Fast Identity Online 2 (FIDO2), a modern authentication protocol, is gai...
Web authentication is a critical component of today's Internet and the
d...
Biometric authentication service providers often claim that it is not
po...
Artificial Intelligence (AI) systems have been increasingly used to make...
Named entity recognition models (NER), are widely used for identifying n...
Lack of trust between organisations and privacy concerns about their dat...
Machine Learning (ML) techniques are used by most data-driven organisati...
Deep neural networks (DNNs) have been proven vulnerable to backdoor atta...
Voice interfaces and assistants implemented by various services have bec...
Voice interfaces and assistants implemented by various services have bec...
We describe and evaluate an attack that reconstructs the histogram of an...
We present a differentially private mechanism to display statistics (e.g...
The monitoring of large dynamic networks is a major chal- lenge for a wi...