IEEE Symposium on Security and Privacy Courses
IEEE via YouTube Post-Quantum Key Exchange for the TLS Protocol from the Ring Learning with Errors Problem
IEEE via YouTube SoK - Let the Privacy Games Begin! A Unified Treatment of Data Inference Privacy in Machine Learning
IEEE via YouTube ImU - Physical Impersonating Attack for Face Recognition System with Natural Style Changes
IEEE via YouTube Red Team vs. Blue Team - A Real-World Hardware Trojan Detection Case Study Across Four Modern CMOS Technology Generations
IEEE via YouTube REDEEM MYSELF - Purifying Backdoors in Deep Learning Models Using Self Attention Distillation
IEEE via YouTube D-DAE - Defense-Penetrating Model Extraction Attacks
IEEE via YouTube Confident Monte Carlo - Rigorous Analysis of Guessing Curves for Probabilistic Password Models
IEEE via YouTube SNAP - Efficient Extraction of Private Properties with Poisoning
IEEE via YouTube Scaling JavaScript Abstract Interpretation to Detect and Exploit Node.js Taint-style Vulnerability
IEEE via YouTube