Biblio

Export 12294 results:
2024
[Anonymous].  2024.  Fledging Will Continue Until Privacy Improves: Empirical Analysis of Google's Privacy-Preserving Targeted Advertising. 33rd USENIX Security Symposium (USENIX Security 24).
Li W, He X, Liu Y, Li K, Chen K, Ge Z, Guan Z, Qi H, Zhang S, Liu G.  2024.  Flow Scheduling with Imprecise Knowledge. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :95--111.
[Anonymous].  2024.  Formalizing Soundness Proofs of Linear PCP SNARKs. 33rd USENIX Security Symposium (USENIX Security 24).
[Anonymous].  2024.  FraudWhistler: A Resilient, Robust and Plug-and-play Adversarial Example Detection Method for Speaker Recognition. 33rd USENIX Security Symposium (USENIX Security 24).
[Anonymous].  2024.  A Friend's Eye is A Good Mirror: Synthesizing MCU Peripheral Models from Peripheral Drivers. 33rd USENIX Security Symposium (USENIX Security 24).
[Anonymous].  2024.  From the Childhood Past: Views of Young Adults on Parental Sharing of Children's Photos. 33rd USENIX Security Symposium (USENIX Security 24).
[Anonymous].  2024.  Fuzzing BusyBox: Leveraging LLM and Crash Reuse for Embedded Bug Unearthing. 33rd USENIX Security Symposium (USENIX Security 24).
Sivaraman V, Karimi P, Venkatapathy V, Khani M, Fouladi S, Alizadeh M, Durand F, Sze V.  2024.  Gemino: Practical and Robust Neural Compression for Video Conferencing. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :569--590.
[Anonymous].  2024.  GFWeb: Measuring the Great Firewall's Web Censorship at Scale. 33rd USENIX Security Symposium (USENIX Security 24).
[Anonymous].  2024.  GhostRace: Exploiting and Mitigating Speculative Race Conditions. 33rd USENIX Security Symposium (USENIX Security 24).
[Anonymous].  2024.  Go Go Gadget Hammer: Flipping Nested Pointers for Arbitrary Data Leakage. 33rd USENIX Security Symposium (USENIX Security 24).
[Anonymous].  2024.  GoFetch: Breaking Constant-Time Cryptographic Implementations Using Data Memory-Dependent Prefetchers. 33rd USENIX Security Symposium (USENIX Security 24).
Cheng Y, Zhang Z, Li H, Arapin A, Zhang Y, Zhang Q, Liu Y, Du K, Zhang X, Yan FY et al..  2024.  GRACE: Loss-Resilient Real-Time Video through Neural Codecs. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :509--531.
Zhang A, Wang C, Hu Y, Hassan A, Zhang Z, Han B, Qian F, Xu S.  2024.  Habitus: Boosting Mobile Immersive Content Delivery through Full-body Pose Tracking and Multipath Networking. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :1677--1695.
Meng Z, Kong X, Chen J, Wang B, Xu M, Han R, Liu H, Arun V, Hu H, Wei X.  2024.  Hairpin: Rethinking Packet Loss Recovery in Edge-based Interactive Video Streaming. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :907--926.
Lou J, Kong X, Huang J, Bai W, Kim NSung, Zhuo D.  2024.  Harmonic: Hardware-assisted RDMA Performance Isolation for Public Clouds. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :1479--1496.
Agarwal S, Cai Q, Agarwal R, Shmoys D, Vahdat A.  2024.  Harmony: A Congestion-free Datacenter Architecture. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :329--343.
Qiao Y, Ruan Z, Ma H, Belay A, Kim M, Xu H.  2024.  Harvesting Idle Memory for Application-managed Soft State with Midas. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :1247--1265.
[Anonymous].  2024.  HECKLER: Breaking Confidential VMs with Malicious Interrupts. 33rd USENIX Security Symposium (USENIX Security 24).
[Anonymous].  2024.  Hermes: Unlocking Security Analysis of Cellular Network Protocols by Synthesizing Finite State Machines from Natural Language Specifications. 33rd USENIX Security Symposium (USENIX Security 24).
[Anonymous].  2024.  A High Coverage Cybersecurity Scale Predictive of User Behavior. 33rd USENIX Security Symposium (USENIX Security 24).
Blach N, Besta M, De Sensi D, Domke J, Harake H, Li S, Iff P, Konieczny M, Lakhotia K, Kubicek A et al..  2024.  A High-Performance Design, Implementation, Deployment, and Evaluation of The Slim Fly Network. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :1025--1044.
[Anonymous].  2024.  Hijacking Attacks against Neural Network by Analyzing Training Data. 33rd USENIX Security Symposium (USENIX Security 24).
Yassini P, Diab K, Mahloujifar S, Hefeeda M.  2024.  Horus: Granular In-Network Task Scheduler for Cloud Datacenters. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :1--22.
[Anonymous].  2024.  How Does a Deep Learning Model Architecture Impact Its Privacy? A Comprehensive Study of Privacy Attacks on CNNs and Transformers 33rd USENIX Security Symposium (USENIX Security 24).

Pages