All
Images
Videos
Maps
News
Shopping
More
Flights
Travel
Hotels
Search
Notebook
Report an inappropriate content
Please select one of the options below.
Not Relevant
Offensive
Adult
Child Sexual Abuse
Length
All
Short (less than 5 minutes)
Medium (5-20 minutes)
Long (more than 20 minutes)
Date
All
Past 24 hours
Past week
Past month
Past year
Resolution
All
Lower than 360p
360p or higher
480p or higher
720p or higher
1080p or higher
Source
All
Dailymotion
Vimeo
Metacafe
Hulu
VEVO
Myspace
MTV
CBS
Fox
CNN
MSN
Price
All
Free
Paid
Clear filters
SafeSearch:
Moderate
Strict
Moderate (default)
Off
Filter
12:59
YouTube
USENIX
USENIX Security '22 - Poison Forensics: Traceback of Data Poisoning Attacks in Neural Networks
USENIX Security '22 - Poison Forensics: Traceback of Data Poisoning Attacks in Neural Networks Shawn Shan, Arjun Nitin Bhagoji, Haitao Zheng, and Ben Y. Zhao, University of Chicago In adversarial machine learning, new defenses against attacks on deep learning systems are routinely broken soon after their release by more powerful attacks. In ...
901 views
Oct 27, 2022
USENIX Conference
Resilient Distributed Datasets: A {Fault-Tolerant} Abstraction for {In-Memory} Cluster Computing
usenix.org
Jan 15, 2014
Comprehensive Experimental Analyses of Automotive Attack Surfaces
usenix.org
Mar 2, 2012
{ZooKeeper}: Wait-free Coordination for Internet-scale Systems
usenix.org
Feb 22, 2013
Top videos
12:25
USENIX Security '22 - Experimenting with Collaborative zk-SNARKs: Zero-Knowledge Proofs for
YouTube
USENIX
996 views
Oct 28, 2022
11:47
USENIX Security '22 - GET /out: Automated Discovery of Application-Layer Censorship Evasion...
YouTube
USENIX
508 views
Oct 25, 2022
12:30
USENIX Security '24 - Double Face: Leveraging User Intelligence to Characterize and Recognize...
YouTube
USENIX
35 views
4 months ago
USENIX Security Symposium
cloaking-malware-trusted-platform-module
usenix.org
Mar 2, 2012
Post-quantum Key {Exchange—A} New Hope
usenix.org
Jun 4, 2016
Alice in Warningland: A {Large-Scale} Field Study of Browser Security Warning Effectiveness
usenix.org
Jan 1, 2009
12:25
USENIX Security '22 - Experimenting with Collaborative
…
996 views
Oct 28, 2022
YouTube
USENIX
11:47
USENIX Security '22 - GET /out: Automated Discovery of Applicati
…
508 views
Oct 25, 2022
YouTube
USENIX
12:30
USENIX Security '24 - Double Face: Leveraging User Intelligence to C
…
35 views
4 months ago
YouTube
USENIX
12:29
USENIX Security '21 - CURE: A Security Architecture with CUsto
…
549 views
Sep 3, 2021
YouTube
USENIX
13:43
USENIX Security '24 - ClearStamp: A Human-Visible and Robust Model
…
9 views
4 months ago
YouTube
USENIX
12:50
USENIX Security '22 - Exploring the Unchartered Space of Container R
…
438 views
Oct 25, 2022
YouTube
USENIX
12:40
USENIX Security '24 - A Mixed-Methods Study on User Experienc
…
6 views
4 months ago
YouTube
USENIX
10:23
USENIX Security '22 - Security and Privacy Perceptions of Third-Part
…
606 views
Oct 27, 2022
YouTube
USENIX
12:00
USENIX Security '24 - All Your Tokens are Belong to Us: Demysti
…
27 views
4 months ago
YouTube
USENIX
12:14
USENIX Security '22 - V'CER: Efficient Certificate Validation in C
…
173 views
Oct 27, 2022
YouTube
USENIX
14:51
USENIX Security '24 - AttackGNN: Red-Teaming GNNs in Hardware S
…
101 views
4 months ago
YouTube
USENIX
13:05
USENIX Security '22 - OVRseen: Auditing Network Traffic and Priv
…
386 views
Oct 27, 2022
YouTube
USENIX
12:33
USENIX Security '24 - Unveiling IoT Security in Reality: A Firmware-Ce
…
4 months ago
YouTube
USENIX
12:09
USENIX Security '24 - "You have to read 50 different RFCs that contra
…
242 views
4 months ago
YouTube
USENIX
13:15
USENIX Security '24 - On the Criticality of Integrity Protection i
…
71 views
4 months ago
YouTube
USENIX
11:30
USENIX Security '24 - An Interview Study on Third-Party Cyber Threa
…
175 views
4 months ago
YouTube
USENIX
11:28
USENIX Security '21 - Extracting Training Data from Large Languag
…
2.9K views
Sep 5, 2021
YouTube
USENIX
46:36
USENIX Security '24 - A World Where We Trust Hard-Won Lesso
…
271 views
4 months ago
YouTube
USENIX
12:41
USENIX Security '24 - GPU Memory Exploitation for Fun and Profit
4 months ago
YouTube
USENIX
19:32
USENIX ATC '24 - Expeditious High-Concurrency MicroVM SnapStart i
…
45 views
6 months ago
YouTube
USENIX
10:46
USENIX Security '24 - FaceObfuscator: Defending Deep
…
71 views
4 months ago
YouTube
USENIX
15:24
USENIX Security '24 - Eye of Sauron: Long-Range Hidden Spy
…
4 months ago
YouTube
USENIX
11:48
USENIX Security '24 - GoFetch: Breaking Constant-Time Cryptogr
…
81 views
4 months ago
YouTube
USENIX
20:35
USENIX ATC '22 - AlNiCo: SmartNIC-accelerated Contentio
…
177 views
Sep 15, 2022
YouTube
USENIX
13:52
USENIX Security '24 - "I feel physically safe but not politically
…
98 views
4 months ago
YouTube
USENIX
13:26
USENIX Security '24 - Rethinking the Security Threats of Stale DNS
…
73 views
4 months ago
YouTube
USENIX
13:09
USENIX Security '24 - Atropos: Effective Fuzzing of Web Applicati
…
86 views
4 months ago
YouTube
USENIX
20:11
USENIX ATC '22 - Amazon DynamoDB: A Scalable, Predictab
…
4.1K views
Sep 15, 2022
YouTube
USENIX
13:37
USENIX Security '24 - Arcanum: Detecting and Evaluating the Priv
…
38 views
4 months ago
YouTube
USENIX
See more videos
More like this
Feedback