主页
外文期刊
OA 期刊
电子期刊
外文会议
中文期刊
标准
网络数据库
专业机构
企业门户
起重机械
生产工程
高级检索
关于我们
版权声明
使用帮助
会议文集
文集名
Computer Security. ESORICS 2024 International Workshops
会议名
29th European Symposium on Research in Computer Security (ESORICS 2024) Workshops: SECAI, DisA, CPS4CIP, and SecAssure
中译名
《第二十九届欧洲计算机安全研究专题研讨会 - 讨论会,卷2》
会议日期
September 16-20, 2024
会议地点
Bydgoszcz, Poland
出版年
2025
馆藏号
356556
题名
作者
出版年
Feasibility Study for Supporting Static Malware Analysis Using LLM
Shota Fujii; Rei Yamagishi
2025
PSY: Posterior Sampling Based Privacy Enhancer in Large Language Models
Yulian Sun; Li Duan; Yong Li
2025
Systematic Bug Reproduction with Large Language Model
Sanghyun Park; Haeun Lee; Sang Kil Cha
2025
BOTracle: A Framework for Discriminating Bots and Humans
Jan Kadel; August See; Ritwik Sinha; Mathias Fischer
2025
Deep Learning for Network Anomaly Detection Under Data Contamination: Evaluating Robustness and Mitigating Performance Degradation
D'Jeff K. Nkashama; Jordan F. Masakuna; Arian Soltani; Jean-Charles Verdier; Marc Frappier; Pierre-Martin Tardif; Froduald Kabanza
2025
On Intrinsic Cause and Defense of Adversarial Examples in Deep Neural Networks
Hajime Tasaki; Jinhui Chao
2025
Effects of Poisoning Attacks on Causal Deep Reinforcement Learning
Patrick Lodeweegs; Behrad Tajalli; Stjepan Picek
2025
Generating Traffic-Level Adversarial Examples from Feature-Level Specifications
Robert Flood; Marco Casadio; David Aspinall; Ekaterina Komendantskaya
2025
PhishCoder: Efficient Extraction of Contextual Information from Phishing Emails
Tarini Saka; Kami Vaniea; Nadin Kokciyan
2025
On the Robustness of Malware Detectors to Adversarial Samples
Muhammad Salman; Benjamin Zi Hao Zhao; Hassan Jameel Asghar; Muhammad Ikram; Sidharth Kaushik; Mohamed Ali Kaafar
2025
Towards AI-Based Identification of Publicly Known Vulnerabilities
Andres Vargas-Rivera; Herson Esquivel-Vargas
2025
Machine Learning-Based Secure Malware Detection Using Features from Binary Executable Headers
Irfan Bulut; Enrique Argones Rua
2025
Improving Adversarial Robustness in Android Malware Detection by Reducing the Impact of Spurious Correlations
Hamid Bostani; Zhengyu Zhao; Veelasha Moonsamy
2025
Multi-Objective Evolutionary Algorithm for Automatic Generation of Adversarial Metamorphic Malware
Kehinde O. Babaagba; Jordan Wylie; Mayowa Ayodele; Zhiyuan Tan
2025
A RAG-Based Question-Answering Solution for Cyber-Attack Investigation and Attribution
Sampath Rajapaksha; Ruby Rani; Erisa Karafili
2025
Recognition of Remakes and Fake Facial Images
Janusz Bobulski; Mariusz Kubanek
2025
A Novel Method of Improving Intrusion Detection Systems Robustness Against Adversarial Attacks, Through Feature Omission and a Committee of Classifiers
Marek Pawlicki; Federica Uccello; Salvatore D'Antonio; Rafal Kozik; Michal Choras
2025
Proposition of a Novel Type of Attacks Targetting Explainable AI Algorithms in Cybersecurity
Sebastian Szelest; Marek Pawlicki; Aleksandra Pawlicka; Rafal Kozik; Michal Choras
2025
Data Structures Towards the Recognition of Fake News and Disinformation Written in Polish
Mateusz Walczak; Aneta Poniszewska-Maranda
2025
Characterizing Prediction Model Responses to Attack Inputs: A Study with Time-Series Power Consumption Data
Srinidhi Madabhushi; Rinku Dewri
2025
1
2
国家科技图书文献中心
全球文献资源网
京ICP备05055788号-26
京公网安备11010202008970号 机械工业信息研究院 2018-2024