Tabular data sharing serves as a common method for data exchange. Howeve...
Biometric data, such as face images, are often associated with sensitive...
Federated learning (FL) is a collaborative learning approach that has ga...
The proliferation of Internet of Things (IoT) devices has made people's ...
Rowhammer is a hardware vulnerability in DRAM memory, where repeated acc...
Personally identifiable information (PII) can find its way into cyberspa...
Network Function Virtualisation (NFV) advances the development of compos...
Rowhammer exploits frequently access specific DRAM rows (i.e., hammer ro...
Outlier detection is widely used in practice to track the anomaly on
inc...
In this paper, we propose GraphSE^2, an encrypted graph database for onl...
The Internet of Things (IoT) is experiencing explosive growth and has ga...
Commodity OS kernels have broad attack surfaces due to the large code ba...
Commodity OS kernels are known to have broad attack surfaces due to the ...