找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Science of Cyber Security; 5th International Co Moti Yung,Chao Chen,Weizhi Meng Conference proceedings 2023 The Editor(s) (if applicable) a

[復(fù)制鏈接]
樓主: chondrocyte
51#
發(fā)表于 2025-3-30 09:53:12 | 只看該作者
Enhancing the Anti-steganalysis Ability of Image Steganography via Multiple Adversarial Networksthe original image using multiple lightweight channel attention modules in the generator, thus enhancing the anti-steganalysis ability of adversarial images. Furthermore, the proposed method utilizes multiple discrimination losses and MSE loss, dynamically combined to improve the quality of adversar
52#
發(fā)表于 2025-3-30 12:32:36 | 只看該作者
53#
發(fā)表于 2025-3-30 19:54:22 | 只看該作者
Real-Time Aggregation for?Massive Alerts Based on?Dynamic Attack Granularity Graphncluding ., and select three common alert aggregation algorithms to perform a comparative test in a simulated real-time situation. The experiment shows that our approach achieves more than 98% aggregation rate, reduces data complexity by more than 82%, and has stronger robustness.
54#
發(fā)表于 2025-3-30 23:29:18 | 只看該作者
Decompilation Based Deep Binary-Source Function Matchingsyntactic and semantic information. In this way, the binary and source functions are represented in the same feature space so to ease the matching model to learn function similarity. For the matching model, we adopt a self-attention based siamese network with contrastive loss. Experiments on two dat
55#
發(fā)表于 2025-3-31 04:53:27 | 只看該作者
ACDroid: Detecting Collusion Applications on?Smart Devicesd IOT (Internet of Things) platforms. Most of these smart devices are designed based on the Android framework, and the security of Android applications is particularly important for these smart devices. To facilitate communication between applications, ICC (Inter-Component Communication) is widely u
56#
發(fā)表于 2025-3-31 05:25:58 | 只看該作者
: Lightweight Intra-enclave Isolation for?Confidential Virtual Machines sensitive and regulated data. This approach relies heavily on hardware-based Trusted Execution Environments (TEE), which establish isolated regions for data processing within a protected CPU region. Currently, a variety of TEEs (such as p-enclave in HyperEnclave and AMD SEV) support privilege separ
57#
發(fā)表于 2025-3-31 10:45:41 | 只看該作者
58#
發(fā)表于 2025-3-31 14:16:35 | 只看該作者
59#
發(fā)表于 2025-3-31 20:16:50 | 只看該作者
60#
發(fā)表于 2025-3-31 22:36:47 | 只看該作者
A Graphical Password Scheme Based on?Rounded Image Selection design and build a more secure and robust graphical password system with the resistance to multiple attacks modalities, especially brute force attack, guessing attack and shoulder-surfing attack, it is important to avoid the credentials being captured in just one step, e.g., by adding several round
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國(guó)際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-7 23:05
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
漯河市| 湖南省| 泰和县| 将乐县| 永顺县| 噶尔县| 改则县| 峨边| 郑州市| 津市市| 修文县| 潍坊市| 梅河口市| 淮南市| 缙云县| 霍林郭勒市| 普兰县| 阆中市| 广东省| 嫩江县| 贺兰县| 自治县| 元谋县| 阳东县| 西藏| 郧西县| 大埔区| 崇左市| 磴口县| 马尔康县| 方正县| 宜春市| 东莞市| 凤庆县| 宁河县| 琼结县| 依兰县| 怀宁县| 武冈市| 德格县| 江口县|