Deep Neural Network (DNN) models are often deployed in resource-sharing
...
Deep neural networks (DNNs) have achieved state-of-the-art performance o...
Deep learning models have achieved state-of-the-art performances in vari...
The proliferation of connected devices through Internet connectivity pre...
Facial forgery detection is a crucial but extremely challenging topic, w...
Forgery facial images and videos have increased the concern of digital
s...
Emulation-based fuzzers enable testing binaries without source code, and...
Designing visually appealing layouts for multimedia documents containing...
Generative models with discrete latent representations have recently
dem...
Training highly performant deep neural networks (DNNs) typically require...
Location trajectories collected by smartphones and other devices represe...
Deception is rapidly growing as an important tool for cyber defence,
com...
The large transformer-based language models demonstrate excellent perfor...
Cloud-enabled Machine Learning as a Service (MLaaS) has shown enormous
p...
Honeyfile deployment is a useful breach detection method in cyber decept...
Each and every organisation releases information in a variety of forms
r...
Federated learning (FL) is a collaborative learning approach that has ga...
Rowhammer has drawn much attention from both academia and industry in th...
Cyber deception is emerging as a promising approach to defending network...
Outsourcing decision tree inference services to the cloud is highly
bene...
Given the ubiquity of memory in commodity electronic devices, fingerprin...
An integrated clinical environment (ICE) enables the connection and
coor...
Spear Phishing is a harmful cyber-attack facing business and individuals...
The proliferation of Internet of Things (IoT) devices has made people's ...
Previous robustness approaches for deep learning models such as data
aug...
The diversity and quantity of the data warehousing, gathering data from
...
Federated learning enables multiple participants to collaboratively trai...
Collaborative inference has recently emerged as an intriguing framework ...
A fundamental premise of SMS One-Time Password (OTP) is that the used
ps...
Federated learning (FL) and split learning (SL) are state-of-the-art
dis...
There are now many adversarial attacks for natural language processing
s...
We propose a roadmap for leveraging the tremendous opportunities the Int...
Ransomware is a growing threat that typically operates by either encrypt...
Convolutional Neural Networks (CNNs) deployed in real-life applications ...
We have witnessed the continuing arms race between backdoor attacks and ...
Elasticity is a form of self-adaptivity in cloud-based software systems ...
As an essential processing step in computer vision applications, image
r...
Artificial intelligence (AI) has been applied in phishing email detectio...
This work provides the community with a timely comprehensive review of
b...
Rowhammer is a hardware vulnerability in DRAM memory, where repeated acc...
Computer users are generally faced with difficulties in making correct
s...
Machine learning models have demonstrated vulnerability to adversarial
a...
Smart meters have currently attracted attention because of their high
ef...
As communities represent similar opinions, similar functions, similar
pu...
As recently emerged rowhammer exploits require undocumented DRAM address...
This work is the first attempt to evaluate and compare felderated learni...
A new collaborative learning, called split learning, was recently introd...
We address the issue of having a limited number of annotations for stanc...
The security of our data stores is underestimated in current practice, w...
Organizations use diverse types of security solutions to prevent
cyberat...