Cherlynn Cha (ExpressVPN)
Detection-as-Code: Build threat detections the way you build software
View More Papers
A Method to Facilitate Membership Inference Attacks in Deep...
Zitao Chen (University of British Columbia), Karthik Pattabiraman (University of British Columbia)
Read MoreRadSee: See Your Handwriting Through Walls Using FMCW Radar
Shichen Zhang (Michigan State University), Qijun Wang (Michigan State University), Maolin Gan (Michigan State University), Zhichao Cao (Michigan State University), Huacheng Zeng (Michigan State University)
Read MoreIncorporating Gradients to Rules: Towards Lightweight, Adaptive Provenance-based Intrusion...
Lingzhi Wang (Northwestern University), Xiangmin Shen (Northwestern University), Weijian Li (Northwestern University), Zhenyuan LI (Zhejiang University), R. Sekar (Stony Brook University), Han Liu (Northwestern University), Yan Chen (Northwestern University)
Read MoreThe Discriminative Power of Cross-layer RTTs in Fingerprinting Proxy...
Diwen Xue (University of Michigan), Robert Stanley (University of Michigan), Piyush Kumar (University of Michigan), Roya Ensafi (University of Michigan)
Read More