Wes Hardaker (USC)
To understand anomalies, you must first understand your past
View More Papers
Incorporating Gradients to Rules: Towards Lightweight, Adaptive Provenance-based Intrusion...
Lingzhi Wang (Northwestern University), Xiangmin Shen (Northwestern University), Weijian Li (Northwestern University), Zhenyuan LI (Zhejiang University), R. Sekar (Stony Brook University), Han Liu (Northwestern University), Yan Chen (Northwestern University)
Read MoreVision: Towards True User-Centric Design for Digital Identity Wallets
Yorick Last (Paderborn University), Patricia Arias Cabarcos (Paderborn University)
Read MoreLLMPirate: LLMs for Black-box Hardware IP Piracy
Vasudev Gohil (Texas A&M University), Matthew DeLorenzo (Texas A&M University), Veera Vishwa Achuta Sai Venkat Nallam (Texas A&M University), Joey See (Texas A&M University), Jeyavijayan Rajendran (Texas A&M University)
Read More