SoK: Game-Theoretic Cybersecurity: Assumptions, Models, Gaps, and Bridges
This article delves into the application of game theory in studying cyber attacker and defender behaviors. It…
This article delves into the application of game theory in studying cyber attacker and defender behaviors. It…
This paper proposes a system that utilizes Vehicle-to-Everything (V2X) technology for autonomous vehicles to exchange data and…
This academic report by Jiameng Pu and Zafar Takhirov summarizes the Membership Inference Attacks (MIA) experiments of…
The paper introduces a new kind of adversarial attack on machine learning models, specifically neural networks. It…
The study focuses on the development of an attack-resilient Generative Adversarial Network (AR-GAN) for traffic sign classification…
The article provides a comprehensive overview of 5G network security, detailing various elements of the 5G core…
This article discusses the vulnerability of elliptic-curve cryptography (ECC) to polynomial-time attacks by quantum computing. It suggests…
This study by Likun Qin and Tianshuo Qiu provides an in-depth analysis of Local Differential Privacy (LDP)…
This research looks at the security performance of a single-input single-output visible light communication (VLC) channel in…
The paper presents an algorithm that relaxes the Differential Privacy (DP) guarantee of a randomized response gradually….