Wes Hardaker (USC)
To understand anomalies, you must first understand your past
View More Papers
DRAGON: Predicting Decompiled Variable Data Types with Learned Confidence...
Caleb Stewart, Rhonda Gaede, Jeffrey Kulick (University of Alabama in Huntsville)
Read MoreDefending Against Membership Inference Attacks on Iteratively Pruned Deep...
Jing Shang (Beijing Jiaotong University), Jian Wang (Beijing Jiaotong University), Kailun Wang (Beijing Jiaotong University), Jiqiang Liu (Beijing Jiaotong University), Nan Jiang (Beijing University of Technology), Md Armanuzzaman (Northeastern University), Ziming Zhao (Northeastern University)
Read MoreTowards LLM-Assisted Vulnerability Detection and Repair for Open-Source 5G...
Rupam Patir (University at Buffalo), Qiqing Huang (University at Buffalo), Keyan Guo (University at Buffalo), Wanda Guo (Texas A&M University), Guofei Gu (Texas A&M University), Haipeng Cai (University at Buffalo), Hongxin Hu (University at Buffalo)
Read MoreThe (Un)usual Suspects – Studying Reasons for Lacking Updates...
Maria Hellenthal (CISPA Helmholtz Center for Information Security), Lena Gotsche (CISPA Helmholtz Center for Information Security), Rafael Mrowczynski (CISPA Helmholtz Center for Information Security), Sarah Kugel (Saarland University), Michael Schilling (CISPA Helmholtz Center for Information Security), Ben Stock (CISPA Helmholtz Center for Information Security)
Read More