| Enforcing Data Geolocation Policies in Public Clouds using Trusted Computing | Jun 14, 2023 | Cloud Computing | —Unverified | 0 | 0 |
| A Provably Secure and Efficient Identity-Based Anonymous Authentication Scheme for Mobile Edge Computing | Feb 22, 2019 | Cloud ComputingEdge-computing | —Unverified | 0 | 0 |
| Enhancing Kubernetes Automated Scheduling with Deep Learning and Reinforcement Techniques for Large-Scale Cloud Computing Optimization | Feb 26, 2024 | Cloud ComputingDeep Learning | —Unverified | 0 | 0 |
| Command Line Interface Risk Modeling | Jan 17, 2023 | Cloud Computing | —Unverified | 0 | 0 |
| Combined Hyper-Extensible Extremely-Secured Zero-Trust CIAM-PAM architecture | Jan 3, 2025 | Cloud ComputingManagement | —Unverified | 0 | 0 |
| Enhancing Wireless Sensor Network Security through Integration with the ServiceNow Cloud Platform | Dec 31, 2024 | Cloud ComputingManagement | —Unverified | 0 | 0 |
| Ensembler: Protect Collaborative Inference Privacy from Model Inversion Attack via Selective Ensemble | Jan 19, 2024 | Cloud ComputingCollaborative Inference | —Unverified | 0 | 0 |
| Epileptic Seizures Detection Using Deep Learning Techniques: A Review | Jul 2, 2020 | Cloud ComputingDeep Learning | —Unverified | 0 | 0 |
| Erasure Coded Neural Network Inference via Fisher Averaging | Sep 2, 2024 | Cloud Computing | —Unverified | 0 | 0 |
| A Privacy-Preserving Outsourced Data Model in Cloud Environment | Nov 24, 2022 | Cloud ComputingFraud Detection | —Unverified | 0 | 0 |