default search action
52nd DSN 2022: Baltimore, MD, USA - Workshops
- 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN Workshops 2022, Baltimore, MD, USA, June 27-30, 2022. IEEE 2022, ISBN 978-1-6654-0262-0
- Aawista Chaudhry, Talal Halabi, Mohammad Zulkernine:
Stealthy Data Corruption Attack Against Road Traffic Congestion Avoidance Applications. 1-7 - Marcello Cinque, Luigi De Simone, Andrea Marchetta:
Certify the Uncertified: Towards Assessment of Virtualization for Mixed-criticality in the Automotive Domain. 8-11 - Connor Sexton, Joseph Callenes:
Tiny Black Boxes: A nano-Drone Safety Architecture. 12-19 - Sidney La Fontaine, Naveen Muralidhar, Michael Clifford, Tina Eliassi-Rad, Cristina Nita-Rotaru:
Alternative Route-Based Attacks in Metropolitan Traffic Systems. 20-27 - John Mern, Kyle Hatch, Ryan Silva, Cameron Hickert, Tamim Sookoor, Mykel J. Kochenderfer:
Autonomous Attack Mitigation for Industrial Control Systems. 28-36 - Shu Liu, Yanlei Shang:
Federated Learning with Anomaly Client Detection and Decentralized Parameter Aggregation. 37-43 - Xugui Zhou, Maxfield Kouzel, Homa Alemzadeh:
Robustness Testing of Data and Knowledge Driven Anomaly Detection in Cyber-Physical Systems. 44-51 - Saba Amiri, Adam Belloum, Eric T. Nalisnick, Sander Klous, Leon Gommans:
On the impact of non-IID data on the performance and fairness of differentially private federated learning. 52-58 - Arunava Roy, Dipankar Dasgupta:
A Robust Framework for Adaptive Selection of Filter Ensembles to Detect Adversarial Inputs. 59-67 - Abraham Chan, Arpan Gujarati, Karthik Pattabiraman, Sathish Gopalakrishnan:
Towards Building Resilient Ensembles against Training Data Faults. 68-69 - Avraham Shinnar, Barry M. Trager:
General Probability in Coq. 70-71 - Sahiti Bommareddy, Benjamin Gilby, Maher Khan, Imes Chiu, Mathaios Panteli, John W. van de Lindt, Linton Wells, Yair Amir, Amy Babay:
Data-Centric Analysis of Compound Threats to Critical Infrastructure Control Systems. 72-79 - Stephan Kleber, Frank Kargl, Milan Stute, Matthias Hollick:
Network Message Field Type Clustering for Reverse Engineering of Unknown Binary Protocols. 80-87 - João R. Campos, Ernesto Costa, Marco Vieira:
A Dataset of Linux Failure Data for Dependability Evaluation and Improvement. 88-95 - Junzhe Wang, Lannan Luo:
Privacy Leakage Analysis for Colluding Smart Apps. 96-102 - Tina Moghaddam, Minjune Kim, Jin-Hee Cho, Hyuk Lim, Terrence J. Moore, Frederica F. Nelson, Dan Dongseong Kim:
A Practical Security Evaluation of a Moving Target Defence against Multi-Phase Cyberattacks. 103-110 - Kai Huang, Su Yang, Hongyu Sun, Chengyi Sun, Xuejun Li, Yuqing Zhang:
Repairing Security Vulnerabilities Using Pre-trained Programming Language Models. 111-116 - Haonan Yang, Yongchao Zhong, Bo Yang, Yiyu Yang, Zifeng Xu, Longjuan Wang, Yuqing Zhang:
An Overview of Sybil Attack Detection Mechanisms in VFC. 117-122 - Qinghan Lai, Shuai Ding, Jinghao Gong, Jin'an Cui, Song Liu:
A Chinese Multi-modal Relation Extraction Model for Internet Security of Finance. 123-128 - Xudong Cao, Tianwei Liu, Jiayuan Zhang, Mengyue Feng, Xin Zhang, Wanying Cao, Hongyu Sun, Yuqing Zhang:
SbrPBert: A BERT-Based Model for Accurate Security Bug Report Prediction. 129-134 - Guangxia Xu, Li Wang:
SCUC-DSAC: A Data Sharing Access Control Model Based on Smart Contract and User Credit. 135-140 - Yuhao Lin, Ying Li, Mianxue Gu, Hongyu Sun, Qiuling Yue, Jinglu Hu, Chunjie Cao, Yuqing Zhang:
Vulnerability Dataset Construction Methods Applied To Vulnerability Detection: A Survey. 141-146 - Junfeng Tian, Ruxin Bai, Tianfeng Zhang:
Multi-authoritative Users Assured Data Deletion Scheme in Cloud Computing. 147-154 - Wenbin Yao, Longcan Hu, Yingying Hou, Xiaoyong Li:
A Two-Layer Soft-Voting Ensemble Learning Model For Network Intrusion Detection. 155-161 - Seth Lyles, Mark Desantis, John Donaldson, Micaela Gallegos, Hannah Nyholm, Claire Taylor, Kristine Monteith:
Machine Learning Analysis of Memory Images for Process Characterization and Malware Detection. 162-169 - Junfeng Tian, Qianqian Song, Haoning Wang:
Blockchain-Based Incentive and Arbitrable Data Auditing Scheme. 170-177 - Menghan Wang, Libin Yang, Wei Lou:
A Comprehensive Dynamic Quality Assessment Method for Cyber Threat Intelligence. 178-181 - Ruizhong Du, Yan Gao:
DTC: A Dynamic Trusted Collaboration Architecture for Mobile Edge Computing. 182-185 - Xin Zhang, Hongyu Sun, Zhipeng He, Mianxue Gu, Jingyu Feng, Yuqing Zhang:
VDBWGDL: Vulnerability Detection Based On Weight Graph And Deep Learning. 186-190 - Jiawei Wu, Xiuquan Qiao, Huijuan Lu:
Dynamic Multipath Routing Mechanism for Multimedia Data Flow Scheduling Over Software Defined Networks. 191-198
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.