Biblio

Export 12173 results:
2024
Zhao C, Guo Y, Wang J, Qi Q, Zhuang Z, Sun H, Guo L, Xie Y, Liao J.  2024.  EPVerifier: Accelerating Update Storms Verification with Edge-Predicate. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :979--992.
Wei Y, Trautwein D, Psaras Y, Castro I, Scott W, Raman A, Tyson G.  2024.  The Eternal Tussle: Exploring the Role of Centralization in IPFS. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :441--454.
Li A, Lu S, Nath S, Padhye R, Sekar V.  2024.  ExChain: Exception Dependency Analysis for Root Cause Diagnosis. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :2047--2062.
[Anonymous].  2024.  Exploring Covert Third-party Identifiers through External Storage in the Android New Era. 33rd USENIX Security Symposium (USENIX Security 24).
[Anonymous].  2024.  Fast and Private Inference of Deep Neural Networks by Co-designing Activation Functions. 33rd USENIX Security Symposium (USENIX Security 24).
Zhang Z, Liu F, Huang G, Liu X, Jin X.  2024.  Fast Vector Query Processing for Large Datasets Beyond GPU Memory with Reordered Pipelining. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :23--40.
[Anonymous].  2024.  FEASE: Fast and Expressive Asymmetric Searchable Encryption. 33rd USENIX Security Symposium (USENIX Security 24).
[Anonymous].  2024.  FFXE: Dynamic Control Flow Graph Recovery for Embedded Firmware Binaries. 33rd USENIX Security Symposium (USENIX Security 24).
Namyar P, Arzani B, Beckett R, Segarra S, Raj H, Krishnaswamy U, Govindan R, Kandula S.  2024.  Finding Adversarial Inputs for Heuristics using Multi-level Optimization. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :927--949.
[Anonymous].  2024.  Finding Traceability Attacks in the Bluetooth Low Energy Specification and Its Implementations. 33rd USENIX Security Symposium (USENIX Security 24).
[Anonymous].  2024.  Fingerprinting Obfuscated Proxy Traffic with Encapsulated TLS Handshakes. 33rd USENIX Security Symposium (USENIX Security 24).
Li W, He X, Liu Y, Li K, Chen K, Ge Z, Guan Z, Qi H, Zhang S, Liu G.  2024.  Flow Scheduling with Imprecise Knowledge. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :95--111.
[Anonymous].  2024.  FraudWhistler: A Resilient, Robust and Plug-and-play Adversarial Example Detection Method for Speaker Recognition. 33rd USENIX Security Symposium (USENIX Security 24).
Sivaraman V, Karimi P, Venkatapathy V, Khani M, Fouladi S, Alizadeh M, Durand F, Sze V.  2024.  Gemino: Practical and Robust Neural Compression for Video Conferencing. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :569--590.
[Anonymous].  2024.  Go Go Gadget Hammer: Flipping Nested Pointers for Arbitrary Data Leakage. 33rd USENIX Security Symposium (USENIX Security 24).
Cheng Y, Zhang Z, Li H, Arapin A, Zhang Y, Zhang Q, Liu Y, Du K, Zhang X, Yan FY et al..  2024.  GRACE: Loss-Resilient Real-Time Video through Neural Codecs. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :509--531.
Zhang A, Wang C, Hu Y, Hassan A, Zhang Z, Han B, Qian F, Xu S.  2024.  Habitus: Boosting Mobile Immersive Content Delivery through Full-body Pose Tracking and Multipath Networking. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :1677--1695.
Meng Z, Kong X, Chen J, Wang B, Xu M, Han R, Liu H, Arun V, Hu H, Wei X.  2024.  Hairpin: Rethinking Packet Loss Recovery in Edge-based Interactive Video Streaming. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :907--926.
Lou J, Kong X, Huang J, Bai W, Kim NSung, Zhuo D.  2024.  Harmonic: Hardware-assisted RDMA Performance Isolation for Public Clouds. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :1479--1496.
Agarwal S, Cai Q, Agarwal R, Shmoys D, Vahdat A.  2024.  Harmony: A Congestion-free Datacenter Architecture. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :329--343.
Qiao Y, Ruan Z, Ma H, Belay A, Kim M, Xu H.  2024.  Harvesting Idle Memory for Application-managed Soft State with Midas. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :1247--1265.
[Anonymous].  2024.  Hermes: Unlocking Security Analysis of Cellular Network Protocols by Synthesizing Finite State Machines from Natural Language Specifications. 33rd USENIX Security Symposium (USENIX Security 24).
[Anonymous].  2024.  A High Coverage Cybersecurity Scale Predictive of User Behavior. 33rd USENIX Security Symposium (USENIX Security 24).
Blach N, Besta M, De Sensi D, Domke J, Harake H, Li S, Iff P, Konieczny M, Lakhotia K, Kubicek A et al..  2024.  A High-Performance Design, Implementation, Deployment, and Evaluation of The Slim Fly Network. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :1025--1044.
[Anonymous].  2024.  Hijacking Attacks against Neural Network by Analyzing Training Data. 33rd USENIX Security Symposium (USENIX Security 24).

Pages