Philip Stoner (Deloitte)
AI Adoption and Skill Development in Security Operations Centers
View More Papers
DShield: Defending against Backdoor Attacks on Graph Neural Networks...
Hao Yu (National University of Defense Technology), Chuan Ma (Chongqing University), Xinhang Wan (National University of Defense Technology), Jun Wang (National University of Defense Technology), Tao Xiang (Chongqing University), Meng Shen (Beijing Institute of Technology, Beijing, China), Xinwang Liu (National University of Defense Technology)
Read MoreOptimizing Trust-Centric Authentication in Matter-enabled IoT Devices with PUF...
Chandranshu Gupta, Gaurav Varshney (IIT Jammu)
Read MoreNo Source Code? No Problem! Twenty Years of Research...
Jack W. Davidson, Professor of Computer Science in the School of Engineering and Applied Science, University of Virginia
Read MoreTZ-DATASHIELD: Automated Data Protection for Embedded Systems via Data-Flow-Based...
Zelun Kong (University of Texas at Dallas), Minkyung Park (University of Texas at Dallas), Le Guan (University of Georgia), Ning Zhang (Washington University in St. Louis), Chung Hwan Kim (University of Texas at Dallas)
Read More