Zobrazeno 1 - 10
of 107
pro vyhledávání: '"Asghar, Muhammad Rizwan"'
Autor:
Xing, Zhibo, Zhang, Zijian, Li, Meng, Liu, Jiamou, Zhu, Liehuang, Russello, Giovanni, Asghar, Muhammad Rizwan
Since the concern of privacy leakage extremely discourages user participation in sharing data, federated learning has gradually become a promising technique for both academia and industry for achieving collaborative learning without leaking informati
Externí odkaz:
http://arxiv.org/abs/2304.05590
Publikováno v:
In Computers & Security October 2024 145
Publikováno v:
In Computer Networks June 2024 247
Autor:
Alhidaifi, Saleh Mohamed1 (AUTHOR) s.al-hidaifi.1@research.gla.ac.uk, Asghar, Muhammad Rizwan2 (AUTHOR) r.asghar@auckland.ac.nz, Ansari, Imran Shafique1 (AUTHOR) ansarimrans@gmail.com
Publikováno v:
ACM Computing Surveys. Aug2024, Vol. 56 Issue 8, p1-48. 48p.
Autor:
Asghar, Muhammad Rizwan, Galbraith, Steven, Lanzi, Andrea, Russello, Giovanni, Zobernig, Lukas
Most recent theoretical literature on program obfuscation is based on notions like Virtual Black Box (VBB) obfuscation and indistinguishability Obfuscation (iO). These notions are very strong and are hard to satisfy. Further, they offer far more prot
Externí odkaz:
http://arxiv.org/abs/2011.02607
Searchable Encryption (SE) is a technique that allows Cloud Service Providers (CSPs) to search over encrypted datasets without learning the content of queries and records. In recent years, many SE schemes have been proposed to protect outsourced data
Externí odkaz:
http://arxiv.org/abs/1909.11624
Advanced attack campaigns span across multiple stages and stay stealthy for long time periods. There is a growing trend of attackers using off-the-shelf tools and pre-installed system applications (such as \emph{powershell} and \emph{wmic}) to evade
Externí odkaz:
http://arxiv.org/abs/1905.07273
Passwords are widely used for client to server authentication as well as for encrypting data stored in untrusted environments, such as cloud storage. Both, authentication and encrypted cloud storage, are usually discussed in isolation. In this work,
Externí odkaz:
http://arxiv.org/abs/1805.05033
Publikováno v:
In Journal of Information Security and Applications December 2022 71
Autor:
Wang, Song, Balarezo, Juan Fernando, Chavez, Karina Gomez, Al-Hourani, Akram, Kandeepan, Sithamparanathan, Asghar, Muhammad Rizwan, Russello, Giovanni
Publikováno v:
In Engineering Science and Technology, an International Journal November 2022 35