Skip to main content
USENIX supports diversity, equity, and inclusion and condemns hate and discrimination
.
About
Conferences
Publications
Membership
Students
Search
Donate Today
Sign In
Search
About
USENIX Board
Staff
Newsroom
Good Works
Blog
Governance and Financials
USENIX Awards
USENIX Supporters
2024 Board Election
Board Meeting Minutes
Annual Fund
Conferences
Upcoming
By Name
Calls for Papers
Grants
Sponsorship
Best Papers
Test of Time Awards
Multimedia
Conference FAQ
Conference Policies
Code of Conduct
Publications
Proceedings
Author Resources
;login: Online
Writing for ;login: Online
;login: Archive
Membership
Students
Conference Fees
Campus Representative Program
Student Grant Program
Search
Donate Today
Donate Today
Query Recovery from Easy to Hard: Jigsaw Attack against {SSE}
Submitted by
admin
on April 30, 2024 - 12:15 pm
[Anonymous]
. 2024.
Query Recovery from Easy to Hard: Jigsaw Attack against {SSE}
.
33rd USENIX Security Symposium (USENIX Security 24).
Read more
about Query Recovery from Easy to Hard: Jigsaw Attack against {SSE}
DBLP
Google Scholar
BibTeX
Transferability of White-box Perturbations: {Query-Efficient} Adversarial Attacks against Commercial {DNN} Services
Submitted by
admin
on April 30, 2024 - 12:02 pm
[Anonymous]
. 2024.
Transferability of White-box Perturbations: {Query-Efficient} Adversarial Attacks against Commercial {DNN} Services
.
33rd USENIX Security Symposium (USENIX Security 24).
Read more
about Transferability of White-box Perturbations: {Query-Efficient} Adversarial Attacks against Commercial {DNN} Services
DBLP
Google Scholar
BibTeX
Fast and Private Inference of Deep Neural Networks by Co-designing Activation Functions
Submitted by
admin
on April 30, 2024 - 12:02 pm
[Anonymous]
. 2024.
Fast and Private Inference of Deep Neural Networks by Co-designing Activation Functions
.
33rd USENIX Security Symposium (USENIX Security 24).
Read more
about Fast and Private Inference of Deep Neural Networks by Co-designing Activation Functions
DBLP
Google Scholar
BibTeX
How Does a Deep Learning Model Architecture Impact Its Privacy? A Comprehensive Study of Privacy Attacks on {CNNs} and Transformers
Submitted by
admin
on April 30, 2024 - 12:02 pm
[Anonymous]
. 2024.
How Does a Deep Learning Model Architecture Impact Its Privacy? A Comprehensive Study of Privacy Attacks on {CNNs} and Transformers
33rd USENIX Security Symposium (USENIX Security 24).
Read more
about How Does a Deep Learning Model Architecture Impact Its Privacy? A Comprehensive Study of Privacy Attacks on {CNNs} and Transformers
DBLP
Google Scholar
BibTeX
{EaTVul}: {ChatGPT-based} Evasion Attack Against Software Vulnerability Detection
Submitted by
admin
on April 30, 2024 - 12:02 pm
[Anonymous]
. 2024.
{EaTVul}: {ChatGPT-based} Evasion Attack Against Software Vulnerability Detection
.
33rd USENIX Security Symposium (USENIX Security 24).
Read more
about {EaTVul}: {ChatGPT-based} Evasion Attack Against Software Vulnerability Detection
DBLP
Google Scholar
BibTeX
More Simplicity for Trainers, More Opportunity for Attackers: {Black-Box} Attacks on Speaker Recognition Systems by Inferring Feature Extractor
Submitted by
admin
on April 30, 2024 - 12:02 pm
[Anonymous]
. 2024.
More Simplicity for Trainers, More Opportunity for Attackers: {Black-Box} Attacks on Speaker Recognition Systems by Inferring Feature Extractor
.
33rd USENIX Security Symposium (USENIX Security 24).
Read more
about More Simplicity for Trainers, More Opportunity for Attackers: {Black-Box} Attacks on Speaker Recognition Systems by Inferring Feature Extractor
DBLP
Google Scholar
BibTeX
"I chose to fight, be brave, and to deal with it": Threat Experiences and Security Practices of Pakistani Content Creators
Submitted by
admin
on April 30, 2024 - 12:02 pm
[Anonymous]
. 2024.
"I chose to fight, be brave, and to deal with it": Threat Experiences and Security Practices of Pakistani Content Creators
.
33rd USENIX Security Symposium (USENIX Security 24).
Read more
about "I chose to fight, be brave, and to deal with it": Threat Experiences and Security Practices of Pakistani Content Creators
DBLP
Google Scholar
BibTeX
On the Difficulty of Defending Contrastive Learning against Backdoor Attacks
Submitted by
admin
on April 30, 2024 - 12:02 pm
[Anonymous]
. 2024.
On the Difficulty of Defending Contrastive Learning against Backdoor Attacks
.
33rd USENIX Security Symposium (USENIX Security 24).
Read more
about On the Difficulty of Defending Contrastive Learning against Backdoor Attacks
DBLP
Google Scholar
BibTeX
{SoK} (or {SoLK?)}: On the Quantitative Study of Sociodemographic Factors and Computer Security Behaviors
Submitted by
admin
on April 30, 2024 - 12:02 pm
[Anonymous]
. 2024.
{SoK} (or {SoLK?)}: On the Quantitative Study of Sociodemographic Factors and Computer Security Behaviors
33rd USENIX Security Symposium (USENIX Security 24).
Read more
about {SoK} (or {SoLK?)}: On the Quantitative Study of Sociodemographic Factors and Computer Security Behaviors
DBLP
Google Scholar
BibTeX
A Linear Reconstruction Approach for Attribute Inference Attacks against Synthetic Data
Submitted by
admin
on April 30, 2024 - 12:02 pm
[Anonymous]
. 2024.
A Linear Reconstruction Approach for Attribute Inference Attacks against Synthetic Data
.
33rd USENIX Security Symposium (USENIX Security 24).
Read more
about A Linear Reconstruction Approach for Attribute Inference Attacks against Synthetic Data
DBLP
Google Scholar
BibTeX
Pages
« first
‹ previous
…
9
10
11
12
13
14
15
16
17
…
next ›
last »