Searched for: contributor%3A%22Urbano%2C+Juli%C3%A1n+%28graduation+committee%29%22
(1 - 20 of 28)

Pages

The effectiveness of subspace mapping techniques adapted to unlabeled samples from a global domain in mitigating sample selection bias
The effectiveness of subspace mapping techniques adapted to unlabeled samples from a global domain in mitigating sample selection bias
Generalizability of Deep Domain Adaptation in case of Sample Selection Bias
Generalizability of Deep Domain Adaptation in case of Sample Selection Bias
Evaluating the Effectiveness of Importance Weighting Techniques in Mitigating Sample Selection Bias
Evaluating the Effectiveness of Importance Weighting Techniques in Mitigating Sample Selection Bias
Multi-Vendor Matrix Factorization with Differential Privacy
Multi-Vendor Matrix Factorization with Differential Privacy
Analysing different Distributed Denial of Service (DDoS) attacks and its solutions in SDN
Analysing different Distributed Denial of Service (DDoS) attacks and its solutions in SDN
Study the impact of topology-related attacks in Software Defined Network
Study the impact of topology-related attacks in Software Defined Network
Study Of The Impact Of Side-channel Attacks On Software Defined Networks
Study Of The Impact Of Side-channel Attacks On Software Defined Networks
MULTI-FLGANs: Multi Distributed Adversarial Networks for Non-IID distributed datasets
MULTI-FLGANs: Multi Distributed Adversarial Networks for Non-IID distributed datasets
Improving privacy of Federated Learning Generative Adversarial Networks using Intel SGX
Improving privacy of Federated Learning Generative Adversarial Networks using Intel SGX
Using autoencoders on differentially private federated learning GANs
Using autoencoders on differentially private federated learning GANs
Effect of Homomorphic Encryption on the Performance of Training Federated Learning Generative Adversarial Networks
Effect of Homomorphic Encryption on the Performance of Training Federated Learning Generative Adversarial Networks
Analyzing Flow Rule Attacks and Policy Enforcement in Software Defined Networking
Analyzing Flow Rule Attacks and Policy Enforcement in Software Defined Networking
Side-channel Attacks on Inner Rounds of AES and PRESENT
Side-channel Attacks on Inner Rounds of AES and PRESENT: A deeper look into the inner rounds of SPN based block ciphers and how this vision can help us attack the intermediate bytes using Deep Learning
Adversarial Examples as a defense against Side-Channel Attacks
Adversarial Examples as a defense against Side-Channel Attacks: A novel approach for countermeasure design
Discovering health disparities: Designing a secure multiparty architecture for social health research
Discovering health disparities: Designing a secure multiparty architecture for social health research
A New Standard: Redesigning Autonomous Vehicle Communication Using Multi-Party Computation
A New Standard: Redesigning Autonomous Vehicle Communication Using Multi-Party Computation
Making private GPS data available to policy makers: Investigating the feasibility of multi-party computation for smart mobility
Making private GPS data available to policy makers: Investigating the feasibility of multi-party computation for smart mobility
Secure MPC-Sortition
Secure MPC-Sortition: Consolidating Innovations in Democracy and Cryptography
Mitigating game theoretic vulnerabilities in Chainlink
Mitigating game theoretic vulnerabilities in Chainlink
Mitigating sandwich attacks in Kyber DMM
Mitigating sandwich attacks in Kyber DMM
Searched for: contributor%3A%22Urbano%2C+Juli%C3%A1n+%28graduation+committee%29%22
(1 - 20 of 28)

Pages