Search

Your search keyword '"Grobler, Marthie"' showing total 207 results

Search Constraints

Start Over You searched for: Author "Grobler, Marthie" Remove constraint Author: "Grobler, Marthie"
207 results on '"Grobler, Marthie"'

Search Results

1. Deep Learning-Based Out-of-distribution Source Code Data Identification: How Far Have We Gone?

2. An Innovative Information Theory-based Approach to Tackle and Enhance The Transparency in Phishing Detection

4. Resurrecting Trust in Facial Recognition: Mitigating Backdoor Attacks in Face Recognition to Prevent Potential Privacy Breaches

5. Local Differential Privacy for Federated Learning

6. Systematic Literature Review on Cyber Situational Awareness Visualizations

7. Robust Training Using Natural Transformation

8. OCTOPUS: Overcoming Performance andPrivatization Bottlenecks in Distributed Learning

9. Adversarial Defense by Latent Style Transformations

11. Defending Adversarial Attacks via Semantic Feature Manipulation

12. OIAD: One-for-all Image Anomaly Detection with Disentanglement Learning

13. Backdoor Attacks against Transfer Learning with Pre-trained Deep Learning Models

14. Generating Semantic Adversarial Examples via Feature Manipulation

15. Local Differential Privacy for Federated Learning

16. A model for system developers to measure the privacy risk of data

17. Security and Performance Considerations in ROS 2: A Balancing Act

18. Catering to Your Concerns: Automatic Generation of Personalised Security-Centric Descriptions for Android Apps

19. Towards a Trusted Collaborative Medical Decision-Making Platform

22. Privacy-Preserving Data Generation and Sharing Using Identification Sanitizer

23. PART-GAN: Privacy-Preserving Time-Series Sharing

25. Improving National Digital Identity Systems Usage: Human-Centric Cybersecurity Survey

26. My Face is Mine: Fighting Unpermitted Tagging on Personal/Group Photos in Social Media

31. Ethical and Legal Issues Involved in the Pro-active Collection of Personal Information with the Aim of Reducing Online Disclosure

34. Cybersecurity when working from home during COVID-19: considering the human factors.

35. Access Control, Key Management, and Trust for Emerging Wireless Body Area Networks.

42. Demystifying the Evolution of Android Malware Variants

43. Leveraging Human-Centric Cybersecurity to Improve Usage of National Digital Identity Systems in Australia

50. Users’ Adoption of National Digital Identity Systems: Human-Centric Cybersecurity Review

Catalog

Books, media, physical & digital resources