发表于 2025-3-30 09:53:12

Enhancing the Anti-steganalysis Ability of Image Steganography via Multiple Adversarial Networksthe original image using multiple lightweight channel attention modules in the generator, thus enhancing the anti-steganalysis ability of adversarial images. Furthermore, the proposed method utilizes multiple discrimination losses and MSE loss, dynamically combined to improve the quality of adversar

insipid 发表于 2025-3-30 12:32:36

http://reply.papertrans.cn/87/8626/862587/862587_52.png

fledged 发表于 2025-3-30 19:54:22

Real-Time Aggregation for Massive Alerts Based on Dynamic Attack Granularity Graphncluding ., and select three common alert aggregation algorithms to perform a comparative test in a simulated real-time situation. The experiment shows that our approach achieves more than 98% aggregation rate, reduces data complexity by more than 82%, and has stronger robustness.

Ischemia 发表于 2025-3-30 23:29:18

Decompilation Based Deep Binary-Source Function Matchingsyntactic and semantic information. In this way, the binary and source functions are represented in the same feature space so to ease the matching model to learn function similarity. For the matching model, we adopt a self-attention based siamese network with contrastive loss. Experiments on two dat

PLIC 发表于 2025-3-31 04:53:27

ACDroid: Detecting Collusion Applications on Smart Devicesd IOT (Internet of Things) platforms. Most of these smart devices are designed based on the Android framework, and the security of Android applications is particularly important for these smart devices. To facilitate communication between applications, ICC (Inter-Component Communication) is widely u

Allure 发表于 2025-3-31 05:25:58

: Lightweight Intra-enclave Isolation for Confidential Virtual Machines sensitive and regulated data. This approach relies heavily on hardware-based Trusted Execution Environments (TEE), which establish isolated regions for data processing within a protected CPU region. Currently, a variety of TEEs (such as p-enclave in HyperEnclave and AMD SEV) support privilege separ

起波澜 发表于 2025-3-31 10:45:41

http://reply.papertrans.cn/87/8626/862587/862587_57.png

chemical-peel 发表于 2025-3-31 14:16:35

http://reply.papertrans.cn/87/8626/862587/862587_58.png

Constant 发表于 2025-3-31 20:16:50

http://reply.papertrans.cn/87/8626/862587/862587_59.png

DIKE 发表于 2025-3-31 22:36:47

A Graphical Password Scheme Based on Rounded Image Selection design and build a more secure and robust graphical password system with the resistance to multiple attacks modalities, especially brute force attack, guessing attack and shoulder-surfing attack, it is important to avoid the credentials being captured in just one step, e.g., by adding several round
页: 1 2 3 4 5 [6] 7
查看完整版本: Titlebook: Science of Cyber Security; 5th International Co Moti Yung,Chao Chen,Weizhi Meng Conference proceedings 2023 The Editor(s) (if applicable) a