生动 发表于 2025-3-21 17:33:37

书目名称Applied Cryptography and Network Security Workshops影响因子(影响力)<br>        http://figure.impactfactor.cn/if/?ISSN=BK0167504<br><br>        <br><br>书目名称Applied Cryptography and Network Security Workshops影响因子(影响力)学科排名<br>        http://figure.impactfactor.cn/ifr/?ISSN=BK0167504<br><br>        <br><br>书目名称Applied Cryptography and Network Security Workshops网络公开度<br>        http://figure.impactfactor.cn/at/?ISSN=BK0167504<br><br>        <br><br>书目名称Applied Cryptography and Network Security Workshops网络公开度学科排名<br>        http://figure.impactfactor.cn/atr/?ISSN=BK0167504<br><br>        <br><br>书目名称Applied Cryptography and Network Security Workshops被引频次<br>        http://figure.impactfactor.cn/tc/?ISSN=BK0167504<br><br>        <br><br>书目名称Applied Cryptography and Network Security Workshops被引频次学科排名<br>        http://figure.impactfactor.cn/tcr/?ISSN=BK0167504<br><br>        <br><br>书目名称Applied Cryptography and Network Security Workshops年度引用<br>        http://figure.impactfactor.cn/ii/?ISSN=BK0167504<br><br>        <br><br>书目名称Applied Cryptography and Network Security Workshops年度引用学科排名<br>        http://figure.impactfactor.cn/iir/?ISSN=BK0167504<br><br>        <br><br>书目名称Applied Cryptography and Network Security Workshops读者反馈<br>        http://figure.impactfactor.cn/5y/?ISSN=BK0167504<br><br>        <br><br>书目名称Applied Cryptography and Network Security Workshops读者反馈学科排名<br>        http://figure.impactfactor.cn/5yr/?ISSN=BK0167504<br><br>        <br><br>

Introduction 发表于 2025-3-21 21:16:04

http://reply.papertrans.cn/17/1676/167504/167504_2.png

丰满中国 发表于 2025-3-22 02:42:21

LM-cAPI:A Lite Model Based on API Core Semantic Information for Malware Classificationnew types and quantities of malware coupled with the continuous updating of dissemination methods, the rapid and accurate identification of malware as well as providing precise support for corresponding warning and defense measures have become a crucial challenge in maintaining network security. Thi

大喘气 发表于 2025-3-22 06:59:40

http://reply.papertrans.cn/17/1676/167504/167504_4.png

种属关系 发表于 2025-3-22 10:48:51

FPGA Implementation of Physically Unclonable Functions Based on Multi-threshold Delay Time Measureme in semiconductor devices. Arbiter PUF is a typical extensive PUF that has a large space for challenge–response pairs (CPRs); however, it is vulnerable to deep learning (DL) attacks predicting unknown CRPs. One of the approaches to mitigate DL attacks is the RG-DTM PUF, which utilizes the delay time

Firefly 发表于 2025-3-22 14:54:11

Incorporating Cluster Analysis of Feature Vectors for Non-profiled Deep-learning-Based Side-Channel S 2019. In the proposed DDLA, the adversary sets the LSB or MSB of the intermediate value in the encryption process assumed for the key candidates as the ground-truth label and trains a deep neural network (DNN) with power traces as an input. The adversary also observes metrics such as loss and accu

伪证 发表于 2025-3-22 18:36:03

Creating from Noise: Trace Generations Using Diffusion Model for Side-Channel Attackration of synthetic traces can help to improve attacks like profiling attacks. However, manually creating synthetic traces from actual traces is arduous. Therefore, automating this process of creating artificial traces is much needed. Recently, diffusion models have gained much recognition after bea

TIA742 发表于 2025-3-22 23:21:53

Diversity Algorithms for Laser Fault Injection injection (FI). Within this process, FI aims to identify parameter combinations that reveal device vulnerabilities. The impracticality of conducting an exhaustive search over FI parameters has prompted the development of advanced and guided algorithms. However, these proposed methods often focus on

护身符 发表于 2025-3-23 05:14:28

One for All, All for Ascon: Ensemble-Based Deep Learning Side-Channel Analysis well-known challenge of hyperparameter tuning in DLSCA encouraged the community to use methods that reduce the effort required to identify an optimal model. One of the successful methods is ensemble learning. While ensemble methods have demonstrated their effectiveness in DLSCA, particularly with A

词根词缀法 发表于 2025-3-23 08:46:50

CNN Architecture Extraction on Edge GPUlanguage processing, speech recognition, forecasting, etc. These applications are also used in resource-constrained environments such as embedded devices. In this work, the susceptibility of neural network implementations to reverse engineering is explored on the NVIDIA Jetson Nano microcomputer via
页: [1] 2 3 4 5 6
查看完整版本: Titlebook: Applied Cryptography and Network Security Workshops; ACNS 2024 Satellite Martin Andreoni Conference proceedings 2024 The Editor(s) (if app