default search action
54th DSN 2024: Brisbane, Australia - Supplemental Volume
- 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2024 - Supplemental Volume, Brisbane, Australia, June 24-27, 2024. IEEE 2024, ISBN 979-8-3503-9570-9
- Nhung H. Nguyen, Jin-Hee Cho, Terrence J. Moore, Seunghyun Yoon, Hyuk Lim, Frederica Free-Nelson, Guangdong Bai, Dan Dongseong Kim:
AuSSE: A Novel Framework for Security and Safety Evaluation for Autonomous Vehicles. 1-5 - Haocong Luo, Ismail Emir Yüksel, Ataberk Olgun, A. Giray Yaglikçi, Mohammad Sadrosadati, Onur Mutlu:
An Experimental Characterization of Combined RowHammer and RowPress Read Disturbance in Modern DRAM Chips. 6-11 - Yang Zhang, Long Wang, Zhengang Wang, Dongdong Shangguan:
Exploring Use of Symbolic Execution for Service Analysis. 12-16 - Haoran Qiu, Weichao Mao, Chen Wang, Saurabh Jha, Hubertus Franke, Chandra Narayanaswami, Zbigniew Kalbarczyk, Tamer Basar, Ravishankar K. Iyer:
When Green Computing Meets Performance and Resilience SLOs. 17-22 - Domenico Cotroneo, Pietro Liguori:
Neural Fault Injection: Generating Software Faults from Natural Language. 23-27 - Subrat Kumar Swain, Vireshwar Kumar, Guangdong Bai, Dan Dongseong Kim:
PANDA: Practical Adversarial Attack Against Network Intrusion Detection. 28-32 - Abraham Chan, Arpan Gujarati, Karthik Pattabiraman, Sathish Gopalakrishnan:
Harnessing Explainability to Improve ML Ensemble Resilience. 33-37 - Tiago Carvalho, António Casimiro, Alysson Bessani:
On the Design of Coordination Services for IoT. 38-42 - Niklas Bunzel:
Patching the Cracks: Detecting and Addressing Adversarial Examples in Real-World Applications. 43-46 - Giann Spilere Nandi, David Pereira, José Proença, Eduardo Tovar, Luís Nogueira:
Reducing the gap between theory and practice in real-time systems with MARS. 47-49 - Tina Moghaddam, Guowei Yang, Chandra Thapa, Seyit Camtepe, Dan Dongseong Kim:
MTD in Plain Sight: Hiding Network Behavior in Moving Target Defenses. 50-52 - Sai Gautam Mandapati, Chathurika Ranaweera, Robin Doss:
Advancing NDN Security for IoT: Harnessing Machine Learning to Detect Attacks. 53-55 - Manu Jo Varghese, Adnan Anwar, Frank Jiang, Robin Doss:
Novel CAN Bus Fuzzing Framework for Finding Vulnerabilities in Automotive Systems. 56-58 - Anuj Nepal, Robin Doss, Frank Jiang:
Secure Data Provenance in Internet of Vehicles with Verifiable Credentials for Security and Privacy. 59-61 - Akhil Bandarupalli, Saurabh Bagchi, Aniket Kate:
(Re)-envisioning Approximate Agreement for Distributed Cryptography and Oracles. 62-64 - Taylor T. Johnson, Diego Manzanas Lopez, Hoang-Dung Tran:
Tutorial: Safe, Secure, and Trustworthy Artificial Intelligence (AI) via Formal Verification of Neural Networks and Autonomous Cyber-Physical Systems (CPS) with NNV. 65-66 - Sushmita Ruj:
Zero-Knowledge Proofs for Blockchains. 67-68 - Andrei Lebedev, Vincent Gramoli:
Evaluating Performance and Dependability of Blockchain Protocols with Diablo. 69-70 - Karthik Pattabiraman, Abraham Chan:
Tutorial: LLTFI and the Art of Fault Injection. 71-72 - Jiongliang Lin, Yiwen Guo, Hao Chen:
Intrusion Detection at Scale with the Assistance of a Command-line Language Model. 73-79 - Shengye Wan, Joshua Saxe, Craig Gomes, Sahana Chennabasappa, Avilash Rath, Kun Sun, Xinda Wang:
Bridging the Gap: A Study of AI-based Vulnerability Management between Industry and Academia. 80-87 - Qiao Yu, Wengui Zhang, Min Zhou, Jialiang Yu, Zhenli Sheng, Jasmin Bogatinovski, Jorge Cardoso, Odej Kao:
Investigating Memory Failure Prediction Across CPU Architectures. 88-95 - Guofeng Li, Xia Feng, Liang-Min Wang, Haiqin Wu, Boris Düdder:
Federated Unlearning in the Internet of Vehicles. 96-103 - Fatema Bannat Wala, Stephan Bohacek:
Zone-Hopping: Sensitive Information Leakage Prevention for DNSSEC-NSEC. 104-110 - Saurabh Hukerikar, Atieh Lotfi, Yanxiang Huang, Jason Campbell, Nirmal R. Saxena:
Optimizing Large-Scale Fault Injection Experiments through Martingale Hypothesis: A Systematic Approach for Reliability Assessment of Safety-Critical Systems. 111-117 - Casidhe Hutchison, Milda Zizyte, David Guttendorf, Claire Le Goues, Philip Koopman:
Active Learning Omnivariate Decision Trees for Fault Diagnosis in Robotic Systems. 118-124 - Kurt Friday, Elias Bou-Harb, Ron Lee, Pramod Peethambaran, Mayank Saxena:
Empowering Data Centers with Computational Storage Drive-Based Deep Learning Inference Functionality to Combat Ransomware. 125-132 - Wei-Jia Chen, Chia-Yi Hsu, Wei-Bin Lee, Chia-Mu Yu, Chun-Ying Huang:
Road Decals as Trojans: Disrupting Autonomous Vehicle Navigation with Adversarial Patterns. 133-140 - Saurabh Jha, Jesus Rios, Naoki Abe, Frank Bagehorn, Laura Shwartz:
Fault Localization Using Interventional Causal Learning for Cloud-Native Applications. 141-147 - Chunjiong Zhang, Byeong-Hee Roh, Gaoyang Shan:
Federated Anomaly Detection. 148-149 - Huiju Lee, Huy Kang Kim:
Mitigating False Positives in DGA Detection for Non-English Domain Names. 150-151 - Ziqiang Xu, Ahmad Salehi S., Naveen K. Chilamkurti:
Cryptography-Based Bootstrapping Scheme for Permissionless Sharding Blockchain. 152-153 - Christian Berger, Hans P. Reiser:
Poster: Optimizing Tree-based Quorum Certification for BFT Systems at Planetary-Scale. 154-156 - Niousha Nazemi, Omid Tavallaie, Shuaijun Chen, Albert Y. Zomaya, Ralph Holz:
Boosting Communication Efficiency of Federated Learning's Secure Aggregation. 157-158 - Shuwen Liu, Yongfeng Qian, Yixue Hao:
Balancing Privacy and Attack Utility: Calibrating Sample Difficulty for Membership Inference Attacks in Transfer Learning. 159-160 - Yu-Chen Hsiao, Chia-Heng Yen, Bo-Yang Ke, Kai-Chiang Wu:
Synergizing GCN and GAT for Hardware Trojan Detection and Localization. 161-162
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.