Memory corruption attacks (MCAs) refer to malicious behaviors of system
...
Membership inference (MI) attacks threaten user privacy through determin...
Federated Learning (FL) is a widely adopted privacy-preserving machine
l...
Metaverse is a vast virtual environment parallel to the physical world i...
Artificial intelligence and machine learning have been integrated into a...
To fight against infectious diseases (e.g., SARS, COVID-19, Ebola, etc.)...
Mobile and IoT applications have greatly enriched our daily life by prov...
Federated learning has become prevalent in medical diagnosis due to its
...
Getting access to labelled datasets in certain sensitive application dom...
The application of federated extreme gradient boosting to mobile crowdse...
Federated learning is a decentralized machine learning technique that ev...
In this paper, we incorporate the realistic scenario of key protection i...
Covert communication can prevent an adversary from knowing that a wirele...
Covert wireless communication or low probability of detection (LPD)
comm...
Covert wireless communication can prevent an adversary from knowing the
...
As a representative sequential pattern mining problem, counting the freq...
Covert communication can prevent the opponent from knowing that a wirele...
The influence maximization (IM) problem as defined in the seminal paper ...