Seyed Ali Ghazi Asgar, Narasimha Reddy (Texas A&M University)
Analysis of Misconfigured IoT MQTT Deployments and a Lightweight Exposure Detection System
View More Papers
A Key-Driven Framework for Identity-Preserving Face Anonymization
Miaomiao Wang (Shanghai University), Guang Hua (Singapore Institute of Technology), Sheng Li (Fudan University), Guorui Feng (Shanghai University)
Read MoreA Large-Scale Measurement Study of the PROXY Protocol and...
Stijn Pletinckx (University of California, Santa Barbara), Christopher Kruegel (University of California, Santa Barbara), Giovanni Vigna (University of California, Santa Barbara)
Read MoreProbe-Me-Not: Protecting Pre-trained Encoders from Malicious Probing
Ruyi Ding (Northeastern University), Tong Zhou (Northeastern University), Lili Su (Northeastern University), Aidong Adam Ding (Northeastern University), Xiaolin Xu (Northeastern University), Yunsi Fei (Northeastern University)
Read MoreBe Careful of What You Embed: Demystifying OLE Vulnerabilities
Yunpeng Tian (Huazhong University of Science and Technology), Feng Dong (Huazhong University of Science and Technology), Haoyi Liu (Huazhong University of Science and Technology), Meng Xu (University of Waterloo), Zhiniang Peng (Huazhong University of Science and Technology; Sangfor Technologies Inc.), Zesen Ye (Sangfor Technologies Inc.), Shenghui Li (Huazhong University of Science and Technology), Xiapu Luo…
Read More