


default search action
40th SP 2019: San Francisco, CA, USA - Workshops
- 2019 IEEE Security and Privacy Workshops, SP Workshops 2019, San Francisco, CA, USA, May 19-23, 2019. IEEE 2019, ISBN 978-1-7281-3508-3

DLS 2019: 2nd IEEE Workshop on Deep Learning and Security
- Chawin Sitawarin

, David A. Wagner:
On the Robustness of Deep K-Nearest Neighbors. 1-7 - Octavian Suciu, Scott E. Coull, Jeffrey Johns:

Exploring Adversarial Examples in Malware Detection. 8-14 - Rohan Taori

, Amog Kamsetty, Brenton Chu, Nikita Vemuri:
Targeted Adversarial Examples for Black Box Audio Systems. 15-20 - Scott E. Coull, Christopher Gardner:

Activation Analysis of a Byte-Based Deep Neural Network for Malware Classification. 21-27 - Petr Gronát, Javier Alejandro Aldana-Iuit, Martin Bálek:

MaxNet: Neural Network Architecture for Continuous Detection of Malicious Activity. 28-35 - Gonzalo Marín, Pedro Casas, Germán Capdehourat

:
Deep in the Dark - Deep Learning-Based Malware Traffic Detection Without Expert Knowledge. 36-42 - Taesung Lee, Benjamin Edwards, Ian M. Molloy, Dong Su:

Defending Against Neural Network Model Stealing Attacks Using Deceptive Perturbations. 43-49 - Liwei Song, Reza Shokri, Prateek Mittal:

Membership Inference Attacks Against Adversarially Robust Deep Learning Models. 50-56 - Patricia Thaine, Sergey Gorbunov, Gerald Penn

:
Efficient Evaluation of Activation Functions over Encrypted Data. 57-63
IWPE 2019: IEEE Workshop on Privacy Engineering
- Laurens Sion

, Dimitri Van Landuyt
, Kim Wuyts
, Wouter Joosen:
Privacy Risk Assessment for Data Subject-Aware Threat Modeling. 64-71 - Ali Kassem, Gergely Ács, Claude Castelluccia, Catuscia Palamidessi

:
Differential Inference Testing: A Practical Approach to Evaluate Sanitizations of Datasets. 72-79 - Kim Wuyts

, Laurens Sion
, Dimitri Van Landuyt
, Wouter Joosen:
Knowledge is Power: Systematic Reuse of Privacy Knowledge for Threat Elicitation. 80-83 - Tavish Vaidya, Micah Sherr:

You Talk Too Much: Limiting Privacy Exposure Via Voice Input. 84-91 - Takahito Sakamoto, Masahiro Matsunaga:

After GDPR, Still Tracking or Not? Understanding Opt-Out States for Online Behavioral Advertising. 92-99 - Ala'a Al-Momani, Frank Kargl, Robert Karl Schmidt, Antonio Kung, Christoph Bösch

:
A Privacy-Aware V-Model for Software Development. 100-104 - Shengbao Zheng, Zhenyu Zhou, Heyi Tang, Xiaowei Yang:

SwitchMan: An Easy-to-Use Approach to Secure User Input and Output. 105-113
SafeThings 2019: IEEE Workshop on the Internet of Safe Things
- Sean Rivera, Sofiane Lagraa, Cristina Nita-Rotaru, Sheila Becker, Radu State:

ROS-Defender: SDN-Based Security Policy Enforcement for Robotic Applications. 114-119 - Kacper Wardega, Roberto Tron

, Wenchao Li
:
Resilience of Multi-robot Systems to Physical Masquerade Attacks. 120-125 - Florian Kohnhäuser, Dominik Püllen, Stefan Katzenbeisser:

Ensuring the Safe and Secure Operation of Electronic Control Units in Road Vehicles. 126-131 - Alesia Chernikova, Alina Oprea, Cristina Nita-Rotaru, BaekGyu Kim

:
Are Self-Driving Cars Secure? Evasion Attacks Against Deep Neural Networks for Steering Angle Prediction. 132-137 - Mitali Palekar, Earlence Fernandes, Franziska Roesner:

Analysis of the Susceptibility of Smart Home Programming Interfaces to End User Error. 138-143 - Peng Cheng, Ibrahim Ethem Bagci, Jeff Yan, Utz Roedig

:
Smart Speaker Privacy Control - Acoustic Tagging for Personal Voice Assistants. 144-149 - Weijia He

, Jesse J. Martinez
, Roshni Padhi, Lefan Zhang, Blase Ur:
When Smart Devices Are Stupid: Negative Experiences Using Home Smart Devices. 150-155 - Sihang Liu

, Yizhou Wei, Jianfeng Chi, Faysal Hossain Shezan
, Yuan Tian:
Side Channel Attacks in Computation Offloading Systems with GPU Virtualization. 156-161 - Shin-Ming Cheng

, Sheng-Hao Ma:
Demo: An Emulator-Based Active Protection System Against IoT Malware. 162 - Salma Elmalaki

, Bo-Jhang Ho, Moustafa Alzantot, Yasser Shoukry
, Mani B. Srivastava
:
SpyCon: Adaptation Based Spyware in Human-in-the-Loop IoT. 163-168 - Simon D. Duque Antón

, Alexander Hafner, Hans Dieter Schotten:
Devil in the Detail: Attack Scenarios in Industrial Applications. 169-174 - Ulrich Matchi Aïvodji, Sébastien Gambs, Alexandre Martin:

IOTFLA : A Secured and Privacy-Preserving Smart Home Architecture Implementing Federated Learning. 175-180 - Davino Mauro Junior, Luis Melo

, Hao Lu, Marcelo d'Amorim, Atul Prakash
:
A Study of Vulnerability Analysis of Popular Smart Devices Through Their Companion Apps. 181-186
WTMC 2019: 4th IEEE Workshop on Traffic Measurements for Cybersecurity
- Victor Le Pochat

, Tom van Goethem, Wouter Joosen:
A Smörgåsbord of Typos: Exploring International Keyboard Layout Typosquatting. 187-192 - Marcin Skwarek, Maciej Korczynski, Wojciech Mazurczyk

, Andrzej Duda
:
Characterizing Vulnerability of DNS AXFR Transfers with Global-Scale Scanning. 193-198 - Thomas Vissers, Peter Janssen, Wouter Joosen, Lieven Desmet

:
Assessing the Effectiveness of Domain Blacklisting Against Malicious DNS Registrations. 199-204 - Oliver Farnan, Joss Wright, Alexander Darer:

Analysing Censorship Circumvention with VPNs Via DNS Cache Snooping. 205-211 - John V. Monaco

:
Feasibility of a Keystroke Timing Attack on Search Engines with Autocomplete. 212-217 - Oleksii Starov, Yuchen Zhou, Jun Wang:

Detecting Malicious Campaigns in Obfuscated JavaScript with Scalable Behavioral Analysis. 218-223 - Alexander Vetterl, Richard Clayton, Ian Walden:

Counting Outdated Honeypots: Legal and Useful. 224-229 - Pedro Casas, Gonzalo Marín, Germán Capdehourat

, Maciej Korczynski:
MLSEC - Benchmarking Shallow and Deep Machine Learning Models for Network Security. 230-235 - Kelvin Mai, Xi Qin, Neil Ortiz Silva, Alvaro A. Cárdenas

:
IEC 60870-5-104 Network Characterization of a Large-Scale Operational Power Grid. 236-241 - Abhishta Abhishta

, Marianne Junger, Reinoud Joosten, Lambert J. M. Nieuwenhuis
:
Victim Routine Influences the Number of DDoS Attacks: Evidence from Dutch Educational Network. 242-247

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














