找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Science of Cyber Security; 5th International Co Moti Yung,Chao Chen,Weizhi Meng Conference proceedings 2023 The Editor(s) (if applicable) a

[復(fù)制鏈接]
樓主: chondrocyte
51#
發(fā)表于 2025-3-30 09:53:12 | 只看該作者
Enhancing the Anti-steganalysis Ability of Image Steganography via Multiple Adversarial Networksthe original image using multiple lightweight channel attention modules in the generator, thus enhancing the anti-steganalysis ability of adversarial images. Furthermore, the proposed method utilizes multiple discrimination losses and MSE loss, dynamically combined to improve the quality of adversar
52#
發(fā)表于 2025-3-30 12:32:36 | 只看該作者
53#
發(fā)表于 2025-3-30 19:54:22 | 只看該作者
Real-Time Aggregation for?Massive Alerts Based on?Dynamic Attack Granularity Graphncluding ., and select three common alert aggregation algorithms to perform a comparative test in a simulated real-time situation. The experiment shows that our approach achieves more than 98% aggregation rate, reduces data complexity by more than 82%, and has stronger robustness.
54#
發(fā)表于 2025-3-30 23:29:18 | 只看該作者
Decompilation Based Deep Binary-Source Function Matchingsyntactic and semantic information. In this way, the binary and source functions are represented in the same feature space so to ease the matching model to learn function similarity. For the matching model, we adopt a self-attention based siamese network with contrastive loss. Experiments on two dat
55#
發(fā)表于 2025-3-31 04:53:27 | 只看該作者
ACDroid: Detecting Collusion Applications on?Smart Devicesd IOT (Internet of Things) platforms. Most of these smart devices are designed based on the Android framework, and the security of Android applications is particularly important for these smart devices. To facilitate communication between applications, ICC (Inter-Component Communication) is widely u
56#
發(fā)表于 2025-3-31 05:25:58 | 只看該作者
: Lightweight Intra-enclave Isolation for?Confidential Virtual Machines sensitive and regulated data. This approach relies heavily on hardware-based Trusted Execution Environments (TEE), which establish isolated regions for data processing within a protected CPU region. Currently, a variety of TEEs (such as p-enclave in HyperEnclave and AMD SEV) support privilege separ
57#
發(fā)表于 2025-3-31 10:45:41 | 只看該作者
58#
發(fā)表于 2025-3-31 14:16:35 | 只看該作者
59#
發(fā)表于 2025-3-31 20:16:50 | 只看該作者
60#
發(fā)表于 2025-3-31 22:36:47 | 只看該作者
A Graphical Password Scheme Based on?Rounded Image Selection design and build a more secure and robust graphical password system with the resistance to multiple attacks modalities, especially brute force attack, guessing attack and shoulder-surfing attack, it is important to avoid the credentials being captured in just one step, e.g., by adding several round
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-7 14:41
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
东乡族自治县| 隆尧县| 佛坪县| 额敏县| 靖边县| 廊坊市| 万州区| 泰和县| 个旧市| 贵定县| 托克托县| 成安县| 漳浦县| 铜山县| 邮箱| 尼木县| 白山市| 竹北市| 监利县| 巴彦县| 纳雍县| 奉化市| 买车| 亚东县| 玉田县| 纳雍县| 六盘水市| 西乌| 常山县| 泌阳县| 于田县| 秦皇岛市| 西华县| 荣昌县| 和静县| 射洪县| 延边| 辛集市| 调兵山市| 磐石市| 新竹县|