Lingzhi Wang (Northwestern University)
Tutorial: Using Aurora, an automated attack emulation system, to create benchmark datasets for intrusion detection
View More Papers
Cache Me, Catch You: Cache Related Security Threats in...
XiangFan Wu (Ocean University of China; QI-ANXIN Technology Research Institute), Lingyun Ying (QI-ANXIN Technology Research Institute), Guoqiang Chen (QI-ANXIN Technology Research Institute), Yacong Gu (Tsinghua University; Tsinghua University-QI-ANXIN Group JCNS), Haipeng Qu (Department of Computer Science and Technology, Ocean University of China)
Read MoreCrack in the Armor: Underlying Infrastructure Threats to RPKI...
Yunhao Liu (Tsinghua University & Zhongguancun Laboratory), Jessie Hui Wang (Tsinghua University & Zhongguancun Laboratory), Yuedong Xu (Fudan University), Zongpeng Li (Tsinghua University), Yangyang Wang (Tsinghua University & Zhongguancun Laboratory), Jilong Wang (Tsinghua University & Zhongguancun Laboratory)
Read MoreCausal-Guided Detoxify Backdoor Attack of Open-Weight LoRA Models
Linzhi Chen (ShanghaiTech University), Yang Sun (Independent Researcher), Hongru Wei (ShanghaiTech University), Yuqi Chen (ShanghaiTech University)
Read More