Robust Optimization-Based Watermarking Scheme for Sequential Data

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:RAID (22. : 2019 : Peking) 22nd International Symposium on Research in Attacks, Intrusions and Defenses 2019
1. Verfasser: Ayday, Erman (VerfasserIn)
Weitere Verfasser: Yilmaz, Emre (VerfasserIn), Yilmaz, Arif (VerfasserIn)
Pages:22
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2021
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Be Sensitive and Collaborative: Analyzing Impact of Coverage Metrics in Greybox Fuzzing 2021 Wang, Jinghan
Toward the Analysis of Embedded Firmware through Automated Re-hosting 2021 Gustafson, Eric
Minimal Kernel: An Operating System Architecture for TEE to Resist Board Level Physical Attacks 2021 Zhao, Shijun
CryPToOREX: Large-scale Analysis of Cryptographic Misuse in IoT Devices 2021 Zhang, Li
Analysis of Location Data Leakage in the Internet Traffic of Android-based Mobile Devices 2021 Sivan, Nir
Automatic Generation of Non-intrusive Updates for Third-Party Libraries in Android Applications 2021 Duan, Yue
Exploiting the Inherent Limitation of Lg Adversarial Examples 2021 Zuo, Fei
Application level attacks on Connected Vehicle Protocols 2021 Abdo, Ahmed
Exploring Syscall-Based Semantics Reconstruction of Android Applications 2021 Nisi, Dario
Towards a First Step to Understand the Cryptocurrency Stealing Attack on Ethereum 2021 Cheng, Zhen
UssESArE: An End-Point Solution to Protect Against USB-Based Attacks 2021 Kharraz, Amin
The Duster Attack: Tor Onion Service Attribution Based on Flow Watermarking with Track Hiding 2021 Iacovazzi, Alfonso
Now You See It, Now You Don’t: A Large-scale Analysis of Early Domain Deletions 2021 Barron, Timothy
Towards Large-Scale Hunting for Android Negative-Day Malware 2021 Yuan, Lun-Pin
DroidScraper: A Tool for Android In-Memory Object Recovery and Reconstruction 2021 Ali-Gombe, Aisha
Fingerprinting SDN Applications via Encrypted Control Traffic 2021 Cao, Jiahao
On Design Inference from Binaries Compiled using Modern C++ Defenses 2021 Erinfolami, Rukayat Ayomide
ScaRR: Scalable Runtime Remote Attestation for Complex Systems 2021 Toffalini, Flavio
COMA: Communication and Obfuscation Management Architecture 2021 Azar, Kimia Zamiri
Smart Malware that Uses Leaked Control Data of Robotic Applications: The Case of Raven-II Surgical Robots 2021 Chung, Keywhan
Alle Artikel auflisten