Showing 1–20 of 44 results
/ Date/ Name
May 23, 2017TwiInsight: Discovering Topics and Sentiments from Social Media DatasetsApr 27, 2021Confined Gradient Descent: Privacy-preserving Optimization for Federated LearningJun 24, 2022Adversarial Robustness of Deep Neural Networks: A Survey from a Formal Verification PerspectiveJan 5, 2024Beyond Fidelity: Explaining Vulnerability Localization of Learning-based DetectorsApr 29, 2025Detecting Manipulated Contents Using Knowledge-Grounded InferenceOct 27, 2025A Multi-Store Privacy Measurement of Virtual Reality App EcosystemSep 16, 2024Assessing Privacy Compliance of Android Third-Party SDKsJun 18, 2025Beyond the Scope: Security Testing of Permission Management in Team WorkspaceJan 20, 2026SecureSplit: Mitigating Backdoor Attacks in Split LearningFeb 12, 2026MedExChain: Enabling Secure and Efffcient PHR Sharing Across Heterogeneous BlockchainsMar 12, 2021ColdPress: An Extensible Malware Analysis Platform for Threat IntelligenceApr 12, 2018Analyzing Use of High Privileges on Android: An Empirical Case Study of Screenshot and Screen Recording ApplicationsSep 8, 2025Embedding Poisoning: Bypassing Safety Alignment via Embedding Semantic ShiftJun 18, 2025Tracking GPTs Third Party Service: Automation, Analysis, and InsightsSep 20, 2025RelRepair: Enhancing Automated Program Repair by Retrieving Relevant CodeOct 24, 2025QAE-BAC: Achieving Quantifiable Anonymity and Efficiency in Blockchain-Based Access Control with AttributeMar 13, 2026AI Model Modulation with Logits RedistributionFeb 11, 2026Mitigating Gradient Inversion Risks in Language Models via Token ObfuscationDec 20, 2023Symbolic Security Verification of Mesh Commissioning Protocol in Thread (extended version)Feb 2, 2025TrojanTime: Backdoor Attacks on Time Series Classification