Author of the publication

ALchemist: Fusing Application and Audit Logs for Precise Attack Provenance without Instrumentation.

, , , , , , , , , , and . NDSS, The Internet Society, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

BadNL: Backdoor Attacks Against NLP Models., , , , and . CoRR, (2020)Training with More Confidence: Mitigating Injected and Natural Backdoors During Training., , , and . NeurIPS, (2022)Deep Learning Backdoors., , , and . Security and Artificial Intelligence, (2022)Complex Backdoor Detection by Symmetric Feature Differencing., , , , , and . CVPR, page 14983-14993. IEEE, (2022)The Case for Learned Provenance Graph Storage Systems., , , and . USENIX Security Symposium, page 3277-3294. USENIX Association, (2023)ELISE: A Storage Efficient Logging System Powered by Redundancy Reduction and Representation Learning., , , and . USENIX Security Symposium, page 3023-3040. USENIX Association, (2021)ABS: Scanning Neural Networks for Back-doors by Artificial Brain Stimulation., , , , , and . CCS, page 1265-1282. ACM, (2019)COLO: COarse-grained LOck-stepping virtual machines for non-stop service., , , , , , and . SoCC, page 3:1-3:16. ACM, (2013)An adaptive enhancement method based on stochastic parallel gradient descent of glioma image., , , , , and . IET Image Process., 17 (14): 3976-3985 (2023)KENKU: Towards Efficient and Stealthy Black-box Adversarial Attacks against ASR Systems., , , , , , and . USENIX Security Symposium, page 247-264. USENIX Association, (2023)