Security

Exploring Personal Attributes from Publicly Available Interactions to Secure Users’ Privacy

Authenticating a User on a Mobile Device

Predict Enterprise Cyber Incidents by Social Network Analysis on Dark Web Forums

Decentralized Attribution of Generative Models

Policy-Governed Content Mediation Model for Mobile Augmented Reality Applications

Improving Angle Estimation Accuracy for Millimeter-Wave Radars

Algorithm for Inferring User Activities from IoT Network Traffic

Machine Learning Algorithm for Inferring User Activities from IoT Device Events

Dynamic Quadruped with Tunable, Compliant Legs

Cyber Risk Loss Distribution Model of Client-Server Networks