Movatterモバイル変換


[0]ホーム

URL:


Schloss Dagstuhl - Leibniz Center for Informatics
For some weeks now, the dblp team has been receiving anexceptionally high number of support and error correction requests from the community. While we are grateful and happy to process all incoming emails, please assume thatit will currently take us several weeks to read and address your request. Most importantly,please refrain from sending your request multiple times. This will not advance your issue and will only complicate and extend the time required to address it. Thank you for your understanding.
Joint Declaration:The freedom of science is at the heart of liberal, democratic societies. Without this freedom, it is impossible for scientific efforts to be geared toward gaining knowledge and facts. It is therefore extremely worrying that the scientific freedom is coming under increasing pressure in various regions of the world.(read more)
search dblp
search dblp

default search action

Authors:
  • no matches
  • waiting...
Venues:
  • no matches
  • waiting...
Publications:
  • no matches
  • waiting...
clear
ask others

ask others

32nd USENIX Security Symposium 2023:Anaheim, CA, USA

SPARQL queries 

Please note that none of the items listed on this page have a DOI stored with their dblp record. Therefore, DOI-based queries won't return any results.

run query for this table of contents

or build your own?

Refine list

note

refinements active!

zoomed in on?? of?? records

    view refined list in

    export refined list as

    showing all?? records

    Breaking Wireless Protocols

    Interpersonal Abuse

    Inferring User Details

    Adversarial ML beyond ML

    Private Set Operations

    Logs and Auditing

    Fighting the Robots

    Perspectives and Incentives

    Traffic Analysis

    Adversarial Patches and Images

    Decentralized Finance

    Memory

    Security in Digital Realities

    Password Guessing

    Privacy Policies, Labels, Etc.

    ML Applications to Malware

    Secure Messaging

    x-Fuzz

    Programs, Code, and Binaries

    IoT Security Expectations and Barriers

    Differential Privacy

    Poisoning

    Smart Contracts

    x-Fuzz and Fuzz-x

    Cache Attacks

    Authentication

    Private Data Leaks

    Generative AI

    Security Worker Perspectives

    Deep Thoughts on Deep Learning

    Smart? Assistants

    Security-Adjacent Worker Perspectives

    Censorship and Internet Freedom

    Machine Learning Backdoors

    Integrity

    Fuzzing Firmware and Drivers

    Vehicles and Security

    Verifying Users

    DNS Security

    Graphs and Security

    Ethereum Security

    Supply Chains and Third-Party Code

    Cellular Networks

    Usability and User Perspectives

    Entomology

    Adversarial Examples

    Private Record Access

    It's All Fun and Games Until...

    Enclaves and Serverless Computing

    Email and Phishing

    OSes and Security

    Intrusion Detection

    Privacy Preserving Crypto Blocks

    Warm and Fuzzing

    Remote Attacks

    Understanding Communities, Part 1

    Keeping Computations Confidential

    Towards Robust Learning

    Network Cryptographic Protocols

    Warmer and Fuzzers

    Kernel Analysis

    It's Academic

    De-anonymization and Re-identification

    Thieves in the House

    Distributed Secure Computations

    Mobile Security and Privacy

    Web Security

    Understanding Communities, Part 2

    Routing and VPNs

    Embedded Systems and Firmware

    Attacks on Cryptography

    Cloud Insecurity

    More Web and Mobile Security

    Networks and Security

    Arming and Disarming ARM

    More ML Attacks and Defenses

    Cryptography for Privacy

    Vulnerabilities and Threat Detection

    Automated Analysis of Deployed Systems

    Manipulation, Influence, and Elections

    Side Channel Attacks

    Transportation and Infrastructure

    Language-Based Security

    Browsers

    Speculation Doesn't Pay

    Facing the Facts

    More Hardware Side Channels

    Deeper Thoughts on Deep Learning

    Attacks on Deployed Cryptosystems

    Attacking, Defending, and Analyzing

    manage site settings

    To protect your privacy, all features that rely on external API calls from your browser areturned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more informationsee our F.A.Q.

    Unpaywalled article links

    Add open access links fromunpaywall.org to the list of external document links (if available).

    load links from unpaywall.org

    Privacy notice: By enabling the option above, your browser will contact the API ofunpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking theUnpaywall privacy policy.

    Archived links via Wayback Machine

    For web page which are no longer available, try to retrieve content from theweb.archive.org of the Internet Archive (if available).

    load content from archive.org

    Privacy notice: By enabling the option above, your browser will contact the API ofarchive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking theInternet Archive privacy policy.

    Reference lists

    Add a list of references fromcrossref.org,opencitations.net, andsemanticscholar.org to record detail pages.

    load references from crossref.org and opencitations.net

    Privacy notice: By enabling the option above, your browser will contact the APIs ofcrossref.org,opencitations.net, andsemanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking theCrossref privacy policy and theOpenCitations privacy policy, as well as theAI2 Privacy Policy covering Semantic Scholar.

    Citation data

    Add a list of citing articles fromopencitations.net andsemanticscholar.org to record detail pages.

    load citations from opencitations.net

    Privacy notice: By enabling the option above, your browser will contact the API ofopencitations.net andsemanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking theOpenCitations privacy policy as well as theAI2 Privacy Policy covering Semantic Scholar.

    OpenAlex data

    Load additional information about publications fromopenalex.org.

    load data from openalex.org

    Privacy notice: By enabling the option above, your browser will contact the API ofopenalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given byOpenAlex.

    w3c valid html last updated on 2025-07-13 19:17 CEST by thedblp team

    cc zero all metadata released asopen data underCC0 1.0 license

    see also:Terms of Use |Privacy Policy |Imprint

    dblp was originally created in 1993 at:

    University of Trier  

    since 2018, dblp has been operated and maintained by:

    Schloss Dagstuhl - Leibniz Center for Informatics  

    the dblp computer science bibliography is funded and supported by:

    BMBF  RLP  SL  Leibniz  DFG  NFDI  

    [8]ページ先頭

    ©2009-2025 Movatter.jp