Computer Science, Computer Vision and Pattern Recognition
Tag: security
Page 1/3
Computer Science, Machine Learning
Federated Learning Client Selection with Data Fairness and Reputation
Computer Science, Cryptography and Security
Quantum-Secure Digital Signature
Computer Science, Cryptography and Security
Efficient Progressive Data Analysis for Aggressor Graph Generation and Analysis
Computer Science, Cryptography and Security
Strengthening VA Security and Privacy: A Critical Review
Computer Science, Cryptography and Security
Securing Edge Devices and Solutions: Challenges and Opportunities
Computer Science, Software Engineering
Sacrificing Precision for Sustainability: How FPO Decrease Impacts CO2 Emissions
Computer Science, Information Theory
Paving the Way for Secure and Covert Communications: A New Noise Modulation Scheme
Computer Science, Distributed, Parallel, and Cluster Computing
Ethereum Smart Contract Security Research: A Survey and Future Directions
Computer Science, Cryptography and Security
Privacy-Aware Data Analysis: Beyond Differential Privacy
Computer Science, Networking and Internet Architecture
Enhancing Road Safety through Intelligent Vehicle Technologies: A Review of Cooperative Intelligent Transport Systems and Pedestrian-to-Anything Communications
Computer Science, Information Theory
RIS-based Electromagnetic Blackout: Enabling Privacy and Isolation in Real Environments
Computer Science, Cryptography and Security
Securing Middlebox Communication through Tag-Based Authentication
Computer Science, Software Engineering
Strengthening Reliability in Smart Contract Analysis: A Dual-Author Approach
Computer Science, Hardware Architecture
Rapid In-Memory Copy Operation in DRAM Sub-Array using RowClone Technique
Computer Science, Cryptography and Security
Privacy-Preserving Federated K-Means Clustering: A Comprehensive Analysis
Computer Science, Cryptography and Security
NFTs at Risk: A Guide to Common Security Threats and How to Mitigate Them
Computer Science, Cryptography and Security
Enhancing KEM-IND-CCA Security Through Forward Path Truncation and Tagging Attack Handling
Computer Science, Cryptography and Security
Exploring Smart Grid Security: A Node-RED Approach to Denial of Service and Malware Detection
Computer Science, Cryptography and Security