M. Conti
Please Note
93 records found
1
BDMFA
Forensic-enabling attestation technique for Internet of Medical Things
CovertPower
A Covert Channel on Android Devices Through USB Power Line
Future of cyberspace
A critical review of standard security protocols in the post-quantum era
ABSE
Adaptive Baseline Score-Based Election for Leader-Based BFT Systems
Federated Learning Under Attack
Exposing Vulnerabilities Through Data Poisoning Attacks in Computer Networks
SoK
Collusion-resistant Multi-party Private Set Intersections in the Semi-honest Model
Work-in-Progress: Crash Course
Can (Under Attack) Autonomous Driving Beat Human Drivers?
X-Lock
A Secure XOR-Based Fuzzy Extractor for Resource Constrained Devices
EmoBack
Backdoor Attacks Against Speaker Identification Using Emotional Prosody
Beyond PhantomSponges
Enhancing Sponge Attack on Object Detection Models