Machine learning is often used for malicious website detection, but an
a...
Vulnerabilities of Ethereum smart contracts often cause serious financia...
Taxi-demand prediction is an important application of machine learning t...
When an adversary provides poison samples to a machine learning model,
p...
Diffusion models have attracted attention in recent years as innovative
...
IoT technology has been developing rapidly, while at the same time, it r...
Model extraction attacks are a kind of attacks where an adversary obtain...
Ethereum smart contracts are programs that run on the Ethereum blockchai...
The BGPsec protocol, which is an extension of the border gateway
protoco...
In the information age, a secure and stable network environment is essen...
Ethereum smart contracts are programs that are deployed and executed in ...
Model extraction attacks are a kind of attacks in which an adversary obt...
In the use of a cloud storage, sharing of data with efficient access con...
A privacy-preserving framework in which a computational resource provide...