TBA
View More Papers
Manipulating the Byzantine: Optimizing Model Poisoning Attacks and Defenses...
Virat Shejwalkar (UMass Amherst), Amir Houmansadr (UMass Amherst)
Read MoreUnderstanding the Growth and Security Considerations of ECS
Athanasios Kountouras (Georgia Institute of Technology), Panagiotis Kintis (Georgia Institute of Technology), Athanasios Avgetidis (Georgia Institute of Technology), Thomas Papastergiou (Georgia Institute of Technology), Charles Lever (Georgia Institute of Technology), Michalis Polychronakis (Stony Brook University), Manos Antonakakis (Georgia Institute of Technology)
Read MoreIs Your Firmware Real or Re-Hosted? A case study...
Abraham A. Clements, Logan Carpenter, William A. Moeglein (Sandia National Laboratories), Christopher Wright (Purdue University)
Read More