找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Science of Cyber Security; 5th International Co Moti Yung,Chao Chen,Weizhi Meng Conference proceedings 2023 The Editor(s) (if applicable) a

[復(fù)制鏈接]
樓主: chondrocyte
51#
發(fā)表于 2025-3-30 09:53:12 | 只看該作者
Enhancing the Anti-steganalysis Ability of Image Steganography via Multiple Adversarial Networksthe original image using multiple lightweight channel attention modules in the generator, thus enhancing the anti-steganalysis ability of adversarial images. Furthermore, the proposed method utilizes multiple discrimination losses and MSE loss, dynamically combined to improve the quality of adversar
52#
發(fā)表于 2025-3-30 12:32:36 | 只看該作者
53#
發(fā)表于 2025-3-30 19:54:22 | 只看該作者
Real-Time Aggregation for?Massive Alerts Based on?Dynamic Attack Granularity Graphncluding ., and select three common alert aggregation algorithms to perform a comparative test in a simulated real-time situation. The experiment shows that our approach achieves more than 98% aggregation rate, reduces data complexity by more than 82%, and has stronger robustness.
54#
發(fā)表于 2025-3-30 23:29:18 | 只看該作者
Decompilation Based Deep Binary-Source Function Matchingsyntactic and semantic information. In this way, the binary and source functions are represented in the same feature space so to ease the matching model to learn function similarity. For the matching model, we adopt a self-attention based siamese network with contrastive loss. Experiments on two dat
55#
發(fā)表于 2025-3-31 04:53:27 | 只看該作者
ACDroid: Detecting Collusion Applications on?Smart Devicesd IOT (Internet of Things) platforms. Most of these smart devices are designed based on the Android framework, and the security of Android applications is particularly important for these smart devices. To facilitate communication between applications, ICC (Inter-Component Communication) is widely u
56#
發(fā)表于 2025-3-31 05:25:58 | 只看該作者
: Lightweight Intra-enclave Isolation for?Confidential Virtual Machines sensitive and regulated data. This approach relies heavily on hardware-based Trusted Execution Environments (TEE), which establish isolated regions for data processing within a protected CPU region. Currently, a variety of TEEs (such as p-enclave in HyperEnclave and AMD SEV) support privilege separ
57#
發(fā)表于 2025-3-31 10:45:41 | 只看該作者
58#
發(fā)表于 2025-3-31 14:16:35 | 只看該作者
59#
發(fā)表于 2025-3-31 20:16:50 | 只看該作者
60#
發(fā)表于 2025-3-31 22:36:47 | 只看該作者
A Graphical Password Scheme Based on?Rounded Image Selection design and build a more secure and robust graphical password system with the resistance to multiple attacks modalities, especially brute force attack, guessing attack and shoulder-surfing attack, it is important to avoid the credentials being captured in just one step, e.g., by adding several round
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-7 14:41
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
东明县| 当雄县| 濉溪县| 三台县| 分宜县| 曲麻莱县| 贡觉县| 凤冈县| 南充市| 韶山市| 合水县| 甘孜| 寻甸| 区。| 洪洞县| 闵行区| 中西区| 侯马市| 绥棱县| 万全县| 思南县| 崇信县| 淮南市| 丹巴县| 利津县| 榆中县| 大冶市| 都兰县| 沁水县| 永顺县| 刚察县| 阿鲁科尔沁旗| 汤原县| 淳安县| 巴中市| 包头市| 胶南市| 肇庆市| 甘肃省| 丹凤县| 家居|