HKU Musketeers Foundation Institute of Data Science: Conference papers Collection home page

Browse
Subscribe to this collection to receive daily e-mail notification of new additions RSS Feed RSS Feed RSS Feed
Collection's Items (Sorted by Submit Date in Descending order): 121 to 140 of 365
TitleAuthor(s)Issue Date
Explore the Transformation Space for Adversarial Images
Proceeding/Conference:CODASPY 2020 - Proceedings of the 10th ACM Conference on Data and Application Security and Privacy
2020
Informer: Irregular traffic detection for containerized microservices RPC in the real world
Proceeding/Conference:Proceedings of the 4th ACM/IEEE Symposium on Edge Computing, SEC 2019
2019
Matryoshka: Fuzzing deeply nested branches
Proceeding/Conference:Proceedings of the ACM Conference on Computer and Communications Security
2019
Angora: Efficient Fuzzing by Principled Search
Proceeding/Conference:Proceedings - IEEE Symposium on Security and Privacy
2018
Detecting third-party libraries in Android applications with high precision and recall
Proceeding/Conference:25th IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2018 - Proceedings
2018
Falsified Data Attack on Backpressure-based Traffic Signal Control Algorithms
Proceeding/Conference:IEEE Vehicular Networking Conference, VNC
2018
Less is more: Culling the training set to improve robustness of deep neural networks
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2018
SurgeScan: Enforcing security policies on untrusted third-party Android libraries
Proceeding/Conference:2017 IEEE SmartWorld Ubiquitous Intelligence and Computing, Advanced and Trusted Computed, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People and Smart City Innovation, SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017 - Conference Proceedings
2018
Evaluating private modes in desktop and mobile browsers and their resistance to fingerprinting
Proceeding/Conference:2017 IEEE Conference on Communications and Network Security, CNS 2017
2017
MagNet: A Two-Pronged defense against adversarial examples
Proceeding/Conference:Proceedings of the ACM Conference on Computer and Communications Security
2017
AppShield: Enabling multi-entity access control cross platforms for mobile app management
Proceeding/Conference:Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
2017
POSTER: Security analysis of personal unmanned aerial vehicles
Proceeding/Conference:Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
2017
On the origin of mobile apps: Network provenance for android applications
Proceeding/Conference:CODASPY 2016 - Proceedings of the 6th ACM Conference on Data and Application Security and Privacy
2016
FineDroid: Enforcing permissions with system-wide application execution context
Proceeding/Conference:Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
2015
Noncespaces: Using Randomization to Enforce Information Flow Tracking and Thwart Cross-Site Scripting Attacks
Proceeding/Conference:Proceedings of the Symposium on Network and Distributed System Security, NDSS 2009
2009
Defending against sensor-sniffing attacks on mobile phones
Proceeding/Conference:SIGCOMM 2009 - Proceedings of the 2009 SIGCOMM Conference and Co-Located Workshops, MobiHeld 2009
2009
Asking for (and about) permissions used by android apps
Proceeding/Conference:IEEE International Working Conference on Mining Software Repositories
2013
TouchLogger: Inferring keystrokes on touch screen from smartphone motion
Proceeding/Conference:HotSec 2011 - 6th USENIX Workshop on Hot Topics in Security
2011
RevDroid: Code analysis of the side effects after dynamic permission revocation of android apps
Proceeding/Conference:ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security
2016
Predictive eviction: a novel policy for optimizing tls session cache performance
Proceeding/Conference:Proceedings - IEEE Global Communications Conference, GLOBECOM
2015
Collection's Items (Sorted by Submit Date in Descending order): 121 to 140 of 365