气候 发表于 2025-3-25 07:05:34

http://reply.papertrans.cn/31/3083/308272/308272_21.png

CLASP 发表于 2025-3-25 11:14:15

CONNECTION: COvert chaNnel NEtwork attaCk Through bIt-rate mOdulatioN,rsarial attacks. This paper introduces a novel method based on bit-rate modulation for implementing covert channels between devices connected over a wide area network. This attack can be exploited to exfiltrate sensitive information from a machine (i.e., covert sender) and stealthily transfer it to

acheon 发表于 2025-3-25 15:27:16

http://reply.papertrans.cn/31/3083/308272/308272_23.png

持久 发表于 2025-3-25 18:26:34

http://reply.papertrans.cn/31/3083/308272/308272_24.png

表主动 发表于 2025-3-25 22:13:52

Communications in Computer and Information Sciencehttp://image.papertrans.cn/e/image/308272.jpg

闷热 发表于 2025-3-26 02:21:43

http://reply.papertrans.cn/31/3083/308272/308272_26.png

并入 发表于 2025-3-26 06:17:24

http://reply.papertrans.cn/31/3083/308272/308272_27.png

Hallowed 发表于 2025-3-26 10:24:08

http://reply.papertrans.cn/31/3083/308272/308272_28.png

煤渣 发表于 2025-3-26 16:03:26

Marijan Kosel,Jürgen Weißenrieder attacks by examples with indistinguishable perturbations that produce incorrect predictions. There are two types of perturbations, i.e., audio-dependent and audio-agnostic. Audio-dependent perturbations involve crafting perturbations for each clean example, while audio-agnostic attacks create a uni

Seizure 发表于 2025-3-26 18:59:55

http://reply.papertrans.cn/31/3083/308272/308272_30.png
页: 1 2 [3] 4 5
查看完整版本: Titlebook: Emerging Information Security and Applications; 4th International Co Jun Shao,Sokratis K. Katsikas,Weizhi Meng Conference proceedings 2024