Showing 441–460 of 468 results
/ Date/ Name
Nov 20, 2017Model Extraction Warning in MLaaS ParadigmAug 16, 2017Spying on the Smart Home: Privacy Attacks and Defenses on Encrypted IoT TrafficJul 4, 2017A general framework for blockchain analyticsJun 15, 2017Horcrux: A Password Manager for ParanoidsJun 11, 2017Decentralized Certificate AuthoritiesMay 18, 2017DeepXplore: Automated Whitebox Testing of Deep Learning SystemsFeb 21, 2017GNSS Signal Authentication via Power and Distortion MonitoringFeb 18, 2017End-to-End Differentially-Private Parameter Tuning in Spatial HistogramsJan 15, 2017Static Detection of DoS Vulnerabilities in Programs that use Regular Expressions (Extended Version)Sep 26, 2016Differentially-Private Counting of Users' Spatial RegionsJun 3, 2016Physical Zero-Knowledge Proofs for Akari, Takuzu, Kakuro and KenKenMay 29, 2016SUIS: An Online Graphical Signature-Based User Identification SystemFeb 15, 2016DroidNative: Semantic-Based Detection of Android Native Code MalwareMay 1, 2013Network-Centric Quantum Communications with Application to Critical Infrastructure ProtectionJan 22, 2013Cryptanalysis and improvement of two certificateless three-party authenticated key agreement protocolsJan 9, 2013Generalized Secure Transmission Protocol for Flexible Load-Balance Control with Cooperative Relays in Two-Hop Wireless NetworksDec 29, 2012Exploring Relay Cooperation Scheme for Load-Balance Control in Two-hop Secure Communication SystemDec 3, 2012Exploring Relay Cooperation for Secure and Reliable Transmission in Two-Hop Wireless NetworksOct 30, 2012Algebraic properties of generalized Rijndael-like ciphersOct 8, 2012Lists that are smaller than their parts: A coding approach to tunable secrecy