HKU Musketeers Foundation Institute of Data Science: Conference papers Collection home page

Browse
Subscribe to this collection to receive daily e-mail notification of new additions RSS Feed RSS Feed RSS Feed
Collection's Items (Sorted by Submit Date in Descending order): 1 to 20 of 260
TitleAuthor(s)Issue Date
Valkyrie: Improving Fuzzing Performance Through Deterministic Techniques
Proceeding/Conference:IEEE International Conference on Software Quality, Reliability and Security, QRS
2022
MHCN: A Hyperbolic Neural Network Model for Multi-view Hierarchical Clustering
Proceeding/Conference:Proceedings of the IEEE International Conference on Computer Vision
2023
Improving Adversarial Transferability via Intermediate-level Perturbation Decay
Proceeding/Conference:Advances in Neural Information Processing Systems
2023
Towards Evaluating Transfer-based Attacks Systematically, Practically, and Fairly
Proceeding/Conference:Advances in Neural Information Processing Systems
2023
Hopper: Interpretative Fuzzing for Libraries
Proceeding/Conference:CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security
2023
Understanding Programs by Exploiting (Fuzzing) Test Cases
Proceeding/Conference:Proceedings of the Annual Meeting of the Association for Computational Linguistics
2023
MAKING SUBSTITUTE MODELS MORE BAYESIAN CAN ENHANCE TRANSFERABILITY OF ADVERSARIAL EXAMPLES
Proceeding/Conference:11th International Conference on Learning Representations, ICLR 2023
2023
Backpropagating linearly improves transferability of adversarial examples
Proceeding/Conference:Advances in Neural Information Processing Systems
2020
Practical no-box adversarial attacks against DNNs
Proceeding/Conference:Advances in Neural Information Processing Systems
2020
Integrity: Finding integer errors by targeted fuzzing
Proceeding/Conference:Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
2020
StyleCAPTCHA: CAPTCHA Based on Stylized Images to Defend against Deep Networks
Proceeding/Conference:FODS 2020 - Proceedings of the 2020 ACM-IMS Foundations of Data Science Conference
2020
iPhish: Phishing vulnerabilities on consumer electronics
Proceeding/Conference:Usability, Psychology, and Security, UPSEC 2008
2008
Task-optimized User Clustering based on Mobile App Usage for Cold-start Recommendations
Proceeding/Conference:Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
2022
FOOLING DETECTION ALONE IS NOT ENOUGH: ADVERSARIAL ATTACK AGAINST MULTIPLE OBJECT TRACKING
Proceeding/Conference:8th International Conference on Learning Representations, ICLR 2020
2020
Yet Another Intermediate-Level Attack
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2020
Explore the Transformation Space for Adversarial Images
Proceeding/Conference:CODASPY 2020 - Proceedings of the 10th ACM Conference on Data and Application Security and Privacy
2020
Informer: Irregular traffic detection for containerized microservices RPC in the real world
Proceeding/Conference:Proceedings of the 4th ACM/IEEE Symposium on Edge Computing, SEC 2019
2019
Matryoshka: Fuzzing deeply nested branches
Proceeding/Conference:Proceedings of the ACM Conference on Computer and Communications Security
2019
Angora: Efficient Fuzzing by Principled Search
Proceeding/Conference:Proceedings - IEEE Symposium on Security and Privacy
2018
Detecting third-party libraries in Android applications with high precision and recall
Proceeding/Conference:25th IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2018 - Proceedings
2018
Collection's Items (Sorted by Submit Date in Descending order): 1 to 20 of 260