Discovery - Top 10
Type
(63)
(13)
Date issued
Journal/Proceeding/Conference
Language
(76)
HKU Organizations
Search
Add filters:
Use filters to refine the search results.
Title | Author(s) | Issue Date | |
---|---|---|---|
SQUEEZE TRAINING FOR ADVERSARIAL ROBUSTNESS Proceeding/Conference:11th International Conference on Learning Representations, ICLR 2023 | 2023 | ||
SurgeScan: Enforcing security policies on untrusted third-party Android libraries Proceeding/Conference:2017 IEEE SmartWorld Ubiquitous Intelligence and Computing, Advanced and Trusted Computed, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People and Smart City Innovation, SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017 - Conference Proceedings | 2018 | ||
Detecting third-party libraries in Android applications with high precision and recall Proceeding/Conference:25th IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2018 - Proceedings | 2018 | ||
Evaluating private modes in desktop and mobile browsers and their resistance to fingerprinting Proceeding/Conference:2017 IEEE Conference on Communications and Network Security, CNS 2017 | 2017 | ||
AppShield: Enabling multi-entity access control cross platforms for mobile app management Proceeding/Conference:Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST | 2017 | ||
POSTER: Security analysis of personal unmanned aerial vehicles Proceeding/Conference:Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST | 2017 | ||
Defending against sensor-sniffing attacks on mobile phones Proceeding/Conference:SIGCOMM 2009 - Proceedings of the 2009 SIGCOMM Conference and Co-Located Workshops, MobiHeld 2009 | 2009 | ||
Predictive eviction: a novel policy for optimizing tls session cache performance Proceeding/Conference:Proceedings - IEEE Global Communications Conference, GLOBECOM | 2015 | ||
FineDroid: Enforcing permissions with system-wide application execution context Proceeding/Conference:Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST | 2015 | ||
TouchLogger: Inferring keystrokes on touch screen from smartphone motion Proceeding/Conference:HotSec 2011 - 6th USENIX Workshop on Hot Topics in Security | 2011 | ||
Noncespaces: Using Randomization to Enforce Information Flow Tracking and Thwart Cross-Site Scripting Attacks Proceeding/Conference:Proceedings of the Symposium on Network and Distributed System Security, NDSS 2009 | 2009 | ||
A Quantitative Study of Forum Spamming Using Context-based Analysis Proceeding/Conference:Proceedings of the Symposium on Network and Distributed System Security, NDSS 2007 | 2007 | ||
RetroSkeleton: Retrofitting android apps Proceeding/Conference:MobiSys 2013 - Proceedings of the 11th Annual International Conference on Mobile Systems, Applications, and Services | 2013 | ||
AnDarwin: Scalable detection of semantically similar Android applications Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2013 | ||
Mitigating DoS attacks on the paging channel by efficient encoding in page messages Proceeding/Conference:Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering | 2009 | ||
Asking for (and about) permissions used by android apps Proceeding/Conference:IEEE International Working Conference on Mining Software Repositories | 2013 | ||
Using and asking: APIs used in the Android market and asked about in StackOverflow Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2013 | ||
FOOLING DETECTION ALONE IS NOT ENOUGH: ADVERSARIAL ATTACK AGAINST MULTIPLE OBJECT TRACKING Proceeding/Conference:8th International Conference on Learning Representations, ICLR 2020 | 2020 | ||
Yet Another Intermediate-Level Attack Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2020 | ||
iPhish: Phishing vulnerabilities on consumer electronics Proceeding/Conference:Usability, Psychology, and Security, UPSEC 2008 | 2008 | ||
StyleCAPTCHA: CAPTCHA Based on Stylized Images to Defend against Deep Networks Proceeding/Conference:FODS 2020 - Proceedings of the 2020 ACM-IMS Foundations of Data Science Conference | 2020 | ||
Practical no-box adversarial attacks against DNNs Proceeding/Conference:Advances in Neural Information Processing Systems | 2020 | ||
Backpropagating linearly improves transferability of adversarial examples Proceeding/Conference:Advances in Neural Information Processing Systems | 2020 | ||
Falsified Data Attack on Backpressure-based Traffic Signal Control Algorithms Proceeding/Conference:IEEE Vehicular Networking Conference, VNC | 2018 | ||
FIREMAN: A toolkit for firewall modeling and analysis Proceeding/Conference:Proceedings - IEEE Symposium on Security and Privacy | 2006 |