Query Privacy in Data Spaces
View More Papers
Horcrux: Synthesize, Split, Shift and Stay Alive; Preventing Channel...
Anqi Tian (Institute of Software, Chinese Academy of Sciences; School of Computer Science and Technology, University of Chinese Academy of Sciences), Peifang Ni (Institute of Software, Chinese Academy of Sciences; Zhongguancun Laboratory, Beijing, P.R.China), Yingzi Gao (Institute of Software, Chinese Academy of Sciences; University of Chinese Academy of Sciences), Jing Xu (Institute of Software, Chinese…
Read MoreLogical Maneuvers: Detecting and Mitigating Adversarial Hardware Faults in...
Fatemeh Khojasteh Dana, Saleh Khalaj Monfared, Shahin Tajik (Worcester Polytechnic Institute)
Read MoreLeakLess: Selective Data Protection against Memory Leakage Attacks for...
Maryam Rostamipoor (Stony Brook University), Seyedhamed Ghavamnia (University of Connecticut), Michalis Polychronakis (Stony Brook University)
Read More