1. Bushra A. Alahmadi Louise Axon and Ivan Martinovic. 2022. 99% False Positives: A Qualitative Study of SOC Analysts' Perspectives on Security Alarms. In USENIX Security.
2. 017)]% alrwais2017the, Sumayah A. Alrwais, Xiaojing Liao, Xianghang Mi, Peng Wang, Xiaofeng Wang, Feng Qian, RaheemA. Beyah, and Damon McCoy. 2017. Under the Shadow of Sunshine: Understanding and Detecting Bulletproof Hosting on Legitimate Service Provider Networks. In IEEE S&P.
3. Yousra Aafer Wei You Yi Sun Yu Shi Xiangyu Zhang and Heng Yin. 2021. Android SmartTVs Vulnerability Discovery via Log-Guided Fuzzing. In USENIX Security.
4. Martín Abadi H. Brendan McMahan Andy Chu Ian Goodfellow Ilya Mironov Kunal Talwar and Li Zhang. 2016. Deep Learning with Differential Privacy. In ACM CCS.
5. Sahar Abdelnabi and Mario Fritz. 2021. Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding. In IEEE S&P.