Learning normality is enough: a software-based mitigation against inaudible voice attacks X Li, X Ji, C Yan, C Li, Y Li, Z Zhang, W Xu 32nd USENIX Security Symposium (USENIX Security 23), 2455-2472, 2023 | 13 | 2023 |
Is it overkill? analyzing feature-space concept drift in malware detectors Z Chen, Z Zhang, Z Kan, L Yang, J Cortellazzi, F Pendlebury, F Pierazzi, ... 2023 IEEE Security and Privacy Workshops (SPW), 21-28, 2023 | 6 | 2023 |
SuGeR: A Subgraph-based Graph Convolutional Network Method for Bundle Recommendation Z Zhang, B Du, H Tong Proceedings of the 31st ACM International Conference on Information …, 2022 | 4 | 2022 |
ViCTer: A semi-supervised video character tracker Z Li, X Wang, Z Zhang, V Kindratenko Machine Learning with Applications 12, 100460, 2023 | 2 | 2023 |
True Attacks, Attack Attempts, or Benign Triggers? An Empirical Measurement of Network Alerts in a Security Operations Center L Yang, Z Chen, C Wang, Z Zhang, S Booma, P Cao, C Adam, A Withers, ... 33rd USENIX Security Symposium (USENIX Security 24), 1525-1542, 2024 | 1 | 2024 |
GenSERP: Large Language Models for Whole Page Presentation Z Zhang, Y Zhang, S Ge, G Weng, M Narang, X Song, S Tiwary arXiv preprint arXiv:2402.14301, 2024 | | 2024 |