-
361
Escape method of malicious traffic based on backdoor attack
Published 2024-04-01Subjects: “…backdoor attack…”
Get full text
Article -
362
Defending Deep Neural Networks Against Backdoor Attack by Using De-Trigger Autoencoder
Published 2025-01-01Subjects: “…Backdoor attack…”
Get full text
Article -
363
Increasing Neural-Based Pedestrian Detectors’ Robustness to Adversarial Patch Attacks Using Anomaly Localization
Published 2025-01-01Subjects: “…adversarial patch attack…”
Get full text
Article -
364
A survey on DNS attack detection and security protection
Published 2022-09-01Subjects: Get full text
Article -
365
Algorithm of NAF scalar multiplication on ECC against SPA
Published 2012-09-01Subjects: Get full text
Article -
366
Moving target defense against network eavesdropping attack using POF
Published 2018-02-01Subjects: Get full text
Article -
367
Query recovery attacks against conjunctive keyword searchable encryption
Published 2024-08-01Subjects: Get full text
Article -
368
-
369
La place Jemaa el-Fna au « printemps marocain »
Published 2011-11-01Subjects: “…attack…”
Get full text
Article -
370
A Metaheuristic Approach to Detecting and Mitigating DDoS Attacks in Blockchain-Integrated Deep Learning Models for IoT Applications
Published 2024-01-01Subjects: Get full text
Article -
371
Cooperation-based location authentication scheme for crowdsensing applications
Published 2022-09-01Subjects: Get full text
Article -
372
Mining and utilization of network protocol’s stealth attack behavior
Published 2017-10-01Subjects: Get full text
Article -
373
Construction of advanced persistent threat attack detection model based on provenance graph and attention mechanism
Published 2024-03-01Subjects: Get full text
Article -
374
RSA-based image recognizable adversarial attack method
Published 2021-10-01Subjects: “…adversarial attack…”
Get full text
Article -
375
Application of keyword searchable encryption in cloud
Published 2015-11-01Subjects: Get full text
Article -
376
Chosen-key extracting attack to random LSB steganography
Published 2010-01-01Subjects: Get full text
Article -
377
Web plug-in paradigm for anti-DoS attack based on end hopping
Published 2017-10-01Subjects: Get full text
Article -
378
Data poisoning attack detection approach for quality of service aware cloud API recommender system
Published 2023-08-01Subjects: Get full text
Article -
379
Quantum public-key encryption protocol based on single-photon
Published 2014-11-01Subjects: “…quantum chosen plaintext attack…”
Get full text
Article -
380