Computation on Encrypted Data using Data Flow Authentication

Authors: Andreas Fischer, Benny Fuhry, Florian Kerschbaum, Eric Bodden | Published: 2017-10-01

Privacy Preserving Identification Using Sparse Approximation with Ambiguization

Authors: Behrooz Razeghi, Slava Voloshynovskiy, Dimche Kostadinov, Olga Taran | Published: 2017-09-29

Resilient Learning-Based Control for Synchronization of Passive Multi-Agent Systems under Attack

Authors: Arash Rahnama, Panos J. Antsaklis | Published: 2017-09-28

Catching Anomalous Distributed Photovoltaics: An Edge-based Multi-modal Anomaly Detection

Authors: Devu Manikantan Shilay, Kin Gwn Lorey, Tianshu Weiz, Teems Lovetty, Yu Cheng | Published: 2017-09-26

Key Management and Learning based Two Level Data Security for Metering Infrastructure of Smart Grid

Authors: Imtiaz Parvez, Maryamossadat Aghili, Arif Sarwat | Published: 2017-09-25

Deep Learning for Secure Mobile Edge Computing

Authors: Yuanfang Chen, Yan Zhang, Sabita Maharjan | Published: 2017-09-23

A Grassmannian Approach to Zero-Shot Learning for Network Intrusion Detection

Authors: Jorge Rivero, Bernardete Ribeiro, Ning Chen, Fátima Silva Leite | Published: 2017-09-23

Characterizing Diabetes, Diet, Exercise, and Obesity Comments on Twitter

Authors: Amir Karami, Alicia A. Dahl, Gabrielle Turner-McGrievy, Hadi Kharrazi, Jr., George Shaw | Published: 2017-09-22

Machine Learning Models that Remember Too Much

Authors: Congzheng Song, Thomas Ristenpart, Vitaly Shmatikov | Published: 2017-09-22

Automatic Detection of Malware-Generated Domains with Recurrent Neural Models

Authors: Pierre Lison, Vasileios Mavroeidis | Published: 2017-09-20