找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Wireless Algorithms, Systems, and Applications; 16th International C Zhe Liu,Fan Wu,Sajal K. Das Conference proceedings 2021 Springer Natur

[复制链接]
楼主: DUBIT
发表于 2025-3-27 00:44:34 | 显示全部楼层
A Lattice-Based Ring Signature Scheme to Secure Automated Valet Parking relevant information to parking lot providers to complete the parking reservation and automatic parking. However, that reveals the drivers’ identity information and the reservation messages might be forged. In addition, with quantum computers developing rapidly, existing systems also suffer from pr
发表于 2025-3-27 02:19:42 | 显示全部楼层
AOPL: Attention Enhanced Oversampling and Parallel Deep Learning Model for Attack Detection in Imbalt and get a superior detection result. However, the actual network traffic data is imbalanced due to the less frequent network attacks than the normal, which decreases the models’ performance. To reduce the impact of imbalanced data, an AOPL model is proposed in this paper, consisting of Attention M
发表于 2025-3-27 05:49:25 | 显示全部楼层
Greedy-Based Black-Box Adversarial Attack Scheme on Graph StructureHowever, most attack schemes are not accurate in locating target nodes and lock unnoticeable perturbations from the perspective of graph embedding space, leading to a low success rate of attack and high perturbation on node classification tasks. To overcome these problems, we propose a greedy-based
发表于 2025-3-27 12:37:31 | 显示全部楼层
SECCEG: A Secure and Efficient Cryptographic Co-processor Based on Embedded GPU Systemon high-volume cryptographic computing. Meanwhile, driven by deep learning, the embedded GPU system is rapidly evolving. In this paper, we discuss the feasibility of turning the lightweight and energy efficient system into a cryptographic co-processor, where security and performance are two daunting
发表于 2025-3-27 17:31:15 | 显示全部楼层
Understanding and Mitigating Security Risks of Network on Medical Cyber Physical Systemions and network. MCPS utilizes high-level supervisory and low-level communication middleware to enable medical devices to interoperate efficiently. Despite the benefits provided by MCPS, the integration of clinical information also brings new threats for the clinical data. In this paper, we perform
发表于 2025-3-27 21:04:41 | 显示全部楼层
RF-Ubia: User Biometric Information Authentication Based on RFIDor biometric information (e.g., fingerprints) for identity authentication. However, there are security risks when these authentication methods are applied solely. For example, if the password is compromised, it is unlikely to determine whether the user is legitimate based on the password. In this pa
发表于 2025-3-28 00:34:59 | 显示全部楼层
NFDD: A Dynamic Malicious Document Detection Method Without Manual Feature Dictionaryand updating the feature dictionary is a complex task that requires a lot of manual work. The detection effect of feature dictionary is limited by expert experience, and it cannot deal with unknown samples. To overcome the above limitations, we propose the no manual feature dictionary detection mode
发表于 2025-3-28 03:08:09 | 显示全部楼层
Bug Triage Model Considering Cooperative and Sequential Relationship the bug by analyzing the text content of the bug report or relationship network. However, the bug repair is a cooperative process with sequential relationship. The tracking system records bugs successively according to the time, which indicates the dynamic changes of the tracking system. In additio
发表于 2025-3-28 09:45:57 | 显示全部楼层
Adaptive Chosen Plaintext Side-Channel Attacks for Higher-Order Masking Schemesside channel attacks. Higher-order masking schemes have been proved in theory to be the secure countermeasures against side-channel attacks. When . th-order masking is involved, the complexity of performing a higher-order SCA grows exponentially with the order ., which can be regarded as the main di
发表于 2025-3-28 13:14:42 | 显示全部楼层
Mind the Amplification: Cracking Content Delivery Networks via DDoS Attacksity, i.e., providing fast delivery of the Internet content. CDN is often part of a mature enterprise level network, but due to the distributed nature, CDN may be vulnerable to a distributed denial-of-service attack (DDoS), in which the cyber-attackers try to flood the victim with overloaded traffic
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-2 21:03
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表