Cherlynn Cha (ExpressVPN)
Detection-as-Code: Build threat detections the way you build software
View More Papers
Towards Understanding Unsafe Video Generation
Yan Pang (University of Virginia), Aiping Xiong (Penn State University), Yang Zhang (CISPA Helmholtz Center for Information Security), Tianhao Wang (University of Virginia)
Read MoreEAGLEYE: Exposing Hidden Web Interfaces in IoT Devices via...
Hangtian Liu (Information Engineering University), Lei Zheng (Institute for Network Sciences and Cyberspace (INSC), Tsinghua University), Shuitao Gan (Laboratory for Advanced Computing and Intelligence Engineering), Chao Zhang (Institute for Network Sciences and Cyberspace (INSC), Tsinghua University), Zicong Gao (Information Engineering University), Hongqi Zhang (Henan Key Laboratory of Information Security), Yishun Zeng (Institute for Network Sciences…
Read MoreExperiences of Using Agentic AI to Fill Tooling Gaps...
Kritan Banstola (University of South Florida), Faayed Al Faisal (University of South Florida), Xinming Ou (University of South Florida)
Read More