Lingzhi Wang (Northwestern University)
Tutorial: Using Aurora, an automated attack emulation system, to create benchmark datasets for intrusion detection
View More Papers
On the Difficulty of Selecting Few-Shot Examples for Effective...
Md Abdul Hannan (Colorado State University), Ronghao Ni (Carnegie Mellon University), Chi Zhang (Carnegie Mellon University), Limin Jia (Carnegie Mellon University), Ravi Mangal (Colorado State University), Corina S. Pasareanu (Carnegie Mellon University)
Read MoreADGFUZZ: Assignment Dependency-Guided Fuzzing for Robotic Vehicles
Yuncheng Wang (Institute of Information Engineering, CAS, China and School of Cyber Security, University of Chinese Academy of Sciences, China), Yaowen Zheng (Institute of Information Engineering, CAS, China and School of Cyber Security, University of Chinese Academy of Sciences, China), Puzhuo Liu (Tsinghua University, China and Ant Group, China), Dongliang Fang (Institute of Information Engineering,…
Read MoreSide-channel Inference of User Activities in AR/VR Using GPU...
Seonghun Son (Iowa State University), Chandrika Mukherjee (Purdue University), Reham Mohamed Aburas (American University of Sharjah), Berk Gulmezoglu (Iowa State University), Z. Berkay Celik (Purdue University)
Read More