Media Summary: CSI NN: Reverse Engineering of Neural Network Architectures Through Electromagnetic Side Channel Shivam Bhasin, Nanyang ... SecurityNet: Assessing Machine Learning Vulnerabilities on Public Models Boyang Zhang, Zheng Li, Ziqing Yang, Xinlei He, ... Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques Fabio Pagani, ...

Usenix Security 20 Interpretable Deep - Detailed Analysis & Overview

CSI NN: Reverse Engineering of Neural Network Architectures Through Electromagnetic Side Channel Shivam Bhasin, Nanyang ... SecurityNet: Assessing Machine Learning Vulnerabilities on Public Models Boyang Zhang, Zheng Li, Ziqing Yang, Xinlei He, ... Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques Fabio Pagani, ... Devils in the Guidance: Predicting Logic Vulnerabilities in Payment Syndication Services through Automated Documentation ... SSOScan: Automated Testing of Web Applications for Single Sign-On Vulnerabilities Yuchen Zhou and David Evans, University of ...

Photo Gallery

USENIX Security '20 - Interpretable Deep Learning under Fire
USENIX Security '19 - CSI NN: Reverse Engineering of Neural Network Architectures
USENIX Security '24 - SecurityNet: Assessing Machine Learning Vulnerabilities on Public Models
USENIX Security '24 - Fast and Private Inference of Deep Neural Networks by Co-designing...
USENIX Security '20 - TextShield: Robust Text Classification Based on Multimodal Embedding
USENIX Security '23 - Adversarial Training for Raw-Binary Malware Classifiers
USENIX Security '21 - Reducing Test Cases with Attention Mechanism of Neural Networks
USENIX Security '20 - Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning
USENIX Security '23 - ASSET: Robust Backdoor Data Detection Across a Multiplicity of Deep Learning..
USENIX Security '21 - You Autocomplete Me: Poisoning Vulnerabilities in Neural Code Completion
USENIX Security '20 - Justinian's GAAvernor: Robust Distributed Learning with Gradient Aggregation
USENIX Security '20 - Exploring Connections Between Active Learning and Model Extraction
View Detailed Profile
USENIX Security '20 - Interpretable Deep Learning under Fire

USENIX Security '20 - Interpretable Deep Learning under Fire

Interpretable Deep

USENIX Security '19 - CSI NN: Reverse Engineering of Neural Network Architectures

USENIX Security '19 - CSI NN: Reverse Engineering of Neural Network Architectures

CSI NN: Reverse Engineering of Neural Network Architectures Through Electromagnetic Side Channel Shivam Bhasin, Nanyang ...

USENIX Security '24 - SecurityNet: Assessing Machine Learning Vulnerabilities on Public Models

USENIX Security '24 - SecurityNet: Assessing Machine Learning Vulnerabilities on Public Models

SecurityNet: Assessing Machine Learning Vulnerabilities on Public Models Boyang Zhang, Zheng Li, Ziqing Yang, Xinlei He, ...

USENIX Security '24 - Fast and Private Inference of Deep Neural Networks by Co-designing...

USENIX Security '24 - Fast and Private Inference of Deep Neural Networks by Co-designing...

Fast and Private Inference of

USENIX Security '20 - TextShield: Robust Text Classification Based on Multimodal Embedding

USENIX Security '20 - TextShield: Robust Text Classification Based on Multimodal Embedding

View the full

USENIX Security '23 - Adversarial Training for Raw-Binary Malware Classifiers

USENIX Security '23 - Adversarial Training for Raw-Binary Malware Classifiers

USENIX Security

USENIX Security '21 - Reducing Test Cases with Attention Mechanism of Neural Networks

USENIX Security '21 - Reducing Test Cases with Attention Mechanism of Neural Networks

USENIX Security

USENIX Security '20 - Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning

USENIX Security '20 - Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning

View the full

USENIX Security '23 - ASSET: Robust Backdoor Data Detection Across a Multiplicity of Deep Learning..

USENIX Security '23 - ASSET: Robust Backdoor Data Detection Across a Multiplicity of Deep Learning..

USENIX Security

USENIX Security '21 - You Autocomplete Me: Poisoning Vulnerabilities in Neural Code Completion

USENIX Security '21 - You Autocomplete Me: Poisoning Vulnerabilities in Neural Code Completion

USENIX Security

USENIX Security '20 - Justinian's GAAvernor: Robust Distributed Learning with Gradient Aggregation

USENIX Security '20 - Justinian's GAAvernor: Robust Distributed Learning with Gradient Aggregation

View the full

USENIX Security '20 - Exploring Connections Between Active Learning and Model Extraction

USENIX Security '20 - Exploring Connections Between Active Learning and Model Extraction

View the full

USENIX Security '19 - Back to the Whiteboard: a Principled Approach for the Assessment and

USENIX Security '19 - Back to the Whiteboard: a Principled Approach for the Assessment and

Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques Fabio Pagani, ...

USENIX Security '19 - Devils in the Guidance: Predicting Logic Vulnerabilities in Payment

USENIX Security '19 - Devils in the Guidance: Predicting Logic Vulnerabilities in Payment

Devils in the Guidance: Predicting Logic Vulnerabilities in Payment Syndication Services through Automated Documentation ...

USENIX Security '21 - Reducing Bias in Modeling Real-world Password Strength via Deep Learning...

USENIX Security '21 - Reducing Bias in Modeling Real-world Password Strength via Deep Learning...

USENIX Security

USENIX Security '14 - SSOScan: Automated Testing of Web Applications for Single Sign-On

USENIX Security '14 - SSOScan: Automated Testing of Web Applications for Single Sign-On

SSOScan: Automated Testing of Web Applications for Single Sign-On Vulnerabilities Yuchen Zhou and David Evans, University of ...

USENIX Security '21 - Phishpedia: A Hybrid Deep Learning Based Approach to Visually Identify

USENIX Security '21 - Phishpedia: A Hybrid Deep Learning Based Approach to Visually Identify

Phishpedia: A Hybrid

USENIX Security '20 - Hybrid Batch Attacks: Finding Black-box Adversarial Examples with Limited

USENIX Security '20 - Hybrid Batch Attacks: Finding Black-box Adversarial Examples with Limited

View the full