unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
WIP: Towards a Certifiably Robust Defense for Multi-label Classifiers Against Adversarial Patches
Dennis Jacob, Chong Xiang, Prateek Mittal (Princeton Univ...
2024-2-9 09:30:42 | 阅读: 4 |
收藏
|
NDSS - www.ndss-symposium.org
chicago
security
cryptologic
shandong
ministry
Enhancing Security Event Detection on Twitter with Graph-based Tweet Embedding
Find the papers accepted for presentation at the upcoming Artificial Intelligence System with Confi...
2024-2-9 09:30:42 | 阅读: 7 |
收藏
|
NDSS - www.ndss-symposium.org
zhejiang
liu
adversarial
security
minnesota
Differentially Private Dataset Condensation
Find the papers accepted for presentation at the upcoming Artificial Intelligence System with Confi...
2024-2-9 09:30:42 | 阅读: 5 |
收藏
|
NDSS - www.ndss-symposium.org
zhejiang
liu
adversarial
security
imdea
Heterogeneous Graph Pre-training Based Model for Secure and Efficient Prediction of Default Risk Propagation among Bond Issuers
Find the papers accepted for presentation at the upcoming Artificial Intelligence System with Confi...
2024-2-9 09:30:42 | 阅读: 5 |
收藏
|
NDSS - www.ndss-symposium.org
zhejiang
liu
adversarial
security
Towards a Certifiably Robust Defense for Multi-label Classifiers Against Adversarial Patches
Find the papers accepted for presentation at the upcoming Artificial Intelligence System with Confi...
2024-2-9 09:30:42 | 阅读: 4 |
收藏
|
NDSS - www.ndss-symposium.org
zhejiang
liu
security
adversarial
shanghai
Auditing Artist Style Pirate in Text-to-image Generation Models
Find the papers accepted for presentation at the upcoming Artificial Intelligence System with Confi...
2024-2-9 09:30:42 | 阅读: 4 |
收藏
|
NDSS - www.ndss-symposium.org
zhejiang
liu
security
adversarial
sydney
Opinion Manipulation of Controversial Topics Based on Adversarial Ranking Attacks
Find the papers accepted for presentation at the upcoming Artificial Intelligence System with Confi...
2024-2-9 09:30:42 | 阅读: 4 |
收藏
|
NDSS - www.ndss-symposium.org
zhejiang
liu
security
adversarial
Strengthening Privacy in Robust Federated Learning through Secure Aggregation
Find the papers accepted for presentation at the upcoming Artificial Intelligence System with Confi...
2024-2-9 09:30:42 | 阅读: 5 |
收藏
|
NDSS - www.ndss-symposium.org
zhejiang
liu
security
adversarial
zheng
Aligning Confidential Computing with Cloud-native ML Platforms
Find the papers accepted for presentation at the upcoming Artificial Intelligence System with Confi...
2024-2-9 09:30:42 | 阅读: 2 |
收藏
|
NDSS - www.ndss-symposium.org
zhejiang
liu
adversarial
security
Aligning Confidential Computing with Cloud-native ML Platforms
Angelo Ruocco, Chris Porter, Claudio Carvalho, Daniele Bu...
2024-2-9 09:30:42 | 阅读: 5 |
收藏
|
NDSS - www.ndss-symposium.org
tsinghua
virginia
polytechnic
Benchmarking transferable adversarial attacks
Zhibo Jin (The University of Sydney), Jiayu Zhang (Suzhou...
2024-2-9 09:30:42 | 阅读: 7 |
收藏
|
NDSS - www.ndss-symposium.org
adversarial
singapore
software
bench
Differentially Private Dataset Condensation
Tianhang Zheng (University of Missouri-Kansas City), Baoc...
2024-2-9 09:30:42 | 阅读: 3 |
收藏
|
NDSS - www.ndss-symposium.org
southeast
luo
missouri
xinwen
lowell
Enhancing Security Event Detection on Twitter with Graph-based Tweet Embedding
Jian Cui (Indiana University Bloomington) Twitt...
2024-2-9 09:30:42 | 阅读: 3 |
收藏
|
NDSS - www.ndss-symposium.org
security
embeddings
tweets
embedding
novel
Exploring the Influence of Prompts in LLMs for Security-Related Tasks
Weiheng Bai (University of Minnesota), Qiushi Wu (IBM Res...
2024-2-9 09:30:42 | 阅读: 4 |
收藏
|
NDSS - www.ndss-symposium.org
security
lincoln
llms
virginia
polytechnic
Facilitating Threat Modeling by Leveraging Large Language Models
read file error: read notes: is a directory...
2024-2-9 09:30:42 | 阅读: 3 |
收藏
|
NDSS - www.ndss-symposium.org
modeling
llm
security
threats
darmstadt
Heterogeneous Graph Pre-training Based Model for Secure and Efficient Prediction of Default Risk Propagation among Bond Issuers
Xurui Li (Fudan University), Xin Shan (Bank of Shanghai),...
2024-2-9 09:30:42 | 阅读: 8 |
收藏
|
NDSS - www.ndss-symposium.org
nanyang
shanghai
xurui
ltd
Content Censorship in the InterPlanetary File System
The following papers are currently accepted for NDSS Symposium 2024. Stay tuned for the final versi...
2024-1-16 20:29:1 | 阅读: 15 |
收藏
|
NDSS - www.ndss-symposium.org
tsinghua
sciences
academy
security
zhejiang
Crafter: Facial Feature Crafting against Inversion-based Identity Theft on Deep Models
The following papers are currently accepted for NDSS Symposium 2024. Stay tuned for the final versi...
2024-1-16 20:29:1 | 阅读: 15 |
收藏
|
NDSS - www.ndss-symposium.org
tsinghua
sciences
academy
security
zhejiang
ReqsMiner: Automated Discovery of CDN Forwarding Request Inconsistencies and DoS Attacks with Grammar-based Fuzzing
The following papers are currently accepted for NDSS Symposium 2024. Stay tuned for the final versi...
2024-1-16 20:29:1 | 阅读: 7 |
收藏
|
NDSS - www.ndss-symposium.org
tsinghua
sciences
academy
security
zhejiang
File Hijacking Vulnerability: The Elephant in the Room
Chendong Yu (Institute of Information Engineering, Chinese Aca...
2024-1-16 20:29:1 | 阅读: 7 |
收藏
|
NDSS - www.ndss-symposium.org
sciences
academy
security
fhvulns
Previous
5
6
7
8
9
10
11
12
Next