知识中心主页
文献服务
文献资源
外文期刊
外文会议
专业机构
智能制造
高级检索
版权声明
使用帮助
会议文集
文集名
Computer Security. ESORICS 2024 International Workshops
会议名
29th European Symposium on Research in Computer Security (ESORICS 2024) Workshops: SECAI, DisA, CPS4CIP, and SecAssure
中译名
《第二十九届欧洲计算机安全研究专题研讨会 - 讨论会,卷2》
会议日期
September 16-20, 2024
会议地点
Bydgoszcz, Poland
出版年
2025
馆藏号
356556
题名
作者
出版年
Feasibility Study for Supporting Static Malware Analysis Using LLM
Shota Fujii; Rei Yamagishi
2025
PSY: Posterior Sampling Based Privacy Enhancer in Large Language Models
Yulian Sun; Li Duan; Yong Li
2025
Systematic Bug Reproduction with Large Language Model
Sanghyun Park; Haeun Lee; Sang Kil Cha
2025
BOTracle: A Framework for Discriminating Bots and Humans
Jan Kadel; August See; Ritwik Sinha; Mathias Fischer
2025
Deep Learning for Network Anomaly Detection Under Data Contamination: Evaluating Robustness and Mitigating Performance Degradation
D'Jeff K. Nkashama; Jordan F. Masakuna; Arian Soltani; Jean-Charles Verdier; Marc Frappier; Pierre-Martin Tardif; Froduald Kabanza
2025
On Intrinsic Cause and Defense of Adversarial Examples in Deep Neural Networks
Hajime Tasaki; Jinhui Chao
2025
Effects of Poisoning Attacks on Causal Deep Reinforcement Learning
Patrick Lodeweegs; Behrad Tajalli; Stjepan Picek
2025
Generating Traffic-Level Adversarial Examples from Feature-Level Specifications
Robert Flood; Marco Casadio; David Aspinall; Ekaterina Komendantskaya
2025
PhishCoder: Efficient Extraction of Contextual Information from Phishing Emails
Tarini Saka; Kami Vaniea; Nadin Kokciyan
2025
On the Robustness of Malware Detectors to Adversarial Samples
Muhammad Salman; Benjamin Zi Hao Zhao; Hassan Jameel Asghar; Muhammad Ikram; Sidharth Kaushik; Mohamed Ali Kaafar
2025
Towards AI-Based Identification of Publicly Known Vulnerabilities
Andres Vargas-Rivera; Herson Esquivel-Vargas
2025
Machine Learning-Based Secure Malware Detection Using Features from Binary Executable Headers
Irfan Bulut; Enrique Argones Rua
2025
Improving Adversarial Robustness in Android Malware Detection by Reducing the Impact of Spurious Correlations
Hamid Bostani; Zhengyu Zhao; Veelasha Moonsamy
2025
Multi-Objective Evolutionary Algorithm for Automatic Generation of Adversarial Metamorphic Malware
Kehinde O. Babaagba; Jordan Wylie; Mayowa Ayodele; Zhiyuan Tan
2025
A RAG-Based Question-Answering Solution for Cyber-Attack Investigation and Attribution
Sampath Rajapaksha; Ruby Rani; Erisa Karafili
2025
Recognition of Remakes and Fake Facial Images
Janusz Bobulski; Mariusz Kubanek
2025
A Novel Method of Improving Intrusion Detection Systems Robustness Against Adversarial Attacks, Through Feature Omission and a Committee of Classifiers
Marek Pawlicki; Federica Uccello; Salvatore D'Antonio; Rafal Kozik; Michal Choras
2025
Proposition of a Novel Type of Attacks Targetting Explainable AI Algorithms in Cybersecurity
Sebastian Szelest; Marek Pawlicki; Aleksandra Pawlicka; Rafal Kozik; Michal Choras
2025
Data Structures Towards the Recognition of Fake News and Disinformation Written in Polish
Mateusz Walczak; Aneta Poniszewska-Maranda
2025
Characterizing Prediction Model Responses to Attack Inputs: A Study with Time-Series Power Consumption Data
Srinidhi Madabhushi; Rinku Dewri
2025
1
2
制造业外文文献服务平台