


default search action
54th DSN 2024: Brisbane, Australia - Workshops
- 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2024 - Workshops, Brisbane, Australia, June 24-27, 2024. IEEE 2024, ISBN 979-8-3503-9572-3

- David Pereira, José Proença, Behrooz Sangchoolie:

Message from the VERDI Workshop Chairs; DSN-W 2024. xiv - Juan Carlos Ruiz:

On Improving the Robustness of Convolutional Neural Networks using In-Parameter Zero-Space Error Correction Codes. xxii - Sanghyun Hong, Bo Fang:

Message from the DSML Workshop Chairs; DSN-W 2024. xiii - Simona De Vivo, Islam Obaidat

, Dong Dai, Pietro Liguori
:
DDoShield-IoT: A Testbed for Simulating and Lightweight Detection of IoT Botnet DDoS Attacks. 1-8 - Yuki Hagihara, Tadashi Dohi, Hiroyuki Okamura:

Performance Comparison of Bayesian Estimations on the Residual Number of Software Bugs. 9-16 - Naohiro Hayashibara, Kazuaki Kawabata:

Caching and Prefetching for Improving ORAM Performance. 17-20 - Kaoru Matsui, Xiao Xiao:

On Predicting Software Intensity Using Wavelets and Nonlinear Regression. 21-28 - Niklas Bunzel, Michel Geißler, Gerrit Klause:

Measuring the Effects of Environmental Influences on Object Detection. 29-31 - Larry Huynh, Jin B. Hong

, Ajmal Mian
, Hajime Suzuki, Seyit Camtepe:
Intrusion Detection Systems Using Quantum-Inspired Density Matrix Encodings. 32-38 - Niklas Bunzel

, Jannis Hamborg
:
Adversarial Patch Detection: Leveraging Depth Contrast for Enhanced Threat Visibility. 39-45 - Kealan Dunnett, Reza Arablouei

, Dimity Miller
, Volkan Dedeoglu, Raja Jurdak
:
Unlearning Backdoor Attacks Through Gradient-Based Model Pruning. 46-54 - René Klaus Nikiel, Meghdad Mirabi, Carsten Binnig:

TrustDDL: A Privacy-Preserving Byzantine-Robust Distributed Deep Learning Framework. 55-62 - Hans Dermot Doran, Suzana Veljanovska:

Hybrid Convolutional Neural Networks with Reliability Guarantee. 63-65 - Xiaoyun Xu, Oguzhan Ersoy, Behrad Tajalli, Stjepan Picek:

Universal Soldier: Using Universal Adversarial Perturbations for Detecting Backdoor Attacks. 66-73 - Xiaolei Wang, Bin Zhang, Chaojing Tang, Long Zhang:

Highly Comprehensive and Efficient Memory Safety Enforcement with Pointer Tagging. 74-81 - Anil Ranjitbhai Patel, Peter Liggesmeyer:

Enhancing Continuous Risk Assessment: The Role of Safety Engineers in Early Hazard Identification. 82-89 - Adam Bachorek, Benedikt Lüken-Winkels, Iron Prando da Silva

, Stefan Schwenk, Markus Damm, Pablo Oliveira Antonino:
Virtual Evaluation of Dependability Attributes for Mission-Critical Cyber-Physical Systems. 90-93 - Robin Thunig, Christoph Borchert, Urs Kober, Horst Schirmeier

:
Hybrid Hardware/Software Detection of Multi-Bit Upsets in Memory. 94-97 - Mazen Mohamad, Ramana Reddy Avula, Peter Folkesson, Pierre Kleberger, Aria Mirzai, Martin A. Skoglund, Marvin Damschen:

Cybersecurity Pathways Towards CE-Certified Autonomous Forestry Machines. 98-105

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














