复习 发表于 2025-3-23 12:03:41

http://reply.papertrans.cn/87/8635/863500/863500_11.png

NICE 发表于 2025-3-23 16:39:09

http://reply.papertrans.cn/87/8635/863500/863500_12.png

HAWK 发表于 2025-3-23 20:56:32

http://reply.papertrans.cn/87/8635/863500/863500_13.png

daredevil 发表于 2025-3-24 00:56:18

Differentially Private High-Dimensional Data Publication via Markov Network-dimensional data publication, such as the complex attribute relationships, the high computational complexity and data sparsity. Therefore, we propose ., a novel method to publish high-dimensional data with differential privacy guarantee. We first use the Markov model to represent the mutual relatio

运动吧 发表于 2025-3-24 05:06:58

Automated Identification of Sensitive Data via Flexible User Requirementsion, deciding sensitive data subjects to users’ requirements and the application context. Existing research efforts on identifying sensitive data from its descriptive texts focus on keyword/phrase searching. These approaches can have high false positives/negatives as they do not consider the semanti

的染料 发表于 2025-3-24 10:28:28

Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild. To this end, code obfuscation is widely utilized by both legitimate app developers and malware authors, which complicates the representation of source code or machine code in order to hinder the manual investigation and code analysis. Despite many previous studies focusing on the obfuscation techn

步兵 发表于 2025-3-24 11:23:28

Transparent Low-Latency Network Anonymisation for Mobile Devicesessaging. At the same time however, mobile devices fail to provide important privacy guarantees for their users. In particular, mobile devices per default neither conceal which services they are contacting nor hide their source IP addresses. Solutions to these problems exist, but either do not provi

Factorable 发表于 2025-3-24 15:33:57

Inferring UI States of Mobile Applications Through Power Side Channel Exploitationould initiate attacks timely according to this information, for example inserting fake GUIs or taking screenshots of GUIs involving user’s sensitive data. This paper proposes PoWatt, a method to infer the timing of sensitive UI occurrences by exploiting power side channels on mobile devices such as

变形词 发表于 2025-3-24 19:15:41

http://reply.papertrans.cn/87/8635/863500/863500_19.png

品尝你的人 发表于 2025-3-25 01:03:36

http://reply.papertrans.cn/87/8635/863500/863500_20.png
页: 1 [2] 3 4 5 6
查看完整版本: Titlebook: Security and Privacy in Communication Networks; 14th International C Raheem Beyah,Bing Chang,Sencun Zhu Conference proceedings 2018 ICST In