In a federated learning (FL) system, malicious participants can easily e...
In representative democracies, the election of new representatives in re...
In this paper, we consider a discrete-time information-update system, wh...
We consider a set of APs with unknown data rates that cooperatively serv...
Submodularity is an important property of set functions and has been
ext...
Moving target defense has emerged as a critical paradigm of protecting a...
Recent works on adversarial examples for image classification focus on
d...
Network function virtualization (NFV) is an emerging design paradigm tha...
As an effective approach to thwarting advanced attacks, moving target de...
Adversarial examples are perturbed inputs designed to fool machine learn...
We study multi-armed bandit problems with graph feedback, in which the
d...
Recent works show that power-proportional data centers can save energy c...
Mobile applications (apps) often transmit sensitive data through network...
Cybersecurity is increasingly threatened by advanced and persistent atta...