In modern distributed computing applications, such as federated learning...
Computing is a critical driving force in the development of human
civili...
In this paper, we propose a Graph Inception Diffusion Networks(GIDN) mod...
Enterprise networks are one of the major targets for cyber attacks due t...
VirusTotal (VT) provides aggregated threat intelligence on various entit...
We introduce Permutation and Structured Perturbation Inference (PSPI), a...
Autoencoder-based anomaly detection methods have been used in identifyin...
Literature analysis facilitates researchers to acquire a good understand...
The EOSIO blockchain, one of the representative Delegated Proof-of-Stake...
This paper studies the problem of predicting the distribution over multi...
In this paper, we propose to identify compromised mobile devices from a
...
Machine learning algorithms perform well on identifying patterns in many...
Recent developments in modeling language and vision have been successful...
In visual relationship detection, human-notated relationships can be reg...
Crowdsourcing has arisen as a new problem-solving paradigm for tasks tha...
Malicious domains are one of the major resources required for adversarie...
Inference based techniques are one of the major approaches to analyze DN...