Due to various and serious adverse impacts of spreading fake news, it is...
Proximal Policy Optimization (PPO) is a highly popular policy-based deep...
An in-depth understanding of uncertainty is the first step to making
eff...
We propose the end-to-end multimodal fact-checking and explanation
gener...
The deployment of monoculture software stacks can cause a devastating da...
Defensive deception is a promising approach for cyberdefense. Although
d...
Defensive deception techniques have emerged as a promising proactive def...
Traditional deep neural networks (NNs) have significantly contributed to...
Thanks to graph neural networks (GNNs), semi-supervised node classificat...
Diversity-based security approaches have been studied for several decade...
By leveraging the principle of software polyculture to ensure security i...
Resource constrained Internet-of-Things (IoT) devices are highly likely ...
We are living in an era when online communication over social network
se...
Traditional deep neural nets (NNs) have shown the state-of-the-art
perfo...
Subjective Logic (SL) is one of well-known belief models that can explic...
Reactive defense mechanisms, such as intrusion detection systems, have m...
As a solution to protect and defend a system against inside attacks, man...
Internet of Things (IoT) devices can be exploited by the attackers as en...
In cyberspace, evolutionary strategies are commonly used by both attacke...
With the spread of false and misleading information in current news, man...
The accurate measurement of security metrics is a critical research prob...
Network address shuffling is one of moving target defense (MTD) techniqu...
Unmanned Aerial Vehicles (UAV)-based civilian or military applications b...