Attacks against industrial control systems (ICSs) often exploit the
insu...
Provenance embedding algorithms are well known for tracking the footprin...
Without the need of a clean reference, non-intrusive speech assessment
m...
Due to the recent outbreak of COVID-19, many governments suspended outdo...
Blockchain interoperability, which allows state transitions across diffe...
We propose a new adversarial attack on frequency-hopping based wireless
...
We study the impact of signal jamming attacks against the communication ...
The detection of network flows that send excessive amounts of traffic is...
In this paper, we introduce a strong adversarial attack, referred to as ...
Today's cloud networks are shared among many tenants. Bandwidth guarante...
Today's cloud networks are shared among many tenants. Bandwidth guarante...