Computer Science, Cryptography and Security
Category: Cryptography and Security
Page 2/7
Computer Science, Cryptography and Security
Enhancing Data Security with Forecasting Models
Computer Science, Cryptography and Security
Exploring Explainability Metrics: A Comparison of Approaches in Deep Learning
Computer Science, Cryptography and Security
Microaggregation-Based Data Masking for Differential Privacy: A Sensitivity Reduction Approach
Computer Science, Cryptography and Security
Machine Learning and Knowledge Graphs for Intrusion Detection in Smart Grids: A Comparative Study
Computer Science, Cryptography and Security
Optimal Mechanisms for Interactive Authentication
Computer Science, Cryptography and Security
Privacy-Aware Data Analysis: Beyond Differential Privacy
Computer Science, Cryptography and Security
Reduction and Recursion of Semidirect Product Decomposition in Finite Groups
Computer Science, Cryptography and Security
Optimizing Transaction Fees in Blockchain Systems: A Dynamic Incentive Approach
Computer Science, Cryptography and Security
Techniques for Differentially Private Graph Analysis
Computer Science, Cryptography and Security
Comparing Efficiency and Accuracy of NLP Techniques for SQL Injection Detection
Computer Science, Cryptography and Security
Enhancing Named Entity Recognition with Deep Learning Techniques
Computer Science, Cryptography and Security
Bypassing Memory Protection: Exploiting the FPB in Embedded Systems
Computer Science, Cryptography and Security
Fuzzer Diminishing Returns: Addressing Structured Input Requirements in EDA Tools
Computer Science, Cryptography and Security
Lazy Translation Coherence in SGX and Cache-Attacks: A Comprehensive Review
Computer Science, Cryptography and Security
Privacy-Preserving Data Publishing: Mitigating Risks through Transformations
Computer Science, Cryptography and Security
Efficient and Secure Text-to-Image Synthesis via Confused Labels
Computer Science, Cryptography and Security
Privacy Risks in Language Models: The Myth of Verbatim Memorization
Computer Science, Cryptography and Security
Privacy-Preserving Machine Learning Techniques: A Survey
Computer Science, Cryptography and Security