Search for persons
X
?
2023 IEEE Symposium on Security and Privacy (SP) ,
2
SyzDescribe: Principled, Automated, Static Generation of Sy..:
, In:
?
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining ,
4
3D-IDS: Doubly Disentangled Dynamic Intrusion Detection:
, In:
?
Proceedings of the 8th ACM Workshop on Moving Target Defense ,
6
Themis : Ambiguity-Aware Network Intrusion Detection bas..:
, In:
?
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security ,
7
Themis: Ambiguity-Aware Network Intrusion Detection based o..:
, In:
?
Annual Computer Security Applications Conference ,
8
Eluding ML-based Adblockers With Actionable Adversarial Exa..:
, In:
?
Computer Vision – ECCV 2020; Lecture Notes in Computer Science ,
9
Connecting the Dots: Detecting Adversarial Perturbations Us..:
, In:
?
Proceedings of the 16th International Conference on emerging Networking EXperiments and Technologies ,
10
You do (not) belong here : detecting DPI evasion attacks..:
, In:
?
2020 IEEE Symposium on Security and Privacy (SP) ,
11
AdGraph: A Graph-Based Approach to Ad and Tracker Blocking:
, In:
?
?
Proceedings of the 30th Annual ACM Symposium on Applied Computing ,
13
A source-location privacy protection strategy via pseudo no..:
, In:
?
Proceedings of the 2015 Conference on research in adaptive and convergent systems ,
14