Zobrazeno 1 - 10
of 587
pro vyhledávání: '"LUO Xiangyang"'
Publikováno v:
Tongxin xuebao, Vol 45, Pp 160-175 (2024)
With the continuous increase in the scale and variety of malware, traditional malware analysis methods, which relied on manual feature extraction, become time-consuming and error-prone, rendering them unsuitable. To improve detection efficiency and a
Externí odkaz:
https://doaj.org/article/8c3796462a584fe5a0d5758d8c9dc125
Publikováno v:
网络与信息安全学报, Vol 8, Iss 1, Pp 30-40 (2022)
Network attack detection plays a vital role in network security. Existing detection approaches focus on typical attack behaviors, such as Botnets and SQL injection. The widespread use of the SSL/TLS encryption protocol arises some emerging attack str
Externí odkaz:
https://doaj.org/article/69021e50435740a89aec2e47cfb3b925
The misuse of deep learning-based facial manipulation poses a potential threat to civil rights. To prevent this fraud at its source, proactive defense technology was proposed to disrupt the manipulation process by adding invisible adversarial perturb
Externí odkaz:
http://arxiv.org/abs/2409.13349
Recently, a novel form of audio partial forgery has posed challenges to its forensics, requiring advanced countermeasures to detect subtle forgery manipulations within long-duration audio. However, existing countermeasures still serve a classificatio
Externí odkaz:
http://arxiv.org/abs/2407.16554
In recent years, Large Language Models (LLMs) have demonstrated remarkable capabilities across a wide array of text-centric tasks. However, their `large' scale introduces significant computational and storage challenges, particularly in managing the
Externí odkaz:
http://arxiv.org/abs/2407.02328
Publikováno v:
Security and Safety, Vol 2, p 2023002 (2023)
With the metaverse being the development direction of the next generation Internet, the popularity of intelligent devices, and the maturity of various emerging technologies, more and more intelligent devices try to connect to the Internet, which pose
Externí odkaz:
https://doaj.org/article/7c897d0e07ce4c77bce720ea66145254
Publikováno v:
IEEE Access, Vol 7, Pp 87085-87096 (2019)
Group key agreement is a good way to ensure secure communication within a group. However, the identity authentication, privacy protection, and information sharing access control (different access rights may exist for different sensitivity of informat
Externí odkaz:
https://doaj.org/article/ec089dfeab97426699e382a0a445c337
While impressive performance has been achieved in image captioning, the limited diversity of the generated captions and the large parameter scale remain major barriers to the real-word application of these systems. In this work, we propose a lightwei
Externí odkaz:
http://arxiv.org/abs/2309.04965
The vulnerability of Deep Neural Networks (DNNs) to adversarial examples has been confirmed. Existing adversarial defenses primarily aim at preventing adversarial examples from attacking DNNs successfully, rather than preventing their generation. If
Externí odkaz:
http://arxiv.org/abs/2303.04502
Conventional covert image communication is assumed to transmit the message, in the securest way possible for a given payload, over lossless channels, and the associated steganographic schemes are generally vulnerable to active attacks, e.g., JPEG re-
Externí odkaz:
http://arxiv.org/abs/2212.02822