Authorship attribution has become increasingly accurate, posing a seriou...
Recent natural language processing (NLP) techniques have accomplished hi...
Demands are increasing to measure per-flow statistics in the data plane ...
The rapid growth of the Internet of Things (IoT) devices is paralleled b...
The Linux shell is a command-line interpreter that provides users with a...
The lack of security measures among the Internet of Things (IoT) devices...
Social media has become an essential part of the daily routines of child...
Deep learning models are widely used in a range of application areas, su...
The wide acceptance of Internet of Things (IoT) for both household and
i...
The wide acceptance of Internet of Things (IoT) for both household and
i...
Mobile devices and technologies have become increasingly popular, offeri...
Computer-aided methods for analyzing white blood cells (WBC) have become...
Despite many attempts, the state-of-the-art of adversarial machine learn...
In this paper, we systematically explore the attack surface of the Block...
In the zettabyte era, per-flow measurement becomes more challenging owin...
The growth in the number of Android and Internet of Things (IoT) devices...
The lack of security measures in the Internet of Things (IoT) devices an...
Using runtime execution artifacts to identify malware and its associated...
Owing to Satoshi Nakamoto's brilliant idea, a P2P public ledger is shown...