Wes Hardaker (USC)
To understand anomalies, you must first understand your past
View More Papers
Distributed Function Secret Sharing and Applications
Pengzhi Xing (University of Electronic Science and Technology of China), Hongwei Li (University of Electronic Science and Technology of China), Meng Hao (Singapore Management University), Hanxiao Chen (University of Electronic Science and Technology of China), Jia Hu (University of Electronic Science and Technology of China), Dongxiao Liu (University of Electronic Science and Technology of China)
Read MoreOptimizing Trust-Centric Authentication in Matter-enabled IoT Devices with PUF...
Chandranshu Gupta, Gaurav Varshney (IIT Jammu)
Read MoreTZ-DATASHIELD: Automated Data Protection for Embedded Systems via Data-Flow-Based...
Zelun Kong (University of Texas at Dallas), Minkyung Park (University of Texas at Dallas), Le Guan (University of Georgia), Ning Zhang (Washington University in St. Louis), Chung Hwan Kim (University of Texas at Dallas)
Read MoreRethink Custom Transformers for Binary Analysis
Heng Yin, Professor, Department of Computer Science and Engineering, University of California, Riverside
Read More