Security
Dynamic Quadruped with Tunable, Compliant Legs
Read more
Cyber Risk Loss Distribution Model of Client-Server Networks
Read more
Machine Learning Algorithm for Inferring User Activities from IoT Device Events
Read more
Algorithm for Inferring User Activities from IoT Network Traffic
Read more
Predict Enterprise Cyber Incidents by Social Network Analysis on Dark Web Forums
Read more
Improving Angle Estimation Accuracy for Millimeter-Wave Radars
Read more
Policy-Governed Content Mediation Model for Mobile Augmented Reality Applications
Read more
Authenticating a User on a Mobile Device
Read more
Exploring Personal Attributes from Publicly Available Interactions to Secure Users’ Privacy
Read more
Decentralized Attribution of Generative Models
Read more