Discovery - Top 10

Journal/Proceeding/Conference

Language

Search

Current filters:
Start a new search
Add filters:

Use filters to refine the search results.

Results 1-25 of 76 (Search time: 0.005 seconds).

TitleAuthor(s)Issue Date
SQUEEZE TRAINING FOR ADVERSARIAL ROBUSTNESS
Proceeding/Conference:11th International Conference on Learning Representations, ICLR 2023
2023
SurgeScan: Enforcing security policies on untrusted third-party Android libraries
Proceeding/Conference:2017 IEEE SmartWorld Ubiquitous Intelligence and Computing, Advanced and Trusted Computed, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People and Smart City Innovation, SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017 - Conference Proceedings
2018
Detecting third-party libraries in Android applications with high precision and recall
Proceeding/Conference:25th IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2018 - Proceedings
2018
Evaluating private modes in desktop and mobile browsers and their resistance to fingerprinting
Proceeding/Conference:2017 IEEE Conference on Communications and Network Security, CNS 2017
2017
AppShield: Enabling multi-entity access control cross platforms for mobile app management
Proceeding/Conference:Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
2017
POSTER: Security analysis of personal unmanned aerial vehicles
Proceeding/Conference:Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
2017
Defending against sensor-sniffing attacks on mobile phones
Proceeding/Conference:SIGCOMM 2009 - Proceedings of the 2009 SIGCOMM Conference and Co-Located Workshops, MobiHeld 2009
2009
Predictive eviction: a novel policy for optimizing tls session cache performance
Proceeding/Conference:Proceedings - IEEE Global Communications Conference, GLOBECOM
2015
FineDroid: Enforcing permissions with system-wide application execution context
Proceeding/Conference:Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
2015
TouchLogger: Inferring keystrokes on touch screen from smartphone motion
Proceeding/Conference:HotSec 2011 - 6th USENIX Workshop on Hot Topics in Security
2011
Noncespaces: Using Randomization to Enforce Information Flow Tracking and Thwart Cross-Site Scripting Attacks
Proceeding/Conference:Proceedings of the Symposium on Network and Distributed System Security, NDSS 2009
2009
A Quantitative Study of Forum Spamming Using Context-based Analysis
Proceeding/Conference:Proceedings of the Symposium on Network and Distributed System Security, NDSS 2007
2007
RetroSkeleton: Retrofitting android apps
Proceeding/Conference:MobiSys 2013 - Proceedings of the 11th Annual International Conference on Mobile Systems, Applications, and Services
2013
AnDarwin: Scalable detection of semantically similar Android applications
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2013
Mitigating DoS attacks on the paging channel by efficient encoding in page messages
Proceeding/Conference:Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering
2009
Asking for (and about) permissions used by android apps
Proceeding/Conference:IEEE International Working Conference on Mining Software Repositories
2013
Using and asking: APIs used in the Android market and asked about in StackOverflow
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2013
FOOLING DETECTION ALONE IS NOT ENOUGH: ADVERSARIAL ATTACK AGAINST MULTIPLE OBJECT TRACKING
Proceeding/Conference:8th International Conference on Learning Representations, ICLR 2020
2020
Yet Another Intermediate-Level Attack
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2020
iPhish: Phishing vulnerabilities on consumer electronics
Proceeding/Conference:Usability, Psychology, and Security, UPSEC 2008
2008
StyleCAPTCHA: CAPTCHA Based on Stylized Images to Defend against Deep Networks
Proceeding/Conference:FODS 2020 - Proceedings of the 2020 ACM-IMS Foundations of Data Science Conference
2020
Practical no-box adversarial attacks against DNNs
Proceeding/Conference:Advances in Neural Information Processing Systems
2020
Backpropagating linearly improves transferability of adversarial examples
Proceeding/Conference:Advances in Neural Information Processing Systems
2020
Falsified Data Attack on Backpressure-based Traffic Signal Control Algorithms
Proceeding/Conference:IEEE Vehicular Networking Conference, VNC
2018
FIREMAN: A toolkit for firewall modeling and analysis
Proceeding/Conference:Proceedings - IEEE Symposium on Security and Privacy
2006