In this paper, we present a novel Single-class target-specific Adversari...
Training highly performant deep neural networks (DNNs) typically require...
As a well-known physical unclonable function that can provide huge numbe...
Since Bitcoin appeared in 2009, over 6,000 different cryptocurrency proj...
Deep learning models have been shown to be vulnerable to recent backdoor...
Collaborative inference has recently emerged as an intriguing framework ...
A fundamental premise of SMS One-Time Password (OTP) is that the used
ps...
Federated learning (FL) and split learning (SL) are state-of-the-art
dis...
Ransomware is a growing threat that typically operates by either encrypt...
Convolutional Neural Networks (CNNs) deployed in real-life applications ...
As an essential processing step in computer vision applications, image
r...
This work provides the community with a timely comprehensive review of
b...
Image spam emails are often used to evade text-based spam filters that d...
Creating a state-of-the-art deep-learning system requires vast amounts o...
This work is the first attempt to evaluate and compare felderated learni...
A new collaborative learning, called split learning, was recently introd...
This work corroborates a run-time Trojan detection method exploiting STR...
Currently, miners typically join mining pools to solve cryptographic puz...
In Aug. 2017, Bitcoin was split into the original Bitcoin (BTC) and Bitc...
Online game involves a very large number of users who are interconnected...