Kanhere, Salil S.
460  results:
Search for persons X
?
2

Demo: P4 Based In-network ML with Federated Learning to Sec..:

, In: 2024 IEEE 25th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM),
 
?
3

OCHJRNChain: A Blockchain-Based Security Data Sharing Frame..:

Hong, Yujie ; Yang, Liang ; Xiong, Zehui..
IEEE Transactions on Intelligent Transportation Systems.  25 (2024)  6 - p. 5299-5311 , 2024
 
?
4

SoK: False Information, Bots and Malicious Campaigns: Demys..:

, In: Proceedings of the 19th ACM Asia Conference on Computer and Communications Security,
 
?
 
?
6

VLIA: Navigating Shadows with Proximity for Highly Accurate..:

, In: Proceedings of the 19th ACM Asia Conference on Computer and Communications Security,
 
?
8

Make out like a (Multi-Armed) Bandit: Improving the Odds of..:

, In: Proceedings of the 19th ACM Asia Conference on Computer and Communications Security,
Luo, Simon ; Herrera, Adrian ; Quirk, Paul... - p. 1463-1479 , 2024
 
?
9

SoK: Can Trajectory Generation Combine Privacy and Utility?:

Buchholz, Erik ; Abuadbba, Alsharif ; Wang, Shuo..
Proceedings on Privacy Enhancing Technologies.  2024 (2024)  3 - p. 75-93 , 2024
 
?
11

Transformative effects of ChatGPT on modern education: Emer..:

Gill, Sukhpal Singh ; Xu, Minxian ; Patros, Panos...
Internet of Things and Cyber-Physical Systems.  4 (2024)  - p. 19-23 , 2024
 
?
12

Honeyfile Camouflage: Hiding Fake Files in Plain Sight:

, In: Proceedings of the 3rd ACM Workshop on the Security Implications of Deepfakes and Cheapfakes,
 
?
14

Domain Invariant Driving Behaviour Prediction Based on Auto..:

, In: 2024 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops),
 
?
15

SplITS: Split Input-to-State Mapping for Effective Firmware..:

, In: Computer Security – ESORICS 2023; Lecture Notes in Computer Science,
Farrelly, Guy ; Quirk, Paul ; Kanhere, Salil S... - p. 290-310 , 2024
 
1-15