The Obfuscation Method of User Identification System
|
2021 |
Xu, Jing |
Proof of Assets in the Diem Blockchain
|
2021 |
Chatzigiannis, Panagiotis |
A Good Anvil Fears No Hammer: Automated Rowhammer Detection Using Unsupervised Deep Learning
|
2021 |
Chakraborty, Anirban |
Cryptanalysis of a Lattice-Based Group Signature with Verifier-Local Revocation Achieving Full Security
|
2021 |
Zhang, Yanhua |
Combating the OS-Level Malware in Mobile Devices by Leveraging Isolation and Steganography
|
2021 |
Chen, Niusen |
Pass-As-You-Go: A Direct Anonymous Attestation-Based Untraceable Contactless Transit Pass
|
2021 |
Diop, Aïda |
Kryptonite: An Adversarial Attack Using Regional Focus
|
2021 |
Kulkarni, Yogesh |
Shaping Blockchain Technology for Securing Supply Chains
|
2021 |
Lim, Yong Zhi |
An Identity-Based Blind Signature Scheme with Message Recovery from Pairings
|
2021 |
Wen, Yihong |
Towards Trained Model Confidentiality and Integrity Using Trusted Execution Environments
|
2021 |
Nakai, Tsunato |
Towards Real-Time Deep Learning-Based Network Intrusion Detection on FPGA
|
2021 |
Jeune, Laurens Le |
Cyber-Attack Case Studies on Dynamic Voltage Restorer in Smart Grid
|
2021 |
Roomi, Muhammad M. |
Attacklets to Test Anomaly Detectors for Critical Infrastructure
|
2021 |
Liyakkathali, Salimah |
On Reverse Engineering Neural Network Implementation on GPU
|
2021 |
Chmielewski, Łukasz |
Demand Manipulation Attack Resilient Privacy Aware Smart Grid Using PUFs and Blockchain
|
2021 |
Ghosh, Soumyadyuti |
Memory Deduplication as a Protective Factor in Virtualized Systems
|
2021 |
Albalawi, Abdullah |
A (Bit)slice of Rainbow
|
2021 |
Caullery, Florian |
PoliCT: Flexible Policy in Certificate Transparency Enabling Lightweight Self-monitor
|
2021 |
Sun, Aozhuo |
POSTER: Resistance Analysis of Two AES-Like Against the Boomerang Attack
|
2021 |
Debesse, Laetitia |
POSTER: Optimizing Device Implementation of Linear Layers with Automated Tools
|
2021 |
Baksi, Anubhab |