HKU Musketeers Foundation Institute of Data Science: Conference papers Collection home page

Browse
Subscribe to this collection to receive daily e-mail notification of new additions RSS Feed RSS Feed RSS Feed
Collection's Items (Sorted by Submit Date in Descending order): 1 to 20 of 187
TitleAuthor(s)Issue Date
Valkyrie: Improving Fuzzing Performance Through Deterministic Techniques
Proceeding/Conference:IEEE International Conference on Software Quality, Reliability and Security, QRS
2022
Towards Evaluating Transfer-based Attacks Systematically, Practically, and Fairly
Proceeding/Conference:Advances in Neural Information Processing Systems
2023
Hopper: Interpretative Fuzzing for Libraries
Proceeding/Conference:CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security
2023
Understanding Programs by Exploiting (Fuzzing) Test Cases
Proceeding/Conference:Proceedings of the Annual Meeting of the Association for Computational Linguistics
2023
MAKING SUBSTITUTE MODELS MORE BAYESIAN CAN ENHANCE TRANSFERABILITY OF ADVERSARIAL EXAMPLES
Proceeding/Conference:11th International Conference on Learning Representations, ICLR 2023
2023
Backpropagating linearly improves transferability of adversarial examples
Proceeding/Conference:Advances in Neural Information Processing Systems
2020
Practical no-box adversarial attacks against DNNs
Proceeding/Conference:Advances in Neural Information Processing Systems
2020
Integrity: Finding integer errors by targeted fuzzing
Proceeding/Conference:Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
2020
StyleCAPTCHA: CAPTCHA Based on Stylized Images to Defend against Deep Networks
Proceeding/Conference:FODS 2020 - Proceedings of the 2020 ACM-IMS Foundations of Data Science Conference
2020
Task-optimized User Clustering based on Mobile App Usage for Cold-start Recommendations
Proceeding/Conference:Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
2022
FOOLING DETECTION ALONE IS NOT ENOUGH: ADVERSARIAL ATTACK AGAINST MULTIPLE OBJECT TRACKING
Proceeding/Conference:8th International Conference on Learning Representations, ICLR 2020
2020
Yet Another Intermediate-Level Attack
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2020
Explore the Transformation Space for Adversarial Images
Proceeding/Conference:CODASPY 2020 - Proceedings of the 10th ACM Conference on Data and Application Security and Privacy
2020
Matryoshka: Fuzzing deeply nested branches
Proceeding/Conference:Proceedings of the ACM Conference on Computer and Communications Security
2019
Angora: Efficient Fuzzing by Principled Search
Proceeding/Conference:Proceedings - IEEE Symposium on Security and Privacy
2018
Detecting third-party libraries in Android applications with high precision and recall
Proceeding/Conference:25th IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2018 - Proceedings
2018
Less is more: Culling the training set to improve robustness of deep neural networks
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2018
Evaluating private modes in desktop and mobile browsers and their resistance to fingerprinting
Proceeding/Conference:2017 IEEE Conference on Communications and Network Security, CNS 2017
2017
POSTER: Security analysis of personal unmanned aerial vehicles
Proceeding/Conference:Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
2017
On the origin of mobile apps: Network provenance for android applications
Proceeding/Conference:CODASPY 2016 - Proceedings of the 6th ACM Conference on Data and Application Security and Privacy
2016
Collection's Items (Sorted by Submit Date in Descending order): 1 to 20 of 187