Container technology, as the key enabler behind microservice architectur...
In NFV networks, service functions (SFs) can be deployed on virtual mach...
Processing sensitive data and deploying well-designed Intellectual Prope...
Federated Learning (FL), a privacy-oriented distributed ML paradigm, is ...
Stubborn mining attack greatly downgrades Bitcoin throughput and also
be...
Fully homomorphic encryption (FHE) has experienced significant developme...
GHOST, like the longest-chain protocol, is a chain selection protocol an...
Bitcoin and Ethereum are the top two blockchain-based cryptocurrencies
w...
White-box Adversarial Example (AE) attacks towards Deep Neural Networks
...
The widespread application of deep neural network (DNN) techniques is be...
Recent research has proved that deep neural networks (DNNs) are vulnerab...
Malware is being increasingly threatening and malware detectors based on...
Deep learning (DL) models for image-based malware detection have exhibit...
Blockchain technology has been attracting much attention from both acade...