Poster

Results: 19881



#Item
21Computational neuroscience / Chemistry / Applied mathematics / Artificial neural networks / Phase transitions / Statistics / Scientific modeling / Design of experiments / Deep learning / Distillation / Outlier / Surrogate model

A full version of this paper is available at https://papernot.fr/files/extending-distillation.pdf Poster: Extending Defensive Distillation Nicolas Papernot and Patrick McDaniel Pennsylvania State University {ngp5056,mcd

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-14 02:41:14
22Cryptography / Obfuscation / Computer security / Password / Security / Cyberwarfare / Salt / Identity management / Password policy / Password fatigue

Poster: An Analysis of Targeted Password Guessing Using Neural Networks Huan Zhou, Qixu Liu, Fangjiao Zhang Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chines

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-13 08:13:56
23Security / Security breaches / Prevention / Ransomware / Cybercrime / Malware / Locky / Computer security

Poster:A New Approach to Detecting Ransomware with Deception Yun Feng, Chaoge Liu, Baoxu Liu Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chinese Academy of

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-24 15:44:20
24Concurrent computing / Computer network security / Multi-agent systems / Spamming / Computing / Cybercrime / Distributed computing / Malware / Botnet / Peer-to-peer / Social peer-to-peer processes

Poster: A Reputation-Based Resilient P2P Botnet Jie Yin1,2, Xiang Cui1,2, Ke Li3 1 2 Institute of Information Engineering, Chinese Academy of Sciences

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-12 09:17:38
25Artificial intelligence / World Wide Web / Human-based computation / Technology / Computer vision / Computer access control / Anti-spam / CAPTCHA / Computer security / Internet bot / Turing test / Transaction authentication number

Poster: Adaptcha: An Adaptive CAPTCHA for Improved User Experience Brian M. Powell1 , Richa Singh1,2 , Mayank Vatsa1,2 and Afzel Noore1 1 West Virginia University, 2 IIIT-Delhi {brian.powell, afzel.noore}@mail.wvu.edu, {

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-14 09:05:50
26Machine learning / Artificial neural networks / Artificial intelligence / Learning / Computational neuroscience / Cybernetics / Statistical classification / Support vector machine / Autoencoder / Tor / Deep learning / Training /  test /  and validation sets

Poster: Experimental Evaluation of Website Fingerprinting using Deep Learning Payap Sirinam Mohsen Imani

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-13 06:14:58
27Cryptocurrencies / Blockchains / Computing / Concurrent computing / Alternative currencies / Data management / Bitcoin / Decentralization / Shard / Bitcoin Unlimited / Ethereum / Unspent transaction output

Poster: Low-latency blockchain consensus Cristina Basescu Lefteris Kokoris-Kogias Bryan Ford

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-14 19:45:56
28Computer architecture / System software / Operating system kernels / Linux kernel / Monolithic kernels / Kernel / Loadable kernel module / Protection ring / Operating system / Mach / Rootkit / Mandatory access control

Poster: (SF)2 I - Structure Field Software Fault Isolation Spyridoula Gravani, Zhuojia Shen, John Criswell Department of Computer Science, University of Rochester Email: {sgravani, zshen10, criswell}@cs.rochester.edu Ab

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-14 06:12:20
29Artificial neural networks / Computational neuroscience / Applied mathematics / Cybernetics / Neuroscience / Convolutional neural network / Long short-term memory / Recurrent neural network / Artificial intelligence

Poster: Summarized Network Behavior Prediction Shih-Chieh Su∗ Qualcomm Inc. San Diego, CA, 92121 Email: ∗

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-26 01:29:24
30Terms of service / Software / Computing / Technology / Social networking services / Microblogging / Real-time web / Text messaging / Twitter / Privacy / Internet privacy / Medical privacy

Poster - Using Twitter to Identify Privacy Information Esha Sharma1 and Jessica Staddon 2 Abstract— We are building the first comprehensive database

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-11 01:15:34
UPDATE