The success of machine learning (ML) has been accompanied by increased
c...
Cyberspace is a fragile construct threatened by malicious cyber operatio...
Background: The kidney exchange problem (KEP) addresses the matching of
...
Physical isolation, so called air-gapping, is an effective method for
pr...
Recently, a number of backdoor attacks against Federated Learning (FL) h...
We investigate the decidability and computational complexity of conserva...
In this work, we provide an industry research view for approaching the
d...
Performing machine learning tasks in mobile applications yields a challe...
AI algorithms, and machine learning (ML) techniques in particular, are
i...
In many voice biometrics applications there is a requirement to preserve...
Privacy-preserving scalar product (PPSP) protocols are an important buil...
Today, rail vehicle localization is based on infrastructure-side Balises...
External effects such as shocks and temperature variations affect the
ca...
One possibility to break down the capacity limit in optical transmission...
This paper discusses a large-scale and long-term mapping and localizatio...
Industrial facilities often require periodic visual inspections of key
i...
We present Chameleon, a novel hybrid (mixed-protocol) framework for secu...
Robust and accurate visual-inertial estimation is crucial to many of tod...
Qualitative spatial and temporal reasoning is based on so-called qualita...
Extracting a subset of a given OWL ontology that captures all the ontolo...