Media Summary: DVa: Extracting Victims and Abuse Vectors from Devil's Whisper: A General Approach for Physical

Usenix Security 23 Black Box Adversarial Example Attack Towards Fcg Based Android Malware - Detailed Analysis & Overview

DVa: Extracting Victims and Abuse Vectors from Devil's Whisper: A General Approach for Physical

Photo Gallery

USENIX Security '23 - Black-box Adversarial Example Attack towards FCG Based Android Malware...
USENIX Security '23 - Adversarial Training for Raw-Binary Malware Classifiers
USENIX Security '23 - Hard-label Black-box Universal Adversarial Patch Attack
USENIX Security '23 - Continuous Learning for Android Malware Detection
USENIX Security '20 - Hybrid Batch Attacks: Finding Black-box Adversarial Examples with Limited
USENIX Security '23 - Two-in-One: A Model Hijacking Attack Against Text Generation Models
USENIX Security '23 - Towards Targeted Obfuscation of Adversarial Unsafe Images using...
USENIX Security '24 - A Wolf in Sheep's Clothing: Practical Black-box Adversarial Attacks for...
USENIX Security '24 - DVa: Extracting Victims and Abuse Vectors from Android Accessibility Malware
USENIX Security '21 - Android SmartTVs Vulnerability Discovery via Log-Guided Fuzzing
USENIX Security '22 - Adversarial Detection Avoidance Attacks: Evaluating the robustness
USENIX Security '20 - Devil’s Whisper: A General Approach for Physical Adversarial Attacks
Sponsored
View Detailed Profile
USENIX Security '23 - Black-box Adversarial Example Attack towards FCG Based Android Malware...

USENIX Security '23 - Black-box Adversarial Example Attack towards FCG Based Android Malware...

USENIX Security

USENIX Security '23 - Adversarial Training for Raw-Binary Malware Classifiers

USENIX Security '23 - Adversarial Training for Raw-Binary Malware Classifiers

USENIX Security

USENIX Security '23 - Hard-label Black-box Universal Adversarial Patch Attack

USENIX Security '23 - Hard-label Black-box Universal Adversarial Patch Attack

USENIX Security

USENIX Security '23 - Continuous Learning for Android Malware Detection

USENIX Security '23 - Continuous Learning for Android Malware Detection

USENIX Security

USENIX Security '20 - Hybrid Batch Attacks: Finding Black-box Adversarial Examples with Limited

USENIX Security '20 - Hybrid Batch Attacks: Finding Black-box Adversarial Examples with Limited

Hybrid Batch

Sponsored
USENIX Security '23 - Two-in-One: A Model Hijacking Attack Against Text Generation Models

USENIX Security '23 - Two-in-One: A Model Hijacking Attack Against Text Generation Models

USENIX Security

USENIX Security '23 - Towards Targeted Obfuscation of Adversarial Unsafe Images using...

USENIX Security '23 - Towards Targeted Obfuscation of Adversarial Unsafe Images using...

USENIX Security

USENIX Security '24 - A Wolf in Sheep's Clothing: Practical Black-box Adversarial Attacks for...

USENIX Security '24 - A Wolf in Sheep's Clothing: Practical Black-box Adversarial Attacks for...

A Wolf in Sheep's Clothing: Practical

USENIX Security '24 - DVa: Extracting Victims and Abuse Vectors from Android Accessibility Malware

USENIX Security '24 - DVa: Extracting Victims and Abuse Vectors from Android Accessibility Malware

DVa: Extracting Victims and Abuse Vectors from

USENIX Security '21 - Android SmartTVs Vulnerability Discovery via Log-Guided Fuzzing

USENIX Security '21 - Android SmartTVs Vulnerability Discovery via Log-Guided Fuzzing

USENIX Security

USENIX Security '22 - Adversarial Detection Avoidance Attacks: Evaluating the robustness

USENIX Security '22 - Adversarial Detection Avoidance Attacks: Evaluating the robustness

USENIX Security

USENIX Security '20 - Devil’s Whisper: A General Approach for Physical Adversarial Attacks

USENIX Security '20 - Devil’s Whisper: A General Approach for Physical Adversarial Attacks

Devil's Whisper: A General Approach for Physical

USENIX Security '21 - WaveGuard: Understanding and Mitigating Audio Adversarial Examples

USENIX Security '21 - WaveGuard: Understanding and Mitigating Audio Adversarial Examples

USENIX Security