Many of our critical infrastructure systems and personal computing syste...
While prior domain generalization (DG) benchmarks consider train-test da...
Modern Byzantine Fault-Tolerant State Machine Replication (BFT-SMR) solu...
Secure aggregation promises a heightened level of privacy in federated
l...
Security and privacy are important concerns in machine learning. End use...
Weather and soil conditions are particularly important when it comes to
...
Smart manufacturing systems are being deployed at a growing rate because...
Efficient and adaptive computer vision systems have been proposed to mak...
Federated learning—multi-party, distributed learning in a decentralized
...
Federated learning allows a large number of devices to jointly learn a m...
While previous distribution shift detection approaches can identify if a...
We consider a security game in a setting consisting of two players (an
a...
IoT systems have been facing increasingly sophisticated technical proble...
Adversarial examples (AEs) are images that can mislead deep neural netwo...
We model the behavioral biases of human decision-making in securing
inte...
In recent years, edge computing has become a popular choice for
latency-...
Advanced video analytic systems, including scene classification and obje...
We study the problem of learning data representations that are private y...
The recent advancement of the Internet of Things (IoT) enables the
possi...
Decades of continuous scaling has reduced the energy of unit computing t...
The field of IoT has blossomed and is positively influencing many applic...
We study the security of large-scale cyber-physical systems (CPS) consis...
We study a setting where each agent in a network receives certain privat...
We consider a system consisting of multiple interdependent assets, and a...
A set of about 80 researchers, practitioners, and federal agency program...
Cyberphysical systems (CPS) are ubiquitous in our personal and professio...
Storage has become a constrained resource on smartphones. Gaming is a po...
Adversarial examples (AEs) are images that can mislead deep neural netwo...
Videos take lot of time to transport over the network, hence running
ana...
YouTube is the leading social media platform for sharing videos. As a re...
The performance of most error-correction algorithms that operate on geno...
Distributed monitoring plays a crucial role in managing the activities o...
The widespread proliferation of sensor nodes in the era of Internet of T...
Edge computing is the practice of placing computing resources at the edg...