Discussion on Protocol Vulnerabilities and Attack Scenarios

Optimistic TEE-Rollups: A Hybrid Architecture for Scalable and Verifiable Generative AI Inference on Blockchain

Authors: Aaron Chan, Alex Ding, Frank Chen, Alan Wu, Bruce Zhang, Arther Tian | Published: 2025-12-23
Security Analysis Method
Blockchain Technology
Discussion on Protocol Vulnerabilities and Attack Scenarios

ASTRA: High Throughput 3PC over Rings with Application to Secure Prediction

Authors: Harsh Chaudhari, Ashish Choudhury, Arpita Patra, Ajith Suresh | Published: 2019-12-05
Privacy Enhancing Protocol
Discussion on Protocol Vulnerabilities and Attack Scenarios
Performance Evaluation

Machine Learning Based Network Vulnerability Analysis of Industrial Internet of Things

Authors: Maede Zolanvari, Marcio A. Teixeira, Lav Gupta, Khaled M. Khan, Raj Jain | Published: 2019-11-13
Backdoor Attack
Discussion on Protocol Vulnerabilities and Attack Scenarios
Attacker Behavior Analysis

Advanced Analytics for Connected Cars Cyber Security

Authors: Matan Levi, Yair Allouche, Aryeh Kontorovich | Published: 2017-11-06 | Updated: 2017-11-08
HMM Model Generation
ML-Based IDS
Discussion on Protocol Vulnerabilities and Attack Scenarios