default search action
Search dblp for Publications
export results for "toc:db/conf/codaspy/iwspa2022.bht:"
@inproceedings{DBLP:conf/codaspy/DawsonB22, author = {Sam Dawson and Mark Batty}, editor = {Andrew H. Sung and Rakesh M. Verma and Roland H. C. Yap}, title = {Chronos vs. Chaos: Timing Weak Memory Executions in the Linux Kernel}, booktitle = {IWSPA@CODASPY 2022: Proceedings of the 2022 {ACM} on International Workshop on Security and Privacy Analytics, Baltimore, MD, USA, April 27, 2022}, pages = {68--77}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3510548.3519371}, doi = {10.1145/3510548.3519371}, timestamp = {Tue, 03 May 2022 16:41:23 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/DawsonB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/HalvorsenSRKP22, author = {Louise Halvorsen and Siv L. Steffensen and Willard Rafnsson and Oksana Kulyk and Ra{\'{u}}l Pardo}, editor = {Andrew H. Sung and Rakesh M. Verma and Roland H. C. Yap}, title = {How Attacker Knowledge Affects Privacy Risks: An Analysis Using Probabilistic Programming}, booktitle = {IWSPA@CODASPY 2022: Proceedings of the 2022 {ACM} on International Workshop on Security and Privacy Analytics, Baltimore, MD, USA, April 27, 2022}, pages = {55--65}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3510548.3519380}, doi = {10.1145/3510548.3519380}, timestamp = {Tue, 03 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/HalvorsenSRKP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/JankovicM22, author = {Aleksandar Jankovic and Rudolf Mayer}, editor = {Andrew H. Sung and Rakesh M. Verma and Roland H. C. Yap}, title = {An Empirical Evaluation of Adversarial Examples Defences, Combinations and Robustness Scores}, booktitle = {IWSPA@CODASPY 2022: Proceedings of the 2022 {ACM} on International Workshop on Security and Privacy Analytics, Baltimore, MD, USA, April 27, 2022}, pages = {86--92}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3510548.3519370}, doi = {10.1145/3510548.3519370}, timestamp = {Tue, 03 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/JankovicM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/Jones22, author = {Daniel N. Jones}, editor = {Andrew H. Sung and Rakesh M. Verma and Roland H. C. Yap}, title = {Shadows Behind the Keyboard: Dark Personalities and Deception in Cyberattacks}, booktitle = {IWSPA@CODASPY 2022: Proceedings of the 2022 {ACM} on International Workshop on Security and Privacy Analytics, Baltimore, MD, USA, April 27, 2022}, pages = {66--67}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3510548.3519379}, doi = {10.1145/3510548.3519379}, timestamp = {Tue, 03 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/Jones22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/JooshPJ22, author = {Sander Joos and Tim Van hamme and Davy Preuveneers and Wouter Joosen}, editor = {Andrew H. Sung and Rakesh M. Verma and Roland H. C. Yap}, title = {Adversarial Robustness is Not Enough: Practical Limitations for Securing Facial Authentication}, booktitle = {IWSPA@CODASPY 2022: Proceedings of the 2022 {ACM} on International Workshop on Security and Privacy Analytics, Baltimore, MD, USA, April 27, 2022}, pages = {2--12}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3510548.3519369}, doi = {10.1145/3510548.3519369}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/JooshPJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/KotalPCJ22, author = {Anantaa Kotal and Aritran Piplai and Sai Sree Laya Chukkapalli and Anupam Joshi}, editor = {Andrew H. Sung and Rakesh M. Verma and Roland H. C. Yap}, title = {PriveTAB: Secure and Privacy-Preserving sharing of Tabular Data}, booktitle = {IWSPA@CODASPY 2022: Proceedings of the 2022 {ACM} on International Workshop on Security and Privacy Analytics, Baltimore, MD, USA, April 27, 2022}, pages = {35--45}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3510548.3519377}, doi = {10.1145/3510548.3519377}, timestamp = {Tue, 03 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/KotalPCJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/MadaniAG22, author = {Omid Madani and Sai Ankith Averineni and Shashidhar Gandham}, editor = {Andrew H. Sung and Rakesh M. Verma and Roland H. C. Yap}, title = {A Dataset of Networks of Computing Hosts}, booktitle = {IWSPA@CODASPY 2022: Proceedings of the 2022 {ACM} on International Workshop on Security and Privacy Analytics, Baltimore, MD, USA, April 27, 2022}, pages = {100--104}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3510548.3519368}, doi = {10.1145/3510548.3519368}, timestamp = {Tue, 03 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/MadaniAG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/Nair22, author = {Suku Nair}, editor = {Andrew H. Sung and Rakesh M. Verma and Roland H. C. Yap}, title = {{SDP} Based Zero-Trust Architectures}, booktitle = {IWSPA@CODASPY 2022: Proceedings of the 2022 {ACM} on International Workshop on Security and Privacy Analytics, Baltimore, MD, USA, April 27, 2022}, pages = {1}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3510548.3519390}, doi = {10.1145/3510548.3519390}, timestamp = {Tue, 03 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/Nair22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/NudingM22, author = {Florian Nuding and Rudolf Mayer}, editor = {Andrew H. Sung and Rakesh M. Verma and Roland H. C. Yap}, title = {Data Poisoning in Sequential and Parallel Federated Learning}, booktitle = {IWSPA@CODASPY 2022: Proceedings of the 2022 {ACM} on International Workshop on Security and Privacy Analytics, Baltimore, MD, USA, April 27, 2022}, pages = {24--34}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3510548.3519372}, doi = {10.1145/3510548.3519372}, timestamp = {Tue, 03 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/NudingM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/SangTY022, author = {Tran Van Sang and Tran Phuong Thao and Rie Shigetomi Yamaguchi and Toshiyuki Nakata}, editor = {Andrew H. Sung and Rakesh M. Verma and Roland H. C. Yap}, title = {Enhancing Boundary Attack in Adversarial Image Using Square Random Constraint}, booktitle = {IWSPA@CODASPY 2022: Proceedings of the 2022 {ACM} on International Workshop on Security and Privacy Analytics, Baltimore, MD, USA, April 27, 2022}, pages = {13--23}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3510548.3519373}, doi = {10.1145/3510548.3519373}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/SangTY022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/Sehwani22, author = {Nitesh Suresh Sehwani}, editor = {Andrew H. Sung and Rakesh M. Verma and Roland H. C. Yap}, title = {No Features Needed: Using {BPE} Sequence Embeddings for Web Log Anomaly Detection}, booktitle = {IWSPA@CODASPY 2022: Proceedings of the 2022 {ACM} on International Workshop on Security and Privacy Analytics, Baltimore, MD, USA, April 27, 2022}, pages = {78--85}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3510548.3519375}, doi = {10.1145/3510548.3519375}, timestamp = {Tue, 03 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/Sehwani22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/TekgulA22, author = {Buse Gul Atli Tekgul and N. Asokan}, editor = {Andrew H. Sung and Rakesh M. Verma and Roland H. C. Yap}, title = {On the Effectiveness of Dataset Watermarking}, booktitle = {IWSPA@CODASPY 2022: Proceedings of the 2022 {ACM} on International Workshop on Security and Privacy Analytics, Baltimore, MD, USA, April 27, 2022}, pages = {93--99}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3510548.3519376}, doi = {10.1145/3510548.3519376}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/TekgulA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/WasswaS22, author = {Hassan Wasswa and Abdul Serwadda}, editor = {Andrew H. Sung and Rakesh M. Verma and Roland H. C. Yap}, title = {The Proof is in the Glare: On the Privacy Risk Posed by Eyeglasses in Video Calls}, booktitle = {IWSPA@CODASPY 2022: Proceedings of the 2022 {ACM} on International Workshop on Security and Privacy Analytics, Baltimore, MD, USA, April 27, 2022}, pages = {46--54}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3510548.3519378}, doi = {10.1145/3510548.3519378}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/WasswaS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/codaspy/2022iwspa, editor = {Andrew H. Sung and Rakesh M. Verma and Roland H. C. Yap}, title = {IWSPA@CODASPY 2022: Proceedings of the 2022 {ACM} on International Workshop on Security and Privacy Analytics, Baltimore, MD, USA, April 27, 2022}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3510548}, doi = {10.1145/3510548}, isbn = {978-1-4503-9230-3}, timestamp = {Tue, 03 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/2022iwspa.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.