Search

Your search keyword '"CHOO, KIM-KWANG RAYMOND"' showing total 4,369 results

Search Constraints

Start Over You searched for: Author "CHOO, KIM-KWANG RAYMOND" Remove constraint Author: "CHOO, KIM-KWANG RAYMOND"
4,369 results on '"CHOO, KIM-KWANG RAYMOND"'

Search Results

1. Beyond Text-to-SQL for IoT Defense: A Comprehensive Framework for Querying and Classifying IoT Threats

2. Shadow-Free Membership Inference Attacks: Recommender Systems Are More Vulnerable Than You Thought

3. A2-DIDM: Privacy-preserving Accumulator-enabled Auditing for Distributed Identity of DNN Model

4. Holistic Evaluation Metrics: Use Case Sensitive Evaluation Metrics for Federated Learning

5. GE-AdvGAN: Improving the transferability of adversarial samples by gradient editing-based adversarial generative model

6. FairCompass: Operationalising Fairness in Machine Learning

7. MFABA: A More Faithful and Accelerated Boundary-based Attribution Method for Deep Neural Networks

10. VFedMH: Vertical Federated Learning for Training Multiple Heterogeneous Models

11. Source Inference Attacks: Beyond Membership Inference Attacks in Federated Learning

12. Ethical Considerations and Policy Implications for Large Language Models: Guiding Responsible Development and Deployment

13. Edge Learning for 6G-enabled Internet of Things: A Comprehensive Survey of Vulnerabilities, Datasets, and Defenses

14. Towards Understanding the Generalization of Medical Text-to-SQL Models and Datasets

15. Poisoning Attacks in Federated Edge Learning for Digital Twin 6G-enabled IoTs: An Anticipatory Study

16. Security Analysis of Google Authenticator, Microsoft Authenticator, and Authy

17. Password Managers and Vault Application Security and Forensics: Research Challenges and Future Opportunities

18. Empirical Evaluations of Machine Learning Effectiveness in Detecting Web Application Attacks

19. A Blockchain Patient-Centric Records Framework for Older Adult Healthcare

20. Blockchain for Unmanned Underwater Drones: Research Issues, Challenges, Trends and Future Directions

23. Multi-Domain Virtual Network Embedding Algorithm based on Horizontal Federated Learning

24. Forensic Artefact Discovery and Attribution from Android Cryptocurrency Wallet Applications

25. BABD: A Bitcoin Address Behavior Dataset for Pattern Analysis

39. A Systematic Review of Bio-Cyber Interface Technologies and Security Issues for Internet of Bio-Nano Things

43. A Lightweight Privacy-Preserving Scheme Using Label-based Pixel Block Mixing for Image Classification in Deep Learning

44. Investigating Protected Health Information Leakage from Android Medical Applications

45. Consumer, Commercial and Industrial IoT (In)Security: Attack Taxonomy and Case Studies

46. DeepKeyGen: A Deep Learning-based Stream Cipher Generator for Medical Image Encryption and Decryption

47. Towards Minimising Perturbation Rate for Adversarial Machine Learning with Pruning

49. A Survey of Machine Learning Techniques in Adversarial Image Forensics

50. Pocket Diagnosis: Secure Federated Learning against Poisoning Attack in the Cloud

Catalog

Books, media, physical & digital resources