Search

Your search keyword '"Nepal, Surya"' showing total 1,194 results

Search Constraints

Start Over You searched for: Author "Nepal, Surya" Remove constraint Author: "Nepal, Surya"
1,194 results on '"Nepal, Surya"'

Search Results

1. Provisioning Time-Based Subscription in NDN: A Secure and Efficient Access Control Scheme

2. Comprehensive Evaluation of Cloaking Backdoor Attacks on Object Detector in Real-World

3. OblivCDN: A Practical Privacy-preserving CDN with Oblivious Content Access

4. SoK: Unifying Cybersecurity and Cybersafety of Multimodal Foundation Models with an Information Theory Approach

5. Analysing one- and two-bit data to reduce memory requirements for F-statistic-based gravitational wave searches

6. From Solitary Directives to Interactive Encouragement! LLM Secure Code Generation by Natural Language Prompting

7. Adversarially Guided Stateful Defense Against Backdoor Attacks in Federated Deep Learning

8. SAFE: Advancing Large Language Models in Leveraging Semantic and Syntactic Relationships for Software Vulnerability Detection

9. Systematic Literature Review of AI-enabled Spectrum Management in 6G and Future Networks

10. Leakage-Resilient and Carbon-Neutral Aggregation Featuring the Federated AI-enabled Critical Infrastructure

11. Honeyfile Camouflage: Hiding Fake Files in Plain Sight

12. Deep Learning-Based Out-of-distribution Source Code Data Identification: How Far Have We Gone?

13. Contextual Chart Generation for Cyber Deception

14. SoK: Can Trajectory Generation Combine Privacy and Utility?

15. An Innovative Information Theory-based Approach to Tackle and Enhance The Transparency in Phishing Detection

16. A2C: A Modular Multi-stage Collaborative Decision Framework for Human-AI Teams

17. Multiple Hypothesis Dropout: Estimating the Parameters of Multi-Modal Output Distributions

19. Watch Out! Simple Horizontal Class Backdoor Can Trivially Evade Defense

20. Parameter-Saving Adversarial Training: Reinforcing Multi-Perturbation Robustness via Hypernetworks

21. AI Potentiality and Awareness: A Position Paper from the Perspective of Human-AI Teaming in Cybersecurity

22. Digital Twins and the Future of their Use Enabling Shift Left and Shift Right Cybersecurity Operations

23. DeepTheft: Stealing DNN Model Architectures through Power Side Channel

24. RAI4IoE: Responsible AI for Enabling the Internet of Energy

25. Stealthy Physical Masked Face Recognition Attack via Adversarial Style Optimization

26. A Multi-Client Searchable Encryption Scheme for IoT Environment

27. Not Seen, Not Heard in the Digital World! Measuring Privacy Practices in Children's Apps

28. Two-in-one Knowledge Distillation for Efficient Facial Forgery Detection

29. Anti-Compression Contrastive Facial Forgery Detection

30. Icicle: A Re-Designed Emulator for Grey-Box Firmware Fuzzing

31. Diverse Multimedia Layout Generation with Multi Choice Learning

32. Masked Vector Quantization

33. DeepTaster: Adversarial Perturbation-Based Fingerprinting to Identify Proprietary Dataset Use in Deep Neural Networks

34. Reconstruction Attack on Differential Private Trajectory Protection Mechanisms

35. AI Potentiality and Awareness: A Position Paper from the Perspective of Human-AI Teaming in Cybersecurity

36. Exploiting Layerwise Feature Representation Similarity For Backdoor Defence in Federated Learning

37. Acumen: Analysing the Impact of Organisational Change on Users’ Access Entitlements

38. Unraveling Threat Intelligence Through the Lens of Malicious URL Campaigns

39. Profiler: Profile-Based Model to Detect Phishing Emails

40. Deception for Cyber Defence: Challenges and Opportunities

41. Transformer-Based Language Models for Software Vulnerability Detection

42. Towards Web Phishing Detection Limitations and Mitigation

43. PublicCheck: Public Integrity Verification for Services of Run-time Deep Models

44. TSM: Measuring the Enticement of Honeyfiles with Natural Language Processing

45. Can pre-trained Transformers be used in detecting complex sensitive sentences? -- A Monsanto case study

46. Local Differential Privacy for Federated Learning

47. SoK: Rowhammer on Commodity Operating Systems

49. Modelling Direct Messaging Networks with Multiple Recipients for Cyber Deception

50. Measuring Vulnerabilities of Malware Detectors with Explainability-Guided Evasion Attacks

Catalog

Books, media, physical & digital resources