unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
A Key-Driven Framework for Identity-Preserving Face Anonymization
The following papers from the summer cycle are currently accepted for NDSS Symposium 2025.Summe...
2024-10-2 11:48:40 | 阅读: 1 |
收藏
|
NDSS - www.ndss-symposium.org
security
analysis
software
machine
propose
Abstract:
The following papers from the summer cycle are currently accepted for NDSS Symposium 2025.Summe...
2024-10-2 11:48:40 | 阅读: 2 |
收藏
|
NDSS - www.ndss-symposium.org
security
analysis
software
machine
propose
Topics:
The following papers from the summer cycle are currently accepted for NDSS Symposium 2025.Summe...
2024-10-2 11:48:40 | 阅读: 2 |
收藏
|
NDSS - www.ndss-symposium.org
security
analysis
software
machine
propose
A Method to Facilitate Membership Inference Attacks in Deep Learning Models
The following papers from the summer cycle are currently accepted for NDSS Symposium 2025.Summe...
2024-10-2 11:48:40 | 阅读: 1 |
收藏
|
NDSS - www.ndss-symposium.org
security
analysis
software
machine
textit
Topic:
The following papers from the summer cycle are currently accepted for NDSS Symposium 2025.Summe...
2024-10-2 11:48:40 | 阅读: 3 |
收藏
|
NDSS - www.ndss-symposium.org
security
analysis
software
machine
propose
A Systematic Evaluation of Novel and Existing Cache Side Channels
The following papers from the summer cycle are currently accepted for NDSS Symposium 2025.Summe...
2024-10-2 11:48:40 | 阅读: 1 |
收藏
|
NDSS - www.ndss-symposium.org
security
analysis
software
machine
propose
AlphaDog: No-Box Camouflage Attacks via Alpha Channel Oversight
The following papers from the summer cycle are currently accepted for NDSS Symposium 2025.Summe...
2024-10-2 11:48:40 | 阅读: 4 |
收藏
|
NDSS - www.ndss-symposium.org
security
analysis
software
machine
propose
An Empirical Study on Fingerprint API Misuse with Lifecycle Analysis in Real-world Android Apps
The following papers from the summer cycle are currently accepted for NDSS Symposium 2025.Summe...
2024-10-2 11:48:40 | 阅读: 4 |
收藏
|
NDSS - www.ndss-symposium.org
security
analysis
software
machine
textit
Automated Expansion of Privacy Data Taxonomy for Compliant Data Breach Notification
The following papers from the summer cycle are currently accepted for NDSS Symposium 2025.Summe...
2024-10-2 11:48:40 | 阅读: 13 |
收藏
|
NDSS - www.ndss-symposium.org
security
analysis
software
machine
propose
CHAOS: Exploiting Station Time Synchronization in 802.11 Networks
The following papers from the summer cycle are currently accepted for NDSS Symposium 2025.Summe...
2024-10-2 11:48:40 | 阅读: 2 |
收藏
|
NDSS - www.ndss-symposium.org
security
analysis
software
machine
textit
Be Careful of What You Embed: Demystifying OLE Vulnerabilities
The following papers from the summer cycle are currently accepted for NDSS Symposium 2025.Summe...
2024-10-2 11:48:40 | 阅读: 9 |
收藏
|
NDSS - www.ndss-symposium.org
security
analysis
software
machine
textit
CLIBE: Detecting Dynamic Backdoors in Transformer-based NLP Models
The following papers from the summer cycle are currently accepted for NDSS Symposium 2025.Summe...
2024-10-2 11:48:40 | 阅读: 1 |
收藏
|
NDSS - www.ndss-symposium.org
security
analysis
software
machine
textit
Black-box Membership Inference Attacks against Fine-tuned Diffusion Models
The following papers from the summer cycle are currently accepted for NDSS Symposium 2025.Summe...
2024-10-2 11:48:40 | 阅读: 2 |
收藏
|
NDSS - www.ndss-symposium.org
security
analysis
software
machine
textit
Compiled Models, Built-In Exploits: Uncovering Pervasive Bit-Flip Attack Surfaces in DNN Executables
The following papers from the summer cycle are currently accepted for NDSS Symposium 2025.Summe...
2024-10-2 11:48:40 | 阅读: 2 |
收藏
|
NDSS - www.ndss-symposium.org
security
analysis
software
machine
textit
BULKHEAD: Secure, Scalable, and Efficient Kernel Compartmentalization with PKS
The following papers from the summer cycle are currently accepted for NDSS Symposium 2025.Summe...
2024-10-2 11:48:40 | 阅读: 3 |
收藏
|
NDSS - www.ndss-symposium.org
security
analysis
software
machine
textit
Cross-Origin Web Attacks via HTTP/2 Server Push and Signed HTTP Exchange
The following papers from the summer cycle are currently accepted for NDSS Symposium 2025.Summe...
2024-10-2 11:48:40 | 阅读: 8 |
收藏
|
NDSS - www.ndss-symposium.org
security
analysis
software
machine
propose
Careful About What App Promotion Ads Recommend! Detecting and Explaining Malware Promotion via App Promotion Graph
The following papers from the summer cycle are currently accepted for NDSS Symposium 2025.Summe...
2024-10-2 11:48:40 | 阅读: 4 |
收藏
|
NDSS - www.ndss-symposium.org
security
analysis
software
machine
propose
Cascading Spy Sheets: Exploiting the Complexity of Modern CSS for Email and Browser Fingerprinting
The following papers from the summer cycle are currently accepted for NDSS Symposium 2025.Summe...
2024-10-2 11:48:40 | 阅读: 0 |
收藏
|
NDSS - www.ndss-symposium.org
security
analysis
software
machine
textit
CENSOR: Defense Against Gradient Inversion via Orthogonal Subspace Bayesian Sampling
The following papers from the summer cycle are currently accepted for NDSS Symposium 2025.Summe...
2024-10-2 11:48:40 | 阅读: 0 |
收藏
|
NDSS - www.ndss-symposium.org
security
analysis
software
machine
propose
BumbleBee: Secure Two-party Inference Framework for Large Transformers
The following papers from the summer cycle are currently accepted for NDSS Symposium 2025.Summe...
2024-10-2 11:48:40 | 阅读: 0 |
收藏
|
NDSS - www.ndss-symposium.org
security
analysis
software
machine
propose
Previous
-46
-45
-44
-43
-42
-41
-40
-39
Next