default search action
5th SVCC 2024: Seoul, Korea
- Silicon Valley Cybersecurity Conference, SVCC 2024, Seoul, Republic of Korea, June 17-19, 2024. IEEE 2024, ISBN 979-8-3503-8314-0
- Aditi Aggarwal, Deepika Varshney:
Multimodal Sentiment Analysis: Perceived vs Induced Sentiments. 1-7 - Firuz Juraev, Mohammed Abuhamad, Simon S. Woo, George K. Thiruvathukal, Tamer Abuhmed:
The Impact of Model Variations on the Robustness of Deep Learning Models in Adversarial Settings. 1-7 - Seon Woo Lee, Ju Young Lee, Tae Jin Lee:
Graph Neural Networks for Network Intrusion Detection: An IP Behavioral Analysis Perspective. 1-4 - Qaiser Khan, Sourav Purification, Rono Cheruiyot, Jinoh Kim, Jonghyun Kim, Sang-Yoon Chang:
Toward Post-Quantum Digital Certificate for eSIM. 1-3 - Rono Cheruiyot, Sourav Purification, Simeon Wuthier, Sang-Yoon Chang:
5G Remote eSIM Provisioning: Blockchain-based Public Key Delivery. 1-3 - Steven Ning, Khanh Nguyen, Sohini Bagchi, Younghee Park:
The Study of Feature Engineering in Machine Learning and Deep Learning for Network Intrusion Detection Systems. 1-5 - Seonho Choi:
Hop-Count Authentication with Moving Keys for Mobile Ad Hoc Networks. 1-3 - Amanul Islam, Sang-Yoon Chang, Jinoh Kim, Jonghyun Kim:
Anomaly Detection in 5G using Variational Autoencoders. 1-6 - Jetwadee Phanthanachai, Manoj Tripathy, Balakrishana Pamulaparthy:
Smart DC Microgrid Architectures and its Cyber Security Challenges: An Overview. 1-8 - Yujin Oh, Kyungbae Jang, Yujin Yang, Hwajeong Seo:
Quantum Implementation and Analysis of ARIA. 1-7 - Jaeseung Han, Yeon-Jae Kim, Dong-Guk Han:
Side-Channel Protected PIPO Implementation in Hardware. 1-3 - Taehyun Han, Sangyeon Hwang, Tae-Jin Lee:
Attack Group Analysis and Identification based on Heterogeneous Graph. 1-6 - Kyungbae Jang, Yujin Oh, Minwoo Lee, Dukyoung Kim, Hwajeong Seo:
Depth Optimized Quantum Circuits for HIGHT and LEA. 1-6 - Firuz Juraev, Mohammed Abuhamad, Eric Chan-Tin, George K. Thiruvathukal, Tamer Abuhmed:
Unmasking the Vulnerabilities of Deep Learning Models: A Multi-Dimensional Analysis of Adversarial Attacks and Defenses. 1-8 - Jihyeon Song, Kyungmin Park, Cheolhee Park, Jonghyun Kim, Ikkyun Kim:
Analyzing the container security threat on the 5G Core Network. 1-3 - Jung-Hyun Kim, Steve Gustaman, Sang Kil Cha:
PoE: A Domain-Specific Language for Exploitation. 1-6 - Francesco Pietrantonio, Alessio Botta, Stefania Zinno, Giorgio Ventre, Luigi Gallo, Laura Mancuso, Roberta Presta:
A Gaze-Based Analysis of Human Detection of Email Phishing. 1-8 - Pablo Armingol Robles, Antonio Agustin Pastor Perales, Juan Carlos Caja Díaz:
A Distributed Approach for Detecting and Mitigating DDoS Attacks on White-Boxes. 1-8 - Kamrul Hasan, Nima Karimian, Sara Tehranipoor:
Combating Deepfakes: A Novel Hybrid Hardware-Software Approach. 1-2 - Sourav Purification, Kyungmin Park, Jinoh Kim, Jonghyun Kim, Sang-Yoon Chang:
Wireless Link Routing to Secure Against Fake Base Station in 5G. 1-3 - Kelei Zhang, Sang-Yoon Chang:
Exploring Reinforcement Learning to Aid Tor Latency Performance. 1-3 - Khanh Nguyen, Younghee Park:
Detecting Malicious Websites by using Deep Q-Networks. 1-10 - Anson Xu, Arnav Choudhury, Eason Liu, Sean Choi:
ProtectNIC: SmartNIC-based Ransomware Detection. 1-3 - Minah Chae, Wongeun Shin, Sangyun Jung, Jihun Yeom, Dongho Jeon, Heeseok Kim:
The Threat of Password Guessing Attacks Exploiting Linguistic Characteristics: A Case Study on the Korean Domains. 1-4 - Jinseob Oh, Chanho Choi, Dooho Choi:
Simplified Quantum Circuit Implementation for ASCON Security Analysis against Grover's Algorithm. 1-3 - Wael Alsabbagh, Chaerin Kim, Peter Langendörfer:
Silent Sabotage: A Stealthy Control Logic Injection in IIoT Systems. 1-8 - Ravi Nitinkumar Patel, Xiaomei Zhang, Xiaoyan Sun, Jun Dai:
Exploring Scalable Bayesian Networks For Identification of Zero-day Attack Paths. 1-8 - MohammadReza Hosseinzadehketilateh, Sara Tehranipoor, Nima Karimian:
Human-to-Device (H2D) Authentication Using Biometrics. 1-3
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.