Cherlynn Cha (ExpressVPN)
Detection-as-Code: Build threat detections the way you build software
View More Papers
PolicyPulse: Precision Semantic Role Extraction for Enhanced Privacy Policy...
Andrick Adhikari (University of Denver), Sanchari Das (University of Denver), Rinku Dewri (University of Denver)
Read MoreBitShield: Defending Against Bit-Flip Attacks on DNN Executables
Yanzuo Chen (The Hong Kong University of Science and Technology), Yuanyuan Yuan (The Hong Kong University of Science and Technology), Zhibo Liu (The Hong Kong University of Science and Technology), Sihang Hu (Huawei Technologies), Tianxiang Li (Huawei Technologies), Shuai Wang (The Hong Kong University of Science and Technology)
Read MoreMagmaw: Modality-Agnostic Adversarial Attacks on Machine Learning-Based Wireless Communication...
Jung-Woo Chang (University of California, San Diego), Ke Sun (University of California, San Diego), Nasimeh Heydaribeni (University of California, San Diego), Seira Hidano (KDDI Research, Inc.), Xinyu Zhang (University of California, San Diego), Farinaz Koushanfar (University of California, San Diego)
Read More