YoVDO

IEEE Symposium on Security and Privacy Courses

AI-Guardian - Defeating Adversarial Attacks Using Backdoors
IEEE via YouTube
ADI - Adversarial Dominating Inputs in Vertical Federated Learning Systems
IEEE via YouTube
We Are a Startup to the Core - A Qualitative Interview Study on the Security and Privacy Development Practices in Turkish Software Startups
IEEE via YouTube
MEGA - Malleable Encryption Goes Awry
IEEE via YouTube
Sound Verification of Security Protocols - From Design to Interoperable Implementations
IEEE via YouTube
On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security
IEEE via YouTube
AUC - Accountable Universal Composability
IEEE via YouTube
SCAPHY - Detecting Modern ICS Attacks by Correlating Behaviors in SCADA and Physical
IEEE via YouTube
VIDEZZO - Dependency-Aware Virtual Device Fuzzing
IEEE via YouTube
Typing High-Speed Cryptography against Spectre v1
IEEE via YouTube
< Prev Page 38 Next >