Items where Year is 2020

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Author(s)/Creator(s) | Item Type | No Grouping
Jump to: A | B | C | D | E | F | G | H | J | K | M | O | P | R | S | T | W | Y | Z
Number of items: 95.

A

Abdelnabi, Sahar and Krombholz, Katharina and Fritz, Mario
(2020) VisualPhishNet: Zero-Day Phishing Website Detection by Visual Similarity.
In: ACM Conference on Computer and Communications Security (CCS).
Conference: CCS ACM Conference on Computer and Communications Security

Agarwal, Vedika and Shetty, Rakshith and Fritz, Mario
(2020) Towards Causal VQA: Revealing and Reducing Spurious Correlations by Invariant and Covariant Semantic Editing.
In: IEEE Conference on Computer Vision and Pattern Recognition.
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Akhmetzyanova, Liliya and Cremers, Cas and Garratt, Luke and Smyshlyaev, Stanislav and Sullivan, Nick
(2020) Limiting the impact of unreliable randomness in deployed security protocols.
In: 33rd IEEE Computer Security Foundations Symposium, June 22-25, 2020.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Antonioli, Daniele and Tippenhauer, Nils Ole and Rasmussen, Kasper
(2020) BIAS: Bluetooth Impersonation AttackS.
In: Proceedings of the IEEE Symposium on Security and Privacy (S&P).
Conference: SP IEEE Symposium on Security and Privacy

Antonioli, Daniele and Tippenhauer, Nils Ole and Rasmussen, Kasper
(2020) Key Negotiation Downgrade Attacks on Bluetooth and Bluetooth Low Energy.
ACM Transactions on Privacy and Security. ISSN 2471-2566

B

Baumeister, Jan and Finkbeiner, Bernd and Kruse, Matthis and Schwenger, Maximilian
(2020) Automatic Optimizations for Stream-based Monitoring Languages.
In: 20th International Conference on Runtime Verification, 06-09 October 2020.
Conference: RV International Conference on Runtime Verification (was workshop pre 2010)
(In Press)

Baumeister, Jan and Finkbeiner, Bernd and Schirmer, Sebastian and Schwenger, Maximilian and Torens, Christoph
(2020) RTLola Cleared for Take-Off: Monitoring Autonomous Aircraft.
In: Computer Aided Verification - 32nd International Conference, CAV 2020, Los Angeles, CA, USA, July 21-24, 2020, Proceedings, Part II.
Conference: CAV Computer Aided Verification

Belth, Caleb and Zheng, X and Vreeken, Jilles and Koutra, Danai
(2020) What is Normal, What is Strange, and What is Missing in an Knowledge Graph.
In: The Web Conference.
Conference: WWW International World Wide Web Conference

Benz, Manuel and Kristensen, Erik Krogh and Luo, Linghui and Pereira Borges Jr., Nataniel and Bodden, Eric and Zeller, Andreas
(2020) Heaps’n’Leaks: How Heap Snapshots Improve Android Taint Analysis.
In: ICSE 2020: Proceedings of the International Conference on Software Engineering.
Conference: ICSE International Conference on Software Engineering

Bhattacharyya, Apratim and Mahajan, Shweta and Fritz, Mario and Schiele, Bernt and Roth, Stefan
(2020) Normalizing Flows with Multi-scale Autoregressive Priors.
In: IEEE Conference on Computer Vision and Pattern Recognition.
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Bieringer, Lukas
(2020) Stellungnahme zur Anhörung der Enquêtekommission „Digitalisierung im Saarland“ zur wirtschaftlichen Entwicklung im Zuge der Digitalisierung.
Lukas Bieringer
.

Birtel, Benedikt and Rossow, Christian
(2020) Slitheen++: Stealth TLS-based Decoy Routing.
In: FOCI'20, August 2020.

Brakerski, Zvika and Döttling, Nico
(2020) Hardness of LWE on General Entropic Distribution.
In: Eurocrypt 2020.
Conference: EuroCrypt International Conference on the Theory and Application of Cryptographic Techniques

Brakerski, Zvika and Döttling, Nico and Garg, Sanjam and Malavolta, Giulio
(2020) Candidate iO from Homomorphic Encryption Schemes.
In: UNSPECIFIED.
Conference: EuroCrypt International Conference on the Theory and Application of Cryptographic Techniques
(In Press)

Brendel, Jacqueline and Fischlin, Marc and Günther, Felix and Janson, Christian and Stebila, Douglas
(2020) Towards Post-Quantum Security for Signal's X3DH Handshake.
In: SAC 2020, Oct 19-23, 2020.
Conference: SAC Selected Areas in Cryptography
(In Press)

Budhathoki, Kailash
(2020) Causal Inference on Discrete Data.
Doctoral thesis, Saarland University.

Bushart, Jonas and Christian, Rossow
(2020) Padding Ain’t Enough: Assessing the Privacy Guarantees of Encrypted DNS.
In: 10th USENIX Workshop on Free and Open Communications on the Internet, 2020-08-11.

C

Calzavara, Stefano and Roth, Sebastian and Rabitti, Alvise and Backes, Michael and Stock, Ben
(2020) A Tale of Two Headers: A Formal Analysis of Inconsistent Click-Jacking Protection on the Web.
In: Proceedings of the 29th USENIX Security Symposium.
Conference: USENIX-Security Usenix Security Symposium

Chen, Dingfan and Orekondy, Tribhuvanesh and Fritz, Mario
(2020) GS-WGAN: A Gradient-Sanitized Approach for Learning Differentially Private Generators.
ArXiv.

Chen, Dingfan and Orekondy, Tribhuvanesh and Fritz, Mario
(2020) GS-WGAN: A Gradient-Sanitized Approach for Learning Differentially Private Generators.
In: Neural Information Processing Systems (NeurIPS).
Conference: NIPS Advances in Neural Information Processing Systems

Chen, Dingfan and Yu, Ning and Zhang, Yang and Fritz, Mario
(2020) GAN-Leaks: A Taxonomy of Membership Inference Attacks against GANs.
In: ACM SIGSAC Conference on Computer and Communications Security (CCS).
Conference: CCS ACM Conference on Computer and Communications Security

Chou, Edward and Tramer, Florian and Pellegrino, Giancarlo
(2020) SentiNet: Detecting Localized Universal Attack Against Deep Learning Systems.
In: 3rd Deep Learning and Security Workshop (DLS 2020), May 21, 2020, All-digital.
Conference: IEEE SPW IEEE Symposium on Security and Privacy Workshops

Cogliati, Benoît and Jha, Ashwin and Nandi, Mridul
(2020) How to Build Optimally Secure PRFs Using Block Ciphers.
In: ASIACRYPT 2020.
Conference: ASIACRYPT International Conference on the Theory and Application of Cryptology and Information Security
(In Press)

Cohn-Gordon, Katriel and Cremers, Cas and Dowling, Benjamin and Garratt, Luke and Stebila, Douglas
(2020) A Formal Security Analysis of Key Establishment in the Signal Messaging Protocol.
Journal of Cryptology.
(In Press)

Cremers, Cas and Fairoze, Jayden and Kiesl, Benjamin and Naska, Aurora
(2020) Clone Detection in Secure Messaging: Improving Post-Compromise Security in Practice.
In: CCS 2020, November 09-13, 2020.
Conference: CCS ACM Conference on Computer and Communications Security
(In Press)

Cremers, Cas and Kiesl, Benjamin and Medinger, Niklas
(2020) A Formal Analysis of IEEE 802.11’s WPA2: Countering the Kracks Caused by Cracking the Counters.
In: 29th USENIX Security Symposium (USENIX Security 20), August 12–14, 2020.
Conference: USENIX-Security Usenix Security Symposium

Cueppers, Joscha and Vreeken, Jilles
(2020) Just Wait For It... Mining Sequential Patterns with Reliable Prediction Delays.
In: IEEE International Conference on Data Mining.
Conference: ICDM IEEE International Conference on Data Mining
(In Press)

D

Dalleiger, Sebastian and Vreeken, Jilles
(2020) Explainable Data Decompositions.
In: Proceedings of the AAAI Conference on Artificial Intelligence (AAAI).
Conference: AAAI National Conference of the American Association for Artificial Intelligence
(In Press)

Dalleiger, Sebastian and Vreeken, Jilles
(2020) The Relaxed Maximum Entropy Distribution and its Application to Pattern Discovery.
In: IEEE International Conference on Data Mining.
Conference: ICDM IEEE International Conference on Data Mining
(In Press)

Deuber, Dominic and Döttling, Nico and Magri, Bernardo and Malavolta, Giulio and Thyagarajan, Sri Aravinda Krishnan
(2020) Minting Mechanisms for (PoS) Blockchains.
In: ACNS.

Döttling, Nico and Garg, Sanjam and Hajiabadi, Mohammad and Masny, Daniel and Wichs, Daniel
(2020) Two-Round Oblivious Transfer from CDH or LPN.
In: UNSPECIFIED.
Conference: EuroCrypt International Conference on the Theory and Application of Cryptographic Techniques
(In Press)

Döttling, Nico and Garg, Sanjam and Malavolta, Giulio and Vasudevan, Prashant Nalini
(2020) Tight Verifiable Delay Functions.
In: SCN 2020.

E

Erba, Alessandro and Taormina, Riccardo and Galelli, Stefano and Pogliani, Marcello and Carminati, Michele and Zanero, Stefano and Tippenhauer, Nils Ole
(2020) Constrained Concealment Attacks against Reconstruction-based Anomaly Detectors in Industrial Control Systems.
In: Proceedings of the Annual Computer Security Applications Conference (ACSAC).
Conference: ACSAC Annual Computer Security Applications Conference

Esiyok, Ilkan and Hanzlik, Lucjan and Künnemann, Robert and Budde, Lena Marie and Backes, Michael
(2020) TrollThrottle — Raising the Cost of Astroturfing.
In: ACNS 2020, 19-22 October 2020, Rome, Italy.

F

Finkbeiner, Bernd and Gieseking, Manuel and Hecking-Harbusch, Jesko and Olderog, Ernst-Rüdiger
(2020) AdamMC: A Model Checker for Petri Nets with Transits against Flow-LTL.
In: Computer Aided Verification - 32nd International Conference, CAV 2020, Los Angeles, CA, USA, July 21-24, 2020, Proceedings, Part II.
Conference: CAV Computer Aided Verification

Finkbeiner, Bernd and Gieseking, Manuel and Hecking-Harbusch, Jesko and Olderog, Ernst-Rüdiger
(2020) Model Checking Branching Properties on Petri Nets with Transits.
In: Automated Technology for Verification and Analysis - 18th International Symposium, ATVA 2020, Hanoi, Vietnam, October 19-23, 2020, Proceedings.
Conference: ATVA International Symposium on Automated Technology for Verification and Analysis

Finkbeiner, Bernd and Hahn, Christopher and Hofmann, Jana and Tentrup, Leander
(2020) Realizing Omega-regular Hyperproperties.
In: Computer Aided Verification - 32nd International Conference, CAV 2020, Los Angeles, CA, USA, July 21-24, 2020, Proceedings, Part II, 21.07.2020 - 24.07.2020, Los Angeles.
Conference: CAV Computer Aided Verification

Finkbeiner, Bernd and Hahn, Christopher and Stenger, Marvin and Tentrup, Leander
(2020) Efficient monitoring of hyperproperties using prefix trees.
International Journal on Software Tools for Technology Transfer. ISSN 1433-2779

Finkbeiner, Bernd and Oswald, Stefan and Passing, Noemi and Schwenger, Maximilian
(2020) Verified Rust Monitors for Lola Specifications.
In: RV 2020.
Conference: RV International Conference on Runtime Verification (was workshop pre 2010)

Finkbeiner, Bernd and Passing, Noemi
(2020) Dependency-based Compositional Synthesis.
In: 18th International Symposium on Automated Technology for Verification and Analysis, ATVA 2020.
Conference: ATVA International Symposium on Automated Technology for Verification and Analysis

Finkbeiner, Bernd and Schmidt, Jessica and Schwenger, Maximilian
(2020) Simplex Architecture Meets RTLola.
In: 5th Workshop on Monitoring and Testing of Cyber-Physical Systems, April 13-22 2020, Sydney.
Conference: MT-CPS WORKSHOP ON MONITORING AND TESTING OF CYBER-PHYSICAL SYSTEMS

Fischer, Jonas and Vreeken, Jilles
(2020) Discovering Succinct Pattern Sets Expressing Co-Occurrence and Mutual Exclusivity.
In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD).
Conference: KDD ACM International Conference on Knowledge Discovery and Data Mining

Frassinelli, Daniel and Park, Sohyeon and Nürnberger, Stefan
(2020) ≪ I Know Where You Parked Last Summer ≫ Automated Reverse Engineering and Privacy Analysis of Modern Cars.
In: S&P - IEEE Symposium on Security and Privacy.
Conference: SP IEEE Symposium on Security and Privacy

G

Ghorbani Lyastani, Sanam and Schilling, Michael and Neumayr, Michaela and Backes, Michael and Bugiel, Sven
(2020) Is FIDO2 the Kingslayer of User Authentication? A Comparative Usability Study of FIDO2 Passwordless Authentication.
In: Proceedings of the 41st IEEE Symposium on Security and Privacy.
Conference: SP IEEE Symposium on Security and Privacy

Girol, Guillaume and Hirschi, Lucca and Sasse, Ralf and Jackson, Dennis and Cremers, Cas and Basin, David
(2020) A Spectral Analysis of Noise:A Comprehensive, Automated, Formal Analysis of Diffie-Hellman Protocols.
In: 29th USENIX Security Symposium (USENIX Security 20), August 12–14, 2020.
Conference: USENIX-Security Usenix Security Symposium

Gopinath, Rahul and Kampmann, Alexander and Havrikov, Nikolas and Soremekun, Ezekiel and Zeller, Andreas
(2020) Abstracting Failure-Inducing Inputs.
In: ISSTA - ACM SIGSOFT International Symposium on Software Testing and Analysis, Sat 18 - Wed 22 July 2020, Virtual.
Conference: ISSTA International Symposium on Software Testing and Analysis

Gopinath, Rahul and Mathis, Björn and Zeller, Andreas
(2020) Mining Input Grammars from Dynamic Control Flow.
In: ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE), 2020-11-09, virtual.
Conference: ESEC/FSE European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (duplicate was listed as ESEC, removed from DB)

Gopinath, Rahul and Nemati, Hamed and Zeller, Andreas
(2020) Input Algebras.
In: International Conference on Software Engineering (ICSE).
Conference: ICSE International Conference on Software Engineering
(Submitted)

Grochowksi, Marco and Simon, Hendrik and Bohlender, Dimitri and Kowalewski, Stefan and Löcklin, Andreas and Müller, Timo and Jazdi, Nasser and Zeller, Andreas and Weyrich, Michael
(2020) Formale Methoden für rekonfigurierbare cyber-physische Systeme in der Produktion.
Automatisierungstechnik, 68 (1). ISSN 0178-2312

H

Hagestedt, Inken and Humbert, Mathias and Berrang, Pascal and Lehmann, Irina and Eils, Roland and Backes, Michael and Zhang, Yang
(2020) Membership Inference Against DNA Methylation Databases.
In: IEEE European Symposium on Security and Privacy.
Conference: EuroS&P IEEE European Symposium on Security and Privacy

Hajipour, Hossein and Malinowski, Mateusz and Fritz, Mario
(2020) IReEn: Iterative Reverse-Engineering of Black-Box Functions via Neural Program Synthesis.
ArXiv.

Hasan, Rakibul and Crandall, David and Fritz, Mario and Kapadia, Apu
(2020) Automatically Detecting Bystanders in Photos to Reduce Privacy Risks.
In: IEEE Symposium on Security and Privacy (S&P).
Conference: SP IEEE Symposium on Security and Privacy

He, Yang and Rahimian, Shadi and Schiele, Bernt and Fritz, Mario
(2020) Segmentations-Leak: Membership Inference Attacks and Defenses in Semantic Image Segmentation.
In: European Conference on Computer Vision (ECCV).
Conference: ECCV European Conference on Computer Vision

He, Yang and Schiele, Bernt and Fritz, Mario
(2020) Synthetic Convolutional Features for Improved Semantic Segmentation.
In: Workshop on Assistive Computer Vision and Robotics at European Conference on Computer Vision (ECCV-Workshop).
Conference: ACVR International Workshop on Assistive Computer Vision and Robotics

Holmes, Josie and Brindescu, Iftekhar and Gopinath, Rahul and Zhang, He and Groce, Alex and Brindescu, Caius
(2020) Using Relative Lines of Code to Guide Automated Test Generation for Python.
ACM Transactions on Software Engineering and Methodology, 29 (4). ISSN 1049-331X

J

Jaber, Nouraldin and Jacobs, Swen and Wagner, Christopher and Kulkarni, Milind and Samanta, Roopsha
(2020) Parameterized Verification of Systems with Global Synchronization and Guards.
In: CAV 2020.
Conference: CAV Computer Aided Verification
(In Press)

Jacobs, Swen and Sakr, Mouhammad and Zimmermann, Martin
(2020) Promptness and Bounded Fairness in Concurrent and Parameterized Systems.
In: VMCAI 2020.
(In Press)

K

Kampmann, Alexander and Havrikov, Nikolas and Ezekiel, Soremekun and Zeller, Andreas
(2020) When does my Program do this? Learning Circumstances of Software Behavior.
In: ESEC/FSE 2020.
Conference: ESEC/FSE European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (duplicate was listed as ESEC, removed from DB)
(In Press)

Kirschner, Lukas and Soremekun, Ezekiel and Zeller, Andreas
(2020) Debugging Inputs.
In: 42nd International Conference on Software Engineering, October 5-11, 2020, Seoul, South Korea..
Conference: ICSE International Conference on Software Engineering

Kirschner, Lukas and Soremekun, Ezekiel and Zeller, Andreas
(2020) Poster: Debugging Inputs.
In: 42nd International Conference on Software Engineering Companion, October 5-11, 2020, Seoul, South Korea..
Conference: ICSE International Conference on Software Engineering
(In Press)

Koch, Simon and Sauer, Tim and Johns, Martin and Pellegrino, Giancarlo
(2020) Raccoon: Automated Verification of Guarded Race Conditions in Web Applications.
In: The 35th ACM/SIGAPP Symposium On Applied Computing, March 30-April 3, 2020, Brno, Czech Republic.

M

Mai, Alexandra and Pfeffer, Katharina and Gusenbauer, Matthias and Weippl, Edgar and Krombholz, Katharina
(2020) User Mental Models of Cryptocurrency Systems - A Grounded Theory Approach.
In: Symposium on Usable Privacy and Security (SOUPS) 2020.

Mandros, Panagiotis and Boley, Mario and Vreeken, Jilles
(2020) Discovering Dependencies with Reliable Mutual Information.
Knowledge and Information Systems. ISSN 0219-1377

Mandros, Panagiotis and Kaltenpoth, David and Boley, Mario and Vreeken, Jilles
(2020) Discovering Functional Dependencies from Mixed-Type Data.
In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD).
Conference: KDD ACM International Conference on Knowledge Discovery and Data Mining

Mascle, Corto and Neider, Daniel and Schwenger, Maximilian and Tabuada, Paulo and Weinert, Alexander and Zimmermann, Martin
(2020) From LTL to rLTL Monitoring: Improved Monitorability Through Robust Semantics.
In: HSCC 2020, April 21-14 2020, Sydney, Australia.
Conference: HSCC ACM International Conference on Hybrid Systems: Computation and Control

Mathis, Björn and Gopinath, Rahul and Zeller, Andreas
(2020) Learning Input Tokens for Effective Fuzzing.
In: ISSTA - ACM SIGSOFT International Symposium on Software Testing and Analysis, Sat 18 - Wed 22 July 2020, Virtual.
Conference: ISSTA International Symposium on Software Testing and Analysis
(In Press)

O

Oh, Seong Joon and Benenson, Rodrigo and Fritz, Mario and Schiele, Bernt
(2020) Person Recognition in Personal Photo Collections.
IEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI).

Orekondy, Tribhuvanesh and Schiele, Bernt and Fritz, Mario
(2020) Prediction Poisoning: Utility-Constrained Defenses Against Model Stealing Attacks.
In: International Conference on Representation Learning (ICLR).
Conference: ICLR International Conference on Learning Representations

P

Patrignani, Marco and Wahby, Riad S. and Künnemann, Robert
(2020) Universal Composability is Secure Compilation.
In: PriSC 2020 The Principles of Secure Compilation.
Conference: POPL ACM-SIGACT Symposium on Principles of Programming Languages

Penerath, Frederic and Mandros, Panagiotis and Vreeken, Jilles
(2020) Discovering Approximate Functional Dependencies using Smoothed Mutual Information.
In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD).
Conference: KDD ACM International Conference on Knowledge Discovery and Data Mining

R

Reen, Gaganjeet Singh and Rossow, Christian
(2020) DPIFuzz: A Differential Fuzzing Frameworkto Detect DPI Elusion Strategies for QUIC.
In: Annual Computer Security Applications Conference (ACSAC 2020).
Conference: ACSAC Annual Computer Security Applications Conference

Roth, Sebastian and Backes, Michael and Stock, Ben
(2020) Assessing the Impact of Script Gadgets on CSP at Scale.
In: AsiaCCS 2020.

Roth, Sebastian and Barron, Timothy and Calzavara, Stefano and Nikiforakis, Nick and Stock, Ben
(2020) Complex Security Policy? A Longitudinal Analysis of Deployed Content Security Policies.
In: NDSS 2020.
Conference: NDSS Network and Distributed System Security Symposium

S

Salem, Ahmed and Bhattacharya, Apratim and Backes, Michael and Fritz, Mario and Zhang, Yang
(2020) Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning.
In: USENIX Security Symposium.
Conference: USENIX-Security Usenix Security Symposium

Sattar, Hosnieh and Krombholz, Katharina and Pons-Moll, Gerard and Fritz, Mario
(2020) Body Shape Privacy in Images: Understanding Privacy and Preventing Automatic Shape Extraction.
In: Workshop on The Bright and Dark Sides of Computer Vision: Challenges and Opportunities for Privacy and Security CVCOPS at European Conference on Computer Vision (ECCV-W).
Conference: UNSPECIFIED

Sattara, Hosnieh and Fritz, Mario and Bulling, Andreas
(2020) Deep gaze pooling: Inferring and visually decoding search intents from human gaze fixations.
Neurocomputing, 387. ISSN 0925-2312

Schwarz, Fabian and Rossow, Christian
(2020) SENG, the SGX-Enforcing Network Gateway: Authorizing Communication from Shielded Clients.
In: 29th USENIX Security Symposium (USENIX Security 20).
Conference: USENIX-Security Usenix Security Symposium

Schwenger, Maximilian
(2020) Let’s not Trust Experience Blindly: Formal Monitoring of Humans and other CPS.
Masters thesis, Saarland University.

Schwenger, Maximilian
(2020) Monitoring Cyber-Physical Systems: From Design to Integration.
In: RV 2020.
Conference: RV International Conference on Runtime Verification (was workshop pre 2010)

Shetty, Rakshith and Fritz, Mario and Schiele, Bernt
(2020) Towards Automated Testing and Robustification by Semantic Adversarial Data Generation.
In: European Conference on Computer Vision (ECCV).
Conference: ECCV European Conference on Computer Vision

Skripniuk, Vladislav and Yu, Ning and Abdelnabi, Sahar and Fritz, Mario
(2020) Black-Box Watermarking for Generative Adversarial Networks.
ArXiv.

Steffens, Marius and Stock, Ben
(2020) PMForce: Systematically Analyzing PostMessage Handlers at Scale.
In: ACM CCS 2020.
Conference: CCS ACM Conference on Computer and Communications Security

Stivala, Giada and Pellegrino, Giancarlo
(2020) Deceptive Previews: A Study of the Link Preview Trustworthiness in Social Platforms.
In: 27th Annual Network and Distributed System Security symposium, February 2020, San Diego.
Conference: NDSS Network and Distributed System Security Symposium

Sutton, Christopher and Boley, Mario and Ghiringhelli, Luca M. and Rupp, Matthias and Vreeken, Jilles and Scheffler, Matthias
(2020) Identifying Domains of Applicability of Machine Learning Models for Materials Science.
Nature Communications. ISSN 2041-1723

T

Thyagarajan, Sri Aravinda Krishnan and Bhat, Adithya and Malavolta, Giulio and Nico, Döttling and Kate, Aniket and Schröder, Dominique
(2020) Verifiable Timed Signatures Made Practical.
In: CCS 2020.
Conference: CCS ACM Conference on Computer and Communications Security

Tiefenau, Christian and Häring, Maximilian and Krombholz, Katharina and von Zezschwitz, Emanuel
(2020) Security, Availability, and Multiple Information Sources: Exploring Update Behavior of System Administrators.
In: Symposium on Usable Privacy and Security (SOUPS) 2020.

Tran, Nicolas and Speicher, Patrick and Künnemann, Robert and Backes, Michael and Torralba, Àlvaro and Hoffmann, Jörg
(2020) Planning in the Browser.
In: System Demonstration at the 30th International Conference on Automated Planning and Scheduling (ICAPS'20), October 2020.
Conference: ICAPS International Conference on Automated Planning and Scheduling

Troncoso, Carmela and Payer, Matthias and Hubaux, Jean-Pierre and Salathé, Marcel and Larus, James and Lueks, Wouter and Stadler, Theresa and Pyrgelis, Apostolos and Antonioli, Daniele and Barman, Ludovic and Chatel, Sylvain and Paterson, Kenneth G. and Capkun, Srdjan and Basin, David and Beutel, Jan and Jackson, Dennis and Roeschlin, Marc and Leu, Patrick and Preneel, Bart and Smart, Nigel and Abidin, Aysajan and Gürses, Seda and Veale, Michael and Cremers, Cas and Backes, Michael and Tippenhauer, Nils Ole and Binns, Reuben and Cattuto, Ciro and Barrat, Alain and Fiore, Dario and Barbosa, Manuel and Oliveira, Rui and Pereira, José
(2020) Decentralized Privacy-Preserving Proximity Tracing.
IEEE Data Engineering Bulletin Volume 43, Number 2, June 2020. pp. 36-66.

W

Wang, Hui-Po and Orekondy, Tribhuvanesh and Fritz, Mario
(2020) InfoScrub: Towards Attribute Privacy by Targeted Obfuscation.
ArXiv.

Wang, Jiawei and Li, Li and Zeller, Andreas
(2020) Better Code, Better Sharing: On the Need of Analyzing Jupyter Notebooks.
In: 2020 IEEE/ACM 42nd International Conference on Software Engineering: New Ideas and Emerging Results (ICSE-NIER).
Conference: ICSE International Conference on Software Engineering

Wanwarang, Tanapuch and Pereira Borges Jr., Nataniel and Bettscheider, Leon and Zeller, Andreas
(2020) Testing Apps With Real-World Inputs.
In: 1st IEEE/ACM International Conference on Automation of Software Test, May 25-26, 2020, Seoul, South Korea.
(In Press)

Wen, Rui and Yu, Yu and Xie, Xiang and Zhang, Yang
(2020) LEAF: A Faster Secure Search Algorithm via Localization, Extraction, and Reconstruction.
In: ACM SIGSAC Conference on Computer and Communications Security.
Conference: CCS ACM Conference on Computer and Communications Security

Y

Yu, Ning and Li, Ke and Zhou, Peng and Malik, Jitendra and Davis, Larry S. and Fritz, Mario
(2020) Inclusive GAN: Improving Data and Minority Coverage in Generative Models.
In: European Conference on Computer Vision (ECCV).
Conference: ECCV European Conference on Computer Vision

Z

Zhang, Yang and Humbert, Mathias and Surma, Bartlomiej and Manoharan, Praveen and Vreeken, Jilles and Backes, Michael
(2020) Towards Plausible Graph Anonymization.
In: Annual Network and Distributed System Security Symposium.
Conference: NDSS Network and Distributed System Security Symposium

Zhao, Qingchuan and Zuo, Chaoshun and Brendan, Dolan-Gavitt and Pellegrino, Giancarlo and Lin, Zhiqiang
(2020) Automatic Uncovering of Hidden Behaviors from Input Validation in Mobile Apps.
In: IEEE Symposium on Security and Privacy.
Conference: SP IEEE Symposium on Security and Privacy

This list was generated on Sun Oct 25 00:02:06 2020 CEST.