Ben Nassi (Ben-Gurion University of the Negev), Elad Feldman (Ben-Gurion University of the Negev), Aviel Levy (Ben-Gurion University of the Negev), Yaron Pirutin (Ben-Gurion University of the Negev), Asaf Shabtai (Ben-Gurion University of the Negev), Ryusuke Masuoka (Fujitsu System Integration Laboratories) and Yuval Elovici (Ben-Gurion University of the Negev)
Demo #8: Identifying Drones Based on Visual Tokens
View More Papers
Hiding My Real Self! Protecting Intellectual Property in Additive...
Sizhuang Liang (Georgia Institute of Technology), Saman Zonouz (Rutgers University), Raheem Beyah (Georgia Institute of Technology)
Read MoreFuzzing: A Tale of Two Cultures
Andreas Zeller (CISPA Helmholtz Center for Information Security)
Read MoreWhat the Fork? Finding and Analyzing Malware in GitHub...
Alan Cao (New York University) and Brendan Dolan-Gavitt (New York University)
Read MoreDemo #6: Impact of Stealthy Attacks on Autonomous Robotic...
Pritam Dash, Mehdi Karimibiuki, and Karthik Pattabiraman (University of British Columbia)
Read More