(1) Jonathan Petit, Secure ML Performance Benchmark (Qualcomm)
(2) David Balenson, The Road to Future Automotive Research Datasets: PIVOT Project and Community Workshop (USC Information Sciences Institute)
(3) Jeremy Daily, CyberX Challenge Events (Colorado State University)
(4) Mert D. Pesé, DETROIT: Data Collection, Translation and Sharing for Rapid Vehicular App Development (Clemson University)
(5) Ning Zhang, Timing Security in Cyber-physical Systems (Washington University in St. Louis )
(6) Craig Rodine, Large-scale simulation of EV Charging PKI (Sandia National Laboratories)
Lightning Community Shout-Outs to:
View More Papers
VulHawk: Cross-architecture Vulnerability Detection with Entropy-based Binary Code Search
Zhenhao Luo (College of Computer, National University of Defense Technology), Pengfei Wang (College of Computer, National University of Defense Technology), Baosheng Wang (College of Computer, National University of Defense Technology), Yong Tang (College of Computer, National University of Defense Technology), Wei Xie (College of Computer, National University of Defense Technology), Xu Zhou (College of Computer,…
Read MoreWIP: Adversarial Retroreflective Patches: A Novel Stealthy Attack on...
Go Tsuruoka (Waseda University), Takami Sato, Qi Alfred Chen (University of California, Irvine), Kazuki Nomoto, Ryunosuke Kobayashi, Yuna Tanaka (Waseda University), Tatsuya Mori (Waseda University/NICT/RIKEN)
Read MoreSometimes, You Aren’t What You Do: Mimicry Attacks against...
Akul Goyal (University of Illinois at Urbana-Champaign), Xueyuan Han (Wake Forest University), Gang Wang (University of Illinois at Urbana-Champaign), Adam Bates (University of Illinois at Urbana-Champaign)
Read MoreEvaluating Wireless Attacks Against CCS Electric Vehicle Charging
Sebastian Köhler (University of Oxford)
Read More