中国机械工程学会生产工程分会知识服务平台

会议文集


文集名Computer Security - ESORICS 2023
会议名28th European Symposium on Research in Computer Security (ESORICS 2023)
中译名《第二十八届欧洲计算机安全研究专题研讨会,卷4》
会议日期September 25-29, 2023
会议地点The Hague, The Netherlands
出版年2024
馆藏号350879


题名作者出版年
Reinforcement Learning Approach to Generate Zero-Dynamics Attacks on Control Systems Without State Space ModelsBipin Paudel; George Amariucai2024
Secure Split Learning Against Property Inference, Data Reconstruction, and Feature Space Hijacking AttacksYunlong Mao; Zexi Xin; Zhenyu Li; Jue Hong; Qingyou Yang; Sheng Zhong2024
The Power of MEME: Adversarial Malware Creation with Model-Based Reinforcement LearningMaria Rigaki; Sebastian Garcia2024
FLGuard: Byzantine-Robust Federated Learning via Ensemble of Contrastive ModelsYounghan Lee; Yungi Cho; Woorim Han; Ho Bae; Yunheung Paek2024
Machine Learning for SAST: A Lightweight and Adaptable ApproachLorenz Huther; Karsten Sohr; Bernhard J. Berger; Hendrik Rothe; Stefan Edelkamp2024
Two Models are Better Than One: Federated Learning is Not Private for Google GBoard Next Word PredictionMohamed Suliman; Douglas Leith2024
Privacy-Preserving Split Learning via Pareto Optimal SearchXi Yu; Liyao Xiang; Shiming Wang; Chengnian Long2024
Security of NVMe Offloaded Data in Large-Scale Machine LearningTorsten Krauss; Raphael Gotz; Alexandra Dmitrienko2024
PassGPT: Password Modeling and (Guided) Generation with Large Language ModelsJavier Rando; Fernando Perez-Cruz; Briland Hitaj2024
Learning Type Inference for Enhanced Dataflow AnalysisLukas Seidel; Sedick David Baker Effendi; Xavier Pinho; Konrad Rieck; Brink van der Merwe; Fabian Yamaguchi2024
Efficient Pruning for Machine Learning Under Homomorphic EncryptionEhud Aharoni; Moran Baruch; Pradip Bose; Alper Buyuktosunoglu; Nir Drucker; Subhankar Pal; Tomer Pelleg; Kanthi Sarpatwar; Hayim Shaul; Omri Soceanu; Roman Vaculin2024
SoK: A Tale of Reduction, Security, and Correctness - Evaluating Program Debloating Paradigms and Their CompositionsMuaz Ali; Muhammad Muzammil; Faraz Karim; Ayesha Naeem; Rukhshan Haroon; Muhammad Haris; Huzaifah Nadeem; Waseem Sabir; Fahad Shaon; Fareed Zaffar; Vinod Yegneswaran; Ashish Gehani; Sazzadur Rahaman2024
On the (In) Security of Manufacturer-Provided Remote Attestation Frameworks in AndroidZiyi Zhou; Xuangan Xiao; Tianxiao Hou; Yikun Hu; Dawu Gu2024
DScope: To Reliably and Securely Acquire Live Data from Kernel-Compromised ARM DevicesZhe Chen; Haiqing Qiu; Xuhua Ding2024
SplITS: Split Input-to-State Mapping for Effective Firmware FuzzingGuy Farrelly; Paul Quirk; Salil S. Kanhere; Seyit Camtepe; Damith C. Ranasinghe2024
μIPS: Software-Based Intrusion Prevention for Bare-Metal Embedded SystemsLuca Degani; Majid Salehi; Fabio Martinelli; Bruno Crispo2024
Aion: Secure Transaction Ordering Using TEEsPouriya Zarbafian; Vincent Gramoli2024
Towards a Privacy-Preserving Attestation for Virtualized NetworksGhada Arfaoui; Thibaut Jacques; Marc Lacoste; Cristina Onete; Leo Robert2024
An Empirical Study of the Imbalance Issue in Software Vulnerability DetectionYuejun Guo; Qiang Hu; Qiang Tang; Yves Le Traon2024
AttnCall: Refining Indirect Call Targets in Binaries with AttentionRui Sun; Yinggang Guo; Zicheng Wang; Qingkai Zeng2024
12