Deep neural networks (DNNs) have achieved state-of-the-art performance o...
Deep learning models have achieved state-of-the-art performances in vari...
Quantum-inspired Machine Learning (QiML) is a burgeoning field, receivin...
Ability to test firmware on embedded devices is critical to discovering
...
As cyber threats evolve and grow progressively more sophisticated, cyber...
DDoS attacks involve overwhelming a target system with a large number of...
Tabular data sharing serves as a common method for data exchange. Howeve...
Physical-layer authentication is a popular alternative to the convention...
Software vulnerabilities existing in a program or function of computer
s...
We consider the multi-user detection (MUD) problem in uplink grant-free
...
Compression also known as entropy coding has a rich and long history.
Ho...
Solutions for rapid prioritization of different ransomware have been rai...
Interpretable machine learning offers insights into what factors drive a...
Graph Neural Networks (GNNs) have achieved tremendous success in many gr...
Anomaly detection for indoor air quality (IAQ) data has become an import...
The large transformer-based language models demonstrate excellent perfor...
Biometric data, such as face images, are often associated with sensitive...
Federated learning (FL) is a collaborative learning approach that has ga...
Ransomware defense solutions that can quickly detect and classify differ...
The Android system manages access to sensitive APIs by permission
enforc...
Malware authors apply different obfuscation techniques on the generic fe...
Vehicle-to-vehicle communication enables autonomous platoons to boost tr...
Federated Learning (FL), Split Learning (SL), and SplitFed Learning (SFL...
An integrated clinical environment (ICE) enables the connection and
coor...
Ransomware is a growing threat that typically operates by either encrypt...
Contrastive learning (CL) has recently emerged as an effective approach ...
Precision health leverages information from various sources, including o...
Personally identifiable information (PII) can find its way into cyberspa...
The rapid spread of COVID-19 has made traditional manual contact tracing...
Federated learning (FL) and split learning (SL) are two recent distribut...
Fuzzing is a promising technique for detecting security vulnerabilities....