Providing security guarantees for embedded devices with limited interfac...
The Android operating system is currently the most popular mobile operat...
Designing deep networks robust to adversarial examples remains an open
p...
A one-time program (OTP) works as follows: Alice provides Bob with the
i...
A protocol for two-party secure function evaluation (2P-SFE) aims to all...
Voice Processing Systems (VPSes), now widely deployed, have been made
si...
Establishing unique identities for both humans and end systems has been ...