Hidden Voice Commands N Carlini, P Mishra, T Vaidya, Y Zhang, M Sherr, C Shields, D Wagner, ... 25th USENIX Security Symposium (Security 16), 2016 | 777 | 2016 |
Cocaine noodles: exploiting the gap between human and machine speech recognition T Vaidya, Y Zhang, M Sherr, C Shields 9th USENIX Workshop on Offensive Technologies (WOOT 15), 2015 | 253 | 2015 |
Dispersing Asymmetric DDoS Attacks with SplitStack A Chen, A Sriraman, T Vaidya, Y Zhang, A Haeberlen, BT Loo, LTX Phan, ... ACM Workshop on Hot Topics in Networks (HotNets 16), 2016 | 24 | 2016 |
Privacy-preserving Network Provenance Y Zhang, A O’Neill, M Sherr, W Zhou Proceedings of the VLDB Endowment 10 (11), 1550 - 1561, 2017 | 14 | 2017 |
Dedos: Defusing dos with dispersion oriented software HM Demoulin, T Vaidya, I Pedisich, B DiMaiolo, J Qian, C Shah, Y Zhang, ... Proceedings of the 34th Annual Computer Security Applications Conference …, 2018 | 13 | 2018 |
A demonstration of the dedos platform for defusing asymmetric ddos attacks in data centers HM Demoulin, T Vaidya, I Pedisich, N Sultana, B Wang, J Qian, Y Zhang, ... Proceedings of the SIGCOMM Posters and Demos, 71-73, 2017 | 4 | 2017 |
Optimizing and Debugging Distributed Systems with Declarative Languages Y Zhang Georgetown University, 2019 | | 2019 |
Hidden voice commands In 25th USENIX Security Symposium (USENIX Security 16) N Carlini, P Mishra, T Vaidya, Y Zhang, M Sherr, C Shields, D Wagner, ... Austin, TX, 1-20, 2016 | | 2016 |