Security

Adversarial Text Purification: Large Language Model Approach for Defense

Exploring Personal Attributes from Publicly Available Interactions to Secure Users’ Privacy

Authenticating a User on a Mobile Device

Predict Enterprise Cyber Incidents by Social Network Analysis on Dark Web Forums

Decentralized Attribution of Generative Models

Policy-Governed Content Mediation Model for Mobile Augmented Reality Applications

Improving Angle Estimation Accuracy for Millimeter-Wave Radars

Algorithm for Inferring User Activities from IoT Network Traffic

Machine Learning Algorithm for Inferring User Activities from IoT Device Events

Dynamic Quadruped with Tunable, Compliant Legs