reptile 发表于 2025-3-28 16:33:56
http://reply.papertrans.cn/47/4654/465367/465367_41.png人造 发表于 2025-3-28 21:42:31
WebSmell: An Efficient Malicious HTTP Traffic Detection Framework Using Data Augmentationtraffic detection using deep learning with data augmentation based on keywords library avoidance. The proposed method can improve the cross-dataset detection ability, reduce the input cost of training dataset, and make deep learning model have strong generalization even with a small training dataset.Decibel 发表于 2025-3-29 02:27:36
http://reply.papertrans.cn/47/4654/465367/465367_43.png蒙太奇 发表于 2025-3-29 03:06:23
http://reply.papertrans.cn/47/4654/465367/465367_44.pngCT-angiography 发表于 2025-3-29 09:20:52
http://reply.papertrans.cn/47/4654/465367/465367_45.png掺和 发表于 2025-3-29 11:24:21
http://reply.papertrans.cn/47/4654/465367/465367_46.png江湖郎中 发表于 2025-3-29 16:55:23
An Illumination Modulation-Based Adversarial Attack Against Automated Face Recognition Systemealize adversarial perturbations, and such an attack scheme will meet inevitable disadvantages of perturbation distortion and low concealment. In this paper, we propose a novel attack scheme based on illumination modulation. Because of the rolling shutter effect of CMOS sensor, the created perturbatOligarchy 发表于 2025-3-29 23:06:36
http://reply.papertrans.cn/47/4654/465367/465367_48.png裁决 发表于 2025-3-30 00:30:49
Fully Secure ABE with Outsourced Decryption against Chosen Ciphertext Attacke inefficiency of decryption. To solve this problem, Green et al. proposed a new paradigm named attribute-based encryption with outsourced decryption (OD-ABE). It allows a proxy with a transformation key delegated from the user to transform any ABE ciphertext into a constant size ciphertext. While fbronchodilator 发表于 2025-3-30 05:26:16
An Efficient CCA-Secure Access Control Encryption for Any Policy also controls the information flow. However, their DDH-based scheme suffered from the ciphertext revealing attack (CRA) introduced by Badertscher, Matt and Maurer in Asiacrypt 2017 and just satisfied chosen plaintext attack (CPA) security. Badertscher, Matt and Maurer strengthened the security mode