43 results on '"Ko, Ryan K L"'
Search Results
2. Preserving the Privacy and Cybersecurity of Home Energy Data
3. Preserving the Privacy and Cybersecurity of Home Energy Data
4. SDGen: A Scalable, Reproducible and Flexible Approach to Generate Real World Cyber Security Datasets
5. Privacy-Preserving Gradient Descent for Distributed Genome-Wide Analysis
6. Pandora: A Cyber Range Environment for the Safe Testing and Deployment of Autonomous Cyber Attack Tools
7. PrivColl: Practical Privacy-Preserving Collaborative Machine Learning
8. Data Provenance for Big Data Security and Accountability
9. Visualization and Data Provenance Trends in Decision Support for Cybersecurity
10. The Full Provenance Stack: Five Layers for Complete and Meaningful Provenance
11. Computing Mod with a Variable Lookup Table
12. STRATUS: Towards Returning Data Control to Cloud Users
13. End-to-End Secure and Privacy Preserving Mobile Chat Application
14. Data Accountability in Cloud Systems
15. Formal Concept Discovery in Semantic Web Data
16. Towards Achieving Accountability, Auditability and Trust in Cloud Computing
17. Evaluation of an Anomaly Detector for Routers Using Parameterizable Malware in an IoT Ecosystem
18. An Edge-Cloud Collaborative Object Detection System
19. Smart Search over Encrypted Educational Resources in Cloud Storage
20. PUFloc: PUF and Location Based Hierarchical Mutual Authentication Protocol for Surveillance Drone Networks
21. A Robust Malware Detection Approach for Android System Based on Ensemble Learning
22. A Fine-Grained Access Control Scheme for Electronic Health Records Based on Roles and Attributes
23. Towards a Location-Aware Blockchain-Based Solution to Distinguish Fake News in Social Media
24. Active Malicious Accounts Detection with Multimodal Fusion Machine Learning Algorithm
25. Security and Privacy for Sharing Electronic Medical Records Based on Blockchain and Federated Learning
26. Research on Bandwidth Reservation Algorithm of Teaching Resources in Cloud Computing Environment
27. An Online Automated Anti-anti-virus Method
28. A Fine-Tuning Strategy Based on Real Scenes in Gait Identification
29. A Reverse Auction Based Efficient D2D Transmission Mechanism for Ubiquitous Power Terminals
30. Towards Evaluating the Effectiveness of Botnet Detection Techniques
31. A Supervised Rare Anomaly Detection Technique via Cooperative Co-evolution-Based Feature Selection Using Benchmark UNSW_NB15 Dataset
32. Towards a Two-Tier Architecture for Privacy-Enabled Recommender Systems (PeRS)
33. A Network Forensics Investigating Method Based on Weak Consistency for Distributed SDN
34. Intrusion Detection System Based on Deep Neural Network and Incremental Learning for In-Vehicle CAN Networks
35. A Backdoor Embedding Method for Backdoor Detection in Deep Neural Networks
36. Generalizing Supervised Learning for Intrusion Detection in IoT Mesh Networks
37. Skill Reward for Safe Deep Reinforcement Learning
38. A Large-Scale Study on the Security Vulnerabilities of Cloud Deployments
39. Design and Architecture of Progger 3: A Low-Overhead, Tamper-Proof Provenance System
40. Privacy-Enhanced Mean-Variance Scheme Against Malicious Signature Attacks in Smart Grids
41. Reliable and Controllable Data Sharing Based on Blockchain
42. Privacy-Preserving Cluster Validity
43. Using Streaming Data Algorithm for Intrusion Detection on the Vehicular Controller Area Network
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.