-
21
Survey on vertical federated learning: algorithm, privacy and security
Published 2023-04-01Subjects: Get full text
Article -
22
Survey on Byzantine attacks and defenses in federated learning
Published 2024-12-01Subjects: Get full text
Article -
23
Comparative study of power analysis attacks based on template and KNN algorithm
Published 2022-04-01Subjects: Get full text
Article -
24
Design and implementation of OSPF vulnerability analysis and detection system
Published 2013-09-01Subjects: Get full text
Article -
25
Deception defense method against intelligent penetration attack
Published 2022-10-01Subjects: Get full text
Article -
26
-
27
GreyFan:a network attack framework using Wi-Fi covert channel
Published 2019-09-01Subjects: “…HID attack…”
Get full text
Article -
28
Attack signature generation by traceable dynamic taint analysis
Published 2012-05-01Subjects: Get full text
Article -
29
Improved integral attack——random linear distinguish and key recovery attack
Published 2023-04-01Subjects: “…integral attack…”
Get full text
Article -
30
Mechanism and implementation of Rootkit attack and defense
Published 2018-12-01Subjects: Get full text
Article -
31
Detection and Control Technology of Distributed DNS Reflective DDoS Attack
Published 2015-10-01Subjects: Get full text
Article -
32
Machine learning-based detection, identification and restoration method of jamming attacks in optical networks
Published 2023-07-01Subjects: Get full text
Article -
33
Label flipping adversarial attack on graph neural network
Published 2021-09-01Subjects: Get full text
Article -
34
Qualitative modeling and analysis of attack surface for process multi-variant execution software system
Published 2022-10-01Subjects: Get full text
Article -
35
RESEARCH ON TECHNIQUES TO ENHANCE DDoS ATTACK PREVENTION USING CUMULATIVE SUM AND BACKPROPAGATION ALGORITHMS
Published 2024-12-01Subjects: “…network attack…”
Get full text
Article -
36
Attack Analysis Framework of Space-Integrated-Ground Information Network Based on Cybersecurity Knowledge Graph
Published 2021-09-01Subjects: Get full text
Article -
37
Research and simulation of timing attacks on ECC
Published 2016-04-01Subjects: Get full text
Article -
38
High order DPA with profiling
Published 2018-09-01Subjects: “…side channel attack…”
Get full text
Article -
39
Fault-injection attack on countermeasure algorithms of RSA-CRT cryptosystem
Published 2019-02-01Subjects: Get full text
Article -
40
VLSI implementation of AES algorithm against differential power attack and differential fault attack
Published 2010-01-01Subjects: Get full text
Article