Hamed Haddadpajouh, Ali Dehghantanha
Make your IoT environments robust against adversarial machine learning malware threats: a code-cave approach
View More Papers
From Hardware Fingerprint to Access Token: Enhancing the Authentication...
Yue Xiao (Wuhan University), Yi He (Tsinghua University), Xiaoli Zhang (Zhejiang University of Technology), Qian Wang (Wuhan University), Renjie Xie (Tsinghua University), Kun Sun (George Mason University), Ke Xu (Tsinghua University), Qi Li (Tsinghua University)
Read MoreWIP: Security Vulnerabilities and Attack Scenarios in Smart Home...
Haoqiang Wang (Chinese Academy of Sciences, University of Chinese Academy of Sciences, Indiana University Bloomington), Yichen Liu (Indiana University Bloomington), Yiwei Fang, Ze Jin, Qixu Liu (Chinese Academy of Sciences, University of Chinese Academy of Sciences, Indiana University Bloomington), Luyi Xing (Indiana University Bloomington)
Read MoreAttributions for ML-based ICS Anomaly Detection: From Theory to...
Clement Fung (Carnegie Mellon University), Eric Zeng (Carnegie Mellon University), Lujo Bauer (Carnegie Mellon University)
Read MoreStacking up the LLM Risks: Applied Machine Learning Security
Dr. Gary McGraw, Berryville Institute of Machine Learning
Read More