Papers

Search results

    ConferenceTitleAuthor(s)
    NSDI '24OctoSketch: Enabling Real-Time, Continuous Network Monitoring over Multiple CoresYinda Zhang, Peiqing Chen, Zaoxing Liu
    NSDI '24Habitus: Boosting Mobile Immersive Content Delivery through Full-body Pose Tracking and Multipath NetworkingAnlan Zhang, Chendong Wang, Yuming Hu, Ahmad Hassan, Zejun Zhang, Bo Han, Feng Qian, Shichang Xu
    NSDI '24BFMSense: WiFi Sensing Using Beamforming Feedback MatrixEnze Yi, Dan Wu, Jie Xiong, Fusang Zhang, Kai Niu, Wenwei Li, Daqing Zhang
    NSDI '24mmComb: High-speed mmWave Commodity WiFi BackscatterYoon Chae, Zhenzhe Lin, Kang Min Bae, Song Min Kim, Parth Pathak
    NSDI '24A System to Detect Forged-Origin BGP HijacksThomas Holterbach, Thomas Alfroy, Amreesh Phokeer, Alberto Dainotti, Cristel Pelsser
    NSDI '24NetVigil: Robust and Low-Cost Anomaly Detection for East-West Data Center SecurityKevin Hsieh, Mike Wong, Santiago Segarra, Sathiya Kumaran Mani, Trevor Eberl, Anatoliy Panasyuk, Ravi Netravali, Ranveer Chandra, Srikanth Kandula
    NSDI '24LitePred: Transferable and Scalable Latency Prediction for Hardware-Aware Neural Architecture SearchChengquan Feng, Li Lyna Zhang, Yuanchi Liu, Jiahang Xu, Chengruidong Zhang, Zhiyuan Wang, Ting Cao, Mao Yang, Haisheng Tan
    NSDI '24Catch Me If You Can: Laser Tethering with Highly Mobile TargetsCharles J. Carver, Hadleigh Schwartz, Qijia Shao, Nicholas Shade, Joseph Lazzaro, Xiaoxin Wang, Jifeng Liu, Eric Fossum, Xia Zhou
    NSDI '24AUGUR: Practical Mobile Multipath Transport Service for Low Tail Latency in Real-Time StreamingYuhan Zhou, Tingfeng Wang, Liying Wang, Nian Wen, Rui Han, Jing Wang, Chenglei Wu, Jiafeng Chen, Longwei Jiang, Shibo Wang, Honghao Liu, Chenren Xu
    NSDI '24Zombie: Middleboxes that Don’t SnoopCollin Zhang, Zachary DeStefano, Arasu Arun, Joseph Bonneau, Paul Grubbs, Michael Walfish
    NSDI '24Solving Max-Min Fair Resource Allocations Quickly on Large GraphsPooria Namyar, Behnaz Arzani, Srikanth Kandula, Santiago Segarra, Daniel Crankshaw, Umesh Krishnaswamy, Ramesh Govindan, Himanshu Raj
    NSDI '24Passengers' Safety Matters: Experiences of Deploying a Large-Scale Indoor Delivery Monitoring SystemXiubin Fan, Zhongming Lin, Yuming Hu, Tianrui Jiang, Feng Qian, Zhimeng Yin, S.-H. Gary Chan, Dapeng Wu
    NSDI '24Harvesting Idle Memory for Application-managed Soft State with MidasYifan Qiao, Zhenyuan Ruan, Haoran Ma, Adam Belay, Miryung Kim, Harry Xu
    USENIX Security '23Tubes Among Us: Analog Attack on Automatic Speaker IdentificationShimaa Ahmed, Yash Wani, Ali Shahin Shamsabadi, Mohammad Yaghini, Ilia Shumailov, Nicolas Papernot, Kassem Fawaz
    USENIX Security '23Practical Asynchronous High-threshold Distributed Key Generation and Distributed Polynomial SamplingSourav Das, Zhuolun Xiang, Lefteris Kokoris-Kogias, Ling Ren
    USENIX Security '23Every Vote Counts: Ranking-Based Training of Federated Learning to Resist Poisoning AttacksHamid Mozaffari, Virat Shejwalkar, Amir Houmansadr
    USENIX Security '23Hidden Reality: Caution, Your Hand Gesture Inputs in the Immersive Virtual World are Visible to All!Sindhu Reddy Kalathur Gopal, Diksha Shukla, James David Wheelock, Nitesh Saxena
    USENIX Security '23ARI: Attestation of Real-time Mission Execution IntegrityJinwen Wang, Yujie Wang, Ao Li, Yang Xiao, Ruide Zhang, Wenjing Lou, Y. Thomas Hou, Ning Zhang
    USENIX Security '23Eos: Efficient Private Delegation of zkSNARK ProversAlessandro Chiesa, Ryan Lehmkuhl, Pratyush Mishra, Yinuo Zhang
    USENIX Security '23PELICAN: Exploiting Backdoors of Naturally Trained Deep Learning Models In Binary Code AnalysisZhuo Zhang, Guanhong Tao, Guangyu Shen, Shengwei An, Qiuling Xu, Yingqi Liu, Yapeng Ye, Yaoxuan Wu, Xiangyu Zhang
    USENIX Security '23The Gates of Time: Improving Cache Attacks with Transient ExecutionDaniel Katzman, William Kosasih, Chitchanok Chuengsatiansup, Eyal Ronen, Yuval Yarom
    USENIX Security '23TRust: A Compilation Framework for In-process Isolation to Protect Safe Rust against Untrusted CodeInyoung Bang, Martin Kayondo, Hyungon Moon, Yunheung Paek
    USENIX Security '23The Most Dangerous Codec in the World: Finding and Exploiting Vulnerabilities in H.264 DecodersWilly R. Vasquez, Stephen Checkoway, Hovav Shacham
    USENIX Security '23A Large Scale Study of the Ethereum Arbitrage EcosystemRobert McLaughlin, Christopher Kruegel, Giovanni Vigna
    USENIX Security '23Sherlock on Specs: Building LTE Conformance Tests through Automated ReasoningYi Chen, Di Tang, Yepeng Yao, Mingming Zha, XiaoFeng Wang, Xiaozhong Liu, Haixu Tang, Baoxu Liu

Pages