IEEE

Results: 22018



#Item
41

1 SecureML: A System for Scalable Privacy-Preserving Machine Learning Payman Mohassel∗ and Yupeng Zhang† Research, † University of Maryland

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 16:01:37
    42Cryptography / Computing / Internet / Internet Standards / Internet protocols / Cryptographic protocols / E-commerce / Public-key cryptography / Transport Layer Security / Hostname / X.509 / Public key certificate

    HVLearn: Automated Black-box Analysis of Hostname Verification in SSL/TLS Implementations Suphannee Sivakorn, George Argyros, Kexin Pei, Angelos D. Keromytis, and Suman Jana Department of Computer Science Columbia Univer

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-04-03 15:58:27
    43Economy / Payment systems / Money / Finance / Foreign exchange companies / Credit card / Email / American Express / Sponsor / Advertising / US Airways

    Patron & Exhibitor Agreement Level of Involvement Cost Exhibit Booth

    Add to Reading List

    Source URL: i2mtc2019.ieee-ims.org

    Language: English - Date: 2018-06-06 17:56:31
    44Denial-of-service attacks / Statistical inference / Cyberwarfare / Estimation theory / Computing / Denial-of-service attack / Internet Relay Chat / Domain name system / Anycast / Cross-validation / Regression analysis / Prediction

    Poster: A DDoS Peak Traffic Volume Prediction Method Based on Machine Learning Shuang Wei† , Yijing Ding† , Tongxin Li† , Shuaifu Dai‡ , Xinfeng Wu† and Xinhui Han†∗ † Peking University ‡ CNCERT/CC

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-04-27 07:43:28
    45Computing / Fingerprinting algorithms / Cryptography / Identification / Internet privacy / Biometrics / Computer network security / Device fingerprint / Internet fraud / Public key fingerprint / Fingerprint / Tor

    Poster: Identify and Track Web Attacker Based on Deceptive Technology and Browser Fingerprint Heyang Lv1 Binxing Fang2 Xiang Cui3,4 1 Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-12 06:46:30
    46Computer security / Security engineering / Cyberwarfare / Prevention / Cybercrime / National security / Computer network security / Cyberattack / Capture the flag / Information security / Denial-of-service attack

    Poster: Shell We Play A Game? CTF-as-a-service for Security Education Adam Doup´e and Giovanni Vigna Arizona State University and UC Santa Barbara ,

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-13 00:24:26
    475G / Internet of things / Technology forecasting / American Solar Challenge / Technology / Triathlon at the 2014 Summer Youth Olympics

    38th IEEE Sarnoff Symposium, NJIT, Newark, NJ, Sep, 2017 SCHEDULE OF KEYNOTE AND INVITED PRESENTATIONS MONDAY, SEPTEMBER 18, :00-09:30 Registration and Networking 09:30-12:30 Tutorial – Bitcoin and Blockc

    Add to Reading List

    Source URL: ewh.ieee.org

    Language: English - Date: 2017-09-18 00:09:30
    48Computing / Sponsor / Advertising / ACM/IEEE Supercomputing Conference / Marketing / Design

    Microsoft Word - Exhibitor and Patron Opportunities - I2MTC 2019 Auckland.docx

    Add to Reading List

    Source URL: i2mtc2019.ieee-ims.org

    Language: English - Date: 2018-06-06 17:56:31
    49Computational neuroscience / Chemistry / Applied mathematics / Artificial neural networks / Phase transitions / Statistics / Scientific modeling / Design of experiments / Deep learning / Distillation / Outlier / Surrogate model

    A full version of this paper is available at https://papernot.fr/files/extending-distillation.pdf Poster: Extending Defensive Distillation Nicolas Papernot and Patrick McDaniel Pennsylvania State University {ngp5056,mcd

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-14 02:41:14
    50Cryptography / Obfuscation / Computer security / Password / Security / Cyberwarfare / Salt / Identity management / Password policy / Password fatigue

    Poster: An Analysis of Targeted Password Guessing Using Neural Networks Huan Zhou, Qixu Liu, Fangjiao Zhang Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chines

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-13 08:13:56
    UPDATE