|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 281 occurrences of 202 keywords
|
|
|
Results
Found 1440 publication records. Showing 1440 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
63 | David M. Nicol, Michael Liljenstam |
Models and Analysis of Active Worm Defense. |
MMM-ACNS |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Michael Liljenstam, David M. Nicol |
Comparing Passive and Active Worm Defenses. |
QEST |
2004 |
DBLP DOI BibTeX RDF |
|
51 | Mohit Mehta, Kanika Thapar, George C. Oikonomou, Jelena Mirkovic |
Combining Speak-Up with DefCOM for Improved DDoS Defense. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
51 | Bruce Hartpence |
Teaching wireless security for results. |
SIGITE Conference |
2005 |
DBLP DOI BibTeX RDF |
attack/defend, teaching, wireless security |
40 | Daniel Halperin, Thomas S. Heydt-Benjamin, Benjamin Ransford, Shane S. Clark, Benessa Defend, Will Morgan, Kevin Fu, Tadayoshi Kohno, William H. Maisel |
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses. |
SP |
2008 |
DBLP DOI BibTeX RDF |
security, privacy, pervasive computing, implantable medical devices, medical safety |
40 | Úlfar Erlingsson |
Low-Level Software Security: Attacks and Defenses. |
FOSAD |
2007 |
DBLP DOI BibTeX RDF |
|
38 | Ji Wu 0006, Chaoqun Ye, Shiyao Jin |
Adversarial Organization Modeling for Network Attack/Defense. |
ISPEC |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Seung Ho Na, Kwanwoo Kim, Seungwon Shin |
Witnessing Erosion of Membership Inference Defenses: Understanding Effects of Data Drift in Membership Privacy. |
RAID |
2023 |
DBLP DOI BibTeX RDF |
|
30 | Xhelal Likaj, Soheil Khodayari, Giancarlo Pellegrino |
Where We Stand (or Fall): An Analysis of CSRF Defenses in Web Frameworks. |
RAID |
2021 |
DBLP DOI BibTeX RDF |
|
30 | Rukayat Ayomide Erinfolami, Anh Quach, Aravind Prakash |
On Design Inference from Binaries Compiled using Modern C++ Defenses. |
RAID |
2019 |
DBLP BibTeX RDF |
|
30 | Enes Göktas, Elias Athanasopoulos, Herbert Bos, Georgios Portokalidis |
Evaluating control-flow restricting defenses. |
The Continuing Arms Race |
2018 |
DBLP DOI BibTeX RDF |
|
30 | Warren He, James Wei, Xinyun Chen, Nicholas Carlini, Dawn Song |
Adversarial Example Defenses: Ensembles of Weak Defenses are not Strong. |
CoRR |
2017 |
DBLP BibTeX RDF |
|
30 | Felix Schuster, Thomas Tendyck, Jannik Pewny, Andreas Maaß, Martin Steegmanns, Moritz Contag, Thorsten Holz |
Evaluating the Effectiveness of Current Anti-ROP Defenses. |
RAID |
2014 |
DBLP DOI BibTeX RDF |
|
30 | Nan Jiang 0017, Yu Jin 0001, Ann Skudlark, Zhi-Li Zhang |
Understanding SMS Spam in a Large Cellular Network: Characteristics, Strategies and Defenses. |
RAID |
2013 |
DBLP DOI BibTeX RDF |
|
30 | Richard Skowyra, Kelly Casteel, Hamed Okhravi, Nickolai Zeldovich, William W. Streilein |
Systematic Analysis of Defenses against Return-Oriented Programming. |
RAID |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Katerina J. Argyraki, David R. Cheriton |
Scalable network-layer defense against internet bandwidth-flooding attacks. |
IEEE/ACM Trans. Netw. |
2009 |
DBLP DOI BibTeX RDF |
denial-of-service defenses, traffic filtering, network-level security and protection |
28 | Spyros Antonatos, Quang Hieu Vu |
Harnessing the Power of P2P Systems for Fast Attack Signature Validation. |
NSS |
2009 |
DBLP DOI BibTeX RDF |
signature validation, P2P defenses, indexing |
28 | Marios Mavronicolas, Vicky Papadopoulou, Anna Philippou, Paul G. Spirakis |
A Network Game with Attackers and a Defender. |
Algorithmica |
2008 |
DBLP DOI BibTeX RDF |
Attacks and defenses, Security, Game theory, Graph theory, Nash equilibria |
28 | Frédéric Vanderhaegen, Sébastien Chalmé, Françoise Anceaux, Patrick Millot |
Principles of cooperation and competition: application to car driver behavior analysis. |
Cogn. Technol. Work. |
2006 |
DBLP DOI BibTeX RDF |
BCD model, Car driver, Human factors, Cooperation, Competition, Defenses, Risk control |
28 | Paul Schmehl |
Barbarians at the gateway, defeating viruses in EDU. |
SIGUCCS |
2001 |
DBLP DOI BibTeX RDF |
malicious programs, security, strategies, blocking, viruses, anti-virus, defenses |
28 | Bimal Viswanath, Ansley Post, P. Krishna Gummadi, Alan Mislove |
An analysis of social network-based Sybil defenses. |
SIGCOMM |
2010 |
DBLP DOI BibTeX RDF |
social network-based Sybil defense, communities, social networks, sybil attacks |
28 | Martin R. Stytz |
The Shape of Crimeware to Come (review of Crimeware: Understanding New Attacks and Defenses by M. Jacobsson and Z. Ramzan) [Book reviews]. |
IEEE Secur. Priv. |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Zheng Zhang 0009, Ying Zhang 0022, Y. Charlie Hu, Zhuoqing Morley Mao |
Practical defenses against BGP prefix hijacking. |
CoNEXT |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Vitaly Shmatikov, Ming-Hsiu Wang |
Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses. |
ESORICS |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Nikita Borisov |
Computational Puzzles as Sybil Defenses. |
Peer-to-Peer Computing |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Jeffrey P. Ridder, Jason C. HandUber |
Mission planning for joint suppression of enemy air defenses using a genetic algorithm. |
GECCO |
2005 |
DBLP DOI BibTeX RDF |
genetic algorithms, mission planning |
28 | Jeff S. L. Cheng, Victor K. Wei |
Defenses against the Truncation of Computation Results of Free-Roaming Agents. |
ICICS |
2002 |
DBLP DOI BibTeX RDF |
agent route protection, cryptographic protocols, mobile agent security, malicious host, truncation attack |
28 | John P. McDermott, R. Gelinas, S. Ornstein |
Doc, Wyatt, and Virgil: Prototyping Storage Jamming Defenses. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
Doc, Wyatt, Virgil, storage jamming defense, storage jamming attack detection, replay defense, attack source determination, attack pattern determination, object-oriented data storage, application-specific techniques, access control, encryption, auditing, software prototyping, checksums, virus detection, prototype tools, logical replication, information warfare |
25 | Collin Jackson, Adam Barth, Andrew Bortz, Weidong Shao, Dan Boneh |
Protecting browsers from DNS rebinding attacks. |
ACM Trans. Web |
2009 |
DBLP DOI BibTeX RDF |
spam, firewall, DNS, Same-origin policy, click fraud |
25 | Adam Barth, Juan Caballero, Dawn Song |
Secure Content Sniffing for Web Browsers, or How to Stop Papers from Reviewing Themselves. |
SP |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Lorenzo Cavallaro, Prateek Saxena, R. Sekar 0001 |
On the Limits of Information Flow Techniques for Malware Analysis and Containment. |
DIMVA |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Sandeep Bhatkar, R. Sekar 0001 |
Data Space Randomization. |
DIMVA |
2008 |
DBLP DOI BibTeX RDF |
address space randomization, buffer overflow, memory error |
25 | Jiajun Zhu, Jonathan Z. Bakdash, David Koller, Thomas Banton, Dennis Proffitt, Greg Humphreys |
Quantifying usability in secure graphics: assessing the user costs of protecting 3D content. |
APGV |
2008 |
DBLP DOI BibTeX RDF |
secure graphics, usability, perception, 3D reconstruction |
25 | Reiko Ann Miura-Ko, Nicholas Bambos |
Dynamic Risk Mitigation in Computing Infrastructures. |
IAS |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Jelena Mirkovic, Peter L. Reiher, Sonia Fahmy, Roshan K. Thomas, Alefiya Hussain, Stephen Schwab, Calvin Ko |
Measuring denial Of service. |
QoP |
2006 |
DBLP DOI BibTeX RDF |
metrics, denial of service |
25 | Bertrand Anckaert, Mariusz H. Jakubowski, Ramarathnam Venkatesan |
Proteus: virtualization for diversified tamper-resistance. |
Digital Rights Management Workshop |
2006 |
DBLP DOI BibTeX RDF |
virtualization, diversity, copyright protection, intellectual property, obfuscation, tamper-resistance |
25 | George C. Oikonomou, Jelena Mirkovic, Peter L. Reiher, Max Robinson |
A Framework for a Collaborative DDoS Defense. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Ying Xu, Roch Guérin |
On the robustness of router-based denial-of-service (DoS) defense systems. |
Comput. Commun. Rev. |
2005 |
DBLP DOI BibTeX RDF |
router-based defense, denial-of-service |
25 | Stephen T. Chou, Angelos Stavrou, John Ioannidis, Angelos D. Keromytis |
gore: Routing-Assisted Defense Against DDoS Attacks. |
ISC |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Jelena Mirkovic, Peter L. Reiher |
A taxonomy of DDoS attack and DDoS defense mechanisms. |
Comput. Commun. Rev. |
2004 |
DBLP DOI BibTeX RDF |
|
25 | Haidong Xia, José Carlos Brustoloni |
Detecting and Blocking Unauthorized Access in Wi-Fi Networks. |
NETWORKING |
2004 |
DBLP DOI BibTeX RDF |
|
25 | Stuart Staniford, David Moore 0001, Vern Paxson, Nicholas Weaver |
The top speed of flash worms. |
WORM |
2004 |
DBLP DOI BibTeX RDF |
flash worm, simulation, modeling, worms |
25 | Petros Maniatis, Thomas J. Giuli, Mema Roussopoulos, David S. H. Rosenthal, Mary Baker |
Impeding attrition attacks in P2P systems. |
ACM SIGOPS European Workshop |
2004 |
DBLP DOI BibTeX RDF |
|
25 | Charlie Kaufman, Radia J. Perlman, Bill Sommerfeld |
DoS protection for UDP-based protocols. |
CCS |
2003 |
DBLP DOI BibTeX RDF |
buffer exhaustion, network security, DoS, denial of service, fragmentation, IPsec, protocol design, IKE |
15 | Mayra Alexandra Macas Carrasco, Chun-Ming Wu 0001, Walter Fuertes |
Adversarial examples: A survey of attacks and defenses in deep learning-enabled cybersecurity systems. |
Expert Syst. Appl. |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Caelin Kaplan, Chuan Xu 0002, Othmane Marfoq, Giovanni Neglia, Anderson Santana de Oliveira |
A Cautionary Tale: On the Role of Reference Data in Empirical Privacy Defenses. |
Proc. Priv. Enhancing Technol. |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Jaewoo Park, Leo Hyun Park, Hong Eun Ahn, Taekyoung Kwon 0002 |
Coexistence of Deepfake Defenses: Addressing the Poisoning Challenge. |
IEEE Access |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Quentin Le Roux, Eric Bourbao, Yannick Teglia, Kassem Kallas |
A Comprehensive Survey on Backdoor Attacks and Their Defenses in Face Recognition Systems. |
IEEE Access |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Chuang Wang 0005, Zidong Wang, Qinyuan Liu, Hongli Dong, Weiguo Sheng |
Support-Sample-Assisted Domain Generalization via Attacks and Defenses: Concepts, Algorithms, and Applications to Pipeline Fault Diagnosis. |
IEEE Trans. Ind. Informatics |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Sihan Wang, Tian Xie, Min-Yue Chen, Guan-Hua Tu, Chi-Yu Li 0001, Xinyu Lei, Po-Yi Chou, Fu-Cheng Hsieh, Yiwen Hu, Li Xiao 0001, Chunyi Peng 0001 |
Dissecting Operational Cellular IoT Service Security: Attacks and Defenses. |
IEEE/ACM Trans. Netw. |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Ren-Yi Huang, G. Dumindu Samaraweera, J. Morris Chang |
Exploring Threats, Defenses, and Privacy-Preserving Techniques in Federated Learning: A Survey. |
Computer |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Gongxi Zhu, Donghao Li, Hanlin Gu, Yuxing Han 0001, Yuan Yao, Lixin Fan, Qiang Yang 0001 |
Evaluating Membership Inference Attacks and Defenses in Federated Learning. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Ziyao Liu, Huanyi Ye, Chen Chen 0037, Kwok-Yan Lam |
Threats, Attacks, and Defenses in Machine Unlearning: A Survey. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Arijit Ghosh Chowdhury, Md Mofijul Islam, Vaibhav Kumar, Faysal Hossain Shezan, Vinija Jain, Aman Chadha |
Breaking Down the Defenses: A Comparative Survey of Attacks on Large Language Models. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Xabier Echeberria-Barrio, Amaia Gil-Lerchundi, Jon Egaña Zubia, Raul Orduna Urrutia |
Understanding Deep Learning defenses Against Adversarial Examples Through Visualizations for Dynamic Risk Assessment. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Bui Duc Son, Tien Hoa Nguyen, Trinh Van Chien, Waqas Khalid, Mohamed Amine Ferrag, Wan Choi 0001, Mérouane Debbah |
Adversarial Attacks and Defenses in 6G Network-Assisted IoT Systems. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Vitaliy Pozdnyakov, Aleksandr Kovalenko, Ilya Makarov, Mikhail Drobyshevskiy, Kirill Lukyanov |
Adversarial Attacks and Defenses in Automated Control Systems: A Comprehensive Benchmark. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Zhichen Dong, Zhanhui Zhou, Chao Yang, Jing Shao, Yu Qiao |
Attacks, Defenses and Evaluations for LLM Conversation Safety: A Survey. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Hao Fang, Yixiang Qiu, Hongyao Yu, Wenbo Yu, Jiawei Kong, Baoli Chong, Bin Chen 0011, Xuan Wang, Shu-Tao Xia |
Privacy Leakage on DNNs: A Survey of Model Inversion Attacks and Defenses. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Abdullah Giray Yaglikçi, Yahya Can Tugrul, Geraldo F. Oliveira, Ismail Emir Yüksel, Ataberk Olgun, Haocong Luo, Onur Mutlu |
Spatial Variation-Aware Read Disturbance Defenses: Experimental Analysis of Real DRAM Chips and Implications on Future Solutions. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Azuka J. Chiejina, Brian Kim, Kaushik Chowhdury, Vijay K. Shah |
System-level Analysis of Adversarial Attacks and Defenses on Intelligence in O-RAN based Cellular Networks. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Ghazaleh Shirvani, Saeid Ghasemshirazi, Behzad Beigzadeh |
Federated Learning: Attacks, Defenses, Opportunities, and Challenges. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
15 | R. Spencer Hallyburton, David Hunt, Shaocheng Luo, Miroslav Pajic |
A Multi-Agent Security Testbed for the Analysis of Attacks and Defenses in Collaborative Sensor Fusion. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Lei Xu 0040, Sarah Alnegheimish, Laure Berti-Équille, Alfredo Cuesta-Infante, Kalyan Veeramachaneni |
Single Word Change is All You Need: Designing Attacks and Defenses for Text Classifiers. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Sheng Liu, Zihan Wang, Qi Lei |
Data Reconstruction Attacks and Defenses: A Systematic Evaluation. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Satwik Kundu, Debarshi Kundu, Swaroop Ghosh |
Evaluating Efficacy of Model Stealing Attacks and Defenses on Quantum Neural Networks. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Li Hu, Anli Yan, Hongyang Yan, Jin Li, Teng Huang, Yingying Zhang, Changyu Dong, Chunsheng Yang |
Defenses to Membership Inference Attacks: A Survey. |
ACM Comput. Surv. |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Yunrui Yu, Xitong Gao, Cheng-Zhong Xu 0001 |
LAFIT: Efficient and Reliable Evaluation of Adversarial Defenses With Latent Features. |
IEEE Trans. Pattern Anal. Mach. Intell. |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Pedro Miguel Sánchez Sánchez, Alberto Huertas Celdrán, Gérôme Bovet, Gregorio Martínez Pérez |
Adversarial attacks and defenses on ML- and hardware-based IoT device fingerprinting and identification. |
Future Gener. Comput. Syst. |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Huaibing Peng, Huming Qiu, Hua Ma, Shuo Wang, Anmin Fu, Said F. Al-Sarawi, Derek Abbott, Yansong Gao |
On Model Outsourcing Adaptive Attacks to Deep Learning Backdoor Defenses. |
IEEE Trans. Inf. Forensics Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Jiajun Gong, Wuqi Zhang, Charles Zhang 0001, Tao Wang 0012 |
WFDefProxy: Real World Implementation and Evaluation of Website Fingerprinting Defenses. |
IEEE Trans. Inf. Forensics Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Thuy Dung Nguyen, Tuan Nguyen, Phi Le Nguyen, Hieu H. Pham 0001, Khoa D. Doan, Kok-Seng Wong |
Backdoor attacks and defenses in federated learning: Survey, challenges and future research directions. |
Eng. Appl. Artif. Intell. |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Xi Xiao, Xiang Zhou, Zhenyu Yang, Le Yu 0002, Bin Zhang, Qixu Liu, Xiapu Luo |
A comprehensive analysis of website fingerprinting defenses on Tor. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Theodore Tangie Longtchi, Rosana Montañez Rodriguez, Laith Al-Shawaf, Adham Atyabi, Shouhuai Xu |
Internet-Based Social Engineering Psychology, Attacks, and Defenses: A Survey. |
Proc. IEEE |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Abdullah Giray Yaglikçi, Yahya Can Tugrul, Geraldo F. Oliveira, Ismail Emir Yüksel, Ataberk Olgun, Haocong Luo, Onur Mutlu |
Spatial Variation-Aware Read Disturbance Defenses: Experimental Analysis of Real DRAM Chips and Implications on Future Solutions. |
HPCA |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Erik Scheurer, Jenny Schmalfuss, Alexander Lis, Andrés Bruhn |
Detection Defenses: An Empty Promise against Adversarial Patch Attacks on Optical Flow. |
WACV |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Shiliang Zuo |
Near Optimal Adversarial Attacks on Stochastic Bandits and Defenses with Smoothed Responses. |
AISTATS |
2024 |
DBLP BibTeX RDF |
|
15 | Zhengli Zhai, Penghui Li, Shu Feng |
State of the art on adversarial attacks and defenses in graphs. |
Neural Comput. Appl. |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Hemant Rathore, Adarsh Nandanwar, Sanjay K. Sahay, Mohit Sewak |
Adversarial superiority in android malware detection: Lessons from reinforcement learning based evasion attacks and defenses. |
Forensic Sci. Int. Digit. Investig. |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Suzan Almutairi, Ahmed Barnawi |
Federated learning vulnerabilities, threats and defenses: A systematic review and future directions. |
Internet Things |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Haya Brama, Lihi Dery, Tal Grinshpoun |
Evaluation of neural networks defenses and attacks using NDCG and reciprocal rank metrics. |
Int. J. Inf. Sec. |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Xifeng Wang, Limin Sun, Chao Wang, Hongsong Zhu, Lian Zhao, Shujie Yang, Changqiao Xu |
Intelligent Connected Vehicle Security: Threats, Attacks and Defenses. |
J. Inf. Sci. Eng. |
2023 |
DBLP BibTeX RDF |
|
15 | Giorgio Di Tizio, Patrick Speicher, Milivoj Simeonovski, Michael Backes 0001, Ben Stock, Robert Künnemann |
Pareto-optimal Defenses for the Web Infrastructure: Theory and Practice. |
ACM Trans. Priv. Secur. |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Yaman Kumar 0001, Swapnil Parekh, Somesh Singh 0003, Junyi Jessy Li, Rajiv Ratn Shah, Changyou Chen |
Automatic Essay Scoring Systems Are Both Overstable And Oversensitive: Explaining Why And Proposing Defenses. |
Dialogue Discourse |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Yuxi Zhao, Xiaowen Gong, Fuhong Lin, Xu Chen 0004 |
Data Poisoning Attacks and Defenses in Dynamic Crowdsourcing With Online Data Quality Learning. |
IEEE Trans. Mob. Comput. |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Belal M. Amro, Saeed Salah, Mohammed Moreb |
A Comprehensive Architectural Framework of Moving Target Defenses Against DDoS Attacks. |
J. Cyber Secur. Mobil. |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Alexander Veicht, Cédric Renggli, Diogo Barradas |
DeepSE-WF: Unified Security Estimation for Website Fingerprinting Defenses. |
Proc. Priv. Enhancing Technol. |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Sandra Siby, Ludovic Barman, Christopher A. Wood, Marwan Fayed, Nick Sullivan, Carmela Troncoso |
Evaluating practical QUIC website fingerprinting defenses for the masses. |
Proc. Priv. Enhancing Technol. |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Arthur Mercier, Nikita Smolin, Oliver Sihlovec, Stefanos Koffas, Stjepan Picek |
Backdoor Pony: Evaluating backdoor attacks and defenses in different domains. |
SoftwareX |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Hanieh Naderi, Ivan V. Bajic |
Adversarial Attacks and Defenses on 3D Point Cloud Classification: A Survey. |
IEEE Access |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Peidong Liu, Longtao He, Zhoujun Li 0001 |
A Survey on Deep Learning for Website Fingerprinting Attacks and Defenses. |
IEEE Access |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Xin Yang 0019, Abla Smahi, Hui Li 0022, Ping Lu 0008, Huayu Zhang, Shuo-Yen Robert Li |
Triple methods-based empirical assessment of the effectiveness of adaptive cyber defenses in the cloud. |
J. Supercomput. |
2023 |
DBLP DOI BibTeX RDF |
|
15 | A. S. M. Rizvi, Jelena Mirkovic, John S. Heidemann, Wesley Hardaker, Robert Story |
Defending Root DNS Servers against DDoS Using Layered Defenses (Extended). |
Ad Hoc Networks |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Christopher W. Fletcher, Marco Guarnieri, David Kohlbrenner, Clémentine Maurice |
MAD: Microarchitectural Attacks and Defenses (Dagstuhl Seminar 23481). |
Dagstuhl Reports |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Izzat Alsmadi, Kashif Ahmad, Mahmoud Nazzal, Firoj Alam, Ala I. Al-Fuqaha, Abdallah Khreishah, Abdulelah Abdallah Algosaibi |
Adversarial NLP for Social Network Applications: Attacks, Defenses, and Research Directions. |
IEEE Trans. Comput. Soc. Syst. |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Johannes C. Pol, Paulina Kindermann, Mark G. van der Krogt, Vera M. van Bergeijk, Guido Remmerswaal, Willem Kanning, Sebastiaan N. Jonkman, Matthijs Kok |
The effect of interactions between failure mechanisms on the reliability of flood defenses. |
Reliab. Eng. Syst. Saf. |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Dezhang Kong, Yi Shen 0012, Xiang Chen, Qiumei Cheng, Hongyan Liu 0001, Dong Zhang, Xuan Liu 0006, Shuangxi Chen, Chunming Wu 0001 |
Combination Attacks and Defenses on SDN Topology Discovery. |
IEEE/ACM Trans. Netw. |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Charles Meyers, Tommy Löfstedt, Erik Elmroth |
Safety-critical computer vision: an empirical survey of adversarial evasion attacks and defenses on computer vision systems. |
Artif. Intell. Rev. |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Xiaoyu Zhang, Chao Chen 0015, Yi Xie 0002, Xiaofeng Chen 0001, Jun Zhang 0010, Yang Xiang 0001 |
A survey on privacy inference attacks and defenses in cloud-based Deep Neural Network. |
Comput. Stand. Interfaces |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Mohamed Amine Ferrag, Othmane Friha, Burak Kantarci, Norbert Tihanyi, Lucas C. Cordeiro, Mérouane Debbah, Djallel Hamouda, Muna Al-Hawawreh, Kim-Kwang Raymond Choo |
Edge Learning for 6G-Enabled Internet of Things: A Comprehensive Survey of Vulnerabilities, Datasets, and Defenses. |
IEEE Commun. Surv. Tutorials |
2023 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 1440 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|