標(biāo)題: Titlebook: Information and Communications Security; 23rd International C Debin Gao,Qi Li,Xiaofeng Liao Conference proceedings 2021 Springer Nature Swi [打印本頁] 作者: Cession 時間: 2025-3-21 17:45
書目名稱Information and Communications Security影響因子(影響力)
書目名稱Information and Communications Security影響因子(影響力)學(xué)科排名
書目名稱Information and Communications Security網(wǎng)絡(luò)公開度
書目名稱Information and Communications Security網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Information and Communications Security被引頻次
書目名稱Information and Communications Security被引頻次學(xué)科排名
書目名稱Information and Communications Security年度引用
書目名稱Information and Communications Security年度引用學(xué)科排名
書目名稱Information and Communications Security讀者反饋
書目名稱Information and Communications Security讀者反饋學(xué)科排名
作者: 變量 時間: 2025-3-21 21:37 作者: 排斥 時間: 2025-3-22 01:39 作者: gusher 時間: 2025-3-22 07:12
Nikolay Ivanov,Hanqing Guo,Qiben Yanresponding to our era‘s challenges. The polyphonic paradigm it proposes uses current educational elements to produce "a new whole" connecting technology, varied learning spaces, humanizing pedagogy, and global values of personal, social, and environmental??responsibility...Combining all these elemen作者: 送秋波 時間: 2025-3-22 11:15 作者: CURL 時間: 2025-3-22 15:54 作者: Expertise 時間: 2025-3-22 20:20 作者: Brittle 時間: 2025-3-23 00:51
Junnan Wang,Qixu Liu,Chaoge Liu,Jie Yinresponding to our era‘s challenges. The polyphonic paradigm it proposes uses current educational elements to produce "a new whole" connecting technology, varied learning spaces, humanizing pedagogy, and global values of personal, social, and environmental??responsibility...Combining all these elemen作者: ingenue 時間: 2025-3-23 05:09
Ahmed Tanvir Mahdad,Mohammed Jubur,Nitesh Saxenamensionality and polyphony of our reality.The book as theore.The book Cultivating Future-Oriented Learners: Polyphonic Education in a Changing World offers a new theoretical and practical educational approach, responding to our era‘s challenges. The polyphonic paradigm it proposes uses current educa作者: sulcus 時間: 2025-3-23 08:18
mensionality and polyphony of our reality.The book as theore.The book Cultivating Future-Oriented Learners: Polyphonic Education in a Changing World offers a new theoretical and practical educational approach, responding to our era‘s challenges. The polyphonic paradigm it proposes uses current educa作者: vasospasm 時間: 2025-3-23 10:43
Chuan Zhou,Huiyun Jing,Xin He,Liming Wang,Kai Chen,Duohe Mamensionality and polyphony of our reality.The book as theore.The book Cultivating Future-Oriented Learners: Polyphonic Education in a Changing World offers a new theoretical and practical educational approach, responding to our era‘s challenges. The polyphonic paradigm it proposes uses current educa作者: Osteons 時間: 2025-3-23 17:25 作者: 細胞學(xué) 時間: 2025-3-23 20:43
Kunyu Yang,Xuexian Hu,Qihui Zhang,Jianghong Wei,Wenfen Liuresponding to our era‘s challenges. The polyphonic paradigm it proposes uses current educational elements to produce "a new whole" connecting technology, varied learning spaces, humanizing pedagogy, and global values of personal, social, and environmental??responsibility...Combining all these elemen作者: 吞沒 時間: 2025-3-24 01:32 作者: Pander 時間: 2025-3-24 05:34
Huiying Wang,Huixin Shen,Boyang Zhang,Yu Wen,Dan Mengmensionality and polyphony of our reality.The book as theore.The book Cultivating Future-Oriented Learners: Polyphonic Education in a Changing World offers a new theoretical and practical educational approach, responding to our era‘s challenges. The polyphonic paradigm it proposes uses current educa作者: appall 時間: 2025-3-24 07:12
Yucheng Liu,Xiangxue Liresponding to our era‘s challenges. The polyphonic paradigm it proposes uses current educational elements to produce "a new whole" connecting technology, varied learning spaces, humanizing pedagogy, and global values of personal, social, and environmental??responsibility...Combining all these elemen作者: Lime石灰 時間: 2025-3-24 11:54
Qin Si,Lei Cui,Lun Li,Zhenquan Ding,Yongji Liu,Zhiyu Haomensionality and polyphony of our reality.The book as theore.The book Cultivating Future-Oriented Learners: Polyphonic Education in a Changing World offers a new theoretical and practical educational approach, responding to our era‘s challenges. The polyphonic paradigm it proposes uses current educa作者: V洗浴 時間: 2025-3-24 16:12 作者: 發(fā)展 時間: 2025-3-24 23:05
Rectifying Administrated ERC20 Tokenstes the popular notions of “decentralized banking” and “tokenized economy”. Yet, it is a common misconception to assume that the decentralization of blockchain entails the decentralization of smart contracts deployed on this blockchain. In practice, the developers of smart contracts implement ., suc作者: 大溝 時間: 2025-3-25 00:10
: Model Agnostic Defense against Targeted Poisoning Attacks in Federated Learningta poses a concern. The malicious participation injects malevolent gradient updates to make the model maleficent. They do not impose an overall ill-behavior. Instead, they target a few classes or patterns to misbehave. Label Flipping and Backdoor attacks belong to targeted poisoning attacks performi作者: 1FAWN 時間: 2025-3-25 07:20 作者: adumbrate 時間: 2025-3-25 09:52 作者: pacifist 時間: 2025-3-25 12:36
Analyzing the Security of OTP 2FA in the Face of Malicious Terminalsurity from multiple perspectives, considering its ubiquitous presence in the user’s day-to-day activities. In this work, we assess the security of seven commercially deployed .schemes against malware in the terminal attack model without compromising any 2FA device or authentication services. To impl作者: palliative-care 時間: 2025-3-25 16:04 作者: 字的誤用 時間: 2025-3-25 21:24
HIAWare: Speculate Handwriting on Mobile Devices with Built-In Sensorshers have shown that some touchscreen information, such as PIN and unlock pattern, can be speculated by background applications with motion sensors. Those attacks mainly focus on the restricted-area input interface (e.g., virtual keyboard). To date, the privacy risk in the unrestricted-area input in作者: GRIEF 時間: 2025-3-26 03:27 作者: Efflorescent 時間: 2025-3-26 05:15
CNN-Based Continuous Authentication on Smartphones with Auto Augmentation Searchfor deep feature extraction and the auto augmentation search is exploited for CNN training data augmentation. Specifically, CAuSe consists of three stages of the offline stage, registration stage and authentication stage. In the offline stage, we utilize auto augmentation search on the collected dat作者: 不容置疑 時間: 2025-3-26 10:31
Generating Adversarial Point Clouds on?Multi-modal Fusion Based 3D Object Detection Modelt Detection and Ranging) and camera sensors to perform 3D object detection. While single-modal (LiDAR-based and camera-based) models are found to be vulnerable to adversarial attacks, there are limited studies on the adversarial robustness of MMF models. Recent work has proposed a general spoofing a作者: 裁決 時間: 2025-3-26 16:42 作者: Inferior 時間: 2025-3-26 16:47
EmuIoTNet: An Emulated IoT Network for Dynamic Analysisating on a single IoT device, it is challenging to find security issues hidden in communication channels. This paper presents EmuIoTNet, a tool capable of automatically building an emulated IoT network for dynamic analysis. First, EmuIoTNet prepares an emulated hardware environment to emulate a numb作者: 膽大 時間: 2025-3-26 21:27 作者: synovial-joint 時間: 2025-3-27 03:55
TranFuzz: An Ensemble Black-Box Attack Framework Based on Domain Adaptation and Fuzzingof data and neural networks all black-box. This paper fully considers the relationship between the challenges related to data black-box and model black-box and proposes an effective and efficient non-target attack framework, namely TranFuzz. On the one hand, TranFuzz introduces a domain adaptation-b作者: 印第安人 時間: 2025-3-27 06:02 作者: 驕傲 時間: 2025-3-27 11:35 作者: endocardium 時間: 2025-3-27 17:14 作者: ANTH 時間: 2025-3-27 19:53 作者: 率直 時間: 2025-3-28 00:07
Conference proceedings 2021issions. The papers in Part I are organized in the following thematic blocks:? blockchain and federated learning; malware analysis and detection; IoT security; software security; Internet security; data-driven cybersecurity..作者: 沒收 時間: 2025-3-28 05:50 作者: Interregnum 時間: 2025-3-28 09:03
Conference proceedings 2021urity, ICICS 2021, held in Chongqing, China, in September 2021.?The 49 revised full papers presented in the book were carefully selected from 182 submissions. The papers in Part I are organized in the following thematic blocks:? blockchain and federated learning; malware analysis and detection; IoT 作者: 收養(yǎng) 時間: 2025-3-28 12:28
0302-9743 ations Security, ICICS 2021, held in Chongqing, China, in September 2021.?The 49 revised full papers presented in the book were carefully selected from 182 submissions. The papers in Part I are organized in the following thematic blocks:? blockchain and federated learning; malware analysis and detec作者: 聲音刺耳 時間: 2025-3-28 15:47 作者: hemoglobin 時間: 2025-3-28 21:39
Source Identification from In-Vehicle CAN-FD Signaling: What Can We Expect?icle CAN-FD network from bus signaling and the contributions are four-fold..We hope our results could be used as a step forward and a guidance on securing the commercialization and batch production of in-vehicle CAN-FD network in the near future.作者: 注意力集中 時間: 2025-3-29 02:04 作者: A簡潔的 時間: 2025-3-29 04:30
TranFuzz: An Ensemble Black-Box Attack Framework Based on Domain Adaptation and Fuzzinghat the proposed method can achieve an attack success rate of more than 68% in a real-world CVS attack. Moreover, TranFuzz can also reinforce both the robustness (up?to 3.3%) and precision (up?to 5%) of the original neural network performance by taking advantage of the adversarial re-training.作者: Cardioplegia 時間: 2025-3-29 08:47
Rectifying Administrated ERC20 Tokensver these contracts. Moreover, the owners of these tokens carry lesser social and legal responsibilities compared to the traditional centralized actors that those tokens intend to disrupt. This entails two major problems: a) the owners of the tokens have the ability to quickly steal all the funds an作者: LAP 時間: 2025-3-29 13:54
: Model Agnostic Defense against Targeted Poisoning Attacks in Federated Learningures. The aggregation of interpreted values for important features against a baseline input detects the presence of an adversary. The proposed solution scales in terms of attackers and is also robust against adversarial noise in either homogeneous or heterogeneous distribution. The most appealing ab作者: 內(nèi)閣 時間: 2025-3-29 18:29 作者: 歌曲 時間: 2025-3-29 20:18
GAN-Based Adversarial Patch for Malware C2 Traffic to Bypass DL Detectorused by GAN training. Results show that the adversarial patch generated by GAN can prevent malware C2 traffic from being detected with 51.4% success rate. The higher time efficiency and smaller malware impact make our method more suitable for real attacks.作者: FLIT 時間: 2025-3-29 23:55
Analyzing the Security of OTP 2FA in the Face of Malicious Terminalswhich mostly use two variants of .and observed that almost all of them are vulnerable to this attack. Here, the threat model is practical as the attack components can be installed in the user’s terminal without any root/administrator privilege. Moreover, the attack modules require a small number of 作者: forager 時間: 2025-3-30 05:32 作者: 愛花花兒憤怒 時間: 2025-3-30 08:13
HIAWare: Speculate Handwriting on Mobile Devices with Built-In Sensorsre, to mitigate the impact of holding posture in handwriting, we propose a user-independent posture-aware approach. As a result, HIAWare can attack any victim without obtaining the victim’s information in advance. The experiments show that the speculation accuracy of HIAWare is close to 90.0%, demon作者: Inelasticity 時間: 2025-3-30 16:18
Studies of Keyboard Patterns in?Passwords: Recognition, Characteristics and Strength Evolutioned, which reveals a great deal of amazing facts about the preference for passwords based on keyboard patterns, such as: (1) More than half of the pattern-based passwords are completely composed by keyboard patterns; (2) The frequency distribution of the keyboard patterns satisfies the PDF-Zipf model作者: 偽證 時間: 2025-3-30 20:28
CNN-Based Continuous Authentication on Smartphones with Auto Augmentation Searchmal strategy and the performance of CAuSe. The experimental results demonstrate that the strategy of Time-Warping(0.6)+Time-Warping(0.6) reaches the highest accuracy of 93.19% with data size 400 and CAuSe achieves the best authentication accuracy of 96.93%, respectively, comparing with other strateg作者: 緊張過度 時間: 2025-3-30 22:35
Generating Adversarial Point Clouds on?Multi-modal Fusion Based 3D Object Detection Modelto generate adversarial point clouds with few points and prove the defect still exists in MMF architecture. We evaluate the attack effectiveness of different combinations of points and distances and generate universal adversarial examples at the best distance of 4m, which achieve attack success rate作者: Communal 時間: 2025-3-31 03:36
ACGVD: Vulnerability Detection Based on Comprehensive Graph via Graph Neural Network with Attentionetwork instead of the sequence-based model to automatically analyze the comprehensive graph. In order to solve the problem that the vulnerability information could be covered up, we add a double-level attention mechanism to the graph model. We also add a novel classification layer to extract the hig作者: 賠償 時間: 2025-3-31 05:17
unique teaching models to foster humanizing global values: diversity and inclusion, ecohumanistic responsibility, and a dialogue between diverse stands and perspectives. It guides learners toward attaining their objectives by acquiring independent learning skills. Together, these teaching models are作者: 健談 時間: 2025-3-31 09:17
Nikolay Ivanov,Hanqing Guo,Qiben Yanunique teaching models to foster humanizing global values: diversity and inclusion, ecohumanistic responsibility, and a dialogue between diverse stands and perspectives. It guides learners toward attaining their objectives by acquiring independent learning skills. Together, these teaching models are作者: 移植 時間: 2025-3-31 15:54 作者: orthodox 時間: 2025-3-31 20:37
unique teaching models to foster humanizing global values: diversity and inclusion, ecohumanistic responsibility, and a dialogue between diverse stands and perspectives. It guides learners toward attaining their objectives by acquiring independent learning skills. Together, these teaching models are