interrogate 发表于 2025-3-26 23:52:54

Synthetic Is All You Need: Removing the Auxiliary Data Assumption for Membership Inference Attacks Ae attacks (MIAs), based on shadow modeling, have become the standard to evaluate the privacy of synthetic data, they currently assume the attacker to have access to an auxiliary dataset sampled from a similar distribution as the training dataset. This is often seen as a very strong assumption in pra

Gustatory 发表于 2025-3-27 04:47:46

http://reply.papertrans.cn/24/2339/233883/233883_32.png

Kinetic 发表于 2025-3-27 07:56:59

http://reply.papertrans.cn/24/2339/233883/233883_33.png

CHANT 发表于 2025-3-27 12:30:31

http://reply.papertrans.cn/24/2339/233883/233883_34.png

CAMEO 发表于 2025-3-27 17:30:09

http://reply.papertrans.cn/24/2339/233883/233883_35.png

拥挤前 发表于 2025-3-27 21:29:19

Differentially Private Traffic Flow Prediction Using Transformers: A Federated Approachisting traffic flow prediction techniques using deep learning, mostly LSTMs, have achieved enormous success based on the large traffic flow datasets collected by governments and different organizations. Nevertheless, a lot of these datasets contain sensitive attributes that may relate to users’ priv

小步舞 发表于 2025-3-28 00:57:11

Analyzing Continuous K,-Anonymization for Smart Meter Data evaluated in the context of a dataset to make meaningful statements about their eligibility for a particular use case. In this paper, we therefore analyze the suitability of continuous .-anonymization with CASTLE for data streams generated by smart meters. We compare CASTLE ’s continuous, piecewise

Devastate 发表于 2025-3-28 04:16:31

http://reply.papertrans.cn/24/2339/233883/233883_38.png

凶猛 发表于 2025-3-28 07:54:23

METRICS: A Methodology for Evaluating and Testing the Resilience of Industrial Control Systems to Cyng ICS testbeds by enabling the configuration of measurement campaigns for comprehensive resilience evaluations. Therefore, the user specifies individual evaluation scenarios consisting of cyberattacks and countermeasures while facilitating manual and automatic interventions. Moreover, . provides do

同时发生 发表于 2025-3-28 13:05:10

Skade – A Challenge Management System for Cyber Threat Huntinglators are presented, e.g. the data they need to provide to enable generation of feedback to trainees. Seven required functions are identified, e.g. the ability to produce assessment questions based on logs from emulators.
页: 1 2 3 [4] 5 6 7
查看完整版本: Titlebook: Computer Security. ESORICS 2023 International Workshops; CyberICS, DPM, CBT, Sokratis Katsikas,Frédéric Cuppens,Stefanos Gritza Conference