


default search action
8th IWSPA@CODASPY 2022: Baltimore, MD, USA
- Andrew H. Sung, Rakesh M. Verma, Roland H. C. Yap:
IWSPA@CODASPY 2022: Proceedings of the 2022 ACM on International Workshop on Security and Privacy Analytics, Baltimore, MD, USA, April 27, 2022. ACM 2022, ISBN 978-1-4503-9230-3 - Suku Nair:
SDP Based Zero-Trust Architectures. 1 - Sander Joos
, Tim Van hamme, Davy Preuveneers, Wouter Joosen:
Adversarial Robustness is Not Enough: Practical Limitations for Securing Facial Authentication. 2-12 - Tran Van Sang, Tran Phuong Thao, Rie Shigetomi Yamaguchi, Toshiyuki Nakata
:
Enhancing Boundary Attack in Adversarial Image Using Square Random Constraint. 13-23 - Florian Nuding, Rudolf Mayer:
Data Poisoning in Sequential and Parallel Federated Learning. 24-34 - Anantaa Kotal, Aritran Piplai, Sai Sree Laya Chukkapalli, Anupam Joshi:
PriveTAB: Secure and Privacy-Preserving sharing of Tabular Data. 35-45 - Hassan Wasswa
, Abdul Serwadda:
The Proof is in the Glare: On the Privacy Risk Posed by Eyeglasses in Video Calls. 46-54 - Louise Halvorsen, Siv L. Steffensen, Willard Rafnsson, Oksana Kulyk, Raúl Pardo:
How Attacker Knowledge Affects Privacy Risks: An Analysis Using Probabilistic Programming. 55-65 - Daniel N. Jones:
Shadows Behind the Keyboard: Dark Personalities and Deception in Cyberattacks. 66-67 - Sam Dawson, Mark Batty:
Chronos vs. Chaos: Timing Weak Memory Executions in the Linux Kernel. 68-77 - Nitesh Suresh Sehwani:
No Features Needed: Using BPE Sequence Embeddings for Web Log Anomaly Detection. 78-85 - Aleksandar Jankovic, Rudolf Mayer:
An Empirical Evaluation of Adversarial Examples Defences, Combinations and Robustness Scores. 86-92 - Buse Gul Atli Tekgul, N. Asokan
:
On the Effectiveness of Dataset Watermarking. 93-99 - Omid Madani, Sai Ankith Averineni, Shashidhar Gandham:
A Dataset of Networks of Computing Hosts. 100-104

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.