KMS

浏览/检索结果: 共13条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
SFACIF: A safety function attack and anomaly industrial condition identified framework 期刊论文
COMPUTER NETWORKS, 2025, 卷号: 257
作者:  Liu, Kaixiang;  Xie, Yongfang
Adobe PDF(2049Kb)  |  收藏  |  浏览/下载:213/3  |  提交时间:2024/12/13
SecureSIS: Securing SIS Safety Functions with Safety Attributes and BPCS Information 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2025, 卷号: PP, 期号: 99, 页码: 3060-3073
作者:  Kaixiang Liu;  Yongfang Xie;  Shiwen Xie;  Yuqi Chen;  Xin Chen
Adobe PDF(1241Kb)  |  收藏  |  浏览/下载:44/1  |  提交时间:2025/03/10
Self-Supervised Machine Learning Framework for Online Container Security Attack Detection 期刊论文
ACM TRANSACTIONS ON AUTONOMOUS AND ADAPTIVE SYSTEMS, 2024, 卷号: 19, 期号: 3
作者:  Tunde-Onadele, Olufogorehan;  Lin, Yuhang;  Gu, Xiaohui;  He, Jingzhu;  Latapie, Hugo
Adobe PDF(22391Kb)  |  收藏  |  浏览/下载:238/3  |  提交时间:2024/10/25
MMJ-Bench: A Comprehensive Study on Jailbreak Attacks and Defenses for Vision Language Models 会议论文
2025 ASSOCIATION FOR THE ADVANCEMENT OF ARTIFICIAL INTELLIGENCE, Philadelphia, Pennsylvania, USA, February 25 – March 4, 2025
作者:  Weng, Fenghua;  Xu, Yue;  Fu, Chengyan;  Wang, Wenjie
Adobe PDF(818Kb)  |  收藏  |  浏览/下载:358/7  |  提交时间:2024/09/02
PowerGuard: Using Power Side-Channel Signals to Secure Motion Controllers in ICS 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 卷号: PP, 期号: 99, 页码: 1-1
作者:  Shijie Li;  Yuqi Chen;  Xin Chen;  Zedong Li;  Dongliang Fang
Adobe PDF(5822Kb)  |  收藏  |  浏览/下载:258/2  |  提交时间:2024/09/18
Detecting Cyber-Attacks Against Cyber-Physical Manufacturing System: A Machining Process Invariant Approach 期刊论文
IEEE INTERNET OF THINGS JOURNAL, 2024, 卷号: PP, 期号: 99, 页码: 1-1
作者:  Li, Zedong;  Chen, Xin;  Chen, Yuqi;  Li, Shijie;  Wang, Hangyu
Adobe PDF(4650Kb)  |  收藏  |  浏览/下载:1378/1  |  提交时间:2024/02/23
Attack as Detection: Using Adversarial Attack Methods to Detect Abnormal Examples 期刊论文
ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2023, 卷号: 33, 期号: 3
作者:  Zhao, Zhe
Adobe PDF(1098Kb)  |  收藏  |  浏览/下载:489/0  |  提交时间:2023/11/22
Black-Box Attack-Based Security Evaluation Framework for Credit Card Fraud Detection Models 期刊论文
INFORMS JOURNAL ON COMPUTING, 2023, 卷号: 35, 期号: 5, 页码: 986-1001
作者:  Xiao, Jin;  Tian, Yuhang;  Jia, Yanlin;  Jiang, Xiaoyi;  Yu, Lean
Adobe PDF(2140Kb)  |  收藏  |  浏览/下载:329/0  |  提交时间:2023/05/08
Control Logic Attack Detection and Forensics through Reverse-engineering and Verifying PLC Control Applications 期刊论文
IEEE INTERNET OF THINGS JOURNAL, 2023, 卷号: PP, 期号: 99, 页码: 1-1
作者:  Yangyang Geng;  Xin Che;  Rongkuan Ma;  Qiang Wei;  Mufeng Wang
Adobe PDF(2495Kb)  |  收藏  |  浏览/下载:319/0  |  提交时间:2023/10/07
DeJITLeak: eliminating JIT-induced timing side-channel leaks 会议论文
ESEC/FSE 2022 - PROCEEDINGS OF THE 30TH ACM JOINT MEETING EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING, Singapore, Singapore, November 14, 2022 - November 18, 2022
作者:  Qin, Qi;  Jiyang, JulianAndres;  Song, Fu;  Chen, Taolue;  Xing, Xinyu
Adobe PDF(574Kb)  |  收藏  |  浏览/下载:340/0  |  提交时间:2022/12/16
  • 首页
  • 上一页
  • 1
  • 2
  • 下一页
  • 末页