Cherlynn Cha (ExpressVPN)
Detection-as-Code: Build threat detections the way you build software
View More Papers
GhostShot: Manipulating the Image of CCD Cameras with Electromagnetic...
Yanze Ren (Zhejiang University), Qinhong Jiang (Zhejiang University), Chen Yan (Zhejiang University), Xiaoyu Ji (Zhejiang University), Wenyuan Xu (Zhejiang University)
Read MoreBinEnhance: An Enhancement Framework Based on External Environment Semantics...
Yongpan Wang (Institute of Information Engineering Chinese Academy of Sciences & University of Chinese Academy of Sciences, China), Hong Li (Institute of Information Engineering Chinese Academy of Sciences & University of Chinese Academy of Sciences, China), Xiaojie Zhu (King Abdullah University of Science and Technology, Thuwal, Saudi Arabia), Siyuan Li (Institute of Information Engineering Chinese…
Read MoreTowards LLM-Assisted Vulnerability Detection and Repair for Open-Source 5G...
Rupam Patir (University at Buffalo), Qiqing Huang (University at Buffalo), Keyan Guo (University at Buffalo), Wanda Guo (Texas A&M University), Guofei Gu (Texas A&M University), Haipeng Cai (University at Buffalo), Hongxin Hu (University at Buffalo)
Read MoreOptimizing Trust-Centric Authentication in Matter-enabled IoT Devices with PUF...
Chandranshu Gupta, Gaurav Varshney (IIT Jammu)
Read More