Search

Your search keyword '"Nepal, Surya"' showing total 1,182 results

Search Constraints

Start Over You searched for: Author "Nepal, Surya" Remove constraint Author: "Nepal, Surya"
1,182 results on '"Nepal, Surya"'

Search Results

1. From Solitary Directives to Interactive Encouragement! LLM Secure Code Generation by Natural Language Prompting

2. Adversarially Guided Stateful Defense Against Backdoor Attacks in Federated Deep Learning

3. SAFE: Advancing Large Language Models in Leveraging Semantic and Syntactic Relationships for Software Vulnerability Detection

4. Systematic Literature Review of AI-enabled Spectrum Management in 6G and Future Networks

5. Leakage-Resilient and Carbon-Neutral Aggregation Featuring the Federated AI-enabled Critical Infrastructure

6. Honeyfile Camouflage: Hiding Fake Files in Plain Sight

7. Deep Learning-Based Out-of-distribution Source Code Data Identification: How Far Have We Gone?

8. Contextual Chart Generation for Cyber Deception

9. SoK: Can Trajectory Generation Combine Privacy and Utility?

10. An Innovative Information Theory-based Approach to Tackle and Enhance The Transparency in Phishing Detection

11. A2C: A Modular Multi-stage Collaborative Decision Framework for Human-AI Teams

12. Multiple Hypothesis Dropout: Estimating the Parameters of Multi-Modal Output Distributions

14. Watch Out! Simple Horizontal Class Backdoor Can Trivially Evade Defense

15. Parameter-Saving Adversarial Training: Reinforcing Multi-Perturbation Robustness via Hypernetworks

16. AI Potentiality and Awareness: A Position Paper from the Perspective of Human-AI Teaming in Cybersecurity

17. Digital Twins and the Future of their Use Enabling Shift Left and Shift Right Cybersecurity Operations

18. DeepTheft: Stealing DNN Model Architectures through Power Side Channel

19. RAI4IoE: Responsible AI for Enabling the Internet of Energy

20. Stealthy Physical Masked Face Recognition Attack via Adversarial Style Optimization

21. A Multi-Client Searchable Encryption Scheme for IoT Environment

22. Not Seen, Not Heard in the Digital World! Measuring Privacy Practices in Children's Apps

23. Two-in-one Knowledge Distillation for Efficient Facial Forgery Detection

24. Anti-Compression Contrastive Facial Forgery Detection

25. Icicle: A Re-Designed Emulator for Grey-Box Firmware Fuzzing

26. Diverse Multimedia Layout Generation with Multi Choice Learning

27. Masked Vector Quantization

28. Exploiting Layerwise Feature Representation Similarity For Backdoor Defence in Federated Learning

29. Acumen: Analysing the Impact of Organisational Change on Users’ Access Entitlements

30. DeepTaster: Adversarial Perturbation-Based Fingerprinting to Identify Proprietary Dataset Use in Deep Neural Networks

31. Reconstruction Attack on Differential Private Trajectory Protection Mechanisms

32. Unraveling Threat Intelligence Through the Lens of Malicious URL Campaigns

33. Profiler: Profile-Based Model to Detect Phishing Emails

34. Deception for Cyber Defence: Challenges and Opportunities

36. Transformer-Based Language Models for Software Vulnerability Detection

37. Towards Web Phishing Detection Limitations and Mitigation

38. PublicCheck: Public Integrity Verification for Services of Run-time Deep Models

39. TSM: Measuring the Enticement of Honeyfiles with Natural Language Processing

40. Can pre-trained Transformers be used in detecting complex sensitive sentences? -- A Monsanto case study

41. Local Differential Privacy for Federated Learning

42. SoK: Rowhammer on Commodity Operating Systems

43. Modelling Direct Messaging Networks with Multiple Recipients for Cyber Deception

44. Measuring Vulnerabilities of Malware Detectors with Explainability-Guided Evasion Attacks

45. Optimizing Secure Decision Tree Inference Outsourcing

46. NoisFre: Noise-Tolerant Memory Fingerprints from Commodity Devices for Security Functions

47. Characterizing Malicious URL Campaigns

48. FedDICE: A ransomware spread detection in a distributed integrated clinical environment using federated learning and SDN based mitigation

50. A Comprehensive Survey on Community Detection with Deep Learning

Catalog

Books, media, physical & digital resources