Sequential Change-Point Detection for High-Dimensional and Non-Euclidean Data | 0 | 0.34 | 2022 |
Task-optimized User Clustering based on Mobile App Usage for Cold-start Recommendations | 0 | 0.34 | 2022 |
ConcSpectre: Be Aware of Forthcoming Malware Hidden in Concurrent Programs | 0 | 0.34 | 2022 |
A Fast and Efficient Change-Point Detection Framework Based on Approximate k-Nearest Neighbor Graphs | 0 | 0.34 | 2022 |
AflIot: Fuzzing on linux-based IoT device with binary-level instrumentation | 0 | 0.34 | 2022 |
Stealing Neural Network Structure Through Remote Fpga Side-Channel Analysis | 0 | 0.34 | 2021 |
Stealing Neural Network Structure through Remote FPGA Side-channel Analysis | 1 | 0.35 | 2021 |
Automatically detecting and fixing concurrency bugs in go software systems | 1 | 0.35 | 2021 |
Protect Privacy Of Deep Classification Networks By Exploiting Their Generative Power | 0 | 0.34 | 2021 |
StyleCAPTCHA - CAPTCHA Based on Stylized Images to Defend against Deep Networks. | 0 | 0.34 | 2020 |
Practical No-box Adversarial Attacks against DNNs | 0 | 0.34 | 2020 |
Efficient Homomorphic Conversion Between (Ring) Lwe Ciphertexts | 0 | 0.34 | 2020 |
Backpropagating Linearly Improves Transferability of Adversarial Examples | 0 | 0.34 | 2020 |
senDroid: Auditing Sensor Access in Android System-Wide | 1 | 0.37 | 2020 |
Fooling Detection Alone is Not Enough: Adversarial Attack against Multiple Object Tracking | 0 | 0.34 | 2020 |
Explore the Transformation Space for Adversarial Images | 0 | 0.34 | 2020 |
Matryoshka: fuzzing deeply nested branches. | 5 | 0.42 | 2019 |
Homomorphic Encryption Standard. | 0 | 0.34 | 2019 |
Informer - irregular traffic detection for containerized microservices RPC in the real world. | 0 | 0.34 | 2019 |
Toward Scalable Fully Homomorphic Encryption Through Light Trusted Computing Assistance. | 0 | 0.34 | 2019 |
DeepIsoFun: A deep domain adaptation approach to predict isoform functions. | 2 | 0.36 | 2019 |
Angora: Efficient Fuzzing by Principled Search | 31 | 0.98 | 2018 |
Logistic regression over encrypted data from fully homomorphic encryption. | 2 | 0.42 | 2018 |
Labeled PSI from Fully Homomorphic Encryption with Malicious Security. | 5 | 0.40 | 2018 |
Falsified Data Attack on Backpressure-based Traffic Signal Control Algorithms | 1 | 0.39 | 2018 |
CHET: Compiler and Runtime for Homomorphic Evaluation of Tensor Programs. | 1 | 0.36 | 2018 |
Detecting third-party libraries in Android applications with high precision and recall | 10 | 0.47 | 2018 |
DNA copy number profiling using single-cell sequencing. | 1 | 0.37 | 2018 |
Evaluating private modes in desktop and mobile browsers and their resistance to fingerprinting. | 0 | 0.34 | 2017 |
Simple Encrypted Arithmetic Library - SEAL v2.1. | 15 | 0.66 | 2017 |
Attacks on the Search-RLWE problem with small errors. | 0 | 0.34 | 2017 |
Private Queries on Encrypted Genomic Data. | 4 | 0.52 | 2017 |
Security Considerations for Galois Non-dual RLWE Families. | 0 | 0.34 | 2017 |
MagNet: a Two-Pronged Defense against Adversarial Examples. | 146 | 3.94 | 2017 |
Surgescan: Enforcing Security Policies On Untrusted Third-Party Android Libraries | 0 | 0.34 | 2017 |
Attacks On The Search Rlwe Problem With Small Errors | 2 | 0.36 | 2017 |
On the Origin of Mobile Apps: Network Provenance for Android Applications. | 2 | 0.37 | 2016 |
Camera-Recognizable and Human-Invisible Labelling for Privacy Protection | 0 | 0.34 | 2016 |
revDroid: Code Analysis of the Side Effects after Dynamic Permission Revocation of Android Apps. | 8 | 0.48 | 2016 |
Vulnerable Galois RLWE Families and Improved Attacks. | 0 | 0.34 | 2016 |
AppShield: Enabling Multi-entity Access Control Cross Platforms for Mobile App Management. | 0 | 0.34 | 2016 |
Rethinking Permission Enforcement Mechanism on Mobile Systems. | 5 | 0.44 | 2016 |
Realizing the Fault-Tolerance Promise of Cloud Storage Using Locks with Intent. | 2 | 0.36 | 2016 |
POSTER: Security Analysis of Personal Unmanned Aerial Vehicles. | 0 | 0.34 | 2016 |
Predictive Eviction: A Novel Policy for Optimizing TLS Session Cache Performance. | 0 | 0.34 | 2015 |
FineDroid: Enforcing Permissions with System-Wide Application Execution Context. | 3 | 0.36 | 2015 |
Attacks on Search RLWE. | 12 | 0.55 | 2015 |
AnDarwin: Scalable Detection of Android Application Clones Based on Semantics | 14 | 0.57 | 2015 |
MAdFraud: investigating ad fraud in android applications | 56 | 1.45 | 2014 |
A Frequent Term-Based Multiple Clustering Approach for Text Documents. | 1 | 0.34 | 2014 |