找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Information Security; 26th International C Elias Athanasopoulos,Bart Mennink Conference proceedings 2023 The Editor(s) (if applicable) and

[复制链接]
查看: 26784|回复: 48
发表于 2025-3-21 18:09:05 | 显示全部楼层 |阅读模式
书目名称Information Security
副标题26th International C
编辑Elias Athanasopoulos,Bart Mennink
视频video
丛书名称Lecture Notes in Computer Science
图书封面Titlebook: Information Security; 26th International C Elias Athanasopoulos,Bart Mennink Conference proceedings 2023 The Editor(s) (if applicable) and
描述This book constitutes the proceedings of the 26th International Conference on Information Security, ISC 2023, which took place in Groningen, The Netherlands, in November 2023..The 29 full papers presented in this volume were carefully reviewed and selected from 90 submissions. The contributions were organized in topical sections as follows: privacy; intrusion detection and systems; machine learning; web security; mobile security and trusted execution; post-quantum cryptography; multiparty computation; symmetric cryptography; key management; functional and updatable encryption; and signatures, hashes, and cryptanalysis..
出版日期Conference proceedings 2023
关键词artificial intelligence; authentication; computer networks; computer systems; cryptography; data communic
版次1
doihttps://doi.org/10.1007/978-3-031-49187-0
isbn_softcover978-3-031-49186-3
isbn_ebook978-3-031-49187-0Series ISSN 0302-9743 Series E-ISSN 1611-3349
issn_series 0302-9743
copyrightThe Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerl
The information of publication is updating

书目名称Information Security影响因子(影响力)




书目名称Information Security影响因子(影响力)学科排名




书目名称Information Security网络公开度




书目名称Information Security网络公开度学科排名




书目名称Information Security被引频次




书目名称Information Security被引频次学科排名




书目名称Information Security年度引用




书目名称Information Security年度引用学科排名




书目名称Information Security读者反馈




书目名称Information Security读者反馈学科排名




单选投票, 共有 1 人参与投票
 

0票 0.00%

Perfect with Aesthetics

 

0票 0.00%

Better Implies Difficulty

 

0票 0.00%

Good and Satisfactory

 

1票 100.00%

Adverse Performance

 

0票 0.00%

Disdainful Garbage

您所在的用户组没有投票权限
发表于 2025-3-21 23:40:59 | 显示全部楼层
发表于 2025-3-22 03:47:49 | 显示全部楼层
发表于 2025-3-22 07:56:22 | 显示全部楼层
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/i/image/465273.jpg
发表于 2025-3-22 09:39:27 | 显示全部楼层
Exploring Privacy-Preserving Techniques on Synthetic Data as a Defense Against Model Inversion Attacernmental institute aims to release a trained machine learning model to the public (i.e., for collaboration or transparency reasons) without threatening privacy. The model predicts change of living place and is important for studying individuals’ tendency to relocate. For this reason, it is called a
发表于 2025-3-22 16:40:03 | 显示全部楼层
Privacy-Preserving Medical Data Generation Using Adversarial Learningg models. However, developing these kinds of models in sensitive domains such as healthcare usually necessitates dealing with a specific level of privacy challenges which provide unique concerns. For managing such privacy concerns, a practical method might involve generating feasible synthetic data
发表于 2025-3-22 19:42:55 | 显示全部楼层
Balanced Privacy Budget Allocation for Privacy-Preserving Machine Learninglearning: adding noise to machine-learning model parameters, which is often selected for its higher accuracy; and executing learning using noisy data, which is preferred for privacy. Recently, a Scalable Unified Privacy-preserving Machine learning framework (.) has been proposed, which controls the
发表于 2025-3-22 23:12:54 | 显示全部楼层
SIFAST: An Efficient Unix Shell Embedding Framework for Malicious Detections scripts. These scripts can compromise servers, steal confidential data, or cause system crashes. Therefore, detecting and preventing malicious scripts is an important task for intrusion detection systems. In this paper, we propose a novel framework, called SIFAST, for embedding and detecting malic
发表于 2025-3-23 02:25:59 | 显示全部楼层
发表于 2025-3-23 07:10:24 | 显示全部楼层
: Synthesizing High-Quality System Call Traces for OS Fuzz Testing software fuzz testing. By mutating the program inputs with random variations for iterations, fuzz testing aims to trigger program crashes and hangs caused by potential bugs that can be abused by the inputs. To achieve high OS code coverage, the de facto OS fuzzer typically composes . as the input s
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-1 22:55
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表