default search action
29th ESORICS 2024: Bydgoszcz, Poland - Part I
- Joaquín García-Alfaro, Rafal Kozik, Michal Choras, Sokratis K. Katsikas:
Computer Security - ESORICS 2024 - 29th European Symposium on Research in Computer Security, Bydgoszcz, Poland, September 16-20, 2024, Proceedings, Part I. Lecture Notes in Computer Science 14982, Springer 2024, ISBN 978-3-031-70878-7
Security and Machine Learning
- Vasisht Duddu, Anudeep Das, Nora Khayata, Hossein Yalame, Thomas Schneider, N. Asokan:
Attesting Distributional Properties of Training Data for Machine Learning. 3-23 - Yuanmin Huang, Mi Zhang, Daizong Ding, Erling Jiang, Qifan Xiao, Xiaoyu You, Yuan Tian, Min Yang:
Towards Detection-Recovery Strategy for Robust Decentralized Matrix Factorization. 24-44 - Bao Gia Doan, Dang Quang Nguyen, Paul Montague, Tamas Abraham, Olivier Y. de Vel, Seyit Camtepe, Salil S. Kanhere, Ehsan Abbasnejad, Damith C. Ranasinghe:
Bayesian Learned Models Can Detect Adversarial Malware for Free. 45-65 - Kamil Malinka, Anton Firc, Petr Kaska, Tomás Lapsanský, Oskar Sandor, Ivan Homoliak:
Resilience of Voice Assistants to Synthetic Speech. 66-84 - Fabio De Gaspari, Dorjan Hitaj, Luigi V. Mancini:
Have You Poisoned My Data? Defending Neural Networks Against Data Poisoning. 85-104 - Julien Piet, Maha Alrashed, Chawin Sitawarin, Sizhe Chen, Zeming Wei, Elizabeth Sun, Basel Alomair, David A. Wagner:
Jatmo: Prompt Injection Defense by Task-Specific Finetuning. 105-124 - Xianlong Wang, Minghui Li, Peng Xu, Wei Liu, Leo Yu Zhang, Shengshan Hu, Yanjun Zhang:
PointAPA: Towards Availability Poisoning Attacks in 3D Point Clouds. 125-145 - Xianlong Wang, Shengshan Hu, Yechao Zhang, Ziqi Zhou, Leo Yu Zhang, Peng Xu, Wei Wan, Hai Jin:
ECLIPSE: Expunging Clean-Label Indiscriminate Poisons via Sparse Diffusion Purification. 146-166 - Omar Adel Ibrahim, Roberto Di Pietro:
MAG-JAM: Jamming Detection via Magnetic Emissions. 167-186 - Hamid Mozaffari, Sunav Choudhary, Amir Houmansadr:
Fake or Compromised? Making Sense of Malicious Clients in Federated Learning. 187-207 - Ubaid Ullah, Sonia Laudanna, P. Vinod, Andrea Di Sorbo, Corrado Aaron Visaggio, Gerardo Canfora:
Beyond Words: Stylometric Analysis for Detecting AI Manipulation on Social Media. 208-228 - Peng Yang, Zoe Lin Jiang, Jiehang Zhuang, Junbin Fang, Siu-Ming Yiu, Xuan Wang:
FSSiBNN: FSS-Based Secure Binarized Neural Network Inference with Free Bitwidth Conversion. 229-250 - Hongming Fei, Prosanta Gope, Owen Millwood, Biplab Sikdar:
Optimal Machine-Learning Attacks on Hybrid PUFs. 251-270 - Yuejun Guo, Constantinos Patsakis, Qiang Hu, Qiang Tang, Fran Casino:
Outside the Comfort Zone: Analysing LLM Capabilities in Software Vulnerability Detection. 271-289 - M. Caner Tol, Berk Sunar:
ZeroLeak: Automated Side-Channel Patching in Source Code Using LLMs. 290-310 - Yuying Li, Zeyan Liu, Junyi Zhao, Liangqin Ren, Fengjun Li, Jiebo Luo, Bo Luo:
The Adversarial AI-Art: Understanding, Generation, Detection, and Benchmarking. 311-331 - Diksha Goel, Kristen Moore, Mingyu Guo, Derui Wang, Minjune Kim, Seyit Camtepe:
Optimizing Cyber Defense in Dynamic Active Directories Through Reinforcement Learning. 332-352 - Heewon Baek, Minwook Lee, Hyoungshick Kim:
CryptoLLM: Harnessing the Power of LLMs to Detect Cryptographic API Misuse. 353-373 - Emad Efatinasab, Alessandro Brighente, Mirco Rampazzo, Nahal Azadi, Mauro Conti:
GAN-GRID: A Novel Generative Attack on Smart Grid Stability Prediction. 374-393
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.