Daniel Kahn Gillmor (ACLU)
Keynote: Armor for the back half of the camel: Why confidentiality matters for recursive DNS traffic
View More Papers
Evaluating Personal Data Control In Mobile Applications Using Heuristics
Alain Giboin (UCA, INRIA, CNRS, I3S), Karima Boudaoud (UCA, CNRS, I3S), Patrice Pena (Userthink), Yoann Bertrand (UCA, CNRS, I3S), Fabien Gandon (UCA, INRIA, CNRS, I3S)
Read MoreFrom WHOIS to WHOWAS: A Large-Scale Measurement Study of...
Chaoyi Lu (Tsinghua University; Beijing National Research Center for Information Science and Technology), Baojun Liu (Tsinghua University; Beijing National Research Center for Information Science and Technology; Qi An Xin Group), Yiming Zhang (Tsinghua University; Beijing National Research Center for Information Science and Technology), Zhou Li (University of California, Irvine), Fenglu Zhang (Tsinghua University), Haixin Duan…
Read MoreData Poisoning Attacks to Deep Learning Based Recommender Systems
Hai Huang (Tsinghua University), Jiaming Mu (Tsinghua University), Neil Zhenqiang Gong (Duke University), Qi Li (Tsinghua University), Bin Liu (West Virginia University), Mingwei Xu (Tsinghua University)
Read MoreDetecting DolphinAttacks Based on Microphone Array
Guoming Zhang, Xiaoyu Ji (Zhejiang University)
Read More