Irrigate 发表于 2025-3-26 22:59:11
SecretKeeper: Robust Vertical Federated Learning Against Label Inference Attacksed by the active party and even labels of testing samples. Existing defense methods against label inference attacks are limited to a specific type of VFL framework. Specifically, existing defenses are designed for VFL without model splitting and cannot be applied to VFL with model splitting. To bridCAMP 发表于 2025-3-27 02:44:48
Quantify the Success Probability of Honest-But-Curious Relay Attack for Modulation Based Physical Lattack successful probability for M-QAM. With the information-theoretic analysis results, it has been clearly shown that the attack successful probability is decreased with the increasing modulation order. Finally, the simulation is performed to demonstrate the theoretical analysis.cyanosis 发表于 2025-3-27 06:47:58
An Intranet Defense Capability Assessment Method for Network Security Solutions Based on ATT&CK Framlity of network security solutions, constructs an indicator system with comprehensiveness and good scalability, and involves tactics, techniques and sub-technologies in the enterprise framework used by 138 APT organizations in the ATT&CK framework as objective data for indicator assignment, balancinnostrum 发表于 2025-3-27 11:27:53
http://reply.papertrans.cn/67/6629/662853/662853_34.pngHeart-Rate 发表于 2025-3-27 17:14:37
CAPTURE: Efficient Attack Investigation Through Causal Alert Correlation Analysisational resources, leading to what is known as “alert fatigue”. To address this challenge, we propose CAPTURE, a novel system designed to expedite attack investigation by employing causal alert correlation analysis in multi-alert scenarios. By optimizing the provenance graph through the search for aETHER 发表于 2025-3-27 18:38:51
http://reply.papertrans.cn/67/6629/662853/662853_36.pngFELON 发表于 2025-3-27 23:51:23
http://reply.papertrans.cn/67/6629/662853/662853_37.png弄皱 发表于 2025-3-28 03:22:16
http://reply.papertrans.cn/67/6629/662853/662853_38.pngpromote 发表于 2025-3-28 07:05:28
LFPS: A Blockchain-Based Fair Privacy Preservation Scheme for Mobile Crowdsensingcles to submit their sensing data anonymously. This mechanism is lightweight, as it does not require expensive cryptographic tools. We give a comprehensive security analysis to demonstrate LFPS’s resistance against various attacks. We also evaluate the performance of LFPS to show its efficiency in tMultiple 发表于 2025-3-28 11:24:03
Optimized Deployment of Honeypages Based on Multi-strategy Combinationsions, allowing these honeypages to be deployed along paths where attackers are more likely to access. By our method, honeypages can be deployed on the paths maintaining concealment and obfuscation, as well as rendering attackers unaware of their entry into the honeypages. We applied the defense opti