lipeng He (University of Waterloo), Kejia Chen (Zhejiang University), Wen-jie Lu (Zhejiang University), Yinghao Wang (Zhejiang University), Xiaoyang Hou (Zhejiang University), Jian Liu (Zhejiang University), Kui Ren (Zhejiang University), Xiaohu Yang (Zhejiang University)
Read MorePanel on “Security and Privacy Issues in New 5G...
Moderator: Arupjyoti (Arup) Bhuyan, Ph.D. Director, Wireless Security Institute, Idaho National Laboratory Panelists: Ted K. Woodward, Ph.D. Technical Director for FutureG, OUSD (R&E) Phillip Porras, Program Director, Internet Security Research, SRI Donald McBride, Senior Security Researcher, Bell Laboratories, Nokia
Read MorePoster: Securing IoT Edge Devices: Applying NIST IR 8259A...
Rahul Choutapally, Konika Reddy Saddikuti, Solomon Berhe (University of the Pacific)
Read MoremmProcess: Phase-Based Speech Reconstruction from mmWave Radar
Hyeongjun Choi, Young Eun Kwon, Ji Won Yoon (Korea University)
Read More