-
241
Novel blind audio watermarking algorithm in the hybrid domain
Published 2007-01-01Subjects: Get full text
Article -
242
DAGUARD: distributed backdoor attack defense scheme under federated learning
Published 2023-05-01Subjects: Get full text
Article -
243
Adversarial sample generation algorithm for vertical federated learning
Published 2023-08-01Subjects: Get full text
Article -
244
Resilience characterization and evaluation model of field area network for the power distribution network
Published 2022-09-01Subjects: Get full text
Article -
245
Application of adversarial machine learning in network intrusion detection
Published 2021-11-01Subjects: Get full text
Article -
246
Information flow integrity measurement method using integrity threat tree
Published 2019-04-01Subjects: Get full text
Article -
247
Security risk analysis and evaluation techniques in power information system cloud
Published 2018-02-01Subjects: Get full text
Article -
248
Grey evaluation model and algorithm of network attack effectiveness
Published 2009-01-01Subjects: “…attack effectiveness…”
Get full text
Article -
249
Global randomized consensus algorithm resist collusion attack based on game theory
Published 2022-08-01Subjects: Get full text
Article -
250
Optimal path identification to defend against DDoS attacks
Published 2008-01-01Subjects: Get full text
Article -
251
Preimage attacks on reduced‐round Keccak hash functions by solving algebraic systems
Published 2023-05-01Subjects: Get full text
Article -
252
Clustering perception mining of network protocol’s stealth attack behavior
Published 2017-06-01Subjects: Get full text
Article -
253
Research on discovering multi-step attack patterns based on clustering IDS alert sequences
Published 2011-01-01Subjects: Get full text
Article -
254
Review of side-channel privacy inference of Android mobile devices
Published 2018-04-01Subjects: Get full text
Article -
255
Efficient Method for Robust Backdoor Detection and Removal in Feature Space Using Clean Data
Published 2025-01-01Subjects: “…Backdoor attack…”
Get full text
Article -
256
A method for synthetic speech detection using local phase quantization
Published 2024-02-01Subjects: Get full text
Article -
257
Research on the risk adjacency matrix based on attack graphs
Published 2011-01-01Subjects: Get full text
Article -
258
Network slicing deployment method based on isolation level
Published 2020-04-01Subjects: Get full text
Article -
259
Approach to making strategies for network security enhancement based on attack graphs
Published 2009-01-01Subjects: Get full text
Article -
260
Post-harvest Fungal Infection in Arabica Coffee Beans (Coffea arabica Linnaeus) in the Coffee Center of West Sumatra Province, Indonesia
Published 2022-12-01Subjects: “…Attack, Aspergillus niger, Aspergillus flavus, Aspergillus ochraceus, storage…”
Get full text
Article