Showing 1–20 of 41 results
/ Date/ Name
May 17, 2021RAIDER: Reinforcement-aided Spear Phishing DetectorMay 3, 2021OCTOPUS: Overcoming Performance andPrivatization Bottlenecks in Distributed LearningNov 22, 2012Evolving hypersurfaces by their inverse null mean curvatureMar 26, 2023Deepfake in the Metaverse: Security Implications for Virtual Gaming, Meetings, and OfficesNov 21, 2021Modelling Direct Messaging Networks with Multiple Recipients for Cyber DeceptionMay 10, 2021Robust Training Using Natural TransformationMar 13, 2015Null mean curvature flow and outermost MOTSAug 15, 2022Deception for Cyber Defence: Challenges and OpportunitiesFeb 25, 2023Why Do Facial Deepfake Detectors Fail?May 30, 2023DualVAE: Controlling Colours of Generated and Real ImagesJun 11, 2021A comprehensive solution to retrieval-based chatbot constructionJan 22, 2026TempoNet: Learning Realistic Communication and Timing Patterns for Network Traffic SimulationMar 21, 2022PublicCheck: Public Integrity Verification for Services of Run-time Deep ModelsNov 24, 2022DeepTaster: Adversarial Perturbation-Based Fingerprinting to Identify Proprietary Dataset Use in Deep Neural NetworksFeb 5, 2024Learning with Mixture of Prototypes for Out-of-Distribution DetectionApr 4, 2024An Investigation into Misuse of Java Security APIs by Large Language ModelsJul 1, 2024DeepiSign-G: Generic Watermark to Stamp Hidden DNN Parameters for Self-contained TrackingJun 28, 2024Optimizing Cyber Defense in Dynamic Active Directories through Reinforcement LearningOct 18, 2024From Solitary Directives to Interactive Encouragement! LLM Secure Code Generation by Natural Language PromptingJun 16, 2025From Promise to Peril: Rethinking Cybersecurity Red and Blue Teaming in the Age of LLMs