Cross-domain recommendation has attracted increasing attention from indu...
Adversarial training, as one of the most effective defense methods again...
Crowdsourcing is an online outsourcing mode which can solve the current
...
The malware has been being one of the most damaging threats to computers...
Network security events prediction helps network operators to take respo...
The surge in the internet of things (IoT) devices seriously threatens th...
Deep packet inspection (DPI) has been extensively investigated in
softwa...
As the number of cyber-attacks is increasing, cybersecurity is evolving ...
The vulnerability of deep neural networks (DNNs) for adversarial example...
Code retrieval is to find the code snippet from a large corpus of source...
A flurry of fuzzing tools (fuzzers) have been proposed in the literature...
With the boom of edge intelligence, its vulnerability to adversarial att...
While the celebrated graph neural networks yield effective representatio...
Deep learning has been broadly leveraged by major cloud providers such a...
Fuzzing is a technique of finding bugs by executing a software recurrent...