Cherlynn Cha (ExpressVPN)
Detection-as-Code: Build threat detections the way you build software
View More Papers
Enhancing Security in Third-Party Library Reuse – Comprehensive Detection...
Shangzhi Xu (The University of New South Wales), Jialiang Dong (The University of New South Wales), Weiting Cai (Delft University of Technology), Juanru Li (Feiyu Tech), Arash Shaghaghi (The University of New South Wales), Nan Sun (The University of New South Wales), Siqi Ma (The University of New South Wales)
Read MoreFormally Verifying the Newest Versions of the GNSS-centric TESLA...
Ioana Boureanu, Stephan Wesemeyer (Surrey Centre for Cyber Security, University of Surrey)
Read MoreBlack-box Membership Inference Attacks against Fine-tuned Diffusion Models
Yan Pang (University of Virginia), Tianhao Wang (University of Virginia)
Read MoreCharacterizing the Impact of Audio Deepfakes in the Presence...
Magdalena Pasternak (University of Florida), Kevin Warren (University of Florida), Daniel Olszewski (University of Florida), Susan Nittrouer (University of Florida), Patrick Traynor (University of Florida), Kevin Butler (University of Florida)
Read More