-
321
Defend Against Property Inference Attack for Flight Operations Data Sharing in FedMeta Framework
Published 2025-01-01Subjects: “…property inference attack…”
Get full text
Article -
322
Shamir-based virtual machine placement policy
Published 2019-10-01Subjects: “…co-resident attack…”
Get full text
Article -
323
STRATEGIES OF EQUAL STATUS INTERCULTURAL COMMUNICATION
Published 2013-12-01Subjects: Get full text
Article -
324
Automated crowdturfing attack in Chinese user reviews
Published 2019-06-01Subjects: “…automated crowdturfing attack…”
Get full text
Article -
325
Effect of self-healing of cracks in chloride ion diffusion and corrosion of engineered cementitious composites
Published 2025-03-01Subjects: Get full text
Article -
326
The Role of Atrial Fibrillation and Oral Anticoagulation Status in Health‐Related Quality of Life 12 Months After Ischemic Stroke or TIA
Published 2025-01-01Subjects: Get full text
Article -
327
Forgery attacks on several certificateless signature schemes
Published 2020-06-01Subjects: “…public key replacement attack…”
Get full text
Article -
328
Research on the multi-message modification techniques on MD5
Published 2009-01-01Subjects: Get full text
Article -
329
Detection algorithm for cache pollution attacks based on node state model in content centric networking
Published 2016-09-01Subjects: Get full text
Article -
330
Side channel attack of cipher chips based on difference variability
Published 2015-03-01Subjects: Get full text
Article -
331
-
332
Random routing defense method based on deep deterministic policy gradient
Published 2021-06-01Subjects: Get full text
Article -
333
Detecting and preventing collusion attack in DPoS based on power index
Published 2022-12-01Subjects: Get full text
Article -
334
Targeted Discrepancy Attacks: Crafting Selective Adversarial Examples in Graph Neural Networks
Published 2025-01-01Subjects: Get full text
Article -
335
Guess and determine attack on E<sub>0</sub>algorithm
Published 2012-11-01Subjects: Get full text
Article -
336
Network intrusion intention analysis model based on Bayesian attack graph
Published 2020-09-01Subjects: Get full text
Article -
337
EBS-based efficient and secure group key management in wireless sensor networks
Published 2009-01-01Subjects: Get full text
Article -
338
Membership inference attacks against transfer learning for generalized model
Published 2021-10-01Subjects: “…membership inference attack…”
Get full text
Article -
339
-
340
Cyber attacks and privacy protection distributed consensus algorithm for multi-agent systems
Published 2023-03-01Subjects: Get full text
Article