/** * Note: This file may contain artifacts of previous malicious infection. * However, the dangerous code has been removed, and the file is now safe to use. */

Usenix Security 24 Neural Network Semantic Backdoo

USENIX Security '24 - SoK: Neural Network Extraction Through Physical Side Channels

USENIX Security '24 - SoK: Neural Network Extraction Through Physical Side Channels

12:57
USENIX Security '24 - Hijacking Attacks against Neural Network by Analyzing Training Data

USENIX Security '24 - Hijacking Attacks against Neural Network by Analyzing Training Data

11:11
USENIX Security '24 - How Does a Deep Learning Model Architecture Impact Its Privacy?...

USENIX Security '24 - How Does a Deep Learning Model Architecture Impact Its Privacy?...

14:56
USENIX Security '24 - Scalable Multi-Party Computation Protocols for Machine Learning in the...

USENIX Security '24 - Scalable Multi-Party Computation Protocols for Machine Learning in the...

13:08
USENIX Security '24 - DeepEclipse: How to Break White-Box DNN-Watermarking Schemes

USENIX Security '24 - DeepEclipse: How to Break White-Box DNN-Watermarking Schemes

10:49
USENIX Security '24 - UIHash: Detecting Similar Android UIs through Grid-Based Visual Appearance...

USENIX Security '24 - UIHash: Detecting Similar Android UIs through Grid-Based Visual Appearance...

11:59
USENIX Security '24 - On the Difficulty of Defending Contrastive Learning against Backdoor Attacks

USENIX Security '24 - On the Difficulty of Defending Contrastive Learning against Backdoor Attacks

11:06
USENIX Security '24 - INSIGHT: Attacking Industry-Adopted Learning Resilient Logic Locking...

USENIX Security '24 - INSIGHT: Attacking Industry-Adopted Learning Resilient Logic Locking...

12:04
NDSS 2026 - Keynote 2: Securing the Software Supply Chain

NDSS 2026 - Keynote 2: Securing the Software Supply Chain

1:10:09
SREcon26 Americas - AI Agents for Incident Investigation: The Good, The Bad, and The Ugly

SREcon26 Americas - AI Agents for Incident Investigation: The Good, The Bad, and The Ugly

15:46
SREcon26 Americas - Autonomous Policy Validation: Building AI Agents to Analyze Logs and Identify...

SREcon26 Americas - Autonomous Policy Validation: Building AI Agents to Analyze Logs and Identify...

35:37
SREcon26 Americas - How We Debug 1000s of Databases with AI: Lessons from an AI-Assisted Database...

SREcon26 Americas - How We Debug 1000s of Databases with AI: Lessons from an AI-Assisted Database...

17:14
Deep Neural Network Robustness course: Backdoor attacks and defense by Hasan Abed Al Kader Hammoud

Deep Neural Network Robustness course: Backdoor attacks and defense by Hasan Abed Al Kader Hammoud

37:42
ESWEEK 2021 Education - Neural Network Accelerator Design

ESWEEK 2021 Education - Neural Network Accelerator Design

1:52:25
USENIX Security '18-Q: Why Do Keynote Speakers Keep Suggesting That Improving Security Is Possible?

USENIX Security '18-Q: Why Do Keynote Speakers Keep Suggesting That Improving Security Is Possible?

51:22
vCISO Master Class: Build a Security Program From Zero

vCISO Master Class: Build a Security Program From Zero

1:20:38
Fawkes: Protecting Personal Privacy against Unauthorized Deep Learning Models (USENIX Security 2020)

Fawkes: Protecting Personal Privacy against Unauthorized Deep Learning Models (USENIX Security 2020)

11:47
Cybersecurity Lab - Building a Live SOC + Honeynet in Azure

Cybersecurity Lab - Building a Live SOC + Honeynet in Azure

1:26:28
USENIX Security '24 - AutoFHE: Automated Adaption of CNNs for Efficient Evaluation over FHE

USENIX Security '24 - AutoFHE: Automated Adaption of CNNs for Efficient Evaluation over FHE

12:48
USENIX Security '24 - Splitting the Difference on Adversarial Training

USENIX Security '24 - Splitting the Difference on Adversarial Training

12:31
USENIX Security '24 - A Wolf in Sheep's Clothing: Practical Black-box Adversarial Attacks for...

USENIX Security '24 - A Wolf in Sheep's Clothing: Practical Black-box Adversarial Attacks for...

11:28
USENIX Security '24 - Fast and Private Inference of Deep Neural Networks by Co-designing...

USENIX Security '24 - Fast and Private Inference of Deep Neural Networks by Co-designing...

10:07
USENIX Security '24 - Unveiling the Secrets without Data: Can Graph Neural Networks Be Exploited...

USENIX Security '24 - Unveiling the Secrets without Data: Can Graph Neural Networks Be Exploited...

10:24
USENIX Security '24 - zkCross: A Novel Architecture for Cross-Chain Privacy-Preserving Auditing

USENIX Security '24 - zkCross: A Novel Architecture for Cross-Chain Privacy-Preserving Auditing

11:59
USENIX Security '19 - CSI NN: Reverse Engineering of Neural Network Architectures

USENIX Security '19 - CSI NN: Reverse Engineering of Neural Network Architectures

23:12
USENIX Security '24 - ClearStamp: A Human-Visible and Robust Model-Ownership Proof based on...

USENIX Security '24 - ClearStamp: A Human-Visible and Robust Model-Ownership Proof based on...

13:43
USENIX Security '22 - DnD: A Cross-Architecture Deep Neural Network Decompiler

USENIX Security '22 - DnD: A Cross-Architecture Deep Neural Network Decompiler

11:14
USENIX Security '23 - Precise and Generalized Robustness Certification for Neural Networks

USENIX Security '23 - Precise and Generalized Robustness Certification for Neural Networks

12:19
USENIX Security '24 - Formalizing and Benchmarking Prompt Injection Attacks and Defenses

USENIX Security '24 - Formalizing and Benchmarking Prompt Injection Attacks and Defenses

12:00

Recent searches