Membership inference (MI) attacks threaten user privacy through determin...
With the rapid development and large-scale popularity of program softwar...
Scientific literature serves as a high-quality corpus, supporting a lot ...
Emulating firmware of microcontrollers is challenging due to the lack of...
Backdoor attacks have been a critical threat to deep neural network (DNN...
Federated learning (FL) trains a global model across a number of
decentr...
Recent advancements in end-to-end speech synthesis have made it possible...
Emulating firmware for microcontrollers is challenging due to the tight
...
We propose a simple randomized rule for the optimization of prices in re...
In recent years, IoT platforms and systems have been rapidly emerging.
A...
As more and more embedded devices are connected to the Internet, leading...
With the developing of the attack and defense technology, the cyber
envi...
Smart home connects tens of home devices into the Internet, running a sm...
The future of Internet of Things (IoT) is already upon us. IoT applicati...
Internet of Things (IoT) is characterized by various of heterogeneous de...
Individuals and organizations tend to migrate their data to clouds,
espe...