胆小鬼 发表于 2025-3-30 08:26:45

Detection of Malware Using Self-Attention Mechanism and Stringsthat considers word order and the model that considers only the number of occurrences of words were compared using the FFRI Dataset. The maximum F-measure for the proposed method considering word order was 0.904. We also analyzed the weights of the self-attention mechanism to identify the features t

悲观 发表于 2025-3-30 15:35:51

KDRM: Kernel Data Relocation Mechanism to Mitigate Privilege Escalation Attackthe privilege information to change by dynamically relocating for a user process. The evaluation results confirmed that privilege escalation attacks by user processes on Linux could be prevented with KDRM. As a performance evaluation, we showed that the overhead of issuing a system call was up to 14

Heart-Rate 发表于 2025-3-30 17:22:58

http://reply.papertrans.cn/67/6629/662889/662889_53.png

下级 发表于 2025-3-30 22:13:26

Provably Secure Blockchain Protocols from Distributed Proof-of-Deep-Learningblockchain protocol which can be instantiated with two chain selection rules, i.e., the longest-chain rule and the weight-based blockchain framework (LatinCrypt’ 21). This work is the first to provide formal proofs for deep learning-involved blockchain protocols concerning the robust ledger properti

痛苦一下 发表于 2025-3-31 04:18:35

http://reply.papertrans.cn/67/6629/662889/662889_55.png

Addictive 发表于 2025-3-31 08:18:01

New LDP Approach Using VAEe of a Variational AutoEncoder (VAE), which is used to recover the original distribution. We tested our proposal on four real and open datasets with different characteristics, including the number of users, the number of attributes, and their cardinality. The proposed solution outperforms the well-k
页: 1 2 3 4 5 [6]
查看完整版本: Titlebook: Network and System Security; 17th International C Shujun Li,Mark Manulis,Atsuko Miyaji Conference proceedings 2023 The Editor(s) (if applic