filmov
tv
Все публикации
0:19:32
9 Prune+PlumTree Finding Eviction Sets at Scale Tom Kissos
0:19:07
6 Efficient Zero knowledge Arguments for Paillier Cryptosystem Rae Gong
0:19:48
101 The Great Request Robbery Soheil Khodayari Soheil Khodayari
0:16:00
116 Security Privacy and Data Sharing Challenges When Moving to the US Insights from a Qualitative s
0:19:37
220 Piano Extremely Simple Single Server PIR with Sublinear Server Computation Mingxun Zhou
0:08:14
227 Sabre Cutting through Adversarial Noise with Adaptive Spectral Filtering and Input Reconstructio
0:11:10
307 Springproofs Efficient Inner Product Arguments for Vectors of Arbitrary Length Ming Su
0:15:56
443 Targeted and Troublesome Zahra Moti Zahra Moti
0:11:20
520 BELT Old School Backdoor Attacks can Evade the State of the Art Defense with Backdoor Exclusivit
0:19:43
483 Pandora Principled Symbolic Validation of Intel SGX Enclave Runtimes Jo Van Bulck
0:13:38
665 Obelix Mitigating Side Channels Through Dynamic Obfuscation Jan
0:14:13
694 LLMIF Augmented Large Language Model for Fuzzing IoT Devices Jincheng Wang
0:10:29
2024 37 SoK Safer Digital Safety Research Involving At Risk Users Rosanna “Rosie” Bellini
0:18:05
2024 76 Formal Dolev Yao Models Meet Cryptographic Protocol Fuzz Testing Max Ammann
0:15:06
2024 125 DeepTheft Stealing DNN Model Architectures through Power Side Channel Garrison Gao
0:08:11
2024 205 FlowMur A Stealthy and Practical Audio Backdoor Attack with Limited Knowledge Jiahe Lan
0:14:58
2024 305 Pianist Scalable zkRollups via Fully Distributed Zero Knowledge Proofs Tianyi Liu
0:15:29
Backdooring Multimodal Learning
0:18:45
LowerBoundsRDP Tim Kutta
0:05:28
183 Who Left the Door Open Investigating the Causes of Exposed IoT Devices in an Academic Network
0:18:55
114 GAuV Xingyu Xie
0:18:57
239 Nebula A Privacy First Platform for Data Backhaul Jean Luc Watson
0:18:17
272 SneakyPrompt Jailbreaking Text to image Generative Models Yuchen Yang
Вперёд