生动 发表于 2025-3-21 17:33:37
书目名称Applied Cryptography and Network Security Workshops影响因子(影响力)<br> http://figure.impactfactor.cn/if/?ISSN=BK0167504<br><br> <br><br>书目名称Applied Cryptography and Network Security Workshops影响因子(影响力)学科排名<br> http://figure.impactfactor.cn/ifr/?ISSN=BK0167504<br><br> <br><br>书目名称Applied Cryptography and Network Security Workshops网络公开度<br> http://figure.impactfactor.cn/at/?ISSN=BK0167504<br><br> <br><br>书目名称Applied Cryptography and Network Security Workshops网络公开度学科排名<br> http://figure.impactfactor.cn/atr/?ISSN=BK0167504<br><br> <br><br>书目名称Applied Cryptography and Network Security Workshops被引频次<br> http://figure.impactfactor.cn/tc/?ISSN=BK0167504<br><br> <br><br>书目名称Applied Cryptography and Network Security Workshops被引频次学科排名<br> http://figure.impactfactor.cn/tcr/?ISSN=BK0167504<br><br> <br><br>书目名称Applied Cryptography and Network Security Workshops年度引用<br> http://figure.impactfactor.cn/ii/?ISSN=BK0167504<br><br> <br><br>书目名称Applied Cryptography and Network Security Workshops年度引用学科排名<br> http://figure.impactfactor.cn/iir/?ISSN=BK0167504<br><br> <br><br>书目名称Applied Cryptography and Network Security Workshops读者反馈<br> http://figure.impactfactor.cn/5y/?ISSN=BK0167504<br><br> <br><br>书目名称Applied Cryptography and Network Security Workshops读者反馈学科排名<br> http://figure.impactfactor.cn/5yr/?ISSN=BK0167504<br><br> <br><br>Introduction 发表于 2025-3-21 21:16:04
http://reply.papertrans.cn/17/1676/167504/167504_2.png丰满中国 发表于 2025-3-22 02:42:21
LM-cAPI:A Lite Model Based on API Core Semantic Information for Malware Classificationnew types and quantities of malware coupled with the continuous updating of dissemination methods, the rapid and accurate identification of malware as well as providing precise support for corresponding warning and defense measures have become a crucial challenge in maintaining network security. Thi大喘气 发表于 2025-3-22 06:59:40
http://reply.papertrans.cn/17/1676/167504/167504_4.png种属关系 发表于 2025-3-22 10:48:51
FPGA Implementation of Physically Unclonable Functions Based on Multi-threshold Delay Time Measureme in semiconductor devices. Arbiter PUF is a typical extensive PUF that has a large space for challenge–response pairs (CPRs); however, it is vulnerable to deep learning (DL) attacks predicting unknown CRPs. One of the approaches to mitigate DL attacks is the RG-DTM PUF, which utilizes the delay timeFirefly 发表于 2025-3-22 14:54:11
Incorporating Cluster Analysis of Feature Vectors for Non-profiled Deep-learning-Based Side-Channel S 2019. In the proposed DDLA, the adversary sets the LSB or MSB of the intermediate value in the encryption process assumed for the key candidates as the ground-truth label and trains a deep neural network (DNN) with power traces as an input. The adversary also observes metrics such as loss and accu伪证 发表于 2025-3-22 18:36:03
Creating from Noise: Trace Generations Using Diffusion Model for Side-Channel Attackration of synthetic traces can help to improve attacks like profiling attacks. However, manually creating synthetic traces from actual traces is arduous. Therefore, automating this process of creating artificial traces is much needed. Recently, diffusion models have gained much recognition after beaTIA742 发表于 2025-3-22 23:21:53
Diversity Algorithms for Laser Fault Injection injection (FI). Within this process, FI aims to identify parameter combinations that reveal device vulnerabilities. The impracticality of conducting an exhaustive search over FI parameters has prompted the development of advanced and guided algorithms. However, these proposed methods often focus on护身符 发表于 2025-3-23 05:14:28
One for All, All for Ascon: Ensemble-Based Deep Learning Side-Channel Analysis well-known challenge of hyperparameter tuning in DLSCA encouraged the community to use methods that reduce the effort required to identify an optimal model. One of the successful methods is ensemble learning. While ensemble methods have demonstrated their effectiveness in DLSCA, particularly with A词根词缀法 发表于 2025-3-23 08:46:50
CNN Architecture Extraction on Edge GPUlanguage processing, speech recognition, forecasting, etc. These applications are also used in resource-constrained environments such as embedded devices. In this work, the susceptibility of neural network implementations to reverse engineering is explored on the NVIDIA Jetson Nano microcomputer via