Showing 1–14 of 14 results
/ Date/ Name
Sep 12, 2025Enhancing LLM-based Specification Generation via Program Slicing and Logical DeletionSep 17, 2024An Anti-disguise Authentication System Using the First Impression of Avatar in MetaverseJul 12, 2023SoK: Comparing Different Membership Inference Attacks with a Comprehensive BenchmarkSep 19, 2022A Secure Authentication Framework to Guarantee the Traceability of Avatars in MetaverseJan 24, 2022Backdoor Defense with Machine UnlearningSep 23, 2020Pocket Diagnosis: Secure Federated Learning against Poisoning Attack in the CloudMay 9, 2020Cloud-based Federated Boosting for Mobile CrowdsensingMar 24, 2020Learn to Forget: Machine Unlearning via Neuron MaskingMay 16, 2018Covert Wireless Communications with Active Eavesdropper on AWGN ChannelsDec 14, 2017The Sound and the Fury: Hiding Communications in Noisy Wireless Networks with Interference UncertaintyJan 9, 2013Generalized Secure Transmission Protocol for Flexible Load-Balance Control with Cooperative Relays in Two-Hop Wireless NetworksDec 29, 2012Exploring Relay Cooperation Scheme for Load-Balance Control in Two-hop Secure Communication SystemDec 3, 2012Exploring Relay Cooperation for Secure and Reliable Transmission in Two-Hop Wireless NetworksMay 15, 2008Secure Network Coding Against the Contamination and Eavesdropping Adversaries