Sebastian Meiser, Debajyoti Das, Moritz Kirschte, Esfandiar Mohammadi, Aniket Kate
Mixnets on a Tightrope: Quantifying the Leakage of Mix Networks Using a Provably Optimal Heuristic Adversary
View More Papers
Poster: Securing IoT Edge Devices: Applying NIST IR 8259A...
Rahul Choutapally, Konika Reddy Saddikuti, Solomon Berhe (University of the Pacific)
Read MoreVision: Towards True User-Centric Design for Digital Identity Wallets
Yorick Last (Paderborn University), Patricia Arias Cabarcos (Paderborn University)
Read MoreL-HAWK: A Controllable Physical Adversarial Patch Against a Long-Distance...
Taifeng Liu (Xidian University), Yang Liu (Xidian University), Zhuo Ma (Xidian University), Tong Yang (Peking University), Xinjing Liu (Xidian University), Teng Li (Xidian University), Jianfeng Ma (Xidian University)
Read MoreVoiceRadar: Voice Deepfake Detection using Micro-Frequency and Compositional Analysis
Kavita Kumari (Technical University of Darmstadt), Maryam Abbasihafshejani (University of Texas at San Antonio), Alessandro Pegoraro (Technical University of Darmstadt), Phillip Rieger (Technical University of Darmstadt), Kamyar Arshi (Technical University of Darmstadt), Murtuza Jadliwala (University of Texas at San Antonio), Ahmad-Reza Sadeghi (Technical University of Darmstadt)
Read More