Posters > 2020
Artificial Intelligence
- Dynamic Optimization Using Object Detection in Bandwidth Constrained Automatic Multi-camera Networks [87A-DD4]
- Twitter Topic and Bias Identification: A Graph-based Approach [7C4-BF3]
End System Security
- Impedance and Temperature attacks against the VMG-KLJN Secure Key Exchange Protocol [7CE-8CA]
- Securing Global Supply Chain with nanophotonic Hardware Security solutions [XB5-623]
- Statistical RNG Attack against the KLJN Secure Key Exchange Protocol [B98-C44]
- Your Home is Insecure: Practical Attacks on Wireless Home Alarm Systems [F7E-DB8]
Human Centric Security
- Formulating a Crowd State Prediction Problem for Application to Crowd Control [928-764]
- The Impacts of Behavioral Probability Weighting on Security Investments in Interdependent Systems [BB5-0F9]
Network Security
- A Characterization of the Deterministic Capacity of Channels with an Active Adversary [1A2-296]
- Bento: Bringing Network Function Virtualization to Tor [GHX-F24]
- Byzantine-Resilient Distributed Optimization [D19-43F]
- Causal Adversarial Binary Symmetric Channel with Feedback Snooping [460-08C]
- E2C - Energy Efficient Consensus [311-6C0]