0 | -- | 0 | Chris Clifton, Eric J. Hanson, Keith Merrill, Shawn Merrill. k-Nearest Neighbor Missing Data Imputation |
0 | -- | 0 | Yaguan Qian, Yankai Guo, Qiqi Shao, Jiamin Wang, Bin Wang, Zhaoquan Gu, Xiang Ling 0001, Chunming Wu 0001. EI-MTD: Moving Target Defense for Edge Intelligence against Adversarial Attacks |
0 | -- | 0 | Cláudio Martins, Ibéria Medeiros. Generating Quality Threat Intelligence Leveraging OSINT and a Cyber Threat Unified Taxonomy |
0 | -- | 0 | Adi Akavia, Max Leibovich, Yehezkel S. Resheff, Roey Ron, Moni Shahar, Margarita Vald. Privacy-Preserving Decision Trees Training and Prediction |
0 | -- | 0 | Padmavathi Iyer, Amirreza Masoumzadeh 0001. Learning Relationship-Based Access Control Policies from Black-Box Systems |
0 | -- | 0 | Yuxuan Chen, Jiangshan Zhang, Xuejing Yuan, Shengzhi Zhang, Kai Chen 0012, Xiaofeng Wang 0006, Shanqing Guo. SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems |
0 | -- | 0 | Andreas Fischer 0011, Benny Fuhry, Jörn Kußmaul, Jonas Janneck, Florian Kerschbaum, Eric Bodden. Computation on Encrypted Data Using Dataflow Authentication |
0 | -- | 0 | Mário S. Alvim, Konstantinos Chatzikokolakis 0001, Yusuke Kawamoto 0001, Catuscia Palamidessi. Information Leakage Games: Exploring Information as a Utility Function |
0 | -- | 0 | Max Landauer, Florian Skopik, Markus Wurzenberger, Andreas Rauber. Dealing with Security Alert Flooding: Using Machine Learning for Domain-independent Alert Aggregation |