PALL 发表于 2025-3-27 00:44:34
A Lattice-Based Ring Signature Scheme to Secure Automated Valet Parking relevant information to parking lot providers to complete the parking reservation and automatic parking. However, that reveals the drivers’ identity information and the reservation messages might be forged. In addition, with quantum computers developing rapidly, existing systems also suffer from pr放逐 发表于 2025-3-27 02:19:42
AOPL: Attention Enhanced Oversampling and Parallel Deep Learning Model for Attack Detection in Imbalt and get a superior detection result. However, the actual network traffic data is imbalanced due to the less frequent network attacks than the normal, which decreases the models’ performance. To reduce the impact of imbalanced data, an AOPL model is proposed in this paper, consisting of Attention M昆虫 发表于 2025-3-27 05:49:25
Greedy-Based Black-Box Adversarial Attack Scheme on Graph StructureHowever, most attack schemes are not accurate in locating target nodes and lock unnoticeable perturbations from the perspective of graph embedding space, leading to a low success rate of attack and high perturbation on node classification tasks. To overcome these problems, we propose a greedy-basedconservative 发表于 2025-3-27 12:37:31
SECCEG: A Secure and Efficient Cryptographic Co-processor Based on Embedded GPU Systemon high-volume cryptographic computing. Meanwhile, driven by deep learning, the embedded GPU system is rapidly evolving. In this paper, we discuss the feasibility of turning the lightweight and energy efficient system into a cryptographic co-processor, where security and performance are two dauntingcalamity 发表于 2025-3-27 17:31:15
Understanding and Mitigating Security Risks of Network on Medical Cyber Physical Systemions and network. MCPS utilizes high-level supervisory and low-level communication middleware to enable medical devices to interoperate efficiently. Despite the benefits provided by MCPS, the integration of clinical information also brings new threats for the clinical data. In this paper, we performcliche 发表于 2025-3-27 21:04:41
RF-Ubia: User Biometric Information Authentication Based on RFIDor biometric information (e.g., fingerprints) for identity authentication. However, there are security risks when these authentication methods are applied solely. For example, if the password is compromised, it is unlikely to determine whether the user is legitimate based on the password. In this paCHASE 发表于 2025-3-28 00:34:59
NFDD: A Dynamic Malicious Document Detection Method Without Manual Feature Dictionaryand updating the feature dictionary is a complex task that requires a lot of manual work. The detection effect of feature dictionary is limited by expert experience, and it cannot deal with unknown samples. To overcome the above limitations, we propose the no manual feature dictionary detection modesebaceous-gland 发表于 2025-3-28 03:08:09
Bug Triage Model Considering Cooperative and Sequential Relationship the bug by analyzing the text content of the bug report or relationship network. However, the bug repair is a cooperative process with sequential relationship. The tracking system records bugs successively according to the time, which indicates the dynamic changes of the tracking system. In additioEmbolic-Stroke 发表于 2025-3-28 09:45:57
Adaptive Chosen Plaintext Side-Channel Attacks for Higher-Order Masking Schemesside channel attacks. Higher-order masking schemes have been proved in theory to be the secure countermeasures against side-channel attacks. When . th-order masking is involved, the complexity of performing a higher-order SCA grows exponentially with the order ., which can be regarded as the main di图表证明 发表于 2025-3-28 13:14:42
Mind the Amplification: Cracking Content Delivery Networks via DDoS Attacksity, i.e., providing fast delivery of the Internet content. CDN is often part of a mature enterprise level network, but due to the distributed nature, CDN may be vulnerable to a distributed denial-of-service attack (DDoS), in which the cyber-attackers try to flood the victim with overloaded traffic