🔍 论文列表简介
本页汇总了使用 PaperHunter 工具在 2010–2025 年间所有 CCF 会议(A/B/C)论文 中,标题中包含关键词 “attack” 或 “vulnerability” 的相关研究成果。
这些论文包括 AI、系统、网络、IoT 等多个方向的漏洞分析,利用与防御论文,旨在帮助研究者快速了解近十余年来在攻击与漏洞相关领域的重要工作与发展趋势。
本列表将持续更新,欢迎补充与纠正。
- [FAST 2025] AtomicDisk: A Secure Virtual Disk for TEEs against Eviction Attacks.
- [DAC 2012] Attackboard: a novel dependency-aware traffic generator for exploring NoC design space.
- [DAC 2013] Role of power grid in side channel attack and power-grid-aware secure design.
- [DAC 2013] High-performance hardware monitors to protect network processors from data plane attacks.
- [DAC 2013] Compiler-based side channel vulnerability analysis and optimized countermeasures application.
- [DAC 2014] Aspect-oriented Modeling of Attacks in Automotive Cyber-Physical Systems.
- [DAC 2014] Detecting Reliability Attacks during Split Fabrication using Test-only BEOL Stack.
- [DAC 2015] DERA: yet another differential fault attack on cryptographic devices based on error rate analysis.
- [DAC 2015] Information leakage chaff: feeding red herrings to side channel attackers.
- [DAC 2015] Self-correcting STTRAM under magnetic field attacks.
- [DAC 2015] Impact assessment of net metering on smart home cyberattack detection.
- [DAC 2015] Leveraging on-chip voltage regulators as a countermeasure against side-channel attacks.
- [DAC 2015] EM attack sensor: concept, circuit, and design-automation methodology.
- [DAC 2016] A high-resolution side-channel attack on last-level cache.
- [DAC 2016] Physical unclonable functions-based linear encryption against code reuse attacks.
- [DAC 2016] AVFSM: a framework for identifying and mitigating vulnerabilities in FSMs.
- [DAC 2017] RIC: Relaxed Inclusion Caches for Mitigating LLC Side-Channel Attacks.
- [DAC 2017] On Mitigation of Side-Channel Attacks in 3D ICs: Decorrelating Thermal Patterns from Power and Activity.
- [DAC 2017] Cross-level Monte Carlo Framework for System Vulnerability Evaluation against Fault Attack.
- [DAC 2017] Estimation of Safe Sensor Measurements of Autonomous System Under Attack.
- [DAC 2018] It’s hammer time: how to attack (rowhammer-based) DRAM-PUFs.
- [DAC 2018] A collaborative defense against wear out attacks in non-volatile processors.
- [DAC 2018] Cache side-channel attacks and time-predictability in high-performance critical real-time systems.
- [DAC 2018] GPU obfuscation: attack and defense strategies.
- [DAC 2018] A security vulnerability analysis of SoCFPGA architectures.
- [DAC 2019] Protecting RISC-V against Side-Channel Attacks.
- [DAC 2019] Lightweight Mitigation of Hardware Trojan Attacks in NoC-based Manycore Computing.
- [DAC 2019] A Novel Covert Channel Attack Using Memory Encryption Engine Cache.
- [DAC 2019] SpectreGuard: An Efficient Data-centric Defense Mechanism against Spectre Attacks.
- [DAC 2019] PAPP: Prefetcher-Aware Prime and Probe Side-channel Attack.
- [DAC 2019] HardScope: Hardening Embedded Systems Against Data-Oriented Attacks.
- [DAC 2019] X-DeepSCA: Cross-Device Deep Learning Side Channel Attack.
- [DAC 2019] Attacking Split Manufacturing from a Deep Learning Perspective.
- [DAC 2019] ALAFA: Automatic Leakage Assessment for Fault Attack Countermeasures.
- [DAC 2019] ChipSecure: A Reconfigurable Analog eFlash-Based PUF with Machine Learning Attack Resiliency in 55nm CMOS.
- [DAC 2019] Adversarial Attack against Modeling Attack on PUFs.
- [DAC 2019] RFTC: Runtime Frequency Tuning Countermeasure Using FPGA Dynamic Reconfiguration to Mitigate Power Analysis Attacks.
- [DAC 2019] Adversarial Attack on Microarchitectural Events based Malware Detectors.
- [DAC 2019] Fault Sneaking Attack: a Stealthy Framework for Misleading Deep Neural Networks.
- [DAC 2020] Neural Network-Based Side Channel Attacks and Countermeasures.
- [DAC 2020] A Formal Approach for Detecting Vulnerabilities to Transient Execution Attacks in Out-of-Order Processors.
- [DAC 2020] Imperceptible Misclassification Attack on Deep Learning Accelerator by Glitch Injection.
- [DAC 2020] On Countermeasures Against the Thermal Covert Channel Attacks Targeting Many-core Systems.
- [DAC 2020] TrojDRL: Evaluation of Backdoor Attacks on Deep Reinforcement Learning.
- [DAC 2020] Defending Bit-Flip Attack through DNN Weight Reconstruction.
- [DAC 2020] A Novel GPU Overdrive Fault Attack.
- [DAC 2020] StatSAT: A Boolean Satisfiability based Attack on Logic-Locked Probabilistic Circuits.
- [DAC 2020] Deep Learning Multi-Channel Fusion Attack Against Side-Channel Protected Hardware.
- [DAC 2021] Quantifying Rowhammer Vulnerability for DRAM Security.
- [DAC 2021] SACReD: An Attack Framework on SAC Resistant Delay-PUFs leveraging Bias and Reliability Factors.
- [DAC 2021] Fortifying RTL Locking Against Oracle-Less (Untrusted Foundry) and Oracle-Guided Attacks.
- [DAC 2021] DeepStrike: Remotely-Guided Fault Injection Attacks on DNN Accelerator in Cloud-FPGA.
- [DAC 2021] 3D-Adv: Black-Box Adversarial Attacks against Deep Learning Models through 3D Sensors.
- [DAC 2021] PRID: Model Inversion Privacy Attacks in Hyperdimensional Learning Systems.
- [DAC 2021] Leveraging Noise and Aggressive Quantization of In-Memory Computing for Robust DNN Hardware Against Adversarial Input and Weight Attacks.
- [DAC 2021] On the Intrinsic Robustness of NVM Crossbars Against Adversarial Attacks.
- [DAC 2021] FALCON Down: Breaking FALCON Post-Quantum Signature Scheme through Side-Channel Attacks.
- [DAC 2021] New Predictor-Based Attacks in Processors.
- [DAC 2021] Cross-Device Profiled Side-Channel Attacks using Meta-Transfer Learning.
- [DAC 2021] Load-Step: A Precise TrustZone Execution Control Framework for Exploring New Side-channel Attacks Like Flush+Evict.
- [DAC 2021] Late Breaking Results: Physical Adversarial Attacks of Diffractive Deep Neural Networks.
- [DAC 2022] LOCK&ROLL: deep-learning power side-channel attack mitigation using emerging reconfigurable devices and logic locking.
- [DAC 2022] Apple vs. EMA: electromagnetic side channel attacks on apple CoreCrypto.
- [DAC 2022] Efficiency attacks on spiking neural networks.
- [DAC 2022] FaSe: fast selective flushing to mitigate contention-based cache timing attacks.
- [DAC 2022] Conditional address propagation: an efficient defense mechanism against transient execution attacks.
- [DAC 2022] Timed speculative attacks exploiting store-to-load forwarding bypassing cache-based countermeasures.
- [DAC 2022] DARPT: defense against remote physical attack based on TDC in multi-tenant scenario.
- [DAC 2022] Terminator on SkyNet: a practical DVFS attack on DNN hardware IP for UAV object detection.
- [DAC 2022] AL-PA: cross-device profiled side-channel attack using adversarial learning.
- [DAC 2022] CLIMBER: defending phase change memory against inconsistent write attacks.
- [DAC 2022] Adaptive window-based sensor attack detection for cyber-physical systems.
- [DAC 2022] Secure by construction: addressing security vulnerabilities introduced during high-level synthesis: invited.
- [DAC 2022] Trusting the trust anchor: towards detecting cross-layer vulnerabilities with hardware fuzzing.
- [DAC 2023] HammerDodger: A Lightweight Defense Framework against RowHammer Attack on DNNs.
- [DAC 2023] AVX Timing Side-Channel Attacks against Address Space Layout Randomization.
- [DAC 2023] ChaosINTC: A Secure Interrupt Management Mechanism against Interrupt-based Attacks on TEE.
- [DAC 2023] MES-Attacks: Software-Controlled Covert Channels based on Mutual Exclusion and Synchronization.
- [DAC 2023] HyperAttack: An Efficient Attack Framework for HyperDimensional Computing.
- [DAC 2023] SimLL: Similarity-Based Logic Locking Against Machine Learning Attacks.
- [DAC 2023] Smart Detection of Obfuscated Thermal Covert Channel Attacks in Many-core Processors.
- [DAC 2023] Discerning Limitations of GNN-based Attacks on Logic Locking.
- [DAC 2023] NNTesting: Neural Network Fault Attacks Detection Using Gradient-Based Test Vector Generation.
- [DAC 2023] SCAGuard: Detection and Classification of Cache Side-Channel Attacks via Attack Behavior Modeling and Similarity Comparison.
- [DAC 2023] Processor Vulnerability Discovery.
- [DAC 2023] Power Side-Channel Vulnerability Assessment of Lightweight Cryptographic Scheme, XOODYAK.
- [DAC 2023] ALMOST: Adversarial Learning to Mitigate Oracle-less ML Attacks via Synthesis Tuning.
- [DAC 2023] Fast Adversarial Training with Dynamic Batch-level Attack Control.
- [DAC 2023] Return-to-Non-Secure Vulnerabilities on ARM Cortex-M TrustZone: Attack and Defense.
- [DAC 2023] Leaky MDU: ARM Memory Disambiguation Unit Uncovered and Vulnerabilities Exposed.
- [DAC 2024] SecPaging: Secure Enclave Paging with Hardware-Enforced Protection against Controlled-Channel Attacks.
- [DAC 2024] Conjuring: Leaking Control Flow via Speculative Fetch Attacks.
- [DAC 2024] ThermalScope: A Practical Interrupt Side Channel Attack Based on Thermal Event Interrupts.
- [DAC 2024] DNN-Defender: A Victim-Focused In-DRAM Defense Mechanism for Taming Adversarial Weight Attack on DNNs.
- [DAC 2024] EOS: An Energy-Oriented Attack Framework for Spiking Neural Networks.
- [DAC 2024] Laser Shield: a Physical Defense with Polarizer against Laser Attacks on Autonomous Driving Systems.
- [DAC 2024] Fake Node-Based Perception Poisoning Attacks against Federated Object Detection Learning in Mobile Computing Networks.
- [DAC 2024] CDS: An Anti-Aging Calibratable Digital Sensor for Detecting Multiple Types of Fault Injection Attacks.
- [DAC 2024] Plug Your Volt: Protecting Intel Processors against Dynamic Voltage Frequency Scaling based Fault Attacks.
- [DAC 2024] Lost and Found in Speculation: Hybrid Speculative Vulnerability Detection.
- [DAC 2024] Uncovering Software-Based Power Side-Channel Attacks on Apple M1/M2 Systems.
- [HPCA 2013] Architecture support for guest-transparent VM protection from untrusted hypervisor and physical attacks.
- [HPCA 2013] SCRAP: Architecture for signature-based protection from Code Reuse Attacks.
- [HPCA 2014] A Non-Inclusive Memory Permissions architecture for protection against cross-layer attacks.
- [HPCA 2016] A complete key recovery timing attack on a GPU.
- [HPCA 2016] CATalyst: Defeating last-level cache side channel attacks in cloud computing.
- [HPCA 2017] Vulnerabilities in MLC NAND Flash Memory Programming: Experimental Analysis, Exploits, and Mitigation Techniques.
- [HPCA 2017] Secure Dynamic Memory Scheduling Against Timing Channel Attacks.
- [HPCA 2017] Cold Boot Attacks are Still Hot: Security Analysis of Memory Scramblers in Modern Processors.
- [HPCA 2017] Camouflage: Memory Traffic Shaping to Mitigate Timing Attacks.
- [HPCA 2018] RCoal: Mitigating GPU Timing Attack via Subwarp-Based Randomized Coalescing Techniques.
- [HPCA 2019] Conditional Speculation: An Effective Approach to Safeguard Out-of-Order Execution Against Spectre Attacks.
- [HPCA 2019] POWERT Channels: A Novel Class of Covert CommunicationExploiting Power Management Vulnerabilities.
- [HPCA 2020] IRONHIDE: A Secure Multicore that Efficiently Mitigates Microarchitecture State Attacks for Interactive Applications.
- [HPCA 2020] A New Side-Channel Vulnerability on Modern Computers by Exploiting Electromagnetic Emanations from the Power Management Unit.
- [HPCA 2021] New Models for Understanding and Reasoning about Speculative Execution Attacks.
- [HPCA 2021] Heat Behind the Meter: A Hidden Threat of Thermal Attacks in Edge Colocation Data Centers.
- [HPCA 2021] Trident: A Hybrid Correlation-Collision GPU Cache Timing Attack for AES Key Recovery.
- [HPCA 2022] Leaky Frontends: Security Vulnerabilities in Processor Frontends.
- [HPCA 2022] DPrime+DAbort: A High-Precision and Timer-Free Directory-Based Side-Channel Attack in Non-Inclusive Cache Hierarchies using Intel TSX.
- [HPCA 2023] AutoCAT: Reinforcement Learning for Automated Exploration of Cache-Timing Attacks.
- [HPCA 2023] AVGI: Microarchitecture-Driven, Fast and Accurate Vulnerability Assessment.
- [HPCA 2024] Exploitation of Security Vulnerability on Retirement.
- [HPCA 2024] PREFETCHX: Cross-Core Cache-Agnostic Prefetcher-based Side-Channel Attacks.
- [HPCA 2024] Modeling, Derivation, and Automated Analysis of Branch Predictor Security Vulnerabilities.
- [HPCA 2025] BrokenSleep: Remote Power Timing Attack Exploiting Processor Idle States.
- [HPCA 2025] DAPPER: A Performance-Attack-Resilient Tracker for RowHammer Defense.
- [MICRO 2010] AVF Stressmark: Towards an Automated Methodology for Bounding the Worst-Case Vulnerability to Soft Errors.
- [MICRO 2012] The Performance Vulnerability of Architectural and Non-architectural Arrays to Permanent Faults.
- [MICRO 2014] A Practical Methodology for Measuring the Side-Channel Signal Available to the Attacker for Instruction-Level Events.
- [MICRO 2014] Calculating Architectural Vulnerability Factors for Spatial Multi-Bit Transient Faults.
- [MICRO 2016] ReplayConfusion: Detecting cache-based covert channel attacks using record and replay.
- [MICRO 2016] Jump over ASLR: Attacking branch predictors to bypass ASLR.
- [MICRO 2017] How secure is your cache against side-channel attacks?
- [MICRO 2018] CEASER: Mitigating Conflict-Based Cache Attacks via Encrypted-Address and Remapping.
- [MICRO 2018] DAWG: A Defense Against Cache Timing Attacks in Speculative Execution Processors.
- [MICRO 2019] NDA: Preventing Speculative Execution Attacks at Their Source.
- [MICRO 2020] PerSpectron: Detecting Invariant Footprints of Microarchitectural Attacks with Perceptron.
- [MICRO 2021] A Deeper Look into RowHammer’s Sensitivities: Experimental Analysis of Real DRAM Chipsand Implications on Future Attacks and Defenses.
- [MICRO 2024] Defending Against EMI Attacks on Just-In-Time Checkpoint for Resilient Intermittent Systems.
- [MICRO 2024] DelayAVF: Calculating Architectural Vulnerability Factors for Delay Faults.
- [MICRO 2024] Ghost Arbitration: Mitigating Interconnect Side-Channel Timing Attacks in GPU.
- [SC 2012] Classifying soft error vulnerabilities in extreme-scale scientific applications using a binary instrumentation tool.
- [SC 2014] Quantitatively Modeling Application Resilience with the Data Vulnerability Factor.
- [SC 2018] Attacking the opioid epidemic: determining the epistatic and pleiotropic genetic architectures for chronic pain and opioid addiction.
- [SC 2020] Runtime-guided ECC protection using online estimation of memory vulnerability.
- [SC 2021] PEPPA-X: finding program test inputs to bound silent data corruption vulnerability in HPC applications.
- [ASPLOS 2013] Iago attacks: why the system call API is a bad untrusted RPC interface.
- [ASPLOS 2014] Finding trojan message vulnerabilities in distributed systems.
- [ASPLOS 2015] Protecting Data on Smartphones and Tablets from Memory Attacks.
- [ASPLOS 2016] True IOMMU Protection from DMA Attacks: When Copy is Faster than Zero Copy.
- [ASPLOS 2016] ANVIL: Software-Based Protection Against Next-Generation Rowhammer Attacks.
- [ASPLOS 2018] FirmUp: Precise Static Detection of Common Vulnerabilities in Firmware.
- [ASPLOS 2018] BranchScope: A New Side-Channel Attack on Directional Branch Predictor.
- [ASPLOS 2019] Morpheus: A Vulnerability-Tolerant Secure Architecture Based on Ensembles of Moving Target Defenses with Churn.
- [ASPLOS 2019] ProbeGuard: Mitigating Probing Attacks Through Reactive Program Transformations.
- [ASPLOS 2019] Protecting Page Tables from RowHammer Attacks using Monotonic Pointers in DRAM True-Cells.
- [ASPLOS 2020] DNNGuard: An Elastic Heterogeneous DNN Accelerator Architecture against Adversarial Attacks.
- [ASPLOS 2020] Game of Threads: Enabling Asynchronous Poisoning Attacks.
- [ASPLOS 2020] Hurdle: Securing Jump Instructions Against Code Reuse Attacks.
- [ASPLOS 2020] A Benchmark Suite for Evaluating Caches’ Vulnerability to Timing Attacks.
- [ASPLOS 2020] COIN Attacks: On Insecurity of Enclave Untrusted Interfaces in SGX.
- [ASPLOS 2020] Klotski: Efficient Obfuscated Execution against Controlled-Channel Attacks.
- [ASPLOS 2021] Speculative interference attacks: breaking invisible speculation schemes.
- [ASPLOS 2021] Jamais vu: thwarting microarchitectural replay attacks.
- [ASPLOS 2021] Streamline: a fast, flushless cache covert-channel attack by enabling asynchronous collusion.
- [ASPLOS 2022] RSSD: defend against ransomware with hardware-isolated network-storage codesign and post-attack analysis.
- [ASPLOS 2023] Decker: Attack Surface Reduction via On-Demand Code Mapping.
- [ASPLOS 2023] FITS: Inferring Intermediate Taint Sources for Effective Vulnerability Analysis of IoT Device Firmware.
- [ASPLOS 2024] Everywhere All at Once: Co-Location Attacks on Public Cloud FaaS.
- [ASPLOS 2024] Last-Level Cache Side-Channel Attacks Are Feasible in the Modern Public Cloud.
- [ASPLOS 2024] Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor.
- [ASPLOS 2024] Pythia: Compiler-Guided Defense Against Non-Control Data Attacks.
- [ASPLOS 2024] TAROT: A CXL SmartNIC-Based Defense Against Multi-bit Errors by Row-Hammer Attacks.
- [ASPLOS 2024] Sharing is leaking: blocking transient-execution attacks with core-gapped confidential VMs.
- [ASPLOS 2025] Marionette: A RowHammer Attack via Row Coupling.
- [ASPLOS 2025] Controlled Preemption: Amplifying Side-Channel Attacks from Userspace.
- [ASPLOS 2025] SMaCk: Efficient Instruction Cache Attacks via Self-Modifying Code Conflicts.
- [ASPLOS 2025] Tackling ML-based Dynamic Mispredictions using Statically Computed Invariants for Attack Surface Reduction.
- [ISCA 2010] Using hardware vulnerability factors to enhance AVF analysis.
- [ISCA 2012] Branch regulation: Low-overhead protection from code reuse attacks.
- [ISCA 2012] Side-channel vulnerability factor: A metric for measuring information leakage.
- [ISCA 2012] TimeWarp: Rethinking timekeeping and performance monitoring mechanisms to mitigate side-channel attacks.
- [ISCA 2012] A first-order mechanistic model for architectural vulnerability factor.
- [ISCA 2016] Power Attack Defense: Securing Battery-Backed Data Centers.
- [ISCA 2017] Secure Hierarchy-Aware Cache Replacement Policy (SHARP): Defending Against Cache-Based Side Channel Attacks.
- [ISCA 2019] MicroScope: enabling microarchitectural replay attacks.
- [ISCA 2019] SecDir: a secure directory to defeat directory side-channel attacks.
- [ISCA 2019] New attacks and defense for encrypted-address cache.
- [ISCA 2020] MuonTrap: Preventing Cross-Domain Spectre-Like Attacks by Capturing Speculative State.
- [ISCA 2021] INTROSPECTRE: A Pre-Silicon Framework for Discovery and Analysis of Transient Execution Vulnerabilities.
- [ISCA 2021] Demystifying the System Vulnerability Stack: Transient Fault Effects Across the Layers.
- [ISCA 2021] ZeRØ: Zero-Overhead Resilient Operation Under Pointer Integrity Attacks.
- [ISCA 2022] There’s always a bigger fish: a clarifying analysis of a machine-learning-assisted side-channel attack.
- [ISCA 2022] PACMAN: attacking ARM pointer authentication with speculative execution.
- [ISCA 2023] TEESec: Pre-Silicon Vulnerability Discovery for Trusted Execution Environments.
- [ISCA 2023] Spy in the GPU-box: Covert and Side Channel Attacks on Multi-GPU Systems.
- [ISCA 2025] When Mitigations Backfire: Timing Channel Attacks and Defense for PRAC-Based RowHammer Mitigations.
- [ISCA 2025] SpecASan: Mitigating Transient Execution Attacks Using Speculative Address Sanitization.
- [USENIX 2012] Tolerating Overload Attacks Against Packet Capturing Systems.
- [USENIX 2017] Mercury: Bandwidth-Effective Prevention of Rollback Attacks Against Community Repositories.
- [USENIX 2018] AIQL: Enabling Efficient Attack Investigation from System Monitoring Data.
- [USENIX 2018] Throwhammer: Rowhammer Attacks over the Network and Defenses.
- [USENIX 2018] Varys: Protecting SGX Enclaves from Practical Side-Channel Attacks.
- [USENIX 2018] EPTI: Efficient Defence against Meltdown Attack for Unpatched VMs.
- [USENIX 2019] Detecting Asymmetric Application-layer Denial-of-Service Attacks In-Flight with Finelame.
- [USENIX 2021] ICARUS: Attacking low Earth orbit satellite networks.
- [USENIX 2022] SoftTRR: Protect Page Tables against Rowhammer Attacks using Software-only Target Row Refresh.
- [USENIX 2025] MemoryTrap: Booby Trapping Memory to Counter Memory Disclosure Attacks with Hardware Support.
- [EUROSYS 2021] Mitigating vulnerability windows with hypervisor transplant.
- [EUROSYS 2021] Characterizing, exploiting, and detecting DMA code injection vulnerabilities in the presence of an IOMMU.
- [EUROSYS 2021] REBOUND: defending distributed systems against attacks with bounded-time recovery.
- [EUROSYS 2022] Performance evolution of mitigating transient execution attacks.
- [CLOUD 2017] Mitigating traffic-based side channel attacks in bandwidth-efficient cloud storage.
- [SPAA 2013] IRIS: a robust information system against insider dos-attacks.
- [SPAA 2017] Brief Announcement: Efficient Best Response Computation for Strategic Network Formation under Attack.
- [PODC 2012] Brief announcement: network-destabilizing attacks.
- [PODC 2014] How to withstand mobile virus attacks, revisited.
- [PODC 2021] Hedging Against Sore Loser Attacks in Cross-Chain Transactions.
- [FPGA 2013] Side-channel attacks on the bitstream encryption mechanism of Altera Stratix II: facilitating black-box analysis using software reverse-engineering.
- [FPGA 2013] Sensing nanosecond-scale voltage attacks and natural transients in FPGAs.
- [FPGA 2014] Using high-level synthesis and formal analysis to predict and preempt attacks on industrial control systems.
- [FPGA 2014] A soft error vulnerability analysis framework for Xilinx FPGAs.
- [FPGA 2017] Cache Timing Attacks from The SoCFPGA Coherency Port (Abstract Only).
- [FPGA 2019] Fast Confidence Detection: One Hot Way to Detect Adversarial Attacks via Sensor Pattern Noise Fingerprinting.
- [FPGA 2020] Thermal and Voltage Side and Covert Channels and Attacks in Cloud FPGAs.
- [FPGA 2020] Closing Leaks: Routing Against Crosstalk Side-Channel Attacks.
- [FPGA 2022] Highly Scalable Runtime Countermeasure Against Microprobing Attacks on Die-to-Die Interconnections in System-in-Package.
- [FPGA 2024] ISO-TENANT: Rethinking FPGA Power Distribution Network (PDN): A Hardware Based Solution for Remote Power Side Channel Attacks in FPGA.
- [CGO 2016] Inference of peak density of indirect branches to detect ROP attacks.
- [CGO 2019] Smokestack: Thwarting DOP Attacks with Runtime Stack Layout Randomization.
- [DATE 2010] IVF: Characterizing the vulnerability of microprocessor structures to intermittent faults.
- [DATE 2010] Fault-based attack of RSA authentication.
- [DATE 2011] Enhancement of simple electro-magnetic attacks by pre-characterization in frequency domain and demodulation techniques.
- [DATE 2011] Multi-level attacks: An emerging security concern for cryptographic hardware.
- [DATE 2011] Arithmetic logic units with high error detection rates to counteract fault attacks.
- [DATE 2012] Application-specific power-efficient approach for reducing register file vulnerability.
- [DATE 2012] Analysis of instruction-level vulnerability to dynamic voltage and temperature variations.
- [DATE 2013] Comprehensive analysis of software countermeasures against fault attacks.
- [DATE 2013] An EDA-friendly protection scheme against side-channel attacks.
- [DATE 2013] A cost-effective selective TMR for heterogeneous coarse-grained reconfigurable architectures based on DFG-level vulnerability analysis.
- [DATE 2013] Capturing vulnerability variations for register files.
- [DATE 2014] Physical vulnerabilities of Physically Unclonable Functions.
- [DATE 2014] Embedded reconfigurable logic for ASIC design obfuscation against supply chain attacks.
- [DATE 2014] Hybrid side-channel/machine-learning attacks on PUFs: A new threat?
- [DATE 2014] PUF modeling attacks: An introduction and overview.
- [DATE 2014] Special session: How secure are PUFs really? On the reach and limits of recent PUF attacks.
- [DATE 2014] Protocol attacks on advanced PUF protocols and countermeasures.
- [DATE 2014] Attack-resilient sensor fusion.
- [DATE 2014] A multiple fault injection methodology based on cone partitioning towards RTL modeling of laser attacks.
- [DATE 2014] Key-recovery attacks on various RO PUF constructions via helper data manipulation.
- [DATE 2015] Efficient soft error vulnerability estimation of complex designs.
- [DATE 2015] Reliable information extraction for single trace attacks.
- [DATE 2015] Side-channel attacks from static power: when should we care?
- [DATE 2015] Fault-based attacks on the Bel-T block cipher family.
- [DATE 2015] Efficient attacks on robust ring oscillator PUF with enhanced challenge-response set.
- [DATE 2015] A novel modeling attack resistant PUF design based on non-linear voltage transfer characteristics.
- [DATE 2016] TOTAL: TRNG on-the-fly testing for attack detection using Lightweight hardware.
- [DATE 2016] On the development of a new countermeasure based on a laser attack RTL fault model.
- [DATE 2016] Emulation-based hierarchical fault-injection framework for coarse-to-fine vulnerability analysis of hardware-accelerated approximate algorithms.
- [DATE 2016] Software security: Vulnerabilities and countermeasures for two attacker models.
- [DATE 2017] Side-channel plaintext-recovery attacks on leakage-resilient encryption.
- [DATE 2017] Protect non-volatile memory from wear-out attack based on timing difference of row buffer hit/miss.
- [DATE 2018] Cyclic locking and memristor-based obfuscation against CycSAT and inside foundry attacks.
- [DATE 2018] Cost-efficient design for modeling attacks resistant PUFs.
- [DATE 2018] SAT-based bit-flipping attack on logic encryptions.
- [DATE 2018] Earthquake - A NoC-based optimized differential cache-collision attack for MPSoCs.
- [DATE 2018] Evaluating the impact of execution parameters on program vulnerability in GPU applications.
- [DATE 2018] An inside job: Remote power analysis attacks on FPGAs.
- [DATE 2018] SCADPA: Side-channel assisted differential-plaintext attack on bit permutation based ciphers.
- [DATE 2018] DFARPA: Differential fault attack resistant physical design automation.
- [DATE 2018] Ising-PUF: A machine learning attack resistant PUF featuring lattice like arrangement of Arbiter-PUFs.
- [DATE 2018] Securing conditional branches in the presence of fault attacks.
- [DATE 2019] Multi-Tenant FPGA-based Reconfigurable Systems: Attacks and Defenses.
- [DATE 2019] Mitigating Power Supply Glitch based Fault Attacks with Fast All-Digital Clock Modulation Circuit.
- [DATE 2019] Optically Interrogated Unique Object with Simulation Attack Prevention.
- [DATE 2019] PUFs Deep Attacks: Enhanced modeling attacks using deep learning techniques to break the security of double arbiter PUFs.
- [DATE 2019] Desieve the Attacker: Thwarting IP Theft in Sieve-Valve-based Biochips.
- [DATE 2019] Functional Analysis Attacks on Logic Locking.
- [DATE 2019] SigAttack: New High-level SAT-based Attack on Logic Encryptions.
- [DATE 2019] Processor Hardware Security Vulnerabilities and their Detection by Unique Program Execution Checking.
- [DATE 2019] Protecting RISC-V Processors against Physical Attacks.
- [DATE 2019] Real-time Detection and Localization of DoS Attacks in NoC based SoCs.
- [DATE 2019] A Container-based DoS Attack-Resilient Control Framework for Real-Time UAV Systems.
- [DATE 2019] Memory Trojan Attack on Neural Network Accelerators.
- [DATE 2019] When Capacitors Attack: Formal Method Driven Design and Detection of Charge-Domain Trojans.
- [DATE 2020] SOLOMON: An Automated Framework for Detecting Fault Attack Vulnerabilities in Hardware.
- [DATE 2020] A Particle Swarm Optimization Guided Approximate Key Search Attack on Logic Locking in The Absence of Scan Access.
- [DATE 2020] Effect of Aging on PUF Modeling Attacks based on Power Side-Channel Observations.
- [DATE 2020] On the Performance of Non-Profiled Differential Deep Learning Attacks against an AES Encryption Algorithm Protected using a Correlated Noise Generation based Hiding Countermeasure.
- [DATE 2020] GhostBusters: Mitigating Spectre Attacks on a DBT-Based Processor.
- [DATE 2020] Oracle-based Logic Locking Attacks: Protect the Oracle Not Only the Netlist.
- [DATE 2020] Are Cloud FPGAs Really Vulnerable to Power Analysis Attacks?
- [DATE 2020] A Novel TIGFET-based DFF Design for Improved Resilience to Power Side-Channel Attacks.
- [DATE 2020] Bitstream Modification Attack on SNOW 3G.
- [DATE 2020] Capturing and Obscuring Ping-Pong Patterns to Mitigate Continuous Attacks.
- [DATE 2020] Mitigating Cache-Based Side-Channel Attacks through Randomization: A Comprehensive System and Architecture Level Analysis.
- [DATE 2021] HOST: HLS Obfuscations against SMT ATtack.
- [DATE 2021] GLAIVE: Graph Learning Assisted Instruction Vulnerability Estimation.
- [DATE 2021] GRINCH: A Cache Attack against GIFT Lightweight Cipher.
- [DATE 2021] Feeding Three Birds With One Scone: A Generic Duplication Based Countermeasure To Fault Attacks.
- [DATE 2021] Side-channel attack on Rainbow post-quantum signature.
- [DATE 2021] Seclusive Cache Hierarchy for Mitigating Cross-Core Cache and Coherence Directory Attacks.
- [DATE 2021] Securing Deep Spiking Neural Networks against Adversarial Attacks through Inherent Structural Parameters.
- [DATE 2021] RADAR: Run-time Adversarial Weight Attack Detection and Accuracy Recovery.
- [DATE 2021] Making Obfuscated PUFs Secure Against Power Side-Channel Based Modeling Attacks.
- [DATE 2021] Stealthy Logic Misuse for Power Analysis Attacks in Multi-Tenant FPGAs.
- [DATE 2021] Enhanced Detection Range for EM Side-channel Attack Probes utilizing Co-planar Capacitive Asymmetry Sensing.
- [DATE 2021] Fa-SAT: Fault-aided SAT-based Attack on Compound Logic Locking Techniques.
- [DATE 2021] Sequential Logic Encryption Against Model Checking Attack.
- [DATE 2021] Real-Time Detection and Localization of Denial-of-Service Attacks in Heterogeneous Vehicular Networks.
- [DATE 2021] Remote and Stealthy Fault Attacks on Virtualized FPGAs.
- [DATE 2021] Remote Power Side-Channel Attacks on BNN Accelerators in FPGAs.
- [DATE 2021] Shared FPGAs and the Holy Grail: Protections against Side-Channel and Fault Attacks.
- [DATE 2021] PiPoMonitor: Mitigating Cross-core Cache Attacks Using the Auto-Cuckoo Filter.
- [DATE 2021] Towards Automated Detection of Higher-Order Memory Corruption Vulnerabilities in Embedded Devices.
- [DATE 2022] Estimating Vulnerability of All Model Parameters in DNN with a Small Number of Fault Injections.
- [DATE 2022] Attack Data Generation Framework for Autonomous Vehicle Sensors.
- [DATE 2022] PoisonHD: Poison Attack on Brain-Inspired Hyperdimensional Computing.
- [DATE 2022] Is Approximation Universally Defensive Against Adversarial Attacks in Deep Neural Networks?
- [DATE 2022] SCI-FI: Control Signal, Code, and Control Flow Integrity against Fault Injection Attacks.
- [DATE 2022] Learning to Mitigate Rowhammer Attacks.
- [DATE 2022] A Cross-Platform Cache Timing Attack Framework via Deep Learning.
- [DATE 2022] DIP Learning on CAS-Lock: Using Distinguishing Input Patterns for Attacking Logic Locking.
- [DATE 2022] Analysis of Power-Oriented Fault Injection Attacks on Spiking Neural Networks.
- [DATE 2022] FPGA-to-CPU Undervolting Attacks.
- [DATE 2022] JANUS-HD: Exploiting FSM Sequentiality and Synthesis Flexibility in Logic Obfuscation to Thwart SAT Attack While Offering Strong Corruption.
- [DATE 2022] TriLock: IC Protection with Tunable Corruptibility and Resilience to SAT and Removal Attacks.
- [DATE 2022] PREFENDER: A Prefetching Defender against Cache Side Channel Attacks as A Pretender.
- [DATE 2022] Stealthy Inference Attack on DNN via Cache-based Side-Channel Attacks.
- [DATE 2023] Warm-Boot Attack on Modern DRAMs.
- [DATE 2023] Attacking ReRAM-based Architectures using Repeated Writes.
- [DATE 2023] A Practical Remote Power Attack on Machine Learning Accelerators in Cloud FPGAs.
- [DATE 2023] Temperature Impact on Remote Power Side-Channel Attacks on Shared FPGAs.
- [DATE 2023] SoCFuzzer: SoC Vulnerability Detection using Cost Function enabled Fuzz Testing.
- [DATE 2023] SCFI: State Machine Control-Flow Hardening Against Fault Attacks.
- [DATE 2023] The First Concept and Real-world Deployment of a GPU-based Thermal Covert Channel: Attack and Countermeasures.
- [DATE 2023] Expanding In-Cone Obfuscated Tree for Anti SAT Attack.
- [DATE 2023] Cache Side-channel Attacks and Defenses of the Sliding Window Algorithm in TEEs.
- [DATE 2023] Comprehensive Analysis of Hyperdimensional Computing Against Gradient Based Attacks.
- [DATE 2023] HUnTer: Hardware Underneath Trigger for Exploiting SoC-level Vulnerabilities.
- [DATE 2023] Fault Model Analysis of DRAM under Electromagnetic Fault Injection Attack.
- [DATE 2023] Butterfly Effect Attack: Tiny and Seemingly Unrelated Perturbations for Object Detection.
- [DATE 2023] Non-Profiled Side-Channel Assisted Fault Attack: A Case Study on DOMREP.
- [DATE 2023] Spoiler-Alert: Detecting Spoiler Attacks Using a Cuckoo Filter.
- [DATE 2023] Adversarial Attack on Hyperdimensional Computing-based NLP Applications.
- [DATE 2024] Bitstream Fault Injection Attacks on CRYSTALS Kyber Implementations on FPGAs.
- [DATE 2024] Modeling Attack Tests and Security Enhancement of the Sub-Threshold Voltage Divider Array PUF.
- [DATE 2024] KRATT: QBF-Assisted Removal and Structural Analysis Attack Against Logic Locking.
- [DATE 2024] ROLDEF: RObust Layered DEFense for Intrusion Detection Against Adversarial Attacks.
- [DATE 2024] DRAM-Locker: A General-Purpose DRAM Protection Mechanism Against Adversarial DNN Weight Attacks.
- [DATE 2024] TroScan: Enhancing On-Chip Delivery Resilience to Physical Attack Through Frequency-Triggered Key Generation.
- [DATE 2024] IOMMU Deferred Invalidation Vulnerability: Exploit and Defense.
- [DATE 2024] Memory Scraping Attack on Xilinx FPGAs: Private Data Extraction from Terminated Processes.
- [DATE 2024] Enhancing Side-Channel Attacks Through X-Ray-Induced Leakage Amplification.
- [DATE 2024] REDCAP: Reconfigurable RFET-Based Circuits Against Power Side-Channel Attacks.
- [DATE 2024] Derailed: Arbitrarily Controlling DNN Outputs with Targeted Fault Injection Attacks.
- [DATE 2024] Detecting Backdoor Attacks in Black-Box Neural Networks through Hardware Performance Counters.
- [DATE 2024] $\mathcal{F}lush+early\mathcal{R}\text{ELOAD}$: Covert Channels Attack on Shared LLC Using MSHR Merging.
- [DATE 2025] REAP-NVM: Resilient Endurance-Aware NVM-Based PUF Against Learning-Based Attacks.
- [DATE 2025] Using OFF-set only for Corrupting Circuit to Resist Structural Attack in CAC Locking.
- [DATE 2025] Grafted Trees Bear Better Fruit: An Improved Multiple-Valued Plaintext-Checking Side-Channel Attack Against Kyber.
- [DATE 2025] Multi-Sensor Data Fusion for Enhanced Detection of Laser Fault Injection Attacks in Cryptographic Hardware: Practical Results.
- [DATE 2025] Xray: Detecting and Exploiting Vulnerabilities in Arm AXI Interconnects.
- [DATE 2025] Side-Channel Collision Attacks Against ASCON.
- [DATE 2025] Assessing Soft Error Reliability in Vectorized Kernels: Vulnerability and Performance Trade-Offs on Arm and RISC-V ISAs.
- [DATE 2025] SAFELOC: Overcoming Data Poisoning Attacks in Heterogeneous Federated Machine Learning for Indoor Localization.
- [DATE 2025] RTL-Breaker: Assessing the Security of LLMs Against Backdoor Attacks on HDL Code Generation.
- [CLUSTER 2023] FedGuard: Selective Parameter Aggregation for Poisoning Attack Mitigation in Federated Learning.
- [ICCD 2010] Countering code injection attacks with TLB and I/O monitoring.
- [ICCD 2011] Hardware Trojans: The defense and attack of integrated circuits.
- [ICCD 2011] Exploring the vulnerability of CMPs to soft errors with 3D stacked non-volatile memory.
- [ICCD 2011] SoftBeam: Precise tracking of transient faults and vulnerability analysis at processor design time.
- [ICCD 2012] Exposing vulnerabilities of untrusted computing platforms.
- [ICCD 2012] A novel profiled side-channel attack in presence of high Algorithmic Noise.
- [ICCD 2013] On design vulnerability analysis and trust benchmarks development.
- [ICCD 2014] Advanced modes in AES: Are they safe from power analysis based side channel attacks?
- [ICCD 2014] Hybrid modeling attacks on current-based PUFs.
- [ICCD 2015] 3D Integration: New opportunities in defense against cache-timing side-channel attacks.
- [ICCD 2016] Voting system design pitfalls: Vulnerability analysis and exploitation of a model platform.
- [ICCD 2016] Hardware-based attacks to compromise the cryptographic security of an election system.
- [ICCD 2016] Cryptographic vote-stealing attacks against a partially homomorphic e-voting architecture.
- [ICCD 2016] Shuffling across rounds: A lightweight strategy to counter side-channel attacks.
- [ICCD 2016] Towards a timing attack aware high-level synthesis of integrated circuits.
- [ICCD 2017] Side-Channel Attack on STTRAM Based Cache for Cryptographic Application.
- [ICCD 2017] Template Attack Based Deobfuscation of Integrated Circuits.
- [ICCD 2017] Vulnerability-Aware Energy Optimization Using Reconfigurable Caches in Multicore Systems.
- [ICCD 2017] Power Profile Equalizer: A Lightweight Countermeasure against Side-Channel Attack.
- [ICCD 2017] Implications of Distributed On-Chip Power Delivery on EM Side-Channel Attacks.
- [ICCD 2017] Logic Obfuscation against IC Reverse Engineering Attacks Using PLGs.
- [ICCD 2017] Identifying Reversible Circuit Synthesis Approaches to Enable IP Piracy Attacks.
- [ICCD 2017] Compiler-Assisted Threshold Implementation against Power Analysis Attacks.
- [ICCD 2018] Composable Template Attacks Using Templates for Individual Architectural Components.
- [ICCD 2018] A Timing Side-Channel Attack on a Mobile GPU.
- [ICCD 2018] Analysis of Row Hammer Attack on STTRAM.
- [ICCD 2018] SGXlinger: A New Side-Channel Attack Vector Based on Interrupt Latency Against Enclave Execution.
- [ICCD 2018] NVCool: When Non-Volatile Caches Meet Cold Boot Attacks.
- [ICCD 2018] A Compact AES Hardware Implementation Secure Against 1st-Order Side-Channel Attacks.
- [ICCD 2019] Integrating Cyber-Attack Defense Techniques into Real-Time Cyber-Physical Systems.
- [ICCD 2019] Cyclic Beneš Network Based Logic Encryption for Mitigating SAT-Based Attacks.
- [ICCD 2019] AdapTimer: Hardware/Software Collaborative Timer Resistant to Flush-Based Cache Attacks on ARM-FPGA Embedded SoC.
- [ICCD 2020] Special Session: Potentially Leaky Controller: Examining Cache Side-Channel Attacks in Programmable Logic Controllers.
- [ICCD 2020] Special Session: Noninvasive Sensor-Spoofing Attacks on Embedded and Cyber-Physical Systems.
- [ICCD 2020] pacSCA: A Profiling-Assisted Correlation-based Side-Channel Attack on GPUs.
- [ICCD 2020] BranchSpec: Information Leakage Attacks Exploiting Speculative Branch Instruction Executions.
- [ICCD 2020] ND-HMDs: Non-Differentiable Hardware Malware Detectors against Evasive Transient Execution Attacks.
- [ICCD 2020] Stealthy-Shutdown: Practical Remote Power Attacks in Multi - Tenant FPGAs.
- [ICCD 2020] Attacking Trivium at the Bitstream Level.
- [ICCD 2020] Phased-Guard: Multi-Phase Machine Learning Framework for Detection and Identification of Zero-Day Microarchitectural Side-Channel Attacks.
- [ICCD 2021] ModelShield: A Generic and Portable Framework Extension for Defending Bit-Flip based Adversarial Weight Attacks.
- [ICCD 2021] An Efficient Non-Profiled Side-Channel Attack on the CRYSTALS-Dilithium Post-Quantum Signature.
- [ICCD 2022] Efficient Finite State Machine Encoding for Defending Against Laser Fault Injection Attacks.
- [ICCD 2022] MultiCon: An Efficient Timing-based Side Channel Attack on Shared Memory Multicores.
- [ICCD 2022] Transition Recovery Attack on Embedded State Machines Using Power Analysis.
- [ICCD 2022] A Black-Box Sensitization Attack on SAT-Hard Instances in Logic Obfuscation.
- [ICCD 2022] DNNCloak: Secure DNN Models Against Memory Side-channel Based Reverse Engineering Attacks.
- [ICCD 2022] Area Efficient Asynchronous Circuits for Side Channel Attack Mitigation.
- [ICCD 2023] Leveraging Firmware Reverse Engineering for Stealthy Sensor Attacks via Binary Modification.
- [ICCD 2023] Transcend Adversarial Examples: Diversified Adversarial Attacks to Test Deep Learning Model.
- [ICCD 2024] A Semi Black-Box Adversarial Bit- Flip Attack with Limited DNN Model Information.
- [ICCD 2024] Blink: Breaking Parallel Implementation of Crystals-Kyber with Side-Channel Attack.
- [ICCD 2024] Interpretable Risk-aware Access Control for Spark: Blocking Attack Purpose Behind Actions.
- [ICCD 2024] TDM: Time and Distance Metric for Quantifying Information Leakage Vulnerabilities in SoCs.
- [ICCAD 2014] Vulnerability assessment and defense technology for smart home cybersecurity considering pricing cyberattacks.
- [ICCAD 2016] An optimization-theoretic approach for attacking physical unclonable functions.
- [ICCAD 2016] KCAD: kinetic cyber-attack detection method for cyber-physical additive manufacturing systems.
- [ICCAD 2016] Are proximity attacks a threat to the security of split manufacturing of integrated circuits?
- [ICCAD 2016] Security of neuromorphic computing: thwarting learning attacks using memristor’s obsolescence effect.
- [ICCAD 2016] Analysis of production data manipulation attacks in petroleum cyber-physical systems.
- [ICCAD 2017] CycSAT: SAT-based attack on cyclic logic encryptions.
- [ICCAD 2017] Efficient simulation of EM side-channel attack resilience.
- [ICCAD 2017] Fault injection attack on deep neural network.
- [ICCAD 2017] A novel cache bank timing attack.
- [ICCAD 2017] ATRIUM: Runtime attestation resilient under memory attacks.
- [ICCAD 2017] An assessment of vulnerability of hardware neural networks to dynamic voltage and temperature variations.
- [ICCAD 2017] Front-end-of-line attacks in split manufacturing.
- [ICCAD 2018] TimingSAT: timing profile embedded SAT attack.
- [ICCAD 2018] Assured deep learning: practical defense against adversarial attacks.
- [ICCAD 2018] Vulnerability-tolerant secure architectures.
- [ICCAD 2018] Defensive dropout for hardening deep neural networks under adversarial attacks.
- [ICCAD 2018] Shadow attacks on MEDA biochips.
- [ICCAD 2018] SCADET: a side-channel attack detection tool for tracking prime+probe.
- [ICCAD 2018] Electromagnetic equalizer: an active countermeasure against EM side-channel attack.
- [ICCAD 2018] GPU acceleration of RSA is vulnerable to side-channel timing attacks.
- [ICCAD 2018] Remote inter-chip power analysis side-channel attacks at board-level.
- [ICCAD 2018] Effective simple-power analysis attacks of elliptic curve cryptography on embedded systems.
- [ICCAD 2018] SPN dash: fast detection of adversarial attacks on mobile via sensor pattern noise fingerprinting.
- [ICCAD 2019] Is Robust Design-for-Security Robust Enough? Attack on Locked Circuits with Restricted Scan Chain Access.
- [ICCAD 2019] IcySAT: Improved SAT-based Attacks on Cyclic Locked Circuits.
- [ICCAD 2019] SCRIP: Secure Random Clock Execution on Soft Processor Systems to Mitigate Power-based Side Channel Attacks.
- [ICCAD 2019] Karna: A Gate-Sizing based Security Aware EDA Flow for Improved Power Side-Channel Attack Protection.
- [ICCAD 2020] Counteracting Adversarial Attacks in Autonomous Driving.
- [ICCAD 2020] A Quantitative Defense Framework against Power Attacks on Multi-tenant FPGA.
- [ICCAD 2020] Concurrent Weight Encoding-based Detection for Bit-Flip Attack on Neural Network Accelerators.
- [ICCAD 2020] Power Side Channel Attack Analysis and Detection.
- [ICCAD 2020] Faultless to a Fault? The Case of Threshold Implementations of Crypto-systems vs Fault Template Attacks.
- [ICCAD 2020] New Passive and Active Attacks on Deep Neural Networks in Medical Applications.
- [ICCAD 2020] Hybrid-Shield: Accurate and Efficient Cross-Layer Countermeasure for Run-Time Detection and Mitigation of Cache-Based Side-Channel Attacks.
- [ICCAD 2020] Laser Attack Benchmark Suite.
- [ICCAD 2020] NNgSAT: Neural Network guided SAT Attack on Logic Locked Complex Structures.
- [ICCAD 2021] LoopBreaker: Disabling Interconnects to Mitigate Voltage-Based Attacks in Multi-Tenant FPGAs.
- [ICCAD 2021] GPU Overdrive Fault Attacks on Neural Networks.
- [ICCAD 2021] DeepFreeze: Cold Boot Attacks and High Fidelity Model Recovery on Commercial EdgeML Device.
- [ICCAD 2021] HASHTAG: Hash Signatures for Online Detection of Fault-Injection Attacks on Deep Neural Networks.
- [ICCAD 2022] Attacks on Image Sensors.
- [ICCAD 2022] False Data Injection Attacks on Sensor Systems.
- [ICCAD 2022] Hardware IP Protection against Confidentiality Attacks and Evolving Role of CAD Tool.
- [ICCAD 2022] Attack Directories on ARM big.LITTLE Processors.
- [ICCAD 2022] PowerTouch: A Security Objective-Guided Automation Framework for Generating Wired Ghost Touch Attacks on Touchscreens.
- [ICCAD 2022] A Combined Logical and Physical Attack on Logic Obfuscation.
- [ICCAD 2022] Speculative Load Forwarding Attack on Modern Processors.
- [ICCAD 2022] Fast, Robust and Accurate Detection of Cache-Based Spectre Attack Phases.
- [ICCAD 2023] Side Channel-Assisted Inference Attacks on Machine Learning-Based ECG Classification.
- [ICCAD 2023] SystemC Model of Power Side-Channel Attacks Against AI Accelerators: Superstition or not?
- [ICCAD 2023] Protection Against Physical Attacks Through Self-Destructive Polymorphic Latch.
- [ICCAD 2023] Invited Paper: Machine Learning Based Blind Side-Channel Attacks on PQC-Based KEMs - A Case Study of Kyber KEM.
- [ICCAD 2023] An Anti-Removal-Attack Hardware Watermarking Method Based on Polymorphic Gates.
- [ICCAD 2023] HidFix: Efficient Mitigation of Cache-Based Spectre Attacks Through Hidden Rollbacks.
- [ICCAD 2024] Exploration of Timing and Higher-Energy Attacks on Quantum Random Access Memory.
- [ICCAD 2024] Systematic Use of Random Self-Reducibility in Cryptographic Code against Physical Attacks.
- [ICCAD 2024] HDXpose: Harnessing Hyperdimensional Computing’s Explainability for Adversarial Attacks.
- [ICCAD 2024] On the Security Vulnerabilities of MRAM-based In-Memory Computing Architectures against Model Extraction Attacks.
- [ICCAD 2024] µLAM: A LLM-Powered Assistant for Real-Time Micro-architectural Attack Detection and Mitigation.
- [ICCAD 2024] RandOhm: Mitigating Impedance Side-channel Attacks using Randomized Circuit Configurations.
- [ICCAD 2024] LaserEscape: Detecting and Mitigating Optical Probing Attacks.
- [ICDCS 2010] FLoc : Dependable Link Access for Legitimate Traffic in Flooding Attacks.
- [ICDCS 2010] On Achieving Maximum Secure Throughput Using Network Coding against Wiretap Attack.
- [ICDCS 2011] Localizing Multiple Jamming Attackers in Wireless Networks.
- [ICDCS 2011] A New Class of Buffer Overflow Attacks.
- [ICDCS 2012] A Novel En-route Filtering Scheme against False Data Injection Attacks in Cyber-Physical Networked Systems.
- [ICDCS 2012] Studying Impacts of Prefix Interception Attack by Exploring BGP AS-PATH Prepending.
- [ICDCS 2013] Identifying and Addressing Protocol Manipulation Attacks in “Secure” BGP.
- [ICDCS 2014] Impact Analysis of Topology Poisoning Attacks on Economic Operation of the Smart Power Grid.
- [ICDCS 2014] Turret: A Platform for Automated Attack Finding in Unmodified Distributed System Implementations.
- [ICDCS 2015] MAVR: Code Reuse Stealthy Attacks and Mitigation on Unmanned Aerial Vehicles.
- [ICDCS 2015] Inside Attack Filtering for Robust Sensor Localization.
- [ICDCS 2016] CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data.
- [ICDCS 2017] You Can Hear But You Cannot Steal: Defending Against Voice Impersonation Attacks on Smartphones.
- [ICDCS 2017] Flow Reconnaissance via Timing Attacks on SDN Switches.
- [ICDCS 2017] Adaptive Reconnaissance Attacks with Near-Optimal Parallel Batching.
- [ICDCS 2017] An Adversary-Centric Behavior Modeling of DDoS Attacks.
- [ICDCS 2017] Detecting Time Synchronization Attacks in Cyber-Physical Systems with Machine Learning Techniques.
- [ICDCS 2017] FlipNet: Modeling Covert and Persistent Attacks on Networked Resources.
- [ICDCS 2018] Vulnerability of Interdependent Networks with Heterogeneous Cascade Models and Timescales.
- [ICDCS 2018] Website Fingerprinting Attack Mitigation Using Traffic Morphing.
- [ICDCS 2018] Realistic Cover Traffic to Mitigate Website Fingerprinting Attacks.
- [ICDCS 2019] Hide and Seek: Waveform Emulation Attack and Defense in Cross-Technology Communication.
- [ICDCS 2019] Partitioning Attacks on Bitcoin: Colliding Space, Time, and Logic.
- [ICDCS 2019] Adversarial Learning Attacks on Graph-based IoT Malware Detection Systems.
- [ICDCS 2019] Tail Amplification in n-Tier Systems: A Study of Transient Cross-Resource Contention Attacks.
- [ICDCS 2020] Attack-Aware Data Timestamping in Low-Power Synchronization-Free LoRaWAN.
- [ICDCS 2020] Classification of Channel Access Attacks in Wireless Networks: A Deep Learning Approach.
- [ICDCS 2020] Impact of Memory DoS Attacks on Cloud Applications and Real-Time Detection Schemes.
- [ICDCS 2021] Poster: Off-path VoIP Interception Attacks.
- [ICDCS 2021] A Suspicion-Free Black-box Adversarial Attack for Deep Driving Maneuver Classification Models.
- [ICDCS 2021] Practical Location Privacy Attacks and Defense on Point-of-interest Aggregates.
- [ICDCS 2021] Hand-Key: Leveraging Multiple Hand Biometrics for Attack-Resilient User Authentication Using COTS RFID.
- [ICDCS 2021] Poster: Fragmentation Attacks on DNS over TCP.
- [ICDCS 2022] Thwarting Longitudinal Location Exposure Attacks in Advertising Ecosystem via Edge Computing.
- [ICDCS 2022] Defending against Thru-barrier Stealthy Voice Attacks via Cross-Domain Sensing on Phoneme Sounds.
- [ICDCS 2022] NWADE: A Neighborhood Watch Mechanism for Attack Detection and Evacuation in Autonomous Intersection Management.
- [ICDCS 2022] Demo: Dynamic Suppression of Selfish Node Attack Motivation in the Process of VANET Communication.
- [ICDCS 2023] DUO: Stealthy Adversarial Example Attack on Video Retrieval Systems via Frame-Pixel Search.
- [ICDCS 2023] Detecting Flash Loan Based Attacks in Ethereum.
- [ICDCS 2023] Mitigating Adversarial Attacks in Federated Learning with Trusted Execution Environments.
- [ICDCS 2023] Poster: Uncovering Vulnerabilities in Wasm Smart Contracts.
- [ICDCS 2024] Mitigation of Gradient Inversion Attacks in Federated Learning with Private Adaptive Optimization.
- [ICDCS 2024] Toward Free-Riding Attack on Cross-Silo Federated Learning Through Evolutionary Game.
- [ICDCS 2024] OASIS: Offsetting Active Reconstruction Attacks in Federated Learning.
- [ICDCS 2024] Dual Study of Canvas Fingerprinting Based Authentication: A Novel Spoofing Attack and the Countermeasure.
- [ICDCS 2024] Poster: CrystalBall - Attack Graphs Using Large Language Models and RAGs.
- [CODESISSS 2023] Special Session: Mitigating Side-Channel Attacks Through Circuit to Application Layer Approaches.
- [SIGMETRICS 2010] Characterizing the soft error vulnerability of multicores running multithreaded applications.
- [SIGMETRICS 2012] How well can congestion pricing neutralize denial of service attacks?
- [SIGMETRICS 2013] Sustainability of service provisioning systems under attack.
- [SIGMETRICS 2015] Joint Cyber and Physical Attacks on Power Grids: Graph Theoretical Approaches for Information Recovery.
- [SIGMETRICS 2017] Investigation of the 2016 Linux TCP Stack Vulnerability at Scale.
- [SIGMETRICS 2017] Security Game with Non-additive Utilities and Multiple Attacker Resources.
- [SIGMETRICS 2017] Pseudo-Separation for Assessment of Structural Vulnerability of a Network.
- [SIGMETRICS 2017] Why “Some” Like It Hot Too: Thermal Attack on Data Centers.
- [SIGMETRICS 2018] Why Some Like It Loud: Timing Power Attacks in Multi-tenant Data Centers Using an Acoustic Side Channel.
- [SIGMETRICS 2020] Fundamental Limits of Volume-based Network DoS Attacks.
- [SIGMETRICS 2024] Optimized Cross-Path Attacks via Adversarial Reconnaissance.
- [SIGMETRICS 2025] Blockchain Amplification Attack.
- [ICPP 2015] PLP: Protecting Location Privacy Against Correlation-Analysis Attack in Crowdsensing.
- [ICPP 2019] When Power Oversubscription Meets Traffic Flood Attack: Re-Thinking Data Center Peak Load Management.
- [ICPP 2020] Impact of Memory DoS Attacks on Cloud Applications and Real-Time Detection Schemes.
- [ICPP 2024] Cache Line Pinning for Mitigating Row Hammer Attack.
- [ICS 2019] GPUGuard: mitigating contention based side and covert channel attacks on GPUs.
- [VEE 2012] Replacement attacks against VM-protected applications.
- [VEE 2017] ReRanz: A Light-Weight Virtual Machine to Mitigate Memory Disclosure Attacks.
- [IPPS 2010] Attack-resistant frequency counting.
- [IPPS 2010] Head-body partitioned string matching for Deep Packet Inspection with scalable and attack-resilient performance.
- [IPPS 2011] Minimal Obstructions for the Coordinated Attack Problem and Beyond.
- [IPPS 2014] F-SEFI: A Fine-Grained Soft Error Fault Injection Tool for Profiling Application Vulnerability.
- [IPPS 2016] Mitigation of Denial of Service Attack with Hardware Trojans in NoC Architectures.
- [IPPS 2018] Mitigating Traffic-Based Side Channel Attacks in Bandwidth-Efficient Cloud Storage.
- [IPPS 2023] Lyra: Fast and Scalable Resilience to Reordering Attacks in Blockchains.
- [IPPS 2024] Druto: Upper-Bounding Silent Data Corruption Vulnerability in GPU Applications.
- [IPPS 2025] FLAME: Federated Learning for Attack Mitigation and Evasion.
- [ITC 2012] Vulnerability-based Interleaving for Multi-Bit Upset (MBU) protection in modern microprocessors.
- [ITC 2014] Test-mode-only scan attack and countermeasure for contemporary scan architectures.
- [ITC 2016] Machine learning-based defense against process-aware attacks on Industrial Control Systems.
- [ITC 2020] Cross-PUF Attacks on Arbiter-PUFs through their Power Side-Channel.
- [ITC 2021] The Security Enhancement Techniques of the Double-layer PUF Against the ANN-based Modeling Attack.
- [ITC 2021] A BIST-based Dynamic Obfuscation Scheme for Resilience against Removal and Oracle-guided Attacks*.
- [ITC 2021] Is your secure test infrastructure secure enough? : Attacks based on delay test patterns using transient behavior analysis.
- [ITC 2022] Modeling Challenge Covariances and Design Dependency for Efficient Attacks on Strong PUFs.
- [ITC 2022] The Impact of On-chip Training to Adversarial Attacks in Memristive Crossbar Arrays.
- [ITC 2022] Circuit-to-Circuit Attacks in SoCs via Trojan-Infected IEEE 1687 Test Infrastructure.
- [ITC 2022] AI-Driven Assurance of Hardware IP against Reverse Engineering Attacks.
- [ITC 2023] Laser Fault Injection Vulnerability Assessment and Mitigation with Case Study on PG-TVD Logic Cells.
- [ITC 2024] Evaluating Vulnerability of Chiplet-Based Systems to Contactless Probing Techniques.
- [ITC 2024] FAT-RABBIT: Fault-Aware Training towards Robustness AgainstBit-flip Based Attacks in Deep Neural Networks.
- [LISA 2011] WCIS: A Prototype for Detecting Zero-Day Attacks in Web Server Requests.
- [LISA 2014] Towards Detecting Target Link Flooding Attack.
- [RTAS 2016] TaskShuffler: A Schedule Randomization Protocol for Obfuscation against Timing Inference Attacks in Real-Time Systems.
- [RTAS 2016] Attacking the One-Out-Of-m Multicore Problem by Combining Hardware Management with Mixed-Criticality Provisioning.
- [RTAS 2019] On the Pitfalls and Vulnerabilities of Schedule Randomization Against Schedule-Based Attacks.
- [RTAS 2019] Denial-of-Service Attacks on Shared Cache in Multicore: Analysis and Prevention.
- [RTAS 2021] Real-Time Adaptive Sensor Attack Detection in Autonomous Cyber-Physical Systems.
- [RTAS 2021] Brief Industry Paper: HDAD: Hyperdimensional Computing-based Anomaly Detection for Automotive Sensor Attacks.
- [RTAS 2021] Work in Progress: Network Attack Detection Towards Smart Factory.
- [RTAS 2022] The Thundering Herd: Amplifying Kernel Interference to Attack Response Times.
- [RTAS 2023] Cache Bank-Aware Denial-of-Service Attacks on Multicore ARM Processors.
- [RTAS 2023] Real-Time Data-Predictive Attack-Recovery for Complex Cyber-Physical Systems.
- [RTAS 2023] Work-in-Progress: Securing Safety-Critical Control Tasks with Attack-aware Multi-Rate Scheduling.
- [RTAS 2024] Fast Attack Recovery for Stochastic Cyber-Physical Systems.
- [RTAS 2024] Demo: Vulnerability Analysis for STL-Guided Safe Reinforcement Learning in Cyber-Physical Systems.
- [RTAS 2024] Work in Progress: Emerging from Shadows: Optimal Hidden Actuator Attack to Cyber-Physical Systems.
- [RTAS 2025] Recovery-Guaranteed Sensor Attack Detection for Cyber-Physical Systems.
- [EUROPAR 2024] Efficient RNIC Cache Side-Channel Attack Detection Through DPU-Driven Architecture.
- [EUROPAR 2024] Disttack: Graph Adversarial Attacks Toward Distributed GNN Training.
- [CF 2010] Protective redundancy overhead reduction using instruction vulnerability factor.
- [CF 2015] PHP-sensor: a prototype method to discover workflow violation and XSS vulnerabilities in PHP web applications.
- [CF 2016] Automated instantiation of side-channel attacks countermeasures for software cipher implementations.
- [CF 2017] CAROL-FI: an Efficient Fault-Injection Tool for Vulnerability Evaluation of Modern HPC Parallel Accelerators.
- [CF 2018] Vulnerability analysis of Android auto infotainment apps.
- [CF 2018] VPsec: countering fault attacks in general purpose microprocessors with value prediction.
- [CF 2018] Higher order side-channel attack resilient S-boxes.
- [CF 2019] The parameter optimization based on LVPSO algorithm for detecting multi-step attacks.
- [CF 2019] CacheGuard: a security-enhanced directory architecture against continuous attacks.
- [CF 2019] SPADA: a statistical program attack detection analysis.
- [CF 2019] NPUFort: a secure architecture of DNN accelerator against model inversion attack.
- [CF 2019] Performance statistics and learning based detection of exploitative speculative attacks.
- [CF 2021] On resilience of security-oriented error detecting architectures against power attacks: a theoretical analysis.
- [CF 2021] Fault injection attacks on SoftMax function in deep neural networks.
- [CF 2022] Evaluating fork after withholding (FAW) attack in Bitcoin.
- [CF 2022] Where’s Waldo?: identifying anomalous behavior of data-only attacks using hardware features.
- [CF 2024] LeakageFreeSpec: Applying the Wiping Approach to Defend Against Transient Execution Attacks.
- [CF 2025] Corrosion Hammer: A Self-Activated Bit-Flip Attack to the Processing-In-Memory Accelerator.
- [SYSTOR 2015] Disruptive prefetching: impact on side-channel attacks and cache designs.
- [SYSTOR 2019] Deadversarial multiverse network: a defense architecture against adversarial attacks.
- [SYSTOR 2023] Fuzzing LibraryOSes for Iago vulnerabilities.
- [NOCS 2015] Runtime Detection of a Bandwidth Denial Attack from a Rogue Network-on-Chip.
- [NOCS 2018] Securing NoCs Against Timing Attacks with Non-Interference Based Adaptive Routing.
- [NOCS 2019] Detection and prevention protocol for black hole attack in network-on-chip.
- [NOCS 2021] Packet header attack by hardware trojan in NoC based TCMP and its impact analysis.
- [NOCS 2021] Denial-of-service attack detection using machine learning in network-on-chip architectures.
- [ASAP 2010] Dependability analysis of a countermeasure against fault attacks by means of laser shots onto a SRAM-based FPGA.
- [ASAP 2015] Towards secure cryptographic software implementation against side-channel power analysis attacks.
- [ASAP 2017] DoSGuard: Protecting pipelined MPSoCs against hardware Trojan based DoS attacks.
- [ASAP 2018] Clean the Scratch Registers: A Way to Mitigate Return-Oriented Programming Attacks.
- [ASAP 2019] Fooling AI with AI: An Accelerator for Adversarial Attacks on Deep Learning Visual Classification.
- [ASPDAC 2010] Scan-based attack against elliptic curve cryptosystems.
- [ASPDAC 2011] Secure scan design using shift register equivalents against differential behavior attack.
- [ASPDAC 2013] DARNS: A randomized multi-modulo RNS architecture for double-and-add in ECC to prevent power analysis side channel attacks.
- [ASPDAC 2015] Vulnerability analysis for crypto devices against probing attack.
- [ASPDAC 2016] JTAG-based robust PCB authentication for protection against counterfeiting attacks.
- [ASPDAC 2016] Data privacy in non-volatile cache: Challenges, attack models and solutions.
- [ASPDAC 2016] SPARTA: A scheduling policy for thwarting differential power analysis attacks.
- [ASPDAC 2017] An FPGA-compatible PLL-based sensor against fault injection attack.
- [ASPDAC 2017] Security vulnerability analysis of design-for-test exploits for asset protection in SoCs.
- [ASPDAC 2018] A machine learning attack resistant multi-PUF design on FPGA.
- [ASPDAC 2018] A conflict-free approach for parallelizing SAT-based de-camouflaging attacks.
- [ASPDAC 2018] A comparative investigation of approximate attacks on logic encryptions.
- [ASPDAC 2018] A nonvolatile flip-flop-enabled cryptographic wireless authentication tag with per-query key update and power-glitch attack countermeasures.
- [ASPDAC 2018] Security analysis and enhancement of model compressed deep learning systems under adversarial attacks.
- [ASPDAC 2019] Layout recognition attacks on split manufacturing.
- [ASPDAC 2019] Execution of provably secure assays on MEDA biochips to thwart attacks.
- [ASPDAC 2019] TAD: time side-channel attack defense of obfuscated source code.
- [ASPDAC 2019] ADMM attack: an enhanced adversarial attack for deep neural networks with undetectable distortions.
- [ASPDAC 2019] A system-level perspective to understand the vulnerability of deep learning systems.
- [ASPDAC 2019] A 0.16pJ/bit recurrent neural network based PUF for enhanced machine learning attack resistance.
- [ASPDAC 2019] BeSAT: behavioral SAT-based attack on cyclic logic encryption.
- [ASPDAC 2020] Analyzing The Security of The Cache Side Channel Defences With Attack Graphs.
- [ASPDAC 2020] iGPU Leak: An Information Leakage Vulnerability on Intel Integrated GPU.
- [ASPDAC 2020] Mitigating Adversarial Attacks for Deep Neural Networks by Input Deformation and Augmentation.
- [ASPDAC 2020] LanCe: A Comprehensive and Lightweight CNN Defense Methodology against Physical Adversarial Attacks on Embedded Multimedia Applications.
- [ASPDAC 2021] PCBench: Benchmarking of Board-Level Hardware Attacks and Trojans.
- [ASPDAC 2021] On the Impact of Aging on Power Analysis Attacks Targeting Power-Equalized Cryptographic Circuits.
- [ASPDAC 2021] Micro-architectural Cache Side-Channel Attacks and Countermeasures.
- [ASPDAC 2021] VADER: Leveraging the Natural Variation of Hardware to Enhance Adversarial Attack.
- [ASPDAC 2021] Entropy-Based Modeling for Estimating Adversarial Bit-flip Attack Impact on Binarized Neural Network.
- [ASPDAC 2021] ObfusX: Routing Obfuscation with Explanatory Analysis of a Machine Learning Attack.
- [ASPDAC 2021] Attacking a CNN-based Layout Hotspot Detector Using Group Gradient Method.
- [ASPDAC 2022] Lightweight and Secure Branch Predictors against Spectre Attacks.
- [ASPDAC 2022] Avatar: Reinforcing Fault Attack Countermeasures in EDA with Fault Transformations.
- [ASPDAC 2022] A Voltage Template Attack on the Modular Polynomial Subtraction in Kyber.
- [ASPDAC 2023] Rethink before Releasing Your Model: ML Model Extraction Attack in EDA.
- [ASPDAC 2023] FPGANeedle: Precise Remote Fault Attacks from FPGA to CPU.
- [ASPDAC 2023] FPGA Based Countermeasures against Side Channel Attacks on Block Ciphers.
- [ASPDAC 2023] Robust Hyperdimensional Computing against Cyber Attacks and Hardware Errors: A Survey.
- [ASPDAC 2023] PMU-Leaker: Performance Monitor Unit-Based Realization of Cache Side-Channel Attacks.
- [ASPDAC 2023] EO-Shield: A Multi-Function Protection Scheme against Side Channel and Focused Ion Beam Attacks.
- [ASPDAC 2023] CompaSeC: A Compiler-Assisted Security Countermeasure to Address Instruction Skip Fault Attacks on RISC-V.
- [ASPDAC 2024] Sensors for Remote Power Attacks: New Developments and Challenges.
- [ASPDAC 2024] FormalFuzzer: Formal Verification Assisted Fuzz Testing for SoC Vulnerability Detection.
- [ASPDAC 2024] LIPSTICK: Corruptibility-Aware and Explainable Graph Neural Network-based Oracle-Less Attack on Logic Locking.
- [ASPDAC 2024] Modeling of Tamper Resistance to Electromagnetic Side-channel Attacks on Voltage-scaled Circuits.
- [ASPDAC 2024] d-GUARD: Thwarting Denial-of-Service Attacks via Hardware Monitoring of Information Flow using Language Semantics in Embedded Systems.
- [ASPDAC 2025] Making Legacy Hardware Robust against Side Channel Attacks via High-Level Synthesis.
- [ASPDAC 2025] Machine Learning-Based Real-Time Detection of Power Analysis Attacks Using Supply Voltage Comparisons.
- [ASPDAC 2025] Side-channel Collision Attacks on Hyper-Dimensional Computing based on Emerging Resistive Memories.
- [ASPDAC 2025] K-Gate Lock: Multi-Key Logic Locking Using Input Encoding Against Oracle-Guided Attacks.
- [ETS 2010] Robustness evaluation and improvements under laser-based fault attacks of an AES crypto-processor implemented on a SRAM-based FPGA.
- [ETS 2011] Scan Attacks and Countermeasures in Presence of Scan Response Compactors.
- [ETS 2011] Timing Vulnerability Factors of Ultra Deep-sub-micron CMOS.
- [ETS 2014] A collision resistant deterministic random bit generator with fault attack detection possibilities.
- [ETS 2014] Test-mode-only scan attack using the boundary scan chain.
- [ETS 2014] Quantitative evaluation of register vulnerabilities in RTL control paths.
- [ETS 2017] An efficient test technique to prevent scan-based side-channel attacks.
- [ETS 2018] Detection of IJTAG attacks using LDPC-based feature reduction and machine learning.
- [ETS 2020] Detection of Rowhammer Attacks in SoCs with FPGAs.
- [ETS 2020] Hardware Trojan Attacks in Analog/Mixed-Signal ICs via the Test Access Mechanism.
- [ETS 2020] Failure and Attack Detection by Digital Sensors.
- [ETS 2020] LiD-CAT: A Lightweight Detector for Cache ATtacks.
- [ETS 2021] Chill Out: Freezing Attacks on Capacitors and DC/DC Converters.
- [ETS 2021] Opacity preserving Countermeasure using Finite State Machines against Differential Scan Attacks.
- [ETS 2021] Transit-Guard: An OS-based Defense Mechanism Against Transient Execution Attacks.
- [ETS 2022] Smart Redundancy Schemes for ANNs Against Fault Attacks.
- [ETS 2023] Spotlight: An Impairing Packet Transmission Attack Targeting Specific Node in NoC-based TCMP.
- [ETS 2023] DeepVigor: VulnerabIlity Value RanGes and FactORs for DNNs’ Reliability Assessment.
- [ETS 2023] Error Resilient Transformers: A Novel Soft Error Vulnerability Guided Approach to Error Checking and Suppression.
- [ETS 2023] Power Side-Channel Attacks and Countermeasures on Computation-in-Memory Architectures and Technologies.
- [ETS 2023] Attacking Memristor-Mapped Graph Neural Network by Inducing Slow-to-Write Errors.
- [ETS 2023] A Side-Channel Attack on a Hardware Implementation of CRYSTALS-Kyber.
- [ETS 2024] A Novel Power Analysis Attack against CRYSTALS-Dilithium Implementation.
- [ETS 2024] Power Analysis Attack Against post-SAT Logic Locking schemes.
- [ETS 2025] Security Risks in AI Accelerators: Detecting RTL Vulnerabilities to Model Theft with Formal Verification.
- [ETS 2025] FSMlock: Defending against Oracle-based Sequential Logic-Locking Attacks under Output-Corruption Requirements.
- [ETS 2025] Securing Reconfigurable Scan Networks Against Data Sniffing and Data Alteration Attacks.
- [ETS 2025] Pulsed Electromagnetic Fault Injection Attack on Ring Oscillator-based PUFs in FPGAs.
- [ETS 2025] FLARE: Fault Attack Leveraging Address Reconfiguration Exploits in Multi-Tenant FPGAs.
- [FPL 2010] Investigation of a Masking Countermeasure against Side-Channel Attacks for RISC-based Processor Architectures.
- [FPL 2010] Secure Protocol Implementation for Remote Bitstream Update Preventing Replay Attacks on FPGA.
- [FPL 2011] Thwarting Software Attacks on Data-Intensive Platforms with Configurable Hardware-Assisted Application Rule Enforcement.
- [FPL 2012] Detecting power attacks on reconfigurable hardware.
- [FPL 2012] SecURe DPR: Secure update preventing replay attacks for dynamic partial reconfiguration.
- [FPL 2013] Fast, FPGA-based Rainbow Table creation for attacking encrypted mobile communications.
- [FPL 2015] In-field vulnerability analysis of hardware-accelerated computer vision applications.
- [FPL 2017] Voltage drop-based fault attacks on FPGAs using valid bitstreams.
- [FPL 2019] Characterizing Power Distribution Attacks in Multi-User FPGA Environments.
- [FPL 2019] Physical Side-Channel Attacks and Covert Communication on FPGAs: A Survey.
- [FPL 2020] X-Attack: Remote Activation of Satisfiability Don’t-Care Hardware Trojans on Shared FPGAs.
- [FPL 2020] Power Wasting Circuits for Cloud FPGA Attacks.
- [FPL 2021] Modeling Attack Resistant Arbiter PUF with Time-Variant Obfuscation Scheme.
- [FPL 2022] Breaking an FPGA-Integrated NIST SP 800-193 Compliant TRNG Hard-IP Core with On-Chip Voltage-Based Fault Attacks.
- [FPL 2022] A Lightweight Multi-Attack CAN Intrusion Detection System on Hybrid FPGAs.
- [FCCM 2018] FPGA Side Channel Attacks without Physical Access.
- [FCCM 2019] Model-Extraction Attack Against FPGA-DNN Accelerator Utilizing Correlation Electromagnetic Analysis.
- [FCCM 2020] Power-hammering through Glitch Amplification - Attacks and Mitigation.
- [FCCM 2021] Remote Power Attacks on the Versatile Tensor Accelerator in Multi-Tenant FPGAs.
- [FCCM 2022] On the Single Event Upset Vulnerability and Mitigation of Binarized Neural Networks on FPGAs.
- [FCCM 2022] Precise Fault Injection to Enable DFIA for Attacking AES in Remote FPGAs.
- [FCCM 2022] Characterization of Side Channels on FPGA-based Off-The-Shelf Boards against Automated Attacks.
- [FCCM 2023] Power Side-Channel Attacks and Defenses for Neural Network Accelerators.
- [FCCM 2024] Ph.D. Project - IsoFPGA - A Novel CMOS Galvanic Isolation for Remote Physical Attacks in Multi-tenant Cloud FPGA.
- [FCCM 2025] Defending Side-Channel Attacks in Convolutional Neural Networks with Channel-Level Parallelization.
- [ATS 2014] On the Use of Scan Chain to Improve Physical Attacks (Extended Abstract).
- [ATS 2016] Efficient Attack on Non-linear Current Mirror PUF with Genetic Algorithm.
- [ATS 2016] Side-Channel Attack on Flipped Scan Chains.
- [ATS 2017] Tree-Based Logic Encryption for Resisting SAT Attack.
- [ATS 2017] On Securing Scan Design from Scan-Based Side-Channel Attacks.
- [ATS 2017] How to Secure Scan Design Against Scan-Based Side-Channel Attacks?
- [ATS 2018] A Dynamic-Key Secure Scan Structure Against Scan-Based Side Channel and Memory Cold Boot Attacks.
- [ATS 2020] LBIST-PUF: An LBIST Scheme Towards Efficient Challenge-Response Pairs Collection and Machine-Learning Attack Tolerance Improvement.
- [ATS 2020] HRAE: Hardware-assisted Randomization against Adversarial Example Attacks.
- [ATS 2020] An effective technique preventing differential cryptanalysis attack.
- [ATS 2021] Side-Channel Attacks on Triple Modular Redundancy Schemes.
- [ATS 2023] ClearLock: Deterring Hardware Reverse Engineering Attacks in a White-Box.
- [ATS 2023] Side-channel Attacks on Memristive Circuits Under External Disturbances.
- [ATS 2023] An Empirical Study of the Inherent Resistance of Knowledge Distillation Based Federated Learning to Targeted Poisoning Attacks.
- [ATS 2023] A Covert Attack Method Against FPGA Clouds.
- [ATS 2023] A Logic Encryption-Enhanced PUF Architecture to Deceive Machine Learning-Based Modeling Attacks.
- [ATS 2023] SMASh: A State Encoding Methodology Against Attacks on Finite State Machines.
- [ATS 2023] A Template Attack on Reduction Without Reference Device on Kyber.
- [ATS 2023] On Detecting and Defending AdvDrop Adversarial Attacks by Image Blurring and Adaptive Noising.
- [ATS 2024] Security Vulnerabilities in AI Hardware: Threats and Countermeasures.
- [HPCC 2010] A CellBE-based HPC Application for the Analysis of Vulnerabilities in Cryptographic Hash Functions.
- [HPCC 2011] Simulation of DDOS Attacks on P2P Networks.
- [HPCC 2013] Detecting Flood Attacks through New Density-Pattern Based Approach.
- [HPCC 2013] Method to Evaluate Software Protection Based on Attack Modeling.
- [HPCC 2013] Software Attack Modeling and Its Application.
- [HPCC 2013] Secure Route Discovery for Preventing Black Hole Attacks on AODV-Based MANETs.
- [HPCC 2013] Access Control to Prevent Attacks Exploiting Vulnerabilities of WebView in Android OS.
- [HPCC 2013] An Anti-power Attacks Implementation of AES Algorithm in ASIC.
- [HPCC 2013] An Efficient Attack on a Fuzzy Keyword Search Scheme over Encrypted Data.
- [HPCC 2014] Vulnerability Analysis of Clock Synchronization Protocol Using Stochastic Petri Net.
- [HPCC 2014] Analysis and Detection of DoS Attacks in Cloud Computing by Using QSE Algorithm.
- [HPCC 2015] Detecting Fault Injection Attacks on Embedded Real-Time Applications: A System-Level Perspective.
- [HPCC 2015] Evaluating Sybil Attacks in P2P Infrastructures for Online Social Networks.
- [HPCC 2015] Mitigating HTTP Flooding Attacks with Meta-data Analysis.
- [HPCC 2015] User-Level Side Channel Attack on Workflow System in Data-Center.
- [HPCC 2015] Analysis and Comparison of the Network Security Protocol with DoS/DDoS Attack Resistance Performance.
- [HPCC 2016] Vehicle Driving Pattern Based Sybil Attack Detection.
- [HPCC 2016] The Concept of Attack Scenarios and Its Applications in Android Malware Detection.
- [HPCC 2018] Non-asymptotic Bound on the Performance of k-Anonymity against Inference Attacks.
- [HPCC 2018] Proactive Risk Assessment Based on Attack Graphs: An Element of the Risk Management Process on System, Enterprise and National Level.
- [HPCC 2019] A Bayesian Improved Defense Model for Deceptive Attack in Honeypot-Enabled Networks.
- [HPCC 2019] Low-Rate DoS Attack Detection Based on Improved Logistic Regression.
- [HPCC 2019] CFADefense: A Security Solution to Detect and Mitigate Crossfire Attacks in Software-Defined IoT-Edge Infrastructure.
- [HPCC 2019] PCA-SVM-Based Approach of Detecting Low-Rate DoS Attack.
- [HPCC 2019] A Secure Container Deployment Strategy by Genetic Algorithm to Defend against Co-Resident Attacks in Cloud Computing.
- [HPCC 2019] RTMA: Real Time Mining Algorithm for Multi-Step Attack Scenarios Reconstruction.
- [HPCC 2019] Trust-Based Distributed Kalman Filter Estimation Fusion under Malicious Cyber Attacks.
- [HPCC 2020] Adversarial point cloud perturbations to attack deep object detection models.
- [HPCC 2021] Universal Adversarial Attack Against 3D Object Tracking.
- [HPCC 2021] A Two-Stage Deanonymization Attack Towards Bitcoin Hidden Service Nodes.
- [HPCC 2021] A Highly Efficient Profiled Power Analysis Attack Based on Power Leakage Fitting.
- [HPCC 2021] Reinforcement Learning-based Black-Box Evasion Attacks to Link Prediction in Dynamic Graphs.
- [HPCC 2021] Falsified CV Data Attack Detection Based on LSTM.
- [HPCC 2021] BOFSanitizer: Efficient locator and detector for buffer overflow vulnerability.
- [HPCC 2021] Towards Applying IPSec between Edge Switches and End Users to Counter DDoS Attacks in SDNs.
- [HPCC 2021] False Data Injection Attack Detection Based on Wavelet Packet Decomposition and Random Forest in Smart Grid.
- [HPCC 2022] A practical adversarial attack on Graph Neural Networks by attacking single node structure.
- [HPCC 2022] Manipulated Client Initial Attack and Defense of QUIC.
- [HPCC 2022] A Data-free Black-box Attack for Generating Transferable Adversarial Examples.
- [HPCC 2022] LightSCA: Lightweight Side-Channel Attack via Discrete Cosine Transform and Residual Networks.
- [HPCC 2022] Optimal strategy selection for attack graph games using deep reinforcement learning.
- [HPCC 2022] Optimized Client-side Detection of Model Poisoning Attacks in Federated learning.
- [HPCC 2022] A Detecting Method Against Cross-Container Spectre Attacks.
- [HPCC 2022] A Block Gray Adversarial Attack Method for Image Classification Neural Network.
- [HPCC 2022] Evaluation of data poisoning attacks on federated learning-based network intrusion detection system.
- [HPCC 2023] A Privacy-Preserving Timing Attacks Mitigation in Information-Centric Edge Networks.
- [HPCC 2023] Cell Manipulation Attack Against Onion Services.
- [HPCC 2023] On a Hybrid BiLSTM-GCNN-Based Approach for Attack Detection in SDN.
- [HPCC 2023] Anti-DDoS Attacks Strategy of SDN Data Plane with Data Augmentation Based on P4.
- [HPCC 2023] VPFL: A Verifiable Property Federated Learning Framework Against Invisible Attacks in Distributed IoT.
- [MASCOTS 2010] Modeling and Evaluation of Control Flow Vulnerability in the Embedded System.
- [MASCOTS 2014] Multi-fusion Based Distributed Spectrum Sensing against Data Falsification Attacks and Byzantine Failures in CR-MANET.
- [MASCOTS 2020] Adversarial Attacks in a Deep Reinforcement Learning based Cluster Scheduler.
- [MASCOTS 2021] A Multiple Snapshot Attack on Deniable Storage Systems.
- [MASCOTS 2022] G-Networks Can Detect Different Types of Cyberattacks.
- [MASCOTS 2023] Interdependent Mission Impact Assessment of an IoT System with Hypergame- heoretic Attack-Defense Behavior Modeling.
- [MASCOTS 2024] Deep Learning Intrusion Detection and Mitigation of DoS Attacks.
- [MASCOTS 2024] Vulnerability prediction using pre-trained models: An empirical evaluation.
- [MASCOTS 2024] An Associated Random Neural Network Detects Intrusions and Estimates Attack Graphs.
- [MASCOTS 2024] Transforming the field of Vulnerability Prediction: Are Large Language Models the key?
- [ISPA 2011] Preventing Denial of Service Attacks in Government E-Services Using a New Efficient Packet Filtering Technique.
- [ISPA 2011] Fault Injection Attack on A5/3.
- [ISPA 2017] On the Vulnerabilities of Landmark-Based Data Location Approaches: Threats, Solutions, and Challenges.
- [ISPA 2017] Assessment of Reduction of Quality Attacks on Mobile IP Networks.
- [ISPA 2017] An Adaptive Android Security Extension against Privilege Escalation Attacks.
- [ISPA 2018] A Partition Matching Method for Optimal Attack Path Analysis.
- [ISPA 2018] LogoPhish: A New Two-Dimensional Code Phishing Attack Detection Method.
- [ISPA 2018] A Comprehensive Detection of Memory Corruption Vulnerabilities for C/C++ Programs.
- [ISPA 2018] Memory Cache Attacks on Alluxio Impede High Performance Computing.
- [ISPA 2018] A Novel Approach for Identifying Lateral Movement Attacks Based on Network Embedding.
- [ISPA 2018] Tearing Down the Face of Algorithmic Complexity Attacks for DPI Engines.
- [ISPA 2019] Game-Based Attack Defense Model to Provide Security for Relay Selection in 5G Mobile Networks.
- [ISPA 2019] Register before Publishing with Smart Forwarding, Mitigate Content Poisoning Attack in ICN.
- [ISPA 2019] An Improved Quantum Genetic Algorithms and Application for DDoS Attack Detection.
- [ISPA 2019] Buffer Management for Identifying Crypto-Ransomware Attack in Environment with No Semantic Information.
- [ISPA 2019] Improvement of Quantum Genetic Algorithms and Application of DDoS Attack Detection.
- [ISPA 2019] Using Temporal Conceptual Graphs and Neural Networks for Big Data-Based Attack Scenarios Reconstruction.
- [ISPA 2020] Constructing Optimal Sparse Decision Tree for Analying I-SIG System Attack.
- [ISPA 2020] AVDHRAM: Automated Vulnerability Detection based on Hierarchical Representation and Attention Mechanism.
- [ISPA 2020] Atomic Restriction: Hardware Atomization to Defend Against Preemption Attacks.
- [ISPA 2020] Analysis of security methods in Vehicular Ad-Hoc Network against Worm Hole and Gray Hole attacks.
- [ISPA 2020] Low-rate DoS Attack Detection Based on WPD-EE Algorithm.
- [ISPA 2020] Geographical distance and news diffusion associating with the sentiment of tweets: Case Study on London Bridge Attack 2017.
- [ISPA 2021] AddrArmor: An Address-based Runtime Code-reuse Attack Mitigation for Shared Objects at the Binary-level.
- [ISPA 2021] BA-BNN: Detect LDoS Attacks in SDN Based on Bat Algorithm and BP Neural Network.
- [ISPA 2021] The Random Content Poisoning Attack in NDN.
- [ISPA 2021] Self-Attention based Automated Vulnerability Detection with Effective Data Representation.
- [ISPA 2021] Practical Deanonymization Attack in Ethereum Based on P2P Network Analysis.
- [ISPA 2021] A Comparative Study of Credentialed Vulnerability Scanning and Non-credentialed Vulnerability Scanning.
- [ISPA 2021] Malicious Conspiracy on Permissioned Blockchain to Mount Denial-of-endorsement Attacks.
- [ISPA 2021] Generative Adverserial Analysis of Phishing Attacks on Static and Dynamic Content of Webpages.
- [ISPA 2021] A Randomized Switched-Mode Voltage Regulation System for IoT Edge Devices to Defend Against Power Analysis based Side Channel Attacks.
- [ISPA 2024] FFGDetector: Vulnerability Detection in Cross-Contract Feature Flow Graph Using GCN.
- [ISPA 2024] Adversarial Attack against Intrusion Detectors in Cyber-Physical Systems With Minimal Perturbations.
- [ISPA 2024] InviINS: Invisible Instruction Backdoor Attacks on Peer-to-Peer Semantic Networks.
- [ISPA 2024] Using KVM Events to Detect VM Memory-Sharing Lateral Movement Attacks in a Virtualized Environment.
- [ISPA 2024] Improving INT Inference Resilience of CNNs by Vulnerability-Aware Mixed-Precision Quantization.
- [ISPA 2024] Reinforcement Learning-powered Effectiveness and Efficiency Few-shot Jailbreaking Attack LLMs.
- [ISPA 2024] Detecting Smart Contract Vulnerabilities based on Fusing Semantic and Syntax Structure Information.
- [ISPA 2024] MAD-LLM: A Novel Approach for Alert-Based Multi-stage Attack Detection via LLM.
- [ISPA 2024] A Model for Vulnerability Classification based on Res-CNN-BiTLSTM.
- [ISPA 2024] DNS Covert Channel Attack Detection Based on Spatio-Temporal Feature Fusion.
- [ISPA 2024] PhantomPatch: Easy-ignoring Attacks on Object Detectors Using Ghosting Artifacts.
- [ISPA 2024] Smart Contract Vulnerability Detection via Feature Fusion of Local Data Flow and Global Features.
- [CCGRID 2011] Detection and Protection against Distributed Denial of Service Attacks in Accountable Grid Computing Systems.
- [CCGRID 2013] Empowering the Invulnerability of Wireless Sensor Networks through Super Wires and Super Nodes.
- [CCGRID 2013] BitDeposit: Deterring Attacks and Abuses of Cloud Computing Services through Economic Measures.
- [CCGRID 2017] Security Implications of Blockchain Cloud with Analysis of Block Withholding Attack.
- [CCGRID 2017] A Game Theoretic Method for VM-to-Hypervisor Attacks Detection in Cloud Environment.
- [CCGRID 2020] A Feedforward Neural Network based Model to Predict Sub-optimal Path Attack in IoT-LLNs.
- [CCGRID 2020] Solving the Interdependency Problem: A Secure Virtual Machine Allocation Method Relying on the Attacker’s Efficiency and Coverage.
- [CCGRID 2020] Integrated Proactive Defense for Software Defined Internet of Things under Multi-Target Attacks.
- [CCGRID 2022] SPA: An Efficient Adversarial Attack on Spiking Neural Networks using Spike Probabilistic.
- [CCGRID 2022] VARIoT - Vulnerability and Attack Repository for the Internet of Things.
- [NPC 2012] Dempster-Shafer Theory to Identify Insider Attacker in Wireless Sensor Network.
- [NPC 2012] Detection and Mitigation of Web Application Vulnerabilities Based on Security Testing.
- [NPC 2016] A Study of Overflow Vulnerabilities on GPUs.
- [NPC 2019] High Performance DDoS Attack Detection System Based on Distribution Statistics.
- [ICA3PP 2010] A Note-Based Randomized and Distributed Protocol for Detecting Node Replication Attacks in Wireless Sensor Networks.
- [ICA3PP 2012] Security Computing for the Resiliency of Protecting from Internal Attacks in Distributed Wireless Sensor Networks.
- [ICA3PP 2012] Wireless Sensor Network Internal Attacker Identification with Multiple Evidence by Dempster-Shafer Theory.
- [ICA3PP 2014] Efficient Detection of Cloned Attacks for Large-Scale RFID Systems.
- [ICA3PP 2014] Combining Supervised and Unsupervised Learning for Automatic Attack Signature Generation System.
- [ICA3PP 2014] Detection and Defense Technology of Blackhole Attacks in Wireless Sensor Network.
- [ICA3PP 2015] VCLT: An Accurate Trajectory Tracking Attack Based on Crowdsourcing in VANETs.
- [ICA3PP 2015] Minimizing Resource Expenditure While Maximizing Destructiveness for Node Capture Attacks.
- [ICA3PP 2015] A Robust and Efficient Detection Model of DDoS Attack for Cloud Services.
- [ICA3PP 2015] An Agent-Based Framework for Simulating and Analysing Attacks on Cyber Physical Systems.
- [ICA3PP 2017] Optimally Selecting the Timing of Zero-Day Attack via Spatial Evolutionary Game.
- [ICA3PP 2018] Controlled Channel Attack Detection Based on Hardware Virtualization.
- [ICA3PP 2018] Predicting SDC Vulnerability of Instructions Based on Random Forests Algorithm.
- [ICA3PP 2018] Harden Tamper-Proofing to Combat MATE Attack.
- [ICA3PP 2018] Detecting Evil-Twin Attack with the Crowd Sensing of Landmark in Physical Layer.
- [ICA3PP 2018] InterestFence: Countering Interest Flooding Attacks by Using Hash-Based Security Labels.
- [ICA3PP 2018] Access Delay Analysis in String Multi-hop Wireless Network Under Jamming Attack.
- [ICA3PP 2019] Moving Target Defense Against Injection Attacks.
- [ICA3PP 2019] Safeguarding Against Active Routing Attack via Online Learning.
- [ICA3PP 2019] Reliability Enhancement of Neural Networks via Neuron-Level Vulnerability Quantization.
- [ICA3PP 2019] A Vulnerability Assessment Method for Network System Based on Cooperative Game Theory.
- [ICA3PP 2019] Data Poisoning Attacks on Graph Convolutional Matrix Completion.
- [ICA3PP 2019] Secure Data Deduplication with Resistance to Side-Channel Attacks via Fog Computing.
- [ICA3PP 2019] Practical IDS on In-vehicle Network Against Diversified Attack Models.
- [ICA3PP 2019] Adaptive Detection Method for Packet-In Message Injection Attack in SDN.
- [ICA3PP 2020] A Data Augmentation-Based Defense Method Against Adversarial Attacks in Neural Networks.
- [ICA3PP 2020] An Attack-Immune Trusted Architecture for Supervisory Intelligent Terminal.
- [ICA3PP 2020] Machine Learning-Based Attack Detection Method in Hadoop.
- [ICA3PP 2020] Towards NoC Protection of HT-Greyhole Attack.
- [ICA3PP 2020] Adversarial Attacks on Deep Learning Models of Computer Vision: A Survey.
- [ICA3PP 2020] Web Attack Detection Based on User Behaviour Semantics.
- [ICA3PP 2021] Recode-Decode-and-Compare: An Efficient Verification Scheme for Coded Edge Computing Against Collusion Attack.
- [ICA3PP 2021] Edge DDoS Attack Detection Method Based on Software Defined Networks.
- [ICA3PP 2021] Security Analysis of Poisoning Attacks Against Multi-agent Reinforcement Learning.
- [ICA3PP 2021] Why is Your Trojan NOT Responding? A Quantitative Analysis of Failures in Backdoor Attacks of Neural Networks.
- [ICA3PP 2022] A Label Flipping Attack on Machine Learning Model and Its Defense Mechanism.
- [ICA3PP 2023] Label-Only Membership Inference Attack Against Federated Distillation.
- [ICA3PP 2023] SolGPT: A GPT-Based Static Vulnerability Detection Model for Enhancing Smart Contract Security.
- [ICA3PP 2023] Efficient Black-Box Adversarial Attacks with Training Surrogate Models Towards Speaker Recognition Systems.
- [ICA3PP 2023] Multi-label Detection Method for Smart Contract Vulnerabilities Based on Expert Knowledge and Pre-training Technology.
- [ICA3PP 2024] Data-Free Encoder Stealing Attack in Self-supervised Learning.
- [ICA3PP 2024] Data Poisoning Attack Against Reinforcement Learning from Human Feedback in Robot Control Tasks.
- [ICA3PP 2024] AutoMiner: Reinforcement Learning-Based Mining Attack Simulator.
- [ICA3PP 2024] A Dual-Defense Self-balancing Framework Against Bilateral Model Attacks in Federated Learning.
- [ICA3PP 2024] Updates Leakage Attack Against Private Graph Split Learning.
- [ICA3PP 2024] A Neural Network-Based PUF Protection Method Against Machine Learning Attack.
- [ICA3PP 2024] Invisible Backdoor Attack with Image Contours Triggers.
- [ICA3PP 2024] DPG-FairFL: A Dual-Phase GAN-Based Defense Framework Against Image-Based Fairness Data Poisoning Attacks in Federated Learning.
- [ICA3PP 2024] Black-Box Adversarial Attack Against Transformer-Based Object Detection Models in Vehicular Networks.
- [ICA3PP 2024] DP-CLMI:Differentially Private Contrastive Learning Against Membership Inference Attack.
- [ICA3PP 2024] A Lightweight Detection Scheme for the Black-Hole Attacks and Gray-Hole Attacks in VANETs.
- [CASES 2011] Smart cache cleaning: energy efficient vulnerability reduction in embedded processors.
- [CASES 2012] Side channel attacks and the non volatile memory of the future.
- [CASES 2015] QuadSeal: Quadruple algorithmic symmetrizing countermeasure against power based side-channel attacks.
- [CASES 2017] A “high resilience” mode to minimize soft error vulnerabilities in ARM cortex-R CPU pipelines: work-in-progress.
- [CASES 2019] Sequence-Crafter: Side-Channel Entropy Minimization to Thwart Timing-based Side-Channel Attacks.
- [CASES 2022] On Evaluation of On-chip Thermal Covert Channel Attacks.
- [CASES 2023] Work-in-Progress: Towards Evaluating CNNs Against Integrity Attacks on Multi-tenant Computation.
- [CASES 2024] Special Session: Detecting and Defending Vulnerabilities in Heterogeneous and Monolithic Systems: Current Strategies and Future Directions.
- [FPT 2023] MERCURY: An Automated Remote Side-channel Attack to Nvidia Deep Learning Accelerator.
- [ICPADS 2011] New RFID Authentication Protocol with DOS-attack Resistance.
- [ICPADS 2011] Trust Issues that Create Threats for Cyber Attacks in Cloud Computing.
- [ICPADS 2011] A Revised Ant Colony Optimization Scheme for Discovering Attack Paths of Botnet.
- [ICPADS 2012] Dictionary Attack on TrueCrypt with RIVYERA S3-5000.
- [ICPADS 2012] Cyber Attacks Prediction Model Based on Bayesian Network.
- [ICPADS 2013] Privacy Vulnerability Analysis on Routing in Mobile Social Networks.
- [ICPADS 2015] Jamming with Power Boost: Leaky Waveguide Vulnerability in Train Systems.
- [ICPADS 2015] Detecting and Mitigating P2P Eclipse Attacks.
- [ICPADS 2015] STUMP - STalling offline password attacks Using pre-hash ManiPulations.
- [ICPADS 2017] AppIS: Protect Android Apps Against Runtime Repackaging Attacks.
- [ICPADS 2017] PBUF: Sharing Buffer to Mitigate Flooding Attacks.
- [ICPADS 2017] Vulnerability Detection in IoT Firmware: A Survey.
- [ICPADS 2018] Filter Assignment Policy Against Distributed Denial-of-Service Attack.
- [ICPADS 2018] Optimized Lightweight Hardware Trojan-Based Fault Attack on DES.
- [ICPADS 2019] Understanding Distributed Poisoning Attack in Federated Learning.
- [ICPADS 2019] A Null-Space-Based Verification Scheme for Coded Edge Computing against Pollution Attacks.
- [ICPADS 2019] Predicting the Silent Data Corruption Vulnerability of Instructions in Programs.
- [ICPADS 2019] Cache Side-Channel Attacks: Flush+Flush and the Countermeasures Time Gap.
- [ICPADS 2020] Intelligent Detection Algorithm Against UAVs’ GPS Spoofing Attack.
- [ICPADS 2020] Explainable Congestion Attack Prediction and Software-level Reinforcement in Intelligent Traffic Signal System.
- [ICPADS 2021] Anti-Replay: A Fast and Lightweight Voice Replay Attack Detection System.
- [ICPADS 2021] Jyane: Detecting Reentrancy vulnerabilities based on path profiling method.
- [ICPADS 2021] Protecting Resources Against Volumetric and Non-volumetric Network Attacks.
- [ICPADS 2021] ShadowDroid: Practical Black-box Attack against ML-based Android Malware Detection.
- [ICPADS 2022] UltraBD: Backdoor Attack against Automatic Speaker Verification Systems via Adversarial Ultrasound.
- [ICPADS 2022] Stealing Secrecy from Outside: A Novel Gradient Inversion Attack in Federated Learning.
- [ICPADS 2022] WAIR: Watermark Attack on Image Retrieval Systems.
- [ICPADS 2023] A High-Performance Smart Contract Vulnerability Detection Scheme Based on BERT.
- [ICPADS 2023] A Comprehensive Robustness Analysis of Storj DCS Under Coordinated DDoS Attack.
- [ICPADS 2023] Full-coverage Invisible Camouflage For Adversarial Targeted Attack.
- [ICPADS 2023] A Lightweight CNN-based Mechanism to Efficiently Identify Electric Meters under Stealthy False Data Injection Attacks in Smart Power Grid.
- [ICPADS 2023] The Art of Deception: Black-box Attack Against Text-to-Image Diffusion Model.
- [ICPADS 2023] Fairness with adaptive weight in network attack detection.
- [ICPADS 2023] RPFL: Robust and Privacy Federated Learning against Backdoor and Sample Inference Attacks.
- [ICPADS 2023] SemSBA: Semantic-perturbed Stealthy Backdoor Attack on Federated Semi-supervised Learning.
- [ICPADS 2023] CACluster: A Clustering Approach for IoT Attack Activities Based on Contextual Analysis.
- [ICPADS 2023] A Highly Accurate Statistical Attack against Searchable Symmetric Encryption.
- [ICPADS 2024] FEMD: Feature Enhancement-aided Multimodal Feature Fusion Approach for Smart Contract Vulnerability Detection.
- [ISCAS 2010] State-dependent changeable scan architecture against scan-based side channel attacks.
- [ISCAS 2010] Fault and simple power attack resistant RSA using Montgomery modular multiplication.
- [ISCAS 2011] Counteracting power analysis attack using Static Single-ended Logic.
- [ISCAS 2011] Efficient attack strategy to communication networks with partial degree information.
- [ISCAS 2011] Leakage Power Analysis attacks: Effectiveness on DPA resistant logic styles under process variations.
- [ISCAS 2012] CoRaS: A multiprocessor key corruption and random round swapping for power analysis side channel attacks: A DES case study.
- [ISCAS 2012] Design of security enhanced TPM chip against invasive physical attacks.
- [ISCAS 2013] Power analysis attack of QCA circuits: A case study of the Serpent cipher.
- [ISCAS 2013] Hardware-fault attack handling in RNS-based Montgomery multipliers.
- [ISCAS 2014] An efficient countermeasure against power attacks for ECC over GF(p).
- [ISCAS 2014] Scan-based attack on the LED block cipher using scan signatures.
- [ISCAS 2014] Traffic dynamics and vulnerability in hypercube communication networks.
- [ISCAS 2014] Side-channel attack resistant AES cryptographic circuits with ROM reducing address-dependent EM leaks.
- [ISCAS 2015] Tamper-resistant authentication system with side-channel attack resistant AES and PUF using MDR-ROM.
- [ISCAS 2015] DPA vulnerability analysis on Trivium stream cipher using an optimized power model.
- [ISCAS 2016] Efficient differential fault analysis attacks to AES decryption for low cost sensors in IoTs.
- [ISCAS 2016] Fault attack on FPGA implementations of Trivium stream cipher.
- [ISCAS 2016] Multi-threshold dual-spacer dual-rail delay-insensitive logic: An improved IC design methodology for side channel attack mitigation.
- [ISCAS 2016] Online malware defense using attack behavior model.
- [ISCAS 2016] A hardware security solution against scan-based attacks.
- [ISCAS 2016] A new countermeasure against scan-based side-channel attacks.
- [ISCAS 2016] Live demonstration: Screen piracy protection using saturation laser attack and TPVM.
- [ISCAS 2017] Revisit sequential logic obfuscation: Attacks and defenses.
- [ISCAS 2017] Runtime mitigation of illegal packet request attacks in Networks-on-Chip.
- [ISCAS 2017] Implications of noise insertion mechanisms of different countermeasures against side-channel attacks.
- [ISCAS 2017] Low-cost fortification of arbiter PUF against modeling attack.
- [ISCAS 2017] A low-cost masquerade and replay attack detection method for CAN in automobiles.
- [ISCAS 2017] An energy-based attack flow for temporal misalignment coutermeasures on cryptosystems.
- [ISCAS 2017] Highly secured state-shift local clock circuit to countermeasure against side channel attack.
- [ISCAS 2018] PUF Modeling Attack using Active Learning.
- [ISCAS 2018] Thwarting Fault Attacks against Lightweight Cryptography using SIMD Instructions.
- [ISCAS 2018] Cascading Failure Model Considering Multi-Step Attack Strategy.
- [ISCAS 2019] PUFNet: A Deep Neural Network Based Modeling Attack for Physically Unclonable Function.
- [ISCAS 2019] Increasing the SAT Attack Resiliency of In-Cone Logic Locking.
- [ISCAS 2019] Maximizing Side Channel Attack-Resistance and Energy-Efficiency of the STTL Combining Multi-Vt Transistors with Current and Capacitance Balancing.
- [ISCAS 2019] Functional Reverse Engineering on SAT-Attack Resilient Logic Locking.
- [ISCAS 2019] Fault Attack Countermeasures for Error Samplers in Lattice-Based Cryptography.
- [ISCAS 2020] CT PUF: Configurable Tristate PUF against Machine Learning Attacks.
- [ISCAS 2020] Detection of Denial of Service Attacks in Communication Networks.
- [ISCAS 2020] Temporal Power Redistribution as a Countermeasure against Side-Channel Attacks.
- [ISCAS 2020] A Random Interrupt Dithering SAR Technique for Secure ADC against Reference-Charge Side-Channel Attack.
- [ISCAS 2020] Model Reverse-Engineering Attack using Correlation Power Analysis against Systolic Array Based Neural Network Accelerator.
- [ISCAS 2020] Consensus in Multi-Agent System under Aperiodic Denial-of-Service Attacks.
- [ISCAS 2020] Efficacy of Satisfiability-Based Attacks in the Presence of Circuit Reverse-Engineering Errors.
- [ISCAS 2020] Modeling SAT-Attack Search Complexity.
- [ISCAS 2020] RNN-Based Detection of Fault Attacks on RSA.
- [ISCAS 2020] A New Logic-Locking Scheme Resilient to Gate Removal Attack.
- [ISCAS 2020] Security Vulnerabilities of Obfuscated Analog Circuits.
- [ISCAS 2020] Cascading Failures of Power System with the Consideration of Cyber Attacks.
- [ISCAS 2020] Cross Entropy Attack on Deep Graph Infomax.
- [ISCAS 2020] Adversarial Perturbation Attacks on GLRT-Based Detectors.
- [ISCAS 2021] Lightweight Monitoring Scheme for Flooding DoS Attack Detection in Multi-Tenant MPSoCs.
- [ISCAS 2021] SoWaF: Shuffling of Weights and Feature Maps: A Novel Hardware Intrinsic Attack (HIA) on Convolutional Neural Network (CNN).
- [ISCAS 2021] A Digital and Lightweight Delay-Based Detector against Fault Injection Attacks.
- [ISCAS 2021] Enhancing SAT-Attack Resiliency and Cost-Effectiveness of Reconfigurable-Logic-Based Circuit Obfuscation.
- [ISCAS 2021] A Switched-Capacitor Power Side-Channel Attack Detection Circuit in 65-nm CMOS.
- [ISCAS 2021] Side-Channel Trojan Insertion - a Practical Foundry-Side Attack via ECO.
- [ISCAS 2021] Power Side-Channel Attack Detection through Battery Impedance Monitoring.
- [ISCAS 2021] Sequential Node Attack of Complex Networks Based on Q-Learning Method.
- [ISCAS 2021] PG-CAS: Patterned-Ground Co-Planar Capacitive Asymmetry Sensing for mm-Range EM Side-Channel Attack Probe Detection.
- [ISCAS 2021] Evaluating the Impact of BTI on Hiding Countermeasures for DPA and DEMA Attacks.
- [ISCAS 2021] Assessing the Vulnerability of Cyber-Coupled Power Systems to Component Failures.
- [ISCAS 2022] Low-Complexity AES Architectures Resilient to Power Analysis Attacks.
- [ISCAS 2022] Hardware Security Vulnerability in Analog Signal Chain Filters.
- [ISCAS 2022] Tampering Attack Detection in Analog to Feature Converter for Wearable Biosensor.
- [ISCAS 2022] Mitigating EM Side-Channel Attacks with Dynamic Delay Insertion and Data Bus Inversion.
- [ISCAS 2022] An Asynchronous-Logic Masked Advanced Encryption Standard (AES) Accelerator and its Side-Channel Attack Evaluations.
- [ISCAS 2022] Comparison of the Resilience of Convolutional and Cellular Neural Networks Against Adversarial Attacks.
- [ISCAS 2022] Event-Based Resilient Consensus of Second-Order Multi-Agent Systems Under Dos Attacks.
- [ISCAS 2022] Spectre attack detection with Neutral Network on RISC-V processor.
- [ISCAS 2023] A Power Side-Channel Attack on Flash ADC.
- [ISCAS 2023] GERALT: Real-time Detection of Evasion Attacks in Deep Learning Systems.
- [ISCAS 2023] Deep Echo State Networks for Detecting Internet Worm and Ransomware Attacks.
- [ISCAS 2023] Security Framework for Cloud Control Systems Against False Data Injection Attacks.
- [ISCAS 2023] Attack-Resilient Temperature Sensor Design.
- [ISCAS 2023] Cascaded Machine Learning Model Based DoS Attacks Detection and Classification in NoC.
- [ISCAS 2023] DeepAttack: A Deep Learning Based Oracle-less Attack on Logic Locking.
- [ISCAS 2024] Side-channel Attacks Targeting Classical-Quantum Interface in Quantum Computers.
- [ISCAS 2024] FPGA Bitstream Fault Injection Attack and Countermeasures on the Sampling Counter in CRYSTALS Kyber.
- [ISCAS 2024] CTC: Continuous-Time Convolution based Multi-Attack Detection for Sensor Networks.
- [ISCAS 2024] A Fault Attack Resistant Method for RISC-V Based on Interrupt Handlers and Instruction Extensions.
- [ISCAS 2024] Securing On-Chip Learning: Navigating Vulnerabilities and Potential Safeguards in Spiking Neural Network Architectures.
- [ISCAS 2024] Detecting Fake Deposit Attacks on Cross-chain Bridges from a Network Perspective.
- [ISCAS 2024] Passive Lightweight On-chip Sensors for Power Side Channel Attack Detection.
- [ISCAS 2024] A Novel Non-profiling Side-Channel Attack on Masked Devices with Connectivity Matrix.
- [ISCAS 2024] Code Property Graph based Cross-Domain Vulnerability Detection via Deep Fused Feature.
- [ISCAS 2024] Streamlining DNN Obfuscation to Defend Against Model Stealing Attacks.
- [ISCAS 2024] Live Demonstration: Man-in-the-Middle Attack on Edge Artificial Intelligence.
- [ISCAS 2024] A Timing Attack Resistant Lightweight Post-Quantum Crypto-Processor for SPHINCS+.
- [ISCAS 2024] Adversarial Label Flipping Attack on Supervised Machine Learning-Based HT Detection Systems.
- [ISCAS 2024] DNA: DC Nodal Analysis Attack for Analog Circuits.
- [ISCAS 2024] Fortifying Strong PUFs: A Modeling Attack-Resilient Approach Using Weak PUF for IoT Device Security.
- [ISCAS 2024] A Dual-Slope BlueFMCW Radar for Simultaneous Mitigation Against Close-in DRFM and Frequency Domain Spoofing Attacks.
- [ISCAS 2025] Crosstalk Attack Resilient RNS Quantum Addition.
- [ISCAS 2025] Design of Reliable and Modeling-Attack Resistant Strong PUFs for Lightweight Applications.
- [ISCAS 2025] Mitigation of Camouflaged Adversarial Attacks in Autonomous Vehicles-A Case Study Using CARLA Simulator.
- [ISCAS 2025] DyLock: A Dynamic Key-based SAT and Structural Attacks Resilient Low-overhead Logic Locking.
- [ISCAS 2025] An On-chip Sensor Placement Strategy For Mitigation Framework Against Voltage-Drop Attack.
- [ISCAS 2025] LiCSPA: Lightweight Countermeasure against Static Power Side-Channel Attacks.
- [ISCAS 2025] Rabbit: Dynamic Clock Randomization to Protect against Side-Channel Attacks.
- [ISCAS 2025] Asynchronous Threshold Voltage Defined Logic Family Resistant to LLSI Attacks.
- [ISCAS 2025] Feature Perturbation Agent based Adversarial Attack Method for Weakly Supervised Video Anomaly Detection.
- [ISCAS 2025] Educational Framework for Power Side-Channel Attacks on Neural Networks in Embedded Systems.
- [ISCAS 2025] N-MUX: Neighborhood-Based Logic Locking Against Machine Learning Attacks.
- [ISCAS 2025] Mitigation of Range and Doppler Spoofing Attacks on Indoor FMCW Radars using Dual-Slope FSK-FMCW Waveform.
- [ISCAS 2025] Detection of Physiological Data Tampering Attacks with Quantum Machine Learning.
- [ISCAS 2025] Live Demonstration: Securing Wireless ICs Against Supply Chain Attacks Using SyncLock.
- [ISCAS 2025] AxRA: Approximate Rowhammer Attack for Modern DRAM Systems.
- [ISCAS 2025] Innovative Elliptic Curve Multiplication Design for Preventing Side-Channel Attacks Based on Variable Radix System.
- [ISCAS 2025] Masking Based Protection Mechanism for Ascon against CPA Attack.
- [ISCAS 2025] Hacking Health: Unveiling Vulnerabilities in BLE-Enabled Wearable Sensor Nodes.
- [ISCAS 2025] Efficient CNN-Based Side-Channel Attacks on Dilithium without Device Access.
- [ISCAS 2025] A New Hardware Trojan Attack on Scan-obfuscated Logic-locked Circuits.
- [ISLPED 2015] Exploring power attack protection of resource constrained encryption engines using integrated low-drop-out regulators.
- [ISLPED 2016] Performance Impact of Magnetic and Thermal Attack on STTRAM and Low-Overhead Mitigation Techniques.
- [ISLPED 2018] Blacklist Core: Machine-Learning Based Dynamic Operating-Performance-Point Blacklisting for Mitigating Power-Management Security Attacks.
- [ISLPED 2018] Information Leakage Attacks on Emerging Non-Volatile Memory and Countermeasures.
- [ISLPED 2022] Predictive Model Attack for Embedded FPGA Logic Locking.
- [ISLPED 2023] Enabling DVFS Side-Channel Attacks for Neural Network Fingerprinting in Edge Inference Services.
- [ISLPED 2023] Learning from Output Transitions: A Chosen Challenge Strategy for ML Attacks on PUFs.
- [ISLPED 2023] FPGA-Patch: Mitigating Remote Side-Channel Attacks on FPGAs using Dynamic Patch Generation.
- [ISLPED 2024] Securing Deep Neural Networks on Edge from Membership Inference Attacks Using Trusted Execution Environments.
- [ISPD 2022] Hardware Security: Physical Design versus Side-Channel and Fault Attacks.
- [ISPD 2023] Security-aware Physical Design against Trojan Insertion, Frontside Probing, and Fault Injection Attacks.
- [ISPD 2023] X-Volt: Joint Tuning of Driver Strengths and Supply Voltages Against Power Side-Channel Attacks.
- [HOTI 2021] Hardware SYN Attack Protection For High Performance Load Balancers.
- [VTS 2012] Are advanced DfT structures sufficient for preventing scan-attacks?
- [VTS 2013] RSAK: Random stream attack for phase change memory in video applications.
- [VTS 2014] Active defense against counterfeiting attacks through robust antifuse-based on-chip locks.
- [VTS 2015] In-depth soft error vulnerability analysis using synthetic benchmarks.
- [VTS 2015] TMO: A new class of attack on cipher misusing test infrastructure.
- [VTS 2016] Security of emerging non-volatile memories: Attacks and defenses.
- [VTS 2016] Thwarting timing attacks on NEMS relay based designs.
- [VTS 2016] Online soft-error vulnerability estimation for memory arrays.
- [VTS 2017] Dynamically obfuscated scan for protecting IPs against scan-based attacks throughout supply chain.
- [VTS 2018] Modeling attacks on strong physical unclonable functions strengthened by random number and weak PUF.
- [VTS 2018] Hardware Trojan attacks in embedded memory.
- [VTS 2018] Special session on reliability and vulnerability of neuromorphic computing systems.
- [VTS 2018] Securing IJTAG against data-integrity attacks.
- [VTS 2019] PCB Hardware Trojans: Attack Modes and Detection Strategies.
- [VTS 2019] Shielding Logic Locking from Redundancy Attacks.
- [VTS 2020] Special Session: Novel Attacks on Logic-Locking.
- [VTS 2020] Flush+Time: A High Accuracy and High Resolution Cache Attack On ARM-FPGA Embedded SoC.
- [VTS 2021] Special Session: Physical Attacks through the Chip Backside: Threats, Challenges, and Opportunities.
- [VTS 2021] Multi-Bit Blinding: A Countermeasure for RSA Against Side Channel Attacks.
- [VTS 2023] Thwarting Reverse Engineering Attacks through Keyless Logic Obfuscation.
- [VTS 2023] Graph Neural Networks for Hardware Vulnerability Analysis - Can you Trust your GNN?
- [VTS 2025] BugWhisperer: Fine-Tuning LLMs for SoC Hardware Vulnerability Detection.
- [ITC-ASIA 2019] Time-Related Hardware Trojan Attacks on Processor Cores.
- [ITC-ASIA 2019] Instruction Vulnerability Test and Code Optimization Against DVFS Attack.
- [ITC-ASIA 2020] On Optical Attacks Making Logic Obfuscation Fragile.
- [ITC-ASIA 2020] A Novel Tampering Attack on AES Cores with Hardware Trojans.
- [ITC-ASIA 2021] The ANN Based Modeling Attack and Security Enhancement of the Double-layer PUF.
- [ITC-ASIA 2024] A RO-Integrated-LFSR-Based Nonlinear Strong PUF with Intrinsic Modeling Attacks Resilience.
- [ITC-ASIA 2024] SCD-PUF: Shuffled Chaotic-dual-PUF With High Machine Learning Attack Resilience.
- [ITC-ASIA 2024] NoBALL: A Novel BDD-based Attack against Logic Locking.
- [ITC-ASIA 2024] PFO PUF: A Lightweight Parallel Feed Obfuscation PUF Resistant to Machine Learning Attacks.
- [SIGCOMM 2010] NetShield: massive semantics-based vulnerability signature matching for high-speed networks.
- [SIGCOMM 2010] Empowering users against sidejacking attacks.
- [SIGCOMM 2011] Finding protocol manipulation attacks.
- [SIGCOMM 2011] “Roto-Rooting” your router: solution against new potential DoS attacks on modern routers.
- [SIGCOMM 2014] NIMBUS: cloud-scale attack detection and mitigation.
- [SIGCOMM 2015] Yo-Yo Attack: Vulnerability In Auto-scaling Mechanism.
- [SIGCOMM 2021] From IP to transport and beyond: cross-layer attacks against applications.
- [SIGCOMM 2022] SurgeProtector: mitigating temporal algorithmic complexity attacks using adversarial scheduling.
- [SIGCOMM 2023] Poster: Off-Path DNSSEC Downgrade Attacks.
- [MOBICOM 2010] Privacy vulnerability of published anonymous mobility traces.
- [MOBICOM 2012] A unified approach to identifying and healing vulnerabilities in x86 machine code.
- [MOBICOM 2016] Investigation of multi-device location spoofing attacks on air traffic control and possible countermeasures.
- [MOBICOM 2018] Poster: Detection of Topology Poisoning by Silent Relay Attacker in SDN.
- [MOBICOM 2018] Poster: A Learning Automata-based DDoS Attack Defense Mechanism in Software Defined Networks.
- [MOBICOM 2018] Poster: Feasibility of Desynchronization Attack in LTE/SAE Networks.
- [MOBICOM 2020] Ghost calls from operational 4G call systems: IMS vulnerability, call DoS attack, and countermeasure.
- [MOBICOM 2021] Insecurity of operational cellular IoT service: new vulnerabilities, attacks, and countermeasures.
- [MOBICOM 2021] Data-plane signaling in cellular IoT: attacks and defense.
- [MOBICOM 2022] Audio-domain position-independent backdoor attack via unnoticeable triggers.
- [MOBICOM 2022] Sifter: protecting security-critical kernel modules in Android through attack surface reduction.
- [MOBICOM 2022] AdaptOver: adaptive overshadowing attacks in cellular networks.
- [MOBICOM 2022] Development of C-plane DoS attacker for O-RAN FHI.
- [MOBICOM 2023] MASTERKEY: Practical Backdoor Attack Against Speaker Verification Systems.
- [MOBICOM 2023] Breaking Mobile Notification-based Authentication with Concurrent Attacks Outside of Mobile Devices.
- [MOBICOM 2023] Screen Perturbation: Adversarial Attack and Defense on Under-Screen Camera.
- [MOBICOM 2023] MagTracer: Detecting GPU Cryptojacking Attacks via Magnetic Leakage Signals.
- [MOBICOM 2024] Inaudible Backdoor Attack via Stealthy Frequency Trigger Injection in Audio Spectrogram.
- [MOBICOM 2024] Practical Adversarial Attack on WiFi Sensing Through Unnoticeable Communication Packet Perturbation.
- [MOBICOM 2024] Malicious Attacks against Multi-Sensor Fusion in Autonomous Driving.
- [MOBICOM 2024] Hydra: Attacking OFDM-base Communication System via Metasurfaces Generated Frequency Harmonics.
- [MOBICOM 2024] Multimodal Strategy To Defend Mobile Devices Against Vishing Attacks.
- [MOBICOM 2024] Exploring Visual Explanations for Defending Federated Learning against Poisoning Attacks.
- [INFOCOM 2010] Sybil Attacks Against Mobile Users: Friends and Foes to the Rescue.
- [INFOCOM 2010] PhishNet: Predictive Blacklisting to Detect Phishing Attacks.
- [INFOCOM 2010] Maximum Damage Malware Attack in Mobile Wireless Networks.
- [INFOCOM 2010] An Attack-Defense Game Theoretic Analysis of Multi-Band Wireless Covert Timing Networks.
- [INFOCOM 2010] From Time Domain to Space Domain: Detecting Replica Attacks in Mobile Ad Hoc Networks.
- [INFOCOM 2010] P-Coding: Secure Network Coding against Eavesdropping Attacks.
- [INFOCOM 2010] On Approximation of New Optimization Methods for Assessing Network Vulnerability.
- [INFOCOM 2011] Hearing is believing: Detecting mobile primary user emulation attack in white space.
- [INFOCOM 2011] A novel packet size based covert channel attack against anonymizer.
- [INFOCOM 2011] Designing localization algorithms robust to signal strength attacks.
- [INFOCOM 2011] Anonymous communication with network coding against traffic analysis attack.
- [INFOCOM 2011] On the vulnerability of the proportional fairness scheduler to retransmission attacks.
- [INFOCOM 2011] Maintaining source privacy under eavesdropping and node compromise attacks.
- [INFOCOM 2011] Good guys vs. Bot Guise: Mimicry attacks against fast-flux detection systems.
- [INFOCOM 2011] From jammer to gambler: Modeling and detection of jamming attacks against time-critical traffic.
- [INFOCOM 2011] Identity-based attack detection in mobile wireless networks.
- [INFOCOM 2011] A dynamic game solution to malware attack.
- [INFOCOM 2012] On detecting pollution attacks in inter-session network coding.
- [INFOCOM 2012] Optimal resource allocation to defend against deliberate attacks in networking infrastructures.
- [INFOCOM 2012] Detection of channel degradation attack by Intermediary Node in Linear Networks.
- [INFOCOM 2012] Vulnerability and protection for distributed consensus-based spectrum sensing in cognitive radio networks.
- [INFOCOM 2012] BitTrickle: Defending against broadband and high-power reactive jamming attacks.
- [INFOCOM 2012] A formal analysis of IEEE 802.11w deadlock vulnerabilities.
- [INFOCOM 2012] Detection and prevention of SIP flooding attacks in voice over IP networks.
- [INFOCOM 2012] SybilDefender: Defend against sybil attacks in large social networks.
- [INFOCOM 2012] A novel network delay based side-channel attack: Modeling and defense.
- [INFOCOM 2012] Can we beat legitimate cyber behavior mimicking attacks from botnets?
- [INFOCOM 2013] Fast and secure rendezvous protocols for mitigating control channel DoS attacks.
- [INFOCOM 2013] An optimized design of reconfigurable PSD accelerator for online shrew DDoS attacks detection.
- [INFOCOM 2013] Cardinality change-based early detection of large-scale cyber-attacks.
- [INFOCOM 2013] A traceback attack on Freenet.
- [INFOCOM 2013] On the security vulnerabilities of the virtual force approach to mobile sensor deployment.
- [INFOCOM 2013] Rejecting the attack: Source authentication for Wi-Fi management frames using CSI Information.
- [INFOCOM 2013] Location privacy in database-driven Cognitive Radio Networks: Attacks and countermeasures.
- [INFOCOM 2013] Analysis on perfect location spoofing attacks using beamforming.
- [INFOCOM 2013] A novel method to detect bad data injection attack in smart grid.
- [INFOCOM 2014] DAWN: Defending against wormhole attacks in wireless network coding systems.
- [INFOCOM 2014] Security vulnerability and countermeasures of frequency offset correction in 802.11a systems.
- [INFOCOM 2014] Information leaks out: Attacks and countermeasures on compressive data gathering in wireless sensor networks.
- [INFOCOM 2014] Greenbench: A benchmark for observing power grid vulnerability under data-centric threats.
- [INFOCOM 2014] Power grid vulnerability to geographically correlated failures - Analysis and control implications.
- [INFOCOM 2015] Detecting distributed signature-based intrusion: The case of multi-path routing attacks.
- [INFOCOM 2015] JITScope: Protecting web users from control-flow hijacking attacks.
- [INFOCOM 2015] Agile virtualized infrastructure to proactively defend against cyber attacks.
- [INFOCOM 2015] Adversary-aware IP address randomization for proactive agility against sophisticated attackers.
- [INFOCOM 2015] Rate alteration attacks in smart grid.
- [INFOCOM 2015] Assessing attack vulnerability in networks with uncertainty.
- [INFOCOM 2016] Jamming attack on in-band full-duplex communications: Detection and countermeasures.
- [INFOCOM 2016] DDoS attack detection under SDN context.
- [INFOCOM 2016] On applying fault detectors against false data injection attacks in cyber-physical control systems.
- [INFOCOM 2016] A novel framework for modeling and mitigating distributed link flooding attacks.
- [INFOCOM 2017] Malicious co-residency on the cloud: Attacks and defense.
- [INFOCOM 2017] FloodDefender: Protecting data and control plane resources under SDN-aimed DoS attacks.
- [INFOCOM 2017] DDoS attack on cloud auto-scaling mechanisms.
- [INFOCOM 2017] Electric grid power flow model camouflage against topology leaking attacks.
- [INFOCOM 2017] Large-scale invisible attack on AFC systems with NFC-equipped smartphones.
- [INFOCOM 2018] FlowCloak: Defeating Middlebox-Bypass Attacks in Software-Defined Networking.
- [INFOCOM 2018] Off-sensing and Route Manipulation Attack: A Cross-Layer Attack in Cognitive Radio based Wireless Mesh Networks.
- [INFOCOM 2018] A Novel Graph-based Mechanism for Identifying Traffic Vulnerabilities in Smart Home IoT.
- [INFOCOM 2018] Walls Have Ears: Traffic-based Side-channel Attack in Video Streaming.
- [INFOCOM 2018] Game Theoretic Characterization of Collusive Behavior Among Attackers.
- [INFOCOM 2019] Hide and Seek: A Defense Against Off-sensing Attack in Cognitive Radio Networks.
- [INFOCOM 2019] Corking by Forking: Vulnerability Analysis of Blockchain.
- [INFOCOM 2019] CoDoC: A Novel Attack for Wireless Rechargeable Sensor Networks through Denial of Charge.
- [INFOCOM 2019] Collaborative Client-Side DNS Cache Poisoning Attack.
- [INFOCOM 2019] Orthogonality-Sabotaging Attacks against OFDMA-based Wireless Networks.
- [INFOCOM 2019] On User Selective Eavesdropping Attacks in MU-MIMO: CSI Forgery and Countermeasure.
- [INFOCOM 2020] Stealthy DGoS Attack: DeGrading of Service under the Watch of Network Tomography.
- [INFOCOM 2020] Voiceprint Mimicry Attack Towards Speaker Verification System in Smart Home.
- [INFOCOM 2020] Flow Table Security in SDN: Adversarial Reconnaissance and Intelligent Attacks.
- [INFOCOM 2020] Synergetic Denial-of-Service Attacks and Defense in Underwater Named Data Networking.
- [INFOCOM 2020] ROBin: Known-Plaintext Attack Resistant Orthogonal Blinding via Channel Randomization.
- [INFOCOM 2020] Threats of Adversarial Attacks in DNN-Based Modulation Recognition.
- [INFOCOM 2020] ZeroWall: Detecting Zero-Day Web Attacks through Encoder-Decoder Recurrent Neural Networks.
- [INFOCOM 2020] Machine Learning-based Spoofing Attack Detection in MmWave 60GHz IEEE 802.11ad Networks.
- [INFOCOM 2021] Tornadoes In The Cloud: Worst-Case Attacks on Distributed Resources Systems.
- [INFOCOM 2021] Attack Resilience of Cache Replacement Policies.
- [INFOCOM 2021] Code is the (F)Law: Demystifying and Mitigating Blockchain Inconsistency Attacks Caused by Software Bugs.
- [INFOCOM 2021] Launching Smart Selective Jamming Attacks in WirelessHART Networks.
- [INFOCOM 2021] Your Home is Insecure: Practical Attacks on Wireless Home Alarm Systems.
- [INFOCOM 2021] Invisible Poison: A Blackbox Clean Label Backdoor Attack to Deep Neural Networks.
- [INFOCOM 2022] Physical-World Attack towards WiFi-based Behavior Recognition.
- [INFOCOM 2022] Protect Privacy from Gradient Leakage Attack in Federated Learning.
- [INFOCOM 2022] Poisoning Attacks on Deep Learning based Wireless Traffic Prediction.
- [INFOCOM 2022] Connectivity Maintenance in Uncertain Networks under Adversarial Attack.
- [INFOCOM 2022] PhoneyTalker: An Out-of-the-Box Toolkit for Adversarial Example Attack on Speaker Recognition.
- [INFOCOM 2022] TrojanFlow: A Neural Backdoor Attack to Deep Learning-based Network Traffic Classifiers.
- [INFOCOM 2022] Vehicle-to-Nothing? Securing C-V2X Against Protocol-Aware DoS Attacks.
- [INFOCOM 2023] Expelliarmus: Command Cancellation Attacks on Smartphones using Electromagnetic Interference.
- [INFOCOM 2023] Your Locations May Be Lies: Selective-PRS-Spoofing Attacks and Defence on 5G NR Positioning Systems.
- [INFOCOM 2023] Universal Targeted Adversarial Attacks Against mmWave-based Human Activity Recognition.
- [INFOCOM 2023] FeatureSpy: Detecting Learning-Content Attacks via Feature Inspection in Secure Deduplicated Storage.
- [INFOCOM 2023] Spotting Deep Neural Network Vulnerabilities in Mobile Traffic Forecasting with an Explainable AI Lens.
- [INFOCOM 2023] Secure Device Trust Bootstrapping Against Collaborative Signal Modification Attacks.
- [INFOCOM 2023] How to Attack and Congest Delay-Sensitive Applications on the Cloud.
- [INFOCOM 2023] Mixup Training for Generative Models to Defend Membership Inference Attacks.
- [INFOCOM 2023] De-anonymization Attacks on Metaverse.
- [INFOCOM 2023] Fast Generation-Based Gradient Leakage Attacks against Highly Compressed Gradients.
- [INFOCOM 2023] Mind Your Heart: Stealthy Backdoor Attack on Dynamic Deep Neural Network in Edge Computing.
- [INFOCOM 2024] A De-anonymization Attack against Downloaders in Freenet.
- [INFOCOM 2024] Det-RAN: Data-Driven Cross-Layer Real-Time Attack Detection in 5G Open RANs.
- [INFOCOM 2024] Explanation-Guided Backdoor Attacks on Model-Agnostic RF Fingerprinting.
- [INFOCOM 2024] Exploiting Miscoordination of Microservices in Tandem for Effective DDoS Attacks.
- [INFOCOM 2024] Catch Me if You Can: Effective Honeypot Placement in Dynamic AD Attack Graphs.
- [INFOCOM 2024] PTPsec: Securing the Precision Time Protocol Against Time Delay Attacks Using Cyclic Path Asymmetry Analysis.
- [INFOCOM 2024] Detecting Adversarial Spectrum Attacks via Distance to Decision Boundary Statistics.
- [INFOCOM 2024] Deep Learning Models as Moving Targets to Counter Modulation Classification Attacks.
- [INFOCOM 2024] BLE Location Tracking Attacks by Exploiting Frequency Synthesizer Imperfection.
- [INFOCOM 2025] An Active Identification Overriding Attack Against RFID: Attack Strategy and Defense Design.
- [INFOCOM 2025] Preference Profiling Attacks Against Vertical Federated Learning Over Graph Data.
- [INFOCOM 2025] 5G-Muffler: Covert DoS Attacks over Open Fronthaul Interface of O-RAN 5G Network.
- [INFOCOM 2025] Protocol-Agnostic and Data-Free Backdoor Attacks on Pre-Trained Models in RF Fingerprinting.
- [INFOCOM 2025] SafeLead: Detecting and Excluding Random STS Attack in UWB Ranging System.
- [INFOCOM 2025] VaniKG: Vanishing Key Gradient Attack and Defense for Robust Federated Aggregation.
- [INFOCOM 2025] DroneMA: Drone Mobility Alignment Countering AI-Based Spoofing Attacks.
- [INFOCOM 2025] 5GC-Fuzz: Finding Deep Stateful Vulnerabilities in 5G Core Network with Black-Box Fuzzing.
- [INFOCOM 2025] Channel Access Deterrence Attack: An Attack Against Spectrum Coexistence Between NR-U and Wi-Fi in the 5 GHz Band.
- [NSDI 2013] Effective Straggler Mitigation: Attack of the Clones.
- [NSDI 2018] Inaudible Voice Commands: The Long-Range Attack and Defense.
- [NSDI 2019] CAUDIT: Continuous Auditing of SSH Servers To Mitigate Brute-Force Attacks.
- [NSDI 2023] Exploring Practical Vulnerabilities of Machine Learning-based Wireless Systems.
- [NSDI 2024] Where The Wild Things Are: Brute-Force SSH Attacks In The Wild And How To Stop Them.
- [NSDI 2024] Cloudy with a Chance of Cyberattacks: Dangling Resources Abuse on Cloud Platforms.
- [SENSYS 2013] A robust iterative filtering technique for wireless sensor networks in the presence of malicious attacks.
- [SENSYS 2019] Side channel attack on smartphone sensors to infer gender of the user: poster abstract.
- [SENSYS 2020] Detecting replay attacks against industrial robots via power fingerprinting.
- [SENSYS 2020] How robust are malware detection models for Android smartphones against adversarial attacks?: poster abstract.
- [SENSYS 2020] Mitigating denial-of-service attacks on digital contact tracing: poster abstract.
- [SENSYS 2020] Adversarial attacks on malware detection models for smartphones using reinforcement learning: PhD forum abstract.
- [SENSYS 2020] Mobile application for caregiver in collecting statistical data of BPSD attack focused on macro activities: PhD forum abstract.
- [SENSYS 2021] Adversarial Attacks against LiDAR Semantic Segmentation in Autonomous Driving.
- [SENSYS 2021] Are CNN based Malware Detection Models Robust?: Developing Superior Models using Adversarial Attack and Defense.
- [SENSYS 2021] Large-scale Urban IoT Activity Data for DDoS Attack Emulation.
- [SENSYS 2022] Towards Backdoor Attacks against LiDAR Object Detection in Autonomous Driving.
- [SENSYS 2022] KITE: Exploring the Practical Threat from Acoustic Transduction Attacks on Inertial Sensors.
- [SENSYS 2022] Push the Limit of Adversarial Example Attack on Speaker Recognition in Physical Domain.
- [SENSYS 2022] Smart Contracts Vulnerability Classification through Deep Learning.
- [SENSYS 2023] FingerFaker: Spoofing Attack on COTS Fingerprint Recognition Without Victim’s Knowledge.
- [SENSYS 2023] RIStealth: Practical and Covert Physical-Layer Attack against WiFi-based Intrusion Detection via Reconfigurable Intelligent Surface.
- [SENSYS 2024] An Online Defense against Object-based LiDAR Attacks in Autonomous Driving.
- [SENSYS 2025] SecureGaze: Defending Gaze Estimation Against Backdoor Attacks.
- [SENSYS 2025] Optimizing IoT Cross-rule Vulnerability Detection through Reinforcement Learning-Based Fuzzing.
- [SENSYS 2025] Poster Abstract: Time Attacks using Kernel Vulnerabilities.
- [SENSYS 2025] Poster Abstract: Mobile Vision Dynamic Layer Dropping against Adversarial Attacks.
- [CONEXT 2010] Assessing the vulnerability of replicated network services.
- [CONEXT 2013] CoDef: collaborative defense against large-scale link-flooding attacks.
- [CONEXT 2018] Stellar: network attack mitigation using advanced blackholing.
- [CONEXT 2019] Tuple space explosion: a denial-of-service attack against a software packet classifier.
- [CONEXT 2020] Return of version downgrade attack in the era of TLS 1.3.
- [CONEXT 2020] You do (not) belong here: detecting DPI evasion attacks with context learning.
- [SECON 2010] Designing Localization Algorithms Robust to Signal Strength Attacks.
- [SECON 2011] Trade-offs of source location protection in globally attacked sensor networks: A case analysis.
- [SECON 2011] Making DTNs robust against spoofing attacks with localized countermeasures.
- [SECON 2011] Coping with packet replay attacks in wireless networks.
- [SECON 2012] Integrated detection and mitigation of pollution attack in wireless network coding: Physical layer approach.
- [SECON 2012] Split Null Keys: A null space based defense for pollution attacks in wireless network coding.
- [SECON 2012] Seed and Grow: An attack against anonymized social networks.
- [SECON 2014] GlobalTrust: An attack-resilient reputation system for tactical networks.
- [SECON 2016] Arpeggio: A Penetration Attack on Glossy Networks.
- [SECON 2016] CAE: Collusion Attack Emulator for Privacy-Preserving Data Aggregation Schemes.
- [SECON 2016] Counteracting Denial-of-Sleep Attacks in Wake-Up-Radio-Based Sensing Systems.
- [SECON 2017] Beyond K-Anonymity: Protect Your Trajectory from Semantic Attack.
- [SECON 2018] Frame-Selective Wireless Attack Using Deep-Learning-Based Length Prediction.
- [SECON 2018] Spoofing Attack Detection Using Physical Layer Information in Cross-Technology Communication.
- [SECON 2018] Recipient-Oriented Transaction for Preventing Double Spending Attacks in Private Blockchain.
- [SECON 2019] Real Time Attack Detection with Deep Learning.
- [SECON 2021] A Context-aware Black-box Adversarial Attack for Deep Driving Maneuver Classification Models.
- [SECON 2021] Wi-attack: Cross-technology Impersonation Attack against iBeacon Services.
- [SECON 2021] BIoTA: Control-Aware Attack Analytics for Building Internet of Things.
- [SECON 2022] WiCAM: Imperceptible Adversarial Attack on Deep Learning based WiFi Sensing.
- [SECON 2022] On-Demand or On-Premises: Online Mitigation of DDoS Attacks via Cloud-Edge Coordination.
- [SECON 2022] FedMix: A Sybil Attack Detection System Considering Cross-layer Information Fusion and Privacy Protection.
- [SECON 2023] VagueGAN: A GAN-Based Data Poisoning Attack Against Federated Learning Systems.
- [IPSN 2023] PhD Forum Abstract: DDoS attack detection in IoT systems using Neural Networks.
- [MOBISYS 2016] Targeted Mimicry Attacks on Touch Input Based Implicit Authentication Schemes.
- [MOBISYS 2017] Poster: Towards Quick Angular Check to Rebuff Forged Position Attacks in Vehicular Communication.
- [MOBISYS 2017] System Service Call-oriented Symbolic Execution of Android Framework with Applications to Vulnerability Discovery and Exploit Generation.
- [MOBISYS 2018] Augmented Reality-based Mimicry Attacks on Behaviour-Based Smartphone Authentication.
- [MOBISYS 2019] Understanding Fileless Attacks on Linux-based IoT Devices with HoneyCloud.
- [MOBISYS 2020] SmokeBomb: effective mitigation against cache side-channel attacks on the ARM architecture.
- [MOBISYS 2020] BlueDoor: breaking the secure information flow via BLE vulnerability.
- [MOBISYS 2022] Universal targeted attacks against mmWave-based human activity recognition system.
- [MOBISYS 2022] Speech privacy attack via vibrations from room objects leveraging a phased-MIMO radar.
- [MOBISYS 2023] EchoAttack: Practical Inaudible Attacks To Smart Earbuds.
- [MOBISYS 2023] Demo: Exploiting Indices for Man-in-the-Middle Attacks on Collaborative Unpooling Autoencoders.
- [MOBISYS 2024] RefreshChannels: Exploiting Dynamic Refresh Rate Switching for Mobile Device Attacks.
- [MOBISYS 2024] Poster: Hybrid Detection Mechanism for Spoofing Attacks in Bluetooth Low Energy Networks.
- [ICNP 2013] Eliminating network protocol vulnerabilities through abstraction and systems language design.
- [ICNP 2014] DDoS Attack Protection in the Era of Cloud Computing and Software-Defined Networking.
- [ICNP 2014] The Shape and Size of Threats: Defining a Networked System’s Attack Surface.
- [ICNP 2014] Vulnerabilities of RFID Security Protocol Based on Chaotic Maps.
- [ICNP 2015] A Practical System for Guaranteed Access in the Presence of DDoS Attacks and Flash Crowds.
- [ICNP 2017] Multipath TCP traffic diversion attacks and countermeasures.
- [ICNP 2017] Investigating the impact of cache pollution attacks in heterogeneous cellular networks.
- [ICNP 2018] JamCloak: Reactive Jamming Attack over Cross-Technology Communication Links.
- [ICNP 2018] Kiram and WOE: Distributed Denial of Service Attacks in Named-Data Networking.
- [ICNP 2019] Defending Web Servers Against Flash Crowd Attacks.
- [ICNP 2021] Detecting Network Attacks using Federated Learning for IoT Devices.
- [ICNP 2021] Advertising DNS Protocol Use to Mitigate DDoS Attacks.
- [ICNP 2023] Efficient Attack Detection with Multi-Latency Neural Models on Heterogeneous Network Devices.
- [ICNP 2024] E-DDoS: An Evaluation System for DDoS Attack Detection.
- [ICNP 2024] Detecting Attacks at Switching Speed: Ai/Ml and Active Learning for in-Network Monitoring in Data Planes.
- [ICNP 2024] Envisioning a Unified Programmable Dataplane to Monitor Slow Attacks.
- [ICNP 2024] Infiltrating the Sky: Data Delay and Overflow Attacks in Earth Observation Constellations.
- [ICNP 2024] DoS-Dam: a Hierarchical Method for Identifying and Mitigating DDoS Attacks in High-Speed Network Traffic.
- [MOBIHOC 2015] Mitigating Rate Attacks through Crypto-Coded Modulation.
- [MOBIHOC 2016] Analog man-in-the-middle attack against link-based packet source identification.
- [MOBIHOC 2016] Rate maximization under reactive jamming attacks: poster.
- [MOBIHOC 2017] CSIsnoop: Attacker Inference of Channel State Information in Multi-User WLANs.
- [MOBIHOC 2018] Towards Data Poisoning Attacks in Crowd Sensing Systems.
- [MOBIHOC 2019] Jam Sessions: Analysis and Experimental Evaluation of Advanced Jamming Attacks in MIMO Networks.
- [MOBIHOC 2021] Man-in-the-Middle Attack Resistant Secret Key Generation via Channel Randomization.
- [MOBIHOC 2023] Poster: Efficient Exploration of Automotive Ranging Sensor Attacks.
- [NOSSDAV 2010] RTP-miner: a real-time security framework for RTP fuzzing attacks.
- [IWQOS 2010] SPoIM: A close look at pollution attacks in P2P live streaming.
- [IWQOS 2011] Identity attack and anonymity protection for P2P-VoD systems.
- [IWQOS 2011] Thwarting Spam over Internet Telephony (SPIT) attacks on VoIP networks.
- [IWQOS 2012] Understanding the impact of Denial of Service attacks on Virtual Machines.
- [IWQOS 2015] Hamburger attack: A collusion attack against privacy-preserving data aggregation schemes.
- [IWQOS 2016] The detection of physical attacks against iBeacon transmitters.
- [IWQOS 2019] Secure indoor positioning against signal strength attacks via optimized multi-voting.
- [IWQOS 2019] ATMPA: attacking machine learning-based malware visualization detection methods via adversarial examples.
- [IWQOS 2019] A game theoretic analysis on block withholding attacks using the zero-determinant strategy.
- [IWQOS 2021] Revisiting Double-Spending Attacks on the Bitcoin Blockchain: New Findings.
- [IWQOS 2022] DoCile: Taming Denial-of-Capability Attacks in Inter-Domain Communications.
- [IWQOS 2023] Energy Drain Attack in Satellite Internet Constellations.
- [IWQOS 2023] Vulnerabilities and Attacks of Inter-device Coordination in Programmable Networks.
- [IWQOS 2023] Improving Precision of Detecting Deserialization Vulnerabilities with Bytecode Analysis.
- [IWQOS 2023] In-band Network Telemetry Manipulation Attacks and Countermeasures in Programmable Networks.
- [IWQOS 2024] A Horizontal Study on the Mixed IPID Assignment Vulnerability in the Linux Ecosystem.
- [IWQOS 2024] FedTrojan: Corrupting Federated Learning via Zero-Knowledge Federated Trojan Attacks.
- [IWQOS 2024] StarMaze: Ring-based Attack in Satellite Internet Constellations.
- [IMC 2014] Taming the 800 Pound Gorilla: The Rise and Decline of NTP DDoS Attacks.
- [IMC 2014] DNSSEC and its potential for DDoS attacks: a comprehensive measurement study.
- [IMC 2015] Resilience of Deployed TCP to Blind Attacks.
- [IMC 2015] The Doppelgänger Bot Attack: Exploring Identity Impersonation in Online Social Networks.
- [IMC 2015] The Dark Menace: Characterizing Network-based Attacks in the Cloud.
- [IMC 2017] Millions of targets under attack: a macroscopic characterization of the DoS ecosystem.
- [IMC 2018] A First Joint Look at DoS Attacks and BGP Blackholing in the Wild.
- [IMC 2019] Booting the Booters: Evaluating the Effects of Police Interventions in the Market for Denial-of-Service Attacks.
- [IMC 2019] Errors, Misunderstandings, and Attacks: Analyzing the Crowdsourcing Process of Ad-blocking Systems.
- [IMC 2019] What You See is NOT What You Get: Discovering and Tracking Social Engineering Attack Campaigns.
- [IMC 2020] Five Alarms: Assessing the Vulnerability of US Cellular Communication Infrastructure to Wildfires.
- [IMC 2021] Open for hire: attack trends and misconfiguration pitfalls of IoT devices.
- [IMC 2021] TsuNAME: exploiting misconfiguration and vulnerability to DDoS DNS.
- [IMC 2021] The far side of DNS amplification: tracing the DDoS attack ecosystem from the internet core.
- [IMC 2022] Investigating the impact of DDoS attacks on DNS infrastructure.
- [IMC 2022] The ukrainian internet under attack: an NDT perspective.
- [IMC 2022] No keys to the kingdom required: a comprehensive investigation of missing authentication vulnerabilities in the wild.
- [IMC 2022] SPFail: discovering, measuring, and remediating vulnerabilities in email sender validation.
- [IMC 2022] Demystifying the presence of cellular network attacks and misbehaviors.
- [IMC 2022] How DRDoS attacks vary across the globe?
- [IMC 2023] Phishing in the Free Waters: A Study of Phishing Attacks Created using Free Website Building Services.
- [IMC 2023] Cloud Watching: Understanding Attacks Against Cloud-Hosted Services.
- [IMC 2024] Poster: Investigating Network Security Post-Outage: Open Ports Vulnerabilities.
- [ANCS 2012] MCA2: multi-core architecture for mitigating complexity attacks.
- [ANCS 2013] Automated signature extraction for high volume attacks.
- [ANCS 2015] Resistance Against Brute-Force Attacks on Stateless Forwarding in Information Centric Networking.
- [ANCS 2017] An Attack-Resilient Source Authentication Protocol in Controller Area Network.
- [ANCS 2018] LAMP: prompt layer 7 attack mitigation with programmable data planes.
- [ANCS 2019] Accelerated DDoS Attacks Mitigation using Programmable Data Plane.
- [ANCS 2021] Mitigation of IPv6 Router Spoofing Attacks with P4.
- [APNOMS 2011] Automatic attack detection and correction system development.
- [APNOMS 2012] DDoS attack forecasting system architecture using Honeynet.
- [APNOMS 2013] A cost-effective approach to evaluating security vulnerability scanner.
- [APNOMS 2015] Automatic detection of vulnerabilities for advanced security analytics.
- [APNOMS 2015] Defense technique against spoofing attacks using reliable ARP table in cloud computing environment.
- [APNOMS 2016] Crowdsourcing platform for collaboration management in vulnerability verification.
- [APNOMS 2016] Mitigating DDoS attacks towards Top Level Domain name service.
- [APNOMS 2017] Collaborative security attack detection in software-defined vehicular networks.
- [APNOMS 2017] Could we beat a new mimicking attack?
- [APNOMS 2019] DDoS Attack Detection on Bitcoin Ecosystem using Deep-Learning.
- [APNOMS 2019] Hybrid Controller for Securing SDN from Switched DDoS and ARP Poisoning Attacks.
- [APNOMS 2020] Mitigating SYN flooding Attack and ARP Spoofing in SDN Data Plane.
- [APNOMS 2020] A Light-weight Mitigation Scheme on the Mole Content Poisoning Attack in NDN.
- [APNOMS 2020] Improving Performance of Collaborative Source-Side DDoS Attack Detection.
- [APNOMS 2020] IPv6 DoS Attacks Detection Using Machine Learning Enhanced IDS in SDN/NFV Environment.
- [APNOMS 2022] Mitigating New-Flow Attack with SDNSnapshot in P4-based SDN.
- [APNOMS 2022] DDoS Attack Detection Combining Time Series-based Multi-dimensional Sketch and Machine Learning.
- [APNOMS 2022] HDS: A Hierarchical Scheme for Accurate and Efficient DDoS Flooding Attack Detection.
- [APNOMS 2022] A machine learning based approach for the detection of sybil attacks in C-ITS.
- [APNOMS 2022] Detecting Crossfire-Attack Hosts in Search Phase.
- [APNOMS 2023] Machine Learning-based Approach for Enhancing Multi-step Attack Prediction.
- [APNOMS 2023] Cooperative Spectrum Sensing Method against Spectrum Sensing Data Falsification Attack.
- [APNOMS 2023] Analyzing the Effect of Observer Node Addition Strategy on Bitcoin Double-Spending Attack Detection Using Graph Neural Network.
- [APNOMS 2023] A Honey-imprint enabled Approach for Resisting Social Engineering Attacks.
- [FORTE 2014] Denial-of-Service Security Attack in the Continuous-Time World.
- [FORTE 2023] Impact Analysis of Coordinated Cyber-Physical Attacks via Statistical Model Checking: A Case Study.
- [LCN 2010] The rise and fall of the AODV protocol: A testbed study on practical routing attacks.
- [LCN 2010] Lightweight DDoS flooding attack detection using NOX/OpenFlow.
- [LCN 2011] PFS: Probabilistic filter scheduling against distributed denial-of-service attacks.
- [LCN 2011] Flooding attacks detection in traffic of backbone networks.
- [LCN 2011] A study on path behavior characteristics of IPv6 based reflector attacks.
- [LCN 2012] 3DSVAT: A 3D Stereoscopic Vulnerability Assessment Tool for network security.
- [LCN 2012] LT-OLSR: Attack-tolerant OLSR against link spoofing.
- [LCN 2012] Protecting IEEE 802.11s wireless mesh networks against insider attacks.
- [LCN 2012] Novel assessment metric and countermeasures for traffic attack threats in wireless sensor networks.
- [LCN 2013] Detecting heap-spray attacks in drive-by downloads: Giving attackers a hand.
- [LCN 2013] Security analysis of a protocol for pollution attack detection.
- [LCN 2013] Poseidon: Mitigating interest flooding DDoS attacks in Named Data Networking.
- [LCN 2014] Measuring the impact of denial-of-service attacks on wireless sensor networks.
- [LCN 2014] Unleashing the shrew: a stealth greedy targeted attack on TCP traffic in wireless LANs.
- [LCN 2015] ELDA: Towards efficient and lightweight detection of cache pollution attacks in NDN.
- [LCN 2015] Viterbi algorithm for detecting DDoS attacks.
- [LCN 2015] A reputation-based method for detection of attacks in Virtual Coordinate based Wireless Sensor Networks.
- [LCN 2016] The Early Bird Gets the Botnet: A Markov Chain Based Early Warning System for Botnet Attacks.
- [LCN 2016] Fragmentation-Based Multipath Routing for Attack Resilience in Software Defined Networks.
- [LCN 2016] Mitigating Crossfire Attacks Using SDN-Based Moving Target Defense.
- [LCN 2017] Lightweight Detection of Denial-of-Service Attacks on Wireless Sensor Networks Revisited.
- [LCN 2018] Mitigating Suppression Attack in Multicast Protocol for Low Power and Lossy Networks.
- [LCN 2018] An SDN-based Approach For Defending Against Reflective DDoS Attacks.
- [LCN 2018] Gargoyle: A Network-based Insider Attack Resilient Framework for Organizations.
- [LCN 2019] An Attack Behaviors Prediction Model Based on Bag Representation in Time Series.
- [LCN 2020] SCAN: Smart Collaborative Attack in Named Data Networking.
- [LCN 2020] Cloud-based Deception against Network Reconnaissance Attacks using SDN and NFV.
- [LCN 2021] SecGrid: a Visual System for the Analysis and ML-based Classification of Cyberattack Traffic.
- [LCN 2021] Protecting Software-Defined Enterprise Networks from Packet Injection Attacks.
- [LCN 2021] ICN PATTA: ICN Privacy Attack Through Traffic Analysis.
- [LCN 2021] Securing Software-Defined Vehicular Network Architecture against DDoS attack.
- [LCN 2022] HollywooDDoS: Detecting Volumetric Attacks in Moving Images of Network Traffic.
- [LCN 2022] Network Attacks Against Marine Radar Systems: A Taxonomy, Simulation Environment, and Dataset.
- [LCN 2022] Inline Traffic Analysis Attacks on DNS over HTTPS.
- [LCN 2023] Measurement Based Evaluation and Mitigation of Flood Attacks on a LAN Test-Bed.
- [LCN 2023] Electronic Attacks as a Cyber False Flag against Maritime Radars Systems.
- [GLOBECOM 2010] Rethinking about Type-Flaw Attacks.
- [GLOBECOM 2010] Practical Defenses for Evil Twin Attacks in 802.11.
- [GLOBECOM 2010] SinPack: A Security Protocol for Preventing Pollution Attacks in Network-Coded Content Distribution Networks.
- [GLOBECOM 2010] A Distributed Multi-Target Software Vulnerability Discovery and Analysis Infrastructure for Smart Phones.
- [GLOBECOM 2010] Coping with Traitor Attacks in Reputation Models for Wireless Sensor Networks.
- [GLOBECOM 2010] Optimal Defense against Jamming Attacks in Cognitive Radio Networks Using the Markov Decision Process Approach.
- [GLOBECOM 2010] Denial of Service Attacks in Cognitive Radio Networks through Channel Eviction Triggering.
- [GLOBECOM 2010] Robust Spectrum Decision Protocol against Primary User Emulation Attacks in Dynamic Spectrum Access Networks.
- [GLOBECOM 2010] Cross-Layer Attack and Defense in Cognitive Radio Networks.
- [GLOBECOM 2010] Detection of Resource-Drained Attacks on SIP-Based Wireless VoIP Networks.
- [GLOBECOM 2010] SKWeak Attacks on Path Splicing: Vulnerability Assessment and Defense Mechanisms.
- [GLOBECOM 2010] Selective Cross Correlation in Passive Timing Analysis Attacks against Low-Latency Mixes.
- [GLOBECOM 2010] A2C: Anti-Attack Counters for Traffic Measurement.
- [GLOBECOM 2010] Risk-Aware Response for Mitigating MANET Routing Attacks.
- [GLOBECOM 2010] Performance Analysis of Dynamic Spectrum Access Networks under Primary User Emulation Attacks.
- [GLOBECOM 2010] An Implementation Scheme of Flow-Net and Its Applications on Detecting Attacks in Wireless Networks.
- [GLOBECOM 2010] Location Spoofing Attack Detection in Wireless Networks.
- [GLOBECOM 2010] Defending Resource Depletion Attacks on Implantable Medical Devices.
- [GLOBECOM 2010] Attack-Resistant Collaboration in Wireless Video Streaming Social Networks.
- [GLOBECOM 2010] MCC: Mitigating Colluding Collision Attacks in Wireless Sensor Networks.
- [GLOBECOM 2010] A Graph-Theoretic QoS-Aware Vulnerability Assessment for Network Topologies.
- [GLOBECOM 2011] Risk-Aware Attacks and Catastrophic Cascading Failures in U.S. Power Grid.
- [GLOBECOM 2011] Stable Topology Support for Tracing DDoS Attackers in MANET.
- [GLOBECOM 2011] Stochastic Strategic Routing Reduces Attack Effects.
- [GLOBECOM 2011] Mitigating DDoS Attacks Using Protection Nodes in Mobile Ad Hoc Networks.
- [GLOBECOM 2011] Using Sybil Identities for Primary User Emulation and Byzantine Attacks in DSA Networks.
- [GLOBECOM 2011] Security Vulnerability Due to Channel Aggregation/Bonding in LTE and HSPA+ Network.
- [GLOBECOM 2011] Cooperative Sybil Attack Detection for Position Based Applications in Privacy Preserved VANETs.
- [GLOBECOM 2011] MIRA: Misleading Routing Attack in Mobile Ad-Hoc Networks.
- [GLOBECOM 2011] Intentional Attack and Fusion-Based Defense Strategy in Complex Networks.
- [GLOBECOM 2011] Detecting Primary User Emulation Attack in Cognitive Radio Networks.
- [GLOBECOM 2011] A Distributed Cooperative Attack on the Multi-Channel Spectrum Sensing: A Coalitional Game Study.
- [GLOBECOM 2011] Evaluation of Security Vulnerabilities by Using ProtoGENI as a Launchpad.
- [GLOBECOM 2011] Examining Social Dynamics for Countering Botnet Attacks.
- [GLOBECOM 2011] On a Hierarchical False Data Injection Attack on Power System State Estimation.
- [GLOBECOM 2012] Enhanced security of random seed DSSS algorithms against seed jamming attacks.
- [GLOBECOM 2012] Real-world sybil attacks in BitTorrent mainline DHT.
- [GLOBECOM 2012] IRONSIDES: DNS with no single-packet denial of service or remote code execution vulnerabilities.
- [GLOBECOM 2012] Load distribution vector based attack strategies against power grid systems.
- [GLOBECOM 2012] Thwarting Diversity Attacks in wireless network coding using threshold signatures and a sender-centered approach.
- [GLOBECOM 2012] DDoS attack on WAVE-enabled VANET through synchronization.
- [GLOBECOM 2012] Finding out the liars: Fighting against false channel information exchange attacks in cognitive radio ad hoc networks.
- [GLOBECOM 2012] Performance evaluation of security routing strategies to avoid DoS attacks in WSN.
- [GLOBECOM 2012] Attack against electricity market-attacker and defender gaming.
- [GLOBECOM 2012] False data injection attacks with incomplete information against smart power grids.
- [GLOBECOM 2013] Mitigating Misleading Routing Attack using path signature in Mobile Ad-Hoc Networks.
- [GLOBECOM 2013] A density based scheme to countermeasure spectrum sensing data falsification attacks in cognitive radio networks.
- [GLOBECOM 2013] Connectivity of multi-channel wireless networks under jamming attacks.
- [GLOBECOM 2013] Thwarting traceback attack on Freenet.
- [GLOBECOM 2013] Using randomized routing to counter routing table insertion attack on Freenet.
- [GLOBECOM 2013] On false data injection attack against Multistep Electricity Price in electricity market in smart grid.
- [GLOBECOM 2013] Mitigating False-data Injection Attacks on DC State Estimation using Covert Topological Information.
- [GLOBECOM 2013] False-data injection attack to control real-time price in electricity market.
- [GLOBECOM 2013] Combating network pollution attacks: A cascaded error-control coding approach.
- [GLOBECOM 2013] RE-NOTE: An E-voting scheme based on ring signature and clash attack protection.
- [GLOBECOM 2013] DS3: A Dynamic and Smart Spectrum Sensing Technique for Cognitive Radio Networks under denial of service attack.
- [GLOBECOM 2013] Mitigating congestion-based denial of service attacks with active queue management.
- [GLOBECOM 2013] Network vulnerability assessment under cascading failures.
- [GLOBECOM 2013] Secret key agreement under an active attack in MU-TDD systems with large antenna arrays.
- [GLOBECOM 2013] Detecting substitution attacks against non-colluding relays.
- [GLOBECOM 2013] A decisional attack to privacy-friendly data aggregation in Smart Grids.
- [GLOBECOM 2013] Mitigating primary user emulation attacks in cognitive radio networks using advanced encryption standard.
- [GLOBECOM 2014] A frequency hopping algorithm against jamming attacks under asynchronous environments.
- [GLOBECOM 2014] Exploiting channel-aware reputation system against selective forwarding attacks in WSNs.
- [GLOBECOM 2014] Too big or too small? The PTB-PTS ICMP-based attack against IPsec gateways.
- [GLOBECOM 2014] Implications and detection of DoS attacks in OpenFlow-based networks.
- [GLOBECOM 2014] LPAttack: Leverage point attacks against state estimation in smart grid.
- [GLOBECOM 2014] Coordinated attacks against substations and transmission lines in power grids.
- [GLOBECOM 2014] Modeling Leechers attack in BitTorrent.
- [GLOBECOM 2014] Resilience of LTE networks against smart jamming attacks.
- [GLOBECOM 2014] Mitigating malicious attacks using Bayesian nonparametric clustering in collaborative cognitive radio networks.
- [GLOBECOM 2014] Channel detecting jamming attacks on symmetric blind rendezvous algorithms for cognitive radio networks.
- [GLOBECOM 2014] Analyzing mobile phone vulnerabilities caused by camera.
- [GLOBECOM 2014] Modeling and verification tools for jamming attacks in VANETs.
- [GLOBECOM 2015] A Revisit of DNS Kaminsky Cache Poisoning Attacks.
- [GLOBECOM 2015] A Lightweight DDoS Flooding Attack Detection Algorithm Based on Synchronous Long Flows.
- [GLOBECOM 2015] Smart Grid Vulnerability under Cascade-Based Sequential Line-Switching Attacks.
- [GLOBECOM 2015] Performance Analysis of Secondary Users in the Presence of Attackers in Cognitive Radio Networks.
- [GLOBECOM 2015] Using CAPTCHA Selectively to Mitigate HTTP-Based Attacks.
- [GLOBECOM 2015] Haddle: A Framework for Investigating Data Leakage Attacks in Hadoop.
- [GLOBECOM 2015] Reliable Communications over Multihop Networks under Routing Attacks.
- [GLOBECOM 2015] Robust Consensus-Based Cooperative Spectrum Sensing under Insistent Spectrum Sensing Data Falsification Attacks.
- [GLOBECOM 2015] Clustering-Based Mitigation of Anonymity Attacks in Wireless Sensor Networks.
- [GLOBECOM 2015] Incentive Attack Prevention for Collaborative Spectrum Sensing: A Peer-Prediction Method.
- [GLOBECOM 2015] Robustness of Biologically Inspired Pulse-Coupled Synchronization against Static Attacks.
- [GLOBECOM 2015] Efficient Collaborative Spectrum Sensing under the Smart Primary User Emulation Attacker Network.
- [GLOBECOM 2016] A Novel Interest Flooding Attacks Detection and Countermeasure Scheme in NDN.
- [GLOBECOM 2016] A Traffic Based Lightweight Attack Detection Scheme for VoLTE.
- [GLOBECOM 2016] Analysis of the Spreading Influence Variations for Online Social Users under Attacks.
- [GLOBECOM 2016] Fingerprinting OpenFlow Controllers: The First Step to Attack an SDN Control Plane.
- [GLOBECOM 2016] How to Detect Cyber-Attacks in Unmanned Aerial Vehicles Network?
- [GLOBECOM 2016] Mitigating Primary Emulation Attacks in Multi-Channel Cognitive Radio Networks: A Surveillance Game.
- [GLOBECOM 2016] Physical Layer Secure Information Exchange Protocol for MIMO Ad Hoc Networks against Passive Attacks.
- [GLOBECOM 2016] Pilot Contamination Attack Detection by Key-Confirmation in Secure MIMO Systems.
- [GLOBECOM 2016] Self-Organized SDN Controller Cluster Conformations against DDoS Attacks Effects.
- [GLOBECOM 2016] Silent Battery Draining Attack against Android Systems by Subverting Doze Mode.
- [GLOBECOM 2016] Smart Attacks on the Integrity of the Internet of Things: Avoiding Detection by Employing Game Theory.
- [GLOBECOM 2016] Stochastic Geometry Analysis of Reference Signal Spoofing Attack in Wireless Cellular Networks.
- [GLOBECOM 2016] You Cannot Sense My PINs: A Side-Channel Attack Deterrent Solution Based on Haptic Feedback on Touch-Enabled Devices.
- [GLOBECOM 2017] A Novel Traceroute-Based Detection Scheme for Wi-Fi Evil Twin Attacks.
- [GLOBECOM 2017] Modeling a Traffic Remapping Attack Game in a Multi-Hop Ad Hoc Network.
- [GLOBECOM 2017] Positioning Helper Nodes to Improve Robustness of Wireless Mesh Networks to Jamming Attacks.
- [GLOBECOM 2017] How to Notify a Vulnerability to the Right Person? Case Study: In an ISP Scope.
- [GLOBECOM 2017] Time Series Analysis for Jamming Attack Detection in Wireless Networks.
- [GLOBECOM 2017] Physical Malicious Attacks Detection in AF Relaying Systems with Unreliable CSI.
- [GLOBECOM 2017] FADM: DDoS Flooding Attack Detection and Mitigation System in Software-Defined Networking.
- [GLOBECOM 2017] Impact of Off-Sensing Attacks in Cognitive Radio Networks.
- [GLOBECOM 2017] SDN-Based DDoS Attack Detection with Cross-Plane Collaboration and Lightweight Flow Monitoring.
- [GLOBECOM 2017] VulDigger: A Just-in-Time and Cost-Aware Tool for Digging Vulnerability-Contributing Changes.
- [GLOBECOM 2018] Light-Weight Solution to Defend Implantable Medical Devices against Man-In-The-Middle Attack.
- [GLOBECOM 2018] Improving WiFi Statistical Fingerprint-Based Detection Techniques Against UAV Stealth Attacks.
- [GLOBECOM 2018] An MEC-Based DoS Attack Detection Mechanism for C-V2X Networks.
- [GLOBECOM 2018] PAMA: A Proactive Approach to Mitigate False Data Injection Attacks in Smart Grids.
- [GLOBECOM 2018] Combining Dynamic and Static Attack Information for Attack Tracing and Event Correlation.
- [GLOBECOM 2018] Keyboard Side Channel Attacks on Smartphones Using Sensor Fusion.
- [GLOBECOM 2018] I Know What You Type: Leaking User Privacy via Novel Frequency-Based Side-Channel Attacks.
- [GLOBECOM 2018] An Attack on Untraceable Linear Network Coding.
- [GLOBECOM 2018] Vulnerability Prediction Based on Weighted Software Network for Secure Software Building.
- [GLOBECOM 2018] Covert Spectrum Handoff: An Attack in Spectrum Handoff Processes in Cognitive Radio Networks.
- [GLOBECOM 2018] Energy-Based Detection of Defect Injection Attacks in IoT-Enabled Manufacturing.
- [GLOBECOM 2018] Efficient Identity Spoofing Attack Detection for IoT in mm-Wave and Massive MIMO 5G Communication.
- [GLOBECOM 2018] New Slot-Head Jamming Attack and Mitigation Mechanism for Wireless Body Area Networks.
- [GLOBECOM 2018] All Your Alexa Are Belong to Us: A Remote Voice Control Attack against Echo.
- [GLOBECOM 2018] On the Detection of Adaptive Side-Channel Attackers in Cloud Environments.
- [GLOBECOM 2018] Colonel Blotto Game Aided Attack-Defense Analysis in Real-World Networks.
- [GLOBECOM 2018] A Self-Adaptable System for DDoS Attack Prediction Based on the Metastability Theory.
- [GLOBECOM 2018] Recovering an OSPF Network from Malicious Attacks: An Experimental Evaluation of Recovery Techniques.
- [GLOBECOM 2018] Multi-Dimensional Data Fusion Intrusion Detection for Stealthy Attacks on Industrial Control Systems.
- [GLOBECOM 2019] Secure Routing in IoT: Evaluation of RPL’s Secure Mode under Attacks.
- [GLOBECOM 2019] LSTM-Based Detection for Timing Attacks in Named Data Network.
- [GLOBECOM 2019] DeepDDoS: Online DDoS Attack Detection.
- [GLOBECOM 2019] On Detecting and Preventing Jamming Attacks with Machine Learning in Optical Networks.
- [GLOBECOM 2019] Think That Attackers Think: Using First-Order Theory of Mind in Intrusion Response System.
- [GLOBECOM 2019] Secure Coded Cooperative Computation at the Heterogeneous Edge against Byzantine Attacks.
- [GLOBECOM 2019] A Replay Attack-Resistant 0-RTT Key Management Scheme for Low-Bandwidth Smart Grid Communications.
- [GLOBECOM 2019] LTE Is Vulnerable: Implementing Identity Spoofing and Denial-of-Service Attacks in LTE Networks.
- [GLOBECOM 2019] Towards Robust Ensemble Defense Against Adversarial Examples Attack.
- [GLOBECOM 2019] AClog: Attack Chain Construction Based on Log Correlation.
- [GLOBECOM 2019] Targeted Poisoning Attacks on Social Recommender Systems.
- [GLOBECOM 2019] Hidden Terminal Emulation: An Attack in Dense IoT Networks in the Shared Spectrum Operation.
- [GLOBECOM 2019] Q-MIND: Defeating Stealthy DoS Attacks in SDN with a Machine-Learning Based Defense Framework.
- [GLOBECOM 2019] False-Locality Attack Detection Using CNN in Named Data Networking.
- [GLOBECOM 2019] Man-in-the-Middle and Denial of Service Attacks in Wireless Secret Key Generation.
- [GLOBECOM 2019] An Experimental Study Towards Attacker Identification in Automotive Networks.
- [GLOBECOM 2019] Defending against ROP Attacks with Nearly Zero Overhead.
- [GLOBECOM 2019] No Way to Evade: Detecting Multi-Path Routing Attacks for NIDS.
- [GLOBECOM 2019] Optimal Filter Assignment Policy against Transit-Link Distributed Denial-of-Service Attack.
- [GLOBECOM 2019] Defense against PUE Attacks in DSA Networks Using GAN Based Learning.
- [GLOBECOM 2019] Multi-Tier and Multi-Band Heterogeneous Wireless Networks with Black Hole Attacks.
- [GLOBECOM 2019] SDN Security: Information Disclosure and Flow Table Overflow Attacks.
- [GLOBECOM 2019] Defend Jamming Attacks: How to Make Enemies Become Friends.
- [GLOBECOM 2019] Active Pilot Contamination Attack Detection in Sub-6 GHz Massive MIMO NOMA Systems.
- [GLOBECOM 2019] An Intelligent Route Mutation Mechanism against Mixed Attack Based on Security Awareness.
- [GLOBECOM 2019] Vulnerability Assessment of Social-Smart Grids: An Algorithmic Approach.
- [GLOBECOM 2019] Self Organizing Feature Map for Fake Task Attack Modelling in Mobile Crowdsensing.
- [GLOBECOM 2019] Machine Learning Assisted PHYSEC Attacks and SLP Countermeasures for Multi-Antenna Downlink Systems.
- [GLOBECOM 2019] Modeling Stepping Stone Attacks with Constraints in Cyber Infrastructure.
- [GLOBECOM 2019] FDI Attacks against Real-Time DLMP in CPS-Based Smart Distribution Systems.
- [GLOBECOM 2019] Analyzing Adversarial Attacks against Deep Learning for Intrusion Detection in IoT Networks.
- [GLOBECOM 2020] COVID-19 Vulnerability Map Construction via Location Privacy Preserving Mobile Crowdsourcing.
- [GLOBECOM 2020] Topology Poisoning Attacks and Countermeasures in SDN-enabled Vehicular Networks.
- [GLOBECOM 2020] A Practical Black-Box Attack Against Autonomous Speech Recognition Model.
- [GLOBECOM 2020] A Defense Mechanism for Timing-based Side-Channel Attacks on IoT Traffic.
- [GLOBECOM 2020] Real Time Stream Mining based Attack Detection in Distribution Level PMUs for Smart Grids.
- [GLOBECOM 2020] Evaluating and Improving Adversarial Attacks on DNN-Based Modulation Recognition.
- [GLOBECOM 2020] Stealthy DGoS Attack under Passive and Active Measurements.
- [GLOBECOM 2020] A Selfish Attack on Chainweb Blockchain.
- [GLOBECOM 2020] Preventing Denial of Service Attacks in IoT Networks through Verifiable Delay Functions.
- [GLOBECOM 2020] Divide and conquer-based attack against RPL routing protocol.
- [GLOBECOM 2020] Preventing DRDoS Attacks in 5G Networks: a New Source IP Address Validation Approach.
- [GLOBECOM 2020] Enhancing Path Reliability against Sybil Attack by Improved Multi-Path-Trees in SDN.
- [GLOBECOM 2020] Adversarial Attacks to Machine Learning-Based Smart Healthcare Systems.
- [GLOBECOM 2020] Privacy Preserving Facial Recognition Against Model Inversion Attacks.
- [GLOBECOM 2020] Certified Robustness of Graph Classification against Topology Attack with Randomized Smoothing.
- [GLOBECOM 2020] Model Partition Defense against GAN Attacks on Collaborative Learning via Mobile Edge Computing.
- [GLOBECOM 2020] Study of the Impact of Sinkhole Attack in IoT Using Shewhart Control Charts.
- [GLOBECOM 2020] What Can Ail Thee: New and Old Security Vulnerabilities of Wireless Datacenters.
- [GLOBECOM 2020] Forensic Model for DDoS Attack.
- [GLOBECOM 2020] Vulnerability Analysis for Network Connectivity: A Prioritizing Critical Area Approach.
- [GLOBECOM 2021] Non-Coherent Fast-Forward Relays for Full-Duplex Jamming Attack.
- [GLOBECOM 2021] FedEqual: Defending Model Poisoning Attacks in Heterogeneous Federated Learning.
- [GLOBECOM 2021] Active Learning Under Malicious Mislabeling and Poisoning Attacks.
- [GLOBECOM 2021] CoWatch: Collaborative Prediction of DDoS Attacks in Edge Computing with Distributed SDN.
- [GLOBECOM 2021] MIRAI Botnet Attack Detection with Auto-Associative Dense Random Neural Network.
- [GLOBECOM 2021] Preamble Injection and Spoofing Attacks in Wi-Fi Networks.
- [GLOBECOM 2021] Deep Learning for Hardware-Impaired Wireless Secret Key Generation with Man-in-the-Middle Attacks.
- [GLOBECOM 2021] Vulnerability Analysis of Road Network under Information Pollution Attacks in VANET.
- [GLOBECOM 2021] Securing IoT Transactions Against Double-Spending Attacks based on Signaling Game Approach.
- [GLOBECOM 2021] Slider: Towards Precise, Robust and Updatable Sketch-based DDoS Flooding Attack Detection.
- [GLOBECOM 2021] A Novel Machine Learning Framework for Advanced Attack Detection using SDN.
- [GLOBECOM 2021] Estimation Performance of Cyber-Physical Systems Attacked by False Data Injection.
- [GLOBECOM 2021] CVAE-AN: Atypical Attack Flow Detection Using Incremental Adversarial Learning.
- [GLOBECOM 2021] Dual-Masking Framework against Two-Sided Model Attacks in Federated Learning.
- [GLOBECOM 2021] Visible Forensic Investigation for Android Applications by Using Attack Scenario Reconstruction.
- [GLOBECOM 2021] Stand-in Backdoor: A Stealthy and Powerful Backdoor Attack.
- [GLOBECOM 2021] Accurate and Fast Detection of DDoS Attacks in High-Speed Network with Asymmetric Routing.
- [GLOBECOM 2021] NGS: Mitigating DDoS Attacks using SDN-based Network Gate Shield.
- [GLOBECOM 2021] Adversarial Attacks to Solar Power Forecast.
- [GLOBECOM 2021] Defending against Flooding Attacks in the Internet of Drones Environment.
- [GLOBECOM 2021] Network Resilience Under Epidemic Attacks: Deep Reinforcement Learning Network Topology Adaptations.
- [GLOBECOM 2022] False Data Injection Attack Against Cyber-Physical Systems Protected by a Watermark.
- [GLOBECOM 2022] Physics-informed Cyber-Attack Detection in Wind Farms.
- [GLOBECOM 2022] Defending Against DDOS Attacks on IoT Network Throughput: A Trust-Stackelberg Game Model.
- [GLOBECOM 2022] Attack Detection and Mitigation using Intelligent Data Planes in SDNs.
- [GLOBECOM 2022] Dynamic Deep Neural Network Adversarial Attacks for Edge-based IoT Devices.
- [GLOBECOM 2022] Poisoning Attacks in Crowdsensing Over Multiple Areas.
- [GLOBECOM 2022] Semantic Preserving Adversarial Attack Generation with Autoencoder and Genetic Algorithm.
- [GLOBECOM 2022] A Graph Learning Approach with Audit Records for Advanced Attack Investigation.
- [GLOBECOM 2022] DDoS Attacks Detection and Mitigation in 5G and Beyond Networks: A Deep Learning-based Approach.
- [GLOBECOM 2022] Securing Federated Learning against Overwhelming Collusive Attackers.
- [GLOBECOM 2022] Mixture GAN For Modulation Classification Resiliency Against Adversarial Attacks.
- [GLOBECOM 2022] A Novel Sybil Attack Detection Mechanism for Mobile IoT Networks.
- [GLOBECOM 2022] False Data Injection Attacks against Low Voltage Distribution Systems.
- [GLOBECOM 2022] Intelligent Ensemble based System for Rare Attacks Dectection in IoT Networks.
- [GLOBECOM 2022] Enhancing Automatic Attack Detection through Spectral Decomposition of Network Flows.
- [GLOBECOM 2022] Self-Taught Black-Box Adversarial Attack to Multilayer Network Automation.
- [GLOBECOM 2022] Addressing the Tangle Vulnerability: A Preventive Strategy for IOTA by Using Large Deviation Theory.
- [GLOBECOM 2022] A Temporal-Pattern Backdoor Attack to Deep Reinforcement Learning.
- [GLOBECOM 2022] Distributed Detection with Multiple Sensors in the Presence of Sybil Attacks.
- [GLOBECOM 2022] An Attack-Resilient and Energy-Adaptive Monitoring System for Smart Farms.
- [GLOBECOM 2022] Optimized Moving Target Defense Against DDoS Attacks in IoT Networks: When to Adapt?
- [GLOBECOM 2022] Adversarial Attacks Against IoT Networks using Conditional GAN based Learning.
- [GLOBECOM 2022] Early Detection of Campus Network DDoS Attacks using Predictive Models.
- [GLOBECOM 2022] Feasible Time Delay Attacks Against the Precision Time Protocol.
- [GLOBECOM 2022] AMON-SENSS: Scalable and Accurate Detection of Volumetric DDoS Attacks at ISPs.
- [GLOBECOM 2022] TLS Early Data Resistance to Replay Attacks in Wireless Internet of Things.
- [GLOBECOM 2022] A novel aggregation method to promote safety security for poisoning attacks in Federated Learning.
- [GLOBECOM 2022] Implicit Channel Coordination to Tackle Starvation Attacks in 5G and Wi-Fi Coexistence Systems.
- [GLOBECOM 2022] TableGuard: A Novel Security Mechanism Against Flow Table Overflow Attacks in SDN.
- [GLOBECOM 2022] A Cost-Effective MTD Approach for DDoS Attacks in Software-Defined Networks.
- [GLOBECOM 2022] Autoscaling cracker: an efficient asymmetric DDoS attack on serverless functions.
- [GLOBECOM 2022] Energy Level Spoofing Attacks and Countermeasures in Blockchain-enabled IoT.
- [GLOBECOM 2022] Pairwise Gaussian Graph Convolutional Networks: Defense Against Graph Adversarial Attack.
- [GLOBECOM 2022] Double Perturbation-Based Privacy-Preserving Federated Learning against Inference Attack.
- [GLOBECOM 2022] Impersonation Attack Detection in IoT Networks.
- [GLOBECOM 2022] Side-Channel VoIP Profiling Attack against Customer Service Automated Phone System.
- [GLOBECOM 2023] Conditional Matching GAN Guided Reconstruction Attack in Machine Unlearning.
- [GLOBECOM 2023] On the Profitability of Selfish Mining Attack Under the Checkpoint Mechanism.
- [GLOBECOM 2023] Transferable Attacks on Deep Learning Based Modulation Recognition in Cognitive Radio.
- [GLOBECOM 2023] Routing Recovery for UAV Networks with Deliberate Attacks: A Reinforcement Learning based Approach.
- [GLOBECOM 2023] A Lightweight Few-Shot Attack Detection Scheme for Industrial Cognitive Radio Networks.
- [GLOBECOM 2023] Utilizing Autoencoder to Improve the Robustness of Intrusion Detection Systems Against Adversarial Attacks.
- [GLOBECOM 2023] Unsupervised Feature Engineering Approach to Predict DDoS Attacks.
- [GLOBECOM 2023] Aigis: Full-Coverage And Low-Overhead Mitigating Against Amplified Reflection DDoS Attacks.
- [GLOBECOM 2023] In-Network Collaborative Link Flooding Attack Defense with Adaptive Anomaly Analysis.
- [GLOBECOM 2023] Decentralized Sparse Matrix Multiplication Under Byzantine Attacks.
- [GLOBECOM 2023] Surviving False Data Injection Attacks: An Effective Recovery Scheme for Resilient CPS.
- [GLOBECOM 2023] Machine Learning based Time Synchronization Attack Detection for Synchrophasors.
- [GLOBECOM 2023] Zero-Trust Empowered Decentralized Security Defense against Poisoning Attacks in SL-IoT: Joint Distance-Accuracy Detection Approach.
- [GLOBECOM 2023] Backdoor Attacks Against Deep Learning-Based Massive MIMO Localization.
- [GLOBECOM 2023] Detecting CAM Flooding Attacks in Vehicular Networks Using Online K-means Algorithm.
- [GLOBECOM 2023] Analytical evaluation of three attacks on Ethereum.
- [GLOBECOM 2023] Backdoor Attacks on Multi-Agent Reinforcement Learning-based Spectrum Management.
- [GLOBECOM 2023] A Multimodal Deep Learning Approach for Efficient Vulnerability Detection in Smart Contracts.
- [GLOBECOM 2023] A SKG Security Challenge: Indoor SKG Under an On-The-Shoulder Eavesdropping Attack.
- [GLOBECOM 2023] SMSDect: A Prediction Model for Smishing Attack Detection Using Machine Learning and Text Analysis.
- [GLOBECOM 2023] FedChallenger: Challenge-Response-Based Defence for Federated Learning Against Byzantine Attacks.
- [GLOBECOM 2023] Preemptive DoS attacks on Time Sensitive Networks.
- [GLOBECOM 2023] Enhancing Online Intrusion Detection Systems via Attack Clustering.
- [GLOBECOM 2023] An Anti-Jamming Strategy for Disco Intelligent Reflecting Surfaces Based Fully-Passive Jamming Attacks.
- [GLOBECOM 2023] An SRN-Based Model for Assessing Co-Resident Attack Mitigation in Cloud with VM Migration and Allocation Policies.
- [GLOBECOM 2023] Firm VEA: Vulnerability Discovery Optimisation for IoT Firmware via Version Evolution Analysis.
- [GLOBECOM 2023] The Model Inversion Eavesdropping Attack in Semantic Communication Systems.
- [GLOBECOM 2023] DASTAN-CNN: RF Fingerprinting for the Mitigation of Membership Inference Attacks in 5G.
- [GLOBECOM 2023] Green Floating Blockchain-Empowered Co-Trust Security Mechanism with Energy Efficiency Against Attack Threat for 6G-IoV.
- [GLOBECOM 2023] Ransomware Attacks Detection Methodology to Protect IoT-Enabled Critical Infrastructures.
- [GLOBECOM 2023] Experimental Study of Adversarial Attacks on ML-Based xApps in O-RAN.
- [GLOBECOM 2023] Policy Poisoning Attacks on Transfer Learning Enabled Resource Allocation for Network Slicing.
- [GLOBECOM 2023] Membership Inference Attacks Against the Graph Classification.
- [GLOBECOM 2023] Deep Learning-based Smart Radio Jamming Attacks Detection on 5G V2I/V2N Communications.
- [GLOBECOM 2023] Evaluating Network Boolean Tomography Under Byzantine Attacks.
- [GLOBECOM 2024] Utilizing Online Learning for Both Defense and DoS Attacks in CPS: A Repeated Game Approach.
- [GLOBECOM 2024] SymJam: Symbiotic Jamming Attacks on NR-V2X.
- [GLOBECOM 2024] Mixture Gaussian Distribution-Based Collaborative Reinforcement Learning for 3D UAV Localization Optimization Against Jamming Attacks.
- [GLOBECOM 2024] Exploitation of Defensive Frequency Shifting-RIS against RIS-in-the-Middle (RITM) Attack.
- [GLOBECOM 2024] Wire-speed DDoS Attack Mitigation using Hardware Acceleration of Programmable DPUs.
- [GLOBECOM 2024] In-Network Defense: Safeguarding the Network Against Evolving DDoS Attacks.
- [GLOBECOM 2024] Pilot-Attacks Can Enable Positive-Rate Covert Communications of Wireless Hardware Trojans.
- [GLOBECOM 2024] A Graph Motif Adversarial Attack for Fault Detection in Power Distribution Systems.
- [GLOBECOM 2024] A Lightweight and Optimal Defense System for DDoS Attacks in IoMT Networks.
- [GLOBECOM 2024] On the Detection of Replay Authentication Attacks Through Channel State Information Analysis.
- [GLOBECOM 2024] Multi-Model based Federated Learning Against Model Poisoning Attack: A Deep Learning Based Model Selection for MEC Systems.
- [GLOBECOM 2024] M-Door: Joint Attack of Backdoor Injection and Membership Inference in Federated Learning.
- [GLOBECOM 2024] MulDoor: A Multi-target Backdoor Attack Against Federated Learning System.
- [GLOBECOM 2024] Modeling and Analysis of Over-the-Air Attack with QoS-Aware Scheduling: Queuing-based Approach.
- [GLOBECOM 2024] A Representation Learning Induced Property Inference Attack on Machine Learning Models for E-Health.
- [GLOBECOM 2024] eBPF-Based Approach to Tracing System Calls and Predicting Privilege Escalation Attacks.
- [GLOBECOM 2024] An Approach for APT Attack Scenario Construction Based on Dynamic Attack Graphs.
- [GLOBECOM 2024] Backdoor Attack Against Vision Transformers via Attention Gradient-Based Image Erosion.
- [GLOBECOM 2024] BadTTS: Identifying Vulnerabilities in Neural Text-to-Speech Models.
- [GLOBECOM 2024] MQTTv5 Shared Subscription in IoT Systems: Vulnerability Analysis and Mitigation.
- [GLOBECOM 2024] Position-Independent and Stealthy Backdoor Attack of IMU Systems.
- [GLOBECOM 2024] Malicious RIS Meets RSMA: Unveiling the Robustness of Rate Splitting to RIS-Induced Attacks.
- [GLOBECOM 2024] CASAR: Cross Uc-domain Authentication Scheme with Attack Resistance for SUNet.
- [GLOBECOM 2024] Impact of Conflicting Transactions in Blockchain: Detecting and Mitigating Potential Attacks.
- [GLOBECOM 2024] A Spatiotemporal Stealthy Backdoor Attack against Cooperative Multi-Agent Deep Reinforcement Learning.
- [GLOBECOM 2024] Adversarial Robustness Poisoning: Increasing Adversarial Vulnerability of the Model via Data Poisoning.
- [GLOBECOM 2024] AdvNets: Adversarial Attacks and Countermeasures for Model-level Neural Trojan Defenses.
- [GLOBECOM 2024] Mitigating Energy Attacks in Wireless Sensor Networks Using Deception: A Game Theoretic Approach.
- [GLOBECOM 2024] HEDVA: Harnessing HTTP Traffic for Enhanced Detection of Vulnerability Attacks in IoT Networks.
- [GLOBECOM 2024] Stealthy Backdoor Attacks on Semantic Symbols in Semantic Communications.
- [GLOBECOM 2024] From the Perspective of AI Safety: Analyzing the Impact of XAI Performance on Adversarial Attack.
- [GLOBECOM 2024] Semantic Camouflage Communications Using Defensive Adversarial Attack: Conceal Truth while Show Fake.
- [ICC 2010] A Probabilistic Approach for Detecting Blocking Attack in RFID Systems.
- [ICC 2010] An Efficient Recovery and Survival Scheme against Malware Attacks.
- [ICC 2010] An Efficient Self-Healing Key Distribution with Resistance to the Collusion Attack for Wireless Sensor Networks.
- [ICC 2010] Attacker Detection Game in Wireless Networks with Channel Uncertainty.
- [ICC 2010] Blind Dogfight in Spectrum: Combating Primary User Emulation Attacks in Cognitive Radio Systems with Unknown Channel Statistics.
- [ICC 2010] Coordinated Denial-of-Service Attacks in IEEE 802.22 Networks.
- [ICC 2010] Embedded TaintTracker: Lightweight Tracking of Taint Data against Buffer Overflow Attacks.
- [ICC 2010] Low-Cost Side Channel Remote Traffic Analysis Attack in Packet Networks.
- [ICC 2010] Quantitative Analysis of the Sybil Attack and Effective Sybil Resistance in Peer-to-Peer Systems.
- [ICC 2010] Real-Time Detection of Stealthy DDoS Attacks Using Time-Series Decomposition.
- [ICC 2010] Selective Jamming Attacks in Wireless Networks.
- [ICC 2010] Throughput and Stability Improvements of Slotted ALOHA Based Wireless Networks under the Random Packet Destruction Dos Attack.
- [ICC 2011] Timing Attacks on a Centralized Presence Model.
- [ICC 2011] Lightweight Attacks against Channel Assignment Protocols in MIMC Wireless Networks.
- [ICC 2011] Least Squares Disclosure Attack in Mobile Ad Hoc Networks.
- [ICC 2011] Securing BioEncoded IrisCodes against Correlation Attacks.
- [ICC 2011] An Accurate Sampling Scheme for Detecting SYN Flooding Attacks and Portscans.
- [ICC 2011] Quick Detection of Stealthy SIP Flooding Attacks in VoIP Networks.
- [ICC 2011] A Stateless Traceback Technique for Identifying the Origin of Attacks from a Single Packet.
- [ICC 2011] A Covert Timing Channel via Algorithmic Complexity Attacks: Design and Analysis.
- [ICC 2011] Side Channel Monitoring: Packet Drop Attack Detection in Wireless Ad Hoc Networks.
- [ICC 2011] Mitigating the Effects of Position-Based Routing Attacks in Vehicular Ad Hoc Networks.
- [ICC 2011] BAMBi: Blackhole Attacks Mitigation with Multiple Base Stations in Wireless Sensor Networks.
- [ICC 2011] Defending Sensor Worm Attack Using Software Diversity Approach.
- [ICC 2011] Reuse-Attack Mitigation in Wireless Sensor Networks.
- [ICC 2011] A Novel Attack Tree Based Risk Assessment Approach for Location Privacy Preservation in the VANETs.
- [ICC 2011] iCAPTCHA: The Next Generation of CAPTCHA Designed to Defend against 3rd Party Human Attacks.
- [ICC 2011] A Measurement Study of Attacks on BitTorrent Seeds.
- [ICC 2011] Spectrum Stealing via Sybil Attacks in DSA Networks: Implementation and Defense.
- [ICC 2012] A novel mechanism to secure internal attacks in HWMP routing protocol.
- [ICC 2012] Dynamic solution for detecting Denial of Service attacks in wireless sensor networks.
- [ICC 2012] Base station location protection in wireless sensor networks: Attacks and defense.
- [ICC 2012] Towards effective defense against pollution attacks on network coding.
- [ICC 2012] Efficient jamming attacks on MIMO channels.
- [ICC 2012] A novel architecture against false data injection attacks in smart grid.
- [ICC 2012] A novel traffic-analysis back tracing attack for locating source nodes in wireless sensor networks.
- [ICC 2012] All your jammers belong to us - Localization of wireless sensors under jamming attack.
- [ICC 2012] Stealthy pre-attacks against random key pre-distribution security.
- [ICC 2012] DDoS vulnerability of BitTorrent Peer Exchange extension: Analysis and defense.
- [ICC 2012] A trust-based strategy for addressing residual attacks in the RELOAD architecture.
- [ICC 2012] Detection of cache pollution attacks using randomness checks.
- [ICC 2012] Assessing network path vulnerabilities for secure cloud computing.
- [ICC 2012] A mark association-based investigation of attack scenarios in communication networks.
- [ICC 2012] An ontology-based system to identify complex network attacks.
- [ICC 2012] SIP Protector: Defense architecture mitigating DDoS flood attacks against SIP servers.
- [ICC 2013] Improved detection and correlation of multi-stage VoIP attack patterns by using a Dynamic Honeynet System.
- [ICC 2013] Protect sensitive sites from phishing attacks using features extractable from inaccessible phishing URLs.
- [ICC 2013] RobuRec: Robust Sybil attack defense in online recommender systems.
- [ICC 2013] Pollution and whitewashing attacks in a P2P live streaming system: Analysis and counter-attack.
- [ICC 2013] On effective localization attacks against Internet Threat monitors.
- [ICC 2013] d2 Deleting Diaspora: Practical attacks for profile discovery and deletion.
- [ICC 2013] Characterization and visualization of sophisticated scanning attacks.
- [ICC 2013] Stochastic optimization of flow-jamming attacks in multichannel wireless networks.
- [ICC 2013] Sequence sensing Jamming attacks against modular-based channel hopping rendezvous algorithms for cognitive ratio networks.
- [ICC 2013] Performance impact of asynchronous off-tone jamming attacks against OFDM.
- [ICC 2013] Intercept probability analysis of cooperative wireless networks with best relay selection in the presence of eavesdropping attack.
- [ICC 2013] Two vulnerabilities in Android OS kernel.
- [ICC 2014] Energy-balancing method to detect denial of service attacks in wireless sensor networks.
- [ICC 2014] The sequential attack against power grid networks.
- [ICC 2014] The NewShrew attack: A new type of low-rate TCP-Targeted DoS attack.
- [ICC 2014] An analysis of an HMM-based attack on the substitution cipher with error-prone ciphertext.
- [ICC 2014] Virtual machine allocation policies against co-resident attacks in cloud computing.
- [ICC 2014] A moving-target defense strategy for Cloud-based services with heterogeneous and dynamic attack surfaces.
- [ICC 2014] Containing sybil attacks on trust management schemes for peer-to-peer networks.
- [ICC 2014] A denial of service attack in advanced metering infrastructure network.
- [ICC 2014] Coping with physical attacks on random network structures.
- [ICC 2014] A mechanism for detecting gray hole attacks on synchrophasor data.
- [ICC 2015] A time correlated attacker-defender model for smart grid communication networks.
- [ICC 2015] A two-way training method for defending against pilot spoofing attack in MISO systems.
- [ICC 2015] Preventing Denial of Service attacks in Wireless Sensor Networks.
- [ICC 2015] Resource allocation in pollution attack and defense: A game-theoretic perspective.
- [ICC 2015] FlowRanger: A request prioritizing algorithm for controller DoS attacks in Software Defined Networks.
- [ICC 2015] Game theoretic modeling of jamming attack in wireless powered communication networks.
- [ICC 2015] TapLock: Exploit finger tap events for enhancing attack resilience of smartphone passwords.
- [ICC 2015] A unified framework for wireless connectivity study subject to general interference attack.
- [ICC 2015] Towards a multiobjective framework for evaluating network security under exploit attacks.
- [ICC 2015] Detection of DoS attacks through Fourier transform and mutual information.
- [ICC 2015] A two-stage attacking scheme for low-sparsity unobservable attacks in smart grid.
- [ICC 2015] On false data injection attacks against the dynamic microgrid partition in the smart grid.
- [ICC 2015] Cross-layer scheme for detecting large-scale colluding Sybil attack in VANETs.
- [ICC 2015] M-NOTE: A Multi-part ballot based E-voting system with clash attack protection.
- [ICC 2015] Optimal strategies for defending location inference attack in database-driven CRNs.
- [ICC 2016] Passive inference of attacks on SCADA communication protocols.
- [ICC 2016] Efficient prevention technique for false data injection attack in smart grid.
- [ICC 2016] Smart meter data aggregation against wireless attacks: A game-theoretic approach.
- [ICC 2016] Spectral analysis of low rate of denial of service attacks detection based on fisher and Siegel tests.
- [ICC 2016] Pinball attacks: Exploiting channel allocation in wireless networks.
- [ICC 2016] A detection method for a novel DDoS attack against SDN controllers by vast new low-traffic flows.
- [ICC 2016] Building suspiciousness cascading graph over multiple hosts for detecting targeted attacks.
- [ICC 2016] On the dynamics of the RPL protocol in AMI networks under jamming attacks.
- [ICC 2016] Simulation study of routing attacks under network coding environment.
- [ICC 2017] Game theoretic study of protecting MIMO transmissions against smart attacks.
- [ICC 2017] 3D vision attack against authentication.
- [ICC 2017] On modeling and understanding vehicle evacuation attacks in VANETs.
- [ICC 2017] Energy harvesting in secret key generation systems under jamming attacks.
- [ICC 2017] The effect of buffer management strategies on 6LoWPAN’s response to buffer reservation attacks.
- [ICC 2017] Secret key generation in Rayleigh block fading AWGN channels under jamming attacks.
- [ICC 2017] AutoPatchDroid: A framework for patching inter-app vulnerabilities in android application.
- [ICC 2017] Novel attacks in OSPF networks to poison routing table.
- [ICC 2017] A closer look at Eclipse attacks against Tor hidden services.
- [ICC 2017] Bandit strategies for blindly attacking networks.
- [ICC 2017] Optimal transmission strategy for sensors to defend against eavesdropping and jamming attacks.
- [ICC 2017] Distributed faulty node detection in DTNs in presence of Byzantine attack.
- [ICC 2017] ICA-SBDC: A channel estimation and identification mechanism for MISO-OFDM systems under pilot spoofing attack.
- [ICC 2017] A distributed middleware architecture for attack-resilient communications in smart grids.
- [ICC 2017] Two-stage uplink training for pilot spoofing attack detection and secure transmission.
- [ICC 2017] A cost-effective shuffling-based defense against HTTP DDoS attacks with SDN/NFV.
- [ICC 2017] Modeling DoS attacks in WSNs with quantitative games.
- [ICC 2017] New sensing technique for detecting application layer DDoS attacks targeting back-end database resources.
- [ICC 2018] A Framework for Detecting and Countering Android UI Attacks via Inspection of IPC Traffic.
- [ICC 2018] Mitigating Traffic Analysis Attack in Smartphones with Edge Network Assistance.
- [ICC 2018] On Success Probability of Eavesdropping Attack in 802.11ad mmWave WLAN.
- [ICC 2018] Sbsd: Detecting the Sequence Attack through Sensor Data in ICSs.
- [ICC 2018] Sentinel: Defense Mechanism against DDoS Flooding Attack in Software Defined Vehicular Network.
- [ICC 2018] Game-Based Defending against Attacks in Software Defined Networks with Routing Control.
- [ICC 2018] Machine-Learning-Based Online Distributed Denial-of-Service Attack Detection Using Spark Streaming.
- [ICC 2018] A Novel Distributed Denial-of-Service Attack Detection Scheme for Software Defined Networking Environments.
- [ICC 2018] Optical Wireless Interception Vulnerability Analysis of Visible Light Communication System.
- [ICC 2018] A Game Theoretic Approach to Model Cyber Attack and Defense Strategies.
- [ICC 2018] Network Intrusion Detection System for Jamming Attack in LoRaWAN Join Procedure.
- [ICC 2018] Empirical Evaluation of the Hypervisor Scheduling on Side Channel Attacks.
- [ICC 2018] Analysis of Stepping Stone Attacks in Dynamic Vulnerability Graphs.
- [ICC 2018] Multi-Channel Jamming Attacks against Cooperative Defense: A Two-Level Stackelberg Game Approach.
- [ICC 2019] Modeling an Information-Based Advanced Persistent Threat Attack on the Internal Network.
- [ICC 2019] Mitigation of the Spectrum Sensing Data Falsifying Attack in Cognitive Radio Networks.
- [ICC 2019] Anti-Jamming V2V Communication in an Integrated UAV-CAV Network with Hybrid Attackers.
- [ICC 2019] Detection of Pilot Spoofing Attack in Massive MIMO Systems.
- [ICC 2019] Spoofing Attacks on Speaker Verification Systems Based Generated Voice using Genetic Algorithm.
- [ICC 2019] Dual Redundant Cyber-Attack Tolerant Control Systems Strategy for Cyber-Physical Systems.
- [ICC 2019] A Flexible Poisoning Attack Against Machine Learning.
- [ICC 2019] Road Navigation System Attacks: A Case on GPS Navigation Map.
- [ICC 2019] Against Pilot Spoofing Attack with Double Channel Training in Massive MIMO NOMA Systems.
- [ICC 2019] SDN-Ti: A General Solution Based on SDN to Attacker Traceback and Identification in IPv6 Networks.
- [ICC 2019] Detection of Multi-Stage Attacks Based on Multi-Layer Long and Short-Term Memory Network.
- [ICC 2019] Machine Learning Based Attack Against Artificial Noise-Aided Secure Communication.
- [ICC 2019] DETPro: A High-Efficiency and Low-Latency System Against DDoS Attacks in SDN Based on Decision Tree.
- [ICC 2019] HMM Based Cache Pollution Attack Detection for Edge Computing Enabled Mobile Social Networks.
- [ICC 2019] Detection of Hidden Terminal Emulation Attacks in Cognitive Radio-Enabled IoT Networks.
- [ICC 2019] Fog-Based Distributed Intrusion Detection System Against False Metering Attacks in Smart Grid.
- [ICC 2019] SoftGuard: Defend Against the Low-Rate TCP Attack in SDN.
- [ICC 2019] Equipment Contention Attack in Cloud Manufacturing Environments and Its Defense.
- [ICC 2019] Detecting Link Correlation Spoofing Attack: A Beacon-Trap Approach.
- [ICC 2019] Increasing Network Resilience to Persistent OSPF Attacks.
- [ICC 2019] Secure Data Aggregation in Wireless Sensor Networks: Enumeration Attack and Countermeasure.
- [ICC 2019] SCTM: A Multi-View Detecting Approach Against Industrial Control Systems Attacks.
- [ICC 2020] Defending Link Flooding Attacks under Incomplete Information: A Bayesian Game Approach.
- [ICC 2020] Multi-vNIC Intelligent Mutation: A Moving Target Defense to thwart Client-side DNS Cache Attack.
- [ICC 2020] Toward More Effective Centrality-Based Attacks on Network Topologies.
- [ICC 2020] GAN Enhanced Membership Inference: A Passive Local Attack in Federated Learning.
- [ICC 2020] Robust Artificial Noise-aided Secure Communication against ICA-based Attacks.
- [ICC 2020] Cyber Security of Smart Grid: Attacks and Defenses.
- [ICC 2020] Measuring the Prevalence of the Password Authentication Vulnerability in SSH.
- [ICC 2020] Data Integrity Attacks against Traffic Modeling and Forecasting in M2M Communications.
- [ICC 2020] Fairness-aware Subcarrier Allocation to Combat full duplex Eavesdropping and Jamming attacks in IoT.
- [ICC 2020] Network Planning with Bilevel optimization to Address Attacks to Physical Infrastructure of SDN.
- [ICC 2020] Machine-learning-assisted DDoS attack detection with P4 language.
- [ICC 2020] Physical Intrusion Detection against Device-connected Attack in Industrial Control Systems.
- [ICC 2020] An Intelligent Mechanism for Sybil Attacks Detection in VANETs.
- [ICC 2020] On the Effective Capacity of an Underwater Acoustic Channel under Impersonation Attack.
- [ICC 2020] Detecting GAN-based Privacy Attack in Distributed Learning.
- [ICC 2021] Targeted Discreditation Attack against Trust Management in Connected Vehicles.
- [ICC 2021] Channel Effects on Surrogate Models of Adversarial Attacks against Wireless Signal Classifiers.
- [ICC 2021] Exploiting Jamming Attacks for Energy Harvesting in Massive MIMO Systems.
- [ICC 2021] Adversarial Attacks on Deep Learning Based Power Allocation in a Massive MIMO Network.
- [ICC 2021] Robustness of Image-based Android Malware Detection Under Adversarial Attacks.
- [ICC 2021] MT-MTD: Muti-Training based Moving Target Defense Trojaning Attack in Edged-AI network.
- [ICC 2021] Impact of Uplink Power Control on User Location Tracking Attacks in Cellular Networks.
- [ICC 2021] Algorithmic Detection of Adversarial Attacks on Message Transmission and ACK/NACK Feedback.
- [ICC 2021] Security Analysis of Block Withholding Attacks in Blockchain.
- [ICC 2021] GANMIA: GAN-based Black-box Membership Inference Attack.
- [ICC 2021] Worst-Case Detection Performance of Physical Layer Authentication Under Optimal MIMO Attacks.
- [ICC 2021] Q-learning Enabled Intelligent Energy Attack in Sustainable Wireless Communication Networks.
- [ICC 2021] Countermeasure for Smart Jamming Threat: A Deceptively Adversarial Attack Approach.
- [ICC 2021] Robust Detection of Electricity Theft Against Evasion Attacks in Smart Grids.
- [ICC 2021] Adversarial Attacks on CFO-Based Continuous Physical Layer Authentication: A Game Theoretic Study.
- [ICC 2021] Analysis of Attacker Behavior in Compromised Hosts During Command and Control.
- [ICC 2021] Penetrating RF Fingerprinting-based Authentication with a Generative Adversarial Attack.
- [ICC 2021] Communication Modeling for Targeted Delivery under Bio-DoS Attack in 6G Molecular Networks.
- [ICC 2021] On Defensive Neural Networks Against Inference Attack in Federated Learning.
- [ICC 2021] Jump and Wobble: A Defense Against Hidden Terminal Emulation Attack in Dense IoT Networks.
- [ICC 2021] A Privacy Preserving Federated Learning Framework for COVID-19 Vulnerability Map Construction.
- [ICC 2021] Identifying Account Association with Assistance from Mobile Networks using Cross-Service Attacks.
- [ICC 2021] Delay Performance of Distributed Physical Layer Authentication Under Sybil Attacks.
- [ICC 2022] AoI Optimization for UAV-aided MEC Networks under Channel Access Attacks: A Game Theoretic Viewpoint.
- [ICC 2022] Physical Layer Defense against Eavesdropping Attacks on Low-Resolution Phased Arrays.
- [ICC 2022] Resilient UAV Path Planning for Data Collection under Adversarial Attacks.
- [ICC 2022] Analysis of DRAM Vulnerability Using Computation Tree Logic.
- [ICC 2022] Side Channel Attack resistant Cross-User Generalized Deduplication for Cloud Storage.
- [ICC 2022] Defending Data Poisoning Attack via Trusted Platform Module and Blockchain Oracle.
- [ICC 2022] Optimal FDI and DoS Attacks on CPSs with Energy Constraint.
- [ICC 2022] Deep Reinforcement Learning for Joint Sensor Scheduling and Power Allocation under DoS Attack.
- [ICC 2022] From adversarial examples to data poisoning instances: utilizing an adversarial attack method to poison a transfer learning model.
- [ICC 2022] Crafting Text Adversarial Examples to Attack the Deep-Learning-based Malicious URL Detection.
- [ICC 2022] Colluding RF Fingerprint Impersonation Attack Based on Generative Adversarial Network.
- [ICC 2022] Adaptive Resource Reservation to Survive Against Adversarial Resource Selection Jamming Attacks in 5G NR-V2X Distributed Mode 2.
- [ICC 2022] Intelligent Fingerprinting to Detect Data Leakage Attacks on Spectrum Sensors.
- [ICC 2022] A Robust Adversarial Network-Based End-to-End Communications System with Strong Generalization Ability Against Adversarial Attacks.
- [ICC 2022] IM-Shield: A Novel Defense System against DDoS Attacks under IP Spoofing in High-speed Networks.
- [ICC 2022] A Proactive Defense Strategy Against SGX Side-channel Attacks via self-checking DRL in the Cloud.
- [ICC 2022] How Does FAW Attack Impact an Imperfect PoW Blockchain: A Simulation-based Approach.
- [ICC 2022] WiFi Interference-Based Adversarial Attacks on NTC Using CSI Sensing.
- [ICC 2022] A Hierarchical Fog Computing Framework for Network Attack Detection in SDN.
- [ICC 2022] Active Attack Detection Based on Interpretable Channel Fingerprint and Adversarial Autoencoder.
- [ICC 2022] P4-NSAF: defending IPv6 networks against ICMPv6 DoS and DDoS attacks with P4.
- [ICC 2022] Cooperative and smart attacks detection systems in 6G-enabled Internet of Things.
- [ICC 2022] Finding Vulnerabilities in Internal-binary of Firmware with Clues.
- [ICC 2022] Data Poisoning Attacks against Autoencoder-based Anomaly Detection Models: a Robustness Analysis.
- [ICC 2023] Towards Detection of Zero-Day Botnet Attack in IoT Networks Using Federated Learning.
- [ICC 2023] Data Poisoning Attack Against Anomaly Detectors in Digital Twin-Based Networks.
- [ICC 2023] CLMD:Detection and Prevention of Poisoning Attacks for Federated Learning in Maritime Communication Network.
- [ICC 2023] An Incremental Gray-Box Physical Adversarial Attack on Neural Network Training.
- [ICC 2023] Making Watermark Survive Model Extraction Attacks in Graph Neural Networks.
- [ICC 2023] A Heterogenous IoT Attack Detection Through Deep Reinforcement Learning: A Dynamic ML Approach.
- [ICC 2023] An Attack-Resistant Federated Edge Learning Framework for Integrated Sensing, Computing and Communications System.
- [ICC 2023] Practical Adversarial Attacks Against AI-Driven Power Allocation in a Distributed MIMO Network.
- [ICC 2023] Construct New Graphs Using Information Bottleneck Against Property Inference Attacks.
- [ICC 2023] Warping the Defence Timeline: Non-Disruptive Proactive Attack Mitigation for Kubernetes Clusters.
- [ICC 2023] Exquisite Feature Selection for Machine Learning Powered Probing Attack Detection.
- [ICC 2023] IMaler: An Adversarial Attack Framework to Obfuscate Malware Structure Against DGCNN-Based Classifier via Reinforcement Learning.
- [ICC 2023] A Defense Strategy Against LDDoS Attack Aggregation in DCN.
- [ICC 2023] Federated Learning for Zero-Day Attack Detection in 5G and Beyond V2X Networks.
- [ICC 2023] Trust-Awareness to Secure Swarm Intelligence from Data Injection Attack.
- [ICC 2023] Adversarial Attack with Genetic Algorithm against IoT Malware Detectors.
- [ICC 2023] Protecting Legitimate SEI Security Approaches from Phase-Based Obfuscation Attacks.
- [ICC 2023] Machine Learning-Based Early Attack Detection Using Open RAN Intelligent Controller.
- [ICC 2023] Unsupervised Wireless Diarization: A Potential New Attack on Encrypted Wireless Networks.
- [ICC 2023] How Potent are Evasion Attacks for Poisoning Federated Learning-Based Signal Classifiers?
- [ICC 2023] Seeing is Believing: Detecting Sybil Attack in FANET by Matching Visual and Auditory Domains.
- [ICC 2023] Exploiting the Divergence Between Output of ML Models to Detect Adversarial Attacks in Streaming IoT Applications.
- [ICC 2023] A Wasserstein GAN-based Framework for Adversarial Attacks Against Intrusion Detection Systems.
- [ICC 2023] White-Box Adversarial Attacks on Deep Learning-Based Radio Frequency Fingerprint Identification.
- [ICC 2023] Attack Endgame: Proactive Security Approach for Predicting Attack Consequences in VANET.
- [ICC 2023] More Effective Centrality-Based Attacks on Weighted Networks.
- [ICC 2023] PACMAN Attack: A Mobility-Powered Attack in Private 5G-Enabled Industrial Automation System.
- [ICC 2023] FedMC: Federated Learning with Mode Connectivity Against Distributed Backdoor Attacks.
- [ICC 2023] GBMIA: Gradient-based Membership Inference Attack in Federated Learning.
- [ICC 2023] Defensive Randomization Against Adversarial Attacks in Image-Based Android Malware Detection.
- [ICC 2023] Towards Defending Adaptive Backdoor Attacks in Federated Learning.
- [ICC 2023] Data Flow-driven and Attention Mechanism-enabled Smart Contract Vulnerability Detection for Secure and Green Blockchain-based Service Networks.
- [ICC 2023] Evaluation of Channel Hopping Strategies Against Smart Jamming Attacks.
- [ICC 2023] ATTAA: Active Text Traffic Analysis Attacks on Secure Messaging Applications.
- [ICC 2023] Boosting Physical Layer Black-Box Attacks with Semantic Adversaries in Semantic Communications.
- [ICC 2023] RSSI-Based Sybil Attack Detection Under Fading Channel in VANET.
- [ICC 2023] Mitigating Energy Depletion Attack In Wireless Sensor Network Using Signaling Game.
- [ICC 2023] Cyber Resilience Measurement Through Logical Attack Graph Analysis.
- [ICC 2023] Adversarial Poisoning Attacks on Federated Learning in Metaverse.
- [ICC 2024] TLTracer: Dynamically Detecting Cache Side Channel Attacks with a Timing Loop Tracer.
- [ICC 2024] Non-Diagonal RIS Empowered Channel Reciprocity Attacks on TDD-Based Wireless Systems.
- [ICC 2024] Toward Intelligent Attack Detection with a Causal Explainable Method for Encrypting Traffic.
- [ICC 2024] Evasive Camouflage Attack of RF Sensing and Imaging Systems.
- [ICC 2024] Backdoor Attacks and Defenses on Semantic-Symbol Reconstruction in Semantic Communications.
- [ICC 2024] Deep Learning and Big Data Integration with Cuckoo Search Optimization for Robust Phishing Attack Detection.
- [ICC 2024] Online and Collaboratively Mitigating Multi-Vector DDoS Attacks for Cloud-Edge Computing.
- [ICC 2024] A Secure and Lightweight Client-Side Deduplication Approach for Resisting Side Channel Attacks.
- [ICC 2024] Secure Peer-to-Peer Federated Learning for Efficient Cyberattacks Detection in 5G and Beyond Networks.
- [ICC 2024] DroneDefGANt: A Generative AI-Based Approach for Detecting UAS Attacks and Faults.
- [ICC 2024] Exploring Jamming and Hijacking Attacks for Micro Aerial Drones.
- [ICC 2024] Digital Twin Based Topology Fingerprinting for Detecting False Data Injection Attacks in Cyber-Physical Systems.
- [ICC 2024] Adversarial Attacks and Defenses for Wireless Signal Classifiers Using CDI-aware GANs.
- [ICC 2024] RanCAD: Random Channel Access Deterrence Attack against Spectrum Coexistence between NR-U and Wi-Fi on the 5GHz Unlicensed Band.
- [ICC 2024] CMA: A Cross-Modal Attack on Radar Signal Recognition Model Based on Time-Frequency Analysis.
- [ICC 2024] Cyber-Twin: Digital Twin-Boosted Autonomous Attack Detection for Vehicular Ad-Hoc Networks.
- [ICC 2024] Mtisa: Multi-Target Image-Scaling Attack.
- [ICC 2024] Unmasking Vulnerabilities: Adversarial Attacks against DRL-based Resource Allocation in O-RAN.
- [ICC 2024] Cross-Domain AI for Early Attack Detection and Defense Against Malicious Flows in O-RAN.
- [ICC 2024] Dealing with Smart GPS Spoofing Attacks in VANETs: 3BSM Approach.
- [ICC 2024] A Zero Trust Framework for Realization and Defense Against Generative AI Attacks in Power Grid.
- [ICC 2024] TRACEGADGET: Detecting and Tracing Network Level Attack Through Federal Provenance Graph.
- [ICC 2024] Integrated Sensing and Communications Using Generative AI: Countering Adversarial Machine Learning Attacks.
- [ICC 2024] Robust Low-Overhead Control of DER Reactive Power Under Adversarial Attacks and Uncertainty.
- [ICC 2024] Physical Layer Overshadowing Attack on Semantic Communication System.
- [ICC 2024] IRS-Enhanced Anti-Jamming Precoding Against DISCO Physical Layer Jamming Attacks.
- [ICC 2024] Poisoning Attack Mitigation for Privacy-Preserving Federated Learning-Based Energy Theft Detection.
- [ICC 2024] Explore Patterns to Detect Sybil Attack during Federated Learning in Mobile Digital Twin Network.
- [ICC 2024] Physical-Layer Spoofing in WiFi 6 to Steer the Beam Toward the Attacker.
- [ICC 2024] Jamming Attacks and Mitigation in Transfer Learning Enabled 5G RAN Slicing.
- [ICC 2024] Adaptive Backdoor Attacks Against Dataset Distillation for Federated Learning.
- [ICC 2024] Securing IoT Malware Classifiers: Dynamic Trigger-Based Attack and Mitigation.
- [ICC 2024] Machine Learning-Based Detection of Data Replay and Data Replay Sybil Attacks for Vehicular Communication Networks.
- [ICC 2024] Federated Learning with Dual Attention for Robust Modulation Classification under Attacks.
- [ICCCN 2010] Mantlet Trilogy: DDoS Defense Deployable with Innovative Anti-Spoofing, Attack Detection and Mitigation.
- [ICCCN 2010] Toward Ensemble Characterization and Projection of Multistage Cyber Attacks.
- [ICCCN 2011] CapMan: Capability-Based Defense against Multi-Path Denial of Service (DoS) Attacks in MANET.
- [ICCCN 2011] Identifying Pollution Attackers in Network-Coding Enabled Wireless Mesh Networks.
- [ICCCN 2011] STEP: Source Traceability Elimination for Privacy against Global Attackers in Sensor Networks.
- [ICCCN 2011] Attacks on Network Infrastructure.
- [ICCCN 2011] SIPp-DD: SIP DDoS Flood-Attack Simulation Tool.
- [ICCCN 2011] Characterizing Transition Behaviors in Internet Attack Sequences.
- [ICCCN 2012] Attack-Resistant Distributed Time Synchronization for Virtual Private Networks.
- [ICCCN 2013] Channel Detecting Jamming Attacks against Jump-Stay Based Channel Hopping Rendezvous Algorithms for Cognitive Radio Networks.
- [ICCCN 2013] MOTAG: Moving Target Defense against Internet Denial of Service Attacks.
- [ICCCN 2014] The store-and-flood distributed reflective denial of service attack.
- [ICCCN 2014] A framework for large-scale modeling and simulation of attacks on an OpenFlow network.
- [ICCCN 2014] Attacks/faults detection and isolation in the Smart Grid using Kalman Filter.
- [ICCCN 2014] Malicious attacks in Mobile Device Clouds: A data driven risk assessment.
- [ICCCN 2014] Two-stage detection algorithm for RoQ attack based on localized periodicity analysis of traffic anomaly.
- [ICCCN 2014] On simulation studies of cyber attacks against LTE networks.
- [ICCCN 2016] A Gaussian-Mixture Model Based Detection Scheme against Data Integrity Attacks in the Smart Grid.
- [ICCCN 2016] The Highly Insidious Extreme Phishing Attacks.
- [ICCCN 2017] EvilDirect: A New Wi-Fi Direct Hijacking Attack and Countermeasures.
- [ICCCN 2017] Detecting Link Fabrication Attacks in Software-Defined Networks.
- [ICCCN 2017] Enhanced AODV: Detection and Avoidance of Black Hole Attack in Smart Meter Network.
- [ICCCN 2018] CCoLBP: Chromatic Co-Occurrence of Local Binary Pattern for Face Presentation Attack Detection.
- [ICCCN 2018] On Context-Aware DDoS Attacks Using Deep Generative Networks.
- [ICCCN 2018] Enhanced Attack Aware Security Provisioning Scheme in SDN/NFV Enabled over 5G Network.
- [ICCCN 2018] Attacking Network Isolation in Software-Defined Networks: New Attacks and Countermeasures.
- [ICCCN 2018] Synthetic Forgery Attack against Continuous Keystroke Authentication Systems.
- [ICCCN 2018] FR-WARD: Fast Retransmit as a Wary but Ample Response to Distributed Denial-of-Service Attacks from the Internet of Things.
- [ICCCN 2018] Harnessing Uncertainty in Vulnerability Market.
- [ICCCN 2018] Selecting Combined Countermeasures for Multi-Attack Paths in Intrusion Response System.
- [ICCCN 2018] Can Machine Learning Techniques Be Effectively Used in Real Networks against DDoS Attacks?
- [ICCCN 2018] A Double-Layer Detection and Classification Approach for Network Attacks.
- [ICCCN 2018] Vulnerability Mining Method Based on Genetic Algorithm and Model Constraint.
- [ICCCN 2018] A Monte Carlo Graph Search Algorithm with Ant Colony Optimization for Optimal Attack Path Analysis.
- [ICCCN 2019] Protecting against Inference Attacks on Co-Location Data.
- [ICCCN 2019] A Novel Congestion-Aware Interest Flooding Attacks Detection Mechanism in Named Data Networking.
- [ICCCN 2020] Predict the Next Attack Location via An Attention-based Fused-SpatialTemporal LSTM.
- [ICCCN 2020] Misinformation Detection and Adversarial Attack Cost Analysis in Directional Social Networks.
- [ICCCN 2020] On the Mitigation of Controllable Event Triggering Attack in WSNs.
- [ICCCN 2020] IoT-APIScanner: Detecting API Unauthorized Access Vulnerabilities of IoT Platform.
- [ICCCN 2020] Attack Detection and Mitigation for Sensor and CAN Bus Attacks in Vehicle Anti-lock Braking Systems.
- [ICCCN 2020] MLGuard: Mitigating Poisoning Attacks in Privacy Preserving Distributed Collaborative Learning.
- [ICCCN 2020] Modelling DoS Attacks & Interoperability in the Smart Grid.
- [ICCCN 2020] An Effective and Lightweight Countermeasure Scheme to Multiple Network Attacks in NDNs.
- [ICCCN 2020] An Efficient Detection Approach for LDoS Attack based on NCS-SVM Algorithm.
- [ICCCN 2020] IFVD: Design of Intelligent Fusion Framework for Vulnerability Data Based on Text Measures.
- [ICCCN 2021] Def-IDS: An Ensemble Defense Mechanism Against Adversarial Attacks for Deep Learning-based Network Intrusion Detection.
- [ICCCN 2021] Grammatical Evolution for Detecting Cyberattacks in Internet of Things Environments.
- [ICCCN 2021] CDetector: Extracting Textual Features of Financial Social Media to Detect Cyber Attacks.
- [ICCCN 2021] Security of continuous-variable quantum key distribution against canonical attacks.
- [ICCCN 2022] Discovery of Rare yet Co-occurring Actions with Temporal Characteristics in Episodic Cyberattack Streams.
- [ICCCN 2022] A Defense-Attack Game under Multiple Preferences and Budget Constraints with Equilibrium.
- [ICCCN 2022] Socially-aware Collaborative Defense System against Bit-Flip Attack in Social Internet of Things and Its Online Assignment Optimization.
- [ICCCN 2022] A Distributed & Lightweight Framework to Secure IoT Networks Against Network Layer Attacks.
- [ICCCN 2022] Neural Networks for DDoS Attack Detection using an Enhanced Urban IoT Dataset.
- [ICCCN 2023] Stealthy Backdoor Attack on RF Signal Classification.
- [ICCCN 2023] Towards Adversarial-Resilient Deep Neural Networks for False Data Injection Attack Detection in Power Grids.
- [ICCCN 2023] Analysis of Evil Twin, Deauthentication, and Disassociation Attacks on Wi-Fi Cameras.
- [ICCCN 2023] IoT Sentinel: Correlation-based Attack Detection, Localization, and Authentication in IoT Networks.
- [ICCCN 2024] LibGuard: Protecting Sensitive Data In Android Third-Party Libraries From XLDH Attacks.
- [ICCCN 2024] Redefining DDoS Attack Detection Using A Dual-Space Prototypical Network-Based Approach.
- [ICCCN 2024] Adversarial Attack Detection for Deep Learning Driving Maneuver Classifiers in Connected Autonomous Vehicles.
- [ICCCN 2024] QuadraCode AI: Smart Contract Vulnerability Detection with Multimodal Representation.
- [ICCCN 2024] Securing Federated Learning: Enhancing Defense Mechanisms against Poisoning Attacks.
- [ICCCN 2024] Explainability Guided Adversarial Evasion Attacks on Malware Detectors.
- [ICCCN 2024] Advanced DDoS Attack Classification using Ensemble Model with Meta-Learner.
- [ICCCN 2024] In-network Reinforcement Learning for Attack Mitigation using Programmable Data Plane in SDN.
- [MASS 2011] Detecting Route Attraction Attacks in Wireless Networks.
- [MASS 2011] Inherent Security Benefits of Analog Network Coding for the Detection of Byzantine Attacks in Multi-Hop Wireless Networks.
- [MASS 2012] Social closeness based clone attack detection for mobile healthcare system.
- [MASS 2013] Droplet: A New Denial-of-Service Attack on Low Power Wireless Sensor Networks.
- [MASS 2013] MeshJam: Intelligent Jamming Attack and Defense in IEEE 802.11s Wireless Mesh Networks.
- [MASS 2014] LearJam: An Energy-Efficient Learning-Based Jamming Attack against Low-Duty-Cycle Networks.
- [MASS 2014] Identifying Malicious Attacks to Wireless Localization in Bad Channel Conditions.
- [MASS 2017] Protecting Glossy-Based Wireless Networks from Packet Injection Attacks.
- [MASS 2017] Exposing Vulnerabilities in Mobile Networks: A Mobile Data Consumption Attack.
- [MASS 2017] Can Architecture Design Help Eliminate Some Common Vulnerabilities?
- [MASS 2018] Five Important Attack in Round Function Using SIMECK Algorithm.
- [MASS 2018] A Web Attack Detection Technology Based on Bag of Words and Hidden Markov Model.
- [MASS 2019] ForeSee: A Cross-Layer Vulnerability Detection Framework for the Internet of Things.
- [MASS 2020] An Advanced Black-Box Adversarial Attack for Deep Driving Maneuver Classification Models.
- [MASS 2020] FSDM: Fast Recovery Saturation Attack Detection and Mitigation Framework in SDN.
- [MASS 2020] Multi-Armed-Bandit-based Shilling Attack on Collaborative Filtering Recommender Systems.
- [MASS 2020] Towards a Unified Trust Framework for Detecting IoT Device Attacks in Smart Homes.
- [MASS 2021] Occlusion Resilient Adversarial Attack for Person Re-identification.
- [MASS 2021] Efficient Black-Box Adversarial Attacks for Deep Driving Maneuver Classification Models.
- [MASS 2021] Hardware Speculation Vulnerabilities and Mitigations.
- [P2P 2012] AntiLiar: Defending against cheating attacks in mesh based streaming.
- [IPCCC 2010] Secure localization against wormhole attacks using conflicting sets.
- [IPCCC 2011] Making eclipse attacks computationally infeasible in large-scale DHTs.
- [IPCCC 2011] Resource-misuse attack detection in delay-tolerant networks.
- [IPCCC 2012] A system analysis of reputation-base defences against pollution attacks in P2P streaming.
- [IPCCC 2012] HADEGA: A novel MPLS-based mitigation solution to handle network attacks.
- [IPCCC 2012] GeoCAPTCHA - A novel personalized CAPTCHA using geographic concept to defend against 3rd Party Human Attack.
- [IPCCC 2012] Locating jamming attackers in malicious wireless sensor networks.
- [IPCCC 2013] Defend GPUs against DoS attacks.
- [IPCCC 2014] Resisting label-neighborhood attacks in outsourced social networks.
- [IPCCC 2015] Parallel and distributed normalization of security events for instant attack analysis.
- [IPCCC 2015] Defending against Energy Dispatching Data integrity attacks in smart grid.
- [IPCCC 2015] Replication attack detection with monitor nodes in clustered wireless sensor networks.
- [IPCCC 2016] Thwart eavesdropping attacks on network communication based on moving target defense.
- [IPCCC 2016] Polarized beamforming for enhanced countermeasure of wireless jamming attacks.
- [IPCCC 2016] Data integrity attacks against the distributed real-time pricing in the smart grid.
- [IPCCC 2017] Mitigating cloud co-resident attacks via grouping-based virtual machine placement strategy.
- [IPCCC 2018] A Cache Based DoS Attack on Real Information Centric Networking System.
- [IPCCC 2018] A Deep Learning Based Framework for Cloud Masquerade Attack Detection.
- [IPCCC 2019] Autonomous Detection of Synchronization Attacks in the Industrial Internet Of Things.
- [IPCCC 2019] On Effects of Mobility Management Signalling Based DoS Attacks Against LTE Terminals.
- [IPCCC 2019] Efficient Attack Correlation and Identification of Attack Scenarios based on Network-Motifs.
- [IPCCC 2019] ALEAP: Attention-based LSTM with Event Embedding for Attack Projection.
- [IPCCC 2020] A sensor attack detection method based on fusion interval and historical measurement in CPS.
- [IPCCC 2021] RecGraph: Graph Recovery Attack using Variational Graph Autoencoders.
- [IPCCC 2021] Universal Perturbation for Flow Correlation Attack on Tor.
- [IPCCC 2021] Defending Against Adversarial Attacks in Speaker Verification Systems.
- [IPCCC 2022] Exploring Adversarial Attacks on Neural Networks: An Explainable Approach.
- [IPCCC 2022] TForm-RF: An Efficient Data Augmentation for Website Fingerprinting Attack.
- [IPCCC 2022] APEX: Characterizing Attack Behaviors from Network Anomalies.
- [IPCCC 2022] MODLSTM: A Method to Recognize DoS Attacks on Modbus/TCP.
- [IPCCC 2022] DeepThrottle: Deep Reinforcement Learning for Router Throttling to Defend Against DDoS Attack in SDN.
- [IPCCC 2023] Anomaly Detection and Attack Classification in IoT Networks Using Machine Learning.
- [IPCCC 2024] Adaptive Mitigation of Blackhole Attacks in Blockchain-Enhanced Software Defined Networks.
- [IPCCC 2024] Curse to Blessing: Leveraging Model Inversion Attacks to Detect Backdoor Attacks in Federated Learning.
- [IPCCC 2024] Smart Contract Vulnerability Detection Based on AST-Augmented Heterogeneous Graphs.
- [WOWMOM 2010] Empirical studies and queuing modeling of denial of service attacks against 802.11 WLANs.
- [WOWMOM 2010] Detecting blackhole attacks in Disruption-Tolerant Networks through packet exchange recording.
- [WOWMOM 2010] Detection of the Evil ring attack in wireless sensor networks using cross verification.
- [WOWMOM 2012] Association attacks: Identifying association protocols.
- [WOWMOM 2012] Detecting receiver attacks in VRTI-based device free localization.
- [WOWMOM 2012] Efficient broadcast communication in the presence of inside attackers: A non-cooperative game.
- [WOWMOM 2012] Traffic analysis attacks and countermeasures in wireless body area sensor networks.
- [WOWMOM 2013] A flexible multi-criteria scheme to detect primary user emulation attacks in CRAHNs.
- [WOWMOM 2014] Mitigating Blackhole attacks in a hybrid VDTN.
- [WOWMOM 2014] A P2P based usage control enforcement scheme resilient to re-injection attacks.
- [WOWMOM 2016] SWAP: Protecting pull-based P2P video streaming systems from inference attacks.
- [WOWMOM 2016] Security threat assessment of simultaneous multiple Denial-of-Service attacks in IEEE 802.22 Cognitive Radio networks.
- [WOWMOM 2018] QoE Degradation Attack in Dynamic Adaptive Streaming Over ICN.
- [WOWMOM 2018] A Detection Mechanism for Internal Attacks on Pull-Based P2P Streaming Systems.
- [WOWMOM 2020] Evaluation of Feasibility and Impact of Attacks Against the 6top Protocol in 6TiSCH Networks.
- [WOWMOM 2020] Towards Learning-automation IoT Attack Detection through Reinforcement Learning.
- [WOWMOM 2020] DDoSNet: A Deep-Learning Model for Detecting Network Attacks.
- [WOWMOM 2021] Resilience Against Bad Mouthing Attacks in Mobile Crowdsensing Systems via Cyber Deception.
- [WOWMOM 2023] POSTER: Activity Graph Learning for Attack Detection in IoT Networks.
- [WOWMOM 2025] SigDetect: Collaborative Endpoint-based Signal Injection Attack Detection based on Channel Frequency Response.
- [ISCC 2010] Enhanced attack collection scheme on high-interaction web honeypots.
- [ISCC 2010] Mitigating collision and preimage attacks against the generalized MDC-2 mode of operation.
- [ISCC 2010] A key-agreement protocol based on the stack-overflow software vulnerability.
- [ISCC 2010] Playing Defense by Offense: Equilibrium in the DoS-attack problem.
- [ISCC 2010] A link-layer-based self-replicating vulnerability discovery agent.
- [ISCC 2010] Obfuscation-based analysis of SQL injection attacks.
- [ISCC 2011] Vulnerability assessment of intrusion recovery countermeasures in wireless sensor networks.
- [ISCC 2011] Utilizing document classification for grooming attack recognition.
- [ISCC 2011] An efficient heuristic for estimating transportation network vulnerability.
- [ISCC 2013] Sensor Swarm query filtering: Heightened attack resilience for broadcast on-demand services.
- [ISCC 2013] A similarity based approach for application DoS attacks detection.
- [ISCC 2015] A probabilistic model to corroborate three attacks in vehicular ad hoc networks.
- [ISCC 2015] Internet of Things: Security vulnerabilities and challenges.
- [ISCC 2015] Selfish attacks in IEEE 802.11aa networks with intra-AC prioritization.
- [ISCC 2016] Towards mitigating Link Flooding Attack via incremental SDN deployment.
- [ISCC 2016] Evaluating and mitigating a Collusive version of the Interest Flooding Attack in NDN.
- [ISCC 2016] Modeling NDN PIT to analyze the limits of timeout on the effectiveness of flooding attacks.
- [ISCC 2016] Evaluating privacy attacks in Named Data Network.
- [ISCC 2017] Secure the commodity applications against address exposure attacks.
- [ISCC 2017] SDNScore: A statistical defense mechanism against DDoS attacks in SDN environment.
- [ISCC 2017] Locating victims of destructive targeted attacks based on Suspicious Activity Spike Train.
- [ISCC 2017] Efficient attack plan recognition using automated planning.
- [ISCC 2017] Mitigating the ACK counterfeiting attack in Delay and Disruption Tolerant Networks.
- [ISCC 2017] Worst-case attacker models for two-layered networks based on the Minimum Overlay Cut.
- [ISCC 2018] A VM Placement Based Approach to Proactively Mitigate Co-Resident Attacks in Cloud.
- [ISCC 2018] R-TSCH: Proactive Jamming Attack Protection for IEEE 802.15.4-TSCH Networks.
- [ISCC 2018] Non-Authentication Based Checkpoint Fault-tolerant Vulnerability in Spark Streaming.
- [ISCC 2018] NPM: An Anti-attacking Analysis Model of the MTD system Based on Martingale Theory.
- [ISCC 2018] Query-Aware User Privacy Protection for LBS over Query-Feature-based Attacks.
- [ISCC 2018] A Study on Pseudo CRS Signal Jamming Attacks in LTE Network.
- [ISCC 2019] A Deep ConvNet-Based Countermeasure to Mitigate Link Flooding Attacks Using Software-Defined Networks.
- [ISCC 2019] A Novel Immune Detection Approach Enhanced by Attack Graph Based Correlation.
- [ISCC 2019] Mitigating Both Data Corruption and Content Replay Attacks with Implicit Data Integrity.
- [ISCC 2020] Automation of Vulnerability Classification from its Description using Machine Learning.
- [ISCC 2020] A Hardware/Software Collaborative SM4 Implementation Resistant to Side-channel Attacks on ARM-FPGA Embedded SoC.
- [ISCC 2020] WF-GAN: Fighting Back Against Website Fingerprinting Attack Using Adversarial Learning.
- [ISCC 2020] Flush-Detector: More Secure API Resistant to Flush-Based Spectre Attacks on ARM Cortex-A9.
- [ISCC 2020] JumpEstimate: a Novel Black-box Countermeasure to Website Fingerprint Attack Based on Decision-boundary Confusion.
- [ISCC 2020] STUART: ReSilient archiTecture to dynamically manage Unmanned aeriAl vehicle networks under atTack.
- [ISCC 2020] 2ch-TCN: A Website Fingerprinting Attack over Tor Using 2-channel Temporal Convolutional Networks.
- [ISCC 2021] VM Migration Scheduling as Moving Target Defense against Memory DoS Attacks: An Empirical Study.
- [ISCC 2021] Evaluating Resilience of Encrypted Traffic Classification against Adversarial Evasion Attacks.
- [ISCC 2021] An Effective and Efficient Method for Word-Level Textual Adversarial Attack.
- [ISCC 2021] firm VulSeeker: BERT and Siamese based Vulnerability for Embedded Device Firmware Images.
- [ISCC 2021] 5G Core Security in Edge Networks: A Vulnerability Assessment Approach.
- [ISCC 2021] Interpretable deep learning method for attack detection based on spatial domain attention.
- [ISCC 2022] A False Data Injection Attack Detection Approach Using Convolutional Neural Networks in Unmanned Aerial Systems.
- [ISCC 2022] Mollywood: Subtitles as an attack vector.
- [ISCC 2022] ActDetector: A Sequence-based Framework for Network Attack Activity Detection.
- [ISCC 2022] DICOF: A Distributed and Collaborative Framework for Hybrid DDoS Attack Detection.
- [ISCC 2022] StinAttack: A Lightweight and Effective Adversarial Attack Simulation to Ensemble IDSs for Satellite- Terrestrial Integrated Network.
- [ISCC 2022] Assessing Anonymous and Selfish Free-rider Attacks in Federated Learning.
- [ISCC 2022] Avoiding Notorious Content Sources: A Content-Poisoning Attack Mitigation Approach.
- [ISCC 2022] Automating environmental vulnerability analysis for network services.
- [ISCC 2022] MMSP: A LSTM Based Framework for Multi-Step Attack Prediction in Mixed Scenarios.
- [ISCC 2022] MAC-Layer Traffic Shaping Defense Against WiFi Device Fingerprinting Attacks.
- [ISCC 2023] Attack Analysis on Two-party Signature and Threshold Signature Based on Dilithium.
- [ISCC 2023] BVSNO: Binary Code Vulnerability Detection Based on Slice Semantic and Node Order.
- [ISCC 2023] Federated Byzantine Agreement Protocol Robustness to Targeted Network Attacks.
- [ISCC 2023] Automated WiFi Incident Detection Attack Tool on 802.11 Networks.
- [ISCC 2023] On the Efficacy of Differential Cryptanalysis Attacks on K-Cipher.
- [ISCC 2023] Autoencoder-SAD: An Autoencoder-based Model for Security Attacks Detection.
- [ISCC 2023] A GNN-Based Rate Limiting Framework for DDoS Attack Mitigation in Multi-Controller SDN.
- [ISCC 2023] Which2learn: A Vulnerability Dataset Complexity Measurement Method for Data-Driven Detectors.
- [ISCC 2023] Driving into Danger: Adversarial Patch Attack on End-to-End Autonomous Driving Systems Using Deep Learning.
- [ISCC 2023] Using Long-Short-Term Memory to Effectively Identify Persistent Routes Under Stealthy Link Flooding Attacks in Software-Defined Networks.
- [ISCC 2023] An Enhanced Vulnerability Detection in Software Using a Heterogeneous Encoding Ensemble.
- [ISCC 2023] Revisiting Data Poisoning Attacks on Deep Learning Based Recommender Systems.
- [ISCC 2023] GoGDDoS: A Multi-Classifier for DDoS Attacks Using Graph Neural Networks.
- [ISCC 2024] NuanceTracker: A Website Fingerprinting Attack against Tor Hidden Services through Burst patterns.
- [ISCC 2024] Early Detection of Fileless Attacks Based on Multi-Feature Fusion of Complex Attack Vectors.
- [ISCC 2024] Comparative Analysis of Methods for Performing a Side-Channel Video-Fingerprinting Attack.
- [ISCC 2024] eBPF-sec: A Defensive Framework Against eBPF Attacks on Containers.
- [ISCC 2024] Resilience of lattice-based Cryptosystems to Quantum Attacks.
- [ISCC 2024] Balancing Detection Speed and Resource Efficiency in Healthcare Vulnerability Scanning.
- [ISCC 2024] HID Detector: A New Detection Framework Against HID Attacks Based on Behavior Features.
- [ISCC 2024] CARACAS: vehiCular ArchitectuRe for detAiled Can Attacks Simulation.
- [ISCC 2024] Fast, Private, and Protected: Safeguarding Data Privacy and Defending Against Model Poisoning Attacks in Federated Learning.
- [ISCC 2024] Attacks detection in Cyber-Physical Systems with Neural Networks: a case study.
- [WCNC 2010] A Biologically Inspired Framework for Mitigating Epidemic and Pandemic Attacks in the NGMN.
- [WCNC 2010] A Metric for Quantifying Key Exposure Vulnerability in Wireless Sensor Networks.
- [WCNC 2010] An Eavesdrop Vulnerability Analysis of Random Network Coding over Wireless Ad-Hoc Networks.
- [WCNC 2010] Attack-Resistant Sensor Localization under Realistic Wireless Signal Fading.
- [WCNC 2010] Early and Lightweight Distributed Detection of Node Replication Attack in Sensor Networks.
- [WCNC 2011] Defense against primary user emulation attacks using belief propagation of location information in cognitive radio networks.
- [WCNC 2012] Technical vulnerability of the E-UTRAN paging mechanism.
- [WCNC 2012] Preventing wormhole attacks using physical layer authentication.
- [WCNC 2013] Transmission cost minimization with vulnerability constraint in wireless sensor networks.
- [WCNC 2013] Protecting wireless sensor networks from internal attacks based on uncertain decisions.
- [WCNC 2013] Detecting DoS attacks in WSN based on clustering technique.
- [WCNC 2013] Deferrable load scheduling optimization under power price information attacks in smart grid.
- [WCNC 2014] Coordinated attacks on cooperative spectrum sensing in cognitive radio networks.
- [WCNC 2014] A routing game in Cognitive Radio Networks against Routing-toward-Primary-User Attacks.
- [WCNC 2015] A theoretical framework of resilience: Biased random walk routing against insider attacks.
- [WCNC 2015] Performance analysis of delay-constrained wireless energy harvesting communication networks under jamming attacks.
- [WCNC 2015] Strong authentication countermeasures using dynamic keying for sinkhole and distance spoofing attacks in smart grid networks.
- [WCNC 2015] Joint estimation-detection of cyber attacks in smart grids: Bayesian and non-Bayesian formulations.
- [WCNC 2016] An efficient CGA algorithm against DoS attack on duplicate address detection process.
- [WCNC 2017] Insider-Attacks on Physical-Layer Group Secret-Key Generation in Wireless Networks.
- [WCNC 2017] IEEE 802.11 Network Anomaly Detection and Attack Classification: A Deep Learning Approach.
- [WCNC 2017] On the Performance of the DNPS-Based Relay Networks under Attack by Masquerader.
- [WCNC 2017] Support Vector Machine (SVM) Based Sybil Attack Detection in Vehicular Networks.
- [WCNC 2018] Cyberattack detection in mobile cloud computing: A deep learning approach.
- [WCNC 2018] Attack tolerance of RSS-based fingerprinting.
- [WCNC 2018] Cognitive radio from hell: Flipping attack on direct-sequence spread spectrum.
- [WCNC 2018] Efficient detection of electricity theft cyber attacks in AMI networks.
- [WCNC 2018] ICA-based channel estimation and identification against pilot spoofing attack for OFDM systems.
- [WCNC 2018] Online orchestration of cooperative defense against DDoS attacks for 5G MEC.
- [WCNC 2018] Exploring the behaviors and threats of pollution attack in cooperative MEC caching.
- [WCNC 2019] Global Orchestration of Cooperative Defense against DDoS Attacks for MEC.
- [WCNC 2019] Modeling and evaluation of a new IoT security system for mitigating DoS attacks to the MQTT broker.
- [WCNC 2019] Mitigating DoS Attacks against SDN Controller Using Information Hiding.
- [WCNC 2020] Collaborative Learning Model for Cyberattack Detection Systems in IoT Industry 4.0.
- [WCNC 2020] Weighted Trustworthiness for ML Based Attacks Classification.
- [WCNC 2020] Robust Self-Protection Against Application-Layer (D)DoS Attacks in SDN Environment.
- [WCNC 2020] Adversarial Jamming Attacks on Deep Reinforcement Learning Based Dynamic Multichannel Access.
- [WCNC 2021] Predictable Model for Detecting Sybil Attacks in Mobile Social Networks.
- [WCNC 2021] Shielding Federated Learning: A New Attack Approach and Its Defense.
- [WCNC 2021] LDoS Attack Detection Based on ASNNC-OFA Algorithm.
- [WCNC 2021] Secure Connected Vehicle-based Traffic Signal Systems Against Data Spoofing Attacks.
- [WCNC 2022] Defense Strategies Toward Model Poisoning Attacks in Federated Learning: A Survey.
- [WCNC 2022] Semi-supervised Learning-enabled Two-stage Framework for Cooperative Spectrum Sensing Against SSDF Attack.
- [WCNC 2022] Federated Learning Stability Under Byzantine Attacks.
- [WCNC 2022] A Robust Distributed Intrusion Detection System for Collusive Attacks on Edge of Things.
- [WCNC 2022] Adversarial Attacks on Deep-Learning RF Classification in Spectrum Monitoring with Imperfect Bandwidth Estimation.
- [WCNC 2022] Effectiveness Evaluation of Evasion Attack on Encrypted Malicious Traffic Detection.
- [WCNC 2022] Learning-Based Robust Anomaly Detection in the Presence of Adversarial Attacks.
- [WCNC 2022] IoTMonitor: A Hidden Markov Model-based Security System to Identify Crucial Attack Nodes in Trigger-action IoT Platforms.
- [WCNC 2023] Physical Layer Protection Against Relay/Replay Attacks for Short-Range Systems.
- [WCNC 2023] Efficient Privacy-Preserving Federated Learning Against Inference Attacks for IoT.
- [WCNC 2023] Self-supervised Multi-Modal Video Forgery Attack Detection.
- [WCNC 2023] eSWORD: Implementation of Wireless Jamming Attacks in a Real-World Emulated Network.
- [WCNC 2023] Feature Engineering and Machine Learning Pipeline for Detecting Radio Protocol-based Attacks.
- [WCNC 2023] SymSDN: A DRDoS Attack Prevention Approach.
- [WCNC 2024] Knock-Knock: De-Anonymise Hidden Services by Exploiting Service Answer Vulnerability.
- [WCNC 2024] Achieving Covertness and Secrecy in Wireless Communications with Active Attackers.
- [WCNC 2024] IoTWarden: A Deep Reinforcement Learning Based Real-Time Defense System to Mitigate Trigger-Action IoT Attacks.
- [WCNC 2024] Spoofing Attack Detection in the Physical Layer with Robustness to User Movement.
- [WCNC 2024] Real-time Cyberattack Detection with Collaborative Learning for Blockchain Networks.
- [WCNC 2024] Patronus: Countering Model Poisoning Attacks in Edge Distributed DNN Training.
- [WCNC 2024] ZETA: ZEro-Trust Attack Framework with Split Learning for Autonomous Vehicles in 6G Networks.
- [WCNC 2024] Game Theory for 5G Cloud- Edge-Terminal Distributed Networks under DoS Attacks.
- [WCNC 2024] Enhancing In-Vehicle Network Security Against AI-Generated Cyberattacks Using Machine Learning.
- [WCNC 2024] Analytical Modeling of Denial-of-Service Attacks in Blockchain Shardings.
- [WCNC 2024] TF-Timer: Mitigating Cache Side-Channel Attacks in Cloud through a Targeted Fuzzy Timer.
- [WCNC 2024] Adaptive Weight XGBoost: Detecting and Mitigating Low-Rate DoS Attack in Network Slicing.
- [WCNC 2025] Experimental Viability of Full-Frame 5G Meaconing Attacks.
- [WCNC 2025] Digital Twin-Enabled Lightweight Attack Detection for Software-Defined Edge Networks.
- [WCNC 2025] Leveraging Explainable AI for Adaptive Adversarial DoS Attack Detection in 6G IoT Networks.
- [WCNC 2025] Comprehensive Security Analysis and DoS Attack Mitigation in Thread Networks.
- [WCNC 2025] Imperceptible and Targeted Physical Attacks on Deep Learning-Based Speech Semantic Communications.
- [WCNC 2025] A Robust Joint RSS and Doppler Shift-Based Sybil Attack Detection Scheme for Mobile Networks.
- [WCNC 2025] Defeating Eavesdropping Attacks with Inter-Cell Interference and Deep Reinforcement Learning.
- [WCNC 2025] Detection and Mitigation of Jamming Attacks in LoRaWan Using Machine Learning.
- [WCNC 2025] A Novel 5G Key Reinstallation Attack and Defensive Strategies.
- [WCNC 2025] Practical Guidelines to Assess Vulnerabilities in 5G Core Network and OPEN RAN.
- [WCNC 2025] Securing IoT LoRaWAN Networks Against Duty Cycle Compliant Jamming Attacks.
- [NETWORKING 2010] Path Attestation Scheme to Avert DDoS Flood Attacks.
- [NETWORKING 2012] On the Vulnerability of Hardware Hash Tables to Sophisticated Attacks.
- [NETWORKING 2013] Interest flooding attack and countermeasures in Named Data Networking.
- [NETWORKING 2014] A distributed infrastructure to analyse SIP attacks in the Internet.
- [NETWORKING 2016] User location tracking attacks for LTE networks using the interworking functionality.
- [NETWORKING 2017] Early detection of in-the-wild botnet attacks by exploiting network communication uniformity: An empirical study.
- [NETWORKING 2017] On the impact of sybil attacks in cooperative driving scenarios.
- [NETWORKING 2019] The Risk of Successive Disasters: A Blow-by-Blow Network Vulnerability Analysis.
- [NETWORKING 2019] Poster: A framework to secure IoT networks against network layer attacks.
- [NETWORKING 2021] Poster: DDoSGrid: a Platform for the Post-mortem Analysis and Visualization of DDoS Attacks.
- [NETWORKING 2022] Malicious attack detection based on traffic-flow information fusion.
- [NETWORKING 2022] Lightweight Fingerprint Attack and Encrypted Traffic Analysis on News Articles.
- [NETWORKING 2022] Query-Efficient and Imperceptible Attacks on Multivariate Time Series DNN Models.
- [NETWORKING 2022] Preventing the Flood: Incentive-Based Collaborative Mitigation for DRDoS Attacks.
- [NETWORKING 2024] Poisoning Attacks on Federated Learning-based Wireless Traffic Prediction.
- [NETWORKING 2024] Inter-Slice Defender: An Anomaly Detection Solution for Distributed Slice Mobility Attacks.
- [NETWORKING 2024] Evaluating Localization Algorithms in IoT Networks Under Jamming Attacks.
- [IM 2013] Slowing down to speed up: Mitigating collusion attacks in Content Distribution Systems.
- [IM 2013] Ovaldroid: An OVAL-based vulnerability assessment framework for Android.
- [IM 2015] Booters - An analysis of DDoS-as-a-service attacks.
- [IM 2015] An optimal statistical test for robust detection against interest flooding attacks in CCN.
- [IM 2015] Unveiling flat traffic on the Internet: An SSH attack case study.
- [IM 2015] Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for Internet of Things.
- [IM 2015] Investigating unique flow marking for tracing back DDoS attacks.
- [IM 2015] Collaborative attack mitigation and response: A survey.
- [IM 2015] Real-time DDoS attack detection for Cisco IOS using NetFlow.
- [IM 2015] Denial-of-service attacks in OpenFlow SDN networks.
- [IM 2015] A simulation model for analysis of attacks on the Bitcoin peer-to-peer network.
- [IM 2015] TOPASE: Detection of brute force attacks used disciplined IPs from IDS log.
- [IM 2017] Managing vulnerabilities in a cloud native world with bluefix.
- [IM 2017] Attacking SCADA systems: A practical perspective.
- [IM 2017] FlowVisor vulnerability analysis.
- [IM 2017] Comprehensive vulnerability assessment and optimization method for smart grid communication transmission systems.
- [IM 2017] Defending against Probe-Response Attacks.
- [IM 2017] Towards optimally resilient topologies against optimal attacks.
- [IM 2017] DDoS attack volume forecasting using a statistical approach.
- [IM 2017] Applied Machine Learning predictive analytics to SQL Injection Attack detection and prevention.
- [IM 2019] Offloading Real-time DDoS Attack Detection to Programmable Data Planes.
- [IM 2019] Attacker Behavior-Based Metric for Security Monitoring Applied to Darknet Analysis.
- [IM 2019] Mitigation of Multi-vector Network Attacks via Orchestration of Distributed Rule Placement.
- [IM 2019] A Charging/Rewarding mechanism-based Interest Flooding Attack mitigation strategy in NDN.
- [IM 2019] Demonstration of Synchronization Attacks on Distributed and Cooperative Control in Microgrids.
- [IM 2021] Adaptive Observation of Emerging Cyber Attacks targeting Various IoT Devices.
- [IM 2021] FQDN-Based Whitelist Filter on a DNS Cache Server Against the DNS Water Torture Attack.
- [IM 2021] Defense Against SYN Flood DoS Attacks Using Network-based Mitigation Techniques.
- [IM 2021] Detection of DoS/DDoS attacks: the UBM and GMM approach.
- [IM 2021] ORACLE: An Architecture for Collaboration of Data and Control Planes to Detect DDoS Attacks.
- [MSN 2011] An Overview of Bootkit Attacking Approaches.
- [MSN 2011] Towards a Flaw Function Heuristic Vulnerability Static Analysis Framework for Executable File.
- [MSN 2011] Shrew Attack in Cloud Data Center Networks.
- [MSN 2016] Energy Preserving Detection Model for Collaborative Black Hole Attacks in Wireless Sensor Networks.
- [MSN 2017] TSA: A Two-Phase Scheme Against Amplification DDoS Attack in SDN.
- [MSN 2018] Launching Low-Rate DoS Attacks with Cache-Enabled WiFi Offloading.
- [MSN 2019] VDetector: Detecting Vulnerability Based on Inter-Component Data Flows in Android Applications.
- [MSN 2020] Optimal Defense Strategy against Evasion Attacks.
- [MSN 2020] SASAK: Shrinking the Attack Surface for Android Kernel with Stricter “seccomp” Restrictions.
- [MSN 2020] A Method to Construct Vulnerability Knowledge Graph based on Heterogeneous Data.
- [MSN 2021] Defending Against Byzantine Attacks in Quantum Federated Learning.
- [MSN 2021] Defending against Membership Inference Attacks in Federated learning via Adversarial Example.
- [MSN 2021] DeSMP: Differential Privacy-exploited Stealthy Model Poisoning Attacks in Federated Learning.
- [MSN 2021] Publish or Perish: Defending Withholding Attack in Dfinity Consensus.
- [MSN 2021] ReDetect: Reentrancy Vulnerability Detection in Smart Contracts with High Accuracy.
- [MSN 2021] Intelligent IDS Chaining for Network Attack Mitigation in SDN.
- [MSN 2022] Shielding Federated Learning: Mitigating Byzantine Attacks with Less Constraints.
- [MSN 2022] Accelerating Adversarial Attack using Process-in-Memory Architecture.
- [MSN 2022] PhysioGait: Context-Aware Physiological Context Modeling for Person Re-identification Attack on Wearable Sensing.
- [MSN 2022] Secure Deduplication Against Frequency Analysis Attacks.
- [MSN 2022] Web Attack Payload Identification and Interpretability Analysis Based on Graph Convolutional Network.
- [MSN 2022] A Mitmproxy-based Dynamic Vulnerability Detection System For Android Applications.
- [MSN 2022] IA-DD: An SDN Topological Poisoning Attack Defense Scheme Based on Blockchain.
- [MSN 2022] Low-power Robustness Learning Framework for Adversarial Attack on Edges.
- [MSN 2022] A Mitmproxy-based Dynamic Vulnerability Detection System For Android Applications.
- [MSN 2023] Crossfire Attack Defense Method Based on Virtual Topology.
- [MSN 2023] ShuffleCAN: Enabling Moving Target Defense for Attack Mitigation on Automotive CAN.
- [MSN 2023] Arrow: Capture the Inaudible Attacker in 3D Space via Smart-speaker.
- [MSN 2023] Supvirus: A Scenario-Oriented Feature Poisoning Attack Approach in SplitFed Learning.
- [MSN 2023] Data Poisoning Attack Based on Privacy Reasoning and Countermeasure in Federated Learning.
- [MSN 2023] Efficient Side-Channel Attack through Balanced Labels Compression and Variational Autoencoder.
- [MSN 2023] BypTalker: An Adaptive Adversarial Example Attack to Bypass Prefilter-enabled Speaker Recognition.
- [MSN 2023] B³A: Bokeh Based Backdoor Attack with Feature Restrictions.
- [MSN 2023] Maximizing Throughput in Unmanned Surface Vehicle Relay System under Jamming Attacks.
- [MSN 2024] Apollo: Permissioned Blockchain Network Auto-Tuning Based on DRL Against Eclipse Attack.
- [MSN 2024] ML-AGNN: Smart Contract Vulnerability Detection Method Based on a Multi-Level Attention Graph Neural Network.
- [MSN 2024] X-EDF: An Efficient Defensive Deception Framework against Reconnaissance Attacks.
- [MSN 2024] CLGuard: Presentation Attack Detection Model using Clean Labels for Copyright Protection.
- [MSN 2024] Efficient Short Video Identification Attack for Scenarios with Hybrid Transmission Modes and Preloading Mechanism.
- [MSN 2024] Hybrid-Based Timing Attack for Path Inference in Named Data Networking.
- [MSN 2024] Template Inversion Attack Against Face Recognition Systems in Smart Cities with a Tiny Dataset.
- [MSN 2024] Enhancing Membership Inference Attacks in Federated Learning Based on Overfitting Property.
- [MSN 2024] A Dual Convolution Hybrid Multi-Model for Code Vulnerability Detection.
- [MSN 2024] Poster Abstract: Leveraging Phase Offset for Stealthy Backdoor Attacks.
- [MSWIM 2013] Solution of detecting jamming attacks in vehicle ad hoc networks.
- [MSWIM 2014] Entropy as a new metric for denial of service attack detection in vehicular ad-hoc networks.
- [MSWIM 2018] Cascading Attacks on Wi-Fi Networks with Weak Interferers.
- [MSWIM 2019] Secure Routing in Multi-hop IoT-based Cognitive Radio Networks under Jamming Attacks.
- [MSWIM 2022] An Adaptable Module for Designing Jamming Attacks in WiFi Networks for ns-3.
- [MSWIM 2023] A VeReMi-based Dataset for Predicting the Effect of Attacks in VANETs.
- [WASA 2010] Prevention of Wormhole Attacks in Mobile Ad Hoc Networks by Intrusion Detection Nodes.
- [WASA 2012] On the Performance of TDD and LDD Based Clone Attack Detection in Mobile Ad Hoc Networks.
- [WASA 2015] EBRS: Event Based Reputation System for Defensing Multi-source Sybil Attacks in VANET.
- [WASA 2015] Enhancing Wireless Security Against Reactive Jamming Attacks: A Game-Theoretical Framework.
- [WASA 2015] Performance of Target Tracking in Radar Network System Under Deception Attack.
- [WASA 2015] A Simplified Attack-Defense Game Model for NSSA.
- [WASA 2016] Optimal Jamming Attack Schedule Against Wireless State Estimation in Cyber-Physical Systems.
- [WASA 2016] Toward Exposing Timing-Based Probing Attacks in Web Applications.
- [WASA 2017] Detect SIP Flooding Attacks in VoLTE by Utilizing and Compressing Counting Bloom Filter.
- [WASA 2017] Preserving Privacy in Social Networks Against Label Pair Attacks.
- [WASA 2017] Breakdown by Rumors: Vulnerability of D2D Communications from Online Social Networks.
- [WASA 2017] CacheRascal: Defending the Flush-Reload Side-Channel Attack in PaaS Clouds.
- [WASA 2018] KrackCover: A Wireless Security Framework for Covering KRACK Attacks.
- [WASA 2019] Detecting Android Side Channel Probing Attacks Based on System States.
- [WASA 2021] AOPL: Attention Enhanced Oversampling and Parallel Deep Learning Model for Attack Detection in Imbalanced Network Traffic.
- [WASA 2021] Greedy-Based Black-Box Adversarial Attack Scheme on Graph Structure.
- [WASA 2021] Adaptive Chosen Plaintext Side-Channel Attacks for Higher-Order Masking Schemes.
- [WASA 2021] Mind the Amplification: Cracking Content Delivery Networks via DDoS Attacks.
- [WASA 2021] TFRA: Trajectory-Based Message Ferry Recognition Attack in UAV Network.
- [WASA 2021] Hacks Hit the Phish: Phish Attack Detection Based on Hacks Search.
- [WASA 2021] Attack Traffic Detection Based on LetNet-5 and GRU Hierarchical Deep Neural Network.
- [WASA 2021] New Rectangle Attack Against SKINNY Block Cipher.
- [WASA 2022] Inferring Device Interactions for Attack Path Discovery in Smart Home IoT.
- [WASA 2022] Robust Truth Discovery Against Multi-round Data Poisoning Attacks.
- [WASA 2022] BERT-Based Vulnerability Type Identification with Effective Program Representation.
- [WASA 2022] An Efficient Soft Analytical Side-Channel Attack on Ascon.
- [WASA 2022] Secure RFID Handwriting Recognition-Attacker Can Hear but Cannot Understand.
- [WASA 2022] Reinforcement Learning Based Vulnerability Analysis for Smart Grids Against False Data Injection Attacks.
- [WASA 2022] Gradient-Based Adversarial Attacks Against Malware Detection by Instruction Replacement.
- [WASA 2022] Low-Poisoning Rate Invisible Backdoor Attack Based on Important Neurons.
- [WASA 2022] Multi-view Pre-trained Model for Code Vulnerability Identification.
- [WASA 2022] Dataset for Evaluation of DDoS Attacks Detection in Vehicular Ad-Hoc Networks.
- [WASA 2022] CodeDiff: A Malware Vulnerability Detection Tool Based on Binary File Similarity for Edge Computing Platform.
- [WASA 2024] E-SAGE: Explainability-Based Defense Against Backdoor Attacks on Graph Neural Networks.
- [WASA 2024] Sophon IDS: Mitigating the Effectiveness of GAN-Based Adversarial Attacks via Tailored Misinformation.
- [WASA 2024] The Client-Level GAN-Based Data Reconstruction Attack and Defense in Clustered Federated Learning.
- [WASA 2024] Defending Against Poisoning Attacks in Federated Prototype Learning on Non-IID Data.
- [WASA 2024] FEAttack: A Fast and Efficient Hard-Label Textual Attack Framework.
- [WASA 2024] Active Defense Simulation Evaluation of Industrial Control Systems Based on Attack-Defense Graph.
- [WASA 2024] DevDet: Detecting IoT Device Impersonation Attacks via Traffic Based Identification.
- [WASA 2024] Towards Robust Internet of Vehicles Security: An Edge Node-Based Machine Learning Framework for Attack Classification.
- [WASA 2024] Autocue : Targeted Textual Adversarial Attacks with Adversarial Prompts.
- [WASA 2025] Discovering PLC Web Application Vulnerabilities Impacting Physical Control Using LLM-Based Fuzzing.
- [WASA 2025] The Defense Against Backdoor Attacks Using Trigger Inversion and Data Augmentation in Clustered Federated Learning.
- [WASA 2025] MACROSS: End-to-End Network Attack Detection Model for EV Charging Station Based on Temporal-Frequency Feature Fusion.
- [WASA 2025] Black-Box Universal Adversarial Attack Targeting Speaker Recognition Models.
- [WASA 2025] Adaptive Privacy Defense Against Category Inference Attack in Clustered Federated Learning: Balancing Security and Model Performance.
- [HOTNETS 2013] Cross-path inference attacks on multipath TCP.
- [HOTNETS 2016] Dispersing Asymmetric DDoS Attacks with SplitStack.
- [HOTNETS 2023] Mars Attacks!: Software Protection Against Space Radiation.
- [APNET 2021] Exploring the Impact of Attacks on Ring AllReduce.
- [APNET 2022] A Component Vulnerability Matching Approach for IoT Firmware.
- [APNET 2024] A Radial Basis Function Neural Network-based Detection Method for Collusive Interest Flooding Attacks in Named Data Networks.
- [APNET 2024] ESPRESSO: Advanced End-to-End Flow Correlation Attacks on Tor.
- [CCS 2010] Testing metrics for password creation policies by attacking large sets of revealed passwords.
- [CCS 2010] Attacks and design of image recognition CAPTCHAs.
- [CCS 2010] Modeling attacks on physical unclonable functions.
- [CCS 2010] Attacking and fixing PKCS#11 security tokens.
- [CCS 2010] In search of an anonymous and secure lookup: attacks on structured peer-to-peer anonymous communication systems.
- [CCS 2010] BLADE: an attack-agnostic approach for preventing drive-by malware infections.
- [CCS 2010] Protecting browsers from cross-origin CSS attacks.
- [CCS 2010] Demonstrating cognitive packet network resilience to worm attacks.
- [CCS 2010] Timing attacks on PIN input devices.
- [CCS 2010] Protecting location privacy against inference attacks.
- [CCS 2010] iFriendU: leveraging 3-cliques to enhance infiltration attacks in online social networks.
- [CCS 2010] Losing control of the internet: using the data plane to attack the control plane.
- [CCS 2011] On the requirements for successful GPS spoofing attacks.
- [CCS 2011] On the vulnerability of FPGA bitstream encryption against power analysis attacks: extracting keys from xilinx Virtex-II FPGAs.
- [CCS 2011] Fear the EAR: discovering and mitigating execution after redirect vulnerabilities.
- [CCS 2011] Automated black-box detection of side-channel vulnerabilities in web applications.
- [CCS 2011] Eliminating the hypervisor attack surface for a more secure cloud.
- [CCS 2011] Poster: Destabilizing BitTorrent’s clusters to attack high bandwidth leechers.
- [CCS 2011] Poster: the quest for security against privilege escalation attacks on android.
- [CCS 2011] Poster: mimicry attacks against wireless link signature.
- [CCS 2011] Poster: inference attacks against searchable encryption protocols.
- [CCS 2012] A cross-protocol attack on the TLS protocol.
- [CCS 2012] An historical examination of open source releases and their vulnerabilities.
- [CCS 2012] Mobile data charging: new attacks and countermeasures.
- [CCS 2012] CHEX: statically vetting Android apps for component hijacking vulnerabilities.
- [CCS 2012] Resource-freeing attacks: improve your cloud performance (at your neighbor’s expense).
- [CCS 2012] Operating system framed in case of mistaken identity: measuring the success of web-based spoofing attacks on OS password-entry dialogs.
- [CCS 2012] GPS software attacks.
- [CCS 2012] Towards a bayesian network game framework for evaluating DDoS attacks and defense.
- [CCS 2012] Collaborative TCP sequence number inference attack: how to crack sequence number under a second.
- [CCS 2012] Touching from a distance: website fingerprinting attacks and defenses.
- [CCS 2012] Protecting location privacy: optimal strategy against localization attacks.
- [CCS 2012] Scriptless attacks: stealing the pie without touching the sill.
- [CCS 2012] Before we knew it: an empirical study of zero-day attacks in the real world.
- [CCS 2013] Impact of integrity attacks on real-time pricing in smart grids.
- [CCS 2013] Chucky: exposing missing checks in source code for vulnerability discovery.
- [CCS 2013] mXSS attacks: attacking well-secured web-applications by using innerHTML mutations.
- [CCS 2013] Towards reducing the attack surface of software backdoors.
- [CCS 2013] Cross-origin pixel stealing: timing attacks using CSS filters.
- [CCS 2013] Hang with your buddies to resist intersection attacks.
- [CCS 2013] Diglossia: detecting code injection attacks with precision and efficiency.
- [CCS 2013] Computationally complete symbolic attacker and key exchange.
- [CCS 2013] Protecting sensitive web content from client-side vulnerabilities with CRYPTONS.
- [CCS 2013] Signal anomaly based attack detection in wireless sensor networks.
- [CCS 2013] A new framework against privilege escalation attacks on android.
- [CCS 2013] trend of online flash XSS vulnerabilities.
- [CCS 2013] Reflected attacks abusing honeypots.
- [CCS 2014] Code Reuse Attacks in PHP: Automated POP Chain Generation.
- [CCS 2014] Information Leaks Without Memory Disclosures: Remote Side Channel Attacks on Diversified Code.
- [CCS 2014] Code Injection Attacks on HTML5-based Mobile Apps: Characterization, Detection and Mitigation.
- [CCS 2014] A11y Attacks: Exploiting Accessibility in Operating Systems.
- [CCS 2014] Your Online Interests: Pwned! A Pollution Attack Against Targeted Advertising.
- [CCS 2014] ATRA: Address Translation Redirection Attack against Hardware-based External Monitors.
- [CCS 2014] A Critical Evaluation of Website Fingerprinting Attacks.
- [CCS 2014] Security Vulnerability in Processor-Interconnect Router Design.
- [CCS 2014] ARPKI: Attack Resilient Public-Key Infrastructure.
- [CCS 2014] Context-free Attacks Using Keyboard Acoustic Emanations.
- [CCS 2014] A Computationally Complete Symbolic Attacker for Equivalence Properties.
- [CCS 2014] MACE: Detecting Privilege Escalation Vulnerabilities in Web Applications.
- [CCS 2014] Vulnerability and Protection of Channel State Information in Multiuser MIMO Networks.
- [CCS 2014] Wiretapping via Mimicry: Short Voice Imitation Man-in-the-Middle Attacks on Crypto Phones.
- [CCS 2014] From Patches to Honey-Patches: Lightweight Attacker Misdirection, Deception, and Disinformation.
- [CCS 2014] Cross-Tenant Side-Channel Attacks in PaaS Clouds.
- [CCS 2014] Synthesis of Fault Attacks on Cryptographic Implementations.
- [CCS 2014] Hey, NSA: Stay Away from my Market! Future Proofing App Markets against Powerful Attackers.
- [CCS 2014] S3: A Symbolic String Solver for Vulnerability Detection in Web Applications.
- [CCS 2014] POSTER: Positioning Attack on Proximity-Based People Discovery.
- [CCS 2014] POSTER: Compromising Cloaking-based Location Privacy Preserving Mechanisms with Location Injection Attacks.
- [CCS 2014] POSTER: TraceVirt: A Framework for Detecting the Non-tampering Attacks in the Virtual Machine.
- [CCS 2014] POSTER: Protecting Against Data Exfiltration Insider Attacks Through Application Programs.
- [CCS 2014] POSTER: How Distributed Are Today’s DDoS Attacks?
- [CCS 2014] POSTER: On the Capability of DNS Cache Poisoning Attacks.
- [CCS 2014] POSTER: UAFChecker: Scalable Static Detection of Use-After-Free Vulnerabilities.
- [CCS 2015] It’s a TRaP: Table Randomization and Protection against Function-Reuse Attacks.
- [CCS 2015] Heisenbyte: Thwarting Memory Disclosure Attacks using Destructive Code Reads.
- [CCS 2015] ASLR-Guard: Stopping Address Space Leakage for Code Reuse Attacks.
- [CCS 2015] Static Detection of Packet Injection Vulnerabilities: A Case for Identifying Attacker-controlled Implicit Information Leaks.
- [CCS 2015] Unearthing Stealthy Program Attacks Buried in Extremely Long Execution Paths.
- [CCS 2015] From Collision To Exploitation: Unleashing Use-After-Free Vulnerabilities in Linux Kernel.
- [CCS 2015] VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits.
- [CCS 2015] FlowWatcher: Defending against Data Disclosure Vulnerabilities in Web Applications.
- [CCS 2015] Detecting and Exploiting Second Order Denial-of-Service Vulnerabilities in Web Applications.
- [CCS 2015] Inference Attacks on Property-Preserving Encrypted Databases.
- [CCS 2015] Leakage-Abuse Attacks Against Searchable Encryption.
- [CCS 2015] Where’s Wally?: Precise User Discovery Attacks in Location Proximity Services.
- [CCS 2015] Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks.
- [CCS 2015] PyCRA: Physical Challenge-Response Authentication For Active Sensors Under Spoofing Attacks.
- [CCS 2015] Lattice Basis Reduction Attack against Physically Unclonable Functions.
- [CCS 2015] An Empirical Study of Web Vulnerability Discovery Ecosystems.
- [CCS 2015] Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures.
- [CCS 2015] The Clock is Still Ticking: Timing Attacks in the Modern Web.
- [CCS 2015] Cross-Site Search Attacks.
- [CCS 2015] The Spy in the Sandbox: Practical Cache Attacks in JavaScript and their Implications.
- [CCS 2015] Mass-surveillance without the State: Strongly Undetectable Algorithm-Substitution Attacks.
- [CCS 2015] POSTER: Page Table Manipulation Attack.
- [CCS 2015] POSTER: PatchGen: Towards Automated Patch Detection and Generation for 1-Day Vulnerabilities.
- [CCS 2016] Call Me Back!: Attacks on System Server and System Apps in Android through Synchronous Callback.
- [CCS 2016] Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR.
- [CCS 2016] Message-Recovery Attacks on Feistel-Based Format Preserving Encryption.
- [CCS 2016] On the Practical (In-)Security of 64-bit Block Ciphers: Collision Attacks on HTTP over TLS and OpenVPN.
- [CCS 2016] CREDAL: Towards Locating a Memory Corruption Vulnerability with Your Core Dump.
- [CCS 2016] Twice the Bits, Twice the Trouble: Vulnerabilities Induced by Migrating to 64-Bit Platforms.
- [CCS 2016] My Smartphone Knows What You Print: Exploring Smartphone-based Side-channel Attacks Against 3D Printers.
- [CCS 2016] Limiting the Impact of Stealthy Attacks on Industrial Control Systems.
- [CCS 2016] Generic Attacks on Secure Outsourced Databases.
- [CCS 2016] The Shadow Nemesis: Inference Attacks on Efficiently Deployable, Efficiently Searchable Encryption.
- [CCS 2016] Identifying the Scan and Attack Infrastructures Behind Amplification DDoS Attacks.
- [CCS 2016] Attacking OpenSSL Implementation of ECDSA with a Few Signatures.
- [CCS 2016] Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition.
- [CCS 2016] Drammer: Deterministic Rowhammer Attacks on Mobile Platforms.
- [CCS 2016] SFADiff: Automated Evasion Attacks and Fingerprinting Using Black-box Differential Automata Learning.
- [CCS 2016] POSTER: Attack on Non-Linear Physical Unclonable Function.
- [CCS 2016] POSTER: Mapping the Landscape of Large-Scale Vulnerability Notifications.
- [CCS 2016] POSTER: VUDEC: A Framework for Vulnerability Management in Decentralized Communication Networks.
- [CCS 2016] POSTER: WiPING: Wi-Fi signal-based PIN Guessing attack.
- [CCS 2017] DolphinAttack: Inaudible Voice Commands.
- [CCS 2017] Hindsight: Understanding the Evolution of UI Vulnerabilities in Mobile Browsers.
- [CCS 2017] Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin.
- [CCS 2017] Zero-Knowledge Contingent Payments Revisited: Attacks and Payments for Services.
- [CCS 2017] RAIN: Refinable Attack Investigation with On-demand Inter-Process Information Flow Tracking.
- [CCS 2017] May the Fourth Be With You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519.
- [CCS 2017] STACCO: Differentially Analyzing Side-Channel Traces for Detecting SSL/TLS Vulnerabilities in Secure Enclaves.
- [CCS 2017] Precise Detection of Side-Channel Vulnerabilities using Quantitative Cartesian Hoare Logic.
- [CCS 2017] Client-side Name Collision Vulnerability in the New gTLD Era: A Systematic Study.
- [CCS 2017] Exploiting a Thermal Side Channel for Power Attacks in Multi-Tenant Data Centers.
- [CCS 2017] Viden: Attacker Identification on In-Vehicle Networks.
- [CCS 2017] Practical Attacks Against Graph-based Clustering.
- [CCS 2017] Automated Crowdturfing Attacks and Defenses in Online Review Systems.
- [CCS 2017] Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2.
- [CCS 2017] CCCP: Closed Caption Crypto Phones to Resist MITM Attacks, Human Errors and Click-Through.
- [CCS 2017] No-Match Attacks and Robust Partnering Definitions: Defining Trivial Attacks for Security Protocols is Not Trivial.
- [CCS 2017] Economic Factors of Vulnerability Trade and Exploitation.
- [CCS 2017] Quantifying the Pressure of Legal Risks on Third-party Vulnerability Research.
- [CCS 2017] The Return of Coppersmith’s Attack: Practical Factorization of Widely Used RSA Moduli.
- [CCS 2017] Algorithm Substitution Attacks from a Steganographic Perspective.
- [CCS 2017] On the Power of Optical Contactless Probing: Attacking Bitstream Encryption of FPGAs.
- [CCS 2017] Capturing Malware Propagations with Code Injections and Code-Reuse Attacks.
- [CCS 2017] Code-Reuse Attacks for the Web: Breaking Cross-Site Scripting Mitigations via Script Gadgets.
- [CCS 2017] Tail Attacks on Web Applications.
- [CCS 2017] To BLISS-B or not to be: Attacking strongSwan’s Implementation of Post-Quantum Signatures.
- [CCS 2017] Side-Channel Attacks on BLISS Lattice-Based Signatures: Exploiting Branch Tracing against strongSwan and Electromagnetic Emanations in Microcontrollers.
- [CCS 2017] The Waterfall of Liberty: Decoy Routing Circumvention that Resists Routing Attacks.
- [CCS 2017] SlowFuzz: Automated Domain-Independent Detection of Algorithmic Complexity Vulnerabilities.
- [CCS 2017] POSTER: Finding Vulnerabilities in P4 Programs with Assertion-based Verification.
- [CCS 2017] POSTER: Vulnerability Discovery with Function Representation Learning from Unlabeled Projects.
- [CCS 2017] POSTER: TOUCHFLOOD: A Novel Class of Attacks against Capacitive Touchscreens.
- [CCS 2017] POSTER: Cyber Attack Prediction of Threats from Unconventional Resources (CAPTURE).
- [CCS 2017] POSTER: Is Active Electromagnetic Side-channel Attack Practical?
- [CCS 2017] Identity Related Threats, Vulnerabilities and Risk Mitigation in Online Social Networks: A Tutorial.
- [CCS 2017] ASHES 2017: Workshop on Attacks and Solutions in Hardware Security.
- [CCS 2018] Ohm’s Law in Data Centers: A Voltage Side Channel for Timing Power Attacks.
- [CCS 2018] Utility-Aware Synthesis of Differentially Private and Attack-Resilient Location Traces.
- [CCS 2018] Practical State Recovery Attacks against Legacy RNG Implementations.
- [CCS 2018] Model-Reuse Attacks on Deep Learning Systems.
- [CCS 2018] Property Inference Attacks on Fully Connected Neural Networks using Permutation Invariant Representations.
- [CCS 2018] AIM-SDN: Attacking Information Mismanagement in SDN-datastores.
- [CCS 2018] Detecting Attacks Against Robotic Vehicles: A Control Invariant Approach.
- [CCS 2018] Truth Will Out: Departure-Based Process-Level Detection of Stealthy Attacks on Control Systems.
- [CCS 2018] No Training Hurdles: Fast Training-Agnostic Attacks to Infer Your Typing.
- [CCS 2018] Phishing Attacks on Modern Android.
- [CCS 2018] Block Oriented Programming: Automating Data-Only Attacks.
- [CCS 2018] DeepCorr: Strong Flow Correlation Attacks on Tor Using Deep Learning.
- [CCS 2018] Measuring Information Leakage in Website Fingerprinting Attacks and Defenses.
- [CCS 2018] Rendered Insecure: GPU Side Channel Attacks are Practical.
- [CCS 2018] ASHES 2018- Workshop on Attacks and Solutions in Hardware Security.
- [CCS 2018] Practical Fault Attack on Deep Neural Networks.
- [CCS 2018] Off-Path Attacks Against PKI.
- [CCS 2018] Audio Hotspot Attack: An Attack on Voice Assistance Systems Using Directional Sound Beams.
- [CCS 2018] Towards Understanding the Dynamics of Adversarial Attacks.
- [CCS 2018] Cryptographically Secure Detection of Injection Attacks.
- [CCS 2018] Not All Pixels are Born Equal: An Analysis of Evasion Attacks under Locality Constraints.
- [CCS 2019] Page Cache Attacks.
- [CCS 2019] Principled Unearthing of TCP Side Channel Vulnerabilities.
- [CCS 2019] MemGuard: Defending against Black-Box Membership Inference Attacks via Adversarial Examples.
- [CCS 2019] Procedural Noise Adversarial Examples for Black-Box Attacks on Deep Convolutional Networks.
- [CCS 2019] Encrypted Databases: New Volume Attacks against Range Queries.
- [CCS 2019] SICO: Surgical Interception Attacks by Manipulating BGP Communities.
- [CCS 2019] Power Adjusting and Bribery Racing: Novel Mining Attacks in the Bitcoin System.
- [CCS 2019] An In-depth Look Into SDN Topology Discovery Mechanisms: Novel Attacks and Practical Countermeasures.
- [CCS 2019] Charting the Attack Surface of Trigger-Action IoT Platforms.
- [CCS 2019] SLAKE: Facilitating Slab Manipulation for Exploiting Vulnerabilities in the Linux Kernel.
- [CCS 2019] A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes.
- [CCS 2019] POIROT: Aligning Attack Behavior with Kernel Audit Records for Cyber Threat Hunting.
- [CCS 2019] Effective and Light-Weight Deobfuscation and Semantic-Aware Attack Detection for PowerShell Scripts.
- [CCS 2019] Your Cache Has Fallen: Cache-Poisoned Denial-of-Service Attack.
- [CCS 2019] Seeing isn’t Believing: Towards More Robust Adversarial Attack Against Real World Object Detectors.
- [CCS 2019] Attacking Graph-based Classification via Manipulating the Graph Structure.
- [CCS 2019] Latent Backdoor Attacks on Deep Neural Networks.
- [CCS 2019] Seems Legit: Automated Analysis of Subtle Attacks on Protocols that Use Signatures.
- [CCS 2019] Adversarial Sensor Attack on LiDAR-based Perception in Autonomous Driving.
- [CCS 2019] Trick or Heat?: Manipulating Critical Temperature-Based Control Systems Using Rectification Attacks.
- [CCS 2019] CryptoGuard: High Precision Detection of Cryptographic Vulnerabilities in Massive-sized Java Projects.
- [CCS 2019] Medical Protocol Security: DICOM Vulnerability Mining Based on Fuzzing Technology.
- [CCS 2019] Poster: Attacking Malware Classifiers by Crafting Gradient-Attacks that Preserve Functionality.
- [CCS 2019] Poster: Towards a Framework for Assessing Vulnerabilities of Brainwave Authentication Systems.
- [CCS 2019] Poster: Recovering the Input of Neural Networks via Single Shot Side-channel Attacks.
- [CCS 2019] Poster: TCLP: Enforcing Least Privileges to Prevent Containers from Kernel Vulnerabilities.
- [CCS 2019] Poster: When Adversary Becomes the Guardian - Towards Side-channel Security With Adversarial Attacks.
- [CCS 2019] Poster: Towards Automated Quantitative Analysis and Forecasting of Vulnerability Discoveries in Debian GNU/Linux.
- [CCS 2019] ASHES 2019: 3rd Workshop on Attacks and Solutions in Hardware Security.
- [CCS 2020] Gotta Catch’Em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks.
- [CCS 2020] Composite Backdoor Attack for Deep Neural Network by Mixing Existing Benign Features.
- [CCS 2020] FirmXRay: Detecting Bluetooth Link Layer Vulnerabilities From Bare-Metal Firmware.
- [CCS 2020] Cyber-Physical Inconsistency Vulnerability Identification for Safety Checks in Robotic Vehicles.
- [CCS 2020] Phantom of the ADAS: Securing Advanced Driver-Assistance Systems from Split-Second Phantom Attacks.
- [CCS 2020] GAN-Leaks: A Taxonomy of Membership Inference Attacks against Generative Models.
- [CCS 2020] Mnemosyne: An Effective and Efficient Postmortem Watering Hole Attack Investigation System.
- [CCS 2020] Cache-in-the-Middle (CITM) Attacks: Manipulating Sensitive Data in Isolated Execution Environments.
- [CCS 2020] QuantumHammer: A Practical Hybrid Attack on the LUOV Signature Scheme.
- [CCS 2020] When the Differences in Frequency Domain are Compensated: Understanding and Defeating Modulated Replay Attacks on Automatic Speech Recognition.
- [CCS 2020] AdvPulse: Universal, Synchronization-free, and Targeted Audio Adversarial Attacks via Subsecond Perturbations.
- [CCS 2020] DNS Cache Poisoning Attack Reloaded: Revolutions with Side Channels.
- [CCS 2020] Logging to the Danger Zone: Race Condition Attacks and Defenses on System Audit Frameworks.
- [CCS 2020] Mitigation of Attacks on Email End-to-End Encryption.
- [CCS 2020] A Generic Technique for Automatically Finding Defense-Aware Code Reuse Attacks.
- [CCS 2020] InSpectre: Breaking and Fixing Microarchitectural Vulnerabilities by Formal Analysis.
- [CCS 2020] Talking with Familiar Strangers: An Empirical Study on HTTPS Context Confusion Attacks.
- [CCS 2020] TrafficSliver: Fighting Website Fingerprinting Attacks with Traffic Splitting.
- [CCS 2020] LPET - Mining MS-Windows Software Privilege Escalation Vulnerabilities by Monitoring Interactive Behavior.
- [CCS 2020] Towards Using Source Code Repositories to Identify Software Supply Chain Attacks.
- [CCS 2020] Impact of Energy Consumption Attacks on LoRaWAN-Enabled Devices in Industrial Context.
- [CCS 2020] ASHES 2020: 4th Workshop on Attacks and Solutions in Hardware Security.
- [CCS 2021] Reverse Attack: Black-box Attacks on Collaborative Recommendation.
- [CCS 2021] Black-box Adversarial Attacks on Commercial Speech Platforms with Minimal Information.
- [CCS 2021] A Hard Label Black-box Adversarial Attack Against Graph Neural Networks.
- [CCS 2021] Robust Adversarial Attacks Against DNN-Based Wireless Communication Systems.
- [CCS 2021] “Hello, It’s Me”: Deep Learning-based Speech Synthesis Attacks in the Real World.
- [CCS 2021] Wireless Charging Power Side-Channel Attacks.
- [CCS 2021] Periscope: A Keystroke Inference Attack Using Human Coupled Electromagnetic Emanations.
- [CCS 2021] Demons in the Shared Kernel: Abstract Resource Attacks Against OS-level Virtualization.
- [CCS 2021] Statically Discovering High-Order Taint Style Vulnerabilities in OS Kernels.
- [CCS 2021] Membership Inference Attacks Against Recommender Systems.
- [CCS 2021] Scan, Test, Execute: Adversarial Tactics in Amplification DDoS Attacks.
- [CCS 2021] United We Stand: Collaborative Detection and Mitigation of Amplification DDoS Attacks at Scale.
- [CCS 2021] Side-Channel Attacks on Query-Based Data Anonymization.
- [CCS 2021] You Make Me Tremble: A First Look at Attacks Against Structural Control Systems.
- [CCS 2021] Ghost in the Binder: Binder Transaction Redirection Attacks in Android System Services.
- [CCS 2021] VIP: Safeguard Value Invariant Property for Thwarting Critical Memory Corruption Attacks.
- [CCS 2021] SyncAttack: Double-spending in Bitcoin Without Mining Power.
- [CCS 2021] Supply-Chain Vulnerability Elimination via Active Learning and Regeneration.
- [CCS 2021] Robust Detection of Machine-induced Audio Attacks in Intelligent Audio Systems with Microphone Array.
- [CCS 2021] Glowworm Attack: Optical TEMPEST Sound Recovery via a Device’s Power Indicator LED.
- [CCS 2021] I Can See the Light: Attacks on Autonomous Vehicles Using Invisible Lights.
- [CCS 2021] Can We Use Arbitrary Objects to Attack LiDAR Perception in Autonomous Driving?
- [CCS 2021] Unleashing the Tiger: Inference Attacks on Split Learning.
- [CCS 2021] Reconstructing with Less: Leakage Abuse Attacks in Two Dimensions.
- [CCS 2021] LEAP: Leakage-Abuse Attack on Efficiently Deployable, Efficiently Searchable Encryption with Partially Known Dataset.
- [CCS 2021] Membership Inference Attacks against GANs by Leveraging Over-representation Regions.
- [CCS 2021] POSTER: ReAvatar: Virtual Reality De-anonymization Attack Through Correlating Movement Signatures.
- [CCS 2021] Enabling Visual Analytics via Alert-driven Attack Graphs.
- [CCS 2021] Chronos: Timing Interference as a New Attack Vector on Autonomous Cyber-physical Systems.
- [CCS 2021] Demo: Large Scale Analysis on Vulnerability Remediation in Open-source JavaScript Projects.
- [CCS 2021] PARASITE: PAssword Recovery Attack against Srp Implementations in ThE wild.
- [CCS 2021] One Glitch to Rule Them All: Fault Injection Attacks Against AMD’s Secure Encrypted Virtualization.
- [CCS 2021] Prime+Scope: Overcoming the Observer Effect for High-Precision Cache Contention Attacks.
- [CCS 2021] Subpopulation Data Poisoning Attacks.
- [CCS 2021] Feature-Indistinguishable Attack to Circumvent Trapdoor-Enabled Defense.
- [CCS 2021] DetectorGuard: Provably Securing Object Detectors against Localized Patch Hiding Attacks.
- [CCS 2021] Structural Attack against Graph Based Android Malware Detection.
- [CCS 2021] Locating the Security Patches for Disclosed OSS Vulnerabilities with Vulnerability-Commit Correlation Ranking.
- [CCS 2021] Facilitating Vulnerability Assessment through PoC Migration.
- [CCS 2021] Validating the Integrity of Audit Logs Against Execution Repartitioning Attacks.
- [CCS 2021] DNS Cache Poisoning Attack: Resurrections with Side Channels.
- [CCS 2022] Membership Inference Attacks and Generalization: A Causal Perspective.
- [CCS 2022] Victory by KO: Attacking OpenPGP Using Key Overwriting.
- [CCS 2022] QuerySnout: Automating the Discovery of Attribute Inference Attacks against Query-Based Systems.
- [CCS 2022] VRust: Automated Vulnerability Detection for Solana Smart Contracts.
- [CCS 2022] CANflict: Exploiting Peripheral Conflicts for Data-Link Layer Attacks on Automotive Networks.
- [CCS 2022] FenceSitter: Black-box, Content-Agnostic, and Synchronization-Free Enrollment-Phase Attacks on Speaker Recognition Systems.
- [CCS 2022] A Run a Day Won’t Keep the Hacker Away: Inference Attacks on Endpoint Privacy Zones in Fitness Tracking Social Networks.
- [CCS 2022] Watch Out for Race Condition Attacks When Using Android External Storage.
- [CCS 2022] Perception-Aware Attack: Creating Adversarial Music via Reverse-Engineering Human Perception.
- [CCS 2022] ATTRITION: Attacking Static Hardware Trojan Detection Techniques Using Reinforcement Learning.
- [CCS 2022] SPECPATCH: Human-In-The-Loop Adversarial Audio Spectrogram Patch Attack on Speech Recognition.
- [CCS 2022] Identifying a Training-Set Attack’s Target Using Renormalized Influence Estimation.
- [CCS 2022] Location Heartbleeding: The Rise of Wi-Fi Spoofing Attack Via Geolocation API.
- [CCS 2022] SpecDoctor: Differential Fuzz Testing to Find Transient Execution Vulnerabilities.
- [CCS 2022] On the Success Rate of Side-Channel Attacks on Masked Implementations: Information-Theoretical Bounds and Their Practical Usage.
- [CCS 2022] Are Attribute Inference Attacks Just Imputation?
- [CCS 2022] TRACER: Signature-based Static Analysis for Detecting Recurring Vulnerabilities.
- [CCS 2022] Frequency Throttling Side-Channel Attack.
- [CCS 2022] Order-Disorder: Imitation Adversarial Attacks for Black-box Neural Ranking Models.
- [CCS 2022] Acquirer: A Hybrid Approach to Detecting Algorithmic Complexity Vulnerabilities.
- [CCS 2022] Membership Inference Attacks by Exploiting Loss Trajectory.
- [CCS 2022] Detecting Missing-Permission-Check Vulnerabilities in Distributed Cloud Systems.
- [CCS 2022] TChecker: Precise Static Inter-Procedural Analysis for Detecting Taint-Style Vulnerabilities in PHP Applications.
- [CCS 2022] Feature Inference Attack on Shapley Values.
- [CCS 2022] Physical Hijacking Attacks against Object Trackers.
- [CCS 2022] Discovering IoT Physical Channel Vulnerabilities.
- [CCS 2022] Cerberus: Query-driven Scalable Vulnerability Detection in OAuth Service Provider Implementations.
- [CCS 2022] Don’t Kick Over the Beehive: Attacks and Security Analysis on Zigbee.
- [CCS 2022] Group Property Inference Attacks Against Graph Neural Networks.
- [CCS 2022] EchoHand: High Accuracy and Presentation Attack Resistant Hand Authentication on Commodity Mobile Devices.
- [CCS 2022] Understanding and Mitigating Remote Code Execution Vulnerabilities in Cross-platform Ecosystem.
- [CCS 2022] Automatic Detection of Fake Key Attacks in Secure Messaging.
- [CCS 2022] Cross Miniapp Request Forgery: Root Causes, Attacks, and Vulnerability Detection.
- [CCS 2022] Enhanced Membership Inference Attacks against Machine Learning Models.
- [CCS 2022] PalanTír: Optimizing Attack Provenance with Hardware-enhanced System Observability.
- [CCS 2022] Poster: Backdoor Attacks on Spiking NNs and Neuromorphic Datasets.
- [CCS 2022] Poster: Data Recovery from Ransomware Attacks via File System Forensics and Flash Translation Layer Data Extraction.
- [CCS 2022] Poster: Adversarial Perturbation Attacks on the State-of-the-Art Cryptojacking Detection System in IoT Networks.
- [CCS 2022] Poster: Effectiveness of Moving Target Defense Techniques to Disrupt Attacks in the Cloud.
- [CCS 2022] Poster: Towards Large-Scale Measurement Study on LiDAR Spoofing Attacks against Object Detection.
- [CCS 2022] Poster: On the System-Level Effectiveness of Physical Object-Hiding Adversarial Attack in Autonomous Driving.
- [CCS 2022] Poster: Clean-label Backdoor Attack on Graph Neural Networks.
- [CCS 2022] Poster: Automated Discovery of Sensor Spoofing Attacks on Robotic Vehicles.
- [CCS 2022] Poster: TaintGrep: A Static Analysis Tool for Detecting Vulnerabilities of Android Apps Supporting User-defined Rules.
- [CCS 2022] Poster: May the Swarm Be With You: Sensor Spoofing Attacks Against Drone Swarms.
- [CCS 2022] ASHES 2022 - 6th Workshop on Attacks and Solutions in Hardware Security.
- [CCS 2022] Checkmate ‘22: Research on offensive and defensive techniques in the context of Man At The End (MATE) attacks.
- [CCS 2023] Efficient Query-Based Attack against ML-Based Android Malware Detection under Zero Knowledge Setting.
- [CCS 2023] Exploration of Power Side-Channel Vulnerabilities in Quantum Computer Controllers.
- [CCS 2023] Securing NISQ Quantum Computer Reset Operations Against Higher Energy State Attacks.
- [CCS 2023] Protecting HRP UWB Ranging System Against Distance Reduction Attacks.
- [CCS 2023] BLUFFS: Bluetooth Forward and Future Secrecy Attacks and Defenses.
- [CCS 2023] Narcissus: A Practical Clean-Label Backdoor Attack with Limited Information.
- [CCS 2023] Stateful Defenses for Machine Learning Models Are Not Yet Secure Against Black-box Attacks.
- [CCS 2023] Attack Some while Protecting Others: Selective Attack Strategies for Attacking and Protecting Multiple Concepts.
- [CCS 2023] Learning from Limited Heterogeneous Training Data: Meta-Learning for Unsupervised Zero-Day Web Attack Detection across Web Domains.
- [CCS 2023] Transformer-based Model for Multi-tab Website Fingerprinting Attack.
- [CCS 2023] Prediction Privacy in Distributed Multi-Exit Neural Networks: Vulnerabilities and Solutions.
- [CCS 2023] TileMask: A Passive-Reflection-based Attack against mmWave Radar Object Detection in Autonomous Driving.
- [CCS 2023] Unraveling the Connections between Privacy and Certified Robustness in Federated Learning Against Poisoning Attacks.
- [CCS 2023] MESAS: Poisoning Defense for Federated Learning Resilient against Adaptive Attackers.
- [CCS 2023] A Systematic Evaluation of Automated Tools for Side-Channel Vulnerabilities Detection in Cryptographic Libraries.
- [CCS 2023] Tainted Secure Multi-Execution to Restrict Attacker Influence.
- [CCS 2023] Group and Attack: Auditing Differential Privacy.
- [CCS 2023] iLeakage: Browser-based Timerless Speculative Execution Attacks on Apple Devices.
- [CCS 2023] Vulnerability Intelligence Alignment via Masked Graph Attention Networks.
- [CCS 2023] CoCo: Efficient Browser Extension Vulnerability Detection via Coverage-guided, Concurrent Abstract Interpretation.
- [CCS 2023] Targeted Attack Synthesis for Smart Grid Vulnerability Analysis.
- [CCS 2023] SalsaPicante: A Machine Learning Attack on LWE with Binary Secrets.
- [CCS 2023] SymGX: Detecting Cross-boundary Pointer Vulnerabilities of SGX Applications via Static Symbolic Execution.
- [CCS 2023] HODOR: Shrinking Attack Surface on Node.js via System Call Limitation.
- [CCS 2023] Leakage-Abuse Attacks Against Forward and Backward Private Searchable Symmetric Encryption.
- [CCS 2023] Take Over the Whole Cluster: Attacking Kubernetes via Excessive Permissions of Third-party Applications.
- [CCS 2023] Poster: Mujaz: A Summarization-based Approach for Normalized Vulnerability Description.
- [CCS 2023] Poster: Query-efficient Black-box Attack for Image Forgery Localization via Reinforcement Learning.
- [CCS 2023] Poster: Membership Inference Attacks via Contrastive Learning.
- [CCS 2023] Poster: Multi-target & Multi-trigger Backdoor Attacks on Graph Neural Networks.
- [CCS 2023] Poster: Longitudinal Analysis of DoS Attacks.
- [CCS 2023] Poster: Backdoor Attack on Extreme Learning Machines.
- [CCS 2023] Poster: A Privacy-Preserving Smart Contract Vulnerability Detection Framework for Permissioned Blockchain.
- [CCS 2023] Poster: Unveiling the Impact of Patch Placement: Adversarial Patch Attacks on Monocular Depth Estimation.
- [CCS 2023] ASHES ‘23: Workshop on Attacks and Solutions in Hardware Security.
- [CCS 2024] TDXdown: Single-Stepping and Instruction Counting Attacks against Intel TDX.
- [CCS 2024] Interstellar: Fully Partitioned and Efficient Security Monitoring Hardware Near a Processor Core for Protecting Systems against Attacks on Privileged Software.
- [CCS 2024] The Harder You Try, The Harder You Fail: The KeyTrap Denial-of-Service Algorithmic Complexity Attacks on DNSSEC.
- [CCS 2024] MiniCAT: Understanding and Detecting Cross-Page Request Forgery Vulnerabilities in Mini-Programs.
- [CCS 2024] SWIDE: A Semantic-aware Detection Engine for Successful Web Injection Attacks.
- [CCS 2024] Stealing Trust: Unraveling Blind Message Attacks in Web3 Authentication.
- [CCS 2024] Test Suites Guided Vulnerability Validation for Node.js Applications.
- [CCS 2024] ReactAppScan: Mining React Application Vulnerabilities via Component Graph.
- [CCS 2024] Certifiable Black-Box Attacks with Randomized Adversarial Examples: Breaking Defenses with Provable Confidence.
- [CCS 2024] Phantom: Untargeted Poisoning Attacks on Semi-Supervised Learning.
- [CCS 2024] Zero-Query Adversarial Attack on Black-box Automatic Speech Recognition Systems.
- [CCS 2024] Optimization-based Prompt Injection Attack to LLM-as-a-Judge.
- [CCS 2024] Characterizing Ethereum Address Poisoning Attack.
- [CCS 2024] FORAY: Towards Effective Attack Synthesis against Deep Logical Vulnerabilities in DeFi Protocols.
- [CCS 2024] Blockchain Bribing Attacks and the Efficacy of Counterincentives.
- [CCS 2024] Is Difficulty Calibration All We Need? Towards More Practical Membership Inference Attacks.
- [CCS 2024] Membership Inference Attacks against Vision Transformers: Mosaic MixUp Training to the Defense.
- [CCS 2024] Safeslab: Mitigating Use-After-Free Vulnerabilities via Memory Protection Keys.
- [CCS 2024] Breaching Security Keys without Root: FIDO2 Deception Attacks via Overlays exploiting Limited Display Authenticators.
- [CCS 2024] The Not-So-Silent Type: Vulnerabilities in Chinese IME Keyboards’ Network Security Protocols.
- [CCS 2024] Demystifying RCE Vulnerabilities in LLM-Integrated Apps.
- [CCS 2024] GAZEploit: Remote Keystroke Inference Attack by Gaze Estimation from Avatar Views in VR/MR Devices.
- [CCS 2024] SpecGuard: Specification Aware Recovery for Robotic Autonomous Vehicles from Physical Attacks.
- [CCS 2024] PhyScout: Detecting Sensor Spoofing Attacks via Spatio-temporal Consistency.
- [CCS 2024] Robust and Reliable Early-Stage Website Fingerprinting Attacks via Spatial-Temporal Distribution Analysis.
- [CCS 2024] Characterizing and Mitigating Phishing Attacks at ccTLD Scale.
- [CCS 2024] RIoTFuzzer: Companion App Assisted Remote Fuzzing for Detecting Vulnerabilities in IoT Devices.
- [CCS 2024] OctopusTaint: Advanced Data Flow Analysis for Detecting Taint-Based Vulnerabilities in IoT/IIoT Firmware.
- [CCS 2024] Attacks Against the IND-CPAD Security of Exact FHE Schemes.
- [CCS 2024] SemPat: From Hyperproperties to Attack Patterns for Scalable Analysis of Microarchitectural Security.
- [CCS 2024] Distributed Backdoor Attacks on Federated Graph Learning and Certified Defenses.
- [CCS 2024] Not One Less: Exploring Interplay between User Profiles and Items in Untargeted Attacks against Federated Recommendation.
- [CCS 2024] Unveiling the Vulnerability of Private Fine-Tuning in Split-Based Frameworks for Large Language Models: A Bidirectionally Enhanced Attack.
- [CCS 2024] PeTAL: Ensuring Access Control Integrity against Data-only Attacks on Linux.
- [CCS 2024] Detecting Broken Object-Level Authorization Vulnerabilities in Database-Backed Applications.
- [CCS 2024] Practical Key-Extraction Attacks in Leading MPC Wallets.
- [CCS 2024] A Comprehensive Analysis of Security Vulnerabilities and Attacks in Satellite Modems.
- [CCS 2024] Accurate and Efficient Recurring Vulnerability Detection for IoT Firmware.
- [CCS 2024] RISiren: Wireless Sensing System Attacks via Metasurface.
- [CCS 2024] The Invisible Polyjuice Potion: an Effective Physical Adversarial Attack against Face Recognition.
- [CCS 2024] UWBAD: Towards Effective and Imperceptible Jamming Attacks Against UWB Ranging Systems with COTS Chips.
- [CCS 2024] CiMSAT: Exploiting SAT Analysis to Attack Compute-in-Memory Architecture Defenses.
- [CCS 2024] QueryCheetah: Fast Automated Discovery of Attribute Inference Attacks Against Query-Based Systems.
- [CCS 2024] Membership Inference Attacks Against In-Context Learning.
- [CCS 2024] SeqMIA: Sequential-Metric Based Membership Inference Attack.
- [CCS 2024] Curator Attack: When Blackbox Differential Privacy Auditing Loses Its Power.
- [CCS 2024] Data Poisoning Attacks to Locally Differentially Private Frequent Itemset Mining Protocols.
- [CCS 2024] PLeak: Prompt Leaking Attacks against Large Language Model Applications.
- [CCS 2024] A Framework for Differential Privacy Against Timing Attacks.
- [CCS 2024] Exploiting Temporal Vulnerabilities for Unauthorized Access in Intent-based Networking.
- [CCS 2024] Fuzz to the Future: Uncovering Occluded Future Vulnerabilities via Robust Fuzzing.
- [CCS 2024] Beowulf: Mitigating Model Extraction Attacks Via Reshaping Decision Regions.
- [CCS 2024] PhySense: Defending Physically Realizable Attacks for Autonomous Systems via Consistency Reasoning.
- [CCS 2024] VMud: Detecting Recurring Vulnerabilities with Multiple Fixing Functions via Function Selection and Semantic Equivalent Statement Matching.
- [CCS 2024] Fisher Information guided Purification against Backdoor Attacks.
- [CCS 2024] BadMerging: Backdoor Attacks Against Model Merging.
- [CCS 2024] DeepCache: Revisiting Cache Side-Channel Attacks in Deep Neural Networks Executables.
- [CCS 2024] Manipulative Interference Attacks.
- [CCS 2024] Avara: A Uniform Evaluation System for Perceptibility Analysis Against Adversarial Object Evasion Attacks.
- [CCS 2024] CheckMATE ‘24 - Research on Offensive and Defensive Techniques in the context of Man At The End (MATE) Attacks.
- [CCS 2024] ASHES ‘24: Workshop on Attacks and Solutions in Hardware Security.
- [CCS 2024] Poster: The Concept of a System for Automatic Detection and Correction of Vulnerabilities in the Source Code.
- [CCS 2024] Poster: In-switch Defense against DNS Amplification DDoS Attacks.
- [CCS 2024] Poster: M2ASK: A Correlation-Based Multi-Step Attack Scenario Detection Framework Using MITRE ATT&CK Mapping.
- [CCS 2024] Poster: Detecting Ransomware Attacks by Analyzing Replicated Block Snapshots Using Neural Networks.
- [CCS 2024] Poster: Acoustic Side-Channel Attack on Robot Vacuums.
- [CCS 2024] Poster: Protection against Source Inference Attacks in Federated Learning using Unary Encoding and Shuffling.
- [CCS 2024] Poster: FlashGuard: Real-time Disruption of Non-Price Flash Loan Attacks in DeFi.
- [CCS 2024] Poster: Analyzing and Correcting Inaccurate CVE-CWE Mappings in the National Vulnerability Database.
- [CCS 2024] Poster: Advanced Features for Real-Time Website Fingerprinting Attacks on Tor.
- [CCS 2024] Poster: Byzantine Discrepancy Attacks against Calendar, Set-intersection and Nations.
- [CCS 2024] Novel Privacy Attacks and Defenses Against Neural Networks.
- [EUROCRYPT 2010] Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds.
- [EUROCRYPT 2010] Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks.
- [EUROCRYPT 2011] A Formal Study of Power Variability Issues and Side-Channel Attacks for Nanoscale Devices.
- [EUROCRYPT 2011] On Linear Hulls, Statistical Saturation Attacks, PRESENT and a Cryptanalysis of PUFFIN.
- [EUROCRYPT 2011] Statistical Attack on RC4 - Distinguishing WPA.
- [EUROCRYPT 2012] Cryptanalyses on a Merkle-Damgård Based MAC - Almost Universal Forgery and Distinguishing-H Attacks.
- [EUROCRYPT 2012] Statistical Tools Flavor Side-Channel Collision Attacks.
- [EUROCRYPT 2013] Masking against Side-Channel Attacks: A Formal Security Proof.
- [EUROCRYPT 2013] New Collision Attacks on SHA-1 Based on Optimal Joint Local-Collision Analysis.
- [EUROCRYPT 2013] Improving Local Collisions: New Attacks on Reduced SHA-256.
- [EUROCRYPT 2013] Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting.
- [EUROCRYPT 2014] Polynomial Time Attack on Wild McEliece over Quadratic Extensions.
- [EUROCRYPT 2014] Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack.
- [EUROCRYPT 2014] Generic Universal Forgery Attack on Iterative Hash-Based MACs.
- [EUROCRYPT 2014] Links between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities.
- [EUROCRYPT 2014] Protecting Obfuscation against Algebraic Attacks.
- [EUROCRYPT 2014] Unifying Leakage Models: From Probing Attacks to Noisy Leakage.
- [EUROCRYPT 2015] On the Behaviors of Affine Equivalent Sboxes Regarding Differential and Linear Attacks.
- [EUROCRYPT 2015] A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro.
- [EUROCRYPT 2015] On the Provable Security of the Iterated Even-Mansour Cipher Against Related-Key and Chosen-Key Attacks.
- [EUROCRYPT 2015] Cube Attacks and Cube-Attack-Like Cryptanalysis on the Round-Reduced Keccak Sponge Function.
- [EUROCRYPT 2015] Twisted Polynomials and Forgery Attacks on GCM.
- [EUROCRYPT 2016] New Attacks on the Concatenation and XOR Hash Combiners.
- [EUROCRYPT 2016] Lucky Microseconds: A Timing Attack on Amazon’s s2n Implementation of TLS.
- [EUROCRYPT 2017] Revisiting Lattice Attacks on Overstretched NTRU Parameters.
- [EUROCRYPT 2017] On Dual Lattice Attacks Against Small-Secret LWE and Parameter Choices in HElib and SEAL.
- [EUROCRYPT 2017] Conditional Cube Attack on Reduced-Round Keccak Sponge Function.
- [EUROCRYPT 2017] New Collision Attacks on Round-Reduced Keccak.
- [EUROCRYPT 2018] Correlation Cube Attacks: From Weak-Key Distinguisher to Key Recovery.
- [EUROCRYPT 2018] Fast Near Collision Attack on the Grain v1 Stream Cipher.
- [EUROCRYPT 2018] OPAQUE: An Asymmetric PAKE Protocol Secure Against Pre-computation Attacks.
- [EUROCRYPT 2019] Attacks only Get Better: How to Break FF3 on Large Domains.
- [EUROCRYPT 2019] Misuse Attacks on Post-quantum Cryptosystems.
- [EUROCRYPT 2019] Preimage Attacks on Round-Reduced Keccak-224/256 via an Allocating Approach.
- [EUROCRYPT 2019] Multi-target Attacks on the Picnic Signature Scheme and Related Protocols.
- [EUROCRYPT 2020] Indistinguishability Obfuscation Without Maps: Attacks and Fixes for Noisy Linear FE.
- [EUROCRYPT 2020] Mind the Composition: Birthday Bound Attacks on EWCDMD and SoKAC21.
- [EUROCRYPT 2020] Improving Key-Recovery in Linear Attacks: Application to 28-Round PRESENT.
- [EUROCRYPT 2020] New Slide Attacks on Almost Self-similar Ciphers.
- [EUROCRYPT 2020] The Retracing Boomerang Attack.
- [EUROCRYPT 2020] Modeling for Three-Subset Division Property Without Unknown Subset - Improved Cube Attacks Against Trivium and Grain-128AEAD.
- [EUROCRYPT 2020] Fault Template Attacks on Block Ciphers Exploiting Fault Propagation.
- [EUROCRYPT 2020] Security of Hedged Fiat-Shamir Signatures Under Fault Attacks.
- [EUROCRYPT 2020] An Algebraic Attack on Rank Metric Code-Based Cryptosystems.
- [EUROCRYPT 2021] One-Way Functions and Malleability Oracles: Hidden Shift Attacks on Isogeny-Based Protocols.
- [EUROCRYPT 2021] The Nested Subset Differential Attack - A Practical Direct Attack Against LUOV Which Forges a Signature Within 210 Minutes.
- [EUROCRYPT 2021] Improved Linear Approximations to ARX Ciphers and Attacks Against ChaCha.
- [EUROCRYPT 2021] Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing.
- [EUROCRYPT 2021] Three Third Generation Attacks on the Format Preserving Encryption Scheme FF3.
- [EUROCRYPT 2021] Dummy Shuffling Against Algebraic Attacks in White-Box Implementations.
- [EUROCRYPT 2021] Message-Recovery Laser Fault Injection Attack on the Classic McEliece Cryptosystem.
- [EUROCRYPT 2022] Key Guessing Strategies for Linear Key-Schedule Algorithms in Rectangle Attacks.
- [EUROCRYPT 2022] A Correlation Attack on Full SNOW-V and SNOW-Vi.
- [EUROCRYPT 2022] Information-Combining Differential Fault Attacks on DEFAULT.
- [EUROCRYPT 2022] A Novel Completeness Test for Leakage Models and Its Application to Side Channel Attacks and Responsibly Engineered Simulators.
- [EUROCRYPT 2022] Beyond Quadratic Speedups in Quantum Attacks on Symmetric Schemes.
- [EUROCRYPT 2022] Non-malleable Commitments Against Quantum Attacks.
- [EUROCRYPT 2023] Worst-Case Subexponential Attacks on PRGs of Constant Degree or Constant Locality.
- [EUROCRYPT 2023] Let Attackers Program Ideal Models: Modularity and Composability for Adaptive Compromise.
- [EUROCRYPT 2023] Truncated Boomerang Attacks and Application to AES-Based Ciphers.
- [EUROCRYPT 2023] Finding the Impossible: Automated Search for Full Impossible-Differential, Zero-Correlation, and Integral Attacks.
- [EUROCRYPT 2023] Meet-in-the-Middle Preimage Attacks on Sponge-Based Hashing.
- [EUROCRYPT 2023] Analysis of RIPEMD-160: New Collision Attacks and Finding Characteristics with MILP.
- [EUROCRYPT 2023] Collision Attacks on Round-Reduced SHA-3 Using Conditional Internal Differentials.
- [EUROCRYPT 2023] Generic Attack on Duplex-Based AEAD Modes Using Random Function Statistics.
- [EUROCRYPT 2023] Context Discovery and Commitment Attacks - How to Break CCM, EAX, SIV, and More.
- [EUROCRYPT 2023] Improved Power Analysis Attacks on Falcon.
- [EUROCRYPT 2023] Caveat Implementor! Key Recovery Attacks on MEGA.
- [EUROCRYPT 2023] M-SIDH and MD-SIDH: Countering SIDH Attacks by Masking Information.
- [EUROCRYPT 2023] An Efficient Key Recovery Attack on SIDH.
- [EUROCRYPT 2023] A Direct Key Recovery Attack on SIDH.
- [EUROCRYPT 2024] Partial Sums Meet FFT: Improved Attack on 6-Round AES.
- [EUROCRYPT 2024] New Records in Collision Attacks on SHA-2.
- [EUROCRYPT 2024] Improving Linear Key Recovery Attacks Using Walsh Spectrum Puncturing.
- [EUROCRYPT 2024] A Generic Algorithm for Efficient Key Recovery in Differential Attacks - and its Associated Tool.
- [EUROCRYPT 2024] Tight Security of TNT and Beyond - Attacks, Proofs and Possibilities for the Cascaded LRW Paradigm.
- [EUROCRYPT 2024] Probabilistic Extensions: A One-Step Framework for Finding Rectangle Attacks and Beyond.
- [EUROCRYPT 2024] Massive Superpoly Recovery with a Meet-in-the-Middle Framework - Improved Cube Attacks on Trivium and Kreyvium.
- [EUROCRYPT 2025] Preimage Attacks on up to 5 Rounds of SHA-3 Using Internal Differentials.
- [SP 2010] Reconciling Belief and Vulnerability in Information Flow.
- [SP 2010] A Practical Attack to De-anonymize Social Network Users.
- [SP 2010] State of the Art: Automated Black-Box Web Application Vulnerability Testing.
- [SP 2010] TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection.
- [SP 2011] I Still Know What You Visited Last Summer: Leaking Browsing History via User Interaction and Side Channel Attacks.
- [SP 2011] Preventing Sybil Attacks by Privilege Attenuation: A Design Principle for Social Network Systems.
- [SP 2011] Cache Games - Bringing Access-Based Cache Attacks on AES to Practice.
- [SP 2012] Distance Hijacking Attacks on Distance Bounding Protocols.
- [SP 2012] Off-path TCP Sequence Number Inference Attack - How Firewall Middleboxes Reduce Security.
- [SP 2012] Clash Attacks on the Verifiability of E-Voting Systems.
- [SP 2013] The Crossfire Attack.
- [SP 2013] Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog Sensors.
- [SP 2013] Practical Timing Side Channel Attacks against Kernel Space ASLR.
- [SP 2013] PUFs in Security Protocols: Attack Models and Security Evaluations.
- [SP 2014] Stealing Webpages Rendered on Your Browser by Exploiting GPU Vulnerabilities.
- [SP 2014] All Your Screens Are Belong to Us: Attacks Exploiting the HTML5 Screen Sharing API.
- [SP 2014] Chip and Skim: Cloning EMV Cards with the Pre-play Attack.
- [SP 2014] Hidden GEMs: Automated Discovery of Access Control Vulnerabilities in Graphical User Interfaces.
- [SP 2014] Modeling and Discovering Vulnerabilities with Code Property Graphs.
- [SP 2015] Protecting Private Keys against Memory Disclosure Attacks Using Hardware Transactional Memory.
- [SP 2015] Temporal Lensing and Its Application in Pulsing Denial-of-Service Attacks.
- [SP 2015] GenoGuard: Protecting Genomic Data against Brute-Force Attacks.
- [SP 2015] S$A: A Shared Cache Attack That Works across Cores and Defies VM Sandboxing - and Its Application to AES.
- [SP 2015] Last-Level Cache Side-Channel Attacks are Practical.
- [SP 2015] Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems.
- [SP 2015] The Attack of the Clones: A Study of the Impact of Shared Code on Vulnerability Patching.
- [SP 2015] Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications.
- [SP 2015] Automatic Inference of Search Patterns for Taint-Style Vulnerabilities.
- [SP 2016] Cache Storage Channels: Alias-Driven Attacks and Verified Countermeasures.
- [SP 2016] LAVA: Large-Scale Automated Vulnerability Addition.
- [SP 2016] No Pardon for the Interruption: New Inference Attacks on Android Through Interrupt Timing Analysis.
- [SP 2016] Talos: Neutralizing Vulnerabilities with Security Workarounds for Rapid Response.
- [SP 2016] MitM Attack by Name Collision: Cause Analysis and Vulnerability Assessment in the New gTLD Era.
- [SP 2016] A Tough Call: Mitigating Advanced Code-Reuse Attacks at the Binary Level.
- [SP 2016] Return to the Zombie Gadgets: Undermining Destructive Code Reads via Code Inference Attacks.
- [SP 2016] Data-Oriented Programming: On the Expressiveness of Non-control Data Attacks.
- [SP 2017] Membership Inference Attacks Against Machine Learning Models.
- [SP 2017] The Password Reset MitM Attack.
- [SP 2017] Hijacking Bitcoin: Routing Attacks on Cryptocurrencies.
- [SP 2017] Leakage-Abuse Attacks against Order-Revealing Encryption.
- [SP 2017] Side-Channel Attacks on Shared Search Indexes.
- [SP 2017] Counter-RAPTOR: Safeguarding Tor Against Active Routing Attacks.
- [SP 2018] Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning.
- [SP 2018] Grand Pwning Unit: Accelerating Microarchitectural Attacks with the GPU.
- [SP 2018] FPGA-Based Remote Power Side-Channel Attacks.
- [SP 2018] Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage.
- [SP 2018] Hackers vs. Testers: A Comparison of Software Vulnerability Discovery Processes.
- [SP 2018] Sonar: Detecting SS7 Redirection Attacks with Audio-Based Distance Bounding.
- [SP 2018] Routing Around Congestion: Defeating DDoS Attacks and Adverse Network Conditions via Reactive BGP Routing.
- [SP 2018] Study and Mitigation of Origin Stripping Vulnerabilities in Hybrid-postMessage Enabled Mobile Applications.
- [SP 2018] Mobile Application Web API Reconnaissance: Web-to-Mobile Inconsistencies & Vulnerabilities.
- [SP 2018] Secure Device Bootstrapping Without Secrets Resistant to Signal Manipulation Attacks.
- [SP 2018] Crowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks.
- [SP 2019] Spectre Attacks: Exploiting Speculative Execution.
- [SP 2019] Exploiting Correcting Codes: On the Effectiveness of ECC Memory Against Rowhammer Attacks.
- [SP 2019] Postcards from the Post-HTTP World: Amplification of HTTPS Vulnerabilities in the Web Ecosystem.
- [SP 2019] The 9 Lives of Bleichenbacher’s CAT: New Cache ATtacks on TLS Implementations.
- [SP 2019] Using Safety Properties to Generate Vulnerability Patches.
- [SP 2019] Tap ‘n Ghost: A Compilation of Novel Attack Techniques against Smartphone Touchscreens.
- [SP 2019] Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks.
- [SP 2019] Comprehensive Privacy Analysis of Deep Learning: Passive and Active White-box Inference Attacks against Centralized and Federated Learning.
- [SP 2019] ProFuzzer: On-the-fly Input Type Probing for Better Zero-Day Vulnerability Discovery.
- [SP 2019] Attack Directories, Not Caches: Side Channel Attacks in a Non-Inclusive World.
- [SP 2019] Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks.
- [SP 2019] The Code That Never Ran: Modeling Attacks on Speculative Evaluation.
- [SP 2020] : Practical Cache Attacks from the Network.
- [SP 2020] SpecCFI: Mitigating Spectre Attacks using CFI Informed Speculation.
- [SP 2020] Detection of Electromagnetic Interference Attacks on Sensor Systems.
- [SP 2020] WaveSpy: Remote and Through-wall Screen Attack via mmWave Sensing.
- [SP 2020] BIAS: Bluetooth Impersonation AttackS.
- [SP 2020] The Many Kinds of Creepware Used for Interpersonal Attacks.
- [SP 2020] Leveraging EM Side-Channel Information to Detect Rowhammer Attacks.
- [SP 2020] A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network.
- [SP 2020] TARDIS: Rolling Back The Clock On CMS-Targeting Cyber Attacks.
- [SP 2020] The State of the Uniform: Attacks on Encrypted Databases Beyond the Uniform Query Distribution.
- [SP 2020] Pseudorandom Black Swans: Cache Attacks on CTR_DRBG.
- [SP 2020] HopSkipJumpAttack: A Query-Efficient Decision-Based Attack.
- [SP 2020] Intriguing Properties of Adversarial ML Attacks in the Problem Space.
- [SP 2020] SoK: Understanding the Prevailing Security Vulnerabilities in TrustZone-assisted TEE Systems.
- [SP 2020] Plundervolt: Software-based Fault Injection Attacks against Intel SGX.
- [SP 2020] Unexpected Data Dependency Creation and Chaining: A New Attack to SDN.
- [SP 2020] C3APSULe: Cross-FPGA Covert-Channel Attacks through Power Supply Unit Leakage.
- [SP 2021] Invisible for both Camera and LiDAR: Security of Multi-Sensor Fusion based Perception in Autonomous Driving Under Physical-World Attacks.
- [SP 2021] CANNON: Reliable and Stealthy Remote Shutdown Attacks via Unaltered Automotive Microcontrollers.
- [SP 2021] Invisible Probe: Timing Attacks with PCIe Congestion Side-channel.
- [SP 2021] PLATYPUS: Software-based Power Side-Channel Attacks on x86.
- [SP 2021] Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems.
- [SP 2021] Hear “No Evil”, See “Kenansville”*: Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems.
- [SP 2021] SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems.
- [SP 2021] Manipulation Attacks in Local Differential Privacy.
- [SP 2021] Randomized Last-Level Caches Are Still Vulnerable to Cache Side-Channel Attacks! But We Can Fix It.
- [SP 2021] Cross Layer Attacks and How to Use Them (for DNS Cache Poisoning, Device Tracking and More).
- [SP 2021] Bookworm Game: Automatic Discovery of LTE Vulnerabilities Through Documentation Analysis.
- [SP 2021] MAD-HTLC: Because HTLC is Crazy-Cheap to Attack.
- [SP 2021] HackEd: A Pedagogical Analysis of Online Vulnerability Discovery Exercises.
- [SP 2021] Method Confusion Attack on Bluetooth Pairing.
- [SP 2021] Revealer: Detecting and Exploiting Regular Expression Denial-of-Service Vulnerabilities.
- [SP 2021] Response-Hiding Encrypted Ranges: Revisiting Security via Parametrized Leakage-Abuse Attacks.
- [SP 2021] Runtime Recovery of Web Applications under Zero-Day ReDoS Attacks.
- [SP 2022] Automated Attack Synthesis by Extracting Finite State Machines from Protocol Specification Documents.
- [SP 2022] Four Attacks and a Proof for Telegram.
- [SP 2022] A Formal Security Analysis of the W3C Web Payment APIs: Attacks and Verification.
- [SP 2022] Cats vs. Spectre: An Axiomatic Approach to Modeling Speculative Execution Attacks.
- [SP 2022] Delay Wreaks Havoc on Your Smart Home: Delay-based Automation Interference Attacks.
- [SP 2022] A Secret-Free Hypervisor: Rethinking Isolation in the Age of Speculative Vulnerabilities.
- [SP 2022] Are We There Yet? Timing and Floating-Point Attacks on Differential Privacy Systems.
- [SP 2022] DEPCOMM: Graph Summarization on System Audit Logs for Attack Investigation.
- [SP 2022] “They’re not that hard to mitigate”: What Cryptographic Library Developers Think About Timing Attacks.
- [SP 2022] SpecHammer: Combining Spectre and Rowhammer for New Speculative Attacks.
- [SP 2022] Spook.js: Attacking Chrome Strict Site Isolation via Speculative Execution.
- [SP 2022] How to Attack and Generate Honeywords.
- [SP 2022] WIGHT: Wired Ghost Touch Attack on Capacitive Touchscreens.
- [SP 2022] Mitigating Information Leakage Vulnerabilities with Type-based Data Isolation.
- [SP 2022] Model Stealing Attacks Against Inductive Graph Neural Networks.
- [SP 2022] Attacks on Wireless Coexistence: Exploiting Cross-Technology Performance Features for Inter-Chip Privilege Escalation.
- [SP 2022] Invisible Finger: Practical Electromagnetic Interference Attack on Touchscreen-based Electronic Devices.
- [SP 2022] Back to the Drawing Board: A Critical Evaluation of Poisoning Attacks on Production Federated Learning.
- [SP 2022] Universal 3-Dimensional Perturbations for Black-Box Attacks on Video Recognition Systems.
- [SP 2022] Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings.
- [SP 2022] Adversarial Prefetch: New Cross-Core Cache Side Channel Attacks.
- [SP 2022] MeshUp: Stateless Cache Side-channel Attack on CPU Mesh.
- [SP 2022] Timing-Based Browsing Privacy Vulnerabilities Via Site Isolation.
- [SP 2022] IRQDebloat: Reducing Driver Attack Surface in Embedded Devices.
- [SP 2022] Finding SMM Privilege-Escalation Vulnerabilities in UEFI Firmware with Protocol-Centric Static Analysis.
- [SP 2022] Hardening Circuit-Design IP Against Reverse-Engineering Attacks.
- [SP 2022] Evaluating Physical-Layer BLE Location Tracking Attacks on Mobile Devices.
- [SP 2022] Membership Inference Attacks From First Principles.
- [SP 2022] DeepCoFFEA: Improved Flow Correlation Attacks on Tor via Metric Learning and Amplification.
- [SP 2022] Bad Characters: Imperceptible NLP Attacks.
- [SP 2022] BadEncoder: Backdoor Attacks to Pre-trained Encoders in Self-Supervised Learning.
- [SP 2022] Repairing DoS Vulnerability of Real-World Regexes.
- [SP 2022] Formal Model-Driven Discovery of Bluetooth Protocol Design Vulnerabilities.
- [SP 2022] Exposed Infrastructures: Discovery, Attacks and Remediation of Insecure ICS Remote Management Devices.
- [SP 2023] Scaphy: Detecting Modern ICS Attacks by Correlating Behaviors in SCADA and PHYsical.
- [SP 2023] Three Birds with One Stone: Efficient Partitioning Attacks on Interdependent Cryptocurrency Networks.
- [SP 2023] Weak Fiat-Shamir Attacks on Modern Proof Systems.
- [SP 2023] D-DAE: Defense-Penetrating Model Extraction Attacks.
- [SP 2023] Disguising Attacks with Explanation-Aware Backdoors.
- [SP 2023] AI-Guardian: Defeating Adversarial Attacks using Backdoors.
- [SP 2023] Jigsaw Puzzle: Selective Backdoor Attack to Subvert Malware Classifiers.
- [SP 2023] ImU: Physical Impersonating Attack for Face Recognition System with Natural Style Changes.
- [SP 2023] Robust Multi-tab Website Fingerprinting Attacks in the Wild.
- [SP 2023] It’s (DOM) Clobbering Time: Attack Techniques, Prevalence, and Defenses.
- [SP 2023] Scaling JavaScript Abstract Interpretation to Detect and Exploit Node.js Taint-style Vulnerability.
- [SP 2023] Practical Timing Side-Channel Attacks on Memory Compression.
- [SP 2023] WarpAttack: Bypassing CFI through Compiler-Introduced Double-Fetches.
- [SP 2023] RAB: Provable Robustness Against Backdoor Attacks.
- [SP 2023] ObjectSeeker: Certifiably Robust Object Detection against Patch Hiding Attacks via Patch-agnostic Masking.
- [SP 2023] FedRecover: Recovering from Poisoning Attacks in Federated Learning using Historical Information.
- [SP 2023] On The Empirical Effectiveness of Unrealistic Adversarial Hardening Against Realistic Adversarial Attacks.
- [SP 2023] SoK: Taxonomy of Attacks on Open-Source Software Supply Chains.
- [SP 2023] TrojanModel: A Practical Trojan Attack against Automatic Speech Recognition Systems.
- [SP 2023] Inducing Wireless Chargers to Voice Out for Inaudible Command Attacks.
- [SP 2023] PLA-LiDAR: Physical Laser Attacks against LiDAR-based 3D Object Detection in Autonomous Vehicle.
- [SP 2023] 3DFed: Adaptive and Extensible Framework for Covert Backdoor Attack in Federated Learning.
- [SP 2023] No One Drinks From the Firehose: How Organizations Filter and Prioritize Vulnerability Information.
- [SP 2023] Vulnerability Discovery for All: Experiences of Marginalization in Vulnerability Discovery.
- [SP 2023] AEM: Facilitating Cross-Version Exploitability Assessment of Linux Kernel Vulnerabilities.
- [SP 2023] AEM: Facilitating Cross-Version Exploitability Assessment of Linux Kernel Vulnerabilities.
- [SP 2023] RSFuzzer: Discovering Deep SMI Handler Vulnerabilities in UEFI Firmware with Hybrid Fuzzing.
- [SP 2023] Scatter and Split Securely: Defeating Cache Contention and Occupancy Attacks.
- [SP 2023] DevIOus: Device-Driven Side-Channel Attacks on the IOMMU.
- [SP 2023] DVFS Frequently Leaks Secrets: Hertzbleed Attacks Beyond SIKE, Cryptography, and CPU-Only Data.
- [SP 2023] A Security RISC: Microarchitectural Attacks on Hardware RISC-V CPUs.
- [SP 2023] Examining Zero-Shot Vulnerability Repair with Large Language Models.
- [SP 2023] Examining Zero-Shot Vulnerability Repair with Large Language Models.
- [SP 2023] Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation.
- [SP 2023] SoK: Decentralized Finance (DeFi) Attacks.
- [SP 2023] Limits of I/O Based Ransomware Detection: An Imitation Based Attack.
- [SP 2023] Toss a Fault to Your Witcher: Applying Grey-box Coverage-Guided Mutational Fuzzing to Detect SQL and Command Injection Vulnerabilities.
- [SP 2023] ODDFuzz: Discovering Java Deserialization Vulnerabilities via Structure-Aware Directed Greybox Fuzzing.
- [SP 2023] TeSec: Accurate Server-side Attack Investigation for Web Applications.
- [SP 2023] Man-in-the-Middle Attacks without Rogue AP: When WPAs Meet ICMP Redirects.
- [SP 2023] MagBackdoor: Beware of Your Loudspeaker as A Backdoor For Magnetic Injection Attacks.
- [SP 2023] Practically-exploitable Cryptographic Vulnerabilities in Matrix.
- [SP 2024] AVA: Inconspicuous Attribute Variation-based Adversarial Attack bypassing DeepFake Detection.
- [SP 2024] The Great Request Robbery: An Empirical Study of Client-side Request Hijacking Vulnerabilities on the Web.
- [SP 2024] Break the Wall from Bottom: Automated Discovery of Protocol-Level Evasion Vulnerabilities in Web Application Firewalls.
- [SP 2024] Where URLs Become Weapons: Automated Discovery of SSRF Vulnerabilities in Web Applications.
- [SP 2024] C-Frame: Characterizing and measuring in-the-wild CAPTCHA attacks.
- [SP 2024] Nightshade: Prompt-Specific Poisoning Attacks on Text-to-Image Generative Models.
- [SP 2024] LLMs Cannot Reliably Identify and Reason About Security Vulnerabilities (Yet?): A Comprehensive Evaluation, Framework, and Benchmarks.
- [SP 2024] Shedding Light on CVSS Scoring Inconsistencies: A User-Centric Study on Evaluating Widespread Security Vulnerabilities.
- [SP 2024] Patchy Performance? Uncovering the Vulnerability Management Practices of IoT-Centric Vendors.
- [SP 2024] Need for Speed: Taming Backdoor Attacks with Speed and Precision.
- [SP 2024] Multi-Instance Adversarial Attack on GNN-Based Malicious Domain Detection.
- [SP 2024] Dropout Attacks.
- [SP 2024] BounceAttack: A Query-Efficient Decision-based Adversarial Attack by Bouncing into the Wild.
- [SP 2024] Loki: Large-scale Data Reconstruction Attack against Federated Learning through Model Manipulation.
- [SP 2024] Test-Time Poisoning Attacks Against Test-Time Adaptation Models.
- [SP 2024] Attacking Byzantine Robust Aggregation in High Dimensions.
- [SP 2024] CaFA: Cost-aware, Feasible Attacks With Database Constraints Against Neural Tabular Classifiers.
- [SP 2024] Breach Extraction Attacks: Exposing and Addressing the Leakage in Second Generation Compromised Credential Checking Services.
- [SP 2024] ALIF: Low-Cost Adversarial Audio Attacks on Black-Box Speech Platforms using Linguistic Features.
- [SP 2024] FlowMur: A Stealthy and Practical Audio Backdoor Attack with Limited Knowledge.
- [SP 2024] Transferable Multimodal Attack on Vision-Language Pre-training Models.
- [SP 2024] MM-BD: Post-Training Detection of Backdoor Attacks with Arbitrary Backdoor Pattern Types Using a Maximum Margin Statistic.
- [SP 2024] BadVFL: Backdoor Attacks in Vertical Federated Learning.
- [SP 2024] Distribution Preserving Backdoor Attack in Self-supervised Learning.
- [SP 2024] Exploring the Orthogonality and Linearity of Backdoor Attacks.
- [SP 2024] BELT: Old-School Backdoor Attacks can Evade the State-of-the-Art Defense with Backdoor Exclusivity Lifting.
- [SP 2024] Formal Model-Driven Analysis of Resilience of GossipSub to Attacks from Misbehaving Peers.
- [SP 2024] Nyx: Detecting Exploitable Front-Running Vulnerabilities in Smart Contracts.
- [SP 2024] Large-Scale Study of Vulnerability Scanners for Ethereum Smart Contracts.
- [SP 2024] A Systematic Study of Physical Sensor Attack Hardness.
- [SP 2024] Revisiting Automotive Attack Surfaces: a Practitioners’ Perspective.
- [SP 2024] MEA-Defender: A Robust Watermark against Model Extraction Attack.
- [SP 2024] FLShield: A Validation Based Federated Learning Framework to Defend Against Poisoning Attacks.
- [SP 2024] Injection Attacks Against End-to-End Encrypted Applications.
- [SP 2024] Text-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attacks.
- [SP 2024] Node-aware Bi-smoothing: Certified Robustness against Graph Injection Attacks.
- [SP 2024] CryptoVampire: Automated Reasoning for the Complete Symbolic Attacker Cryptographic Model.
- [SP 2024] Attacking and Improving the Tor Directory Protocol.
- [SP 2024] Learn What You Want to Unlearn: Unlearning Inversion Attacks against Machine Unlearning.
- [SP 2024] DeepShuffle: A Lightweight Defense Framework against Adversarial Fault Injection Attacks on Deep Neural Networks in Multi-Tenant Cloud-FPGA.
- [SP 2024] BUSted!!! Microarchitectural Side-Channel Attacks on the MCU Bus Interconnect.
- [SP 2024] ConjunCT: Learning Inductive Invariants to Prove Unbounded Instruction Safety Against Microarchitectural Timing Attacks.
- [SP 2024] Rethinking IC Layout Vulnerability: Simulation-Based Hardware Trojan Threat Assessment with High Fidelity.
- [SP 2024] Routing Attacks on Cryptocurrency Mining Pools.
- [SP 2024] POMABuster: Detecting Price Oracle Manipulation Attacks in Decentralized Finance.
- [SP 2024] Pryde: A Modular Generalizable Workflow for Uncovering Evasion Attacks Against Stateful Firewall Deployments.
- [SP 2024] TuDoor Attack: Systematically Exploring and Exploiting Logic Vulnerabilities in DNS Response Pre-processing with Malformed Packets.
- [SP 2024] DNSBomb: A New Practical-and-Powerful Pulsing DoS Attack Exploiting DNS Queries-and-Responses.
- [SP 2024] Practical Attacks Against DNS Reputation Systems.
- [SP 2024] Leveraging Prefix Structure to Detect Volumetric DDoS Attack Signatures with Programmable Switches.
- [SP 2024] SoK: A Comprehensive Analysis and Evaluation of Docker Container Attack and Defense Mechanisms.
- [SP 2024] P4Control: Line-Rate Cross-Host Attack Prevention via In-Network Information Flow Control Enabled by Programmable Switches and eBPF.
- [SP 2024] Side-Channel-Assisted Reverse-Engineering of Encrypted DNN Hardware Accelerator IP and Attack Surface Exploration.
- [SP 2024] SHERPA: Explainable Robust Algorithms for Privacy-Preserved Federated Learning in Future Networks to Defend Against Data Poisoning Attacks.
- [SP 2024] Please Tell Me More: Privacy Impact of Explainability through the Lens of Membership Inference Attack.
- [SP 2025] Connecting the Extra Dots (Contexts): Correlating External Information about Point of Interest for Attack Investigation.
- [SP 2025] Security Attacks Abusing Pulse-level Quantum Circuits.
- [SP 2025] Benchmarking Attacks on Learning with Errors.
- [SP 2025] On the Effectiveness of Prompt Stealing Attacks on In-the-Wild Prompts.
- [SP 2025] Fun-tuning: Characterizing the Vulnerability of Proprietary LLMs to Optimization-Based Prompt Injection Attacks via the Fine-Tuning Interface.
- [SP 2025] Unveiling Security Vulnerabilities in Git Large File Storage Protocol.
- [SP 2025] Codebreaker: Dynamic Extraction Attacks on Code Language Models.
- [SP 2025] Make a Feint to the East While Attacking in the West: Blinding LLM-Based Code Auditors with Flashboom Attacks.
- [SP 2025] GoSonar: Detecting Logical Vulnerabilities in Memory Safe Language Using Inductive Constraint Reasoning.
- [SP 2025] BridgeRouter: Automated Capability Upgrading of Out-Of-Bounds Write Vulnerabilities to Arbitrary Memory Write Primitives in the Linux Kernel.
- [SP 2025] Predator: Directed Web Application Fuzzing for Efficient Vulnerability Validation.
- [SP 2025] MOCGuard: Automatically Detecting Missing-Owner-Check Vulnerabilities in Java Web Applications.
- [SP 2025] Racedb: Detecting Request Race Vulnerabilities in Database-Backed Web Applications.
- [SP 2025] Detecting Taint-Style Vulnerabilities in Microservice-Structured Web Applications.
- [SP 2025] SoK: Space Infrastructures Vulnerabilities, Attacks and Defenses.
- [SP 2025] Countmamba: A Generalized Website Fingerprinting Attack via Coarse-Grained Representation and Fine-Grained Prediction.
- [SP 2025] Preference Poisoning Attacks on Reward Model Learning.
- [SP 2025] Query Provenance Analysis: Efficient and Robust Defense Against Query-Based Black-Box Attacks.
- [SP 2025] BAIT: Large Language Model Backdoor Scanning by Inverting Attack Target.
- [SP 2025] Prompt Inversion Attack Against Collaborative Inference of Large Language Models.
- [SP 2025] PEFTGuard: Detecting Backdoor Attacks Against Parameter-Efficient Fine-Tuning.
- [SP 2025] Practical Poisoning Attacks with Limited Byzantine Clients in Clustered Federated Learning.
- [SP 2025] SCAD: Towards a Universal and Automated Network Side-Channel Vulnerability Detection.
- [SP 2025] An Attack on TON’s ADNL Secure Channel Protocol.
- [SP 2025] GRID: Protecting Training Graph from Link Stealing Attacks on GNN Models.
- [SP 2025] Fight Fire with Fire: Combating Adversarial Patch Attacks using Pattern-randomized Defensive Patches.
- [SP 2025] DataSentinel: A Game-Theoretic Detection of Prompt Injection Attacks.
- [SP 2025] Rigging the Foundation: Manipulating Pre-training for Advanced Membership Inference Attacks.
- [SP 2025] UnMarker: A Universal Attack on Defensive Image Watermarking.
- [SP 2025] Is MPC Secure? Leveraging Neural Network Classifiers to Detect Data Leakage Vulnerabilities in MPC Implementations.
- [SP 2025] SV-TrustEval-C: Evaluating Structure and Semantic Reasoning in Large Language Models for Source Code Vulnerability Analysis.
- [SP 2025] Chimera: Fuzzing P4 Network Infrastructure for Multi-Plane Bug Detection and Vulnerability Discovery.
- [SP 2025] Breaking the Barrier: Post-Barrier Spectre Attacks.
- [SP 2025] SLAP: Data Speculation Attacks via Load Address Prediction on Apple Silicon.
- [SP 2025] PQ-Hammer: End-to-End Key Recovery Attacks on Post-Quantum Cryptography Using Rowhammer.
- [SP 2025] Half Spectre, Full Exploit: Hardening Rowhammer Attacks with Half-Spectre Gadgets.
- [SP 2025] Training Solo: On the Limitations of Domain Isolation Against Spectre-v2 Attacks.
- [SP 2025] I know What You Sync: Covert and Side Channel Attacks on File Systems via syncfs.
- [SP 2025] HouseFuzz: Service-Aware Grey-Box Fuzzing for Vulnerability Detection in Linux-Based Firmware.
- [SP 2025] An Attack-Agnostic Defense Framework Against Manipulation Attacks Under Local Differential Privacy.
- [SP 2025] The Inadequacy of Similarity-Based Privacy Metrics: Privacy Attacks Against “Truly Anonymous” Synthetic Datasets.
- [SP 2025] EUCLEAK Side-Channel Attack on the YubiKey 5 Series (Revealing and Breaking Infineon ECDSA Implementation on the Way).
- [SP 2025] BadRAM: Practical Memory Aliasing Attacks on Trusted Execution Environments.
- [SP 2025] EvilHarmony: Stealthy Adversarial Attacks Against Black-Box Speech Recognition Systems.
- [SP 2025] Investigating Physical Latency Attacks Against Camera-Based Perception.
- [CRYPTO 2010] Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks.
- [CRYPTO 2010] Instantiability of RSA-OAEP under Chosen-Plaintext Attack.
- [CRYPTO 2010] Improved Differential Attacks for ECHO and Grøstl.
- [CRYPTO 2010] A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony.
- [CRYPTO 2010] Time Space Tradeoffs for Attacks against One-Way Functions and PRGs.
- [CRYPTO 2010] Pseudorandom Functions and Permutations Provably Secure against Related-Key Attacks.
- [CRYPTO 2011] Automatic Search of Attacks on Round-Reduced AES and Applications.
- [CRYPTO 2011] How to Improve Rebound Attacks.
- [CRYPTO 2011] A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack.
- [CRYPTO 2011] McEliece and Niederreiter Cryptosystems That Resist Quantum Fourier Sampling Attacks.
- [CRYPTO 2012] New Preimage Attacks against Reduced SHA-1.
- [CRYPTO 2012] Efficient Padding Oracle Attacks on Cryptographic Hardware.
- [CRYPTO 2012] Resistance against Iterated Attacks by Decorrelation Revisited, .
- [CRYPTO 2013] Sieve-in-the-Middle: Improved MITM Attacks.
- [CRYPTO 2014] Updates on Generic Attacks against HMAC and NMAC.
- [CRYPTO 2014] Improved Generic Attacks against Hash-Based MACs and HAIFA.
- [CRYPTO 2015] Capacity and Data Complexity in Multidimensional Linear Attack.
- [CRYPTO 2015] Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations.
- [CRYPTO 2015] New Attacks on Feistel Structures with Improved Memory Complexities.
- [CRYPTO 2015] Key-Recovery Attack on the ASASA Cryptosystem with Expanding S-Boxes.
- [CRYPTO 2015] Last Fall Degree, HFE, and Weil Descent Attacks on ECDLP.
- [CRYPTO 2015] Practical Free-Start Collision Attacks on 76-step SHA-1.
- [CRYPTO 2015] Fast Correlation Attacks over Extension Fields, Large-Unit Linear Approximation and Cryptanalysis of SNOW 2.0.
- [CRYPTO 2015] Higher-Order Differential Meet-in-the-middle Preimage Attacks on SHA-1 and BLAKE.
- [CRYPTO 2015] Impossibility of Black-Box Simulation Against Leakage Attacks.
- [CRYPTO 2015] Multi-prover Commitments Against Non-signaling Attacks.
- [CRYPTO 2016] A Subfield Lattice Attack on Overstretched NTRU Assumptions - Cryptanalysis of Some FHE and Graded Encoding Schemes.
- [CRYPTO 2016] A 2^70 Attack on the Full MISTY1.
- [CRYPTO 2016] Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks.
- [CRYPTO 2016] ParTI - Towards Combined Hardware Countermeasures Against Side-Channel and Fault-Injection Attacks.
- [CRYPTO 2016] Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13.
- [CRYPTO 2017] Stronger Security for Reusable Garbled Circuits, General Definitions and Attacks.
- [CRYPTO 2017] Quantum Security of NMAC and Related Constructions - PRF Domain Extension Against Quantum attacks.
- [CRYPTO 2017] Time-Memory Tradeoff Attacks on the MTP Proof-of-Work Scheme.
- [CRYPTO 2017] Functional Graph Revisited: Updates on (Second) Preimage Attacks on Hash Combiners.
- [CRYPTO 2017] Non-full Sbox Linearization: Applications to Collision Attacks on Round-Reduced Keccak.
- [CRYPTO 2017] Proving Resistance Against Invariant Attacks: How to Choose the Round Constants.
- [CRYPTO 2017] Cube Attacks on Non-Blackbox Polynomials Based on Division Property.
- [CRYPTO 2018] CAPA: The Spirit of Beaver Against Physical Attacks.
- [CRYPTO 2018] The Curse of Small Domains: New Attacks on Format-Preserving Encryption.
- [CRYPTO 2018] Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly.
- [CRYPTO 2018] Generic Attacks Against Beyond-Birthday-Bound MACs.
- [CRYPTO 2018] Fast Correlation Attack Revisited - Cryptanalysis on Full Grain-128a, Grain-128, and Grain-v1.
- [CRYPTO 2018] A Key-Recovery Attack on 855-round Trivium.
- [CRYPTO 2018] Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities.
- [CRYPTO 2018] GGH15 Beyond Permutation Branching Programs: Proofs, Attacks, and Candidates.
- [CRYPTO 2018] Quantum Attacks Against Indistinguishablility Obfuscators Proved Secure in the Weak Multilinear Map Model.
- [CRYPTO 2019] Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality.
- [CRYPTO 2019] Quantum Cryptanalysis in the RAM Model: Claw-Finding Attacks on SIKE.
- [CRYPTO 2019] Efficient Collision Attack Frameworks for RIPEMD-160.
- [CRYPTO 2019] Improving Attacks on Round-Reduced Speck32/64 Using Deep Learning.
- [CRYPTO 2019] Low-Memory Attacks Against Two-Round Even-Mansour Using the 3-XOR Problem.
- [CRYPTO 2019] Data-Independent Memory Hard Functions: New Attacks and Stronger Constructions.
- [CRYPTO 2019] Statistical Zeroizing Attack: Cryptanalysis of Candidates of BP Obfuscation over GGH15 Multilinear Map.
- [CRYPTO 2020] LWE with Side Information: Attacks and Concrete Security Estimation.
- [CRYPTO 2020] A Key-Recovery Timing Attack on Post-quantum Primitives Using the Fujisaki-Okamoto Transformation and Its Application on FrodoKEM.
- [CRYPTO 2020] Non-malleable Secret Sharing Against Bounded Joint-Tampering Attacks in the Plain Model.
- [CRYPTO 2020] Improved Differential-Linear Attacks with Applications to ARX Ciphers.
- [CRYPTO 2021] Quantum Collision Attacks on Reduced SHA-256 and SHA-512.
- [CRYPTO 2021] A Rational Protocol Treatment of 51% Attacks.
- [CRYPTO 2021] Meet-in-the-Middle Attacks Revisited: Key-Recovery, Collision, and Preimage Attacks.
- [CRYPTO 2021] Improved Torsion-Point Attacks on SIDH Variants.
- [CRYPTO 2022] Superposition Meet-in-the-Middle Attacks: Updates on Fundamental Security of AES-like Hashing.
- [CRYPTO 2022] Triangulating Rebound Attack on AES-like Hashing.
- [CRYPTO 2022] Time-Space Tradeoffs for Sponge Hashing: Attacks and Limitations for Short Collisions.
- [CRYPTO 2022] Partial Key Exposure Attacks on BIKE, Rainbow and NTRU.
- [CRYPTO 2022] Improving Support-Minors Rank Attacks: Applications to Gđisplaystyle eMSS and Rainbow.
- [CRYPTO 2022] Simplified MITM Modeling for Permutations: New (Quantum) Attacks.
- [CRYPTO 2023] The Query-Complexity of Preprocessing Attacks.
- [CRYPTO 2023] Does the Dual-Sieve Attack on Learning with Errors Even Work?
- [CRYPTO 2023] Exploring Decryption Failures of BIKE: New Class of Weak Keys and Key Recovery Attacks.
- [CRYPTO 2023] Practical-Time Related-Key Attack on GOST with Secret S-Boxes.
- [CRYPTO 2023] Cryptanalysis of Symmetric Primitives over Rings and a Key Recovery Attack on Rubato.
- [CRYPTO 2023] On Active Attack Detection in Messaging with Immediate Decryption.
- [CRYPTO 2023] Quantum Linear Key-Recovery Attacks Using the QFT.
- [CRYPTO 2024] Provable Security Against Decryption Failure Attacks from LWE.
- [CRYPTO 2024] Generic MitM Attack Frameworks on Sponge Constructions.
- [CRYPTO 2024] Revisiting Differential-Linear Attacks via a Boomerang Perspective with Application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT.
- [CRYPTO 2024] Speeding Up Preimage and Key-Recovery Attacks with Highly Biased Differential-Linear Approximations.
- [CRYPTO 2024] Improving Generic Attacks Using Exceptional Functions.
- [CRYPTO 2024] The Algebraic FreeLunch: Efficient Gröbner Basis Attacks Against Arithmetization-Oriented Primitives.
- [USS 2010] Toward Automated Detection of Logic Vulnerabilities in Web Applications.
- [USS 2010] Acoustic Side-Channel Attacks on Printers.
- [USS 2010] Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study.
- [USS 2010] VEX: Vetting Browser Extensions for Security Vulnerabilities.
- [USS 2010] Fighting Coercion Attacks in Key Generation using Skin Conductance.
- [USS 2011] Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space.
- [USS 2011] Comprehensive Experimental Analyses of Automotive Attack Surfaces.
- [USS 2011] SHELLOS: Enabling Fast Detection and Forensic Analysis of Code Injection Attacks.
- [USS 2011] MACE: Model-inference-Assisted Concolic Exploration for Protocol and Vulnerability Discovery.
- [USS 2011] Static Detection of Access Control Vulnerabilities in Web Applications.
- [USS 2011] Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade.
- [USS 2011] Permission Re-Delegation: Attacks and Defenses.
- [USS 2011] SMS of Death: From Analyzing to Attacking Mobile Phones on a Large Scale.
- [USS 2012] I Forgot Your Password: Randomness Attacks Against PHP Applications.
- [USS 2012] Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose Attacks.
- [USS 2012] On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces.
- [USS 2012] Whispers in the Hyper-space: High-speed Covert Channel Attacks in the Cloud.
- [USS 2012] STEALTHMEM: System-Level Protection Against Cache-Based Side Channel Attacks in the Cloud.
- [USS 2012] New Attacks on Timing-based Network Flow Watermarks.
- [USS 2012] Clickjacking: Attacks and Defenses.
- [USS 2012] kGuard: Lightweight Kernel Protection against Return-to-User Attacks.
- [USS 2012] Enemy of the State: A State-Aware Black-Box Web Vulnerability Scanner.
- [USS 2012] STING: Finding Name Resolution Vulnerabilities in Programs.
- [USS 2013] MetaSymploit: Day-One Defense against Script-based Attacks with Security-Enhanced Symbolic Analysis.
- [USS 2013] An Empirical Study of Vulnerability Rewards Programs.
- [USS 2013] FIE on Firmware: Finding Vulnerabilities in Embedded Systems Using Symbolic Execution.
- [USS 2013] Take This Personally: Pollution Attacks on Personalized Services.
- [USS 2014] Exit from Hell? Reducing the Impact of Amplification DDoS Attacks.
- [USS 2014] Effective Attacks and Provable Defenses for Website Fingerprinting.
- [USS 2014] From the Aether to the Ethernet - Attacking the Internet using Broadcast Digital Television.
- [USS 2014] Size Does Matter: Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard.
- [USS 2014] Password Managers: Attacks and Defenses.
- [USS 2014] SSOScan: Automated Testing of Web Applications for Single Sign-On Vulnerabilities.
- [USS 2014] A Look at Targeted Attacks Through the Lense of an NGO.
- [USS 2014] On the Effective Prevention of TLS Man-in-the-Middle Attacks in Web Applications.
- [USS 2014] FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack.
- [USS 2014] Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks.
- [USS 2014] Static Detection of Second-Order Vulnerabilities in Web Applications.
- [USS 2014] Peeking into Your App without Actually Seeing It: UI State Inference and Novel Android Attacks.
- [USS 2015] Attacks Only Get Better: Password Recovery Attacks Against RC4 in TLS.
- [USS 2015] Eclipse Attacks on Bitcoin’s Peer-to-Peer Network.
- [USS 2015] Compiler-instrumented, Dynamic Secret-Redaction of Legacy Processes for Attacker Deception.
- [USS 2015] RAPTOR: Routing Attacks on Privacy in Tor.
- [USS 2015] Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services.
- [USS 2015] Type Casting Verification: Stopping an Emerging Attack Vector.
- [USS 2015] ZigZag: Automatically Hardening Web Applications Against Client-side Validation Vulnerabilities.
- [USS 2015] Cache Template Attacks: Automating Attacks on Inclusive Last-Level Caches.
- [USS 2015] A Placement Vulnerability Study in Multi-Tenant Public Clouds.
- [USS 2015] Vulnerability Disclosure in the Age of Social Media: Exploiting Twitter for Predicting Real-World Exploits.
- [USS 2016] One Bit Flips, One Cloud Flops: Cross-VM Row Hammer Attacks and Privilege Escalation.
- [USS 2016] On Omitting Commits and Committing Omissions: Preventing Git Metadata Tampering That (Re)introduces Software Vulnerabilities.
- [USS 2016] Micro-Virtualization Memory Tracing to Detect and Prevent Spraying Attacks.
- [USS 2016] ARMageddon: Cache Attacks on Mobile Devices.
- [USS 2016] DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks.
- [USS 2016] Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage.
- [USS 2016] All Your Queries Are Belong to Us: The Power of File-Injection Attacks on Searchable Encryption.
- [USS 2016] Towards Measuring and Mitigating Social Engineering Software Download Attacks.
- [USS 2016] You Are Who You Know and How You Behave: Attribute Inference Attacks via Users’ Social Friends and Behaviors.
- [USS 2016] Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability Notification.
- [USS 2016] You’ve Got Vulnerability: Exploring Effective Vulnerability Notifications.
- [USS 2017] How Double-Fetch Situations turn into Double-Fetch Vulnerabilities: A Study of Double Fetches in the Linux Kernel.
- [USS 2017] Prime+Abort: A Timer-Free High-Precision L3 Cache Attack using Intel TSX.
- [USS 2017] CAn’t Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory.
- [USS 2017] Digtool: A Virtualization-Based Framework for Detecting Kernel Vulnerabilities.
- [USS 2017] Venerable Variadic Vulnerabilities Vanquished.
- [USS 2017] 6thSense: A Context-aware Sensor-based Attack Detector for Smart Devices.
- [USS 2017] Identifier Binding Attacks and Defenses in Software-Defined Networks.
- [USS 2017] Attacking the Brain: Races in the SDN Control Plane.
- [USS 2017] SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data.
- [USS 2017] Predicting the Resilience of Obfuscated Code Against Symbolic Execution Attacks via Machine Learning.
- [USS 2017] PDF Mirage: Content Masking Attack Against Information-Based Online Services.
- [USS 2017] Loophole: Timing Attacks on Shared Event Loops in Chrome.
- [USS 2017] Speeding up detection of SHA-1 collision attacks using unavoidable attack conditions.
- [USS 2017] Telling Your Secrets without Page Faults: Stealthy Page Table-Based Attacks on Enclaved Execution.
- [USS 2017] AutoLock: Why Cache Attacks on ARM Are Harder Than You Think.
- [USS 2017] MPI: Multiple Perspective Attack Investigation with Semantic Aware Execution Partitioning.
- [USS 2017] USB Snooping Made Easy: Crosstalk Leakage Attacks on USB Hubs.
- [USS 2017] Walkie-Talkie: An Efficient Defense Against Passive Website Fingerprinting Attacks.
- [USS 2018] Skill Squatting Attacks on Amazon Alexa.
- [USS 2018] ATtention Spanned: Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem.
- [USS 2018] Enabling Refinable Cross-Host Attack Investigation with Efficient Data Flow Tagging and Tracking.
- [USS 2018] Freezing the Web: A Study of ReDoS Vulnerabilities in JavaScript-based Web Servers.
- [USS 2018] Rampart: Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks.
- [USS 2018] AttriGuard: A Practical Defense Against Attribute Inference Attacks via Adversarial Machine Learning.
- [USS 2018] The Dangers of Key Reuse: Practical Attacks on IPsec IKE.
- [USS 2018] One&Done: A Single-Decryption EM-Based Attack on OpenSSL’s Constant-Time Blinded RSA.
- [USS 2018] FUZE: Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities.
- [USS 2018] From Patching Delays to Infection Symptoms: Using Risk Profiles for an Early Discovery of Vulnerabilities Exploited in the Wild.
- [USS 2018] Understanding the Reproducibility of Crowd-reported Security Vulnerabilities.
- [USS 2018] Malicious Management Unit: Why Stopping Cache Attacks in Software is Harder Than You Think.
- [USS 2018] Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks.
- [USS 2018] The aftermath of a crypto-ransomware attack at a large academic institution.
- [USS 2018] End-to-End Measurements of Email Spoofing Attacks.
- [USS 2018] The Guard’s Dilemma: Efficient Code-Reuse Attacks Against Intel SGX.
- [USS 2018] With Great Training Comes Great Vulnerability: Practical Attacks against Transfer Learning.
- [USS 2018] When Does Machine Learning FAIL? Generalized Transferability for Evasion and Poisoning Attacks.
- [USS 2018] Shielding Software From Privileged Side-Channel Attacks.
- [USS 2018] Modelling and Analysis of a Hierarchy of Distance Bounding Attacks.
- [USS 2019] A Study of the Feasibility of Co-located App Attacks against BLE and a Large-Scale Analysis of the Current Application-Layer Security Landscape.
- [USS 2019] The CrossPath Attack: Disrupting the SDN Control Channel via Shared Links.
- [USS 2019] A Billion Open Interfaces for Eve and Mallory: MitM, DoS, and Tracking Attacks on iOS and macOS Through Apple Wireless Direct Link.
- [USS 2019] Hiding in Plain Signal: Physical Signal Overshadowing Attack on LTE.
- [USS 2019] UWB-ED: Distance Enlargement Attack Detection in Ultra-Wideband.
- [USS 2019] A Systematic Evaluation of Transient Execution Attacks and Defenses.
- [USS 2019] Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features.
- [USS 2019] Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks.
- [USS 2019] Wireless Attacks on Aircraft Instrument Landing Systems.
- [USS 2019] Seeing is Not Believing: Camouflage Attacks on Image Scaling Algorithms.
- [USS 2019] Terminal Brain Damage: Exposing the Graceless Degradation in Deep Neural Networks Under Hardware Fault Attacks.
- [USS 2019] SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks.
- [USS 2019] ScatterCache: Thwarting Cache Attacks via Cache Set Randomization.
- [USS 2019] Devils in the Guidance: Predicting Logic Vulnerabilities in Payment Syndication Services through Automated Documentation Analysis.
- [USS 2019] Towards the Detection of Inconsistencies in Public Security Vulnerability Reports.
- [USS 2019] Understanding and Securing Device Vulnerabilities through Automated Bug Report Analysis.
- [USS 2019] ATTACK2VEC: Leveraging Temporal Word Embeddings to Understand the Evolution of Cyberattacks.
- [USS 2019] Leaky Images: Targeted Privacy Attacks in the Web.
- [USS 2019] What Are You Searching For? A Remote Keylogging Attack on Search Engine Autocomplete.
- [USS 2019] Iframes/Popups Are Dangerous in Mobile WebView: Studying and Mitigating Differential Context Vulnerabilities.
- [USS 2019] Scalable Scanning and Automatic Classification of TLS Padding Oracle Vulnerabilities.
- [USS 2019] Not Everything is Dark and Gloomy: Power Grid Protections Against IoT Demand Attacks.
- [USS 2019] KEPLER: Facilitating Control-flow Hijacking Primitive Evaluation for Linux Kernel Vulnerabilities.
- [USS 2019] Cognitive Triaging of Phishing Attacks.
- [USS 2019] Probability Model Transforming Encoders Against Encoding Attacks.
- [USS 2019] Point Break: A Study of Bandwidth Denial-of-Service Attacks against Tor.
- [USS 2020] Breaking Secure Pairing of Bluetooth Low Energy Using Downgrade Attacks.
- [USS 2020] Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness of Phishing Attacks at Scale.
- [USS 2020] CopyCat: Controlled Instruction-Level Attacks on Enclaves.
- [USS 2020] An Off-Chip Attack on Hardware Enclaves via the Memory Bus.
- [USS 2020] Poison Over Troubled Forwarders: A Cache Poisoning Attack Targeting DNS Forwarding Devices.
- [USS 2020] NXNSAttack: Recursive DNS Inefficiencies and Vulnerabilities.
- [USS 2020] TeeRex: Discovery and Exploitation of Memory Corruption Vulnerabilities in SGX Enclaves.
- [USS 2020] Towards Robust LiDAR-based Perception in Autonomous Driving: General Black-box Adversarial Sensor Attack and Countermeasures.
- [USS 2020] Plug-N-Pwned: Comprehensive Vulnerability Analysis of OBD-II Dongles as A New Over-the-Air Attack Surface in Automotive IoT.
- [USS 2020] KOOBE: Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities.
- [USS 2020] MVP: Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures.
- [USS 2020] Hall Spoofing: A Non-Invasive DoS Attack on Grid-Tied Solar Inverter.
- [USS 2020] Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning.
- [USS 2020] Hybrid Batch Attacks: Finding Black-box Adversarial Examples with Limited Queries.
- [USS 2020] Adversarial Preprocessing: Understanding and Preventing Image-Scaling Attacks in Machine Learning.
- [USS 2020] PKU Pitfalls: Attacks on PKU-based Memory Isolation Systems.
- [USS 2020] Medusa: Microarchitectural Data Leakage via Automated Attack Synthesis.
- [USS 2020] V0LTpwn: Attacking x86 Processor Integrity from Software.
- [USS 2020] SpecFuzz: Bringing Spectre-type vulnerabilities to the surface.
- [USS 2020] Local Model Poisoning Attacks to Byzantine-Robust Federated Learning.
- [USS 2020] Temporal System Call Specialization for Attack Surface Reduction.
- [USS 2020] Automating the Development of Chosen Ciphertext Attacks.
- [USS 2020] RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks.
- [USS 2020] Timeless Timing Attacks: Exploiting Concurrency to Leak Secrets over Remote Connections.
- [USS 2020] Cache Telepathy: Leveraging Shared Resource Attacks to Learn DNN Architectures.
- [USS 2020] TPM-FAIL: TPM meets Timing and Lattice Attacks.
- [USS 2020] Liveness is Not Enough: Enhancing Fingerprint Authentication with Behavioral Biometrics to Defeat Puppet Attacks.
- [USS 2020] FIRMSCOPE: Automatic Uncovering of Privilege-Escalation Vulnerabilities in Pre-Installed Apps in Android Firmware.
- [USS 2020] SEAL: Attack Mitigation for Encrypted Databases via Adjustable Leakage.
- [USS 2020] Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems.
- [USS 2020] Devil’s Whisper: A General Approach for Physical Adversarial Attacks against Commercial Black-box Speech Recognition Devices.
- [USS 2020] Remote Side-Channel Attacks on Anonymous Transactions.
- [USS 2020] TXSPECTOR: Uncovering Attacks in Ethereum from Transactions.
- [USS 2020] An Ever-evolving Game: Evaluation of Real-world Attacks and Defenses in Ethereum Ecosystem.
- [USS 2021] A Highly Accurate Query-Recovery Attack against Searchable Encryption using Non-Indexed Documents.
- [USS 2021] Card Brand Mixup Attack: Bypassing the PIN in non-Visa Cards by Using Them for Visa Transactions.
- [USS 2021] Partitioning Oracle Attacks.
- [USS 2021] Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E).
- [USS 2021] Automatic Extraction of Secrets from the Transistor Jungle using Laser-Assisted Side-Channel Attacks.
- [USS 2021] Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical.
- [USS 2021] Frontal Attack: Leaking Control-Flow in SGX via the CPU Frontend.
- [USS 2021] VoltPillager: Hardware-based fault injection attacks against Intel SGX Enclaves using the SVID voltage scaling interface.
- [USS 2021] Data Poisoning Attacks to Local Differential Privacy Protocols.
- [USS 2021] SMASH: Synchronized Many-sided Rowhammer Attacks from JavaScript.
- [USS 2021] Database Reconstruction from Noisy Volumes: A Cache Side-Channel Attack on SQLite.
- [USS 2021] A Large-Scale Interview Study on Information Security in and Attacks against Small and Medium-sized Enterprises.
- [USS 2021] On the Routing-Aware Peering against Network-Eclipse Attacks in Bitcoin.
- [USS 2021] Evil Under the Sun: Understanding and Discovering Attacks on Ethereum Decentralized Applications.
- [USS 2021] Smart Contract Vulnerabilities: Vulnerable Does Not Imply Exploited.
- [USS 2021] MIRAGE: Mitigating Conflict-Based Cache Attacks with a Practical Fully-Associative Design.
- [USS 2021] Rage Against the Machine Clear: A Systematic Analysis of Machine Clears and Their Implications for Transient Execution Attacks.
- [USS 2021] Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers.
- [USS 2021] You Autocomplete Me: Poisoning Vulnerabilities in Neural Code Completion.
- [USS 2021] Double-Cross Attacks: Subverting Active Learning Systems.
- [USS 2021] DRMI: A Dataset Reduction Technology based on Mutual Information for Black-box Attacks.
- [USS 2021] Deep-Dup: An Adversarial Weight Duplication Attack Framework to Crush Deep Neural Network in Multi-Tenant FPGA.
- [USS 2021] Hermes Attack: Steal DNN Models with Lossless Inference Accuracy.
- [USS 2021] T-Miner: A Generative Approach to Defend Against Trojan Attacks on DNN-based Text Classification.
- [USS 2021] An Analysis of Speculative Type Confusion Vulnerabilities in the Wild.
- [USS 2021] Preventing Use-After-Free Attacks with Fast Forward Allocation.
- [USS 2021] PolyScope: Multi-Policy Access Control Analysis to Compute Authorized Attack Operations in Android Systems.
- [USS 2021] Android SmartTVs Vulnerability Discovery via Log-Guided Fuzzing.
- [USS 2021] Can I Take Your Subdomain? Exploring Same-Site Attacks in the Modern Web.
- [USS 2021] Abusing Hidden Properties to Attack the Node.js Ecosystem.
- [USS 2021] ATLAS: A Sequence-based Learning Approach for Attack Investigation.
- [USS 2021] V0Finder: Discovering the Correct Origin of Publicly Reported Software Vulnerabilities.
- [USS 2021] Blind In/On-Path Attacks and Applications to VPNs.
- [USS 2021] Injection Attacks Reloaded: Tunnelling Malicious Payloads over DNS.
- [USS 2021] Causal Analysis for Software-Defined Networking Attacks.
- [USS 2021] Weak Links in Authentication Chains: A Large-scale Analysis of Email Sender Spoofing Attacks.
- [USS 2021] Automated Discovery of Denial-of-Service Vulnerabilities in Connected Vehicle Protocols.
- [USS 2021] Acoustics to the Rescue: Physical Key Inference Attack Revisited.
- [USS 2021] Messy States of Wiring: Vulnerabilities in Emerging Personal Payment Systems.
- [USS 2021] Dirty Road Can Attack: Security of Deep Learning based Automated Lane Centering under Physical-World Attack.
- [USS 2021] Forecasting Malware Capabilities From Cyber Attack Memory Images.
- [USS 2021] Compromised or Attacker-Owned: A Large Scale Classification and Study of Hosting Domains of Malicious URLs.
- [USS 2021] Is Real-time Phishing Eliminated with FIDO? Social Engineering Downgrade Attacks against FIDO Protocols.
- [USS 2021] Jaqen: A High-Performance Switch-Native Approach for Detecting and Mitigating Volumetric DDoS Attacks with Programmable Switches.
- [USS 2021] Accurately Measuring Global Risk of Amplification Attacks using AmpMap.
- [USS 2021] A Stealthy Location Identification Attack Exploiting Carrier Aggregation in Cellular Networks.
- [USS 2021] Disrupting Continuity of Apple’s Wireless Ecosystem Security: New Tracking, DoS, and MitM Attacks on iOS and macOS Through Bluetooth Low Energy, AWDL, and Wi-Fi.
- [USS 2021] Stars Can Tell: A Robust Method to Defend against GPS Spoofing Attacks using Off-the-shelf Chipset.
- [USS 2021] Exposing New Vulnerabilities of Error Handling Mechanism in CAN.
- [USS 2021] SiamHAN: IPv6 Address Correlation Attacks on TLS Encrypted Traffic via Siamese Heterogeneous Graph Attention Network.
- [USS 2022] Mining Node.js Vulnerabilities via Object Dependence Graph and Query.
- [USS 2022] FUGIO: Automatic Exploit Generation for PHP Object Injection Vulnerabilities.
- [USS 2022] “They Look at Vulnerability and Use That to Abuse You”: Participatory Threat Modelling with Migrant Domestic Workers.
- [USS 2022] How Long Do Vulnerabilities Live in the Code? A Large-Scale Empirical Measurement Study on FOSS Vulnerability Lifetimes.
- [USS 2022] Expected Exploitability: Predicting the Development of Functional Vulnerability Exploits.
- [USS 2022] OS-Aware Vulnerability Prioritization via Differential Severity Analysis.
- [USS 2022] Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary Programs.
- [USS 2022] Pool Inference Attacks on Local Differential Privacy: Quantifying the Privacy Guarantees of Apple’s Count Mean Sketch in Practice.
- [USS 2022] Poisoning Attacks to Local Differential Privacy Protocols for Key-Value Data.
- [USS 2022] Watching the watchers: bias and vulnerability in remote proctoring software.
- [USS 2022] AMD Prefetch Attacks through Power and Time.
- [USS 2022] Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86.
- [USS 2022] Binoculars: Contention-Based Side-Channel Attacks Exploiting the Page Walker.
- [USS 2022] Online Website Fingerprinting: Evaluating Website Fingerprinting Attacks on Tor in the Real World.
- [USS 2022] Physical-Layer Attacks Against Pulse Width Modulation-Controlled Actuators.
- [USS 2022] Branch History Injection: On the Effectiveness of Hardware Mitigations Against Cross-Privilege Spectre-v2 Attacks.
- [USS 2022] TLB;DR: Enhancing TLB-based Attacks with TLB Desynchronized Reverse Engineering.
- [USS 2022] FuzzOrigin: Detecting UXSS vulnerabilities in Browsers through Origin Fuzzing.
- [USS 2022] AmpFuzz: Fuzzing for Amplification DDoS Vulnerabilities.
- [USS 2022] Watching the Watchers: Practical Video Identification Attack in LTE Networks.
- [USS 2022] Ghost Peak: Practical Distance Reduction Attacks Against HRP UWB Ranging.
- [USS 2022] Label Inference Attacks Against Vertical Federated Learning.
- [USS 2022] Mitigating Membership Inference Attacks by Self-Distillation Through a Novel Ensemble Architecture.
- [USS 2022] Attacks on Deidentification’s Defenses.
- [USS 2022] Targeted Deanonymization via the Cache Side Channel: Attacks and Defenses.
- [USS 2022] GhostTouch: Targeted Attacks on Touchscreens without Physical Touch.
- [USS 2022] DoubleStar: Long-Range Attack Towards Depth Estimation based Obstacle Avoidance in Autonomous Systems.
- [USS 2022] Security Analysis of Camera-LiDAR Fusion Against Black-Box Attacks on Autonomous Vehicles.
- [USS 2022] SAID: State-aware Defense Against Injection Attacks on In-vehicle Network.
- [USS 2022] Backporting Security Patches of Web Applications: A Prototype Design and Implementation on Injection Vulnerability Patches.
- [USS 2022] Blacklight: Scalable Defense for Neural Networks against Query-Based Black-Box Attacks.
- [USS 2022] Adversarial Detection Avoidance Attacks: Evaluating the robustness of perceptual hashing-based client-side scanning.
- [USS 2022] Back-Propagating System Dependency Impact for Attack Investigation.
- [USS 2022] Off-Path Network Traffic Manipulation via Revitalized ICMP Redirect Attacks.
- [USS 2022] Composable Cachelets: Protecting Enclaves from Cache Side-Channel Attacks.
- [USS 2022] Don’t Mesh Around: Side-Channel Attacks and Mitigations on Mesh Interconnects.
- [USS 2022] COMRace: Detecting Data Race Vulnerabilities in COM Objects.
- [USS 2022] Loki: Hardening Code Obfuscation Against Automated Attacks.
- [USS 2022] TheHuzz: Instruction Fuzzing of Processors Using Golden-Reference Models for Finding Software-Exploitable Vulnerabilities.
- [USS 2022] An Experimental Study of GPS Spoofing and Takeover Attacks on UAVs.
- [USS 2022] MaDIoT 2.0: Modern High-Wattage IoT Botnet Attacks and Defenses.
- [USS 2022] AutoDA: Automated Decision-based Iterative Adversarial Attacks.
- [USS 2022] Poison Forensics: Traceback of Data Poisoning Attacks in Neural Networks.
- [USS 2022] Teacher Model Fingerprinting Attacks Against Transfer Learning.
- [USS 2022] Hidden Trigger Backdoor Attack on NLP Models via Linguistic Style Manipulation.
- [USS 2022] Double Trouble: Combined Heterogeneous Attacks on Non-Inclusive Cache Hierarchies.
- [USS 2022] Rapid Prototyping for Microarchitectural Attacks.
- [USS 2022] Minefield: A Software-only Protection for SGX Enclaves against DVFS Attacks.
- [USS 2022] Counting in Regexes Considered Harmful: Exposing ReDoS Vulnerability of Nonbacktracking Matchers.
- [USS 2022] Stalloris: RPKI Downgrade Attack.
- [USS 2022] XDRI Attacks - and - How to Enhance Resilience of Residential Routers.
- [USS 2022] ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine Learning Models.
- [USS 2022] Inference Attacks Against Graph Neural Networks.
- [USS 2022] Membership Inference Attacks and Defenses in Neural Network Pruning.
- [USS 2022] Are Your Sensitive Attributes Private? Novel Model Inversion Attribute Inference Attacks on Classification Models.
- [USS 2023] Towards a General Video-based Keystroke Inference Attack.
- [USS 2023] Auditory Eyesight: Demystifying μs-Precision Keystroke Tracking Attacks on Unconstrained Keyboard Inputs.
- [USS 2023] Squint Hard Enough: Attacking Perceptual Hashing with Adversarial Machine Learning.
- [USS 2023] KENKU: Towards Efficient and Stealthy Black-box Adversarial Attacks against ASR Systems.
- [USS 2023] Tubes Among Us: Analog Attack on Automatic Speaker Identification.
- [USS 2023] AIRTAG: Towards Automated Attack Investigation by Unsupervised Learning with Log Texts.
- [USS 2023] Know Your Cybercriminal: Evaluating Attacker Preferences by Measuring Profile Sales on an Active, Leading Criminal Market for User Impersonation at Scale.
- [USS 2023] Hard-label Black-box Universal Adversarial Patch Attack.
- [USS 2023] Exploring User Reactions and Mental Models Towards Perceptual Manipulation Attacks in Mixed Reality.
- [USS 2023] Improving Real-world Password Guessing Attacks via Bi-directional Transformers.
- [USS 2023] Araña: Discovering and Characterizing Password Guessing Attacks in Practice.
- [USS 2023] Black-box Adversarial Example Attack towards FCG Based Android Malware Detection under Incomplete Feature Information.
- [USS 2023] VIPER: Spotting Syscall-Guard Variables for Data-Only Attacks.
- [USS 2023] Not All Data are Created Equal: Data and Pointer Prioritization for Scalable Protection Against Data-Oriented Attacks.
- [USS 2023] PORE: Provably Robust Recommender Systems against Data Poisoning Attacks.
- [USS 2023] Every Vote Counts: Ranking-Based Training of Federated Learning to Resist Poisoning Attacks.
- [USS 2023] Fine-grained Poisoning Attack to Local Differential Privacy Protocols for Mean and Variance Estimation.
- [USS 2023] Your Exploit is Mine: Instantly Synthesizing Counterattack Smart Contract.
- [USS 2023] Confusum Contractum: Confused Deputy Vulnerabilities in Ethereum Smart Contracts.
- [USS 2023] The Gates of Time: Improving Cache Attacks with Transient Execution.
- [USS 2023] Synchronization Storage Channels (S2C): Timer-less Cache Side-Channel Attacks on the Apple M1 via Hardware Synchronization Instructions.
- [USS 2023] ClepsydraCache - Preventing Cache Attacks with Time-Based Evictions.
- [USS 2023] CacheQL: Quantifying and Localizing Cache Side-Channel Vulnerabilities in Production Software.
- [USS 2023] InfinityGauntlet: Expose Smartphone Fingerprint Authentication to Brute-force Attack.
- [USS 2023] Two-in-One: A Model Hijacking Attack Against Text Generation Models.
- [USS 2023] Aegis: Mitigating Targeted Bit-flip Attacks against Deep Neural Networks.
- [USS 2023] IvySyn: Automated Vulnerability Discovery in Deep Learning Frameworks.
- [USS 2023] QFA2SR: Query-Free Adversarial Transfer Attacks to Speaker Recognition Systems.
- [USS 2023] Learning Normality is Enough: A Software-based Mitigation against Inaudible Voice Attacks.
- [USS 2023] Timeless Timing Attacks and Preload Defenses in Tor’s DNS Cache.
- [USS 2023] Sparsity Brings Vulnerabilities: Exploring New Metrics in Backdoor Attacks.
- [USS 2023] Aliasing Backdoor Attacks on Pre-trained Models.
- [USS 2023] VILLAIN: Backdoor Attacks Against Vertical Split Learning.
- [USS 2023] DDRace: Finding Concurrency UAF Vulnerabilities in Linux Drivers with Directed Fuzzing.
- [USS 2023] Exorcising “Wraith”: Protecting LiDAR-based Object Detector in Automated Driving System from Appearing Attacks.
- [USS 2023] You Can’t See Me: Physical Removal Attacks on LiDAR-based Autonomous Vehicles Driving Frameworks.
- [USS 2023] The Maginot Line: Attacking the Boundary of DNS Caching Protection.
- [USS 2023] NRDelegationAttack: Complexity DDoS attack on DNS Recursive Resolvers.
- [USS 2023] Snapping Snap Sync: Practical Attacks on Go Ethereum Synchronising Nodes.
- [USS 2023] X-Adv: Physical Adversarial Object Attacks against X-ray Prohibited Item Detection.
- [USS 2023] SMACK: Semantically Meaningful Adversarial Audio Attack.
- [USS 2023] It’s all in your head(set): Side-channel attacks on AR/VR systems.
- [USS 2023] AEX-Notify: Thwarting Precise Single-Stepping Attacks through Interrupt Awareness for Intel SGX Enclaves.
- [USS 2023] Controlled Data Races in Enclaves: Attacks and Detection.
- [USS 2023] ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks.
- [USS 2023] Remote Attacks on Speech Recognition Systems Using Sound from Power Supply.
- [USS 2023] Near-Ultrasound Inaudible Trojan (Nuit): Exploiting Your Speaker to Attack Your Microphone.
- [USS 2023] Medusa Attack: Exploring Security Hazards of In-App QR Code Scanning.
- [USS 2023] A Two-Decade Retrospective Analysis of a University’s Vulnerability to Attacks Exploiting Reused Passwords.
- [USS 2023] In the Quest to Protect Users from Side-Channel Attacks - A User-Centred Design Space to Mitigate Thermal Attacks on Public Payment Terminals.
- [USS 2023] PCAT: Functionality and Data Stealing from Split Learning by Pseudo-Client Attack.
- [USS 2023] A Plot is Worth a Thousand Words: Model Information Stealing Attacks via Scientific Plots.
- [USS 2023] Notice the Imposter! A Study on User Tag Spoofing Attack in Mobile Apps.
- [USS 2023] NAUTILUS: Automated RESTful API Vulnerability Detection.
- [USS 2023] The Impostor Among US(B): Off-Path Injection Attacks on USB Communications.
- [USS 2023] Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses.
- [USS 2023] High Recovery with Fewer Injections: Practical Binary Volumetric Injection Attacks against Dynamic Searchable Encryption.
- [USS 2023] Cross Container Attacks: The Bewildered eBPF on Clouds.
- [USS 2023] Detecting Multi-Step IAM Attacks in AWS Environments via Model Checking.
- [USS 2023] WHIP: Improving Static Vulnerability Detection in Web Application by Forcing tools to Collaborate.
- [USS 2023] SQIRL: Grey-Box Detection of SQL Injection Vulnerabilities Using Reinforcement Learning.
- [USS 2023] Temporal CDN-Convex Lens: A CDN-Assisted Practical Pulsing DDoS Attack.
- [USS 2023] Hot Pixels: Frequency, Power, and Temperature Attacks on GPUs and Arm SoCs.
- [USS 2023] NeuroPots: Realtime Proactive Defense against Bit-Flip Attacks in Neural Networks.
- [USS 2023] Trojan Source: Invisible Vulnerabilities.
- [USS 2023] Cheesecloth: Zero-Knowledge Proofs of Real World Vulnerabilities.
- [USS 2023] V1SCAN: Discovering 1-day Vulnerabilities in Reused C/C++ Open-source Software Components Using Code Classification Techniques.
- [USS 2023] VulChecker: Graph-based Vulnerability Localization in Source Code.
- [USS 2023] The Most Dangerous Codec in the World: Finding and Exploiting Vulnerabilities in H.264 Decoders.
- [USS 2023] Strategies and Vulnerabilities of Participants in Venezuelan Influence Operations.
- [USS 2023] TRIDENT: Towards Detecting and Mitigating Web-based Social Engineering Attacks.
- [USS 2023] Fact-Saboteurs: A Taxonomy of Evidence Manipulation Attacks against Fact-Verification Systems.
- [USS 2023] NVLeak: Off-Chip Side-Channel Attacks via Non-Volatile Memory Systems.
- [USS 2023] Cipherfix: Mitigating Ciphertext Side-Channel Attacks in Software.
- [USS 2023] Side-Channel Attacks on Optane Persistent Memory.
- [USS 2023] CipherH: Automated Detection of Ciphertext Side-channel Vulnerabilities in Cryptographic Implementations.
- [USS 2023] ICSPatch: Automated Vulnerability Localization and Non-Intrusive Hotpatching in Industrial Control Systems using Data Dependence Graphs.
- [USS 2023] RIDAS: Real-time identification of attack sources on controller area networks.
- [USS 2023] That Person Moves Like A Car: Misclassification Attack Detection for Autonomous Systems Using Spatiotemporal Consistency.
- [USS 2023] Isolated and Exhausted: Attacking Operating Systems via Site Isolation in the Browser.
- [USS 2023] Extending a Hand to Attackers: Browser Privilege Escalation Attacks via Extensions.
- [USS 2023] GlitchHiker: Uncovering Vulnerabilities of Image Signal Transmission with IEMI.
- [USS 2023] Inception: Exposing New Attack Surfaces with Training in Transient Execution.
- [USS 2023] Differential Testing of Cross Deep Learning Framework APIs: Revealing Inconsistencies and Vulnerabilities.
- [USS 2023] Attacks are Forwarded: Breaking the Isolation of MicroVM-based Containers Through Operation Forwarding.
- [USS 2024] AttackGNN: Red-Teaming GNNs in Hardware Security Using Reinforcement Learning.
- [USS 2024] INSIGHT: Attacking Industry-Adopted Learning Resilient Logic Locking Techniques Using Explainable Graph Neural Network.
- [USS 2024] Defending Against Data Reconstruction Attacks in Federated Learning: An Information Theory Approach.
- [USS 2024] InSpectre Gadget: Inspecting the Residual Attack Surface of Cross-privilege Spectre v2.
- [USS 2024] BeeBox: Hardening BPF against Transient Execution Attacks.
- [USS 2024] Vulnerability-oriented Testing for RESTful APIs.
- [USS 2024] Exploring ChatGPT’s Capabilities on Vulnerability Management.
- [USS 2024] Can I Hear Your Face? Pervasive Attack on Voice Authentication Systems with a Single Face Image.
- [USS 2024] DMAAUTH: A Lightweight Pointer Integrity-based Secure Architecture to Defeat DMA Attacks.
- [USS 2024] FakeBehalf: Imperceptible Email Spoofing Attacks against the Delegation Mechanism in Email Systems.
- [USS 2024] Forget and Rewire: Enhancing the Resilience of Transformer-based Models against Bit-Flip Attacks.
- [USS 2024] Practical Data-Only Attack Generation.
- [USS 2024] True Attacks, Attack Attempts, or Benign Triggers? An Empirical Measurement of Network Alerts in a Security Operations Center.
- [USS 2024] ZenHammer: Rowhammer Attacks on AMD Zen-based Platforms.
- [USS 2024] WEBRR: A Forensic System for Replaying and Investigating Web-Based Attacks in The Modern Web.
- [USS 2024] Cost-effective Attack Forensics by Recording and Correlating File System Changes.
- [USS 2024] VulSim: Leveraging Similarity of Multi-Dimensional Neighbor Embeddings for Vulnerability Detection.
- [USS 2024] An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities against Strong Detection.
- [USS 2024] Formalizing and Benchmarking Prompt Injection Attacks and Defenses.
- [USS 2024] Instruction Backdoor Attacks Against Customized LLMs.
- [USS 2024] FIRE: Combining Multi-Stage Filtering with Taint Analysis for Scalable Recurring Vulnerability Detection.
- [USS 2024] Invalidate+Compare: A Timer-Free GPU Cache Attack Primitive.
- [USS 2024] Indirector: High-Precision Branch Target Injection Attacks Exploiting the Indirect Branch Predictor.
- [USS 2024] Prefetch for Fun and Profit: A Revisit of Prefetch Attacks on Apple M1.
- [USS 2024] A Flushing Attack on the DNS Cache.
- [USS 2024] A Linear Reconstruction Approach for Attribute Inference Attacks against Synthetic Data.
- [USS 2024] MIST: Defending Against Membership Inference Attacks Through Membership-Invariant Subspace Training.
- [USS 2024] Inf2Guard: An Information-Theoretic Framework for Learning Privacy-Preserving Representations against Inference Attacks.
- [USS 2024] SymBisect: Accurate Bisection for Fuzzer-Exposed Vulnerabilities.
- [USS 2024] Query Recovery from Easy to Hard: Jigsaw Attack against SSE.
- [USS 2024] Can Virtual Reality Protect Users from Keystroke Inference Attacks?
- [USS 2024] Remote Keylogging Attacks in Multi-user VR Applications.
- [USS 2024] That Doesn’t Go There: Attacks on Shared State in Multi-User Augmented Reality Applications.
- [USS 2024] On the Difficulty of Defending Contrastive Learning against Backdoor Attacks.
- [USS 2024] Mudjacking: Patching Backdoor Vulnerabilities in Foundation Models.
- [USS 2024] More Simplicity for Trainers, More Opportunity for Attackers: Black-Box Attacks on Speaker Recognition Systems by Inferring Feature Extractor.
- [USS 2024] Transferability of White-box Perturbations: Query-Efficient Adversarial Attacks against Commercial DNN Services.
- [USS 2024] A Formal Analysis of SCTP: Attack Synthesis and Patch Verification.
- [USS 2024] Shaken, not Stirred - Automated Discovery of Subtle Attacks on Protocols using Mix-Nets.
- [USS 2024] What Was Your Prompt? A Remote Keylogging Attack on AI Assistants.
- [USS 2024] ChainPatrol: Balancing Attack Detection and Classification with Performance Overhead for Service Function Chains Using Virtual Trailers.
- [USS 2024] Mempool Privacy via Batched Threshold Encryption: Attacks and Defenses.
- [USS 2024] Speculative Denial-of-Service Attacks In Ethereum.
- [USS 2024] All Your Tokens are Belong to Us: Demystifying Address Verification Vulnerabilities in Solidity Smart Contracts.
- [USS 2024] Correction-based Defense Against Adversarial Video Attacks via Discretization-Enhanced Video Compressive Sensing.
- [USS 2024] Machine Learning needs Better Randomness Standards: Randomised Smoothing and PRNG-based attacks.
- [USS 2024] SoK: What don’t we know? Understanding Security Vulnerabilities in SNARKs.
- [USS 2024] SecurityNet: Assessing Machine Learning Vulnerabilities on Public Models.
- [USS 2024] LaserAdv: Laser Adversarial Attacks on Speech Recognition Systems.
- [USS 2024] MicGuard: A Comprehensive Detection System against Out-of-band Injection Attacks for Different Level Microphone-based Devices.
- [USS 2024] SLUBStick: Arbitrary Memory Writes through Practical Software Cross-Cache Attacks within the Linux Kernel.
- [USS 2024] Lurking in the shadows: Unveiling Stealthy Backdoor Attacks against Personalized Federated Learning.
- [USS 2024] ACE: A Model Poisoning Attack on Contribution Evaluation Methods in Federated Learning.
- [USS 2024] UBA-Inf: Unlearning Activated Backdoor Attack with Influence-Driven Camouflage.
- [USS 2024] Racing on the Negative Force: Efficient Vulnerability Root-Cause Analysis through Reinforcement Learning on Counterexamples.
- [USS 2024] Uncovering the Limits of Machine Learning for Automatic Vulnerability Detection.
- [USS 2024] Exploiting Leakage in Password Managers via Injection Attacks.
- [USS 2024] The Imitation Game: Exploring Brand Impersonation Attacks on Social Media Platforms.
- [USS 2024] Finding Traceability Attacks in the Bluetooth Low Energy Specification and Its Implementations.
- [USS 2024] ResolverFuzz: Automated Discovery of DNS Resolver Vulnerabilities with Query-Response Fuzzing.
- [USS 2024] Atropos: Effective Fuzzing of Web Applications for Server-Side Vulnerabilities.
- [USS 2024] TAPFixer: Automatic Detection and Repair of Home Automation Vulnerabilities based on Negated-property Reasoning.
- [USS 2024] Enhancing Network Attack Detection with Distributed and In-Network Data Collection System.
- [USS 2024] Unveiling the Secrets without Data: Can Graph Neural Networks Be Exploited through Data-Free Model Extraction Attacks?
- [USS 2024] ModelGuard: Information-Theoretic Defense Against Model Extraction Attacks.
- [USS 2024] WhisperFuzz: White-Box Fuzzing for Detecting and Locating Timing Vulnerabilities in Processors.
- [USS 2024] Your Firmware Has Arrived: A Study of Firmware Update Vulnerabilities.
- [USS 2024] CDN Cannon: Exploiting CDN Back-to-Origin Strategies for Amplification Attacks.
- [USS 2024] You Can Obfuscate, but You Cannot Hide: CrossPoint Attacks against Network Topology Obfuscation.
- [USS 2024] CAMP: Compositional Amplification Attacks against DNS.
- [USS 2024] Prompt Stealing Attacks Against Text-to-Image Generation Models.
- [USS 2024] Wireless Signal Injection Attacks on VSAT Satellite Modems.
- [USS 2024] RECORD: A RECeption-Only Region Determination Attack on LEO Satellite Users.
- [USS 2024] On a Collision Course: Unveiling Wireless Attacks to the Aircraft Traffic Collision Avoidance System (TCAS).
- [USS 2024] A First Physical-World Trajectory Prediction Attack via LiDAR-induced Deceptions in Autonomous Driving.
- [USS 2024] On Data Fabrication in Collaborative Vehicular Perception: Attacks and Countermeasures.
- [USS 2024] Adversary is on the Road: Attacks on Visual SLAM using Unnoticeable Adversarial Patch.
- [USS 2024] SAIN: Improving ICS Attack Detection Sensitivity via State-Aware Invariants.
- [USS 2024] Divide and Surrender: Exploiting Variable Division Instruction Timing in HQC Key Recovery Attacks.
- [USS 2024] How Does a Deep Learning Model Architecture Impact Its Privacy? A Comprehensive Study of Privacy Attacks on CNNs and Transformers.
- [USS 2024] FaceObfuscator: Defending Deep Learning-based Privacy Attacks with Gradient Descent-resistant Features in Face Recognition.
- [USS 2024] Hijacking Attacks against Neural Network by Analyzing Training Data.
- [USS 2024] Operation Mango: Scalable Discovery of Taint-Style Vulnerabilities in Binary Firmware Services.
- [USS 2024] pi-Jack: Physical-World Adversarial Attack on Monocular Depth Estimation with Perspective Hijacking.
- [USS 2024] EaTVul: ChatGPT-based Evasion Attack Against Software Vulnerability Detection.
- [USS 2024] FVD-DPM: Fine-grained Vulnerability Detection via Conditional Diffusion Probabilistic Models.
- [USS 2024] A Wolf in Sheep’s Clothing: Practical Black-box Adversarial Attacks for Evading Learning-based Windows Malware Detection in the Wild.
- [USS 2024] Leakage-Abuse Attacks Against Structured Encryption for SQL.
- [USS 2024] Key Recovery Attacks on Approximate Homomorphic Encryption with Non-Worst-Case Noise Flooding Countermeasures.
- [USS 2024] Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation.
- [NDSS 2010] Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs.
- [NDSS 2010] Stealth DoS Attacks on Secure Channels.
- [NDSS 2010] Protecting Browsers from Extension Vulnerabilities.
- [NDSS 2010] FLAX: Systematic Discovery of Client-side Validation Vulnerabilities in Rich Web Applications.
- [NDSS 2010] When Good Randomness Goes Bad: Virtual Machine Reset Vulnerabilities and Hedging Deployed Cryptography.
- [NDSS 2011] Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars.
- [NDSS 2011] Losing Control of the Internet: Using the Data Plane to Attack the Control Plane.
- [NDSS 2011] No Loitering: Exploiting Lingering Vulnerabilities in Default COM Objects.
- [NDSS 2011] Automated Discovery of Parameter Pollution Vulnerabilities in Web Applications.
- [NDSS 2012] Plaintext-Recovery Attacks Against Datagram TLS.
- [NDSS 2012] Persistent OSPF Attacks.
- [NDSS 2012] You Can Run, but You Can’t Hide: Exposing Network Location for Targeted DoS Attacks in Cellular Networks.
- [NDSS 2012] Distance Hijacking Attacks on Distance Bounding Protocols.
- [NDSS 2012] Access Pattern disclosure on Searchable Encryption: Ramification, Attack and Mitigation.
- [NDSS 2012] On Limitations of Designing Leakage-Resilient Password Systems: Attacks, Principals and Usability.
- [NDSS 2012] MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones.
- [NDSS 2012] Towards Taming Privilege-Escalation Attacks on Android.
- [NDSS 2012] Insights into User Behavior in Dealing with Internet Attacks.
- [NDSS 2012] Gatling: Automatic Attack Discovery in Large-Scale Distributed Systems.
- [NDSS 2012] Static detection of C++ vtable escape vulnerabilities in binary code.
- [NDSS 2013] A Practical, Targeted, and Stealthy Attack Against WPA Enterprise Authentication.
- [NDSS 2013] High Accuracy Attack Provenance via Binary-based Execution Partition.
- [NDSS 2013] Attack Surface Metrics and Automated Compile-Time OS Kernel Tailoring.
- [NDSS 2013] When Firmware Modifications Attack: A Case Study of Embedded Exploitation.
- [NDSS 2013] The Postman Always Rings Twice: Attacking and Defending postMessage in HTML5 Websites.
- [NDSS 2013] Practical Timing Side Channel Attacks Against Kernel Space ASLR.
- [NDSS 2013] One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography.
- [NDSS 2013] Does Counting Still Count? Revisiting the Security of Counting based User Authentication Protocols against Statistical Attacks.
- [NDSS 2013] Behind the Scenes of Online Attacks: an Analysis of Exploitation Behaviors on the Web.
- [NDSS 2014] ROPecker: A Generic and Practical Approach For Defending Against ROP Attacks.
- [NDSS 2014] SafeDispatch: Securing C++ Virtual Calls from Memory Corruption Attacks.
- [NDSS 2014] Detecting Logic Vulnerabilities in E-commerce Applications.
- [NDSS 2014] The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network.
- [NDSS 2014] Power Attack: An Increasing Threat to Data Centers.
- [NDSS 2014] SMV-Hunter: Large Scale, Automated Detection of SSL/TLS Man-in-the-Middle Vulnerabilities in Android Apps.
- [NDSS 2014] AppSealer: Automatic Generation of Vulnerability-Specific Patches for Preventing Component Hijacking Attacks in Android Applications.
- [NDSS 2014] Practical Known-Plaintext Attacks against Physical Layer Security in Wireless MIMO Systems.
- [NDSS 2015] FreeSentry: protecting against use-after-free vulnerabilities due to dangling pointers.
- [NDSS 2015] StackArmor: Comprehensive Protection From Stack-based Memory Error Vulnerabilities for Binaries.
- [NDSS 2015] Thwarting Cache Side-Channel Attacks Through Dynamic Software Diversity.
- [NDSS 2015] Preventing Lunchtime Attacks: Fighting Insider Threats With Eye Movement Biometrics.
- [NDSS 2015] SPHINX: Detecting Security Attacks in Software-Defined Networks.
- [NDSS 2015] Poisoning Network Visibility in Software-Defined Networks: New Attacks and Countermeasures.
- [NDSS 2015] Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware.
- [NDSS 2016] Transcript Collision Attacks: Breaking Authentication in TLS, IKE and SSH.
- [NDSS 2016] Attacking the Network Time Protocol.
- [NDSS 2016] SPIFFY: Inducing Cost-Detectability Tradeoffs for Persistent Link-Flooding Attacks.
- [NDSS 2016] CrossFire: An Analysis of Firefox Extension-Reuse Vulnerabilities.
- [NDSS 2016] Attack Patterns for Black-Box Security Testing of Multi-Party Web Applications.
- [NDSS 2016] Are these Ads Safe: Detecting Hidden Attacks through the Mobile App-Web Interfaces.
- [NDSS 2016] Forwarding-Loop Attacks in Content Delivery Networks.
- [NDSS 2016] A Simple Generic Attack on Text Captchas.
- [NDSS 2016] Tracking Mobile Web Users Through Motion Sensors: Attacks and Defenses.
- [NDSS 2016] Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems.
- [NDSS 2016] Life after App Uninstallation: Are the Data Still Alive? Data Residue Attacks on Android.
- [NDSS 2016] Automatic Forgery of Cryptographically Consistent Messages to Identify Security Vulnerabilities in Mobile Services.
- [NDSS 2016] Pitfalls in Designing Zero-Effort Deauthentication: Opportunistic Human Observation Attacks.
- [NDSS 2017] Enabling Reconstruction of Attacks on Users via Efficient Browsing Snapshots.
- [NDSS 2017] Fake Co-visitation Injection Attacks to Recommender Systems.
- [NDSS 2017] Broken Hearted: How To Attack ECG Biometrics.
- [NDSS 2017] Measuring small subgroup attacks against Diffie-Hellman.
- [NDSS 2017] Safelnit: Comprehensive and Practical Mitigation of Uninitialized Read Vulnerabilities.
- [NDSS 2017] PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables.
- [NDSS 2017] T-SGX: Eradicating Controlled-Channel Attacks Against Enclave Programs.
- [NDSS 2017] Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit.
- [NDSS 2017] Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones.
- [NDSS 2017] ASLR on the Line: Practical Cache Attacks on the MMU.
- [NDSS 2017] Unleashing Use-Before-Initialization Vulnerabilities in the Linux Kernel Using Targeted Stack Spraying.
- [NDSS 2018] Didn’t You Hear Me? - Towards More Successful Web Vulnerability Notifications.
- [NDSS 2018] Exposing Congestion Attack on Emerging Connected Vehicle based Traffic Signal Control.
- [NDSS 2018] Automated Attack Discovery in TCP Congestion Control Using a Model-guided Approach.
- [NDSS 2018] VulDeePecker: A Deep Learning-Based System for Vulnerability Detection.
- [NDSS 2018] Trojaning Attack on Neural Networks.
- [NDSS 2018] KeyDrown: Eliminating Software-Based Keystroke Timing Side-Channel Attacks.
- [NDSS 2018] Reduced Cooling Redundancy: A New Security Vulnerability in a Hot Data Center.
- [NDSS 2018] SYNODE: Understanding and Automatically Preventing Injection Attacks on NODE.JS.
- [NDSS 2018] JavaScript Zero: Real JavaScript and Zero Side-Channel Attacks.
- [NDSS 2018] MCI : Modeling-based Causality Inference in Audit Logging for Attack Investigation.
- [NDSS 2018] JSgraph: Enabling Reconstruction of Web Attacks via Efficient Tracking of Live In-Browser JavaScript Executions.
- [NDSS 2018] Smoke Screener or Straight Shooter: Detecting Elite Sybil Attacks in User-Review Social Networks.
- [NDSS 2019] JavaScript Template Attacks: Automatically Inferring Host Information for Targeted Exploits.
- [NDSS 2019] Latex Gloves: Protecting Browser Extensions from Probing and Revelation Attacks.
- [NDSS 2019] SABRE: Protecting Bitcoin against Routing Attacks.
- [NDSS 2019] ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models.
- [NDSS 2019] Mind Your Own Business: A Longitudinal Study of Threats and Vulnerabilities in Enterprises.
- [NDSS 2019] Thunderclap: Exploring Vulnerabilities in Operating System IOMMU Protection via DMA from Untrustworthy Peripherals.
- [NDSS 2019] CodeAlchemist: Semantics-Aware Code Generation to Find Vulnerabilities in JavaScript Engines.
- [NDSS 2019] Oligo-Snoop: A Non-Invasive Side Channel Attack Against DNA Synthesis Machines.
- [NDSS 2019] Unveiling your keystrokes: A Cache-based Side-channel Attack on Graphics Libraries.
- [NDSS 2019] Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information.
- [NDSS 2019] Distinguishing Attacks from Legitimate Authentication Traffic at Scale.
- [NDSS 2019] UWB with Pulse Reordering: Securing Ranging against Relay and Physical-Layer Attacks.
- [NDSS 2019] Nearby Threats: Reversing, Analyzing, and Attacking Google’s ‘Nearby Connections’ on Android.
- [NDSS 2019] Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems.
- [NDSS 2019] Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding.
- [NDSS 2019] Sereum: Protecting Existing Smart Contracts Against Re-Entrancy Attacks.
- [NDSS 2020] Overcoming the “Evil Twins” Attack: Lessons Learned from the Industrial Battlefield.
- [NDSS 2020] Cross-Origin State Inference (COSI) Attacks: Leaking Web Site States through XS-Leaks.
- [NDSS 2020] HotFuzz: Discovering Algorithmic Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing.
- [NDSS 2020] SurfingAttack: Interactive Hidden Attack on Voice Assistants Using Ultrasonic Guided Waves.
- [NDSS 2020] The Attack of the Clones Against Proof-of-Authority.
- [NDSS 2020] Broken Metre: Attacking Resource Metering in EVM.
- [NDSS 2020] Automated Discovery of Cross-Plane Event-Based Vulnerabilities in Software-Defined Networking.
- [NDSS 2020] Poseidon: Mitigating Volumetric DDoS Attacks with Programmable Switches.
- [NDSS 2020] Revisiting Leakage Abuse Attacks.
- [NDSS 2020] IMP4GT: IMPersonation Attacks in 4G NeTworks.
- [NDSS 2020] Practical Traffic Analysis Attacks on Secure Messaging Applications.
- [NDSS 2020] OmegaLog: High-Fidelity Attack Investigation via Transparent Multi-layer Log Analysis.
- [NDSS 2020] UIScope: Accurate, Instrumentation-free, and Visible Attack Investigation for GUI Applications.
- [NDSS 2020] A View from the Cockpit: Exploring Pilot Reactions to Attacks on Avionic Systems.
- [NDSS 2020] Genotype Extraction and False Relative Attacks: Security Risks to Third-Party Genetic Genealogy Services Beyond Identity Inference.
- [NDSS 2020] SPEECHMINER: A Framework for Investigating and Measuring Speculative Execution Vulnerabilities.
- [NDSS 2020] DESENSITIZATION: Privacy-Aware and Attack-Preserving Crash Report.
- [NDSS 2021] Trust the Crowd: Wireless Witnessing to Detect Attacks on ADS-B-Based Air-Traffic Surveillance.
- [NDSS 2021] Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages.
- [NDSS 2021] Shadow Attacks: Hiding and Replacing Content in Signed PDFs.
- [NDSS 2021] More than a Fair Share: Network Data Remanence Attacks against Secret Sharing-based Schemes.
- [NDSS 2021] Zoom on the Keystrokes: Exploiting Video Calls for Keystroke Inference Attacks.
- [NDSS 2021] SerialDetector: Principled and Practical Exploration of Object Injection Vulnerabilities for the Web.
- [NDSS 2021] On the Insecurity of SMS One-Time Password Messages against Local Attackers in Modern Mobile Devices.
- [NDSS 2021] Preventing and Detecting State Inference Attacks on Android.
- [NDSS 2021] SquirRL: Automating Attack Analysis on Blockchain Incentive Mechanisms with Deep Reinforcement Learning.
- [NDSS 2021] Screen Gleaning: A Screen Reading TEMPEST Attack on Mobile Devices Exploiting an Electromagnetic Side Channel.
- [NDSS 2021] EarArray: Defending against DolphinAttack via Acoustic Attenuation.
- [NDSS 2021] Practical Blind Membership Inference Attack via Differential Comparisons.
- [NDSS 2021] FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data.
- [NDSS 2021] Manipulating the Byzantine: Optimizing Model Poisoning Attacks and Defenses for Federated Learning.
- [NDSS 2021] Data Poisoning Attacks to Deep Learning Based Recommender Systems.
- [NDSS 2021] ALchemist: Fusing Application and Audit Logs for Precise Attack Provenance without Instrumentation.
- [NDSS 2022] PMTUD is not Panacea: Revisiting IP Fragmentation Attacks against TCP.
- [NDSS 2022] PHYjacking: Physical Input Hijacking for Zero-Permission Authorization Attacks on Android.
- [NDSS 2022] GhostTalk: Interactive Attack on Smartphone Voice System Through Power Line.
- [NDSS 2022] Evaluating Susceptibility of VPN Implementations to DoS Attacks Using Adversarial Testing.
- [NDSS 2022] Forensic Analysis of Configuration-based Attacks.
- [NDSS 2022] FANDEMIC: Firmware Attack Construction and Deployment on Power Management Integrated Circuit and Impacts on IoT Applications.
- [NDSS 2022] DeepSight: Mitigating Backdoor Attacks in Federated Learning Through Deep Model Inspection.
- [NDSS 2022] Probe the Proto: Measuring Client-Side Prototype Pollution Vulnerabilities of One Million Real-world Websites.
- [NDSS 2022] Chosen-Instruction Attack Against Commercial Code Virtualization Obfuscators.
- [NDSS 2022] Too Afraid to Drive: Systematic Discovery of Semantic DoS Vulnerability in Autonomous Driving Planning under Physical-World Attacks.
- [NDSS 2022] Hiding My Real Self! Protecting Intellectual Property in Additive Manufacturing Systems Against Optical Side-Channel Attacks.
- [NDSS 2022] SpiralSpy: Exploring a Stealthy and Practical Covert Channel to Attack Air-gapped Computing Devices via mmWave Sensing.
- [NDSS 2022] FakeGuard: Exploring Haptic Response to Mitigate the Vulnerability in Commercial Fingerprint Anti-Spoofing.
- [NDSS 2022] Remote Memory-Deduplication Attacks.
- [NDSS 2022] Repttack: Exploiting Cloud Schedulers to Guide Co-Location Attacks.
- [NDSS 2022] ATTEQ-NN: Attention-based QoE-aware Evasive Backdoor Attacks.
- [NDSS 2022] RamBoAttack: A Robust and Query Efficient Deep Neural Network Decision Exploit.
- [NDSS 2022] Property Inference Attacks Against GANs.
- [NDSS 2022] Get a Model! Model Hijacking Attack Against Machine Learning Models.
- [NDSS 2022] Multi-Certificate Attacks against Proof-of-Elapsed-Time and Their Countermeasures.
- [NDSS 2022] Cross-Language Attacks.
- [NDSS 2023] Assessing the Impact of Interface Vulnerabilities in Compartmentalized Software.
- [NDSS 2023] VulHawk: Cross-architecture Vulnerability Detection with Entropy-based Binary Code Search.
- [NDSS 2023] Backdoor Attacks Against Dataset Distillation.
- [NDSS 2023] Focusing on Pinocchio’s Nose: A Gradients Scrutinizer to Thwart Split-Learning Hijacking Attacks Using Intrinsic Attributes.
- [NDSS 2023] PPA: Preference Profiling Attack Against Federated Learning.
- [NDSS 2023] RoVISQ: Reduction of Video Service Quality via Adversarial Attacks on Deep Learning-based Video Compression.
- [NDSS 2023] Thwarting Smartphone SMS Attacks at the Radio Interface Layer.
- [NDSS 2023] FUZZILLI: Fuzzing for JavaScript JIT Compiler Vulnerabilities.
- [NDSS 2023] Securing Federated Sensitive Topic Classification against Poisoning Attacks.
- [NDSS 2023] Smarter Contracts: Detecting Vulnerabilities in Smart Contracts with Deep Transfer Learning.
- [NDSS 2023] Do Not Give a Dog Bread Every Time He Wags His Tail: Stealing Passwords through Content Queries (CONQUER) Attacks.
- [NDSS 2023] Copy-on-Flip: Hardening ECC Memory Against Rowhammer Attacks.
- [NDSS 2023] Extrapolating Formal Analysis to Uncover Attacks in Bluetooth Passkey Entry Pairing.
- [NDSS 2023] Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks on Automatic Speech Recognition Systems.
- [NDSS 2023] BlockScope: Detecting and Investigating Propagated Vulnerabilities in Forked Blockchain Projects.
- [NDSS 2023] Breaking and Fixing Virtual Channels: Domino Attack and Donner.
- [NDSS 2023] Un-Rocking Drones: Foundations of Acoustic Injection Attacks and Recovery Thereof.
- [NDSS 2023] Evasion Attacks and Defenses on Smart Home Physical Event Verification.
- [NDSS 2023] BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense.
- [NDSS 2023] MetaWave: Attacking mmWave Sensing with Meta-material-enhanced Tags.
- [NDSS 2023] Sometimes, You Aren’t What You Do: Mimicry Attacks against Provenance Graph Host Intrusion Detection Systems.
- [NDSS 2024] BreakSPF: How Shared Infrastructures Magnify SPF Vulnerabilities Across the Internet.
- [NDSS 2024] Compensating Removed Frequency Components: Thwarting Voice Spectrum Reduction Attacks.
- [NDSS 2024] Enhance Stealthiness and Transferability of Adversarial Attacks with Class Activation Mapping Ensemble Attack.
- [NDSS 2024] File Hijacking Vulnerability: The Elephant in the Room.
- [NDSS 2024] Front-running Attack in Sharded Blockchains and Fair Cross-shard Consensus.
- [NDSS 2024] LiDAR Spoofing Meets the New-Gen: Capability Improvements, Broken Assumptions, and New Attack Strategies.
- [NDSS 2024] NODLINK: An Online System for Fine-Grained APT Attack Detection and Investigation.
- [NDSS 2024] Overconfidence is a Dangerous Thing: Mitigating Membership Inference Attacks by Enforcing Less Confident Prediction.
- [NDSS 2024] Transpose Attack: Stealing Datasets with Bidirectional Training.
- [NDSS 2024] 5G-Spector: An O-RAN Compliant Layer-3 Cellular Attack Detection Service.
- [NDSS 2024] A Duty to Forget, a Right to be Assured? Exposing Vulnerabilities in Machine Unlearning Services.
- [NDSS 2024] A Security and Usability Analysis of Local Attacks Against FIDO2.
- [NDSS 2024] Automatic Adversarial Adaption for Stealthy Poisoning Attacks in Federated Learning.
- [NDSS 2024] Beyond the Surface: Uncovering the Unprotected Components of Android Against Overlay Attack.
- [NDSS 2024] BGP-iSec: Improved Security of Internet Routing Against Post-ROV Attacks.
- [NDSS 2024] Detecting Voice Cloning Attacks via Timbre Watermarking.
- [NDSS 2024] Eavesdropping on Controller Acoustic Emanation for Keystroke Inference Attack in Virtual Reality.
- [NDSS 2024] EnclaveFuzz: Finding Vulnerabilities in SGX Applications.
- [NDSS 2024] Faster and Better: Detecting Vulnerabilities in Linux-based IoT Firmware with Optimized Reaching Definition Analysis.
- [NDSS 2024] Faults in Our Bus: Novel Bus Fault Attack to Break ARM TrustZone.
- [NDSS 2024] Flow Correlation Attacks on Tor Onion Service Sessions with Sliding Subset Sum.
- [NDSS 2024] FreqFed: A Frequency Analysis-Based Approach for Mitigating Poisoning Attacks in Federated Learning.
- [NDSS 2024] Gradient Shaping: Enhancing Backdoor Attack Against Reverse Engineering.
- [NDSS 2024] LoRDMA: A New Low-Rate DoS Attack in RDMA Networks.
- [NDSS 2024] MadRadar: A Black-Box Physical Layer Attack Framework on mmWave Automotive FMCW Radars.
- [NDSS 2024] MirageFlow: A New Bandwidth Inflation Attack on Tor.
- [NDSS 2024] Not your Type! Detecting Storage Collision Vulnerabilities in Ethereum Smart Contracts.
- [NDSS 2024] Parrot-Trained Adversarial Examples: Pushing the Practicality of Black-Box Audio Attacks against Speaker Recognition Models.
- [NDSS 2024] Phoenix: Surviving Unpatched Vulnerabilities via Accurate and Efficient Filtering of Syscall Sequences.
- [NDSS 2024] PrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction Sound.
- [NDSS 2024] QUACK: Hindering Deserialization Attacks via Static Duck Typing.
- [NDSS 2024] ReqsMiner: Automated Discovery of CDN Forwarding Request Inconsistencies and DoS Attacks with Grammar-based Fuzzing.
- [NDSS 2024] SLMIA-SR: Speaker-Level Membership Inference Attacks against Speaker Recognition Systems.
- [NDSS 2024] Sneaky Spikes: Uncovering Stealthy Backdoor Attacks in Spiking Neural Networks with Neuromorphic Data.
- [NDSS 2024] TextGuard: Provable Defense against Backdoor Attacks on Text Classification.
- [NDSS 2024] The CURE to Vulnerabilities in RPKI Validation.
- [NDSS 2024] VETEOS: Statically Vetting EOSIO Contracts for the “Groundhog Day” Vulnerabilities.
- [NDSS 2025] A Method to Facilitate Membership Inference Attacks in Deep Learning Models.
- [NDSS 2025] AlphaDog: No-Box Camouflage Attacks via Alpha Channel Oversight.
- [NDSS 2025] Be Careful of What You Embed: Demystifying OLE Vulnerabilities.
- [NDSS 2025] Black-box Membership Inference Attacks against Fine-tuned Diffusion Models.
- [NDSS 2025] Compiled Models, Built-In Exploits: Uncovering Pervasive Bit-Flip Attack Surfaces in DNN Executables.
- [NDSS 2025] Cross-Origin Web Attacks via HTTP/2 Server Push and Signed HTTP Exchange.
- [NDSS 2025] LeakLess: Selective Data Protection against Memory Leakage Attacks for Serverless Platforms.
- [NDSS 2025] Magmaw: Modality-Agnostic Adversarial Attacks on Machine Learning-Based Wireless Communication Systems.
- [NDSS 2025] Mens Sana In Corpore Sano: Sound Firmware Corpora for Vulnerability Research.
- [NDSS 2025] Off-Path TCP Hijacking in Wi-Fi Networks: A Packet-Size Side Channel Attack.
- [NDSS 2025] On the Realism of LiDAR Spoofing Attacks against Autonomous Driving Vehicle at High Speed and Long Distance.
- [NDSS 2025] Passive Inference Attacks on Split Learning via Adversarial Regularization.
- [NDSS 2025] PhantomLiDAR: Cross-modality Signal Injection Attacks against LiDAR.
- [NDSS 2025] ReDAN: An Empirical Study on Remote DoS Attacks against NAT Networks.
- [NDSS 2025] Revisiting Physical-World Adversarial Attack on Traffic Sign Recognition: A Commercial Systems Perspective.
- [NDSS 2025] Understanding Data Importance in Machine Learning Attacks: Does Valuable Data Pose Greater Harm?
- [NDSS 2025] Wallbleed: A Memory Disclosure Vulnerability in the Great Firewall of China.
- [NDSS 2025] All your (data)base are belong to us: Characterizing Database Ransom(ware) Attacks.
- [NDSS 2025] BitShield: Defending Against Bit-Flip Attacks on DNN Executables.
- [NDSS 2025] CounterSEVeillance: Performance-Counter Attacks on AMD SEV-SNP.
- [NDSS 2025] Deanonymizing Device Identities via Side-channel Attacks in Exclusive-use IoTs & Mitigation.
- [NDSS 2025] Defending Against Membership Inference Attacks on Iteratively Pruned Deep Neural Networks.
- [NDSS 2025] DShield: Defending against Backdoor Attacks on Graph Neural Networks via Discrepancy Learning.
- [NDSS 2025] Eclipse Attacks on Monero’s Peer-to-Peer Network.
- [NDSS 2025] Enhancing Security in Third-Party Library Reuse - Comprehensive Detection of 1-day Vulnerability through Code Patch Analysis.
- [NDSS 2025] From Large to Mammoth: A Comparative Evaluation of Large Language Models in Vulnerability Detection.
- [NDSS 2025] HADES Attack: Understanding and Evaluating Manipulation Risks of Email Blocklists.
- [NDSS 2025] KernelSnitch: Side Channel-Attacks on Kernel Data Structures.
- [NDSS 2025] LADDER: Multi-Objective Backdoor Attack via Evolutionary Algorithm.
- [NDSS 2025] NodeMedic-FINE: Automatic Detection and Exploit Synthesis for Node.js Vulnerabilities.
- [NDSS 2025] On the Robustness of LDP Protocols for Numerical Attributes under Data Poisoning Attacks.
- [NDSS 2025] Oreo: Protecting ASLR Against Microarchitectural Attacks.
- [NDSS 2025] Power-Related Side-Channel Attacks using the Android Sensor Framework.
- [NDSS 2025] RAIFLE: Reconstruction Attacks on Interaction-based Federated Learning with Adversarial Data Manipulation.
- [NDSS 2025] SafeSplit: A Novel Defense Against Client-Side Backdoor Attacks in Split Learning.
- [NDSS 2025] Scale-MIA: A Scalable Model Inversion Attack against Secure Federated Learning via Latent Space Reconstruction.
- [NDSS 2025] Sheep’s Clothing, Wolf’s Data: Detecting Server-Induced Client Vulnerabilities in Windows Remote IPC.
- [NDSS 2025] Statically Discover Cross-Entry Use-After-Free Vulnerabilities in the Linux Kernel.
- [NDSS 2025] URVFL: Undetectable Data Reconstruction Attack on Vertical Federated Learning.
- [NDSS 2025] Vulnerability, Where Art Thou? An Investigation of Vulnerability Management in Android Smartphone Chipsets.
- [ACSAC 2010] Cujo: efficient detection and prevention of drive-by-download attacks.
- [ACSAC 2010] Familiarity breeds contempt: the honeymoon effect and the role of legacy code in zero-day vulnerabilities.
- [ACSAC 2010] Heap Taichi: exploiting memory allocation granularity in heap-spraying attacks.
- [ACSAC 2011] Distilling critical attack graph surface iteratively through minimum-cost SAT solving.
- [ACSAC 2011] Security through amnesia: a software-based solution to the cold boot attack on disk encryption.
- [ACSAC 2011] Improving robustness of DNS to software vulnerabilities.
- [ACSAC 2011] BLOCK: a black-box approach for detection of state violation attacks towards web applications.
- [ACSAC 2011] An empirical study of visual security cues to prevent the SSLstripping attack.
- [ACSAC 2011] Attacks on WebView in the Android system.
- [ACSAC 2011] Mitigating code-reuse attacks with control-flow locking.
- [ACSAC 2011] Nexat: a history-based approach to predict attacker actions.
- [ACSAC 2012] TRESOR-HUNT: attacking CPU-bound encryption.
- [ACSAC 2012] Augmenting vulnerability analysis of binary code.
- [ACSAC 2012] Code shredding: byte-granular randomization of program layout for detecting code-reuse attacks.
- [ACSAC 2012] Generalized vulnerability extrapolation using abstract syntax trees.
- [ACSAC 2013] CPS: an efficiency-motivated attack against autonomous vehicular transportation.
- [ACSAC 2013] No attack necessary: the surprising dynamics of SSL trust relationships.
- [ACSAC 2014] CPS: market analysis of attacks against demand response in the smart grid.
- [ACSAC 2014] CPS: driving cyber-physical systems to unsafe operating conditions by timing DoS attacks on sensor signals.
- [ACSAC 2014] Advanced Wi-Fi attacks using commodity hardware.
- [ACSAC 2014] Using automatic speech recognition for attacking acoustic CAPTCHAs: the trade-off between usability and security.
- [ACSAC 2014] It’s the psychology stupid: how heuristics explain software vulnerabilities and how priming can illuminate developer’s blind spots.
- [ACSAC 2014] OSPF vulnerability to persistent poisoning attacks: a systematic analysis.
- [ACSAC 2014] DNS authentication as a service: preventing amplification attacks.
- [ACSAC 2014] JShield: towards real-time and vulnerability-based detection of polluted drive-by download attacks.
- [ACSAC 2015] Emerging Image Game CAPTCHAs for Resisting Automated and Human-Solver Relay Attacks.
- [ACSAC 2015] Vulnerability Assessment of OAuth Implementations in Android Applications.
- [ACSAC 2015] Control Flow and Code Integrity for COTS binaries: An Effective Defense Against Real-World ROP Attacks.
- [ACSAC 2015] Cross-Site Framing Attacks.
- [ACSAC 2015] AuDroid: Preventing Attacks on Audio Channels in Mobile Devices.
- [ACSAC 2015] DynaGuard: Armoring Canary-based Protections against Brute-force Attacks.
- [ACSAC 2015] Towards Analyzing the Input Validation Vulnerabilities associated with Android System Services.
- [ACSAC 2016] Code obfuscation against symbolic execution attacks.
- [ACSAC 2016] VulPecker: an automated vulnerability detection system based on code similarity analysis.
- [ACSAC 2016] Gametrics: towards attack-resilient behavioral authentication with simple cognitive games.
- [ACSAC 2016] Understanding and defending the binder attack surface in Android.
- [ACSAC 2016] Reliably determining data leakage in the presence of strong attackers.
- [ACSAC 2016] Auror: defending against poisoning attacks in collaborative deep learning systems.
- [ACSAC 2016] HERCULE: attack story reconstruction via community discovery on correlated log graph.
- [ACSAC 2017] QUASAR: Quantitative Attack Space Analysis and Reasoning.
- [ACSAC 2017] Protecting COTS Binaries from Disclosure-guided Code Reuse Attacks.
- [ACSAC 2017] Mitigating Evasion Attacks to Deep Neural Networks via Region-based Classification.
- [ACSAC 2017] Grid Shock: Coordinated Load-Changing Attacks on Power Grids: The Non-Smart Power Grid is Vulnerable to Cyber Attacks as Well.
- [ACSAC 2017] Orpheus: Enforcing Cyber-Physical Execution Semantics to Defend Against Data-Oriented Attacks.
- [ACSAC 2017] SecureDroid: Enhancing Security of Machine Learning-based Detection against Adversarial Android Malware Attacks.
- [ACSAC 2017] Picky Attackers: Quantifying the Role of System Properties on Intruder Behavior.
- [ACSAC 2017] Co-processor-based Behavior Monitoring: Application to the Detection of Attacks Against the System Management Mode.
- [ACSAC 2018] StateDroid: Stateful Detection of Stealthy Attacks in Android Apps via Horn-Clause Verification.
- [ACSAC 2018] SENSS Against Volumetric DDoS Attacks.
- [ACSAC 2018] Wi Not Calling: Practical Privacy and Availability Attacks in Wi-Fi Calling.
- [ACSAC 2018] A Multi-tab Website Fingerprinting Attack.
- [ACSAC 2018] Poisoning Attacks to Graph-Based Recommender Systems.
- [ACSAC 2018] I Know What You See: Power Side-Channel Attack on Convolutional Neural Network Accelerators.
- [ACSAC 2018] A Measurement Study on Linux Container Security: Attacks and Countermeasures.
- [ACSAC 2018] Do Social Disorders Facilitate Social Engineering?: A Case Study of Autism and Phishing Attacks.
- [ACSAC 2018] A Heuristic Framework to Detect Concurrency Vulnerabilities.
- [ACSAC 2018] Noise Matters: Using Sensor and Process Noise Fingerprint to Detect Stealthy Cyber Attacks and Authenticate sensors in CPS.
- [ACSAC 2019] Defeating hidden audio channel attacks on voice assistants via audio-induced surface vibrations.
- [ACSAC 2019] STRIP: a defence against trojan attacks on deep neural networks.
- [ACSAC 2019] Model inversion attacks against collaborative inference.
- [ACSAC 2019] Whisper: a unilateral defense against VoIP traffic re-identification attacks.
- [ACSAC 2019] SRFuzzer: an automatic fuzzing framework for physical SOHO router devices to discover multi-type vulnerabilities.
- [ACSAC 2019] HDMI-walk: attacking HDMI distribution networks via consumer electronic control protocol.
- [ACSAC 2019] Out of control: stealthy attacks against robotic vehicles protected by control-based techniques.
- [ACSAC 2019] Speculator: a tool to analyze speculative execution attacks and mitigations.
- [ACSAC 2020] SAIBERSOC: Synthetic Attack Injection to Benchmark and Evaluate the Performance of Security Operation Centers.
- [ACSAC 2020] CDL: Classified Distributed Learning for Detecting Security Attacks in Containerized Applications.
- [ACSAC 2020] Faulty Point Unit: ABI Poisoning Attacks on Intel SGX.
- [ACSAC 2020] HeapExpo: Pinpointing Promoted Pointers to Prevent Use-After-Free Vulnerabilities.
- [ACSAC 2020] Constrained Concealment Attacks against Reconstruction-based Anomaly Detectors in Industrial Control Systems.
- [ACSAC 2020] Query-Efficient Black-Box Attack Against Sequence-Based Malware Classifiers.
- [ACSAC 2020] FPSelect: Low-Cost Browser Fingerprints for Mitigating Dictionary Attacks against Web Authentication Mechanisms.
- [ACSAC 2020] Voicefox: Leveraging Inbuilt Transcription to Enhance the Security of Machine-Human Speaker Verification against Voice Synthesis Attacks.
- [ACSAC 2020] Februus: Input Purification Defense Against Trojan Attacks on Deep Neural Network Systems.
- [ACSAC 2020] Attacking Graph-Based Classification without Changing Existing Connections.
- [ACSAC 2021] Stealing Machine Learning Models: Attacks and Countermeasures for Generative Adversarial Networks.
- [ACSAC 2021] The Many-faced God: Attacking Face Verification System with Embedding and Image Recovery.
- [ACSAC 2021] BAPM: Block Attention Profiling Model for Multi-tab Website Fingerprinting Attacks on Tor.
- [ACSAC 2021] OPay: an Orientation-based Contactless Payment Solution Against Passive Attacks.
- [ACSAC 2021] They See Me Rollin’: Inherent Vulnerability of the Rolling Shutter in CMOS Image Sensors.
- [ACSAC 2021] Evaluating the Effectiveness of Protection Jamming Devices in Mitigating Smart Speaker Eavesdropping Attacks Using Gaussian White Noise.
- [ACSAC 2021] BadNL: Backdoor Attacks against NLP Models with Semantic-preserving Improvements.
- [ACSAC 2021] TLB Poisoning Attacks on AMD Secure Encrypted Virtualization.
- [ACSAC 2021] CommanderGabble: A Universal Attack Against ASR Systems Leveraging Fast Speech.
- [ACSAC 2021] On Key Reinstallation Attacks over 4G LTE Control-Plane: Feasibility and Negative Impact.
- [ACSAC 2021] Don’t hand it Over: Vulnerabilities in the Handover Procedure of Cellular Telecommunications.
- [ACSAC 2021] Time to Rethink the Design of Qi Standard? Security and Privacy Vulnerability Analysis of Qi Wireless Charging.
- [ACSAC 2021] Detecting and Characterizing SMS Spearphishing Attacks.
- [ACSAC 2021] Characterizing Improper Input Validation Vulnerabilities of Mobile Crowdsourcing Services.
- [ACSAC 2022] DRAGON: Deep Reinforcement Learning for Autonomous Grid Operation and Attack Detection.
- [ACSAC 2022] Local Power Grids at Risk - An Experimental and Simulation-based Analysis of Attacks on Vehicle-To-Grid Communication.
- [ACSAC 2022] Play the Imitation Game: Model Extraction Attack against Autonomous Driving Localization.
- [ACSAC 2022] SpacePhish: The Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning.
- [ACSAC 2022] Make Data Reliable: An Explanation-powered Cleaning on Malware Dataset Against Backdoor Poisoning Attacks.
- [ACSAC 2022] Reconstruction Attack on Differential Private Trajectory Protection Mechanisms.
- [ACSAC 2022] Closing the Loophole: Rethinking Reconstruction Attacks in Federated Learning from a Privacy Standpoint.
- [ACSAC 2022] Assessing Model-free Anomaly Detection in Industrial Control Systems Against Generic Concealment Attacks.
- [ACSAC 2022] BayesImposter: Bayesian Estimation Based.bss Imposter Attack on Industrial Control Systems.
- [ACSAC 2022] Transformer-Based Language Models for Software Vulnerability Detection.
- [ACSAC 2022] Compact Abstract Graphs for Detecting Code Vulnerability with GNN Models.
- [ACSAC 2022] NeuGuard: Lightweight Neuron-Guided Defense against Membership Inference Attacks.
- [ACSAC 2022] More is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural Networks.
- [ACSAC 2022] DF-SCA: Dynamic Frequency Side Channel Attacks are Practical.
- [ACSAC 2022] MoLE: Mitigation of Side-channel Attacks against SGX via Dynamic Data Location Escape.
- [ACSAC 2023] Artemis: Defanging Software Supply Chain Attacks in Multi-repository Update Systems.
- [ACSAC 2023] DefWeb: Defending User Privacy against Cache-based Website Fingerprinting Attacks with Intelligent Noise Injection.
- [ACSAC 2023] Protecting Your Voice from Speech Synthesis Attacks.
- [ACSAC 2023] Link Membership Inference Attacks against Unsupervised Graph Representation Learning.
- [ACSAC 2023] On the Detection of Image-Scaling Attacks in Machine Learning.
- [ACSAC 2023] A First Look at Toxicity Injection Attacks on Open-domain Chatbots.
- [ACSAC 2023] FLEDGE: Ledger-based Federated Learning Resilient to Inference and Backdoor Attacks.
- [ACSAC 2023] Attack of the Knights: Non Uniform Cache Side Channel Attack.
- [ACSAC 2023] PAVUDI: Patch-based Vulnerability Discovery using Machine Learning.
- [ACSAC 2023] No Forking Way: Detecting Cloning Attacks on Intel SGX Applications.
- [ACSAC 2023] Mitigating Membership Inference Attacks via Weighted Smoothing.
- [ACSAC 2024] Not All Tokens Are Equal: Membership Inference Attacks Against Fine-tuned Language Models.
- [ACSAC 2024] ConProv: A Container-Aware Provenance System for Attack Investigation.
- [ACSAC 2024] Web-Armour: Mitigating Reconnaissance and Vulnerability Scanning with Scan-Impeding Delays in Web Deployments.
- [ACSAC 2024] Assault and Battery: Evaluating the Security of Power Conversion Systems Against Electromagnetic Injection Attacks.
- [ACSAC 2024] BioSaFe: Bioprinting Security Framework for Detecting Sabotage Attacks on Printability and Cell Viability.
- [ACSAC 2024] Securing PUFs via a Predictive Adversarial Machine Learning System by Modeling of Attackers.
- [ACSAC 2024] No Leakage Without State Change: Repurposing Configurable CPU Exceptions to Prevent Microarchitectural Attacks.
- [ACSAC 2024] Faking deduplication to prevent timing side-channel attacks on memory deduplication.
- [ACSAC 2024] Reading It like an Open Book: Single-trace Blind Side-channel Attacks on Garbled Circuit Frameworks.
- [ACSAC 2024] Breaking the Privacy Barrier: On the Feasibility of Reorganization Attacks on Ethereum Private Transactions.
- [ACSAC 2024] R+R: Revisiting Graph Matching Attacks on Privacy-Preserving Record Linkage.
- [ACSAC 2024] Link Inference Attacks in Vertical Federated Graph Learning.
- [ACSAC 2024] Adversarially Guided Stateful Defense Against Backdoor Attacks in Federated Deep Learning.
- [ACSAC 2024] On the Credibility of Backdoor Attacks Against Object Detectors in the Physical World.
- [ACSAC 2024] Physical ID-Transfer Attacks against Multi-Object Tracking via Adversarial Trajectory.
- [ACSAC 2024] Model-Manipulation Attacks Against Black-Box Explanations.
- [ACSAC 2024] Moiré Injection Attack (MIA) : Compromising Autonomous Vehicle Safety via Exploiting Camera’s Color Filter Array (CFA) to Inject Hidden Traffic Sign.
- [ACSAC 2024] Leveraging Intensity as a New Feature to Detect Physical Adversarial Attacks Against LiDARs.
- [ACSAC 2024] VIMU: Effective Physics-based Realtime Detection and Recovery against Stealthy Attacks on UAVs.
- [ACSAC 2024] R+R: Security Vulnerability Dataset Quality Is Critical.
- [ACSAC 2024] BinHunter: A Fine-Grained Graph Representation for Localizing Vulnerabilities in Binary Executables*.
- [ASIACRYPT 2010] Rotational Rebound Attacks on Reduced Skein.
- [ASIACRYPT 2010] Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2.
- [ASIACRYPT 2010] Collision Attacks against the Knudsen-Preneel Compression Functions.
- [ASIACRYPT 2010] Improved Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions.
- [ASIACRYPT 2010] A Byte-Based Guess and Determine Attack on SOSEMANUK.
- [ASIACRYPT 2010] Improved Single-Key Attacks on 8-Round AES-192 and AES-256.
- [ASIACRYPT 2011] Rebound Attack on JH42.
- [ASIACRYPT 2011] An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware.
- [ASIACRYPT 2011] Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol.
- [ASIACRYPT 2011] Cryptography Secure against Related-Key Attacks and Tampering.
- [ASIACRYPT 2012] Analysis of Differential Attacks in ARX Constructions.
- [ASIACRYPT 2012] Differential Attacks against Stream Cipher ZUC.
- [ASIACRYPT 2012] Bicliques for Permutations: Collision and Preimage Attacks in Stronger Settings.
- [ASIACRYPT 2012] Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks.
- [ASIACRYPT 2012] Generic Related-Key Attacks for HMAC.
- [ASIACRYPT 2012] Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary Note.
- [ASIACRYPT 2013] Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2.
- [ASIACRYPT 2013] Leaked-State-Forgery Attack against the Authenticated Encryption Algorithm ALE.
- [ASIACRYPT 2013] Generic Key Recovery Attack on Feistel Scheme.
- [ASIACRYPT 2013] Behind the Scene of Side Channel Attacks.
- [ASIACRYPT 2013] New Generic Attacks against Hash-Based MACs.
- [ASIACRYPT 2013] On Diamond Structures and Trojan Message Attacks.
- [ASIACRYPT 2014] Homomorphic Authenticated Encryption Secure against Chosen-Ciphertext Attack.
- [ASIACRYPT 2015] Key-Recovery Attacks on ASASA.
- [ASIACRYPT 2015] On the Impact of Known-Key Attacks on Hash Functions.
- [ASIACRYPT 2015] Counting Keys in Parallel After a Side Channel Attack.
- [ASIACRYPT 2015] A Unified Metric for Quantifying Information Leakage of Cryptographic Devices Under Power Analysis Attacks.
- [ASIACRYPT 2015] Collision Attacks Against CAESAR Candidates - Forgery and Key-Recovery Against AEZ and Marble.
- [ASIACRYPT 2015] Optimized Interpolation Attacks on LowMC.
- [ASIACRYPT 2015] Another Tradeoff Attack on Sprout-Like Stream Ciphers.
- [ASIACRYPT 2015] Reverse-Engineering of the Cryptanalytic Attack Used in the Flame Super-Malware.
- [ASIACRYPT 2015] How to Sequentialize Independent Parallel Attacks? - Biased Distributions Have a Phase Transition.
- [ASIACRYPT 2016] Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential Attacks.
- [ASIACRYPT 2016] Universal Forgery and Key Recovery Attacks on ELmD Authenticated Encryption Algorithm.
- [ASIACRYPT 2016] Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes.
- [ASIACRYPT 2016] Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations.
- [ASIACRYPT 2016] Unknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRF.
- [ASIACRYPT 2016] A Key Recovery Attack on MDPC with CCA Security Using Decoding Errors.
- [ASIACRYPT 2016] Nonlinear Invariant Attack - Practical Attack on Full SCREAM, iSCREAM, and Midori64.
- [ASIACRYPT 2016] Cliptography: Clipping the Power of Kleptographic Attacks.
- [ASIACRYPT 2017] Improved Conditional Cube Attacks on Keccak Keyed Modes with MILP Method.
- [ASIACRYPT 2017] New Key Recovery Attacks on Minimal Two-Round Even-Mansour Ciphers.
- [ASIACRYPT 2017] Grover Meets Simon - Quantumly Attacking the FX-construction.
- [ASIACRYPT 2017] Preventing CLT Attacks on Obfuscation with Linear Overhead.
- [ASIACRYPT 2018] Practical Attacks Against the Walnut Digital Signature Scheme.
- [ASIACRYPT 2018] Two Attacks on Rank Metric Code-Based Schemes: RankSign and an IBE Scheme.
- [ASIACRYPT 2018] An Efficient Structural Attack on NIST Submission DAGS.
- [ASIACRYPT 2018] LWE Without Modular Reduction and Improved Side-Channel Attacks Against BLISS.
- [ASIACRYPT 2018] Programming the Demirci-Selçuk Meet-in-the-Middle Attack with Constraints.
- [ASIACRYPT 2018] New MILP Modeling: Improved Conditional Cube Attacks on Keccak-Based Constructions.
- [ASIACRYPT 2018] Identity-Based Encryption Tightly Secure Under Chosen-Ciphertext Attacks.
- [ASIACRYPT 2018] Statistical Ineffective Fault Attacks on Masked AES with Fault Countermeasures.
- [ASIACRYPT 2018] Attacks and Countermeasures for White-box Designs.
- [ASIACRYPT 2018] Security of the Blockchain Against Long Delay Attack.
- [ASIACRYPT 2019] A Novel CCA Attack Using Decryption Errors Against LAC.
- [ASIACRYPT 2019] Quantum Attacks Without Superposition Queries: The Offline Simon’s Algorithm.
- [ASIACRYPT 2019] A Critical Analysis of ISO 17825 (‘Testing Methods for the Mitigation of Non-invasive Attack Classes Against Cryptographic Modules’).
- [ASIACRYPT 2019] The Exchange Attack: How to Distinguish Six Rounds of AES with 2^88.2 Chosen Plaintexts.
- [ASIACRYPT 2020] A New Decryption Failure Attack Against HQC.
- [ASIACRYPT 2020] An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independent Sums.
- [ASIACRYPT 2020] An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC.
- [ASIACRYPT 2020] Improvements of Algebraic Attacks for Solving the Rank Decoding and MinRank Problems.
- [ASIACRYPT 2020] Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key Encryption.
- [ASIACRYPT 2020] Quantum Collision Attacks on AES-Like Hashing with Low Quantum Random Access Memories.
- [ASIACRYPT 2020] CCA Updatable Encryption Against Malicious Re-encryption Attacks.
- [ASIACRYPT 2021] Partial Key Exposure Attack on Short Secret Exponent CRT-RSA.
- [ASIACRYPT 2021] A Formula for Disaster: A Unified Approach to Elliptic Curve Special-Point-Based Attacks.
- [ASIACRYPT 2021] A Practical Key-Recovery Attack on 805-Round Trivium.
- [ASIACRYPT 2021] Algebraic Attacks on Rasta and Dasta Using Low-Degree Equations.
- [ASIACRYPT 2021] Automatic Classical and Quantum Rebound Attacks on AES-Like Hashing by Exploiting Related-Key Differentials.
- [ASIACRYPT 2021] New Attacks on LowMC Instances with a Single Plaintext/Ciphertext Pair.
- [ASIACRYPT 2021] Quantum Linearization Attacks.
- [ASIACRYPT 2021] Fault-Injection Attacks Against NIST’s Post-Quantum Cryptography Round 3 KEM Candidates.
- [ASIACRYPT 2021] Divided We Stand, United We Fall: Security Analysis of Some SCA+SIFA Countermeasures Against SCA-Enhanced Fault Template Attacks.
- [ASIACRYPT 2021] DEFAULT: Cipher Level Resistance Against Differential Fault Attack.
- [ASIACRYPT 2021] Faster Dual Lattice Attacks for Solving LWE with Applications to CRYSTALS.
- [ASIACRYPT 2021] A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs.
- [ASIACRYPT 2021] Séta: Supersingular Encryption from Torsion Attacks.
- [ASIACRYPT 2022] Algebraic Meet-in-the-Middle Attack on LowMC.
- [ASIACRYPT 2022] Optimizing Rectangle Attacks: A Unified and Generic Framework for Key Recovery.
- [ASIACRYPT 2022] Revisiting Related-Key Boomerang Attacks on AES Using Computer-Aided Tool.
- [ASIACRYPT 2022] Exploring SAT for Cryptanalysis: (Quantum) Collision Attacks Against 6-Round SHA-3.
- [ASIACRYPT 2022] Optimising Linear Key Recovery Attacks with Affine Walsh Transform Pruning.
- [ASIACRYPT 2022] A Third is All You Need: Extended Partial Key Exposure Attack on CRT-RSA with Additive Exponent Blinding.
- [ASIACRYPT 2022] Stretching Cube Attacks: Improved Methods to Recover Massive Superpolies.
- [ASIACRYPT 2023] Quantum Attacks on Hash Constructions with Low Quantum Random Access Memory.
- [ASIACRYPT 2023] Forgery Attacks on Several Beyond-Birthday-Bound Secure MACs.
- [ASIACRYPT 2023] Correlation Cube Attack Revisited - Improved Cube Search and Superpoly Recovery Techniques.
- [ASIACRYPT 2023] Algebraic Attacks on Round-Reduced Rain and Full AIM-III.
- [ASIACRYPT 2023] Automated Meet-in-the-Middle Attack Goes to Feistel.
- [ASIACRYPT 2023] Revisiting Higher-Order Differential-Linear Attacks from an Algebraic Perspective.
- [ASIACRYPT 2023] A New Approach Based on Quadratic Forms to Attack the McEliece Cryptosystem.
- [ASIACRYPT 2023] Memory-Efficient Attacks on Small LWE Keys.
- [ASIACRYPT 2023] SCA-LDPC: A Code-Based Framework for Key-Recovery Side-Channel Attacks on Post-quantum Encryption Schemes.
- [ASIACRYPT 2023] Post-quantum Security of Key Encapsulation Mechanism Against CCA Attacks with a Single Decapsulation Query.
- [ASIACRYPT 2024] Extending Class Group Action Attacks via Sesquilinear Pairings.
- [ESORICS 2010] IntPatch: Automatically Fix Integer-Overflow-to-Buffer-Overflow Vulnerability at Compile-Time.
- [ESORICS 2010] k-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks.
-
| [ESORICS 2010] D(e |
i)aling with VoIP: Robust Prevention of DIAL Attacks. |
- [ESORICS 2011] WiFiHop - Mitigating the Evil Twin Attack through Multi-hop Detection.
- [ESORICS 2011] Automatic and Precise Client-Side Protection against CSRF Attacks.
- [ESORICS 2011] Remote Timing Attacks Are Still Practical.
- [ESORICS 2011] Scalable Analysis of Attack Scenarios.
- [ESORICS 2012] Attack of the Clones: Detecting Cloned Applications on Android Markets.
- [ESORICS 2012] A Probabilistic Framework for Localization of Attackers in MANETs.
- [ESORICS 2012] Trust No One Else: Detecting MITM Attacks against SSL/TLS without Third-Parties.
- [ESORICS 2012] A Practical Man-In-The-Middle Attack on Signal-Based Key Generation Protocols.
- [ESORICS 2012] TorScan: Tracing Long-Lived Connections and Differential Scanning Attacks.
- [ESORICS 2012] Bleichenbacher’s Attack Strikes again: Breaking PKCS#1 v1.5 in XML Encryption.
- [ESORICS 2013] HI-CFG: Construction by Binary Analysis and Application to Attack Polymorphism.
- [ESORICS 2013] Formal Approach for Route Agility against Persistent Attackers.
- [ESORICS 2013] Patrol: Revealing Zero-Day Attack Paths through Network-Wide System Object Dependencies.
- [ESORICS 2013] Range Extension Attacks on Contactless Smart Cards.
- [ESORICS 2013] CellFlood: Attacking Tor Onion Routers on the Cheap.
- [ESORICS 2013] Eliminating Cache-Based Timing Attacks with Instruction-Based Scheduling.
- [ESORICS 2013] KQguard: Binary-Centric Defense against Kernel Queue Injection Attacks.
- [ESORICS 2014] SRID: State Relation Based Intrusion Detection for False Data Injection Attacks in SCADA.
- [ESORICS 2014] Feature-Distributed Malware Attack: Risk and Defence.
- [ESORICS 2014] Modeling Network Diversity for Evaluating the Robustness of Networks against Zero-Day Attacks.
- [ESORICS 2015] Practical Memory Deduplication Attacks in Sandboxed Javascript.
- [ESORICS 2015] Practical Invalid Curve Attacks on TLS-ECDH.
- [ESORICS 2015] Mind-Reading: Privacy Attacks Exploiting Cross-App KeyEvent Injections.
- [ESORICS 2015] Identifying Arbitrary Memory Access Vulnerabilities in Privilege-Separated Software.
- [ESORICS 2015] Towards Attack-Resistant Peer-Assisted Indoor Localization.
- [ESORICS 2015] Enhancing Java Runtime Environment for Smart Cards Against Runtime Attacks.
- [ESORICS 2015] Web-to-Application Injection Attacks on Android: Characterization and Detection.
- [ESORICS 2015] On the Fly Design and Co-simulation of Responses Against Simultaneous Attacks.
- [ESORICS 2016] Towards Efficient Evaluation of a Time-Driven Cache Attack on Modern Processors.
- [ESORICS 2016] On Attacker Models and Profiles for Cyber-Physical Systems.
- [ESORICS 2016] The Beauty or The Beast? Attacking Rate Limits of the Xen Hypervisor.
- [ESORICS 2016] Autocomplete Injection Attack.
- [ESORICS 2016] Breaking into the KeyStore: A Practical Forgery Attack Against Android KeyStore.
- [ESORICS 2017] Is My Attack Tree Correct?
- [ESORICS 2017] Analyzing the Capabilities of the CAN Attacker.
- [ESORICS 2017] Preventing DNS Amplification Attacks Using the History of DNS Queries with SDN.
- [ESORICS 2017] Practical Keystroke Timing Attacks in Sandboxed JavaScript.
- [ESORICS 2017] VuRLE: Automatic Vulnerability Detection and Repair by Learning from Examples.
- [ESORICS 2018] Navigating the Samsung TrustZone and Cache-Attacks on the Keymaster Trustlet.
- [ESORICS 2018] Combination of Hardware and Software: An Efficient AES Implementation Resistant to Side-Channel Attacks on All Programmable SoC.
- [ESORICS 2018] Phishing Attacks Modifications and Evolutions.
- [ESORICS 2018] Automated Identification of Desynchronisation Attacks on Shared Secrets.
- [ESORICS 2018] DigesTor: Comparing Passive Traffic Analysis Attacks on Tor.
- [ESORICS 2018] Hide Your Hackable Smart Home from Remote Attacks: The Multipath Onion IoT Gateways.
- [ESORICS 2018] PIAnalyzer: A Precise Approach for PendingIntent Vulnerability Analysis.
- [ESORICS 2018] Order-Revealing Encryption: File-Injection Attack and Forward Security.
- [ESORICS 2018] Formal Analysis of Vote Privacy Using Computationally Complete Symbolic Attacker.
- [ESORICS 2018] Location Proximity Attacks Against Mobile Targets: Analytical Bounds and Attacker Strategies.
- [ESORICS 2018] Stealthy Probing-Based Verification (SPV): An Active Approach to Defending Software Defined Networks Against Topology Poisoning Attacks.
- [ESORICS 2019] BDPL: A Boundary Differentially Private Layer Against Machine Learning Model Extraction Attacks.
- [ESORICS 2019] A Taxonomy of Attacks Using BGP Blackholing.
- [ESORICS 2019] Automated Formal Analysis of Side-Channel Attacks on Probabilistic Systems.
- [ESORICS 2019] Attacking Speaker Recognition Systems with Phoneme Morphing.
- [ESORICS 2019] Practical Bayesian Poisoning Attacks on Challenge-Based Collaborative Intrusion Detection Networks.
- [ESORICS 2019] A Framework for Evaluating Security in the Presence of Signal Injection Attacks.
- [ESORICS 2019] Identifying Privilege Separation Vulnerabilities in IoT Firmware with Symbolic Execution.
- [ESORICS 2019] Incentives for Harvesting Attack in Proof of Work Mining Pools.
- [ESORICS 2019] A Complete and Optimized Key Mismatch Attack on NIST Candidate NewHope.
- [ESORICS 2019] Mime Artist: Bypassing Whitelisting for the Web with JavaScript Mimicry Attacks.
- [ESORICS 2020] CANSentry: Securing CAN-Based Cyber-Physical Systems against Denial and Spoofing Attacks.
- [ESORICS 2020] Restructured Cloning Vulnerability Detection Based on Function Semantic Reserving and Reiteration Screening.
- [ESORICS 2020] Data Poisoning Attacks Against Federated Learning Systems.
- [ESORICS 2020] Linear Attack on Round-Reduced DES Using Deep Learning.
- [ESORICS 2020] Detection by Attack: Detecting Adversarial Samples by Undercover Attack.
- [ESORICS 2020] Big Enough to Care Not Enough to Scare! Crawling to Attack Recommender Systems.
- [ESORICS 2020] Active Re-identification Attacks on Periodically Released Dynamic Social Graphs.
- [ESORICS 2020] Plenty of Phish in the Sea: Analyzing Potential Pre-attack Surfaces.
- [ESORICS 2020] Certifying Decision Trees Against Evasion Attacks by Program Analysis.
- [ESORICS 2020] How to Model the Bribery Attack: A Practical Quantification Method in Blockchain.
- [ESORICS 2021] Caught in the Web: DoS Vulnerabilities in Parsers for Structured Data.
- [ESORICS 2021] Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains.
- [ESORICS 2021] CONTRA: Defending Against Poisoning Attacks in Federated Learning.
- [ESORICS 2021] Romoa: Robust Model Aggregation for the Resistance of Federated Learning to Model Poisoning Attacks.
- [ESORICS 2021] DA3G: Detecting Adversarial Attacks by Analysing Gradients.
- [ESORICS 2021] Common Component in Black-Boxes Is Prone to Attacks.
- [ESORICS 2021] Genetic Algorithm Assisted State-Recovery Attack on Round-Reduced Xoodyak.
- [ESORICS 2022] An Efficient Query Recovery Attack Against a Graph Encryption Scheme.
- [ESORICS 2022] A Formal Model for Credential Hopping Attacks.
- [ESORICS 2022] Kallima: A Clean-Label Framework for Textual Backdoor Attacks.
- [ESORICS 2022] Two Types of Novel DoS Attacks Against CDNs Based on HTTP/2 Flow Control Mechanism.
- [ESORICS 2022] EVExchange: A Relay Attack on Electric Vehicle Charging System.
- [ESORICS 2022] Cyber Network Resilience Against Self-Propagating Malware Attacks.
- [ESORICS 2022] GAME: Generative-Based Adaptive Model Extraction Attack.
- [ESORICS 2022] AttacKG: Constructing Technique Knowledge Graph from Cyber Threat Intelligence Reports.
- [ESORICS 2022] We Can Hear Your PIN Drop: An Acoustic Side-Channel Attack on ATM PIN Pads.
- [ESORICS 2022] VAL: Volume and Access Pattern Leakage-Abuse Attack with Leaked Documents.
- [ESORICS 2022] Light the Signal: Optimization of Signal Leakage Attacks Against LWE-Based Key Exchange.
- [ESORICS 2022] DEKS: A Secure Cloud-Based Searchable Service Can Make Attackers Pay.
- [ESORICS 2022] An Infection-Identifying and Self-Evolving System for IoT Early Defense from Multi-Step Attacks.
- [ESORICS 2022] IoTEnsemble: Detection of Botnet Attacks on Internet of Things.
- [ESORICS 2022] Hide and Seek: On the Stealthiness of Attacks Against Deep Learning Systems.
- [ESORICS 2022] Precise Extraction of Deep Learning Models via Side-Channel Attacks on Edge/Endpoint Devices.
- [ESORICS 2022] Real-Time Adversarial Perturbations Against Deep Reinforcement Learning Policies: Attacks and Defenses.
- [ESORICS 2022] From Click to Sink: Utilizing AIS for Command and Control in Maritime Cyber Attacks.
- [ESORICS 2022] Reach Me if You Can: On Native Vulnerability Reachability in Android Apps.
- [ESORICS 2022] The Devil Is in the GAN: Backdoor Attacks and Defenses in Deep Generative Models.
- [ESORICS 2023] Peering into the Darkness: The Use of UTRS in Combating DDoS Attacks.
- [ESORICS 2023] Curveball+: Exploring Curveball-Like Vulnerabilities of Implicit Certificate Validation.
- [ESORICS 2023] Indirect Meltdown: Building Novel Side-Channel Attacks from Transient-Execution Attacks.
- [ESORICS 2023] Tamarin-Based Analysis of Bluetooth Uncovers Two Practical Pairing Confusion Attacks.
- [ESORICS 2023] MARF: A Memory-Aware CLFLUSH-Based Intra- and Inter-CPU Side-Channel Attack.
- [ESORICS 2023] You Reset I Attack! A Master Password Guessing Attack Against Honey Password Vaults.
- [ESORICS 2023] Attacking Logo-Based Phishing Website Detectors with Adversarial Perturbations.
- [ESORICS 2023] The Grant Negotiation and Authorization Protocol: Attacking, Fixing, and Verifying an Emerging Standard.
- [ESORICS 2023] Everlasting ROBOT: The Marvin Attack.
- [ESORICS 2023] JWTKey: Automatic Cryptographic Vulnerability Detection in JWT Applications.
- [ESORICS 2023] Bijack: Breaking Bitcoin Network with TCP Vulnerabilities.
- [ESORICS 2023] n-MVTL Attack: Optimal Transaction Reordering Attack on DeFi.
- [ESORICS 2023] Reinforcement Learning Approach to Generate Zero-Dynamics Attacks on Control Systems Without State Space Models.
- [ESORICS 2023] Secure Split Learning Against Property Inference, Data Reconstruction, and Feature Space Hijacking Attacks.
- [ESORICS 2023] An Empirical Study of the Imbalance Issue in Software Vulnerability Detection.
- [ESORICS 2024] PointAPA: Towards Availability Poisoning Attacks in 3D Point Clouds.
- [ESORICS 2024] Optimal Machine-Learning Attacks on Hybrid PUFs.
- [ESORICS 2024] Outside the Comfort Zone: Analysing LLM Capabilities in Software Vulnerability Detection.
- [ESORICS 2024] GAN-GRID: A Novel Generative Attack on Smart Grid Stability Prediction.
- [ESORICS 2024] PRETT2: Discovering HTTP/2 DoS Vulnerabilities via Protocol Reverse Engineering.
- [ESORICS 2024] ProxyKiller: An Anonymous Proxy Traffic Attack Model Based on Traffic Behavior Graphs.
- [ESORICS 2024] Predicting Code Vulnerability Types via Heterogeneous GNN Learning.
- [ESORICS 2024] BloomFuzz: Unveiling Bluetooth L2CAP Vulnerabilities via State Cluster Fuzzing with Target-Oriented State Machines.
- [ESORICS 2024] SerdeSniffer: Enhancing Java Deserialization Vulnerability Detection with Function Summaries.
- [ESORICS 2024] Interp-flow Hijacking: Launching Non-control Data Attack via Hijacking eBPF Interpretation Flow.
- [ESORICS 2024] Key Recovery Attack on CRYSTALS-Kyber and Saber KEMs in Key Reuse Scenario.
- [ESORICS 2024] In Search of Partitioning Oracle Attacks Against TLS Session Tickets.
- [ESORICS 2024] File-Injection Attacks on Searchable Encryption, Based on Binomial Structures.
- [ESORICS 2024] ReminISCence: Trusted Monitoring Against Privileged Preemption Side-Channel Attacks.
- [ESORICS 2024] Leveraging Hierarchies: HMCAT for Efficiently Mapping CTI to Attack Techniques.
- [ESORICS 2024] Similar Data is Powerful: Enhancing Inference Attacks on SSE with Volume Leakages.
- [ESORICS 2024] Breaking Through the Diversity: Encrypted Video Identification Attack Based on QUIC Features.
- [ESORICS 2024] Wherever I May Roam: Stealthy Interception and Injection Attacks Through Roaming Agreements.
- [ESORICS 2024] It is Time To Steer: A Scalable Framework for Analysis-Driven Attack Graph Generation.
- [ESORICS 2024] Resilience to Chain-Quality Attacks in Fair Separability.
- [ESORICS 2024] Leveraging Transformer Architecture for Effective Trajectory-User Linking (TUL) Attack and Its Mitigation.
- [ESORICS 2024] Revoke: Mitigating Ransomware Attacks Against Ethereum Validators.
- [ESORICS 2024] “Ask and Thou Shall Receive”: Reaction-Based Full Key Recovery Attacks on FHE.
- [SIGSOFT 2015] Questions developers ask while diagnosing potential security vulnerabilities with static analysis.
- [SIGSOFT 2015] DexterJS: robust testing platform for DOM-based XSS vulnerabilities.
- [SIGSOFT 2015] Automated attack surface approximation.
- [SIGSOFT 2016] Making invisible things visible: tracking down known vulnerabilities at 3000 companies (showcase).
- [SIGSOFT 2017] LaChouTi: kernel vulnerability responding framework for the fragmented Android devices.
- [SIGSOFT 2017] JoanAudit: a tool for auditing common injection vulnerabilities.
- [SIGSOFT 2018] Towards data-driven vulnerability prediction for requirements.
- [SIGSOFT 2018] VulSeeker-pro: enhanced semantic learning based binary vulnerability seeker with emulation.
- [SIGSOFT 2019] Cerebro: context-aware adaptive fuzzing for effective vulnerability detection.
- [SIGSOFT 2019] The importance of accounting for real-world labelling when predicting software vulnerabilities.
- [SIGSOFT 2019] Detecting concurrency memory corruption vulnerabilities.
- [SIGSOFT 2019] Locating vulnerabilities in binaries via memory layout recovering.
- [SIGSOFT 2019] JCOMIX: a search-based tool to detect XML injection vulnerabilities in web applications.
- [SIGSOFT 2019] EVMFuzzer: detect EVM vulnerabilities via fuzz testing.
- [SIGSOFT 2019] DISCOVER: detecting algorithmic complexity vulnerabilities.
- [SIGSOFT 2019] Machine-learning supported vulnerability detection in source code.
- [SIGSOFT 2020] Fuzzing: on the exponential cost of vulnerability discovery.
- [SIGSOFT 2020] DeepSearch: a simple and effective blackbox attack for deep neural networks.
- [SIGSOFT 2020] All your app links are belong to us: understanding the threats of instant apps based attacks.
- [SIGSOFT 2021] Detecting Node.js prototype pollution vulnerabilities via object lookup analysis.
- [SIGSOFT 2021] Detecting concurrency vulnerabilities based on partial orders of memory and thread events.
- [SIGSOFT 2021] Vulnerability detection with fine-grained interpretations.
- [SIGSOFT 2021] ACHyb: a hybrid analysis approach to detect kernel access control vulnerabilities.
- [SIGSOFT 2021] CrossVul: a cross-language vulnerability dataset with commit data.
- [SIGSOFT 2021] Mitigating security attacks in kubernetes manifests for security best practices violation.
- [SIGSOFT 2022] An empirical study of blockchain system vulnerabilities: modules, types, and patterns.
- [SIGSOFT 2022] On the vulnerability proneness of multilingual code.
- [SIGSOFT 2022] Tracking patches for open source software vulnerabilities.
- [SIGSOFT 2022] VulRepair: a T5-based automated software vulnerability repair.
- [SIGSOFT 2022] Generating realistic vulnerabilities via neural code editing: an empirical study.
- [SIGSOFT 2022] You see what I want you to see: poisoning vulnerabilities in neural code search.
- [SIGSOFT 2022] VulCurator: a vulnerability-fixing commit detector.
- [SIGSOFT 2022] KVS: a tool for knowledge-driven vulnerability searching.
- [SIGSOFT 2022] MANDO-GURU: vulnerability detection for smart contract source code by heterogeneous graph embeddings.
- [SIGSOFT 2022] Blackbox adversarial attacks and explanations for automatic speech recognition.
- [SIGSOFT 2023] An Extensive Study on Adversarial Attack against Pre-trained Models of Code.
- [SIGSOFT 2023] Input-Driven Dynamic Program Debloating for Code-Reuse Attack Mitigation.
- [SIGSOFT 2023] Software Composition Analysis for Vulnerability Detection: An Empirical Study on Java Projects.
- [SIGSOFT 2023] Commit-Level, Neural Vulnerability Detection and Assessment.
- [SIGSOFT 2023] Learning Program Semantics for Vulnerability Detection via Vulnerability-Specific Inter-procedural Slicing.
- [SIGSOFT 2023] DeepRover: A Query-Efficient Blackbox Attack for Deep Neural Networks.
- [SIGSOFT 2023] Crystallizer: A Hybrid Path Analysis Framework to Aid in Uncovering Deserialization Vulnerabilities.
- [SIGSOFT 2023] Detecting Overfitting of Machine Learning Techniques for Automatic Vulnerability Detection.
- [CSFW 2010] Vulnerability Bounds and Leakage Resilience of Blinded Cryptography under Timing Attacks.
- [CSFW 2011] Modular Protections against Non-control Data Attacks.
- [CSFW 2011] Attacking and Fixing Helios: An Analysis of Ballot Secrecy.
- [CSFW 2012] Discovering Concrete Attacks on Website Authorization by Formal Analysis.
- [CSFW 2014] Automated Generation of Attack Trees.
- [CSFW 2015] A Parametric Family of Attack Models for Proxy Re-encryption.
- [CSFW 2015] Rational Protection against Timing Attacks.
- [CSFW 2016] Quantitative Verification and Synthesis of Attack-Defence Scenarios.
- [CSFW 2016] On Access Control, Capabilities, Their Equivalence, and Confused Deputy Attacks.
- [CSFW 2016] Hybrid Monitoring of Attacker Knowledge.
- [CSFW 2016] A Methodology for Formalizing Model-Inversion Attacks.
- [CSFW 2016] Static Detection of Collusion Attacks in ARBAC-Based Workflow Systems.
- [CSFW 2017] Run-Time Attack Detection in Cryptographic APIs.
- [CSFW 2017] Synthesis of Adaptive Side-Channel Attacks.
- [CSFW 2017] A Formal Approach to Cyber-Physical Attacks.
- [CSFW 2023] SoK: Model Inversion Attack Landscape: Taxonomy, Challenges, and Future Roadmap.
- [CSFW 2023] Investigating Membership Inference Attacks under Data Dependencies.
- [CSFW 2024] Inject Less, Recover More: Unlocking the Potential of Document Recovery in Injection Attacks Against SSE.
- [CSFW 2024] Relative Security: Formally Modeling and (Dis)Proving Resilience Against Semantic Optimization Vulnerabilities.
- [CSFW 2024] Attack Tree Metrics are Operad Algebras.
- [SRDS 2010] Attack Injection to Support the Evaluation of Ad Hoc Networks.
- [SRDS 2010] A Study on Latent Vulnerabilities.
- [SRDS 2012] Susceptibility Analysis of Structured P2P Systems to Localized Eclipse Attacks.
- [SRDS 2012] Off the Wall: Lightweight Distributed Filtering to Mitigate Distributed Denial of Service Attacks.
- [SRDS 2014] Gemini: An Emergency Line of Defense against Phishing Attacks.
- [SRDS 2015] PASS: An Address Space Slicing Framework for P2P Eclipse Attack Mitigation.
- [SRDS 2015] ControlFreak: Signature Chaining to Counter Control Flow Attacks.
- [SRDS 2015] Signature-Based Top-k Query Processing against Data Replacement Attacks in MANETs.
- [SRDS 2016] The Rowhammer Attack Injection Methodology.
- [SRDS 2017] Detecting TCP-Based DDoS Attacks in Baidu Cloud Computing Data Centers.
- [SRDS 2018] Impact of Man-In-The-Middle Attacks on Ethereum.
- [SRDS 2018] A Scalable and Efficient Correlation Engine to Detect Multi-Step Attacks in Distributed Systems.
- [SRDS 2019] Attack-Resistant Spanning Tree Construction in Route-Restricted Overlay Networks.
- [SRDS 2019] Trusted Computing Meets Blockchain: Rollback Attacks and a Solution for Hyperledger Fabric.
- [SRDS 2019] ARTEMIS: An Intrusion Detection System for MQTT Attacks in Internet of Things.
- [SRDS 2020] On the Detection of Shilling Attacks in Federated Collaborative Filtering.
- [SRDS 2021] Adding Fairness to Order: Preventing Front-Running Attacks in BFT Protocols using TEEs.
- [SRDS 2021] Scrooge Attack: Undervolting ARM Processors for Profit: Practical experience report.
- [SRDS 2022] AGIC: Approximate Gradient Inversion Attack on Federated Learning.
- [SRDS 2022] Never Too Late: Tracing and Mitigating Backdoor Attacks in Federated Learning.
- [SRDS 2022] Soter: Deep Learning Enhanced In-Network Attack Detection Based on Programmable Switches.
- [SRDS 2023] Defending against Poisoning Attacks in Federated Learning from a Spatial-temporal Perspective.
- [SRDS 2023] ALBUS: a Probabilistic Monitoring Algorithm to Counter Burst-Flood Attacks.
- [SRDS 2024] Availability Analysis of Network-Attack-Resilient Byzantine Fault Tolerant Systems.
- [SRDS 2024] PhD Forum: Challenges of Availability and Cost Assessments for Network-Attack-Resilient Byzantine Systems.
- [CHES 2010] New Results on Instruction Cache Attacks.
- [CHES 2010] Correlation-Enhanced Power Analysis Collision Attack.
- [CHES 2010] Flash Memory ‘Bumping’ Attacks.
- [CHES 2010] When Failure Analysis Meets Side-Channel Attacks.
- [CHES 2011] To Infinity and Beyond: Combined Attack on ECC Using Points of Low Order.
- [CHES 2011] Modulus Fault Attacks against RSA-CRT Signatures.
- [CHES 2011] Extractors against Side-Channel Attacks: Weak or Strong?
- [CHES 2011] On the Power of Fault Sensitivity Analysis and Collision Side-Channel Attacks in a Combined Setting.
- [CHES 2012] A Differential Fault Attack on the Grain Family of Stream Ciphers.
- [CHES 2012] Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model.
- [CHES 2012] Selecting Time Samples for Multivariate DPA Attacks.
- [CHES 2012] Unified and Optimized Linear Collision Attacks and Their Application in a Non-profiled Setting.
- [CHES 2012] Attacking RSA-CRT Signatures with Faults on Montgomery Multiplication.
- [CHES 2012] Side Channel Attack to Actual Cryptanalysis: Breaking CRT-RSA with Low Weight Decryption Exponents.
- [CHES 2012] An Efficient Countermeasure against Correlation Power-Analysis Attacks with Randomized Montgomery Operations for DF-ECC Processor.
- [CHES 2013] Success through Confidence: Evaluating the Effectiveness of a Side-Channel Attack.
- [CHES 2013] Non-invasive Spoofing Attacks for Anti-lock Braking Systems.
- [CHES 2013] A Differential Fault Attack on MICKEY 2.0.
- [CHES 2013] Using Bleichenbacher”s Solution to the Hidden Number Problem to Attack Nonce Leaks in 384-Bit ECDSA.
- [CHES 2013] A New Model for Error-Tolerant Side-Channel Cube Attacks.
- [CHES 2014] EM Attack Is Non-invasive? - Design Methodology and Validity Verification of EM Attack Sensor.
- [CHES 2014] A New Framework for Constraint-Based Probabilistic Template Side Channel Attacks.
- [CHES 2014] How to Estimate the Success Rate of Higher-Order Side-Channel Attacks.
- [CHES 2014] Destroying Fault Invariant with Randomization - A Countermeasure for AES Against Differential Fault Attacks.
- [CHES 2014] Side-Channel Attack against RSA Key Generation Algorithms.
- [CHES 2014] Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks on PCs.
- [CHES 2014] FPGA Implementations of SPRING - And Their Countermeasures against Side-Channel Attacks.
- [CHES 2015] Robust Profiling for DPA-Style Attacks.
- [CHES 2015] Stealing Keys from PCs Using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation.
- [CHES 2015] Exclusive Exponent Blinding May Not Suffice to Prevent Timing Attacks on RSA.
- [CHES 2015] Evaluation and Improvement of Generic-Emulating DPA Attacks.
- [CHES 2015] Transient-Steady Effect Attack on Block Ciphers.
- [CHES 2015] Multi-variate High-Order Attacks of Shuffled Tables Recomputation.
- [CHES 2015] SoC It to EM: ElectroMagnetic Side-Channel Attacks on a Complex System-on-Chip.
- [CHES 2016] Horizontal Side-Channel Attacks and Countermeasures on the ISW Masking Scheme.
- [CHES 2016] Mitigating SAT Attack on Logic Locking.
- [CHES 2016] Flush, Gauss, and Reload - A Cache Attack on the BLISS Lattice-Based Signature Scheme.
- [CHES 2016] CacheBleed: A Timing Attack on OpenSSL Constant Time RSA.
- [CHES 2016] Cache Attacks Enable Bulk Key Recovery on the Cloud.
- [CHES 2016] Strong Machine Learning Attack Against PUFs with No Mathematical Model.
- [CHES 2016] Efficient High-Speed WPA2 Brute Force Attacks Using Scalable Low-Cost FPGA Clustering.
- [CHES 2016] A Design Methodology for Stealthy Parametric Trojans and Its Application to Bug Attacks.
- [CHES 2017] A Side-Channel Assisted Cryptanalytic Attack Against QcBits.
- [CHES 2017] Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures - Profiling Attacks Without Pre-processing.
- [CHES 2017] CacheZoom: How SGX Amplifies the Power of Cache Attacks.
- [CHES 2017] Novel Bypass Attack and BDD-based Tradeoff Analysis Against All Known Logic Locking Attacks.
- [CHES 2017] Hacking in the Blind: (Almost) Invisible Runtime User Interface Attacks.
- [CHES 2017] Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption.
- [CHES 2017] A Systematic Approach to the Side-Channel Analysis of ECC Implementations with Worst-Case Horizontal Attacks.
- [CHES 2017] Four \mathbb Q on Embedded Devices with Strong Countermeasures Against Side-Channel Attacks.
- [DSN 2010] Detecting vulnerabilities in C programs using trace-based testing.
- [DSN 2010] Reuse-oriented camouflaging trojan: Vulnerability detection and attack construction.
- [DSN 2011] Applying game theory to analyze attacks and defenses in virtual coordinate systems.
- [DSN 2011] A combinatorial approach to detecting buffer overflow vulnerabilities.
- [DSN 2011] Characterization of logical masking and error propagation in combinational circuits and effects on system vulnerability.
- [DSN 2011] Modeling and evaluating targeted attacks in large scale dynamic systems.
- [DSN 2012] Understanding soft error propagation using Efficient vulnerability-driven fault injection.
- [DSN 2012] Scalable optimal countermeasure selection using implicit enumeration on attack countermeasure trees.
- [DSN 2012] Time-efficient and cost-effective network hardening using attack graphs.
- [DSN 2012] Taming Mr Hayes: Mitigating signaling based attacks on smartphones.
- [DSN 2012] Epiphany: A location hiding architecture for protecting critical services from DDoS attacks.
- [DSN 2013] Manipulating semantic values in kernel data structures: Attack assessments and implications.
- [DSN 2013] Practical automated vulnerability monitoring using program state invariants.
- [DSN 2014] Probabilistic Inference for Obfuscated Network Attack Sequences.
- [DSN 2014] Scriptless Timing Attacks on Web Browser Privacy.
- [DSN 2014] Application-Level Autonomic Hardware to Predict and Preempt Software Attacks on Industrial Control Systems.
- [DSN 2014] You Can Call but You Can’t Hide: Detecting Caller ID Spoofing Attacks.
- [DSN 2014] Characterizing Application Memory Error Vulnerability to Optimize Datacenter Cost via Heterogeneous-Reliability Memory.
- [DSN 2014] What Vulnerability Do We Need to Patch First?
- [DSN 2015] Leveraging State Information for Automated Attack Discovery in Transport Protocol Implementations.
- [DSN 2015] LEAPS: Detecting Camouflaged Attacks with Statistical Learning Guided by Program Analysis.
- [DSN 2015] OnionBots: Subverting Privacy Infrastructure for Cyber Attacks.
- [DSN 2015] Joza: Hybrid Taint Inference for Defeating Web Application SQL Injection Attacks.
- [DSN 2015] FloodGuard: A DoS Attack Prevention Extension in Software-Defined Networks.
- [DSN 2015] Delving into Internet DDoS Attacks by Botnets: Characterization and Analysis.
- [DSN 2015] On the Metrics for Benchmarking Vulnerability Detection Tools.
- [DSN 2015] Risk Assessment of Buffer “Heartbleed” Over-Read Vulnerabilities.
- [DSN 2016] ePVF: An Enhanced Program Vulnerability Factor Methodology for Cross-Layer Resilience Analysis.
- [DSN 2016] On False Data Injection Attacks Against Railway Traction Power Systems.
- [DSN 2016] Targeted Attacks on Teleoperated Surgical Robots: Dynamic Model-Based Detection and Mitigation.
- [DSN 2016] F-DETA: A Framework for Detecting Electricity Theft Attacks in Smart Grids.
- [DSN 2016] Equipping WAP with WEAPONS to Detect Vulnerabilities: Practical Experience Report.
- [DSN 2017] Privacy Disclosure through Smart Meters: Reactive Power Based Attack and Defense.
- [DSN 2017] JGRE: An Analysis of JNI Global Reference Exhaustion Vulnerabilities in Android.
- [DSN 2017] Regular: Attacker-Induced Traffic Flow Instability in a Stream of Semi-Automated Vehicles.
- [DSN 2017] Demonstrating a Tool for Injection Attack Prevention in MySQL.
- [DSN 2017] ATTAIN: An Attack Injection Framework for Software-Defined Networking.
- [DSN 2017] The Balance Attack or Why Forkable Blockchains are Ill-Suited for Consortium.
- [DSN 2017] Voiceprint: A Novel Sybil Attack Detection Method Based on RSSI for VANETs.
- [DSN 2018] Algorithmic Attack Synthesis Using Hybrid Dynamics of Power Grid Critical Infrastructures.
- [DSN 2018] OWL: Understanding and Detecting Concurrency Attacks.
- [DSN 2018] FAROS: Illuminating In-memory Injection Attacks via Provenance-Based Whole-System Dynamic Information Flow Tracking.
- [DSN 2018] Network-Attack-Resilient Intrusion-Tolerant SCADA for the Power Grid.
- [DSN 2018] Measuring IPv6 DNS Reconnaissance Attacks and Preventing Them Using DNS Guard.
- [DSN 2018] Effective Topology Tampering Attacks and Defenses in Software-Defined Networks.
- [DSN 2018] DTaint: Detecting the Taint-Style Vulnerability in Embedded Device Firmware.
- [DSN 2018] Collaborative Filtering Under a Sybil Attack: Similarity Metrics do Matter!
- [DSN 2019] Exploiting Memory Corruption Vulnerabilities in Connman for IoT Devices.
- [DSN 2019] Detecting “0-Day” Vulnerability: An Empirical Study of Secret Security Patch in OSS.
- [DSN 2019] HeapTherapy+: Efficient Handling of (Almost) All Heap Vulnerabilities Using Targeted Calling-Context Encoding.
- [DSN 2019] UChecker: Automatically Detecting PHP-Based Unrestricted File Upload Vulnerabilities.
- [DSN 2019] 1dVul: Discovering 1-Day Vulnerabilities through Binary Patches.
- [DSN 2019] Revisiting Client Puzzles for State Exhaustion Attacks Resilience.
- [DSN 2020] CDN Backfired: Amplification Attacks Based on HTTP Range Requests.
- [DSN 2020] Comprehensive Java Metadata Tracking for Attack Detection and Repair.
- [DSN 2020] JSKernel: Fortifying JavaScript against Web Concurrency Attacks via a Kernel-Like Structure.
- [DSN 2020] Diving into Email Bomb Attack.
- [DSN 2020] Hybrid Firmware Analysis for Known Mobile and IoT Security Vulnerabilities.
- [DSN 2021] PID-Piper: Recovering Robotic Vehicles from Physical Attacks.
- [DSN 2021] Decamouflage: A Framework to Detect Image-Scaling Attacks on CNN.
- [DSN 2021] The Master and Parasite Attack.
- [DSN 2021] PDGraph: A Large-Scale Empirical Study on Project Dependency of Security Vulnerabilities.
- [DSN 2021] Revealing GPUs Vulnerabilities by Combining Register-Transfer and Software-Level Fault Injection.
- [DSN 2021] WazaBee: attacking Zigbee networks by diverting Bluetooth Low Energy chips.
- [DSN 2021] Glitching Demystified: Analyzing Control-flow-based Glitching Attacks and Defenses.
- [DSN 2021] Physics-Aware Security Monitoring against Structural Integrity Attacks in 3D Printers.
- [DSN 2022] HDiff: A Semi-automatic Framework for Discovering Semantic Gap Attack in HTTP Implementations.
- [DSN 2022] Strategic Safety-Critical Attacks Against an Advanced Driver Assistance System.
- [DSN 2022] SEVulDet: A Semantics-Enhanced Learnable Vulnerability Detector.
- [DSN 2022] ComFASE: A Tool for Evaluating the Effects of V2V Communication Faults and Attacks on Automated Vehicles.
- [DSN 2022] BLAP: Bluetooth Link Key Extraction and Page Blocking Attacks.
- [DSN 2022] L2Fuzz: Discovering Bluetooth L2CAP Vulnerabilities Using Stateful Fuzz Testing.
- [DSN 2022] False Data Injection Attack Detection for Secure Distributed Demand Response in Smart Grids.
- [DSN 2022] IoT Phantom-Delay Attacks: Demystifying and Exploiting IoT Timeout Behaviors.
- [DSN 2023] SHATTER: Control and Defense-Aware Attack Analytics for Activity-Driven Smart Home Systems.
- [DSN 2023] Devils in Your Apps: Vulnerabilities and User Privacy Exposure in Mobile Notification Systems.
- [DSN 2023] Get Your Cyber-Physical Tests Done! Data-Driven Vulnerability Assessment of Robotic Aerial Vehicles.
- [DSN 2023] PT-Guard: Integrity-Protected Page Tables to Defend Against Breakthrough Rowhammer Attacks.
- [DSN 2023] MalAder: Decision-Based Black-Box Attack Against API Sequence Based Malware Detectors.
- [DSN 2023] Tabby: Automated Gadget Chain Detection for Java Deserialization Vulnerabilities.
- [DSN 2023] Targeted Privacy Attacks by Fingerprinting Mobile Apps in LTE Radio Layer.
- [DSN 2023] Fortifying Federated Learning against Membership Inference Attacks via Client-level Input Perturbation.
- [DSN 2023] ReFace: Adversarial Transformation Networks for Real-time Attacks on Face Recognition Systems.
- [DSN 2023] No Free Lunch: On the Increased Code Reuse Attack Surface of Obfuscated Programs.
- [DSN 2023] Detection of e-Mobility-Based Attacks on the Power Grid.
- [DSN 2023] SwarmFuzz: Discovering GPS Spoofing Attacks in Drone Swarms.
- [DSN 2023] Cost-Damage Analysis of Attack Trees.
- [DSN 2024] Byzantine Attacks Exploiting Penalties in Ethereum PoS.
- [DSN 2024] ADSynth: Synthesizing Realistic Active Directory Attack Graphs.
- [DSN 2024] Grunt Attack: Exploiting Execution Dependencies in Microservices.
- [DSN 2024] Privacy Leakage from Logits Attack and its Defense in Federated Distillation.
- [DSN 2024] ZipChannel: Cache Side-Channel Vulnerabilities in Compression Algorithms.
- [DSN 2025] Revisiting Main Memory-Based Covert and Side Channel Attacks in the Context of Processing-in-Memory.
- [DSN 2025] Semantically Improved Adversarial Attack Based on Masked Language Model via Context Preservation.
- [DSN 2025] SoundBoost: Effective RCA and Attack Detection for UAV via Acoustic Side-Channel.
- [DSN 2025] What Lies Beneath: An Empirical Study of Silent Vulnerability Fixes in Open-Source Software.
- [DSN 2025] Attack-Defense Trees with Offensive and Defensive Attributes.
- [DSN 2025] Detecting Code Vulnerabilities using LLMs.
- [DSN 2025] Valkyrie: A Response Framework to Augment Runtime Detection of Time-Progressive Attacks.
- [DSN 2025] KubeFence: Security Hardening of the Kubernetes Attack Surface.
- [DSN 2025] QUIC-Aware Load Balancing: Attacks and Mitigations.
- [DSN 2025] RAVAGE: Robotic Autonomous Vehicles’ Attack Generation Engine.
- [DSN 2025] Reentrancy Redux: The Evolution of Real-World Reentrancy Attacks on Blockchains.
- [DSN 2025] On Security Vulnerabilities in Transportation IoT Devices.
- [DSN 2025] Mitigating Front-Running Attacks through Fair and Resilient Transaction Dissemination.
- [DSN 2025] ZCover: Uncovering Z-Wave Controller Vulnerabilities Through Systematic Security Analysis of Application Layer Implementation.
- [DSN 2025] “I will always be by your side”: A Side-Channel Aided PWM-based Holistic Attack Recovery for Unmanned Aerial Vehicles.
- [RAID 2010] CANVuS: Context-Aware Network Vulnerability Scanning.
- [RAID 2010] A Data-Centric Approach to Insider Attack Detection in Database Systems.
- [RAID 2010] Aspect-Based Attack Detection in Large-Scale Networks.
- [RAID 2011] On the Expressiveness of Return-into-libc Attacks.
- [RAID 2011] Securing Application-Level Topology Estimation Networks: Facing the Frog-Boiling Attack.
- [RAID 2012] Research in Attacks, Intrusions, and Defenses - 15th International Symposium, RAID 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings.
- [RAID 2012] Industrial Espionage and Targeted Attacks: Understanding the Characteristics of an Escalating Threat.
- [RAID 2012] A Memory Access Validation Scheme against Payload Injection Attacks.
- [RAID 2012] PoisonAmplifier: A Guided Approach of Discovering Compromised Websites through Reversing Search Poisoning Attacks.
- [RAID 2013] Research in Attacks, Intrusions, and Defenses - 16th International Symposium, RAID 2013, Rodney Bay, St. Lucia, October 23-25, 2013. Proceedings.
- [RAID 2013] A Primitive for Revealing Stealthy Peripheral-Based Attacks on the Computing Platform’s Main Memory.
- [RAID 2013] Server-Side Code Injection Attacks: A Historical Perspective.
- [RAID 2013] Deobfuscating Embedded Malware Using Probable-Plaintext Attacks.
- [RAID 2013] Side-Channel Attacks on the Yubikey 2 One-Time Password Generator.
- [RAID 2013] Active Credential Leakage for Observing Web-Based Attack Cycle.
- [RAID 2013] Practical Attacks against the I2P Network.
- [RAID 2014] Research in Attacks, Intrusions and Defenses - 17th International Symposium, RAID 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings.
- [RAID 2014] Protecting Web-Based Single Sign-on Protocols against Relying Party Impersonation Attacks through a Dedicated Bi-directional Authenticated Secure Channel.
- [RAID 2014] Wait a Minute! A fast, Cross-VM Attack on AES.
- [RAID 2014] Run Away If You Can: - Persistent Jamming Attacks against Channel Hopping Wi-Fi Devices in Dense Networks.
- [RAID 2014] Some Vulnerabilities Are Different Than Others - Studying Vulnerabilities and Attack Surfaces in the Wild.
- [RAID 2015] Research in Attacks, Intrusions, and Defenses - 18th International Symposium, RAID 2015, Kyoto, Japan, November 2-4, 2015, Proceedings.
- [RAID 2015] Hardware-Assisted Fine-Grained Code-Reuse Attack Detection.
- [RAID 2015] Privacy is Not an Option: Attacking the IPv6 Privacy Extension.
- [RAID 2015] Evaluation of Intrusion Detection Systems in Virtualized Environments Using Attack Injection.
- [RAID 2015] Radmin: Early Detection of Application-Level Resource Exhaustion and Starvation Attacks.
- [RAID 2015] AmpPot: Monitoring and Defending Against Amplification DDoS Attacks.
- [RAID 2016] Research in Attacks, Intrusions, and Defenses - 19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedings.
- [RAID 2016] APDU-Level Attacks in PKCS#11 Devices.
- [RAID 2016] CloudRadar: A Real-Time Side-Channel Attack Detection System in Clouds.
- [RAID 2017] Research in Attacks, Intrusions, and Defenses - 20th International Symposium, RAID 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings.
- [RAID 2017] BEADS: Automated Attack Discovery in OpenFlow-Based SDN Systems.
- [RAID 2017] Sgx-Lapd: Thwarting Controlled Side Channel Attacks via Enclave Verifiable Page Faults.
- [RAID 2017] Linking Amplification DDoS Attacks to Booter Services.
- [RAID 2017] Practical and Accurate Runtime Application Protection Against DoS Attacks.
- [RAID 2018] Research in Attacks, Intrusions, and Defenses - 21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings.
- [RAID 2018] BabelView: Evaluating the Impact of Code Injection Attacks in Mobile Webviews.
- [RAID 2018] DNS Unchained: Amplified Application-Layer DoS Attacks Against DNS Authoritatives.
- [RAID 2018] Control Plane Reflection Attacks in SDNs: New Attacks and Countermeasures.
- [RAID 2018] Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks.
- [RAID 2018] Generic Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers.
- [RAID 2018] KASR: A Reliable and Practical Approach to Attack Surface Reduction of Commodity OS Kernels.
- [RAID 2019] 22nd International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2019, Chaoyang District, Beijing, China, September 23-25, 2019.
- [RAID 2019] Towards a First Step to Understand the Cryptocurrency Stealing Attack on Ethereum.
- [RAID 2019] USBESAFE: An End-Point Solution to Protect Against USB-Based Attacks.
- [RAID 2019] Minimal Kernel: An Operating System Architecture for TEE to Resist Board Level Physical Attacks.
- [RAID 2019] The DUSTER Attack: Tor Onion Service Attribution Based on Flow Watermarking with Track Hiding.
- [RAID 2019] Dynamically Finding Minimal Eviction Sets Can Be Quicker Than You Think for Side-Channel Attacks against the LLC.
- [RAID 2019] Time and Order: Towards Automatically Identifying Side-Channel Vulnerabilities in Enclave Binaries.
- [RAID 2019] Application level attacks on Connected Vehicle Protocols.
- [RAID 2020] 23rd International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2020, San Sebastian, Spain, October 14-15, 2020.
- [RAID 2020] Never Trust Your Victim: Weaponizing Vulnerabilities in Security Scanners.
- [RAID 2020] Binary-level Directed Fuzzing for Use-After-Free Vulnerabilities.
- [RAID 2020] Mininode: Reducing the Attack Surface of Node.js Applications.
- [RAID 2020] aBBRate: Automating BBR Attack Exploration Using a Model-Based Approach.
- [RAID 2020] Evasion Attacks against Banking Fraud Detection Systems.
- [RAID 2020] GhostImage: Remote Perception Attacks against Camera-based Image Classification Systems.
- [RAID 2020] Software-based Realtime Recovery from Sensor Attacks on Robotic Vehicles.
- [RAID 2020] BlueShield: Detecting Spoofing Attacks in Bluetooth Low Energy Networks.
- [RAID 2020] Confine: Automated System Call Policy Generation for Container Attack Surface Reduction.
- [RAID 2021] RAID ‘21: 24th International Symposium on Research in Attacks, Intrusions and Defenses, San Sebastian, Spain, October 6-8, 2021.
- [RAID 2021] UFuzzer: Lightweight Detection of PHP-Based Unrestricted File Upload Vulnerabilities Via Static-Fuzzing Co-Analysis.
- [RAID 2021] iTOP: Automating Counterfeit Object-Oriented Programming Attacks.
- [RAID 2021] AttkFinder: Discovering Attack Vectors in PLC Programs using Information Flow Analysis.
- [RAID 2021] What Did You Add to My Additive Manufacturing Data?: Steganographic Attacks on 3D Printing Files.
- [RAID 2021] The Service Worker Hiding in Your Browser: The Next Web Attack Target?
- [RAID 2022] 25th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2022, Limassol, Cyprus, October 26-28, 2022.
- [RAID 2022] Exploiting Metaobjects to Reinforce Data Leakage Attacks.
- [RAID 2022] RiscyROP: Automated Return-Oriented Programming Attacks on RISC-V and ARM64.
- [RAID 2022] On the Challenges of Detecting Side-Channel Attacks in SGX.
- [RAID 2022] Detection of Electromagnetic Signal Injection Attacks on Actuator Systems.
- [RAID 2022] HALC: A Real-time In-sensor Defense against the Magnetic Spoofing Attack on Hall Sensors.
- [RAID 2022] Mirrors in the Sky: On the Potential of Clouds in DNS Reflection-based Denial-of-Service Attacks.
- [RAID 2022] Harm-DoS: Hash Algorithm Replacement for Mitigating Denial-of-Service Vulnerabilities in Binary Executables.
- [RAID 2022] Zigbee’s Network Rejoin Procedure for IoT Systems: Vulnerabilities and Implications.
- [RAID 2022] Transferable Graph Backdoor Attack.
- [RAID 2022] Automated Runtime Mitigation for Misconfiguration Vulnerabilities in Industrial Control Systems.
- [RAID 2023] Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2023, Hong Kong, China, October 16-18, 2023.
- [RAID 2023] Black-box Attacks Against Neural Binary Function Detection.
- [RAID 2023] MP-Mediator: Detecting and Handling the New Stealthy Delay Attacks on IoT Events and Commands.
- [RAID 2023] Looking Beyond IoCs: Automatically Extracting Attack Patterns from External CTI.
- [RAID 2023] Temporary Block Withholding Attacks on Filecoin’s Expected Consensus.
- [RAID 2023] Beware of Pickpockets: A Practical Attack against Blocking Cards.
- [RAID 2023] Quarantine: Mitigating Transient Execution Attacks with Physical Domain Isolation.
- [RAID 2023] Efficient Membership Inference Attacks against Federated Learning via Bias Differences.
- [RAID 2023] Exploring Clustered Federated Learning’s Vulnerability against Property Inference Attack.
- [RAID 2023] PrivMon: A Stream-Based System for Real-Time Privacy Attack Detection for Machine Learning Models.
- [RAID 2023] Your Attack Is Too DUMB: Formalizing Attacker Scenarios for Adversarial Transferability.
- [RAID 2023] PhantomSound: Black-Box, Query-Efficient Audio Adversarial Attack via Split-Second Phoneme Injection.
- [RAID 2023] Container Orchestration Honeypot: Observing Attacks in the Wild.
- [RAID 2023] Phantom-CSI Attacks against Wireless Liveness Detection.
- [RAID 2023] Bin there, target that: Analyzing the target selection of IoT vulnerabilities in malware binaries.
- [RAID 2023] SCVMON: Data-oriented attack recovery for RVs based on safety-critical variable monitoring.
- [RAID 2023] All Use-After-Free Vulnerabilities Are Not Created Equal: An Empirical Study on Their Characteristics and Detectability.
- [RAID 2023] DiverseVul: A New Vulnerable Source Code Dataset for Deep Learning Based Vulnerability Detection.
- [RAID 2023] Why Johnny Can’t Use Secure Docker Images: Investigating the Usability Challenges in Using Docker Image Vulnerability Scanners through Heuristic Evaluation.
- [RAID 2023] Boosting Big Brother: Attacking Search Engines with Encodings.
- [RAID 2023] Leader: Defense Against Exploit-Based Denial-of-Service Attacks on Web Applications.
- [RAID 2024] The 27th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2024, Padua, Italy, 30 September 2024- 2 October 2024.
- [RAID 2024] Leveraging Deep Reinforcement Learning for Cyber-Attack Paths Prediction: Formulation, Generalization, and Evaluation.
- [RAID 2024] From Victims to Defenders: An Exploration of the Phishing Attack Reporting Ecosystem.
- [RAID 2024] No Need for Details: Effective Anomaly Detection for Process Control Traffic in Absence of Protocol and Attack Knowledge.
- [RAID 2024] Security of Cross-chain Bridges: Attack Surfaces, Defenses, and Open Problems.
- [RAID 2024] KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities.
- [RAID 2024] Beyond REST: Introducing APIF for Comprehensive API Vulnerability Fuzzing.
- [RAID 2024] KGDist: A Prompt-Based Distillation Attack against LMs Augmented with Knowledge Graphs.
- [RAID 2024] Enhancing Model Poisoning Attacks to Byzantine-Robust Federated Learning via Critical Learning Periods.
- [RAID 2024] A Second Look at the Portability of Deep Learning Side-Channel Attacks over EM Traces.
- [PKC 2010] Preventing Pollution Attacks in Multi-source Network Coding.
- [PKC 2011] Parallel Decryption Queries in Bounded Chosen Ciphertext Attacks.
- [PKC 2012] Public Key Encryption against Related Key Attacks.
- [PKC 2013] Combined Attack on CRT-RSA - Why Public Verification Must Not Be Public?
- [PKC 2013] Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited.
- [PKC 2014] Related Randomness Attacks for Public Key Encryption.
- [PKC 2014] Encryption Schemes Secure under Related-Key and Key-Dependent Message Attacks.
- [PKC 2015] Collision of Random Walks and a Refined Analysis of Attacks on the Discrete Logarithm Problem.
- [PKC 2015] A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems.
- [PKC 2015] A Polynomial-Time Attack on the BBCRS Scheme.
- [PKC 2015] Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks.
- [PKC 2016] Mitigating Multi-target Attacks in Hash-Based Signatures.
- [PKC 2016] Degenerate Curve Attacks - Extending Invalid Curve Attacks to Edwards Curves and Other Models.
- [PKC 2017] Zeroizing Attacks on Indistinguishability Obfuscation over CLT13.
- [PKC 2019] Decryption Failure Attacks on IND-CCA Secure Lattice-Based Schemes.
- [PKC 2021] Rate-1 Key-Dependent Message Security via Reusable Homomorphic Extractor Against Correlated-Source Attacks.
- [PKC 2021] Adventures in Crypto Dark Matter: Attacks and Fixes for Weak Pseudorandom Functions.
- [PKC 2022] Multitarget Decryption Failure Attacks and Their Application to Saber and Kyber.
- [PKC 2023] Hull Attacks on the Lattice Isomorphism Problem.
- [PKC 2023] A Key-Recovery Attack Against Mitaka in the t-Probing Model.
- [PKC 2025] Higher Residuosity Attacks on Small RSA Subgroup Decision Problems.
- [PKC 2025] Finding a Polytope: A Practical Fault Attack Against Dilithium.
- [PKC 2025] The Security of Hash-and-Sign with Retry Against Superposition Attacks.
- [PKC 2025] Intermundium-DL: Assessing the Resilience of Current Schemes to Discrete-Log-Computation Attacks on Public Parameters.
- [PKC 2025] Public-Algorithm Substitution Attacks: Subverting Hashing and Verification.
- [PKC 2025] Kleptographic Attacks Against Implicit Rejection.
- [TCC 2011] Identity-Based Encryption Secure against Selective Opening Attack.
- [TCC 2011] (Nearly) Round-Optimal Black-Box Constructions of Commitments Secure against Selective Opening Attacks.
- [TCC 2013] Computational Soundness of Coinductive Symbolic Security under Active Attacks.
- [TCC 2013] Errata to (Nearly) Round-Optimal Black-Box Constructions of Commitments Secure against Selective Opening Attacks.
- [TCC 2017] Blockwise p-Tampering Attacks on Cryptographic Primitives, Extractors, and Learners.
- [TCC 2018] The MMap Strikes Back: Obfuscation and New Multilinear Maps Immune to CLT13 Zeroizing Attacks.
- [TCC 2018] Return of GGH15: Provable Security Against Zeroizing Attacks.
- [TCC 2019] Matrix PRFs: Constructions, Attacks, and Applications to Obfuscation.
- [TCC 2021] Polynomial-Time Targeted Attacks on Coin Tossing for Any Number of Corruptions.
- [TCC 2023] Rigorous Foundations for Dual Attacks in Coding Theory.
- [WISEC 2010] RFID survivability quantification and attack modeling.
- [WISEC 2010] Preventing multi-query attack in location-based services.
- [WISEC 2010] Attacks on physical-layer identification.
- [WISEC 2010] Effectiveness of distance-decreasing attacks against impulse radio ranging.
- [WISEC 2011] Thwarting inside jamming attacks on wireless broadcast communications.
- [WISEC 2012] Physical-layer attacks on chirp-based ranging systems.
- [WISEC 2012] Entropy attacks and countermeasures in wireless network coding.
- [WISEC 2013] A pilot study on the security of pattern screen-lock methods and soft side channel attacks.
- [WISEC 2013] 6LoWPAN fragmentation attacks and mitigation mechanisms.
- [WISEC 2013] Countermeasures against sybil attacks in WSN based on proofs-of-work.
- [WISEC 2013] Energy attacks and defense techniques for wireless systems.
- [WISEC 2014] Short paper: speaking the local dialect: exploiting differences between ieee 802.15.4 receivers with commodity radios for fingerprinting, targeted attacks, and wids evasion.
- [WISEC 2014] Short paper: detection of GPS spoofing attacks in power grids.
- [WISEC 2014] Short paper: attacking and defending lightweight PHY security schemes for wireless communications.
- [WISEC 2015] HB+DB, mitigating man-in-the-middle attacks against HB+ with distance bounding.
- [WISEC 2015] Injection attacks on 802.11n MAC frame aggregation.
- [WISEC 2015] A practical investigation of identity theft vulnerabilities in Eduroam.
- [WISEC 2015] Danger is my middle name: experimenting with SSL vulnerabilities in Android apps.
- [WISEC 2015] Device-to-identity linking attack using targeted wi-fi geolocation spoofing.
- [WISEC 2015] WeChecker: efficient and precise detection of privilege escalation vulnerabilities in Android apps.
- [WISEC 2016] Defeating MAC Address Randomization Through Timing Attacks.
- [WISEC 2016] Trust The Wire, They Always Told Me!: On Practical Non-Destructive Wire-Tap Attacks Against Ethernet.
- [WISEC 2016] Exploiting Data-Usage Statistics for Website Fingerprinting Attacks on Android.
- [WISEC 2016] DARPA: Device Attestation Resilient to Physical Attacks.
- [WISEC 2016] Smart-Phones Attacking Smart-Homes.
- [WISEC 2016] DEMO: Demonstrating Practical Known-Plaintext Attacks against Physical Layer Security in Wireless MIMO Systems.
- [WISEC 2016] POSTER: Assessing the Impact of 802.11 Vulnerabilities using Wicability.
- [WISEC 2016] POSTER: Exploiting Dynamic Partial Reconfiguration for Improved Resistance Against Power Analysis Attacks on FPGAs.
- [WISEC 2017] Quantifying the reflective DDoS attack capability of household IoT devices.
- [WISEC 2017] Power-positive networking using wireless charging: protecting energy against battery exhaustion attacks.
- [WISEC 2017] SCAPI: a scalable attestation protocol to detect software and physical attacks.
- [WISEC 2017] Advancing attacker models of satellite-based localization systems: the case of multi-device attackers.
- [WISEC 2017] YELP: masking sound-based opportunistic attacks in zero-effort deauthentication.
- [WISEC 2017] Insecure to the touch: attacking ZigBee 3.0 via touchlink commissioning.
- [WISEC 2017] A roaming-based denial of service attack on LTE networks: poster.
- [WISEC 2018] Beam-Stealing: Intercepting the Sector Sweep to Launch Man-in-the-Middle Attacks on Wireless IEEE 802.11ad Networks.
- [WISEC 2018] Operating Channel Validation: Preventing Multi-Channel Man-in-the-Middle Attacks Against Protected Wi-Fi Networks.
- [WISEC 2018] WADAC: Privacy-Preserving Anomaly Detection and Attack Classification on Wireless Traffic.
- [WISEC 2018] Listening Watch: Wearable Two-Factor Authentication using Speech Signals Resilient to Near-Far Attacks.
- [WISEC 2018] Detecting smartphone state changes through a Bluetooth based timing attack.
- [WISEC 2018] Signal Jamming Attacks Against Communication-Based Train Control: Attack Impact and Countermeasure.
- [WISEC 2018] My Magnetometer Is Telling You Where I’ve Been?: A Mobile Device Permissionless Location Attack.
- [WISEC 2018] Analysis of the Effect of the Distance-Decreasing Attacks on GNSS Authenticated Signals.
- [WISEC 2018] Android Escalation Paths: Building Attack-Graphs from SEAndroid Policies.
- [WISEC 2018] An Offline Dictionary Attack against zkPAKE Protocol.
- [WISEC 2018] One-Sided Countermeasures for Side-Channel Attacks Can Backfire.
- [WISEC 2019] Digital radio signal cancellation attacks: an experimental evaluation.
- [WISEC 2019] Protecting mobile devices from physical memory attacks with targeted encryption.
- [WISEC 2019] ARF: identifying re-delegation vulnerabilities in Android system services.
- [WISEC 2019] Deployment optimization of IoT devices through attack graph analysis.
- [WISEC 2019] New vulnerabilities in 4G and 5G cellular access network protocols: exposing device capabilities.
- [WISEC 2019] SurFi: detecting surveillance camera looping attacks with wi-fi channel state information.
- [WISEC 2019] Wireless attacks on aircraft landing systems: demo.
- [WISEC 2019] Deep learning approach to detect malicious attacks at system level: poster.
- [WISEC 2019] Attacking HDMI distribution networks: poster.
- [WISEC 2019] Dynamically detecting USB attacks in hardware: poster.
- [WISEC 2019] Investigation of cookie vulnerabilities: poster.
- [WISEC 2019] False data injection attacks against contingency analysis in power grids: poster.
- [WISEC 2020] Truncate after preamble: PHY-based starvation attacks on IoT networks.
- [WISEC 2020] Countering cross-technology jamming attack.
- [WISEC 2020] Analyzing the attack landscape of Zigbee-enabled IoT systems and reinstating users’ privacy.
- [WISEC 2020] A plug-n-play game theoretic framework for defending against radio window attacks.
- [WISEC 2020] Paging storm attacks against 4G/LTE networks from regional Android botnets: rationale, practicality, and implications.
- [WISEC 2021] Message sieving to mitigate smart gridlock attacks in V2V.
- [WISEC 2021] RIP StrandHogg: a practical StrandHogg attack detection method on Android.
- [WISEC 2021] SigUnder: a stealthy 5G low power attack and defenses.
- [WISEC 2021] SoK: assessing the threat potential of vibration-based attacks against live speech using mobile sensors.
- [WISEC 2021] Relay/replay attacks on GNSS signals.
- [WISEC 2021] Cross-protocol attacks: weaponizing a smartphone by diverting its bluetooth controller.
- [WISEC 2022] Physical-Layer Attacks and Their Impact on Wireless Networks: Two Case Studies.
- [WISEC 2022] PITracker: Detecting Android PendingIntent Vulnerabilities through Intent Flow Analysis.
- [WISEC 2022] AirGuard - Protecting Android Users from Stalking Attacks by Apple Find My Devices.
- [WISEC 2022] Attack Impact and Misbehavior Detection in Vehicular Platoons.
- [WISEC 2022] Analog Physical-Layer Relay Attacks with Application to Bluetooth and Phase-Based Ranging.
- [WISEC 2022] Sybil-Based Attacks on Google Maps or How to Forge the Image of City Life.
- [WISEC 2022] Metasurface-in-the-Middle Attack: From Theory to Experiment.
- [WISEC 2022] Adversarial Metasurfaces: Metasurface-in-the-Middle Attack.
- [WISEC 2022] Wheels on the Modbus - Attacking ModbusTCP Communications.
- [WISEC 2023] MS-PTP: Protecting Network Timing from Byzantine Attacks.
- [WISEC 2023] E-Spoofer: Attacking and Defending Xiaomi Electric Scooter Ecosystem.
- [WISEC 2023] Never Let Me Down Again: Bidding-Down Attacks and Mitigations in 5G and 4G.
- [WISEC 2023] SoK: A Comprehensive Evaluation of 2FA-based Schemes in the Face of Active Concurrent Attacks from User Terminal.
- [WISEC 2023] BarrierBypass: Out-of-Sight Clean Voice Command Injection Attacks through Physical Barriers.
- [WISEC 2023] Portability of Deep-Learning Side-Channel Attacks against Software Discrepancies.
- [WISEC 2023] VSMask: Defending Against Voice Synthesis Attack via Real-Time Predictive Perturbation.
- [WISEC 2023] Countering Relay and Spoofing Attacks in the Connection Establishment Phase of Wi-Fi Systems.
- [WISEC 2023] Wavefront Manipulation Attack via Programmable mmWave Metasurfaces: from Theory to Experiments.
- [WISEC 2023] EMI-LiDAR: Uncovering Vulnerabilities of LiDAR Sensors in Autonomous Driving Setting using Electromagnetic Interference.
- [WISEC 2023] Satellite Spoofing from A to Z: On the Requirements of Satellite Downlink Overshadowing Attacks.
- [WISEC 2023] Location-independent GNSS Relay Attacks: A Lazy Attacker’s Guide to Bypassing Navigation Message Authentication.
- [WISEC 2023] Circumventing the Defense against Modulation Classification Attacks.
- [WISEC 2024] System-level Analysis of Adversarial Attacks and Defenses on Intelligence in O-RAN based Cellular Networks.
- [WISEC 2024] Random Access Failure Attack on Cellular Networks: Forcing Timing Advance Misalignment.
- [WISEC 2024] PROV5GC: Hardening 5G Core Network Security with Attack Detection and Attribution Based on Provenance Graphs.
- [WISEC 2024] Uncovering Security Vulnerabilities in Real-world Implementation and Deployment of 5G Messaging Services.
- [WISEC 2025] Distributed Multi-Antenna GPS Spoofing Attack using Off-the-Shelf Devices.
- [WISEC 2025] Ripple: Software-Only Detection of Signal Injection Attacks in Drone Temperature Sensors.
- [WISEC 2025] SpaceJam: Protocol-aware Jamming Attacks against Space Communications.
- [WISEC 2025] SoK: Evaluating 5G-Advanced Protocols Against Legacy and Emerging Privacy and Security Attacks.
- [WISEC 2025] Improving Wireless Security Research: Cost-Effective Detection of Wireless Charging Vulnerabilities.
- [WISEC 2025] Fragile Frames: Wi-Fi’s Fraught Fight Against FragAttacks.
- [WISEC 2025] Low-Layer Attacks Against 4G/5G Networks.
- [SACMAT 2013] Beyond accountability: using obligations to reduce risk exposure and deter insider attacks.
- [SACMAT 2013] User-centric management of distributed credential repositories: balancing availability and vulnerability.
- [SACMAT 2015] Mitigating Access Control Vulnerabilities through Interactive Static Analysis.
- [SACMAT 2016] Detecting Privilege Escalation Attacks through Instrumenting Web Application Source Code.
- [SACMAT 2017] An Enforcement Model for Preventing Inference Attacks in Social Computing Platforms.
- [SACMAT 2018] Toward A Code Pattern Based Vulnerability Measurement Model.
- [SACMAT 2019] History and Future of Automated Vulnerability Analysis.
- [SACMAT 2020] Proactive Risk Assessment for Preventing Attribute-Forgery Attacks to ABAC Policies.
- [SACMAT 2021] Backdoor Attacks to Graph Neural Networks.
- [SACMAT 2022] A Game-Theoretically Optimal Defense Paradigm against Traffic Analysis Attacks using Multipath Routing and Deception.
- [SACMAT 2023] Access Control Vulnerabilities in Network Protocol Implementations: How Attackers Exploit Them and What To Do About It.
- [SACMAT 2023] SpaceMediator: Leveraging Authorization Policies to Prevent Spatial and Privacy Attacks in Mobile Augmented Reality.
- [SACMAT 2024] Make Split, not Hijack: Preventing Feature-Space Hijacking Attacks in Split Learning.
- [SACMAT 2024] Defending Multi-Cloud Applications Against Man-in-the-Middle Attacks.
- [SACMAT 2024] SPRT: Automatically Adjusting SELinux Policy for Vulnerability Mitigation.
- [SACMAT 2025] SPEAR: Security Posture Evaluation using AI Planner-Reasoning on Attack-Connectivity Hypergraphs.
- [SACMAT 2025] ACGuard5GC: Privacy-Preserving Prevention of Access Control Attacks within 5G Core Networks.
- [SACMAT 2025] ProfessorX: Detecting Silent Vulnerabilities in Policy Engine Implementations.
- [SACMAT 2025] In-Context Vulnerability Propagation in LLMs [Work In Progress Paper].
- [DRM 2010] A chameleon encryption scheme resistant to known-plaintext attack.
- [IH 2013] A simple tracing algorithm for binary fingerprinting code under averaging attack.
- [IH 2013] Watermarking road maps against crop and merge attacks.
- [IH 2014] On the combination of randomized thresholds and non-parametric boundaries to protect digital watermarks against sensitivity attacks.
- [IH 2015] A Negative Number Vulnerability for Histogram-based Face Recognition Systems.
- [IH 2016] Machine Learning under Attack: Vulnerability Exploitation and Security Measures.
- [IH 2016] A Higher Order Analysis of the Joint Capacity of Digital Fingerprinting Codes against the Interleaving Attack.
- [IH 2017] Modeling Attacks on Photo-ID Documents and Applying Media Forensics for the Detection of Facial Morphing.
- [IH 2018] Densely Connected Convolutional Neural Network for Multi-purpose Image Forensics under Anti-forensic Attacks.
- [IH 2020] Information Hiding in Industrial Control Systems: An OPC UA based Supply Chain Attack and its Detection.
- [IH 2021] FederatedReverse: A Detection and Defense Method Against Backdoor Attacks in Federated Learning.
- [IH 2022] Fighting the Reverse JPEG Compatibility Attack: Pick your Side.
- [IH 2023] Compatibility and Timing Attacks for JPEG Steganalysis.
- [IH 2023] Analysis and Mitigation of the False Alarms of the Reverse JPEG Compatibility Attack.
- [IH 2023] Advancing the JPEG Compatibility Attack: Theory, Performance, Robustness, and Practice.
- [IH 2023] Hand Vein Spoof GANs: Pitfalls in the Assessment of Synthetic Presentation Attack Artefacts.
- [IH 2024] Extending the Scope of Gradient Reconstruction Attacks in Federated Averaging.
- [IH 2024] Is Audio Spoof Detection Robust to Laundering Attacks?
- [IH 2025] Exploring Adversarial Attacks on the MaSTer Truncation Protocol.
- [ACNS 2010] Multi-trail Statistical Saturation Attacks.
- [ACNS 2010] Multiset Collision Attacks on Reduced-Round SNOW 3G and SNOW 3G (+) .
- [ACNS 2010] Adaptive Chosen-Message Side-Channel Attacks.
- [ACNS 2011] Non-transferable User Certification Secure against Authority Information Leaks and Impersonation Attacks.
- [ACNS 2011] Practical Attacks on the Maelstrom-0 Compression Function.
- [ACNS 2012] Contextual OTP: Mitigating Emerging Man-in-the-Middle Attacks with Wireless Hardware Tokens.
- [ACNS 2012] TreVisor - OS-Independent Software-Based Full Disk Encryption Secure against Main Memory Attacks.
- [ACNS 2012] Zero-Value Point Attacks on Kummer-Based Cryptosystem.
- [ACNS 2012] ARC: Protecting against HTTP Parameter Pollution Attacks Using Application Request Caches.
- [ACNS 2013] Generic Attacks for the Xor of k Random Permutations.
- [ACNS 2013] Preimage Attacks on Feistel-SP Functions: Impact of Omitting the Last Network Twist.
- [ACNS 2013] Experimental Analysis of Attacks on Next Generation Air Traffic Communication.
- [ACNS 2013] Launching Generic Attacks on iOS with Approved Third-Party Applications.
- [ACNS 2013] Attacking Atmel’s CryptoMemory EEPROM with Special-Purpose Hardware.
- [ACNS 2014] A Linear Algebra Attack to Group-Ring-Based Key Exchange Protocols.
- [ACNS 2014] Improved Constructions of PRFs Secure Against Related-Key Attacks.
- [ACNS 2014] Partial Key Exposure Attacks on Takagi’s Variant of RSA.
- [ACNS 2014] New Partial Key Exposure Attacks on CRT-RSA with Large Public Exponents.
- [ACNS 2014] Memoryless Unbalanced Meet-in-the-Middle Attacks: Impossible Results and Applications.
- [ACNS 2014] Polymorphism as a Defense for Automated Attack of Websites.
- [ACNS 2015] Non-malleability Under Selective Opening Attacks: Implication and Separation.
- [ACNS 2015] Time-Memory Trade-Off Attack on the GSM A5/1 Stream Cipher Using Commodity GPGPU - (Extended Abstract).
- [ACNS 2015] Replacement Attacks: Automatically Impeding Behavior-Based Malware Specifications.
- [ACNS 2015] Partial Key Exposure Attacks on CRT-RSA: Better Cryptanalysis to Full Size Encryption Exponents.
- [ACNS 2015] Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks.
- [ACNS 2016] Low-Cost Mitigation Against Cold Boot Attacks for an Authentication Token.
- [ACNS 2016] Square Attack on 7-Round Kiasu-BC.
- [ACNS 2016] On the Design Rationale of Simon Block Cipher: Integral Attacks and Impossible Differential Attacks against Simon Variants.
- [ACNS 2017] A Novel GPU-Based Implementation of the Cube Attack - Preliminary Results Against Trivium.
- [ACNS 2017] Related-Key Impossible-Differential Attack on Reduced-Round Skinny.
- [ACNS 2017] Side-Channel Attacks Meet Secure Network Protocols.
- [ACNS 2018] Drive-By Key-Extraction Cache Attacks from Portable Code.
- [ACNS 2018] On the Ineffectiveness of Internal Encodings - Revisiting the DCA Attack on White-Box Cryptography.
- [ACNS 2018] Related-Key Boomerang Attacks on Full ANU Lightweight Block Cipher.
- [ACNS 2018] Generic Round-Function-Recovery Attacks for Feistel Networks over Small Domains.
- [ACNS 2018] Can Caesar Beat Galois? - Robustness of CAESAR Candidates Against Nonce Reusing and High Data Complexity Attacks.
- [ACNS 2018] Assentication: User De-authentication and Lunchtime Attack Mitigation with Seated Posture Biometric.
- [ACNS 2019] Re: What’s Up Johnny? - Covert Content Attacks on Email End-to-End Encryption.
- [ACNS 2019] Hide and Seek: An Architecture for Improving Attack-Visibility in Industrial Control Systems.
- [ACNS 2019] Uncle-Block Attack: Blockchain Mining Threat Beyond Block Withholding for Rational and Uncooperative Miners.
- [ACNS 2020] Classical Misuse Attacks on NIST Round 2 PQC - The Power of Rank-Based Schemes.
- [ACNS 2020] Human Factors in Homograph Attack Recognition.
- [ACNS 2021] Terrorist Attacks for Fake Exposure Notifications in Contact Tracing Systems.
- [ACNS 2021] SnakeGX: A Sneaky Attack Against SGX Enclaves.
- [ACNS 2021] Telepathic Headache: Mitigating Cache Side-Channel Attacks on Convolutional Neural Networks.
- [ACNS 2021] Experimental Review of the IKK Query Recovery Attack: Assumptions, Recovery Rate and Improvements.
- [ACNS 2021] Vestige: Identifying Binary Code Provenance for Vulnerability Detection.
- [ACNS 2021] Defending Web Servers Against Flash Crowd Attacks.
- [ACNS 2022] Beware of Your Vibrating Devices! Vibrational Relay Attacks on Zero-Effort Deauthentication.
- [ACNS 2022] ZLeaks: Passive Inference Attacks on Zigbee Based Smart Homes.
- [ACNS 2022] Passive Query-Recovery Attack Against Secure Conjunctive Keyword Search Schemes.
- [ACNS 2022] Identifying Near-Optimal Single-Shot Attacks on ICSs with Limited Process Knowledge.
- [ACNS 2022] Autoguess: A Tool for Finding Guess-and-Determine Attacks and Key Bridges.
- [ACNS 2022] Improved Differential-Linear Attack with Application to Round-Reduced Speck32/64.
- [ACNS 2023] Low Memory Attacks on Small Key CSIDH.
- [ACNS 2024] A Security Analysis of WPA3-PK: Implementation and Precomputation Attacks.
- [ACNS 2024] DoSat: A DDoS Attack on the Vulnerable Time-Varying Topology of LEO Satellite Networks.
- [ACNS 2024] DDoSMiner: An Automated Framework for DDoS Attack Characterization and Vulnerability Mining.
- [ACNS 2024] ProvIoT : Detecting Stealthy Attacks in IoT through Federated Edge-Cloud Security.
- [ACNS 2024] A Practical Key-Recovery Attack on LWE-Based Key-Encapsulation Mechanism Schemes Using Rowhammer.
- [ACNS 2024] A Side-Channel Attack on a Higher-Order Masked CRYSTALS-Kyber Implementation.
- [ACNS 2024] Time Is Money, Friend! Timing Side-Channel Attack Against Garbled Circuit Constructions.
- [ACNS 2024] Related-Tweak and Related-Key Differential Attacks on HALFLOOP-48.
- [ACNS 2025] Opening Pandora’s Packet: Expose IPv6 Implementations Vulnerabilities Using Differential Fuzzing.
- [ACNS 2025] Key Recovery Attacks on Unpatched MEGA from Four Queries: Solving Approximate Divisor Problem with Help of Approximation of Squared Divisor.
- [ACNS 2025] G-DBREACH Attacks: Algorithmic Techniques for Faster and Stronger Compression Side Channels.
- [ACNS 2025] Decompose and Conquer: ZVP Attacks on GLV Curves.
- [ACNS 2025] Revisiting the Attacker’s Knowledge in Inference Attacks Against Searchable Symmetric Encryption.
- [ACNS 2025] The Impact of SBOM Generators on Vulnerability Assessment in Python: A Comparison and a Novel Approach.
- [ACNS 2025] LaserGuider: A Laser Based Physical Backdoor Attack Against Deep Neural Networks.
- [ACNS 2025] Obfuscation for Deep Neural Networks Against Model Extraction: Attack Taxonomy and Defense Optimization.
- [ASIACCS 2021] Robust and Verifiable Information Embedding Attacks to Deep Neural Networks via Error-Correcting Codes.
- [ASIACCS 2021] A Diversity Index based Scoring Framework for Identifying Smart Meters Launching Stealthy Data Falsification Attacks.
- [ASIACCS 2021] HVAC: Evading Classifier-based Defenses in Hidden Voice Attacks.
- [ASIACCS 2021] CrypTag: Thwarting Physical and Logical Memory Vulnerabilities using Cryptographically Colored Memory.
- [ASIACCS 2021] Robust Roadside Physical Adversarial Attack Against Deep Learning in Lidar Perception Modules.
- [ASIACCS 2021] DeepSweep: An Evaluation Framework for Mitigating DNN Backdoor Attacks using Data Augmentation.
- [ASIACCS 2021] Filtering DDoS Attacks from Unlabeled Network Traffic Data Using Online Deep Learning.
- [ASIACCS 2021] Localizing Vulnerabilities Statistically From One Exploit.
- [ASIACCS 2021] Privilege-Escalation Vulnerability Discovery for Large-scale RPC Services: Principle, Design, and Deployment.
- [ASIACCS 2021] Bran: Reduce Vulnerability Search Space in Large Open Source Repositories by Learning Bug Symptoms.
- [ASIACCS 2021] Targeting the Weakest Link: Social Engineering Attacks in Ethereum Smart Contracts.
- [ASIACCS 2021] Transduction Shield: A Low-Complexity Method to Detect and Correct the Effects of EMI Injection Attacks on Sensors.
- [ASIACCS 2022] Exploring Unfairness on Proof of Authority: Order Manipulation Attacks and Remedies.
- [ASIACCS 2022] Eliminating Sandwich Attacks with the Help of Game Theory.
- [ASIACCS 2022] Mirror, Mirror on the Wall: Wireless Environment Reconfiguration Attacks Based on Fast Software-Controlled Surfaces.
- [ASIACCS 2022] Signal Injection Attacks against CCD Image Sensors.
- [ASIACCS 2022] Confusing and Detecting ML Adversarial Attacks with Injected Attractors.
- [ASIACCS 2022] Model Extraction Attacks on Graph Neural Networks: Taxonomy and Realisation.
- [ASIACCS 2022] PeriScope: Comprehensive Vulnerability Analysis of Mobile App-defined Bluetooth Peripherals.
- [ASIACCS 2022] The Convergence of Source Code and Binary Vulnerability Discovery - A Case Study.
- [ASIACCS 2022] Symbolic Synthesis of Indifferentiability Attacks.
- [ASIACCS 2022] ASAP: Algorithm Substitution Attacks on Cryptographic Protocols.
- [ASIACCS 2022] FLARE: Defending Federated Learning against Model Poisoning Attacks via Latent Space Representations.
- [ASIACCS 2022] Understanding Disparate Effects of Membership Inference Attacks and their Countermeasures.
- [ASIACCS 2022] Wolf at the Door: Preventing Install-Time Attacks in npm with Latch.
- [ASIACCS 2022] Server-Side Browsers: Exploring the Web’s Hidden Attack Surface.
- [ASIACCS 2022] Depth, Breadth, and Complexity: Ways to Attack and Defend Deep Learning Models.
- [ASIACCS 2022] Black-box and Target-specific Attack Against Interpretable Deep Learning Systems.
- [ASIACCS 2022] Vulnerability Detection via Multimodal Learning: Datasets and Analysis.
- [ASIACCS 2022] Towards Polyvalent Adversarial Attacks on URL Classification Engines.
- [ASIACCS 2022] Developing Secured Android Applications by Mitigating Code Vulnerabilities with Machine Learning.
- [ASIACCS 2023] Rethinking IoT Security: Understanding and Mitigating Out-of-Band Vulnerabilities.
- [ASIACCS 2023] LDL: A Defense for Label-Based Membership Inference Attacks.
- [ASIACCS 2023] LoDen: Making Every Client in Federated Learning a Defender Against the Poisoning Membership Inference Attacks.
- [ASIACCS 2023] FlushTime: Towards Mitigating Flush-based Cache Attacks via Collaborating Flush Instructions and Timers on ARMv8-A.
- [ASIACCS 2023] Eliminating Vulnerabilities by Disabling Unwanted Functionality in Binary Programs.
- [ASIACCS 2023] Electromagnetic Signal Injection Attacks on Differential Signaling.
- [ASIACCS 2023] Model Stealing Attacks and Defenses: Where Are We Now?
- [ASIACCS 2023] How Secure Are The Main Real-World Mix Networks - Case Studies To Explore Vulnerabilities And Usability.
- [ASIACCS 2023] Democratizing election verification: new methods for addressing an ancient attacker model.
- [ASIACCS 2023] FLAIR: Defense against Model Poisoning Attack in Federated Learning.
- [ASIACCS 2023] SoK: Systematizing Attack Studies in Federated Learning - From Sparseness to Completeness.
- [ASIACCS 2023] Jujutsu: A Two-stage Defense against Adversarial Patch Attacks on Deep Neural Networks.
- [ASIACCS 2023] Mitigating Adversarial Attacks by Distributing Different Copies to Different Buyers.
- [ASIACCS 2023] SPARTA: Signal Propagation-based Attack Recognition and Threat Avoidance for Automotive Networks.
- [ASIACCS 2023] Investigating Traffic Analysis Attacks on Apple iCloud Private Relay.
- [ASIACCS 2023] CASSOCK: Viable Backdoor Attacks against DNN in the Wall of Source-Specific Backdoor Defenses.
- [ASIACCS 2023] Uncovering Vulnerabilities of Bluetooth Low Energy IoT from Companion Mobile Apps with Ble-Guuide.
- [ASIACCS 2023] POSTER: Toward Intelligent Cyber Attacks for Moving Target Defense Techniques in Software-Defined Networking.
- [ASIACCS 2024] Generic and Automated Drive-by GPU Cache Attacks from the Browser.
- [ASIACCS 2024] WebGPU-SPY: Finding Fingerprints in the Sandbox through GPU Cache Attacks.
- [ASIACCS 2024] SoK: Can We Really Detect Cache Side-Channel Attacks by Monitoring Performance Counters?
- [ASIACCS 2024] PowSpectre: Powering Up Speculation Attacks with TSX-based Replay.
- [ASIACCS 2024] Pairwise and Parallel: Enhancing the Key Mismatch Attacks on Kyber and Beyond.
- [ASIACCS 2024] External Attack-Surface of Modern Organizations.
- [ASIACCS 2024] Cryptography in the Wild: An Empirical Analysis of Vulnerabilities in Cryptographic Libraries.
- [ASIACCS 2024] Sync-Millibottleneck Attack on Microservices Cloud Architecture.
- [ASIACCS 2024] RootFree Attacks: Exploiting Mobile Platform’s Super Apps From Desktop.
- [ASIACCS 2024] Diagnosis-guided Attack Recovery for Securing Robotic Vehicles from Sensor Deception Attacks.
- [ASIACCS 2024] Uncovering Covert Attacks on EV Charging Infrastructure: How OCPP Backend Vulnerabilities Could Compromise Your System.
- [ASIACCS 2024] Model Extraction Attacks Revisited.
- [ASIACCS 2024] VLIA: Navigating Shadows with Proximity for Highly Accurate Visited Location Inference Attack against Federated Recommendation Models.
- [ASIACCS 2024] Self-Supervised Fine-Tuning of Automatic Speech Recognition Systems against Signal Processing Attacks.
- [ASIACCS 2024] Mitigating Distributed Backdoor Attack in Federated Learning Through Mode Connectivity.
- [ASIACCS 2024] PARL: Poisoning Attacks Against Reinforcement Learning-based Recommender Systems.
- [ASIACCS 2024] SecPLF: Secure Protocols for Loanable Funds against Oracle Manipulation Attacks.
- [ASIACCS 2024] What All the PHUZZ Is About: A Coverage-guided Fuzzer for Finding Vulnerabilities in PHP Web Applications.
- [ASIACCS 2024] POSTER: Double-Dip: Thwarting Label-Only Membership Inference Attacks with Transfer Learning and Randomization.
- [ASIACCS 2024] POSTER: Defense against False Data Injection Attack in a Cyber-Physical System.
- [ASIACCS 2024] POSTER: Identifying and Mitigating Vulnerabilities in LLM-Integrated Applications.
- [ASIACCS 2024] POSTER: Multi-Block Fusion Mechanism for Multi-label Vulnerability Detection in Smart Contracts.
- [ASIACCS 2024] POSTER: iTieProbe: Is IoT Device Provisioning secure against MAC Layer authentication-token based replay attacks?
- [ACISP 2010] Repelling Sybil-Type Attacks in Wireless Ad Hoc Systems.
- [ACISP 2011] New Impossible Differential Attacks of Reduced-Round Camellia-192 and Camellia-256.
- [ACISP 2011] Results on the Immunity of Boolean Functions against Probabilistic Algebraic Attacks.
- [ACISP 2011] Preimage Attacks on Full-ARIRANG (Poster).
- [ACISP 2012] Low Data Complexity Attack on Reduced Camellia-256.
- [ACISP 2012] An Algebraic Broadcast Attack against NTRU.
- [ACISP 2013] A Chosen IV Related Key Attack on Grain-128a.
- [ACISP 2013] Attacks on Multi-Prime RSA with Small Prime Difference.
- [ACISP 2013] Improved Boomerang Attacks on SM3.
- [ACISP 2013] Related-Key Boomerang Attacks on KATAN32/48/64.
- [ACISP 2013] Highly Accurate Key Extraction Method for Access-Driven Cache Attacks Using Correlation Coefficient.
- [ACISP 2014] Differential and Impossible Differential Related-Key Attacks on Hierocrypt-L1.
- [ACISP 2014] On Selection of Samples in Algebraic Attacks and a New Technique to Find Hidden Low Degree Equations.
- [ACISP 2014] Low Data Complexity Inversion Attacks on Stream Ciphers via Truncated Compressed Preimage Sets.
- [ACISP 2014] A New Attack against the Selvi-Vivek-Rangan Deterministic Identity Based Signature Scheme from ACISP 2012.
- [ACISP 2014] Further Research on N-1 Attack against Exponentiation Algorithms.
- [ACISP 2014] Lattice Decoding Attacks on Binary LWE.
- [ACISP 2015] Preventing Fault Attacks Using Fault Randomization with a Case Study on AES.
- [ACISP 2016] A Survey on the Cyber Attacks Against Non-linear State Estimation in Smart Grids.
- [ACISP 2016] Partial Key Exposure Attacks on RSA with Multiple Exponent Pairs.
- [ACISP 2016] A New Attack on Three Variants of the RSA Cryptosystem.
- [ACISP 2016] Improved Rebound Attacks on AESQ: Core Permutation of CAESAR Candidate PAEQ.
- [ACISP 2016] Improved (related-key) Attacks on Round-Reduced KATAN-32/48/64 Based on the Extended Boomerang Framework.
- [ACISP 2016] Linear Hull Attack on Round-Reduced Simeck with Dynamic Key-Guessing Techniques.
- [ACISP 2017] ID-Based Encryption with Equality Test Against Insider Attack.
- [ACISP 2017] Fault Attacks on XEX Mode with Application to Certain Authenticated Encryption Modes.
- [ACISP 2017] Improved Factoring Attacks on Multi-prime RSA with Small Prime Difference.
- [ACISP 2017] Improved Integral Attack on HIGHT.
- [ACISP 2017] Process Control Cyber-Attacks and Labelled Datasets on S7Comm Critical Infrastructure.
- [ACISP 2017] Solving the DLP with Low Hamming Weight Product Exponents and Improved Attacks on the GPS Identification Scheme.
- [ACISP 2018] Distributed Time-Memory Tradeoff Attacks on Ciphers - (with Application to Stream Ciphers and Counter Mode).
- [ACISP 2018] A New Framework for Finding Nonlinear Superpolies in Cube Attacks Against Trivium-Like Ciphers.
- [ACISP 2018] Differential Attacks on Reduced Round LILLIPUT.
- [ACISP 2018] Asymmetric Subversion Attacks on Signature Schemes.
- [ACISP 2018] Complete Attack on RLWE Key Exchange with Reused Keys, Without Signal Leakage.
- [ACISP 2018] New Attacks and Secure Design for Anonymous Distance-Bounding.
- [ACISP 2018] TDDAD: Time-Based Detection and Defense Scheme Against DDoS Attack on SDN Controller.
- [ACISP 2018] Live Path CFI Against Control Flow Hijacking Attacks.
- [ACISP 2019] Risk of Asynchronous Protocol Update: Attacks to Monero Protocols.
- [ACISP 2019] A Combined Micro-block Chain Truncation Attack on Bitcoin-NG.
- [ACISP 2019] The Wiener Attack on RSA Revisited: A Quest for the Exact Bound.
- [ACISP 2019] AMOGAP: Defending Against Man-in-the-Middle and Offline Guessing Attacks on Passwords.
- [ACISP 2019] Related-Key Boomerang Attacks on GIFT with Automated Trail Search Including BCT Effect.
- [ACISP 2019] Fast Chosen-Key Distinguish Attacks on Round-Reduced AES-192.
- [ACISP 2019] Automated Cash Mining Attacks on Mobile Advertising Networks.
- [ACISP 2020] DCONST: Detection of Multiple-Mix-Attack Malicious Nodes Using Consensus-Based Trust in IoT Networks.
- [ACISP 2020] A Black-Box Attack on Neural Networks Based on Swarm Evolutionary Algorithm.
- [ACISP 2020] PALOR: Poisoning Attacks Against Logistic Regression.
- [ACISP 2020] Rolling Attack: An Efficient Way to Reduce Armors of Office Automation Devices.
- [ACISP 2020] Improving Key Mismatch Attack on NewHope with Fewer Queries.
- [ACISP 2020] Design and Evaluation of Enumeration Attacks on Package Tracking Systems.
- [ACISP 2021] Algebraic Attacks on Round-Reduced Keccak.
- [ACISP 2021] Distinguishing and Key Recovery Attacks on the Reduced-Round SNOW-V.
- [ACISP 2021] Mind the Scraps: Attacking Blockchain Based on Selfdestruct.
- [ACISP 2022] Key Structures: Improved Related-Key Boomerang Attack Against the Full AES-256.
- [ACISP 2022] Improved Differential Attack on Round-Reduced LEA.
- [ACISP 2022] Handle the Traces: Revisiting the Attack on ECDSA with EHNP.
- [ACISP 2022] Hybrid Dual and Meet-LWE Attack.
- [ACISP 2023] A New Correlation Cube Attack Based on Division Property.
- [ACISP 2023] Key Recovery Attacks on Grain-Like Keystream Generators with Key Injection.
- [ACISP 2023] Related-Cipher Attacks: Applications to Ballet and ANT.
- [ACISP 2024] The Offline Quantum Attack Against Modular Addition Variant of Even-Mansour Cipher.
- [ACISP 2024] Known-Key Attack on GIFT-64 and GIFT-64[g0c] Based on Correlation Matrices.
- [ACISP 2024] Differential Distinguishing Attacks on SNOW-V, SNOW-Vi and KCipher-2.
- [ACISP 2024] On the Feasibility of Identity-Based Encryption with Equality Test Against Insider Attacks.
- [ACISP 2024] Automatic Quantum Multi-collision Distinguishers and Rebound Attacks with Triangulation Algorithm.
- [ACISP 2024] Revisiting the Security of Fiat-Shamir Signature Schemes Under Superposition Attacks.
- [ACISP 2024] Improved Lattice-Based Attack on Mersenne Low Hamming Ratio Search Problem.
- [ACISP 2024] Revisiting Impossible Differential Cryptanalysis and Expanding the Application of MILP in Impossible Differential Attack.
- [ACISP 2024] Unveiling the Unseen: Video Recognition Attacks on Social Software.
- [ACISP 2024] Efficient Vulnerability Detection for Smart Contracts Using Gated Graph Neural Network.
- [ACISP 2024] Detect Llama - Finding Vulnerabilities in Smart Contracts Using Large Language Models.
- [ACISP 2025] Forgery Attacks on SipHash.
- [ACISP 2025] Cryptanalysis of Fruit-F: Exploiting Key-Derivation Weaknesses and Initialization Vulnerabilities.
- [ACISP 2025] Exploring Key-Recovery-Friendly Differential Distinguishers for SM4 and Their Performance in Differential Attacks.
- [ACISP 2025] Lattice Attack with EHNP: Key Recovery from Two ECDSA Signatures and Breaking the Information-Theoretic Limit.
- [ACISP 2025] Breaking the Shield: Novel Fault Attacks on CRYSTALS-Dilithium.
- [ACISP 2025] Partial Key Exposure Attacks on UOV and Its Variants.
- [ACISP 2025] Get Rid of Templates: A Chosen-Ciphertext Attack on ML-KEM with a DPA-Based Self-comparison Oracle.
- [ACISP 2025] Identifying the Truth of Global Model: A Generic Solution to Defend Against Byzantine and Backdoor Attacks in Federated Learning.
- [ACISP 2025] RAGLeak: Membership Inference Attacks on RAG-Based Large Language Models.
- [ACISP 2025] LPIA: Label Preference Inference Attack Against Federated Graph Learning.
- [ACISP 2025] DARA: Enhancing Vulnerability Alignment via Adaptive Reconstruction and Dual-Level Attention.
- [ACISP 2025] Mitigating the Unprivileged User Namespaces Based Privilege Escalation Attacks with Linux Capabilities.
- [ACISP 2025] Facial Authentication Security Evaluation Against Deepfake Attacks in Mobile Apps.
- [DIMVA 2010] Detection of Intrusions and Malware, and Vulnerability Assessment, 7th International Conference, DIMVA 2010, Bonn, Germany, July 8-9, 2010. Proceedings.
- [DIMVA 2010] Why Johnny Can’t Pentest: An Analysis of Black-Box Web Vulnerability Scanners.
- [DIMVA 2010] HProxy: Client-Side Detection of SSL Stripping Attacks.
- [DIMVA 2011] Detection of Intrusions and Malware, and Vulnerability Assessment - 8th International Conference; DIMVA 2011, Amsterdam, The Netherlands, July 7-8, 2011. Proceedings.
- [DIMVA 2011] Protecting against DNS Reflection Attacks with Bloom Filters.
- [DIMVA 2011] Effective Network Vulnerability Assessment through Model Abstraction.
- [DIMVA 2011] Decoy Document Deployment for Effective Masquerade Attack Detection.
- [DIMVA 2011] Reverse Social Engineering Attacks in Online Social Networks.
- [DIMVA 2011] Timing Attacks on PIN Input in VoIP Networks (Short Paper).
- [DIMVA 2011] Mitigating Cross-Site Form History Spamming Attacks with Domain-Based Ranking.
- [DIMVA 2011] Code Pointer Masking: Hardening Applications against Code Injection Attacks.
- [DIMVA 2012] Detection of Intrusions and Malware, and Vulnerability Assessment - 9th International Conference, DIMVA 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papers.
- [DIMVA 2012] BISSAM: Automatic Vulnerability Identification of Office Documents.
- [DIMVA 2013] Detection of Intrusions and Malware, and Vulnerability Assessment - 10th International Conference, DIMVA 2013, Berlin, Germany, July 18-19, 2013. Proceedings.
- [DIMVA 2013] SMS-Based One-Time Passwords: Attacks and Defense - (Short Paper).
- [DIMVA 2013] Towards the Protection of Industrial Control Systems - Conclusions of a Vulnerability Analysis of Profinet IO.
- [DIMVA 2014] Detection of Intrusions and Malware, and Vulnerability Assessment - 11th International Conference, DIMVA 2014, Egham, UK, July 10-11, 2014. Proceedings.
- [DIMVA 2014] Attacks on Android Clipboard.
- [DIMVA 2014] Parallelization of Network Intrusion Detection Systems under Attack Conditions.
- [DIMVA 2014] Quantifiable Run-Time Kernel Attack Surface Reduction.
- [DIMVA 2014] Bee Master: Detecting Host-Based Code Injection Attacks.
- [DIMVA 2015] Detection of Intrusions and Malware, and Vulnerability Assessment - 12th International Conference, DIMVA 2015, Milan, Italy, July 9-10, 2015, Proceedings.
- [DIMVA 2015] Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks.
- [DIMVA 2015] Capturing DDoS Attack Dynamics Behind the Scenes.
- [DIMVA 2015] More Guidelines Than Rules: CSRF Vulnerabilities from Noncompliant OAuth 2.0 Implementations.
- [DIMVA 2016] Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedings.
- [DIMVA 2016] Subverting Operating System Properties Through Evolutionary DKOM Attacks.
- [DIMVA 2016] DeepFuzz: Triggering Vulnerabilities Deeply Hidden in Binaries - (Extended Abstract).
- [DIMVA 2016] AutoRand: Automatic Keyword Randomization to Prevent Injection Attacks.
- [DIMVA 2016] AVRAND: A Software-Based Defense Against Code Reuse Attacks for AVR Embedded Devices.
- [DIMVA 2016] Towards Vulnerability Discovery Using Staged Program Analysis.
- [DIMVA 2016] Flush+Flush: A Fast and Stealthy Cache Attack.
- [DIMVA 2016] Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript.
- [DIMVA 2017] Detection of Intrusions and Malware, and Vulnerability Assessment - 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings.
- [DIMVA 2017] Malware Guard Extension: Using SGX to Conceal Cache Attacks.
- [DIMVA 2017] A Stealth, Selective, Link-Layer Denial-of-Service Attack Against Automotive Networks.
- [DIMVA 2017] Quincy: Detecting Host-Based Code Injection Attacks in Memory Dumps.
- [DIMVA 2018] Detection of Intrusions and Malware, and Vulnerability Assessment - 15th International Conference, DIMVA 2018, Saclay, France, June 28-29, 2018, Proceedings.
- [DIMVA 2018] GuardION: Practical Mitigation of DMA-Based Rowhammer Attacks on ARM.
- [DIMVA 2018] BINARM: Scalable and Efficient Detection of Vulnerabilities in Firmware Images of Intelligent Electronic Devices.
- [DIMVA 2018] Bytecode Corruption Attacks Are Real - And How to Defend Against Them.
- [DIMVA 2019] Detection of Intrusions and Malware, and Vulnerability Assessment - 16th International Conference, DIMVA 2019, Gothenburg, Sweden, June 19-20, 2019, Proceedings.
- [DIMVA 2019] Overshadow PLC to Detect Remote Control-Logic Injection Attacks.
- [DIMVA 2019] Memory Categorization: Separating Attacker-Controlled Data.
- [DIMVA 2019] No Need to Marry to Change Your Name! Attacking Profinet IO Automation Networks Using DCP.
- [DIMVA 2020] Detection of Intrusions and Malware, and Vulnerability Assessment - 17th International Conference, DIMVA 2020, Lisbon, Portugal, June 24-26, 2020, Proceedings.
- [DIMVA 2020] Backstabber’s Knife Collection: A Review of Open Source Software Supply Chain Attacks.
- [DIMVA 2020] Putting Attacks in Context: A Building Automation Testbed for Impact Assessment from the Victim’s Perspective.
- [DIMVA 2020] Understanding Android VoIP Security: A System-Level Vulnerability Assessment.
- [DIMVA 2020] Sec2graph: Network Attack Detection Based on Novelty Detection on Graph Structured Data.
- [DIMVA 2021] Detection of Intrusions and Malware, and Vulnerability Assessment - 18th International Conference, DIMVA 2021, Virtual Event, July 14-16, 2021, Proceedings.
- [DIMVA 2021] The Full Gamut of an Attack: An Empirical Analysis of OAuth CSRF in the Wild.
- [DIMVA 2021] Detecting and Measuring In-The-Wild DRDoS Attacks at IXPs.
- [DIMVA 2021] Specularizer : Detecting Speculative Execution Attacks via Performance Tracing.
- [DIMVA 2021] Aion Attacks: Manipulating Software Timers in Trusted Execution Environment.
- [DIMVA 2021] Calibration Done Right: Noiseless Flush+Flush Attacks.
- [DIMVA 2022] Detection of Intrusions and Malware, and Vulnerability Assessment - 19th International Conference, DIMVA 2022, Cagliari, Italy, June 29 - July 1, 2022, Proceedings.
- [DIMVA 2022] VANDALIR: Vulnerability Analyses Based on Datalog and LLVM-IR.
- [DIMVA 2022] Branch Different - Spectre Attacks on Apple Silicon.
- [DIMVA 2022] Amplification Chamber: Dissecting the Attack Infrastructure of Memcached DRDoS Attacks.
- [DIMVA 2022] Consistency is All I Ask: Attacks and Countermeasures on the Network Context of Distributed Honeypots.
- [DIMVA 2023] Detection of Intrusions and Malware, and Vulnerability Assessment - 20th International Conference, DIMVA 2023, Hamburg, Germany, July 12-14, 2023, Proceedings.
- [DIMVA 2023] PwrLeak: Exploiting Power Reporting Interface for Side-Channel Attacks on AMD SEV.
- [DIMVA 2023] Madvex: Instrumentation-Based Adversarial Attacks on Machine Learning Malware Detection.
- [DIMVA 2023] Honey, I Chunked the Passwords: Generating Semantic Honeywords Resistant to Targeted Attacks Using Pre-trained Language Models.
- [DIMVA 2023] White-Box Concealment Attacks Against Anomaly Detectors for Cyber-Physical Systems.
- [DIMVA 2023] Attackers as Instructors: Using Container Isolation to Reduce Risk and Understand Vulnerabilities.
- [DIMVA 2023] Divak: Non-invasive Characterization of Out-of-Bounds Write Vulnerabilities.
- [DIMVA 2024] Detection of Intrusions and Malware, and Vulnerability Assessment - 21st International Conference, DIMVA 2024, Lausanne, Switzerland, July 17-19, 2024, Proceedings.
- [DIMVA 2024] Acoustic Side-Channel Attacks on a Computer Mouse.
- [DIMVA 2024] Constructs of Deceit: Exploring Nuances in Modern Social Engineering Attacks.
- [DIMVA 2024] Evading Userland API Hooking, Again: Novel Attacks and a Principled Defense Method.
- [DIMVA 2024] Bringing UFUs Back into the Air with FUEL: A Framework for Evaluating the Effectiveness of Unrestricted File Upload Vulnerability Scanners.
- [DIMVA 2024] Extended Abstract: Assessing GNSS Vulnerabilities in Smart Grids.
- [DIMVA 2025] Detection of Intrusions and Malware, and Vulnerability Assessment - 22nd International Conference, DIMVA 2025, Graz, Austria, July 9-11, 2025, Proceedings, Part I.
- [DIMVA 2025] Domain Name Encryption Does Not Ensure Privacy: Website Fingerprinting Attack With Only a Few Samples Using Siamese Network.
- [DIMVA 2025] Making (Only) the Right Calls: Preventing Remote Code Execution Attacks in PHP Applications with Contextual, State-Sensitive System Call Filtering.
- [DIMVA 2025] CodeGrafter: Unifying Source and Binary Graphs for Robust Vulnerability Detection.
- [DIMVA 2025] Poster: Machine Learning for Vulnerability Detection as Target Oracle in Automated Fuzz Driver Generation.
- [DIMVA 2025] Cohere+Reload: Re-enabling High-Resolution Cache Attacks on AMD SEV-SNP.
- [DIMVA 2025] Detection of Intrusions and Malware, and Vulnerability Assessment - 22nd International Conference, DIMVA 2025, Graz, Austria, July 9-11, 2025, Proceedings, Part II.
- [DIMVA 2025] Poster: SPECK: From Google Textual Guidelines to Automatic Detection of Android Apps Vulnerabilities.
- [DIMVA 2025] Linux Hurt Itself in Its Confusion! Exploiting Out-of-Memory Killer for Confusion Attacks via Heuristic Manipulation.
- [FC 2010] Multichannel Protocols to Prevent Relay Attacks.
- [FC 2010] A Traceability Attack against e-Passports.
- [FC 2010] The Phish-Market Protocol: Securely Sharing Attack Data between Competitors.
- [FC 2010] PKI Layer Cake: New Collision Attacks against the Global X.509 Infrastructure.
- [FC 2010] Attacking of SmartCard-Based Banking Applications with JavaScript-Based Rootkits.
- [FC 2010] Shoulder-Surfing Safe Login in a Partially Observable Attacker Model.
- [FC 2011] An Attack on PUF-Based Session Key Exchange and a Hardware-Based Countermeasure: Erasable PUFs.
- [FC 2011] Certified Lies: Detecting and Defeating Government Interception Attacks against SSL (Short Paper).
- [FC 2011] Quo Vadis? A Study of the Evolution of Input Validation Vulnerabilities in Web Applications.
- [FC 2012] Attacking the Washington, D.C. Internet Voting System.
- [FC 2012] A Cache Timing Attack on AES in Virtualization Environments.
- [FC 2013] “Give Me Letters 2, 3 and 6!”: Partial Password Implementations and Attacks.
- [FC 2013] How to Attack Two-Factor Authentication Internet Banking.
- [FC 2013] Securing Anonymous Communication Channels under the Selective DoS Attack.
- [FC 2014] Digital Check Forgery Attacks on Client Check Truncation Systems.
- [FC 2014] Attack on U-Prove Revocation Scheme from FC’13 - Passing Verification by Revoked Users.
- [FC 2015] Are You at Risk? Profiling Organizations and Individuals Subject to Targeted Attacks.
- [FC 2015] Protecting Encrypted Cookies from Compression Side-Channel Attacks.
- [FC 2015] Hard Drive Side-Channel Attacks Using Smartphone Magnetic Field Sensors.
- [FC 2016] Android UI Deception Revisited: Attacks and Defenses.
- [FC 2016] DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android (Short Paper).
- [FC 2016] A Sound for a Sound: Mitigating Acoustic Side Channel Attacks on Password Keystrokes with Active Sounds.
- [FC 2016] Refund Attacks on Bitcoin’s Payment Protocol.
- [FC 2017] Fantastic Timers and Where to Find Them: High-Resolution Microarchitectural Attacks in JavaScript.
- [FC 2017] Attacks on Secure Logging Schemes.
- [FC 2017] Short Paper: Addressing Sophisticated Email Attacks.
- [FC 2018] Attacks Against GSMA’s M2M Remote Provisioning (Short Paper).
- [FC 2018] Not So Predictable Mining Pools: Attacking Solo Mining Pools by Bagging Blocks and Conning Competitors.
- [FC 2018] A Fourier Analysis Based Attack Against Physically Unclonable Functions.
- [FC 2019] Biased Nonce Sense: Lattice Attacks Against Weak ECDSA Signatures in Cryptocurrencies.
- [FC 2019] Short Paper: I Can’t Believe It’s Not Stake! Resource Exhaustion Attacks on PoS.
- [FC 2019] Short Paper: Making Contactless EMV Robust Against Rogue Readers Colluding with Relay Attackers.
- [FC 2019] Short Paper: How to Attack PSD2 Internet Banking.
- [FC 2020] Coded Merkle Tree: Solving Data Availability Attacks in Blockchains.
- [FC 2020] LockDown: Balance Availability Attack Against Lightning Network Channels.
- [FC 2021] Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit.
- [FC 2021] The Eye of Horus: Spotting and Analyzing Attacks on Ethereum Smart Contracts.
- [FC 2021] Perimeter: A Network-Layer Attack on the Anonymity of Cryptocurrencies.
- [FC 2021] Congestion Attacks in Payment Channel Networks.
- [FC 2021] Selfish Mining Attacks Exacerbated by Elastic Hash Supply.
- [FC 2022] Arbitrage Attack: Miners of the World, Unite!
- [FC 2022] Three Attacks on Proof-of-Stake Ethereum.
- [FC 2022] India’s “Aadhaar” Biometric ID: Structure, Security, and Vulnerabilities.
- [FC 2023] On the Sustainability of Bitcoin Partitioning Attacks.
- [FC 2023] Defending Against Free-Riders Attacks in Distributed Generative Adversarial Networks.
- [FC 2024] Goldfish: No More Attacks on Ethereum?!
- [FC 2024] Remote Scheduler Contention Attacks.
- [TRUSTCOM 2011] Defending against Large-Scale and Coordinated Attacks in the Ubiquitous Environments.
- [TRUSTCOM 2011] A Cooperative Mechanism to Defense against Distributed Denial of Service Attacks.
- [TRUSTCOM 2011] Estimates of Success Rates of Denial-of-Service Attacks.
- [TRUSTCOM 2011] Uncovering SIP Vulnerabilities to DoS Attacks Using Coloured Petri Nets.
- [TRUSTCOM 2011] Launching Return-Oriented Programming Attacks against Randomized Relocatable Executables.
- [TRUSTCOM 2011] A Privacy-Preserving Defense Mechanism against Request Forgery Attacks.
- [TRUSTCOM 2011] A Survey on Latest Botnet Attack and Defense.
- [TRUSTCOM 2011] Holistic Solution for Confining Insider Attacks in Wireless Sensor Networks Using Reputation Systems Coupled with Clustering Techniques.
- [TRUSTCOM 2011] LoongChecker: Practical Summary-Based Semi-simulation to Detect Vulnerability in Binary Code.
- [TRUSTCOM 2011] Attack Vector Analysis and Privacy-Preserving Social Network Data Publishing.
- [TRUSTCOM 2011] Study on IP Prefix Hijacking in Cloud Computing Networks Based on Attack Planning.
- [TRUSTCOM 2011] A Hardware/Software Countermeasure and a Testing Framework for Cache Based Side Channel Attacks.
- [TRUSTCOM 2011] Detection DoS Attack on FPGA Using Fuzzy Association Rules.
- [TRUSTCOM 2011] Time-Based Detection and Location of Wormhole Attacks in Wireless Ad Hoc Networks.
- [TRUSTCOM 2012] The Effectiveness of Intersection Attack Countermeasures for Graphical Passwords.
- [TRUSTCOM 2012] Divide and Conquer: An Efficient Attack on Yahoo! CAPTCHA.
- [TRUSTCOM 2012] Implementing an Attack on Bluetooth 2.1+ Secure Simple Pairing in Passkey Entry Mode.
- [TRUSTCOM 2012] Research on Time Synchronization and Flow Aggregation in LDDoS Attack Based on Cross-correlation.
- [TRUSTCOM 2012] Triangle-Area-Based Multivariate Correlation Analysis for Effective Denial-of-Service Attack Detection.
- [TRUSTCOM 2012] A Taxonomy of Trust and Reputation System Attacks.
- [TRUSTCOM 2012] An Active Detection Mechanism for Detecting ICMP Based Attacks.
- [TRUSTCOM 2012] Vulnerabilities through Usability Pitfalls in Cloud Services: Security Problems due to Unverified Email Addresses.
- [TRUSTCOM 2012] Insider Attacks in Cloud Computing.
- [TRUSTCOM 2012] A Lightweight Privacy Preserving Approach for Analyzing Communication Records to Prevent VoIP Attacks Using Toll Fraud as an Example.
- [TRUSTCOM 2012] Static Detection of Logic Vulnerabilities in Java Web Applications.
- [TRUSTCOM 2012] Enhanced EDoS-Shield for Mitigating EDoS Attacks Originating from Spoofed IP Addresses.
- [TRUSTCOM 2012] Locating the Attacker of Wormhole Attack by Using the Honeypot.
- [TRUSTCOM 2012] Malicious AODV: Implementation and Analysis of Routing Attacks in MANETs.
- [TRUSTCOM 2013] A Threat to Mobile Cyber-Physical Systems: Sensor-Based Privacy Theft Attacks on Android Smartphones.
- [TRUSTCOM 2013] DDoS Attack Detection at Local Area Networks Using Information Theoretical Metrics.
- [TRUSTCOM 2013] Visual Analytics Model for Intrusion Detection in Flood Attack.
- [TRUSTCOM 2013] A Regional Statistics Detection Scheme against Sybil Attacks in WSNs.
- [TRUSTCOM 2013] Scalable Attack Representation Model Using Logic Reduction Techniques.
- [TRUSTCOM 2013] Reputation Attacks Detection for Effective Trust Assessment among Cloud Services.
- [TRUSTCOM 2013] Cloud Computing: Insider Attacks on Virtual Machines during Migration.
- [TRUSTCOM 2013] Developing an Empirical Algorithm for Protecting Text-Based CAPTCHAs against Segmentation Attacks.
- [TRUSTCOM 2013] Research on the Anti-attack Design Principles of Low-Latency Anonymous Communication.
- [TRUSTCOM 2013] Development and Analysis of Generic VoIP Attack Sequences Based on Analysis of Real Attack Traffic.
- [TRUSTCOM 2013] A Novel Evidential Evaluation for Internal Attacks with Dempster-Shafer Theory in WSN.
- [TRUSTCOM 2013] De-anonymization Attack on Geolocated Data.
- [TRUSTCOM 2013] Shear-Based Spatial Transformation to Protect Proximity Attack in Outsourced Database.
- [TRUSTCOM 2013] Defend against Collusive SSDF Attack Using Trust in Cooperative Spectrum Sensing Environment.
- [TRUSTCOM 2014] A Survey of Security Network Coding toward Various Attacks.
- [TRUSTCOM 2014] Public-Key Encryption Resilient against Linear Related-Key Attacks Revisited.
- [TRUSTCOM 2014] The Micro-architectural Support Countermeasures against the Branch Prediction Analysis Attack.
- [TRUSTCOM 2014] Attack Tree Based Android Malware Detection with Hybrid Analysis.
- [TRUSTCOM 2014] Systematic Analysis and Detection of Misconfiguration Vulnerabilities in Android Smartphones.
- [TRUSTCOM 2014] Attacks on Physically-Embedded Data Encryption for Embedded Devices.
- [TRUSTCOM 2014] Escrow: A Large-Scale Web Vulnerability Assessment Tool.
- [TRUSTCOM 2015] Cooperative Transmission Against Impersonation Attack Using Inter-Session Interference in Two-Hop Wireless Networks.
- [TRUSTCOM 2015] Loop-Oriented Programming: A New Code Reuse Attack to Bypass Modern Defenses.
- [TRUSTCOM 2015] A Sybil Attack Detection Scheme for a Centralized Clustering-Based Hierarchical Network.
- [TRUSTCOM 2015] Diversifying SQL to Prevent Injection Attacks.
- [TRUSTCOM 2015] CaptureMe: Attacking the User Credential in Mobile Banking Applications.
- [TRUSTCOM 2015] DroidCIA: A Novel Detection Method of Code Injection Attacks on HTML5-Based Mobile Apps.
- [TRUSTCOM 2015] A Taxonomy of Cloud Attack Consequences and Mitigation Strategies: The Role of Access Control and Privileged Access Management.
- [TRUSTCOM 2015] A Global, Empirical Analysis of the Shellshock Vulnerability in Web Applications.
- [TRUSTCOM 2015] Mission-Aware Vulnerability Assessment for Cyber-Physical Systems.
- [TRUSTCOM 2015] A Rejuvenation Model for Software System under Normal Attack.
- [TRUSTCOM 2015] Unblocking Stolen Mobile Devices Using SS7-MAP Vulnerabilities: Exploiting the Relationship between IMEI and IMSI for EIR Access.
- [TRUSTCOM 2016] Group-Based Memory Deduplication against Covert Channel Attacks in Virtualized Environments.
- [TRUSTCOM 2016] Cache Control Method Mitigating Packet Concentration of Router Caused by Interest Flooding Attack.
- [TRUSTCOM 2016] Considering Internal Vulnerabilities and the Attacker’s Knowledge to Model the Impact of Cyber Events as Geometrical Prisms.
- [TRUSTCOM 2016] Code Reuse Attack Mitigation Based on Function Randomization without Symbol Table.
- [TRUSTCOM 2016] Security Analysis and Vulnerability Detection of Gesture-Based Lock in Android Applications.
- [TRUSTCOM 2016] A Game-Theoretic Model on Coalitional Attacks in Smart Grid.
- [TRUSTCOM 2016] What If Routers Are Malicious? Mitigating Content Poisoning Attack in NDN.
- [TRUSTCOM 2016] Taxonomy of Man-in-the-Middle Attacks on HTTPS.
- [TRUSTCOM 2016] Whispers between the Containers: High-Capacity Covert Channel Attacks in Docker.
- [TRUSTCOM 2016] Design and Evaluation of Advanced Collusion Attacks on Collaborative Intrusion Detection Networks in Practice.
- [TRUSTCOM 2016] A Trust-Based Cooperative Spectrum Sensing Scheme against SSDF Attack in CRNs.
- [TRUSTCOM 2016] Privacy Preservation in Social Network against Public Neighborhood Attacks.
- [TRUSTCOM 2016] Bad Data Injection Attacks Identification in Power System on Fast Decoupled Load Flow.
- [TRUSTCOM 2016] A Hadoop Based Analysis and Detection Model for IP Spoofing Typed DDoS Attack.
- [TRUSTCOM 2017] On the Effectiveness of Ambient Sensing for Detecting NFC Relay Attacks.
- [TRUSTCOM 2017] A Passive Client-based Approach to Detect Evil Twin Attacks.
- [TRUSTCOM 2017] An Automated Formal Process for Detecting Fault Injection Vulnerabilities in Binaries and Case Study on PRESENT.
- [TRUSTCOM 2017] Feedback Entropy: A New Metric to Detect Unfair Rating Attacks for Trust Computing in Cloud Environments.
- [TRUSTCOM 2017] A Fault-based Attack on AEZ v4.2.
- [TRUSTCOM 2017] Anonymous Anti-Sybil Attack Protocol for Mobile Healthcare Networks Analytics.
- [TRUSTCOM 2017] Investigating Cube Attacks on the Authenticated Encryption Stream Cipher MORUS.
- [TRUSTCOM 2017] An Integration Testing Platform for Software Vulnerability Detection Method.
- [TRUSTCOM 2017] Fault Injection Attack on Salsa20 and ChaCha and a Lightweight Countermeasure.
- [TRUSTCOM 2017] Performance Evaluation of RPL Protocol under Mobile Sybil Attacks.
- [TRUSTCOM 2017] Visualizing the New Zealand Cyber Security Challenge for Attack Behaviors.
- [TRUSTCOM 2018] A Reinforcement Learning Approach for Attack Graph Analysis.
- [TRUSTCOM 2018] DDoS Flooding Attack Detection Based on Joint-Entropy with Multiple Traffic Features.
- [TRUSTCOM 2018] Application of Visual Analysis to Detect and Analyze Patterns in VoIP Attack Traffic.
- [TRUSTCOM 2018] Cache-Collision Attacks on GPU-Based AES Implementation with Electro-Magnetic Leakages.
- [TRUSTCOM 2018] An Improved Monte Carlo Graph Search Algorithm for Optimal Attack Path Analysis.
- [TRUSTCOM 2018] AES Design Improvements Towards Information Security Considering Scan Attack.
- [TRUSTCOM 2018] Good Vibrations: Artificial Ambience-Based Relay Attack Detection.
- [TRUSTCOM 2018] Selecting System Specific Cybersecurity Attack Patterns Using Topic Modeling.
- [TRUSTCOM 2018] Inscription: Thwarting ActionScript Web Attacks From Within.
- [TRUSTCOM 2018] A Malicious Attack on the Machine Learning Policy of a Robotic System.
- [TRUSTCOM 2018] Black Hole Attack Prevention Method Using Multiple RREPs in Mobile Ad Hoc Networks.
- [TRUSTCOM 2018] FlowHacker: Detecting Unknown Network Attacks in Big Traffic Data Using Network Flows.
- [TRUSTCOM 2018] Machine Learning for Reliable Network Attack Detection in SCADA Systems.
- [TRUSTCOM 2018] FloodShield: Securing the SDN Infrastructure Against Denial-of-Service Attacks.
- [TRUSTCOM 2018] Pangr: A Behavior-Based Automatic Vulnerability Detection and Exploitation Framework.
- [TRUSTCOM 2018] Securing Wireless Networks from Sinkhole and Sybil Attacks Using Secure Data Aggregation Protocol.
- [TRUSTCOM 2018] A Novel Multi-source Fusion Model for Known and Unknown Attack Scenarios.
- [TRUSTCOM 2018] Energy Exhaustion Attack on Barrett’s Reduction.
- [TRUSTCOM 2018] Uninterrupted Video Surveillance in the Face of an Attack.
- [TRUSTCOM 2018] Website Fingerprinting by Power Estimation Based Side-Channel Attacks on Android 7.
- [TRUSTCOM 2018] Monero Ring Attack: Recreating Zero Mixin Transaction Effect.
- [TRUSTCOM 2018] Identifying Passive Message Fingerprint Attacks via Honey Challenge in Collaborative Intrusion Detection Networks.
- [TRUSTCOM 2018] Learning and Applying Ontology for Machine Learning in Cyber Attack Detection.
- [TRUSTCOM 2018] A Power Analysis Attack Countermeasure Based on Random Execution.
- [TRUSTCOM 2018] Partial Scan Design Against Scan-Based Side Channel Attacks.
- [TRUSTCOM 2018] Differential Power Attack on SM4 Block Cipher.
- [TRUSTCOM 2018] Low-Cost Energy-Efficient Side-Channel Attacks Resistant AES S-Box with Power-Aware Hiding Inverter in GF(2^4).
- [TRUSTCOM 2018] Detection and Prevention of Routing Attacks in Internet of Things.
- [TRUSTCOM 2018] Double-Blind Reputation vs. Intelligent Fake VIP Attacks in Cloud-Assisted Interactions.
- [TRUSTCOM 2018] An Effective Method to Generate Simulated Attack Data Based on Generative Adversarial Nets.
- [TRUSTCOM 2018] Check-ins and Photos: Spatiotemporal Correlation-Based Location Inference Attack and Defense in Location-Based Social Networks.
- [TRUSTCOM 2018] Correlation-Based Electromagnetic Analysis Attack Using Haar Wavelet Reconstruction with Low-Pass Filtering on an FPGA Implementaion of AES.
- [TRUSTCOM 2019] A Unified Measurable Software Trustworthy Model Based on Vulnerability Loss Speed Index.
- [TRUSTCOM 2019] The Deviation Attack: A Novel Denial-of-Service Attack Against IKEv2.
- [TRUSTCOM 2019] STDeepGraph: Spatial-Temporal Deep Learning on Communication Graphs for Long-Term Network Attack Detection.
- [TRUSTCOM 2019] A Heuristic Method for Network Modification Against Cyber Epidemic Attacks.
- [TRUSTCOM 2019] Understanding the Influence of Graph Kernels on Deep Learning Architecture: A Case Study of Flow-Based Network Attack Detection.
- [TRUSTCOM 2019] Laughter in the Wild: A Study Into DoS Vulnerabilities in YAML Libraries.
- [TRUSTCOM 2019] Poisoning Attack in Federated Learning using Generative Adversarial Nets.
- [TRUSTCOM 2019] Finding Rats in Cats: Detecting Stealthy Attacks using Group Anomaly Detection.
- [TRUSTCOM 2019] Protecting Code Injection Attacks in Intelligent Transportation System.
- [TRUSTCOM 2020] Cyclic Bayesian Attack Graphs: A Systematic Computational Approach.
- [TRUSTCOM 2020] TRUVIN: Lightweight Detection of Data-Oriented Attacks Through Trusted Value Integrity.
- [TRUSTCOM 2020] Active Link Obfuscation to Thwart Link-flooding Attacks for Internet of Things.
- [TRUSTCOM 2020] Densely Connected Residual Network for Attack Recognition.
- [TRUSTCOM 2020] De-randomizing the Code Segment with Timing Function Attack.
- [TRUSTCOM 2020] TEADS: A Defense-aware Framework for Synthesizing Transient Execution Attacks.
- [TRUSTCOM 2020] IoT Attacks: Features Identification and Clustering.
- [TRUSTCOM 2020] Estimating Loss Due to Cyber-attack in the Presence of Uncertainty.
- [TRUSTCOM 2020] Partial-SMT: Core-scheduling Protection Against SMT Contention-based Attacks.
- [TRUSTCOM 2020] Evaluating the Soundness of Security Metrics from Vulnerability Scoring Frameworks.
- [TRUSTCOM 2020] FTCLNet: Convolutional LSTM with Fourier Transform for Vulnerability Detection.
- [TRUSTCOM 2020] Secure Coded Matrix Multiplication against Cooperative Attack in Edge Computing.
- [TRUSTCOM 2020] A Measurement Study of IoT-Based Attacks Using IoT Kill Chain.
- [TRUSTCOM 2020] Use of Bash History Novelty Detection for Identification of Similar Source Attack Generation.
- [TRUSTCOM 2020] Measurement Unit Placement Against Injection Attacks for the Secured Operation of an IIoT-based Smart Grid.
- [TRUSTCOM 2020] An Analytics Framework for Heuristic Inference Attacks against Industrial Control Systems.
- [TRUSTCOM 2020] Adversarial Attacks on Time-Series Intrusion Detection for Industrial Control Systems.
- [TRUSTCOM 2020] Cache side-channel attacks detection based on machine learning.
- [TRUSTCOM 2020] Inference Attacks on Physical Layer Channel State Information.
- [TRUSTCOM 2020] Time is Money: Countering Griefing Attack in Lightning Network.
- [TRUSTCOM 2020] Modelling Attacks in Blockchain Systems using Petri Nets.
- [TRUSTCOM 2020] VGG-based side channel attack on RSA implementation.
- [TRUSTCOM 2020] Towards Collaborative Intrusion Detection Enhancement against Insider Attacks with Multi-Level Trust.
- [TRUSTCOM 2020] Analysis and modelling of multi-stage attacks.
- [TRUSTCOM 2020] IoT-Sphere: A Framework To Secure IoT Devices From Becoming Attack Target And Attack Source.
- [TRUSTCOM 2020] Membership Inference Attacks: Analysis and Mitigation.
- [TRUSTCOM 2020] iTES: Integrated Testing and Evaluation System for Software Vulnerability Detection Methods.
- [TRUSTCOM 2020] An Automatic Vulnerability Scanner for Web Applications.
- [TRUSTCOM 2020] An Automatic Vulnerability Classification System for IoT Softwares.
- [TRUSTCOM 2020] SCScan: A SVM-based Scanning System for Vulnerabilities in Blockchain Smart Contracts.
- [TRUSTCOM 2020] An Efficient Vulnerability Extrapolation Using Similarity of Graph Kernel of PDGs.
- [TRUSTCOM 2020] An Approach for Poisoning Attacks against RNN-Based Cyber Anomaly Detection.
- [TRUSTCOM 2020] Implementing Network Attack Detection with a Novel NSSA Model Based on Knowledge Graphs.
- [TRUSTCOM 2020] Monitoring Social Media for Vulnerability-Threat Prediction and Topic Analysis.
- [TRUSTCOM 2020] pcSVF: An Evaluation of Side-Channel Vulnerability of Port Contention.
- [TRUSTCOM 2020] A Multi-Layer Industrial-IoT Attack Taxonomy: Layers, Dimensions, Techniques and Application.
- [TRUSTCOM 2020] Boosting Homograph Attack Classification Using Ensemble Learning and N-gram Model.
- [TRUSTCOM 2020] Special-purpose Model Extraction Attacks: Stealing Coarse Model with Fewer Queries.
- [TRUSTCOM 2021] RoBin: Facilitating the Reproduction of Configuration-Related Vulnerability.
- [TRUSTCOM 2021] Security on SM2 and GOST Signatures against Related Key Attacks.
- [TRUSTCOM 2021] Cryptanalysis of Deterministic and Probabilistic Multi-Copy PDP Schemes For Cloud Storage - Attacks and Countermeasures.
- [TRUSTCOM 2021] Techniques for Securing 5G Network Services from attacks.
- [TRUSTCOM 2021] Techniques for Securing Control Systems from Attacks.
- [TRUSTCOM 2021] Sybil Attacks and Defense on Differential Privacy based Federated Learning.
- [TRUSTCOM 2021] Protecting Locations with Differential Privacy against Location-Dependent Attacks in Continuous LBS Queries.
- [TRUSTCOM 2021] Too Expensive to Attack: Enlarge the Attack Expense through Joint Defense at the Edge.
- [TRUSTCOM 2021] A Fast-Detection and Fault-Correction Algorithm against Persistent Fault Attack.
- [TRUSTCOM 2021] Multi-level Directed Fuzzing for Detecting Use-after-Free Vulnerabilities.
- [TRUSTCOM 2021] DeepVuler: A Vulnerability Intelligence Mining System for Open-Source Communities.
- [TRUSTCOM 2021] Robust Backdoor Attacks against Deep Neural Networks in Real Physical World.
- [TRUSTCOM 2021] FLDDoS: DDoS Attack Detection Model based on Federated Learning.
- [TRUSTCOM 2021] TS-SVM: Detect LDoS Attack in SDN Based on Two-step Self-adjusting SVM.
- [TRUSTCOM 2021] MAAC: Novel Alert Correlation Method To Detect Multi-step Attack.
- [TRUSTCOM 2021] Attack versus Attack: Toward Adversarial Example Defend Website Fingerprinting Attack.
- [TRUSTCOM 2021] Towards Strengthening Deep Learning-based Side Channel Attacks with Mixup.
- [TRUSTCOM 2021] MazeRunner: Evaluating the Attack Surface of Control-Flow Integrity Policies.
- [TRUSTCOM 2021] Gray Adversarial Attack Algorithm based on Multi-Scale Grid Search.
- [TRUSTCOM 2021] PDAAA: Progressive Defense Against Adversarial Attacks for Deep Learning-as-a-Service in Internet of Things.
- [TRUSTCOM 2021] A Deep Learning-based Penetration Testing Framework for Vulnerability Identification in Internet of Things Environments.
- [TRUSTCOM 2021] Robust Sensor Fusion Algorithms Against Voice Command Attacks in Autonomous Vehicles.
- [TRUSTCOM 2021] Multi-label Positive and Unlabeled Learning and its Application to Common Vulnerabilities and Exposure Categorization.
- [TRUSTCOM 2021] Constant-Time Loading: Modifying CPU Pipeline to Defeat Cache Side-Channel Attacks.
- [TRUSTCOM 2021] FedIM: An Anti-attack Federated Learning Based on Agent Importance Aggregation.
- [TRUSTCOM 2022] Coverage Reliability of IoT Intrusion Detection System based on Attack-Defense Game Design.
- [TRUSTCOM 2022] Differential Game Approach for Modelling and Defense of False Data Injection Attacks Targeting Energy Metering Systems.
- [TRUSTCOM 2022] SEEKER: A Root Cause Analysis Method Based on Deterministic Replay for Multi-Type Network Protocol Vulnerabilities.
- [TRUSTCOM 2022] Challenges and Approaches for Mitigating Byzantine Attacks in Federated Learning.
- [TRUSTCOM 2022] Detecting Unknown Network Attacks with Attention Encoding and Deep Metric Learning.
- [TRUSTCOM 2022] Data Poisoning Attack to X-armed Bandits.
- [TRUSTCOM 2022] Neural-FacTOR: Neural Representation Learning for Website Fingerprinting Attack over TOR Anonymity.
- [TRUSTCOM 2022] Source Code Vulnerability Detection Using Vulnerability Dependency Representation Graph.
- [TRUSTCOM 2022] Near Field Air-Gap Covert Channel Attack.
- [TRUSTCOM 2022] Marking based Obfuscation Strategy to resist Side Channel Attack in Cross-User Deduplication for Cloud Storage.
- [TRUSTCOM 2022] A General Backdoor Attack to Graph Neural Networks Based on Explanation Method.
- [TRUSTCOM 2022] Software Side Channel Vulnerability Detection Based on Similarity Calculation and Deep Learning.
- [TRUSTCOM 2022] Leveraging Model Poisoning Attacks on License Plate Recognition Systems.
- [TRUSTCOM 2022] Practical Side-Channel Attack on Message Encoding in Masked Kyber.
- [TRUSTCOM 2022] A Flow Attack Strategy based on Critical Links for Cyber-attack.
- [TRUSTCOM 2022] MLIA: modulated LED illumination-based adversarial attack on traffic sign recognition system for autonomous vehicle.
- [TRUSTCOM 2022] A formalization-based vulnerability detection method for cross-subject network components.
- [TRUSTCOM 2022] Action-Manipulation Attack and Defense to X-Armed Bandits.
- [TRUSTCOM 2022] Adversarial Attacks on Deep Learning-Based Methods for Network Traffic Classification.
- [TRUSTCOM 2022] An Attribute-attack-proof Watermarking Technique for Relational Database.
- [TRUSTCOM 2022] Clean-label Backdoor Attack on Machine Learning-based Malware Detection Models and Countermeasures.
- [TRUSTCOM 2022] Confusing Traffic against Intra-domain Webpage Fingerprinting Attacks.
- [TRUSTCOM 2022] False Data Injection Attack Detection in a Platoon of CACC in RSU.
- [TRUSTCOM 2022] Forgery Trajectory Injection Attack Detection for Traffic Lights under Connected Vehicle Environment.
- [TRUSTCOM 2022] SCEVD: Semantic-enhanced Code Embedding for Vulnerability Discovery.
- [TRUSTCOM 2023] APM: An Attack Path-based Method for APT Attack Detection on Few-Shot Learning.
- [TRUSTCOM 2023] Class-Targeted Poisoning Attacks against DNNs.
- [TRUSTCOM 2023] Neighborhood Matching Entity Alignment Model for Vulnerability Knowledge Graphs.
- [TRUSTCOM 2023] Undermining License Plate Recognition: A Data Poisoning Attack.
- [TRUSTCOM 2023] Reducing Model Memorization to Mitigate Membership Inference Attacks.
- [TRUSTCOM 2023] Towards Dynamic Backdoor Attacks against LiDAR Semantic Segmentation in Autonomous Driving.
- [TRUSTCOM 2023] BadLiDet: A Simple Backdoor Attack against LiDAR Object Detection in Autonomous Driving.
- [TRUSTCOM 2023] FINDER: A Simple and Effective Defender against Unnoticeable Graph Injection Attacks.
- [TRUSTCOM 2023] FL-TIA: Novel Time Inference Attacks on Federated Learning.
- [TRUSTCOM 2023] Defending against Adversarial Attacks in Federated Learning on Metric Learning Model.
- [TRUSTCOM 2023] Two-Stage Smart Contract Vulnerability Detection Combining Semantic Features and Graph Features.
- [TRUSTCOM 2023] Opcode Sequences-Based Smart Contract Vulnerabilities Detection Using Deep Learning.
- [TRUSTCOM 2023] Protecting IoT Servers Against Flood Attacks with the Quasi Deterministic Transmission Policy.
- [TRUSTCOM 2023] GuiDiv: Mitigating Code-reuse Attack in an IoT Cluster Using Guided Control Flow Diversification.
- [TRUSTCOM 2023] Detecting DDoS Attacks on the Network Edge: An Information-Theoretic Correlation Analysis.
- [TRUSTCOM 2023] PANGA: Attention-based Principal Neighborhood Aggregation for Forecasting Future Cyber Attacks.
- [TRUSTCOM 2023] Multi-stage Attack Detection and Prediction Using Graph Neural Networks: An IoT Feasibility Study.
- [TRUSTCOM 2023] High-knowledge shilling attack detection method based on genetic co-forest.
- [TRUSTCOM 2023] LActDet: An Automatic Network Attack Activity Detection Framework for Multi-step Attacks.
- [TRUSTCOM 2023] A Cost-effective Automation Method of Massive Vulnerabilities Analysis and Remediation Based on Cloud Native.
- [TRUSTCOM 2023] MPS: A Multiple Poisoned Samples Selection Strategy in Backdoor Attack.
- [TRUSTCOM 2023] Software Vulnerabilities Detection Based on a Pre-trained Language Model.
- [TRUSTCOM 2023] Flush+Revisit: A Cross-CCX Side-Channel Attack on AMD Processors.
- [TRUSTCOM 2023] SATBA: An Invisible Backdoor Attack Based on Spatial Attention.
- [TRUSTCOM 2023] MemInspect: Memory Forensics for investigating Fileless Attacks.
- [TRUSTCOM 2023] SQL injection attack sample generation based on IE-GAN.
- [TRUSTCOM 2023] Random Chunks Generation Attack Resistant Cross-User Deduplication for Cloud Storage.
- [TRUSTCOM 2023] Membership Inference Attacks against GNN-based Hardware Trojan Detection.
- [TRUSTCOM 2023] Ripple20 Vulnerabilities Detection using a Featureless Deep Learning Model.
- [TRUSTCOM 2023] Temporal-Gated Graph Neural Network with Graph Sampling for Multi-step Attack Detection.
- [TRUSTCOM 2023] Network Attack Identification and Analysis Based on Graph Convolutional Neural Network.
- [TRUSTCOM 2023] Attacks Against Mobility Prediction in 5G Networks.
- [TRUSTCOM 2023] Code Execution Capability as a Metric for Machine Learning-Assisted Software Vulnerability Detection Models.
- [TRUSTCOM 2023] Vulnerability Name Prediction Based on Enhanced Multi-Source Domain Adaptation.
- [TRUSTCOM 2023] Histopathological Image Classification and Vulnerability Analysis using Federated Learning.
- [TRUSTCOM 2023] DTrap: A cyberattack-defense confrontation technique based on Moving Target Defense.
- [TRUSTCOM 2023] Addressing a Malicious Tampering Attack on the Default Isolation Level in DBMS.
- [TRUSTCOM 2024] CTWF: Website Fingerprinting Attack based on Compact Convolutional Transformer.
- [TRUSTCOM 2024] Vulnerabilities are collaborating to compromise your system: A network risk assessment method based on cooperative game and attack graph.
- [TRUSTCOM 2024] OFLGI: An Optimization-based Feature-Level Gradient Inversion Attack.
- [TRUSTCOM 2024] Front-running Attacks in Hash-Based Transaction Sharding Blockchains.
- [TRUSTCOM 2024] Attacking High-Performance SBCs: A Generic Preprocessing Framework for EMA.
- [TRUSTCOM 2024] TOScorr: Transformer-based Flow Correlation Attack on Tor Onion Service.
- [TRUSTCOM 2024] Attack-Defense Graph Generation: Instantiating Incident Response Actions on Attack Graphs.
- [TRUSTCOM 2024] STGCN-Based Link Flooding Attack Detection and Mitigation in Software-Defined Network.
- [TRUSTCOM 2024] AIDE: Attack Inference Based on Heterogeneous Dependency Graphs with MITRE ATT&CK.
- [TRUSTCOM 2024] Enhancing Privacy-Preserving Multi-Authority Attribute-Based Encryption: Addressing Rogue-Key Attacks Under Adaptive Corruption of Authorities.
- [TRUSTCOM 2024] TransFront: Bi-path Feature Fusion for Detecting Front-running Attack in Decentralized Finance.
- [TRUSTCOM 2024] Attacking High-order Masked Cryptosystem via Deep Learning-based Side-Channel Analysis.
- [TRUSTCOM 2024] Membership Inference Attacks via Dynamic Adversarial Perturbations Reduction.
- [TRUSTCOM 2024] Defending Against Backdoor Attacks through Causality-Augmented Diffusion Models for Dataset Purification.
- [TRUSTCOM 2024] StrucTrans: Zero-Query Structural Adversarial Attack Transferred from Masked Autoencoders to Image Classifiers.
- [TRUSTCOM 2024] AS-FIBA: Adaptive Selective Frequency-Injection for Backdoor Attack on Deep Face Restoration.
- [TRUSTCOM 2024] Paa-Tee: A Practical Adversarial Attack on Thermal Infrared Detectors with Temperature and Pose Adaptability.
- [TRUSTCOM 2024] LSD Attack: Exploiting Inconsistencies between Design and Implementation of Ethereum Protocols.
- [TRUSTCOM 2024] Deep Learning-Based DDoS Attack Detection Using Adversarial Optimization.
- [TRUSTCOM 2024] Active Defense Research: A New Perspective Integrating Traps and Vulnerabilities.
- [TRUSTCOM 2024] Enhancing Graph-Based Vulnerability Detection through Standardized Deep Learning Pipelines.
- [TRUSTCOM 2024] Improving Security in Internet of Medical Things through Hierarchical Cyberattacks Classification.
- [TRUSTCOM 2024] Sparse Silhouette Jump: Adversarial Attack Targeted at Binary Image for Gait Privacy Protection.
- [TRUSTCOM 2024] A Quiet Place: An In-Depth Study of Mobile Public-to-Private Attacks.
- [TRUSTCOM 2024] Broader but More Efficient: Broad Learning in Power Side-channel Attacks.
- [TRUSTCOM 2024] HTV: Measuring Circuit Vulnerability to Hardware Trojan Insertion Based on Node Co-activation Analysis.
- [TRUSTCOM 2024] Hierarchical Graph Feature Extraction Based on Multi-Information Contract Graph for Enhanced Smart Contract Vulnerability Detection.
- [TRUSTCOM 2024] LightRL-AD: A Lightweight Online Reinforcement Learning Approach for Autonomous Defense against Network Attacks.
- [TRUSTCOM 2024] AdvPurRec: Strengthening Network Intrusion Detection with Diffusion Model Reconstruction Against Adversarial Attacks.
- [TRUSTCOM 2024] HFI: High-Frequency Component Injection based Invisible Image Backdoor Attack.
- [TRUSTCOM 2024] Attack Data is Not Solely Paramount: A Universal Model Extraction Enhancement Method.
- [TRUSTCOM 2024] Active Source Inference Attack Based on Label-Flipping in Federated Learning.
- [TRUSTCOM 2024] DMPA: A Compact and Effective Pipeline for Detecting Multiple Phishing Attacks.
- [TRUSTCOM 2024] An Effective Adversarial Text Attack through a Block-Sparse Approach with Hamiltonian Insights.
- [TRUSTCOM 2024] Defending Against Model Poisoning Attacks in Federated Learning via Client-guided Trust.
- [TRUSTCOM 2024] Robust purification defense for transfer attacks based on probabilistic scheduling algorithm of pre-trained models: A model difference perspective.
- [TRUSTCOM 2024] D2FL: Dimensional Disaster-oriented Backdoor Attack Defense Of Federated Learning.
- [TRUSTCOM 2024] Improved Rectangle and Linear Attacks on Lightweight Block Cipher WARP.
- [TRUSTCOM 2024] ROSE+ : A Robustness-Optimized Security Scheme Against Cascading Failures in Multipath TCP under LDDoS Attack Streams.
- [TRUSTCOM 2024] A Cross-Site Scripting Attack Protection Framework Based on Managed Proxy.
- [TRUSTCOM 2024] DA-CPVD: Vulnerability Detection Method based on Dual Attention Composite Pooling.
- [TRUSTCOM 2024] Maldet: An Automated Malicious npm Package Detector Based on Behavior Characteristics and Attack Vectors.
- [TRUSTCOM 2024] A Vulnerability Detection Method for Intermediate Code Based on a Relational Dependency Graph.
- [TRUSTCOM 2024] Contextual Transformer-based Node Embedding for Vulnerability Detection using Graph Learning.
- [TRUSTCOM 2024] FD-WF: A Multi-tab Website Fingerprinting Attack Based on Fixed Dimensions for Tor Network.
- [TRUSTCOM 2024] A Dual Defense Design Against Data Poisoning Attacks in Deep Learning-Based Recommendation Systems.
- [TRUSTCOM 2024] Construction of Cyber-attack Attribution Framework Based on LLM.
- [TRUSTCOM 2024] Investigating Patterns of Adversarial Techniques for Cyberattack Forensics.
- [TRUSTCOM 2024] DI-GAE: A Dynamic and Resource-Efficient Attack Detection Framework with Incremental Learning and Graph Autoencoders.
- [TRUSTCOM 2024] Backdoor Attacks Optimized through Genetic Algorithm-Driven Data Augmentation Combinations in Deep Neural Networks.
- [TRUSTCOM 2024] A Defensive Framework Against Adversarial Attacks on Machine Learning-Based Network Intrusion Detection Systems.
- [TRUSTCOM 2024] Shield-U: Safeguarding Traffic Sign Recognition Against Perturbation Attacks.
- [TRUSTCOM 2024] Deepfakes: A New Kind of Adversarial Attacks Against Face Recognition Systems?
- [TRUSTCOM 2024] IoT Vulnerability Detection using Featureless LLM CyBert Model.
- [TRUSTCOM 2024] A Study of Backdoor Attacks on Data Distillation for Text Classification Tasks.
- [TRUSTCOM 2024] Research on distributed machine learning defence strategies under Byzantine attacks.
- [PLDI 2017] Rigorous analysis of software countermeasures against cache attacks.
- [PLDI 2020] Ethainter: a smart contract security analyzer for composite vulnerabilities.
- [PLDI 2022] Hardening attack surfaces with formally proven binary format parsers.
- [POPL 2012] Defining code-injection attacks.
- [KBSE 2010] Detection of recurring software vulnerabilities.
- [KBSE 2012] Supporting automated vulnerability analysis using formalized vulnerability signatures.
- [KBSE 2012] Automatically securing permission-based software by reducing the attack surface: an application to Android.
- [KBSE 2012] Predicting common web application vulnerabilities from input validation and sanitization code patterns.
- [KBSE 2016] SOFIA: an automated security oracle for black-box testing of SQL-injection vulnerabilities.
- [KBSE 2016] MACKE: compositional analysis of low-level vulnerabilities with symbolic execution.
- [KBSE 2016] BovInspector: automatic inspection and repair of buffer overflow vulnerabilities.
- [KBSE 2017] Static detection of asymptotic resource side-channel vulnerabilities in web applications.
- [KBSE 2017] SEALANT: a detection and visualization tool for inter-app security vulnerabilities in Android.
- [KBSE 2017] Towards a software vulnerability prediction model using traceable code patterns and software metrics.
- [KBSE 2018] ReScue: crafting regular expression DoS attacks.
- [KBSE 2018] TDroid: exposing app switching attacks in Android with control flow specialization.
- [KBSE 2018] ContractFuzzer: fuzzing smart contracts for vulnerability detection.
- [KBSE 2018] Self-protection of Android systems from inter-component communication attacks.
- [KBSE 2018] VulSeeker: a semantic learning based vulnerability seeker for cross-platform binary.
- [KBSE 2019] CONVUL: An Effective Tool for Detecting Concurrency Vulnerabilities.
- [KBSE 2019] A Machine Learning Based Approach to Identify SQL Injection Vulnerabilities.
- [KBSE 2020] Cross-Contract Static Analysis for Detecting Practical Reentrancy Vulnerabilities in Smart Contracts.
- [KBSE 2020] Code-Based Vulnerability Detection in Node.js Applications: How far are we?
- [KBSE 2020] A Hybrid Analysis to Detect Java Serialisation Vulnerabilities.
- [KBSE 2020] A Program Verification based Approach to Find Data Race Vulnerabilities in Interrupt-driven Program.
- [KBSE 2020] Source Code and Binary Level Vulnerability Detection and Hot Patching.
- [KBSE 2021] Adversarial Attacks to API Recommender Systems: Time to Wake Up and Smell the Coffeeƒ.
- [KBSE 2021] Finding A Needle in a Haystack: Automated Mining of Silent Vulnerability Fixes.
- [KBSE 2021] DeepCVA: Automated Commit-level Vulnerability Assessment with Deep Multi-task Learning.
- [KBSE 2021] Unsupervised Labeling and Extraction of Phrase-based Concepts in Vulnerability Descriptions.
- [KBSE 2021] Human-in-the-Loop XAI-enabled Vulnerability Detection, Investigation, and Mitigation.
- [KBSE 2022] Empirical Study of System Resources Abused by IoT Attackers.
- [KBSE 2022] Insight: Exploring Cross-Ecosystem Vulnerability Impacts.
- [KBSE 2022] Precise (Un)Affected Version Analysis for Web Vulnerabilities.
- [KBSE 2022] Reentrancy Vulnerability Detection and Localization: A Deep Learning Based Two-phase Approach.
- [KBSE 2022] Towards Effective Static Analysis Approaches for Security Vulnerabilities in Smart Contracts.
- [KBSE 2022] A transformer-based IDE plugin for vulnerability detection.
- [KBSE 2022] AUSERA: Automated Security Vulnerability Detection for Android Apps.
- [KBSE 2022] V-Achilles: An Interactive Visualization of Transitive Security Vulnerabilities.
- [KBSE 2022] Xscope: Hunting for Cross-Chain Bridge Attacks.
- [KBSE 2022] Automatic Software Timing Attack Evaluation & Mitigation on Clear Hardware Assumption.
- [KBSE 2023] Mitigating Persistence of Open-Source Vulnerabilities in Maven Ecosystem.
- [KBSE 2023] Learning to Locate and Describe Vulnerabilities.
- [KBSE 2023] When Less is Enough: Positive and Unlabeled Learning Model for Vulnerability Detection.
- [KBSE 2023] Systematically Detecting Packet Validation Vulnerabilities in Embedded Network Stacks.
- [KBSE 2023] DeFiWarder: Protecting DeFi Apps from Token Leaking Vulnerabilities.
- [KBSE 2023] MUTEN: Mutant-Based Ensembles for Boosting Gradient-Based Adversarial Attack.
- [KBSE 2023] Function-Level Vulnerability Detection Through Fusing Multi-Modal Knowledge.
- [KBSE 2023] REEF: A Framework for Collecting Real-World Vulnerabilities and Fixes.
- [KBSE 2024] Detecting and Explaining Anomalies Caused by Web Tamper Attacks via Building Consistency-based Normality.
- [KBSE 2024] Snopy: Bridging Sample Denoising with Causal Graph Learning for Effective Vulnerability Detection.
- [KBSE 2024] AdvSCanner: Generating Adversarial Smart Contracts to Exploit Reentrancy Vulnerabilities Using LLM and Static Analysis.
- [KBSE 2024] COBRA: Interaction-Aware Bytecode-Level Vulnerability Detector for Smart Contracts.
- [KBSE 2024] Vision: Identifying Affected Library Versions for Open Source Software Vulnerabilities.
- [KBSE 2024] Skyeye: Detecting Imminent Attacks via Analyzing Adversarial Smart Contracts.
- [KBSE 2024] Magneto: A Step-Wise Approach to Exploit Vulnerabilities in Dependent Libraries via LLM-Empowered Directed Fuzzing.
- [KBSE 2024] Coding-PTMs: How to Find Optimal Code Pre-trained Models for Code Embedding in Vulnerability Detection?
- [KBSE 2024] STASE: Static Analysis Guided Symbolic Execution for UEFI Vulnerability Signature Generation.
- [KBSE 2024] VulAdvisor: Natural Language Suggestion Generation for Software Vulnerability Repair.
- [KBSE 2024] Towards Robust Detection of Open Source Software Supply Chain Poisoning Attacks in Industry Environments.
- [KBSE 2024] Models Are Codes: Towards Measuring Malicious Code Poisoning Attacks on Pre-trained Model Hubs.
- [KBSE 2024] Trident: Detecting SQL Injection Attacks via Abstract Syntax Tree-based Neural Network.
- [KBSE 2024] Oracle-Guided Vulnerability Diversity and Exploit Synthesis of Smart Contracts Using LLMs.
- [KBSE 2024] Attacks and Defenses for Large Language Models on Coding Tasks.
- [KBSE 2024] VulZoo: A Comprehensive Vulnerability Intelligence Dataset.
- [KBSE 2024] ContractTinker: LLM-Empowered Vulnerability Repair for Real-World Smart Contracts.
- [KBSE 2024] A Comprehensive Study of Privacy Leakage Vulnerability in Android App Logs.
- [ICSE 2010] Detecting recurring and similar software vulnerabilities.
- [ICSE 2011] Patching vulnerabilities with sanitization synthesis.
- [ICSE 2011] Empirical results on the study of software vulnerabilities.
- [ICSE 2012] Automated detection of client-state manipulation vulnerabilities.
- [ICSE 2012] A large scale exploratory analysis of software vulnerability life cycles.
- [ICSE 2012] Mining input sanitization patterns for predicting SQL injection and cross site scripting vulnerabilities.
- [ICSE 2013] Mining SQL injection and cross site scripting vulnerabilities using hybrid program analysis.
- [ICSE 2013] Path sensitive static analysis of web applications for remote code execution vulnerability detection.
- [ICSE 2013] Vulnerability of the day: concrete demonstrations for software engineering undergraduates.
- [ICSE 2015] Approximating Attack Surfaces with Stack Traces.
- [ICSE 2015] Analysis of Android Inter-App Security Vulnerabilities Using COVERT.
- [ICSE 2017] Search-driven string constraint solving for vulnerability detection.
- [ICSE 2018] Spatio-temporal context reduction: a pointer-analysis-based static approach for detecting use-after-free vulnerabilities.
- [ICSE 2018] Secure coding practices in Java: challenges and vulnerabilities.
- [ICSE 2018] Are vulnerabilities discovered and resolved like other defects?
- [ICSE 2019] Leopard: identifying vulnerable code for vulnerability assessment through program metrics.
- [ICSE 2020] Finding client-side business flow tampering vulnerabilities.
- [ICSE 2020] Revealing injection vulnerabilities by leveraging existing tests.
- [ICSE 2020] Typestate-guided fuzzer for discovering use-after-free vulnerabilities.
- [ICSE 2020] A large-scale empirical study on vulnerability distribution within projects and the lessons learned.
- [ICSE 2021] DeepPayload: Black-box Backdoor Attack on Deep Learning Models through Neural Payload Injection.
- [ICSE 2021] Reducing DNN Properties to Enable Falsification with Adversarial Attacks.
- [ICSE 2021] ATVHUNTER: Reliable Version Detection of Third-Party Libraries for Vulnerability Identification in Android Applications.
- [ICSE 2022] A Grounded Theory Based Approach to Characterize Software Attack Surfaces.
- [ICSE 2022] Demystifying the Vulnerability Propagation and Its Evolution via Dependency Trees in the NPM Ecosystem.
- [ICSE 2022] Less is More: Supporting Developers in Vulnerability Detection during Code Review.
- [ICSE 2022] MVD: Memory-Related Vulnerability Detection Based on Flow-Sensitive Graph Neural Networks.
- [ICSE 2022] Natural Attack for Pre-trained Models of Code.
- [ICSE 2022] The Extent of Orphan Vulnerabilities from Code Reuse in Open Source Software.
- [ICSE 2022] V-SZZ: Automatic Identification of Version Ranges Affected by CVE Vulnerabilities.
- [ICSE 2022] VulCNN: An Image-inspired Scalable Vulnerability Detection System.
- [ICSE 2023] Data Quality for Software Vulnerability Datasets.
- [ICSE 2023] AChecker: Statically Detecting Smart Contract Access Control Vulnerabilities.
- [ICSE 2023] Fine-grained Commit-level Vulnerability Type Prediction by CWE Tree Structure.
- [ICSE 2023] Silent Vulnerable Dependency Alert Prediction with Vulnerability Key Aspect Explanation.
- [ICSE 2023] CHRONOS: Time-Aware Zero-Shot Identification of Libraries from Vulnerability Reports.
- [ICSE 2023] Understanding the Threats of Upstream Vulnerabilities to Downstream Projects in the Maven Ecosystem.
- [ICSE 2023] On Privacy Weaknesses and Vulnerabilities in Software Systems.
- [ICSE 2023] An Empirical Study of Deep Learning Models for Vulnerability Detection.
- [ICSE 2023] DeepVD: Toward Class-Separation Features for Neural Network Vulnerability Detection.
- [ICSE 2023] Enhancing Deep Learning-based Vulnerability Detection by Building Behavior Graph Model.
- [ICSE 2023] Vulnerability Detection with Graph Simplification and Enhanced Graph Representation Learning.
- [ICSE 2023] Does data sampling improve deep learning-based vulnerability detection? Yeas! and Nays!
- [ICSE 2023] VULGEN: Realistic Vulnerability Generation Via Pattern Mining and Deep Learning.
- [ICSE 2023] Compatible Remediation on Vulnerabilities from Third-Party Libraries for Java Projects.
- [ICSE 2023] Automated Black-Box Testing of Mass Assignment Vulnerabilities in RESTful APIs.
- [ICSE 2023] CoLeFunDa: Explainable Silent Vulnerability Fix Identification.
- [ICSE 2024] Dataflow Analysis-Inspired Deep Learning for Efficient Vulnerability Detection.
- [ICSE 2024] DEMISTIFY: Identifying On-device Machine Learning Models Stealing and Reuse Vulnerabilities in Mobile Apps.
- [ICSE 2024] Toward Improved Deep Learning-based Vulnerability Detection.
- [ICSE 2024] Out of Sight, Out of Mind: Better Automatic Vulnerability Repair by Broadening Input Ranges and Sources.
- [ICSE 2024] Uncover the Premeditated Attacks: Detecting Exploitable Reentrancy Vulnerabilities by Identifying Attacker Contracts.
- [ICSE 2024] FlashSyn: Flash Loan Attack Synthesis via Counter Example Driven Approximation.
- [ICSE 2024] Towards More Practical Automation of Vulnerability Assessment.
- [ICSE 2024] VGX: Large-Scale Sample Generation for Boosting Learning-Based Software Vulnerability Analyses.
- [ICSE 2024] Pre-training by Predicting Program Dependencies for Vulnerability Analysis Tasks.
- [ICSE 2024] Investigating White-Box Attacks for On-Device Models.
- [ICSE 2024] Towards Causal Deep Learning for Vulnerability Detection.
- [ICSE 2024] Coca: Improving and Explaining Graph Neural Network-Based Vulnerability Detection Systems.
- [ICSE 2024] Improving Smart Contract Security with Contrastive Learning-based Vulnerability Detection.
- [ICSE 2024] On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities.
- [ICSE 2024] An Empirical Study of Data Disruption by Ransomware Attacks.
- [ICSE 2024] Identifying Affected Libraries and Their Ecosystems for Open Source Software Vulnerabilities.
- [ICSE 2024] GPTScan: Detecting Logic Vulnerabilities in Smart Contracts by Combining GPT with Program Analysis.
- [ICSE 2024] PrettySmart: Detecting Permission Re-delegation Vulnerability for Token Behaviors in Smart Contracts.
- [ICSE 2024] Combining Structured Static Code Information and Dynamic Symbolic Traces for Software Vulnerability Prediction.
- [ICSE 2024] SCVHunter: Smart Contract Vulnerability Detection Based on Heterogeneous Graph Attention Network.
- [ICSE 2024] Semantic-Enhanced Static Vulnerability Detection in Baseband Firmware.
- [ICSE 2024] Where is it? Tracing the Vulnerability-relevant Files from Vulnerability Reports.
- [ICSE 2024] Empirical Analysis of Vulnerabilities Life Cycle in Golang Ecosystem.
- [ICSE 2024] Exploiting Library Vulnerability via Migration Based Automating Test Generation.
- [ICSE 2025] Closing the Gap: A User Study on the Real-world Usefulness of AI-powered Vulnerability Detection & Repair in the IDE.
- [ICSE 2025] TransferFuzz: Fuzzing with Historical Trace for Verifying Propagated Vulnerability Code.
- [ICSE 2025] Understanding the Effectiveness of Coverage Criteria for Large Language Models: A Special Angle from Jailbreak Attacks.
- [ICSE 2025] $ZTD_{\text{JAVA}}$: Mitigating Software Supply Chain Vulnerabilities via Zero-Trust Dependencies.
- [ICSE 2025] The Seeds of the Future Sprout from History: Fuzzing for Unveiling Vulnerabilities in Prospective Deep-Learning Libraries.
- [ICSE 2025] Vulnerability Detection with Code Language Models: How Far are We?
- [ICSE 2025] DPFuzzer: Discovering Safety Critical Vulnerabilities for Drone Path Planners.
- [ICSE 2025] Similar but Patched Code Considered Harmful: The Impact of Similar but Patched Code on Recurring Vulnerability Detection and How to Remove Them.
- [ICSE 2025] PacDroid: A Pointer-Analysis-Centric Framework for Security Vulnerabilities in Android Apps.
- [ICSE 2025] GVI: Guided Vulnerability Imagination for Boosting Deep Vulnerability Detectors.
- [ICSE 2025] Are We Learning the Right Features? A Framework for Evaluating DL-Based Software Vulnerability Detection Solutions.
- [ISSTA 2012] Undangle: early detection of dangling pointers in use-after-free and double-free vulnerabilities.
- [ISSTA 2014] Automated testing for SQL injection vulnerabilities: an input mutation approach.
- [ISSTA 2015] Detection and classification of malicious JavaScript via attack behavior modelling.
- [ISSTA 2015] Dynamic detection of inter-application communication vulnerabilities in Android.
- [ISSTA 2016] DEKANT: a static analysis tool that learns to detect web application vulnerabilities.
- [ISSTA 2016] Automated and effective testing of web services for XML injection attacks.
- [ISSTA 2016] Optimal sanitization synthesis for web application vulnerability repair.
- [ISSTA 2017] Semi-automated discovery of server-based information oversharing vulnerabilities in Android applications.
- [ISSTA 2019] A cost-effective strategy for software vulnerability prediction based on bellwether analysis.
- [ISSTA 2020] Patch based vulnerability matching for binary programs.
- [ISSTA 2021] Attack as defense: characterizing adversarial examples using robustness.
- [ISSTA 2021] AdvDoor: adversarial backdoor attack of deep learning system.
- [ISSTA 2021] UAFSan: an object-identifier-based dynamic approach for detecting use-after-free vulnerabilities.
- [ISSTA 2021] MoScan: a model-based vulnerability scanner for web single sign-on services.
- [ISSTA 2022] Test mimicry to assess the exploitability of library vulnerabilities.
- [ISSTA 2022] A large-scale empirical analysis of the vulnerabilities introduced by third-party components in IoT firmware.
- [ISSTA 2022] Path-sensitive code embedding via contrastive learning for software vulnerability detection.
- [ISSTA 2022] An empirical study on the effectiveness of static C code analyzers for vulnerability detection.
- [ISSTA 2022] Program vulnerability repair via inductive inference.
- [ISSTA 2022] WASAI: uncovering vulnerabilities in Wasm smart contracts.
- [ISSTA 2022] eTainter: detecting gas-related vulnerabilities in smart contracts.
- [ISSTA 2022] Park: accelerating smart contract vulnerability detection via parallel-fork symbolic execution.
- [ISSTA 2022] SmartDagger: a bytecode-based static analysis approach for detecting cross-contract vulnerability.
- [ISSTA 2022] Maestro: a platform for benchmarking automatic program repair tools on software vulnerabilities.
- [ISSTA 2023] Understanding and Tackling Label Errors in Deep Learning-Based Vulnerability Detection (Experience Paper).
- [ISSTA 2023] Green Fuzzing: A Saturation-Based Stopping Criterion using Vulnerability Prediction.
- [ISSTA 2023] Detecting Vulnerabilities in Linux-Based Embedded Firmware with SSE-Based On-Demand Alias Analysis.
- [ISSTA 2023] 1dFuzz: Reproduce 1-Day Vulnerabilities with Directed Differential Fuzzing.
- [ISSTA 2023] SmartState: Detecting State-Reverting Vulnerabilities in Smart Contracts via Fine-Grained State-Dependency Analysis.
- [ISSTA 2023] DeFiTainter: Detecting Price Manipulation Vulnerabilities in DeFi Protocols.
- [ISSTA 2023] How Effective Are Neural Networks for Fixing Security Vulnerabilities.
- [ISSTA 2023] Interpreters for GNN-Based Vulnerability Detection: Are We There Yet?
- [ISSTA 2024] SCALE: Constructing Structured Natural Language Comment Trees for Software Vulnerability Detection.
- [ISSTA 2024] Graph Neural Networks for Vulnerability Detection: A Counterfactual Explanation.
- [ISSTA 2024] DeFort: Automatic Detection and Analysis of Price Manipulation Attacks in DeFi Applications.
- [ISSTA 2024] Silent Taint-Style Vulnerability Fixes Identification.
- [ISSTA 2024] FDI: Attack Neural Code Generation Systems through User Feedback Channel.
- [ISSTA 2024] PatchFinder: A Two-Phase Approach to Security Patch Tracing for Disclosed Vulnerabilities in Open-Source Software.
- [ISSTA 2024] Automated Data Binding Vulnerability Detection for Java Web Frameworks via Nested Property Graph.
- [ISSTA 2024] Collaboration to Repository-Level Vulnerability Detection.
- [OSDI 2012] Efficient Patch-based Auditing for Web Application Vulnerabilities.
- [OSDI 2016] Correlated Crash Vulnerabilities.
- [OSDI 2018] ZebRAM: Comprehensive and Compatible Software Protection Against Rowhammer Attacks.
- [OSDI 2020] PACEMAKER: Avoiding HeART attacks in storage clusters with disk-adaptive redundancy.
- [OSDI 2020] Efficiently Mitigating Transient Execution Attacks using the Unmapped Speculation Contract.
- [FM 2014] Towards a Formal Analysis of Information Leakage for Signature Attacks in Preferential Elections.
- [FM 2024] Fast Attack Graph Defense Localization via Bisimulation.
- [FM 2024] Detecting Speculative Execution Vulnerabilities on Weak Memory Models.
- [FM 2024] Compositional Verification of Cryptographic Circuits Against Fault Injection Attacks.
- [ECOOP 2017] Evil Pickles: DoS Attacks Based on Object-Graph Engineering.
- [ECOOP 2025] Detecting Functionality-Specific Vulnerabilities via Retrieving Individual Functionality-Equivalent APIs in Open-Source Repositories.
- [RE 2015] Holistic security requirements analysis: An attacker’s perspective.
- [RE 2019] Big Data Analytics on Cyber Attack Graphs for Prioritizing Agile Security Requirements.
- [RE 2019] Towards Effective Assessment for Social Engineering Attacks.
- [RE 2021] Information on Potential Vulnerabilities for New Requirements: Does It Help Writing Secure Code?
- [RE 2023] A Tool for Security Risk Assessment for APT Attacks: using Scenarios, Security Requirements, and Evidence.
- [CAISE 2019] Security Vulnerability Information Service with Natural Language Query Support.
- [CAISE 2022] Analyzing Enterprise Architecture Models by Means of the Meta Attack Language.
- [CAISE 2025] ThreatTrace: Cyber-Attack Detection Through Trace Abstraction and Soft Clustering.
- [LCTRTS 2010] Cache vulnerability equations for protecting data in embedded processor caches from soft errors.
- [LCTRTS 2023] Thread-Level Attack-Surface Reduction.
- [LCTRTS 2024] Enhancing Code Vulnerability Detection via Vulnerability-Preserving Data Augmentation.
- [CP 2017] A Tolerant Algebraic Side-Channel Attack on AES Using CP.
- [CP 2018] A Complete Tolerant Algebraic Side-Channel Attack for AES with CP.
- [CP 2018] Algebraic Fault Attack on SHA Hash Functions Using Programmatic SAT Solvers.
- [CP 2020] Parity (XOR) Reasoning for the Index Calculus Attack.
- [CP 2020] Constraint-Based Software Diversification for Efficient Mitigation of Code-Reuse Attacks.
- [ICSOC 2021] Locating False Data Injection Attacks on Smart Grids Using D-FACTS Devices.
- [ICSOC 2024] Integrated QoS- and Vulnerability-Driven Self-adaptation for Microservices Applications.
- [SANER 2025] Enhancing Automated Vulnerability Repair Through Dependency Embedding and Pattern Store.
- [SANER 2025] Characterizing Logs in Vulnerability Reports: In-Depth Analysis and Security Implications.
- [SANER 2025] WakeMint: Detecting Sleepminting Vulnerabilities in NFT Smart Contracts.
- [SANER 2025] On Categorizing Open Source Software Security Vulnerability Reporting Mechanisms on GitHub.
- [SANER 2025] An Empirical Study of Vulnerability Handling Times in CPython.
- [ICSM 2015] Impact assessment for vulnerabilities in open-source software libraries.
- [ICSM 2016] Resolving Input Validation Vulnerabilities by Retracing Taint Flow Through Source Code.
- [ICSM 2017] Learning to Predict Severity of Software Vulnerability Using Only Vulnerability Description.
- [ICSM 2018] Beyond Metadata: Code-Centric and Usage-Based Analysis of Known Vulnerabilities in Open-Source Software.
- [ICSM 2019] Automated Characterization of Software Vulnerabilities.
- [ICSM 2019] OPIA: A Tool for On-Device Testing of Vulnerabilities in Android Applications.
- [ICSM 2020] Graph Neural Network-based Vulnerability Predication.
- [ICSM 2021] The Used, the Bloated, and the Vulnerable: Reducing the Attack Surface of an Industrial Application.
- [ICSM 2022] Heterogeneous Vulnerability Report Traceability Recovery by Vulnerability Aspect Matching.
- [ICSM 2023] Finding an Optimal Set of Static Analyzers To Detect Software Vulnerabilities.
- [ICSM 2024] VFIX: Facilitating Software Maintenance of Smart Contracts via Automatically Fixing Vulnerabilities.
- [ICSM 2024] An Empirical Study of Automatic Program Repair Techniques for Injection Vulnerabilities.
- [ICSM 2024] New PHP Language Features Make Your Static Code Analysis Tools Miss Vulnerabilities.
- [ICSM 2024] Improving Long-Tail Vulnerability Detection Through Data Augmentation Based on Large Language Models.
- [ICSM 2024] BABEL: A Novel Software Vulnerability Detection Framework for Breaking Language Barriers.
- [VMCAI 2018] Code Obfuscation Against Abstract Model Checking Attacks.
- [VMCAI 2020] Systematic Classification of Attackers via Bounded Model Checking.
- [ICWS 2010] Benchmarking Vulnerability Detection Tools for Web Services.
- [ICWS 2011] Defending Web Services against Denial of Service Attacks Using Client Puzzles.
- [ICWS 2012] Architecting Web Service Attack Detection Handlers.
- [ICWS 2016] Shilling Attacks Analysis in Collaborative Filtering Based Web Service Recommendation Systems.
- [ICWS 2017] Characterizing the Impacts of Application Layer DDoS Attacks.
- [ICWS 2017] I Know You Are Watching Me: Stackelberg-Based Adaptive Intrusion Detection Strategy for Insider Attacks in the Cloud.
- [ICWS 2020] A Practical Defense against Attribute Inference Attacks in Session-based Recommendations.
- [ICWS 2020] WGT: Thwarting Web Attacks Through Web Gene Tree-based Moving Target Defense.
- [ICWS 2022] Privacy Leakage Vulnerability Detection for Privacy-Preserving Computation Services.
- [ICWS 2023] Exploring Logic Scoring of Preference for DoS Attack Detection in Microservice Applications.
- [ICWS 2024] Assessing adversarial attacks in real-world fraud detection.
- [ICWS 2024] Proactive Detection of Physical Inter-rule Vulnerabilities in IoT Services Using a Deep Learning Approach.
- [ICWS 2024] TLSCG: Transfer Learning-Based Efficient Anomalous Smart Contract Generation to Empower Unknown Vulnerability Detection.
- [ICWS 2024] I Can Retrieve More than Images: Contrastive Stealing Attack against Deep Hashing Models.
- [ICWS 2024] KAVE: A Knowledge-Based Multi-Agent System for Web Vulnerability Detection.
- [ICWS 2024] Detection and Defense of Cache Pollution Attack Using State Transfer Matrix in Named Data Networks.
- [ICWS 2024] A novel backdoor scenario target the vulnerability of Prompt-as-a-Service for code intelligence models.
- [ICWS 2024] GasTrace: Detecting Sandwich Attack Malicious Accounts in Ethereum.
- [MIDDLEWARE 2018] RockFS: Cloud-backed File System Resilience to Client-Side Attacks.
- [MIDDLEWARE 2021] Prosecutor: an efficient BFT consensus algorithm with behavior-aware penalization against Byzantine attacks.
- [MIDDLEWARE 2022] MixNN: protection of federated learning against inference attacks by mixing neural network layers.
- [MIDDLEWARE 2022] Shielding federated learning systems against inference attacks with ARM TrustZone.
- [MIDDLEWARE 2024] AsyncFilter: Detecting Poisoning Attacks in Asynchronous Federated Learning.
- [SAS 2022] CLEVEREST: Accelerating CEGAR-based Neural Network Verification via Adversarial Attacks.
- [ESEM 2011] One Technique is Not Enough: A Comparison of Vulnerability Discovery Techniques.
- [ESEM 2013] When a Patch Goes Bad: Exploring the Properties of Vulnerability-Contributing Commits.
- [ESEM 2014] Discovering buffer overflow vulnerabilities in the wild: an empirical study.
- [ESEM 2016] Is Newer Always Better?: The Case of Vulnerability Prediction Models.
- [ESEM 2017] Security Vulnerabilities in Categories of Clones and Non-Cloned Code: An Empirical Study.
- [ESEM 2019] Characterizing Attacker Behavior in a Cybersecurity Penetration Testing Competition.
- [ESEM 2021] A comparative study of vulnerability reporting by software composition analysis tools.
- [ESEM 2021] Who are Vulnerability Reporters?: A Large-scale Empirical Study on FLOSS.
- [ESEM 2021] Why Some Bug-bounty Vulnerability Reports are Invalid?: Study of bug-bounty reports and developing an out-of-scope taxonomy model.
- [ESEM 2022] An Exploratory Study on Regression Vulnerabilities.
- [ESEM 2022] Does Collaborative Editing Help Mitigate Security Vulnerabilities in Crowd-Shared IoT Code Examples?
- [ESEM 2022] PG-VulNet: Detect Supply Chain Vulnerabilities in IoT Devices using Pseudo-code and Graphs.
- [ESEM 2024] Automated Code-centric Software Vulnerability Assessment: How Far Are We? An Empirical Study in C/C++.
- [ESEM 2024] Mitigating Data Imbalance for Software Vulnerability Assessment: Does Data Augmentation Help?
- [ESEM 2024] Automatic Data Labeling for Software Vulnerability Prediction Models: How Far Are We?
- [ISSRE 2010] Comparing SQL Injection Detection Tools Using Attack Injection: An Experimental Study.
- [ISSRE 2010] The Web Attacker Perspective - A Field Study.
- [ISSRE 2010] Preventing Overflow Attacks by Memory Randomization.
- [ISSRE 2010] Client-Side Detection of Cross-Site Request Forgery Attacks.
- [ISSRE 2011] Server Side Detection of Content Sniffing Attacks.
- [ISSRE 2012] Recycling Test Cases to Detect Security Vulnerabilities.
- [ISSRE 2014] Experience Report: An Analysis of Hypercall Handler Vulnerabilities.
- [ISSRE 2015] Security slicing for auditing XML, XPath, and SQL injection vulnerabilities.
- [ISSRE 2016] SV-AF - A Security Vulnerability Analysis Framework.
- [ISSRE 2016] Quantifying the Attack Detection Accuracy of Intrusion Detection Systems in Virtualized Environments.
- [ISSRE 2017] Experience Report: Security Vulnerability Profiles of Mission Critical Software: Empirical Analysis of Security Related Bug Reports.
- [ISSRE 2017] Experience Report: Study of Vulnerabilities of Enterprise Operating Systems.
- [ISSRE 2017] Software Metrics as Indicators of Security Vulnerabilities.
- [ISSRE 2017] Models of Reliability of Fault-Tolerant Software Under Cyber-Attacks.
- [ISSRE 2017] Automatically Repairing Web Application Firewalls Based on Successful SQL Injection Attacks.
- [ISSRE 2019] Learning Marked Markov Modulated Poisson Processes for Online Predictive Analysis of Attack Scenarios.
- [ISSRE 2021] A Comparative Study of Automatic Program Repair Techniques for Security Vulnerabilities.
- [ISSRE 2021] Automatically Identifying Bug Reports with Tactical Vulnerabilities by Deep Feature Learning.
- [ISSRE 2021] Peculiar: Smart Contract Vulnerability Detection Based on Crucial Data Flow Graph and Pre-training Techniques.
- [ISSRE 2021] Secure and Efficient White-box Encryption Scheme for Data Protection against Shared Cache Attacks in Cloud Computing.
- [ISSRE 2021] Vu1SPG: Vulnerability detection based on slice property graph representation learning.
- [ISSRE 2021] PyGuard: Finding and Understanding Vulnerabilities in Python Virtual Machines.
- [ISSRE 2022] Covariate Software Vulnerability Discovery Model to Support Cybersecurity Test & Evaluation (Practical Experience Report).
- [ISSRE 2023] On the Vulnerabilities of Text-to-SQL Models.
- [ISSRE 2023] Intrusion detection without attack knowledge: generating out-of-distribution tabular data.
- [ISSRE 2023] PSCVFinder: A Prompt-Tuning Based Framework for Smart Contract Vulnerability Detection.
- [ISSRE 2023] GraBit: A Sequential Model-Based Framework for Smart Contract Vulnerability Detection.
- [ISSRE 2023] ConvMHSA-SCVD: Enhancing Smart Contract Vulnerability Detection through a Knowledge-Driven and Data-Driven Framework.
- [ISSRE 2023] Efficient Avoidance of Vulnerabilities in Auto-completed Smart Contract Code Using Vulnerability-constrained Decoding.
- [ISSRE 2023] Automatic Static Vulnerability Detection for Machine Learning Libraries: Are We There Yet?
- [ISSRE 2024] S2Vul: Vulnerability Analysis Based on Self-supervised Information Integration.
- [ISSRE 2024] Fine-Tuning Pre-trained Model with Optimizable Prompt Learning for Code Vulnerability Detection.
- [ISSRE 2024] Learning Graph-based Patch Representations for Identifying and Assessing Silent Vulnerability Fixes.
- [ISSRE 2024] Understanding and Detecting Privacy Leakage Vulnerabilities in Hyperledger Fabric Chaincodes.
- [APSEC 2016] An Empirical Analysis of Vulnerabilities in OpenSSL and the Linux Kernel.
- [APSEC 2016] Projected Control Graph for Accurate and Efficient Analysis of Safety and Security Vulnerabilities.
- [APSEC 2018] Categorizing and Predicting Invalid Vulnerabilities on Common Vulnerabilities and Exposures.
- [APSEC 2018] A Comparison of Nano-Patterns vs. Software Metrics in Vulnerability Prediction.
- [APSEC 2019] Adaptive Random Testing for XSS Vulnerability.
- [APSEC 2019] Dam: A Practical Scheme to Mitigate Data-Oriented Attacks with Tagged Memory Based on Hardware.
- [APSEC 2019] Using Bayesian Networks for a Cyberattacks Propagation Analysis in Systems-of-Systems.
- [APSEC 2019] More Secure Collaborative APIs Resistant to Flush+Reload and Flush+Flush Attacks on ARMv8-A.
- [APSEC 2019] Witness: Detecting Vulnerabilities in Android Apps Extensively and Verifiably.
- [APSEC 2020] Examining the Relationship of Code and Architectural Smells with Software Vulnerabilities.
- [APSEC 2020] A Coloured Petri Nets Based Attack Tolerance Framework.
- [APSEC 2021] Program Verification Enhanced Precise Analysis of Interrupt-Driven Program Vulnerabilities.
- [APSEC 2021] Critical Understanding of Security Vulnerability Detection Plugin Evaluation Reports.
- [APSEC 2021] Smart Contract Vulnerability Detection Using Code Representation Fusion.
- [APSEC 2021] An Exploration Study On the Dependency Among Vulnerabilities and Bugs.
- [APSEC 2022] Catch Me If You Can: Blackbox Adversarial Attacks on Automatic Speech Recognition using Frequency Masking.
- [APSEC 2022] Defending against code injection attacks using Secure Design Pattern.
- [APSEC 2023] Improving Vulnerability Detection with Hybrid Code Graph Representation.
- [APSEC 2023] Assessing the Effectiveness of Vulnerability Detection via Prompt Tuning: An Empirical Study.
- [APSEC 2023] ChatGPT for Vulnerability Detection, Classification, and Repair: How Far Are We?
- [APSEC 2024] Effective Vulnerability Detection over Code Token Graph: A GCN with Score Gate Based Approach.
- [APSEC 2024] Enhancing Reentrancy Vulnerability Detection and Repair with a Hybrid Model Framework.
- [APSEC 2024] Enhancing the Transferability of Adversarial Attacks for End-to-End Autonomous Driving Systems.
- [APSEC 2024] Exploring Depths of WebAudio: Advancing Greybox Fuzzing for Vulnerability Detection in Safari.
- [EASE 2016] Improving vulnerability detection measurement: [test suites and software security assurance].
- [EASE 2019] Evaluation of Open-Source IDE Plugins for Detecting Security Vulnerabilities.
- [EASE 2019] A Demand-Side Viewpoint to Software Vulnerabilities in WordPress Plugins.
- [EASE 2019] A Conceptual Replication on Predicting the Severity of Software Vulnerabilities.
- [EASE 2021] A Large-scale Study of Security Vulnerability Support on Developer Q&A Websites.
- [EASE 2021] Dynamic Vulnerability Detection on Smart Contracts Using Machine Learning.
- [EASE 2021] HFContractFuzzer: Fuzzing Hyperledger Fabric Smart Contracts for Vulnerability Detection.
- [EASE 2022] Exploring Security Vulnerabilities in Competitive Programming: An Empirical Study.
- [EASE 2022] On the Use of Refactoring in Security Vulnerability Fixes: An Exploratory Study on Maven Libraries.
- [EASE 2022] A Vulnerability Detection Framework for Hyperledger Fabric Smart Contracts Based on Dynamic and Static Analysis.
- [EASE 2023] Code Privacy in Detection of Web Vulnerabilities.
- [EASE 2023] A Survey on Botnets Attack Detection Utilizing Machine and Deep Learning Models.
- [EASE 2024] Adversarial Attack and Robustness Improvement on Code Summarization.
- [EASE 2024] Analyzing Prerequistes of known Deserializtion Vulnerabilities on Java Applications.
- [EASE 2024] How the Training Procedure Impacts the Performance of Deep Learning-based Vulnerability Patching.
- [EASE 2024] Reality Check: Assessing GPT-4 in Fixing Real-World Software Vulnerabilities.
- [EASE 2024] VulDL: Tree-based and Graph-based Neural Networks for Vulnerability Detection and Localization.
- [EASE 2024] Mining REST APIs for Potential Mass Assignment Vulnerabilities.
- [EASE 2024] Negative Complement of a Set of Vulnerability-Fixing Commits: Method and Dataset.
- [EASE 2024] Automated Software Vulnerability Detection in Statement Level using Vulnerability Reports.
- [EASE 2024] Vulnerability Detection for software-intensive system.
- [EASE 2024] Software Vulnerability Prediction in Low-Resource Languages: An Empirical Study of CodeBERT and ChatGPT.
- [ICECCS 2013] A Comprehensive Client-Side Behavior Model for Diagnosing Attacks in Ajax Applications.
- [ICECCS 2013] Protecting Web Browser Extensions from JavaScript Injection Attacks.
- [ICECCS 2014] Design and Analysis of Security Attacks against Critical Smart Grid Infrastructures.
- [ICECCS 2015] Design and Evaluation of Feature Distributed Malware Attacks against the Internet of Things (IoT).
- [ICECCS 2017] TLSsem: A TLS Security-Enhanced Mechanism against MITM Attacks in Public WiFis.
- [ICECCS 2019] Joint Prediction of Multiple Vulnerability Characteristics Through Multi-Task Learning.
- [ICECCS 2019] Static Detection of Control-Flow-Related Vulnerabilities Using Graph Embedding.
- [ICECCS 2019] Squeezing State Spaces of (Attack-Defence) Trees.
- [ICECCS 2020] DEPOSafe: Demystifying the Fake Deposit Vulnerability in Ethereum Smart Contracts.
- [ICECCS 2022] HoS-ML: Socio-Technical System ADL Dedicated to Human Vulnerability Identification.
- [ICECCS 2022] Minimal Schedule with Minimal Number of Agents in Attack-Defence Trees.
- [ICECCS 2022] A Digital Twin Runtime Verification Framework for Protecting Satellites Systems from Cyber Attacks.
- [ICECCS 2023] Detecting Security Vulnerabilities in Human-Machine Pair Programming with Pointer Analysis.
- [ICST 2010] Searching for a Needle in a Haystack: Predicting Security Vulnerabilities for Windows Vista.
- [ICST 2011] Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities.
- [ICST 2011] Finding Software Vulnerabilities by Smart Fuzzing.
- [ICST 2012] XSS Vulnerability Detection Using Model Inference Assisted Evolutionary Fuzzing.
- [ICST 2013] VERA: A Flexible Model-Based Vulnerability Testing Tool.
- [ICST 2013] Research Questions for Model-Based Vulnerability Testing of Web Applications.
- [ICST 2014] Automated Test Generation from Vulnerability Signatures.
- [ICST 2015] Behind an Application Firewall, Are We Safe from SQL Injection Attacks?
- [ICST 2017] Recovering Semantic Traceability Links between APIs and Security Vulnerabilities: An Ontological Modeling Approach.
- [ICST 2017] A Search-Based Testing Approach for XML Injection Vulnerabilities in Web Applications.
- [ICST 2017] NIVAnalyzer: A Tool for Automatically Detecting and Verifying Next-Intent Vulnerabilities in Android Apps.
- [ICST 2017] Enhancing Trust - Software Vulnerability Analysis Framework.
- [ICST 2019] Fixing of Security Vulnerabilities in Open Source Projects: A Case Study of Apache HTTP Server and Apache Tomcat.
- [ICST 2024] Enhanced Fast and Reliable Statistical Vulnerability Root Cause Analysis with Sanitizer.
- [ICST 2024] On the Coupling between Vulnerabilities and LLM-Generated Mutants: A Study on Vul4J Dataset.
- [ICST 2025] Understanding the Effectiveness of Large Language Models in Detecting Security Vulnerabilities.
- [ISPASS 2024] SAP: Silicon Authentication Platform for System-on-Chip Supply Chain Vulnerabilities.
- [SCAM 2011] Security Testing of Web Applications: A Search-Based Approach for Cross-Site Scripting Vulnerabilities.
- [SCAM 2016] Vulnerability Prediction Models: A Case Study on the Linux Kernel.
- [SCAM 2016] Statically-Informed Dynamic Analysis Tools to Detect Algorithmic Complexity Vulnerabilities.
- [SCAM 2017] Detecting Security Vulnerabilities in Object-Oriented PHP Programs.
- [SCAM 2018] [Engineering Paper] Enabling the Continuous Analysis of Security Vulnerabilities with VulData7.
- [SCAM 2023] Leveraging User-Defined Identifiers for Counterfactual Data Generation in Source Code Vulnerability Detection.
- [SCAM 2023] PTLVD:Program Slicing and Transformer-based Line-level Vulnerability Detection System.
- [SCAM 2023] Can We Trust the Default Vulnerabilities Severity?
- [SCAM 2024] Enhancing Security through Modularization: A Counterfactual Analysis of Vulnerability Propagation and Detection Precision.
- [COMPSAC 2011] A Hypervisor for Injecting Scenario-Based Attack Effects.
- [COMPSAC 2012] Preventing Input Validation Vulnerabilities in Web Applications through Automated Type Analysis.
- [COMPSAC 2013] A Dynamic SQL Injection Vulnerability Test Case Generation Model Based on the Multiple Phases Detection Approach.
- [COMPSAC 2014] Auditing Buffer Overflow Vulnerabilities Using Hybrid Static-Dynamic Analysis.
- [COMPSAC 2014] A Countermeasure Recommendation System against Targeted Attacks with Preserving Continuity of Internal Networks.
- [COMPSAC 2015] MineSpider: Extracting URLs from Environment-Dependent Drive-by Download Attacks.
- [COMPSAC 2015] Buffer Overflow Vulnerability Prediction from x86 Executables Using Static Analysis and Machine Learning.
- [COMPSAC 2016] An Effective Penetration Test Approach Based on Feature Matrix for Exposing SQL Injection Vulnerability.
- [COMPSAC 2016] Toward Exploiting Access Control Vulnerabilities within MongoDB Backend Web Applications.
- [COMPSAC 2016] A Preliminary Study Examining Relationships Between Nano-Patterns and Software Security Vulnerabilities.
- [COMPSAC 2016] Generalized Attacker and Attack Models for Cyber Physical Systems.
- [COMPSAC 2016] How Secure is the Healthcare Network from Insider Attacks? An Audit Guideline for Vulnerability Analysis.
- [COMPSAC 2016] An Advanced Collusion Attack against User Friendship Privacy in OSNs.
- [COMPSAC 2017] Securing Link State Routing for Wireless Networks against Byzantine Attacks: A Monitoring Approach.
- [COMPSAC 2017] SecretSafe: A Lightweight Approach against Heap Buffer Over-Read Attack.
- [COMPSAC 2017] On the Effectiveness of Link Addition for Improving Robustness of Multiplex Networks against Layer Node-Based Attack.
- [COMPSAC 2017] Cybersecurity of Wearable Devices: An Experimental Analysis and a Vulnerability Assessment Method.
- [COMPSAC 2017] Access Control Model for the Inference Attacks with Access Histories.
- [COMPSAC 2017] An Iris-Based Authentication Framework to Prevent Presentation Attacks.
- [COMPSAC 2017] Making DNS Servers Resistant to Cyber Attacks: An Empirical Study on Formal Methods and Performance.
- [COMPSAC 2017] Secure Double-Layered Defense against HTTP-DDoS Attacks.
- [COMPSAC 2018] A Pull-Type Security Patch Management of an Intrusion Tolerant System Under a Periodic Vulnerability Checking Strategy.
- [COMPSAC 2018] Benchmark Requirements for Assessing Software Security Vulnerability Testing Tools.
- [COMPSAC 2018] Secure Mobile IPC Software Development with Vulnerability Detectors in Android Studio.
- [COMPSAC 2018] Removing Software Vulnerabilities During Design.
- [COMPSAC 2018] A Best-Effort Damage Mitigation Model for Cyber-Attacks on Smart Grids.
- [COMPSAC 2018] Detecting Emerging Large-Scale Vulnerability Scanning Activities by Correlating Low-Interaction Honeypots with Darknet.
- [COMPSAC 2018] PDL: An Efficient Prediction-Based False Data Injection Attack Detection and Location in Smart Grid.
- [COMPSAC 2019] Detecting Malicious Attacks Exploiting Hardware Vulnerabilities Using Performance Counters.
- [COMPSAC 2019] Detecting Successful Attacks from IDS Alerts Based On Emulation of Remote Shellcodes.
- [COMPSAC 2020] Who Would Bob Blame? Factors in Blame Attribution in Cyberattacks Among the Non-Adopting Population in the Context of 2FA.
- [COMPSAC 2020] Improving Attack Detection Performance in NIDS Using GAN.
- [COMPSAC 2020] vSwitchGuard: Defending OpenFlow Switches Against Saturation Attacks.
- [COMPSAC 2020] Smart Contracts Vulnerability Auditing with Multi-semantics.
- [COMPSAC 2020] Abuse of the Cloud as an Attack Platform.
- [COMPSAC 2020] Attacks and Mitigation Techniques for Iris-Based Authentication Systems.
- [COMPSAC 2020] Binary Similarity Analysis for Vulnerability Detection.
- [COMPSAC 2020] Scan-Based Self Anomaly Detection: Client-Side Mitigation of Channel-Based Man-in-the-Middle Attacks Against Wi-Fi.
- [COMPSAC 2020] Attack Intention Estimation Based on Syntax Analysis and Dynamic Analysis for SQL Injection.
- [COMPSAC 2020] Comprehensive Review of Collaborative Network Attacks in MANET.
- [COMPSAC 2020] Cloud: A Platform to Launch Stealth Attacks.
- [COMPSAC 2020] Testing Convolutional Neural Network using Adversarial Attacks on Potential Critical Pixels.
- [COMPSAC 2020] Hands-on Lab on Smart City Vulnerability Exploitation.
- [COMPSAC 2020] Evolutionary Algorithms for Vulnerability Coverage.
- [COMPSAC 2021] Detecting Event-synced Navigation Attacks across User-generated Content Platforms.
- [COMPSAC 2021] DDAF: Deceptive Data Acquisition Framework against Stealthy Attacks in Cyber-Physical Systems.
- [COMPSAC 2021] An Empirical Study of Vulnerabilities in Robotics.
- [COMPSAC 2021] Key Aspects Augmentation of Vulnerability Description based on Multiple Security Databases.
- [COMPSAC 2021] Security Metric for Networks with Intrusion Detection Systems having Time Latency using Attack Graphs.
- [COMPSAC 2021] A Taxonomy of XSS Attack Detections in Mobile Environments based on Automation Capabilities.
- [COMPSAC 2021] Human Susceptibility to Phishing Attacks Based on Personality Traits: The Role of Neuroticism.
- [COMPSAC 2021] OPD: Network Packet Distribution after Achieving Equilibrium to Mitigate DDOS Attack.
- [COMPSAC 2021] A Preliminary Study on Common Programming Mistakes that Lead to Buffer Overflow Vulnerability.
- [COMPSAC 2021] Attack Prediction using Hidden Markov Model.
- [COMPSAC 2021] Toward Explainable Users: Using NLP to Enable AI to Understand Users’ Perceptions of Cyber Attacks.
- [COMPSAC 2022] Quantum Machine Learning for Software Supply Chain Attacks: How Far Can We Go?
- [COMPSAC 2022] A Multi-Objective Approach for Security Hardening and Probabilistic Vulnerability Assessment on Attack Graphs.
- [COMPSAC 2022] EOSIOAnalyzer: An Effective Static Analysis Vulnerability Detection Framework for EOSIO Smart Contracts.
- [COMPSAC 2022] Can Deep Learning Models Learn the Vulnerable Patterns for Vulnerability Detection?
- [COMPSAC 2022] Vulnerability Detection in Smart Contracts Using Deep Learning.
- [COMPSAC 2022] SSG-AFL: Vulnerability detection for Reactive Systems using Static Seed Generator based AFL.
- [COMPSAC 2022] EtherGIS: A Vulnerability Detection Framework for Ethereum Smart Contracts Based on Graph Learning Features.
- [COMPSAC 2023] Adversarial Human Context Recognition: Evasion Attacks and Defenses.
- [COMPSAC 2023] Milo: Attacking Deep Pre-trained Model for Programming Languages Tasks with Anti-analysis Code Obfuscation.
- [COMPSAC 2023] A Small Leak Will Sink Many Ships: Vulnerabilities Related to mini-programs Permissions.
- [COMPSAC 2023] AirKeyLogger: Hardwareless Air-Gap Keylogging Attack.
- [COMPSAC 2023] Detecting and Preventing ROP Attacks using Machine Learning on ARM.
- [COMPSAC 2023] IDS-MA: Intrusion Detection System for IoT MQTT Attacks Using Centralized and Federated Learning.
- [COMPSAC 2023] Preserving Privacy of Neuromorphic Hardware From PCIe Congestion Side-Channel Attack.
- [COMPSAC 2023] CCDetector: Detect Chaincode Vulnerabilities Based on Knowledge Graph.
- [COMPSAC 2023] FL-PTD: A Privacy Preserving Defense Strategy Against Poisoning Attacks in Federated Learning.
- [COMPSAC 2023] Feature Engineering-Based Detection of Buffer Overflow Vulnerability in Source Code Using Neural Networks.
- [COMPSAC 2023] Plain Source Code Obfuscation as an Effective Attack Method on IoT Malware Image Classification.
- [COMPSAC 2023] Survivability Model of Networks using Attack Graphs and Markov Chains.
- [COMPSAC 2023] Security Operation Support by Estimating Cyber Attacks Without Traffic Decryption.
- [COMPSAC 2023] Security Impact Analysis of Degree of Field Extension in Lattice Attacks on Ring-LWE Problem.
- [COMPSAC 2023] Transparency-based reconnaissance for APT attacks.
- [COMPSAC 2023] PAD-Phys: Exploiting Physiology for Presentation Attack Detection in Face Biometrics.
- [COMPSAC 2023] Uncovering Software Supply Chains Vulnerability: A Review of Attack Vectors, Stakeholders, and Regulatory Frameworks.
- [COMPSAC 2023] Evaluating ChatGPT for Smart Contracts Vulnerability Correction.
- [COMPSAC 2023] Security Risk and Attacks in AI: A Survey of Security and Privacy.
- [COMPSAC 2024] PIXHELL Attack: Leaking Sensitive Information from Air-Gap Computers via ‘Singing Pixels’.
- [COMPSAC 2024] XGDFed: Exposing Vulnerability in Byzantine Robust Federated Binary Classifiers with Novel Aggregation-Agnostic Model Poisoning Attack.
- [COMPSAC 2024] Ants: Attacking Spatial Temporal Graph Learning Networks Structurally.
- [COMPSAC 2024] Fine-Tuned Variational Quantum Classifiers for Cyber Attacks Detection Based on Parameterized Quantum Circuits and Optimizers.
- [COMPSAC 2024] Quantum Adversarial Attacks: Developing Quantum FGSM Algorithm.
- [COMPSAC 2024] Robustness of Random Walk on a Graph against Adversary Attacks.
- [COMPSAC 2024] Audio Steganography Based Backdoor Attack for Speech Recognition Software.
- [COMPSAC 2024] VulDet-BC: Binary Software Vulnerability Detection Based on BiGRU and CNN.
- [COMPSAC 2024] A Risk Assessment based RBAC using Attack Graphs to Mitigate Insider Threat during UAQ.
- [COMPSAC 2024] Authentic Learning Approach for Data Poisoning Vulnerability in LLMs.
- [COMPSAC 2024] Assessing Initial Attacks and Defense with Retry Function in MQTT Over QUIC.
- [COMPSAC 2024] Feasibility Assessment of Denial-of-Service Attacks by Analyzing SOME/IP-SD State Transition Models.
- [COMPSAC 2024] DDoS Attack Information Sharing Among CDNs Interconnected Through CDNI.
- [COMPSAC 2024] Call Graph Delta Analysis and Security Vulnerability Assessment with Static Analysis.
- [COMPSAC 2024] Formal Support for Threat Modeling with Attack Decision Diagrams.
- [ICFEM 2016] A Formal Approach to Identifying Security Vulnerabilities in Telecommunication Networks.
- [ICFEM 2016] CPDY: Extending the Dolev-Yao Attacker with Physical-Layer Interactions.
- [ICFEM 2017] An Improved Android Collusion Attack Detection Method Based on Program Slicing.
- [ICFEM 2018] Towards Building a Generic Vulnerability Detection Platform by Combining Scalable Attacking Surface Analysis and Directed Fuzzing.
- [ICFEM 2020] Hackers vs. Security: Attack-Defence Trees as Asynchronous Multi-agent Systems.
- [ICFEM 2022] A Formal Methodology for Verifying Side-Channel Vulnerabilities in Cache Architectures.
- [ICFEM 2023] Compositional Vulnerability Detection with Insecurity Separation Logic.
- [ICFEM 2023] IoT Software Vulnerability Detection Techniques through Large Language Model.
- [ICFEM 2023] Vulnerability Detection via Typestate-Guided Code Representation Learning.
- [ISPW 2022] Privilege Escalation Attack Scenarios on the DevOps Pipeline Within a Kubernetes Environment.
- [SEKE 2010] A String Constraint Solver for Detecting Web Application Vulnerability.
- [SEKE 2010] Towards a Structured Model for Software Vulnerabilities.
- [SEKE 2013] Modeling and Analyzing Attack-Defense Strategy of Resource Service in Cloud Computing.
- [SEKE 2014] Runtime Code Reuse Attacks: A Dynamic Framework Bypassing Fine-Grained Address Space Layout Randomization.
- [SEKE 2015] Statically-Guided Fork-based Symbolic Execution for Vulnerability Detection.
- [SEKE 2015] Modeling Framework for Developing and Testing Network Security Techniques against DDoS Attacks.
- [SEKE 2017] SemHunt: Identifying Vulnerability Type with Double Validation in Binary Code.
- [SEKE 2018] Finding Shilling Attack in Recommender System based on Dynamic Feature Selection.
- [SEKE 2019] Detecting Security Vulnerabilities using Clone Detection and Community Knowledge.
- [SEKE 2019] An Integrated Software Vulnerability Discovery Model based on Artificial Neural Network.
- [SEKE 2020] A Detect-and-Modify Region-based Classifier to Defend Evasion Attacks.
- [SEKE 2020] Classifying Common Security Vulnerabilities by Software Type.
- [SEKE 2020] Characterizing Vulnerabilities in a Major Linux Distribution.
- [SEKE 2020] SecureChange: An Automated Framework to Guide Programmers in Fixing Vulnerability.
- [SEKE 2021] From Vulnerability Anti-Patterns to Secure Design Patterns (S).
- [SEKE 2023] Fine-Grained Source Code Vulnerability Detection via Graph Neural Networks (S).
- [SEKE 2023] Smart Contract Vulnerability Detection Based on Clustering Opcode Instructions.
- [SEKE 2024] Vulnerability Detection Based on Adapter Tuning and Enhanced Feature Learning.
- [SEKE 2024] Intelligent Contract Timestamp Vulnerability Detection Based on Key Control FlowGraph.
- [SEKE 2024] Smart Contract Vulnerability Detection Based on Mixed Channel Attention.
- [SEKE 2024] Multi-Scale Feature Extraction with Supervised Contrastive Learning for Vulnerability Detection.
- [SEKE 2024] Vulnerability Detection Based on Pre-trained Code Language Model and Convolutional Neural Network.
- [QRS 2015] Attack Pattern-Based Combinatorial Testing with Constraints for Web Security Testing.
- [QRS 2015] Known XML Vulnerabilities Are Still a Threat to Popular Parsers and Open Source Systems.
- [QRS 2016] Profiling Android Vulnerabilities.
- [QRS 2017] Detecting Cross-Site Scripting Vulnerabilities through Automated Unit Testing.
- [QRS 2018] Vulnerability Assessment of Web Services with Model-Based Mutation Testing.
- [QRS 2019] Detecting Vulnerabilities in Android Applications using Event Sequences.
- [QRS 2019] Improving the Accuracy of Vulnerability Report Classification Using Term Frequency-Inverse Gravity Moment.
- [QRS 2020] Attack Graph Auto-Generation for Blockchains based on Bigraphical Reaction Systems.
- [QRS 2021] A Novel Method to Prevent Multiple Withdraw Attack on ERC20 Tokens.
- [QRS 2021] Cryptography Vulnerabilities on HackerOne.
- [QRS 2021] Dynamic Interval-based Watermarking for Tracking down Network Attacks.
- [QRS 2021] A Simulation based Intelligent Analysis Framework of Aircraft Reliability, Resilience and Vulnerability.
- [QRS 2021] Estimating the Attack Surface from Residual Vulnerabilities in Open Source Software Supply Chain.
- [QRS 2021] Confuzzion: A Java Virtual Machine Fuzzer for Type Confusion Vulnerabilities.
- [QRS 2021] Vulnerability Analysis of Similar Code.
- [QRS 2021] ReDefender: A Tool for Detecting Reentrancy Vulnerabilities in Smart Contracts Effectively.
- [QRS 2021] WANA: Symbolic Execution of Wasm Bytecode for Extensible Smart Contract Vulnerability Detection.
- [QRS 2021] Analyzing Software Security-related Size and its Relationship with Vulnerabilities in OSS.
- [QRS 2021] Analyzing the Impact of Cyberattacks on Industrial Control Systems using Timed Automata.
- [QRS 2022] A Comprehensive Analysis of NVD Concurrency Vulnerabilities.
- [QRS 2022] IntJect: Vulnerability Intent Bug Seeding.
- [QRS 2022] Exploring Transformers for Multi-Label Classification of Java Vulnerabilities.
- [QRS 2022] Can PoW Consensus Protocol Resist the Whale Attack?
- [QRS 2022] Multi-Transaction Sequence Vulnerability Detection for Smart Contracts based on Inter-Path Data Dependency.
- [QRS 2022] DeepRTest: A Vulnerability-Guided Robustness Testing and Enhancement Framework for Deep Neural Networks.
- [QRS 2022] A Survey on Backdoor Attack and Defense in Natural Language Processing.
- [QRS 2022] Quantity-Simulation-Analysis Method based Novel RSA Timing Attack Algorithm for Single-Chip Microcomputer Platform.
- [QRS 2023] AndrAS: Automated Attack Surface Extraction for Android Applications.
- [QRS 2024] A Method of Network Attack Named Entity Recognition based on Deep Active Learning.
- [QRS 2024] Requirements for Applying SCIA: A Structured Cyberattack Impact Analysis Approach for ICS.
- [QRS 2024] cf-TDFM: A Framework for Limiting Fault Infusion Attacks on Deep Neural Networks.
- [QRS 2024] GNN-Based Transfer Learning and Tuning for Detecting Code Vulnerabilities across Different Programming Languages.
- [ICSR 2019] A Double-Edged Sword? Software Reuse and Potential Security Vulnerabilities.
- [ICWE 2013] Detecting Occasional Reputation Attacks on Cloud Services.
- [ICWE 2018] Refining Traceability Links Between Vulnerability and Software Component in a Vulnerability Knowledge Graph.
- [SPIN 2014] Generic and efficient attacker models in SPIN.
- [SPIN 2015] String Analysis for Vulnerability Detection and Repair.
- [SPIN 2022] Monitoring Cyber-Physical Systems Using a Tiny Twin to Prevent Cyber-Attacks.
- [ATVA 2017] Attacking the V: On the Resiliency of Adaptive-Horizon MPC.
- [TASE 2010] Estimating the Soft Error Vulnerability of Register Files via Interprocedural Data Flow Analysis.
- [TASE 2012] File Parsing Vulnerability Detection with Symbolic Execution.
- [TASE 2020] A Comparative Study of Neural Network Techniques for Automatic Software Vulnerability Detection.
- [TASE 2020] AT-ROP: Using static analysis and binary patch technology to defend against ROP attacks based on return instruction.
- [TASE 2021] A Character-Level Convolutional Neural Network for Predicting Exploitability of Vulnerability.
- [TASE 2022] Sound Static Analysis of Regular Expressions for Vulnerabilities to Denial of Service Attacks.
- [TASE 2022] Security Vulnerabilities Detection Through Assertion-Based Approach.
- [TASE 2024] Detecting Vulnerabilities via Explicitly Leveraging Vulnerability Features on Program Slices.
- [TASE 2024] CtxFuzz: Discovering Heap-Based Memory Vulnerabilities Through Context Heap Operation Sequence Guided Fuzzing.
- [MSR 2015] Do Bugs Foreshadow Vulnerabilities? A Study of the Chromium Project.
- [MSR 2017] An empirical study on Android-related vulnerabilities.
- [MSR 2017] Understanding the origins of mobile app vulnerabilities: a large-scale measurement study of free and paid apps.
- [MSR 2018] VulinOSS: a dataset of security vulnerabilities in open-source systems.
- [MSR 2018] On the impact of security vulnerabilities in the npm package dependency network.
- [MSR 2019] Automated software vulnerability assessment with concept drift.
- [MSR 2019] A manually-curated dataset of fixes to vulnerabilities of open-source software.
- [MSR 2020] A Machine Learning Approach for Vulnerability Curation.
- [MSR 2020] A C/C++ Code Vulnerability Dataset with Code Changes and CVE Summaries.
- [MSR 2021] Automatic Part-of-Speech Tagging for Security Vulnerability Descriptions.
- [MSR 2021] On the Effectiveness of Deep Vulnerability Detectors to Simple Stupid Bug Detection.
- [MSR 2022] Vul4J: A Dataset of Reproducible Java Vulnerabilities Geared Towards the Study of Program Repair Techniques.
- [MSR 2022] LineVD: Statement-level Vulnerability Detection using Graph Neural Networks.
- [MSR 2022] LineVul: A Transformer-based Line-Level Vulnerability Prediction.
- [MSR 2022] On the Use of Fine-grained Vulnerable Code Statements for Software Vulnerability Assessment Models.
- [MSR 2023] Characterizing and Understanding Software Security Vulnerabilities in Machine Learning Libraries.
- [MSR 2023] MANDO-HGT: Heterogeneous Graph Transformers for Smart Contract Vulnerability Detection.
- [MSR 2024] Are Latent Vulnerabilities Hidden Gems for Software Vulnerability Prediction? An Empirical Study.
- [MSR 2024] Hash4Patch: A Lightweight Low False Positive Tool for Finding Vulnerability Patch Commits.
- [MSR 2024] MegaVul: A C/C++ Vulnerability Dataset with Comprehensive Code Representations.
- [MSR 2025] Wolves in the Repository: A Software Engineering Analysis of the XZ Utils Supply Chain Attack.
- [MSR 2025] From Industrial Practices to Academia: Uncovering the Gap in Vulnerability Research and Practice.
- [MSR 2025] SCRUBD: Smart Contracts Reentrancy and Unhandled Exceptions Vulnerability Dataset.
- [MSR 2025] ICVul: A Well-labeled C/C++ Vulnerability Dataset with Comprehensive Metadata and VCCs.
- [MSR 2025] Chasing the Clock: How Fast Are Vulnerabilities Fixed in the Maven Ecosystem?
- [MSR 2025] Decoding Dependency Risks: A Quantitative Study of Vulnerabilities in the Maven Ecosystem.
- [MSR 2025] Faster Releases, Fewer Risks: A Study on Maven Artifact Vulnerabilities and Lifecycle Management.
- [MSR 2025] Insights into Vulnerability Trends in Maven Artifacts: Recurrence, Popularity, and User Behavior.
- [MSR 2025] Understanding Software Vulnerabilities in the Maven Ecosystem: Patterns, Timelines, and Risks.
- [MSR 2025] Analyzing Vulnerability Overestimation in the Maven Ecosystem.
- [MSR 2025] Out of Sight, Still at Risk: The Lifecycle of Transitive Vulnerabilities in Maven.
- [MSR 2025] The Ripple Effect of Vulnerabilities in Maven Central: Prevalence, Propagation, and Mitigation Challenges.
- [MSR 2025] Tracing Vulnerabilities in Maven: A Study of CVE lifecycles and Dependency Networks.
- [MSR 2025] Characterizing Packages for Vulnerability Prediction.
- [MSR 2025] How Much Do Code Language Models Remember? An Investigation on Data Extraction Attacks Before and After Fine-tuning.
- [REFSQ 2010] Visualizing Cyber Attacks with Misuse Case Maps.
- [REFSQ 2024] Assessing the Understandability and Acceptance of Attack-Defense Trees for Modelling Security Requirements.
- [INTERNETWARE 2018] Vanguard: Detecting Missing Checks for Prognosing Potential Vulnerabilities.
- [INTERNETWARE 2020] EOSFuzzer: Fuzzing EOSIO Smart Contracts for Vulnerability Detection.
- [INTERNETWARE 2022] An adaptive search optimization algorithm for improving the detection capability of software vulnerability.
- [INTERNETWARE 2023] Comparing the Performance of Different Code Representations for Learning-based Vulnerability Detection.
- [INTERNETWARE 2023] VulD-Transformer: Source Code Vulnerability Detection via Transformer.
- [INTERNETWARE 2024] Enhancing Deep Learning Vulnerability Detection through Imbalance Loss Functions: An Empirical Study.
- [INTERNETWARE 2024] DFEPT: Data Flow Embedding for Enhancing Pre-Trained Model Based Vulnerability Detection.
- [INTERNETWARE 2024] T-RAP: A Template-guided Retrieval-Augmented Vulnerability Patch Generation Approach.
- [INTERNETWARE 2024] MatsVD: Boosting Statement-Level Vulnerability Detection via Dependency-Based Attention.
- [INTERNETWARE 2024] LateBA: Latent Backdoor Attack on Deep Bug Search via Infrequent Execution Codes.
- [RV 2012] Defense against Stack-Based Attacks Using Speculative Stack Layout Transformation.
- [RV 2022] Rule-Based Runtime Mitigation Against Poison Attacks on Neural Networks.
- [SIGMOD 2010] K-isomorphism: privacy preserving network publication against structural attacks.
- [SIGMOD 2017] ACIDRain: Concurrency-Related Attacks on Database-Backed Web Applications.
- [SIGMOD 2021] De-anonymization Attacks on Neuroimaging Datasets.
- [SIGMOD 2021] SRA: Smart Recovery Advisor for Cyber Attacks.
- [SIGMOD 2022] The Price of Tailoring the Index to Your Data: Poisoning Attacks on Learned Index Structures.
- [KDD 2010] Beyond heuristics: learning to classify vulnerabilities and predict exploits.
- [KDD 2011] Exploiting vulnerability to secure user privacy on a social networking site.
- [KDD 2011] Personal privacy vs population privacy: learning to attack anonymization.
- [KDD 2011] Privacy-preserving social network publication against friendship attacks.
- [KDD 2012] HySAD: a semi-supervised hybrid shilling attack detector for trustworthy product recommendation.
- [KDD 2014] Scalable noise mining in long-term electrocardiographic time-series to predict death following heart attacks.
- [KDD 2018] Identify Susceptible Locations in Medical Records via Adversarial Attacks on Deep Predictive Models.
- [KDD 2018] Adversarial Attacks on Neural Networks for Graph Data.
- [KDD 2019] Robust Graph Convolutional Networks Against Adversarial Attacks.
- [KDD 2019] Using Twitter to Predict When Vulnerabilities will be Exploited.
- [KDD 2020] Truth Discovery against Strategic Sybil Attack in Crowdsourcing.
- [KDD 2020] An Embarrassingly Simple Approach for Trojan Attack in Deep Neural Networks.
- [KDD 2020] Vulnerability vs. Reliability: Disentangled Adversarial Examples for Cross-Modal Learning.
- [KDD 2020] Malicious Attacks against Deep Reinforcement Learning Interpretations.
- [KDD 2020] Re-identification Attack to Privacy-Preserving Data Analysis with Noisy Sample-Mean.
- [KDD 2020] Attackability Characterization of Adversarial Evasion Attack on Discrete Data.
- [KDD 2020] RayS: A Ray Searching Method for Hard-label Adversarial Attack.
- [KDD 2020] AdvMind: Inferring Adversary Intent of Black-Box Attacks.
- [KDD 2020] Two Sides of the Same Coin: White-box and Black-box Attacks for Transfer Learning.
- [KDD 2020] Adversarial Attacks and Defenses: Frontiers, Advances and Practice.
- [KDD 2021] PAR-GAN: Improving the Generalization of Generative Adversarial Networks Against Membership Inference Attacks.
- [KDD 2021] PETGEN: Personalized Text Generation Attack on Deep Sequence Embedding-based Classification Models.
- [KDD 2021] Multi-view Correlation based Black-box Adversarial Attack for 3D Object Detection.
- [KDD 2021] Graph Adversarial Attack via Rewiring.
- [KDD 2021] Simple and Efficient Hard Label Black-box Adversarial Attacks in Low Query Budget Regimes.
- [KDD 2021] Triple Adversarial Learning for Influence based Poisoning Attack in Recommender Systems.
- [KDD 2021] Indirect Invisible Poisoning Attacks on Domain Adaptation.
- [KDD 2021] Defending Privacy Against More Knowledgeable Membership Inference Attackers.
- [KDD 2021] Data Poisoning Attack against Recommender System Using Incomplete and Perturbed Data.
- [KDD 2021] Data Poisoning Attacks Against Outcome Interpretations of Predictive Models.
- [KDD 2021] TDGIA: Effective Injection Attacks on Graph Neural Networks.
- [KDD 2021] A Framework for Modeling Cyber Attack Techniques from Security Vulnerability Descriptions.
- [KDD 2021] Adversarial Attacks on Deep Models for Financial Transaction Records.
- [KDD 2022] Knowledge-enhanced Black-box Attacks for Recommendations.
- [KDD 2022] Graph Structural Attack by Perturbing Spectral Distance.
- [KDD 2022] Bilateral Dependency Optimization: Defending Against Model-inversion Attacks.
- [KDD 2022] DICE: Domain-attack Invariant Causal Learning for Improved Data Privacy Protection and Adversarial Robustness.
- [KDD 2022] Debiasing Learning for Membership Inference Attacks Against Recommender Systems.
- [KDD 2022] LeapAttack: Hard-Label Adversarial Attack on Text via Gradient-Based Optimization.
- [KDD 2022] Availability Attacks Create Shortcuts.
- [KDD 2022] FLDetector: Defending Federated Learning Against Model Poisoning Attacks via Detecting Malicious Clients.
- [KDD 2022] FedAttack: Effective and Covert Poisoning Attack on Federated Recommendation via Hard Sampling.
- [KDD 2022] Towards Adversarial Learning: From Evasion Attacks to Poisoning Attacks.
- [KDD 2023] Investigating Trojan Attacks on Pre-trained Language Model-powered Database Middleware.
- [KDD 2023] FedDefender: Client-Side Attack-Tolerant Federated Learning.
- [KDD 2023] Towards Understanding and Enhancing Robustness of Deep Learning Models against Malicious Unlearning Attacks.
- [KDD 2023] Temporal Dynamics-Aware Adversarial Attacks on Discrete-Time Dynamic Graph Models.
- [KDD 2023] PAT: Geometry-Aware Hard-Label Black-Box Adversarial Attacks on Text.
- [KDD 2023] Revisiting Personalized Federated Learning: Robustness Against Backdoor Attacks.
- [KDD 2023] UA-FedRec: Untargeted Attack on Federated News Recommendation.
- [KDD 2024] RCTD: Reputation-Constrained Truth Discovery in Sybil Attack Crowdsourcing Environment.
- [KDD 2024] Attacking Graph Neural Networks with Bit Flips: Weisfeiler and Leman Go Indifferent.
- [KDD 2024] Cross-Context Backdoor Attacks against Graph Prompt Learning.
- [KDD 2024] CheatAgent: Attacking LLM-Empowered Recommender Systems via LLM Agent.
- [KDD 2024] Unsupervised Heterogeneous Graph Rewriting Attack via Node Clustering.
- [KDD 2024] Unveiling Vulnerabilities of Contrastive Recommender Systems to Poisoning Attacks.
- [KDD 2024] Fake News in Sheep’s Clothing: Robust Fake News Detection Against LLM-Empowered Style Attacks.
- [KDD 2024] Unveiling Privacy Vulnerabilities: Investigating the Role of Structure in Graph Data.
- [KDD 2024] Rethinking Graph Backdoor Attacks: A Distribution-Preserving Perspective.
- [KDD 2024] FedSecurity: A Benchmark for Attacks and Defenses in Federated Learning and Federated LLMs.
- [KDD 2025] Wedjat: Detecting Sophisticated Evasion Attacks via Real-time Causal Analysis.
- [KDD 2025] Adaptive Domain Inference Attack with Concept Hierarchy.
- [KDD 2025] On Measuring Unnoticeability of Graph Adversarial Attacks: Observations, New Measure, and Applications.
- [KDD 2025] Enhancing Black-Box Adversarial Attacks on Discrete Sequential Data via Bilevel Bayesian Optimization in Hybrid Spaces.
- [KDD 2025] Benchmarking and Defending against Indirect Prompt Injection Attacks on Large Language Models.
- [ICDE 2011] Preventing equivalence attacks in updated, anonymized data.
- [ICDE 2015] Preserving privacy in social networks against connection fingerprint attacks.
- [ICDE 2020] PoisonRec: An Adaptive Data Poisoning Framework for Attacking Black-box Recommender Systems.
- [ICDE 2021] Feature Inference Attack on Model Predictions in Vertical Federated Learning.
- [ICDE 2021] Attacking Black-box Recommendations via Copying Cross-domain User Profiles.
- [ICDE 2021] Stealthy Targeted Data Poisoning Attack on Knowledge Graphs.
- [ICDE 2022] BinarizedAttack: Structural Poisoning Attacks to Graph-based Anomaly Detection.
- [ICDE 2022] Black-box Adversarial Attack and Defense on Graph Neural Networks.
- [ICDE 2022] Towards Backdoor Attack on Deep Learning based Time Series Classification.
- [ICDE 2022] FedRecAttack: Model Poisoning Attack to Federated Recommendation.
- [ICDE 2023] Jointly Attacking Graph Neural Network and its Explanations.
- [ICDE 2023] Federated IoT Interaction Vulnerability Analysis.
- [ICDE 2023] Differential Aggregation against General Colluding Attackers.
- [ICDE 2023] Planning Data Poisoning Attacks on Heterogeneous Recommender Systems in a Multiplayer Setting.
- [ICDE 2024] LDPRecover: Recovering Frequencies from Poisoning Attacks Against Local Differential Privacy.
- [ICDE 2024] Preventing the Popular Item Embedding Based Attack in Federated Recommendations.
- [ICDE 2024] Interactive Trimming Against Evasive Online Data Manipulation Attacks: A Game-Theoretic Approach.
- [SIGIR 2014] Detection of abnormal profiles on group attacks in recommender systems.
- [SIGIR 2015] Reducing Hubness: A Cause of Vulnerability in Recommender Systems.
- [SIGIR 2020] Studying Ransomware Attacks Using Web Search Logs.
- [SIGIR 2020] Data Poisoning Attacks against Differentially Private Recommender Systems.
- [SIGIR 2020] Adversarial Attacks and Detection on Reinforcement Learning-Based Interactive Recommender Systems.
- [SIGIR 2021] DAIR: A Query-Efficient Decision-based Attack on Image Retrieval Systems.
- [SIGIR 2021] Targeted Attack and Defense for Deep Hashing.
- [SIGIR 2023] Topic-oriented Adversarial Attacks against Black-box Neural Ranking Models.
- [SIGIR 2023] Attacking Pre-trained Recommendation.
- [SIGIR 2024] Multi-granular Adversarial Attacks against Black-box Neural Ranking Models.
- [SIGIR 2024] Untargeted Adversarial Attack on Knowledge Graph Embeddings.
- [SIGIR 2025] Document Screenshot Retrievers are Vulnerable to Pixel Poisoning Attacks.
- [SIGIR 2025] PR-Attack: Coordinated Prompt-RAG Attacks on Retrieval-Augmented Generation in Large Language Models via Bilevel Optimization.
- [SIGIR 2025] Diversity-aware Dual-promotion Poisoning Attack on Sequential Recommendation.
- [SIGIR 2025] Unsupervised Corpus Poisoning Attacks in Continuous Space for Dense Retrieval.
- [SIGIR 2025] Information Leakage of Sentence Embeddings via Generative Embedding Inversion Attacks.
- [CIKM 2012] Measuring robustness of complex networks under MVC attack.
- [CIKM 2013] A belief propagation approach for detecting shilling attacks in collaborative filtering.
- [CIKM 2015] A Data-Driven Approach to Distinguish Cyber-Attacks from Physical Faults in a Smart Grid.
- [CIKM 2017] Crowdsourcing Cybersecurity: Cyber Attack Detection using Social Media.
- [CIKM 2017] Profiling DRDoS Attacks with Data Analytics Pipeline.
- [CIKM 2019] αCyber: Enhancing Robustness of Android Malware Detection System against Adversarial Attacks on Heterogeneous Graph based Model.
- [CIKM 2019] Wide-Ranging Review Manipulation Attacks: Model, Empirical Study, and Countermeasures.
- [CIKM 2019] Data Poisoning Attacks on Cross-domain Recommendation.
- [CIKM 2020] Attacking Recommender Systems with Augmented User Profiles.
- [CIKM 2020] A Graph Matching Attack on Privacy-Preserving Record Linkage.
- [CIKM 2021] Single Node Injection Attack against Graph Neural Networks.
- [CIKM 2021] Projective Ranking: A Transferable Evasion Attack Method on Graph Neural Networks.
- [CIKM 2021] Toward an Effective Black-Box Adversarial Attack on Functional JavaScript Malware against Commercial Anti-Virus.
- [CIKM 2021] Evaluating Graph Vulnerability and Robustness using TIGER.
- [CIKM 2022] Are Gradients on Graph Structure Reliable in Gray-box Attacks?
- [CIKM 2022] Certified Robustness to Word Substitution Ranking Attack for Neural Ranking Models.
- [CIKM 2022] Cross-domain Cross-architecture Black-box Attacks on Fine-tuned Models with Transferred Evolutionary Strategies.
- [CIKM 2022] RaDaR: A Real-Word Dataset for AI powered Run-time Detection of Cyber-Attacks.
- [CIKM 2022] Towards an Awareness of Time Series Anomaly Detection Models’ Adversarial Vulnerability.
- [CIKM 2022] IEEE13-AdvAttack A Novel Dataset for Benchmarking the Power of Adversarial Attacks against Fault Prediction Systems in Smart Electrical Grid.
- [CIKM 2022] An Empirical Study on the Membership Inference Attack against Tabular Data Synthesis Models.
- [CIKM 2022] Robustness of Sketched Linear Classifiers to Adversarial Attacks.
- [CIKM 2022] System-Auditing, Data Analysis and Characteristics of Cyber Attacks for Big Data Systems.
- [CIKM 2023] Attacking Neural Networks with Neural Networks: Towards Deep Synchronization for Backdoor Attacks.
- [CIKM 2023] Targeted Shilling Attacks on GNN-based Recommender Systems.
- [CIKM 2023] Single-User Injection for Invisible Shilling Attack against Recommender Systems.
- [CIKM 2023] VFedAD: A Defense Method Based on the Information Mechanism Behind the Vertical Federated Data Poisoning Attack.
- [CIKM 2023] Black-box Adversarial Attacks against Dense Retrieval Models: A Multi-view Contrastive Learning Method.
- [CIKM 2023] Transferable Structure-based Adversarial Attack of Heterogeneous Graph Neural Network.
- [CIKM 2023] TOAK: A Topology-oriented Attack Strategy for Degrading User Identity Linkage in Cross-network Learning.
- [CIKM 2023] Linkage Attack on Skeleton-based Motion Visualization.
- [CIKM 2023] HEPT Attack: Heuristic Perpendicular Trial for Hard-label Attacks under Limited Query Budgets.
- [CIKM 2023] Exposing Model Theft: A Robust and Transferable Watermark for Thwarting Model Extraction Attacks.
- [CIKM 2023] SNAKE Challenge: Sanitization Algorithms under Attack.
- [CIKM 2024] PROSPECT: Learn MLPs on Graphs Robust against Adversarial Structure Attacks.
- [CIKM 2024] Dynamic Neural Control Flow Execution: an Agent-Based Deep Equilibrium Approach for Binary Vulnerability Detection.
- [CIKM 2024] Unveiling Intellectual Property Vulnerabilities of GAN-Based Distributed Machine Learning through Model Extraction Attacks.
- [CIKM 2024] Exploring Robustness of GNN against Universal Injection Attack from a Worst-case Perspective.
- [CIKM 2024] SGFL-Attack: A Similarity-Guidance Strategy for Hard-Label Textual Adversarial Attack Based on Feedback Learning.
- [CIKM 2024] Trojan Activation Attack: Red-Teaming Large Language Models using Steering Vectors for Safety-Alignment.
- [CIKM 2024] Bots Shield Fake News: Adversarial Attack on User Engagement based Fake News Detection.
- [CIKM 2024] Improving Adversarial Transferability via Frequency-Guided Sample Relevance Attack.
- [CIKM 2024] Attacking Visually-aware Recommender Systems with Transferable and Imperceptible Adversarial Styles.
- [CIKM 2024] Breaking State-of-the-Art Poisoning Defenses to Federated Learning: An Optimization-Based Attack Framework.
- [CIKM 2024] Debiased Graph Poisoning Attack via Contrastive Surrogate Objective.
- [CIKM 2024] Interaction-level Membership Inference Attack against Recommender Systems with Long-tailed Distribution.
- [CIKM 2024] LST2A: Lexical-Syntactic Targeted Adversarial Attack for Texts.
- [CIKM 2024] Effective Clean-Label Backdoor Attacks on Graph Neural Networks.
- [CIKM 2024] XploitSQL: Advancing Adversarial SQL Injection Attack Generation with Language Models and Reinforcement Learning.
- [WSDM 2020] All You Need Is Low (Rank): Defending Against Adversarial Attacks on Graphs.
- [WSDM 2020] Transferring Robustness for Graph Neural Network Against Poisoning Attacks.
- [WSDM 2021] A Black-Box Attack Model for Visually-Aware Recommender Systems.
- [WSDM 2022] Surrogate Representation Learning with Isometric Mapping for Gray-box Graph Adversarial Attacks.
- [WSDM 2022] Adversarial Attack on Graph Neural Networks as An Influence Maximization Problem.
- [WSDM 2022] PipAttack: Poisoning Federated Recommender Systems for Manipulating Item Promotion.
- [WSDM 2023] Scalable Adversarial Attack Algorithms on Influence Maximization.
- [WSDM 2024] User Consented Federated Recommender System Against Personalized Attribute Inference Attack.
- [WSDM 2024] Efficient, Direct, and Restricted Black-Box Graph Evasion Attacks to Any-Layer Graph Neural Networks via Influence Function.
- [WSDM 2024] Defense Against Model Extraction Attacks on Recommender Systems.
- [WSDM 2024] Maximizing Malicious Influence in Node Injection Attack.
- [PODS 2019] Attacking Diophantus: Solving a Special Case of Bag Containment.
- [DASFAA 2012] Data Privacy against Composition Attack.
- [DASFAA 2012] Protecting Sensitive Relationships against Inference Attacks in Social Networks.
- [DASFAA 2013] Feel Free to Check-in: Privacy Alert against Hidden Location Inference Attacks in GeoSNs.
- [DASFAA 2014] Thwarting Passive Privacy Attacks in Collaborative Filtering.
- [DASFAA 2021] Susceptible Temporal Patterns Discovery for Electronic Health Records via Adversarial Attack.
- [DASFAA 2022] Poisoning Attacks on Fair Machine Learning.
- [DASFAA 2022] RShield: A Refined Shield for Complex Multi-step Attack Detection Based on Temporal Graph Network.
- [DASFAA 2023] Towards Defending Against Byzantine LDP Amplified Gain Attacks.
- [DASFAA 2023] A New Reconstruction Attack: User Latent Vector Leakage in Federated Recommendation.
- [DASFAA 2023] BACH: Black-Box Attacking on Deep Cross-Modal Hamming Retrieval Models.
- [DASFAA 2023] Fine-Grained Software Vulnerability Detection via Neural Architecture Search.
- [DASFAA 2024] Enhancing Privacy of Spatiotemporal Federated Learning Against Gradient Inversion Attacks.
- [DASFAA 2024] LDP-Purifier: Defending against Poisoning Attacks in Local Differential Privacy.
- [PKDD 2012] PCA, Eigenvector Localization and Clustering for Side-Channel Attacks on Cryptographic Hardware Devices.
- [PKDD 2013] Evasion Attacks against Machine Learning at Test Time.
- [PKDD 2014] Anti-discrimination Analysis Using Privacy Attack Strategies.
- [PKDD 2018] ShapeShifter: Robust Physical Adversarial Attack on Faster R-CNN Object Detector.
- [PKDD 2018] ADAGIO: Interactive Experimentation with Adversarial Attack and Defense for Audio.
- [PKDD 2020] Poisoning Attacks on Algorithmic Fairness.
- [PKDD 2020] Quality Guarantees for Autoencoders via Unsupervised Adversarial Attacks.
- [PKDD 2020] FAWA: Fast Adversarial Watermark Attack on Optical Character Recognition (OCR) Systems.
- [PKDD 2021] PATHATTACK: Attacking Shortest Paths in Complex Networks.
- [PKDD 2021] Attack Transferability Characterization for Adversarially Robust Multi-label Classification.
- [PKDD 2021] Strategic Mitigation Against Wireless Attacks on Autonomous Platoons.
- [PKDD 2022] Defending Observation Attacks in Deep Reinforcement Learning via Detection and Denoising.
- [PKDD 2022] Resisting Graph Adversarial Attack via Cooperative Homophilous Augmentation.
- [PKDD 2022] Adversarial Mask: Real-World Universal Adversarial Attack on Face Recognition Models.
- [PKDD 2023] Practical and General Backdoor Attacks Against Vertical Federated Learning.
- [PKDD 2023] Interpretation Attacks and Defenses on Predictive Models Using Electronic Health Records.
- [PKDD 2023] Detecting Evasion Attacks in Deployed Tree Ensembles.
- [PKDD 2024] Backdoor Attacks with Input-Unique Triggers in NLP.
- [PKDD 2024] A Theoretically Grounded Extension of Universal Attacks from the Attacker’s Viewpoint.
- [ICDM 2010] On the Vulnerability of Large Graphs.
- [ICDM 2014] On Sparse Feature Attacks in Adversarial Learning.
- [ICDM 2018] Query-Efficient Black-Box Attack by Active Learning.
- [ICDM 2019] Performing Co-membership Attacks Against Deep Generative Models.
- [ICDM 2019] VASE: A Twitter-Based Vulnerability Analysis and Score Engine.
- [ICDM 2019] Generation of Low Distortion Adversarial Attacks via Convex Programming.
- [ICDM 2020] Defending Water Treatment Networks: Exploiting Spatio-temporal Effects for Cyber Attack Detection.
- [ICDM 2020] MALCOM: Generating Malicious Comments to Attack Neural Fake News Detection Models.
- [ICDM 2020] Adversarial Label-Flipping Attack and Defense for Graph Neural Networks.
- [ICDM 2020] Exploratory Adversarial Attacks on Graph Neural Networks.
- [ICDM 2020] Generalizing Universal Adversarial Attacks Beyond Additive Perturbations.
- [ICDM 2020] Robust Meta Network Embedding against Adversarial Attacks.
- [ICDM 2021] Attacking Similarity-Based Sign Prediction.
- [ICDM 2021] Source Inference Attacks in Federated Learning.
- [ICDM 2021] Adapting Membership Inference Attacks to GNN for Graph Classification: Approaches and Implications.
- [ICDM 2022] Query-Efficient Target-Agnostic Black-Box Attack.
- [ICDM 2023] A Practical Clean-Label Backdoor Attack with Limited Information in Vertical Federated Learning.
- [ICDM 2023] HINT: Healthy Influential-Noise based Training to Defend against Data Poisoning Attacks.
- [ICDM 2023] Backdoor Attack on 3D Grey Image Segmentation.
- [ICDM 2023] ATTA: Adversarial Task-transferable Attacks on Autonomous Driving Systems.
- [ICDM 2023] Sparse Attacks for Manipulating Explanations in Deep Neural Network Models.
- [ICDM 2023] Attacking c-MARL More Effectively: A Data Driven Approach.
- [ICDM 2023] Review-Incorporated Model-Agnostic Profile Injection Attacks on Recommender Systems.
- [ICDM 2024] ChronoCTI: Mining Knowledge Graph of Temporal Relations Among Cyberattack Actions.
- [ICDM 2024] Designing an Attack-Defense Game: How to Increase the Robustness of Financial Transaction Models Via a Competition.
- [ICDM 2024] FGLBA: Enabling Highly-Effective and Stealthy Backdoor Attack on Federated Graph Learning.
- [ICDM 2024] Goal-Guided Generative Prompt Injection Attack on Large Language Models.
- [CIDR 2013] We are Under Attack; by the least publishable unit.
- [CIDR 2021] Integrity-based Attacks for Encrypted Databases and Implications.
- [SDM 2011] Computationally Generated Cardiac Biomarkers: Heart Rate Patterns to Predict Death Following Coronary Attacks.
- [SDM 2015] Attacking DBSCAN for Fun and Profit.
- [SDM 2021] Turning Attacks into Protection: Social Media Privacy Protection Using Adversarial Attacks.
- [RECSYS 2011] Semi-SAD: applying semi-supervised learning to shilling attack detection.
- [RECSYS 2013] When power users attack: assessing impacts in collaborative recommender systems.
- [RECSYS 2013] Accuracy and robustness impacts of power user attacks on collaborative recommender systems.
- [RECSYS 2014] Attacking item-based recommender systems with power items.
- [RECSYS 2015] Nuke ‘Em Till They Go: Investigating Power User Attacks to Disparage Items in Collaborative Recommenders.
- [RECSYS 2019] Adversarial attacks on an oblivious recommender.
- [RECSYS 2019] Quick and accurate attack detection in recommender systems through user attributes.
- [RECSYS 2020] Revisiting Adversarially Learned Injection Attacks Against Recommender Systems.
- [RECSYS 2021] Black-Box Attacks on Sequential Recommenders via Data-Free Model Extraction.
- [RECSYS 2022] Defending Substitution-Based Profile Pollution Attacks on Sequential Recommenders.
- [RECSYS 2023] RecAD: Towards A Unified Library for Recommender Attack and Defense.
- [RECSYS 2024] Improving the Shortest Plank: Vulnerability-Aware Adversarial Training for Robust Recommender System.
- [RECSYS 2024] Accelerating the Surrogate Retraining for Poisoning Attacks against Recommender Systems.
- [APWEB 2020] On the Vulnerability and Generality of K-Anonymity Location Privacy Under Continuous LBS Requests.
- [APWEB 2021] Data Poisoning Attacks on Crowdsourcing Learning.
- [APWEB 2022] RoFL: A Robust Federated Learning Scheme Against Malicious Attacks.
- [APWEB 2022] TSD3: A Novel Time-Series-Based Solution for DDoS Attack Detection.
- [APWEB 2022] IMPGA: An Effective and Imperceptible Black-Box Attack Against Automatic Speech Recognition Systems.
- [APWEB 2022] FD-Leaks: Membership Inference Attacks Against Federated Distillation Learning.
- [APWEB 2023] Multi-patch Adversarial Attack for Remote Sensing Image Classification.
- [APWEB 2023] Entity Alignment Based on Multi-view Interaction Model in Vulnerability Knowledge Graphs.
- [APWEB 2023] Truth Discovery Against Disguised Attack Mechanism in Crowdsourcing.
- [APWEB 2023] Identifying Backdoor Attacks in Federated Learning via Anomaly Detection.
- [APWEB 2023] CY-Apollo: A Multi-view Profile System for Complicated Network Attacks.
- [APWEB 2024] Generating Adversarial Texts by the Universal Tail Word Addition Attack.
- [APWEB 2024] LPLA : The Adversarial Attack Against License Plate Recognition Systems.
- [APWEB 2024] Malicious Attack Detection Method for Recommendation Systems Based on Meta-pseudo Labels and Dynamic Features.
- [DEXA 2011] An Empirical Study on Using the National Vulnerability Database to Predict Software Vulnerabilities.
- [DEXA 2013] Discovering Multi-stage Attacks Using Closed Multi-dimensional Sequential Pattern Mining.
- [DEXA 2020] Online Attacks on Picture Owner Privacy.
- [DEXA 2023] A Study on Vulnerability Code Labeling Method in Open-Source C Programs.
- [DEXA 2023] Variables are a Curse in Software Vulnerability Prediction.
- [ECIR 2021] Chattack: A Gamified Crowd-Sourcing Platform for Tagging Deceptive & Abusive Behaviour.
- [ECIR 2024] Analyzing Adversarial Attacks on Sequence-to-Sequence Relevance Models.
- [ECIR 2024] Absolute Variation Distance: An Inversion Attack Evaluation Metric for Federated Learning.
- [ECIR 2024] SALSA: Salience-Based Switching Attack for Adversarial Perturbations in Fake News Detection Models.
- [ECIR 2025] Malevolence Attacks Against Pretrained Dialogue Models.
- [ECIR 2025] Reproducing HotFlip for Corpus Poisoning Attacks in Dense Retrieval.
- [ECIR 2025] Poison-RAG: Adversarial Data Poisoning Attacks on Retrieval-Augmented Generation in Recommender Systems.
- [MDM 2013] A Practical Location Privacy Attack in Proximity Services.
- [MDM 2014] Top-k Query Processing and Malicious Node Identification against Data Replacement Attack in MANETs.
- [MDM 2022] Multi-round Data Poisoning Attack and Defense against Truth Discovery in Crowdsensing Systems.
- [SSDBM 2022] How Powerful are Membership Inference Attacks on Graph Neural Networks?
- [SSDBM 2022] Facilitating DoS Attack Detection using Unsupervised Anomaly Detection.
- [SSDBM 2024] On Vulnerability of Access Control Restrictions to Timing Attacks in a Database Management System.
- [WAIM 2010] SWORDS: Improving Sensor Networks Immunity under Worm Attacks.
- [WAIM 2013] K-core-preferred Attack to the Internet: Is It More Malicious Than Degree Attack?
- [PAKDD 2012] Evasion Attack of Multi-class Linear Classifiers.
- [PAKDD 2013] An Unsupervised Learning Model to Perform Side Channel Attack.
- [PAKDD 2018] Vulnerability Assessment of Metro Systems Based on Dynamic Network Structure.
- [PAKDD 2018] Randomizing SVM Against Adversarial Attacks Under Uncertainty.
- [PAKDD 2020] Dual-Component Deep Domain Adaptation: A New Approach for Cross Project Software Vulnerability Detection.
- [PAKDD 2020] Data-Free Adversarial Perturbations for Practical Black-Box Attack.
- [PAKDD 2020] Deep Cost-Sensitive Kernel Machine for Binary Software Vulnerability Detection.
- [PAKDD 2021] Attack Is the Best Defense: A Multi-Mode Poisoning PUF Against Machine Learning Attacks.
- [PAKDD 2021] VIKING: Adversarial Attack on Network Embeddings via Supervised Network Poisoning.
- [PAKDD 2022] Smooth Perturbations for Time Series Adversarial Attacks.
- [PAKDD 2022] Transferable Interpolated Adversarial Attack with Random-Layer Mixup.
- [PAKDD 2022] Discretization Inspired Defence Algorithm Against Adversarial Attacks on Tabular Data.
- [PAKDD 2022] IDSGAN: Generative Adversarial Networks for Attack Generation Against Intrusion Detection.
- [PAKDD 2023] Leveraging Generative Models for Combating Adversarial Attacks on Tabular Datasets.
- [PAKDD 2023] Defending Against Backdoor Attacks by Layer-wise Feature Analysis.
- [PAKDD 2023] BeamAttack: Generating High-quality Textual Adversarial Examples Through Beam Search and Mixed Semantic Spaces.
- [PAKDD 2023] Targeted Attacks on Time Series Forecasting.
- [PAKDD 2024] SASBO: Sparse Attack via Stochastic Binary Optimization.
- [PAKDD 2024] SD-Attack: Targeted Spectral Attacks on Graphs.
- [PAKDD 2024] Construct a Secure CNN Against Gradient Inversion Attack.
- [PAKDD 2024] Backdoor Attack Against One-Class Sequential Anomaly Detection Models.
- [PAKDD 2025] A Unified Detector for Both Adversarial Attacks and Out-of-Distribution Samples Based on Kernel Path Distribution.
- [PAKDD 2025] RPDN: An Effective Rating Pollution Attacks Detection Framework for Recommendation Systems.
- [PAKDD 2025] LiSA: Leveraging Link Recommender to Attack Graph Neural Networks via Subgraph Injection.
- [PAKDD 2025] Adaptive Weight Assignment for Adversarial Training Based on Predicted Class Probabilities Across Different Attacks and Perturbation Sizes.
- [PAKDD 2025] Enabling Heterogeneous Adversarial Transferability via Feature Permutation Attacks.
- [PAKDD 2025] MarkErase: Defeating Entangled Watermarks in Model Extraction Attacks.
- [PAKDD 2025] Large Language Model and Variational Autoencoder Based Deep Neural Framework for Cyber Attack Detection.
- [PAKDD 2025] TrojanTime: Backdoor Attacks on Time Series Classification.
- [PAKDD 2025] Arms Race in Deep Learning: A Survey of Backdoor Defenses and Adaptive Attacks.
- [PAKDD 2025] Privacy in Fine-Tuning Large Language Models: Attacks, Defenses, and Future Directions.
- [WISE 2011] Finding Homoglyphs - A Step towards Detecting Unicode-Based Visual Spoofing Attacks.
- [WISE 2012] VAM-aaS: Online Cloud Services Security Vulnerability Analysis and Mitigation-as-a-Service.
- [WISE 2018] Gradient Correlation: Are Ensemble Classifiers More Robust Against Evasion Attacks in Practical Settings?
- [WISE 2018] Privacy Preserving Social Network Against Dopv Attacks.
- [WISE 2021] Crowdsourcing Software Vulnerability Discovery: Models, Dimensions, and Directions.
- [WISE 2023] Local Difference-Based Federated Learning Against Preference Profiling Attacks.
- [WISE 2023] Empowering Vulnerability Prioritization: A Heterogeneous Graph-Driven Framework for Exploitability Prediction.
- [WISE 2024] Model Extraction Attacks on Privacy-Preserving Deep Learning Based Medical Services.
- [WISE 2024] Nob-MIAs: Non-biased Membership Inference Attacks Assessment on Large Language Models with Ex-Post Dataset Construction.
- [WISE 2024] Industry-Specific Vulnerability Assessment.
- [WISE 2024] Smart Contracts Vulnerability Detection Using Transformers.
- [WISE 2024] A Lightweight Detection of Sequential Patterns in File System Events During Ransomware Attacks.
- [WISE 2024] Detection and Mitigation of Backdoor Attacks on x-Apps.
- [WISE 2024] AttackER: Towards Enhancing Cyber-Attack Attribution with a Named Entity Recognition Dataset.
- [ADMA 2012] Towards a Tricksy Group Shilling Attack Model against Recommender Systems.
- [ADMA 2014] Attack Type Prediction Using Hybrid Classifier.
- [ADMA 2018] Instruction SDC Vulnerability Prediction Using Long Short-Term Memory Neural Network.
- [ADMA 2021] A Comprehensive Feature Importance Evaluation for DDoS Attacks Detection.
- [ADMA 2022] Cyber Attack Detection in IoT Networks with Small Samples: Implementation And Analysis.
- [ADMA 2022] SAME: Sampling Attack in Multiplex Network Embedding.
- [ADMA 2023] DANAA: Towards Transferable Attacks with Double Adversarial Neuron Attribution.
- [ADMA 2023] A Poisoning Attack Based on Variant Generative Adversarial Networks in Recommender Systems.
- [ADMA 2023] Boosting Adversarial Attacks with Improved Sign Method.
- [ADMA 2024] Nightfall Deception: A Novel Backdoor Attack on Traffic Sign Recognition Models via Low-Light Data Manipulation.
- [ADMA 2024] Correlation Analysis of Adversarial Attack in Time Series Classification.
- [STOC 2014] Circuits resilient to additive attacks with applications to secure computation.
- [STOC 2016] Algebraic attacks against random local functions and their countermeasures.
- [SODA 2013] The Power of Linear Reconstruction Attacks.
- [CAV 2011] HAMPI: A String Solver for Testing, Analysis and Vulnerability Detection.
- [CAV 2013] Finding Security Vulnerabilities in a Network Protocol Using Parameterized Systems.
- [CAV 2014] Synthesis of Masking Countermeasures against Side Channel Attacks.
- [CAV 2016] Synthesis of Fault-Attack Countermeasures for Cryptographic Circuits.
- [CAV 2018] SCInfer: Refinement-Based Verification of Software Countermeasures Against Side-Channel Attacks.
- [CAV 2022] Verifying Neural Networks Against Backdoor Attacks.
- [FOCS 2010] Cryptography against Continuous Memory Attacks.
- [FOCS 2014] Quantum Attacks on Classical Proof Systems: The Hardness of Quantum Rewinding.
- [LICS 2013] LICS: Logic in Computer Security - Some Attacker’s Models and Related Decision Problems.
- [COMPGEOM 2013] Union of random minkowski sums and network vulnerability analysis.
- [ICALP 2017] Non-Uniform Attacks Against Pseudoentropy.
- [CONCUR 2018] Ergodic Mean-Payoff Games for the Analysis of Attacks in Crypto-Currencies.
- [HYBRID 2010] Stealthy deception attacks on water SCADA systems.
- [HYBRID 2015] Vulnerability analysis of dynamical power networks to stochastic link failure attacks.
- [HYBRID 2023] Stealthy attacks formalized as STL formulas for Falsification of CPS Security.
- [HYBRID 2023] Quantitative Robustness Analysis of Sensor Attacks on Cyber-Physical Systems.
- [SAT 2014] A SAT Attack on the Erdős Discrepancy Conjecture.
- [SAT 2022] A SAT Attack on Rota’s Basis Conjecture.
- [COCOON 2014] Optimal Inspection Points for Malicious Attack Detection in Smart Grids.
- [COCOON 2015] Multi-Radio Channel Detecting Jamming Attack Against Enhanced Jump-Stay Based Rendezvous in Cognitive Radio Networks.
- [COCOON 2023] Quantum Query Lower Bounds for Key Recovery Attacks on the Even-Mansour Cipher.
- [COCOON 2024] Resource-Limited Network Security Games with General Contagious Attacks.
- [COCOON 2024] Analyzing the Vulnerabilities of Targets in Clean-Label Data Poisoning Attacks.
- [COCOON 2024] Topological Vulnerability-Based Imperceptible Node Injection Attack Against Dynamic Graph Neural Network.
- [FSTTCS 2012] Computationally Complete Symbolic Attacker in Action.
- [DSAA 2021] V2W-BERT: A Framework for Effective Hierarchical Multiclass Classification of Software Vulnerabilities.
- [DSAA 2022] MANDO: Multi-Level Heterogeneous Graph Embeddings for Fine-Grained Detection of Smart Contract Vulnerabilities.
- [DSAA 2023] Prediction of Future Nation-initiated Cyberattacks from News-based Political Event Graph.
- [DSAA 2023] Defending the Graph Reconstruction Attacks for Simplicial Neural Networks.
- [DSAA 2023] A Multimodal Adversarial Database: Towards A Comprehensive Assessment of Adversarial Attacks and Defenses on Medical Images.
- [DSAA 2024] Evaluating the Robustness of Fake News Detectors to Adversarial Attacks with Real User Comments (Extended Abstract).
- [ICTAC 2021] Assessing Security of Cryptocurrencies with Attack-Defense Trees: Proof of Concept and Future Directions.
- [ICTAC 2023] Learning Attack Trees by Genetic Algorithms.
- [ISAAC 2012] The Minimum Vulnerability Problem.
- [MFCS 2015] Active Linking Attacks.
- [SETTA 2015] A High-Level Model for an Assembly Language Attacker by Means of Reflection.
- [SETTA 2021] AIdetectorX: A Vulnerability Detector Based on TCN and Self-attention Mechanism.
- [SETTA 2023] Software Vulnerability Detection Using an Enhanced Generalization Strategy.
- [SETTA 2023] Vulnerability Report Analysis and Vulnerability Reproduction for Web Applications.
- [MM 2010] Real-world trajectory extraction for attack pattern analysis in soccer video.
- [MM 2010] Optimal collusion attack for digital fingerprinting.
- [MM 2012] Constraint-optimized keypoint inhibition/insertion attack: security threat to scale-space image feature extraction.
- [MM 2015] Ciphertext-Only Attack on an Image Homomorphic Encryption Scheme with Small Ciphertext Expansion.
- [MM 2018] An ADMM-Based Universal Framework for Adversarial Attacks on Deep Neural Networks.
- [MM 2018] When Deep Fool Meets Deep Prior: Adversarial Attack on Super-Resolution Network.
- [MM 2019] Attacking Gait Recognition Systems via Silhouette Guided GANs.
- [MM 2019] MetaAdvDet: Towards Robust Detection of Evolving Adversarial Attacks.
- [MM 2019] Black-box Adversarial Attacks on Video Recognition Models.
- [MM 2020] Amora: Black-box Adversarial Morphing Attack.
- [MM 2020] Adversarial Image Attacks Using Multi-Sample and Most-Likely Ensemble Methods.
- [MM 2020] Efficient Joint Gradient Based Attack Against SOR Defense for 3D Point Cloud Classification.
- [MM 2020] MGAAttack: Toward More Query-efficient Black-box Attack by Microbial Genetic Algorithm.
- [MM 2020] Learning Optimization-based Adversarial Perturbations for Attacking Sequential Recognition Models.
- [MM 2020] Revealing True Identity: Detecting Makeup Attacks in Face-based Biometric Systems.
- [MM 2020] Finding Achilles’ Heel: Adversarial Attack on Multi-modal Action Recognition.
- [MM 2020] Attacking Image Captioning Towards Accuracy-Preserving Target Words Removal.
- [MM 2021] Towards Multiple Black-boxes Attack via Adversarial Example Generation Network.
- [MM 2021] AdvFilter: Predictive Perturbation-aware Filtering against Adversarial Attack via Multi-domain Learning.
- [MM 2021] Anti-Distillation Backdoor Attacks: Backdoors Can Really Survive in Knowledge Distillation.
- [MM 2021] VLAD-VSA: Cross-Domain Face Presentation Attack Detection with Vocabulary Separation and Adaptation.
- [MM 2021] Discriminator-free Generative Adversarial Attack.
- [MM 2021] Adversarial Pixel Masking: A Defense against Physical Attacks for Pre-trained Object Detectors.
- [MM 2021] Efficient Sparse Attacks on Videos using Reinforcement Learning.
- [MM 2021] AdvHash: Set-to-set Targeted Attack on Deep Hashing with One Single Adversarial Patch.
- [MM 2021] Open Set Face Anti-Spoofing in Unseen Attacks.
- [MM 2021] Robust Real-World Image Super-Resolution against Adversarial Attacks.
- [MM 2022] Attack is the Best Defense: Towards Preemptive-Protection Person Re-Identification.
- [MM 2022] ARRA: Absolute-Relative Ranking Attack against Image Retrieval.
- [MM 2022] BadHash: Invisible Backdoor Attacks against Deep Hashing with Clean Label.
- [MM 2022] Rethinking the Vulnerability of DNN Watermarking: Are Watermarks Robust against Naturalness-aware Perturbations?
- [MM 2022] Defending Physical Adversarial Attack on Object Detection via Adversarial Patch-Feature Energy.
- [MM 2022] Opportunistic Backdoor Attacks: Exploring Human-imperceptible Vulnerabilities on Speech Recognition Systems.
- [MM 2022] Text’s Armor: Optimized Local Adversarial Perturbation Against Scene Text Editing Attacks.
- [MM 2022] Physical Backdoor Attacks to Lane Detection Systems in Autonomous Driving.
- [MM 2022] Towards Adversarial Attack on Vision-Language Pre-training Models.
- [MM 2022] Backdoor Attacks on Crowd Counting.
- [MM 2022] Benign Adversarial Attack: Tricking Models for Goodness.
- [MM 2023] Cross-modal and Cross-medium Adversarial Attack for Audio.
- [MM 2023] Face Encryption via Frequency-Restricted Identity-Agnostic Attacks.
- [MM 2023] GCMA: Generative Cross-Modal Transferable Adversarial Attacks from Images to Videos.
- [MM 2023] Towards Decision-based Sparse Attacks on Video Recognition.
- [MM 2023] Deep Neural Network Watermarking against Model Extraction Attack.
- [MM 2023] ALA: Naturalness-aware Adversarial Lightness Attack.
- [MM 2023] PAIF: Perception-Aware Infrared-Visible Image Fusion for Attack-Tolerant Semantic Segmentation.
- [MM 2023] Isolation and Induction: Training Robust Deep Neural Networks against Model Stealing Attacks.
- [MM 2023] Model Inversion Attack via Dynamic Memory Learning.
- [MM 2023] Precise Target-Oriented Attack against Deep Hashing-based Retrieval.
- [MM 2023] My Brother Helps Me: Node Injection Based Adversarial Attack on Social Bot Detection.
- [MM 2023] A Four-Pronged Defense Against Byzantine Attacks in Federated Learning.
- [MM 2023] ProTegO: Protect Text Content against OCR Extraction Attack.
- [MM 2023] The Silent Manipulator: A Practical and Inaudible Backdoor Attack against Speech Recognition Systems.
- [MM 2023] Robust Image Steganography against General Scaling Attacks.
- [MM 2023] Adversarial Attack for Robust Watermark Protection Against Inpainting-based and Blind Watermark Removers.
- [MM 2023] Reinforcement Learning-based Adversarial Attacks on Object Detectors using Reward Shaping.
- [MM 2023] SiFDetectCracker: An Adversarial Attack Against Fake Voice Detection Based on Speaker-Irrelative Features.
- [MM 2023] Exploring the Adversarial Robustness of Video Object Segmentation via One-shot Adversarial Attacks.
- [MM 2023] Physics-Based Adversarial Attack on Near-Infrared Human Detector for Nighttime Surveillance Camera Systems.
- [MM 2023] Moiré Backdoor Attack (MBA): A Novel Trigger for Pedestrian Detectors in the Physical World.
- [MM 2023] PatchBackdoor: Backdoor Attack against Deep Neural Networks without Model Modification.
- [MM 2024] A Unified Understanding of Adversarial Vulnerability Regarding Unimodal Models and Vision-Language Pre-training Models.
- [MM 2024] Highly Transferable Diffusion-based Unrestricted Adversarial Attack on Pre-trained Vision-Language Models.
- [MM 2024] Break the Visual Perception: Adversarial Attacks Targeting Encoded Visual Tokens of Large Vision-Language Models.
- [MM 2024] Cascaded Adversarial Attack: Simultaneously Fooling Rain Removal and Semantic Segmentation Networks.
- [MM 2024] Rethinking Impersonation and Dodging Attacks on Face Recognition Systems.
- [MM 2024] SymAttack: Symmetry-aware Imperceptible Adversarial Attacks on 3D Point Clouds.
- [MM 2024] Disrupting Diffusion: Token-Level Attention Erasure Attack against Diffusion-based Customization.
- [MM 2024] Backdoor Attacks on Bimodal Salient Object Detection with RGB-Thermal Data.
- [MM 2024] ReToMe-VA: Recursive Token Merging for Video Diffusion-based Unrestricted Adversarial Attack.
- [MM 2024] PFFAA: Prototype-based Feature and Frequency Alteration Attack for Semantic Segmentation.
- [MM 2024] LinkThief: Combining Generalized Structure Knowledge with Node Similarity for Link Stealing Attack against GNN.
- [MM 2024] Towards Robust Physical-world Backdoor Attacks on Lane Detection.
- [MM 2024] Embodied Laser Attack: Leveraging Scene Priors to Achieve Agent-based Robust Non-contact Attacks.
- [MM 2024] Frequency-Aware GAN for Imperceptible Transfer Attack on 3D Point Clouds.
- [MM 2024] AdvQDet: Detecting Query-Based Adversarial Attacks with Adversarial Contrastive Prompt Tuning.
- [MM 2024] Exploring the Robustness of Decision-Level Through Adversarial Attacks on LLM-Based Embodied Models.
- [MM 2024] Unveiling Structural Memorization: Structural Membership Inference Attack for Text-to-Image Diffusion Models.
- [VR 2018] The Effect of Immersive Displays on Situation Awareness in Virtual Environments for Aerial Firefighting Air Attack Supervisor Training.
- [VR 2021] VR-Spy: A Side-Channel Attack on Virtual Key-Logging in VR Headsets.
- [VR 2022] SPAA: Stealthy Projector-based Adversarial Attacks on Deep Image Classifiers.
- [VR 2022] A Keylogging Inference Attack on Air-Tapping Keyboards in Virtual Environments.
- [VR 2025] “Just stop doing everything for now!”: Understanding security attacks in remote collaborative mixed reality.
- [VISUALIZATION 2020] Bluff: Interactively Deciphering Adversarial Attacks on Deep Neural Networks.
- [MIR 2021] A Smart Adversarial Attack on Deep Hashing Based Image Retrieval.
- [MIR 2022] Camouflaged Poisoning Attack on Graph Neural Networks.
- [MIR 2022] Accelerated Sign Hunter: A Sign-based Black-box Attack via Branch-Prune Strategy and Stabilized Hierarchical Search.
- [MIR 2022] Adaptive Temporal Grouping for Black-box Adversarial Attacks on Videos.
- [MIR 2024] Targeted Universal Adversarial Attack on Deep Hash Networks.
- [MIR 2025] FLAIN: Mitigating Backdoor Attacks in Federated Learning via Flipping Weight Updates of Low-Activation Input Neurons.
- [MIR 2025] Two Heads are Better than One: A Network Attack Detection Model Based on Multimodal and Multimedia Retrieval.
- [MIR 2025] FewMEA: Few-shot Model Extraction Attack against Sequential Recommenders.
- [MIR 2025] GraphDC: Detecting and Confusing in Node Injection Attack.
- [SCA 2024] Rigid Body Adversarial Attacks.
- [DCC 2018] Protecting JPEG Images Against Adversarial Attacks.
- [DCC 2024] An imperceptible adversarial attack against reconstruction for learned image compression.
- [ICASSP 2010] Score normalization in playback attack detection.
- [ICASSP 2010] A solution to gain attack onwatermarking systems: Logarithmic Homogeneous Rational Dither Modulation.
- [ICASSP 2010] Improvement of power analysis attacks using Kalman filter.
- [ICASSP 2010] Joint pollution detection and attacker identification in peer-to-peer live streaming.
- [ICASSP 2010] Countering byzantine attacks in cognitive radio networks.
- [ICASSP 2011] Vulnerability of insens to denial of service attacks.
- [ICASSP 2011] Cooperative sensing in cognitive networks under malicious attack.
- [ICASSP 2011] Malicious data attack on real-time electricity market.
- [ICASSP 2012] Enlarging hacker’s toolbox: Deluding image recognition by attacking keypoint orientations.
- [ICASSP 2012] Attacking a privacy preserving music matching algorithm.
- [ICASSP 2012] Vulnerability of speaker verification systems against voice conversion spoofing attacks: The case of telephone speech.
- [ICASSP 2013] On the vulnerability of face recognition systems to spoofing mask attacks.
- [ICASSP 2013] Phase warping and differential scrambling attacks against OFDM frequency synchronization.
- [ICASSP 2013] A physical layer authentication scheme for countering primary user emulation attack.
- [ICASSP 2013] A novel quantization-based watermarking approach invariant to gain attack.
- [ICASSP 2013] Antiforensics attacks to Benford’s law for the detection of double compressed images.
- [ICASSP 2013] Attacking the IDS learning processes.
- [ICASSP 2014] Random distributed detection with an application to Cognitive Radio Byzantine attack.
- [ICASSP 2014] A fictitious play-based game-theoretical approach to alleviating jamming attacks for cognitive radios.
- [ICASSP 2015] Detection of pilot spoofing attack in multi-antenna systems via energy-ratio comparison.
- [ICASSP 2015] Cyber-physical systems: Dynamic sensor attacks and strong observability.
- [ICASSP 2015] An attack on antenna subset modulation for millimeter wave communication.
- [ICASSP 2015] SAS: A speaker verification spoofing database containing diverse attacks.
- [ICASSP 2016] Active eavesdropping via spoofing relay attack.
- [ICASSP 2016] Sparse attacking strategies in multi-sensor dynamic systems maximizing state estimation errors.
- [ICASSP 2016] Compensation of attacks on consensus networks.
- [ICASSP 2016] Detection of pilot contamination attack in T.D.D./S.D.M.A. systems.
- [ICASSP 2017] Theoretical vulnerabilities in map speaker adaptation.
- [ICASSP 2017] Spectrum attacks aimed at minimizing spectrum opportunities.
- [ICASSP 2017] On mitigation of pilot spoofing attack.
- [ICASSP 2017] A novel iterative online rating attack based on market self-exciting property.
- [ICASSP 2017] On the security of block scrambling-based ETC systems against jigsaw puzzle solver attacks.
- [ICASSP 2017] Cyber attacks on estimation sensor networks and iots: Impact, mitigation and implications to unattacked systems.
- [ICASSP 2017] RedDots replayed: A new replay spoofing attack corpus for text-dependent speaker verification research.
- [ICASSP 2018] A Diverse Large-Scale Dataset for Evaluating Rebroadcast Attacks.
- [ICASSP 2018] Trade-offs in Data-Driven False Data Injection Attacks Against the Power Grid.
- [ICASSP 2018] Defending Against Packet-Size Side-Channel Attacks in Iot Networks.
- [ICASSP 2018] Recurrent Neural Networks for Automatic Replay Spoofing Attack Detection.
- [ICASSP 2018] Data Injection Attack on Decentralized Optimization.
- [ICASSP 2018] Robust Distributed Gradient Descent with Arbitrary Number of Byzantine Attackers.
- [ICASSP 2019] Adversarial Watermarking to Attack Deep Neural Networks.
- [ICASSP 2019] Quickest Detection of Time-varying False Data Injection Attacks in Dynamic Smart Grids.
- [ICASSP 2019] Data Poisoning Attacks against MRMR.
- [ICASSP 2019] Detectability of Denial-of-service Attacks on Communication Systems.
- [ICASSP 2019] Audio Replay Spoof Attack Detection Using Segment-based Hybrid Feature and DenseNet-LSTM Network.
- [ICASSP 2019] Phonespoof: A New Dataset for Spoofing Attack Detection in Telephone Channel.
- [ICASSP 2019] Turning a Vulnerability into an Asset: Accelerating Facial Identification with Morphing.
- [ICASSP 2019] Attacks on Digital Watermarks for Deep Neural Networks.
- [ICASSP 2019] Detecting Cyber Attacks Using Anomaly Detection with Explanations and Expert Feedback.
- [ICASSP 2019] Efficient Randomized Defense against Adversarial Attacks in Deep Convolutional Neural Networks.
- [ICASSP 2019] Auditory Inspired Spatial Differentiation for Replay Spoofing Attack Detection.
- [ICASSP 2019] Transmission Line Cochlear Model Based AM-FM Features for Replay Attack Detection.
- [ICASSP 2019] Can We Use Speaker Recognition Technology to Attack Itself? Enhancing Mimicry Attacks Using Automatic Target Speaker Selection.
- [ICASSP 2019] Replay Attack Detection Using Magnitude and Phase Information with Attention-based Adaptive Filters.
- [ICASSP 2019] Importance of Analytic Phase of the Speech Signal for Detecting Replay Attacks in Automatic Speaker Verification Systems.
- [ICASSP 2019] Attentive Filtering Networks for Audio Replay Attack Detection.
- [ICASSP 2019] Universal Adversarial Attacks on Text Classifiers.
- [ICASSP 2019] When Not to Classify: Detection of Reverse Engineering Attacks on DNN Image Classifiers.
- [ICASSP 2019] Learning Requirements for Stealth Attacks.
- [ICASSP 2019] Spoofing Attack Detection by Anomaly Detection.
- [ICASSP 2020] A Study on the Transferability of Adversarial Attacks in Sound Event Classification.
- [ICASSP 2020] The Swax Benchmark: Attacking Biometric Systems with Wax Figures.
- [ICASSP 2020] Domain Adaptation for Generalization of Face Presentation Attack Detection in Mobile Settengs with Minimal Information.
- [ICASSP 2020] Real-Time, Universal, and Robust Adversarial Attacks Against Speaker Recognition Systems.
- [ICASSP 2020] Evaluating Voice Conversion-Based Privacy Protection against Informed Attackers.
- [ICASSP 2020] Unseen Face Presentation Attack Detection with Hypersphere Loss.
- [ICASSP 2020] Electro-Magnetic Side-Channel Attack Through Learned Denoising and Classification.
- [ICASSP 2020] Dynamic Attack Scoring Using Distributed Local Detectors.
- [ICASSP 2020] Hijacking Tracker: A Powerful Adversarial Attack on Visual Tracking.
- [ICASSP 2020] AdvMS: A Multi-Source Multi-Cost Defense Against Adversarial Attacks.
- [ICASSP 2020] Improving Cross-Dataset Performance of Face Presentation Attack Detection Systems Using Face Recognition Datasets.
- [ICASSP 2020] Headless Horseman: Adversarial Attacks on Transfer Learning Models.
- [ICASSP 2020] Detecting Adversarial Attacks In Time-Series Data.
- [ICASSP 2020] Detection of Adversarial Attacks and Characterization of Adversarial Subspace.
- [ICASSP 2020] Action-Manipulation Attacks on Stochastic Bandits.
- [ICASSP 2020] Enhanced Adversarial Strategically-Timed Attacks Against Deep Reinforcement Learning.
- [ICASSP 2020] Witchcraft: Efficient PGD Attacks with Random Step Size.
- [ICASSP 2020] Decentralized Min-Max Optimization: Formulations, Algorithms and Applications in Network Poisoning Attack.
- [ICASSP 2020] Resilient to Byzantine Attacks Finite-Sum Optimization Over Networks.
- [ICASSP 2020] Adversarial Attacks on Deep Unfolded Networks for Sparse Coding.
- [ICASSP 2020] Multiple Points Input For Convolutional Neural Networks in Replay Attack Detection.
- [ICASSP 2020] Defense Against Adversarial Attacks on Spoofing Countermeasures of ASV.
- [ICASSP 2020] Adversarial Attacks on GMM I-Vector Based Speaker Verification Systems.
- [ICASSP 2020] An Ensemble Based Approach for Generalized Detection of Spoofing Attacks to Automatic Speaker Recognizers.
- [ICASSP 2020] Generating and Protecting Against Adversarial Attacks for Deep Speech-Based Emotion Recognition Models.
- [ICASSP 2020] Defending Graph Convolutional Networks Against Adversarial Attacks.
- [ICASSP 2020] Detect Insider Attacks Using CNN in Decentralized Optimization.
- [ICASSP 2021] Adversarial Attacks on Audio Source Separation.
- [ICASSP 2021] Attacking and Defending Behind A Psychoacoustics-Based Captcha.
- [ICASSP 2021] Saga: Sparse Adversarial Attack on EEG-Based Brain Computer Interface.
- [ICASSP 2021] Adversarial Attacks on Object Detectors with Limited Perturbations.
- [ICASSP 2021] Backdoor Attack Against Speaker Verification.
- [ICASSP 2021] Class-Conditional Defense GAN Against End-To-End Speech Attacks.
- [ICASSP 2021] Attack on Practical Speaker Verification System Using Universal Adversarial Perturbations.
- [ICASSP 2021] Optimal Attacking Strategy Against Online Reputation Systems with Consideration of the Message-Based Persuasion Phenomenon.
- [ICASSP 2021] Application-Layer DDOS Attacks with Multiple Emulation Dictionaries.
- [ICASSP 2021] Efficient Network Protection Games Against Multiple Types Of Strategic Attackers.
- [ICASSP 2021] Integrating Deep Learning with First-Order Logic Programmed Constraints for Zero-Day Phishing Attack Detection.
- [ICASSP 2021] Extending the Reverse JPEG Compatibility Attack to Double Compressed Images.
- [ICASSP 2021] Adversarial Attacks on Coarse-to-Fine Classifiers.
- [ICASSP 2021] L-Red: Efficient Post-Training Detection of Imperceptible Backdoor Attacks Without Access to the Training Set.
- [ICASSP 2021] Strong Data Augmentation Sanitizes Poisoning and Backdoor Attacks Without an Accuracy Tradeoff.
- [ICASSP 2021] Real Number Signal Processing can Detect Denial-of-Service Attacks.
- [ICASSP 2021] Social Learning Under Inferential Attacks.
- [ICASSP 2021] Data Augmentation with Signal Companding for Detection of Logical Access Attacks.
- [ICASSP 2021] A Capsule Network Based Approach for Detection of Audio Spoofing Attacks.
- [ICASSP 2021] Replay-Attack Detection Using Features With Adaptive Spectro-Temporal Resolution.
- [ICASSP 2021] Detecting Adversarial Attacks on Audiovisual Speech Recognition.
- [ICASSP 2022] Invisible and Efficient Backdoor Attacks for Compressed Deep Neural Networks.
- [ICASSP 2022] Defending Against Universal Attack Via Curvature-Aware Category Adversarial Training.
- [ICASSP 2022] SP Attack: Single-Perspective Attack for Generating Adversarial Omnidirectional Images.
- [ICASSP 2022] Few-Shot One-Class Domain Adaptation Based On Frequency For Iris Presentation Attack Detection.
- [ICASSP 2022] Wassertrain: An Adversarial Training Framework Against Wasserstein Adversarial Attacks.
- [ICASSP 2022] Efficient Universal Shuffle Attack for Visual Object Tracking.
- [ICASSP 2022] Non-Rigid Transformation Based Adversarial Attack Against 3d Object Tracking.
- [ICASSP 2022] Adversary Distillation for One-Shot Attacks on 3D Target Tracking.
- [ICASSP 2022] Object-Oriented Backdoor Attack Against Image Captioning.
- [ICASSP 2022] Towards Robust Speech-to-Text Adversarial Attack.
- [ICASSP 2022] Sparse Adversarial Attack For Video Via Gradient-Based Keyframe Selection.
- [ICASSP 2022] Stealthy Backdoor Attack with Adversarial Training.
- [ICASSP 2022] Against Backdoor Attacks In Federated Learning With Differential Privacy.
- [ICASSP 2022] Randomized Smoothing Under Attack: How Good is it in Practice?
- [ICASSP 2022] Applying Deep Learning to Known-Plaintext Attack on Chaotic Image Encryption Schemes.
- [ICASSP 2022] Detecting Backdoor Attacks against Point Cloud Classifiers.
- [ICASSP 2022] Characterizing the Adversarial Vulnerability of Speech self-Supervised Learning.
- [ICASSP 2022] Combating False Sense of Security: Breaking the Defense of Adversarial Training Via Non-Gradient Adversarial Attack.
- [ICASSP 2022] Position-Invariant Adversarial Attacks on Neural Modulation Recognition.
- [ICASSP 2022] SparseBFA: Attacking Sparse Deep Neural Networks with the Worst-Case Bit Flips on Coordinates.
- [ICASSP 2022] FedClean: A Defense Mechanism against Parameter Poisoning Attacks in Federated Learning.
- [ICASSP 2022] When Does Backdoor Attack Succeed in Image Reconstruction? A Study of Heuristics vs. Bi-Level Solution.
- [ICASSP 2022] Map: Multispectral Adversarial Patch to Attack Person Detection.
- [ICASSP 2022] AdverSparse: An Adversarial Attack Framework for Deep Spatial-Temporal Graph Neural Networks.
- [ICASSP 2022] Privacy Attacks for Automatic Speech Recognition Acoustic Models in A Federated Learning Framework.
- [ICASSP 2022] Block-Sparse Adversarial Attack to Fool Transformer-Based Text Classifiers.
- [ICASSP 2023] Measuring the Transferability of ℓ∞ Attacks by the ℓ2 Norm.
- [ICASSP 2023] Distance-Based Online Label Inference Attacks Against Split Learning.
- [ICASSP 2023] Light Projection-Based Physical-World Vanishing Attack Against Car Detection.
- [ICASSP 2023] Measure and Countermeasure of the Capsulation Attack Against Backdoor-Based Deep Neural Network Watermarks.
- [ICASSP 2023] Adversarial Attacks on Genotype Sequences.
- [ICASSP 2023] Content-Insensitive Dynamic Lip Feature Extraction for Visual Speaker Authentication Against Deepfake Attacks.
- [ICASSP 2023] Towards Making a Trojan-Horse Attack on Text-to-Image Retrieval.
- [ICASSP 2023] Untargeted Backdoor Attack Against Object Detection.
- [ICASSP 2023] A Graph Neural Network Multi-Task Learning-Based Approach for Detection and Localization of Cyberattacks in Smart Grids.
- [ICASSP 2023] Bert is Robust! A Case Against Word Substitution-Based Adversarial Attacks.
- [ICASSP 2023] STYX: Adaptive Poisoning Attacks Against Byzantine-Robust Defenses in Federated Learning.
- [ICASSP 2023] Identifying Source Speakers for Voice Conversion Based Spoofing Attacks on Speaker Verification Systems.
- [ICASSP 2023] Step restriction for improving adversarial attacks.
- [ICASSP 2023] Similarity Relation Preserving Cross-Modal Learning for Multispectral Pedestrian Detection Against Adversarial Attacks.
- [ICASSP 2023] Defending Against Universal Patch Attacks by Restricting Token Attention in Vision Transformers.
- [ICASSP 2023] POINTACL: Adversarial Contrastive Learning for Robust Point Clouds Representation Under Adversarial Attack.
- [ICASSP 2023] Single Domain Dynamic Generalization for Iris Presentation Attack Detection.
- [ICASSP 2023] Multi-Layer Feature Division Transferable Adversarial Attack.
- [ICASSP 2023] Backdoor Attack Against Automatic Speaker Verification Models in Federated Learning.
- [ICASSP 2023] Privacy-Enhanced Federated Learning Against Attribute Inference Attack for Speech Emotion Recognition.
- [ICASSP 2023] Transaudio: Towards the Transferable Adversarial Audio Attack Via Learning Contextualized Perturbations.
- [ICASSP 2023] Targeted Adversarial Attacks Against Neural Machine Translation.
- [ICASSP 2023] Forensics for Adversarial Machine Learning Through Attack Mapping Identification.
- [ICASSP 2023] BATT: Backdoor Attack with Transformation-Based Triggers.
- [ICASSP 2023] Defense Against Black-Box Adversarial Attacks Via Heterogeneous Fusion Features.
- [ICASSP 2023] Sparse Black-Box Inversion Attack with Limited Information.
- [ICASSP 2023] Prompt Makes mask Language Models Better Adversarial Attackers.
- [ICASSP 2023] Multi-Head Uncertainty Inference for Adversarial Attack Detection.
- [ICASSP 2023] APGP: Accuracy-Preserving Generative Perturbation for Defending Against Model Cloning Attacks.
- [ICASSP 2023] Towards Practical Edge Inference Attacks Against Graph Neural Networks.
- [ICASSP 2023] Two-Branch Multi-Scale Deep Neural Network for Generalized Document Recapture Attack Detection.
- [ICASSP 2023] An Empirical Study of Backdoor Attacks on Masked Auto Encoders.
- [ICASSP 2024] On The Role of Room Acoustics in Audio Presentation Attack Detection.
- [ICASSP 2024] Stealthy Backdoor Attack Towards Federated Automatic Speaker Verification.
- [ICASSP 2024] SPY-Watermark: Robust Invisible Watermarking for Backdoor Attack.
- [ICASSP 2024] Scale-Free And Task-Generic Attack: Generating Photo-Realistic Adversarial Patterns With Patch Quilting Generator.
- [ICASSP 2024] Exploring Targeted Universal Adversarial Attack for Deep Hashing.
- [ICASSP 2024] Transformer Model with Multi-Type Classification Decisions for Intrusion Attack Detection of Track Traffic and Vehicle.
- [ICASSP 2024] Uncovering Strong Ties: A Study of Indirect Sybil Attack on Signed Social Network.
- [ICASSP 2024] Improving Visual Quality and Transferability of Adversarial Attacks on Face Recognition Simultaneously with Adversarial Restoration.
- [ICASSP 2024] ADVSV: An Over-the-Air Adversarial Attack Dataset for Speaker Verification.
- [ICASSP 2024] Attribution-Based Scanline Perturbation Attack on 3d Detectors of Lidar Point Clouds.
- [ICASSP 2024] CNFA: Conditional Normalizing Flow for Query-Limited Attack.
- [ICASSP 2024] AdvShadow: Evading DeepFake Detection via Adversarial Shadow Attack.
- [ICASSP 2024] Scalable Ensemble-Based Detection Method Against Adversarial Attacks For Speaker Verification.
- [ICASSP 2024] GI-PIP: Do We Require Impractical Auxiliary Dataset for Gradient Inversion Attacks?
- [ICASSP 2024] NWS: Natural Textual Backdoor Attacks Via Word Substitution.
- [ICASSP 2024] Least-Effort Adversarial Attack Against Gait-Based Identity Recognition System.
- [ICASSP 2024] A Targeted Adversarial Attack Method for Multi-Classification Malicious Traffic Detection.
- [ICASSP 2024] Noise Masking Attacks and Defenses for Pretrained Speech Models.
- [ICASSP 2024] Vulnerability of Face age Verification to Replay Attacks.
- [ICASSP 2024] Gradient Inversion Attacks on Acoustic Signals: Revealing Security Risks in Audio Recognition Systems.
- [ICASSP 2024] AdvTTS: Adversarial Text-to-Speech Synthesis Attack on Speaker Identification Systems.
- [ICASSP 2024] Universal Adversarial Attack Against Speaker Recognition Models.
- [ICASSP 2024] DROPFL: Client Dropout Attacks Against Federated Learning Under Communication Constraints.
- [ICASSP 2024] Cost Aware Untargeted Poisoning Attack Against Graph Neural Networks.
- [ICASSP 2024] CPMSVD: Cross-Project Multiclass Software Vulnerability Detection Via Fused Deep Feature and Domain Adaptation.
- [ICASSP 2024] Image Mixing and Gradient Smoothing to Enhance the SAR Image Attack Transferability.
- [ICASSP 2024] Defending against Clean-Image Backdoor Attack in Multi-Label Classification.
- [ICASSP 2024] Robustness Against Adversarial Attacks Via Learning Confined Adversarial Polytopes.
- [ICASSP 2024] SSTA: Salient Spatially Transformed Attack.
- [ICASSP 2024] OADAS: Optimizing Global Perturbation Attacks with Dual-Path Attribution Synergy.
- [ICASSP 2024] MISA: Unveiling the Vulnerabilities in Split Federated Learning.
- [ICASSP 2024] Towards Video-Text Retrieval Adversarial Attack.
- [ICASSP 2024] GCIA: A Black-Box Graph Injection Attack Method Via Graph Contrastive Learning.
- [ICASSP 2024] FIBA: Federated Invisible Backdoor Attack.
- [ICASSP 2024] Identifying Attack-Specific Signatures in Adversarial Examples.
- [ICASSP 2024] Ten-Guard: Tensor Decomposition for Backdoor Attack Detection in Deep Neural Networks.
- [ICASSP 2024] Hierarchical Attacks on Large-Scale Graph Neural Networks.
- [ICASSP 2024] PoisonPrompt: Backdoor Attack on Prompt-Based Large Language Models.
- [ICASSP 2024] Analyzing Adversarial Vulnerabilities of Graph Lottery Tickets.
- [ICASSP 2024] Mitigating Data Injection Attacks on Federated Learning.
- [ICASSP 2024] On The Resilience Of Online Federated Learning To Model Poisoning Attacks Through Partial Sharing.
- [ICASSP 2024] Rethinking Targeted Adversarial Attacks for Neural Machine Translation.
- [ICASSP 2024] VIC-KD: Variance-Invariance-Covariance Knowledge Distillation to Make Keyword Spotting More Robust Against Adversarial Attacks.
- [ICASSP 2024] Spoofing Attack Augmentation: Can Differently-Trained Attack Models Improve Generalisation?
- [ICASSP 2024] Are Deep Neural Networks Robust to Named Entities? An Adversarial Attack and Defense Perspective.
- [ICASSP 2024] Benchmarking Adversarial Robustness of Image Shadow Removal with Shadow-Adaptive Attacks.
- [ICASSP 2025] PGD-Imp: Rethinking and Unleashing Potential of Classic PGD with Dual Strategies for Imperceptible Adversarial Attacks.
- [ICASSP 2025] Detecting and Defending Against Adversarial Attacks on Automatic Speech Recognition via Diffusion Models.
- [ICASSP 2025] Multi-view Feature Discrepancy Attack for Single Object Tracking.
- [ICASSP 2025] DiffAttack: Diffusion-based Timbre-reserved Adversarial Attack in Speaker Identification.
- [ICASSP 2025] Adversarial Knowledge Transfer for Black-Box Model Inversion Attack.
- [ICASSP 2025] Palm-vein images reconstruction against adversarial attacks.
- [ICASSP 2025] Device-aware Optical Adversarial Attack for a Portable Projector-camera System.
- [ICASSP 2025] Stealthy Backdoor Attack against Video Recognition Models.
- [ICASSP 2025] Steering Large Language Models for Vulnerability Detection.
- [ICASSP 2025] SBA: A Swift and Stealthy Backdoor Attack Framework for Federated Learning.
- [ICASSP 2025] FA-GAN: Defense Against Adversarial Attacks in Automatic Modulation Recognition.
- [ICASSP 2025] Energy Backdoor Attack to Deep Neural Networks.
- [ICASSP 2025] Imperceptible Transfer Attack on Large Vision-Language Models.
- [ICASSP 2025] Imperceptible Adversarial Attacks on Point Clouds Guided by Point-to-Surface Field.
- [ICASSP 2025] Boosting Jailbreak Attack with Momentum.
- [ICASSP 2025] PB-UAP: Hybride Universal Adversarial Attack for Image Segmentation.
- [ICASSP 2025] EM-MIAs: Enhancing Membership Inference Attacks in Large Language Models through Ensemble Modeling.
- [ICASSP 2025] Enhancing the Robustness of LiDAR-based Object Detection under Disappearing Attacks.
- [ICASSP 2025] LossControl: Defending Membership Inference Attacks by Controlling the Loss.
- [ICASSP 2025] Generating Is Believing: Membership Inference Attacks against Retrieval-Augmented Generation.
- [ICASSP 2025] VulKiller: Java Web Vulnerability Detection with Code Property Graph and Large Language Models.
- [ICASSP 2025] APTSniffer: Detecting APT Attack Traffic Using Retrieval-Augmented Large Language Models.
- [ICASSP 2025] Robust Multi-task Adversarial Attacks Using Min-max Optimization.
- [ICASSP 2025] GPA: Enhancing Generalizable Physical Adversarial Attacks Across Multiple Vision Tasks.
- [ICASSP 2025] Robust Adversarial Defense Based on Non-Transferability of Attack Across Foundation Models.
- [ICASSP 2025] Known-Plaintext Attacks to Thumbnail-Preservation Encryption Using Pix2pix Generative Adversarial Network.
- [ICASSP 2025] Selective Consistency Gradient Attack: Resolving Multi-Target Gradient Conflicts in Object Detection.
- [ICASSP 2025] Covert and Potent: A Weather-Camouflaged Backdoor Attacks on Self-Supervised Learning.
- [ICASSP 2025] V-Phanton: Voltage-Based Physically-Triggered Backdoor Attack Against Facial Recognition.
- [ICASSP 2025] AdaPPA: Adaptive Position Pre-Fill Jailbreak Attack Approach Targeting LLMs.
- [ICASSP 2025] Fading-Invariant Adversarial Attacks on Neural Modulation Recognition.
- [ICASSP 2025] RAS-GNN: Reconstructing APT Attack Scenario Using Graph Neural Network.
- [ICASSP 2025] MS-UFAD: A Large-Scale Dataset for Real-world Unified Face Attack Detection with Text Descriptions.
- [ICASSP 2025] Efficient Multi-branch Black-box Semantic-aware Targeted Attack Against Deep Hashing Retrieval.
- [ICASSP 2025] BadRefSR: Backdoor Attacks Against Reference-based Image Super Resolution.
- [ICASSP 2025] Point Clean-label Backdoor Attack for Specific Classes via Feature Entanglement.
- [ICASSP 2025] Dual-Population Watermark Vaccine: Efficient and Imperceptible Adversarial Attack for Watermarked Image Protection.
- [ICASSP 2025] Real-time Adversarial Attack to Deep Learning-based Wi-Fi Human Activity Recognition.
- [ICASSP 2025] Exploiting Robust Model Watermarking Against the Model Fine-Tuning Attack via Flat Minima Aware Optimizers.
- [ICASSP 2025] Identifying Adversarial Attacks in Crowdsourcing via Dense Subgraph Detection.
- [ICASSP 2025] Can Fairness and Robustness Be Simultaneously Achieved Under Byzantine Attacks?
- [ICASSP 2025] Explainable Adversarial Attacks on Coarse-to-Fine Classifiers.
- [ICASSP 2025] DiGradPatch: Black-Box Patch Attacks via Diffusion-Based Double Gradient and Sensitive Distribution Guidance.
- [ICASSP 2025] A Model Stealing Attack Against Multi-Exit Networks.
- [ICASSP 2025] To Learn Better Character Embeddings in Generative Models for Password Attack.
- [ICASSP 2025] Rethinking Adversarial Attacks in Reinforcement Learning from Policy Distribution Perspective.
- [ICASSP 2025] DCASI: A Sequence-based Attack Investigation Method Using DTW Contrastive Learning.
- [ICASSP 2025] HLTCOE Submission to the VoicePrivacy Attacker Challenge.
- [ICASSP 2025] SpecWav-Attack: Leveraging Spectrogram Resizing and Wav2Vec 2.0 for Attacking Anonymized Speech.
- [ICASSP 2025] Fine-tuning TitaNet-Large Model for Speaker Anonymization Attacker Systems.
- [ICASSP 2025] The First VoicePrivacy Attacker Challenge.
- [ICASSP 2025] Attacking Voice Anonymization Systems with Augmented Feature and Speaker Identity Difference.
- [ICASSP 2025] Unveiling the Pruning Risks on Privacy Vulnerabilities of Deep Neural Networks.
- [ICASSP 2025] DiffAttack: Imperceptible and Transferable Audio Adversarial Attack via Diffusion Model.
- [ICMCS 2012] A Pollution Attack to Public-key Watermarking Schemes.
- [ICMCS 2014] Gaming the game: Defeating a game captcha with efficient and robust hybrid attacks.
- [ICMCS 2017] Security evaluation for block scrambling-based ETC systems against extended jigsaw puzzle solver attacks.
- [ICMCS 2018] Schmidt: Image Augmentation for Black-Box Adversarial Attack.
- [ICMCS 2019] Query-Free Embedding Attack Against Deep Learning.
- [ICMCS 2019] Untargeted Adversarial Attack via Expanding the Semantic Gap.
- [ICMCS 2020] Exploring Hypergraph Representation On Face Anti-Spoofing Beyond 2d Attacks.
- [ICMCS 2020] Contextual Adversarial Attacks For Object Detection.
- [ICMCS 2020] Fooled by Imagination: Adversarial Attack to Image Captioning Via Perturbation in Complex Domain.
- [ICMCS 2021] Efficient Open-Set Adversarial Attacks on Deep Face Recognition.
- [ICMCS 2021] Blind Adversarial Pruning: Towards The Comprehensive Robust Models With Gradually Pruning Against Blind Adversarial Attacks.
- [ICMCS 2021] Towards Effective Adversarial Attack Against 3D Point Cloud Classification.
- [ICMCS 2021] Structure-Oriented Progressive Low-Rank Image Restoration for Defending Adversarial Attacks.
- [ICMCS 2021] Rpattack: Refined Patch Attack on General Object Detectors.
- [ICMCS 2022] Learning to Augment Face Presentation Attack Dataset via Disentangled Feature Learning from Limited Spoof Data.
- [ICMCS 2022] A2SC: Adversarial Attack on Subspace Clustering.
- [ICMCS 2022] Attention Based Adversarial Attacks with Low Perturbations.
- [ICMCS 2022] Towards Black-Box Adversarial Attacks on Interpretable Deep Learning Systems.
- [ICMCS 2023] Making Adversarial Attack Imperceptible in Frequency Domain: A Watermark-based Framework.
- [ICMCS 2023] Towards Boosting Black-Box Attack Via Sharpness-Aware.
- [ICMCS 2023] Contrastive Fusion Representation: Mitigating Adversarial Attacks on VQA Models.
- [ICMCS 2023] Transferable Waveform-level Adversarial Attack against Speech Anti-spoofing Models.
- [ICMCS 2023] DBIA: Data-Free Backdoor Attack Against Transformer Networks.
- [ICMCS 2023] Downstream Task-agnostic Transferable Attacks on Language-Image Pre-training Models.
- [ICMCS 2023] Adversarial Attacks on Generated Text Detectors.
- [ICMCS 2023] Automated Software Vulnerability Detection via Curriculum Learning.
- [ICMCS 2024] Adaptive Oriented Adversarial Attacks on Visible and Infrared Image Fusion Models.
- [ICMCS 2024] Towards Query-Efficient Decision-Based Adversarial Attacks Through Frequency Domain.
- [ICMCS 2024] Shapley Ensemble Adversarial Attack.
- [ICMCS 2024] Time-Frequency Jointed Imperceptible Adversarial Attack to Brainprint Recognition with Deep Learning Models.
- [ICMCS 2024] Defending Against Backdoor Attacks via Region Growing and Diffusion Model.
- [ICMCS 2024] Improving the Sar Image Adversarial Transferability Through Dual-Loop Ensemble Gradient Attack.
- [ICMCS 2024] Enhancing Adversarial Transferability on Vision Transformer by Permutation-Invariant Attacks.
- [ICMCS 2024] Reputation Defender: Local Black-Box Adversarial Attack against Image-Translation-Based DeepFake.
- [ICMCS 2024] Multi-Modal Document Presentation Attack Detection with Forensics Trace Disentanglement.
- [ICMCS 2024] On the Higher Moment Disparity of Backdoor Attacks.
- [ICMCS 2024] SSyncOA: Self-synchronizing Object-aligned Watermarking to Resist Crop-paste Attacks.
- [ICMCS 2024] FIA-TE: Feature Inference Attack on Decision Tree Ensembles in Vertical Federated Learning.
- [ICMCS 2024] SVASTIN: Sparse Video Adversarial Attack via Spatio-Temporal Invertible Neural Networks.
- [ICMCS 2024] Boosting Node Injection Attack with Graph Local Sparsity.
- [ICMCS 2024] Understanding Impacts of Electromagnetic Signal Injection Attacks on Object Detection.
- [ICMCS 2024] Multi-Strategy Adversarial Learning for Robust Face Forgery Detection Under Heterogeneous and Composite Attacks.
- [ICMCS 2024] FedCL: Detecting Backdoor Attacks in Federated Learning with Confidence Levels.
- [ICMCS 2024] MysticMask: Adversarial Mask for Impersonation Attack Against Face Recognition Systems.
- [ICMCS 2024] Cross-Point Adversarial Attack Based on Feature Neighborhood Disruption Against Segment Anything Model.
- [ICMCS 2024] Public-Domain Locator for Boosting Attack Transferability on Videos.
- [VRST 2021] BreachMob: Detecting Vulnerabilities in Physical Environments Using Virtual Reality.
- [VRST 2021] Dealing with a Panic Attack: a Virtual Reality Training Module for Postgraduate Psychology Students.
- [VRST 2024] A Critical Review of Virtual and Extended Reality Immersive Police Training: Application Areas, Benefits & Vulnerabilities.
- [INTERSPEECH 2012] Spoofing countermeasures for the protection of automatic speaker recognition systems against attacks with artificial signals.
- [INTERSPEECH 2012] Detecting Converted Speech and Natural Speech for anti-Spoofing Attack in Speaker Recognition.
- [INTERSPEECH 2013] I-vectors meet imitators: on vulnerability of speaker verification systems against voice mimicry.
- [INTERSPEECH 2013] Security evaluation of i-vector based speaker verification systems against hill-climbing attacks.
- [INTERSPEECH 2013] Vulnerability evaluation of speaker verification under voice conversion spoofing: the effect of text constraints.
- [INTERSPEECH 2016] Unit-Selection Attack Detection Based on Unfiltered Frequency-Domain Features.
- [INTERSPEECH 2017] The ASVspoof 2017 Challenge: Assessing the Limits of Replay Spoofing Attack Detection.
- [INTERSPEECH 2017] Experimental Analysis of Features for Replay Attack Detection - Results on the ASVspoof 2017 Challenge.
- [INTERSPEECH 2017] Countermeasures for Automatic Speaker Verification Replay Spoofing Attack : On Data Augmentation, Feature Representation, Classification and Fusion.
- [INTERSPEECH 2017] Audio Replay Attack Detection Using High-Frequency Features.
- [INTERSPEECH 2017] Audio Replay Attack Detection with Deep Learning Frameworks.
- [INTERSPEECH 2017] Ensemble Learning for Countermeasure of Audio Replay Spoofing Attack in ASVspoof2017.
- [INTERSPEECH 2017] A Study on Replay Attack and Anti-Spoofing for Automatic Speaker Verification.
- [INTERSPEECH 2017] Replay Attack Detection Using DNN for Channel Discrimination.
- [INTERSPEECH 2017] Detection of Replay Attacks Using Single Frequency Filtering Cepstral Coefficients.
- [INTERSPEECH 2017] Improving Speaker Verification Performance in Presence of Spoofing Attacks Using Out-of-Domain Spoofed Data.
- [INTERSPEECH 2018] Integrated Presentation Attack Detection and Automatic Speaker Verification: Common Features and Gaussian Back-end Fusion.
- [INTERSPEECH 2018] Exploration of Compressed ILPR Features for Replay Attack Detection.
- [INTERSPEECH 2018] Detection of Replay-Spoofing Attacks Using Frequency Modulation Features.
- [INTERSPEECH 2018] Multiple Phase Information Combination for Replay Attacks Detection.
- [INTERSPEECH 2018] Frequency Domain Linear Prediction Features for Replay Spoofing Attack Detection.
- [INTERSPEECH 2018] End-To-End Audio Replay Attack Detection Using Deep Convolutional Networks with Attention.
- [INTERSPEECH 2018] Decision-level Feature Switching as a Paradigm for Replay Attack Detection.
- [INTERSPEECH 2018] Modulation Dynamic Features for the Detection of Replay Attacks.
- [INTERSPEECH 2018] Novel Linear Frequency Residual Cepstral Features for Replay Attack Detection.
- [INTERSPEECH 2018] Linear Prediction Residual based Short-term Cepstral Features for Replay Attacks Detection.
- [INTERSPEECH 2019] Speech Replay Detection with x-Vector Attack Embeddings and Spectral Features.
- [INTERSPEECH 2019] Transfer-Representation Learning for Detecting Spoofing Attacks with Converted and Synthesized Speech in Automatic Speaker Verification System.
- [INTERSPEECH 2019] Detecting Spoofing Attacks Using VGG and SincNet: BUT-Omilia Submission to ASVspoof 2019 Challenge.
- [INTERSPEECH 2019] Replay Attack Detection with Complementary High-Resolution Information Using End-to-End DNN for the ASVspoof 2019 Challenge.
- [INTERSPEECH 2019] ReMASC: Realistic Replay Attack Corpus for Voice Controlled Systems.
- [INTERSPEECH 2019] Blind Channel Response Estimation for Replay Attack Detection.
- [INTERSPEECH 2019] Adversarial Optimization for Dictionary Attacks on Speaker Verification.
- [INTERSPEECH 2019] Cross-Domain Replay Spoofing Attack Detection Using Domain Adversarial Training.
- [INTERSPEECH 2019] Biologically Inspired Adaptive-Q Filterbanks for Replay Spoofing Attack Detection.
- [INTERSPEECH 2019] Adversarial Black-Box Attacks on Automatic Speech Recognition Systems Using Multi-Objective Evolutionary Optimization.
- [INTERSPEECH 2020] Enhancing Transferability of Black-Box Adversarial Attacks via Lifelong Learning for Speech Emotion Recognition Models.
- [INTERSPEECH 2020] Multi-Task Siamese Neural Network for Improving Replay Attack Detection.
- [INTERSPEECH 2020] Dual-Adversarial Domain Adaptation for Generalized Replay Attack Detection.
- [INTERSPEECH 2020] Light Convolutional Neural Network with Feature Genuinization for Detection of Synthetic Speech Attacks.
- [INTERSPEECH 2020] Spoofing Attack Detection Using the Non-Linear Fusion of Sub-Band Classifiers.
- [INTERSPEECH 2020] Deep Architecture Enhancing Robustness to Noise, Adversarial Attacks, and Cross-Corpus Setting for Speech Emotion Recognition.
- [INTERSPEECH 2020] Defense for Black-Box Attacks on Anti-Spoofing Models by Self-Supervised Learning.
- [INTERSPEECH 2020] Universal Adversarial Attacks on Spoken Language Assessment Systems.
- [INTERSPEECH 2020] The Attacker’s Perspective on Automatic Speaker Verification: An Overview.
- [INTERSPEECH 2020] Inaudible Adversarial Perturbations for Targeted Attack in Speaker Recognition.
- [INTERSPEECH 2020] x-Vectors Meet Adversarial Attacks: Benchmarking Adversarial Robustness in Speaker Verification.
- [INTERSPEECH 2020] Black-Box Attacks on Spoofing Countermeasures Using Transferability of Adversarial Examples.
- [INTERSPEECH 2020] Detecting Audio Attacks on ASR Systems with Dropout Uncertainty.
- [INTERSPEECH 2021] Evaluating the Vulnerability of End-to-End Automatic Speech Recognition Models to Membership Inference Attacks.
- [INTERSPEECH 2021] Identifying Indicators of Vulnerability from Short Speech Segments Using Acoustic and Textual Features.
- [INTERSPEECH 2021] Pairing Weak with Strong: Twin Models for Defending Against Adversarial Attack on Speaker Verification.
- [INTERSPEECH 2021] Representation Learning to Classify and Detect Adversarial Attacks Against Speaker and Speech Recognition Systems.
- [INTERSPEECH 2021] Channel-Wise Gated Res2Net: Towards Robust Detection of Synthetic Speech Attacks.
- [INTERSPEECH 2022] Vaccinating SER to Neutralize Adversarial Attacks with Self-Supervised Augmentation Strategy.
- [INTERSPEECH 2022] Attacker Attribution of Audio Deepfakes.
- [INTERSPEECH 2022] Speaker-Specific Utterance Ensemble based Transfer Attack on Speaker Identification.
- [INTERSPEECH 2022] Example-based Explanations with Adversarial Attacks for Respiratory Sound Analysis.
- [INTERSPEECH 2022] Attack Agnostic Dataset: Towards Generalization and Stabilization of Audio DeepFake Detection.
- [INTERSPEECH 2022] Recent improvements of ASR models in the face of adversarial attacks.
- [INTERSPEECH 2022] NRI-FGSM: An Efficient Transferable Adversarial Attack for Speaker Recognition Systems.
- [INTERSPEECH 2022] A Deep One-Class Learning Method for Replay Attack Detection.
- [INTERSPEECH 2022] A Universal Identity Backdoor Attack against Speaker Verification based on Siamese Network.
- [INTERSPEECH 2022] Multi-Path GMM-MobileNet Based on Attack Algorithms and Codecs for Synthetic Speech and Deepfake Detection.
- [INTERSPEECH 2022] Defense against Adversarial Attacks on Hybrid Speech Recognition System using Adversarial Fine-tuning with Denoiser.
- [INTERSPEECH 2022] Membership Inference Attacks Against Self-supervised Speech Models.
- [INTERSPEECH 2022] Chunking Defense for Adversarial Attacks on ASR.
- [INTERSPEECH 2022] User-Level Differential Privacy against Attribute Inference Attack of Speech Emotion Recognition on Federated Learning.
- [INTERSPEECH 2022] AdvEst: Adversarial Perturbation Estimation to Classify and Detect Adversarial Attacks against Speaker Identification.
- [INTERSPEECH 2022] An Empirical Analysis on the Vulnerabilities of End-to-End Speech Segregation Models.
- [INTERSPEECH 2023] Privacy Risks in Speech Emotion Recognition: A Systematic Study on Gender Inference Attack.
- [INTERSPEECH 2023] SlothSpeech: Denial-of-service Attack Against Speech Recognition Models.
- [INTERSPEECH 2023] Malafide: a novel adversarial convolutive noise attack against deepfake and spoofing detection systems.
- [INTERSPEECH 2023] Group GMM-ResNet for Detection of Synthetic Speech Attacks.
- [INTERSPEECH 2023] Pseudo-Siamese Network based Timbre-reserved Black-box Adversarial Attack in Speaker Identification.
- [INTERSPEECH 2023] Fake the Real: Backdoor Attack on Deep Speech Classification via Voice Conversion.
- [INTERSPEECH 2023] Defense Against Adversarial Attacks on Audio DeepFake Detection.
- [INTERSPEECH 2023] Spoofing Attacker Also Benefits from Self-Supervised Pretrained Model.
- [INTERSPEECH 2024] VoiceDefense: Protecting Automatic Speaker Verification Models Against Black-box Adversarial Attacks.
- [INTERSPEECH 2024] Boosting the Transferability of Adversarial Examples with Gradient-Aligned Ensemble Attack for Speaker Recognition.
- [INTERSPEECH 2024] Speech Formants Integration for Generalized Detection of Synthetic Speech Spoofing Attacks.
- [INTERSPEECH 2024] RW-VoiceShield: Raw Waveform-based Adversarial Attack on One-shot Voice Conversion.
- [INTERSPEECH 2024] To what extent can ASV systems naturally defend against spoofing attacks?
- [ICIP 2010] Analysis of the resistance of the Spread Transform against Temporal Frame Averaging attack.
- [ICIP 2010] Secure and robust sift with resistance to chosen-plaintext attack.
- [ICIP 2011] Countermeasure of re-recording prevention against attack with short wavelength pass filter.
- [ICIP 2012] Optimal watermark power and host samples allocation under random gain attack.
- [ICIP 2013] A visual dictionary attack on Picture Passwords.
- [ICIP 2014] Novel presentation attack detection algorithm for face recognition system: Application to 3D face mask attack.
- [ICIP 2014] Attacking the triangle test in sensor-based camera identification.
- [ICIP 2017] Detecting anti-forensic attacks on demosaicing-based camera model identification.
- [ICIP 2019] A New Backdoor Attack in CNNS by Training Set Corruption Without Label Poisoning.
- [ICIP 2019] Extending Adversarial Attacks and Defenses to Deep 3D Point Cloud Classifiers.
- [ICIP 2019] Direct Adversarial Attack on Stego Sandwiched Between Black Boxes.
- [ICIP 2019] Generating Adversarial Examples By Makeup Attacks on Face Recognition.
- [ICIP 2019] Robustness of Saak Transform Against Adversarial Attacks.
- [ICIP 2020] Type I Attack For Generative Models.
- [ICIP 2020] Substitute Model Generation for Black-Box Adversarial Attack Based on Knowledge Distillation.
- [ICIP 2020] Efficient Detection of Pixel-Level Adversarial Attacks.
- [ICIP 2020] Universal Adversarial Attack Via Enhanced Projected Gradient Descent.
- [ICIP 2020] Feature Extraction For Visual Speaker Authentication Against Computer-Generated Video Attacks.
- [ICIP 2020] CNN Patch Pooling for Detecting 3D Mask Presentation Attacks in NIR.
- [ICIP 2020] Security of Facial Forensics Models Against Adversarial Attacks.
- [ICIP 2021] Fabricate-Vanish: An Effective And Transferable Black-Box Adversarial Attack Incorporating Feature Distortion.
- [ICIP 2021] Simtrojan: Stealthy Backdoor Attack.
- [ICIP 2021] Regularized Intermediate Layers Attack: Adversarial Examples With High Transferability.
- [ICIP 2021] AI-GAN: Attack-Inspired Generation of Adversarial Examples.
- [ICIP 2021] Facial Expressions as a Vulnerability in Face Recognition.
- [ICIP 2021] Image-Level Iris Morph Attack.
- [ICIP 2021] Robust Decision-Based Black-Box Adversarial Attack via Coarse-To-Fine Random Search.
- [ICIP 2021] On the Reversibility of Adversarial Attacks.
- [ICIP 2021] Towards Universal Physical Attacks On Cascaded Camera-Lidar 3d Object Detection Models.
- [ICIP 2021] From Gradient Leakage To Adversarial Attacks In Federated Learning.
- [ICIP 2021] Adversarial Attack on Fake-Faces Detectors Under White and Black Box Scenarios.
- [ICIP 2021] rPPG-Based Spoofing Detection for Face Mask Attack using Efficientnet on Weighted Spatial-Temporal Representation.
- [ICIP 2021] A Neuro-Inspired Autoencoding Defense Against Adversarial Attacks.
- [ICIP 2022] Diverse Generative Perturbations on Attention Space for Transferable Adversarial Attacks.
- [ICIP 2022] Sign-OPT+: An Improved Sign Optimization Adversarial Attack.
- [ICIP 2022] Query-Efficient Adversarial Attack Based On Latin Hypercube Sampling.
- [ICIP 2022] Simulator Attack+ for Black-Box Adversarial Attack.
- [ICIP 2022] Regional Saliency Map Attack for Medical Image Segmentation.
- [ICIP 2022] Authentication Of Copy Detection Patterns Under Machine Learning Attacks: A Supervised Approach.
- [ICIP 2022] Hidden Conditional Adversarial Attacks.
- [ICIP 2022] CRAB: Certified Patch Robustness Against Poisoning-Based Backdoor Attacks.
- [ICIP 2022] Adaptive Warping Network for Transferable Adversarial Attacks.
- [ICIP 2022] AI-Based Compression: A New Unintended Counter Attack on JPEG-Related Image Forensic Detectors?
- [ICIP 2022] A Novel System for Deep Contour Classifiers Certification Under Filtering Attacks.
- [ICIP 2022] Towards Model Quantization on the Resilience Against Membership Inference Attacks.
- [ICIP 2022] Adversarial Label-Poisoning Attacks and Defense for General Multi-Class Models Based on Synthetic Reduced Nearest Neighbor.
- [ICIP 2022] An Enhanced Transferable Adversarial Attack of Scale-Invariant Methods.
- [ICIP 2022] Vitranspad: Video Transformer Using Convolution And Self-Attention For Face Presentation Attack Detection.
- [ICIP 2023] Domain-Generalized Face Anti-Spoofing with Unknown Attacks.
- [ICIP 2023] CSSBA: A Clean Label Sample-Specific Backdoor Attack.
- [ICIP 2023] Towards Query Efficient and Generalizable Black-Box Face Reconstruction Attack.
- [ICIP 2023] OOD Attack: Generating Overconfident out-of-Distribution Examples to Fool Deep Neural Classifiers.
- [ICIP 2023] Image Translation-Based Deniable Encryption against Model Extraction Attack.
- [ICIP 2023] Data Poisoning Attack Aiming the Vulnerability of Continual Learning.
- [ICIP 2023] Multi-Label Adversarial Attack Based on Label Correlation.
- [ICIP 2023] Local Texture Complexity Guided Adversarial Attack.
- [ICIP 2023] GNP Attack: Transferable Adversarial Examples Via Gradient Norm Penalty.
- [ICIP 2023] Efficient any-Target Backdoor Attack with Pseudo Poisoned Samples.
- [ICIP 2023] An Enhanced Neuron Attribution-Based Attack Via Pixel Dropping.
- [ICIP 2024] AdvART: Adversarial Art for Camouflaged Object Detection Attacks.
- [ICIP 2024] Universal Black-Box Adversarial Patch Attack with Optimized Genetic Algorithm.
- [ICIP 2024] SegGuard: Defending Scene Segmentation Against Adversarial Patch Attack.
- [ICIP 2024] Anomaly Unveiled: Securing Image Classification against Adversarial Patch Attacks.
- [ICIP 2024] Efficient Black-Box Adversarial Attack on Deep Clustering Models.
- [ICIP 2024] Mask-Based Invisible Backdoor Attacks on Object Detection.
- [ICIP 2024] A Trustworthy Authentication Against Visual Master Face Dictionary Attacks (Trauma).
- [ICIP 2024] Interpreting the Fraudulence Level of Different Finger Photo Presentation Attack Instruments.
- [ICIP 2024] Exposing the Limits of Deepfake Detection using novel Facial mole attack: A Perceptual Black- Box Adversarial Attack Study.
- [ICIP 2024] Defending Against Physical Adversarial Patch attacks On Infrared Human Detection.
- [MMM 2019] Large Scale Audio-Visual Video Analytics Platform for Forensic Investigations of Terroristic Attacks.
- [MMM 2020] An Effective Way to Boost Black-Box Adversarial Attack.
- [MMM 2022] Adversarial Attacks on Deepfake Detectors: A Practical Analysis.
- [MMM 2023] Transferable Adversarial Attack on 3D Object Tracking in Point Cloud.
- [MMM 2024] HPattack: An Effective Adversarial Attack for Human Parsing.
- [MMM 2025] EIA: Edge-Aware Imperceptible Adversarial Attacks on 3D Point Clouds.
- [MMM 2025] Making Strides Security in Multimodal Fake News Detection Models: A Comprehensive Analysis of Adversarial Attacks.
- [MMM 2025] SMG-Diff: Adversarial Attack Method Based on Semantic Mask-Guided Diffusion.
- [MMM 2025] FencBuddy: Action-Aware Depth Perception Training for Fencing Attacks.
- [MMASIA 2021] Towards Transferable 3D Adversarial Attack.
- [MMASIA 2023] Targeted Transferable Attack against Deep Hashing Retrieval.
- [CVM 2024] Adversarial Geometric Transformations of Point Clouds for Physical Attack.
- [CVM 2025] ADMMOA: Attribute-Driven Multimodal Optimization for Face Recognition Adversarial Attacks.
- [PRCV 2022] Query-UAP: Query-Efficient Universal Adversarial Perturbation for Large-Scale Person Re-Identification Attack.
- [PRCV 2023] Cross-Task Physical Adversarial Attack Against Lane Detection System Based on LED Illumination Modulation.
- [PRCV 2023] Ranking Variance Reduced Ensemble Attack with Dual Optimization Surrogate Search.
- [PRCV 2023] A Physically Feasible Counter-Attack Method for Remote Sensing Imaging Point Clouds.
- [PRCV 2023] Minimum Assumption Reconstruction Attacks: Rise of Security and Privacy Threats Against Face Recognition.
- [PRCV 2024] SecBFL-IoV: A Secure Blockchain-Enabled Federated Learning Framework for Resilience Against Poisoning Attacks in Internet of Vehicles.
- [PRCV 2024] Invisible Backdoor Attack Through Singular Value Decomposition.
- [PRCV 2024] A Privacy-Preserving Source Code Vulnerability Detection Method.
- [PRCV 2024] Enhancing the Transferability and Stealth of Deepfake Detection Attacks Through Latent Diffusion Models.
- [AAAI 2013] Bundling Attacks in Judgment Aggregation.
- [AAAI 2014] Lazy Defenders Are Almost Optimal against Diligent Attackers.
- [AAAI 2015] Optimal Personalized Filtering Against Spear-Phishing Attacks.
- [AAAI 2015] Using Machine Teaching to Identify Optimal Training-Set Attacks on Machine Learners.
- [AAAI 2015] HACKAR: Helpful Advice for Code Knowledge and Attack Resilience.
- [AAAI 2015] Realistic Assumptions for Attacks on Elections.
- [AAAI 2016] Multi-Defender Strategic Filtering Against Spear-Phishing Attacks.
- [AAAI 2016] Optimizing Personalized Email Filtering Thresholds to Mitigate Sequential Spear Phishing Attacks.
- [AAAI 2016] Data Poisoning Attacks against Autoregressive Models.
- [AAAI 2017] Optimal Personalized Defense Strategy Against Man-In-The-Middle Attack.
- [AAAI 2017] Explicit Defense Actions Against Test-Set Attacks.
- [AAAI 2018] EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples.
- [AAAI 2018] Towards Imperceptible and Robust Adversarial Example Attacks Against Neural Networks.
- [AAAI 2018] Data Poisoning Attacks on Multi-Task Relationship Learning.
- [AAAI 2018] Learning to Attack: Adversarial Transformation Networks.
- [AAAI 2018] Manipulative Elicitation - A New Attack on Elections with Incomplete Preferences.
- [AAAI 2018] On Cryptographic Attacks Using Backdoors for SAT.
- [AAAI 2018] Unravelling Robustness of Deep Learning Based Face Recognition Against Adversarial Attacks.
- [AAAI 2018] Complexity of Optimally Defending and Attacking a Network.
- [AAAI 2019] Resisting Adversarial Attacks Using Gaussian Mixture Variational Autoencoders.
- [AAAI 2019] AutoZOOM: Autoencoder-Based Zeroth Order Optimization Method for Attacking Black-Box Neural Networks.
- [AAAI 2019] Connecting the Digital and Physical World: Improving the Robustness of Adversarial Attacks.
- [AAAI 2019] The Pure Price of Anarchy of Pool Block Withholding Attacks in Bitcoin Mining.
- [AAAI 2019] Distributionally Adversarial Attack.
- [AAAI 2019] Attacking Data Transforming Learners at Training Time.
- [AAAI 2019] The Curse of Concentration in Robust Learning: Evasion and Poisoning Attacks from Concentration of Measure.
- [AAAI 2019] The Adversarial Attack and Detection under the Fisher Information Metric.
- [AAAI 2019] Non-Local Context Encoder: Robust Biomedical Image Segmentation against Adversarial Attacks.
- [AAAI 2020] VCG under Sybil (False-Name) Attacks - A Bayesian Analysis.
- [AAAI 2020] Ranking-Based Semantics for Sets of Attacking Arguments.
- [AAAI 2020] A Restricted Black-Box Adversarial Framework Towards Attacking Graph Embedding Models.
- [AAAI 2020] A New Ensemble Adversarial Attack Powered by Long-Term Gradient Memories.
- [AAAI 2020] A Frank-Wolfe Framework for Efficient and Effective Adversarial Attacks.
- [AAAI 2020] Optimal Attack against Autoregressive Models by Manipulating the Environment.
- [AAAI 2020] Suspicion-Free Adversarial Attacks on Clustering Algorithms.
- [AAAI 2020] Robust Stochastic Bandit Algorithms under Probabilistic Unbounded Adversarial Attack.
- [AAAI 2020] Spatiotemporally Constrained Action Space Attacks on Deep Reinforcement Learning Agents.
- [AAAI 2020] Robustness Certificates for Sparse Adversarial Attacks by Randomized Ablation.
- [AAAI 2020] Weighted-Sampling Audio Adversarial Example Attack.
- [AAAI 2020] CAG: A Real-Time Low-Cost Enhanced-Robustness High-Transferability Content-Aware Adversarial Attack Generator.
- [AAAI 2020] Stealthy and Efficient Adversarial Attacks against Deep Reinforcement Learning.
- [AAAI 2020] Detecting Asks in Social Engineering Attacks: Impact of Linguistic and Structural Knowledge.
- [AAAI 2020] Is BERT Really Robust? A Strong Baseline for Natural Language Attack on Text Classification and Entailment.
- [AAAI 2020] Adversarial Attack on Deep Product Quantization Network for Image Retrieval.
- [AAAI 2020] SADA: Semantic Adversarial Diagnostic Attacks for Autonomous Applications.
- [AAAI 2020] Adversary for Social Good: Protecting Familial Privacy through Joint Adversarial Attacks.
- [AAAI 2020] Hidden Trigger Backdoor Attacks.
- [AAAI 2020] Heuristic Black-Box Adversarial Attacks on Video Recognition Models.
- [AAAI 2020] Draining the Water Hole: Mitigating Social Engineering Attacks with CyberTWEAK.
- [AAAI 2020] On the Robustness of Face Recognition Algorithms Against Attacks and Bias.
- [AAAI 2020] Understanding Generalization in Neural Networks for Robustness against Adversarial Vulnerabilities.
- [AAAI 2020] Bayesian Adversarial Attack on Graph Neural Networks (Student Abstract).
- [AAAI 2021] Bigram and Unigram Based Text Attack via Adaptive Monotonic Heuristic Search.
- [AAAI 2021] A Unified Multi-Scenario Attacking Network for Visual Object Tracking.
- [AAAI 2021] Deep Feature Space Trojan Attack of Neural Networks by Controlled Detoxification.
- [AAAI 2021] Towards Universal Physical Attacks on Single Object Tracking.
- [AAAI 2021] Modeling Deep Learning Based Privacy Attacks on Physical Mail.
- [AAAI 2021] Beating Attackers At Their Own Games: Adversarial Example Detection Using Adversarial Gradient Directions.
- [AAAI 2021] Learning to Attack Real-World Models for Person Re-identification via Virtual-Guided Meta-Learning.
- [AAAI 2021] Defending against Contagious Attacks on a Network with Resource Reallocation.
- [AAAI 2021] UAG: Uncertainty-aware Attention Graph Neural Network for Defending Adversarial Attacks.
- [AAAI 2021] Intrinsic Certified Robustness of Bagging against Data Poisoning Attacks.
- [AAAI 2021] Sequential Attacks on Kalman Filter-based Forward Collision Warning Systems.
- [AAAI 2021] Composite Adversarial Attacks.
- [AAAI 2021] Exacerbating Algorithmic Bias through Fairness Attacks.
- [AAAI 2021] Uncertainty-Matching Graph Neural Networks to Defend Against Poisoning Attacks.
- [AAAI 2021] PID-Based Approach to Adversarial Attacks.
- [AAAI 2021] Towards Feature Space Adversarial Attack by Style Perturbation.
- [AAAI 2021] DeHiB: Deep Hidden Backdoor Attack on Semi-supervised Learning via Adversarial Perturbation.
- [AAAI 2021] Characterizing the Evasion Attackability of Multi-label Classifiers.
- [AAAI 2021] Are Adversarial Examples Created Equal? A Learnable Weighted Minimax Risk for Robustness under Non-uniform Attacks.
- [AAAI 2021] Exploring the Vulnerability of Deep Neural Networks: A Study of Parameter Corruption.
- [AAAI 2021] Improving Robustness to Model Inversion Attacks via Mutual Information Regularization.
- [AAAI 2021] Generating Natural Language Attacks in a Hard Label Black Box Setting.
- [AAAI 2021] Adversarial Training with Fast Gradient Projection Method against Synonym Substitution Based Text Attacks.
- [AAAI 2021] Enabling Fast and Universal Audio Adversarial Attack Using Generative Model.
- [AAAI 2021] EvaLDA: Efficient Evasion Attacks Towards Latent Dirichlet Allocation.
- [AAAI 2021] A Novel AI-based Methodology for Identifying Cyber Attacks in Honey Pots.
- [AAAI 2021] Using Online Planning and Acting to Recover from Cyberattacks on Software-defined Networks.
- [AAAI 2021] A Context Aware Approach for Generating Natural Language Attacks.
- [AAAI 2021] DeepRobust: a Platform for Adversarial Attacks and Defenses.
- [AAAI 2021] SkeletonVis: Interactive Visualization for Understanding Adversarial Attacks on Human Action Recognition Models.
- [AAAI 2022] Context-Aware Transfer Attacks for Object Detection.
- [AAAI 2022] Attacking Video Recognition Models with Bullet-Screen Comments.
- [AAAI 2022] Backdoor Attacks on the DNN Interpretation System.
- [AAAI 2022] Learning to Learn Transferable Attack.
- [AAAI 2022] Adversarial Attack for Asynchronous Event-Based Data.
- [AAAI 2022] A Fusion-Denoising Attack on InstaHide with Data Augmentation.
- [AAAI 2022] Adversarial Bone Length Attack on Action Recognition.
- [AAAI 2022] FCA: Learning a 3D Full-Coverage Vehicle Camouflage for Multi-View Physical Adversarial Attack.
- [AAAI 2022] Towards Transferable Adversarial Attacks on Vision Transformers.
- [AAAI 2022] TextHoaxer: Budgeted Hard-Label Adversarial Attacks on Text.
- [AAAI 2022] Blindfolded Attackers Still Threatening: Strict Black-Box Adversarial Attacks on Graphs.
- [AAAI 2022] Robust Heterogeneous Graph Neural Networks against Adversarial Attacks.
- [AAAI 2022] Sparse-RS: A Versatile Framework for Query-Efficient Sparse Black-Box Adversarial Attacks.
- [AAAI 2022] Improved Gradient-Based Adversarial Attacks for Quantized Networks.
- [AAAI 2022] Hard to Forget: Poisoning Attacks on Certified Machine Unlearning.
- [AAAI 2022] Preemptive Image Robustification for Protecting Users against Man-in-the-Middle Adversarial Attacks.
- [AAAI 2022] Saving Stochastic Bandits from Poisoning Attacks via Limited Data Verification.
- [AAAI 2022] Shape Prior Guided Attack: Sparser Perturbations on 3D Point Clouds.
- [AAAI 2022] CLPA: Clean-Label Poisoning Availability Attacks Using Generative Adversarial Nets.
- [AAAI 2022] Practical Fixed-Parameter Algorithms for Defending Active Directory Style Attack Graphs.
- [AAAI 2022] When Can the Defender Effectively Deceive Attackers in Security Games?
- [AAAI 2022] Certified Robustness of Nearest Neighbors against Data Poisoning and Backdoor Attacks.
- [AAAI 2022] Hibernated Backdoor: A Mutual Information Empowered Backdoor Attack to Deep Neural Networks.
- [AAAI 2022] Synthetic Disinformation Attacks on Automated Fact Verification Systems.
- [AAAI 2022] Has CEO Gender Bias Really Been Fixed? Adversarial Attacking and Improving Gender Fairness in Image Search.
- [AAAI 2022] Deep Learning Based Side Channel Attacks on Lightweight Cryptography (Student Abstract).
- [AAAI 2022] FedCC: Federated Learning with Consensus Confirmation for Byzantine Attack Resistance (Student Abstract).
- [AAAI 2022] Using Random Perturbations to Mitigate Adversarial Attacks on NLP Models.
- [AAAI 2023] Imperceptible Adversarial Attack via Invertible Neural Networks.
- [AAAI 2023] Defending Backdoor Attacks on Vision Transformer via Patch Processing.
- [AAAI 2023] Multispectral Invisible Coating: Laminated Visible-Thermal Physical Attack against Multispectral Object Detectors Using Transparent Low-E Films.
- [AAAI 2023] CDTA: A Cross-Domain Transfer-Based Attack with Contrastive Learning.
- [AAAI 2023] Deep Manifold Attack on Point Clouds via Parameter Plane Stretching.
- [AAAI 2023] Global-Local Characteristic Excited Cross-Modal Attacks from Images to Videos.
- [AAAI 2023] Exploring Non-target Knowledge for Improving Ensemble Universal Adversarial Attacks.
- [AAAI 2023] Pseudo Label-Guided Model Inversion Attack via Conditional Generative Adversarial Network.
- [AAAI 2023] Attack Can Benefit: An Adversarial Approach to Recognizing Facial Expressions under Noisy Annotations.
- [AAAI 2023] Let Graph Be the Go Board: Gradient-Free Node Injection Attack for Graph Neural Networks via Reinforcement Learning.
- [AAAI 2023] Untargeted Attack against Federated Recommendation Systems via Poisonous Item Embeddings and the Defense.
- [AAAI 2023] Practical Cross-System Shilling Attacks with Limited Access to Data.
- [AAAI 2023] Defending against Backdoor Attacks in Natural Language Generation.
- [AAAI 2023] Scalable Edge Blocking Algorithms for Defending Active Directory Style Attack Graphs.
- [AAAI 2023] Towards Efficient and Domain-Agnostic Evasion Attack with High-Dimensional Categorical Inputs.
- [AAAI 2023] Black-Box Adversarial Attack on Time Series Classification.
- [AAAI 2023] Local-Global Defense against Unsupervised Adversarial Attacks on Graphs.
- [AAAI 2023] Reliable Robustness Evaluation via Automatically Constructed Attack Ensembles.
- [AAAI 2023] Enhancing the Antidote: Improved Pointwise Certifications against Poisoning Attacks.
- [AAAI 2023] Poisoning with Cerberus: Stealthy and Colluded Backdoor Attack against Federated Learning.
- [AAAI 2023] Behavioral Learning in Security Games: Threat of Multi-Step Manipulative Attacks.
- [AAAI 2023] Training Meta-Surrogate Model for Transferable Adversarial Attack.
- [AAAI 2023] Training-Time Attacks against K-nearest Neighbors.
- [AAAI 2023] Reward Poisoning Attacks on Offline Multi-Agent Reinforcement Learning.
- [AAAI 2023] DeFL: Defending against Model Poisoning Attacks in Federated Learning via Critical Learning Periods Awareness.
- [AAAI 2023] Purifier: Defending Data Inference Attacks via Transforming Confidence Scores.
- [AAAI 2023] Robust Multi-Agent Coordination via Evolutionary Generation of Auxiliary Adversarial Attackers.
- [AAAI 2023] On the Vulnerability of Backdoor Defenses for Federated Learning.
- [AAAI 2023] XRand: Differentially Private Defense against Explanation-Guided Attacks.
- [AAAI 2023] Privacy Attacks on Schedule-Driven Data.
- [AAAI 2023] SSPAttack: A Simple and Sweet Paradigm for Black-Box Hard-Label Textual Adversarial Attack.
- [AAAI 2023] Reducing Sentiment Bias in Pre-trained Sentiment Classification via Adaptive Gumbel Attack.
- [AAAI 2023] GAN-Based Domain Inference Attack.
- [AAAI 2023] Similarity Distribution Based Membership Inference Attack on Person Re-identification.
- [AAAI 2023] Redactor: A Data-Centric and Individualized Defense against Inference Attacks.
- [AAAI 2023] CodeAttack: Code-Based Adversarial Attacks for Pre-trained Programming Language Models.
- [AAAI 2023] Defending from Physically-Realizable Adversarial Attacks through Internal Over-Activation Analysis.
- [AAAI 2023] Task and Model Agnostic Adversarial Attack on Graph Neural Networks.
- [AAAI 2023] Revisiting Item Promotion in GNN-Based Collaborative Filtering: A Masked Targeted Topological Attack Perspective.
- [AAAI 2023] Poisoning-Based Backdoor Attacks in Computer Vision.
- [AAAI 2023] Reconsidering Deception in Social Robotics: The Role of Human Vulnerability (Student Abstract).
- [AAAI 2023] Summarization Attack via Paraphrasing (Student Abstract).
- [AAAI 2023] MGIA: Mutual Gradient Inversion Attack in Multi-Modal Federated Learning (Student Abstract).
- [AAAI 2023] Fraud’s Bargain Attacks to Textual Classifiers via Metropolis-Hasting Sampling (Student Abstract).
- [AAAI 2023] Improving Adversarial Robustness to Sensitivity and Invariance Attacks with Deep Metric Learning (Student Abstract).
- [AAAI 2023] Measuring the Privacy Leakage via Graph Reconstruction Attacks on Simplicial Neural Networks (Student Abstract).
- [AAAI 2024] Inspecting Prediction Confidence for Detecting Black-Box Backdoor Attacks.
- [AAAI 2024] Adversarial Attacks on Federated-Learned Adaptive Bitrate Algorithms.
- [AAAI 2024] Comparing the Robustness of Modern No-Reference Image- and Video-Quality Metrics to Adversarial Attacks.
- [AAAI 2024] Attack Deterministic Conditional Image Generative Models for Diverse and Controllable Generation.
- [AAAI 2024] Transferable Adversarial Attacks for Object Detection Using Object-Aware Significant Feature Distortion.
- [AAAI 2024] Attacking Transformers with Feature Diversity Adversarial Perturbation.
- [AAAI 2024] COMBAT: Alternated Training for Effective Clean-Label Backdoor Attacks.
- [AAAI 2024] Towards Robust Image Stitching: An Adaptive Resistance Learning against Compatible Attacks.
- [AAAI 2024] Temporal-Distributed Backdoor Attack against Video Based Action Recognition.
- [AAAI 2024] Explicitly Perceiving and Preserving the Local Geometric Structures for 3D Point Cloud Attack.
- [AAAI 2024] Adv-Diffusion: Imperceptible Adversarial Face Identity Attack via Latent Diffusion Model.
- [AAAI 2024] DifAttack: Query-Efficient Black-Box Adversarial Attack via Disentangled Feature Space.
- [AAAI 2024] Adversarial Attacks on the Interpretation of Neuron Activation Maximization.
- [AAAI 2024] Manifold Constraints for Imperceptible Adversarial Attacks on Point Clouds.
- [AAAI 2024] Multi-Domain Incremental Learning for Face Presentation Attack Detection.
- [AAAI 2024] AGS: Affordable and Generalizable Substitute Training for Transferable Adversarial Attack.
- [AAAI 2024] Towards Transferable Adversarial Attacks with Centralized Perturbation.
- [AAAI 2024] Revisiting Gradient Pruning: A Dual Realization for Defending against Gradient Attacks.
- [AAAI 2024] FACL-Attack: Frequency-Aware Contrastive Learning for Transferable Adversarial Attacks.
- [AAAI 2024] Mutual-Modality Adversarial Attack with Semantic Perturbation.
- [AAAI 2024] VQAttack: Transferable Adversarial Attacks on Visual Question Answering via Pre-trained Models.
- [AAAI 2024] Step Vulnerability Guided Mean Fluctuation Adversarial Attack against Conditional Diffusion Models.
- [AAAI 2024] Attacks on Continual Semantic Segmentation by Perturbing Incremental Samples.
- [AAAI 2024] Data-Free Hard-Label Robustness Stealing Attack.
- [AAAI 2024] Curvature-Invariant Adversarial Attacks for 3D Point Clouds.
- [AAAI 2024] IPRemover: A Generative Model Inversion Attack against Deep Neural Network Fingerprinting and Watermarking.
- [AAAI 2024] Redefining ABA+ Semantics via Abstract Set-to-Set Attacks.
- [AAAI 2024] Task-Agnostic Privacy-Preserving Representation Learning for Federated Learning against Attribute Inference Attacks.
- [AAAI 2024] Where and How to Attack? A Causality-Inspired Recipe for Generating Counterfactual Adversarial Examples.
- [AAAI 2024] BadRL: Sparse Targeted Backdoor Attack against Reinforcement Learning.
- [AAAI 2024] Friendly Attacks to Improve Channel Coding Reliability.
- [AAAI 2024] Spear and Shield: Adversarial Attacks and Defense Methods for Model-Based Link Prediction on Continuous-Time Dynamic Graphs.
- [AAAI 2024] Value at Adversarial Risk: A Graph Defense Strategy against Cost-Aware Attacks.
- [AAAI 2024] Towards Inductive Robustness: Distilling and Fostering Wave-Induced Resonance in Transductive GCNs against Graph Adversarial Attacks.
- [AAAI 2024] Backdoor Attacks via Machine Unlearning.
- [AAAI 2024] On the Convergence of an Adaptive Momentum Method for Adversarial Attacks.
- [AAAI 2024] Optimal Attack and Defense for Reinforcement Learning.
- [AAAI 2024] Resisting Backdoor Attacks in Federated Learning via Bidirectional Elections and Individual Perspective.
- [AAAI 2024] Stealthy Adversarial Attacks on Stochastic Multi-Armed Bandits.
- [AAAI 2024] Chronic Poisoning: Backdoor Attack against Split Learning.
- [AAAI 2024] Robust Nonparametric Regression under Poisoning Attack.
- [AAAI 2024] On the Robustness of Neural-Enhanced Video Streaming against Adversarial Attacks.
- [AAAI 2024] MathAttack: Attacking Large Language Models towards Math Solving Ability.
- [AAAI 2024] LimeAttack: Local Explainable Method for Textual Hard-Label Adversarial Attack.
- [AAAI 2024] Conditional Backdoor Attack via JPEG Compression.
- [AAAI 2024] Does Few-Shot Learning Suffer from Backdoor Attacks?
- [AAAI 2024] Towards Model Extraction Attacks in GAN-Based Image Translation via Domain Shift Mitigation.
- [AAAI 2024] SAME: Sample Reconstruction against Model Extraction Attacks.
- [AAAI 2024] Invisible Backdoor Attack against 3D Point Cloud Classifier in Graph Spectral Domain.
- [AAAI 2024] Provable Robustness against a Union of L_0 Adversarial Attacks.
- [AAAI 2024] Personalization as a Shortcut for Few-Shot Backdoor Attack against Text-to-Image Diffusion Models.
- [AAAI 2024] Stronger and Transferable Node Injection Attacks.
- [AAAI 2024] NeRFail: Neural Radiance Fields-Based Multiview Adversarial Attack.
- [AAAI 2024] Layer Attack Unlearning: Fast and Accurate Machine Unlearning via Layer Level Attack and Knowledge Distillation.
- [AAAI 2024] Beyond Traditional Threats: A Persistent Backdoor Attack on Federated Learning.
- [AAAI 2024] DataElixir: Purifying Poisoned Dataset to Mitigate Backdoor Attacks via Diffusion Models.
- [AAAI 2024] Closing the Gap: Achieving Better Accuracy-Robustness Tradeoffs against Query-Based Attacks.
- [AAAI 2024] BadSAM: Exploring Security Vulnerabilities of SAM via Backdoor Attacks (Student Abstract).
- [AAAI 2024] Attacking CNNs in Histopathology with SNAP: Sporadic and Naturalistic Adversarial Patches (Student Abstract).
- [AAAI 2024] A SAT Solver and Computer Algebra Attack on the Minimum Kochen-Specker Problem (Student Abstract).
- [AAAI 2024] Confidence Is All You Need for MI Attacks (Student Abstract).
- [AAAI 2025] CLEP: A Novel Contrastive Learning Method for Evolutionary Reentrancy Vulnerability Detection.
- [AAAI 2025] Hypergraph Attacks via Injecting Homogeneous Nodes into Elite Hyperedges.
- [AAAI 2025] DF-MIA: A Distribution-Free Membership Inference Attack on Fine-Tuned Large Language Models.
- [AAAI 2025] IWRN: A Robust Blind Watermarking Method for Artwork Image Copyright Protection Against Noise Attack.
- [AAAI 2025] Recoverable Facial Identity Protection via Adaptive Makeup Transfer Adversarial Attacks.
- [AAAI 2025] NumbOD: A Spatial-Frequency Fusion Attack Against Object Detectors.
- [AAAI 2025] Mixture-of-Attack-Experts with Class Regularization for Unified Physical-Digital Face Attack Detection.
- [AAAI 2025] AttackBench: Evaluating Gradient-based Attacks for Adversarial Examples.
- [AAAI 2025] PROSAC: Provably Safe Certification for Machine Learning Models under Adversarial Attacks.
- [AAAI 2025] HUANG: A Robust Diffusion Model-based Targeted Adversarial Attack Against Deep Hashing Retrieval.
- [AAAI 2025] Medical MLLM Is Vulnerable: Cross-Modality Jailbreak and Mismatched Attacks on Medical Multimodal Large Language Models.
- [AAAI 2025] A²RNet: Adversarial Attack Resilient Network for Robust Infrared and Visible Image Fusion.
- [AAAI 2025] AIM: Additional Image Guided Generation of Transferable Adversarial Attacks.
- [AAAI 2025] Transferable Adversarial Face Attack with Text Controlled Attribute.
- [AAAI 2025] Adversarial Attacks on Event-Based Pedestrian Detectors: A Physical Approach.
- [AAAI 2025] Privacy-Preserving Low-Rank Adaptation Against Membership Inference Attacks for Latent Diffusion Models.
- [AAAI 2025] Autonomous LLM-Enhanced Adversarial Attack for Text-to-Motion.
- [AAAI 2025] Medical Multimodal Model Stealing Attacks via Adversarial Domain Alignment.
- [AAAI 2025] Pixel Is Not a Barrier: An Effective Evasion Attack for Pixel-Domain Diffusion Models.
- [AAAI 2025] First Line of Defense: A Robust First Layer Mitigates Adversarial Attacks.
- [AAAI 2025] ADBA: Approximation Decision Boundary Approach for Black-Box Adversarial Attacks.
- [AAAI 2025] Meme Trojan: Backdoor Attacks Against Hateful Meme Detection via Cross-Modal Triggers.
- [AAAI 2025] HoneypotNet: Backdoor Attacks Against Model Extraction.
- [AAAI 2025] Attention-Imperceptible Backdoor Attacks on Vision Transformers.
- [AAAI 2025] Power of Diversity: Enhancing Data-Free Black-Box Attack with Domain-Augmented Learning.
- [AAAI 2025] Cross-Modal Stealth: A Coarse-to-Fine Attack Framework for RGB-T Tracker.
- [AAAI 2025] Data-Free Universal Attack by Exploiting the Intrinsic Vulnerability of Deep Models.
- [AAAI 2025] Adversarial-Inspired Backdoor Defense via Bridging Backdoor and Adversarial Attacks.
- [AAAI 2025] Backdoor Attacks Against No-Reference Image Quality Assessment Models via a Scalable Trigger.
- [AAAI 2025] Everywhere Attack: Attacking Locally and Globally to Boost Targeted Transferability.
- [AAAI 2025] PhyCamo: A Robust Physical Camouflage via Contrastive Learning for Multi-View Physical Adversarial Attack.
- [AAAI 2025] RP-PGD: Boosting Segmentation Robustness with a Region-and-Prototype Based Adversarial Attack.
- [AAAI 2025] Mesh Watermark Removal Attack and Mitigation: A Novel Perspective of Function Space.
- [AAAI 2025] Attack-in-the-Chain: Bootstrapping Large Language Models for Attacks Against Black-Box Neural Ranking Models.
- [AAAI 2025] Trust-GRS: A Trustworthy Training Framework for Graph Neural Network Based Recommender Systems Against Shilling Attacks.
- [AAAI 2025] Adversarial Contrastive Graph Masked AutoEncoder Against Graph Structure and Feature Dual Attacks.
- [AAAI 2025] Sim4Rec: Data-Free Model Extraction Attack on Sequential Recommendation.
- [AAAI 2025] Prompt-based Unifying Inference Attack on Graph Neural Networks.
- [AAAI 2025] Highly Imperceptible Black-Box Graph Injection Attacks with Reinforcement Learning.
- [AAAI 2025] Quickest Detection of Adversarial Attacks Against Correlated Equilibria.
- [AAAI 2025] MTVHunter: Smart Contracts Vulnerability Detection Based on Multi-Teacher Knowledge Translation.
- [AAAI 2025] On the Robustness of Distributed Machine Learning Against Transfer Attacks.
- [AAAI 2025] RAT: Adversarial Attacks on Deep Reinforcement Agents for Targeted Behaviors.
- [AAAI 2025] Differentiable Adversarial Attacks for Marked Temporal Point Processes.
- [AAAI 2025] Attack-inspired Calibration Loss for Calibrating Crack Recognition.
- [AAAI 2025] Unveiling the Threat of Fraud Gangs to Graph Neural Networks: Multi-Target Graph Injection Attacks Against GNN-Based Fraud Detectors.
- [AAAI 2025] Attribute Inference Attacks for Federated Regression Tasks.
- [AAAI 2025] SADBA: Self-Adaptive Distributed Backdoor Attack Against Federated Learning.
- [AAAI 2025] A New Federated Learning Framework Against Gradient Inversion Attacks.
- [AAAI 2025] CAMH: Advancing Model Hijacking Attack in Machine Learning.
- [AAAI 2025] COMMIT: Certifying Robustness of Multi-Sensor Fusion Systems Against Semantic Attacks.
- [AAAI 2025] Backdoor Attack on Propagation-based Rumor Detectors.
- [AAAI 2025] Crossfire: An Elastic Defense Framework for Graph Neural Networks Under Bit Flip Attacks.
- [AAAI 2025] AIA: Autoregression-Based Injection Attacks Against Text2SQL Models.
- [AAAI 2025] A Sample-Level Evaluation and Generative Framework for Model Inversion Attacks.
- [AAAI 2025] Grimm: A Plug-and-Play Perturbation Rectifier for Graph Neural Networks Defending Against Poisoning Attacks.
- [AAAI 2025] VVRec: Reconstruction Attacks on DL-based Volumetric Video Upstreaming via Latent Diffusion Model with Gamma Distribution.
- [AAAI 2025] Query-efficient Attack for Black-box Image Inpainting Forensics via Reinforcement Learning.
- [AAAI 2025] Attack on Prompt: Backdoor Attack in Prompt-Based Continual Learning.
- [AAAI 2025] Label-Free Backdoor Attacks in Vertical Federated Learning.
- [AAAI 2025] Stop Diverse OOD Attacks: Knowledge Ensemble for Reliable Defense.
- [AAAI 2025] Imperceptible 3D Point Cloud Attacks on Lattice-based Barycentric Coordinates.
- [AAAI 2025] Influence-Based Fair Selection for Sample-Discriminative Backdoor Attack.
- [AAAI 2025] Clean-Label Graph Backdoor Attack in the Node Classification Task.
- [AAAI 2025] Speed Master: Quick or Slow Play to Attack Speaker Recognition.
- [AAAI 2025] AAKR: Adversarial Attack-based Knowledge Retention for Continual Semantic Segmentation.
- [AAAI 2025] Personalized Label Inference Attack in Federated Transfer Learning via Contrastive Meta Learning.
- [AAAI 2025] Against All Odds: Overcoming Typology, Script, and Language Confusion in Multilingual Embedding Inversion Attacks.
- [AAAI 2025] Security Attacks on LLM-based Code Completion Tools.
- [AAAI 2025] CLNX: Bridging Code and Natural Language for C/C++ Vulnerability-Contributing Commits Identification.
- [AAAI 2025] Defending Against Sophisticated Poisoning Attacks with RL-based Aggregation in Federated Learning.
- [AAAI 2025] Watch Out for Your Guidance on Generation! Exploring Conditional Backdoor Attacks against Large Language Models.
- [AAAI 2025] Practicable Black-Box Evasion Attacks on Link Prediction in Dynamic Graphs - a Graph Sequential Embedding Method.
- [AAAI 2025] CL-Attack: Textual Backdoor Attacks via Cross-Lingual Triggers.
- [AAAI 2025] ChatBug: A Common Vulnerability of Aligned LLMs Induced by Chat Templates.
- [AAAI 2025] Is Your Autonomous Vehicle Safe? Understanding the Threat of Electromagnetic Signal Injection Attacks on Traffic Scene Perception.
- [AAAI 2025] Reinforcement Learning Platform for Adversarial Black-box Attacks with Custom Distortion Filters.
- [AAAI 2025] MMJ-Bench: A Comprehensive Study on Jailbreak Attacks and Defenses for Vision Language Models.
- [AAAI 2025] IBAS: Imperceptible Backdoor Attacks in Split Learning with Limited Information.
- [AAAI 2025] J&H: Evaluating the Robustness of Large Language Models Under Knowledge-Injection Attacks in Legal Domain.
- [AAAI 2025] CVE-LLM: Ontology-Assisted Automatic Vulnerability Evaluation Using Large Language Models.
- [AAAI 2025] Assessing Vulnerabilities in State-of-the-Art Large Language Models Through Hex Injection (Student Abstract).
- [NIPS 2020] A Game Theoretic Analysis of Additive Adversarial Attacks and Defenses.
- [NIPS 2020] On Adaptive Attacks to Adversarial Example Defenses.
- [NIPS 2020] Input-Aware Dynamic Backdoor Attack.
- [NIPS 2020] Dual Manifold Adversarial Robustness: Defense against Lp and non-Lp Adversarial Attacks.
- [NIPS 2020] Diversity can be Transferred: Output Diversification for White- and Black-box Attacks.
- [NIPS 2020] Towards More Practical Adversarial Attacks on Graph Neural Networks.
- [NIPS 2020] DVERGE: Diversifying Vulnerabilities for Enhanced Robust Generation of Ensembles.
- [NIPS 2020] (De)Randomized Smoothing for Certifiable Defense against Patch Attacks.
- [NIPS 2020] Certified Robustness of Graph Convolution Networks for Graph Classification under Topological Attacks.
- [NIPS 2020] GNNGuard: Defending Graph Neural Networks against Adversarial Attacks.
- [NIPS 2020] GreedyFool: Distortion-Aware Sparse Adversarial Attack.
- [NIPS 2020] Learning Black-Box Attackers with Transferable Priors and Query Feedback.
- [NIPS 2020] Practical No-box Adversarial Attacks against DNNs.
- [NIPS 2020] Adversarial Attacks on Linear Contextual Bandits.
- [NIPS 2020] Election Coding for Distributed Learning: Protecting SignSGD against Byzantine Attacks.
- [NIPS 2020] Robustness of Bayesian Neural Networks to Gradient-Based Attacks.
- [NIPS 2020] AdvFlow: Inconspicuous Black-box Adversarial Attacks using Normalizing Flows.
- [NIPS 2020] Attack of the Tails: Yes, You Really Can Backdoor Federated Learning.
- [NIPS 2020] An Efficient Adversarial Attack for Tree Ensembles.
- [NIPS 2020] Guided Adversarial Attack for Evaluating and Enhancing Adversarial Defenses.
- [NIPS 2020] Perturbing Across the Feature Hierarchy to Improve Standard and Strict Blackbox Attack Transferability.
- [NIPS 2020] Adversarial Attacks on Deep Graph Matching.
- [NIPS 2021] Adversarial Attacks on Black Box Video Classifiers: Leveraging the Power of Geometric Transformations.
- [NIPS 2021] Accumulative Poisoning Attacks on Real-time Data.
- [NIPS 2021] On Success and Simplicity: A Second Look at Transferable Targeted Attacks.
- [NIPS 2021] Adversarial Attacks on Graph Classifiers via Bayesian Optimisation.
- [NIPS 2021] Evaluating Gradient Inversion Attacks and Defenses in Federated Learning.
- [NIPS 2021] Random Noise Defense Against Query-Based Black-Box Attacks.
- [NIPS 2021] Variational Model Inversion Attacks.
- [NIPS 2021] A Little Robustness Goes a Long Way: Leveraging Robust Features for Targeted Transfer Attacks.
- [NIPS 2021] A Separation Result Between Data-oblivious and Data-aware Poisoning Attacks.
- [NIPS 2021] Provably Efficient Black-Box Action Poisoning Attacks Against Reinforcement Learning.
- [NIPS 2021] FL-WBC: Enhancing Robustness against Model Poisoning Attacks in Federated Learning from a Client Perspective.
- [NIPS 2021] Stable Neural ODE with Lyapunov-Stable Equilibrium Points for Defending Against Adversarial Attacks.
- [NIPS 2021] Adversarial Attack Generation Empowered by Min-Max Optimization.
- [NIPS 2021] Manipulating SGD with Data Ordering Attacks.
- [NIPS 2021] Backdoor Attack with Imperceptible Input and Latent Modification.
- [NIPS 2021] Finding Optimal Tangent Points for Reducing Distortions of Hard-label Attacks.
- [NIPS 2021] Fast Minimum-norm Adversarial Attacks through Adaptive Norm Constraints.
- [NIPS 2021] Observation-Free Attacks on Stochastic Bandits.
- [NIPS 2021] Morié Attack (MA): A New Potential Risk of Screen Photos.
- [NIPS 2021] Automated Discovery of Adaptive Attacks on Adversarial Defenses.
- [NIPS 2021] Meta-Learning the Search Distribution of Black-Box Random Search Based Adversarial Attacks.
- [NIPS 2022] Perceptual Attacks of No-Reference Image Quality Models with Human-in-the-Loop.
- [NIPS 2022] Blackbox Attacks via Surrogate Ensemble Search.
- [NIPS 2022] Defending Against Adversarial Attacks via Neural Dynamic System.
- [NIPS 2022] Natural Color Fool: Towards Boosting Black-box Unrestricted Attacks.
- [NIPS 2022] Formulating Robustness Against Unforeseen Attacks.
- [NIPS 2022] Alleviating Adversarial Attacks on Variational Autoencoders with MCMC.
- [NIPS 2022] Friendly Noise against Adversarial Noise: A Powerful Defense against Data Poisoning Attack.
- [NIPS 2022] Decision-based Black-box Attack Against Vision Transformers via Patch-wise Adversarial Removal.
- [NIPS 2022] Adversarial Attack on Attackers: Post-Process to Mitigate Black-Box Score-Based Query Attacks.
- [NIPS 2022] Practical Adversarial Attacks on Spatiotemporal Traffic Forecasting Models.
- [NIPS 2022] Towards Lightweight Black-Box Attack Against Deep Neural Networks.
- [NIPS 2022] On the Robustness of Deep Clustering Models: Adversarial Attacks and Defenses.
- [NIPS 2022] Efficient Adversarial Training without Attacking: Worst-Case-Aware Robust Reinforcement Learning.
- [NIPS 2022] A2: Efficient Automated Attacker for Boosting Adversarial Training.
- [NIPS 2022] Indicators of Attack Failure: Debugging and Improving Optimization of Adversarial Examples.
- [NIPS 2022] Adversarial Training with Complementary Labels: On the Benefit of Gradually Informative Attacks.
- [NIPS 2022] MORA: Improving Ensemble Robustness Evaluation with Model Reweighing Attack.
- [NIPS 2022] Towards Reasonable Budget Allocation in Untargeted Graph Structure Attacks via Gradient Debias.
- [NIPS 2022] Boosting the Transferability of Adversarial Attacks with Reverse Adversarial Perturbation.
- [NIPS 2022] Revisiting Injective Attacks on Recommender Systems.
- [NIPS 2022] VoiceBlock: Privacy through Real-Time Adversarial Attacks with Audio-to-Audio Models.
- [NIPS 2022] Randomized Channel Shuffling: Minimal-Overhead Backdoor Attack Detection without Clean Datasets.
- [NIPS 2022] Adv-Attribute: Inconspicuous and Transferable Adversarial Attack on Face Recognition.
- [NIPS 2022] SALSA: Attacking Lattice Cryptography with Transformers.
- [NIPS 2022] Learning to Attack Federated Learning: A Model-based Reinforcement Learning Attack Framework.
- [NIPS 2022] Trap and Replace: Defending Backdoor Attacks by Trapping Them into an Easy-to-Replace Subnetwork.
- [NIPS 2022] GAMA: Generative Adversarial Multi-Object Scene Attacks.
- [NIPS 2022] BadPrompt: Backdoor Attacks on Continuous Prompts.
- [NIPS 2022] Marksman Backdoor: Backdoor Attacks with Arbitrary Target Class.
- [NIPS 2023] Scalable Membership Inference Attacks via Quantile Regression.
- [NIPS 2023] Batchnorm Allows Unsupervised Radial Attacks.
- [NIPS 2023] RECESS Vaccine for Federated Learning: Proactive Defense Against Model Poisoning Attacks.
- [NIPS 2023] Robust Contrastive Language-Image Pretraining against Data Poisoning and Backdoor Attacks.
- [NIPS 2023] A Theory of Transfer-Based Black-Box Attacks: Explanation and Implications.
- [NIPS 2023] Attacks on Online Learners: a Teacher-Student Analysis.
- [NIPS 2023] Efficient Adversarial Attacks on Online Multi-agent Reinforcement Learning.
- [NIPS 2023] Defending Pre-trained Language Models as Few-shot Learners against Backdoor Attacks.
- [NIPS 2023] VillanDiffusion: A Unified Backdoor Attack Framework for Diffusion Models.
- [NIPS 2023] What Distributions are Robust to Indiscriminate Poisoning Attacks for Linear Learners?
- [NIPS 2023] Adversarial Attacks on Online Learning to Rank with Click Feedback.
- [NIPS 2023] Towards Evaluating Transfer-based Attacks Systematically, Practically, and Fairly.
- [NIPS 2023] BadTrack: A Poison-Only Backdoor Attack on Visual Object Tracking.
- [NIPS 2023] Hidden Poison: Machine Unlearning Enables Camouflaged Poisoning Attacks.
- [NIPS 2023] QuadAttacK: A Quadratic Programming Approach to Learning Ordered Top-K Adversarial Attacks.
- [NIPS 2023] Punctuation-level Attack: Single-shot and Single Punctuation Can Fool Text Models.
- [NIPS 2023] Characterizing the Optimal 0-1 Loss for Multi-class Classification with a Test-time Attacker.
- [NIPS 2023] HQA-Attack: Toward High Quality Black-Box Hard-Label Adversarial Attack on Text.
- [NIPS 2023] Vulnerabilities in Video Quality Assessment Models: The Challenge of Adversarial Attacks.
- [NIPS 2023] Content-based Unrestricted Adversarial Attack.
- [NIPS 2023] VLATTACK: Multimodal Adversarial Attacks on Vision-Language Tasks via Pre-trained Models.
- [NIPS 2023] FedGame: A Game-Theoretic Defense against Backdoor Attacks in Federated Learning.
- [NIPS 2023] SALSA VERDE: a machine learning attack on LWE with sparse small secrets.
- [NIPS 2023] GAN You See Me? Enhanced Data Reconstruction Attacks against Split Inference.
- [NIPS 2023] Effective Targeted Attacks for Adversarial Self-Supervised Learning.
- [NIPS 2023] Blurred-Dilated Method for Adversarial Attacks.
- [NIPS 2023] A3FL: Adversarially Adaptive Backdoor Attacks to Federated Learning.
- [NIPS 2023] TrojLLM: A Black-box Trojan Prompt Attack on Large Language Models.
- [NIPS 2023] IBA: Towards Irreversible Backdoor Attacks in Federated Learning.
- [NIPS 2023] Label-Only Model Inversion Attacks via Knowledge Transfer.
- [NIPS 2023] Training on Foveated Images Improves Robustness to Adversarial Attacks.
- [NIPS 2023] Marich: A Query-efficient Distributionally Equivalent Model Extraction Attack.
- [NIPS 2023] DiffAttack: Evasion Attacks Against Diffusion-Based Adversarial Purification.
- [NIPS 2023] Static and Sequential Malicious Attacks in the Context of Selective Forgetting.
- [NIPS 2024] Efficient Adversarial Training in LLMs with Continuous Attacks.
- [NIPS 2024] BackdoorAlign: Mitigating Fine-tuning based Jailbreak Attack with Backdoor Enhanced Safety Alignment.
- [NIPS 2024] Revisiting Adversarial Patches for Designing Camera-Agnostic Attacks against Person Detection.
- [NIPS 2024] Data Mixture Inference Attack: BPE Tokenizers Reveal Training Data Compositions.
- [NIPS 2024] Soft Prompt Threats: Attacking Safety Alignment and Unlearning in Open-Source LLMs through the Embedding Space.
- [NIPS 2024] PrivAuditor: Benchmarking Data Protection Vulnerabilities in LLM Adaptation Techniques.
- [NIPS 2024] Boosting the Transferability of Adversarial Attack on Vision Transformer with Adaptive Token Tuning.
- [NIPS 2024] Cross-Modality Perturbation Synergy Attack for Person Re-identification.
- [NIPS 2024] Data Free Backdoor Attacks.
- [NIPS 2024] Faster Repeated Evasion Attacks in Tree Ensembles.
- [NIPS 2024] Constrained Adaptive Attack: Effective Adversarial Attack Against Deep Neural Networks for Tabular Data.
- [NIPS 2024] Bag of Tricks: Benchmarking of Jailbreak Attacks on LLMs.
- [NIPS 2024] Pseudo-Private Data Guided Model Inversion Attacks.
- [NIPS 2024] Attack-Resilient Image Watermarking Using Stable Diffusion.
- [NIPS 2024] Robust Prompt Optimization for Defending Language Models Against Jailbreaking Attacks.
- [NIPS 2024] Unveiling and Mitigating Backdoor Vulnerabilities based on Unlearning Weight Changes and Backdoor Activeness.
- [NIPS 2024] WaveAttack: Asymmetric Frequency Obfuscation-based Backdoor Attacks Against Deep Neural Networks.
- [NIPS 2024] MALT Powers Up Adversarial Attacks.
- [NIPS 2024] Intruding with Words: Towards Understanding Graph Injection Attacks at the Text Level.
- [NIPS 2024] Pandora’s Box: Towards Building Universal Attackers against Real-World Large Vision-Language Models.
- [NIPS 2024] AdvAD: Exploring Non-Parametric Diffusion for Imperceptible Adversarial Attacks.
- [NIPS 2024] Shadowcast: Stealthy Data Poisoning Attacks Against Vision-Language Models.
- [NIPS 2024] Tree of Attacks: Jailbreaking Black-Box LLMs Automatically.
- [NIPS 2024] OSLO: One-Shot Label-Only Membership Inference Attacks.
- [NIPS 2024] Beware of Road Markings: A New Adversarial Patch Attack to Monocular Depth Estimation.
- [NIPS 2024] Dual Defense: Enhancing Privacy and Mitigating Poisoning Attacks in Federated Learning.
- [NIPS 2024] Are Your Models Still Fair? Fairness Attacks on Graph Neural Networks via Node Injections.
- [NIPS 2024] Efficient Availability Attacks against Supervised and Contrastive Learning Simultaneously.
- [NIPS 2024] Vaccine: Perturbation-aware Alignment for Large Language Models against Harmful Fine-tuning Attack.
- [NIPS 2024] Mitigating Backdoor Attack by Injecting Proactive Defensive Backdoor.
- [NIPS 2024] Auditing Privacy Mechanisms via Label Inference Attacks.
- [NIPS 2024] AgentDojo: A Dynamic Environment to Evaluate Prompt Injection Attacks and Defenses for LLM Agents.
- [NIPS 2024] Amnesia as a Catalyst for Enhancing Black Box Pixel Attacks in Image Classification and Object Detection.
- [NIPS 2024] Transferable Adversarial Attacks on SAM and Its Downstream Models.
- [NIPS 2024] Trap-MID: Trapdoor-based Defense against Model Inversion Attacks.
- [NIPS 2024] On provable privacy vulnerabilities of graph representations.
- [NIPS 2024] SuperDeepFool: a new fast and accurate minimal adversarial attack.
- [NIPS 2024] Membership Inference Attacks against Large Vision-Language Models.
- [NIPS 2024] RFLPA: A Robust Federated Learning Framework against Poisoning Attacks with Secure Aggregation.
- [NIPS 2024] Lisa: Lazy Safety Alignment for Large Language Models against Harmful Fine-tuning Attack.
- [NIPS 2024] Reconstruction Attacks on Machine Unlearning: Simple Models are Vulnerable.
- [NIPS 2024] Ask, Attend, Attack: An Effective Decision-Based Black-Box Targeted Attack for Image-to-Text Models.
- [NIPS 2024] SleeperNets: Universal Backdoor Poisoning Attacks Against Reinforcement Learning Agents.
- [NIPS 2024] Breaking the False Sense of Security in Backdoor Defense through Re-Activation Attack.
- [NIPS 2024] Diffusion Policy Attacker: Crafting Adversarial Attacks for Diffusion-based Policies.
- [NIPS 2024] Suitable is the Best: Task-Oriented Knowledge Fusion in Vulnerability Detection.
- [NIPS 2024] Gradient Cuff: Detecting Jailbreak Attacks on Large Language Models by Exploring Refusal Loss Landscapes.
- [NIPS 2024] DeSparsify: Adversarial Attack Against Token Sparsification Mechanisms.
- [NIPS 2024] BackTime: Backdoor Attacks on Multivariate Time Series Forecasting.
- [NIPS 2024] Attack-Aware Noise Calibration for Differential Privacy.
- [NIPS 2024] Membership Inference Attacks against Fine-tuned Large Language Models via Self-prompt Calibration.
- [NIPS 2024] Feature-Level Adversarial Attacks and Ranking Disruption for Visible-Infrared Person Re-identification.
- [ACL 2012] Attacking Parsing Bottlenecks with Unlabeled Data and Relevant Factorizations.
- [ACL 2018] Attacking Visual Language Grounding with Adversarial Examples: A Case Study on Neural Image Captioning.
- [ACL 2020] Weight Poisoning Attacks on Pretrained Models.
- [ACL 2020] Word-level Textual Adversarial Attacking as Combinatorial Optimization.
- [ACL 2021] Hidden Killer: Invisible Textual Backdoor Attacks with Syntactic Trigger.
- [ACL 2021] A Sweet Rabbit Hole by DARCY: Using Honeypots to Detect Universal Trigger’s Adversarial Attacks.
- [ACL 2021] Turn the Combination Lock: Learnable Textual Backdoor Attacks via Word Substitution.
- [ACL 2021] Defense against Synonym Substitution-based Adversarial Attacks via Dirichlet Neighborhood Ensemble.
- [ACL 2021] Rethinking Stealthiness of Backdoor Attack against NLP Models.
- [ACL 2021] Using Adversarial Attacks to Reveal the Statistical Bias in Machine Reading Comprehension Models.
- [ACL 2021] An Empirical Study on Adversarial Attack on NMT: Languages and Positions Matter.
- [ACL 2022] Pass off Fish Eyes for Pearls: Attacking Model Selection of Pre-trained Models.
- [ACL 2022] Flooding-X: Improving BERT’s Resistance to Adversarial Attacks via Loss-Restricted Fine-Tuning.
- [ACL 2022] SHIELD: Defending Textual Neural Networks against Multiple Black-Box Adversarial Attacks with Stochastic Multi-Expert Patcher.
- [ACL 2022] “That Is a Suspicious Reaction!”: Interpreting Logits Variation to Detect NLP Adversarial Attacks.
- [ACL 2023] Text Adversarial Purification as Defense against Adversarial Attacks.
- [ACL 2023] White-Box Multi-Objective Adversarial Attack on Dialogue Generation.
- [ACL 2023] RMLM: A Flexible Defense Framework for Proactively Mitigating Word-level Adversarial Attacks.
- [ACL 2023] A Gradient Control Method for Backdoor Attacks on Parameter-Efficient Tuning.
- [ACL 2023] Multi-target Backdoor Attacks for Code Pre-trained Models.
- [ACL 2023] DIP: Dead code Insertion based Black-box Attack for Programming Language Model.
- [ACL 2023] How do humans perceive adversarial text? A reality check on the validity and naturalness of word-based adversarial attacks.
- [ACL 2023] NatLogAttack: A Framework for Attacking Natural Language Inference Models with Natural Logic.
- [ACL 2023] Improving the Detection of Multilingual Online Attacks with Rich Social Media Data from Singapore.
- [ACL 2023] BITE: Textual Backdoor Attacks with Iterative Trigger Injection.
- [ACL 2023] NOTABLE: Transferable Backdoor Attacks Against Prompt-based NLP Models.
- [ACL 2024] Enhancing Contrastive Learning with Noise-Guided Attack: Towards Continual Relation Extraction in the Wild.
- [ACL 2024] RLHFPoison: Reward Poisoning Attack for Reinforcement Learning with Human Feedback in Large Language Models.
- [ACL 2024] Stumbling Blocks: Stress Testing the Robustness of Machine-Generated Text Detectors Under Attacks.
- [ACL 2024] Transferable Embedding Inversion Attack: Uncovering Privacy Risks in Text Embeddings without Model Queries.
- [ACL 2024] SafeDecoding: Defending against Jailbreak Attacks via Safety-Aware Decoding.
- [ACL 2024] Stealthy Attack on Large Language Model based Recommendation.
- [ACL 2024] Safety Alignment in NLP Tasks: Weakly Aligned Summarization as an In-Context Attack.
- [ACL 2024] Defending Large Language Models Against Jailbreaking Attacks Through Goal Prioritization.
- [ACL 2024] VulLibGen: Generating Names of Vulnerability-Affected Packages via a Large Language Model.
- [ACL 2024] BadAgent: Inserting and Activating Backdoor Attacks in LLM Agents.
- [ACL 2024] Defending Against Alignment-Breaking Attacks via Robustly Aligned LLM.
- [ACL 2024] PRP: Propagating Universal Perturbations to Attack Large Language Model Guard-Rails.
- [ACL 2024] ArtPrompt: ASCII Art-based Jailbreak Attacks against Aligned LLMs.
- [ACL 2024] PsySafe: A Comprehensive Framework for Psychological-based Attack, Defense, and Evaluation of Multi-agent System Safety.
- [ACL 2025] Evaluation of LLM Vulnerabilities to Being Misused for Personalized Disinformation Generation.
- [ACL 2025] ObfusLM: Privacy-preserving Language Model Service against Embedding Inversion Attacks.
- [ACL 2025] What Really Matters in Many-Shot Attacks? An Empirical Study of Long-Context Vulnerabilities in LLMs.
- [ACL 2025] Bias in the Mirror : Are LLMs opinions robust to their own adversarial attacks.
- [ACL 2025] When Backdoors Speak: Understanding LLM Backdoor Attacks Through Model-Generated Explanations.
- [ACL 2025] Iron Sharpens Iron: Defending Against Attacks in Machine-Generated Text Detection with Adversarial Training.
- [ACL 2025] Stepwise Reasoning Disruption Attack of LLMs.
- [ACL 2025] The TIP of the Iceberg: Revealing a Hidden Class of Task-in-Prompt Adversarial Attacks on LLMs.
- [ACL 2025] Attacking Vision-Language Computer Agents via Pop-ups.
- [ACL 2025] DiffuseDef: Improved Robustness to Adversarial Attacks via Iterative Denoising.
- [ACL 2025] PIG: Privacy Jailbreak Attack on LLMs via Gradient-based Iterative In-Context Optimization.
- [ACL 2025] Agents Under Siege: Breaking Pragmatic Multi-Agent LLM Systems with Optimized Prompt Attacks.
- [ACL 2025] SINCon: Mitigate LLM-Generated Malicious Message Injection Attack for Rumor Detection.
- [ACL 2025] Mimicking the Familiar: Dynamic Command Generation for Information Theft Attacks in LLM Tool-Learning System.
- [ACL 2025] Multi-task Adversarial Attacks against Black-box Model with Few-shot Queries.
- [ACL 2025] Stealing Training Data from Large Language Models in Decentralized Training through Activation Inversion Attack.
- [ACL 2025] HiddenDetect: Detecting Jailbreak Attacks against Multimodal Large Language Models via Monitoring Hidden States.
- [ACL 2025] One-Shot is Enough: Consolidating Multi-Turn Attacks into Efficient Single-Turn Prompts for LLMs.
- [ACL 2025] AGD: Adversarial Game Defense Against Jailbreak Attacks in Large Language Models.
- [ACL 2025] Understanding Large Language Model Vulnerabilities to Social Bias Attacks.
- [ACL 2025] ELBA-Bench: An Efficient Learning Backdoor Attacks Benchmark for Large Language Models.
- [ACL 2025] Can Indirect Prompt Injection Attacks Be Detected and Removed?
- [ACL 2025] Defense Against Prompt Injection Attack by Leveraging Attack Techniques.
- [ACL 2025] Guiding not Forcing: Enhancing the Transferability of Jailbreaking Attacks on LLMs via Removing Superfluous Constraints.
- [ACL 2025] Vulnerability of LLMs to Vertically Aligned Text Manipulations.
- [ACL 2025] JailbreakRadar: Comprehensive Assessment of Jailbreak Attacks Against LLMs.
- [ACL 2025] A Statistical and Multi-Perspective Revisiting of the Membership Inference Attack in Large Language Models.
- [ACL 2025] WET: Overcoming Paraphrasing Vulnerabilities in Embeddings-as-a-Service with Linear Transformation Watermarks.
- [ACL 2025] ALGEN: Few-shot Inversion Attacks on Textual Embeddings via Cross-Model Alignment and Generation.
- [ACL 2025] LLMs know their vulnerabilities: Uncover Safety Gaps through Natural Distribution Shifts.
- [ACL 2025] Benchmarking LLMs and LLM-based Agents in Practical Vulnerability Detection for Code Repositories.
- [ACL 2025] Merge Hijacking: Backdoor Attacks to Model Merging of Large Language Models.
- [CVPR 2018] On the Robustness of Semantic Segmentation Models to Adversarial Attacks.
- [CVPR 2018] Robust Physical-World Attacks on Deep Learning Visual Classification.
- [CVPR 2018] Defense Against Adversarial Attacks Using High-Level Representation Guided Denoiser.
- [CVPR 2018] Deflecting Adversarial Attacks With Pixel Deflection.
- [CVPR 2018] Boosting Adversarial Attacks With Momentum.
- [CVPR 2019] Parametric Noise Injection: Trainable Randomness to Improve Deep Neural Network Robustness Against Adversarial Attack.
- [CVPR 2019] Exact Adversarial Attack to Image Captioning via Structured Output Learning With Latent Variables.
- [CVPR 2019] Adversarial Attacks Beyond the Image Space.
- [CVPR 2019] Evading Defenses to Transferable Adversarial Examples by Translation-Invariant Attacks.
- [CVPR 2019] Decoupling Direction and Norm for Efficient Gradient-Based L2 Adversarial Attacks and Defenses.
- [CVPR 2019] What Does It Mean to Learn in Deep Networks? And, How Does One Detect Adversarial Attacks?
- [CVPR 2019] Curls & Whey: Boosting Black-Box Adversarial Attacks.
- [CVPR 2019] ShieldNets: Defending Against Adversarial Attacks Using Probabilistic Adversarial Robustness.
- [CVPR 2019] Efficient Decision-Based Black-Box Adversarial Attacks on Face Recognition.
- [CVPR 2019] Catastrophic Child’s Play: Easy to Perform, Hard to Defend Adversarial Attacks.
- [CVPR 2019] Multi-Adversarial Discriminative Deep Domain Generalization for Face Presentation Attack Detection.
- [CVPR 2019] Defending Against Adversarial Attacks by Randomized Diversification.
- [CVPR 2019] Rob-GAN: Generator, Discriminator, and Adversarial Attacker.
- [CVPR 2019] Trust Region Based Adversarial Attack on Neural Networks.
- [CVPR 2020] DaST: Data-Free Substitute Training for Adversarial Attacks.
- [CVPR 2020] The Secret Revealer: Generative Model-Inversion Attacks Against Deep Neural Networks.
- [CVPR 2020] Universal Litmus Patterns: Revealing Backdoor Attacks in CNNs.
- [CVPR 2020] Transferable, Controllable, and Inconspicuous Adversarial Attacks on Person Re-identification With Deep Mis-Ranking.
- [CVPR 2020] Projection & Probability-Driven Black-Box Attack.
- [CVPR 2020] Ensemble Generative Cleaning With Feedback Loops for Defending Adversarial Attacks.
- [CVPR 2020] When NAS Meets Robustness: In Search of Robust Architectures Against Adversarial Attacks.
- [CVPR 2020] Towards Transferable Targeted Attack.
- [CVPR 2020] Defending Against Universal Attacks Through Selective Feature Regeneration.
- [CVPR 2020] Universal Physical Camouflage Attacks on Object Detectors.
- [CVPR 2020] Defending Against Model Stealing Attacks With Adaptive Misinformation.
- [CVPR 2020] Cooling-Shrinking Attack: Blinding the Tracker With Imperceptible Noises.
- [CVPR 2020] Adversarial Camouflage: Hiding Physical-World Attacks With Natural Styles.
- [CVPR 2020] On Isometry Robustness of Deep 3D Point Cloud Models Under Adversarial Attacks.
- [CVPR 2020] QEBA: Query-Efficient Boundary-Based Blackbox Attack.
- [CVPR 2020] Cross-Domain Face Presentation Attack Detection via Multi-Domain Disentangled Representation Learning.
- [CVPR 2020] Robust Design of Deep Neural Networks Against Adversarial Attacks Based on Lyapunov Theory.
- [CVPR 2020] GeoDA: A Geometric Framework for Black-Box Adversarial Attacks.
- [CVPR 2020] Attack to Explain Deep Representation.
- [CVPR 2020] One-Shot Adversarial Attacks on Visual Tracking With Dual Attention.
- [CVPR 2020] LG-GAN: Label Guided Adversarial Network for Flexible Targeted Attack of Point Cloud Based Deep Networks.
- [CVPR 2020] Smoothing Adversarial Domain Attack and P-Memory Reconsolidation for Cross-Domain Person Re-Identification.
- [CVPR 2020] Robust Superpixel-Guided Attentional Adversarial Attack.
- [CVPR 2020] TBT: Targeted Neural Network Attack With Bit Trojan.
- [CVPR 2020] Defending and Harnessing the Bit-Flip Based Adversarial Weight Attack.
- [CVPR 2020] ILFO: Adversarial Attack on Adaptive Neural Networks.
- [CVPR 2020] Clean-Label Backdoor Attacks on Video Recognition Models.
- [CVPR 2021] Over-the-Air Adversarial Flickering Attacks Against Video Recognition Networks.
- [CVPR 2021] Enhancing the Transferability of Adversarial Attacks Through Variance Tuning.
- [CVPR 2021] You See What I Want You To See: Exploring Targeted Black-Box Transferability Attack for Hash-Based Image Retrieval Systems.
- [CVPR 2021] Universal Spectral Adversarial Attacks for Deformable Shapes.
- [CVPR 2021] QAIR: Practical Query-Efficient Black-Box Attacks for Image Retrieval.
- [CVPR 2021] Protecting Intellectual Property of Generative Adversarial Networks From Ambiguity Attacks.
- [CVPR 2021] Delving into Data: Effectively Substitute Training for Black-box Attack.
- [CVPR 2021] Can Audio-Visual Integration Strengthen Robustness Under Multimodal Attacks?
- [CVPR 2021] Backdoor Attacks Against Deep Learning Systems in the Physical World.
- [CVPR 2021] IoU Attack: Towards Temporally Coherent Black-Box Adversarial Attack for Visual Object Tracking.
- [CVPR 2021] BASAR: Black-Box Attack on Skeletal Action Recognition.
- [CVPR 2021] On the Difficulty of Membership Inference Attacks.
- [CVPR 2021] Dual Attention Suppression Attack: Generate Adversarial Camouflage in Physical World.
- [CVPR 2021] SurFree: A Fast Surrogate-Free Black-Box Attack.
- [CVPR 2021] Simulating Unknown Target Models for Query-Efficient Black-Box Attacks.
- [CVPR 2021] MAZE: Data-Free Model Stealing Attack Using Zeroth-Order Gradient Estimation.
- [CVPR 2021] Understanding the Robustness of Skeleton-Based Action Recognition Under Adversarial Attack.
- [CVPR 2021] The Translucent Patch: A Physical and Universal Attack on Object Detectors.
- [CVPR 2021] Adversarial Laser Beam: Effective Physical-World Attack to DNNs in a Blink.
- [CVPR 2021] Prototype-Supervised Adversarial Network for Targeted Attack of Deep Hashing.
- [CVPR 2022] Quarantine: Sparsity Can Uncover the Trojan Attack Trigger for Free.
- [CVPR 2022] Exploring Frequency Adversarial Attacks for Face Forgery Detection.
- [CVPR 2022] Towards Robust Rain Removal Against Adversarial Attacks: A Comprehensive Benchmark Analysis and Beyond.
- [CVPR 2022] ResSFL: A Resistance Transfer Framework for Defending Model Inversion Attack in Split Federated Learning.
- [CVPR 2022] Backdoor Attacks on Self-Supervised Learning.
- [CVPR 2022] Towards Practical Deployment-Stage Backdoor Attack on Deep Neural Networks.
- [CVPR 2022] Bandits for Structure Perturbation-based Black-box Attacks to Graph Neural Networks with Theoretical Guarantees.
- [CVPR 2022] Improving Robustness Against Stealthy Weight Bit-Flip Attacks by Output Code Matching.
- [CVPR 2022] LAS-AT: Adversarial Training with Learnable Attack Strategy.
- [CVPR 2022] DST: Dynamic Substitute Training for Data-free Black-box Attack.
- [CVPR 2022] Segment and Complete: Defending Object Detectors against Adversarial Patch Attacks with Robust Patch Detection.
- [CVPR 2022] Stochastic Variance Reduced Ensemble Adversarial Attack for Boosting the Adversarial Transferability.
- [CVPR 2022] Improving Adversarial Transferability via Neuron Attribution-based Attacks.
- [CVPR 2022] Zero-Query Transfer Attacks on Context-Aware Object Detectors.
- [CVPR 2022] 360-Attack: Distortion-Aware Perturbations from Perspective-Views.
- [CVPR 2022] Label-Only Model Inversion Attacks via Boundary Repulsion.
- [CVPR 2022] Cross-Modal Transferable Adversarial Attacks from Images to Videos.
- [CVPR 2022] BppAttack: Stealthy and Efficient Trojan Attacks against Deep Neural Networks via Image Quantization and Contrastive Adversarial Learning.
- [CVPR 2022] Investigating Top-k White-Box and Transferable Black-box Attack.
- [CVPR 2022] Boosting Black-Box Attack with Partially Transferred Conditional Adversarial Distribution.
- [CVPR 2022] Practical Evaluation of Adversarial Robustness via Adaptive Auto Attack.
- [CVPR 2022] Towards Efficient Data Free Blackbox Adversarial Attack.
- [CVPR 2022] Bounded Adversarial Attack on Deep Content Features.
- [CVPR 2022] DEFEAT: Deep Hidden Feature Backdoor Attacks by Imperceptible Perturbation and Latent Representation Constraints.
- [CVPR 2022] Adversarial Eigen Attack on BlackBox Models.
- [CVPR 2022] Appearance and Structure Aware Robust Deep Visual Graph Matching: Attack, Defense and Beyond.
- [CVPR 2022] Robust Structured Declarative Classifiers for 3D Point Clouds: Defending Adversarial Attacks with Implicit Gradients.
- [CVPR 2022] DTA: Physical Camouflage Attacks using Differentiable Transformation Network.
- [CVPR 2022] Frequency-driven Imperceptible Adversarial Attack on Semantic Similarity.
- [CVPR 2022] Shadows can be Dangerous: Stealthy and Effective Physical-world Adversarial Attack by Natural Phenomenon.
- [CVPR 2022] Exploring Effective Data for Surrogate Training Towards Black-box Attack.
- [CVPR 2022] EyePAD++: A Distillation-based approach for joint Eye Authentication and Presentation Attack Detection using Periocular Images.
- [CVPR 2022] FIBA: Frequency-Injection based Backdoor Attack in Medical Image Analysis.
- [CVPR 2023] The Resource Problem of Using Linear Layer Leakage Attack in Federated Learning.
- [CVPR 2023] TrojDiff: Trojan Attacks on Diffusion Models with Diverse Targets.
- [CVPR 2023] Ensemble-based Blackbox Attacks on Dense Prediction.
- [CVPR 2023] Efficient Loss Function by Minimizing the Detrimental Effect of Floating-Point Errors on Gradient-Based Attacks.
- [CVPR 2023] The Best Defense is a Good Offense: Adversarial Augmentation Against Adversarial Attacks.
- [CVPR 2023] Rate Gradient Approximation Attack Threats Deep Spiking Neural Networks.
- [CVPR 2023] Effective Ambiguity Attack Against Passport-based DNN Intellectual Property Protection Schemes through Fully Connected Layer Substitution.
- [CVPR 2023] Color Backdoor: A Robust Poisoning Attack in Color Space.
- [CVPR 2023] Minimizing Maximum Model Discrepancy for Transferable Black-box Targeted Attacks.
- [CVPR 2023] Breaching FedMD: Image Recovery via Paired-Logits Inversion Attack.
- [CVPR 2023] Defending Against Patch-based Backdoor Attacks on Self-Supervised Learning.
- [CVPR 2023] Backdoor Attacks Against Deep Image Compression via Adaptive Frequency Trigger.
- [CVPR 2023] Enhancing the Self-Universality for Transferable Targeted Attacks.
- [CVPR 2023] Black-Box Sparse Adversarial Attack via Multi-Objective Optimisation CVPR Proceedings.
- [CVPR 2023] Towards Benchmarking and Assessing Visual Naturalness of Physical World Adversarial Attacks.
- [CVPR 2023] Can’t Steal? Cont-Steal! Contrastive Stealing Attacks Against Image Encoders.
- [CVPR 2023] Re-Thinking Model Inversion Attacks Against Deep Neural Networks.
- [CVPR 2023] Turning Strengths into Weaknesses: A Certified Robustness Inspired Attack Framework against Graph Neural Networks.
- [CVPR 2023] Dynamic Generative Targeted Attacks with Pattern Injection.
- [CVPR 2023] Transferable Adversarial Attacks on Vision Transformers with Token Gradient Regularization.
- [CVPR 2023] Progressive Backdoor Erasing via connecting Backdoor and Adversarial Attacks.
- [CVPR 2023] Reinforcement Learning-Based Black-Box Model Inversion Attacks.
- [CVPR 2023] T-SEA: Transfer-Based Self-Ensemble Attack on Object Detection.
- [CVPR 2023] Proximal Splitting Adversarial Attack for Semantic Segmentation.
- [CVPR 2023] Discrete Point-Wise Attack is Not Enough: Generalized Manifold Adversarial Attack for Face Recognition.
- [CVPR 2023] You Are Catching My Attention: Are Vision Transformers Bad Learners under Backdoor Attacks?
- [CVPR 2023] Sibling-Attack: Rethinking Transferable Adversarial Attacks against Face Recognition.
- [CVPR 2023] Robust Single Image Reflection Removal Against Adversarial Attacks.
- [CVPR 2023] Physical-World Optical Adversarial Attacks on 3D Face Recognition.
- [CVPR 2024] MMA-Diffusion: MultiModal Attack on Diffusion Models.
- [CVPR 2024] Anomaly Score: Evaluating Generative Models and Individual Generated Images Based on Complexity and Vulnerability.
- [CVPR 2024] GLOW: Global Layout Aware Attacks on Object Detection.
- [CVPR 2024] A Stealthy Wrongdoer: Feature-Oriented Reconstruction Attack Against Split Learning.
- [CVPR 2024] Re-Thinking Data Availability Attacks Against Deep Neural Networks.
- [CVPR 2024] Leak and Learn: An Attacker’s Cookbook to Train Using Leaked Data from Federated Learning.
- [CVPR 2024] VA3: Virtually Assured Amplification Attack on Probabilistic Copyright Protection for Text-to-Image Generative Models.
- [CVPR 2024] Physical Backdoor: Towards Temperature-Based Backdoor Attacks in the Physical World.
- [CVPR 2024] Adversarial Backdoor Attack by Naturalistic Data Poisoning on Trajectory Prediction in Autonomous Driving.
- [CVPR 2024] BrainWash: A Poisoning Attack to Forget in Continual Learning.
- [CVPR 2024] BadCLIP: Trigger-Aware Prompt Learning for Backdoor Attacks on CLIP.
- [CVPR 2024] Semantic-Aware Multi-Label Adversarial Attacks.
- [CVPR 2024] Data Poisoning Based Backdoor Attacks to Contrastive Learning.
- [CVPR 2024] Not All Prompts Are Secure: A Switchable Backdoor Attack Against Pre-trained Vision Transfomers.
- [CVPR 2024] Physical 3D Adversarial Attacks against Monocular Depth Estimation in Autonomous Driving.
- [CVPR 2024] PAD: Patch-Agnostic Defense against Adversarial Patch Attacks.
- [CVPR 2024] Towards Transferable Targeted 3D Adversarial Attack in the Physical World.
- [CVPR 2024] Nearest is Not Dearest: Towards Practical Defense Against Quantization-Conditioned Backdoor Attacks.
- [CVPR 2024] Improving Transferable Targeted Adversarial Attacks with Model Self-Enhancement.
- [CVPR 2024] On the Robustness of Large Multimodal Models Against Image Adversarial Attacks.
- [CVPR 2024] Intriguing Properties of Diffusion Models: An Empirical Study of the Natural Attack Capability in Text-to-Image Generative Models.
- [CVPR 2024] BadCLIP: Dual-Embedding Guided Backdoor Attack on Multimodal Contrastive Learning.
- [CVPR 2024] MMCert: Provable Defense Against Adversarial Attacks to Multi-Modal Models.
- [CVPR 2024] Transferable Structural Sparse Adversarial Attack Via Exact Group Sparsity Training.
- [CVPR 2024] Overload: Latency Attacks on Object Detection for Edge Devices.
- [CVPR 2024] Attack To Defend: Exploiting Adversarial Attacks for Detecting Poisoned Models.
- [CVPR 2024] SlowFormer: Adversarial Attack on Compute and Energy Consumption of Efficient Vision Transformers.
- [CVPR 2024] Lotus: Evasive and Resilient Backdoor Attacks through Sub-Partitioning.
- [CVPR 2024] Deep-TROJ: An Inference Stage Trojan Insertion Algorithm Through Efficient Weight Replacement Attack.
- [CVPR 2024] Strong Transferable Adversarial Attacks via Ensembled Asymptotically Normal Distribution Learning.
- [CVPR 2024] Defense Against Adversarial Attacks on No-Reference Image Quality Models with Gradient Norm Regularization.
- [CVPR 2025] NoPain: No-box Point Cloud Attack via Optimal Transport Singular Boundary.
- [CVPR 2025] Improving the Transferability of Adversarial Attacks on Face Recognition with Diverse Parameters Augmentation.
- [CVPR 2025] Towards Effective and Sparse Adversarial Attack on Spiking Neural Networks via Breaking Invisible Surrogate Gradients.
- [CVPR 2025] Deterministic Certification of Graph Neural Networks against Graph Poisoning Attacks with Arbitrary Perturbations.
- [CVPR 2025] MOS-Attack: A Scalable Multi-objective Adversarial Attack Framework.
- [CVPR 2025] Silent Branding Attack: Trigger-free Data Poisoning Attack on Text-to-Image Diffusion Models.
- [CVPR 2025] Variance-Based Membership Inference Attacks Against Large-Scale Image Captioning Models.
- [CVPR 2025] Revisiting Backdoor Attacks against Large Vision-Language Models from Domain Shift.
- [CVPR 2025] Gradient Inversion Attacks on Parameter-Efficient Fine-Tuning.
- [CVPR 2025] Mind the Gap: Detecting Black-box Adversarial Attacks in the Making through Query Update Analysis.
- [CVPR 2025] Doppelgangers and Adversarial Vulnerability.
- [CVPR 2025] Rethinking the Adversarial Robustness of Multi-Exit Neural Networks in an Attack-Defense Game.
- [CVPR 2025] Seeing is Not Believing: Adversarial Natural Object Optimization for Hard-Label 3D Scene Attacks.
- [CVPR 2025] Chain of Attack: On the Robustness of Vision-Language Models Against Transfer-Based Adversarial Attacks.
- [CVPR 2025] CLIP is Strong Enough to Fight Back: Test-time Counterattacks towards Zero-shot Adversarial Robustness of CLIP.
- [CVPR 2025] Model Poisoning Attacks to Federated Learning via Multi-Round Consistency.
- [CVPR 2025] Advancing Adversarial Robustness in GNeRFs: The IL2-NeRF Attack.
- [CVPR 2025] Enduring, Efficient and Robust Trajectory Prediction Attack in Autonomous Driving via Optimization-Driven Multi-Frame Perturbation Framework.
- [CVPR 2025] UIBDiffusion: Universal Imperceptible Backdoor Attack for Diffusion Models.
- [CVPR 2025] Can’t Slow Me Down: Learning Robust and Hardware-Adaptive Object Detectors against Latency Attacks for Edge Devices.
- [CVPR 2025] Exploring Visual Vulnerabilities via Multi-Loss Adversarial Search for Jailbreaking Vision-Language Models.
- [CVPR 2025] Anyattack: Towards Large-scale Self-supervised Adversarial Attacks on Vision-language Models.
- [CVPR 2025] Your Scale Factors are My Weapon: Targeted Bit-Flip Attacks on Vision Transformers via Scale Factor Manipulation.
- [CVPR 2025] FedMIA: An Effective Membership Inference Attack Exploiting “All for One” Principle in Federated Learning.
- [CVPR 2025] Detecting Backdoor Attacks in Federated Learning via Direction Alignment Inspection.
- [CVPR 2025] Black-Box Forgery Attacks on Semantic Watermarks for Diffusion Models.
- [CVPR 2025] Adv-CPG: A Customized Portrait Generation Framework with Facial Adversarial Attacks.
- [CVPR 2025] ProjAttacker: A Configurable Physical Adversarial Attack for Face Recognition via Projector.
- [CVPR 2025] ACAttack: Adaptive Cross Attacking RGB-T Tracker via Multi-Modal Response Decoupling.
- [CVPR 2025] Stealthy Backdoor Attack in Self-Supervised Learning Vision Encoders for Large Vision Language Models.
- [CVPR 2025] Infighting in the Dark: Multi-Label Backdoor Attack in Federated Learning.
- [CVPR 2025] Invisible Backdoor Attack against Self-supervised Learning.
- [CVPR 2025] Improving Transferable Targeted Attacks with Feature Tuning Mixup.
- [CVPR 2025] Prompt2Perturb (P2P): Text-Guided Diffusion-Based Adversarial Attack on Breast Ultrasound Images.
- [CVPR 2025] Implicit Bias Injection Attacks against Text-to-Image Diffusion Models.
- [CVPR 2025] From Head to Tail: Efficient Black-box Model Inversion Attack via Long-tailed Learning.
- [CVPR 2025] BadToken: Token-level Backdoor Attacks to Multi-modal Large Language Models.
- [CVPR 2025] Towards Million-Scale Adversarial Robustness Evaluation With Stronger Individual Attacks.
- [ICCVW 2019] Attack Agnostic Statistical Method for Adversarial Detection.
- [ICCVW 2019] Propagated Perturbation of Adversarial Attack for well-known CNNs: Empirical Study and its Explanation.
- [ICCVW 2021] Evasion Attack STeganography: Turning Vulnerability Of Machine Learning To Adversarial Attacks Into A Real-world Application.
- [ICCVW 2021] Optical Adversarial Attack.
- [ICCVW 2021] Patch Attack Invariance: How Sensitive are Patch Attacks to 3D Pose?
- [ICCVW 2021] 3D High-Fidelity Mask Face Presentation Attack Detection Challenge.
- [ICCVW 2021] A Dual-stream Framework for 3D Mask Face Presentation Attack Detection.
- [ICCVW 2021] 3D mask presentation attack detection via high resolution face parts.
- [ICCVW 2021] UniNet: A Unified Scene Understanding Network and Exploring Multi-Task Relationships through the Lens of Adversarial Attacks.
- [ICCVW 2023] Developing Robust and Lightweight Adversarial Defenders by Enforcing Orthogonality on Attack-Agnostic Denoising Autoencoders.
- [ICCVW 2023] Defense-Prefix for Preventing Typographic Attacks on CLIP.
- [ICCVW 2023] PRAT: PRofiling Adversarial aTtacks.
- [ICCVW 2023] Black-Box Attacks on Image Activity Prediction and its Natural Language Explanations.
- [ICCVW 2023] OMG-Attack: Self-Supervised On-Manifold Generation of Transferable Evasion Attacks.
- [ICCVW 2023] On the unreasonable vulnerability of transformers for image restoration - and an easy fix.
- [ICCVW 2023] Targeted Adversarial Attacks on Generalizable Neural Radiance Fields.
- [ICCVW 2023] Adversarial Attacks Against Uncertainty Quantification.
- [ICML 2012] Bayesian Watermark Attacks.
- [ICML 2012] Poisoning Attacks against Support Vector Machines.
- [ICML 2018] Adversarial Attack on Graph Structured Data.
- [ICML 2018] Black-box Adversarial Attacks with Limited Queries and Information.
- [ICML 2018] The Hidden Vulnerability of Distributed Learning in Byzantium.
- [ICML 2018] Adversarial Risk and the Dangers of Evaluating Against Weak Attacks.
- [ICML 2019] Adversarial Attacks on Node Embeddings via Graph Poisoning.
- [ICML 2019] Simple Black-box Adversarial Attacks.
- [ICML 2019] Are Generative Classifiers More Robust to Adversarial Attacks?
- [ICML 2019] NATTACK: Learning the Distributions of Adversarial Examples for an Improved Black-Box Attack on Deep Neural Networks.
- [ICML 2019] Adversarial camera stickers: A physical camera-based attack on deep learning systems.
- [ICML 2019] Data Poisoning Attacks on Stochastic Bandits.
- [ICML 2019] On Certifying Non-Uniform Bounds against Adversarial Attacks.
- [ICML 2019] Data Poisoning Attacks in Multi-Party Learning.
- [ICML 2019] Parsimonious Black-Box Adversarial Attacks via Efficient Combinatorial Optimization.
- [ICML 2019] First-Order Adversarial Vulnerability of Neural Networks and Input Dimension.
- [ICML 2019] Defending Against Saddle Point Attack in Byzantine-Robust Distributed Learning.
- [ICML 2019] Transferable Clean-Label Poisoning Attacks on Deep Neural Nets.
- [ICML 2020] Minimally distorted Adversarial Examples with a Fast Adaptive Boundary Attack.
- [ICML 2020] Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks.
- [ICML 2020] Adversarial Attacks on Probabilistic Autoregressive Forecasting Models.
- [ICML 2020] Min-Max Optimization without Gradients: Convergence and Applications to Black-Box Evasion and Poisoning Attacks.
- [ICML 2020] Adversarial Neural Pruning with Latent Vulnerability Suppression.
- [ICML 2020] Randomization matters How to defend against strong adversarial attacks.
- [ICML 2020] Policy Teaching via Environment Poisoning: Training-time Adversarial Attacks against Reinforcement Learning.
- [ICML 2020] Certified Robustness to Label-Flipping Attacks via Randomized Smoothing.
- [ICML 2020] Adversarial Attacks on Copyright Detection Systems.
- [ICML 2020] Second-Order Provable Defenses against Adversarial Attacks.
- [ICML 2020] Confidence-Calibrated Adversarial Training: Generalizing to Unseen Attacks.
- [ICML 2020] Alleviating Privacy Attacks via Causal Learning.
- [ICML 2020] Stronger and Faster Wasserstein Adversarial Attacks.
- [ICML 2020] Dual-Path Distillation: A Unified Framework to Improve Black-Box Attacks.
- [ICML 2020] Adaptive Reward-Poisoning Attacks against Reinforcement Learning.
- [ICML 2020] Attacks Which Do Not Kill Training Make Adversarial Learning Stronger.
- [ICML 2021] Robust Testing and Estimation under Manipulation Attacks.
- [ICML 2021] Label Inference Attacks from Log-loss Scores.
- [ICML 2021] Label-Only Membership Inference Attacks.
- [ICML 2021] Mind the Box: l1-APGD for Sparse Adversarial Attacks on Image Classifiers.
- [ICML 2021] Maximum Mean Discrepancy Test is Aware of Adversarial Attacks.
- [ICML 2021] Query Complexity of Adversarial Attacks.
- [ICML 2021] Knowledge Enhanced Machine Learning Pipeline against Diverse Adversarial Attacks.
- [ICML 2021] Defense against backdoor attacks via robust covariance estimation.
- [ICML 2021] When Does Data Augmentation Help With Membership Inference Attacks?
- [ICML 2021] Learning to Generate Noise for Multi-Attack Robustness.
- [ICML 2021] Just How Toxic is Data Poisoning? A Unified Benchmark for Backdoor and Data Poisoning Attacks.
- [ICML 2021] PopSkipJump: Decision-Based Attack for Probabilistic Classifiers.
- [ICML 2021] Model-Targeted Poisoning Attacks with Provable Convergence.
- [ICML 2021] Robust Learning for Data Poisoning Attacks.
- [ICML 2021] Making Paper Reviewing Robust to Bid Manipulation Attacks.
- [ICML 2021] CRFL: Certifiably Robust Federated Learning against Backdoor Attacks.
- [ICML 2021] Neural Tangent Generalization Attacks.
- [ICML 2021] Progressive-Scale Boundary Blackbox Attack via Projective Gradient Estimation.
- [ICML 2021] Expressive 1-Lipschitz Neural Networks for Robust Multiple Graph Learning against Adversarial Attacks.
- [ICML 2021] Towards Defending against Adversarial Examples via Attack-Invariant Features.
- [ICML 2021] Sparse and Imperceptible Adversarial Attack via a Homotopy Algorithm.
- [ICML 2021] Recovering AES Keys with a Deep Cold Boot Attack.
- [ICML 2022] Adversarial Vulnerability of Randomized Ensembles.
- [ICML 2022] An Equivalence Between Data Poisoning and Byzantine Gradient Attacks.
- [ICML 2022] Rethinking Image-Scaling Attacks: The Interplay Between Vulnerabilities in Machine Learning Systems.
- [ICML 2022] Fast and Reliable Evaluation of Adversarial Robustness with Minimum-Margin Attack.
- [ICML 2022] Adversarial Attacks on Gaussian Process Bandits.
- [ICML 2022] Coordinated Attacks against Contextual Bandits: Fundamental Limits and Defense Mechanisms.
- [ICML 2022] Query-Efficient and Scalable Black-Box Adversarial Attacks on Discrete Sequential Data via Bayesian Optimization.
- [ICML 2022] Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks.
- [ICML 2022] Hindering Adversarial Attacks with Implicit Neural Representations.
- [ICML 2022] Plug & Play Attacks: Towards Robust and Flexible Model Inversion Attacks.
- [ICML 2022] LCANets: Lateral Competition Improves Robustness Against Corruption and Attack.
- [ICML 2022] Reverse Engineering ℓp attacks: A block-sparse optimization approach with recovery guarantees.
- [ICML 2022] When Are Linear Stochastic Bandits Attackable?
- [ICML 2022] Adversarial Attack and Defense for Non-Parametric Two-Sample Tests.
- [ICML 2022] Diversified Adversarial Attacks based on Conjugate Gradient Method.
- [ICML 2022] A Branch and Bound Framework for Stronger Adversarial Attacks of ReLU Networks.
- [ICML 2022] Certified Robustness Against Natural Language Attacks by Causal Intervention.
- [ICML 2023] MultiRobustBench: Benchmarking Robustness Against Multiple Attacks.
- [ICML 2023] Are Diffusion Models Vulnerable to Membership Inference Attacks?
- [ICML 2023] NeRFool: Uncovering the Vulnerability of Generalizable Neural Radiance Fields against Adversarial Perturbations.
- [ICML 2023] Towards Stable and Efficient Adversarial Training against l1 Bounded Adversarial Attacks.
- [ICML 2023] Cocktail Party Attack: Breaking Aggregation-Based Privacy in Federated Learning Using Independent Component Analysis.
- [ICML 2023] Rethinking Backdoor Attacks.
- [ICML 2023] Understanding and Defending Patched-based Adversarial Attacks for Vision Transformer.
- [ICML 2023] Exploring the Limits of Model-Targeted Indiscriminate Data Poisoning Attacks.
- [ICML 2023] SRATTA: Sample Re-ATTribution Attack of Secure Aggregation in Federated Learning.
- [ICML 2023] Run-off Election: Improved Provable Defense against Data Poisoning Attacks.
- [ICML 2023] Preprocessors Matter! Realistic Decision-Based Attacks on Machine Learning Systems.
- [ICML 2023] Sketching for First Order Method: Efficient Algorithm for Low-Bandwidth Channel and Vulnerability.
- [ICML 2023] Understanding Backdoor Attacks through the Adaptability Hypothesis.
- [ICML 2023] UMD: Unsupervised Model Detection for X2X Backdoor Attacks.
- [ICML 2023] Probabilistic Categorical Adversarial Attack and Adversarial Training.
- [ICML 2023] Data Poisoning Attacks Against Multimodal Encoders.
- [ICML 2023] Adversarial Parameter Attack on Deep Neural Networks.
- [ICML 2023] Graph Contrastive Backdoor Attacks.
- [ICML 2023] Demystifying Uneven Vulnerability of Link Stealing Attacks against Graph Neural Networks.
- [ICML 2023] On Strengthening and Defending Graph Reconstruction Attack with Markov Chain Approximation.
- [ICML 2023] Surrogate Model Extension (SME): A Fast and Accurate Weight Update Attack on Federated Learning.
- [ICML 2024] Low-Cost High-Power Membership Inference Attacks.
- [ICML 2024] A Theoretical Analysis of Backdoor Poisoning Attacks in Convolutional Neural Networks.
- [ICML 2024] Adversarial Attacks on Combinatorial Multi-Armed Bandits.
- [ICML 2024] Attack-free Evaluating and Enhancing Adversarial Robustness on Categorical Data.
- [ICML 2024] SignSGD with Federated Defense: Harnessing Adversarial Attacks through Gradient Sign Decoding.
- [ICML 2024] Unmasking Vulnerabilities: Cardinality Sketches under Adaptive Inputs.
- [ICML 2024] Exact Soft Analytical Side-Channel Attacks using Tractable Circuits.
- [ICML 2024] Causality Based Front-door Defense Against Backdoor Attack on Language Models.
- [ICML 2024] COLD-Attack: Jailbreaking LLMs with Stealthiness and Controllability.
- [ICML 2024] FedREDefense: Defending against Model Poisoning Attacks for Federated Learning using Model Update Reconstruction Error.
- [ICML 2024] Fast Adversarial Attacks on Language Models In One GPU Minute.
- [ICML 2024] Data Poisoning Attacks against Conformal Prediction.
- [ICML 2024] Defense against Backdoor Attack on Pre-trained Language Models via Head Pruning and Attention Normalization.
- [ICML 2024] IOI: Invisible One-Iteration Adversarial Attack on No-Reference Image- and Video-Quality Metrics.
- [ICML 2024] Adversarially Robust Deep Multi-View Clustering: A Novel Attack and Defense Framework.
- [ICML 2024] RAUCA: A Novel Physical Adversarial Attack on Vehicle Detectors via Robust and Accurate Camouflage Generation.
- [ICML 2024] Toward Availability Attacks in 3D Point Clouds.
- [ICML 2024] Better Safe than Sorry: Pre-training CLIP against Targeted Data Poisoning and Backdoor Attacks.
- [ICML 2024] The Pitfalls and Promise of Conformal Inference Under Adversarial Attacks.
- [ICML 2024] Membership Inference Attacks on Diffusion Models via Quantile Regression.
- [ICML 2024] Collective Certified Robustness against Graph Injection Attacks.
- [ICML 2024] Efficient Black-box Adversarial Attacks via Bayesian Optimization Guided by a Function Prior.
- [ICML 2024] BadPart: Unified Black-box Adversarial Patch Attacks against Pixel-wise Regression Tasks.
- [ICML 2024] DataFreeShield: Defending Adversarial Attacks without Training Data.
- [ICML 2024] Revisiting Character-level Adversarial Attacks for Language Models.
- [ICML 2024] UPAM: Unified Prompt Attack in Text-to-Image Generation Models Against Both Textual Filters and Visual Checkers.
- [ICML 2024] Defense against Model Extraction Attack by Bayesian Active Watermarking.
- [ICML 2024] Privacy Attacks in Decentralized Learning.
- [ICML 2024] Generalization Bound and New Algorithm for Clean-Label Backdoor Attack.
- [ICML 2024] CosPGD: an efficient white-box adversarial attack for pixel-wise prediction tasks.
- [IJCAI 2011] Security Games with Multiple Attacker Resources.
- [IJCAI 2011] Attack Semantics for Abstract Argumentation.
- [IJCAI 2015] Quantifying Robustness of Trust Systems against Collusive Unfair Rating Attacks Using Information Theory.
- [IJCAI 2015] Optimal Network Security Hardening Using Attack Graph Games.
- [IJCAI 2015] Regression Model Fitting under Differential Privacy and Model Inversion Attack.
- [IJCAI 2015] Catch the Black Sheep: Unified Framework for Shilling Attack Detection Based on Fraudulent Action Propagation.
- [IJCAI 2015] The Complexity of Manipulative Attacks in Nearly Single-Peaked Electorates (Extended Abstract).
- [IJCAI 2017] Measuring the Intensity of Attacks in Argumentation Graphs with Shapley Value.
- [IJCAI 2017] A Bayesian Approach to Argument-Based Reasoning for Attack Estimation.
- [IJCAI 2017] Defending Against Man-In-The-Middle Attack in Repeated Games.
- [IJCAI 2017] Tactics of Adversarial Attack on Deep Reinforcement Learning Agents.
- [IJCAI 2017] Efficient Label Contamination Attacks Against Black-Box Learning Models.
- [IJCAI 2018] Adversarial Regression for Detecting Attacks in Cyber-Physical Systems.
- [IJCAI 2019] Network Formation under Random Attack and Probabilistic Spread.
- [IJCAI 2019] Identifying vulnerabilities in trust and reputation systems.
- [IJCAI 2019] Imitative Attacker Deception in Stackelberg Security Games.
- [IJCAI 2019] Transferable Adversarial Attacks for Image and Video Object Detection.
- [IJCAI 2019] Harnessing the Vulnerability of Latent Layers in Adversarially Trained Models.
- [IJCAI 2019] Topology Attack and Defense for Graph Neural Networks: An Optimization Perspective.
- [IJCAI 2019] VulSniper: Focus Your Attention to Shoot Fine-Grained Vulnerabilities.
- [IJCAI 2019] Real-Time Adversarial Attacks.
- [IJCAI 2019] Locate-Then-Detect: Real-time Web Attack Detection via Attention-based Deep Neural Networks.
- [IJCAI 2019] Data Poisoning against Differentially-Private Learners: Attacks and Defenses.
- [IJCAI 2019] Adversarial Examples for Graph Data: Deep Insights into Attack and Defense.
- [IJCAI 2019] FABA: An Algorithm for Fast Aggregation against Byzantine Attacks in Distributed Neural Networks.
- [IJCAI 2019] Data Poisoning Attack against Knowledge Graph Embedding.
- [IJCAI 2019] Robust Audio Adversarial Example for a Physical Attack.
- [IJCAI 2019] Quality Control Attack Schemes in Crowdsourcing.
- [IJCAI 2019] Adversarial Attacks on Neural Networks for Graph Data.
- [IJCAI 2019] VEST: A System for Vulnerability Exploit Scoring & Timing.
- [IJCAI 2020] Detecting Adversarial Attacks via Subset Scanning of Autoencoder Activations and Reconstruction Error.
- [IJCAI 2020] Smart Contract Vulnerability Detection using Graph Neural Network.
- [IJCAI 2020] Inspection of Blackbox Models for Evaluating Vulnerability in Maternal, Newborn, and Child Health.
- [IJCAI 2021] Feature Space Targeted Attacks by Statistic Alignment.
- [IJCAI 2021] Dual Reweighting Domain Generalization for Face Presentation Attack Detection.
- [IJCAI 2021] AVA: Adversarial Vignetting Attack against Visual Recognition.
- [IJCAI 2021] Adv-Makeup: A New Imperceptible and Transferable Attack on Face Recognition.
- [IJCAI 2021] On Cycles, Attackers and Supporters - A Contribution to The Investigation of Dynamics in Abstract Argumentation.
- [IJCAI 2021] Multi-Agent Abstract Argumentation Frameworks With Incomplete Knowledge of Attacks.
- [IJCAI 2021] Understanding Structural Vulnerability in Graph Convolutional Networks.
- [IJCAI 2021] InverseNet: Augmenting Model Extraction Attacks with Training Data Inversion.
- [IJCAI 2021] Smart Contract Vulnerability Detection: From Pure Neural Network to Interpretable Graph Feature and Expert Pattern Fusion.
- [IJCAI 2021] Demiguise Attack: Crafting Invisible Semantic Adversarial Perturbations with Perceptual Similarity.
- [IJCAI 2021] Against Membership Inference Attack: Pruning is All You Need.
- [IJCAI 2021] Reinforcement Learning Based Sparse Black-box Adversarial Attack on Video Recognition Models.
- [IJCAI 2021] BESA: BERT-based Simulated Annealing for Adversarial Text Attacks.
- [IJCAI 2021] Graph Universal Adversarial Attacks: A Few Bad Actors Ruin Graph Learning Models.
- [IJCAI 2021] Fine-tuning Is Not Enough: A Simple yet Effective Watermark Removal Attack for DNN Models.
- [IJCAI 2021] BACKDOORL: Backdoor Attack against Competitive Reinforcement Learning.
- [IJCAI 2021] A Survey on Universal Adversarial Attack.
- [IJCAI 2022] PPT: Backdoor Attacks on Pre-trained Models via Poisoned Prompt Tuning.
- [IJCAI 2022] Anti-Forgery: Towards a Stealthy and Robust DeepFake Disruption Attack via Adversarial Perceptual-aware Perturbations.
- [IJCAI 2022] Cluster Attack: Query-based Adversarial Attacks on Graph with Graph-Dependent Priors.
- [IJCAI 2022] A Unified Framework for Adversarial Attack and Defense in Constrained Feature Space.
- [IJCAI 2022] Imperceptible Backdoor Attack: From Input Space to Feature Representation.
- [IJCAI 2022] Sample Complexity Bounds for Robustly Learning Decision Lists against Evasion Attacks.
- [IJCAI 2022] To Trust or Not To Trust Prediction Scores for Membership Inference Attacks.
- [IJCAI 2022] Online Evasion Attacks on Recurrent Models: The Power of Hallucinating the Future.
- [IJCAI 2022] A Few Seconds Can Change Everything: Fast Decision-based Attacks against DNNs.
- [IJCAI 2022] Understanding the Limits of Poisoning Attacks in Episodic Reinforcement Learning.
- [IJCAI 2022] Exploring the Vulnerability of Deep Reinforcement Learning-based Emergency Control for Low Carbon Power Systems.
- [IJCAI 2022] Data-Efficient Backdoor Attacks.
- [IJCAI 2022] Logically Consistent Adversarial Attacks for Soft Theorem Provers.
- [IJCAI 2022] An Online Learning Approach towards Far-sighted Emergency Relief Planning under Intentional Attacks in Conflict Areas.
- [IJCAI 2022] On Attacking Out-Domain Uncertainty Estimation in Deep Neural Networks.
- [IJCAI 2022] A Survey on Gradient Inversion: Attacks, Defenses and Future Directions.
- [IJCAI 2023] Towards Semantics- and Domain-Aware Adversarial Attacks.
- [IJCAI 2023] Spatially Constrained Adversarial Attack Detection and Localization in the Representation Space of Optical Flow Networks.
- [IJCAI 2023] Character As Pixels: A Controllable Prompt Adversarial Attacking Framework for Black-Box Text Guided Image Generation Models.
- [IJCAI 2023] Boosting Decision-Based Black-Box Adversarial Attack with Gradient Priors.
- [IJCAI 2023] Black-Box Data Poisoning Attacks on Crowdsourcing.
- [IJCAI 2023] Strategic Adversarial Attacks in AI-assisted Decision Making to Reduce Human Trust and Reliance.
- [IJCAI 2023] Poisoning the Well: Can We Simultaneously Attack a Group of Learning Agents?
- [IJCAI 2023] Denial-of-Service or Fine-Grained Control: Towards Flexible Model Poisoning Attacks on Federated Learning.
- [IJCAI 2023] Preventing Attacks in Interbank Credit Rating with Selective-aware Graph Neural Network.
- [IJCAI 2024] BadFusion: 2D-Oriented Backdoor Attacks against 3D Object Detection.
- [IJCAI 2024] Detecting and Understanding Vulnerabilities in Language Models via Mechanistic Interpretability.
- [IJCAI 2024] Protecting Object Detection Models from Model Extraction Attack via Feature Space Coverage.
- [IJCAI 2024] EAB-FL: Exacerbating Algorithmic Bias through Model Poisoning Attacks in Federated Learning.
- [IJCAI 2024] When Fairness Meets Privacy: Exploring Privacy Threats in Fair Binary Classifiers via Membership Inference Attacks.
- [IJCAI 2024] On the Effects of Fairness to Adversarial Vulnerability.
- [IJCAI 2024] BADFSS: Backdoor Attacks on Federated Self-Supervised Learning.
- [IJCAI 2024] A General Black-box Adversarial Attack on Graph-based Fake News Detectors.
- [IJCAI 2024] Imperio: Language-Guided Backdoor Attacks for Arbitrary Model Control.
- [IJCAI 2024] Unified Physical-Digital Face Attack Detection.
- [IJCAI 2024] IntensPure: Attack Intensity-aware Secondary Domain Adaptive Diffusion for Adversarial Purification.
- [IJCAI 2024] Advancing Generalized Transfer Attack with Initialization Derived Bilevel Optimization and Dynamic Sequence Truncation.
- [IJCAI 2024] A SAT Solver + Computer Algebra Attack on the Minimum Kochen-Specker Problem.
- [IJCAI 2024] Vulnerabilities of Single-Round Incentive Compatibility in Auto-bidding: Theory and Evidence from ROI-Constrained Online Advertising Markets.
- [IJCAI 2024] Justifying Argument Acceptance with Collective Attacks: Discussions and Disputes.
- [IJCAI 2024] Explaining Arguments’ Strength: Unveiling the Role of Attacks and Supports.
- [IJCAI 2024] EFEVD: Enhanced Feature Extraction for Smart Contract Vulnerability Detection.
- [IJCAI 2024] DarkFed: A Data-Free Backdoor Attack in Federated Learning.
- [IJCAI 2024] Mean Aggregator Is More Robust than Robust Aggregators under Label Poisoning Attacks.
- [IJCAI 2024] Shadow-Free Membership Inference Attacks: Recommender Systems Are More Vulnerable Than You Thought.
- [IJCAI 2024] VF-Detector: Making Multi-Granularity Code Changes on Vulnerability Fix Detector Robust to Mislabeled Changes.
- [IJCAI 2024] Vision-fused Attack: Advancing Aggressive and Stealthy Adversarial Text against Neural Machine Translation.
- [IJCAI 2024] Practical Anytime Algorithms for Judicious Partitioning of Active Directory Attack Graphs.
- [IJCAI 2024] VulnerabilityMap: An Open Framework for Mapping Vulnerability among Urban Disadvantaged Populations in the United States.
- [IJCAI 2024] Safeguarding Fraud Detection from Attacks: A Robust Graph Learning Approach.
- [IJCAI 2024] Defending Against Backdoor Attacks by Layer-wise Feature Analysis (Extended Abstract).
- [IJCAI 2024] AADMIP: Adversarial Attacks and Defenses Modeling in Industrial Processes.
- [COLT 2021] Robust learning under clean-label attack.
- [COLT 2022] Robustly-reliable learners under poisoning attacks.
- [EMNLP 2017] Identifying attack and support argumentative relations using deep learning.
- [EMNLP 2018] Extractive Adversarial Networks: High-Recall Explanations for Identifying Personal Attacks in Social Media Posts.
- [EMNLP 2019] Universal Adversarial Triggers for Attacking and Analyzing NLP.
- [EMNLP 2019] Evaluating adversarial attacks against multiple fact verification systems.
- [EMNLP 2019] Build it Break it Fix it for Dialogue Safety: Robustness from Adversarial Human Attack.
- [EMNLP 2019] Learning to Discriminate Perturbations for Blocking Adversarial Attacks in Text Classification.
- [EMNLP 2020] Detecting Attackable Sentences in Arguments.
- [EMNLP 2020] Adversarial Attack and Defense of Structured Prediction Models.
- [EMNLP 2020] Imitation Attacks and Defenses for Black-box Machine Translation Systems.
- [EMNLP 2020] T3: Tree-Autoencoder Constrained Adversarial Text Generation for Targeted Attack.
- [EMNLP 2020] BERT-ATTACK: Adversarial Attack Against BERT Using BERT.
- [EMNLP 2020] Detecting Word Sense Disambiguation Biases in Machine Translation for Model-Agnostic Adversarial Attacks.
- [EMNLP 2021] On the Transferability of Adversarial Attacks against Neural Text Classifier.
- [EMNLP 2021] Reconstruction Attack on Instance Encoding for Language Understanding.
- [EMNLP 2021] Backdoor Attacks on Pre-trained Models by Layerwise Weight Poisoning.
- [EMNLP 2021] Multi-granularity Textual Adversarial Attack with Behavior Cloning.
- [EMNLP 2021] Mind the Style of Text! Adversarial and Backdoor Attacks Based on Text Style Transfer.
- [EMNLP 2021] Adversarial Attack against Cross-lingual Knowledge Graph Alignment.
- [EMNLP 2021] Gradient-based Adversarial Attacks against Text Transformers.
- [EMNLP 2021] Don’t Search for a Search Method - Simple Heuristics Suffice for Adversarial Text Attacks.
- [EMNLP 2021] Adversarial Attacks on Knowledge Graph Embeddings via Instance Attribution Methods.
- [EMNLP 2021] RAP: Robustness-Aware Perturbations for Defending against Backdoor Attacks on NLP Models.
- [EMNLP 2021] A Strong Baseline for Query Efficient Attacks in a Black Box Setting.
- [EMNLP 2021] ONION: A Simple and Effective Defense Against Textual Backdoor Attacks.
- [EMNLP 2022] Backdoor Attacks in Federated Learning by Rare Embeddings and Gradient Ensembling.
- [EMNLP 2022] TABS: Efficient Textual Adversarial Attack for Pre-trained NL Code Model Using Semantic Beam Search.
- [EMNLP 2022] Character-level White-Box Adversarial Attacks against Transformers via Attachable Subwords Substitution.
- [EMNLP 2022] Quantifying Privacy Risks of Masked Language Models Using Membership Inference Attacks.
- [EMNLP 2022] Textual Backdoor Attacks Can Be More Harmful via Two Simple Tricks.
- [EMNLP 2022] TASA: Deceiving Question Answering Models by Twin Answer Sentences Attack.
- [EMNLP 2023] Mitigating Backdoor Poisoning Attacks through the Lens of Spurious Correlation.
- [EMNLP 2023] Ignore This Title and HackAPrompt: Exposing Systemic Vulnerabilities of LLMs Through a Global Prompt Hacking Competition.
- [EMNLP 2023] CT-GAT: Cross-Task Generative Adversarial Attack based on Transferability.
- [EMNLP 2023] VECHR: A Dataset for Explainable and Robust Classification of Vulnerability Type in the European Court of Human Rights.
- [EMNLP 2023] Prompt as Triggers for Backdoor Attack: Examining the Vulnerability in Language Models.
- [EMNLP 2023] MeaeQ: Mount Model Extraction Attacks with Efficient Queries.
- [EMNLP 2023] Joint Geometrical and Statistical Domain Adaptation for Cross-domain Code Vulnerability Detection.
- [EMNLP 2023] “Are Your Explanations Reliable?” Investigating the Stability of LIME in Explaining Text Classifiers by Marrying XAI and Adversarial Attack.
- [EMNLP 2023] MoPe: Model Perturbation based Privacy Attacks on Language Models.
- [EMNLP 2024] Glue pizza and eat rocks - Exploiting Vulnerabilities in Retrieval-Augmented Generative Models.
- [EMNLP 2024] DA³: A Distribution-Aware Adversarial Attack against Language Models.
- [EMNLP 2024] An Inversion Attack Against Obfuscated Embedding Matrix in Language Model Inference.
- [EMNLP 2024] ASETF: A Novel Method for Jailbreak Attack on LLMs through Translate Suffix Embeddings.
- [EMNLP 2024] Adaptive Immune-based Sound-Shape Code Substitution for Adversarial Chinese Text Attacks.
- [EMNLP 2024] Towards Understanding Jailbreak Attacks in LLMs: A Representation Space Analysis.
- [EMNLP 2024] Is LLM-as-a-Judge Robust? Investigating Universal Adversarial Attacks on Zero-shot LLM Assessment.
- [EMNLP 2024] Muting Whisper: A Universal Acoustic Adversarial Attack on Speech Foundation Models.
- [EMNLP 2024] RealVul: Can We Detect Vulnerabilities in Web Applications with LLM?
- [EMNLP 2024] The Best Defense is Attack: Repairing Semantics in Textual Adversarial Examples.
- [EMNLP 2024] CleanGen: Mitigating Backdoor Attacks for Generation Tasks in Large Language Models.
- [EMNLP 2024] Universal Vulnerabilities in Large Language Models: Backdoor Attacks for In-context Learning.
- [EMNLP 2024] Applying Contrastive Learning to Code Vulnerability Type Classification.
- [EMNLP 2024] Defending Against Social Engineering Attacks in the Age of LLMs.
- [EMNLP 2024] Large Language Models Are Involuntary Truth-Tellers: Exploiting Fallacy Failure for Jailbreak Attacks.
- [EMNLP 2024] Shortcuts Arising from Contrast: Towards Effective and Lightweight Clean-Label Attacks in Prompt-Based Learning.
- [EMNLP 2024] BaitAttack: Alleviating Intention Shift in Jailbreak Attacks via Adaptive Bait Crafting.
- [EMNLP 2024] Distract Large Language Models for Automatic Jailbreak Attack.
- [EMNLP 2024] RAFT: Realistic Attacks to Fool Text Detectors.
- [EMNLP 2024] Revisiting the Robustness of Watermarking to Paraphrasing Attacks.
- [EMNLP 2024] User Inference Attacks on Large Language Models.
- [ECAI 2010] Acceptability semantics accounting for strength of attacks in argumentation.
- [ECAI 2012] Adversarial Label Flips Attack on Support Vector Machines.
- [ECAI 2014] Election Attacks with Few Candidates.
- [ECAI 2016] Using a Deep Understanding of Network Activities for Network Vulnerability Assessment.
- [ECAI 2020] Decoding the Imitation Security Game: Handling Attacker Imitative Behavior Deception.
- [ECAI 2020] Tackling Imitative Attacker Deception in Repeated Bayesian Stackelberg Security Games.
- [ECAI 2020] Dynamics in Abstract Argumentation Frameworks with Recursive Attack and Support Relations.
- [ECAI 2020] On the Relation Between Claim-Augmented Argumentation Frameworks and Collective Attacks.
- [ECAI 2020] Black-Box Adversarial Attacks Against Deep Learning Based Malware Binaries Detection with GAN.
- [ECAI 2023] TrojBits: A Hardware Aware Inference-Time Attack on Transformer-Based Language Models.
- [ECAI 2023] Robust Federated Learning Method Against Data and Model Poisoning Attacks with Heterogeneous Data Distribution.
- [ECAI 2023] On the Robustness of Split Learning Against Adversarial Attacks.
- [ECAI 2023] Is Performance Fairness Achievable in Presence of Attackers Under Federated Learning?
- [ECAI 2023] Exploring the Feasibility of Physical Adversarial Attacks: A Cybersecurity Study.
- [ECAI 2023] GraphSA: Smart Contract Vulnerability Detection Combining Graph Neural Networks and Static Analysis.
- [ECAI 2023] Preserving Semantics in Textual Adversarial Attacks.
- [ECAI 2023] FedPerturb: Covert Poisoning Attack on Federated Learning via Partial Perturbation.
- [ECAI 2023] Stackelberg Attacks on Auctions and Blockchain Transaction Fee Mechanisms.
- [ECAI 2023] Fingerprint Attack: Client De-Anonymization in Federated Learning.
- [ECAI 2023] Invisible Backdoor Attacks Using Data Poisoning in Frequency Domain.
- [ECAI 2024] MakeupAttack: Feature Space Black-Box Backdoor Attack on Face Recognition via Makeup Transfer.
- [ECAI 2024] IPA-NeRF: Illusory Poisoning Attack Against Neural Radiance Fields.
- [ECAI 2024] Detecting Patterns of Attacks to Network Security in Urban Air Mobility with Answer Set Programming.
- [ECAI 2024] Artwork Protection Against Neural Style Transfer Using Locally Adaptive Adversarial Color Attack.
- [ECAI 2024] TSFool: Crafting Highly-Imperceptible Adversarial Time Series Through Multi-Objective Attack.
- [ECAI 2024] Efficient Model-Stealing Attacks Against Inductive Graph Neural Networks.
- [ECAI 2024] Sampling-Based Teacher Guided Method to Boost Transferable Attack on SAR Image Classification.
- [ECAI 2024] Target-driven Attack for Large Language Models.
- [ECAI 2024] A Data-Driven Defense Against Edge-Case Model Poisoning Attacks on Federated Learning.
- [ECAI 2024] Adversarial Attack for Explanation Robustness of Rationalization Models.
- [ECAI 2024] Assessing Privacy Risks of Attribute Inference Attacks Against Speech-Based Depression Detection System.
- [ECCV 2020] Targeted Attack for Deep Hashing Based Retrieval.
- [ECCV 2020] Making an Invisibility Cloak: Real World Adversarial Attacks on Object Detectors.
- [ECCV 2020] Indirect Local Attacks for Context-Aware Semantic Segmentation Networks.
- [ECCV 2022] Exploring the Devil in Graph Spectral Domain for 3D Point Cloud Attacks.
- [ECCV 2022] Shape Matters: Deformable Patch Attack.
- [ECCV 2022] Frequency Domain Model Augmentation for Adversarial Attack.
- [ECCV 2022] A Large-Scale Multiple-objective Method for Black-box Attack Against Object Detection.
- [ECCV 2022] GradAuto: Energy-Oriented Attack on Dynamic Neural Networks.
- [ECCV 2022] RIBAC: Towards Robust and Imperceptible Backdoor Attack against Compact DNN.
- [ECCV 2022] Adaptive Image Transformations for Transfer-Based Adversarial Attack.
- [ECCV 2022] AdvDO: Realistic Adversarial Attacks for Trajectory Prediction.
- [ECCV 2022] Hardly Perceptible Trojan Attack Against Neural Networks with Bit Flips.
- [ECCV 2022] Triangle Attack: A Query-Efficient Decision-Based Adversarial Attack.
- [ECCV 2022] Black-Box Dissector: Towards Erasing-Based Hard-Label Model Stealing Attack.
- [ECCV 2022] Adversarial Label Poisoning Attack on Graph Neural Networks via Label Propagation.
- [ECCV 2022] Zero-Shot Attribute Attacks on Fine-Grained Recognition Models.
- [ECCV 2022] Exploiting the Local Parabolic Landscapes of Adversarial Losses to Accelerate Black-Box Adversarial Attack.
- [ECCV 2022] Effective Presentation Attack Detection Driven by Face Related Task.
- [ICRA 2013] A flapping-wing microrobot with a differential angle-of-attack mechanism.
- [ICRA 2017] Development of a block machine for volleyball attack training.
- [ICRA 2018] Cross-Layer Retrofitting of UAVs Against Cyber-Physical Attacks.
- [ICRA 2020] Distributed Attack-Robust Submodular Maximization for Multi-Robot Planning.
- [ICRA 2020] Learn-to-Recover: Retrofitting UAVs with Reinforcement Learning-Assisted Flight Control Under Cyber-Physical Attacks.
- [ICRA 2021] Adversarial Attacks on Optimization based Planners.
- [ICRA 2021] Secure Planning Against Stealthy Attacks via Model-Free Reinforcement Learning.
- [ICRA 2022] Ad2Attack: Adaptive Adversarial Attack on Real-Time UAV Tracking.
- [ICRA 2022] Targeted Attack on Deep RL-based Autonomous Driving with Learned Visual Patterns.
- [ICRA 2023] Stealthy Perception-based Attacks on Unmanned Aerial Vehicles.
- [ICRA 2023] Robot Mimicry Attack on Keystroke-Dynamics User Identification and Authentication System.
- [ICRA 2024] Physical and Digital Adversarial Attacks on Grasp Quality Networks.
- [ICRA 2024] Learning Generalizable Patrolling Strategies through Domain Randomization of Attacker Behaviors.
- [ICRA 2024] Fault Tolerant Neural Control Barrier Functions for Robotic Systems under Sensor Faults and Attacks.
- [ICRA 2024] Characterizing Physical Adversarial Attacks on Robot Motion Planners.
- [ICRA 2024] AdvGPS: Adversarial GPS for Multi-Agent Perception Attack.
- [COLING 2020] Don’t take “nswvtnvakgxpm” for an answer -The surprising vulnerability of automatic content scoring systems to adversarial input.
- [COLING 2020] Enhancing Neural Models with Vulnerability via Adversarial Attack.
- [COLING 2020] Contrastive Zero-Shot Learning for Cross-Domain Slot Filling with Adversarial Attack.
- [COLING 2020] A Geometry-Inspired Attack for Generating Natural Language Adversarial Examples.
- [COLING 2022] Where to Attack: A Dynamic Locator Model for Backdoor Attack in Text Classifications.
- [COLING 2022] Student Surpasses Teacher: Imitation Attack for Black-Box NLP APIs.
- [COLING 2022] PlugAT: A Plug and Play Module to Defend against Textual Adversarial Attack.
- [COLING 2022] PARSE: An Efficient Search Method for Black-box Adversarial Text Attacks.
- [COLING 2022] Learn2Weight: Parameter Adaptation against Similar-domain Adversarial Attacks.
- [COLING 2024] Attack Named Entity Recognition by Entity Boundary Interference.
- [COLING 2024] Enhance Robustness of Language Models against Variation Attack through Graph Integration.
- [COLING 2024] Humanizing Machine-Generated Content: Evading AI-Text Detection through Adversarial Attack.
- [COLING 2024] Rethinking Word-level Adversarial Attack: The Trade-off between Efficiency, Effectiveness, and Imperceptibility.
- [COLING 2024] Revisiting Data Reconstruction Attacks on Real-world Dataset for Federated Natural Language Understanding.
- [COLING 2024] Unveiling Vulnerability of Self-Attention.
- [COLING 2024] XAI-Attack: Utilizing Explainable AI to Find Incorrectly Learned Patterns for Black-Box Adversarial Example Creation.
- [COLING 2024] XVD: Cross-Vocabulary Differentiable Training for Generative Adversarial Attacks.
- [COLING 2025] Exploring Backdoor Vulnerabilities of Chat Models.
- [COLING 2025] Monte Carlo Tree Search Based Prompt Autogeneration for Jailbreak Attacks against LLMs.
- [COLING 2025] Gradient Inversion Attack in Federated Learning: Exposing Text Data through Discrete Optimization.
- [COLING 2025] RoleBreak: Character Hallucination as a Jailbreak Attack in Role-Playing Systems.
- [COLING 2025] Unraveling the Mystery: Defending Against Jailbreak Attacks Via Unearthing Real Intention.
- [COLING 2025] BinarySelect to Improve Accessibility of Black-Box Attack Research.
- [KR 2012] Weighted Attacks in Argumentation Frameworks.
- [KR 2020] Bipolar Abstract Argumentation with Dual Attacks and Supports.
- [KR 2021] Reasoning over Attack-incomplete AAFs in the Presence of Correlations.
- [KR 2022] Rediscovering Argumentation Principles Utilizing Collective Attacks.
- [KR 2024] Weak Admissibility for ABA via Abstract Set-Attacks.
- [UAI 2012] Interdependent Defense Games: Modeling Interdependent Security under Deliberate Attacks.
- [UAI 2020] Robust Collective Classification against Structural Attacks.
- [UAI 2021] Defending SVMs against poisoning attacks: the hardness and DBSCAN approach.
- [UAI 2021] Investigating vulnerabilities of deep neural policies.
- [UAI 2022] Data poisoning attacks on off-policy policy evaluation methods.
- [UAI 2022] Robust textual embedding against word-level adversarial attacks.
- [UAI 2022] Research on video adversarial attack with long living cycle.
- [UAI 2023] MFA: Multi-layer Feature-aware Attack for Object Detection.
- [UAI 2023] Two-phase Attacks in Security Games.
- [UAI 2023] Learning To Invert: Simple Adaptive Attacks for Gradient Inversion in Federated Learning.
- [UAI 2024] Center-Based Relaxed Learning Against Membership Inference Attacks.
- [UAI 2024] Characterizing Data Point Vulnerability as Average-Case Robustness.
- [UAI 2024] Fast Reliability Estimation for Neural Networks with Adversarial Attack-Driven Importance Sampling.
- [ATAL 2010] Model checking detectability of attacks in multiagent systems.
- [ATAL 2011] An investigation of the vulnerabilities of scale invariant dynamics in large teams.
- [ATAL 2012] Solving non-zero sum multiagent network flow security games with attack costs.
- [ATAL 2013] Optimal interdiction of attack plans.
- [ATAL 2013] Security games with surveillance cost and optimal timing of attack execution.
- [ATAL 2014] Opponent-driven planning and execution for pass, attack, and defense in a multi-robot soccer team.
- [ATAL 2014] Multi-robot adversarial patrolling: facing coordinated attacks.
- [ATAL 2014] Open census for addressing false identity attacks in agent-based decentralized social networks.
- [ATAL 2015] Robust Strategy against Unknown Risk-averse Attackers in Security Games.
- [ATAL 2015] Game-Theoretic Algorithms for Optimal Network Security Hardening Using Attack Graphs.
- [ATAL 2015] To Handle, to Learn and to Manipulate the Attacker’s (Uncertain) Payoffs in Security Games: Doctoral Consortium.
- [ATAL 2016] On Learning Attacks in Probabilistic Abstract Argumentation.
- [ATAL 2017] Real-World Evaluation and Deployment of Adversary Attack Prediction Models.
- [ATAL 2018] Diversified Strategies for Mitigating Adversarial Attacks in Multiagent Systems.
- [ATAL 2018] Robust Deep Reinforcement Learning with Adversarial Attacks.
- [ATAL 2019] Attacking Similarity-Based Link Prediction in Social Networks.
- [ATAL 2019] How You Act Tells a Lot: Privacy-Leaking Attack on Deep Reinforcement Learning.
- [ATAL 2019] Attacking Power Indices by Manipulating Player Reliability.
- [ATAL 2019] Patrol Scheduling Against Adversaries with Varying Attack Durations.
- [ATAL 2019] Gradual Semantics Accounting for Varied-Strength Attacks.
- [ATAL 2019] Attack-Resilient Connectivity Game for UAV Networks using Generative Adversarial Learning.
- [ATAL 2019] Delayed and Time-Variant Patrolling Strategies against Attackers with Local Observation Capabilities.
- [ATAL 2019] General-Sum Cyber Deception Games under Partial Attacker Valuation Information.
- [ATAL 2019] Masquerade Attack Detection Through Observation Planning for Multi-Robot Systems.
- [ATAL 2020] CopyCAT: : Taking Control of Neural Policies with Constant Attacks.
- [ATAL 2020] Snooping Attacks on Deep Reinforcement Learning.
- [ATAL 2020] A POMDP-based Method for Analyzing Blockchain System Security Against Long Delay Attack: (Extended Abstract).
- [ATAL 2021] Cyber Attack Intent Recognition and Active Deception using Factored Interactive POMDPs.
- [ATAL 2021] Transferable Environment Poisoning: Training-time Attack on Reinforcement Learning.
- [ATAL 2021] ADT2AMAS: Managing Agents in Attack-Defence Scenarios.
- [ATAL 2022] Characterizing Attacks on Deep Reinforcement Learning.
- [ATAL 2022] Properties of Reputation Lag Attack Strategies.
- [ATAL 2022] Spiking Pitch Black: Poisoning an Unknown Environment to Attack Unknown Reinforcement Learners.
- [ATAL 2022] Multi-Agent Adversarial Attacks for Multi-Channel Communications.
- [ATAL 2022] The Reputation Lag Attack.
- [ATAL 2022] Transferable Environment Poisoning: Training-time Attack on Reinforcement Learner with Limited Prior Knowledge.
- [ATAL 2023] Implicit Poisoning Attacks in Two-Agent Reinforcement Learning: Adversarial Policies for Training-Time Attacks.
- [ATAL 2023] Grey-box Adversarial Attack on Communication in Multi-agent Reinforcement Learning.
- [ATAL 2023] HoLA Robots: Mitigating Plan-Deviation Attacks in Multi-Robot Systems with Co-Observations and Horizon-Limiting Announcements.
- [ATAL 2023] Optimal Decoy Resource Allocation for Proactive Defense in Probabilistic Attack Graphs.
- [ATAL 2023] Know Your Enemy: Identifying and Adapting to Adversarial Attacks in Deep Reinforcement Learning.
- [ATAL 2024] Multi-Agent Reinforcement Learning for Assessing False-Data Injection Attacks on Transportation Networks.
- [ATAL 2024] Attacking Multi-Player Bandits and How to Robustify Them.
- [ATAL 2024] Adaptive Discounting of Training Time Attacks.
- [ATAL 2024] Evaluation of Robustness of Off-Road Autonomous Driving Segmentation against Adversarial Attacks: A Dataset-Centric Study.
- [ATAL 2024] Consensus of Nonlinear Multi-Agent Systems with Semi-Markov Switching Under DoS Attacks.
- [PPSN 2022] Attention-Based Genetic Algorithm for Adversarial Attack in Natural Language Processing.
- [PPSN 2024] Attacker-Defender Strategy Optimization Using Multi-objective Competitive Co-Evolution.
- [NAACL 2013] Supersense Tagging for Arabic: the MT-in-the-Middle Attack.
- [NAACL 2018] Detecting Denial-of-Service Attacks from Social Media Text: Applying NLP to Computer Security.
- [NAACL 2019] White-to-Black: Efficient Distillation of Black-Box Adversarial Attacks.
- [NAACL 2019] Text Processing Like Humans Do: Visually Attacking and Shielding NLP Systems.
- [NAACL 2021] Concealed Data Poisoning Attacks on NLP Models.
- [NAACL 2021] Certified Robustness to Word Substitution Attack with Differential Privacy.
- [NAACL 2021] Be Careful about Poisoned Word Embeddings: Exploring the Vulnerability of the Embedding Layers in NLP Models.
- [NAACL 2021] Universal Adversarial Attacks with Natural Triggers for Text Classification.
- [NAACL 2021] Dynamically Disentangling Social Bias from Task-Oriented Representations with Adversarial Attack.
- [NAACL 2021] Grey-box Adversarial Attack And Defence For Sentiment Classification.
- [NAACL 2021] Contextualized Perturbation for Textual Adversarial Attack.
- [NAACL 2022] A Word is Worth A Thousand Dollars: Adversarial Attack on Tweets Fools Stock Prediction.
- [NAACL 2022] Don’t sweat the small stuff, classify the rest: Sample Shielding to protect text classifiers against adversarial attacks.
- [NAACL 2022] Triggerless Backdoor Attack for NLP Tasks with Clean Labels.
- [NAACL 2022] Residue-Based Natural Language Adversarial Attack Detection.
- [NAACL 2024] Query-Efficient Textual Adversarial Example Generation for Black-Box Attacks.
- [NAACL 2024] VertAttack: Taking Advantage of Text Classifiers’ Horizontal Vision.
- [NAACL 2024] Navigation as Attackers Wish? Towards Building Robust Embodied Agents under Federated Learning.
- [NAACL 2024] How Trustworthy are Open-Source LLMs? An Assessment under Malicious Demonstrations Shows their Vulnerabilities.
- [NAACL 2024] ChatGPT as an Attack Tool: Stealthy Textual Backdoor Attack via Blackbox Generative Model Trigger.
- [NAACL 2024] Instructions as Backdoors: Backdoor Vulnerabilities of Instruction Tuning for Large Language Models.
- [NAACL 2024] Backdoor Attacks on Multilingual Machine Translation.
- [NAACL 2024] LinkPrompt: Natural and Universal Adversarial Attacks on Prompt-based Language Models.
- [NAACL 2024] Attacks, Defenses and Evaluations for LLM Conversation Safety: A Survey.
- [NAACL 2024] Defining and Detecting Vulnerability in Human Evaluation Guidelines: A Preliminary Study Towards Reliable NLG Evaluation.
- [NAACL 2024] SemRoDe: Macro Adversarial Training to Learn Representations that are Robust to Word-Level Attacks.
- [NAACL 2025] Stealthy Jailbreak Attacks on Large Language Models via Benign Data Mirroring.
- [NAACL 2025] Tricking Retrievers with Influential Tokens: An Efficient Black-Box Corpus Poisoning Attack.
- [NAACL 2025] CVE-Bench: Benchmarking LLM-based Software Engineering Agent’s Ability to Repair Real-World CVE Vulnerabilities.
- [NAACL 2025] On the Vulnerability of Text Sanitization.
- [NAACL 2025] Stronger Universal and Transferable Attacks by Suppressing Refusals.
- [NAACL 2025] PoisonedParrot: Subtle Data Poisoning Attacks to Elicit Copyright-Infringing Content from Large Language Models.
- [NAACL 2025] B⁴: A Black-Box Scrubbing Attack on LLM Watermarks.
- [NAACL 2025] QAVA: Query-Agnostic Visual Attack to Large Vision-Language Models.
- [NAACL 2025] Layer-Level Self-Exposure and Patch: Affirmative Token Mitigation for Jailbreak Attack Defense.
- [NAACL 2025] Typographic Attacks in a Multi-Image Setting.
- [NAACL 2025] Defense against Prompt Injection Attacks via Mixture of Encodings.
- [NAACL 2025] Tighter Clusters, Safer Code? Improving Vulnerability Detection with Enhanced Contrastive Loss.
- [NAACL 2025] Paraphrasing Attack Resilience of Various Machine-Generated Text Detection Methods.
- [AISTATS 2019] Defending against Whitebox Adversarial Attacks via Randomized Discretization.
- [AISTATS 2020] Robustness for Non-Parametric Classification: A Generic Attack and Defense.
- [AISTATS 2020] Wasserstein Smoothing: Certified Robustness against Wasserstein Adversarial Attacks.
- [AISTATS 2021] Learning to Defend by Learning to Attack.
- [AISTATS 2021] Stochastic Linear Bandits Robust to Adversarial Attacks.
- [AISTATS 2021] Free-rider Attacks on Model Aggregation in Federated Learning.
- [AISTATS 2021] Detection and Defense of Topological Adversarial Attacks on Graphs.
- [AISTATS 2021] Nonlinear Projection Based Gradient Estimation for Query Efficient Blackbox Attacks.
- [AISTATS 2022] Robust Stochastic Linear Contextual Bandits Under Adversarial Attacks.
- [AISTATS 2022] SparseFed: Mitigating Model Poisoning Attacks in Federated Learning with Sparsification.
- [AISTATS 2022] On Global-view Based Defense via Adversarial Attack and Defense Risk Guaranteed Bounds.
- [AISTATS 2023] Characterizing Internal Evasion Attacks in Federated Learning.
- [AISTATS 2023] Membership Inference Attacks against Synthetic Data through Overfitting Detection.
- [AISTATS 2023] Does Label Differential Privacy Prevent Label Inference Attacks?
- [AISTATS 2023] Active Membership Inference Attack under Local Differential Privacy in Federated Learning.
- [AISTATS 2024] A White-Box False Positive Adversarial Attack Method on Contrastive Loss Based Offline Handwritten Signature Verification Models.
- [AISTATS 2024] Effect of Ambient-Intrinsic Dimension Gap on Adversarial Vulnerability.
- [AISTATS 2024] Near Optimal Adversarial Attacks on Stochastic Bandits and Defenses with Smoothed Responses.
- [AISTATS 2024] Optimal Zero-Shot Detector for Multi-Armed Attacks.
- [AISTATS 2024] Invariant Aggregator for Defending against Federated Backdoor Attacks.
- [AISTATS 2024] On the Vulnerability of Fairness Constrained Learning to Malicious Noise.
- [ACCV 2020] Vax-a-Net: Training-Time Defence Against Adversarial Patch Attacks.
- [ACCV 2022] Decision-Based Black-Box Attack Specific to Large-Size Images.
- [ACML 2019] SDC-causing Error Detection Based on Lightweight Vulnerability Prediction.
- [ACML 2021] Local Aggressive Adversarial Attacks on 3D Point Cloud.
- [ACML 2021] Beyond Lp Clipping: Equalization based Psychoacoustic Attacks against ASRs.
- [ACML 2022] Adversarial Laser Spot: Robust and Covert Physical-World Attack to DNNs.
- [ACML 2024] Membership Inference Attacks Against Time-Series Models.
- [ACML 2024] Diffusion-based Adversarial Attack to Automatic Speech Recognition.
- [ACML 2024] Chain Association-based Attacking and Shielding Natural Language Processing Systems.
- [BMVC 2016] Practical View on Face Presentation Attack Detection.
- [BMVC 2019] Exploring the Vulnerability of Single Shot Module in Object Detectors via Imperceptible Background Patches.
- [BMVC 2020] Robust Ensemble Model Training via Random Layer Sampling Against Adversarial Attack.
- [BMVC 2021] ZeBRA: Precisely Destroying Neural Networks with Zero-Data Based Repeated Bit Flip Attack.
- [BMVC 2021] Sparse Adversarial Video Attacks with Spatial Transformations.
- [BMVC 2021] Mitigating Reverse Engineering Attacks on Local Feature Descriptors.
- [BMVC 2021] On Adversarial Robustness of 3D Point Cloud Classification under Adaptive Attacks.
- [BMVC 2021] Generative Dynamic Patch Attack.
- [BMVC 2021] Selection of Source Images Heavily Influences the Effectiveness of Adversarial Attacks.
- [BMVC 2021] WAN: Watermarking Attack Network.
- [BMVC 2022] Privacy Vulnerability of Split Computing to Data-Free Model Inversion Attacks.
- [BMVC 2022] Check Your Other Door! Creating Backdoor Attacks in the Frequency Domain.
- [BMVC 2022] Universal Perturbation Attack on Differentiable No-Reference Image- and Video-Quality Metrics.
- [BMVC 2023] Backdoor Attack on Hash-based Image Retrieval via Clean-label Data Poisoning.
- [BMVC 2023] Semantic Adversarial Attacks via Diffusion Models.
- [BMVC 2023] Exploring Non-additive Randomness on ViT against Query-Based Black-Box Attacks.
- [BMVC 2023] ADoPT: LiDAR Spoofing Attack Detection Based on Point-Level Temporal Consistency.
- [BMVC 2023] Unifying the Harmonic Analysis of Adversarial Attacks and Robustness.
- [BMVC 2024] From Black-box to Label-only: a Plug-and-Play Attack Network for Model Inversion.
- [NLPCC 2022] PromptAttack: Prompt-Based Attack for Language Models via Gradient Search.
- [NLPCC 2023] Evaluation Framework for Poisoning Attacks on Knowledge Graph Embeddings.
- [NLPCC 2023] Imitation Attacks Can Steal More Than You Think from Machine Translation Systems.
- [NLPCC 2023] Punctuation Matters! Stealthy Backdoor Attack for Language Models.
- [NLPCC 2023] QAE: A Hard-Label Textual Attack Considering the Comprehensive Quality of Adversarial Examples.
- [NLPCC 2023] IMTM: Invisible Multi-trigger Multimodal Backdoor Attack.
- [NLPCC 2024] TARGET: Template-Transferable Backdoor Attack Against Prompt-Based NLP Models via GPT4.
- [GECCO 2019] Fitness comparison by statistical testing in construction of SAT-based guess-and-determine cryptographic attacks.
- [GECCO 2019] GenAttack: practical black-box attacks with gradient-free optimization.
- [GECCO 2020] Lateralized learning for robustness against adversarial attacks in a visual classification system.
- [GECCO 2021] Coevolutionary modeling of cyber attack patterns and mitigations using public datasets.
- [GECCO 2022] TAGA: a transfer-based black-box adversarial attack with genetic algorithms.
- [GECCO 2024] Pixel Logo Attack: Embedding Attacks as Logo-Like Pixels.
- [GECCO 2025] Black-Box Adversarial Attack on Dialogue Generation via Multi-Objective Optimization.
- [GECCO 2025] Adversarial attacks to image classification systems using evolutionary algorithms.
- [GECCO 2025] Gradient-Free Sparse Adversarial Attack on Object Detection Models.
- [ICTAI 2010] Dialectical Proofs Accounting for Strength of Attacks in Argumentation Systems.
- [ICTAI 2013] From Preferences over Arguments to Preferences over Attacks in Abstract Argumentation: A Comparative Study.
- [ICTAI 2014] A Risk Assessment and Alerting System for Maritime Attacks.
- [ICTAI 2017] A New Mimicking Attack by LSGAN.
- [ICTAI 2018] Detection of Shilling Attack Based on Bayesian Model and User Embedding.
- [ICTAI 2018] Logical Encoding of Argumentation Frameworks with Higher-Order Attacks.
- [ICTAI 2019] Reasoning About Future Cyber-Attacks Through Socio-Technical Hacking Information.
- [ICTAI 2019] Deep Learning Poison Data Attack Detection.
- [ICTAI 2019] Adversarial Attack Against DoS Intrusion Detection: An Improved Boundary-Based Method.
- [ICTAI 2019] Evaluating Different Metric Configurations of an Evolutionary Wrapper for Attack Detection.
- [ICTAI 2020] Fair Detection of Poisoning Attacks in Federated Learning.
- [ICTAI 2020] Studying Adversarial Attacks on Behavioral Cloning Dynamics.
- [ICTAI 2020] Adversarial Attack against LSTM-based DDoS Intrusion Detection System.
- [ICTAI 2020] Argumentation Frameworks with Higher-Order Attacks: Labellings and Complexity.
- [ICTAI 2021] Blur the Eyes of UAV: Effective Attacks on UAV-based Infrastructure Inspection.
- [ICTAI 2021] Stochastic sparse adversarial attacks.
- [ICTAI 2022] Towards Query-limited Adversarial Attacks on Graph Neural Networks.
- [ICTAI 2022] Detecting Backdoor Attacks on Deep Neural Networks Based on Model Parameters Analysis.
- [ICTAI 2022] RIA: A Reversible Network-based Imperceptible Adversarial Attack.
- [ICTAI 2022] Detecting DoS and DDoS Attacks through Sparse U-Net-like Autoencoders.
- [ICTAI 2024] Multi-type Vulnerability Detection with Staged Feature Fusion and Group Data Balance.
- [ICTAI 2024] Phoneme Substitution: A Novel Approach for Backdoor Attacks on Speech Recognition Systems.
- [ICTAI 2024] Boosting Imperceptibility of Adversarial Attacks for Environmental Sound Classification.
- [IROS 2014] Dynamic attack motion prediction for kendo agent.
- [IROS 2014] Attack resilient state estimation for autonomous robotic systems.
- [IROS 2018] Distributed Direction of Arrival Estimation-Aided Cyberattack Detection in Networked Multi-Robot Systems.
- [IROS 2019] Time-Varying Graph Patrolling Against Attackers with Locally Limited and Imperfect Observation Models.
- [IROS 2021] Adversarial Attacks on Camera-LiDAR Models for 3D Car Detection.
- [IROS 2021] Vulnerability of Connected Autonomous Vehicles Networks to Periodic Time-Varying Communication Delays of Certain Frequency.
- [IROS 2021] R-SNN: An Analysis and Design Methodology for Robustifying Spiking Neural Networks against Adversarial Attacks through Noise Filters for Dynamic Vision Sensors.
- [IROS 2021] The Pursuit and Evasion of Drones Attacking an Automated Turret.
- [IROS 2022] Resilient Detection and Recovery of Autonomous Systems Operating under On-board Controller Cyber Attacks.
- [IROS 2022] Particle Swarm Optimizer-based Attack Strategy with Swarm Robots.
- [IROS 2022] Adversarial Attacks on Monocular Pose Estimation.
- [IROS 2023] Helical Propulsion in Low-Re Numbers with Near-Zero Angle of Attack.
- [IROS 2023] Towards a Robust Adversarial Patch Attack Against Unmanned Aerial Vehicles Object Detection.
- [IROS 2023] Generation of Time-Varying Impedance Attacks Against Haptic Shared Control Steering Systems.
- [IROS 2023] Cyber-Attacks on Wheeled Mobile Robotic Systems with Visual Servoing Control.
- [IROS 2023] On Cyber-Attacks Mitigation for Distributed Trajectory Generators.
- [IROS 2023] Lateral-Direction Localization Attack in High-Level Autonomous Driving: Domain-Specific Defense Opportunity via Lane Detection.
- [IROS 2024] Adversarial Attack on Trajectory Prediction for Autonomous Vehicles with Generative Adversarial Networks.
- [IROS 2024] Model Agnostic Defense against Adversarial Patch Attacks on Object Detection in Unmanned Aerial Vehicles.
- [IROS 2024] Rain-Reaper: Unmasking LiDAR-based Detector Vulnerabilities in Rain.
- [IROS 2024] MIXED-SENSE: A Mixed Reality Sensor Emulation Framework for Test and Evaluation of UAVs Against False Data Injection Attacks.
- [IROS 2024] RoboCop: A Robust Zero-Day Cyber-Physical Attack Detection Framework for Robots.
- [IROS 2024] Malicious Path Manipulations via Exploitation of Representation Vulnerabilities of Vision-Language Navigation Systems.
- [ALT 2018] Learning under $p$-Tampering Attacks.
- [ICANN 2010] Detecting DDoS Attack towards DNS Server Using a Neural Network Classifier.
- [ICANN 2018] Classification of SIP Attack Variants with a Hybrid Self-enforcing Network.
- [ICANN 2019] Recovering Localized Adversarial Attacks.
- [ICANN 2019] Physical Adversarial Attacks by Projecting Perturbations.
- [ICANN 2019] Incremental Learning of GAN for Detecting Multiple Adversarial Attacks.
- [ICANN 2019] Towards Attention Based Vulnerability Discovery Using Source Code Representation.
- [ICANN 2020] An Efficient Blurring-Reconstruction Model to Defend Against Adversarial Attacks.
- [ICANN 2021] Adversarial Robustness in Deep Learning: Attacks on Fragile Neurons.
- [ICANN 2021] Multiple-Model Based Defense for Deep Reinforcement Learning Against Adversarial Attack.
- [ICANN 2021] Model Extraction and Adversarial Attacks on Neural Networks Using Switching Power Information.
- [ICANN 2021] Feature Creation Towards the Detection of Non-control-Flow Hijacking Attacks.
- [ICANN 2022] Nesterov Adam Iterative Fast Gradient Method for Adversarial Attacks.
- [ICANN 2022] PlAA: Pixel-level Adversarial Attack on Attention for Deep Neural Network.
- [ICANN 2022] Making Images Resilient to Adversarial Example Attacks.
- [ICANN 2022] Jacobian Ensembles Improve Robustness Trade-Offs to Adversarial Attacks.
- [ICANN 2022] Autonomous Driving Model Defense Study on Hijacking Adversarial Attack.
- [ICANN 2023] VDCNet: A Vulnerability Detection and Classification System in Cross-Project Scenarios.
- [ICANN 2023] Componentwise Adversarial Attacks.
- [ICANN 2023] A Graph Neural Network-Based Smart Contract Vulnerability Detection Method with Artificial Rule.
- [ICANN 2023] Low-Frequency Features Optimization for Transferability Enhancement in Radar Target Adversarial Attack.
- [ICANN 2023] Multi-convolution and Adaptive-Stride Based Transferable Adversarial Attacks.
- [ICANN 2023] SAL: Salient Adversarial Attack with LRP Refinement.
- [ICANN 2023] TransNoise: Transferable Universal Adversarial Noise for Adversarial Attack.
- [ICANN 2024] Unconventional Face Adversarial Attack.
- [ICANN 2024] Key Substructure-Driven Backdoor Attacks on Graph Neural Networks.
- [ICANN 2024] Unveiling Vulnerabilities in Large Vision-Language Models: The SAVJ Jailbreak Approach.
- [FGR 2013] Countermeasure for the protection of face recognition systems against mask attacks.
- [FGR 2017] PPGSecure: Biometric Presentation Attack Detection Using Photopletysmograms.
- [FGR 2017] 3D Facial Geometric Attributes Based Anti-Spoofing Approach against Mask Attacks.
- [FGR 2017] OULU-NPU: A Mobile Face Presentation Attack Database with Real-World Variations.
- [FGR 2021] Federated Test-Time Adaptive Face Presentation Attack Detection with Dual-Phase Privacy Preservation.
- [FGR 2021] Generating Master Faces for Dictionary Attacks with a Network-Assisted Latent Space Evolution.
- [FGR 2021] Understanding Cross Domain Presentation Attack Detection for Visible Face Recognition.
- [FGR 2021] Adversarial Attacks on Kinship Verification using Transformer.
- [FGR 2021] Explaining Face Presentation Attack Detection Using Natural Language.
- [FGR 2021] Partial Attack Supervision and Regional Weighted Inference for Masked Face Presentation Attack Detection.
- [FGR 2021] Similarity-based Gray-box Adversarial Attack Against Deep Face Recognition.
- [FGR 2021] NoPeek-Infer: Preventing face reconstruction attacks in distributed inference after on-premise training.
- [FGR 2023] Self-Supervised Face Presentation Attack Detection with Dynamic Grayscale Snippets.
- [FGR 2023] PhygitalNet: Unified Face Presentation Attack Detection via One-Class Isolation Learning.
- [FGR 2023] Unified Detection of Digital and Physical Face Attacks.
- [FGR 2024] 3D Face Morphing Attack Generation using Non-Rigid Registration.
- [FGR 2024] VoxAtnNet: A 3D Point Clouds Convolutional Neural Network for Generalizable Face Presentation Attack Detection.
- [FGR 2024] ∊-Mesh Attack: A Surface-based Adversarial Point Cloud Attack for Facial Expression Recognition.
- [FGR 2024] TetraLoss: Improving the Robustness of Face Recognition Against Morphing Attacks.
- [FGR 2024] Hierarchical Generative Network for Face Morphing Attacks.
- [FGR 2024] GestSpoof: Gesture Based Spatio-Temporal Representation Learning for Robust Fingerprint Presentation Attack Detection.
- [ICDAR 2023] Robustness Evaluation of Transformer-Based Form Field Extractors via Form Attacks.
- [ICDAR 2023] Adversarial Attacks on Convolutional Siamese Signature Verification Networks.
- [ICDAR 2024] Test Time Augmentation as a Defense Against Adversarial Attacks on Online Handwriting.
- [ICDAR 2024] Janus-Faced Handwritten Signature Attack: A Clash Between a Handwritten Signature Duplicator and a Writer Independent, Metric Meta-learning Offline Signature Verifier.
- [ICDAR 2024] PCA-Based Adversarial Attacks on Signature Verification Systems.
- [KSEM 2015] A Shilling Attack Detection Method Based on SVM and Target Item Analysis in Collaborative Filtering Recommender Systems.
- [KSEM 2016] Knowledge Extraction from Chinese Records of Cyber Attacks Based on a Semantic Grammar.
- [KSEM 2018] Cross-Layer Attack Path Exploration for Smart Grid Based on Knowledge of Target Network.
- [KSEM 2020] Defense of Word-Level Adversarial Attacks via Random Substitution Encoding.
- [KSEM 2021] Interpretation of Learning-Based Automatic Source Code Vulnerability Detection Model Using LIME.
- [KSEM 2021] GAN-Enabled Code Embedding for Reentrant Vulnerabilities Detection.
- [KSEM 2022] A Fine-Grained Approach for Vulnerabilities Discovery Using Augmented Vulnerability Signatures.
- [KSEM 2022] Detection DDoS of Attacks Based on Federated Learning with Digital Twin Network.
- [KSEM 2022] GM-Attack: Improving the Transferability of Adversarial Attacks.
- [KSEM 2022] Mitigating Targeted Bit-Flip Attacks via Data Augmentation: An Empirical Study.
- [KSEM 2022] Energy-Based Learning for Preventing Backdoor Attack.
- [KSEM 2023] Black-Box Adversarial Attack on Graph Neural Networks Based on Node Domain Knowledge.
- [KSEM 2023] DBA: An Efficient Approach to Boost Transfer-Based Adversarial Attack Performance Through Information Deletion.
- [KSEM 2024] VulCausal: Robust Vulnerability Detection Using Neural Network Models from a Causal Perspective.
- [KSEM 2024] Invisible Backdoor Attacks on Key Regions Based on Target Neurons in Self-Supervised Learning.
- [KSEM 2024] Different Attack and Defense Types for AI Cybersecurity.
- [KSEM 2024] Lurking in the Shadows: Imperceptible Shadow Black-Box Attacks Against Lane Detection Models.
- [KSEM 2024] DFDS: Data-Free Dual Substitutes Hard-Label Black-Box Adversarial Attack.
- [KSEM 2024] Logits Poisoning Attack in Federated Distillation.
- [KSEM 2024] Reentrancy Vulnerability Detection Based on Improved Attention Mechanism.
- [KSEM 2024] Adversarial Attacks on Large Language Models.
- [KSEM 2024] Scalable Attack on Graph Data by Important Nodes.
- [ICONIP 2011] Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis.
- [ICONIP 2012] DNS-Based Defense against IP Spoofing Attacks.
- [ICONIP 2012] Behavior Analysis of Long-term Cyber Attacks in the Darknet.
- [ICONIP 2013] Robust Meter Placement against False Data Injection Attacks on Power System State Estimation.
- [ICONIP 2014] Unknown Attack Detection by Multistage One-Class SVM Focusing on Communication Interval.
- [ICONIP 2017] Effectiveness of Adversarial Attacks on Class-Imbalanced Convolutional Neural Networks.
- [ICONIP 2017] A Deep Learning Method to Detect Web Attacks Using a Specially Designed CNN.
- [ICONIP 2017] Detect Malicious Attacks from Entire TCP Communication Process.
- [ICONIP 2018] Passive Detection of Splicing and Copy-Move Attacks in Image Forgery.
- [ICONIP 2019] White-Box Target Attack for EEG-Based BCI Regression Problems.
- [ICONIP 2019] Safety and Robustness of Deep Neural Networks Object Recognition Under Generic Attacks.
- [ICONIP 2019] Patch Selection Denoiser: An Effective Approach Defending Against One-Pixel Attacks.
- [ICONIP 2020] Port-Piece Embedding for Darknet Traffic Features and Clustering of Scan Attacks.
- [ICONIP 2020] Benchmarking Adversarial Attacks and Defenses for Time-Series Data.
- [ICONIP 2020] Non-norm-bounded Attack for Generating Adversarial Examples.
- [ICONIP 2020] Adversarial Attacks on Deep Learning Systems for User Identification Based on Motion Sensors.
- [ICONIP 2021] Condition-Invariant Physical Adversarial Attacks via Pixel-Wise Adversarial Learning.
- [ICONIP 2021] EvoBA: An Evolution Strategy as a Strong Baseline for Black-Box Adversarial Attacks.
- [ICONIP 2021] Learning Attacker’s Bounded Rationality Model in Security Games.
- [ICONIP 2022] Universal Distributional Decision-Based Black-Box Adversarial Attack with Reinforcement Learning.
- [ICONIP 2022] Detecting and Mitigating Backdoor Attacks with Dynamic and Invisible Triggers.
- [ICONIP 2022] In Situ Augmentation for Defending Against Adversarial Attacks on Text Classifiers.
- [ICONIP 2022] Countering the Anti-detection Adversarial Attacks.
- [ICONIP 2023] Attribution of Adversarial Attacks via Multi-task Learning.
- [ICONIP 2023] SCME: A Self-contrastive Method for Data-Free and Query-Limited Model Extraction Attack.
- [ICPR 2010] Attacking Iris Recognition: An Efficient Hill-Climbing Technique.
- [ICPR 2014] On Iris Spoofing Using Print Attack.
- [ICPR 2016] Exposing seam carving forgery under recompression attacks by hybrid large feature mining.
- [ICPR 2018] Universal Perturbation Generation for Black-box Attack Using Evolutionary Algorithms.
- [ICPR 2018] Detecting Disguise Attacks on Multi-spectral Face Recognition Through Spectral Signatures.
- [ICPR 2020] A delayed Elastic-Net approach for performing adversarial attacks.
- [ICPR 2020] F-mixup: Attack CNNs From Fourier Perspective.
- [ICPR 2020] AdvHat: Real-World Adversarial Attack on ArcFace Face ID System.
- [ICPR 2020] Cost-Effective Adversarial Attacks against Scene Text Recognition.
- [ICPR 2020] Detection of Makeup Presentation Attacks based on Deep Face Representations.
- [ICPR 2020] Defense Mechanism Against Adversarial Attacks Using Density-based Representation of Images.
- [ICPR 2020] Dynamically Mitigating Data Discrepancy with Balanced Focal Loss for Replay Attack Detection.
- [ICPR 2020] Killing Four Birds with one Gaussian Process: The Relation between different Test-Time Attacks.
- [ICPR 2020] ResMax: Detecting Voice Spoofing Attacks with Residual Network and Max Feature Map.
- [ICPR 2020] Optimal Transport as a Defense Against Adversarial Attacks.
- [ICPR 2020] Attack Agnostic Adversarial Defense via Visual Imperceptible Bound.
- [ICPR 2020] Generalized Iris Presentation Attack Detection Algorithm under Cross-Database Settings.
- [ICPR 2020] MixNet for Generalized Face Presentation Attack Detection.
- [ICPR 2020] Viability of Optical Coherence Tomography for Iris Presentation Attack Detection.
- [ICPR 2020] Accuracy-Perturbation Curves for Evaluation of Adversarial Attack and Defence Methods.
- [ICPR 2020] CCA: Exploring the Possibility of Contextual Camouflage Attack on Object Detection.
- [ICPR 2020] Attack-agnostic Adversarial Detection on Medical Data Using Explainable Machine Learning.
- [ICPR 2020] Explain2Attack: Text Adversarial Attacks via Cross-Domain Interpretability.
- [ICPR 2020] Transferable Adversarial Attacks for Deep Scene Text Detection.
- [ICPR 2020] Transformer-Encoder Detector Module: Using Context to Improve Robustness to Adversarial Attacks on Object Detection.
- [ICPR 2022] Backdoor Attacks against Deep Neural Networks by Personalized Audio Steganography.
- [ICPR 2022] Adversarial Attack on Semantic Segmentation Preprocessed with Super Resolution.
- [ICPR 2022] Robust IRIS Presentation Attack Detection Through Stochastic Filter Noise.
- [ICPR 2022] Deep Image Destruction: Vulnerability of Deep Image-to-Image Models against Adversarial Attacks.
- [ICPR 2022] Towards Robust Community Detection via Extreme Adversarial Attacks.
- [ICPR 2022] Boundary Defense Against Black-box Adversarial Attacks.
- [ICPR 2022] Metamorphic Testing-based Adversarial Attack to Fool Deepfake Detectors.
- [ICPR 2024] On Trace of PGD-Like Adversarial Attacks.
- [ICPR 2024] Multifaceted Anchor Nodes Attack on Graph Neural Networks: A Budget-Efficient Approach.
- [ICPR 2024] Multi-target Attention Dispersion Adversarial Attack Against Aerial Object Detector.
- [ICPR 2024] UAD-DPL: An Unknown Encrypted Attack Detection Method Based on Deep Prototype Learning.
- [ICB 2011] Robustness of multi-modal biometric verification systems under realistic spoofing attacks.
- [ICB 2011] Counter-measures to photo attacks in face recognition: A public database and a baseline.
- [ICB 2011] Competition on counter measures to 2-D facial spoofing attacks.
- [ICB 2011] Fusion of multiple clues for photo-attack detection in face recognition systems.
- [ICB 2014] Presentation attack detection on visible spectrum iris recognition by exploring inherent characteristics of Light Field Camera.
- [ICB 2014] Theoretical vulnerability in likelihood-ratio-based biometric verification.
- [ICB 2017] On the vulnerability of ECG verification to online presentation attacks.
- [ICB 2017] LOTS about attacking deep features.
- [ICB 2017] End-to-End convolutional neural network-based voice presentation attack detection.
- [ICB 2017] Fingerprint presentation attacks detection based on the user-specific effect.
- [ICB 2017] Face morphing versus face averaging: Vulnerability and detection.
- [ICB 2017] Robust face presentation attack detection on smartphones : An approach based on variable focus.
- [ICB 2017] SWAPPED! Digital face presentation attack detection via weighted local magnitude pattern.
- [ICB 2017] Synthetic iris presentation attack using iDCGAN.
- [ICB 2017] A competition on generalized software-based face presentation attack detection in mobile scenarios.
- [ICB 2020] Open Source Iris Recognition Hardware and Software with Presentation Attack Detection.
- [ICB 2020] On the Influence of Ageing on Face Morph Attacks: Vulnerability and Detection.
- [ICB 2020] Analysing the Performance of LSTMs and CNNs on 1310 nm Laser Data for Fingerprint Presentation Attack Detection.
- [ICB 2020] Is Face Recognition Safe from Realizable Attacks?
- [ICB 2020] Finding the Suitable Doppelgänger for a Face Morphing Attack.
- [ICB 2020] Fingerprint Presentation Attack Detection: A Sensor and Material Agnostic Approach.
- [ICB 2020] Biometric Identification and Presentation-Attack Detection using Micro- and Macro-Movements of the Eyes.
- [ICB 2020] Micro Stripes Analyses for Iris Presentation Attack Detection.
- [ICB 2020] Anomaly Detection-Based Unknown Face Presentation Attack Detection.
- [ICB 2020] D-NetPAD: An Explainable and Interpretable Iris Presentation Attack Detector.
- [ICB 2020] Generating Master Faces for Use in Performing Wolf Attacks on Face Recognition Systems.
- [ICB 2021] Iris Presentation Attack Detection by Attention-based and Deep Pixel-wise Binary Supervision Network.
- [ICB 2021] Vulnerability Assessment and Presentation Attack Detection Using a Set of Distinct Finger Vein Recognition Algorithms.
- [ICB 2021] Face Morphing of Newborns Can Be Threatening Too : Preliminary Study on Vulnerability and Detection.
- [ICB 2021] Feasibility of Morphing-Attacks in Vascular Biometrics.
- [ICB 2021] Universal Adversarial Spoofing Attacks against Face Recognition.
- [ICB 2021] A Unified Model for Fingerprint Authentication and Presentation Attack Detection.
- [ICB 2021] Leveraging Adversarial Learning for the Detection of Morphing Attacks.
- [ICB 2021] Exploiting Non-uniform Inherent Cues to Improve Presentation Attack Detection.
- [ICB 2022] iCTGAN-An Attack Mitigation Technique for Random-vector Attack on Accelerometer-based Gait Authentication Systems.
- [ICB 2022] Improved Presentation Attack Detection Using Image Decomposition.
- [ICB 2022] PatchSwap: Boosting the Generalizability of Face Presentation Attack Detection by Identity-aware Patch Swapping.
- [ICB 2022] SYN-MAD 2022: Competition on Face Morphing Attack Detection Based on Privacy-aware Synthetic Training Data.
- [ICB 2022] One-Shot Sensor and Material Translator : A Bilinear Decomposer for Fingerprint Presentation Attack Generalization.
- [ICB 2022] Presentation Attack Detection in Iris Recognition through Convolution Block Attention Module.
- [ICB 2022] On the (Limited) Generalization of MasterFace Attacks and Its Relation to the Capacity of Face Representations.
- [ICB 2022] Reliable Face Morphing Attack Detection in On-The-Fly Border Control Scenario with Variation in Image Resolution and Capture Distance.
- [ICB 2022] Unsupervised Face Morphing Attack Detection via Self-paced Anomaly Detection.
- [ICB 2023] Vulnerability of Automatic Identity Recognition to Audio-Visual Deepfakes.
- [ICB 2023] Approximating Optimal Morphing Attacks using Template Inversion.
- [ICB 2023] Fingerprint Presentation Attack Detection with Supervised Contrastive Learning.
- [ICB 2023] Detecting Morphing Attacks via Continual Incremental Training.
- [ICB 2023] ViT Unified: Joint Fingerprint Recognition and Presentation Attack Detection.
- [ICB 2023] COLFIPAD: A Presentation Attack Detection Benchmark for Contactless Fingerprint Recognition.
- [ICB 2023] FedSIS: Federated Split Learning with Intermediate Representation Sampling for Privacy-preserving Generalized Face Presentation Attack Detection.
- [ICB 2023] SynFacePAD 2023: Competition on Face Presentation Attack Detection Based on Privacy-aware Synthetic Training Data.
- [ICB 2023] Depth-guided Robust Face Morphing Attack Detection.
- [ICB 2023] Towards Generalizable Morph Attack Detection with Consistency Regularization.
- [ICB 2023] Can personalised hygienic masks be used to attack face recognition systems?
- [ICB 2023] Template Recovery Attack on Homomorphically Encrypted Biometric Recognition Systems with Unprotected Threshold Comparison.
- [ICB 2023] On Self-Supervised Learning and Prompt Tuning of Vision Transformers for Cross-sensor Fingerprint Presentation Attack Detection.
- [ICB 2023] Adaptive Adversarial Patch Attack on Face Recognition Models.
- [ICB 2023] Sound-Print: Generalised Face Presentation Attack Detection using Deep Representation of Sound Echoes.
- [ICB 2023] Optimal-Landmark-Guided Image Blending for Face Morphing Attacks.
- [ICB 2023] AdvGen: Physical Adversarial Attack on Face Presentation Attack Detection Systems.
- [ICB 2024] Deep Generative Attacks and Countermeasures for Data-Driven Offline Signature Verification.
- [ICB 2024] Few-Shot Learning: Expanding ID Cards Presentation Attack Detection to Unknown ID Countries.
- [ICB 2024] Difficulties in Using Synthetic Data for Presentation Attack Detection in Finger Vein Recognition: The Role of Model Fingerprints.
- [ICB 2024] Unsupervised Fingerphoto Presentation Attack Detection With Diffusion Models.
- [ICB 2024] Privacy-Safe Iris Presentation Attack Detection.
- [ICB 2024] On the Trustworthiness of Face Morphing Attack Detectors.
- [ICB 2024] Evaluating the Effectiveness of Attack-Agnostic Features for Morphing Attack Detection.
- [ICB 2024] V-MAD: Video-based Morphing Attack Detection in Operational Scenarios.
- [ICB 2024] La-SoftMoE CLIP for Unified Physical-Digital Face Attack Detection.
- [ICB 2024] MorFacing: A Benchmark for Estimation Face Recognition Robustness to Face Morphing Attacks.
- [ICB 2024] On the Impact of Face Image Quality on Morphing Attack Detection.
- [ICB 2024] A Novel and Responsible Dataset for Face Presentation Attack Detection on Mobile Devices.
- [ICB 2024] Grains of Saliency: Optimizing Saliency-based Training of Biometric Attack Detection Models.
- [ICB 2024] First Competition on Presentation Attack Detection on ID Card.
- [ICB 2024] Analysis of Backdoor Attacks on Deepfake Detection.
- [ICB 2024] Kin-Wolf: Kinship-established Wolfs in Indirect Synthetic Attack.
- [ICB 2024] Towards Federated Learning for Morphing Attack Detection.
- [IJCNN 2010] A privacy attack that removes the majority of the noise from perturbed data.
- [IJCNN 2013] A new hybrid swarm optimization algorithm for power system vulnerability analysis and sensor network deployment.
- [IJCNN 2014] Attack detection in recommender systems based on target item analysis.
- [IJCNN 2014] Dynamie modeling of an ostraciiform robotic fish based on angle of attack theory.
- [IJCNN 2016] Detection of false data attacks in smart grid with supervised learning.
- [IJCNN 2016] A neural network model for detecting DDoS attacks using darknet traffic features.
- [IJCNN 2016] Game-theoretic tracking control for actuator attack attenuation in cyber-physical systems.
- [IJCNN 2016] Neural network-based attack detection in nonlinear networked control systems.
- [IJCNN 2017] Deep Boltzmann machines for robust fingerprint spoofing attack detection.
- [IJCNN 2017] On the use of deep recurrent neural networks for detecting audio spoofing attacks.
- [IJCNN 2018] Adversarial mRMR against Evasion Attacks.
- [IJCNN 2018] Attack Strength vs. Detectability Dilemma in Adversarial Machine Learning.
- [IJCNN 2018] Adversarials -1: Defending by Attacking.
- [IJCNN 2018] Evolutionary Optimization of an Affine Model for Vulnerability Characterization in Smart Grids.
- [IJCNN 2019] Targeted Black-Box Adversarial Attack Method for Image Classification Models.
- [IJCNN 2019] Extreme Dimensionality Reduction for Network Attack Visualization with Autoencoders.
- [IJCNN 2019] Adversarial Attacks on Remote User Authentication Using Behavioural Mouse Dynamics.
- [IJCNN 2019] Vulnerability of Covariate Shift Adaptation Against Malicious Poisoning Attacks.
- [IJCNN 2019] Adversarial Attacks on Deep Neural Networks for Time Series Classification.
- [IJCNN 2020] Black Box Attacks on Explainable Artificial Intelligence(XAI) methods in Cyber Security.
- [IJCNN 2020] Targeted Forgetting and False Memory Formation in Continual Learners through Adversarial Backdoor Attacks.
- [IJCNN 2020] Fast Local Attack: Generating Local Adversarial Examples for Object Detectors.
- [IJCNN 2020] Identify Potential Attacks from Simulated Log Analysis.
- [IJCNN 2020] Few Features Attack to Fool Machine Learning Models through Mask-based GAN.
- [IJCNN 2020] RegionSparse: Leveraging Sparse Coding and Object Localization to Counter Adversarial Attacks.
- [IJCNN 2020] Learning Word Representation for the Cyber Security Vulnerability Domain.
- [IJCNN 2020] IoT Attack Detection with Deep Learning Analysis.
- [IJCNN 2020] Untargeted, Targeted and Universal Adversarial Attacks and Defenses on Time Series.
- [IJCNN 2020] DAPAS : Denoising Autoencoder to Prevent Adversarial attack in Semantic Segmentation.
- [IJCNN 2020] Is Spiking Secure? A Comparative Study on the Security Vulnerabilities of Spiking and Deep Neural Networks.
- [IJCNN 2020] Cross-Representation Transferability of Adversarial Attacks: From Spectrograms to Audio Waveforms.
- [IJCNN 2020] Recurrent Neural Networks for Colluded Applications Attack Detection in Android OS Devices.
- [IJCNN 2020] NeuroAttack: Undermining Spiking Neural Networks Security through Externally Triggered Bit-Flips.
- [IJCNN 2020] MRobust: A Method for Robustness against Adversarial Attacks on Deep Neural Networks.
- [IJCNN 2020] On Adversarial Examples and Stealth Attacks in Artificial Intelligence Systems.
- [IJCNN 2020] Relative Robustness of Quantized Neural Networks Against Adversarial Attacks.
- [IJCNN 2020] An Adversarial Attack Detection Paradigm With Swarm Optimization.
- [IJCNN 2020] FaDec: A Fast Decision-based Attack for Adversarial Machine Learning.
- [IJCNN 2020] Compressive Recovery Defense: Defending Neural Networks Against ℓ2, ℓ∞, and ℓ0 Norm Attacks.
- [IJCNN 2020] Adversarial Vulnerability in Doppler-based Human Activity Recognition.
- [IJCNN 2020] Black-box Evolutionary Search for Adversarial Examples against Deep Image Classifiers in Non-Targeted Attacks.
- [IJCNN 2021] SpectralDefense: Detecting Adversarial Attacks on CNNs in the Fourier Domain.
- [IJCNN 2021] Adversarial Attacks and Defense on Deep Learning Classification Models using YCbCr Color Images.
- [IJCNN 2021] Linear Program Powered Attack.
- [IJCNN 2021] MSPLD: Shilling Attack Detection Model Based on Meta Self-Paced Learning.
- [IJCNN 2021] Word-Level Textual Adversarial Attack in the Embedding Space.
- [IJCNN 2021] GIMD-Net: An effective General-purpose Image Manipulation Detection Network, even under anti-forensic attacks.
- [IJCNN 2021] Defense against Adversarial Attacks with an Induced Class.
- [IJCNN 2021] Distribution-based Adversarial Filter Feature Selection against Evasion Attack.
- [IJCNN 2021] Beating White-Box Defenses with Black-Box Attacks.
- [IJCNN 2021] Defending against GAN-based DeepFake Attacks via Transformation-aware Adversarial Faces.
- [IJCNN 2021] Information-theoretic Source Code Vulnerability Highlighting.
- [IJCNN 2021] Self-consistent significance level as a statistical predictor of epilepsy attack.
- [IJCNN 2021] Studying the Transferability of Non-Targeted Adversarial Attacks.
- [IJCNN 2021] Targeted Attacks in Hierarchical Settings via Convex Programming.
- [IJCNN 2021] Dynamically Sampled Nonlocal Gradients for Stronger Adversarial Attacks.
- [IJCNN 2021] TransMIA: Membership Inference Attacks Using Transfer Shadow Training.
- [IJCNN 2021] Watermarking-based Defense against Adversarial Attacks on Deep Neural Networks.
- [IJCNN 2021] Special Symbol Attacks On NLP Systems.
- [IJCNN 2021] Automatic Classification of Vulnerabilities using Deep Learning and Machine Learning Algorithms.
- [IJCNN 2021] DeeSCVHunter: A Deep Learning-Based Framework for Smart Contract Vulnerability Detection.
- [IJCNN 2021] OPA2D: One-Pixel Attack, Detection, and Defense in Deep Neural Networks.
- [IJCNN 2021] Attack-Guided Efficient Robustness Verification of ReLU Neural Networks.
- [IJCNN 2021] EAR: An Enhanced Adversarial Regularization Approach against Membership Inference Attacks.
- [IJCNN 2021] DVS-Attacks: Adversarial Attacks on Dynamic Vision Sensors for Spiking Neural Networks.
- [IJCNN 2022] ACTSS: Input Detection Defense against Backdoor Attacks via Activation Subset Scanning.
- [IJCNN 2022] Defensive Bit Planes: Defense Against Adversarial Attacks.
- [IJCNN 2022] Adv-IFD: Adversarial Attack Datasets for An Intelligent Fault Diagnosis.
- [IJCNN 2022] Semi-Targeted Model Poisoning Attack on Federated Learning via Backward Error Analysis.
- [IJCNN 2022] Evaluating Adversarial Attacks and Defences in Infrared Deep Learning Monitoring Systems.
- [IJCNN 2022] An Information Geometric Perspective to Adversarial Attacks and Defenses.
- [IJCNN 2022] VulBERTa: Simplified Source Code Pre-Training for Vulnerability Detection.
- [IJCNN 2022] Comparative Evaluation of Machine Learning Algorithms for Network Intrusion Detection and Attack Classification.
- [IJCNN 2022] Reverse Adversarial Attack To Enhance Environmental Sound Classification.
- [IJCNN 2022] ROOM: Adversarial Machine Learning Attacks Under Real-Time Constraints.
- [IJCNN 2022] CatchPhish: Model for detecting homographic attacks on phishing pages.
- [IJCNN 2022] Deep Reinforcement Learning for Penetration Testing of Cyber-Physical Attacks in the Smart Grid.
- [IJCNN 2022] fakeWeather: Adversarial Attacks for Deep Neural Networks Emulating Weather Conditions on the Camera Lens of Autonomous Systems.
- [IJCNN 2022] KLAttack: Towards Adversarial Attack and Defense on Neural Dependency Parsing Models.
- [IJCNN 2022] Improving the Semantic Consistency of Textual Adversarial Attacks via Prompt.
- [IJCNN 2022] Targeted Data Poisoning Attacks Against Continual Learning Neural Networks.
- [IJCNN 2022] Resilience of Bayesian Layer-Wise Explanations under Adversarial Attacks.
- [IJCNN 2022] GPSAttack: A Unified Glyphs, Phonetics and Semantics Multi-Modal Attack against Chinese Text Classification Models.
- [IJCNN 2022] Trust-No-Pixel: A Remarkably Simple Defense against Adversarial Attacks Based on Massive Inpainting.
- [IJCNN 2022] Latent Space-Based Backdoor Attacks Against Deep Neural Networks.
- [IJCNN 2022] Improving Robustness of Deep Reinforcement Learning Agents: Environment Attack based on the Critic Network.
- [IJCNN 2022] Pixle: a fast and effective black-box attack based on rearranging pixels.
- [IJCNN 2023] RobCaps: Evaluating the Robustness of Capsule Networks against Affine Transformations and Adversarial Attacks.
- [IJCNN 2023] An Enhanced Transferable Adversarial Attack Against Object Detection.
- [IJCNN 2023] Imperceptible Adversarial Attack on S Channel of HSV Colorspace.
- [IJCNN 2023] Defense Against Reconstruction Attacks in Split Federated Learning Through Decreasing Correlation Between Inputs and Activations.
- [IJCNN 2023] AKD: Using Adversarial Knowledge Distillation to Achieve Black-box Attacks.
- [IJCNN 2023] Robust Deep Learning Models against Semantic-Preserving Adversarial Attack.
- [IJCNN 2023] Zero-Knowledge Attack for Replicating Protected Deep Neural Networks.
- [IJCNN 2023] Privacy Inference-Empowered Stealthy Backdoor Attack on Federated Learning under Non-IID Scenarios.
- [IJCNN 2023] Domain Generalization and Feature Fusion for Cross-domain Imperceptible Adversarial Attack Detection.
- [IJCNN 2023] Gradient Sign Inversion: Making an Adversarial Attack a Good Defense.
- [IJCNN 2023] Interpretable and Effective Reinforcement Learning for Attacking against Graph-based Rumor Detection.
- [IJCNN 2023] Improving the Transferability of Adversarial Attacks through Experienced Precise Nesterov Momentum.
- [IJCNN 2023] CEVulDet: A Code Edge Representation Learnable Vulnerability Detector.
- [IJCNN 2023] Improving Robustness Against Adversarial Attacks with Deeply Quantized Neural Networks.
- [IJCNN 2023] FedRRA: Reputation-Aware Robust Federated Learning against Poisoning Attacks.
- [IJCNN 2023] Towards Better Word Importance Ranking in Textual Adversarial Attacks.
- [IJCNN 2023] Deep Inversion Method for Attacking Lifelong Learning Neural Networks.
- [IJCNN 2023] FedGrad: Mitigating Backdoor Attacks in Federated Learning Through Local Ultimate Gradients Inspection.
- [IJCNN 2023] A Non-Targeted Attack Approach for the Coarse Misclassification Problem.
- [IJCNN 2023] Backdoor Attack on Deep Neural Networks in Perception Domain.
- [IJCNN 2023] Defending Machine Reading Comprehension against Question-Targeted Attacks.
- [IJCNN 2023] Data Under Siege: The Quest for the Optimal Convolutional Autoencoder in Side-Channel Attacks.
- [IJCNN 2023] TETRAA - Trained and Selective Transmutation of Encoder-based Adversarial Attack.
- [IJCNN 2023] Attack Assessment and Augmented Identity Recognition for Human Skeleton Data.
- [IJCNN 2023] Detecting Cyber Attacks in Industrial Control Systems Using Spatio-Temporal Autoencoder.
- [IJCNN 2023] Fighting Attacks on Large Character Set CAPTCHAs Using Transferable Adversarial Examples.
- [IJCNN 2023] Evaluating Robustness Against Adversarial Attacks: A Representational Similarity Analysis Approach.
- [IJCNN 2023] Rethinking the Trigger-injecting Position in Graph Backdoor Attack.
- [IJCNN 2023] Unmasking the Imposters: Task-specific feature learning for face presentation attack detection.
- [IJCNN 2023] LGWAE: Label-Guided Weighted Autoencoder Network for Flexible Targeted Attacks of Deep Hashing.
- [IJCNN 2024] PRJack: Pruning-Resistant Model Hijacking Attack Against Deep Learning Models.
- [IJCNN 2024] Unveiling Robustness of Spiking Neural Networks against Data Poisoning Attacks.
- [IJCNN 2024] Offline Textual Adversarial Attacks against Large Language Models.
- [IJCNN 2024] Cross-Task Attack: A Self-Supervision Generative Framework Based on Attention Shift.
- [IJCNN 2024] A Novel Confidence Score Exploiting Attacks on Classification Trees and Random Forest Classifiers.
- [IJCNN 2024] Enhancing Data-Free Model Stealing Attack on Robust Models.
- [IJCNN 2024] Fed-IoVIDS: Intrusion Detection based on Attack Behavior Analysis with Temporal Model on IoV Considering Privacy Protection.
- [IJCNN 2024] Sparse Attack with Meta-Learning.
- [IJCNN 2024] SPSS: A Salience-based Poisoning Selection Strategy for Selecting Backdoor Attack Victims.
- [IJCNN 2024] Sponge Backdoor Attack: Increasing the Latency of Object Detection Exploiting Non-Maximum Suppression.
- [IJCNN 2024] Dual-Dimensional Adversarial Attacks: A Novel Spatial and Temporal Attack Strategy for Multi-Object Tracking.
- [IJCNN 2024] Invisible Backdoor Attack against 3D Point Cloud by Optimized 3D Transformation.
- [IJCNN 2024] S-E Pipeline: A Vision Transformer (ViT) based Resilient Classification Pipeline for Medical Imaging Against Adversarial Attacks.
- [IJCNN 2024] Instance-Level Trojan Attacks on Visual Question Answering via Adversarial Learning in Neuron Activation Space.
- [IJCNN 2024] Enhancing Adversarial Attacks: The Similar Target Method.
- [IJCNN 2024] SpeechGuard: Online Defense against Backdoor Attacks on Speech Recognition Models.
- [IJCNN 2024] Anti-AsynDGAN: Black-box Membership Inference Attacks Against Medical Distributed Generation Models.
- [IJCNN 2024] Attack Behavior Extraction Based on Heterogeneous Threat Intelligence Graphs and Data Augmentation.
- [IJCNN 2024] Query-Based External Information Leakage Attacks on Face Recognition Models.
- [IJCNN 2024] D-CAPTCHA++: A Study of Resilience of Deepfake CAPTCHA under Transferable Imperceptible Adversarial Attack.
- [IJCNN 2024] Multi-attribute Semantic Adversarial Attack Based on Cross-layer Interpolation for Face Recognition.
- [IJCNN 2024] Adversarial Attack and Defense for Transductive Support Vector Machine.
- [IJCNN 2024] Boosting Transferability of Decision-based Sampling Batch Attack Using Skeleton Feature.
- [IJCNN 2024] STFL: Utilizing a Semi-Supervised, Transfer-Learning, Federated-Learning Approach to Detect Phishing URL Attacks.
- [IJCNN 2024] UNICAD: A Unified Approach for Attack Detection, Noise Reduction and Novel Class Identification.
- [IJCNN 2024] Face Morphing via Adversarial Attack-based Adaptive Blending.
- [IJCNN 2024] A Transferable Adversarial Attack against Object Detection Networks.
- [IJCNN 2024] Visual Transformer for Resilience to Adversarial Attacks in OCT Retinal Images.
- [IJCNN 2024] PUBA: A Physical Undirected Backdoor Attack in Vision-based UAV Detection and Tracking Systems.
- [HUC 2011] Who’s your best friend?: targeted privacy attacks In location-sharing social networks.
- [HUC 2011] Jamming attack in WSN: a spatial perspective.
- [HUC 2012] Attacking location privacy: exploring human strategies.
- [HUC 2015] Towards a mobile and wearable system for predicting panic attacks.
- [HUC 2016] Loca: a location-oblivious co-location attack in crowds.
- [HUC 2017] Exploring use of wearable sensors to identify early symptoms of migraine attack.
- [HUC 2017] Early detection of migraine attacks based on wearable sensors: experiences of data collection using Empatica E4.
- [HUC 2021] On the Performance Impact of Poisoning Attacks on Load Forecasting in Federated Learning.
- [IUI 2013] Making graphic-based authentication secure against smudge attacks.
- [IUI 2021] The Design and Development of a Game to Study Backdoor Poisoning Attacks: The Backdoor Game.
- [PERCOM 2012] Sensing-enabled defenses to RFID unauthorized reading and relay attacks without changing the usage model.
- [PERCOM 2014] Comparing and fusing different sensor modalities for relay attack resistance in Zero-Interaction Authentication.
- [PERCOM 2015] Covert channel attacks in pervasive computing.
- [PERCOM 2019] DoubleEcho: Mitigating Context-Manipulation Attacks in Copresence Verification.
- [PERCOM 2020] An Analysis of Adversarial Attacks and Defenses on Autonomous Driving Models.
- [PERCOM 2024] Is Your Kettle Smarter Than a Hacker? A Scalable Tool for Assessing Replay Attack Vulnerabilities on Consumer IoT Devices.
- [ICWSM 2019] TOmCAT: Target-Oriented Crowd Review Attacks and Countermeasures.
- [ICWSM 2022] SAFER: Social Capital-Based Friend Recommendation to Defend against Phishing Attacks.
- [ICWSM 2024] Strategies and Attacks of Digital Militias in WhatsApp Political Groups.
- [ICWSM 2024] TUBERAIDER: Attributing Coordinated Hate Attacks on YouTube Videos to Their Source Communities.
- [ICWSM 2024] Tracking Fringe and Coordinated Activity on Twitter Leading Up to the US Capitol Attack.
- [ICWSM 2025] How (Un)ethical Are Instruction-Centric Responses of LLMs? Unveiling the Vulnerabilities of Safety Guardrails to Harmful Queries.
- [ICWSM 2025] Identifying and Investigating Global News Coverage of Critical Events Such as Disasters and Terrorist Attacks.
- [ICWSM 2025] Exploiting Explainability to Design Adversarial Attacks and Evaluate Attack Resilience in Hate-Speech Detection Models.
- [ICWSM 2025] Using Causality to Infer Coordinated Attacks in Social Media.
- [ICWSM 2025] Coordinated Reply Attacks in Influence Operations: Characterization and Detection.
- [ICWSM 2025] Exploring the Limits of Zero Shot Vision Language Models for Hate Meme Detection: The Vulnerabilities and their Interpretations.
- [UIC 2011] Bullet-Proof Verification (BPV) Method to Detect Black Hole Attack in Mobile Ad Hoc Networks.
- [UIC 2012] A Self-Protection Mechanism against Stepping-Stone Attacks for IaaS Clouds.
- [UIC 2012] Neighbor Similarity Trust against Sybil Attack in P2P E-commerce.
- [UIC 2013] Model-Driven Estimation of Distributed Vulnerability in Complex Railway Networks.
- [UIC 2013] Privacy-Preserving Trajectory Publication against Parking Point Attacks.
- [UIC 2014] An Anonymous Remote Attestation Protocol to Prevent Masquerading Attack.
- [UIC 2015] Reliability Improvement of Multi-path Routing for Wireless Sensor Networks and Its Application to Wormhole Attack Avoidance.
- [UIC 2015] Making Tagging Systems Resistant to Tricky Spam Attacks.
- [UIC 2015] SDN-Based ARP Attack Detection for Cloud Centers.
- [UIC 2015] (C, K)m-Anonymity: A Model to Resist Sub-trajectory Linkage Attacks.
- [UIC 2015] Vulnerabilities Scoring Approach for Cloud SaaS.
- [UIC 2015] Optimization of Elliptic Curve Cryptography Resisting Power Attack Scalar Multiplication Algorithm in Security System on Chip.
- [UIC 2016] Detecting Attacks Smartly in Vehicle Cloud Computing.
- [UIC 2016] Towards Early Detection of Novel Attack Patterns through the Lens of a Large-Scale Darknet.
- [UIC 2016] A Novel Hybrid Flow-Based Handler with DDoS Attacks in Software-Defined Networking.
- [UIC 2016] A Green Trust Management Scheme to Mitigate Trust-Distortion Attacks on MANETs.
- [UIC 2017] Optimal patrol strategies against attacker’s persistent attack with multiple resources.
- [UIC 2017] Exploit dynamic data flows to protect software against semantic attacks.
- [UIC 2017] Whitenoise encryption implementation with increased robustness to side-channel attacks.
- [UIC 2017] A novel spoofing attack against electroencephalogram-based security systems.
- [UIC 2017] Enhancement of probabilistic attack graphs for accurate cyber security monitoring.
- [UIC 2018] A New Detection Method for Stack Overflow Vulnerability Based on Component Binary Code for Third-Party Component.
- [UIC 2018] A Low-Rate DoS Attack Detection Method Based on Hilbert Spectrum and Correlation.
- [UIC 2018] Leaks or Not: A Framework for Evaluating Cache Timing Side Channel Attacks in SGX.
- [UIC 2018] MTF: Mitigating Link Flooding Attacks in Delay Tolerant Networks.
- [UIC 2018] Detection Mechanism of FDI Attack Feature Based on Deep Learning.
- [UIC 2018] Backward Mining Technology Research on Continuous Attacks in Wide Time Domain.
- [UIC 2018] Trust Model and Anti-Attack Analysis for Social Computing.
- [UIC 2019] An Amplification DDoS Attack Defence Mechanism using Reinforcement Learning.
- [UIC 2019] LISC: Location Inference Attack Enhanced by Spatial-Temporal-Social Correlations.
- [UIC 2019] A Vulnerability Detection Model for Java Systems Based on Complex Networks.
- [UIC 2019] Research on the Destructive Capability Metrics of Common Network Attacks.
- [UIC 2019] A Study and Enhancement to the Security of MANET AODV Protocol Against Black Hole Attacks.
- [UIC 2019] Research on the Impact of Attacks on Security Characteristics.
- [UIC 2019] Attack-Defense Utility Quantification And Security Risk Assessment.
- [UIC 2021] A Situation Calculus based approach to Cognitive Modelling for Responding to IoT Cyberattacks.
- [UIC 2021] Exploring The Security Issues in Home-Based IoT Devices Through Denial of Service Attacks.
- [UIC 2022] Inferring Attack Paths in Networks with Periodic Topology Changes.
- [UIC 2022] When Adversarial Example Attacks Meet Vertical Federated Learning.
- [UIC 2022] Generating Frequency-limited Adversarial Examples to Attack Multi-focus Image Fusion Models.
- [UIC 2022] Attack-Model-Agnostic Defense Against Model Poisonings in Distributed Learning.
- [UIC 2022] A Novel Backdoor Attack Adapted to Transfer Learning.
- [UIC 2022] PATVD:Vulnerability Detection Based on Pre-training Techniques and Adversarial Training.
- [UIC 2022] Bi-TWD: A Unified Attack Detection Framework in Recommender Systems Based on BiLSTM and Three-way Decision.
- [HAPTICS 2024] NetworkTouch: A vibrotactile check-in device for cyberattack detection and monitoring.
- [INTERACT 2015] CipherCard: A Token-Based Approach Against Camera-Based Shoulder Surfing Attacks on Common Touchscreen Devices.
- [INTERACT 2019] Social Engineering and Organisational Dependencies in Phishing Attacks.
- [INTERACT 2021] Passphrases Beat Thermal Attacks: Evaluating Text Input Characteristics Against Thermal Attacks on Laptops and Smartphones.
- [INTERACT 2021] Understanding Insider Attacks in Personalized Picture Password Schemes.
- [INTERACT 2021] User Feedback to Improve the Performance of a Cyberattack Detection Artificial Intelligence System in the e-Health Domain.
- [COLCOM 2010] A collaborative approach to facilitate intrusion detection and response against DDoS attacks.
- [COLCOM 2011] A trust-based approach to mitigate rerouting attacks.
- [COLCOM 2012] Modelling Bayesian attacker detection game in wireless networks with epistemic logic.
- [COLCOM 2012] Predictability trust for Wireless Sensor Networks to provide a defense against On/off attack.
- [COLCOM 2012] EigenTrustp++: Attack resilient trust management.
- [COLCOM 2012] Robust expert ranking in online communities - fighting Sybil Attacks.
- [COLCOM 2012] Similarity analysis of shellcodes in drive-by download attack kits.
- [COLCOM 2013] Non-intrusive process-based monitoring system to mitigate and prevent VM vulnerability explorations.
- [COLCOM 2014] Hybrid approach to detect SQLi attacks and evasion techniques.
- [COLCOM 2014] Detection of plugin misuse drive-by download attacks using kernel machines.
- [COLCOM 2017] A Human-Machine Collaborative Detection Model for Identifying Web Attacks.
- [COLCOM 2017] An Efficient Black-Box Vulnerability Scanning Method for Web Application.
- [COLCOM 2020] Attacking the Dialogue System at Smart Home.
- [COLCOM 2021] Yet Another Traffic Black Hole: Amplifying CDN Fetching Traffic with RangeFragAmp Attacks.
- [COLCOM 2021] Backdoor Attack of Graph Neural Networks Based on Subgraph Trigger.
- [COLCOM 2021] Smart Contract Vulnerability Detection Based on Dual Attention Graph Convolutional Network.
- [COLCOM 2021] PATR: A Novel Poisoning Attack Based on Triangle Relations Against Deep Learning-Based Recommender Systems.
- [COLCOM 2022] Secure and Private Coding for Edge Computing Against Cooperative Attack with Low Communication Cost and Computational Load.
- [COLCOM 2022] Prevention of GAN-Based Privacy Inferring Attacks Towards Federated Learning.
- [COLCOM 2022] Anti-Clone: A Lightweight Approach for RFID Cloning Attacks Detection.
- [COLCOM 2023] Robustness-Enhanced Assertion Generation Method Based on Code Mutation and Attack Defense.
- [COLCOM 2023] Structural Adversarial Attack for Code Representation Models.
- [CSCWD 2012] An efficient sequential watermark detection model for tracing network attack flows.
- [CSCWD 2013] Eavesdropping attack in collaborative wireless networks: Security protocols and intercept behavior.
- [CSCWD 2014] A novel active website fingerprinting attack against Tor anonymous system.
- [CSCWD 2014] A multi-queue algorithm for DDoS attacks.
- [CSCWD 2015] A novel Website Fingerprinting attack against multi-tab browsing behavior.
- [CSCWD 2016] Effects of cyber attacks on islanded microgrid frequency control.
- [CSCWD 2019] An ARI-HMM based Interest Flooding Attack countermeasure in NDN.
- [CSCWD 2021] TEA-RNN: Topic-Enhanced Attentive RNN for Attribute Inference Attacks via User Behaviors.
- [CSCWD 2021] LDoS Attack Detection using PSO and K-means Algorithm.
- [CSCWD 2021] Producing More with Less: A GAN-based Network Attack Detection Approach for Imbalanced Data.
- [CSCWD 2021] Modeling Attackers Based on Heterogenous Graph through Malicious HTTP Requests.
- [CSCWD 2021] A Novel Trojan Attack against Co-learning Based ASR DNN System.
- [CSCWD 2022] Inductive Vulnerability Detection via Gated Graph Neural Network.
- [CSCWD 2022] GraphDDoS: Effective DDoS Attack Detection Using Graph Neural Networks.
- [CSCWD 2023] ACG: Attack Classification on Encrypted Network Traffic using Graph Convolution Attention Networks.
- [CSCWD 2023] VDDA: An Effective Software Vulnerability Detection Model Based on Deep Learning and Attention Mechanism.
- [CSCWD 2023] Improving the Quality of Textual Adversarial Examples with Dynamic N-gram Based Attack.
- [CSCWD 2023] A Robust Framework for Fixing The Vulnerability of Compressed Distributed Learning.
- [CSCWD 2023] MIA-FedDL: A Membership Inference Attack against Federated Distillation Learning.
- [CSCWD 2023] Black-box Word-level Textual Adversarial Attack Based On Discrete Harris Hawks Optimization.
- [CSCWD 2023] AHIP: An Adaptive IP Hopping Method for Moving Target Defense to Thwart Network Attacks.
- [CSCWD 2023] Defending Poisoning Attacks in Federated Learning via Loss Value Normal Distribution.
- [CSCWD 2023] Catch Me If You Can: A New Low-Rate DDoS Attack Strategy Disguised by Feint.
- [CSCWD 2023] Cross Domain on Snippets: BiLSTM-TextCNN based Vulnerability Detection with Domain Adaptation.
- [CSCWD 2023] Code Property Graph based Vulnerability Type Identification with Fusion Representation.
- [CSCWD 2024] KSM: Killer of Spectre and Meltdown Attacks.
- [CSCWD 2024] PROFL: A Privacy-Preserving Federated Learning Method with Stringent Defense Against Poisoning Attacks.
- [CSCWD 2024] PAPnet: A Plug-and-play Virus Network for Backdoor Attack.
- [CSCWD 2024] Towards More Effective and Transferable Poisoning Attacks against Link Prediction on Graphs.
- [CSCWD 2024] ASL: Adversarial Attack by Stacking Layer-wise Relevance Propagation.
- [CSCWD 2024] FedPGT: Prototype-based Federated Global Adversarial Training against Adversarial Attack.
- [CSCWD 2024] Multi-granularity Feature Fusion Detection for Encrypted Slow DDoS Attack in SDN.
- [CSCWD 2024] Collaborative Denoising Shilling Attack for Recommendation Systems.
- [CSCWD 2024] Local Black-box Adversarial Attack based on Random Segmentation Channel.
- [CSCWD 2024] Seeing the Attack Paths: Improved Flow Correlation Scheme in Stepping-Stone Intrusion.
- [CSCWD 2024] Stacking Ensemble Learning Network Attack Detection Based on Industrial Processes in CPS-Enabled Smart Water Conservancy.
- [CSCWD 2024] Enhancing Ensemble Attacks through Momentum Self-Maintenance.
- [CSCWD 2024] Imporved on Qiu’s shemes to resist long-term observation attacks with semantic attributes of location.
- [CSCWD 2024] Collaborative Detection Method against False Data Injection Attacks in Microgrid Cyber-Physical Systems.
- [CSCWD 2024] Implementing Fuzz-Based Technology for Detecting Spectre-Style Vulnerabilities.
- [CSCWD 2024] A Blockchain-based Federated Learning Framework for Defending Against Poisoning Attacks in IIOT.
- [CSCWD 2024] Heart of Betrayal: A PIN Inference Attack Leveraging Photoplethysmography on Wearables.
- [CSCWD 2024] A deep learning based detection scheme towards DDos Attack in permissioned blockchains.
- [CSCWD 2024] Extended Cell Similarity-based Cyber Attack Detection Method for DC Microgrids under Variable Load.
- [CSCWD 2024] Revisiting Open DNS Resolver Vulnerabilities to Reflection-Based DDoS Threats.
- [CSCWD 2025] QShield: Universal Defense Framework Against QUIC Client-Side Attacks with eBPF.
- [CSCWD 2025] Go To Anywhere: A Multi-Armed Bandit Based Offloading Attack in Edge Computing.
- [CSCWD 2025] P4M3: Preventing SYN Flood Attacks on IPv6 Networks in SDN Using P4.
- [CSCWD 2025] DCASR: Dynamic Multi-Type Security Resource Allocation Against APT Attack.
- [CSCWD 2025] What Makes an Email Insecure: A Fine-Grained Risk Assessment Scheme for Phishing Emails Targeting Attack Vectors.
- [CSCWD 2025] TAD-FC: An Adaptive Network Attack Detection and Feature Capture Approach for Real-World Network Environments.
- [CSCWD 2025] RGB Single-Channel Frequency Domain Backdoor Attack on Image Manipulation Localization.
- [CSCWD 2025] VDPST: Enhancing Line-Level Vulnerability Detection with Patch Slicing and Transformers.
- [CSCWD 2025] TDBA: Towards Transferable Data-free Black-box Attack with Stable Diffusion.
- [CSCWD 2025] FLUDP: A Backdoor Attack Defense Framework in Federated Learning.
- [CSCWD 2025] A Physical Backdoor Attack Against Practical Federated Learning.
- [CSCWD 2025] Anya: A Novel Video Identification Attack on Media Multiplexing.
- [CSCWD 2025] Migratability of Adversarial Node Attacks in Graph Neural Networks: A Comprehensive Study.
- [CSCWD 2025] Poisoning Attacks Against Federated Recommender Systems and the Defenses: A Survey.
- [CSCWD 2025] Research on Multi-Domain Interoperability Dynamic Access Control Algorithm Under APT Attack.
- [CSCWD 2025] SEABA: Sample-Edge-Adaptive Backdoor Attack with Robustness and Invisibility.
- [CSCWD 2025] Research on DDoS Attack Security Situation Assessment Model Based on Fuzzy C Clustering Algorithm.
- [CSCWD 2025] Enhance CVE Severity Prediction From Vulnerability Description with Auxiliary Sentence.
- [CSCWD 2025] MPKAN: APT Attack Detection on Audit Logs via Graph Semantic Enhancement.
- [MOBIQUITOUS 2013] Complexity of Distance Fraud Attacks in Graph-Based Distance Bounding.
- [MOBIQUITOUS 2013] Neighbourhood-Pair Attack in Social Network Data Publishing.
- [MOBIQUITOUS 2017] AP-Attack: A Novel User Re-identification Attack On Mobility Datasets.
- [MOBIQUITOUS 2017] Understanding Vulnerabilities of Location Privacy Mechanisms against Mobility Prediction Attacks.
- [MOBIQUITOUS 2017] Duck Attack on Accountable Distributed Systems.
- [MOBIQUITOUS 2020] MIRES: Recovering Mobile Applications based on Backend-as-a-Service from Cyber Attacks.
- [MOBIQUITOUS 2023] Reading the Mind’s Eye: Detecting Trauma-Vulnerability in Individuals by Analyzing Attention Through Eye-Tracking.
- [AVI 2012] Envisioning grid vulnerabilities: multi-dimensional visualization for electrical grid planning.
- [AVI 2020] Are Thermal Attacks Ubiquitous?: When Non-Expert Attackers Use Off the shelf Thermal Cameras.
- [AVI 2020] Integrated Visual Analytics Approach against Multivariate Cybersecurity Attack.
- [AVI 2022] Understanding Shoulder Surfer Behavior and Attack Patterns Using Virtual Reality.
- [AVI 2024] Detection And Mitigation Of Cyber attacks that exploit human vuLnerabilitiES (DAMOCLES 2024).
- [WWW 2010] Detection and analysis of drive-by-download attacks and malicious JavaScript code.
- [WWW 2010] Automated detection of session fixation vulnerabilities.
- [WWW 2013] CopyCatch: stopping group attacks by spotting lockstep behavior in social networks.
- [WWW 2013] I know the shortened URLs you clicked on Twitter: inference attack using public click analytics and Twitter metadata.
- [WWW 2014] Automatic detection and correction of web application vulnerabilities using data mining to predict false positives.
- [WWW 2015] Network-based Origin Confusion Attacks against HTTPS Virtual Hosting.
- [WWW 2015] Automatic Detection of Information Leakage Vulnerabilities in Browser Extensions.
- [WWW 2016] Tell Me About Yourself: The Malicious CAPTCHA Attack.
- [WWW 2017] Tracking Phishing Attacks Over Time.
- [WWW 2017] Ex Machina: Personal Attacks Seen at Scale.
- [WWW 2018] Attack under Disguise: An Intelligent Data Poisoning Attack Mechanism in Crowdsourcing.
- [WWW 2018] Did You Really Just Have a Heart Attack?: Towards Robust Detection of Personal Health Mentions in Social Media.
- [WWW 2018] AdBudgetKiller: Online Advertising Budget Draining Attack.
- [WWW 2019] Longitudinal Adversarial Attack on Electronic Health Records Data.
- [WWW 2019] A Large-scale Study on the Risks of the HTML5 WebAPI for Mobile Sensor-based Attacks.
- [WWW 2019] No More than What I Post: Preventing Linkage Attacks on Check-in Services.
- [WWW 2020] Adversarial Attacks on Graph Neural Networks via Node Injections: A Hierarchical Reinforcement Learning Approach.
- [WWW 2020] The Chameleon Attack: Manipulating Content Display in Online Social Media.
- [WWW 2020] Adversarial Attack on Community Detection by Hiding Individuals.
- [WWW 2020] Practical Data Poisoning Attack against Next-Item Recommendation.
- [WWW 2020] On the Robustness of Cascade Diffusion under Node Attacks.
- [WWW 2020] I’ve Got Your Packages: Harvesting Customers’ Delivery Order Information using Package Tracking Number Enumeration Attacks.
- [WWW 2020] Influence Function based Data Poisoning Attacks to Top-N Recommender Systems.
- [WWW 2021] Data Poisoning Attacks and Defenses to Crowdsourcing Systems.
- [WWW 2021] Towards a Lightweight, Hybrid Approach for Detecting DOM XSS Vulnerabilities with Machine Learning.
- [WWW 2021] Graph Embedding for Recommendation against Attribute Inference Attacks.
- [WWW 2021] Adversarial Item Promotion: Vulnerabilities at the Core of Top-N Recommenders that Use Images to Address Cold Start.
- [WWW 2021] Robust Android Malware Detection against Adversarial Example Attacks.
- [WWW 2021] One Detector to Rule Them All: Towards a General Deepfake Attack Detection Framework.
- [WWW 2021] A Targeted Attack on Black-Box Neural Machine Translation with Parallel Data Poisoning.
- [WWW 2021] Robust Network Alignment via Attack Signal Scaling and Adversarial Perturbation Elimination.
- [WWW 2022] Am I a Real or Fake Celebrity? Evaluating Face Recognition and Verification APIs under Deepfake Impersonation Attack.
- [WWW 2022] An Accuracy-Lossless Perturbation Method for Defending Privacy Attacks in Federated Learning.
- [WWW 2022] Link: Black-Box Detection of Cross-Site Scripting Vulnerabilities Using Reinforcement Learning.
- [WWW 2022] Unsupervised Graph Poisoning Attack via Contrastive Loss Back-propagation.
- [WWW 2022] Is this Question Real? Dataset Collection on Perceived Intentions and Implicit Attack Detection.
- [WWW 2022] Modeling Inter Round Attack of Online Debaters for Winner Prediction.
- [WWW 2023] Minimum Topology Attacks for Graph Neural Networks.
- [WWW 2023] Anti-FakeU: Defending Shilling Attacks on Graph Neural Network based Recommender Model.
- [WWW 2023] Interaction-level Membership Inference Attack Against Federated Recommender Systems.
- [WWW 2023] Membership Inference Attacks Against Sequential Recommender Systems.
- [WWW 2023] Efficient and Low Overhead Website Fingerprinting Attacks and Defenses based on TCP/IP Traffic.
- [WWW 2023] MaSS: Model-agnostic, Semantic and Stealthy Data Poisoning Attack on Knowledge Graph Embedding.
- [WWW 2023] NetGuard: Protecting Commercial Web APIs from Model Inversion Attacks using GAN-generated Fake Samples.
- [WWW 2023] Time-manipulation Attack: Breaking Fairness against Proof of Authority Aura.
- [WWW 2023] Ginver: Generative Model Inversion Attacks Against Collaborative Inference.
- [WWW 2023] Training-free Lexical Backdoor Attacks on Language Models.
- [WWW 2023] The Benefits of Vulnerability Discovery and Bug Bounty Programs: Case Studies of Chromium and Firefox.
- [WWW 2023] Cross-Modality Mutual Learning for Enhancing Smart Contract Vulnerability Detection on Bytecode.
- [WWW 2023] Unnoticeable Backdoor Attacks on Graph Neural Networks.
- [WWW 2023] Scan Me If You Can: Understanding and Detecting Unwanted Vulnerability Scanning.
- [WWW 2023] Sedition Hunters: A Quantitative Study of the Crowdsourced Investigation into the 2021 U.S. Capitol Attack.
- [WWW 2023] Attacking Fake News Detectors via Manipulating News Social Engagement.
- [WWW 2024] Federated Learning Vulnerabilities: Privacy Attacks with Denoising Diffusion Probabilistic Models.
- [WWW 2024] Contrastive Fingerprinting: A Novel Website Fingerprinting Attack over Few-shot Traces.
- [WWW 2024] Medusa: Unveil Memory Exhaustion DoS Vulnerabilities in Protocol Implementations.
- [WWW 2024] Fake Resume Attacks: Data Poisoning on Online Job Platforms.
- [WWW 2024] RecurScan: Detecting Recurring Vulnerabilities in PHP Web Applications.
- [WWW 2024] HSDirSniper: A New Attack Exploiting Vulnerabilities in Tor’s Hidden Service Directories.
- [WWW 2024] Poisoning Attack on Federated Knowledge Graph Embedding.
- [WWW 2024] Unity is Strength? Benchmarking the Robustness of Fusion-based 3D Object Detection against Physical Sensor Attack.
- [WWW 2024] Uplift Modeling for Target User Attacks on Recommender Systems.
- [WWW 2024] Physical Trajectory Inference Attack and Defense in Decentralized POI Recommendation.
- [WWW 2024] Message Injection Attack on Rumor Detection under the Black-Box Evasion Setting Using Large Language Model.
- [WWW 2025] NI-GDBA: Non-Intrusive Distributed Backdoor Attack Based on Adaptive Perturbation on Federated Graph Learning.
- [WWW 2025] Dual Intention Escape: Penetrating and Toxic Jailbreak Attack against Large Language Models.
- [WWW 2025] Serial Scammers and Attack of the Clones: How Scammers Coordinate Multiple Rug Pulls on Decentralized Exchanges.
- [WWW 2025] Beyond Single Tabs: A Transformative Few-Shot Approach to Multi-Tab Website Fingerprinting Attacks.
- [WWW 2025] SPEAR: A Structure-Preserving Manipulation Method for Graph Backdoor Attacks.
- [WWW 2025] Revisiting Backdoor Attacks on Time Series Classification in the Frequency Domain.
- [WWW 2025] Not All Benignware Are Alike: Enhancing Clean-Label Attacks on Malware Classifiers.
- [WWW 2025] Traceback of Poisoning Attacks to Retrieval-Augmented Generation.
- [WWW 2025] Robust Graph Learning Against Adversarial Evasion Attacks via Prior-Free Diffusion-Based Structure Purification.
- [WWW 2025] Mask-based Membership Inference Attacks for Retrieval-Augmented Generation.
- [WWW 2025] Beyond Visual Confusion: Understanding How Inconsistencies in ENS Normalization Facilitate Homoglyph Attacks.
- [WWW 2025] Aegis: Post-Training Attribute Unlearning in Federated Recommender Systems against Attribute Inference Attacks.
- [WWW 2025] Instruction Vulnerability Prediction for WebAssembly with Semantic Enhanced Code Property Graph.
- [WWW 2025] Quantitative Runtime Monitoring of Ethereum Transaction Attacks.
- [WWW 2025] SigScope: Detecting and Understanding Off-Chain Message Signing-related Vulnerabilities in Decentralized Applications.
- [WWW 2025] MER-Inspector: Assessing Model Extraction Risks from An Attack-Agnostic Perspective.
- [WWW 2025] Breaking the Shield: Analyzing and Attacking Canvas Fingerprinting Defenses in the Wild.
- [WWW 2025] Hunting in the Dark Forest: A Pre-trained Model for On-chain Attack Transaction Detection in Web3.
- [WWW 2025] Safeguarding Blockchain Ecosystem: Understanding and Detecting Attack Transactions on Cross-chain Bridges.
- [RTSS 2019] Butterfly Attack: Adversarial Manipulation of Temporal Properties of Cyber-Physical Systems.
- [RTSS 2019] Work-in-Progress: Combining Two Security Methods to Detect Versatile Integrity Attacks in Cyber-Physical Systems.
- [RTSS 2020] Real-Time Attack-Recovery for Cyber-Physical Systems Using Linear Approximations.
- [RTSS 2021] Catch Me If You Learn: Real-Time Attack Detection and Mitigation in Learning Enabled CPS.
- [RTSS 2021] Vulnerability of Controller Area Network to Schedule-Based Attacks.
- [RTSS 2022] PolyRhythm: Adaptive Tuning of a Multi-Channel Attack Template for Timing Interference.
- [RTSS 2022] Fail-Safe: Securing Cyber-Physical Systems against Hidden Sensor Attacks.
- [RTSS 2022] Work-in-Progress: Control Skipping Sequence Synthesis to Counter Schedule-based Attacks.
- [RTSS 2023] Who’s Afraid of Butterflies? A Close Examination of the Butterfly Attack.
- [RTSS 2023] Catch You if Pay Attention: Temporal Sensor Attack Diagnosis Using Attention Mechanisms for Cyber-Physical Systems.
- [RTSS 2023] Learn-to-Respond: Sequence-Predictive Recovery from Sensor Attacks in Cyber-Physical Systems.
- [RTSS 2024] Work-in-Progress: Analyzing Worst-Case DDoS Traffic Scrub Effect and Recovery Delay via Attack Vector Combination.
- [WINE 2013] Mitigating Covert Compromises - A Game-Theoretic Model of Targeted and Non-Targeted Covert Attacks.
- [WINE 2016] Strategic Network Formation with Attack and Immunization.
- [WINE 2017] Limiting User’s Sybil Attack in Resource Sharing.
- [WINE 2019] Sophisticated Attacks on Decoy Ballots: A Devil’s Menu.
- [COGSCI 2013] Experiments in dynamic group action and decision making: How crowds of people can walk a tightrope together and survive a zombie attack.
- [COGSCI 2015] Attacker and Defender Counting Approach for Abstract Argumentation.
- [COGSCI 2021] The Perception of Reduced Reliability in an External Store Reduces Vulnerability to its Manipulation.
- [BIBM 2020] Adversarial Vulnerability of Deep Learning Models in Analyzing Next Generation Sequencing Data.
- [BIBM 2021] The effect of the infarct regions on vulnerability to reentry in two different stages of myocardial infarction.
- [BIBM 2022] MedAttacker: Exploring Black-Box Adversarial Attacks on Risk Prediction Models in Healthcare.
- [BIBM 2023] Modelling a network as a spring system to estimate edge vulnerability.
- [EMSOFT 2015] Exp-HE: a family of fast exponentiation algorithms resistant to SPA, fault, and combined attacks.
- [EMSOFT 2020] Interpretability Derived Backdoor Attacks Detection in Deep Neural Networks: Work-in-Progress.
- [EMSOFT 2021] Generative strategy based backdoor attacks to 3D point clouds: work-in-progress.
- [MICCAI 2020] Defending Deep Learning-Based Biomedical Image Segmentation from Adversarial Attacks: A Low-Cost Frequency Refinement Approach.
- [MICCAI 2020] Miss the Point: Targeted Adversarial Attack on Multiple Landmark Detection.
- [MICCAI 2021] A Hierarchical Feature Constraint to Camouflage Medical Adversarial Attacks.
- [AMIA 2014] A Qualitative Study Exploring The Vulnerabilities Of Computerized Physician Order Entry Systems in the U.S. and Canada.
- [AMIA 2018] Re-Identification Risk in HIPAA De-Identified Datasets: The MVA Attack.
- [AMIA 2018] Employee Susceptibility to Phishing Attacks at US Healthcare Institutions.
- [AMIA 2020] Visualizing Vulnerability: Design and Usability of Interactive Mapping Tools for Global Health Preparedness.
- [BIGDATACONF 2014] Location prediction attacks using tensor factorization and optimal defenses.
- [BIGDATACONF 2015] A novel framework for mitigating insider attacks in big data systems.
- [BIGDATACONF 2016] Scalable attack propagation model and algorithms for honeypot systems.
- [BIGDATACONF 2017] Detection of profile injection attacks in social recommender systems using outlier analysis.
- [BIGDATACONF 2017] Improving cyber-attack predictions through information foraging.
- [BIGDATACONF 2017] On the relevance of social media platforms in predicting the volume and patterns of web defacement attacks.
- [BIGDATACONF 2018] CVExplorer: Multidimensional Visualization for Common Vulnerabilities and Exposures.
- [BIGDATACONF 2018] Realtime Robustification of Interdependent Networks under Cascading Attacks.
- [BIGDATACONF 2018] The Unbanked and Poverty: Predicting area-level socio-economic vulnerability from M-Money transactions.
- [BIGDATACONF 2018] Cyberattack Prediction Through Public Text Analysis and Mini-Theories.
- [BIGDATACONF 2018] Analyzing Evolving Trends of Vulnerabilities in National Vulnerability Database.
- [BIGDATACONF 2018] Identification of Attack-based Digital Forensic Evidences for WAMPAC Systems.
- [BIGDATACONF 2018] Intelligent analysis of digital evidences in large-scale logs in power systems attributed to the attacks.
- [BIGDATACONF 2018] Towards Prediction of Security Attacks on Software Defined Networks: A Big Data Analytic Approach.
- [BIGDATACONF 2018] Defending SDN-based IoT Networks Against DDoS Attacks Using Markov Decision Process.
- [BIGDATACONF 2018] Analyzing False Positive Source Code Vulnerabilities Using Static Analysis Tools.
- [BIGDATACONF 2018] A Framework for Making Effective Responses to Cyberattacks.
- [BIGDATACONF 2018] High Performance Attack Estimation in Large-Scale Network Flows.
- [BIGDATACONF 2018] A Hierarchical Framework to Detect Targeted Attacks using Deep Neural Network.
- [BIGDATACONF 2018] MPMPA: A Mitigation and Prevention Model for Social Engineering Based Phishing attacks on Facebook.
- [BIGDATACONF 2019] Uncertainty-Aware Opinion Inference Under Adversarial Attacks.
- [BIGDATACONF 2019] Denoising and Verification Cross-Layer Ensemble Against Black-box Adversarial Attacks.
- [BIGDATACONF 2019] Indirect Adversarial Attacks via Poisoning Neighbors for Graph Convolutional Networks.
- [BIGDATACONF 2019] Towards comparing and using Machine Learning techniques for detecting and predicting Heart Attack and Diseases.
- [BIGDATACONF 2019] Examination of Double Arbiter PUFs on Security against Machine Learning Attacks.
- [BIGDATACONF 2019] Worth the Wait? Time Window Feature Optimization for Attack Classification.
- [BIGDATACONF 2019] Technique for Finding and Investigating the Strongest Combinations of Cyberattacks on Smart Grid Infrastructure.
- [BIGDATACONF 2019] Reinforcement Learning Framework to Identify Cause of Diseases - Predicting Asthma Attack Case.
- [BIGDATACONF 2019] Detecting DoS Attack in Smart Home IoT Devices Using a Graph-Based Approach.
- [BIGDATACONF 2019] Defense-PointNet: Protecting PointNet Against Adversarial Attacks.
- [BIGDATACONF 2019] RIBS: Risky Blind-Spots for Attack Classification Models.
- [BIGDATACONF 2019] A Model Checking based Proposal for Mobile Colluding Attack Detection.
- [BIGDATACONF 2020] Broadening Differential Privacy for Deep Learning Against Model Inversion Attacks.
- [BIGDATACONF 2020] Towards Fighting Cybercrime: Malicious URL Attack Type Detection using Multiclass Classification.
- [BIGDATACONF 2020] From Computational De-Morphogenesis to Contaminated Representation for the Contemporary Digital Tectonics and Lexicon : Vulnerability and Resilience of the Generative Representation in the Web-Oriented Platform - BIM/GD.
- [BIGDATACONF 2020] Predicting Consequences of Cyber-Attacks.
- [BIGDATACONF 2020] An Attacks Detection Mechanism for Intelligent Transport System.
- [BIGDATACONF 2020] Graph Adversarial Attacks and Defense: An Empirical Study on Citation Graph.
- [BIGDATACONF 2020] Toward Quantifying Vulnerabilities in Critical Infrastructure Systems.
- [BIGDATACONF 2020] Explainable Software vulnerability detection based on Attention-based Bidirectional Recurrent Neural Networks.
- [BIGDATACONF 2020] Machine Learning Methods for Improving Vulnerability Detection in Low-level Code.
- [BIGDATACONF 2021] A Synergetic Attack against Neural Network Classifiers combining Backdoor and Adversarial Examples.
- [BIGDATACONF 2021] Resisting Distributed Backdoor Attacks in Federated Learning: A Dynamic Norm Clipping Approach.
- [BIGDATACONF 2021] Vulnerabilities Manager, a platform for linking vulnerability data sources.
- [BIGDATACONF 2021] Digital Forensics Process of an Attack Vector in ICS environment.
- [BIGDATACONF 2021] Tolerating Adversarial Attacks and Byzantine Faults in Distributed Machine Learning.
- [BIGDATACONF 2021] Covid-19 digital Contact-tracing: a doorway to well-being or a backdoor to security vulnerabilities?
- [BIGDATACONF 2021] Fingerphoto Presentation Attack Detection: Generalization in Smartphones.
- [BIGDATACONF 2021] Investigating the Changes in Software Metrics after Vulnerability is Fixed.
- [BIGDATACONF 2022] VWC-BERT: Scaling Vulnerability-Weakness-Exploit Mapping on Modern AI Accelerators.
- [BIGDATACONF 2022] Exploring the Target Distribution for Surrogate-Based Black-Box Attacks.
- [BIGDATACONF 2022] Defending Evasion Attacks via Adversarially Adaptive Training.
- [BIGDATACONF 2022] RAF: Recursive Adversarial Attacks on Face Recognition Using Extremely Limited Queries.
- [BIGDATACONF 2022] Matching Attacks on Non-deterministic Algorithms for Cell Suppression Problem for Tabular Data.
- [BIGDATACONF 2022] Graph Representation Learning based Vulnerable Target Identification in Ransomware Attacks.
- [BIGDATACONF 2022] Dual Graphs of Polyhedral Decompositions for the Detection of Adversarial Attacks.
- [BIGDATACONF 2022] Artificial Intelligence Enabled Middleware for Distributed Cyberattacks Detection in IoT-based Smart Environments.
- [BIGDATACONF 2022] An Improved Vulnerability Detection System of Smart Contracts Based on Symbolic Execution.
- [BIGDATACONF 2022] Analysis of Label-Flip Poisoning Attack on Machine Learning Based Malware Detector.
- [BIGDATACONF 2022] Federated Learning Attacks and Defenses: A Survey.
- [BIGDATACONF 2022] Software Supply Chain Vulnerabilities Detection in Source Code: Performance Comparison between Traditional and Quantum Machine Learning Algorithms.
- [BIGDATACONF 2022] Explaining IoT Attacks: An Effective and Efficient Semi-Supervised Learning Framework.
- [BIGDATACONF 2022] Low-rank Defenses Against Adversarial Attacks in Recommender Systems.
- [BIGDATACONF 2022] Adaptive Attacks and Targeted Fingerprinting of Relational Data.
- [BIGDATACONF 2022] Analyzing and Defending against Membership Inference Attacks in Natural Language Processing Classification.
- [BIGDATACONF 2022] Robust Stochastic Bandit algorithms to defend against Oracle attack using Sample Dropout.
- [BIGDATACONF 2022] Botnet Attack Intrusion Detection In IoT Enabled Automated Guided Vehicles.
- [BIGDATACONF 2023] CGP: Centroid-guided Graph Poisoning for Link Inference Attacks in Graph Neural Networks.
- [BIGDATACONF 2023] An Exploratory Study of Vulnerabilities in Big Data Systems.
- [BIGDATACONF 2023] Analyzing Threat Vectors in ICS Cyberattacks.
- [BIGDATACONF 2023] Active Data Reconstruction Attacks in Vertical Federated Learning.
- [BIGDATACONF 2023] New Finger Photo Databases with Presentation Attacks and Demographics.
- [BIGDATACONF 2023] SmartDT: An Effective Vulnerability Detection System of Smart Contracts Based on Deep Learning.
- [BIGDATACONF 2023] CVE representation to build attack positions graphs.
- [BIGDATACONF 2023] Hybrid Attack Graph Generation with Graph Convolutional Deep-Q Learning.
- [BIGDATACONF 2023] A Max-Min Security Game for Coordinated Backdoor Attacks on Federated Learning.
- [BIGDATACONF 2023] Defending Federated Learning Against Model Poisoning Attacks.
- [BIGDATACONF 2023] Clean-label Poisoning Attack against Fake News Detection Models.
- [BIGDATACONF 2023] Data Poisoning Attacks over Diabetic Retinopathy Images Classification.
- [BIGDATACONF 2023] NetSat: Network Saturation Adversarial Attack.
- [BIGDATACONF 2023] ANTI-Disinformation: An Adversarial Attack and Defense Network Towards Improved Robustness for Disinformation Detection on Social Media.
- [BIGDATACONF 2023] Intelligent Attack Detection in ROS-based Systems.
- [BIGDATACONF 2024] susFL: Federated Learning-based Monitoring for Sustainable, Attack-Resistant Smart Farms.
- [BIGDATACONF 2024] FedGSDW: Enhancing Federated Learning Robustness against Model Poisoning Attack.
- [BIGDATACONF 2024] XSub: Explanation-Driven Adversarial Attack against Blackbox Classifiers via Feature Substitution.
- [BIGDATACONF 2024] Generating Phishing Attacks and Novel Detection Algorithms in the Era of Large Language Models.
- [BIGDATACONF 2024] AutoRed: Automated Attack Scenario Generation Framework for Red Teaming of LLMs.
- [BIGDATACONF 2024] Next-Generation Phishing: How LLM Agents Empower Cyber Attackers.
- [BIGDATACONF 2024] AAG: Adversarial Attack Generator for evaluating the robustness of Machine Learning Models against Adversarial Attacks.
- [BIGDATACONF 2024] A Cloud-Based Key Rolling Technique for Alleviating Join Procedure Replay Attacks in LoRaWAN-based Wireless Sensor Networks.
- [BIGDATACONF 2024] Leveraging Digital Twin Technologies for Public Space Protection and Vulnerability Assessment.
- [BIGDATACONF 2024] Exposing LLM Vulnerabilities: Adversarial Scam Detection and Performance.
- [BIGDATACONF 2024] Assessing Membership Inference Attacks under Distribution Shifts.
- [BIGDATACONF 2024] From Spatial to Frequency Domain: Defending Medical Image Classification Against Steganography-Based Adversarial Attacks.
- [BIGDATACONF 2024] Adversarially Exploring Vulnerabilities in LLMs to Evaluate Social Biases.
- [BIGDATACONF 2024] Are Existing Large Language Models Robust Against Jailbreak Attacks?
- [BIGDATACONF 2024] The Evaluation of Extracted Features for Detecting Eclipse Attacks on Ethereum Network Layers.
- [BIGDATACONF 2024] AWEB to Bridge Cybersecurity Attack Patterns and Weaknesses.
- [BIGDATACONF 2024] Front-running Attack Detection in Blockchain using Conditional Packing Generative AI.
- [BIGDATACONF 2024] Not All Malware are Born Equally: An Empirical Analysis of Adversarial Evasion Attacks in Relation to Malware Types and PE Files Structure.
- [BIGDATACONF 2024] Securing Vision-Language Models with a Robust Encoder Against Jailbreak and Adversarial Attacks.
- [BIGDATACONF 2024] Partially training, isolating and unlearning, mitigating backdoor attack.
- [BIGDATACONF 2024] A Lightweight Edge-CNN-Transformer Model for Detecting Coordinated Cyber and Digital Twin Attacks in Cooperative Smart Farming.
- [BIGDATACONF 2024] EnStack: An Ensemble Stacking Framework of Large Language Models for Enhanced Vulnerability Detection in Source Code.
- [BIGDATACONF 2024] Leveraging MTD to Mitigate Poisoning Attacks in Decentralized FL with Non-IID Data.
- [BIGDATACONF 2024] A Defense Mechanism Against LOKI Attacks in Federated Learning for Enhancing Big Data Privacy in Mobile Systems.
- [BIGDATACONF 2024] FedBlock: A Blockchain Approach to Federated Learning against Backdoor Attacks.
- [BIGDATACONF 2024] Defending Against Inference and Backdoor Attacks in Vertical Federated Learning via Mutual Information Regularization.
- [SMC 2010] A discovery of sequential attack patterns of malware in botnets.
- [SMC 2010] Disclosure strategies for critical infrastructure against terror attacks.
- [SMC 2011] Attack strategy for operation system of systems based on FINC-E model and edge key potential.
- [SMC 2011] On predictive errors of SQL injection attack detection by the feature of the single character.
- [SMC 2012] Detecting collaborative insider attacks in information systems.
- [SMC 2012] Attacks using random forgery against DTW-based online signature verification algorithm.
- [SMC 2013] Detection of Application Layer DDoS Attacks with Clustering and Bayes Factors.
- [SMC 2013] A Hybrid Technique Using Multi-objective Particle Swarm Optimization and Random Forests for PROBE Attacks Detection in a Network.
- [SMC 2013] DNSsec in Isabelle - Replay Attack and Origin Authentication.
- [SMC 2013] On the Design of a System for Airport Protection against Terrorist Attacks Using MANPADs.
- [SMC 2014] SQL injection attack detection method using the approximation function of zeta distribution.
- [SMC 2014] Vulnerability of the conventional accessible CAPTCHA used by the White House and an alternative approach for visually impaired people.
- [SMC 2015] A Wormhole Attacks Detection Using a QTS Algorithm with MA in WSN.
- [SMC 2015] Optimal Attack Strategy Based on Limited Cost Model on Complex Network.
- [SMC 2015] Detection of De-Authentication DoS Attacks in Wi-Fi Networks: A Machine Learning Approach.
- [SMC 2016] On the approximate maximum likelihood estimation in stochastic model of SQL injection attacks.
- [SMC 2016] Multi-level cache vulnerability estimation: The first step to protect memory.
- [SMC 2016] An adaptive sliding mode observer for linear systems under malicious attack.
- [SMC 2016] Modeling cyber attacks by stochastic games and Timed Petri Nets.
- [SMC 2017] Network simulation and vulnerability analysis on organization of facility management.
- [SMC 2017] Attack-aware multi-sensor integration algorithm for autonomous vehicle navigation systems.
- [SMC 2018] Impact Assessment of Multi-threats in Computer Systems Using Attack Tree Modeling.
- [SMC 2018] Systematic Analysis: Resistance to Traffic Analysis Attacks in Tor System for Critical Infrastructures.
- [SMC 2018] Research on Visualization Systems for DDoS Attack Detection.
- [SMC 2018] Vulnerability Analysis of a Chaos-Based Random Number Generator.
- [SMC 2018] Shilling Attack Detection Using Rated Item Correlation for Collaborative Filtering.
- [SMC 2019] Defending a single object in a defender-attacker game considering time.
- [SMC 2019] Integrated assessment of energy performance and seismic vulnerability of existing building stock at urban scale through BIM: an application to “Fiera del Levante”.
- [SMC 2019] A novel rapid survey form for the vulnerability assessment of existing building stock based on the “Index Building” approach.
- [SMC 2019] Rogue Twin Attack Detection: A Discrete Event System Paradigm Approach.
- [SMC 2019] Multiple Attacks Detection on Discrete Event Systems.
- [SMC 2020] It is double pleasure to deceive the deceiver: disturbing classifiers against adversarial attacks.
- [SMC 2020] A Framework for Sensing Radio Frequency Spectrum Attacks on Medical Delivery Drones.
- [SMC 2020] ‘Uh-oh Spaghetti-oh’: When Successful Genetic and Evolutionary Feature Selection Makes You More Susceptible to Adversarial Authorship Attacks.
- [SMC 2020] Identifying Cyber-Physical Vulnerabilities in Additive Manufacturing Systems using a Systems Approach.
- [SMC 2020] Detection of cyber attacks in IoT using tree-based ensemble and feedforward neural network.
- [SMC 2020] Incorporating risk preferences into a defense-attack game.
- [SMC 2020] Replay attack detection using a zonotopic KF and LQ approach.
- [SMC 2020] Unknown Input Observers Design For Real-Time Mitigation of the False Data Injection Attacks.
- [SMC 2020] Deep Learning Defense Method Against Adversarial Attacks.
- [SMC 2021] An XGBoost-Based Vulnerability Analysis of Smart Grid Cascading Failures under Topology Attacks.
- [SMC 2021] Classifying Denial of Service Attacks Using Fast Machine Learning Algorithms.
- [SMC 2021] Detection of Denial of Service Attacks Using Echo State Networks.
- [SMC 2021] ADMM-based OPF Problem Against Cyber Attacks in Smart Grid.
- [SMC 2021] Attack Pattern Recognition in the Internet of Things using Complex Event Processing and Machine Learning.
- [SMC 2021] Cyber secure consensus of discrete-time fractional-order multi-agent systems with distributed delayed control against attacks.
- [SMC 2021] Decentralized Event-Triggered Output Feedback Control for Nonlinear Networked Interconnected Systems under Multiple Cyber Attacks.
- [SMC 2021] Black-box Adversarial Attacks on Monocular Depth Estimation Using Evolutionary Multi-objective Optimization.
- [SMC 2022] A Hybrid Deep Learning Method for Network Attack Prediction.
- [SMC 2022] Adversarial joint attacks on legged robots.
- [SMC 2022] Covert Attack and Detection Through Deep Neural Network on Vision-Based Navigation Systems of Multi-Agent Autonomous Vehicles.
- [SMC 2022] On Attacking Deep Image Quality Evaluator Via Spatial Transform.
- [SMC 2022] A Machine Learning Based Approach to Detect Fault Injection Attacks in IoT Software Systems.
- [SMC 2023] Lyapunov-Based Internal Model Principle Attack Analysis on Distributed Multi-Agent Systems.
- [SMC 2023] Optimal Targeted Attacks Against Gait-Based Identity Recognition.
- [SMC 2023] XMODOS: An Explainable Model for Denial of Service Attack Detection.
- [SMC 2023] Black-Box Targeted Adversarial Attack Based on Multi-Population Genetic Algorithm.
- [SMC 2023] BGP Features and Classification of Internet Worms and Ransomware Attacks.
- [SMC 2023] Assessing the Vulnerability of Self-Supervised Speech Representations for Keyword Spotting Under White-Box Adversarial Attacks.
- [SMC 2023] Robust Malicious Domain Detection Against Adversarial Attacks on Heterogeneous Graph.
- [SMC 2023] FPA-WAN: Feature Pyramid Attention Based Watermarking Attack Network.
- [SMC 2023] Vulnerability Analysis of Interdependent Infrastructures Considering the Sensitivity of Components to Different Risks.
- [SMC 2023] Adversarial Stimuli: Attacking Brain-Computer Interfaces via Perturbed Sensory Events.
- [SMC 2023] Towards a Multi-Agent Simulation of Cyber-attackers and Cyber-defenders Battles.
- [SMC 2023] A GAN-Based False Data Injection and Civil Attack Detection Framework for Digital Relays with Feature Selection.
- [SMC 2023] Enhancing Graph Structures for Node Classification: An Alternative View on Adversarial Attacks.
- [SMC 2024] Dynamic Event-Triggered Distributed MPC for UAV-UGV Systems Against DoS Attacks on Communication Channels.
- [SMC 2024] Perturbing and Backtracking Based Textual Adversarial Attack.
- [SMC 2024] RPID: Boosting Transferability of Adversarial Attacks on Vision Transformers.
- [SMC 2024] Combining Deep Learning and Expert Rules for Smart Contract Vulnerability Detection.
- [SMC 2024] Detection of Low Rate DDoS with Adversarial Attacks by Enhanced Generative Adversarial Networks.
- [SMC 2024] Are ViTs Weak Against Patch Attacks?
- [SMC 2024] Vulnerability Detection by Sequential Learning of Program Semantics via Graph Attention Networks.
- [SMC 2024] A Neighborhood Reconstruction-Based Cyber Attack Detection Method for Smart Grid Security.
- [SMC 2024] Unified Industrial Cyber-Physical Systems Modelling and Performance Analysis Under Cyber-to-Physical Attacks.
- [SMC 2024] BTVD-BERT: A Bilingual Domain-Adaptation Pre-Trained Model for Textural Vulnerability Descriptions.
- [SMC 2024] Graph Attention Networks for Invisible Attack Identification in Smart Grids.
- [SMC 2024] Robust Kalman Filter Based Path-Tracking Control with Prescribed Performance for Autonomous Ground Vehicles under FDI Attack.
- [SMC 2024] Parallel-SWSA: Automated Extraction for Feature Sequences from Remote Access Trojan Attack Packets.
- [SMC 2024] MCD: Defense Against Query-Based Black-Box Surrogate Attacks.
- [ISBRA 2017] Addressing the Threats of Inference Attacks on Traits and Genotypes from Individual Genomic Data.
- [ISBRA 2021] Epidemic Vulnerability Index for Effective Vaccine Distribution Against Pandemic.
- [ISBRA 2024] Fighting Fire with Fire: Medical AI Models Defend Against Backdoor Attacks via Self-learning.
- [SAGT 2017] Efficient Best Response Computation for Strategic Network Formation Under Attack.
- [SAGT 2023] Computation of Nash Equilibria of Attack and Defense Games on Networks.
- [ICIC 2010] Bottleneck Attack Strategies on Complex Communication Networks.
- [ICIC 2011] Forgeability Attack of Two Special Signature Schemes.
- [ICIC 2011] Attacks and Improvements of QSDC Schemes Based on CSS Codes.
- [ICIC 2012] A Method for the Enhancement of the Detection Power and Energy Savings against False Data Injection Attacks in Wireless Sensor Networks.
- [ICIC 2014] Analyzing Feasibility for Deploying Very Fast Decision Tree for DDoS Attack Detection in Cloud-Assisted WBAN.
- [ICIC 2014] Cascading Failures in Power Grid under Three Node Attack Strategies.
- [ICIC 2016] Risk and Vulnerability Analysis of Critical Infrastructure.
- [ICIC 2017] Distributed Attack Prevention Using Dempster-Shafer Theory of Evidence.
- [ICIC 2018] Detecting Distributed Denial of Service Attacks in Neighbour Discovery Protocol Using Machine Learning Algorithm Based on Streams Representation.
- [ICIC 2019] Research on Security Vulnerabilities Based on Artificial Intelligence.
- [ICIC 2020] Phishing Attacks and Websites Classification Using Machine Learning and Multiple Datasets (A Comparative Analysis).
- [ICIC 2021] Adversarial Attacks and Defenses in Deep Learning: A Survey.
- [ICIC 2023] Zeroth-Order Gradient Approximation Based DaST for Black-Box Adversarial Attacks.
- [ICIC 2023] Undetectable Attack to Deep Neural Networks Without Using Model Parameters.
- [ICIC 2024] A Defense Strategy for UAV Swarm Against GNSS Spoofing Attacks Based on Game Model.
- [ICIC 2024] Toward Unknown/Known Cyberattack Detection with a Causal Transformer.
- [ICIC 2024] Smart Contract Vulnerability Detection Based on Multi Graph Convolutional Neural Networks with Self-attention.
- [ICIC 2024] Smart Contract Vulnerability Detection Based on Multimodal Feature Fusion.
- [ICIC 2024] DefenseVGAE: Defending Against Adversarial Attacks on Graph Data via a Variational Graph Autoencoder.
- [ICIC 2024] Collaborative Defense Method Against DDoS Attacks on SDN-Architected Cloud Servers.
- [ICIC 2024] Boosting Robustness of Silhouette-Based Gait Recognition Against Adversarial Attacks.