Abstract is missing.
- Learning from Context: A Multi-View Deep Learning Architecture for Malware DetectionAdarsh Kyadige, Ethan M. Rudd, Konstantin Berlin. 1-7 [doi]
- Attributing and Detecting Fake Images Generated by Known GANsMatthew Joslin, Shuang Hao. 8-14 [doi]
- Adversarial Attacks Against LipNet: End-to-End Sentence Level LipreadingMahir Jethanandani, Derek Tang. 15-19 [doi]
- Detecting Cyber Threats in Non-English Hacker Forums: An Adversarial Cross-Lingual Knowledge Transfer ApproachMohammadReza Ebrahimi, Sagar Samtani, Yidong Chai, Hsinchun Chen. 20-26 [doi]
- RTA3: A Real Time Adversarial Attack on Recurrent Neural NetworksChristopher R. Serrano, Pape M. Sylla, Sicun Gao, Michael A. Warren. 27-33 [doi]
- Minimum-Norm Adversarial Examples on KNN and KNN based ModelsChawin Sitawarin, David A. Wagner 0001. 34-40 [doi]
- Backdooring and Poisoning Neural Networks with Image-Scaling AttacksErwin Quiring, Konrad Rieck. 41-47 [doi]
- SentiNet: Detecting Localized Universal Attacks Against Deep Learning SystemsEdward Chou, Florian Tramèr, Giancarlo Pellegrino. 48-54 [doi]
- Clipped BagNet: Defending Against Sticker Attacks with Clipped Bag-of-featuresZhanyuan Zhang, Benson Yuan, Michael McCoyd, David A. Wagner 0001. 55-61 [doi]
- On the Robustness of Cooperative Multi-Agent Reinforcement LearningJieyu Lin, Kristina Dzeparoska, Sai Qian Zhang, Alberto Leon-Garcia, Nicolas Papernot. 62-68 [doi]
- Adversarial Machine Learning-Industry PerspectivesRam Shankar Siva Kumar, Magnus Nyström, John Lambert, Andrew Marshall, Mario Goertzel, Andi Comissoneru, Matt Swann, Sharon Xia. 69-75 [doi]
- A Case Study of the Security Vetting Process of Smart-home Assistant ApplicationsHang Hu 0002, Limin Yang, Shihan Lin, Gang Wang 0011. 76-81 [doi]
- Privacy-preserving Continuous Tumour Relapse Monitoring Using In-body Radio SignalsSam Hylamia, Wenqing Yan, André Teixeira, Noor Badariah Asan, Mauricio D. Perez, Robin Augustine, Thiemo Voigt. 82-87 [doi]
- On the Feasibility of Acoustic Attacks Using Commodity Smart DevicesMatt Wixey, Emiliano De Cristofaro, Shane D. Johnson. 88-97 [doi]
- Electromagnetic Sensor and Actuator Attacks on Power Converters for Electric VehiclesGökçen Yilmaz Dayanikli, Rees R. Hatch, Ryan M. Gerdes, Hongjie Wang, Regan Zane. 98-103 [doi]
- Never Ending Story: Authentication and Access Control Design Flaws in Shared IoT DevicesBlake Janes, Heather Crawford, T. J. OConnor. 104-109 [doi]
- On Using Camera-based Visible Light Communication for Security ProtocolsWen-Yi Chu, Ting-Guang Yu, Yu-Kai Lin, Shao-Chuan Lee, Hsu-Chun Hsiao. 110-117 [doi]
- Security Analysis of Networked 3D PrintersMatthew McCormack, Sanjay Chandrasekaran, Guyue Liu, Tianlong Yu, Sandra DeVincent Wolf, Vyas Sekar. 118-125 [doi]
- ELF Analyzer Demo: Online Identification for IoT Malwares with Multiple Hardware ArchitecturesShin-Ming Cheng, Tao Ban, Jr-Wei Huang, Bing-Kai Hong, Daisuke Inoue. 126 [doi]
- Poster: Radiometric Signatures for Wireless Device Identification over Dynamic ChannelsWenqing Yan, Thiemo Voigt, Christian Rohner. 127 [doi]
- Assessment of Cyber Security Implications of New Technology Integrations into Military Supply ChainsTheresa May Sobb, Benjamin Turnbull. 128-135 [doi]
- Toward a Trustable, Self-Hosting Computer SystemGabriel L. Somlo. 136-143 [doi]
- EM Fingerprints: Towards Identifying Unauthorized Hardware Substitutions in the Supply Chain JungleConstantinos Kolias, Daniel Barbará, Craig G. Rieger, Jacob Ulrich. 144-151 [doi]
- Binary Analysis with Architecture and Code Section Detection using Supervised Machine LearningBryan Beckman, Jed Haile. 152-156 [doi]
- Identifying Ubiquitious Third-Party Libraries in Compiled Executables Using Annotated and Translated Disassembled Code with Supervised Machine LearningJedediah Haile, Sage Havens. 157-162 [doi]
- Modeling and Assessment of IoT Supply Chain Security Risks: The Role of Structural and Parametric UncertaintiesTimothy Kieras, Muhammad Junaid Farooq, Quanyan Zhu. 163-170 [doi]
- On-Chip Randomization for Memory Protection Against Hardware Supply Chain Attacks to DRAMBrett Meadows, Nathan Edwards, Sang-Yoon Chang. 171-180 [doi]
- Using Taint Analysis and Reinforcement Learning (TARL) to Repair Autonomous Robot SoftwareD. M. Lyons, S. Zahra. 181-184 [doi]
- Partially Observable Games for Secure AutonomyMohamadreza Ahmadi, Arun Viswanathan, Michel D. Ingham, Kymie Tan, Aaron D. Ames. 185-188 [doi]
- Case Study: Safety Verification of an Unmanned Underwater VehicleDiego Manzanas Lopez, Patrick Musau, Nathaniel Hamilton, Hoang-Dung Tran, Taylor T. Jonhson. 189-195 [doi]
- Automated Decision Systems for Cybersecurity and Infrastructure SecurityLuanne Burns Chamberlain, Lauren Eisenberg Davis, Martin Stanley, Brian R. Gattoni. 196-201 [doi]
- A Non-Cooperative Game based Model for the Cybersecurity of Autonomous SystemsFarha Jahan, Weiqing Sun, Quamar Niyaz. 202-207 [doi]
- Detecting Adversarial Examples in Learning-Enabled Cyber-Physical Systems using Variational Autoencoder for RegressionFeiyang Cai, Jiani Li, Xenofon D. Koutsoukos. 208-214 [doi]
- A Smart City Internet for Autonomous SystemsGregory Falco. 215-220 [doi]
- Fooling A Deep-Learning Based Gait Behavioral Biometric SystemHonghao Guo, Zuo Wang, Benfang Wang, Xiangyang Li, Devu M. Shila. 221-227 [doi]
- Trusted Confidence Bounds for Learning Enabled Cyber-Physical SystemsDimitrios Boursinos, Xenofon D. Koutsoukos. 228-233 [doi]
- A Framework for the Analysis of Deep Neural Networks in Autonomous Aerospace Applications using Bayesian StatisticsYuning He, Johann Schumann. 234-239 [doi]
- Towards an AI-Based After-Collision Forensic Analysis Protocol for Autonomous VehiclesPrinkle Sharma, Umesh Siddanagaiah, Gökhan Kul. 240-243 [doi]
- Mission Assurance for Autonomous Undersea VehiclesKarl Siil, Aviel D. Rubin, Matthew Elder, Anton Dahbura, Matthew Green 0001, Lanier A. Watkins. 244-249 [doi]
- Out-of-Distribution Detection in Multi-Label Datasets using Latent Space of β-VAEVijaya Kumar Sundar, Shreyas Ramakrishna, Zahra RahimiNasab, Arvind Easwaran, Abhishek Dubey. 250-255 [doi]
- A Capability for Autonomous IoT System Security: Pushing IoT Assurance to the EdgeJeffrey S. Chavis, Anna L. Buczak, Aaron Kunz, Aviel D. Rubin, Lanier A. Watkins. 256-261 [doi]
- A Privacy Filter Framework for Internet of Robotic Things ApplicationsZahir Alsulaimawi. 262-267 [doi]
- Language-agnostic Injection DetectionLars Hermerschmidt, Andreas Straub, Goran Piskachev. 268-275 [doi]
- Toward Automated Grammar Extraction via Semantic Labeling of Parser ImplementationsCarson Harmon, Bradford Larsen, Evan A. Sultanik. 276-283 [doi]
- The Geometry of Syntax and Semantics for Directed File TransformationsSteve Huntsman, Michael Robinson. 284-290 [doi]
- Armor Within: Defending Against Vulnerabilities in Third-Party LibrariesSameed Ali, Prashant Anantharaman, Sean W. Smith. 291-299 [doi]
- Research Report: The Parsley Data Format Definition LanguagePrashanth Mundkur, Linda Briesemeister, Natarajan Shankar, Prashant Anantharaman, Sameed Ali, Zephyr Lucas, Sean W. Smith. 300-307 [doi]
- Research Report: Formally-Verified ASN.1 Protocol C-language StackNika Pona, Vadim Zaliva. 308-317 [doi]
- Research Report: Building a Wide Reach Corpus for Secure Parser DevelopmentTim Allison, Wayne Burke, Valentino Constantinou, Edwin Goh, Chris Mattmann, Anastasija Mensikova, Philip Southam, Ryan Stonebraker, Virisha Timmaraju. 318-326 [doi]
- Research Report: ICARUS: Understanding De Facto Formats by Way of Feathers and WaxSam Cowger, Yerim Lee, Nichole Schimanski, Mark Tullsen, Walter Woods, Richard Jones, E. W. Davis, William Harris, Trent Brunson, Carson Harmon, Bradford Larsen, Evan Sultanik. 327-334 [doi]