Seyed Ali Ghazi Asgar, Narasimha Reddy (Texas A&M University)
Analysis of Misconfigured IoT MQTT Deployments and a Lightweight Exposure Detection System
View More Papers
DShield: Defending against Backdoor Attacks on Graph Neural Networks...
Hao Yu (National University of Defense Technology), Chuan Ma (Chongqing University), Xinhang Wan (National University of Defense Technology), Jun Wang (National University of Defense Technology), Tao Xiang (Chongqing University), Meng Shen (Beijing Institute of Technology, Beijing, China), Xinwang Liu (National University of Defense Technology)
Read MoreDetecting Ransomware Despite I/O Overhead: A Practical Multi-Staged Approach
Christian van Sloun (RWTH Aachen University), Vincent Woeste (RWTH Aachen University), Konrad Wolsing (RWTH Aachen University & Fraunhofer FKIE), Jan Pennekamp (RWTH Aachen University), Klaus Wehrle (RWTH Aachen University)
Read MoreRAIFLE: Reconstruction Attacks on Interaction-based Federated Learning with Adversarial...
Dzung Pham (University of Massachusetts Amherst), Shreyas Kulkarni (University of Massachusetts Amherst), Amir Houmansadr (University of Massachusetts Amherst)
Read More