V
主页
京东 11.11 红包
USENIX Security '23 - Fourteen Years in the Life:A Root Server’s Perspective on
发布人
打开封面
下载高清视频
观看高清视频
视频下载器
USENIX Security '23 - Diving into Robocall Content with SnorCall
USENIX Security '23 - Improving Logging to Reduce Permission Over-Granting Mista
USENIX Security '23 - PrivateFL:Accurate, Differentially Private Federated Learn
USENIX Security '23 - HyPFuzz:Formal-Assisted Processor Fuzzing
USENIX Security '23 - Distance-Aware Private Set Intersection
USENIX Security '23 - Towards a General Video-based Keystroke Inference Attack
USENIX Security '23 - LocIn: Inferring Semantic Location from Spatial Maps in Mi
USENIX Security '23 - Confusum Contractum:Confused Deputy Vulnerabilities in Eth
USENIX Security '23 - Know Your Cybercriminal:Evaluating Attacker Preferences by
USENIX Security '23 - Hidden Reality:Caution, Your Hand Gesture Inputs in the Im
USENIX Security '23 - TreeSync:Authenticated Group Management for Messaging Laye
USENIX Security '23 - Framing Frames:Bypassing Wi-Fi Encryption by Manipulating
USENIX Security '23 - Differential Testing of Cross Deep Learning Framework APIs
USENIX Security '23 - Formal Analysis of SPDM:Security Protocol and Data Model v
USENIX Security '23 - Cross Container Attacks:The Bewildered eBPF on Clouds
USENIX Security '23 - Fine-grained Poisoning Attack to Local Differential Privac
USENIX Security '23 - KENKU:Towards Efficient and Stealthy Black-box Adversarial
USENIX Security '23 - SMACK:Semantically Meaningful Adversarial Audio Attack
USENIX Security '23 - (M)WAIT for It:Bridging the Gap between Microarchitectural
USENIX Security '23 - Problematic Advertising and its Disparate Exposure on Face
USENIX Security '23 - Internet Service Providers' and Individuals' Attitudes, Ba
USENIX Security '23 - Towards Targeted Obfuscation of Adversarial Unsafe Images
USENIX Security '23 - PrivGraph:Differentially Private Graph Data Publication by
USENIX Security '23 - Aliasing Backdoor Attacks on Pre-trained Models
USENIX Security '23 - FloatZone:Accelerating Memory Error Detection using the Fl
USENIX Security '23 - V1SCAN:Discovering 1-day Vulnerabilities in Reused C-C++ O
USENIX Security '23 - DAFL:Directed Grey-box Fuzzing guided by Data Dependency
USENIX ATC '23 - AWARE: Automate Workload Autoscaling with Reinforcement Learnin
USENIX Security '23 - WHIP:Improving Static Vulnerability Detection in Web Appli
USENIX Security '23 - Educators’ Perspectives of Using (or Not Using) Online Exa
USENIX Security '23 - Glimpse:On-Demand PoW Light Client with Constant-Size Stor
USENIX Security '23 - BunnyHop:Exploiting the Instruction Prefetcher
USENIX Security '23 - Rethinking White-Box Watermarks on Deep Learning Models un
USENIX Security '23 - Cryptographic Deniability:A Multi-perspective Study of Use
USENIX Security '23 - Pass2Edit:A Multi-Step Generative Model for Guessing Edite
USENIX Security '23 - FABRID:Flexible Attestation-Based Routing for Inter-Domain
USENIX Security '23 - ACORN:Input Validation for Secure Aggregation
USENIX Security '23 - PhyAuth:Physical-Layer Message Authentication for ZigBee N
USENIX Security '23 - Mitigating Security Risks in Linux with KLAUS:A Method for
USENIX Security '23 - Side-Channel Attacks on Optane Persistent Memory