INEPT 发表于 2025-3-21 18:13:28

书目名称Information Security Applications影响因子(影响力)<br>        http://impactfactor.cn/if/?ISSN=BK0465294<br><br>        <br><br>书目名称Information Security Applications影响因子(影响力)学科排名<br>        http://impactfactor.cn/ifr/?ISSN=BK0465294<br><br>        <br><br>书目名称Information Security Applications网络公开度<br>        http://impactfactor.cn/at/?ISSN=BK0465294<br><br>        <br><br>书目名称Information Security Applications网络公开度学科排名<br>        http://impactfactor.cn/atr/?ISSN=BK0465294<br><br>        <br><br>书目名称Information Security Applications被引频次<br>        http://impactfactor.cn/tc/?ISSN=BK0465294<br><br>        <br><br>书目名称Information Security Applications被引频次学科排名<br>        http://impactfactor.cn/tcr/?ISSN=BK0465294<br><br>        <br><br>书目名称Information Security Applications年度引用<br>        http://impactfactor.cn/ii/?ISSN=BK0465294<br><br>        <br><br>书目名称Information Security Applications年度引用学科排名<br>        http://impactfactor.cn/iir/?ISSN=BK0465294<br><br>        <br><br>书目名称Information Security Applications读者反馈<br>        http://impactfactor.cn/5y/?ISSN=BK0465294<br><br>        <br><br>书目名称Information Security Applications读者反馈学科排名<br>        http://impactfactor.cn/5yr/?ISSN=BK0465294<br><br>        <br><br>

inhumane 发表于 2025-3-21 23:06:08

A Blockchain-Based Mobile Crowdsensing and Its Incentive Mechanismrd distribution mechanism based on the Shapley value to promote equitable reward distribution. The proposed model provides a more dependable and effective means of achieving high-quality services for society.

Externalize 发表于 2025-3-22 01:42:40

Systematic Evaluation of Robustness Against Model Inversion Attacks on Split Learningnoise-based defense has little practical effect, NoPeekNN has a large performance variation, and differential privacy is somewhat helpful in defense; however, the larger the client-side model, the lower the task performance. Finally, further research is needed to overcome the limitations of previous defenses.

BYRE 发表于 2025-3-22 06:55:13

Defending AirType Against Inference Attacks Using 3D In-Air Keyboard Layouts: Design and Evaluation adversary by manipulating the geometric aspects of this keyboard plane in 3D. We evaluate our design through numerous experiments and show it to be robust against inference attacks, where the adversary’s accuracy in obtaining the correct input text is reduced to 0% (from 87%) and at most to just 18% within the top-500 candidate reconstructions.

生锈 发表于 2025-3-22 10:20:25

http://reply.papertrans.cn/47/4653/465294/465294_5.png

游行 发表于 2025-3-22 14:15:48

A New Higher Order Differential of LCBl-round LCB with 2 chosen plaintexts. Then, we also show that LCB can be broken under the condition for known plaintext attacks. Furthermore, we tried to improve the round function of LCB to analysis this vulnerability.

CROAK 发表于 2025-3-22 17:46:44

Conference proceedings 2024 Island, South Korea, during August 23–25, 2023..The 25 papers included in this book were carefully reviewed and selected from 76 submissions. They were organized in topical sections as follows: Cryptography; network and application security; privacy and management; attacks and defenses; post-quantu

Neuropeptides 发表于 2025-3-22 22:28:22

http://reply.papertrans.cn/47/4653/465294/465294_8.png

Carcinoma 发表于 2025-3-23 02:21:29

http://reply.papertrans.cn/47/4653/465294/465294_9.png

Enteropathic 发表于 2025-3-23 06:34:56

Lecture Notes in Computer Sciencehttp://image.papertrans.cn/i/image/465294.jpg
页: [1] 2 3 4 5 6
查看完整版本: Titlebook: Information Security Applications; 24th International C Howon Kim,Jonghee Youn Conference proceedings 2024 The Editor(s) (if applicable) an