会议文集


文集名Computer Security. ESORICS 2024 International Workshops
会议名29th European Symposium on Research in Computer Security (ESORICS 2024) Workshops: SECAI, DisA, CPS4CIP, and SecAssure
中译名《第二十九届欧洲计算机安全研究专题研讨会 - 讨论会,卷2》
会议日期September 16-20, 2024
会议地点Bydgoszcz, Poland
出版年2025
馆藏号356556


题名作者出版年
Feasibility Study for Supporting Static Malware Analysis Using LLMShota Fujii; Rei Yamagishi2025
PSY: Posterior Sampling Based Privacy Enhancer in Large Language ModelsYulian Sun; Li Duan; Yong Li2025
Systematic Bug Reproduction with Large Language ModelSanghyun Park; Haeun Lee; Sang Kil Cha2025
BOTracle: A Framework for Discriminating Bots and HumansJan Kadel; August See; Ritwik Sinha; Mathias Fischer2025
Deep Learning for Network Anomaly Detection Under Data Contamination: Evaluating Robustness and Mitigating Performance DegradationD'Jeff K. Nkashama; Jordan F. Masakuna; Arian Soltani; Jean-Charles Verdier; Marc Frappier; Pierre-Martin Tardif; Froduald Kabanza2025
On Intrinsic Cause and Defense of Adversarial Examples in Deep Neural NetworksHajime Tasaki; Jinhui Chao2025
Effects of Poisoning Attacks on Causal Deep Reinforcement LearningPatrick Lodeweegs; Behrad Tajalli; Stjepan Picek2025
Generating Traffic-Level Adversarial Examples from Feature-Level SpecificationsRobert Flood; Marco Casadio; David Aspinall; Ekaterina Komendantskaya2025
PhishCoder: Efficient Extraction of Contextual Information from Phishing EmailsTarini Saka; Kami Vaniea; Nadin Kokciyan2025
On the Robustness of Malware Detectors to Adversarial SamplesMuhammad Salman; Benjamin Zi Hao Zhao; Hassan Jameel Asghar; Muhammad Ikram; Sidharth Kaushik; Mohamed Ali Kaafar2025
Towards AI-Based Identification of Publicly Known VulnerabilitiesAndres Vargas-Rivera; Herson Esquivel-Vargas2025
Machine Learning-Based Secure Malware Detection Using Features from Binary Executable HeadersIrfan Bulut; Enrique Argones Rua2025
Improving Adversarial Robustness in Android Malware Detection by Reducing the Impact of Spurious CorrelationsHamid Bostani; Zhengyu Zhao; Veelasha Moonsamy2025
Multi-Objective Evolutionary Algorithm for Automatic Generation of Adversarial Metamorphic MalwareKehinde O. Babaagba; Jordan Wylie; Mayowa Ayodele; Zhiyuan Tan2025
A RAG-Based Question-Answering Solution for Cyber-Attack Investigation and AttributionSampath Rajapaksha; Ruby Rani; Erisa Karafili2025
Recognition of Remakes and Fake Facial ImagesJanusz Bobulski; Mariusz Kubanek2025
A Novel Method of Improving Intrusion Detection Systems Robustness Against Adversarial Attacks, Through Feature Omission and a Committee of ClassifiersMarek Pawlicki; Federica Uccello; Salvatore D'Antonio; Rafal Kozik; Michal Choras2025
Proposition of a Novel Type of Attacks Targetting Explainable AI Algorithms in CybersecuritySebastian Szelest; Marek Pawlicki; Aleksandra Pawlicka; Rafal Kozik; Michal Choras2025
Data Structures Towards the Recognition of Fake News and Disinformation Written in PolishMateusz Walczak; Aneta Poniszewska-Maranda2025
Characterizing Prediction Model Responses to Attack Inputs: A Study with Time-Series Power Consumption DataSrinidhi Madabhushi; Rinku Dewri2025
12