The Center for Education and Research in Information Assurance and Security (CERIAS) is currently viewed as one of the ...
MS, Engineering Mathematics, Faculty of Engineering, Cairo University, Cairo, Egypt, 7/2016 BS, Electrical and Electronics Engineering, Faculty of Engineering, Cairo University, Cairo, Egypt, 7/2012 ...
detection in the past and present, and other TASI and INDOT jointly developed traffic management tools in the near future. The final system will be deployed to INDOT for daily operations.
To refer to this entry, you may select and copy the text below and paste it into your BibTex document. Note that the text may not contain all macros that BibTex supports. @Proceedings{ usenix, title = ...
The development and training of deep learning models have become increasingly costly and complex. Consequently, software engineers are adopting pre-trained models (PTMs) for their downstream ...
Advances in AI and big data analytics rely on data sharing, which can be impeded by privacy concerns. Most challenging in privacy protection is protection of data-in-use, since even encrypted data ...
Differential privacy (DP) is the state-of-the-art framework for formal privacy protection, but many available DP methods are designed primarily for estimation. On the other hand, in many scientific ...
Data privacy on edge devices has become a significant concern, given the widespread use of mobile phones. There is a potential risk of sensitive personal data being leaked through an insecure network ...
Many software applications incorporate third-party packages distributed by package registries. Guaranteeing package provenance – knowledge of authorship – along this supply chain is a necessary part ...
The goal of this project is to help software engineers incorporate the lessons learned from prior failures throughout the software development lifecycle. Since all engineered systems fail, one ...
Computing systems face diverse and substantial cybersecurity threats. To mitigate these cybersecurity threats while developing software, engineers need to be competent in the skill of threat modeling.
Dr. Jason Reinhardt has been doing systematic strategy analysis and development for 18 years, both within and outside government. His work has focused on the application of quantitative risk ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results