Search

Your search keyword '"Suri, Neeraj"' showing total 563 results

Search Constraints

Start Over You searched for: Author "Suri, Neeraj" Remove constraint Author: "Suri, Neeraj"
563 results on '"Suri, Neeraj"'

Search Results

1. Self-Supervised Representation Learning for Adversarial Attack Detection

2. UNICAD: A Unified Approach for Attack Detection, Noise Reduction and Novel Class Identification

3. Federated Adversarial Learning for Robust Autonomous Landing Runway Detection

4. Error Propagation Analysis for Multithreaded Programs: An Empirical Approach

5. Compilation as a Defense: Enhancing DL Model Attack Robustness via Tensor Optimization

6. Model Leeching: An Extraction Attack Targeting LLMs

7. Specifying Autonomous System Behaviour

8. Privacy-preserving Decentralized Federated Learning over Time-varying Communication Graph

9. ThreatPro: Multi-Layer Threat Analysis in the Cloud

10. PINCH: An Adversarial Extraction Attack Framework for Deep Learning Models

11. Security Challenges when Space Merges with Cyberspace

14. A Security Architecture for Railway Signalling

16. Safe Execution of Concurrent Programs by Enforcement of Scheduling Constraints

18. CIPSEC-Enhancing Critical Infrastructure Protection with Innovative Security Framework

20. QRES: Quantitative Reasoning on Encrypted Security SLAs

21. Scaling Out Acid Applications with Operation Partitioning

25. Importance of preoperative HRCT temporal bone in the orientation of the cochlea and its relation to intra-operative difficulties in cochlear implantation – predicting the grades of difficulty.

26. Extracting Safe Thread Schedules from Incomplete Model Checking Results

27. Threat Modeling the Cloud: An Ontology Based Approach

28. Protecting Cloud-Based CIs: Covert Channel Vulnerabilities at the Resource Level

32. Proofs of Writing for Efficient and Robust Storage

37. A Security Architecture for Railway Signalling

38. Privacy-preserving Decentralized Federated Learning over Time-varying Communication Graph

40. Efficient Verification of Program Fragments: Eager POR

44. On the Feasibility of Side-Channel Attacks in a Virtualized Environment

45. PBMC: Symbolic Slicing for the Verification of Concurrent Programs

46. Technical Implementation and Feasibility

Catalog

Books, media, physical & digital resources