NIC: DETECTING ADVERSARIAL SAMPLES WITH NEURAL NETWORK INVARIANT CHECKING

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Network and Distributed System Security Symposium (26. : 2019 : San Diego, Calif.) Network and Distributed System Security Symposium 2019 ; Volume 1 of 2
1. Verfasser: Ma, Shiging (VerfasserIn)
Weitere Verfasser: Liu, Yingqi (VerfasserIn), Tao, Guanhong (VerfasserIn), Lee, Wen-Chuan (VerfasserIn), Zhang, Xiangyu (VerfasserIn)
Pages:2019
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
TIME DOES NOT HEAL ALL WOUNDS: A LONGITUDINAL ANALYSIS OF SECURITY- MECHANISM SUPPORT IN MOBILE BROWSERS 2020 Luo, Meng
DROIDCAP: OS SUPPORT FOR CAPABILITY-BASED PERMISSIONS IN ANDROID 2020 Dawoud, Abdallah
GEO-LOCATING DRIVERS: A STUDY OF SENSITIVE DATA LEAKAGE IN RIDE-HAILING SERVICES 2020 Zhao, Qingchuan
MASTER OF WEB PUPPETS: ABUSING WEB BROWSERS FOR PERSISTENT AND STEALTHY COMPUTATION 2020 Papadopoulos, Panagiotis
JAVASCRIPT TEMPLATE ATTACKS: AUTOMATICALLY INFERRING HOST INFORMATION FOR TARGETED EXPLOITS 2020 Schwarz, Michael
EXSPECTRE: HIDING MALWARE IN SPECULATIVE EXECUTION 2020 Wampler, Jack
STEALTHY ADVERSARIAL PERTURBATIONS AGAINST REAL-TIME VIDEO CLASSIFICATION SYSTEMS 2020 Li, Shasha
MIND YOUR OWN BUSINESS: A LONGITUDINAL STUDY OF THREATS AND VULNERABILITIES IN ENTERPRISES 2020 Kotzias, Platon
NODOZE: COMBATTING THREAT ALERT FATIGUE WITH AUTOMATED PROVENANCE TRIAGE 2020 Hassan, Wajih Ul
ANALYZING SEMANTIC CORRECTNESS WITH SYMBOLIC EXECUTION: A CASE STUDY ON PKCS#1 V1.5 SIGNATURE VERIFICATION 2020 Chau, Sze Yiu
ONE ENGINE TO SERVE 'EM ALL: INFERRING TAINT RULES WITHOUT ARCHITECTURAL SEMANTICS 2020 Chua, Zheng Leong
THUNDERCLAP: EXPLORING VULNERABILITIES IN OPERATING SYSTEM IOMMU PROTECTION VIA DMA FROM UNTRUSTWORTHY PERIPHERALS 2020 Markettos, A. Theodore
SANCTUARY: ARMING TRUSTZONE WITH USER-SPACE ENCLAVES 2020 Brasser, Ferdinand
LATEX GLOVES: PROTECTING BROWSER EXTENSIONS FROM PROBING AND REVELATION ATTACKS 2020 Sjosten, Alexander
A TREASURY SYSTEM FOR CRYPTOCURRENCIES: ENABLING BETTER COLLABORATIVE INTELLIGENCE 2020 Zhang, Bingsheng
GIVING STATE TO THE STATELESS: AUGMENTING TRUSTWORTHY COMPUTATION WITH LEDGERS 2020 Kaptchuk, Gabriel
CLEANING UP THE INTERNET OF EVIL THINGS: REAL-WORLD EVIDENCE ON ISP AND CONSUMER EFFORTS TO REMOVE MIRAI 2020 Cetin, Orcun
ML-LEAKS: MODEL AND DATA INDEPENDENT MEMBERSHIP INFERENCE ATTACKS AND DEFENSES ON MACHINE LEARNING MODELS 2020 Salem, Ahmed
MBEACON: PRIVACY-PRESERVING BEACONS FOR DNA METHYLATION DATA 2020 Hagestedt, Inken
DIGITAL HEALTHCARE-ASSOCIATED INFECTION: A CASE STUDY ON THE SECURITY OF A MAJOR MULTI-CAMPUS HOSPITAL SYSTEM 2020 Vargas, Luis
Alle Artikel auflisten