Hyungsub Kim (Purdue University), Muslum Ozgur Ozmen (Purdue University), Antonio Bianchi (Purdue University), Z. Berkay Celik (Purdue University) and Dongyan Xu (Purdue University)
Demo #2: Policy-based Discovery and Patching of Logic Bugs in Robotic Vehicles
View More Papers
Evaluating Susceptibility of VPN Implementations to DoS Attacks Using...
Fabio Streun (ETH Zurich), Joel Wanner (ETH Zurich), Adrian Perrig (ETH Zurich)
Read MoreGet a Model! Model Hijacking Attack Against Machine Learning...
Ahmed Salem (CISPA Helmholtz Center for Information Security), Michael Backes (CISPA Helmholtz Center for Information Security), Yang Zhang (CISPA Helmholtz Center for Information Security)
Read MoreTowards a TEE-based V2V Protocol for Connected and Autonomous...
Mohit Kumar Jangid (Ohio State University) and Zhiqiang Lin (Ohio State University)
Read MoreExplainable AI in Cybersecurity Operations: Lessons Learned from xAI...
Megan Nyre-Yu (Sandia National Laboratories), Elizabeth S. Morris (Sandia National Laboratories), Blake Moss (Sandia National Laboratories), Charles Smutz (Sandia National Laboratories), Michael R. Smith (Sandia National Laboratories)
Read More