webFuzz: Grey-Box Fuzzing for Web Applications
|
2021 |
Rooij, Orpheas van |
Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains
|
2021 |
Schloegel, Moritz |
MiniLedger: Compact-Sized Anonymous and Auditable Distributed Payments
|
2021 |
Chatzigiannis, Panagiotis |
Romoa: Robust Model Aggregation for the Resistance of Federated Learning to Model Poisoning Attacks
|
2021 |
Mao, Yunlong |
FLOD : Oblivious Defender for Private Byzantine-Robust Federated Learning with Dishonest-Majority
|
2021 |
Dong, Ye |
DA3G: Detecting Adversarial Attacks by Analysing Gradients
|
2021 |
Schulze, Jan-Philipp |
LiMNet: Early-Stage Detection of IoT Botnets with Lightweight Memory Networks
|
2021 |
Giaretta, Lodovico |
AutoGuard: A Dual Intelligence Proactive Anomaly Detection at Application-Layer in 5G Networks
|
2021 |
Madi, Taous |
Shadow-Catcher: Looking into Shadows to Detect Ghost Objects in Autonomous Vehicle 3D Sensing
|
2021 |
Hau, Zhongyuan |
Iterative Selection of Categorical Variables for Log Data Anomaly Detection
|
2021 |
Landauer, Max |
Characterizing GPU Overclocking Faults
|
2021 |
Zuberi, Eldad |
ARIstoteles – Dissecting Apple’s Baseband Interface
|
2021 |
Kröll, Tobias |
My Fuzzer Beats Them All! Developing a Framework for Fair Evaluation and Comparison of Fuzzers
|
2021 |
Paaßen, David |
Fair Peer-to-Peer Content Delivery via Blockchain
|
2021 |
He, Songlin |
Conclave: A Collective Stake Pool Protocol
|
2021 |
Karakostas, Dimitris |
Probabilistic Micropayments with Transferability
|
2021 |
Takahashi, Taisei |
Adversarial Activity Detection Using Keystroke Acoustics
|
2021 |
Fallahi, Amin |
Tell Me How You Re-Charge, I Will Tell You Where You Drove To: Electric Vehicles Profiling Based on Charging-Current Demand
|
2021 |
Brighente, Alessandro |
MORTON: Detection of Malicious Routines in Large-Scale DNS Traffic
|
2021 |
Daihes, Yael |
A Formal Security Analysis of Session Resumption Across Hostnames
|
2021 |
Gellert, Kai |