AI Uncertainty Quantification (UQ) has the potential to improve human
de...
Many of our critical infrastructure systems and personal computing syste...
The black-box nature of complex Neural Network (NN)-based models has hin...
Over the years, honeypots emerged as an important security tool to under...
Topological data analysis (TDA) delivers invaluable and complementary
in...
Federated Learning (FL) is a distributed machine learning protocol that
...
As machine learning (ML) techniques are being increasingly used in many
...
Deception is a crucial tool in the cyberdefence repertoire, enabling
def...
Distributed data analytics platforms such as Apache Spark enable
cost-ef...
Managing a pandemic requires continuous dissemination of infectious dise...
Prior studies have shown that, training machine learning models via empi...
Motivated by the recent surge of criminal activities with
cross-cryptocu...
In today's society, AI systems are increasingly used to make critical
de...
The machinery of topological data analysis becomes increasingly popular ...
Blockchain is an emerging technology that has already enabled a wide ran...
Machine learning models based on Deep Neural Networks (DNNs) are increas...
Federated Learning (FL) is a distributed, and decentralized machine lear...
Federated Learning (FL) is a decentralized machine learning protocol tha...
The growing adoption of IoT devices in our daily life is engendering a d...
Federated Learning (FL) allows a set of agents to collaboratively train ...
Explainable AI provides insight into the "why" for model predictions,
of...
Blockchain has emerged as a decentralized and distributed framework that...
Blockchain technology and, in particular, blockchain-based cryptocurrenc...
With emergence of blockchain technologies and the associated
cryptocurre...
Proliferation of cryptocurrencies (e.g., Bitcoin) that allow pseudo-anon...
Cryptographic API misuses threaten software security. Examples include
e...
Cryptographic API misuses threaten software security. Examples include
e...
We investigate the role of transferability of adversarial attacks in the...
As more and more data is collected for various reasons, the sharing of s...
Nowadays more and more data are gathered for detecting and preventing cy...
Relational DBMSs continue to dominate the database market, and inference...