Ghazal Abdollahi, Hamid Asadi, Robert Ricci (The University of Utah)
NOD: Uncovering intense attackers’ behavior through Nested Outlier Detection from SSH logs
View More Papers
Constructive Noise Defeats Adversarial Noise: Adversarial Example Detection for...
Meng Shen (Beijing Institute of Technology), Jiangyuan Bi (Beijing Institute of Technology), Hao Yu (National University of Defense Technology), Zhenming Bai (Beijing Institute of Technology), Wei Wang (Xi'an Jiaotong University), Liehuang Zhu (Beijing Institute of Technology)
Read MoreCAT: Can Trust be Predicted with Context-Awareness in Dynamic...
Jie Wang (Xidian University), Zheng Yan (Xidian University), Jiahe Lan (Xidian University), Xuyan Li (Xidian University), Elisa Bertino (Purdue University)
Read MoreIdioms: A Simple and Effective Framework for Turbo-Charging Local...
Luke Dramko (Carnegie Mellon University), Claire Le Goues (Carnegie Mellon University), Edward J. Schwartz (Carnegie Mellon University)
Read More