_    ___ ___      _                               
/ \ |_ _/ _ \ ___| |_ _ __ ___ __ _ _ __ ___ ___
/ _ \ | | | | / __| __| '__/ _ \/ _` | '_ ` _ \/ __|
/ ___ \ | | |_| \__ \ |_| | | __/ (_| | | | | | \__ \
/_/ \_\___\___/|___/\__|_| \___|\__,_|_| |_| |_|___/
Twitch
Invidious (YT)

Invidious > Channel > IEEE Symposium on Security and Privacy

Trending
IEEE Symposium on Security and Privacy 9400 subscribers    RSS
View channel on YouTube
Videos
Playlists

YT 13 minutes 39 seconds
568 views Shared 7 months ago
IEEE Symposium on Security and Privacy
#15 No Privacy Left Outside Ziqi Zhang
YT 17 minutes 29 seconds
276 views Shared 7 months ago
IEEE Symposium on Security and Privacy
#144 TCP Spoofing Reliable Payload Transmission Past the Spoofed TCP Handshake Eric Pan
YT 13 minutes 12 seconds
395 views Shared 7 months ago
IEEE Symposium on Security and Privacy
#498 Learn What You Want to Unlearn Unlearning Inversion Attacks against Machine Unlearning Hongsh
YT 13 minutes 43 seconds
137 views Shared 7 months ago
IEEE Symposium on Security and Privacy
#518 LACMUS Latent Concept Masking for General Robustness Enhancement of DNNs Hongsheng Hu
YT 19 minutes 7 seconds
225 views Shared 7 months ago
IEEE Symposium on Security and Privacy
6 Efficient Zero knowledge Arguments for Paillier Cryptosystem Rae Gong
YT 18 minutes 13 seconds
155 views Shared 7 months ago
IEEE Symposium on Security and Privacy
6 Efficient Zero knowledge Arguments for Paillier Cryptosystem Rae Gong1
YT 10 minutes 58 seconds
60 views Shared 7 months ago
IEEE Symposium on Security and Privacy
06 Zihao Li NURGLE zihao li
YT 12 minutes 6 seconds
82 views Shared 7 months ago
IEEE Symposium on Security and Privacy
7B Ehsanul Kabir FLShield A Validation Based Federated Learning Framework to Defend Against Poisonin
YT 19 minutes 32 seconds
126 views Shared 7 months ago
IEEE Symposium on Security and Privacy
9 Prune+PlumTree Finding Eviction Sets at Scale Tom Kissos
YT 18 minutes 14 seconds
111 views Shared 7 months ago
IEEE Symposium on Security and Privacy
14 TuDoor Xiang Li
YT 18 minutes 14 seconds
94 views Shared 7 months ago
IEEE Symposium on Security and Privacy
33 INVISILINE Invisible Plausibly Deniable Storage Sandeep Kiran Pinjala
YT 19 minutes 5 seconds
171 views Shared 7 months ago
IEEE Symposium on Security and Privacy
43 P4Control Line Rate Cross Host Attack Prevention via In Network Information Flow Control Enabled
YT 10 minutes 21 seconds
74 views Shared 7 months ago
IEEE Symposium on Security and Privacy
52 A Picture is Worth 500 Labels A Case Study of Demographic Disparities in Local Machine Learning M
YT 15 minutes 3 seconds
81 views Shared 7 months ago
IEEE Symposium on Security and Privacy
77 UnTrustZone Systematic Accelerated Aging to Expose On chip Jubayer Mahmod
YT 11 minutes 6 seconds
90 views Shared 7 months ago
IEEE Symposium on Security and Privacy
91 PIRANA Faster Multi query PIR via Constant weight Codes Jingyu Li
YT 9 minutes 17 seconds
80 views Shared 7 months ago
IEEE Symposium on Security and Privacy
95 Preserving Node level Privacy in Graph Neural Networks ZH X
YT 19 minutes 48 seconds
88 views Shared 7 months ago
IEEE Symposium on Security and Privacy
101 The Great Request Robbery Soheil Khodayari Soheil Khodayari
YT 15 minutes 10 seconds
47 views Shared 7 months ago
IEEE Symposium on Security and Privacy
109 BULKOR:Enabling Bulk Loading for Path ORAM Xiang Li
YT 17 minutes 42 seconds
100 views Shared 7 months ago
IEEE Symposium on Security and Privacy
111 Efficient and Generic Microarchitectural Hash Function Recovery Lukas Gerlach
YT 16 minutes
88 views Shared 7 months ago
IEEE Symposium on Security and Privacy
116 Security Privacy and Data Sharing Challenges When Moving to the US Insights from a Qualitative s
YT 9 minutes 19 seconds
48 views Shared 7 months ago
IEEE Symposium on Security and Privacy
154 Test time Poisoning Attacks Against Test time Adaptation Models Tianshuo Cong
YT 14 minutes 24 seconds
170 views Shared 7 months ago
IEEE Symposium on Security and Privacy
164 SoK Security and Privacy of Blockchain Interoperability André Augusto
YT 19 minutes 49 seconds
64 views Shared 7 months ago
IEEE Symposium on Security and Privacy
172 Don t Eject the Impostor Fast Three Party Computation With a Known Cheater Andreas Brüggeman
YT 13 minutes
105 views Shared 7 months ago
IEEE Symposium on Security and Privacy
185 BadVFL backdoor attacks in vertical federated learning Mohammad Naseri
YT 15 minutes 26 seconds
79 views Shared 7 months ago
IEEE Symposium on Security and Privacy
211 Multi Instance Adversarial Attack on GNN Based Malicious Domain Detection Mahmoud Khaled Ahm
YT 19 minutes 37 seconds
85 views Shared 7 months ago
IEEE Symposium on Security and Privacy
220 Piano Extremely Simple Single Server PIR with Sublinear Server Computation Mingxun Zhou
YT 8 minutes 14 seconds
79 views Shared 7 months ago
IEEE Symposium on Security and Privacy
227 Sabre Cutting through Adversarial Noise with Adaptive Spectral Filtering and Input Reconstructio
YT 15 minutes 29 seconds
55 views Shared 7 months ago
IEEE Symposium on Security and Privacy
241 Backdooring Multimodal Learning 卡的不动弹
YT 13 minutes 36 seconds
29 views Shared 7 months ago
IEEE Symposium on Security and Privacy
251 Text CRS A Generalized Certified Robustness Framework against Textual Adversarial Attacks Jane
YT 16 minutes 5 seconds
64 views Shared 7 months ago
IEEE Symposium on Security and Privacy
252 SrcMarker Dual channel Source Code Watermarking via Scalable Code Transformations 杨博睿
YT 17 minutes 12 seconds
41 views Shared 7 months ago
IEEE Symposium on Security and Privacy
262 A Representative Study on Human Detection of Artificially Generated Media Across Countries Joe
YT 14 minutes 59 seconds
60 views Shared 7 months ago
IEEE Symposium on Security and Privacy
275 Don t Shoot the Messenger Localization Prevention of Satellite Internet Users Richard Mitev
YT 15 minutes 48 seconds
25 views Shared 7 months ago
IEEE Symposium on Security and Privacy
276 Everyone for Themselves A Qualitative Study about Individual Security Setups of Open Source Sof
YT 13 minutes 8 seconds
111 views Shared 7 months ago
IEEE Symposium on Security and Privacy
591 Where URLs Become Weapons Automated Discovery of SSRF Vulnerabilities in Web Applications Sam
YT 11 minutes 27 seconds
70 views Shared 7 months ago
IEEE Symposium on Security and Privacy
280 NFCEraser A Security Threat of NFC Message Modification Caused by Quartz Crystal Oscillator Jo
YT 9 minutes 43 seconds
166 views Shared 7 months ago
IEEE Symposium on Security and Privacy
282 Transferable Multimodal Attack on Vision Language Pre training Models haodi wang
YT 19 minutes 58 seconds
66 views Shared 7 months ago
IEEE Symposium on Security and Privacy
284 Group Oblivious Message Retrieval Thomas
YT 19 minutes 4 seconds
75 views Shared 7 months ago
IEEE Symposium on Security and Privacy
301 Scalable Verification of Zero Knowledge Protocols MIGUEL ISABEL MÁRQUEZ
YT 13 minutes 17 seconds
160 views Shared 7 months ago
IEEE Symposium on Security and Privacy
305 LLMs Cannot Reliably Identify and Reason About Security Vulnerabilities Yet A Comprehensive Eva
YT 11 minutes 10 seconds
51 views Shared 7 months ago
IEEE Symposium on Security and Privacy
307 Springproofs Efficient Inner Product Arguments for Vectors of Arbitrary Length Ming Su
YT 15 minutes 58 seconds
165 views Shared 7 months ago
IEEE Symposium on Security and Privacy
335 Nightshade Prompt Specific Poisoning Attacks on Text to Image Generative Models Shawn Shan
YT 13 minutes 8 seconds
32 views Shared 7 months ago
IEEE Symposium on Security and Privacy
339 NodeAwareSmoothing Yuni Lai Lena
YT 10 minutes 21 seconds
75 views Shared 7 months ago
IEEE Symposium on Security and Privacy
398 Pulling Off The Mask Forensic Analysis of the Deceptive Creator Wallets Behind Smart Contract Fr
YT 16 minutes 23 seconds
42 views Shared 7 months ago
IEEE Symposium on Security and Privacy
415 SoK Efficient Design and Implementation of Polynomial Hash Functions over Prime Fields Jan G
YT 12 minutes 18 seconds
48 views Shared 7 months ago
IEEE Symposium on Security and Privacy
435 Measure Observe Remeasure An Interactive Paradigm for Differentially Private Exploratory Analysi
YT 15 minutes 56 seconds
25 views Shared 7 months ago
IEEE Symposium on Security and Privacy
443 Targeted and Troublesome Zahra Moti Zahra Moti
YT 13 minutes 17 seconds
198 views Shared 7 months ago
IEEE Symposium on Security and Privacy
446 Flash a comprehensive approach to intrusion detection via provenance graph representation learni
YT 19 minutes 43 seconds
69 views Shared 7 months ago
IEEE Symposium on Security and Privacy
483 Pandora Principled Symbolic Validation of Intel SGX Enclave Runtimes Jo Van Bulck
YT 11 minutes 20 seconds
36 views Shared 7 months ago
IEEE Symposium on Security and Privacy
520 BELT Old School Backdoor Attacks can Evade the State of the Art Defense with Backdoor Exclusivit
YT 9 minutes 56 seconds
41 views Shared 7 months ago
IEEE Symposium on Security and Privacy
555 Patchy Performance Uncovering the Vulnerability Management Practices of IoT Centric Vendors S
YT 15 minutes 29 seconds
22 views Shared 7 months ago
IEEE Symposium on Security and Privacy
574 Cohere Managing Differential Privacy in Large Scale Systems Nicolas Küchler
YT 16 minutes 39 seconds
72 views Shared 7 months ago
IEEE Symposium on Security and Privacy
584 Break the Wall from bottom Automated Discovery of Protocol Level Evasion Vulnerabilities in Web
YT 15 minutes 27 seconds
70 views Shared 7 months ago
IEEE Symposium on Security and Privacy
601 SHERPA Explainable Robust Algorithms for Privacy Preserved Federated Learning in Future Networks
YT 16 minutes 55 seconds
67 views Shared 7 months ago
IEEE Symposium on Security and Privacy
605 Larger scale Nakamoto style Blockchains Don’t Necessarily Offer Better Security Jannik Albrech
YT 11 minutes 20 seconds
40 views Shared 7 months ago
IEEE Symposium on Security and Privacy
617 PromptCARE Prompt Copyright Protection by Watermark Injection and Verification homeway yao
YT 16 minutes 42 seconds
144 views Shared 7 months ago
IEEE Symposium on Security and Privacy
624 WeSee Using Malicious #VC Interrupts to Break AMD SEV SNP Supraja Sridhara
YT 19 minutes 43 seconds
28 views Shared 7 months ago
IEEE Symposium on Security and Privacy
646 attackinng byzantine robustness in high dimensions kolluri aashish
YT 17 minutes 48 seconds
87 views Shared 7 months ago
IEEE Symposium on Security and Privacy
646 SoK Prudent Evaluation Practices for Fuzzing Moritz Schloegel
YT 13 minutes 38 seconds
64 views Shared 7 months ago
IEEE Symposium on Security and Privacy
665 Obelix Mitigating Side Channels Through Dynamic Obfuscation Jan
YT 20 minutes 16 seconds
37 views Shared 7 months ago
IEEE Symposium on Security and Privacy
2024 05 22 02 41 48 H 264 Rui Xi