This thesis explores open-sourced machine learning (ML) model explanatio...
File formats specify how data is encoded for persistent storage. They ca...
The deep feedforward neural networks (DNNs) are increasingly deployed in...
Millions of consumers depend on smart camera systems to remotely monitor...
Millions of consumers depend on smart camera systems to remotely monitor...
The existence of native code in Android apps plays an essential role in
...
The misunderstanding and incorrect configurations of cryptographic primi...
Dynamic taint analysis (DTA) has been widely used in various
security-re...
Recent IoT applications gradually adapt more complicated end systems wit...
In this paper, we present a derivative-based, functional recognizer and
...
IoT devices are decentralized and deployed in un-stable environments, wh...
Just-in-time return-oriented programming (JIT-ROP) technique allows one ...
Control-flow hijacking attacks are used to perform malicious com-putatio...
Recent advances in Internet of Things (IoT) have enabled myriad domains ...
Broadly defined as the Internet of Things (IoT), the growth of commodity...
Broadly defined as the Internet of Things (IoT), the growth of commodity...