Machine learning models may inadvertently memorize sensitive, unauthoriz...
By requiring all data packets been cryptographically authenticatable, th...
Diffusion models have emerged as state-of-the-art deep generative
archit...
The well-known benefits of cloud computing have spurred the popularity o...
In recent years there has been growing popularity of leveraging cloud
co...
Analytics over social graphs allows to extract valuable knowledge and
in...
Graphs are widely used to model the complex relationships among entities...
For autonomous driving, an essential task is to detect surrounding objec...
In recent years, many deep learning models have been adopted in autonomo...
In this paper we study the deployment of multiple unmanned aerial vehicl...
Reversible data hiding in encrypted images (RDH-EI) has attracted increa...
The recently proposed RCube network is a cube-based server-centric data
...
This paper is devoted to the two-opposite-facility location games with a...