Search

Your search keyword '"Deng, Robert"' showing total 1,996 results

Search Constraints

Start Over You searched for: Author "Deng, Robert" Remove constraint Author: "Deng, Robert"
1,996 results on '"Deng, Robert"'

Search Results

1. Detecting and Measuring Security Implications of Entangled Domain Verification in CDN

2. Distributional Black-Box Model Inversion Attack with Multi-Agent Reinforcement Learning

3. A Survey of Protocol Fuzzing

4. SOCI^+: An Enhanced Toolkit for Secure OutsourcedComputation on Integers

5. A Survey of Secure Computation Using Trusted Execution Environments

6. Prove You Owned Me: One Step beyond RFID Tag/Mutual Authentication

7. EvilScreen Attack: Smart TV Hijacking via Multi-channel Remote Control Mimicry

8. SIMC 2.0: Improved Secure ML Inference Against Malicious Clients

9. Hercules: Boosting the Performance of Privacy-preserving Federated Learning

11. An efficient and secure scheme of verifiable computation for Intel SGX

12. Pocket Diagnosis: Secure Federated Learning against Poisoning Attack in the Cloud

13. Privacy-preserving Medical Treatment System through Nondeterministic Finite Automata

14. When Program Analysis Meets Bytecode Search: Targeted and Efficient Inter-procedural Analysis of Modern Android Apps in BackDroid

15. VerifyTL: Secure and Verifiable Collaborative Transfer Learning

17. Lightning-Fast and Privacy-Preserving Outsourced Computation in the Cloud

18. Boosting Privately: Privacy-Preserving Federated Extreme Boosting for Mobile Crowdsensing

20. M-EDESE: Multi-Domain, Easily Deployable, and Efficiently Searchable Encryption

21. When Human cognitive modeling meets PINs: User-independent inter-keystroke timing attacks

22. SCLib: A Practical and Lightweight Defense against Component Hijacking in Android Applications

24. Revocable Policy-Based Chameleon Hash

26. Pine: Enabling Privacy-Preserving Deep Packet Inspection on TLS with Rule-Hiding and Fast Connection Establishment

27. Understanding Android VoIP Security: A System-Level Vulnerability Assessment

30. SecComp: Towards Practically Defending Against Component Hijacking in Android Applications

33. BADFL: Backdoor Attack Defense in Federated Learning From Local Model Perspective

34. Efficient and Secure Federated Learning Against Backdoor Attacks

35. Finding Flaws from Password Authentication Code in Android Apps

36. Privacy-Preserving Remote User Authentication with k-Times Untraceability

Catalog

Books, media, physical & digital resources