声音刺耳 发表于 2025-3-28 15:47:55

http://reply.papertrans.cn/47/4659/465886/465886_41.png

hemoglobin 发表于 2025-3-28 21:39:05

Source Identification from In-Vehicle CAN-FD Signaling: What Can We Expect?icle CAN-FD network from bus signaling and the contributions are four-fold..We hope our results could be used as a step forward and a guidance on securing the commercialization and batch production of in-vehicle CAN-FD network in the near future.

注意力集中 发表于 2025-3-29 02:04:26

http://reply.papertrans.cn/47/4659/465886/465886_43.png

A简洁的 发表于 2025-3-29 04:30:28

TranFuzz: An Ensemble Black-Box Attack Framework Based on Domain Adaptation and Fuzzinghat the proposed method can achieve an attack success rate of more than 68% in a real-world CVS attack. Moreover, TranFuzz can also reinforce both the robustness (up to 3.3%) and precision (up to 5%) of the original neural network performance by taking advantage of the adversarial re-training.

Cardioplegia 发表于 2025-3-29 08:47:39

Rectifying Administrated ERC20 Tokensver these contracts. Moreover, the owners of these tokens carry lesser social and legal responsibilities compared to the traditional centralized actors that those tokens intend to disrupt. This entails two major problems: a) the owners of the tokens have the ability to quickly steal all the funds an

LAP 发表于 2025-3-29 13:54:09

: Model Agnostic Defense against Targeted Poisoning Attacks in Federated Learningures. The aggregation of interpreted values for important features against a baseline input detects the presence of an adversary. The proposed solution scales in terms of attackers and is also robust against adversarial noise in either homogeneous or heterogeneous distribution. The most appealing ab

内阁 发表于 2025-3-29 18:29:35

http://reply.papertrans.cn/47/4659/465886/465886_47.png

歌曲 发表于 2025-3-29 20:18:57

GAN-Based Adversarial Patch for Malware C2 Traffic to Bypass DL Detectorused by GAN training. Results show that the adversarial patch generated by GAN can prevent malware C2 traffic from being detected with 51.4% success rate. The higher time efficiency and smaller malware impact make our method more suitable for real attacks.

FLIT 发表于 2025-3-29 23:55:46

Analyzing the Security of OTP 2FA in the Face of Malicious Terminalswhich mostly use two variants of .and observed that almost all of them are vulnerable to this attack. Here, the threat model is practical as the attack components can be installed in the user’s terminal without any root/administrator privilege. Moreover, the attack modules require a small number of

forager 发表于 2025-3-30 05:32:48

http://reply.papertrans.cn/47/4659/465886/465886_50.png
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Information and Communications Security; 23rd International C Debin Gao,Qi Li,Xiaofeng Liao Conference proceedings 2021 Springer Nature Swi