Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Thien-Phuc Doan"'
Publikováno v:
IEEE Access, Vol 11, Pp 94563-94574 (2023)
Advances in speech synthesis have exposed the vulnerability of spoofing countermeasure (CM) systems. Adversarial attacks exacerbate this problem, mainly due to the reliance of most CM models on deep neural networks. While research on adversarial atta
Externí odkaz:
https://doaj.org/article/5bce239f339341229ae00dece6f51ffd
Publikováno v:
IEEE Access, Vol 9, Pp 30071-30079 (2021)
In recent years, container technology has caught the attention of the communities by its performance and compactness. Although the design of modern container tools (e.g., Docker and podman) serves as a single-purpose application provider, existing de
Externí odkaz:
https://doaj.org/article/a1a09a37d4454687a4294f4f451234cf
Publikováno v:
Computer Systems Science and Engineering. 46:3059-3073
Publikováno v:
ICASSP 2023 - 2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
Autor:
Thien-Phuc Doan, Souhwan Jung
Publikováno v:
Computers, Materials & Continua. 72:1699-1711
Publikováno v:
Intelligent Automation & Soft Computing; 2023, Vol. 37 Issue 2, p1773-1786, 14p
Publikováno v:
IEEE Access, Vol 9, Pp 30071-30079 (2021)
In recent years, container technology has caught the attention of the communities by its performance and compactness. Although the design of modern container tools (e.g., Docker and podman) serves as a single-purpose application provider, existing de
Publikováno v:
Research Briefs on Information and Communication Technology Evolution. 5:102-110
Malicious applications, especially in mobile devices, constitute a serious threats to user data. Dueto the openness, Android have become the most popular smart phone operating system in mobilemarket. Although fast and straightforward, Static analysis
Publikováno v:
Mobile Information Systems, Vol 2020 (2020)
Nowadays, Android malware uses sensitive APIs to manipulate an Android device’s resources frequently. Conventional malware analysis uses hooking techniques to detect this harmful behavior. However, this approach is facing many problems, such as low