Deep Neural Network (DNN) models are often deployed in resource-sharing
...
Deepfakes have become a growing concern in recent years, prompting
resea...
Security Application Programming Interfaces (APIs) play a vital role in
...
The metaverse has gained significant attention from various industries d...
The rise of cyber threats on critical infrastructure and its potential f...
Recent rapid advancements in deepfake technology have allowed the creati...
Split learning (SL) aims to protect user data privacy by splitting deep
...
Training highly performant deep neural networks (DNNs) typically require...
Location trajectories collected by smartphones and other devices represe...
Object detection is the foundation of various critical computer-vision t...
Web-based phishing accounts for over 90
web-browsers and security vendor...
Split learning (SL) enables data privacy preservation by allowing client...
Cyber-phishing attacks recently became more precise, targeted, and tailo...
Deep learning models have been shown to be vulnerable to recent backdoor...
A backdoor deep learning (DL) model behaves normally upon clean inputs b...
There is currently a burgeoning demand for deploying deep learning (DL)
...
Spear Phishing is a harmful cyber-attack facing business and individuals...
The diversity and quantity of the data warehousing, gathering data from
...
There are now many adversarial attacks for natural language processing
s...
Convolutional Neural Networks (CNNs) deployed in real-life applications ...
As an essential processing step in computer vision applications, image
r...