| Covert Communication Based on the Poisoning Attack in Federated Learning | Jun 2, 2023 | Computer SecurityFederated Learning | —Unverified | 0 | 0 |
| Cyber Risk in Health Facilities: A Systematic Literature Review | Feb 8, 2021 | Computer SecurityManagement | —Unverified | 0 | 0 |
| Defensive ML: Defending Architectural Side-channels with Adversarial Obfuscation | Feb 3, 2023 | Computer Security | —Unverified | 0 | 0 |
| Detecting Denial-of-Service Attacks from Social Media Text: Applying NLP to Computer Security | Jun 1, 2018 | Computer Security | —Unverified | 0 | 0 |
| Detecting Face Synthesis Using a Concealed Fusion Model | Jan 8, 2024 | Computer SecurityFace Generation | —Unverified | 0 | 0 |
| Detecting malicious PDF using CNN | Jul 24, 2020 | ClusteringComputer Security | —Unverified | 0 | 0 |