找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Science of Cyber Security; 5th International Co Moti Yung,Chao Chen,Weizhi Meng Conference proceedings 2023 The Editor(s) (if applicable) a

[復(fù)制鏈接]
樓主: chondrocyte
51#
發(fā)表于 2025-3-30 09:53:12 | 只看該作者
Enhancing the Anti-steganalysis Ability of Image Steganography via Multiple Adversarial Networksthe original image using multiple lightweight channel attention modules in the generator, thus enhancing the anti-steganalysis ability of adversarial images. Furthermore, the proposed method utilizes multiple discrimination losses and MSE loss, dynamically combined to improve the quality of adversar
52#
發(fā)表于 2025-3-30 12:32:36 | 只看該作者
53#
發(fā)表于 2025-3-30 19:54:22 | 只看該作者
Real-Time Aggregation for?Massive Alerts Based on?Dynamic Attack Granularity Graphncluding ., and select three common alert aggregation algorithms to perform a comparative test in a simulated real-time situation. The experiment shows that our approach achieves more than 98% aggregation rate, reduces data complexity by more than 82%, and has stronger robustness.
54#
發(fā)表于 2025-3-30 23:29:18 | 只看該作者
Decompilation Based Deep Binary-Source Function Matchingsyntactic and semantic information. In this way, the binary and source functions are represented in the same feature space so to ease the matching model to learn function similarity. For the matching model, we adopt a self-attention based siamese network with contrastive loss. Experiments on two dat
55#
發(fā)表于 2025-3-31 04:53:27 | 只看該作者
ACDroid: Detecting Collusion Applications on?Smart Devicesd IOT (Internet of Things) platforms. Most of these smart devices are designed based on the Android framework, and the security of Android applications is particularly important for these smart devices. To facilitate communication between applications, ICC (Inter-Component Communication) is widely u
56#
發(fā)表于 2025-3-31 05:25:58 | 只看該作者
: Lightweight Intra-enclave Isolation for?Confidential Virtual Machines sensitive and regulated data. This approach relies heavily on hardware-based Trusted Execution Environments (TEE), which establish isolated regions for data processing within a protected CPU region. Currently, a variety of TEEs (such as p-enclave in HyperEnclave and AMD SEV) support privilege separ
57#
發(fā)表于 2025-3-31 10:45:41 | 只看該作者
58#
發(fā)表于 2025-3-31 14:16:35 | 只看該作者
59#
發(fā)表于 2025-3-31 20:16:50 | 只看該作者
60#
發(fā)表于 2025-3-31 22:36:47 | 只看該作者
A Graphical Password Scheme Based on?Rounded Image Selection design and build a more secure and robust graphical password system with the resistance to multiple attacks modalities, especially brute force attack, guessing attack and shoulder-surfing attack, it is important to avoid the credentials being captured in just one step, e.g., by adding several round
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-7 14:41
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
息烽县| 铅山县| 咸阳市| 平罗县| 溧水县| 沁水县| 定安县| 咸丰县| 嫩江县| 安西县| 远安县| 探索| 随州市| 巴南区| 白山市| 名山县| 肇州县| 洞口县| 龙里县| 凉城县| 平邑县| 安宁市| 额济纳旗| 广南县| 娄烦县| 武义县| 微山县| 广州市| 青川县| 林周县| 鸡泽县| 乌兰浩特市| 绵竹市| 宝山区| 襄樊市| 儋州市| 个旧市| 亚东县| 普安县| 榆中县| 彭阳县|