-
741
Review of side-channel privacy inference of Android mobile devices
Published 2018-04-01Subjects: Get full text
Article -
742
Efficient Method for Robust Backdoor Detection and Removal in Feature Space Using Clean Data
Published 2025-01-01Subjects: “…Backdoor attack…”
Get full text
Article -
743
A method for synthetic speech detection using local phase quantization
Published 2024-02-01Subjects: Get full text
Article -
744
Network slicing deployment method based on isolation level
Published 2020-04-01Subjects: Get full text
Article -
745
Post-harvest Fungal Infection in Arabica Coffee Beans (Coffea arabica Linnaeus) in the Coffee Center of West Sumatra Province, Indonesia
Published 2022-12-01Subjects: “…Attack, Aspergillus niger, Aspergillus flavus, Aspergillus ochraceus, storage…”
Get full text
Article -
746
-
747
Analysis and improvement of a password-based authenticated key exchange protocol
Published 2010-01-01Subjects: Get full text
Article -
748
Efficient group signature scheme with revocation
Published 2016-10-01Subjects: Get full text
Article -
749
Towards Privacy in Decentralized IoT: A Blockchain-Based Dual Response DP Mechanism
Published 2024-09-01Subjects: Get full text
Article -
750
Le son dans les procès filmés en France
Published 2024-10-01Subjects: “…trials of the terrorist attacks…”
Get full text
Article -
751
Lvov and Sandomir Offensive Operation: the Look 70 Years
Published 2015-02-01Subjects: Get full text
Article -
752
Automated Windows domain penetration method based on reinforcement learning
Published 2023-08-01Subjects: Get full text
Article -
753
Class of constructions of even variables Boolean function with optimum algebraic immunity
Published 2009-01-01Subjects: Get full text
Article -
754
Provably secure certificateless aggregate signature scheme in wireless roaming authentication
Published 2017-07-01Subjects: Get full text
Article -
755
Shoulder-surfing resistant PIN-entry method
Published 2019-02-01Subjects: “…shoulder-surfing attack…”
Get full text
Article -
756
Adversarial Robust Modulation Recognition Guided by Attention Mechanisms
Published 2025-01-01Subjects: “…Adversarial attacks…”
Get full text
Article -
757
Enhancing adversarial transferability with local transformation
Published 2024-11-01Subjects: Get full text
Article -
758
Secure federated learning scheme based on adaptive Byzantine defense
Published 2024-08-01Subjects: Get full text
Article -
759
Exploring the LEACH routing protocol in wireless sensor networks: a brief analysis
Published 2022-09-01Subjects: Get full text
Article -
760
Measurement study on abnormal changes in authoritative resource records of government and educational domains
Published 2024-11-01Subjects: Get full text
Article