真 发表于 2025-3-30 09:53:12
Enhancing the Anti-steganalysis Ability of Image Steganography via Multiple Adversarial Networksthe original image using multiple lightweight channel attention modules in the generator, thus enhancing the anti-steganalysis ability of adversarial images. Furthermore, the proposed method utilizes multiple discrimination losses and MSE loss, dynamically combined to improve the quality of adversarinsipid 发表于 2025-3-30 12:32:36
http://reply.papertrans.cn/87/8626/862587/862587_52.pngfledged 发表于 2025-3-30 19:54:22
Real-Time Aggregation for Massive Alerts Based on Dynamic Attack Granularity Graphncluding ., and select three common alert aggregation algorithms to perform a comparative test in a simulated real-time situation. The experiment shows that our approach achieves more than 98% aggregation rate, reduces data complexity by more than 82%, and has stronger robustness.Ischemia 发表于 2025-3-30 23:29:18
Decompilation Based Deep Binary-Source Function Matchingsyntactic and semantic information. In this way, the binary and source functions are represented in the same feature space so to ease the matching model to learn function similarity. For the matching model, we adopt a self-attention based siamese network with contrastive loss. Experiments on two datPLIC 发表于 2025-3-31 04:53:27
ACDroid: Detecting Collusion Applications on Smart Devicesd IOT (Internet of Things) platforms. Most of these smart devices are designed based on the Android framework, and the security of Android applications is particularly important for these smart devices. To facilitate communication between applications, ICC (Inter-Component Communication) is widely uAllure 发表于 2025-3-31 05:25:58
: Lightweight Intra-enclave Isolation for Confidential Virtual Machines sensitive and regulated data. This approach relies heavily on hardware-based Trusted Execution Environments (TEE), which establish isolated regions for data processing within a protected CPU region. Currently, a variety of TEEs (such as p-enclave in HyperEnclave and AMD SEV) support privilege separ起波澜 发表于 2025-3-31 10:45:41
http://reply.papertrans.cn/87/8626/862587/862587_57.pngchemical-peel 发表于 2025-3-31 14:16:35
http://reply.papertrans.cn/87/8626/862587/862587_58.pngConstant 发表于 2025-3-31 20:16:50
http://reply.papertrans.cn/87/8626/862587/862587_59.pngDIKE 发表于 2025-3-31 22:36:47
A Graphical Password Scheme Based on Rounded Image Selection design and build a more secure and robust graphical password system with the resistance to multiple attacks modalities, especially brute force attack, guessing attack and shoulder-surfing attack, it is important to avoid the credentials being captured in just one step, e.g., by adding several round