EnCoD: Distinguishing Compressed and Encrypted File Fragments
|
2020 |
Gaspari, Fabio De |
Identity-Based Outsider Anonymous Broadcast Encryption with Simultaneous Individual Messaging
|
2020 |
Mandal, Mriganka |
Model Poisoning Defense on Federated Learning: A. Validation Based Approach
|
2020 |
Wang, Yuao |
Sequential Anomaly Detection Using Feedback and Prioritized Experience Replay
|
2020 |
Ellore, Anish Reddy |
AC° Constructions of Secret Sharing Schemes — Accommodating New Parties
|
2020 |
Chaudhury, Shion Samadder |
Privacy and Utility Trade-Off for Textual Analysis via Calibrated Multivariate Perturbations
|
2020 |
Tang, Jingye |
A Model Specification Implementation for Trust Negotiation
|
2020 |
Kolar, Martin |
ESCAPADE: Encryption-Type-Ransomware: System Call Based Pattern Detection
|
2020 |
Chew, Christopher Jun-Wen |
On the Vulnerability of Hyperdimensional Computing-Based Classifiers to Adversarial Attacks
|
2020 |
Yang, Fangfang |
Safety Analysis of High-Dimensional Anonymized Data from Multiple Perspectives.
|
2020 |
Yamazoe, Takaya |
A Weighted Voting Framework for Android App's Vetting Based on Multiple Machine Learning Models
|
2020 |
Hui, Honglei |
HyperWall: A Hypervisor for Detection and Prevention of Malicious Communication
|
2020 |
Kiperberg, Michael |
Graph Deep Learning Based Anomaly Detection in Ethereum Blockchain Network
|
2020 |
Patel, Vatsal |
The Impact of Differential Privacy on Model Fairness in Federated Learning
|
2020 |
Gu, Xiuting |
Defending Against Package Typosquatting
|
2020 |
Taylor, Matthew |
Fixing Vulnerabilities Automatically with Linters
|
2020 |
Rafnsson, Willard |
A Framework of Blockchain-Based Collaborative Intrusion Detection in Software Defined Networking
|
2020 |
Li, Wenjuan |
Multiply, Divide, and Conquer — Making Fully Decentralised Access Control a Reality
|
2020 |
Prünster, Bernd |
A Privacy Preserving Aggregation Scheme for Fog-Based Recommender System
|
2020 |
Wang, Xiaodong |
Evading Stepping-Stone Detection with Enough Chaff
|
2020 |
Clausen, Henry |