Nowadays, IoT devices integrate a wealth of third-party components (TPCs...
In recent years, REST API fuzzing has emerged to explore errors on a clo...
Currently, the development of IoT firmware heavily depends on third-part...
Facilitated by messaging protocols (MP), many home devices are connected...
One intriguing property of adversarial attacks is their "transferability...
A flurry of fuzzing tools (fuzzers) have been proposed in the literature...
In recent years, cyber-physical system (CPS) security as applied to robo...
In this paper, we study the privacy of online health data. We present a ...
Motivated by many existing security and privacy applications, e.g., netw...
Despite their immense popularity, deep learning-based acoustic systems a...
Following the principle of to set one's own spear against one's own shie...
Modern high-performance as well as power-constrained System-on-Chips (So...