Wes Hardaker (USC)
To understand anomalies, you must first understand your past
View More Papers
ERW-Radar: An Adaptive Detection System against Evasive Ransomware by...
Lingbo Zhao (Institute of Information Engineering, Chinese Academy of Sciences), Yuhui Zhang (Institute of Information Engineering, Chinese Academy of Sciences), Zhilu Wang (Institute of Information Engineering, Chinese Academy of Sciences), Fengkai Yuan (Institute of Information Engineering, CAS), Rui Hou (Institute of Information Engineering, Chinese Academy of Sciences)
Read MoreFrom Large to Mammoth: A Comparative Evaluation of Large...
Jie Lin (University of Central Florida), David Mohaisen (University of Central Florida)
Read MoreMoneta: Ex-Vivo GPU Driver Fuzzing by Recalling In-Vivo Execution...
Joonkyo Jung (Department of Computer Science, Yonsei University), Jisoo Jang (Department of Computer Science, Yonsei University), Yongwan Jo (Department of Computer Science, Yonsei University), Jonas Vinck (DistriNet, KU Leuven), Alexios Voulimeneas (CYS, TU Delft), Stijn Volckaert (DistriNet, KU Leuven), Dokyung Song (Department of Computer Science, Yonsei University)
Read MoreAn Empirical Study on Fingerprint API Misuse with Lifecycle...
Xin Zhang (Fudan University), Xiaohan Zhang (Fudan University), Zhichen Liu (Fudan University), Bo Zhao (Fudan University), Zhemin Yang (Fudan University), Min Yang (Fudan University)
Read More