Wes Hardaker (USC)
To understand anomalies, you must first understand your past
View More Papers
Iris: Dynamic Privacy Preserving Search in Authenticated Chord Peer-to-Peer...
Angeliki Aktypi (University of Oxford), Kasper Rasmussen (University of Oxford)
Read MoreFrom Large to Mammoth: A Comparative Evaluation of Large...
Jie Lin (University of Central Florida), David Mohaisen (University of Central Florida)
Read MoreKronos: A Secure and Generic Sharding Blockchain Consensus with...
Yizhong Liu (Beihang University), Andi Liu (Beihang University), Yuan Lu (Institute of Software Chinese Academy of Sciences), Zhuocheng Pan (Beihang University), Yinuo Li (Xi’an Jiaotong University), Jianwei Liu (Beihang University), Song Bian (Beihang University), Mauro Conti (University of Padua)
Read MoreOff-Path TCP Hijacking in Wi-Fi Networks: A Packet-Size Side...
Ziqiang Wang (Southeast University), Xuewei Feng (Tsinghua University), Qi Li (Tsinghua University), Kun Sun (George Mason University), Yuxiang Yang (Tsinghua University), Mengyuan Li (University of Toronto), Ganqiu Du (China Software Testing Center), Ke Xu (Tsinghua University), Jianping Wu (Tsinghua University)
Read More