Gauravaram, Praveen
50  results:
Search for persons X
?
2

Towards Availability of Strong Authentication in Remote and..:

, In: Proceedings of the 19th International Conference on Availability, Reliability and Security,
 
?
3

POSTER: Addressing the Privacy by Use Challenges in Verifia..:

, In: Proceedings of the 19th ACM Asia Conference on Computer and Communications Security,
Jeong, Jongkil Jay ; Yang, Lu-xing ; Doss, Robin... - p. 1931-1933 , 2024
 
?
7

Weak-Key Analysis for BIKE Post-Quantum Key Encapsulation M..:

Nosouhi, Mohammad Reza ; Shah, Syed W. ; Pan, Lei...
IEEE Transactions on Information Forensics and Security.  18 (2023)  - p. 2160-2174 , 2023
 
?
8

SCEVD: Semantic-enhanced Code Embedding for Vulnerability D..:

, In: 2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom),
Gear, Joseph ; Xu, Yue ; Foo, Ernest... - p. 1522-1527 , 2022
 
?
9

BloomXNOR-Net : privacy-preserving machine learning in I..:

, In: Proceedings of the 13th ACM Wireless of the Students, by the Students, and for the Students Workshop,
 
?
11

Vulnerability Management in IIoT-Based Systems: What, Why a..:

, In: Smart Sensors, Measurement and Instrumentation; Secure and Trusted Cyber Physical Systems,
 
?
12

A Deep Learning-based Penetration Testing Framework for Vul..:

, In: 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom),
 
?
14

SmartPatch : a patch prioritization framework for SCADA ..:

, In: Proceedings of the 26th Annual International Conference on Mobile Computing and Networking,
 
?
15

Vulnerability Database as a Service for IoT:

, In: Applications and Techniques in Information Security; Communications in Computer and Information Science,
 
1-15