Preventing Adversarial Attacks Against Deep Learning-Based Intrusion Detection System

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:ISPEC (17. : 2022 : Taipeh) Information security practice and experience
1. Verfasser: Nguyen, Xuan-Ha (VerfasserIn)
Weitere Verfasser: Nguyen, Xuan-Duong (VerfasserIn), Le, Kim-Hung (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2022
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
A Traceable and Revocable Attribute-based Encryption Scheme Based on Policy Hiding in Smart Healthcare Scenarios 2022 Zhao, Yang
M-EDESE: Multi-Domain, Easily Deployable, and Efficiently Searchable Encryption 2022 Yuan, Jiaming
Attribute Based Tracing for Securing Group Signatures Against Centralized Authorities 2022 Perera, Maharage Nisansala Sevwandi
Differential Cryptanalysis of Salsa20 Based on Comprehensive Analysis of PNBs 2022 Ghafoori, Nasratullah
Anonymous Authentication Protocols in Vehicular Ad Hoc Network-An Survey 2022 Fu, Guiwen
Performance Evaluation of Post-Quantum TLS 1.3 on Resource-Constrained Embedded Systems 2022 Tasopoulos, George
Detection of Adversarial Examples Based on the Neurons Distribution 2022 Zeng, Jiang-Yi
BADPASS: Bots Taking ADvantage of Proxy as a Service 2022 Chiapponi, Elisa
Sparse Attack on Skeleton-Based Human Action Recognition for Internet of Video Things Systems 2022 Huang, Yinqin
A Low-Cost and Cloud Native Solution for Security Orchestration, Automation, and Response 2022 Christian, Juan
Protecting Cyber-Physical System Testbeds from Red-Teaming/Blue-Teaming Experiments Gone Awry 2022 Talukder, Md Rakibul Hasan
Continued Fractions Applied to a Family of RSA-like Cryptosystems 2022 Cotan, Paul
Practical Backdoor Attack Against Speaker Recognition System 2022 Luo, Yuxiao
A New Scalable Mutual Authentication in Fog-Edge Drone Swarm Environment 2022 Han, Kyusuk
Blockchain-Based Multi-keyword Search on Encrypted COVID-19 Contact Tracing Data 2022 Ng, Zheng Yao
Designing Enhanced Robust 6G Connection Strategy with Blockchain 2022 Thomsen, August Lykke
Blockchain-Based Confidential Payment System with Controllable Regulation 2022 Liao, Yu-Chen
Towards Blockchain-Enabled Intrusion Detection for Vehicular Navigation Map System 2022 Bodi, Bodi
Sherlock Holmes Zero-Knowledge Protocols 2022 Teşeleanu, George
A CNN-Based Semi-supervised Learning Approach for the Detection of SS7 Attacks 2022 Ermis, Orhan
Alle Artikel auflisten