While user authentication happens before initiating or resuming a login
...
To fight climate change, new "green" technology are emerging, most of th...
Lithium-ion (Li-ion) batteries are the primary power source in various
a...
Federated learning enables collaborative training of machine learning mo...
Physical unclonable functions (PUFs) are hardware-oriented primitives th...
Time-relevant and accurate threat information from public domains are
es...
Evasion attacks are a threat to machine learning models, where adversari...
In February 2022, Russia launched a full-scale invasion of Ukraine. This...
For many years, car keys have been the sole mean of authentication in
ve...
Recently, researchers have successfully employed Graph Neural Networks (...
Search engines are vulnerable to attacks against indexing and searching ...
Social Honeypots are tools deployed in Online Social Networks (OSN) to
a...
Crypto-ransomware attacks have been a growing threat over the last few y...
The automatic extraction of information from Cyber Threat Intelligence (...
Today, we rely on contactless smart cards to perform several critical
op...
With 1.3 billion users, Instagram (IG) has also become a business tool. ...
Electric Vehicles (EVs) share common technologies with classical
fossil-...
One of the innovations brought by Mirai and its derived malware is the
a...
A backdoor attack places triggers in victims' deep learning models to en...
Membership Inference Attacks (MIAs) infer whether a data point is in the...
Existing literature on adversarial Machine Learning (ML) focuses either ...
With the advent of smart industry, Industrial Control Systems (ICS) are
...
Did you know that over 70 million of Dota2 players have their in-game da...
Electric vehicles (EVs) represent the long-term green substitute for
tra...
Virtual and Augmented Reality (VR, AR) are increasingly gaining traction...
Hyperloop is among the most prominent future transportation systems. Fir...
Internet usage has changed from its first design. Hence, the current Int...
Dynamic wireless power transfer provides means for charging Electric Veh...
Graph Neural Networks (GNNs), inspired by Convolutional Neural Networks
...
Due to the frequent unauthorized access by commercial drones to Critical...
Recent advancements in wireless charging technology, as well as the
poss...
Visible Light Communication (VLC) is one the most promising enabling
tec...
Channel hopping provides a defense mechanism against jamming attacks in ...
The high configurability and low cost of Reflective Intelligent Surfaces...
Smart Contracts (SCs) publicly deployed on blockchain have been shown to...
Embedded devices are ubiquitous. However, preliminary evidence shows tha...
To support the increasing spread of Electric Vehicles (EVs), Charging
St...
Enhancing Network Intrusion Detection Systems (NIDS) with supervised Mac...
Outsourced training and machine learning as a service have resulted in n...
Nowadays, people generate and share massive content on online platforms
...
Automated Teller Machines (ATMs) represent the most used system for
with...
In the 21st century, the industry of drones, also known as Unmanned Aeri...
Deep neural networks represent a powerful option for many real-world
app...
EVs (Electric Vehicles) represent a green alternative to traditional
fue...
Users online tend to consume information adhering to their system of bel...
The increased demand for machine learning applications made companies of...
Recently, Unmanned Aerial Vehicles (UAVs) are employed for a plethora of...
The increasing digitization and interconnection of legacy Industrial Con...
The impact of global warming and the imperative to limit climate change ...
Automated contact tracing is a key solution to control the spread of air...