Cited By
View all- Allaart CAmiri SBal HBelloum AGommans Lvan Halteren AKlous S(2024)Private and Secure Distributed Deep Learning: A SurveyACM Computing Surveys10.1145/370345257:4(1-43)Online publication date: 15-Nov-2024
- ElZemity AArief B(2024)Privacy Threats and Countermeasures in Federated Learning for Internet of Things: A Systematic Review2024 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, Physical & Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics10.1109/iThings-GreenCom-CPSCom-SmartData-Cybermatics62450.2024.00072(331-338)Online publication date: 19-Aug-2024
- Kim JSong MSeo MJin YShin S(2024)PassREfinder: Credential Stuffing Risk Prediction by Representing Password Reuse between Websites on a Graph2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00020(1385-1404)Online publication date: 19-May-2024
- Show More Cited By