Security

Predict Enterprise Cyber Incidents by Social Network Analysis on Dark Web Forums

Decentralized Attribution of Generative Models

Improving Angle Estimation Accuracy for Millimeter-Wave Radars

Algorithm for Inferring User Activities from IoT Network Traffic

Dynamic Quadruped with Tunable, Compliant Legs

Cyber Risk Loss Distribution Model of Client-Server Networks

Exploiting Class Probabilities for Black-Box Sentence-Level Attacks

Adversarial Text Purification: Large Language Model Approach for Defense

Exploring Personal Attributes from Publicly Available Interactions to Secure Users’ Privacy

Authenticating a User on a Mobile Device