Tariq Elahi
Ensuring Safety and Facilitating Research on the Live Tor Network
View More Papers
Adversarial Robustness for Tabular Data through Cost and Utility...
Klim Kireev (EPFL), Bogdan Kulynych (EPFL), Carmela Troncoso (EPFL)
Read MoreVulHawk: Cross-architecture Vulnerability Detection with Entropy-based Binary Code Search
Zhenhao Luo (College of Computer, National University of Defense Technology), Pengfei Wang (College of Computer, National University of Defense Technology), Baosheng Wang (College of Computer, National University of Defense Technology), Yong Tang (College of Computer, National University of Defense Technology), Wei Xie (College of Computer, National University of Defense Technology), Xu Zhou (College of Computer,…
Read MoreAccurate Compiler and Optimization Independent Function Identification Using Program...
Derrick McKee (Purdue University), Nathan Burow (MIT Lincoln Laboratory), Mathias Payer (EPFL)
Read More