Dr. Ruoyu (Fish) Wang, Assistant Professor at Arizona State University
30 Years into Scientific Binary Decompilation: What We Have Achieved and What We Need to Do Next
View More Papers
Analyzing and Creating Malicious URLs: A Comparative Study on...
Vincent Drury (IT-Security Research Group, RWTH Aachen University), Rene Roepke (Learning Technologies Research Group, RWTH Aachen University), Ulrik Schroeder (Learning Technologies Research Group, RWTH Aachen University), Ulrike Meyer (IT-Security Research Group, RWTH Aachen University)
Read MoreFuzzing: A Tale of Two Cultures
Andreas Zeller (CISPA Helmholtz Center for Information Security)
Read MoreInterpretable Federated Transformer Log Learning for Cloud Threat Forensics
Gonzalo De La Torre Parra (University of the Incarnate Word, TX, USA), Luis Selvera (Secure AI and Autonomy Lab, The University of Texas at San Antonio, TX, USA), Joseph Khoury (The Cyber Center For Security and Analytics, University of Texas at San Antonio, TX, USA), Hector Irizarry (Raytheon, USA), Elias Bou-Harb (The Cyber Center For…
Read MoreIt Doesn’t Have to Be So Hard: Efficient Symbolic...
Vaibhav Sharma (University of Minnesota), Navid Emamdoost (University of Minnesota), Seonmo Kim (University of Minnesota), Stephen McCamant (University of Minnesota)
Read More