Search

Your search keyword '"Suri, Neeraj"' showing total 277 results

Search Constraints

Start Over You searched for: Author "Suri, Neeraj" Remove constraint Author: "Suri, Neeraj" Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years
277 results on '"Suri, Neeraj"'

Search Results

1. Self-Supervised Representation Learning for Adversarial Attack Detection

2. UNICAD: A Unified Approach for Attack Detection, Noise Reduction and Novel Class Identification

3. Federated Adversarial Learning for Robust Autonomous Landing Runway Detection

4. Error Propagation Analysis for Multithreaded Programs: An Empirical Approach

5. Compilation as a Defense: Enhancing DL Model Attack Robustness via Tensor Optimization

6. Model Leeching: An Extraction Attack Targeting LLMs

7. Specifying Autonomous System Behaviour

8. Privacy-preserving Decentralized Federated Learning over Time-varying Communication Graph

9. ThreatPro: Multi-Layer Threat Analysis in the Cloud

10. PINCH: An Adversarial Extraction Attack Framework for Deep Learning Models

11. Security Challenges when Space Merges with Cyberspace

14. A Security Architecture for Railway Signalling

16. Safe Execution of Concurrent Programs by Enforcement of Scheduling Constraints

17. QRES: Quantitative Reasoning on Encrypted Security SLAs

18. Scaling Out Acid Applications with Operation Partitioning

19. CIPSEC-Enhancing Critical Infrastructure Protection with Innovative Security Framework

21. An empirical study of reflection attacks using NetFlow data.

25. Importance of preoperative HRCT temporal bone in the orientation of the cochlea and its relation to intra-operative difficulties in cochlear implantation – predicting the grades of difficulty.

26. Extracting Safe Thread Schedules from Incomplete Model Checking Results

27. Threat Modeling the Cloud: An Ontology Based Approach

28. Protecting Cloud-Based CIs: Covert Channel Vulnerabilities at the Resource Level

34. A Security Architecture for Railway Signalling

35. Privacy-preserving Decentralized Federated Learning over Time-varying Communication Graph

38. Efficient Verification of Program Fragments: Eager POR

41. On the Feasibility of Side-Channel Attacks in a Virtualized Environment

42. PBMC: Symbolic Slicing for the Verification of Concurrent Programs

43. Technical Implementation and Feasibility

48. Privacy-preserving Decentralized Federated Learning over Time-varying Communication Graph.

Catalog

Books, media, physical & digital resources