Wes Hardaker (USC)
To understand anomalies, you must first understand your past
View More Papers
UI-CTX: Understanding UI Behaviors with Code Contexts for Mobile...
Jiawei Li (Beihang University & National University of Singapore), Jiahao Liu (National University of Singapore), Jian Mao (Beihang University), Jun Zeng (National University of Singapore), Zhenkai Liang (National University of Singapore)
Read MoreHidden and Lost Control: on Security Design Risks in...
Haoqiang Wang, Yiwei Fang (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences; Indiana University Bloomington), Yichen Liu (Indiana University Bloomington), Ze Jin (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences; Indiana University Bloomington), Emma Delph…
Read MoreSecuWear: Secure Data Sharing Between Wearable Devices
Sujin Han (KAIST) Diana A. Vasile (Nokia Bell Labs), Fahim Kawsar (Nokia Bell Labs, University of Glasgow), Chulhong Min (Nokia Bell Labs)
Read MoreA Method to Facilitate Membership Inference Attacks in Deep...
Zitao Chen (University of British Columbia), Karthik Pattabiraman (University of British Columbia)
Read More