


default search action
51st DSN 2021: Taipei, Taiwan - Workshops
- 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, DSN Workshops 2021, Taipei, Taiwan, June 21-24, 2021. IEEE 2021, ISBN 978-1-6654-3950-3

- Ibéria Medeiros

, Ilir Gashi, Michael Kamp, Pedro Ferreira:
Third International Workshop on Data-Centric Dependability and Security (DCDS). xii - Michaël Lauer, Kalinka Branco, João Carlos Cunha:

7th International Workshop on Safety and Security of Intelligent Vehicles - SSIV 2021. xiii - Xiaofeng Lu, Pietro Liò

:
International Workshop On Application of Intelligent Technology in Security - AITS 2021. xiv-xv - Hui Xu, Guanpeng Li, Homa Alemzadeh, Rakesh Bobba

, Varun Chandrasekaran, David E. Evans
, Nicolas Papernot, Karthik Pattabiraman, Florian Tramèr:
Fourth International Workshop on Dependable and Secure Machine Learning - DSML 2021. xvi - Hélène Waeselynck, Raul Sena Ferreira, Luca Vittorio Sartori:

Workshop on Safer Autonomous Systems: Special theme: safety-aware design and validation of autonomous systems. xvii
Workshop on Data-Centric Dependability and Security (DCDS)
- Marta Catillo, Andrea Del Vecchio, Luciano Ocone, Antonio Pecchia, Umberto Villano:

USB-IDS-1: a Public Multilayer Dataset of Labeled Network Flows for IDS Evaluation. 1-6 - Weizhao Jin

, Xiaoyu Ji, Ruiwen He, Zhou Zhuang, Wenyuan Xu, Yuan Tian:
SMS Goes Nuclear: Fortifying SMS-Based MFA in Online Account Ecosystem. 7-14 - Louis-Simon Létourneau, Chaymae El Jabri

, Marc Frappier, Pierre-Martin Tardif, Guy Lépine, Guillaume Boisvert:
Statistical Approach For Cloud Security: Microsoft Office 365 audit logs case study. 15-18
Workshop on Safety and Security in Intelligent Vehicles (SSIV)
- Sean Joe Taylor

, Farhan Ahmad, Hoang Nga Nguyen
, Siraj Ahmed Shaikh
, David Evans, David Price:
Vehicular Platoon Communication: Cybersecurity Threats and Open Challenges. 19-26 - Christian Wolschke, Behrooz Sangchoolie, Jacob Simon, Stefan Marksteiner

, Tobias Braun, Hayk Hamazaryan:
SaSeVAL: A Safety/Security-Aware Approach for Validation of Safety-Critical Systems. 27-34 - Hengyu Zhao, Siva Kumar Sastry Hari, Timothy Tsai, Michael B. Sullivan, Stephen W. Keckler, Jishen Zhao:

Suraksha: A Quantitative AV Safety Evaluation Framework to Analyze Safety Implications of Perception Design Choices. 35-38 - Rupert Schorn, Wilfried Steiner:

Evaluation of a Fail-Over Mechanism for 1oo2D Architectures in Highly-Automated Driving. 39-46 - Arthur Clavière

, Eric Asselin, Christophe Garion
, Claire Pagetti:
Safety Verification of Neural Network Controlled Systems. 47-54 - Joris Guérin

, Kevin Delmas, Jérémie Guiochet:
Certifying Emergency Landing for Safe Urban UAV. 55-62 - Tewodros A. Beyene, Carmen Cârlan:

CyberGSN: A Semi-formal Language for Specifying Safety Cases. 63-66 - Victor Bandur, Vera Pantelic, Timofey Tomashevskiy, Mark Lawford:

A Safety Architecture for Centralized E/E Architectures. 67-70
Workshop on Application of Intelligent Technology in Security (AITS)
- Zhiqiu Huang, Yuqing Zhang, Wengjie Wang, Haitao He:

Ant Hole: Data Poisoning Attack Breaking out the Boundary of Face Cluster. 71-77 - Bing Chen, Yubo Song

, Zhenchao Zhu, Shang Gao, Junbo Wang, Aiqun Hu:
Authenticating Mobile Wireless Device Through Per-packet Channel State Information. 78-84 - Xiao Yu, Yiyu Yang, Wengjie Wang, Yuqing Zhang:

Whether the sensitive information statement of the IoT privacy policy is consistent with the actual behavior. 85-92 - Junfeng Tian, Junkun Zhang, Fanming Liu:

BBregLocator: A Vulnerability Detection System Based on Bounding Box Regression. 93-100 - Juhua Pu, Zhuang Liu, Yue Wang, Xingwu Liu:

Insight into traffic security: A correlation discovery of urban spatial features and traffic flow patterns. 101-107 - Yongzhi Liu, Xiarun Chen, Zhou Yang, Weiping Wen:

Automatically Constructing Peer Slices via Semanticand Context-Aware Security Checks in the Linux Kernel. 108-113 - Qunke Wang, Lanting Fang, Zhenchao Zhu, Jie Huang:

Detection Algorithm of the Mimicry Attack based on Variational Auto-Encoder. 114-120 - Yucheng Wang, Xuejun Li, Peiyang Jia, Yiyu Yang, He Wang:

Sensitive Instruction Detection Based on the Context of IoT Sensors. 121-128 - Yong Zhang, Jie Niu, Guojian He, Lin Zhu, Da Guo:

Network Intrusion Detection Based on Active Semi-supervised Learning. 129-135 - Lei Liao, Zhiqiu Huang, Wengjie Wang:

A Statistical Learning Model with Deep Learning Characteristics. 137-140
Workshop on Dependable and Secure Machine Learning (DSML)
- Yuta Makino, Tuan Phung-Duc, Fumio Machida:

A Queueing Analysis of Multi-model Multi-input Machine Learning Systems. 141-149 - Tobias Wink, Zoltán Nochta

:
An Approach for Peer-to-Peer Federated Learning. 150-157 - Keshav Kasichainula, Hadi Mansourifar, Weidong Shi:

Poisoning Attacks via Generative Adversarial Text to Image Synthesis. 158-165 - Muhammad Sabih, Frank Hannig, Jürgen Teich:

Fault-Tolerant Low-Precision DNNs using Explainable AI. 166-174 - Nirupam Gupta, Shuo Liu, Nitin H. Vaidya:

Byzantine Fault-Tolerant Distributed Machine Learning with Norm-Based Comparative Gradient Elimination. 175-181 - Brian Wheatman

, Jerry Chen, Tamim Sookoor
, Yair Amir:
RADICS: Runtime Assurance of Distributed Intelligent Control Systems. 182-187 - Jiazhen Gu, Huanlin Xu, Haochuan Lu, Yangfan Zhou, Xin Wang:

Detecting Deep Neural Network Defects with Data Flow Analysis. 188-195

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














