136 papers:
- CASE-2015-TomolaMBC #robust
- Robust codiagnosability of discrete-event systems against permanent loss of observations (JHAT, MVM, JCB, LKC), pp. 813–818.
- DAC-2015-YuUK
- Leveraging on-chip voltage regulators as a countermeasure against side-channel attacks (WY, OAU, SK), p. 6.
- ITiCSE-2015-Tudor #learning #optimisation #query #xml
- Virtual Learning Laboratory about Query Optimization against XML Data (LNT), p. 348.
- ICALP-v2-2015-Raykov
- Broadcast from Minicast Secure Against General Adversaries (PR), pp. 701–712.
- LATA-2015-AmanoS #bound #multi #polynomial
- A Nonuniform Circuit Class with Multilayer of Threshold Gates Having Super Quasi Polynomial Size Lower Bounds Against NEXP (KA, AS), pp. 461–472.
- CHI-2015-MalacriaAQCCR
- Push-Edge and Slide-Edge: Scrolling by Pushing Against the Viewport Edge (SM, JA, PQ, GC, AC, NR), pp. 2773–2776.
- SCSM-2015-MillsF #effectiveness #framework #how #why
- A Computational Study of How and Why reddit.com was an Effective Platform in the Campaign Against SOPA (RM, AF), pp. 229–241.
- ICML-2015-XiaoBBFER #feature model #question
- Is Feature Selection Secure against Training Data Poisoning? (HX, BB, GB, GF, CE, FR), pp. 1689–1698.
- Onward-2015-Petricek
- Against a universal definition of “Type” (TP), pp. 254–266.
- PPDP-2015-Fruhwirth #recursion #termination
- A devil’s advocate against termination of direct recursion (TWF), pp. 103–113.
- SAC-2015-BarbosaBA #monitoring
- Defending against load monitoring in smart metering data through noise addition (PB, AB, HA), pp. 2218–2224.
- ESEC-FSE-2015-KargenS #slicing #source code #using
- Turning programs against each other: high coverage fuzz-testing using binary-code mutation and dynamic slicing (UK, NS), pp. 782–792.
- DAC-2014-DaviKS #control flow #embedded #fine-grained #performance #towards
- Hardware-Assisted Fine-Grained Control-Flow Integrity: Towards Efficient Protection of Embedded Systems Against Software Exploitation (LD, PK, ARS), p. 6.
- DAC-2014-RaoEST #multi #using
- Protecting SRAM-based FPGAs Against Multiple Bit Upsets Using Erasure Codes (PMBR, ME, RS, MBT), p. 6.
- DATE-2014-LiuW #configuration management #design #embedded #logic #obfuscation
- Embedded reconfigurable logic for ASIC design obfuscation against supply chain attacks (BL, BW), pp. 1–6.
- DATE-2014-ZussaDTDMGCT #detection #fault #injection #performance
- Efficiency of a glitch detector against electromagnetic fault injection (LZ, AD, KT, JMD, PM, LGS, JC, AT), pp. 1–6.
- TACAS-2014-EldibWS #smt #verification
- SMT-Based Verification of Software Countermeasures against Side-Channel Attacks (HE, CW, PS), pp. 62–77.
- ICALP-v2-2014-DerevenetcM #robust
- Robustness against Power is PSpace-complete (ED, RM), pp. 158–170.
- CAiSE-2014-Spinellis
- Against the Odds: Managing the Unmanagable in a Time of Crisis (DS), pp. 24–41.
- CIKM-2014-AlabdulmohsinGZ #reverse engineering #robust
- Adding Robustness to Support Vector Machines Against Adversarial Reverse Engineering (IMA, XG, XZ), pp. 231–240.
- ICPR-2014-OnoKKF #2d #automation #recognition #robust
- A Two-Dimensional Barcode with Robust Decoding against Distortion and Occlusion for Automatic Recognition of Garbage Bags (SO, YK, HK, SF), pp. 2879–2884.
- KMIS-2014-MikhaylovZFS #development
- Development of the Protection System Against Malicious Software (DM, AZ, MF, ASS), pp. 161–170.
- KR-2014-LomuscioM #abstraction #atl #multi #specification #verification
- An Abstraction Technique for the Verification of Multi-Agent Systems Against ATL Specifications (AL, JM).
- FSE-2014-Lam #named #network #social
- Omlet: a revolution against big-brother social networks (invited talk) (MSL), p. 1.
- ICSE-2014-GorlaTGZ #behaviour
- Checking app behavior against app descriptions (AG, IT, FG, AZ), pp. 1025–1035.
- ICSE-2014-MaozRR #component #modelling #verification
- Verifying component and connector models against crosscutting structural views (SM, JOR, BR), pp. 95–105.
- HPCA-2014-ElwellRAP #architecture #memory management
- A Non-Inclusive Memory Permissions architecture for protection against cross-layer attacks (JE, RR, NBAG, DP), pp. 201–212.
- CAV-2014-EldibW #synthesis
- Synthesis of Masking Countermeasures against Side Channel Attacks (HE, CW), pp. 114–130.
- ICST-2014-PotetMPD #approach #control flow #evaluation #injection #named #robust
- Lazart: A Symbolic Approach for Evaluation the Robustness of Secured Codes against Control Flow Injections (MLP, LM, MP, LD), pp. 213–222.
- DATE-2013-BayrakVRNBI
- An EDA-friendly protection scheme against side-channel attacks (AGB, NV, FR, DN, PB, PI), pp. 410–415.
- DATE-2013-TheissingMSSS #analysis #fault
- Comprehensive analysis of software countermeasures against fault attacks (NT, DM, MS, FS, GS), pp. 404–409.
- ITiCSE-2013-QureshiEP #bound #student
- Students organizing against pollution: computational thinking across boundaries (SQ, FE, SMP), p. 356.
- ESOP-2013-BouajjaniDM #robust
- Checking and Enforcing Robustness against TSO (AB, ED, RM), pp. 533–553.
- ESOP-2013-BouajjaniEEH #concurrent #source code #specification #verification
- Verifying Concurrent Programs against Sequential Specifications (AB, ME, CE, JH), pp. 290–309.
- CHI-2013-WulfAKASRYR #social #social media
- Fighting against the wall: social media use by political activists in a Palestinian village (VW, KA, IAK, MA, KS, MR, GPY, DR), pp. 1979–1988.
- MoDELS-2013-ChavezSFM #approach #implementation #java #testing #uml
- An Approach to Testing Java Implementation against Its UML Class Model (HMC, WS, RBF, BAM), pp. 220–236.
- MoDELS-2013-ChavezSFM #approach #implementation #java #testing #uml
- An Approach to Testing Java Implementation against Its UML Class Model (HMC, WS, RBF, BAM), pp. 220–236.
- CGO-2013-RodriguesCP #integer #performance #source code
- A fast and low-overhead technique to secure programs against integer overflows (RER, VHSC, FMQP), p. 11.
- ICTSS-2013-FariaPC #consistency #diagrams #sequence chart #testing #tool support #uml
- Techniques and Toolset for Conformance Testing against UML Sequence Diagrams (JPF, ACRP, MVdC), pp. 180–195.
- DATE-2012-BeaumontHN #architecture #execution #hardware #replication #security #using
- SAFER PATH: Security architecture using fragmented execution and replication for protection against trojaned hardware (MRB, BDH, TN), pp. 1000–1005.
- DATE-2012-NassarSGD #named #performance
- RSM: A small and fast countermeasure for AES, secure against 1st and 2nd-order zero-offset SCAs (MN, YS, SG, JLD), pp. 1173–1178.
- TACAS-2012-CairesV #concurrent #logic #model checking #named #specification
- SLMC: A Tool for Model Checking Concurrent Systems against Dynamical Spatial Logic Specifications (LC, HTV), pp. 485–491.
- STOC-2012-BoyleGJK #memory management #multi
- Multiparty computation secure against continual memory leakage (EB, SG, AJ, YTK), pp. 1235–1254.
- STOC-2012-VaziraniV #generative #quantum #random
- Certifiable quantum dice: or, true random number generation secure against quantum adversaries (UVV, TV), pp. 61–76.
- ICGT-2012-KhanRH #contract #modelling #testing #visual notation
- Testing against Visual Contracts: Model-Based Coverage (TAK, OR, RH), pp. 279–293.
- CIKM-2012-GuySBRD #enterprise #process
- Swimming against the streamz: search and analytics over the enterprise activity stream (IG, TS, MB, IR, TD), pp. 1587–1591.
- ICML-2012-BiggioNL
- Poisoning Attacks against Support Vector Machines (BB, BN, PL), p. 190.
- ICML-2012-DekelTA #adaptation #learning #online #policy
- Online Bandit Learning against an Adaptive Adversary: from Regret to Policy Regret (OD, AT, RA), p. 227.
- ICPR-2012-ChatbriK #algorithm #image #robust #sketching #towards
- Towards making thinning algorithms robust against noise in sketch images (HC, KK), pp. 3030–3033.
- KR-2012-FelliGL #ltl #multi #protocol #specification
- Synthesizing Agent Protocols From LTL Specifications Against Multiple Partially-Observable Environments (PF, GDG, AL).
- SEKE-2012-CuiWLBZL #aspect-oriented #diagrams #petri net #process #verification
- Verifying Aspect-Oriented Activity Diagrams Against Crosscutting Properties with Petri Net Analyzer (ZC, LW, XL, LB, JZ, XL), pp. 369–374.
- SIGIR-2012-WeiLZMRZ #novel #web
- Fighting against web spam: a novel propagation method based on click-through data (CW, YL, MZ, SM, LR, KZ), pp. 395–404.
- SAC-2012-GreyRS #automation
- Automatic creation of VPN backup paths for improved resilience against BGP-attackers (MG, MR, GS), pp. 613–620.
- DAC-2011-ReviriegoMB #ad hoc #design #fault #memory management #reliability #sequence
- Designing ad-hoc scrubbing sequences to improve memory reliability against soft errors (PR, JAM, SB), pp. 700–705.
- TACAS-2011-AlglaveMSS #hardware #named #testing
- Litmus: Running Tests against Hardware (JA, LM, SS, PS), pp. 41–44.
- ICALP-v2-2011-BouajjaniMM #robust
- Deciding Robustness against Total Store Ordering (AB, RM, EM), pp. 428–440.
- ECIR-2011-ArampatzisED
- Enhancing Deniability against Query-Logs (AA, PSE, GD), pp. 117–128.
- KDD-2011-TaiYYC #network #privacy #social
- Privacy-preserving social network publication against friendship attacks (CHT, PSY, DNY, MSC), pp. 1262–1270.
- SAC-2011-JohnsBSP #reliability
- Reliable protection against session fixation attacks (MJ, BB, MS, JP), pp. 1531–1537.
- SAC-2011-Muramatsu #algorithm #online #random #verification
- Random forgery attacks against DTW-based online signature verification algorithm (DM), pp. 27–28.
- HPCA-2011-YoonMCRJE #fault #memory management #named
- FREE-p: Protecting non-volatile memory against both hard and soft errors (DHY, NM, JC, PR, NPJ, ME), pp. 466–477.
- DATE-2010-IzumiISO #multi
- Improved countermeasure against Address-bit DPA for ECC scalar multiplication (MI, JI, KS, KO), pp. 981–984.
- HT-2010-BeelG #on the #robust
- On the robustness of google scholar against spam (JB, BG), pp. 297–298.
- SIGMOD-2010-ChengFL #morphism #named #network #privacy
- K-isomorphism: privacy preserving network publication against structural attacks (JC, AWCF, JL), pp. 459–470.
- STOC-2010-DeV #quantum
- Near-optimal extractors against quantum storage (AD, TV), pp. 161–170.
- ICPR-2010-AqmarSF #recognition #robust
- Robust Gait Recognition Against Speed Variation (MRA, KS, SF), pp. 2190–2193.
- ICPR-2010-GunluB #3d #composition
- 3D Face Decomposition and Region Selection Against Expression Variations (GG, HSB), pp. 1298–1301.
- DATE-2009-GhermanECSB
- System-level hardware-based protection of memories against soft-errors (VG, SE, MC, NS, YB), pp. 1222–1225.
- DATE-2009-LomneMTRSC #evaluation #logic #robust
- Evaluation on FPGA of triple rail logic robustness against DPA and DEMA (VL, PM, LT, MR, RS, NC), pp. 634–639.
- DATE-2009-WuM #logic #order #performance
- Joint logic restructuring and pin reordering against NBTI-induced performance degradation (KCW, DM), pp. 75–80.
- VLDB-2009-MachanavajjhalaGG
- Data Publishing against Realistic Adversaries (AM, JG, MG), pp. 790–801.
- STOC-2009-Ta-Shma #quantum
- Short seed extractors against quantum storage (ATS), pp. 401–408.
- ICALP-v1-2009-BuhrmanFS #bound
- Unconditional Lower Bounds against Advice (HB, LF, RS), pp. 195–209.
- FM-2009-LarsenLNP #realtime #requirements #verification
- Verifying Real-Time Systems against Scenario-Based Requirements (KGL, SL, BN, SP), pp. 676–691.
- SAC-2009-CaiCFTCH #network #peer-to-peer
- A holistic mechanism against file pollution in peer-to-peer networks (ZC, RC, JF, CT, ZC, JbH), pp. 28–34.
- SAC-2009-KingLS #network #taxonomy
- A taxonomy and adversarial model for attacks against network log anonymization (JK, KL, AJS), pp. 1286–1293.
- SAC-2009-TupakulaVP #named
- DoSTRACK: a system for defending against DoS attacks (UKT, VV, SRP), pp. 47–53.
- SAC-2009-YangSKY #collaboration #modelling #online #trust
- Defending online reputation systems against collaborative unfair raters through signal modeling and trust (YY, YLS, SK, QY), pp. 1308–1315.
- HPCA-2009-KongASZ
- Hardware-software integrated approaches to defend against software cache-based side channel attacks (JK, OA, JPS, HZ), pp. 393–404.
- LICS-2009-ChenHKM #automaton #markov #model checking #specification
- Quantitative Model Checking of Continuous-Time Markov Chains Against Timed Automata Specifications (TC, TH, JPK, AM), pp. 309–318.
- ICALP-A-2008-BlaserHS #set
- Asymptotically Optimal Hitting Sets Against Polynomials (MB, MH, DS), pp. 345–356.
- ICALP-C-2008-HallgrenKSZ #protocol #quantum #verification
- Making Classical Honest Verifier Zero Knowledge Protocols Secure against Quantum Attacks (SH, AK, PS, SZ), pp. 592–603.
- CIKM-2008-PanXM #mobile #privacy
- Protecting location privacy against location-dependent attack in mobile services (XP, JX, XM), pp. 1475–1476.
- RE-2008-Alexander #design #how #question #requirements #statistics
- Evaluating Design Options against Requirements: How Far Can Statistics Help? (IA), pp. 259–264.
- SAC-2008-GantaA #adaptation #enterprise #privacy
- Adaptive data anonymization against information fusion based privacy attacks on enterprise data (SRG, RA), pp. 1075–1076.
- OSDI-2008-JulaTZC #concurrent
- Deadlock Immunity: Enabling Systems to Defend Against Deadlocks (HJ, DMT, CZ, GC), pp. 295–308.
- IJCAR-2008-KremerMT #protocol #proving
- Proving Group Protocols Secure Against Eavesdroppers (SK, AM, RT), pp. 116–131.
- CASE-2007-WeiJL #automation #industrial #on the
- On Protecting Industrial Automation and Control Systems against Electronic Attacks (DW, MAJ, YL), pp. 176–181.
- DATE-2007-LeveugleAMTMMFRT #evaluation #fault #modelling
- Experimental evaluation of protections against laser-induced faults and consequences on fault modeling (RL, AA, VM, ET, PM, CM, NF, JBR, AT), pp. 1587–1592.
- ICDAR-2007-VargasFTA07a #image #performance #verification
- Off-line Signature Verification System Performance against Image Acquisition Resolution (JFVB, MAFB, CMTG, JBA), pp. 834–838.
- CSMR-2007-MerloLA #automation #injection #php
- Automated Protection of PHP Applications Against SQL-injection Attacks (EM, DL, GA), pp. 191–202.
- CIAA-J-2006-BastienCFR07 #exponential
- Reducing Simple Grammars: Exponential against Highly-Polynomial Time in Practice (CB, JC, WF, WR), pp. 715–725.
- OCSC-2007-MaAL #authentication #protocol
- Chameleon-Based Deniable Authenticated Key Agreement Protocol Secure Against Forgery (CM, JA, JL), pp. 124–133.
- SAC-2007-YavuzT #ambiguity #image
- Improved SVD-DWT based digital image watermarking against watermark ambiguity (EY, ZT), pp. 1051–1055.
- DAC-2006-WagnerBA #design #logic
- Shielding against design flaws with field repairable control logic (IW, VB, TMA), pp. 344–347.
- STOC-2006-Watrous #quantum
- Zero-knowledge against quantum attacks (JW), pp. 296–305.
- CIAA-2006-BastienCFR #exponential
- Reducing Simple Grammars: Exponential Against Highly-Polynomial Time in Practice (CB, JC, WF, WR), pp. 90–101.
- KDD-2006-AggarwalPZ #data mining #mining #on the #privacy
- On privacy preservation against adversarial data mining (CCA, JP, BZ), pp. 510–516.
- GPCE-2006-CzarneckiP #constraints #ocl #verification
- Verifying feature-based model templates against well-formedness OCL constraints (KC, KP), pp. 211–220.
- SAC-2006-BreedenM #internet
- Investigating “Internet Crimes Against Children” (ICAC) cases in the state of Florida (BB, JM), pp. 288–292.
- CIAA-J-2004-HanMZ05 #approach #automaton #database #sequence
- An automata approach to match gapped sequence tags against protein database (YH, BM, KZ), pp. 487–497.
- ICALP-2005-BaudetCK #equation #implementation
- Computationally Sound Implementations of Equational Theories Against Passive Adversaries (MB, VC, SK), pp. 652–663.
- ICEIS-v1-2005-Mattsson #database #encryption #enterprise #implementation
- A Practical Implementation of Transparent Encryption and Separation of Duties in Enterprise Databases — Protection against External and Internal Attacks on Databases (UTM), pp. 146–153.
- ICEIS-v2-2005-Liu
- Defending Against Business Crises with the Help of Intelligent Agent Based Early Warning Solutions (SL), pp. 58–65.
- VLDB-2004-KoudasMS #database #flexibility #scalability #string
- Flexible String Matching Against Large Databases in Practice (NK, AM, DS), pp. 1078–1086.
- SAS-2004-FlanaganF #type inference
- Type Inference Against Races (CF, SNF), pp. 116–132.
- STOC-2004-Fischer #graph #morphism #testing
- The difficulty of testing for isomorphism against a graph that is given in advance (EF), pp. 391–397.
- CIAA-2004-HanMZ #approach #automaton #database #sequence
- An Automata Approach to Match Gapped Sequence Tags Against Protein Database (YH, BM, KZ), pp. 167–177.
- ICPR-v1-2004-KusachiSIA #detection #image #recognition #robust
- Kanji Recognition in Scene Images without Detection of Text Fields — Robust Against Variation of Viewpoint, Contrast, and Background Texture (YK, AS, NI, KA), pp. 457–460.
- ICDAR-2003-Wakahara #correlation #recognition #using
- Shape Matching Using GAT Correlation against Nonlinear Distortion and its Application to Handwritten Numeral Recognition (TW), p. 54–?.
- WCRE-2003-DahnM #c #program transformation #source code #using
- Using Program Transformation to Secure C Programs Against Buffer Overflows (CD, SM), pp. 323–333.
- ICML-2003-ConitzerS #algorithm #learning #multi #named #self
- AWESOME: A General Multiagent Learning Algorithm that Converges in Self-Play and Learns a Best Response Against Stationary Opponents (VC, TS), pp. 83–90.
- SAC-2003-ZhangP #algorithm #effectiveness #performance
- A Fast and Effective Steganalytic Technique Against JSteg-like Algorithms (TZ, XP), pp. 307–311.
- ESEC-FSE-2003-SelonenX #architecture #modelling #uml #validation
- Validating UML models against architectural profiles (PS, JX), pp. 58–67.
- DAC-2002-ChakrabartiDCB #interface #realtime #specification #verification
- Formal verification of module interfaces against real time specifications (AC, PD, PPC, AB), pp. 141–145.
- SEKE-2002-MorisioST
- A new method to evaluate software artifacts against predefined profiles (MM, IS, AT), pp. 811–818.
- SAC-2002-BoscDP #database #query
- About possibilistic queries against possibilistic databases (PB, LD, OP), pp. 807–811.
- CAV-2002-ChatterjeeSG #consistency #memory management #model checking #modelling #protocol #refinement #verification
- Shared Memory Consistency Protocol Verification Against Weak Memory Models: Refinement via Model-Checking (PC, HS, GG), pp. 123–136.
- UML-2001-MetzOW #case study
- Against Use Case Interleaving (PM, JO, WW), pp. 472–486.
- ICPR-v3-2000-DemireklerKC #using
- Fusing Length and Voicing Information, and HMM Decision Using a Bayesian Causal Tree against Insufficient Training Data (MD, FK, TÇ), pp. 3106–3109.
- ICSE-2000-LittlewoodS00a #assessment #design #fault #fault tolerance #reliability #tutorial
- Fault tolerance via diversity against design faults (tutorial session): design principles and reliability assessment (BL, LS), p. 835.
- HCI-EI-1999-MahanMEHD #induction
- Countermeasures Against Stress: Dynamic Cognitive Induction (RPM, CJM, LRE, EH, PTD), pp. 691–695.
- ICML-1999-Harries
- Boosting a Strong Learner: Evidence Against the Minimum Margin (MBH), pp. 171–180.
- OSDI-1999-SpatscheckP
- Defending Against Denial of Service Attacks in Scout (OS, LLP), pp. 59–72.
- ICML-1998-ProvostFK #algorithm #estimation #induction
- The Case against Accuracy Estimation for Comparing Induction Algorithms (FJP, TF, RK), pp. 445–453.
- HCI-CC-1997-Lee
- Effect of the Field-of-View Against Target Ratio in Haptic Exploration (SL), pp. 595–598.
- STOC-1995-Yao #metric #protocol #quantum #security
- Security of quantum protocols against coherent measurements (ACCY), pp. 67–75.
- RE-1995-JacquotV #assessment #specification
- Trading legibility against implementability in requirement specifications: an experimental assessment (JPJ, AV), pp. 181–189.
- STOC-1993-RackoffS #analysis #encryption
- Cryptographic defense against traffic analysis (CR, DRS), pp. 672–681.
- ICALP-1992-BodlaenderFW
- Two Strikes Against Perfect Phylogeny (HLB, MRF, TW), pp. 273–283.
- TRI-Ada-C-1992-Freedom
- Against Software Patents (TLfPF), pp. 14–21.
- TRI-Ada-C-1992-Stallman #user interface
- Against User Interface Copyright (RMS), pp. 9–13.
- STOC-1990-NaorY
- Public-key Cryptosystems Provably Secure against Chosen Ciphertext Attacks (MN, MY), pp. 427–437.
- SIGMOD-1988-Hanson #analysis #database #performance #query
- Processing Queries Against Database Procedures: A Performance Analysis (ENH), pp. 295–302.
- ILPC-1984-BoscoGG84 #concurrent #logic #process #prolog #specification #verification
- A Prolog System for the Verification of Concurrent Processes Against Temporal Logic Specifications (PGB, GG, EG), pp. 219–229.
- VLDB-1982-Leiss #database #statistics
- Randomizing, A Practical Method for Protecting Statistical Databases Against Compromise (ELL), pp. 189–196.