Wes Hardaker (USC)
To understand anomalies, you must first understand your past
View More Papers
Non-intrusive and Unconstrained Keystroke Inference in VR Platforms via...
Tao Ni (City University of Hong Kong), Yuefeng Du (City University of Hong Kong), Qingchuan Zhao (City University of Hong Kong), Cong Wang (City University of Hong Kong)
Read MoreSecure Data Analytics in Apache Spark with Fine-grained Policy...
Byeongwook Kim (Seoul National University), Jaewon Hur (Seoul National University), Adil Ahmad (Arizona State University), Byoungyoung Lee (Seoul National University)
Read MoreGenerating API Parameter Security Rules with LLM for API...
Jinghua Liu (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, China), Yi Yang (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, China), Kai Chen (Institute of Information Engineering, Chinese Academy of…
Read MoredAngr: Lifting Software Debugging to a Symbolic Level
Dairo de Ruck, Jef Jacobs, Jorn Lapon, Vincent Naessens (DistriNet, KU Leuven, 3001 Leuven, Belgium)
Read More