找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Science of Cyber Security; 5th International Co Moti Yung,Chao Chen,Weizhi Meng Conference proceedings 2023 The Editor(s) (if applicable) a

[复制链接]
楼主: chondrocyte
发表于 2025-3-30 09:53:12 | 显示全部楼层
Enhancing the Anti-steganalysis Ability of Image Steganography via Multiple Adversarial Networksthe original image using multiple lightweight channel attention modules in the generator, thus enhancing the anti-steganalysis ability of adversarial images. Furthermore, the proposed method utilizes multiple discrimination losses and MSE loss, dynamically combined to improve the quality of adversar
发表于 2025-3-30 12:32:36 | 显示全部楼层
发表于 2025-3-30 19:54:22 | 显示全部楼层
Real-Time Aggregation for Massive Alerts Based on Dynamic Attack Granularity Graphncluding ., and select three common alert aggregation algorithms to perform a comparative test in a simulated real-time situation. The experiment shows that our approach achieves more than 98% aggregation rate, reduces data complexity by more than 82%, and has stronger robustness.
发表于 2025-3-30 23:29:18 | 显示全部楼层
Decompilation Based Deep Binary-Source Function Matchingsyntactic and semantic information. In this way, the binary and source functions are represented in the same feature space so to ease the matching model to learn function similarity. For the matching model, we adopt a self-attention based siamese network with contrastive loss. Experiments on two dat
发表于 2025-3-31 04:53:27 | 显示全部楼层
ACDroid: Detecting Collusion Applications on Smart Devicesd IOT (Internet of Things) platforms. Most of these smart devices are designed based on the Android framework, and the security of Android applications is particularly important for these smart devices. To facilitate communication between applications, ICC (Inter-Component Communication) is widely u
发表于 2025-3-31 05:25:58 | 显示全部楼层
: Lightweight Intra-enclave Isolation for Confidential Virtual Machines sensitive and regulated data. This approach relies heavily on hardware-based Trusted Execution Environments (TEE), which establish isolated regions for data processing within a protected CPU region. Currently, a variety of TEEs (such as p-enclave in HyperEnclave and AMD SEV) support privilege separ
发表于 2025-3-31 10:45:41 | 显示全部楼层
发表于 2025-3-31 14:16:35 | 显示全部楼层
发表于 2025-3-31 20:16:50 | 显示全部楼层
发表于 2025-3-31 22:36:47 | 显示全部楼层
A Graphical Password Scheme Based on Rounded Image Selection design and build a more secure and robust graphical password system with the resistance to multiple attacks modalities, especially brute force attack, guessing attack and shoulder-surfing attack, it is important to avoid the credentials being captured in just one step, e.g., by adding several round
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-21 23:54
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表