Search for persons
X
?
Detection of Intrusions and Malware, and Vulnerability Assessment; Lecture Notes in Computer Science ,
1
Listening Between the Bits: Privacy Leaks in Audio Fingerpr..:
, In:
?
Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security ,
2
Drift Forensics of Malware Classifiers:
, In:
?
2022 IEEE Security and Privacy Workshops (SPW) ,
4
Misleading Deep-Fake Detection with GAN Fingerprints:
, In:
?
Proceedings of the Twelveth ACM Conference on Data and Application Security and Privacy ,
5
Quantifying the Risk of Wormhole Attacks on Bluetooth Conta..:
, In:
?
Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security ,
6
Spying through Virtual Backgrounds of Video Calls:
, In:
?
2020 IEEE European Symposium on Security and Privacy (EuroS&P) ,
7
Evaluating Explanation Methods for Deep Learning in Securit:
, In:
?
2018 IEEE European Symposium on Security and Privacy (EuroS&P) ,
10
Forgotten Siblings: Unifying Attacks on Machine Learning an..:
, In:
?
2017 IEEE European Symposium on Security and Privacy (EuroS&P) ,
12
Privacy Threats through Ultrasonic Side Channels on Mobile ..:
, In:
?
Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy ,
13
Mining Attributed Graphs for Threat Intelligence:
, In:
?
Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security ,
14