北极人 发表于 2025-3-25 07:06:23

Attack Graph Based Security Metrics for Dynamic Networksnadequate due to their inability to consider temporal evolution of networks. To address this limitation, we introduce the notion of temporal attack graph, which incorporates the temporal characteristics of network configurations and vulnerabilities. It provides a notion for risk assessment by provid

赏钱 发表于 2025-3-25 07:50:28

An Energy-Conscious Surveillance Scheme for Intrusion Detection in Underwater Sensor Networks Using recise intruder detection in such environments via underwater acoustic sensor networks (UASN) with minimal network resources is quite challenging in safeguarding the territorial marine environment. Moreover, the unavailability of GPS, poor visibility, and diverging network scenarios make it more com

grieve 发表于 2025-3-25 15:00:43

STN-Net: A Robust GAN-Generated Face Detectorchnologies have become a boon to industries such as entertainment and gaming, malicious uses of the same in disseminating fabricated information eventually have invited serious social perils. Generative Adversarial Network (GAN) generated images, especially non-existent human facial images, lately h

Expiration 发表于 2025-3-25 19:18:47

: Multimodal Deep Learning Based Android Malware Detectionlatform makes it vulnerable for critical malware attacks. Meanwhile, there is also dramatic advancement in malware obfuscation and evading strategies. This leads to failure of traditional malware detection methods. Recently, machine learning techniques have shown promising outcome for malware detect

Mercurial 发表于 2025-3-25 22:36:36

A Cycle-GAN Based Image Encoding Scheme for Privacy Enhanced Deep Neural Networksroviders raises serious privacy concerns. To address this problem, we propose a Cycle-Gan based-image transformation scheme that leverages convolutional autoencoder image encoding for domain translation. Our Cycle-GAN based image transformation scheme enhances privacy of deep neural networks while p

案发地点 发表于 2025-3-26 02:41:20

http://reply.papertrans.cn/47/4656/465525/465525_26.png

官僚统治 发表于 2025-3-26 07:06:16

A Multi-stage Multi-modal Classification Model for DeepFakes Combining Deep Learned and Computer Visl intelligence is a potent tool that may be used to modify digital data, such as images, videos, and audio files, through the use of emerging deepfake technologies. Deepfake technology has the potential to significantly affect the reliability of multimedia data through the synthesis of fake media. S

COKE 发表于 2025-3-26 10:47:32

http://reply.papertrans.cn/47/4656/465525/465525_28.png

宣称 发表于 2025-3-26 14:19:54

http://reply.papertrans.cn/47/4656/465525/465525_29.png

freight 发表于 2025-3-26 18:59:40

http://reply.papertrans.cn/47/4656/465525/465525_30.png
页: 1 2 [3] 4 5 6
查看完整版本: Titlebook: Information Systems Security; 19th International C Vallipuram Muthukkumarasamy,Sithu D. Sudarsan,Rudr Conference proceedings 2023 The Edito