default search action
51st DSN 2021: Taipei, Taiwan - Workshops
- 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, DSN Workshops 2021, Taipei, Taiwan, June 21-24, 2021. IEEE 2021, ISBN 978-1-6654-3950-3
- Ibéria Medeiros, Ilir Gashi, Michael Kamp, Pedro Ferreira:
Third International Workshop on Data-Centric Dependability and Security (DCDS). xii - Michaël Lauer, Kalinka Branco, João Carlos Cunha:
7th International Workshop on Safety and Security of Intelligent Vehicles - SSIV 2021. xiii - Xiaofeng Lu, Pietro Liò:
International Workshop On Application of Intelligent Technology in Security - AITS 2021. xiv-xv - Hui Xu, Guanpeng Li, Homa Alemzadeh, Rakesh Bobba, Varun Chandrasekaran, David E. Evans, Nicolas Papernot, Karthik Pattabiraman, Florian Tramèr:
Fourth International Workshop on Dependable and Secure Machine Learning - DSML 2021. xvi - Hélène Waeselynck, Raul Sena Ferreira, Luca Vittorio Sartori:
Workshop on Safer Autonomous Systems: Special theme: safety-aware design and validation of autonomous systems. xvii
Workshop on Data-Centric Dependability and Security (DCDS)
- Marta Catillo, Andrea Del Vecchio, Luciano Ocone, Antonio Pecchia, Umberto Villano:
USB-IDS-1: a Public Multilayer Dataset of Labeled Network Flows for IDS Evaluation. 1-6 - Weizhao Jin, Xiaoyu Ji, Ruiwen He, Zhou Zhuang, Wenyuan Xu, Yuan Tian:
SMS Goes Nuclear: Fortifying SMS-Based MFA in Online Account Ecosystem. 7-14 - Louis-Simon Létourneau, Chaymae El Jabri, Marc Frappier, Pierre-Martin Tardif, Guy Lépine, Guillaume Boisvert:
Statistical Approach For Cloud Security: Microsoft Office 365 audit logs case study. 15-18
Workshop on Safety and Security in Intelligent Vehicles (SSIV)
- Sean Joe Taylor, Farhan Ahmad, Hoang Nga Nguyen, Siraj Ahmed Shaikh, David Evans, David Price:
Vehicular Platoon Communication: Cybersecurity Threats and Open Challenges. 19-26 - Christian Wolschke, Behrooz Sangchoolie, Jacob Simon, Stefan Marksteiner, Tobias Braun, Hayk Hamazaryan:
SaSeVAL: A Safety/Security-Aware Approach for Validation of Safety-Critical Systems. 27-34 - Hengyu Zhao, Siva Kumar Sastry Hari, Timothy Tsai, Michael B. Sullivan, Stephen W. Keckler, Jishen Zhao:
Suraksha: A Quantitative AV Safety Evaluation Framework to Analyze Safety Implications of Perception Design Choices. 35-38 - Rupert Schorn, Wilfried Steiner:
Evaluation of a Fail-Over Mechanism for 1oo2D Architectures in Highly-Automated Driving. 39-46 - Arthur Clavière, Eric Asselin, Christophe Garion, Claire Pagetti:
Safety Verification of Neural Network Controlled Systems. 47-54 - Joris Guérin, Kevin Delmas, Jérémie Guiochet:
Certifying Emergency Landing for Safe Urban UAV. 55-62 - Tewodros A. Beyene, Carmen Cârlan:
CyberGSN: A Semi-formal Language for Specifying Safety Cases. 63-66 - Victor Bandur, Vera Pantelic, Timofey Tomashevskiy, Mark Lawford:
A Safety Architecture for Centralized E/E Architectures. 67-70
Workshop on Application of Intelligent Technology in Security (AITS)
- Zhiqiu Huang, Yuqing Zhang, Wengjie Wang, Haitao He:
Ant Hole: Data Poisoning Attack Breaking out the Boundary of Face Cluster. 71-77 - Bing Chen, Yubo Song, Zhenchao Zhu, Shang Gao, Junbo Wang, Aiqun Hu:
Authenticating Mobile Wireless Device Through Per-packet Channel State Information. 78-84 - Xiao Yu, Yiyu Yang, Wengjie Wang, Yuqing Zhang:
Whether the sensitive information statement of the IoT privacy policy is consistent with the actual behavior. 85-92 - Junfeng Tian, Junkun Zhang, Fanming Liu:
BBregLocator: A Vulnerability Detection System Based on Bounding Box Regression. 93-100 - Juhua Pu, Zhuang Liu, Yue Wang, Xingwu Liu:
Insight into traffic security: A correlation discovery of urban spatial features and traffic flow patterns. 101-107 - Yongzhi Liu, Xiarun Chen, Zhou Yang, Weiping Wen:
Automatically Constructing Peer Slices via Semanticand Context-Aware Security Checks in the Linux Kernel. 108-113 - Qunke Wang, Lanting Fang, Zhenchao Zhu, Jie Huang:
Detection Algorithm of the Mimicry Attack based on Variational Auto-Encoder. 114-120 - Yucheng Wang, Xuejun Li, Peiyang Jia, Yiyu Yang, He Wang:
Sensitive Instruction Detection Based on the Context of IoT Sensors. 121-128 - Yong Zhang, Jie Niu, Guojian He, Lin Zhu, Da Guo:
Network Intrusion Detection Based on Active Semi-supervised Learning. 129-135 - Lei Liao, Zhiqiu Huang, Wengjie Wang:
A Statistical Learning Model with Deep Learning Characteristics. 137-140
Workshop on Dependable and Secure Machine Learning (DSML)
- Yuta Makino, Tuan Phung-Duc, Fumio Machida:
A Queueing Analysis of Multi-model Multi-input Machine Learning Systems. 141-149 - Tobias Wink, Zoltán Nochta:
An Approach for Peer-to-Peer Federated Learning. 150-157 - Keshav Kasichainula, Hadi Mansourifar, Weidong Shi:
Poisoning Attacks via Generative Adversarial Text to Image Synthesis. 158-165 - Muhammad Sabih, Frank Hannig, Jürgen Teich:
Fault-Tolerant Low-Precision DNNs using Explainable AI. 166-174 - Nirupam Gupta, Shuo Liu, Nitin H. Vaidya:
Byzantine Fault-Tolerant Distributed Machine Learning with Norm-Based Comparative Gradient Elimination. 175-181 - Brian Wheatman, Jerry Chen, Tamim Sookoor, Yair Amir:
RADICS: Runtime Assurance of Distributed Intelligent Control Systems. 182-187 - Jiazhen Gu, Huanlin Xu, Haochuan Lu, Yangfan Zhou, Xin Wang:
Detecting Deep Neural Network Defects with Data Flow Analysis. 188-195
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.