找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Security and Privacy in Communication Networks; 14th International C Raheem Beyah,Bing Chang,Sencun Zhu Conference proceedings 2018 ICST In

[复制链接]
楼主: frustrate
发表于 2025-3-23 12:03:41 | 显示全部楼层
发表于 2025-3-23 16:39:09 | 显示全部楼层
发表于 2025-3-23 20:56:32 | 显示全部楼层
发表于 2025-3-24 00:56:18 | 显示全部楼层
Differentially Private High-Dimensional Data Publication via Markov Network-dimensional data publication, such as the complex attribute relationships, the high computational complexity and data sparsity. Therefore, we propose ., a novel method to publish high-dimensional data with differential privacy guarantee. We first use the Markov model to represent the mutual relatio
发表于 2025-3-24 05:06:58 | 显示全部楼层
Automated Identification of Sensitive Data via Flexible User Requirementsion, deciding sensitive data subjects to users’ requirements and the application context. Existing research efforts on identifying sensitive data from its descriptive texts focus on keyword/phrase searching. These approaches can have high false positives/negatives as they do not consider the semanti
发表于 2025-3-24 10:28:28 | 显示全部楼层
Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild. To this end, code obfuscation is widely utilized by both legitimate app developers and malware authors, which complicates the representation of source code or machine code in order to hinder the manual investigation and code analysis. Despite many previous studies focusing on the obfuscation techn
发表于 2025-3-24 11:23:28 | 显示全部楼层
Transparent Low-Latency Network Anonymisation for Mobile Devicesessaging. At the same time however, mobile devices fail to provide important privacy guarantees for their users. In particular, mobile devices per default neither conceal which services they are contacting nor hide their source IP addresses. Solutions to these problems exist, but either do not provi
发表于 2025-3-24 15:33:57 | 显示全部楼层
Inferring UI States of Mobile Applications Through Power Side Channel Exploitationould initiate attacks timely according to this information, for example inserting fake GUIs or taking screenshots of GUIs involving user’s sensitive data. This paper proposes PoWatt, a method to infer the timing of sensitive UI occurrences by exploiting power side channels on mobile devices such as
发表于 2025-3-24 19:15:41 | 显示全部楼层
发表于 2025-3-25 01:03:36 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-14 20:05
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表