Many critical applications rely on cameras to capture video footage for
...
Internet of Things (IoT) platforms enable users to deploy home automatio...
Emerging Internet of Thing (IoT) platforms provide a convenient solution...
Adversarial examples (AEs) are crafted by adding human-imperceptible
per...
Given a closed-source program, such as most of proprietary software and
...
Despite the great achievements made by neural networks on tasks such as ...
Exploitation of heap vulnerabilities has been on the rise, leading to ma...
The contextual information (i.e., the time and location) in which a phot...
Binary code analysis allows analyzing binary code without having access ...