Phone scams remain a difficult problem to tackle due to the combination ...
One of the new developments in chit-chat bots is a long-term memory mech...
Several applications require counting the number of distinct items in th...
Privacy-preserving estimation of counts of items in streaming data finds...
Record linkage algorithms match and link records from different database...
This paper presents a timing attack on the FIDO2 (Fast IDentity Online)
...
Sensors embedded in mobile smart devices can monitor users' activity wit...
Differential privacy (DP) has been applied in deep learning for preservi...
With an increase in low-cost machine learning APIs, advanced machine lea...
Many techniques have been proposed for quickly detecting and containing
...
Data holders are increasingly seeking to protect their user's privacy, w...
Observation Resilient Authentication Schemes (ORAS) are a class of share...
Micro-segmentation is a network security technique that requires deliver...
We consider training machine learning models using Training data located...
Machine learning models have been shown to be vulnerable to membership
i...
We assess the security of machine learning based biometric authenticatio...
A number of recent works have demonstrated that API access to machine
le...
In this paper, we apply machine learning to distributed private data own...
Websites employ third-party ads and tracking services leveraging cookies...
With the number of new mobile malware instances increasing by over 50%
a...
This paper focuses on reporting of Internet malicious activity (or
mal-a...
We propose a generic mechanism to efficiently release differentially pri...
The Web is a tangled mass of interconnected services, where websites imp...
A Software-Defined Network (SDN) controller (aka. Network Operating Syst...
`Anytime, Anywhere' data access model has become a widespread IT policy ...
Differential Privacy is one of the strongest privacy guarantees, which a...
Software-Defined Network (SDN) radically changes the network architectur...
Modern wireless traffic demand pushes Internet Service Providers to deve...
In order to cope with the forecasted 1000x increase in wireless capacity...
Mobile data traffic is growing exponentially and it is even more challen...
Modeling users for the purpose of identifying their preferences and then...