BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
attack (25)
protect (15)
secur (14)
base (13)
model (13)

Stem against$ (all stems)

136 papers:

CASECASE-2015-TomolaMBC #robust
Robust codiagnosability of discrete-event systems against permanent loss of observations (JHAT, MVM, JCB, LKC), pp. 813–818.
DACDAC-2015-YuUK
Leveraging on-chip voltage regulators as a countermeasure against side-channel attacks (WY, OAU, SK), p. 6.
ITiCSEITiCSE-2015-Tudor #learning #optimisation #query #xml
Virtual Learning Laboratory about Query Optimization against XML Data (LNT), p. 348.
ICALPICALP-v2-2015-Raykov
Broadcast from Minicast Secure Against General Adversaries (PR), pp. 701–712.
LATALATA-2015-AmanoS #bound #multi #polynomial
A Nonuniform Circuit Class with Multilayer of Threshold Gates Having Super Quasi Polynomial Size Lower Bounds Against NEXP (KA, AS), pp. 461–472.
CHICHI-2015-MalacriaAQCCR
Push-Edge and Slide-Edge: Scrolling by Pushing Against the Viewport Edge (SM, JA, PQ, GC, AC, NR), pp. 2773–2776.
HCISCSM-2015-MillsF #effectiveness #framework #how #why
A Computational Study of How and Why reddit.com was an Effective Platform in the Campaign Against SOPA (RM, AF), pp. 229–241.
ICMLICML-2015-XiaoBBFER #feature model #question
Is Feature Selection Secure against Training Data Poisoning? (HX, BB, GB, GF, CE, FR), pp. 1689–1698.
OnwardOnward-2015-Petricek
Against a universal definition of “Type” (TP), pp. 254–266.
PPDPPPDP-2015-Fruhwirth #recursion #termination
A devil’s advocate against termination of direct recursion (TWF), pp. 103–113.
SACSAC-2015-BarbosaBA #monitoring
Defending against load monitoring in smart metering data through noise addition (PB, AB, HA), pp. 2218–2224.
ESEC-FSEESEC-FSE-2015-KargenS #slicing #source code #using
Turning programs against each other: high coverage fuzz-testing using binary-code mutation and dynamic slicing (UK, NS), pp. 782–792.
DACDAC-2014-DaviKS #control flow #embedded #fine-grained #performance #towards
Hardware-Assisted Fine-Grained Control-Flow Integrity: Towards Efficient Protection of Embedded Systems Against Software Exploitation (LD, PK, ARS), p. 6.
DACDAC-2014-RaoEST #multi #using
Protecting SRAM-based FPGAs Against Multiple Bit Upsets Using Erasure Codes (PMBR, ME, RS, MBT), p. 6.
DATEDATE-2014-LiuW #configuration management #design #embedded #logic #obfuscation
Embedded reconfigurable logic for ASIC design obfuscation against supply chain attacks (BL, BW), pp. 1–6.
DATEDATE-2014-ZussaDTDMGCT #detection #fault #injection #performance
Efficiency of a glitch detector against electromagnetic fault injection (LZ, AD, KT, JMD, PM, LGS, JC, AT), pp. 1–6.
TACASTACAS-2014-EldibWS #smt #verification
SMT-Based Verification of Software Countermeasures against Side-Channel Attacks (HE, CW, PS), pp. 62–77.
ICALPICALP-v2-2014-DerevenetcM #robust
Robustness against Power is PSpace-complete (ED, RM), pp. 158–170.
CAiSECAiSE-2014-Spinellis
Against the Odds: Managing the Unmanagable in a Time of Crisis (DS), pp. 24–41.
CIKMCIKM-2014-AlabdulmohsinGZ #reverse engineering #robust
Adding Robustness to Support Vector Machines Against Adversarial Reverse Engineering (IMA, XG, XZ), pp. 231–240.
ICPRICPR-2014-OnoKKF #2d #automation #recognition #robust
A Two-Dimensional Barcode with Robust Decoding against Distortion and Occlusion for Automatic Recognition of Garbage Bags (SO, YK, HK, SF), pp. 2879–2884.
KMISKMIS-2014-MikhaylovZFS #development
Development of the Protection System Against Malicious Software (DM, AZ, MF, ASS), pp. 161–170.
KRKR-2014-LomuscioM #abstraction #atl #multi #specification #verification
An Abstraction Technique for the Verification of Multi-Agent Systems Against ATL Specifications (AL, JM).
FSEFSE-2014-Lam #named #network #social
Omlet: a revolution against big-brother social networks (invited talk) (MSL), p. 1.
ICSEICSE-2014-GorlaTGZ #behaviour
Checking app behavior against app descriptions (AG, IT, FG, AZ), pp. 1025–1035.
ICSEICSE-2014-MaozRR #component #modelling #verification
Verifying component and connector models against crosscutting structural views (SM, JOR, BR), pp. 95–105.
HPCAHPCA-2014-ElwellRAP #architecture #memory management
A Non-Inclusive Memory Permissions architecture for protection against cross-layer attacks (JE, RR, NBAG, DP), pp. 201–212.
CAVCAV-2014-EldibW #synthesis
Synthesis of Masking Countermeasures against Side Channel Attacks (HE, CW), pp. 114–130.
ICSTICST-2014-PotetMPD #approach #control flow #evaluation #injection #named #robust
Lazart: A Symbolic Approach for Evaluation the Robustness of Secured Codes against Control Flow Injections (MLP, LM, MP, LD), pp. 213–222.
DATEDATE-2013-BayrakVRNBI
An EDA-friendly protection scheme against side-channel attacks (AGB, NV, FR, DN, PB, PI), pp. 410–415.
DATEDATE-2013-TheissingMSSS #analysis #fault
Comprehensive analysis of software countermeasures against fault attacks (NT, DM, MS, FS, GS), pp. 404–409.
ITiCSEITiCSE-2013-QureshiEP #bound #student
Students organizing against pollution: computational thinking across boundaries (SQ, FE, SMP), p. 356.
ESOPESOP-2013-BouajjaniDM #robust
Checking and Enforcing Robustness against TSO (AB, ED, RM), pp. 533–553.
ESOPESOP-2013-BouajjaniEEH #concurrent #source code #specification #verification
Verifying Concurrent Programs against Sequential Specifications (AB, ME, CE, JH), pp. 290–309.
CHICHI-2013-WulfAKASRYR #social #social media
Fighting against the wall: social media use by political activists in a Palestinian village (VW, KA, IAK, MA, KS, MR, GPY, DR), pp. 1979–1988.
MODELSMoDELS-2013-ChavezSFM #approach #implementation #java #testing #uml
An Approach to Testing Java Implementation against Its UML Class Model (HMC, WS, RBF, BAM), pp. 220–236.
MODELSMoDELS-2013-ChavezSFM #approach #implementation #java #testing #uml
An Approach to Testing Java Implementation against Its UML Class Model (HMC, WS, RBF, BAM), pp. 220–236.
CGOCGO-2013-RodriguesCP #integer #performance #source code
A fast and low-overhead technique to secure programs against integer overflows (RER, VHSC, FMQP), p. 11.
ICTSSICTSS-2013-FariaPC #consistency #diagrams #sequence chart #testing #tool support #uml
Techniques and Toolset for Conformance Testing against UML Sequence Diagrams (JPF, ACRP, MVdC), pp. 180–195.
DATEDATE-2012-BeaumontHN #architecture #execution #hardware #replication #security #using
SAFER PATH: Security architecture using fragmented execution and replication for protection against trojaned hardware (MRB, BDH, TN), pp. 1000–1005.
DATEDATE-2012-NassarSGD #named #performance
RSM: A small and fast countermeasure for AES, secure against 1st and 2nd-order zero-offset SCAs (MN, YS, SG, JLD), pp. 1173–1178.
TACASTACAS-2012-CairesV #concurrent #logic #model checking #named #specification
SLMC: A Tool for Model Checking Concurrent Systems against Dynamical Spatial Logic Specifications (LC, HTV), pp. 485–491.
STOCSTOC-2012-BoyleGJK #memory management #multi
Multiparty computation secure against continual memory leakage (EB, SG, AJ, YTK), pp. 1235–1254.
STOCSTOC-2012-VaziraniV #generative #quantum #random
Certifiable quantum dice: or, true random number generation secure against quantum adversaries (UVV, TV), pp. 61–76.
ICGTICGT-2012-KhanRH #contract #modelling #testing #visual notation
Testing against Visual Contracts: Model-Based Coverage (TAK, OR, RH), pp. 279–293.
CIKMCIKM-2012-GuySBRD #enterprise #process
Swimming against the streamz: search and analytics over the enterprise activity stream (IG, TS, MB, IR, TD), pp. 1587–1591.
ICMLICML-2012-BiggioNL
Poisoning Attacks against Support Vector Machines (BB, BN, PL), p. 190.
ICMLICML-2012-DekelTA #adaptation #learning #online #policy
Online Bandit Learning against an Adaptive Adversary: from Regret to Policy Regret (OD, AT, RA), p. 227.
ICPRICPR-2012-ChatbriK #algorithm #image #robust #sketching #towards
Towards making thinning algorithms robust against noise in sketch images (HC, KK), pp. 3030–3033.
KRKR-2012-FelliGL #ltl #multi #protocol #specification
Synthesizing Agent Protocols From LTL Specifications Against Multiple Partially-Observable Environments (PF, GDG, AL).
SEKESEKE-2012-CuiWLBZL #aspect-oriented #diagrams #petri net #process #verification
Verifying Aspect-Oriented Activity Diagrams Against Crosscutting Properties with Petri Net Analyzer (ZC, LW, XL, LB, JZ, XL), pp. 369–374.
SIGIRSIGIR-2012-WeiLZMRZ #novel #web
Fighting against web spam: a novel propagation method based on click-through data (CW, YL, MZ, SM, LR, KZ), pp. 395–404.
SACSAC-2012-GreyRS #automation
Automatic creation of VPN backup paths for improved resilience against BGP-attackers (MG, MR, GS), pp. 613–620.
DACDAC-2011-ReviriegoMB #ad hoc #design #fault #memory management #reliability #sequence
Designing ad-hoc scrubbing sequences to improve memory reliability against soft errors (PR, JAM, SB), pp. 700–705.
TACASTACAS-2011-AlglaveMSS #hardware #named #testing
Litmus: Running Tests against Hardware (JA, LM, SS, PS), pp. 41–44.
ICALPICALP-v2-2011-BouajjaniMM #robust
Deciding Robustness against Total Store Ordering (AB, RM, EM), pp. 428–440.
ECIRECIR-2011-ArampatzisED
Enhancing Deniability against Query-Logs (AA, PSE, GD), pp. 117–128.
KDDKDD-2011-TaiYYC #network #privacy #social
Privacy-preserving social network publication against friendship attacks (CHT, PSY, DNY, MSC), pp. 1262–1270.
SACSAC-2011-JohnsBSP #reliability
Reliable protection against session fixation attacks (MJ, BB, MS, JP), pp. 1531–1537.
SACSAC-2011-Muramatsu #algorithm #online #random #verification
Random forgery attacks against DTW-based online signature verification algorithm (DM), pp. 27–28.
HPCAHPCA-2011-YoonMCRJE #fault #memory management #named
FREE-p: Protecting non-volatile memory against both hard and soft errors (DHY, NM, JC, PR, NPJ, ME), pp. 466–477.
DATEDATE-2010-IzumiISO #multi
Improved countermeasure against Address-bit DPA for ECC scalar multiplication (MI, JI, KS, KO), pp. 981–984.
HTHT-2010-BeelG #on the #robust
On the robustness of google scholar against spam (JB, BG), pp. 297–298.
SIGMODSIGMOD-2010-ChengFL #morphism #named #network #privacy
K-isomorphism: privacy preserving network publication against structural attacks (JC, AWCF, JL), pp. 459–470.
STOCSTOC-2010-DeV #quantum
Near-optimal extractors against quantum storage (AD, TV), pp. 161–170.
ICPRICPR-2010-AqmarSF #recognition #robust
Robust Gait Recognition Against Speed Variation (MRA, KS, SF), pp. 2190–2193.
ICPRICPR-2010-GunluB #3d #composition
3D Face Decomposition and Region Selection Against Expression Variations (GG, HSB), pp. 1298–1301.
DATEDATE-2009-GhermanECSB
System-level hardware-based protection of memories against soft-errors (VG, SE, MC, NS, YB), pp. 1222–1225.
DATEDATE-2009-LomneMTRSC #evaluation #logic #robust
Evaluation on FPGA of triple rail logic robustness against DPA and DEMA (VL, PM, LT, MR, RS, NC), pp. 634–639.
DATEDATE-2009-WuM #logic #order #performance
Joint logic restructuring and pin reordering against NBTI-induced performance degradation (KCW, DM), pp. 75–80.
VLDBVLDB-2009-MachanavajjhalaGG
Data Publishing against Realistic Adversaries (AM, JG, MG), pp. 790–801.
STOCSTOC-2009-Ta-Shma #quantum
Short seed extractors against quantum storage (ATS), pp. 401–408.
ICALPICALP-v1-2009-BuhrmanFS #bound
Unconditional Lower Bounds against Advice (HB, LF, RS), pp. 195–209.
FMFM-2009-LarsenLNP #realtime #requirements #verification
Verifying Real-Time Systems against Scenario-Based Requirements (KGL, SL, BN, SP), pp. 676–691.
SACSAC-2009-CaiCFTCH #network #peer-to-peer
A holistic mechanism against file pollution in peer-to-peer networks (ZC, RC, JF, CT, ZC, JbH), pp. 28–34.
SACSAC-2009-KingLS #network #taxonomy
A taxonomy and adversarial model for attacks against network log anonymization (JK, KL, AJS), pp. 1286–1293.
SACSAC-2009-TupakulaVP #named
DoSTRACK: a system for defending against DoS attacks (UKT, VV, SRP), pp. 47–53.
SACSAC-2009-YangSKY #collaboration #modelling #online #trust
Defending online reputation systems against collaborative unfair raters through signal modeling and trust (YY, YLS, SK, QY), pp. 1308–1315.
HPCAHPCA-2009-KongASZ
Hardware-software integrated approaches to defend against software cache-based side channel attacks (JK, OA, JPS, HZ), pp. 393–404.
LICSLICS-2009-ChenHKM #automaton #markov #model checking #specification
Quantitative Model Checking of Continuous-Time Markov Chains Against Timed Automata Specifications (TC, TH, JPK, AM), pp. 309–318.
ICALPICALP-A-2008-BlaserHS #set
Asymptotically Optimal Hitting Sets Against Polynomials (MB, MH, DS), pp. 345–356.
ICALPICALP-C-2008-HallgrenKSZ #protocol #quantum #verification
Making Classical Honest Verifier Zero Knowledge Protocols Secure against Quantum Attacks (SH, AK, PS, SZ), pp. 592–603.
CIKMCIKM-2008-PanXM #mobile #privacy
Protecting location privacy against location-dependent attack in mobile services (XP, JX, XM), pp. 1475–1476.
RERE-2008-Alexander #design #how #question #requirements #statistics
Evaluating Design Options against Requirements: How Far Can Statistics Help? (IA), pp. 259–264.
SACSAC-2008-GantaA #adaptation #enterprise #privacy
Adaptive data anonymization against information fusion based privacy attacks on enterprise data (SRG, RA), pp. 1075–1076.
OSDIOSDI-2008-JulaTZC #concurrent
Deadlock Immunity: Enabling Systems to Defend Against Deadlocks (HJ, DMT, CZ, GC), pp. 295–308.
IJCARIJCAR-2008-KremerMT #protocol #proving
Proving Group Protocols Secure Against Eavesdroppers (SK, AM, RT), pp. 116–131.
CASECASE-2007-WeiJL #automation #industrial #on the
On Protecting Industrial Automation and Control Systems against Electronic Attacks (DW, MAJ, YL), pp. 176–181.
DATEDATE-2007-LeveugleAMTMMFRT #evaluation #fault #modelling
Experimental evaluation of protections against laser-induced faults and consequences on fault modeling (RL, AA, VM, ET, PM, CM, NF, JBR, AT), pp. 1587–1592.
ICDARICDAR-2007-VargasFTA07a #image #performance #verification
Off-line Signature Verification System Performance against Image Acquisition Resolution (JFVB, MAFB, CMTG, JBA), pp. 834–838.
CSMRCSMR-2007-MerloLA #automation #injection #php
Automated Protection of PHP Applications Against SQL-injection Attacks (EM, DL, GA), pp. 191–202.
CIAACIAA-J-2006-BastienCFR07 #exponential
Reducing Simple Grammars: Exponential against Highly-Polynomial Time in Practice (CB, JC, WF, WR), pp. 715–725.
HCIOCSC-2007-MaAL #authentication #protocol
Chameleon-Based Deniable Authenticated Key Agreement Protocol Secure Against Forgery (CM, JA, JL), pp. 124–133.
SACSAC-2007-YavuzT #ambiguity #image
Improved SVD-DWT based digital image watermarking against watermark ambiguity (EY, ZT), pp. 1051–1055.
DACDAC-2006-WagnerBA #design #logic
Shielding against design flaws with field repairable control logic (IW, VB, TMA), pp. 344–347.
STOCSTOC-2006-Watrous #quantum
Zero-knowledge against quantum attacks (JW), pp. 296–305.
CIAACIAA-2006-BastienCFR #exponential
Reducing Simple Grammars: Exponential Against Highly-Polynomial Time in Practice (CB, JC, WF, WR), pp. 90–101.
KDDKDD-2006-AggarwalPZ #data mining #mining #on the #privacy
On privacy preservation against adversarial data mining (CCA, JP, BZ), pp. 510–516.
GPCEGPCE-2006-CzarneckiP #constraints #ocl #verification
Verifying feature-based model templates against well-formedness OCL constraints (KC, KP), pp. 211–220.
SACSAC-2006-BreedenM #internet
Investigating “Internet Crimes Against Children” (ICAC) cases in the state of Florida (BB, JM), pp. 288–292.
CIAACIAA-J-2004-HanMZ05 #approach #automaton #database #sequence
An automata approach to match gapped sequence tags against protein database (YH, BM, KZ), pp. 487–497.
ICALPICALP-2005-BaudetCK #equation #implementation
Computationally Sound Implementations of Equational Theories Against Passive Adversaries (MB, VC, SK), pp. 652–663.
ICEISICEIS-v1-2005-Mattsson #database #encryption #enterprise #implementation
A Practical Implementation of Transparent Encryption and Separation of Duties in Enterprise Databases — Protection against External and Internal Attacks on Databases (UTM), pp. 146–153.
ICEISICEIS-v2-2005-Liu
Defending Against Business Crises with the Help of Intelligent Agent Based Early Warning Solutions (SL), pp. 58–65.
VLDBVLDB-2004-KoudasMS #database #flexibility #scalability #string
Flexible String Matching Against Large Databases in Practice (NK, AM, DS), pp. 1078–1086.
SASSAS-2004-FlanaganF #type inference
Type Inference Against Races (CF, SNF), pp. 116–132.
STOCSTOC-2004-Fischer #graph #morphism #testing
The difficulty of testing for isomorphism against a graph that is given in advance (EF), pp. 391–397.
CIAACIAA-2004-HanMZ #approach #automaton #database #sequence
An Automata Approach to Match Gapped Sequence Tags Against Protein Database (YH, BM, KZ), pp. 167–177.
ICPRICPR-v1-2004-KusachiSIA #detection #image #recognition #robust
Kanji Recognition in Scene Images without Detection of Text Fields — Robust Against Variation of Viewpoint, Contrast, and Background Texture (YK, AS, NI, KA), pp. 457–460.
ICDARICDAR-2003-Wakahara #correlation #recognition #using
Shape Matching Using GAT Correlation against Nonlinear Distortion and its Application to Handwritten Numeral Recognition (TW), p. 54–?.
WCREWCRE-2003-DahnM #c #program transformation #source code #using
Using Program Transformation to Secure C Programs Against Buffer Overflows (CD, SM), pp. 323–333.
ICMLICML-2003-ConitzerS #algorithm #learning #multi #named #self
AWESOME: A General Multiagent Learning Algorithm that Converges in Self-Play and Learns a Best Response Against Stationary Opponents (VC, TS), pp. 83–90.
SACSAC-2003-ZhangP #algorithm #effectiveness #performance
A Fast and Effective Steganalytic Technique Against JSteg-like Algorithms (TZ, XP), pp. 307–311.
ESEC-FSEESEC-FSE-2003-SelonenX #architecture #modelling #uml #validation
Validating UML models against architectural profiles (PS, JX), pp. 58–67.
DACDAC-2002-ChakrabartiDCB #interface #realtime #specification #verification
Formal verification of module interfaces against real time specifications (AC, PD, PPC, AB), pp. 141–145.
SEKESEKE-2002-MorisioST
A new method to evaluate software artifacts against predefined profiles (MM, IS, AT), pp. 811–818.
SACSAC-2002-BoscDP #database #query
About possibilistic queries against possibilistic databases (PB, LD, OP), pp. 807–811.
CAVCAV-2002-ChatterjeeSG #consistency #memory management #model checking #modelling #protocol #refinement #verification
Shared Memory Consistency Protocol Verification Against Weak Memory Models: Refinement via Model-Checking (PC, HS, GG), pp. 123–136.
UMLUML-2001-MetzOW #case study
Against Use Case Interleaving (PM, JO, WW), pp. 472–486.
ICPRICPR-v3-2000-DemireklerKC #using
Fusing Length and Voicing Information, and HMM Decision Using a Bayesian Causal Tree against Insufficient Training Data (MD, FK, ), pp. 3106–3109.
ICSEICSE-2000-LittlewoodS00a #assessment #design #fault #fault tolerance #reliability #tutorial
Fault tolerance via diversity against design faults (tutorial session): design principles and reliability assessment (BL, LS), p. 835.
HCIHCI-EI-1999-MahanMEHD #induction
Countermeasures Against Stress: Dynamic Cognitive Induction (RPM, CJM, LRE, EH, PTD), pp. 691–695.
ICMLICML-1999-Harries
Boosting a Strong Learner: Evidence Against the Minimum Margin (MBH), pp. 171–180.
OSDIOSDI-1999-SpatscheckP
Defending Against Denial of Service Attacks in Scout (OS, LLP), pp. 59–72.
ICMLICML-1998-ProvostFK #algorithm #estimation #induction
The Case against Accuracy Estimation for Comparing Induction Algorithms (FJP, TF, RK), pp. 445–453.
HCIHCI-CC-1997-Lee
Effect of the Field-of-View Against Target Ratio in Haptic Exploration (SL), pp. 595–598.
STOCSTOC-1995-Yao #metric #protocol #quantum #security
Security of quantum protocols against coherent measurements (ACCY), pp. 67–75.
RERE-1995-JacquotV #assessment #specification
Trading legibility against implementability in requirement specifications: an experimental assessment (JPJ, AV), pp. 181–189.
STOCSTOC-1993-RackoffS #analysis #encryption
Cryptographic defense against traffic analysis (CR, DRS), pp. 672–681.
ICALPICALP-1992-BodlaenderFW
Two Strikes Against Perfect Phylogeny (HLB, MRF, TW), pp. 273–283.
AdaTRI-Ada-C-1992-Freedom
Against Software Patents (TLfPF), pp. 14–21.
AdaTRI-Ada-C-1992-Stallman #user interface
Against User Interface Copyright (RMS), pp. 9–13.
STOCSTOC-1990-NaorY
Public-key Cryptosystems Provably Secure against Chosen Ciphertext Attacks (MN, MY), pp. 427–437.
SIGMODSIGMOD-1988-Hanson #analysis #database #performance #query
Processing Queries Against Database Procedures: A Performance Analysis (ENH), pp. 295–302.
ICLPILPC-1984-BoscoGG84 #concurrent #logic #process #prolog #specification #verification
A Prolog System for the Verification of Concurrent Processes Against Temporal Logic Specifications (PGB, GG, EG), pp. 219–229.
VLDBVLDB-1982-Leiss #database #statistics
Randomizing, A Practical Method for Protecting Statistical Databases Against Compromise (ELL), pp. 189–196.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.