Star 0
Month Quarter Year
#N/A #N/A #N/A
Title Event
Analysis of Concurrent Moving Target Defenses ACM CCS 2018
Secure Computation with Differentially Private Access Patterns ACM CCS 2018
Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation★ ACM CCS 2017
Detecting Stealthy Botnets in a Resource-Constrained Environment using Reinforcement Learning ACM CCS 2017
Global-Scale Secure Multiparty Computation ACM CCS 2017
Performance Modeling of Moving Target Defenses ACM CCS 2017
Vulnerable Implicit Service: A Revisit ACM CCS 2017
Abusing Public Third-Party Services for EDoS Attacks WOOT '16
A Security Analysis of an In-Vehicle Infotainment and App Platform WOOT '16
Fuzzing E-mail Filters with Generative Grammars and N-Gram Analysis WOOT '15