Pixels Who Violate Our Privacy! Deep Learning for Identifying Images’ Key Pixels

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:European Symposium on Research in Computer Security (28. : 2023 : Den Haag) Computer security ; Part 2: CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AL, and SECAI
1. Verfasser: Veenker, Carmen (VerfasserIn)
Weitere Verfasser: Opdam, Danny (VerfasserIn), Alishahi, Mina (VerfasserIn)
Pages:2
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2024
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
TAURIN 2023 2024
ADIoT 2023 2024
An Opportunity-Based Approach to Information Security Risk 2024 Tran, Dinh Uy
Digital Twins in Healthcare: Security, Privacy, Trust and Safety Challenges 2024 Jørgensen, Cecilie Solberg
The VOCODES Kill Chain for Voice Controllable Devices 2024 Esposito, Sergio
Utilizing the Ensemble Learning and XAI for Performance Improvements in IoT Network Attack Detection 2024 Kalutharage, Chathuranga Sampath
Least Information Redundancy Algorithm of Printable Shellcode Encoding for X86 2024 Zhou, Yuanding
Enhancing Security Assurance in Software Development: AI-Based Vulnerable Code Detection with Static Analysis 2024 Rajapaksha, Sampath
ZeekFlow: Deep Learning-Based Network Intrusion Detection a Multimodal Approach 2024 Giagkos, Dimitrios
The Nonce-nce of Web Security: An Investigation of CSP Nonces Reuse 2024 Golinelli, Matteo
Privacy-Preserving Object Recognition with Explainability in Smart Systems 2024 Abbasi, Wisam
NASimEmu: Network Attack Simulator & Emulator for Training Agents Generalizing to Novel Scenarios 2024 Janisch, Jaromír
On the Use of AutoML for Combating Alert Fatigue in Security Operations Centers 2024 Preuveneers, Davy
SecAssure 2023 2024
CPS4CIP 2023 2024
Unravelling Network-Based Intrusion Detection: A Neutrosophic Rule Mining and Optimization Framework 2024 Dias, Tiago Fontes
IM-DISCO: Invariant Mining for Detecting IntrusionS in Critical Operations 2024 Saraiva, Guilherme
Labeling NIDS Rules with MITRE ATT &CK Techniques Using ChatGPT 2024 Daniel, Nir
DETONAR-Light: An IoT Network Intrusion Detection Using DETONAR without a Sniffer Network 2024 Bull, Victoria
SigIL: A Signature-Based Approach of Malware Detection on Intermediate Language 2024 Fortino, Giancarlo
Alle Artikel auflisten