On Reverse Engineering Neural Network Implementation on GPU
|
2021 |
Chmielewski, Łukasz |
Demand Manipulation Attack Resilient Privacy Aware Smart Grid Using PUFs and Blockchain
|
2021 |
Ghosh, Soumyadyuti |
Memory Deduplication as a Protective Factor in Virtualized Systems
|
2021 |
Albalawi, Abdullah |
A (Bit)slice of Rainbow
|
2021 |
Caullery, Florian |
PoliCT: Flexible Policy in Certificate Transparency Enabling Lightweight Self-monitor
|
2021 |
Sun, Aozhuo |
POSTER: Resistance Analysis of Two AES-Like Against the Boomerang Attack
|
2021 |
Debesse, Laetitia |
POSTER: Optimizing Device Implementation of Linear Layers with Automated Tools
|
2021 |
Baksi, Anubhab |
POSTER: Another Look at Boyar-Peralta’s Algorithm
|
2021 |
Baksi, Anubhab |
Shaping Blockchain Technology for Securing Supply Chains
|
2021 |
Lim, Yong Zhi |
An Identity-Based Blind Signature Scheme with Message Recovery from Pairings
|
2021 |
Wen, Yihong |
Towards Trained Model Confidentiality and Integrity Using Trusted Execution Environments
|
2021 |
Nakai, Tsunato |
Towards Real-Time Deep Learning-Based Network Intrusion Detection on FPGA
|
2021 |
Jeune, Laurens Le |
Cyber-Attack Case Studies on Dynamic Voltage Restorer in Smart Grid
|
2021 |
Roomi, Muhammad M. |
Attacklets to Test Anomaly Detectors for Critical Infrastructure
|
2021 |
Liyakkathali, Salimah |
On the Importance of Pooling Layer Tuning for Profiling Side-Channel Analysis
|
2021 |
Wu, Lichao |
Model Evasion Attacks Against Partially Encrypted Deep Neural Networks in Isolated Execution Environment
|
2021 |
Yoshida, Kota |
Quantum Computing Threat Modelling on a Generic CPS Setup
|
2021 |
Lee, Cher Chye |
WiP: Distributed Intrusion Detection System for TCP/IP-Based Connections in Industrial Environments Using Self-organizing Maps
|
2021 |
Kharitonov, Aleksei |
BFV, CKKS, TFHE: Which One is the Best for a Secure Neural Network Evaluation in the Cloud?
|
2021 |
Clet, Pierre-Emmanuel |
An Efficient Proactive Secret Sharing Scheme for Cloud Storage
|
2021 |
Zhang, Shuihai |