Author:
Liu Yuntao,Dachman-Soled Dana,Srivastava Ankur
Cited by
18 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Survey: Security Vulnerabilities and Protective Strategies for Graphical Passwords;Electronics;2024-08-01
2. Streamlining DNN Obfuscation to Defend Against Model Stealing Attacks;2024 IEEE International Symposium on Circuits and Systems (ISCAS);2024-05-19
3. Authenticating Edge Neural Network through Hardware Security Modules and Quantum-Safe Key Management;2024 37th International Conference on VLSI Design and 2024 23rd International Conference on Embedded Systems (VLSID);2024-01-06
4. A Survey on the Role of Reverse Engineering in Security Attacks;2023 International Conference on Research Methodologies in Knowledge Management, Artificial Intelligence and Telecommunication Engineering (RMKMATE);2023-11-01
5. Federated Learning for intrusion detection system: Concepts, challenges and future directions;Computer Communications;2022-11