HKU Musketeers Foundation Institute of Data Science: Conference papers Collection home page

Browse
Subscribe to this collection to receive daily e-mail notification of new additions RSS Feed RSS Feed RSS Feed
Collection's Items (Sorted by Submit Date in Descending order): 1 to 20 of 159
TitleAuthor(s)Issue Date
Valkyrie: Improving Fuzzing Performance Through Deterministic Techniques
Proceeding/Conference:IEEE International Conference on Software Quality, Reliability and Security, QRS
2022
Towards Evaluating Transfer-based Attacks Systematically, Practically, and Fairly
Proceeding/Conference:Advances in Neural Information Processing Systems
2023
Hopper: Interpretative Fuzzing for Libraries
Proceeding/Conference:CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security
2023
Understanding Programs by Exploiting (Fuzzing) Test Cases
Proceeding/Conference:Proceedings of the Annual Meeting of the Association for Computational Linguistics
2023
MAKING SUBSTITUTE MODELS MORE BAYESIAN CAN ENHANCE TRANSFERABILITY OF ADVERSARIAL EXAMPLES
Proceeding/Conference:11th International Conference on Learning Representations, ICLR 2023
2023
Backpropagating linearly improves transferability of adversarial examples
Proceeding/Conference:Advances in Neural Information Processing Systems
2020
Practical no-box adversarial attacks against DNNs
Proceeding/Conference:Advances in Neural Information Processing Systems
2020
Integrity: Finding integer errors by targeted fuzzing
Proceeding/Conference:Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
2020
StyleCAPTCHA: CAPTCHA Based on Stylized Images to Defend against Deep Networks
Proceeding/Conference:FODS 2020 - Proceedings of the 2020 ACM-IMS Foundations of Data Science Conference
2020
Task-optimized User Clustering based on Mobile App Usage for Cold-start Recommendations
Proceeding/Conference:Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
2022
FOOLING DETECTION ALONE IS NOT ENOUGH: ADVERSARIAL ATTACK AGAINST MULTIPLE OBJECT TRACKING
Proceeding/Conference:8th International Conference on Learning Representations, ICLR 2020
2020
Explore the Transformation Space for Adversarial Images
Proceeding/Conference:CODASPY 2020 - Proceedings of the 10th ACM Conference on Data and Application Security and Privacy
2020
Matryoshka: Fuzzing deeply nested branches
Proceeding/Conference:Proceedings of the ACM Conference on Computer and Communications Security
2019
Angora: Efficient Fuzzing by Principled Search
Proceeding/Conference:Proceedings - IEEE Symposium on Security and Privacy
2018
Evaluating private modes in desktop and mobile browsers and their resistance to fingerprinting
Proceeding/Conference:2017 IEEE Conference on Communications and Network Security, CNS 2017
2017
POSTER: Security analysis of personal unmanned aerial vehicles
Proceeding/Conference:Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
2017
RevDroid: Code analysis of the side effects after dynamic permission revocation of android apps
Proceeding/Conference:ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security
2016
MAdFraud: Investigating ad fraud in Android applications
Proceeding/Conference:MobiSys 2014 - Proceedings of the 12th Annual International Conference on Mobile Systems, Applications, and Services
2014
A Quantitative Study of Forum Spamming Using Context-based Analysis
Proceeding/Conference:Proceedings of the Symposium on Network and Distributed System Security, NDSS 2007
2007
Using and asking: APIs used in the Android market and asked about in StackOverflow
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2013
Collection's Items (Sorted by Submit Date in Descending order): 1 to 20 of 159