轻打 发表于 2025-3-30 09:56:04

http://reply.papertrans.cn/25/2420/241944/241944_51.png

小虫 发表于 2025-3-30 12:51:30

https://doi.org/10.1007/978-1-137-07606-9like approaches that rely on psychoacoustics to hide perturbations below the hearing threshold, we show that our audio AEs can still be successfully generated even when inaudible components are removed from audio.

Narrative 发表于 2025-3-30 16:43:12

http://reply.papertrans.cn/25/2420/241944/241944_53.png

calorie 发表于 2025-3-30 22:51:27

http://reply.papertrans.cn/25/2420/241944/241944_54.png

interior 发表于 2025-3-31 04:03:52

http://reply.papertrans.cn/25/2420/241944/241944_55.png

CHURL 发表于 2025-3-31 07:14:30

http://reply.papertrans.cn/25/2420/241944/241944_56.png

善辩 发表于 2025-3-31 11:53:03

High Quality Audio Adversarial Examples Without Using Psychoacousticslike approaches that rely on psychoacoustics to hide perturbations below the hearing threshold, we show that our audio AEs can still be successfully generated even when inaudible components are removed from audio.

Ingratiate 发表于 2025-3-31 15:29:06

Working Mechanism of Eternalblue and Its Application in Ransomwormernalblue, the reverse engineering analysis of Eternalblue in Wannacry, and the comparison with the Metasploit’s Eternalblue exploit are presented. The key finding of our analysis is that the code remains almost the same when Eternalblue is transplanted into Wannacry, which indicates its potential for signatures and thus detection.

Devastate 发表于 2025-3-31 19:13:05

A Multi-stage APT Attack Detection Method Based on Sample Enhancementhe detection awareness ability and improve the detection accuracy of the potential APT attack. The experimental results show that SE-ADN performs well on two benchmark datasets, and is better than the comparison methods in detecting multiple types of potential APT attacks.

GLUT 发表于 2025-3-31 23:00:06

Conference proceedings 2022, in October 2022.The 26 revised full papers presented were carefully reviewed and selected from 104 initial submissions. The papers focus on Cyberspace Safety and Security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability is
页: 1 2 3 4 5 [6] 7
查看完整版本: Titlebook: Cyberspace Safety and Security; 14th International S Xiaofeng Chen,Jian Shen,Willy Susilo Conference proceedings 2022 The Editor(s) (if app