Search by property

This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.

Search by property

A list of all pages that have property "Has Title" with value "Securing IoT: Unveiling Attacks with Multiview-Multitask Learning". Since there have been only a few results, also nearby values are displayed.

â§Ľshowingresultsâ§˝

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)


    

List of results

  • Publication:624  + (SBST Tool Competition 2021)
  • Publication:681  + (SDR-NNP: Sharpened Dimensionality Reduction with Neural Networks)
  • Publication:704  + (SERRANO: Transparent Application Deployment in a Secure, Accelerated and Cognitive Cloud Continuum)
  • Publication:595  + (SGDE: Secure Generative Data Exchange for Cross-Silo Federated Learning)
  • Publication:198  + (SHIELD: Scalable and Holistic Evaluation Framework for ML-Based 5G Jamming Detection)
  • Publication:664  + (SIM-PIPE DryRunner: An approach for testing container-based big data pipelines and generating simulation data)
  • Publication:765  + (Safety by Construction: Pattern-Based Application of Safety Mechanisms in XANDAR)
  • Publication:157  + (Sandboxing Functions For Efficient and Secure Multi-tenant Serverless Deployments)
  • Publication:538  + (Scalable Plug-and-Play Robotic Fabrics Based on Kilobot Modules)
  • Publication:421  + (Scalable energy-aware VM allocation on cloud data centers through mathematical programming models)
  • Publication:650  + (Scaling Data Science Solutions with Semantics and Machine Learning: Bosch Case)
  • Publication:156  + (Scaling Serverless Functions in Edge Networks: A Reinforcement Learning Approach)
  • Publication:321  + (Scaling Up Performance of Managed Applications on NUMA Systems)
  • Publication:384  + (Scaling a Variant Calling Genomics Pipeline with FaaS)
  • Publication:106  + (Scheduling Latency-Sensitive Tasks in the Cloud Continuum with Hierarchical Reinforcement Learning)
  • Publication:113  + (Scheduling Multi-Component Applications Across Federated Edge Clusters With Phare)
  • Publication:657  + (Scheduling of Distributed Applications on the Computing Continuum: A Survey)
  • Publication:503  + (Seamless User-Generated Content Processing for Smart Media: Delivering QoE-Aware Live Media with YOLO-Based Bib Number Recognition)
  • Publication:178  + (Sec5GLoc: Securing 5G Indoor Localization via Adversary-Resilient Deep Learning Architecture)
  • Publication:540  + (Secure Communication for the IoT: EDHOC and (Group) OSCORE Protocols)
  • Publication:862  + (Secure Distributed Storage Orchestration on Heterogeneous Cloud-Edge Infrastructures)
  • Publication:463  + (Secure Sensor Prototype Using Hardware Security Modules and Trusted Execution Environments in a Blockchain Application: Wine Logistic Use Case)
  • Publication:599  + (Secure execution of ML workflows on the Computing Continuum)
  • Publication:99  + (SecureExecutor: An Automated Way to Leverage SCONE to Enhance Application Security)
  • Publication:708  + (Secured Distributed Storage Resource Allocation on Cloud-Edge Infrastructures)
  • Publication:565  + (Securing IoT: Unveiling Attacks with Multiview-Multitask Learning)
  • Publication:351  + (Securing P4-SDN Data Plane against Flow Table Modification Attack)
  • Publication:596  + (Securing the Execution of ML Workflows across the Compute Continua)
  • Publication:705  + (Securitization of cloud, edge and IoT communications through hardware accelerations/offloadings)
  • Publication:736  + (Security Requirements as Code: Example from VeriDevOps Project)
  • Publication:748  + (Security Requirements as Code:Example from VeriDevOps Project)
  • Publication:744  + (Security Testing and Resilience)
  • Publication:777  + (Security in Cloud-Native Services: A Survey on Key Features)
  • Publication:487  + (Security in DevSecOps: Applying Tools and Machine Learning to Verification and Monitoring Steps)
  • Publication:414  + (Self-* capabilities of heterogeneous nodes in the computing continuum; a research review)
  • Publication:334  + (Semantic Programming for Device-Edge-Cloud Continuum)
  • Publication:402  + (Semantic-Enhanced Digital Twin System for Robot Environment Interaction Monitoring)
  • Publication:1  + (Semantics for Resource Selection in Next Generation Internet of Things Systems)
  • Publication:724  + (Semi-Grant-Free Non-Orthogonal Multiple Access for Tactile Internet of Things)
  • Publication:55  + (Serverful Functions: Leveraging Servers in Complex Serverless Workflows (industry track))
  • Publication:797  + (Serverless Workflows for Containerised Applications in the Cloud Continuum)
  • Publication:464  + (Serverless computing: A security perspective)
  • Publication:781  + (Serverless computing: a security perspective)
  • Publication:354  + (Set in stone: Analysis of an immutable web3 social media platform)
  • Publication:304  + (Sharing the control of robot swarms among multiple human operators: A user study)
  • Publication:84  + (Shedding Light on Static Partitioning Hypervisors for Arm-based Mixed-Criticality Systems)
  • Publication:320  + (Short Paper: Estimating Patch Propagation Times across Blockchain Forks)
  • Publication:332  + (Short Reasons for Long Vectors in HPC CPUs: A Study Based on RISC-V)
  • Publication:168  + (Should I Stay or Should I Go: A Learning Approach for Drone-based Sensing Applications)
  • Publication:4  + (Sicherheitsmechanismen des Cloud-Computings zur Verwendung in Korrekturverfahren)
  • Publication:20  + (Side-Channel Analysis of OpenVINO-based Neural Network Models)