News
@inproceedings {294504, author = {Meng Chen and Xiangyu Xu and Li Lu and Zhongjie Ba and Feng Lin and Kui Ren}, title = {Devil in the Room: Triggering Audio Backdoors in the Physical World}, booktitle ...
@inproceedings {295611, author = {Bartek Wydrowski and Robert Kleinberg and Stephen M. Rumble and Aaron Archer}, title = {Load is not what you should balance: Introducing Prequal}, booktitle = {21st ...
(Registered attendees: Sign in to your USENIX account to download this file.) ...
Shubhi Asthana is a Senior Research Software Engineer at IBM Almaden Research Center, specializing in AI and machine learning solutions for privacy-preserving technologies, particularly PII detection ...
Junaid Ahmed Khan, Western Washington University; Kaan Ozbay, New York University ...
Linux supports 3 scheduling policies: SCHED_FIFO, SCHED_RR, and SCHED_OTHER. SCHED_OTHER is the default universal time-sharing scheduler policy used by most processes; SCHED_FIFO and SCHED_RR are ...
We have developed a set of defenses based on the detection of abnormal combinations of network events. For example, to detect the injection of a DNS reply, we use bookkeeping of request-reply pairs to ...
App-integrated systems like AIFM move far-memory management completely into the application and manage memory at object granularity, in a fashion similar to object-based language runtimes like the ...
(Registered attendees: Sign in to your USENIX account to download this file.) ...
(Registered attendees: Sign in to your USENIX account to download these files.) USENIX Security '20 Wednesday Paper Archive (84.1 MB ZIP, includes Proceedings front matter and errata) USENIX Security ...
NSDI '20 Tuesday Paper Archive (32MB ZIP, includes Proceedings front matter, errata, and attendee lists) NSDI '20 Wednesday Paper Archive (44 MB ZIP) NSDI '20 Thursday Paper Archive (59MB ZIP) ...
Collaborative perception, which greatly enhances the sensing capability of connected and autonomous vehicles (CAVs) by incorporating data from external resources, also brings forth potential security ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results