Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
NDSS.2025
papers.cool
Lend
Me Your Beam: Privacy Implications of
Plaintext
Beamforming Feedback in WiFi
papers.cool
·
10w
Automated Expansion of Privacy Data
Taxonomy
for
Compliant
Data Breach Notification
papers.cool
·
10w
SketchFeature
: High-Quality Per-Flow Feature
Extractor
Towards Security-Aware Data Plane
papers.cool
·
10w
Vulnerability, Where Art
Thou
? An Investigation of Vulnerability Management in Android Smartphone
Chipsets
papers.cool
·
10w
Privacy-Preserving
Data
Deduplication
for Enhancing Federated Learning of Language Models
papers.cool
·
10w
Interventional
Root Cause Analysis of Failures in Multi-Sensor Fusion
Perception
Systems
papers.cool
·
10w
The
Midas
Touch: Triggering the Capability of LLMs for
RM-API
Misuse Detection
papers.cool
·
10w
Scale-MIA
: A Scalable Model
Inversion
Attack against Secure Federated Learning via Latent Space Reconstruction
papers.cool
·
10w
Oreo: Protecting
ASLR
Against
Microarchitectural
Attacks
papers.cool
·
10w
Evaluating Machine Learning-Based
IoT
Device
Identification
Models for Security Applications
papers.cool
·
10w
Enhancing Security in Third-Party Library
Reuse
– Comprehensive Detection of 1-day
Vulnerability
through Code Patch Analysis
papers.cool
·
10w
Diffence
:
Fencing
Membership Privacy With Diffusion Models
papers.cool
·
10w
What’s Done Is Not What’s Claimed: Detecting and
Interpreting
Inconsistencies
in App Behaviors
papers.cool
·
10w
L-HAWK
: A
Controllable
Physical Adversarial Patch Against a Long-Distance Target
papers.cool
·
10w
CounterSEVeillance
: Performance-Counter Attacks on AMD
SEV-SNP
papers.cool
·
10w
TME-Box
: Scalable In-Process Isolation through Intel
TME-MK
Memory Encryption
papers.cool
·
10w
Revisiting Concept Drift in Windows Malware Detection: Adaptation to Real
Drifted
Malware with Minimal
Samples
papers.cool
·
10w
Towards
Understanding
Unsafe
Video Generation
papers.cool
·
10w
Try to
Poison
My Deep Learning Data?
Nowhere
to Hide Your Trajectory Spectrum!
papers.cool
·
10w
Truman
: Constructing Device Behavior Models from OS Drivers to
Fuzz
Virtual Devices
papers.cool
·
10w
« Page 5
·
Page 7 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help