Although the prevention of AI vulnerabilities is critical to preserve th...
In secure summation, K users, each holds an input, wish to compute the s...
A storage code over a graph maps K independent source symbols, each of
L...
A secure storage code maps K source symbols, each of L_w bits, to N
code...
Recent research efforts on 3D point-cloud semantic segmentation have ach...
Conditional disclosure of secrets (CDS) is the problem of disclosing as
...
Cache side-channel attacks lead to severe security threats to the settin...
In this paper, we study the problem of publishing a stream of real-value...
In the conditional disclosure of secrets (CDS) problem, Alice and Bob (e...
Monetizing websites and web apps through online advertising is widesprea...
The IoT (Internet of Things) technology has been widely adopted in recen...
In this paper, we seek to better understand Android obfuscation and depi...