Author of the publication

SemFlow: Accurate Semantic Identification from Low-Level System Data.

, , , and . SecureComm (1), volume 398 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 513-535. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Complex Backdoor Detection by Symmetric Feature Differencing., , , , , and . CVPR, page 14983-14993. IEEE, (2022)Training with More Confidence: Mitigating Injected and Natural Backdoors During Training., , , and . NeurIPS, (2022)ABS: Scanning Neural Networks for Back-doors by Artificial Brain Stimulation., , , , , and . CCS, page 1265-1282. ACM, (2019)ELISE: A Storage Efficient Logging System Powered by Redundancy Reduction and Representation Learning., , , and . USENIX Security Symposium, page 3023-3040. USENIX Association, (2021)The Case for Learned Provenance Graph Storage Systems., , , and . USENIX Security Symposium, page 3277-3294. USENIX Association, (2023)autoMPI: Automated Multiple Perspective Attack Investigation With Semantics Aware Execution Partitioning., , , , , , and . IEEE Trans. Software Eng., 49 (4): 2761-2775 (April 2023)COLO: COarse-grained LOck-stepping virtual machines for non-stop service., , , , , , and . SoCC, page 3:1-3:16. ACM, (2013)KENKU: Towards Efficient and Stealthy Black-box Adversarial Attacks against ASR Systems., , , , , , and . USENIX Security Symposium, page 247-264. USENIX Association, (2023)Piccolo: Exposing Complex Backdoors in NLP Transformer Models., , , , , and . SP, page 2025-2042. IEEE, (2022)Get Your Cyber-Physical Tests Done! Data-Driven Vulnerability Assessment of Robotic Aerial Vehicles., , , , , and . DSN, page 67-80. IEEE, (2023)