V
主页
USENIX ATC '23 - TC-GNN:Bridging Sparse GNN Computation and Dense Tensor Cores o
发布人
打开封面
下载高清视频
观看高清视频
视频下载器
USENIX ATC '23 - Change Management in Physical Network Lifecycle Automation
USENIX Security '23 - PrivGraph:Differentially Private Graph Data Publication by
USENIX Security '23 - Prime Match:A Privacy-Preserving Inventory Matching System
USENIX ATC '23 - SecretFlow-SPU:A Performant and User-Friendly Framework for Pri
USENIX ATC '23 - FarReach:Write-back Caching in Programmable Switches
USENIX Security '23 - Differential Testing of Cross Deep Learning Framework APIs
USENIX Security '23 - Confusum Contractum:Confused Deputy Vulnerabilities in Eth
USENIX Security '23 - PhyAuth:Physical-Layer Message Authentication for ZigBee N
USENIX Security '23 - Exploring Tenants' Preferences of Privacy Negotiation in A
USENIX ATC '23 - Comosum:An Extensible, Reconfigurable, and Fault-Tolerant IoT P
Discrete Math - 1.6.2 Rules of Inference for Quantified Statements
USENIX Security '23 - Fine-grained Poisoning Attack to Local Differential Privac
USENIX ATC '23 - AWARE: Automate Workload Autoscaling with Reinforcement Learnin
USENIX Security '23 - Fourteen Years in the Life:A Root Server’s Perspective on
USENIX Security '23 - Freaky Leaky SMS:Extracting User Locations by Analyzing SM
USENIX Security '23 - KENKU:Towards Efficient and Stealthy Black-box Adversarial
USENIX Security '23 - Distance-Aware Private Set Intersection
USENIX Security '23 - BunnyHop:Exploiting the Instruction Prefetcher
USENIX Security '23 - Jinn:Hijacking Safe Programs with Trojans
USENIX ATC '23 - SingularFS:A Billion-Scale Distributed File System Using a Sing
USENIX Security '23 - Framing Frames:Bypassing Wi-Fi Encryption by Manipulating
USENIX Security '23 - LocIn: Inferring Semantic Location from Spatial Maps in Mi
USENIX Security '23 - Black-box Adversarial Example Attack towards FCG Based And
OSDI '23 - TAILCHECK:A Lightweight Heap Overflow Detection Mechanism with Page P
USENIX Security '23 - Improving Logging to Reduce Permission Over-Granting Mista
USENIX Security '23 - Know Your Cybercriminal:Evaluating Attacker Preferences by
Lifecycle of Reusable Automations:Track, Maintain, Deprecate
USENIX Security '23 - Fuzztruction:Using Fault Injection-based Fuzzing to Levera
USENIX Security '23 - Oops..! I Glitched It Again! How to Multi-Glitch the Glitc
USENIX Security '23 - Cross Container Attacks:The Bewildered eBPF on Clouds
USENIX Security '23 - Towards a General Video-based Keystroke Inference Attack
USENIX Security '23 - TreeSync:Authenticated Group Management for Messaging Laye
USENIX Security '23 - Improving Real-world Password Guessing Attacks via Bi-dire
Quantum Cryptography 2 (Crypto 2023)
USENIX Security '23 - Problematic Advertising and its Disparate Exposure on Face
USENIX Security '23 - Side-Channel Attacks on Optane Persistent Memory
USENIX Security '23 - Isolated and Exhausted:Attacking Operating Systems via Sit
USENIX Security '23 - Mitigating Security Risks in Linux with KLAUS:A Method for
USENIX Security '23 - WHIP:Improving Static Vulnerability Detection in Web Appli
USENIX Security '23 - The Case for Learned Provenance Graph Storage Systems