仲裁者 发表于 2025-3-28 16:30:49

http://reply.papertrans.cn/47/4654/465372/465372_41.png

BOOST 发表于 2025-3-28 18:57:22

http://reply.papertrans.cn/47/4654/465372/465372_42.png

headlong 发表于 2025-3-29 00:12:03

Suzzer: A Vulnerability-Guided Fuzzer Based on Deep Learning of causing crashes. However, a software program oftentimes has only a fairly small portion that contains vulnerabilities, leading coverage-based fuzzers to work poorly most of the time. To address this challenge, we propose ., a vulnerability-guided fuzzer, to concentrate on testing code blocks tha

指令 发表于 2025-3-29 04:34:24

http://reply.papertrans.cn/47/4654/465372/465372_44.png

Extemporize 发表于 2025-3-29 09:56:37

http://reply.papertrans.cn/47/4654/465372/465372_45.png

novelty 发表于 2025-3-29 15:12:11

Privacy-Preserving and yet Robust Collaborative Filtering Recommender as a Serviceges. Aiming at pragmatic solutions, we first show how to construct privacy-preserving and yet robust . stage based on existing solutions. Then, we propose two cryptographic protocols to realize a privacy-preserving . stage, depending on whether or not an extra proxy is involved.

Agility 发表于 2025-3-29 15:38:54

CAVAEva: An Engineering Platform for Evaluating Commercial Anti-malware Applications on Smartphonesactive target for cyber-attackers. For example, mobile malware authors seek to compromise devices to collect sensitive information and data from the smartphones. To mitigate such a threat, a number of online scanning platforms exist to evaluate existing anti-malware applications. However, existing p

异端邪说下 发表于 2025-3-29 23:18:25

http://reply.papertrans.cn/47/4654/465372/465372_48.png

后来 发表于 2025-3-30 03:12:48

http://reply.papertrans.cn/47/4654/465372/465372_49.png

注意到 发表于 2025-3-30 05:32:50

http://reply.papertrans.cn/47/4654/465372/465372_50.png
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Information Security and Cryptology; 15th International C Zhe Liu,Moti Yung Conference proceedings 2020 Springer Nature Switzerland AG 2020