Channel Avatar

IEEE Symposium on Security and Privacy @UC6pXMS7qre9GZW7A7FVM90Q@youtube.com

8.78K subscribers - no pronouns set

Since 1980, the IEEE Symposium on Security and Privacy has b


13:39
#15 No Privacy Left Outside Ziqi Zhang
17:29
#144 TCP Spoofing Reliable Payload Transmission Past the Spoofed TCP Handshake Eric Pan
13:12
#498 Learn What You Want to Unlearn Unlearning Inversion Attacks against Machine Unlearning Hongsh
13:43
#518 LACMUS Latent Concept Masking for General Robustness Enhancement of DNNs Hongsheng Hu
19:07
6 Efficient Zero knowledge Arguments for Paillier Cryptosystem Rae Gong
18:13
6 Efficient Zero knowledge Arguments for Paillier Cryptosystem Rae Gong1
10:58
06 Zihao Li NURGLE zihao li
12:06
7B Ehsanul Kabir FLShield A Validation Based Federated Learning Framework to Defend Against Poisonin
19:32
9 Prune+PlumTree Finding Eviction Sets at Scale Tom Kissos
18:14
14 TuDoor Xiang Li
18:14
33 INVISILINE Invisible Plausibly Deniable Storage Sandeep Kiran Pinjala
19:05
43 P4Control Line Rate Cross Host Attack Prevention via In Network Information Flow Control Enabled
10:21
52 A Picture is Worth 500 Labels A Case Study of Demographic Disparities in Local Machine Learning M
15:03
77 UnTrustZone Systematic Accelerated Aging to Expose On chip Jubayer Mahmod
11:06
91 PIRANA Faster Multi query PIR via Constant weight Codes Jingyu Li
09:17
95 Preserving Node level Privacy in Graph Neural Networks ZH X
19:48
101 The Great Request Robbery Soheil Khodayari Soheil Khodayari
15:10
109 BULKOR:Enabling Bulk Loading for Path ORAM Xiang Li
17:42
111 Efficient and Generic Microarchitectural Hash Function Recovery Lukas Gerlach
16:00
116 Security Privacy and Data Sharing Challenges When Moving to the US Insights from a Qualitative s
09:19
154 Test time Poisoning Attacks Against Test time Adaptation Models Tianshuo Cong
14:24
164 SoK Security and Privacy of Blockchain Interoperability André Augusto
19:49
172 Don t Eject the Impostor Fast Three Party Computation With a Known Cheater Andreas Brüggeman
13:00
185 BadVFL backdoor attacks in vertical federated learning Mohammad Naseri
15:26
211 Multi Instance Adversarial Attack on GNN Based Malicious Domain Detection Mahmoud Khaled Ahm
19:37
220 Piano Extremely Simple Single Server PIR with Sublinear Server Computation Mingxun Zhou
08:14
227 Sabre Cutting through Adversarial Noise with Adaptive Spectral Filtering and Input Reconstructio
15:29
241 Backdooring Multimodal Learning 卡的不动弹
13:36
251 Text CRS A Generalized Certified Robustness Framework against Textual Adversarial Attacks Jane
16:05
252 SrcMarker Dual channel Source Code Watermarking via Scalable Code Transformations 杨博睿
17:12
262 A Representative Study on Human Detection of Artificially Generated Media Across Countries Joe
14:59
275 Don t Shoot the Messenger Localization Prevention of Satellite Internet Users Richard Mitev
15:48
276 Everyone for Themselves A Qualitative Study about Individual Security Setups of Open Source Sof
13:08
591 Where URLs Become Weapons Automated Discovery of SSRF Vulnerabilities in Web Applications Sam
11:27
280 NFCEraser A Security Threat of NFC Message Modification Caused by Quartz Crystal Oscillator Jo
09:43
282 Transferable Multimodal Attack on Vision Language Pre training Models haodi wang
19:58
284 Group Oblivious Message Retrieval Thomas
19:05
301 Scalable Verification of Zero Knowledge Protocols MIGUEL ISABEL MÁRQUEZ
13:17
305 LLMs Cannot Reliably Identify and Reason About Security Vulnerabilities Yet A Comprehensive Eva
11:10
307 Springproofs Efficient Inner Product Arguments for Vectors of Arbitrary Length Ming Su
15:58
335 Nightshade Prompt Specific Poisoning Attacks on Text to Image Generative Models Shawn Shan
13:08
339 NodeAwareSmoothing Yuni Lai Lena
10:21
398 Pulling Off The Mask Forensic Analysis of the Deceptive Creator Wallets Behind Smart Contract Fr
16:23
415 SoK Efficient Design and Implementation of Polynomial Hash Functions over Prime Fields Jan G
12:18
435 Measure Observe Remeasure An Interactive Paradigm for Differentially Private Exploratory Analysi
15:56
443 Targeted and Troublesome Zahra Moti Zahra Moti
13:17
446 Flash a comprehensive approach to intrusion detection via provenance graph representation learni
19:43
483 Pandora Principled Symbolic Validation of Intel SGX Enclave Runtimes Jo Van Bulck
11:20
520 BELT Old School Backdoor Attacks can Evade the State of the Art Defense with Backdoor Exclusivit
09:56
555 Patchy Performance Uncovering the Vulnerability Management Practices of IoT Centric Vendors S
15:29
574 Cohere Managing Differential Privacy in Large Scale Systems Nicolas Küchler
16:39
584 Break the Wall from bottom Automated Discovery of Protocol Level Evasion Vulnerabilities in Web
15:27
601 SHERPA Explainable Robust Algorithms for Privacy Preserved Federated Learning in Future Networks
16:55
605 Larger scale Nakamoto style Blockchains Don’t Necessarily Offer Better Security Jannik Albrech
11:20
617 PromptCARE Prompt Copyright Protection by Watermark Injection and Verification homeway yao
16:42
624 WeSee Using Malicious #VC Interrupts to Break AMD SEV SNP Supraja Sridhara
19:43
646 attackinng byzantine robustness in high dimensions kolluri aashish
17:48
646 SoK Prudent Evaluation Practices for Fuzzing Moritz Schloegel
13:38
665 Obelix Mitigating Side Channels Through Dynamic Obfuscation Jan
20:16
2024 05 22 02 41 48 H 264 Rui Xi