- Zero-One Attack: Degrading Closed-Loop Neural Network Control Systems using State-Time Perturbations.
- Biosignal Authentication Considered Harmful Today.
- Falsification using Reachability of Surrogate Koopman Models.
- A Study of the Effects of Transfer Learning on Adversarial Robustness.
- Confine: Fine-grained system call filtering for container attack surface reduction.
- Improving Storage Systems Using Machine Learning.
- WebSheets: A New Privacy-Centric Framework for Web Applications.
- Verifiable Sustainability in Data Centers.
- Multi-Agent Spatial Predictive Control with Application to Drone Flocking.
- Double and Nothing: Understanding and Detecting Cryptocurrency Giveaway Scams.
- Role Models: Role-based Debloating for Web Applications.
- MAVERICK: An App-independent and Platform-agnostic Approach to Enforce Policies in IoT Systems at Runtime.
- Integrating Logic Rules with Everything Else, Seamlessly.
- The More Things Change, the More They Stay the Same: Integrity of Modern JavaScript.
- Navigating Murky Waters: Automated Browser Feature Testing for Uncovering Tracking Vectors.