Wes Hardaker (USC)
To understand anomalies, you must first understand your past
View More Papers
Careful About What App Promotion Ads Recommend! Detecting and...
Shang Ma (University of Notre Dame), Chaoran Chen (University of Notre Dame), Shao Yang (Case Western Reserve University), Shifu Hou (University of Notre Dame), Toby Jia-Jun Li (University of Notre Dame), Xusheng Xiao (Arizona State University), Tao Xie (Peking University), Yanfang Ye (University of Notre Dame)
Read MorePrivacy-Enhancing Technologies Against Physical-Layer and Link-Layer Device Tracking: Trends,...
Apolline Zehner (Universite libre de Bruxelles), Iness Ben Guirat (Universite libre de Bruxelles), Jan Tobias Muhlberg (Universite libre de Bruxelles)
Read MoreLearning Automated Defense Strategies Using Graph-Based Cyber Attack Simulations
Jakob Nyber, Pontus Johnson (KTH Royal Institute of Technology)
Read MoreNodeMedic-FINE: Automatic Detection and Exploit Synthesis for Node.js Vulnerabilities
Darion Cassel (Carnegie Mellon University), Nuno Sabino (IST & CMU), Min-Chien Hsu (Carnegie Mellon University), Ruben Martins (Carnegie Mellon University), Limin Jia (Carnegie Mellon University)
Read More