This paper proposes a distributed deep learning framework for
privacy-pr...
Emerging Non-Volatile Memories (NVMs) bring a unique challenge to the
se...
The extensive use of smartphones and wearable devices has facilitated ma...
Computer-aided methods for analyzing white blood cells (WBC) have become...
Despite many attempts, the state-of-the-art of adversarial machine learn...
Tor and hidden services have emerged as a practical solution to protect ...
Audit logs serve as a critical component in enterprise business systems ...
In this paper, we systematically explore the attack surface of the Block...
Thousands of malicious applications targeting mobile devices, including ...
The main goal of this study is to investigate the robustness of graph-ba...
In the zettabyte era, per-flow measurement becomes more challenging owin...
The growth in the number of Android and Internet of Things (IoT) devices...
In this paper, we explore the partitioning attacks on the Bitcoin networ...
The lack of security measures in the Internet of Things (IoT) devices an...
Using runtime execution artifacts to identify malware and its associated...
Audit logs serve as a critical component in the enterprise business syst...
Selfish mining is a well known vulnerability in blockchains exploited by...
In-browser cryptojacking involves hijacking the CPU power of a website's...