Available:
- Reinforcement learning for MLaaS model stealing attacks
- Detecting image defects and using Ersatz data on autonomous vehicle benchmarks
- Attack resilient features selection method for ML security application
- Detecting troll-users from discussion forums
- Text style obfuscation to prevent author deanonymization by linguistic style
- Simulation of the next generation user equipment in 5G networks
- Security on interacting with third party in 5G networks
- Benchmarking Byzantine fault-tolerance protocols
- Automatic Ownership Change Detection of IoT devices
- Evaluation of Binary Delta (De)Compression of Executable Code for Resource Constrained IoT Devices
- Implementation of In-place Binary Delta Decompression of Executable Code for Resource Constrained IoT Devices
- Distributed Editing in Delay-Tolerant Networks
- Distributed Networks of SGX Enclaves
- Proofs of Good Behaviour
- Formal modelling and analysis of SafeKeeper password protection
- Prototyping an oblivious neural network transformation framework
Reserved:
