Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 60 matches
- 2023
- Yu Zheng, Qizhi Zhang, Sherman S. M. Chow, Yuxiang Peng, Sijun Tan, Lichun Li, Shan Yin:
Secure Softmax/Sigmoid for Machine-learning Computation. ACSAC 2023: 463-476 - Jianli Bai, Xiangfu Song, Xiaowu Zhang, Qifan Wang, Shujie Cui, Ee-Chien Chang, Giovanni Russello:
Mostree: Malicious Secure Private Decision Tree Evaluation with Sublinear Communication. ACSAC 2023: 799-813 - Samira Briongos, Ghassan Karame, Claudio Soriente, Annika Wilde:
No Forking Way: Detecting Cloning Attacks on Intel SGX Applications. ACSAC 2023: 744-758 - Alberto Carboneri, Mohammad Ghasemisharif, Soroush Karami, Jason Polakis:
When Push Comes to Shove: Empirical Analysis of Web Push Implementations in the Wild. ACSAC 2023: 44-55 - Jorge Castillo, Phillip Rieger, Hossein Fereidooni, Qian Chen, Ahmad-Reza Sadeghi:
FLEDGE: Ledger-based Federated Learning Resilient to Inference and Backdoor Attacks. ACSAC 2023: 647-661 - Joann Qiongna Chen, Tianhao Wang, Zhikun Zhang, Yang Zhang, Somesh Jha, Zhou Li:
Differentially Private Resource Allocation. ACSAC 2023: 772-786 - Yufan Chen, Arjun Arunasalam, Z. Berkay Celik:
Can Large Language Models Provide Security & Privacy Advice? Measuring the Ability of LLMs to Refute Misconceptions. ACSAC 2023: 366-378 - Andrew Chi, Blake Anderson, Michael K. Reiter:
Prioritizing Remediation of Enterprise Hosts by Malware Execution Risk. ACSAC 2023: 550-564 - Andrew Chi, Brandon Enright, David A. McGrew:
Detecting Weak Keys in Manufacturing Certificates: A Case Study. ACSAC 2023: 759-771 - Bo Cui, Tianyu Mei:
ABFL: A Blockchain-enabled Robust Framework for Secure and Trustworthy Federated Learning. ACSAC 2023: 636-646 - Zeyu Deng, Long Huang, Chen Wang:
Enhanced In-air Signature Verification via Hand Skeleton Tracking to Defeat Robot-level Replays. ACSAC 2023: 451-462 - Ayesha S. Dina, A. B. Siddique, D. Manivannan:
FS3: Few-Shot and Self-Supervised Framework for Efficient Intrusion Detection in Internet of Things Networks. ACSAC 2023: 138-149 - Michael Eckel, Dominik Roy George, Björn Grohmann, Christoph Krauß:
Remote Attestation with Constrained Disclosure. ACSAC 2023: 718-731 - Fabian Franzen, Andreas Chris Wilhelmer, Jens Grossklags:
RandCompile: Removing Forensic Gadgets from the Linux Kernel to Combat its Analysis. ACSAC 2023: 677-690 - Tom Ganz, Erik Imgrund, Martin Härterich, Konrad Rieck:
PAVUDI: Patch-based Vulnerability Discovery using Machine Learning. ACSAC 2023: 704-717 - Elia Geretto, Julius Hohnerlein, Cristiano Giuffrida, Herbert Bos, Erik van der Kouwe, Klaus von Gleissenthall:
Triereme: Speeding up hybrid fuzzing through efficient query scheduling. ACSAC 2023: 56-70 - Tommaso Innocenti, Matteo Golinelli, Kaan Onarlioglu, Seyed Ali Mirheidari, Bruno Crispo, Engin Kirda:
OAuth 2.0 Redirect URI Validation Falls Short, Literally. ACSAC 2023: 256-267 - Berkay Kaplan, Israel J. Lopez-Toledo, Carl A. Gunter, Jingyu Qian:
A Tagging Solution to Discover IoT Devices in Apartments. ACSAC 2023: 205-215 - Dustin Kern, Christoph Krauß, Matthias Hollick:
Detection of Anomalies in Electric Vehicle Charging Sessions. ACSAC 2023: 298-309 - Takashi Koide, Naoki Fukushi, Hiroki Nakano, Daiki Chiba:
PhishReplicant: A Language Model-based Approach to Detect Generated Squatting Domain Names. ACSAC 2023: 1-13 - Platon Kotzias, Kevin A. Roundy, Michalis Pachilakis, Iskander Sánchez-Rola, Leyla Bilge:
Scamdog Millionaire: Detecting E-commerce Scams in the Wild. ACSAC 2023: 29-43 - Piergiorgio Ladisa, Serena Elisa Ponta, Nicola Ronzoni, Matias Martinez, Olivier Barais:
On the Feasibility of Cross-Language Detection of Malicious Packages in npm and PyPI. ACSAC 2023: 71-82 - Sijia Li, Gaopeng Gou, Chang Liu, Gang Xiong, Zhen Li, Junchao Xiao, Xinyu Xing:
TGC: Transaction Graph Contrast Network for Ethereum Phishing Scam Detection. ACSAC 2023: 352-365 - Fabing Li, Xiang Li, Mingyu Gao:
Secure MLaaS with Temper: Trusted and Efficient Model Partitioning and Enclave Reuse. ACSAC 2023: 621-635 - Xinyu Liu, Ze Jin, Jiaxi Liu, Wei Liu, Xiaoxi Wang, Qixu Liu:
ANDetect: A Third-party Ad Network Libraries Detection Framework for Android Applications. ACSAC 2023: 98-112 - Zihao Liu, Yan Zhang, Chenglin Miao:
Protecting Your Voice from Speech Synthesis Attacks. ACSAC 2023: 394-408 - Lukas Maar, Martin Schwarzl, Fabian Rauscher, Daniel Gruss, Stefan Mangard:
DOPE: DOmain Protection Enforcement with PKS. ACSAC 2023: 662-676 - Farabi Mahmud, Sungkeun Kim, Harpreet Singh Chawla, Eun Jung Kim, Chia-Che Tsai, Abdullah Muzahid:
Attack of the Knights: Non Uniform Cache Side Channel Attack. ACSAC 2023: 691-703 - Jie Meng, Zeyu Yang, Zhenyong Zhang, Yangyang Geng, Ruilong Deng, Peng Cheng, Jiming Chen, Jianying Zhou:
SePanner: Analyzing Semantics of Controller Variables in Industrial Control Systems based on Network Traffic. ACSAC 2023: 310-323 - Ariana Mirian, Grant Ho, Stefan Savage, Geoffrey M. Voelker:
An Empirical Analysis of Enterprise-Wide Mandatory Password Updates. ACSAC 2023: 150-162
skipping 30 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-13 14:44 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint