Optical Character Recognition (OCR) enables automatic text extraction fr...
Deep neural networks are proven to be vulnerable to backdoor attacks.
De...
Adversarial example is a rising way of protecting facial privacy securit...
We present a framework for robust electric network frequency (ENF) extra...
Power system frequency could be captured by digital recordings and extra...
It is well established that neural networks are vulnerable to adversaria...
Searchable symmetric encryption (SSE) allows the data owner to outsource...
Although many classical IP geolocation algorithms are suitable to
rich-c...
Audio steganography is a collection of techniques for concealing the
exi...