We present ProvG-Searcher, a novel approach for detecting known APT beha...
Adversarial training has been empirically shown to be more prone to
over...
Adversarial training is widely acknowledged as the most effective defens...
Enterprise networks are one of the major targets for cyber attacks due t...
We introduce a new method for camera-model identification. Our approach
...
We address the problem of decoding video file fragments when the necessa...
Bluetooth Low Energy (BLE) has become one of the most popular wireless
c...
The present level of proliferation of fake, biased, and propagandistic
c...
We study the individuality of human voice with re-spect to a widely used...
Estimating the photo-response non-uniformity (PRNU) of an imaging sensor...