The data used to train deep neural network (DNN) models in applications ...
Machine learning models in the wild have been shown to be vulnerable to
...
Binary analysis of software is a critical step in cyber forensics
applic...
Multi-agent Markov Decision Processes (MMDPs) arise in a variety of
appl...
Advanced persistent threats (APTs) are organized prolonged cyberattacks ...
Advanced Persistent Threats (APTs) are stealthy attacks that threaten th...
Advanced Persistent Threats (APTs) are stealthy customized attacks by
in...
Advanced Persistent Threats (APTs) infiltrate cyber systems and compromi...