Cloud applications are moving away from monolithic model towards
loosely...
Identity and Access Management (IAM) is an access control service in clo...
Modern software systems rely on mining insights from business sensitive ...
Propositional satisfiability (SAT) is an NP-complete problem that impact...
Accelerators used for machine learning (ML) inference provide great
perf...
With proliferation of DNN-based applications, the confidentiality of DNN...
We explore the commonalities between methods for assuring the security o...
In this work, user's emotion using its facial expressions will be detect...
Hardware-enclaves that target complex CPU designs compromise both securi...
We introduce a new malware detector - Shape-GD - that aggregates per-mac...