0 | -- | 0 | Jinsu Kim, Dongyoung Koo, Yuna Kim, Hyunsoo Yoon, Junbum Shin, Sungwook Kim. Efficient Privacy-Preserving Matrix Factorization for Recommendation via Fully Homomorphic Encryption |
0 | -- | 0 | Yupeng Zhang, Charalampos Papamanthou, Jonathan Katz. Verifiable Graph Processing |
0 | -- | 0 | Guixin Ye, Zhanyong Tang, Dingyi Fang, XiaoJiang Chen, Willy Wolff, Adam J. Aviv, Zheng Wang 0001. A Video-based Attack for Android Pattern Lock |
0 | -- | 0 | Katheryn A. Farris, Ankit Shah, George Cybenko, Rajesh Ganesan, Sushil Jajodia. VULCON: A System for Vulnerability Prioritization, Mitigation, and Management |
0 | -- | 0 | Fanny Lalonde Lévesque, Sonia Chiasson, Anil Somayaji, José M. Fernandez. Technological and Human Factors of Malware Attacks: A Computer Security Clinical Trial Approach |