Wes Hardaker (USC)
To understand anomalies, you must first understand your past
View More Papers
From Large to Mammoth: A Comparative Evaluation of Large...
Jie Lin (University of Central Florida), David Mohaisen (University of Central Florida)
Read MoreRepurposing Neural Networks for Efficient Cryptographic Computation
Xin Jin (The Ohio State University), Shiqing Ma (University of Massachusetts Amherst), Zhiqiang Lin (The Ohio State University)
Read MoreNodeMedic-FINE: Automatic Detection and Exploit Synthesis for Node.js Vulnerabilities
Darion Cassel (Carnegie Mellon University), Nuno Sabino (IST & CMU), Min-Chien Hsu (Carnegie Mellon University), Ruben Martins (Carnegie Mellon University), Limin Jia (Carnegie Mellon University)
Read MoreThe Discriminative Power of Cross-layer RTTs in Fingerprinting Proxy...
Diwen Xue (University of Michigan), Robert Stanley (University of Michigan), Piyush Kumar (University of Michigan), Roya Ensafi (University of Michigan)
Read More