Search
Now showing items 1-2 of 2
Website Fingerprinting Attacks
(2019-05-01)
Most privacy-conscious users utilize HTTPS and an anonymity network such as Tor to mask source and destination IP addresses. It has been shown that encrypted and anonymized network traffic traces can still leak information ...
Interpreting natural language processing (NLP) models and lifting their limitations
(2021-07)
There have been many advances in the artificial intelligence field due to the emergence of deep learning and big data. In almost all sub-fields, artificial neural networks have reached or exceeded human-level performance. ...