Cherlynn Cha (ExpressVPN)
Detection-as-Code: Build threat detections the way you build software
View More Papers
Talk: ORTSOC: A Clinical Rotation Approach to Professional Cybersecurity...
Rakesh Bobba, Dave Nevin (Oregon State University)
Read MoreCHAOS: Exploiting Station Time Synchronization in 802.11 Networks
Sirus Shahini (University of Utah), Robert Ricci (University of Utah)
Read MoreCrosstalk-induced Side Channel Threats in Multi-Tenant NISQ Computers
Ruixuan Li (Choudhury), Chaithanya Naik Mude (University of Wisconsin-Madison), Sanjay Das (The University of Texas at Dallas), Preetham Chandra Tikkireddi (University of Wisconsin-Madison), Swamit Tannu (University of Wisconsin, Madison), Kanad Basu (University of Texas at Dallas)
Read MoreCENSOR: Defense Against Gradient Inversion via Orthogonal Subspace Bayesian...
Kaiyuan Zhang (Purdue University), Siyuan Cheng (Purdue University), Guangyu Shen (Purdue University), Bruno Ribeiro (Purdue University), Shengwei An (Purdue University), Pin-Yu Chen (IBM Research AI), Xiangyu Zhang (Purdue University), Ninghui Li (Purdue University)
Read More