Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 160 matches
- 2020
- Ahmed Salem, Apratim Bhattacharya, Michael Backes, Mario Fritz, Yang Zhang:
Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning. USENIX Security Symposium 2020: 1291-1308 - Junjie Shen, Jun Yeon Won, Zeyuan Chen, Qi Alfred Chen:
Drift with Devil: Security of Multi-Sensor Fusion based Localization in High-Level Autonomous Driving under GPS Spoofing. USENIX Security Symposium 2020: 931-948 - Daniel Lehmann, Johannes Kinder, Michael Pradel:
Everything Old is New Again: Binary Security of WebAssembly. USENIX Security Symposium 2020: 217-234 - Hailong Zhang, Sufian Latif, Raef Bassily, Atanas Rountev:
Differentially-Private Control-Flow Node Coverage for Software Usage Analysis. USENIX Security Symposium 2020: 1021-1038 - Yue Zhang, Jian Weng, Rajib Dey, Yier Jin, Zhiqiang Lin, Xinwen Fu:
Breaking Secure Pairing of Bluetooth Low Energy Using Downgrade Attacks. USENIX Security Symposium 2020: 37-54 - Hao Chen, Ilaria Chillotti, Yihe Dong, Oxana Poburinnaya, Ilya P. Razenshteyn, M. Sadegh Riazi:
SANNS: Scaling Up Secure Approximate k-Nearest Neighbors Search. USENIX Security Symposium 2020: 2111-2128 - Yehuda Afek, Anat Bremler-Barr, Lior Shafir:
NXNSAttack: Recursive DNS Inefficiencies and Vulnerabilities. USENIX Security Symposium 2020: 631-648 - Shimaa Ahmed, Amrita Roy Chowdhury, Kassem Fawaz, Parmesh Ramanathan:
Preech: A System for Privacy-Preserving Speech Transcription. USENIX Security Symposium 2020: 2703-2720 - Muhammad Ejaz Ahmed, Il-Youp Kwak, Jun Ho Huh, Iljoo Kim, Taekkyung Oh, Hyoungshick Kim:
Void: A fast and light voice liveness detection system. USENIX Security Symposium 2020: 2685-2702 - Taslima Akter, Bryan Dosono, Tousif Ahmed, Apu Kapadia, Bryan C. Semaan:
"I am uncomfortable sharing what I can't see": Privacy Concerns of the Visually Impaired with Camera Based Assistive Applications. USENIX Security Symposium 2020: 1929-1948 - Benjamin Andow, Samin Yaseer Mahmud, Justin Whitaker, William Enck, Bradley Reaves, Kapil Singh, Serge Egelman:
Actions Speak Louder than Words: Entity-Sensitive Privacy Policy and Data Flow Analysis with PoliCheck. USENIX Security Symposium 2020: 985-1002 - Mozhgan Azimpourkivi, Umut Topkara, Bogdan Carbunar:
Human Distinguishable Visual Key Fingerprints. USENIX Security Symposium 2020: 2237-2254 - Anomadarshi Barua, Mohammad Abdullah Al Faruque:
Hall Spoofing: A Non-Invasive DoS Attack on Grid-Tied Solar Inverter. USENIX Security Symposium 2020: 1273-1290 - Gabrielle Beck, Maximilian Zinkus, Matthew Green:
Automating the Development of Chosen Ciphertext Attacks. USENIX Security Symposium 2020: 1821-1837 - Daniel J. Bernstein, Tanja Lange:
McTiny: Fast High-Confidence Post-Quantum Key Erasure for Tiny Network Servers. USENIX Security Symposium 2020: 1731-1748 - Tim Blazytko, Moritz Schlögel, Cornelius Aschermann, Ali Abbasi, Joel Frank, Simon Wörner, Thorsten Holz:
AURORA: Statistical Crash Analysis for Automated Root Cause Explanation. USENIX Security Symposium 2020: 235-252 - Jonas Böhler, Florian Kerschbaum:
Secure Multi-party Computation of Differentially Private Median. USENIX Security Symposium 2020: 2147-2164 - Xander Bouwman, Harm Griffioen, Jelle Egbers, Christian Doerr, Bram Klievink, Michel van Eeten:
A different cup of TI? The added value of commercial threat intelligence. USENIX Security Symposium 2020: 433-450 - Samira Briongos, Pedro Malagón, José Manuel Moya, Thomas Eisenbarth:
RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks. USENIX Security Symposium 2020: 1967-1984 - Fraser Brown, Deian Stefan, Dawson R. Engler:
Sys: A Static/Symbolic Tool for Finding Good Bugs in Good (Browser) Code. USENIX Security Symposium 2020: 199-216 - Stefano Calzavara, Sebastian Roth, Alvise Rabitti, Michael Backes, Ben Stock:
A Tale of Two Headers: A Formal Analysis of Inconsistent Click-Jacking Protection on the Web. USENIX Security Symposium 2020: 683-697 - Srdjan Capkun:
Digital Contact Tracing. USENIX Security Symposium 2020 - Varun Chandrasekaran, Kamalika Chaudhuri, Irene Giacomelli, Somesh Jha, Songbai Yan:
Exploring Connections Between Active Learning and Model Extraction. USENIX Security Symposium 2020: 1309-1326 - Yizheng Chen, Shiqi Wang, Dongdong She, Suman Jana:
On Training Robust PDF Malware Classifiers. USENIX Security Symposium 2020: 2343-2360 - Hongxu Chen, Shengjian Guo, Yinxing Xue, Yulei Sui, Cen Zhang, Yuekang Li, Haijun Wang, Yang Liu:
MUZZ: Thread-aware Grey-box Fuzzing for Effective Bug Hunting in Multithreaded Programs. USENIX Security Symposium 2020: 2325-2342 - Jiayi Chen, Urs Hengartner, Hassan Khan, Mohammad Mannan:
Chaperone: Real-time Locking and Loss Prevention for Smartphones. USENIX Security Symposium 2020: 325-342 - Jianjun Chen, Vern Paxson, Jian Jiang:
Composition Kills: A Case Study of Email Sender Authentication. USENIX Security Symposium 2020: 2183-2199 - Yuxuan Chen, Xuejing Yuan, Jiangshan Zhang, Yue Zhao, Shengzhi Zhang, Kai Chen, XiaoFeng Wang:
Devil's Whisper: A General Approach for Physical Adversarial Attacks against Commercial Black-box Speech Recognition Devices. USENIX Security Symposium 2020: 2667-2684 - Weiteng Chen, Xiaochen Zou, Guoren Li, Zhiyun Qian:
KOOBE: Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities. USENIX Security Symposium 2020: 1093-1110 - Jake Christensen, Ionut Mugurel Anghel, Rob Taglang, Mihai Chiroiu, Radu Sion:
DECAF: Automatic, Adaptive De-bloating and Hardening of COTS Firmware. USENIX Security Symposium 2020: 1713-1730
skipping 130 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-26 22:56 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint