网安顶刊IEEE Transactions on Dependable and Secure Computing

安全顶刊论文列表

  • 写在最前面
  • IEEE Transactions on Dependable and Secure Computing
    • Table of Contents(March-April 2023)Volume 20, Issue 2
    • Table of Contents(Sept.-Oct. 2023)Volume 20, Issue 5

写在最前面

为了给自己找论文方向,看了看安全的顶刊最近都发了哪些论文

不过后面找到了另一篇博客,感觉更有用hh
指路:
CSDN博主「riusksk」https://blog.csdn.net/riusksk/article/details/131278262
ChatGPT在计算机领域的翻译质量还是欠缺一些,翻译出来的中文有的不够自然,经常完全按照英文的表达方式来,导致中文特别长,很绕。GPT4的翻译效果相对ChatGPT效果要好,会长句变短句,表达顺序更符合中文逻辑,更自然。因此,本文主要用GPT4翻译,Claude对所有议题摘要进行长文总结。

之后直接看那位博主的整理啦

IEEE Transactions on Dependable and Secure Computing

在这里插入图片描述

Table of Contents(March-April 2023)Volume 20, Issue 2

战胜针对迁移学习的错误分类攻击
Defeating Misclassification Attacks Against Transfer Learningpp. 886-901
by Bang Wu, Shuo Wang, Xingliang Yuan, Cong Wang, Carsten Rudolph, Xiangwen Yang

用API Knowledgepp减缓基于学习的恶意软件检测器的老化
Slowing Down the Aging of Learning-Based Malware Detectors With API Knowledgepp. 902-916
by Xiaohan Zhang, Mi Zhang, Yuan Zhang, Ming Zhong, Xin Zhang, Yinzhi Cao, Min Yang

捕获无效输入操作以进行内存损坏诊断
Capturing Invalid Input Manipulations for Memory Corruption Diagnosispp. 917-930
by Lei Zhao, Keyang Jiang, Yuncong Zhu, Lina Wang, Jiang Ming

去中心化匿名支付中的法规遵从性和强制执行
Enabling Regulatory Compliance and Enforcement in Decentralized Anonymous Paymentpp. 931-943
by Liang Xue, Dongxiao Liu, Jianbing Ni, Xiaodong Lin, Xuemin Sherman Shen

安全隐私保护的智能车辆导航系统
A Security and Privacy Preserved Intelligent Vehicle Navigation Systempp. 944-959
by Barnana Baruah, Subhasish Dhal

个性化局部差分隐私保护回归模型
Protecting Regression Models With Personalized Local Differential Privacypp. 960-974
by Xiaoguang Li, Haonan Yan, Zelei Cheng, Wenhai Sun, Hui Li

你不能总是得到你想要的:android上用户控制的隐私。975-987
You Can’t Always Get What You Want: Towards User-Controlled Privacy on Androidpp. 975-987
by Davide Caputo, Francesco Pagano, Giovanni Bottino, Luca Verderame, Alessio Merlo

联邦学习聚合服务:一种高效、安全、更具弹性的实现
Aggregation Service for Federated Learning: An Efficient, Secure, and More Resilient Realizationpp. 988-1001
by Yifeng Zheng, Shangqi Lai, Yi Liu, Xingliang Yuan, Xun Yi, Cong Wang

VOLERE:基于个人语音挑战的抗泄漏用户认证协议
VOLERE: Leakage Resilient User Authentication Based on Personal Voice Challengespp. 1002-1016
by Rui Zhang, Zheng Yan, Xuerui Wang, Robert H. Deng

I Know Your Social Network Accounts:一种新颖的设备身份关联攻击架构
I Know Your Social Network Accounts: A Novel Attack Architecture for Device-Identity Associationpp. 1017-1030
by Yinhao Xiao, Yizhen Jia, Xiuzhen Cheng, Shengling Wang, Jian Mao, Zhenkai Liang

屏蔽:屏蔽运行有漏洞软件的有限资源物联网设备内的跨区域通信
ShieLD: Shielding Cross-Zone Communication Within Limited-Resourced IoT Devices Running Vulnerable Software Stackpp. 1031-1047
by Anum Khurshid, Sileshi Demesie Yalew, Mudassar Aslam, Shahid Raza

一种可解释的自动编码器:基于决策树的自动编码器及其在异常检测中的应用
Towards an Interpretable Autoencoder: A Decision-Tree-Based Autoencoder and its Application in Anomaly Detectionpp. 1048-1059
by Diana Laura Aguilar, Miguel Angel Medina-Pérez, Octavio Loyola-González, Kim-Kwang Raymond Choo, Edoardo Bucheli-Susarrey

CryptoMaze:链下支付的隐私保护拆分
CryptoMaze: Privacy-Preserving Splitting of Off-Chain Paymentspp. 1060-1073
by Subhra Mazumdar, Sushmita Ruj

STRisk:评估黑客入侵风险的社会技术方法
STRisk: A Socio-Technical Approach to Assess Hacking Breaches Riskpp. 1074-1087
by Hicham Hammouchi, Narjisse Nejjari, Ghita Mezzour, Mounir Ghogho, Houda Benbrahim

轻量级:用于嵌入式集成电子系统的轻量级认证
LIGHT: Lightweight Authentication for Intra Embedded Integrated Electronic Systemspp. 1088-1103
by Xuru Li, Daojing He, Yun Gao, Ximeng Liu, Sammy Chan, Manghan Pan, Kim-Kwang Raymond Choo

SparkAC:用于安全数据共享和分析的Spark细粒度访问控制
SparkAC: Fine-Grained Access Control in Spark for Secure Data Sharing and Analyticspp. 1104-1123
by Tao Xue, Yu Wen, Bo Luo, Gang Li, Yingjiu Li, Boyang Zhang, Yang Zheng, Yanfei Hu, Dan Meng

裸金属嵌入式设备内存破坏漏洞的发现与识别
Discovery and Identification of Memory Corruption Vulnerabilities on Bare-Metal Embedded Devicespp. 1124-1138
by Majid Salehi, Luca Degani, Marco Roveri, Danny Hughes, Bruno Crispo

网络入侵检测系统的对抗样本检测,1139-1153
MANDA: On Adversarial Example Detection for Network Intrusion Detection Systempp. 1139-1153
by Ning Wang, Yimin Chen, Yang Xiao, Yang Hu, Wenjing Lou, Y. Thomas Hou

抵御网络攻击的成本高效冗余规划
Redundancy Planning for Cost Efficient Resilience to Cyber Attackspp. 1154-1168
by Jukka Soikkeli, Giuliano Casale, Luis Muñoz-González, Emil C. Lupu

在线小额信贷欺诈代理检测:一个大规模的实证研究
Fraud-Agents Detection in Online Microfinance: A Large-Scale Empirical Studypp. 1169-1185
by Yiming Wu, Zhiyuan Xie, Shouling Ji, Zhenguang Liu, Xuhong Zhang, Changting Lin, Shuiguang Deng, Jun Zhou, Ting Wang, Raheem Beyah

通过语用理解和可视化进行网络信息检索
Cyber Information Retrieval Through Pragmatics Understanding and Visualizationpp. 1186-1199
by Nan Sun, Jun Zhang, Shang Gao, Leo Yu Zhang, Seyit Camtepe, Yang Xiang

16年的网络钓鱼用户研究:我们学到了什么?
Sixteen Years of Phishing User Studies: What Have We Learned?pp.1200 - 1212
by Shahryar Baki, Rakesh M. Verma

基于社交活动网络增强Sybil检测:随机游走方法
Enhancing Sybil Detection via Social-Activity Networks: A Random Walk Approachpp. 1213-1227
by Xiaoying Zhang, Hong Xie, Pei Yi, John C.S. Lui

PressPIN:通过结构传播Soundspp. 1228-1242在移动设备上启用安全的PIN身份验证
PressPIN: Enabling Secure PIN Authentication on Mobile Devices via Structure-Borne Soundspp. 1228-1242
by Man Zhou, Qian Wang, Xiu Lin, Yi Zhao, Peipei Jiang, Qi Li, Chao Shen, Cong Wang

基于多方计算的大规模恶意安全高效全基因组关联研究
Maliciously Secure and Efficient Large-Scale Genome-Wide Association Study With Multi-Party Computationpp. 1243-1257
by Caiqin Dong, Jian Weng, Jia-Nan Liu, Anjia Yang, Zhiquan Liu, Yaxi Yang, Jianfeng Ma

Stick:为社交网络平台量身定制的端到端加密协议
Stick: An End-to-End Encryption Protocol Tailored for Social Network Platformspp. 1258-1269
by Omar Basem, Abrar Ullah, Hani Ragab Hassen

情境敏感网络漏洞的最优分类和缓解方法研究
Towards Optimal Triage and Mitigation of Context-Sensitive Cyber Vulnerabilitiespp. 1270-1285
by Soumyadeep Hore, Fariha Moomtaheen, Ankit Shah, Xinming Ou

HIBEChain:面向大规模IoTpp的基于分层身份的区块链系统。
HIBEChain: A Hierarchical Identity-Based Blockchain System for Large-Scale IoTpp.1286 - 1301
by Zhiguo Wan, Wei Liu, Hui Cui

用于加密货币网络异常检测的轻量级标识符无关引擎
Lightweight and Identifier-Oblivious Engine for Cryptocurrency Networking Anomaly Detectionpp. 1302-1318
by Wenjun Fan, Hsiang-Jen Hong, Jinoh Kim, Simeon Wuthier, Makiya Nakashima, Xiaobo Zhou, Ching-Hua Chow, Sang-Yoon Chang

面向高效隐私保护的单云用户自定义Skyline查询
Towards Efficient and Privacy-Preserving User-Defined Skyline Query Over Single Cloudpp. 1319-1334
by Songnian

Table of Contents(Sept.-Oct. 2023)Volume 20, Issue 5

改进的分布式秘密共享协议
Improved Protocols for Distributed Secret Sharingpp. 3558-3571
by Roberto De Prisco, Alfredo De Santis, Francesco Palmieri

Go-Sharing:一种基于区块链的跨社交网络照片分享隐私保护框架
Go-Sharing: A Blockchain-Based Privacy-Preserving Framework for Cross-Social Network Photo Sharingpp. 3572-3587
by Ming Zhang, Zhe Sun, Hui Li, Ben Niu, Fenghua Li, Zixu Zhang, Yuhang Xie, Chunhao Zheng

基于密度聚类的密码猜测规则生成
Mangling Rules Generation With Density-Based Clustering for Password Guessingpp. 3588-3600
by Shunbin Li, Zhiyu Wang, Ruyun Zhang, Chunming Wu, Hanguang Luo

VOSA:面向隐私保护联邦学习的可验证不经意安全聚合
VOSA: Verifiable and Oblivious Secure Aggregation for Privacy-Preserving Federated Learningpp. 3601-3616
by Yong Wang, Aiqing Zhang, Shu Wu, Shui Yu

Smaug:一个tee辅助的安全SQLite嵌入式系统
Smaug: A TEE-Assisted Secured SQLite for Embedded Systemspp. 3617-3635
by Di Lu, Minqiang Shi, Xindi Ma, Ximeng Liu, Rui Guo, Tianfang Zheng, Yulong Shen, Xuewen Dong, Jianfeng Ma

ZeroProKeS:一种面向大规模低成本应用的安全零配置密钥建立协议
ZeroProKeS: A Secure Zeroconf Key Establishment Protocol for Large-Scale Low-Cost Applicationspp. 3636-3652
by Shahnewaz Karim Sakib, George T Amariucai, Yong Guan

你的标签正在出卖你:垂直联邦学习中的关系泄漏pp. 3653-3668
Your Labels are Selling You Out: Relation Leaks in Vertical Federated Learningpp. 3653-3668
by Pengyu Qiu, Xuhong Zhang, Shouling Ji, Tianyu Du, Yuwen Pu, Jun Zhou, Ting Wang

基于矩阵的加密图像可逆信息隐藏秘密共享算法
Matrix-Based Secret Sharing for Reversible Data Hiding in Encrypted Imagespp. 3669-3686
by Zhongyun Hua, Yanxiang Wang, Shuang Yi, Yifeng Zheng, Xingyu Liu, Yongyong Chen, Xinpeng Zhang

为硬件安全探索手写签名图像特征ypp. 3687-3698
Exploring Handwritten Signature Image Features for Hardware Securitypp. 3687-3698
by Mahendra Rathor, Anirban Sengupta, Rahul Chaurasia, Aditya Anshul

逃离共识:即时修订的区块链协议在无权限设置pp. 3699-3715
Escaping From Consensus: Instantly Redactable Blockchain Protocols in Permissionless Settingpp. 3699-3715
by Xinyu Li, Jing Xu, Lingyuan Yin, Yuan Lu, Qiang Tang, Zhenfeng Zhang

隐式锤:通过隐式访问跨权限边界的Rowhammer
Implicit Hammer: Cross-Privilege-Boundary Rowhammer Through Implicit Accessespp. 3716-3733
by Zhi Zhang, Wei He, Yueqiang Cheng, Wenhao Wang, Yansong Gao, Dongxi Liu, Kang Li, Surya Nepal, Anmin Fu, Yi Zou

Snoopy:面向大规模监控epp的有限查询网页指纹框架。
Snoopy: A Webpage Fingerprinting Framework With Finite Query Model for Mass-Surveillancepp.3734 - 3752
by Gargi Mitra, Prasanna Karthik Vairam, Sandip Saha, Nitin Chandrachoodan, V. Kamakoti

减轻针对钓鱼检测器3753-3769的对抗灰盒攻击
Mitigating Adversarial Gray-Box Attacks Against Phishing Detectorspp. 3753-3769
by Giovanni Apruzzese, V. S. Subrahmanian

面向加密数据的高效隐私保护空间关键词相似性查询
Efficient and Privacy-Preserving Spatial Keyword Similarity Query Over Encrypted Datapp. 3770-3786
by Songnian Zhang, Suprio Ray, Rongxing Lu, Yunguo Guan, Yandong Zheng, Jun Shao

基于深度生成模型的可复制隐写
Cover Reproducible Steganography via Deep Generative Modelspp. 3787-3798
by Kejiang Chen, Hang Zhou, Yaofei Wang, Menghan Li, Weiming Zhang, Nenghai Yu

通过Logits分布对深度学习模型的成员推断攻击
Membership Inference Attacks Against Deep Learning Models via Logits Distributionpp. 3799-3808
by Hongyang Yan, Shuhao Li, Yajie Wang, Yaoyuan Zhang, Kashif Sharif, Haibo Hu, Yuanzhang Li

MRSA: 5G HetNetspp中高效安全切换认证的掩码随机阵列协议。
MRSA: Mask Random Array Protocol for Efficient Secure Handover Authentication in 5G HetNetspp.3809 - 3827
by Yibing Liu, Lijun Huo, Jun Wu, Mohsen Guizani

基于向量置换和移位排序的可撤销指纹模板构造。
Cancelable Fingerprint Template Construction Using Vector Permutation and Shift-Orderingpp.3828 - 3844
by Sani M. Abdullahi, Ke Lv, Shuifa Sun, Hongxia Wang

通过硬件木马感染的同步泄露无线芯片
Leaking Wireless ICs via Hardware Trojan-Infected Synchronizationpp. 3845-3859
by Alán Rodrigo Díaz-Rizo, Hassan Aboushady, Haralampos-G.Stratigopoulos

增强隐私的证书透明度3860-3872
Certificate Transparency With Enhanced Privacypp. 3860-3872
by Hyunsoo Kwon, Sangtae Lee, Minjae Kim, Changhee Hahn, Junbeom Hur

基于认证矩阵提交的高效可验证无界大小数据库3873-3889
Efficient Verifiable Unbounded-Size Database From Authenticated Matrix Commitmentpp. 3873-3889
by Haining Yang, Dengguo Feng, Jing Qin

互联网规模的指纹识别在网络空间重用和重命名物联网设备
Internet-Scale Fingerprinting the Reusing and Rebranding IoT Devices in the Cyberspacepp. 3890-3909
by Zhaoteng Yan, Zhi Li, Hong Li, Shouguo Yang, Hongsong Zhu, Limin Sun

差分私有分布频率估计
Differentially Private Distributed Frequency Estimationpp. 3910-3926
by Mengmeng Yang, Ivan Tjuawinata, Kwok-Yan Lam, Tianqing Zhu, Jun Zhao

差分隐私化频率分布中同质性攻击的泄露风险
Disclosure Risk From Homogeneity Attack in Differentially Privately Sanitized Frequency Distributionpp. 3927-3939
by Fang Liu, Xingyuan Zhao

一种面向智能电网的隐私保护状态估计方案3940-3956
A Privacy-Preserving State Estimation Scheme for Smart Gridspp. 3940-3956
by Hong-Yen Tran, Jiankun Hu, Hemanshu R. Pota

使用数据起源和度量学习的高级持续性威胁检测
Advanced Persistent Threat Detection Using Data Provenance and Metric Learningpp. 3957-3969
by Khandakar Ashrafi Akbar, Yigong Wang, Gbadebo Ayoade, Yang Gao, Anoop Singhal, Latifur Khan, Bhavani Thuraisingham, Kangkook Jee

说话人识别中音频对抗样本的理解和缓解研究
Towards Understanding and Mitigating Audio Adversarial Examples for Speaker Recognitionpp. 3970-3987
by Guangke Chen, Zhe Zhao, Fu Song, Sen Chen, Lingling Fan, Feng Wang, Jiashui Wang

基于安全电子医疗系统3988-4001敏感数据集的决策树评估
Decision Tree Evaluation on Sensitive Datasets for Secure e-Healthcare Systemspp. 3988-4001
by Mingwu Zhang, Yu Chen, Willy Susilo

边缘异常点的发现:基于异常值暴露的跨竖井联邦学习的DDoS检测pp. 4002-4015
Spotting Anomalies at the Edge: Outlier Exposure-Based Cross-Silo Federated Learning for DDoS Detectionpp. 4002-4015
by Vahid Pourahmadi, Hyame Assem Alameddine, Mohammad Ali Salahuddin, Raouf Boutaba

基于恒Q谱草图和GA-SVMpp的音频复制粘贴篡改检测。
Robust Audio Copy-Move Forgery Detection Using Constant Q Spectral Sketches and GA-SVMpp.4016 - 4031
4016-4031
by Zhaopin Su, Mengke Li, Guofu Zhang, Qinfang Wu, Miqing Li, Weiming Zhang, Xin Yao

Sm中混合的安全访问控制方法(ABAC和RBAC)
Hybrid Approaches (ABAC and RBAC) Toward Secure Access Control in Sm
by Safwa Ameer, James Benson, Ravi Sandhu

ESMAC:基于TEE的多级数据处理高效安全的多用户访问控制
ESMAC: Efficient and Secure Multi-Owner Access Control With TEE in Multi-Level Data Processingpp. 4052-4069
by Dan Liu, Zheng Yan, Wenxiu Ding, Yuxuan Cai, Yaxing Chen, Zhiguo Wan

ADCaDeM:一种基于差分流形的攻击损伤计算新方法4070-4084
ADCaDeM: A Novel Method of Calculating Attack Damage Based on Differential Manifoldspp. 4070-4084
by Zhen Liu, ChangZhen Hu, Chun Shan, Zheng Yan

通用且敏感的网络时间隐蔽信道异常检测方法
Generic and Sensitive Anomaly Detection of Network Covert Timing Channelspp. 4085-4100
by Haozhi Li, Tian Song, Yating Yang

亚线性圆复杂度的差分不经意两方模式匹配ypp. 4101-4117
Differentially Oblivious Two-Party Pattern Matching With Sublinear Round Complexitypp. 4101-4117
by Pengfei Wu, Jianting Ning, Xinyi Huang, Joseph K. Liu

生成隐写的秘密到图像可逆变换
Secret-to-Image Reversible Transformation for Generative Steganographypp. 4118-4134
by Zhili Zhou, Yuecheng Su, Jin Li, Keping Yu, Q. M. Jonathan Wu, Zhangjie Fu, Yunqing Shi

我仍然知道你去年夏天做了什么:通过流量分析推断敏感用户在消息传递应用程序上的活动
I Still Know What You Did Last Summer: Inferring Sensitive User Activities on Messaging Applications Through Traffic Analysispp. 4135-4153
by Ardavan Bozorgi, Alireza Bahramali, Fateme Rezaei, Amirhossein Ghafari, Amir Houmansadr, Ramin Soltani, Dennis Goeckel, Don Towsley

使用Quorum证书增强区块链挖掘透明度
Crystal: Enhancing Blockchain Mining Transparency With Quorum Certificatepp. 4154-4168
by Jianyu Niu, Fangyu Gai, Runchao Han, Ren Zhang, Yinqian Zhang, Chen Feng

量化攻击树分析的高效通用算法
Efficient and Generic Algorithms for Quantitative Attack Tree Analysispp. 4169-4187
by Milan Lopuhaä-Zwakenberg, Carlos E. Budde, Mariëlle Stoelinga

MARNet:针对协作多智能体强化学习的后门攻击
MARNet: Backdoor Attacks Against Cooperative Multi-Agent Reinforcement Learningpp. 4188-4198
by Yanjiao Chen, Zhicong Zheng, Xueluan Gong

基于分层分组变长编码的云安全可逆数据隐藏算法
Reversible Data Hiding With Hierarchical Block Variable Length Coding for Cloud Securitypp. 4199-4213
by Shuying Xu, Ji-Hwei Horng, Ching-Chun Chang, Chin-Chen Chang

Cure-GNN:抗对抗攻击的鲁棒曲率增强图神经网络4214-4229
Cure-GNN: A Robust Curvature-Enhanced Graph Neural Network Against Adversarial Attackspp. 4214-4229
by Yang Xiao, Zhuolin Xing, Alex X. Liu, Lei Bai, Qingqi Pei, Lina Yao

建立安全联邦学习互信的多洗牌器框架pp. 4230-4244
A Multi-Shuffler Framework to Establish Mutual Confidence for Secure Federated Learningpp. 4230-4244
by Zan Zhou, Changqiao Xu, Mingze Wang, Xiaohui Kuang, Yirong Zhuang, Shui Yu

云环境下实现高效的隐私保护神经网络训练与预测
Achieving Efficient and Privacy-Preserving Neural Network Training and Prediction in Cloud Environmentspp. 4245-4257
by Chuan Zhang, Chenfei Hu, Tong Wu, Liehuang Zhu, Ximeng Liu

PolyCosGraph:一种隐私保护的可撤销脑电生物识别系统
PolyCosGraph: A Privacy-Preserving Cancelable EEG Biometric Systempp. 4258-4272
by Min Wang, Song Wang, Jiankun Hu

面向多域协同防御的网络威胁情报共享
Cyber Threat Intelligence Sharing for Co-Operative Defense in Multi-Domain Entitiespp. 4273-4290
by Soumya Purohit, Roshan Neupane, Naga Ramya Bhamidipati, Varsha Vakkavanthula, Songjie Wang, Matthew Rockey, Prasad Calyam

FIDO得到验证:通用认证框架协议4291-4310的形式化分析
FIDO Gets Verified: A Formal Analysis of the Universal Authentication Framework Protocolpp. 4291-4310
by Haonan Feng, Jingjing Guan, Hui Li, Xuesong Pan, Ziming Zhao

SofitMix:一个安全的链下支持比特币兼容的混合协议
SofitMix: A Secure Offchain-Supported Bitcoin-Compatible Mixing Protocolpp. 4311-4324
by Haomeng Xie, Shufan Fei, Zheng Yan, Yang Xiao

基于区块链的资源受限物联网设备公平云审计
Fair Cloud Auditing Based on Blockchain for Resource-Constrained IoT Devicespp. 4325-4342
by Lei Zhou, Anmin Fu, Guomin Yang, Yansong Gao, Shui Yu, Robert H. Deng

PEBA:增强用户隐私保护及安全浏览服务覆盖
PEBA: Enhancing User Privacy and Coverage of Safe Browsing Servicespp. 4343-4358
by Yuefeng Du, Huayi Duan, Lei Xu, Helei Cui, Cong Wang, Qian Wang

SlimBox:轻量级加密流量包检测
SlimBox: Lightweight Packet Inspection over Encrypted Trafficpp. 4359-4371
by Qin Liu, Yu Peng, Hongbo Jiang, Jie Wu, Tian Wang, Tao Peng, Guojun Wang

一种面向区块链扩展的分布式隐私感知高通量交易调度方法
A Distributed and Privacy-Aware High-Throughput Transaction Scheduling Approach for Scaling Blockchainpp. 4372-4386
by Xiaoyu Qiu, Wuhui Chen, Bingxin Tang, Junyuan Liang, Hong-Ning Dai, Zibin Zheng

PRkNN:面向加密数据的高效隐私保护反向kNN查询
PRkNN: Efficient and Privacy-Preserving Reverse kNN Query Over Encrypted Datapp. 4387-4402
by Yandong Zheng, Rongxing Lu, Songnian Zhang, Yunguo Guan, Fengwei Wang, Jun Shao, Hui Zhu

一种智能系统的混合威胁模型
A Hybrid Threat Model for Smart Systemspp. 4403-4417
by Fulvio Valenza, Erisa Karafili, Rodrigo Vieira Steiner, Emil C. Lupu

Hercules:提高隐私保护联邦学习的性能
Hercules: Boosting the Performance of Privacy-Preserving Federated Learningpp. 4418-4433
by Guowen Xu, Xingshuo Han, Shengmin Xu, Tianwei Zhang, Hongwei Li, Xinyi Huang, Robert H. Deng

计数型布隆过滤器在黑盒攻击下的隐私保护研究
On the Privacy of Counting Bloom Filters Under a Black-Box Attackerpp. 4434-4440
by Sergio Galán, Pedro Reviriego, Stefan Walzer, Alfonso Sánchez-Macian, Shanshan Liu, Fabrizio Lombardi

基于格的多级秘密共享方案的安全性研究
On the Security of a Lattice-Based Multi-Stage Secret Sharing Schemepp. 4441-4442
by Zhichao Yang, Debiao He, Longjiang Qu, Jianqiao Xu

本文来自互联网用户投稿,该文观点仅代表作者本人,不代表本站立场。本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如若转载,请注明出处:http://www.mzph.cn/news/110644.shtml

如若内容造成侵权/违法违规/事实不符,请联系多彩编程网进行投诉反馈email:809451989@qq.com,一经查实,立即删除!

相关文章

2023_Spark_实验十九:SparkStreaming入门案例

SparkStreaming入门案例 一、准备工作 二、任务分析 三、官网案例 四、开发NetWordCount 一、准备工作 实验环境:netcat 安装nc:yum install -y nc 二、任务分析 将nc作为服务器端,用户产生数据;启动sparkstreaming案例中的客户端…

NIO IN:技术蔚来的首次「大阅兵」

宝山,上海第一钢铁厂旧址。 上周,蔚来在这里点亮金色炉台,2500 立方米高炉,浓重的工业气质与古典凝重的光影交织,蔚来 NIO IN 用科技的进步呼应那个火红的年代。 这是蔚来第一次开科技发布会,为了全方位展…

通过内网穿透快速搭建公网可访问的Spring Boot接口调试环境

🔥博客主页: 小羊失眠啦 🔖系列专栏: C语言 、Cpolar、Linux ❤️感谢大家点赞👍收藏⭐评论✍️ 文章目录 前言1. 本地环境搭建1.1 环境参数1.2 搭建springboot服务项目 2. 内网穿透2.1 安装配置cpolar内网穿透2.1.1 …

通讯协议学习之路:RS485协议理论

通讯协议之路主要分为两部分,第一部分从理论上面讲解各类协议的通讯原理以及通讯格式,第二部分从具体运用上讲解各类通讯协议的具体应用方法。 后续文章会同时发表在个人博客(jason1016.club)、CSDN;视频会发布在bilibili(UID:399951374) 序&…

HTTP 协议的基本格式(部分)

要想了解HTTP,得先知道什么是HTTP,那么HTTP是什么呢?HTTP (全称为 "超文本传输协议") 是一种应用非常广泛的 应用层协议。那什么是超文本呢?那就是除了文本,还有图片,声音,视频等。 …

『C++成长记』C++入门——命名空间缺省参数

🔥博客主页:小王又困了 📚系列专栏:C 🌟人之为学,不日近则日退 ❤️感谢大家点赞👍收藏⭐评论✍️ 目录 一、C的认识 📒1.1什么是C 📒1.2C的发展 二、C关键字 三…

论文阅读之《Kindling the Darkness: A Practical Low-light Image Enhancer》

目录 摘要 介绍 已有方法回顾 普通方法 基于亮度的方法 基于深度学习的方法 基于图像去噪的方法 提出的方法 2.1 Layer Decomposition Net 2.2 Reflectance Restoration Net 2.3 Illumination Adjustment Net 实验结果 总结 Kindling the Darkness: A Practical L…

轮转数组------题解报告

题目:力扣(LeetCode)官网 - 全球极客挚爱的技术成长平台 题解: 如果直接暴力双循环会时间超限,所以我选择了一个空间复杂度比较高的方法。直接再创建一个数组,然后对应位置替换,最后把值赋给原…

Spring framework Day24:定时任务

前言 在我们的日常生活和工作中,时间管理是一项至关重要的技能。随着各种复杂任务的增加和时间压力的不断增加,如何更好地分配和利用时间成为了一项迫切需要解决的问题。在这样的背景下,定时任务成为了一种非常有效的解决方案。 定时任务&a…

Kubernetes技术与架构-服务

从软件系统架构设计分层的角度看,Kubernetes的Service是基于Pod的上层,业务应用部署在Pod中,使用Service绑定Pod部署的应用,Service可以对外或者对上层提供服务,当Pod集群在系统调度的过程中发生弹性伸缩的时候&#x…

Python中的With ...as... 作用

Python中的with … as …作用: 1、通过with语句可以得到一个上下文管理器 2、执行对象 3、加载__enter__方法 4、加载__exit__方法 5、执行__enter__方法 6、as 可以得到enter的返回值 7、拿到对象执行相关操作 8、执行完了之后调用__exit__方法 9、如果遇到异常&a…

1024程序员节特辑 | ELK+ 用户画像构建个性化推荐引擎,智能实现“千人千面”

专栏集锦,赶紧收藏以备不时之需 Spring Cloud实战专栏:https://blog.csdn.net/superdangbo/category_9270827.html Python 实战专栏:https://blog.csdn.net/superdangbo/category_9271194.html Logback 详解专栏:https://blog.…

易点易动上线招标管理模块:提升企业高效招标管理的解决方案

在当今竞争激烈的商业环境下,招标管理对于企业的成功至关重要。为了帮助企业实现高效的招标管理,易点易动固定资产管理系统上线了全新的招标管理模块。该模块涵盖了供应商资质审核、采购询价单、重新报价单、招标结果单、招标作废单等功能,为…

10月份stable diffusion animatediff等插件使用指南,又来更新了

插件一直会更新,包含了基本市面上流行的90%插件,好用的插件更是不会错过,往期插件请看往期文章,如果你没有时间一直关注sd更新的进展,请关注我,一个月用几个小时看一下我的文章,最短时间跟进sd。…

【微服务】spring webflux响应式编程使用详解

目录 一、webflux介绍 1.1 什么是webflux 1.2 什么是响应式编程 1.3 webflux特点 二、Java9中响应式编程 2.1 定义事件流源 2.2 实现订阅者 三、Spring Webflux介绍 四、Reactor 介绍 五、Reactor 常用API操作 5.1 Flux 创建流操作API 5.2 Flux响应流的订阅 5.3 Fl…

Mybatis对数据库进行增删查改以及单元测试

这篇写的草率了,是好几天前学到,以后用来自己复习 UserInfo import lombok.Data;Data public class UserInfo {private int id;private String name;private int age;private String email;//LocalDateTime可用于接收 时间}Mapper UserMapper pack…

2023年中国多功能折叠刀产量、销量及市场规模分析[图]

多功能折叠刀是一种集多种功能于一身的刀具,通常包括切割、开瓶、剥皮、锯木等功能,可以通过折叠和展开的方式来实现不同的功能,具有便携、多用途、安全等特点,广泛应用于户外探险、露营、自驾旅行等场景。 多功能折叠刀行业分类…

Simian使用方法

1.下载 链接1:官网下载 链接2:压缩包 2.操作 1.双击exe启动 2.打开控制台,winR 输入cmd 3.输入操作语句 G:\1111\simian-2.5.10\bin\simian-2.5.10.exe -includes"G:\1111\test\*.cpp" -threshold3 > output.txt G:\1111\si…

利用TypeScript 和 jsdom 库实现自动化抓取数据

以下是一个使用 TypeScript 和 jsdom 库的下载器程序,用于下载zhihu的内容。此程序使用了 duoip.cn/get_proxy 这段代码。 import { JSDOM } from jsdom; import { getProxy } from https://www.duoip.cn/get_proxy;const zhihuUrl https://www.zhihu.com;(async (…

璞华科技再次赋能,助力成都市温江区“码”上维权不烦“薪” !

科技赋能护“薪”行动 “码”上维权不烦“薪” 为保障劳动者工资收入的合法权益,提升人社部门智能化咨询服务能力,2023年10月17日,成都市温江区人力资源和社会保障局发布“码上护薪”小程序,助力劳动者“码”上维权不烦”薪”。…