Parent directory/ | - | - |
IEEE Security & Privacy 2024 captions/ | - | 2024 Oct 24 14:08 |
#144 T***** Spoofing Reliable Payload Transmission Past the Spoofed T***** Handshake - Eric Pan.eng.srt | 27.5 KiB | 2024 Oct 20 13:45 |
#144 T***** Spoofing Reliable Payload Transmission Past the Spoofed T***** Handshake - Eric Pan.mp4 | 12.6 MiB | 2024 Oct 24 12:58 |
#498 Learn What You Want to Unlearn Unlearning Inversion Attacks against Machine Unlearning - Hongsh.eng.srt | 20.9 KiB | 2024 Oct 20 13:46 |
#498 Learn What You Want to Unlearn Unlearning Inversion Attacks against Machine Unlearning - Hongsh.mp4 | 7.5 MiB | 2024 Oct 24 12:58 |
#518 LACMUS Latent Concept Masking for General Robustness Enhancement of DNNs - Hongsheng Hu.eng.srt | 19.9 KiB | 2024 Oct 20 13:46 |
#518 LACMUS Latent Concept Masking for General Robustness Enhancement of DNNs - Hongsheng Hu.mp4 | 7.4 MiB | 2024 Oct 24 12:58 |
2023 219 Formal Model Driven Analysis of Resilience of GossipSub to Attacks from Misbehaving Peers.eng.srt | 18.5 KiB | 2024 Oct 20 13:54 |
2023 219 Formal Model Driven Analysis of Resilience of GossipSub to Attacks from Misbehaving Peers.mp4 | 9.5 MiB | 2024 Oct 24 12:58 |
2024 05 22 02 41 48 H 264 - Rui Xi.eng.srt | 28.6 KiB | 2024 Oct 20 13:54 |
2024 05 22 02 41 48 H 264 - Rui Xi.mp4 | 20.6 MiB | 2024 Oct 24 12:58 |
2024 100 The Dark Side of Scale Insecurity of Direct to Cell Satellite Mega Constellations - 刘威.eng.srt | 22.5 KiB | 2024 Oct 20 13:55 |
2024 100 The Dark Side of Scale Insecurity of Direct to Cell Satellite Mega Constellations - 刘威.mp4 | 11.7 MiB | 2024 Oct 24 12:58 |
2024 102 BOUNCEATTACK A Query Efficient Decision based Adversarial Attack by Bouncing into the Wild.eng.srt | 10.7 KiB | 2024 Oct 20 13:55 |
2024 102 BOUNCEATTACK A Query Efficient Decision based Adversarial Attack by Bouncing into the Wild.mp4 | 8.7 MiB | 2024 Oct 24 12:58 |
2024 108 DeepShuffle A Lightweight Defense Framework against Adversarial Fault Injection Attacks on.eng.srt | 20.1 KiB | 2024 Oct 20 14:00 |
2024 108 DeepShuffle A Lightweight Defense Framework against Adversarial Fault Injection Attacks on.mp4 | 12.0 MiB | 2024 Oct 24 12:58 |
2024 11 NetShuffle Circumventing Censorship with Shuffle Proxies at the Edge - Patrick Kon.eng.srt | 30.8 KiB | 2024 Oct 20 13:54 |
2024 11 NetShuffle Circumventing Censorship with Shuffle Proxies at the Edge - Patrick Kon.mp4 | 12.5 MiB | 2024 Oct 24 12:58 |
2024 124 LOKI Large scale Data Reconstruction Attack against Federated Learning through Model Manipu.eng.srt | 38.3 KiB | 2024 Oct 20 13:55 |
2024 124 LOKI Large scale Data Reconstruction Attack against Federated Learning through Model Manipu.mp4 | 11.1 MiB | 2024 Oct 24 12:58 |
2024 125 DeepTheft Stealing DNN Model Architectures through Power Side Channel - Garrison Gao.eng.srt | 25.5 KiB | 2024 Oct 20 13:55 |
2024 125 DeepTheft Stealing DNN Model Architectures through Power Side Channel - Garrison Gao.mp4 | 10.0 MiB | 2024 Oct 24 12:58 |
2024 13 Holistic Concolic Execution for Dynamic Web Applications via Symbolic Interpreter Analysis.eng.srt | 24.9 KiB | 2024 Oct 20 13:55 |
2024 13 Holistic Concolic Execution for Dynamic Web Applications via Symbolic Interpreter Analysis.mp4 | 9.6 MiB | 2024 Oct 24 12:58 |
2024 144 Withdrawing is believing Detecting Inconsistencies between Withdrawal Choices and Third par.eng.srt | 21.9 KiB | 2024 Oct 20 13:55 |
2024 144 Withdrawing is believing Detecting Inconsistencies between Withdrawal Choices and Third par.mp4 | 12.9 MiB | 2024 Oct 24 12:58 |
2024 151 Shedding Light on CVSS Scoring Inconsistencies - A User Centric Study on Evaluating Widespre.eng.srt | 34.0 KiB | 2024 Oct 20 13:55 |
2024 151 Shedding Light on CVSS Scoring Inconsistencies - A User Centric Study on Evaluating Widespre.mp4 | 9.4 MiB | 2024 Oct 24 12:58 |
2024 158 Jaehan Kim PassREfinder Credential Stuffing Risk Prediction by Representing Password Reuse.eng.srt | 26.1 KiB | 2024 Oct 20 13:55 |
2024 158 Jaehan Kim PassREfinder Credential Stuffing Risk Prediction by Representing Password Reuse.mp4 | 14.1 MiB | 2024 Oct 24 12:58 |
2024 171 Private Analytics via Streaming, Sketching, and Silently Verifiable Proofs - Mayank Rathee.eng.srt | 28.4 KiB | 2024 Oct 20 13:55 |
2024 171 Private Analytics via Streaming, Sketching, and Silently Verifiable Proofs - Mayank Rathee.mp4 | 8.4 MiB | 2024 Oct 24 12:58 |
2024 176 PolySphinx Extending the Sphinx Mix Format with Better Multicast Support - Daniel Schadt.eng.json | 539.7 KiB | 2024 Oct 24 03:17 |
2024 176 PolySphinx Extending the Sphinx Mix Format with Better Multicast Support - Daniel Schadt.eng.lrc | 13.7 KiB | 2024 Oct 24 03:17 |
2024 176 PolySphinx Extending the Sphinx Mix Format with Better Multicast Support - Daniel Schadt.eng.srt | 14.5 KiB | 2024 Oct 24 03:17 |
2024 176 PolySphinx Extending the Sphinx Mix Format with Better Multicast Support - Daniel Schadt.eng.text | 10.8 KiB | 2024 Oct 24 03:17 |
2024 176 PolySphinx Extending the Sphinx Mix Format with Better Multicast Support - Daniel Schadt.eng.tsv | 12.4 KiB | 2024 Oct 24 03:17 |
2024 176 PolySphinx Extending the Sphinx Mix Format with Better Multicast Support - Daniel Schadt.eng.txt | 13.8 KiB | 2024 Oct 24 03:17 |
2024 176 PolySphinx Extending the Sphinx Mix Format with Better Multicast Support - Daniel Schadt.eng.vtt | 13.5 KiB | 2024 Oct 24 03:17 |
2024 176 PolySphinx Extending the Sphinx Mix Format with Better Multicast Support - Daniel Schadt.mp4 | 10.3 MiB | 2024 Oct 24 12:58 |
2024 18 A Practical Root Cause Analysis System with an Under Constrained State Mutation - 박영기.eng.srt | 29.2 KiB | 2024 Oct 20 13:55 |
2024 18 A Practical Root Cause Analysis System with an Under Constrained State Mutation - 박영기.mp4 | 12.4 MiB | 2024 Oct 24 12:58 |
2024 196 The Times They Are A Changin - Christos Tsoukaladelis.eng.srt | 23.1 KiB | 2024 Oct 20 13:56 |
2024 196 The Times They Are A Changin - Christos Tsoukaladelis.mp4 | 14.3 MiB | 2024 Oct 24 12:58 |
2024 205 FlowMur A Stealthy and Practical Audio Backdoor Attack with Limited Knowledge - Jiahe Lan.eng.srt | 12.1 KiB | 2024 Oct 20 13:56 |
2024 205 FlowMur A Stealthy and Practical Audio Backdoor Attack with Limited Knowledge - Jiahe Lan.mp4 | 4.7 MiB | 2024 Oct 24 12:58 |
2024 22 BUSted Microarchitectural Side Channel Attacks on the MCU Bus Interconnect - Cristiano Rodri.eng.srt | 27.3 KiB | 2024 Oct 20 13:55 |
2024 22 BUSted Microarchitectural Side Channel Attacks on the MCU Bus Interconnect - Cristiano Rodri.mp4 | 13.4 MiB | 2024 Oct 24 12:58 |
2024 237 SoK Unintended Interactions among ML Defenses and Risks - Vasisht Duddu.eng.srt | 29.8 KiB | 2024 Oct 20 13:56 |
2024 237 SoK Unintended Interactions among ML Defenses and Risks - Vasisht Duddu.mp4 | 14.3 MiB | 2024 Oct 24 12:58 |
2024 25 MQTTactic Security Analysis and Verification for Logic Flaws in MQTT Implementations - szx.eng.srt | 18.5 KiB | 2024 Oct 20 13:58 |
2024 25 MQTTactic Security Analysis and Verification for Logic Flaws in MQTT Implementations - szx.mp4 | 10.9 MiB | 2024 Oct 24 12:59 |
2024 265 eAudit - A Fast, Scalable and Deployable Audit Data Collection System - Hanke Kimm.eng.srt | 20.5 KiB | 2024 Oct 20 13:56 |
2024 265 eAudit - A Fast, Scalable and Deployable Audit Data Collection System - Hanke Kimm.mp4 | 8.3 MiB | 2024 Oct 24 12:59 |
2024 267 Wear's my Data - Understanding the Cross Device Runtime Permission Model in Wearables - Dogu.eng.srt | 27.5 KiB | 2024 Oct 20 14:03 |
2024 267 Wear's my Data - Understanding the Cross Device Runtime Permission Model in Wearables - Dogu.mp4 | 10.9 MiB | 2024 Oct 24 12:59 |
2024 305 Pianist Scalable zkRollups via Fully Distributed Zero Knowledge Proofs - Tianyi Liu.eng.srt | 19.1 KiB | 2024 Oct 20 13:56 |
2024 305 Pianist Scalable zkRollups via Fully Distributed Zero Knowledge Proofs - Tianyi Liu.mp4 | 9.6 MiB | 2024 Oct 24 12:59 |
2024 319 FCert - yantiing wang.eng.srt | 11.7 KiB | 2024 Oct 20 13:56 |
2024 319 FCert - yantiing wang.mp4 | 5.0 MiB | 2024 Oct 24 12:59 |
2024 37 SoK Safer Digital Safety Research Involving At Risk Users - Rosanna Rosie Bellini.eng.srt | 18.8 KiB | 2024 Oct 20 13:55 |
2024 37 SoK Safer Digital Safety Research Involving At Risk Users - Rosanna Rosie Bellini.mp4 | 4.8 MiB | 2024 Oct 24 12:59 |
2024 431 Routing Attacks on Cryptocurrency Mining Pools - Muoi Tran.eng.srt | 26.8 KiB | 2024 Oct 20 13:56 |
2024 431 Routing Attacks on Cryptocurrency Mining Pools - Muoi Tran.mp4 | 35.5 MiB | 2024 Oct 24 12:59 |
2024 449 Undefined oriented Programming - Detecting and Chaining Prototype Pollution Gadgets in Node.eng.srt | 30.1 KiB | 2024 Oct 20 14:00 |
2024 449 Undefined oriented Programming - Detecting and Chaining Prototype Pollution Gadgets in Node.mp4 | 15.1 MiB | 2024 Oct 24 12:59 |
2024 456 State aware Fuzzing on Trusted OS Designed for IoT Devices - Qinying.eng.srt | 15.6 KiB | 2024 Oct 20 14:01 |
2024 456 State aware Fuzzing on Trusted OS Designed for IoT Devices - Qinying.mp4 | 11.7 MiB | 2024 Oct 24 12:59 |
2024 467 ARMOR A Formally Verified Implementation of X 509 Certificate Chain Validation - Joyanta De.eng.srt | 29.5 KiB | 2024 Oct 20 13:56 |
2024 467 ARMOR A Formally Verified Implementation of X 509 Certificate Chain Validation - Joyanta De.mp4 | 16.2 MiB | 2024 Oct 24 12:59 |
2024 471 Private Hierarchical Governance for Encrypted Messaging - Armin Namavari.eng.srt | 31.3 KiB | 2024 Oct 20 13:56 |
2024 471 Private Hierarchical Governance for Encrypted Messaging - Armin Namavari.mp4 | 11.3 MiB | 2024 Oct 24 12:59 |
2024 48 SwiftRange - Vincent.eng.srt | 20.8 KiB | 2024 Oct 20 13:55 |
2024 48 SwiftRange - Vincent.mp4 | 11.0 MiB | 2024 Oct 24 12:59 |
2024 50 BAFFLE - Mr HE Junda.eng.srt | 12.9 KiB | 2024 Oct 20 13:55 |
2024 50 BAFFLE - Mr HE Junda.mp4 | 9.0 MiB | 2024 Oct 24 12:59 |
2024 500 Exploring the Orthogonality and Linearity of Backdoor Attacks - Kaiyuan Zhang.eng.srt | 22.6 KiB | 2024 Oct 20 14:02 |
2024 500 Exploring the Orthogonality and Linearity of Backdoor Attacks - Kaiyuan Zhang.mp4 | 16.3 MiB | 2024 Oct 24 12:59 |
2024 517 Understanding and Benchmarking the Commonality of Adversarial Examples - cheng yushi.eng.srt | 12.6 KiB | 2024 Oct 20 13:56 |
2024 517 Understanding and Benchmarking the Commonality of Adversarial Examples - cheng yushi.mp4 | 10.5 MiB | 2024 Oct 24 12:59 |
2024 519 From Individual Computation to Allied Optimization Remodeling Privacy Preserving Neural Inf.eng.srt | 24.1 KiB | 2024 Oct 20 13:56 |
2024 519 From Individual Computation to Allied Optimization Remodeling Privacy Preserving Neural Inf.mp4 | 18.7 MiB | 2024 Oct 24 12:59 |
2024 531 Please Tell Me More - Liu Han.eng.srt | 13.7 KiB | 2024 Oct 20 13:59 |
2024 531 Please Tell Me More - Liu Han.mp4 | 6.5 MiB | 2024 Oct 24 12:59 |
2024 567 More is Merrier Relax the Non Collusion Assumption in Multi Server PIR - esnierde.eng.srt | 38.7 KiB | 2024 Oct 20 14:00 |
2024 567 More is Merrier Relax the Non Collusion Assumption in Multi Server PIR - esnierde.mp4 | 14.7 MiB | 2024 Oct 24 12:59 |
2024 57 Counterexample Guided Directed Fuzzing via Likely Invariant Inference - Shadow HUANG.eng.srt | 23.1 KiB | 2024 Oct 20 14:02 |
2024 57 Counterexample Guided Directed Fuzzing via Likely Invariant Inference - Shadow HUANG.mp4 | 16.1 MiB | 2024 Oct 24 12:59 |
2024 606 BOLT Privacy Preserving, Accurate and Efficient Inference for Transformers - Qi Pang.eng.srt | 31.3 KiB | 2024 Oct 20 14:02 |
2024 606 BOLT Privacy Preserving, Accurate and Efficient Inference for Transformers - Qi Pang.mp4 | 14.2 MiB | 2024 Oct 24 12:59 |
2024 61 ERASAN Efficient Rust Address Sanitizer - Jiun Min.eng.srt | 25.4 KiB | 2024 Oct 20 14:02 |
2024 61 ERASAN Efficient Rust Address Sanitizer - Jiun Min.mp4 | 11.6 MiB | 2024 Oct 24 12:59 |
2024 614 Few shot Unlearning - *****sik Yoon.eng.srt | 17.0 KiB | 2024 Oct 20 14:03 |
2024 614 Few shot Unlearning - *****sik Yoon.mp4 | 7.9 MiB | 2024 Oct 24 12:59 |
2024 62 Enforcing End to end Security for Remote Conferencing - Triste L.eng.json | 647.2 KiB | 2024 Oct 24 03:21 |
2024 62 Enforcing End to end Security for Remote Conferencing - Triste L.eng.lrc | 17.8 KiB | 2024 Oct 24 03:21 |
2024 62 Enforcing End to end Security for Remote Conferencing - Triste L.eng.srt | 19.3 KiB | 2024 Oct 24 03:21 |
2024 62 Enforcing End to end Security for Remote Conferencing - Triste L.eng.text | 14.2 KiB | 2024 Oct 24 03:21 |
2024 62 Enforcing End to end Security for Remote Conferencing - Triste L.eng.tsv | 16.1 KiB | 2024 Oct 24 03:21 |
2024 62 Enforcing End to end Security for Remote Conferencing - Triste L.eng.txt | 18.0 KiB | 2024 Oct 24 03:21 |
2024 62 Enforcing End to end Security for Remote Conferencing - Triste L.eng.vtt | 17.9 KiB | 2024 Oct 24 03:21 |
2024 62 Enforcing End to end Security for Remote Conferencing - Triste L.mp4 | 23.6 MiB | 2024 Oct 24 12:59 |
2024 637 Poisoned ChatGPT Finds Work for Idle Hands Exploring Developers - Coding Practices with Inse.eng.srt | 24.2 KiB | 2024 Oct 20 13:56 |
2024 637 Poisoned ChatGPT Finds Work for Idle Hands Exploring Developers - Coding Practices with Inse.mp4 | 14.6 MiB | 2024 Oct 24 12:59 |
2024 76 Formal Dolev Yao Models Meet Cryptographic Protocol Fuzz Testing - Max Ammann.eng.srt | 28.7 KiB | 2024 Oct 20 13:55 |
2024 76 Formal Dolev Yao Models Meet Cryptographic Protocol Fuzz Testing - Max Ammann.mp4 | 15.3 MiB | 2024 Oct 24 12:59 |
2024 88 AFGEN Whole Function Fuzzing for Applications and Libraries - Yuwei LIU 1.eng.srt | 21.1 KiB | 2024 Oct 20 14:01 |
2024 88 AFGEN Whole Function Fuzzing for Applications and Libraries - Yuwei LIU 1.mp4 | 9.2 MiB | 2024 Oct 24 12:59 |
2024 winter 448 Efficient Actively Secure DPF and RAM based 2PC with One Bit Leakage - Wenhao Zhang.eng.srt | 15.2 KiB | 2024 Oct 20 14:01 |
2024 winter 448 Efficient Actively Secure DPF and RAM based 2PC with One Bit Leakage - Wenhao Zhang.mp4 | 8.1 MiB | 2024 Oct 24 12:59 |
211 - Multi Instance Adversarial Attack on GNN Based Malicious Domain Detection - Mahmoud Khaled Ahm.eng.srt | 23.2 KiB | 2024 Oct 20 13:58 |
211 - Multi Instance Adversarial Attack on GNN Based Malicious Domain Detection - Mahmoud Khaled Ahm.mp4 | 13.3 MiB | 2024 Oct 24 12:59 |
322 - SoK SGX Fail How Stuff Gets eXposed - Stephan van Schaik.eng.srt | 21.2 KiB | 2024 Oct 20 14:02 |
322 - SoK SGX Fail How Stuff Gets eXposed - Stephan van Schaik.mp4 | 8.9 MiB | 2024 Oct 24 12:59 |
415 - SoK Efficient Design and Implementation of Polynomial Hash Functions over Prime Fields - Jan G.eng.srt | 26.6 KiB | 2024 Oct 20 13:53 |
415 - SoK Efficient Design and Implementation of Polynomial Hash Functions over Prime Fields - Jan G.mp4 | 11.9 MiB | 2024 Oct 24 12:59 |
43 P4Control Line Rate Cross Host Attack Prevention via In Network Information Flow Control Enabled.eng.srt | 37.5 KiB | 2024 Oct 20 13:50 |
43 P4Control Line Rate Cross Host Attack Prevention via In Network Information Flow Control Enabled.mp4 | 14.7 MiB | 2024 Oct 24 12:59 |
545video - Irina Ford.eng.srt | 18.9 KiB | 2024 Oct 20 13:59 |
545video - Irina Ford.mp4 | 6.7 MiB | 2024 Oct 24 12:59 |
59 Hyena Balancing Packing, Reuse, and Rotations for Encrypted Inference - Sarabjeet Singh.eng.srt | 18.8 KiB | 2024 Oct 20 14:00 |
59 Hyena Balancing Packing, Reuse, and Rotations for Encrypted Inference - Sarabjeet Singh.mp4 | 11.4 MiB | 2024 Oct 24 12:59 |
6 Efficient Zero knowledge Arguments for Paillier Cryptosystem - Rae Gong.eng.srt | 25.0 KiB | 2024 Oct 20 13:47 |
6 Efficient Zero knowledge Arguments for Paillier Cryptosystem - Rae Gong.mp4 | 13.8 MiB | 2024 Oct 24 12:59 |
6 Efficient Zero knowledge Arguments for Paillier Cryptosystem - Rae Gong1.eng.srt | 25.1 KiB | 2024 Oct 20 13:48 |
6 Efficient Zero knowledge Arguments for Paillier Cryptosystem - Rae Gong1.mp4 | 13.9 MiB | 2024 Oct 24 12:59 |
9 PrunePlumTree - Finding Eviction Sets at Scale - Tom Kissos.eng.srt | 27.8 KiB | 2024 Oct 20 13:50 |
9 PrunePlumTree - Finding Eviction Sets at Scale - Tom Kissos.mp4 | 11.0 MiB | 2024 Oct 24 12:59 |
A Picture is Worth 500 Labels A Case Study of Demographic Disparities in Local Machine Learning M.eng.srt | 18.2 KiB | 2024 Oct 20 13:50 |
A Picture is Worth 500 Labels A Case Study of Demographic Disparities in Local Machine Learning M.mp4 | 6.6 MiB | 2024 Oct 24 12:59 |
A Representative Study on Human Detection of Artificially Generated Media Across Countries - Joe.eng.srt | 25.9 KiB | 2024 Oct 20 13:52 |
A Representative Study on Human Detection of Artificially Generated Media Across Countries - Joe.mp4 | 8.0 MiB | 2024 Oct 24 12:59 |
A Security Analysis of Honey Vaults - Fei Duan.eng.srt | 14.4 KiB | 2024 Oct 20 14:02 |
A Security Analysis of Honey Vaults - Fei Duan.mp4 | 9.7 MiB | 2024 Oct 24 12:59 |
ALIF Low Cost Adversarial Audio Attacks on Black Box Speech Platforms using Linguistic Features.eng.json | 439.3 KiB | 2024 Oct 24 03:24 |
ALIF Low Cost Adversarial Audio Attacks on Black Box Speech Platforms using Linguistic Features.eng.lrc | 12.1 KiB | 2024 Oct 24 03:24 |
ALIF Low Cost Adversarial Audio Attacks on Black Box Speech Platforms using Linguistic Features.eng.srt | 12.5 KiB | 2024 Oct 24 03:24 |
ALIF Low Cost Adversarial Audio Attacks on Black Box Speech Platforms using Linguistic Features.eng.text | 9.4 KiB | 2024 Oct 24 03:24 |
ALIF Low Cost Adversarial Audio Attacks on Black Box Speech Platforms using Linguistic Features.eng.tsv | 10.8 KiB | 2024 Oct 24 03:24 |
ALIF Low Cost Adversarial Audio Attacks on Black Box Speech Platforms using Linguistic Features.eng.txt | 12.2 KiB | 2024 Oct 24 03:24 |
ALIF Low Cost Adversarial Audio Attacks on Black Box Speech Platforms using Linguistic Features.eng.vtt | 11.7 KiB | 2024 Oct 24 03:24 |
ALIF Low Cost Adversarial Audio Attacks on Black Box Speech Platforms using Linguistic Features.mp4 | 14.9 MiB | 2024 Oct 24 12:59 |
APP Miner Detecting API Misuses via Automatically Mining API Path Patterns - Jiasheng Jiang.eng.srt | 16.7 KiB | 2024 Oct 20 14:03 |
APP Miner Detecting API Misuses via Automatically Mining API Path Patterns - Jiasheng Jiang.mp4 | 8.7 MiB | 2024 Oct 24 12:59 |
Ad Inventory Pooling in the Ad Tech Supply Chain - Yash Vekaria.eng.srt | 23.7 KiB | 2024 Oct 20 14:02 |
Ad Inventory Pooling in the Ad Tech Supply Chain - Yash Vekaria.mp4 | 7.8 MiB | 2024 Oct 24 12:59 |
An Analysis of Recent Advances in Deepfake Image Detection in an Evolving Threat Landscape - sif.eng.srt | 34.0 KiB | 2024 Oct 20 13:59 |
An Analysis of Recent Advances in Deepfake Image Detection in an Evolving Threat Landscape - sif.mp4 | 10.9 MiB | 2024 Oct 24 12:59 |
Architectural Mimicry - Innovative Instructions to Efficiently Address Control Flow Leakage in Dat.eng.srt | 27.7 KiB | 2024 Oct 20 14:02 |
Architectural Mimicry - Innovative Instructions to Efficiently Address Control Flow Leakage in Dat.mp4 | 9.1 MiB | 2024 Oct 24 12:59 |
Asterisk Super fast MPC with a Friend - Protik Paul.eng.srt | 34.6 KiB | 2024 Oct 20 13:59 |
Asterisk Super fast MPC with a Friend - Protik Paul.mp4 | 16.1 MiB | 2024 Oct 24 12:59 |
Ati Priya Bajaj Len or index or count, anything but v1 Predicting Variable Names in Decompilation Ou.eng.srt | 19.2 KiB | 2024 Oct 20 13:59 |
Ati Priya Bajaj Len or index or count, anything but v1 Predicting Variable Names in Decompilation Ou.mp4 | 7.4 MiB | 2024 Oct 24 12:59 |
Automated Synthesis of Effect Graph Policies for Microservice Aware Stateful System Call Special.eng.srt | 36.2 KiB | 2024 Oct 20 14:03 |
Automated Synthesis of Effect Graph Policies for Microservice Aware Stateful System Call Special.mp4 | 13.6 MiB | 2024 Oct 24 12:59 |
BELT Old School Backdoor Attacks can Evade the State of the Art Defense with Backdoor Exclusivity.eng.srt | 19.2 KiB | 2024 Oct 20 13:53 |
BELT Old School Backdoor Attacks can Evade the State of the Art Defense with Backdoor Exclusivity.mp4 | 8.5 MiB | 2024 Oct 24 12:59 |
BULKOR:Enabling Bulk Loading for Path ORAM - Xiang Li.eng.srt | 20.3 KiB | 2024 Oct 20 13:51 |
BULKOR:Enabling Bulk Loading for Path ORAM - Xiang Li.mp4 | 11.2 MiB | 2024 Oct 24 12:59 |
Backdooring Multimodal Learning - 卡的不动弹.eng.srt | 21.8 KiB | 2024 Oct 20 13:52 |
Backdooring Multimodal Learning - 卡的不动弹.mp4 | 16.1 MiB | 2024 Oct 24 12:59 |
Backdooring Multimodal Learning.eng.srt | 21.8 KiB | 2024 Oct 20 13:56 |
Backdooring Multimodal Learning.mp4 | 16.1 MiB | 2024 Oct 24 12:59 |
BadVFL backdoor attacks in vertical federated learning - Mohammad Naseri.eng.srt | 19.6 KiB | 2024 Oct 20 13:51 |
BadVFL backdoor attacks in vertical federated learning - Mohammad Naseri.mp4 | 6.4 MiB | 2024 Oct 24 12:59 |
Break the Wall from bottom Automated Discovery of Protocol Level Evasion Vulnerabilities in Web.eng.srt | 25.2 KiB | 2024 Oct 20 13:53 |
Break the Wall from bottom Automated Discovery of Protocol Level Evasion Vulnerabilities in Web.mp4 | 13.2 MiB | 2024 Oct 24 12:59 |
CaFA - Cost aware, Feasible Attacks With Database Constraints - Matan BT.eng.srt | 22.0 KiB | 2024 Oct 20 14:02 |
CaFA - Cost aware, Feasible Attacks With Database Constraints - Matan BT.mp4 | 7.8 MiB | 2024 Oct 24 12:59 |
CanWeCastABallotAsIntendedAndBeReceiptFree - Henri Devillez.eng.srt | 27.0 KiB | 2024 Oct 20 14:00 |
CanWeCastABallotAsIntendedAndBeReceiptFree - Henri Devillez.mp4 | 6.9 MiB | 2024 Oct 24 12:59 |
Casual Users and Rational Choices within Differential Privacy - Narges Ashena.eng.srt | 14.3 KiB | 2024 Oct 20 14:02 |
Casual Users and Rational Choices within Differential Privacy - Narges Ashena.mp4 | 6.3 MiB | 2024 Oct 24 12:59 |
Certifying Zero Knowledge Circuits with Refinement Types - Junrui Liu.eng.srt | 13.2 KiB | 2024 Oct 20 13:58 |
Certifying Zero Knowledge Circuits with Refinement Types - Junrui Liu.mp4 | 5.3 MiB | 2024 Oct 24 12:59 |
Cheng Gongye Side Channel Assisted Reverse Engineering of Encrypted DNN Hardware Accelerator IP.eng.srt | 17.7 KiB | 2024 Oct 20 14:03 |
Cheng Gongye Side Channel Assisted Reverse Engineering of Encrypted DNN Hardware Accelerator IP.mp4 | 9.3 MiB | 2024 Oct 24 12:59 |
Chronos presentation - sard Chen.eng.srt | 15.2 KiB | 2024 Oct 20 13:56 |
Chronos presentation - sard Chen.mp4 | 4.7 MiB | 2024 Oct 24 12:59 |
Cohere Managing Differential Privacy in Large Scale Systems - Nicolas Küchler.eng.srt | 33.3 KiB | 2024 Oct 20 13:53 |
Cohere Managing Differential Privacy in Large Scale Systems - Nicolas Küchler.mp4 | 22.3 MiB | 2024 Oct 24 12:59 |
CoreLocker - Andrew Wang.eng.srt | 13.8 KiB | 2024 Oct 20 13:54 |
CoreLocker - Andrew Wang.mp4 | 5.7 MiB | 2024 Oct 24 12:59 |
Efficient and Generic Microarchitectural Hash Function Recovery - Lukas Gerlach.eng.srt | 30.7 KiB | 2024 Oct 20 13:51 |
Efficient and Generic Microarchitectural Hash Function Recovery - Lukas Gerlach.mp4 | 17.7 MiB | 2024 Oct 24 12:59 |
Ehsanul Kabir FLShield A Validation Based Federated Learning Framework to Defend Against Poisonin.eng.srt | 20.1 KiB | 2024 Oct 20 13:50 |
Ehsanul Kabir FLShield A Validation Based Federated Learning Framework to Defend Against Poisonin.mp4 | 10.2 MiB | 2024 Oct 24 12:59 |
Eureka Presentation - Yu Wei.eng.srt | 30.2 KiB | 2024 Oct 20 14:00 |
Eureka Presentation - Yu Wei.mp4 | 24.9 MiB | 2024 Oct 24 12:59 |
Everyone for Themselves - A Qualitative Study about Individual Security Setups of Open Source Sof.eng.srt | 30.0 KiB | 2024 Oct 20 13:52 |
Everyone for Themselves - A Qualitative Study about Individual Security Setups of Open Source Sof.mp4 | 9.6 MiB | 2024 Oct 24 12:59 |
Flash a comprehensive approach to intrusion detection via provenance graph representation learning.eng.srt | 21.7 KiB | 2024 Oct 20 13:53 |
Flash a comprehensive approach to intrusion detection via provenance graph representation learning.mp4 | 9.3 MiB | 2024 Oct 24 12:59 |
From Chatbots to Phishbots Phishing Scam Generation in Commercial Large Language Models - Sayak.eng.srt | 31.2 KiB | 2024 Oct 20 14:00 |
From Chatbots to Phishbots Phishing Scam Generation in Commercial Large Language Models - Sayak.mp4 | 21.1 MiB | 2024 Oct 24 12:59 |
From Principle to Practice Vertical Data Minimization for Machine Learning - Robin Staab.eng.srt | 26.1 KiB | 2024 Oct 20 14:00 |
From Principle to Practice Vertical Data Minimization for Machine Learning - Robin Staab.mp4 | 8.1 MiB | 2024 Oct 24 12:59 |
From Virtual Touch to Tesla Command Unlocking Unauthenticated Control Chains From Smart Glasses.eng.srt | 20.6 KiB | 2024 Oct 20 14:01 |
From Virtual Touch to Tesla Command Unlocking Unauthenticated Control Chains From Smart Glasses.mp4 | 12.6 MiB | 2024 Oct 24 12:59 |
GAuV - Xingyu Xie.eng.srt | 20.2 KiB | 2024 Oct 20 13:59 |
GAuV - Xingyu Xie.mp4 | 12.4 MiB | 2024 Oct 24 12:59 |
GroVE 20mins S&P - Asim Waheed.eng.srt | 26.4 KiB | 2024 Oct 20 13:57 |
GroVE 20mins S&P - Asim Waheed.mp4 | 10.2 MiB | 2024 Oct 24 12:59 |
Group Oblivious Message Retrieval - Thomas.eng.srt | 34.4 KiB | 2024 Oct 20 13:52 |
Group Oblivious Message Retrieval - Thomas.mp4 | 13.3 MiB | 2024 Oct 24 12:59 |
INVISILINE Invisible Plausibly Deniable Storage - Sandeep Kiran Pinjala.eng.srt | 30.8 KiB | 2024 Oct 20 13:50 |
INVISILINE Invisible Plausibly Deniable Storage - Sandeep Kiran Pinjala.mp4 | 15.4 MiB | 2024 Oct 24 12:59 |
ItsSimplexIEEESP 20min - Andrew Cullen.eng.srt | 37.6 KiB | 2024 Oct 20 14:03 |
ItsSimplexIEEESP 20min - Andrew Cullen.mp4 | 16.1 MiB | 2024 Oct 24 12:59 |
Janus Safe Biometric Deduplication for Humanitarian Aid Distribution - kasra EdalatNejad.eng.srt | 28.1 KiB | 2024 Oct 20 13:59 |
Janus Safe Biometric Deduplication for Humanitarian Aid Distribution - kasra EdalatNejad.mp4 | 11.0 MiB | 2024 Oct 24 12:59 |
LLMIF Augmented Large Language Model for Fuzzing IoT Devices - Jincheng Wang.eng.srt | 20.5 KiB | 2024 Oct 20 13:54 |
LLMIF Augmented Large Language Model for Fuzzing IoT Devices - Jincheng Wang.mp4 | 10.9 MiB | 2024 Oct 24 12:59 |
LLMs Cannot Reliably Identify and Reason About Security Vulnerabilities Yet - A Comprehensive Eva.eng.srt | 23.7 KiB | 2024 Oct 20 13:52 |
LLMs Cannot Reliably Identify and Reason About Security Vulnerabilities Yet - A Comprehensive Eva.mp4 | 19.0 MiB | 2024 Oct 24 12:59 |
Larger scale Nakamoto style Blockchains Don’t Necessarily Offer Better Security - Jannik Albrech.eng.srt | 29.7 KiB | 2024 Oct 20 13:53 |
Larger scale Nakamoto style Blockchains Don’t Necessarily Offer Better Security - Jannik Albrech.mp4 | 11.4 MiB | 2024 Oct 24 12:59 |
Leaky Address Masking - Mathé Hertogh 1.eng.srt | 29.5 KiB | 2024 Oct 20 14:01 |
Leaky Address Masking - Mathé Hertogh 1.mp4 | 14.2 MiB | 2024 Oct 24 12:59 |
LowerBoundsRDP - Tim Kutta.eng.srt | 34.9 KiB | 2024 Oct 20 13:57 |
LowerBoundsRDP - Tim Kutta.mp4 | 7.9 MiB | 2024 Oct 24 12:59 |
MAWSEO Adversarial Wiki Search Poisoning for Illicit Online Promotion - Zilong Lin.eng.srt | 37.4 KiB | 2024 Oct 20 14:01 |
MAWSEO Adversarial Wiki Search Poisoning for Illicit Online Promotion - Zilong Lin.mp4 | 19.5 MiB | 2024 Oct 24 12:59 |
MEA Defender - Lv Peizhuo.eng.srt | 16.1 KiB | 2024 Oct 20 13:57 |
MEA Defender - Lv Peizhuo.mp4 | 15.2 MiB | 2024 Oct 24 12:59 |
MIMOCrypt - Jun Luo John.eng.srt | 31.9 KiB | 2024 Oct 20 14:03 |
MIMOCrypt - Jun Luo John.mp4 | 29.2 MiB | 2024 Oct 24 12:59 |
MPCitH without reputation IEEE S0P online - qw gao.eng.srt | 16.8 KiB | 2024 Oct 20 14:03 |
MPCitH without reputation IEEE S0P online - qw gao.mp4 | 10.4 MiB | 2024 Oct 24 12:59 |
Measure Observe Remeasure An Interactive Paradigm for Differentially Private Exploratory Analysis.eng.srt | 24.1 KiB | 2024 Oct 20 13:53 |
Measure Observe Remeasure An Interactive Paradigm for Differentially Private Exploratory Analysis.mp4 | 5.3 MiB | 2024 Oct 24 12:59 |
NFCEraser A Security Threat of NFC Message Modification Caused by Quartz Crystal Oscillator - Jo.eng.srt | 16.2 KiB | 2024 Oct 20 13:52 |
NFCEraser A Security Threat of NFC Message Modification Caused by Quartz Crystal Oscillator - Jo.mp4 | 9.4 MiB | 2024 Oct 24 12:59 |
Nebula A Privacy First Platform for Data Backhaul - Jean Luc Watson.eng.srt | 35.2 KiB | 2024 Oct 20 13:59 |
Nebula A Privacy First Platform for Data Backhaul - Jean Luc Watson.mp4 | 10.5 MiB | 2024 Oct 24 12:59 |
Nightshade Prompt Specific Poisoning Attacks on Text to Image Generative Models - Shawn Shan.eng.srt | 27.5 KiB | 2024 Oct 20 13:52 |
Nightshade Prompt Specific Poisoning Attacks on Text to Image Generative Models - Shawn Shan.mp4 | 11.8 MiB | 2024 Oct 24 12:59 |
No Privacy Left Outside - Ziqi Zhang.eng.srt | 21.5 KiB | 2024 Oct 20 13:45 |
No Privacy Left Outside - Ziqi Zhang.mp4 | 11.5 MiB | 2024 Oct 24 12:59 |
NodeAwareSmoothing - Yuni Lai Lena.eng.srt | 16.1 KiB | 2024 Oct 20 13:53 |
NodeAwareSmoothing - Yuni Lai Lena.mp4 | 12.8 MiB | 2024 Oct 24 12:59 |
Obelix Mitigating Side Channels Through Dynamic Obfuscation - Jan.eng.srt | 23.5 KiB | 2024 Oct 20 13:54 |
Obelix Mitigating Side Channels Through Dynamic Obfuscation - Jan.mp4 | 11.1 MiB | 2024 Oct 24 12:59 |
On SMS Phishing Tactics and Infrastructure - Alex Nahapetyan.eng.srt | 15.0 KiB | 2024 Oct 20 14:00 |
On SMS Phishing Tactics and Infrastructure - Alex Nahapetyan.mp4 | 5.9 MiB | 2024 Oct 24 12:59 |
One for All and All for One - GNN based Control Flow Attestation for Embedded Devices - Richard M.eng.srt | 22.0 KiB | 2024 Oct 20 13:54 |
One for All and All for One - GNN based Control Flow Attestation for Embedded Devices - Richard M.mp4 | 10.8 MiB | 2024 Oct 24 12:59 |
PIRANA - Faster Multi query PIR via Constant weight Codes - Jingyu Li.eng.srt | 16.9 KiB | 2024 Oct 20 13:51 |
PIRANA - Faster Multi query PIR via Constant weight Codes - Jingyu Li.mp4 | 7.8 MiB | 2024 Oct 24 12:59 |
Pandora - Principled Symbolic Validation of Intel SGX Enclave Runtimes - Jo Van Bulck.eng.srt | 35.1 KiB | 2024 Oct 20 13:53 |
Pandora - Principled Symbolic Validation of Intel SGX Enclave Runtimes - Jo Van Bulck.mp4 | 15.8 MiB | 2024 Oct 24 12:59 |
Patchy Performance - Uncovering the Vulnerability Management Practices of IoT Centric Vendors.eng.srt | 15.9 KiB | 2024 Oct 20 13:53 |
Patchy Performance - Uncovering the Vulnerability Management Practices of IoT Centric Vendors.mp4 | 5.9 MiB | 2024 Oct 24 12:59 |
Piano Extremely Simple Single Server PIR with Sublinear Server Computation - Mingxun Zhou.eng.srt | 31.0 KiB | 2024 Oct 20 13:51 |
Piano Extremely Simple Single Server PIR with Sublinear Server Computation - Mingxun Zhou.mp4 | 8.8 MiB | 2024 Oct 24 12:59 |
Practical Attacks Against DNS Reputation Systems.eng.srt | 20.3 KiB | 2024 Oct 20 14:01 |
Practical Attacks Against DNS Reputation Systems.mp4 | 11.9 MiB | 2024 Oct 24 12:59 |
Practical Obfuscation of BLE Physical Layer Fingerprints on Mobile Devices - Hadi Givehchian.eng.json | 570.6 KiB | 2024 Oct 24 03:28 |
Practical Obfuscation of BLE Physical Layer Fingerprints on Mobile Devices - Hadi Givehchian.eng.lrc | 16.0 KiB | 2024 Oct 24 03:28 |
Practical Obfuscation of BLE Physical Layer Fingerprints on Mobile Devices - Hadi Givehchian.eng.srt | 15.0 KiB | 2024 Oct 24 03:28 |
Practical Obfuscation of BLE Physical Layer Fingerprints on Mobile Devices - Hadi Givehchian.eng.text | 12.4 KiB | 2024 Oct 24 03:28 |
Practical Obfuscation of BLE Physical Layer Fingerprints on Mobile Devices - Hadi Givehchian.eng.tsv | 14.3 KiB | 2024 Oct 24 03:28 |
Practical Obfuscation of BLE Physical Layer Fingerprints on Mobile Devices - Hadi Givehchian.eng.txt | 16.1 KiB | 2024 Oct 24 03:28 |
Practical Obfuscation of BLE Physical Layer Fingerprints on Mobile Devices - Hadi Givehchian.eng.vtt | 14.3 KiB | 2024 Oct 24 03:28 |
Practical Obfuscation of BLE Physical Layer Fingerprints on Mobile Devices - Hadi Givehchian.mp4 | 7.6 MiB | 2024 Oct 24 12:59 |
Preserving Node level Privacy in Graph Neural Networks - ZH X.eng.srt | 14.9 KiB | 2024 Oct 20 13:51 |
Preserving Node level Privacy in Graph Neural Networks - ZH X.mp4 | 7.4 MiB | 2024 Oct 24 12:59 |
PromptCARE Prompt Copyright Protection by Watermark Injection and Verification - homeway yao.eng.srt | 13.1 KiB | 2024 Oct 20 13:53 |
PromptCARE Prompt Copyright Protection by Watermark Injection and Verification - homeway yao.mp4 | 6.6 MiB | 2024 Oct 24 12:59 |
Pryde - A Modular Generalizable Workflow for Uncovering Evasion Attacks Against Stateful Firewall.eng.srt | 35.2 KiB | 2024 Oct 20 14:03 |
Pryde - A Modular Generalizable Workflow for Uncovering Evasion Attacks Against Stateful Firewall.mp4 | 9.2 MiB | 2024 Oct 24 12:59 |
Pudding Private User Discovery in Anonymity Networks - Ceren Kocaogullar.eng.srt | 32.6 KiB | 2024 Oct 20 14:01 |
Pudding Private User Discovery in Anonymity Networks - Ceren Kocaogullar.mp4 | 15.8 MiB | 2024 Oct 24 12:59 |
Pulling Off The Mask Forensic Analysis of the Deceptive Creator Wallets Behind Smart Contract Fr.eng.srt | 15.9 KiB | 2024 Oct 20 13:53 |
Pulling Off The Mask Forensic Analysis of the Deceptive Creator Wallets Behind Smart Contract Fr.mp4 | 9.6 MiB | 2024 Oct 24 12:59 |
Rethinking IC Layout Vulnerability Simulation Based Hardware Trojan Threat Assessment with High.eng.srt | 16.7 KiB | 2024 Oct 20 13:59 |
Rethinking IC Layout Vulnerability Simulation Based Hardware Trojan Threat Assessment with High.mp4 | 11.1 MiB | 2024 Oct 24 12:59 |
S&P 2024 hvc - Nicholas Ngai.eng.srt | 41.8 KiB | 2024 Oct 20 14:03 |
S&P 2024 hvc - Nicholas Ngai.mp4 | 16.1 MiB | 2024 Oct 24 12:59 |
S&PFinal - Louis Henri.eng.srt | 26.0 KiB | 2024 Oct 20 13:59 |
S&PFinal - Louis Henri.mp4 | 10.7 MiB | 2024 Oct 24 12:59 |
SHERPA Explainable Robust Algorithms for Privacy Preserved Federated Learning in Future Networks.eng.srt | 21.9 KiB | 2024 Oct 20 13:53 |
SHERPA Explainable Robust Algorithms for Privacy Preserved Federated Learning in Future Networks.mp4 | 13.3 MiB | 2024 Oct 24 13:00 |
SP24 HD - Florian Hantke.eng.srt | 28.7 KiB | 2024 Oct 20 13:57 |
SP24 HD - Florian Hantke.mp4 | 13.9 MiB | 2024 Oct 24 13:00 |
Sabre Cutting through Adversarial Noise with Adaptive Spectral Filtering and Input Reconstructio.eng.srt | 14.2 KiB | 2024 Oct 20 13:52 |
Sabre Cutting through Adversarial Noise with Adaptive Spectral Filtering and Input Reconstructio.mp4 | 8.1 MiB | 2024 Oct 24 12:59 |
Saiid El Hajj Chehade SINBAD 20 min - Saiid El Hajj Chehade.eng.srt | 27.0 KiB | 2024 Oct 20 14:00 |
Saiid El Hajj Chehade SINBAD 20 min - Saiid El Hajj Chehade.mp4 | 13.4 MiB | 2024 Oct 24 12:59 |
Scalable Mixed Mode MPC - Radhika Garg.eng.srt | 24.1 KiB | 2024 Oct 20 14:00 |
Scalable Mixed Mode MPC - Radhika Garg.mp4 | 9.8 MiB | 2024 Oct 24 12:59 |
Scalable Verification of Zero Knowledge Protocols - MIGUEL ISABEL MÁRQUEZ.eng.srt | 33.9 KiB | 2024 Oct 20 13:52 |
Scalable Verification of Zero Knowledge Protocols - MIGUEL ISABEL MÁRQUEZ.mp4 | 8.1 MiB | 2024 Oct 24 12:59 |
Security Privacy and Data Sharing Challenges When Moving to the US Insights from a Qualitative s.eng.srt | 24.4 KiB | 2024 Oct 20 13:51 |
Security Privacy and Data Sharing Challenges When Moving to the US Insights from a Qualitative s.mp4 | 12.1 MiB | 2024 Oct 24 12:59 |
Serberus Protecting Cryptographic Code frrom Spectres at Compile Time - Nicholas Hunter Mosier.eng.srt | 31.4 KiB | 2024 Oct 20 13:58 |
Serberus Protecting Cryptographic Code frrom Spectres at Compile Time - Nicholas Hunter Mosier.mp4 | 11.4 MiB | 2024 Oct 24 13:00 |
Signing in Four Public Software Package Registries Quantity, Quality, and Influencing Factors.eng.srt | 27.5 KiB | 2024 Oct 20 13:59 |
Signing in Four Public Software Package Registries Quantity, Quality, and Influencing Factors.mp4 | 12.1 MiB | 2024 Oct 24 13:00 |
SneakyPrompt Jailbreaking Text to image Generative Models - Yuchen Yang.eng.srt | 24.6 KiB | 2024 Oct 20 14:00 |
SneakyPrompt Jailbreaking Text to image Generative Models - Yuchen Yang.mp4 | 11.5 MiB | 2024 Oct 24 13:00 |
SoK CollusionResistantMPSI - Jelle Vos.eng.srt | 26.7 KiB | 2024 Oct 20 14:01 |
SoK CollusionResistantMPSI - Jelle Vos.mp4 | 8.5 MiB | 2024 Oct 24 13:00 |
SoK Prudent Evaluation Practices for Fuzzing - Moritz Schloegel.eng.srt | 26.7 KiB | 2024 Oct 20 13:54 |
SoK Prudent Evaluation Practices for Fuzzing - Moritz Schloegel.mp4 | 7.5 MiB | 2024 Oct 24 13:00 |
SoK Security and Privacy of Blockchain Interoperability - André Augusto.eng.srt | 24.1 KiB | 2024 Oct 20 13:51 |
SoK Security and Privacy of Blockchain Interoperability - André Augusto.mp4 | 11.6 MiB | 2024 Oct 24 13:00 |
Specular Towards Secure, Trust minimized Optimistic Blockchain Execution - Zhe Ye.eng.srt | 16.4 KiB | 2024 Oct 20 14:03 |
Specular Towards Secure, Trust minimized Optimistic Blockchain Execution - Zhe Ye.mp4 | 5.5 MiB | 2024 Oct 24 13:00 |
Springproofs Efficient Inner Product Arguments for Vectors of Arbitrary Length - Ming Su.eng.srt | 12.9 KiB | 2024 Oct 20 13:52 |
Springproofs Efficient Inner Product Arguments for Vectors of Arbitrary Length - Ming Su.mp4 | 11.1 MiB | 2024 Oct 24 13:00 |
SrcMarker Dual channel Source Code Watermarking via Scalable Code Transformations - 杨博睿.eng.srt | 28.4 KiB | 2024 Oct 20 13:52 |
SrcMarker Dual channel Source Code Watermarking via Scalable Code Transformations - 杨博睿.mp4 | 13.2 MiB | 2024 Oct 24 13:00 |
Tabbed Out Subverting the Android Custom Tab Security Model - Philipp Beer.eng.srt | 36.2 KiB | 2024 Oct 20 14:03 |
Tabbed Out Subverting the Android Custom Tab Security Model - Philipp Beer.mp4 | 12.2 MiB | 2024 Oct 24 13:00 |
Targeted and Troublesome Zahra Moti - Zahra Moti.eng.srt | 24.3 KiB | 2024 Oct 20 13:53 |
Targeted and Troublesome Zahra Moti - Zahra Moti.mp4 | 13.3 MiB | 2024 Oct 24 13:00 |
Test time Poisoning Attacks Against Test time Adaptation Models - Tianshuo Cong.eng.srt | 14.9 KiB | 2024 Oct 20 13:51 |
Test time Poisoning Attacks Against Test time Adaptation Models - Tianshuo Cong.mp4 | 7.9 MiB | 2024 Oct 24 13:00 |
Text CRS A Generalized Certified Robustness Framework against Textual Adversarial Attacks - Jane.eng.srt | 18.1 KiB | 2024 Oct 20 13:52 |
Text CRS A Generalized Certified Robustness Framework against Textual Adversarial Attacks - Jane.mp4 | 12.3 MiB | 2024 Oct 24 13:00 |
The Great Request Robbery Soheil Khodayari - Soheil Khodayari.eng.srt | 33.8 KiB | 2024 Oct 20 13:51 |
The Great Request Robbery Soheil Khodayari - Soheil Khodayari.mp4 | 15.9 MiB | 2024 Oct 24 13:00 |
The Role of User Agent Interactions on Mobile Money Practices - Karen Sowon.eng.srt | 23.3 KiB | 2024 Oct 20 14:02 |
The Role of User Agent Interactions on Mobile Money Practices - Karen Sowon.mp4 | 14.0 MiB | 2024 Oct 24 13:00 |
Thwarting Last Minute Voter Coercion - Rosario Giustolisi.eng.srt | 24.0 KiB | 2024 Oct 20 14:03 |
Thwarting Last Minute Voter Coercion - Rosario Giustolisi.mp4 | 8.3 MiB | 2024 Oct 24 13:00 |
Transferable Multimodal Attack on Vision Language Pre training Models - haodi wang.eng.srt | 16.7 KiB | 2024 Oct 20 13:52 |
Transferable Multimodal Attack on Vision Language Pre training Models - haodi wang.mp4 | 8.4 MiB | 2024 Oct 24 13:00 |
TuDoor - Xiang Li.eng.srt | 22.6 KiB | 2024 Oct 20 13:50 |
TuDoor - Xiang Li.mp4 | 15.4 MiB | 2024 Oct 24 13:00 |
TuDoor new - Xiang Li.eng.srt | 22.6 KiB | 2024 Oct 20 13:58 |
TuDoor new - Xiang Li.mp4 | 15.5 MiB | 2024 Oct 24 13:00 |
UnTrustZone Systematic Accelerated Aging to Expose On chip - Jubayer Mahmod.eng.srt | 23.5 KiB | 2024 Oct 20 13:51 |
UnTrustZone Systematic Accelerated Aging to Expose On chip - Jubayer Mahmod.mp4 | 11.0 MiB | 2024 Oct 24 13:00 |
Understanding Parents' Perceptions and Practices Toward *****ren's Security and Privacy in Virtua.eng.srt | 23.2 KiB | 2024 Oct 20 14:00 |
Understanding Parents' Perceptions and Practices Toward *****ren's Security and Privacy in Virtua.mp4 | 6.5 MiB | 2024 Oct 24 13:00 |
Understanding the Privacy Practices of Political Campaigns A Perspective from the 2020 US Election.eng.srt | 29.6 KiB | 2024 Oct 20 14:03 |
Understanding the Privacy Practices of Political Campaigns A Perspective from the 2020 US Election.mp4 | 12.3 MiB | 2024 Oct 24 13:00 |
WeSee Using Malicious #VC Interrupts to Break AMD SEV SNP - Supraja Sridhara.eng.srt | 27.4 KiB | 2024 Oct 20 13:54 |
WeSee Using Malicious #VC Interrupts to Break AMD SEV SNP - Supraja Sridhara.mp4 | 10.4 MiB | 2024 Oct 24 13:00 |
Where URLs Become Weapons - Automated Discovery of SSRF Vulnerabilities in Web Applications - Sam.eng.srt | 18.1 KiB | 2024 Oct 20 13:52 |
Where URLs Become Weapons - Automated Discovery of SSRF Vulnerabilities in Web Applications - Sam.mp4 | 9.2 MiB | 2024 Oct 24 13:00 |
Who Left the Door Open Investigating the Causes of Exposed IoT Devices in an Academic Network.eng.srt | 6.1 KiB | 2024 Oct 20 13:58 |
Who Left the Door Open Investigating the Causes of Exposed IoT Devices in an Academic Network.mp4 | 5.0 MiB | 2024 Oct 24 13:00 |
Zihao Li NURGLE - zihao li.eng.srt | 12.0 KiB | 2024 Oct 20 13:48 |
Zihao Li NURGLE - zihao li.mp4 | 5.8 MiB | 2024 Oct 24 13:00 |
attackinng byzantine robustness in high dimensions - kolluri aashish.eng.srt | 34.5 KiB | 2024 Oct 20 13:54 |
attackinng byzantine robustness in high dimensions - kolluri aashish.mp4 | 11.9 MiB | 2024 Oct 24 12:59 |
cut final presentation - Sönke Huster.eng.srt | 22.4 KiB | 2024 Oct 20 13:59 |
cut final presentation - Sönke Huster.mp4 | 8.7 MiB | 2024 Oct 24 12:59 |
don't Eject the Impostor - Fast Three Party Computation With a Known Cheater - Andreas Brüggeman.eng.srt | 37.7 KiB | 2024 Oct 20 13:51 |
don't Eject the Impostor - Fast Three Party Computation With a Known Cheater - Andreas Brüggeman.mp4 | 16.8 MiB | 2024 Oct 24 12:59 |
don't Shoot the Messenger - Localization Prevention of Satellite Internet Users - Richard Mitev.eng.srt | 24.0 KiB | 2024 Oct 20 13:52 |
don't Shoot the Messenger - Localization Prevention of Satellite Internet Users - Richard Mitev.mp4 | 12.0 MiB | 2024 Oct 24 12:59 |
gpuzip 20 - yingchen wang.eng.srt | 37.6 KiB | 2024 Oct 20 13:59 |
gpuzip 20 - yingchen wang.mp4 | 16.3 MiB | 2024 Oct 24 12:59 |
sokvideo v1 - Max N.eng.srt | 14.6 KiB | 2024 Oct 20 13:57 |
sokvideo v1 - Max N.mp4 | 4.6 MiB | 2024 Oct 24 13:00 |
sp 2024 holepunch final - Zachary Ratliff.eng.srt | 23.6 KiB | 2024 Oct 20 14:00 |
sp 2024 holepunch final - Zachary Ratliff.mp4 | 6.2 MiB | 2024 Oct 24 13:00 |
sp24 long recording - Jannis Rautenstrauch.eng.srt | 34.0 KiB | 2024 Oct 20 13:57 |
sp24 long recording - Jannis Rautenstrauch.mp4 | 9.2 MiB | 2024 Oct 24 13:00 |
tor1 - Zhongtang Luo.eng.srt | 24.9 KiB | 2024 Oct 20 13:59 |
tor1 - Zhongtang Luo.mp4 | 9.4 MiB | 2024 Oct 24 13:00 |
video - Zhen Xiang.eng.srt | 27.6 KiB | 2024 Oct 20 13:57 |
video - Zhen Xiang.mp4 | 11.5 MiB | 2024 Oct 24 13:00 |
video1092237667 - Hoang Nguyen Dai.eng.srt | 18.3 KiB | 2024 Oct 20 13:58 |
video1092237667 - Hoang Nguyen Dai.mp4 | 5.1 MiB | 2024 Oct 24 13:00 |