Recent studies on transfer learning have shown that selectively fine-tun...
Speculative execution attacks leverage the speculative and out-of-order
...
Deep neural network based medical image systems are vulnerable to advers...
In cloud computing, it is desirable if suspicious activities can be dete...
Impostors are attackers who take over a smartphone and gain access to th...
As mobile devices are becoming ubiquitous, regularly interacting with a
...
Deep neural networks (DNNs) for medical images are extremely vulnerable ...
Spectre and Meltdown attacks and their variants exploit hardware perform...
Recent methods in multiple landmark detection based on deep convolutiona...
In this paper, we show that sensor-based impostor detection with deep
le...
Deep learning has become popular, and numerous cloud-based services are
...
Attacks against the control processor of a power-grid system, especially...