Number of items: 138.
A
Abate, Carmine and Blanco, Roberto and Ciobaca, Stefan and Durier, Adrien and Garg, Deepak and Hritcu, Catalin and Patrignani, Marco and Tanter, Éric and Thibault, Jérémy
(2020)
Trace-Relating Compiler Correctness and Secure Compilation.
Abdelnabi, Sahar and Krombholz, Katharina and Fritz, Mario
(2020)
VisualPhishNet: Zero-Day Phishing Website Detection by Visual Similarity.
Agarwal, Vedika and Shetty, Rakshith and Fritz, Mario
(2020)
Towards Causal VQA: Revealing and Reducing Spurious Correlations by Invariant and Covariant Semantic Editing.
Akhmetzyanova, Liliya and Cremers, Cas and Garratt, Luke and Smyshlyaev, Stanislav and Sullivan, Nick
(2020)
Limiting the impact of unreliable randomness in deployed security protocols.
Anell, Simon and Gröber, Lea and Krombholz, Katharina
(2020)
End User and Expert Perceptions of Threats and Potential Countermeasures.
Antonioli, Daniele and Tippenhauer, Nils Ole and Rasmussen, Kasper
(2020)
BIAS: Bluetooth Impersonation AttackS.
Antonioli, Daniele and Tippenhauer, Nils Ole and Rasmussen, Kasper
(2020)
Key Negotiation Downgrade Attacks on Bluetooth and Bluetooth Low Energy.
ACM Transactions on Privacy and Security.
ISSN 2471-2566
B
Baumeister, Jan and Finkbeiner, Bernd and Kruse, Matthis and Schwenger, Maximilian
(2020)
Automatic Optimizations for Stream-based Monitoring Languages.
(In Press)
Baumeister, Jan and Finkbeiner, Bernd and Schirmer, Sebastian and Schwenger, Maximilian and Torens, Christoph
(2020)
RTLola Cleared for Take-Off: Monitoring Autonomous Aircraft.
Baumeister, Tom and Finkbeiner, Bernd and Torfah, Hazem
(2020)
Explainable Reactive Synthesis.
Belth, Caleb and Zheng, X and Vreeken, Jilles and Koutra, Danai
(2020)
What is Normal, What is Strange, and What is Missing in an Knowledge Graph.
Benz, Manuel and Kristensen, Erik Krogh and Luo, Linghui and Pereira Borges Jr., Nataniel and Bodden, Eric and Zeller, Andreas
(2020)
Heaps’n’Leaks: How Heap Snapshots Improve Android Taint Analysis.
Bhattacharyya, Apratim and Mahajan, Shweta and Fritz, Mario and Schiele, Bernt and Roth, Stefan
(2020)
Normalizing Flows with Multi-scale Autoregressive Priors.
Bhattacharyya, Apratim and Straehle, Christoph-Nikolas and Fritz, Mario and Schiele, Bernt
(2020)
Haar Wavelet based Block Autoregressive Flows for Trajectories.
Bieringer, Lukas
(2020)
Stellungnahme zur Anhörung der Enquêtekommission „Digitalisierung im Saarland“ zur wirtschaftlichen Entwicklung im Zuge der Digitalisierung.
Birtel, Benedikt and Rossow, Christian
(2020)
Slitheen++: Stealth TLS-based Decoy Routing.
Bonakdarpour, B. and Finkbeiner, B.
(2020)
Controller Synthesis for Hyperproperties.
Brakerski, Zvika and Branco, Pedro and Döttling, Nico and Garg, Sanjam and Malavolta, Giulio
(2020)
Constant Ciphertext-Rate Non-committing Encryption from Standard Assumptions.
Brakerski, Zvika and Döttling, Nico
(2020)
Hardness of LWE on General Entropic Distribution.
Brakerski, Zvika and Döttling, Nico
(2020)
Lossiness and Entropic Hardness for Ring-LWE.
Brakerski, Zvika and Döttling, Nico and Garg, Sanjam and Malavolta, Giulio
(2020)
Candidate iO from Homomorphic Encryption Schemes.
(In Press)
Brendel, Jacqueline and Fischlin, Marc and Günther, Felix and Janson, Christian and Stebila, Douglas
(2020)
Towards Post-Quantum Security for Signal's X3DH Handshake.
(In Press)
Brengel, Michael and Rossow, Christian
(2020)
xOSSig: Leveraging OS Diversity to Automatically Extract Malware Code Signatures.
Budhathoki, Kailash
(2020)
Causal Inference on Discrete Data.
Doctoral thesis, Saarland University.
Bushart, Jonas and Rossow, Christian
(2020)
Padding Ain’t Enough: Assessing the Privacy Guarantees of Encrypted DNS.
Busse, Karoline and Tahaei, Mohammad and Krombholz, Katharina and von Zezschwitz, Emanuel and Smith, Matthew and Tian, Jing and Xu, Wenyuan
(2020)
Cash, Cards or Cryptocurrencies? A Study of Payment Culture in Four Countries.
C
Calciati, Paolo and Kuznetsov, Konstantin and Gorla, Alessandra and Zeller, Andreas
(2020)
Automatically Granted Permissions in Android apps: An Empirical Study on their Prevalence and on the Potential Threats for Privacy.
Calzavara, Stefano and Roth, Sebastian and Rabitti, Alvise and Backes, Michael and Stock, Ben
(2020)
A Tale of Two Headers: A Formal Analysis of Inconsistent Click-Jacking Protection on the Web.
Chen, Dingfan and Orekondy, Tribhuvanesh and Fritz, Mario
(2020)
GS-WGAN: A Gradient-Sanitized Approach for Learning Differentially Private Generators.
Chen, Dingfan and Yu, Ning and Zhang, Yang and Fritz, Mario
(2020)
GAN-Leaks: A Taxonomy of Membership Inference Attacks against Generative Models.
Chen, Yiqun T and Gopinath, Rahul and Tadakamalla, Anita and Ernst, Michael D and Holmes, Reid and Fraser, Gordon and Ammann, Paul and Just, Rene
(2020)
Revisiting the Relationship Between Fault Detection,Test Adequacy Criteria, and Test Set Size.
Chou, Edward and Tramer, Florian and Pellegrino, Giancarlo
(2020)
SentiNet: Detecting Localized Universal Attack Against Deep Learning Systems.
Coenen, Norine and Finkbeiner, Bernd and Hahn, Christopher and Hofmann, Jana
(2020)
The Hierarchy of Hyperlogics: A Knowledge Reasoning Perspective.
Cogliati, Benoît-Michel and Jha, Ashwin and Nandi, Mridul
(2020)
How to Build Optimally Secure PRFs Using Block Ciphers.
(In Press)
Cohn-Gordon, Katriel and Cremers, Cas and Dowling, Benjamin and Garratt, Luke and Stebila, Douglas
(2020)
A Formal Security Analysis of Key Establishment in the Signal Messaging Protocol.
Journal of Cryptology.
(In Press)
Cortiñas, Carlos Tomé and Vassena, Marco and Russo, Alejandro
(2020)
Securing Asynchronous Exceptions.
Cremers, Cas and Fairoze, Jaiden and Kiesl, Benjamin and Naska, Aurora
(2020)
Clone Detection in Secure Messaging: Improving Post-Compromise Security in Practice.
(In Press)
Cremers, Cas and Kiesl, Benjamin and Medinger, Niklas
(2020)
A Formal Analysis of IEEE 802.11’s WPA2: Countering the Kracks Caused by Cracking the Counters.
Cueppers, Joscha and Vreeken, Jilles
(2020)
Just Wait For It... Mining Sequential Patterns with Reliable Prediction Delays.
(In Press)
D
Dalleiger, Sebastian and Vreeken, Jilles
(2020)
Explainable Data Decompositions.
(In Press)
Dalleiger, Sebastian and Vreeken, Jilles
(2020)
The Relaxed Maximum Entropy Distribution and its Application to Pattern Discovery.
(In Press)
Deuber, Dominic and Döttling, Nico and Magri, Bernardo and Malavolta, Giulio and Thyagarajan, Sri Aravinda Krishnan
(2020)
Minting Mechanisms for (PoS) Blockchains.
Dimitrova, Rayna and Finkbeiner, Bernd and Torfah, Hazem
(2020)
Probabilistic Hyperproperties of Markov Decision Processes.
Durst, David and Feldman, Matthew and Huff, Dillon and Akeley, David and Daly, Ross and Bernstein, Gilbert Louis and Patrignani, Marco and Fatahalian, Kayvon and Hanrahan, Pat
(2020)
Type-Directed Scheduling of Streaming Accelerators.
Döttling, Nico and Garg, Sanjam and Hajiabadi, Mohammad and Masny, Daniel and Wichs, Daniel
(2020)
Two-Round Oblivious Transfer from CDH or LPN.
(In Press)
Döttling, Nico and Garg, Sanjam and Malavolta, Giulio and Vasudevan, Prashant Nalini
(2020)
Tight Verifiable Delay Functions.
Döttling, Nico and Malavolta, Giulio and Pu, Sihang
(2020)
A Combinatorial Approach to Quantum Random Functions.
de Berg, Mark and Bodlaender, Hans L. and Kisfaludi-Bak, Sándor and Marx, Dániel and van der Zanden, Tom C.
(2020)
A Framework for Exponential-Time-Hypothesis--Tight Algorithms and Lower Bounds in Geometric Intersection Graphs.
SIAM Journal on Computing, 49 (6).
pp. 1291-1331.
ISSN 0097-5397
E
Erba, Alessandro and Taormina, Riccardo and Galelli, Stefano and Pogliani, Marcello and Carminati, Michele and Zanero, Stefano and Tippenhauer, Nils Ole
(2020)
Constrained Concealment Attacks against Reconstruction-based Anomaly Detectors in Industrial Control Systems.
Esiyok, Ilkan and Hanzlik, Lucjan and Künnemann, Robert and Budde, Lena Marie and Backes, Michael
(2020)
TrollThrottle — Raising the Cost of Astroturfing.
Espitau, Thomas and Joux, Antoine and Kharchenko, Natalia
(2020)
On a dual/hybrid approach to small secret LWE.
F
Fass, Aurore
(2020)
Studying JavaScript Security Through Static Analysis.
Doctoral thesis, Saarland University.
Finkbeiner, Bernd and Gieseking, Manuel and Hecking-Harbusch, Jesko and Olderog, Ernst-Rüdiger
(2020)
AdamMC: A Model Checker for Petri Nets with Transits against Flow-LTL.
Finkbeiner, Bernd and Gieseking, Manuel and Hecking-Harbusch, Jesko and Olderog, Ernst-Rüdiger
(2020)
Model Checking Branching Properties on Petri Nets with Transits.
Finkbeiner, Bernd and Hahn, Christopher and Hofmann, Jana and Tentrup, Leander
(2020)
Realizing Omega-regular Hyperproperties.
Finkbeiner, Bernd and Hahn, Christopher and Stenger, Marvin and Tentrup, Leander
(2020)
Efficient monitoring of hyperproperties using prefix trees.
International Journal on Software Tools for Technology Transfer.
ISSN 1433-2779
Finkbeiner, Bernd and Oswald, Stefan and Passing, Noemi and Schwenger, Maximilian
(2020)
Verified Rust Monitors for Lola Specifications.
Finkbeiner, Bernd and Passing, Noemi
(2020)
Dependency-based Compositional Synthesis.
Finkbeiner, Bernd and Schmidt, Jessica and Schwenger, Maximilian
(2020)
Simplex Architecture Meets RTLola.
Fischer, Jonas and Vreeken, Jilles
(2020)
Discovering Succinct Pattern Sets Expressing Co-Occurrence and Mutual Exclusivity.
Frassinelli, Daniel and Park, Sohyeon and Nürnberger, Stefan
(2020)
≪ I Know Where You Parked Last Summer ≫ Automated Reverse
Engineering and Privacy Analysis of Modern Cars.
Frenkel, Hadar and Grumberg, Orna and Pasareanu, Corina and Sheinvald, Sarai
(2020)
Assume, Guarantee or Repair.
G
Ghorbani Lyastani, Sanam and Schilling, Michael and Neumayr, Michaela and Backes, Michael and Bugiel, Sven
(2020)
Is FIDO2 the Kingslayer of User Authentication? A Comparative Usability Study of FIDO2 Passwordless Authentication.
Girol, Guillaume and Hirschi, Lucca and Sasse, Ralf and Jackson, Dennis and Cremers, Cas and Basin, David
(2020)
A Spectral Analysis of Noise:A Comprehensive, Automated, Formal Analysis of Diffie-Hellman Protocols.
Gopinath, Rahul and Kampmann, Alexander and Havrikov, Nikolas and Soremekun, Ezekiel and Zeller, Andreas
(2020)
Abstracting Failure-Inducing Inputs.
Gopinath, Rahul and Mathis, Björn and Zeller, Andreas
(2020)
Mining Input Grammars from Dynamic Control Flow.
Grochowksi, Marco and Simon, Hendrik and Bohlender, Dimitri and Kowalewski, Stefan and Löcklin, Andreas and Müller, Timo and Jazdi, Nasser and Zeller, Andreas and Weyrich, Michael
(2020)
Formale Methoden für rekonfigurierbare cyber-physische Systeme in der Produktion.
Automatisierungstechnik, 68 (1).
ISSN 0178-2312
Grohe, Martin and Neuen, Daniel and Wiebking, Daniel
(2020)
Isomorphism Testing for Graphs Excluding Small Minors.
Groß, Joschka and Torralba, Àlvaro and Fickert, Maximilian
(2020)
Novel Is Not Always Better:On the Relation between Novelty and Dominance Pruning.
Gunda, Spoorthy and Jain, Pallavi and Lokshtanov, Daniel and Saurabh, Saket and Tale, Prafullkumar
(2020)
On the Parameterized Approximability of Contraction to Classes of Chordal Graphs.
H
Hagestedt, Inken and Humbert, Mathias and Berrang, Pascal and Lehmann, Irina and Eils, Roland and Backes, Michael and Zhang, Yang
(2020)
Membership Inference Against DNA Methylation Databases.
Hajipour, Hossein and Bhattacharyya, Apratim and Fritz, Mario
(2020)
SampleFix: Learning to Correct Programs by Sampling Diverse Fixes.
Hajipour, Hossein and Malinowski, Mateusz and Fritz, Mario
(2020)
IReEn: Iterative Reverse-Engineering of Black-Box Functions via Neural Program Synthesis.
Hasan, Rakibul and Crandall, David and Fritz, Mario and Kapadia, Apu
(2020)
Automatically Detecting Bystanders in Photos to Reduce Privacy Risks.
He, Yang and Rahimian, Shadi and Schiele, Bernt and Fritz, Mario
(2020)
Segmentations-Leak: Membership Inference Attacks and Defenses in Semantic Image Segmentation.
He, Yang and Schiele, Bernt and Fritz, Mario
(2020)
Synthetic Convolutional Features for Improved Semantic Segmentation.
Holmes, Josie and Brindescu, Iftekhar and Gopinath, Rahul and Zhang, He and Groce, Alex and Brindescu, Caius
(2020)
Using Relative Lines of Code to Guide Automated Test Generation for Python.
ACM Transactions on Software Engineering and Methodology, 29 (4).
ISSN 1049-331X
J
Jaber, Nouraldin and Jacobs, Swen and Wagner, Christopher and Kulkarni, Milind and Samanta, Roopsha
(2020)
Parameterized Verification of Systems with Global Synchronization and Guards.
(In Press)
Jacobs, Swen and Sakr, Mouhammad and Zimmermann, Martin
(2020)
Promptness and Bounded Fairness in
Concurrent and Parameterized Systems.
(In Press)
Joux, Antoine and Espitau, Thomas
(2020)
Certified Lattice Reduction.
Advances in Mathematics of Communications, 14 (1).
pp. 137-159.
ISSN 1930-5346
K
Kampmann, Alexander and Havrikov, Nikolas and Soremekun, Ezekiel and Zeller, Andreas
(2020)
When does my Program do this? Learning Circumstances of Software Behavior.
(In Press)
Khosrowjerdi, Hojat and Nemati, Hamed and Meinke, Karl
(2020)
Spatio-Temporal Model-Checking of Cyber-Physical Systems Using Graph Queries.
Kiesl, Benjamin and Rebola-Pardo, Adrián and Heule, Marijn J.H. and Biere, Armin
(2020)
Simulating Strong Practical Proof Systems with Extended Resolution.
Journal of Automated Reasoning, 64.
pp. 1247-1267.
ISSN 0168-7433
Kirschner, Lukas and Soremekun, Ezekiel and Zeller, Andreas
(2020)
Debugging Inputs.
Kirschner, Lukas and Soremekun, Ezekiel and Zeller, Andreas
(2020)
Poster: Debugging Inputs.
(In Press)
Koch, Simon and Sauer, Tim and Johns, Martin and Pellegrino, Giancarlo
(2020)
Raccoon: Automated Verification of Guarded Race Conditions in Web Applications.
Künnemann, Robert and Nemati, Hamed
(2020)
MAC-in-the-Box: Verifying a Minimalistic Hardware Design for MAC Computation.
L
Losch, Max and Fritz, Mario and Schiele, Bernt
(2020)
Semantic Bottlenecks: Quantifying and Improving Inspectability of Deep Representations.
M
Mai, Alexandra and Pfeffer, Katharina and Gusenbauer, Matthias and Weippl, Edgar and Krombholz, Katharina
(2020)
User Mental Models of Cryptocurrency Systems - A Grounded Theory Approach.
Mandros, Panagiotis and Boley, Mario and Vreeken, Jilles
(2020)
Discovering Dependencies with Reliable Mutual Information.
Knowledge and Information Systems.
ISSN 0219-1377
Mandros, Panagiotis and Kaltenpoth, David and Boley, Mario and Vreeken, Jilles
(2020)
Discovering Functional Dependencies from Mixed-Type Data.
Marx, Dániel
(2020)
Chordless Cycle Packing Is Fixed-Parameter Tractable.
Marx, Dániel and Sandeep, R.B.
(2020)
Incompressibility of H-Free Edge Modification Problems: Towards a Dichotomy.
Mascle, Corto and Neider, Daniel and Schwenger, Maximilian and Tabuada, Paulo and Weinert, Alexander and Zimmermann, Martin
(2020)
From LTL to rLTL Monitoring: Improved Monitorability Through Robust Semantics.
Mathis, Björn and Gopinath, Rahul and Zeller, Andreas
(2020)
Learning Input Tokens for Effective Fuzzing.
(In Press)
Morio, Kevin and Jackson, Dennis and Vassena, Marco and Künnemann, Robert
(2020)
Modular Black-box Runtime Verification of Security Protocols.
N
Nemati, Hamed and Buiras, Pablo and Lindner, Andreas and Guanciale, Roberto and Jacobs, Swen
(2020)
Validation of Abstract Side-Channel Models for Computer Architectures.
Nguyen, Duc Cuong and Derr, Erik and Backes, Michael and Bugiel, Sven
(2020)
Up2Dep: Android Tool Support to Fix Insecure Code Dependencies.
O
Oh, Seong Joon and Benenson, Rodrigo and Fritz, Mario and Schiele, Bernt
(2020)
Person Recognition in Personal Photo Collections.
IEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI), 42 (1).
pp. 203-220.
Orekondy, Tribhuvanesh and Schiele, Bernt and Fritz, Mario
(2020)
Prediction Poisoning: Towards Defenses Against DNN Model Stealing Attacks.
Orekondy, Tribhuvanesh and Schiele, Bernt and Fritz, Mario
(2020)
Prediction Poisoning: Utility-Constrained Defenses Against Model Stealing Attacks.
P
Patrignani, Marco and Guarnieri, Marco
(2020)
Exorcising Spectres with Secure Compilers.
Patrignani, Marco and Wahby, Riad S. and Künnemann, Robert
(2020)
Universal Composability is Secure Compilation.
Penerath, Frederic and Mandros, Panagiotis and Vreeken, Jilles
(2020)
Discovering Approximate Functional Dependencies using Smoothed Mutual Information.
R
Reen, Gaganjeet Singh and Rossow, Christian
(2020)
DPIFuzz: A Differential Fuzzing Frameworkto Detect DPI Elusion Strategies for QUIC.
Roth, Sebastian and Backes, Michael and Stock, Ben
(2020)
Assessing the Impact of Script Gadgets on CSP at Scale.
Roth, Sebastian and Barron, Timothy and Calzavara, Stefano and Nikiforakis, Nick and Stock, Ben
(2020)
Complex Security Policy? A Longitudinal Analysis of Deployed Content Security Policies.
S
Sala, Massimiliano and Sogiorno, Domenica and Taufer, Daniele
(2020)
A Small Subgroup Attack on Bitcoin Address Generation.
Mathematics, 8 (10).
ISSN 2227-7390
Salem, Ahmed and Bhattacharya, Apratim and Backes, Michael and Fritz, Mario and Zhang, Yang
(2020)
Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning.
Sattar, Hosnieh and Krombholz, Katharina and Pons-Moll, Gerard and Fritz, Mario
(2020)
Body Shape Privacy in Images: Understanding Privacy and Preventing Automatic Shape Extraction.
Sattara, Hosnieh and Fritz, Mario and Bulling, Andreas
(2020)
Deep gaze pooling: Inferring and visually decoding search intents from human gaze fixations.
Neurocomputing, 387.
pp. 369-382.
ISSN 0925-2312
Saurabh, Saket and Tale, Prafullkumar
(2020)
On the Parameterized Complexity of Maximum Degree Contraction Problem.
Schepper, Philipp
(2020)
Fine-Grained Complexity of Regular Expression Pattern Matching and Membership.
Schlüter, Till and Lemke-Rust, Kerstin
(2020)
Differential Analysis and Fingerprinting of ZombieLoads on Block Ciphers.
Schwarz, Fabian and Rossow, Christian
(2020)
SENG, the SGX-Enforcing Network Gateway: Authorizing Communication from Shielded Clients.
Schwenger, Maximilian
(2020)
Let’s not Trust Experience Blindly: Formal Monitoring of Humans and other CPS.
Masters thesis, Saarland University.
Schwenger, Maximilian
(2020)
Monitoring Cyber-Physical Systems: From Design to Integration.
Seidl, Helmut and Müller, Christian and Finkbeiner, Bernd
(2020)
How to Win First-Order Safety Games.
Sharma, Saurabh and Yu, Ning and Fritz, Mario and Schiele, Bernt
(2020)
Long-Tailed Recognition Using Class-Balanced Experts.
Shetty, Rakshith and Fritz, Mario and Schiele, Bernt
(2020)
Towards Automated Testing and Robustification by Semantic Adversarial Data Generation.
Steffens, Marius and Stock, Ben
(2020)
PMForce: Systematically Analyzing PostMessage Handlers at Scale.
Stivala, Giada and Pellegrino, Giancarlo
(2020)
Deceptive Previews: A Study of the Link Preview Trustworthiness in Social Platforms.
Sudhodanan, Avinash and Khodayari, Soheil and Caballero, Juan
(2020)
Cross-Origin State Inference (COSI) Attacks: Leaking Web Site States through XS-Leaks.
Sutton, Christopher and Boley, Mario and Ghiringhelli, Luca M. and Rupp, Matthias and Vreeken, Jilles and Scheffler, Matthias
(2020)
Identifying Domains of Applicability of Machine Learning Models for Materials Science.
Nature Communications.
ISSN 2041-1723
T
Thyagarajan, Sri Aravinda Krishnan and Bhat, Adithya and Malavolta, Giulio and Nico, Döttling and Kate, Aniket and Schröder, Dominique
(2020)
Verifiable Timed Signatures Made Practical.
Tiefenau, Christian and Häring, Maximilian and Krombholz, Katharina and von Zezschwitz, Emanuel
(2020)
Security, Availability, and Multiple Information Sources:
Exploring Update Behavior of System Administrators.
Tran, Nicolas and Speicher, Patrick and Künnemann, Robert and Backes, Michael and Torralba, Àlvaro and Hoffmann, Jörg
(2020)
Planning in the Browser.
Troncoso, Carmela and Payer, Matthias and Hubaux, Jean-Pierre and Salathé, Marcel and Larus, James and Lueks, Wouter and Stadler, Theresa and Pyrgelis, Apostolos and Antonioli, Daniele and Barman, Ludovic and Chatel, Sylvain and Paterson, Kenneth G. and Capkun, Srdjan and Basin, David and Beutel, Jan and Jackson, Dennis and Roeschlin, Marc and Leu, Patrick and Preneel, Bart and Smart, Nigel and Abidin, Aysajan and Gürses, Seda and Veale, Michael and Cremers, Cas and Backes, Michael and Tippenhauer, Nils Ole and Binns, Reuben and Cattuto, Ciro and Barrat, Alain and Fiore, Dario and Barbosa, Manuel and Oliveira, Rui and Pereira, José
(2020)
Decentralized Privacy-Preserving Proximity Tracing.
IEEE Data Engineering Bulletin Volume 43, Number 2, June 2020.
pp. 36-66.
Turrin, Federico and Erba, Alessandro and Tippenhauer, Nils Ole and Conti, Mauro
(2020)
A Statistical Analysis Framework for ICS Process Datasets.
V
Vassena, Marco and Patrignani, Marco
(2020)
Memory Safety Preservation for WebAssembly.
W
Wan, Gerry and Izhikevich, Liz and Adrian, David and Yoshioka, Katsunari and Holz, Ralph and Rossow, Christian and Durumeric, Zakir
(2020)
On the Origin of Scanning: The Impact of Location on Internet-Wide Scans.
Wang, Jiawei and Li, Li and Zeller, Andreas
(2020)
Better Code, Better Sharing: On the Need of Analyzing Jupyter Notebooks.
Wanwarang, Tanapuch and Pereira Borges Jr., Nataniel and Bettscheider, Leon and Zeller, Andreas
(2020)
Testing Apps With Real-World Inputs.
(In Press)
Wen, Rui and Yu, Yu and Xie, Xiang and Zhang, Yang
(2020)
LEAF: A Faster Secure Search Algorithm via Localization, Extraction, and Reconstruction.
Y
Yu, Ning and Li, Ke and Zhou, Peng and Malik, Jitendra and Davis, Larry S. and Fritz, Mario
(2020)
Inclusive GAN: Improving Data and Minority Coverage in Generative Models.
Yu, Ning and Skripniuk, Vladislav and Abdelnabi, Sahar and Fritz, Mario
(2020)
Artificial Fingerprinting for Generative Models: Rooting Deepfake Attribution in Training Data.
Z
Zhang, Yang and Humbert, Mathias and Surma, Bartlomiej and Manoharan, Praveen and Vreeken, Jilles and Backes, Michael
(2020)
Towards Plausible Graph Anonymization.
Zhao, Qingchuan and Zuo, Chaoshun and Brendan, Dolan-Gavitt and Pellegrino, Giancarlo and Lin, Zhiqiang
(2020)
Automatic Uncovering of Hidden Behaviors from Input Validation in Mobile Apps.
This list was generated on Sat Dec 21 13:01:31 2024 CET.