concord 发表于 2025-3-21 18:29:46

书目名称Information and Communications Security影响因子(影响力)<br>        http://figure.impactfactor.cn/if/?ISSN=BK0465903<br><br>        <br><br>书目名称Information and Communications Security影响因子(影响力)学科排名<br>        http://figure.impactfactor.cn/ifr/?ISSN=BK0465903<br><br>        <br><br>书目名称Information and Communications Security网络公开度<br>        http://figure.impactfactor.cn/at/?ISSN=BK0465903<br><br>        <br><br>书目名称Information and Communications Security网络公开度学科排名<br>        http://figure.impactfactor.cn/atr/?ISSN=BK0465903<br><br>        <br><br>书目名称Information and Communications Security被引频次<br>        http://figure.impactfactor.cn/tc/?ISSN=BK0465903<br><br>        <br><br>书目名称Information and Communications Security被引频次学科排名<br>        http://figure.impactfactor.cn/tcr/?ISSN=BK0465903<br><br>        <br><br>书目名称Information and Communications Security年度引用<br>        http://figure.impactfactor.cn/ii/?ISSN=BK0465903<br><br>        <br><br>书目名称Information and Communications Security年度引用学科排名<br>        http://figure.impactfactor.cn/iir/?ISSN=BK0465903<br><br>        <br><br>书目名称Information and Communications Security读者反馈<br>        http://figure.impactfactor.cn/5y/?ISSN=BK0465903<br><br>        <br><br>书目名称Information and Communications Security读者反馈学科排名<br>        http://figure.impactfactor.cn/5yr/?ISSN=BK0465903<br><br>        <br><br>

舰旗 发表于 2025-3-21 20:26:58

http://reply.papertrans.cn/47/4660/465903/465903_2.png

Missile 发表于 2025-3-22 01:38:29

Lattice-Based Secret Handshakes with Reusable Credentialstocol, we subtly modify a Stern-type zero-knowledge argument by use of a key exchange protocol, which enables users to negotiate a session key for further communication. The security of our scheme relies on the Short Integer Solution (.) and Learning With Errors (.) assumptions.

MERIT 发表于 2025-3-22 08:08:44

When NTT Meets Karatsuba: Preprocess-then-NTT Technique Revisitedithm asymptotically. The claim was also verified in our experiments. As a result, our new algorithm not only relaxes the constraint for modulus but also improves efficiency in practice. In addition, we also present some advantages and applications of our new algorithm.

connoisseur 发表于 2025-3-22 12:00:31

Black-Box Buster: A Robust Zero-Shot Transfer-Based Adversarial Attack Methodf the real training examples of the target models. The experiments demonstrate the effectiveness of our method that significantly improves the non-target black-box attack success rate around 20%–30% of the adversarial examples generated by the substitute models.

挥舞 发表于 2025-3-22 16:53:20

Compressive Sensing Image Steganography via Directional Lifting Wavelet Transformtraction, we introduce the deep-based CS reconstruction algorithm to enhance the quality of the reconstructed image. Experimental results show that the proposed approach maintains security while achieving a high quality of the stego image and the reconstructed image.

legislate 发表于 2025-3-22 17:43:55

Black-Box Audio Adversarial Example Generation Using Variational Autoencoder a method of generating black-box AEs in a way that significantly reduces the required amount of requests. We describe our proposed method and presents experimental results demonstrating its effectiveness in generating word-level and sentence-level AEs that are incorrectly transcribed by an ASR system.

Fracture 发表于 2025-3-22 23:37:58

0302-9743 m 182 submissions. The papers in Part II are organized in the following thematic blocks:​ machine learning security; multimedia security; security analysis; post-quantum cryptography; applied cryptography..978-3-030-88051-4978-3-030-88052-1Series ISSN 0302-9743 Series E-ISSN 1611-3349

Contend 发表于 2025-3-23 04:09:50

http://reply.papertrans.cn/47/4660/465903/465903_9.png

喷油井 发表于 2025-3-23 08:28:13

http://reply.papertrans.cn/47/4660/465903/465903_10.png
页: [1] 2 3 4 5 6
查看完整版本: Titlebook: Information and Communications Security; 23rd International C Debin Gao,Qi Li,Xiaofeng Liao Conference proceedings 2021 Springer Nature Swi