Security

Dynamic Quadruped with Tunable, Compliant Legs

Cyber Risk Loss Distribution Model of Client-Server Networks

Machine Learning Algorithm for Inferring User Activities from IoT Device Events

Algorithm for Inferring User Activities from IoT Network Traffic

Predict Enterprise Cyber Incidents by Social Network Analysis on Dark Web Forums

Improving Angle Estimation Accuracy for Millimeter-Wave Radars

Policy-Governed Content Mediation Model for Mobile Augmented Reality Applications

Authenticating a User on a Mobile Device

Exploring Personal Attributes from Publicly Available Interactions to Secure Users’ Privacy

Decentralized Attribution of Generative Models