Anis Yusof (NU Singapore)
From Observations to Insights: Constructing Effective Cyberattack Provenance with PROVCON
View More Papers
Explanation as a Watermark: Towards Harmless and Multi-bit Model...
Shuo Shao (Zhejiang University), Yiming Li (Zhejiang University), Hongwei Yao (Zhejiang University), Yiling He (Zhejiang University), Zhan Qin (Zhejiang University), Kui Ren (Zhejiang University)
Read Morecozy: Comparative Symbolic Execution for Binary Programs
Caleb Helbling, Graham Leach-Krouse, Sam Lasser, Greg Sullivan (Draper)
Read MoreGhostShot: Manipulating the Image of CCD Cameras with Electromagnetic...
Yanze Ren (Zhejiang University), Qinhong Jiang (Zhejiang University), Chen Yan (Zhejiang University), Xiaoyu Ji (Zhejiang University), Wenyuan Xu (Zhejiang University)
Read More