default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 141 matches
- 2024
- Hui Xia, Rui Zhang, Zi Kang, Shuliang Jiang, Shuo Xu:
Enhance Stealthiness and Transferability of Adversarial Attacks with Class Activation Mapping Ensemble Attack. NDSS 2024 - Jiafan Wang, Sherman S. M. Chow:
Unus pro omnibus: Multi-Client Searchable Encryption via Access Control. NDSS 2024 - Pascal Lafourcade, Dhekra Mahmoud, Sylvain Ruhault:
A Unified Symbolic Analysis of WireGuard. NDSS 2024 - Zitao Chen, Karthik Pattabiraman:
Overconfidence is a Dangerous Thing: Mitigating Membership Inference Attacks by Enforcing Less Confident Prediction. NDSS 2024 - Song Bian, Zian Zhao, Zhou Zhang, Ran Mao, Kohei Suenaga, Yier Jin, Zhenyu Guan, Jianwei Liu:
HEIR: A Unified Representation for Cross-Scheme Compilation of Fully Homomorphic Computation. NDSS 2024 - Mahdi Rahimi, Piyush Kumar Sharma, Claudia Díaz:
LARMix: Latency-Aware Routing in Mix Networks. NDSS 2024 - Ya-Nan Li, Tian Qiu, Qiang Tang:
Pisces: Private and Compliable Cryptocurrency Exchange. NDSS 2024 - Hao Zhou, Shuohan Wu, Chenxiong Qian, Xiapu Luo, Haipeng Cai, Chao Zhang:
Beyond the Surface: Uncovering the Unprotected Components of Android Against Overlay Attack. NDSS 2024 - Yang Yang, Robert H. Deng, Guomin Yang, Yingjiu Li, HweeHwa Pang, Minming Huang, Rui Shi, Jian Weng:
PriSrv: Privacy-Enhanced and Highly Usable Service Discovery in Wireless Communications. NDSS 2024 - Gorka Abad, Oguzhan Ersoy, Stjepan Picek, Aitor Urbieta:
Sneaky Spikes: Uncovering Stealthy Backdoor Attacks in Spiking Neural Networks with Neuromorphic Data. NDSS 2024 - Abbas Acar, Güliz Seray Tuncay, Esteban Luques, Harun Oz, Ahmet Aris, A. Selcuk Uluagac:
50 Shades of Support: A Device-Centric Analysis of Android Security Updates. NDSS 2024 - Kosei Akama, Yoshimichi Nakatsuka, Masaaki Sato, Keisuke Uehara:
Scrappy: SeCure Rate Assuring Protocol with PrivacY. NDSS 2024 - Ayomide Akinsanya, Tegan Brennan:
Timing Channels in Adaptive Neural Networks. NDSS 2024 - Guy Amit, Moshe Levy, Yisroel Mirsky:
Transpose Attack: Stealing Datasets with Bidirectional Training. NDSS 2024 - Meenatchi Sundaram Muthu Selva Annamalai, Igor Bilogrevic, Emiliano De Cristofaro:
FP-Fed: Privacy-Preserving Federated Detection of Browser Fingerprinting. NDSS 2024 - Kerem Arikan, Abraham Farrell, Williams Zhang Cen, Jack McMahon, Barry Williams, Yu David Liu, Nael B. Abu-Ghazaleh, Dmitry Ponomarev:
TEE-SHirT: Scalable Leakage-Free Cache Hierarchies for TEEs. NDSS 2024 - Fatemeh Arkannezhad, Justin Feng, Nader Sehatbakhsh:
IDA: Hybrid Attestation with Support for Interrupts and TOCTOU. NDSS 2024 - Arjun Arunasalam, Andrew Chu, Muslum Ozgur Ozmen, Habiba Farrukh, Z. Berkay Celik:
The Dark Side of E-Commerce: Dropshipping Abuse as a Business Model. NDSS 2024 - Pietro Borrello, Andrea Fioraldi, Daniele Cono D'Elia, Davide Balzarotti, Leonardo Querzoni, Cristiano Giuffrida:
Predictive Context-sensitive Fuzzing. NDSS 2024 - Frank Capobianco, Quan Zhou, Aditya Basu, Trent Jaeger, Danfeng Zhang:
TALISMAN: Tamper Analysis for Reference Monitors. NDSS 2024 - Huiling Chen, Wenqiang Jin, Yupeng Hu, Zhenyu Ning, Kenli Li, Zheng Qin, Mingxing Duan, Yong Xie, Daibo Liu, Ming Li:
Eavesdropping on Black-box Mobile Devices via Audio Amplifier's EMR. NDSS 2024 - Liheng Chen, Zheming Li, Zheyu Ma, Yuan Li, Baojian Chen, Chao Zhang:
EnclaveFuzz: Finding Vulnerabilities in SGX Applications. NDSS 2024 - Yikang Chen, Yibo Liu, Ka Lok Wu, Duc V. Le, Sze Yiu Chau:
Towards Precise Reporting of Cryptographic Misuses. NDSS 2024 - Guangke Chen, Yedi Zhang, Fu Song:
SLMIA-SR: Speaker-Level Membership Inference Attacks against Speaker Recognition Systems. NDSS 2024 - Zhuo Cheng, Maria Apostolaki, Zaoxing Liu, Vyas Sekar:
TrustSketch: Trustworthy Sketch-based Telemetry on Cloud Hosts. NDSS 2024 - Sourav Das, Zhuolun Xiang, Ling Ren:
Powers of Tau in Asynchrony. NDSS 2024 - Yaniv David, Neophytos Christou, Andreas D. Kellas, Vasileios P. Kemerlis, Junfeng Yang:
QUACK: Hindering Deserialization Attacks via Static Duck Typing. NDSS 2024 - Gelei Deng, Yi Liu, Yuekang Li, Kailong Wang, Ying Zhang, Zefeng Li, Haoyu Wang, Tianwei Zhang, Yang Liu:
MASTERKEY: Automated Jailbreaking of Large Language Model Chatbots. NDSS 2024 - Linkang Du, Min Chen, Mingyang Sun, Shouling Ji, Peng Cheng, Jiming Chen, Zhikun Zhang:
ORL-AUDITOR: Dataset Auditing in Offline Deep Reinforcement Learning. NDSS 2024 - Rui Duan, Zhe Qu, Leah Ding, Yao Liu, Zhuo Lu:
Parrot-Trained Adversarial Examples: Pushing the Practicality of Black-Box Audio Attacks against Speaker Recognition Models. NDSS 2024
skipping 111 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-28 08:34 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint