Since the burgeoning days of IoT, Mirai has been established as the cano...
Anonymous microblogging systems are known to be vulnerable to intersecti...
The use of machine learning (ML) inference for various applications is
g...
Palm-based tactile displays have the potential to evolve from single mot...
The metaverse has recently gained increasing attention from the public. ...
The data collected from a vehicle's Controller Area Network (CAN) can qu...
In this work, we address the problem of unsupervised moving object
segme...
Federated learning (FL) enables a set of entities to collaboratively tra...
New types of malware are emerging at concerning rates. However, analyzin...
Publish/Subscribe systems like Twitter and Reddit let users communicate ...
Federated learning enables multiple users to build a joint model by shar...
Common deployment models for Edge Computing are based on (composable)
mi...
Federated learning suffers from several privacy-related issues that expo...
In this paper, we propose DeepAlign, a novel approach to multi-perspecti...
Sophisticated mass attacks, especially when exploiting zero-day
vulnerab...
Most research in the area of intrusion detection requires datasets to
de...
In this paper, we introduce BINet, a neural network architecture for
rea...
In the communication systems domain, constructing and maintaining networ...
Communication networks form the backbone of our society. Topology contro...
Businesses are naturally interested in detecting anomalies in their inte...
In today's data center, a diverse mix of throughput-sensitive long flows...
Despite years of intensive research in the field of software vulnerabili...
Defending against botnets has always been a cat and mouse game.
Cyber-se...
Trust Management (TM) systems for authentication are vital to the securi...