Wes Hardaker (USC)
To understand anomalies, you must first understand your past
View More Papers
From Observations to Insights: Constructing Effective Cyberattack Provenance with...
Anis Yusof (NU Singapore)
Read MoreUI-CTX: Understanding UI Behaviors with Code Contexts for Mobile...
Jiawei Li (Beihang University & National University of Singapore), Jiahao Liu (National University of Singapore), Jian Mao (Beihang University), Jun Zeng (National University of Singapore), Zhenkai Liang (National University of Singapore)
Read MoreInterventional Root Cause Analysis of Failures in Multi-Sensor Fusion...
Shuguang Wang (City University of Hong Kong), Qian Zhou (City University of Hong Kong), Kui Wu (University of Victoria), Jinghuai Deng (City University of Hong Kong), Dapeng Wu (City University of Hong Kong), Wei-Bin Lee (Information Security Center, Hon Hai Research Institute), Jianping Wang (City University of Hong Kong)
Read More