All Stories

  1. Leveraging the Power of Conversations: Optimal Key Term Selection in Conversational Contextual Bandits
  2. Towards Efficient Conversational Recommendations: Expected Value of Information Meets Bandit Learning
  3. Zigbee’s Network Rejoin Procedure for IoT Systems: Vulnerabilities and Implications
  4. MirChecker: Detecting Bugs in Rust Programs via Static Analysis
  5. Securing the Device Drivers of Your Embedded Systems