找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Emerging Information Security and Applications; 4th International Co Jun Shao,Sokratis K. Katsikas,Weizhi Meng Conference proceedings 2024

[复制链接]
楼主: Bunion
发表于 2025-3-25 07:05:34 | 显示全部楼层
发表于 2025-3-25 11:14:15 | 显示全部楼层
CONNECTION: COvert chaNnel NEtwork attaCk Through bIt-rate mOdulatioN,rsarial attacks. This paper introduces a novel method based on bit-rate modulation for implementing covert channels between devices connected over a wide area network. This attack can be exploited to exfiltrate sensitive information from a machine (i.e., covert sender) and stealthily transfer it to
发表于 2025-3-25 15:27:16 | 显示全部楼层
发表于 2025-3-25 18:26:34 | 显示全部楼层
发表于 2025-3-25 22:13:52 | 显示全部楼层
Communications in Computer and Information Sciencehttp://image.papertrans.cn/e/image/308272.jpg
发表于 2025-3-26 02:21:43 | 显示全部楼层
发表于 2025-3-26 06:17:24 | 显示全部楼层
发表于 2025-3-26 10:24:08 | 显示全部楼层
发表于 2025-3-26 16:03:26 | 显示全部楼层
Marijan Kosel,Jürgen Weißenrieder attacks by examples with indistinguishable perturbations that produce incorrect predictions. There are two types of perturbations, i.e., audio-dependent and audio-agnostic. Audio-dependent perturbations involve crafting perturbations for each clean example, while audio-agnostic attacks create a uni
发表于 2025-3-26 18:59:55 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 吾爱论文网 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
QQ|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-8-27 04:05
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表