Increasing activity and the number of devices online are leading to
incr...
Malicious perturbations embedded in input data, known as Trojan attacks,...
Wireless ad hoc federated learning (WAFL) is a fully decentralized
colla...
Visual question answering (VQA) that leverages multi-modality data has
a...
Federated learning has allowed training of a global model by aggregating...
Anomaly detection has emerged as a popular technique for detecting malic...
Model poisoning attacks on federated learning (FL) intrude in the entire...
Media access control (MAC) addresses inside Wi-Fi packets can be used fo...
In cooperative ITS, security and privacy protection are essential.
Coope...
Phishing emails that appear legitimate lure people into clicking on the
...
Federated learning (FL) has been facilitating privacy-preserving deep
le...
The rapidly increasing number of smart devices on the Internet necessita...
Cooperative intelligent transportation systems (ITS) are used by autonom...
An attack on deep learning systems where intelligent machines collaborat...
A wider coverage and a better solution to latency reduction in 5G
necess...
With cyber incidents and data breaches becoming increasingly common, bei...