Stories

  1. Article
    Similarities, differences, and relationships of comparable self-x system classes
  2. Article
    Moneywork: bridging fragmented digital payments
  3. Article
    AI That Learns From Your Habits to Improve Your Health Without Exposing Your Data
  4. Article
    SCALE-CCL: A Scalable Collective Communication Library for Wide-Area Distributed Training
  5. Article
    Simplifying Network Analysis in ns-3 with a Linux-style Socket Statistics Tool
  6. Article
    Multi-robot communication isolation with ROS2
  7. Article
    Low HP: Evaluating the Accuracy of Medicine in Video Games
  8. Article
    Survey of Action Recognition, Spotting and Spatio-Temporal Localization in Soccer
  9. Article
    Realizing Corrupted-Shard Tolerance: A Sharding Blockchain with Preserving Global Resilience
  10. Article
    A Decade-long Analysis of Global Trends in Advanced Persistent Threats
  11. Article
    Action is All You Need: Dual-Flow Generative Ranking Network for Recommendation
  12. Article
    Emergency Recovery of Data Stored Privately on the Cloud
  13. Article
    Are Cryptocurrencies Becoming More Decentralized? A 15-Year Study of 7 Major Ecosystems.
  14. Article
    How humans and AI notice what is missing in images and stories
  15. Article
    A Practical System for Understanding and Monitoring Computer Vision AI Models
  16. Article
    AI-Powered Disassembly for Understanding Compiled Software
  17. Article
    BLACKOUT: Making software both memory-safe and free from side-channel leaks
  18. Article
    Hiding in Plain Sight: Disrupting Malware’s Secret Web Dead Drops
  19. Article
    A Marine Wildlife Video Dataset
  20. Article
    WinSpy: Cross-window Side-channel Attacks on Android's Multi-window Mode
  21. Article
    Audio deepfake detection with visual artifacts
  22. Article
    Clearer Ultrasound Scans: Removing Noise Without Human Help
  23. Article
    Creating Realistic Medical Images Without the Need for Human Labels
  24. Article
    Measuring the deployment of DNSSEC Bootstrapping Using Authenticated Signals
  25. Article
    LLM-based Community Search via Dual-agent Collaboration
  26. Article
    Hidden risks: Fake data can manipulate rankings in local privacy systems
  27. Article
    Protecting Smart Voice Assistants from Invisible and Malicious Audio Attacks
  28. Article
    Demo: Split-and-Pipeline: Collaborative Large Model Inference on Edge Devices
  29. Article
    AI Links the Cause of Stroke to the Damage Seen on Brain Scans
  30. Article
    Using AI to Detect Cyberattacks in Cloud Software Pipelines
  31. Article
    Technology and the Future of Tibetan Cultural Preservation
  32. Article
    Story of my career
  33. Article
    Virtual Reality Banking
  34. Article
    A Scalable Hybrid Approach Using Generative AI for Recommendations.
  35. Article
    Matching Street Photos to Satellite Images Using AI Reasoning
  36. Article
    A Clear Overview of Chaos Engineering and How It Strengthens Software Resilience