NUK - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov NUK. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 527
1.
Celotno besedilo

PDF
2.
  • StackPi: New Packet Marking... StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense
    Yaar, A.; Perrig, A.; Dawn Song IEEE journal on selected areas in communications, 10/2006, Letnik: 24, Številka: 10
    Journal Article
    Recenzirano
    Odprti dostop

    Today's Internet hosts are threatened by large-scale distributed denial-of-service (DDoS) attacks. The path identification (Pi) DDoS defense scheme has recently been proposed as a deterministic ...
Celotno besedilo

PDF
3.
  • Robust Physical-World Attacks on Deep Learning Visual Classification
    Eykholt, Kevin; Evtimov, Ivan; Fernandes, Earlence ... 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 06/2018
    Conference Proceeding

    Recent studies show that the state-of-the-art deep neural networks (DNNs) are vulnerable to adversarial examples, resulting from small-magnitude perturbations added to the input. Given that that ...
Celotno besedilo
4.
  • Anomalous Example Detection... Anomalous Example Detection in Deep Learning: A Survey
    Bulusu, Saikiran; Kailkhura, Bhavya; Li, Bo ... IEEE access, 2020, Letnik: 8
    Journal Article
    Recenzirano
    Odprti dostop

    Deep Learning (DL) is vulnerable to out-of-distribution and adversarial examples resulting in incorrect outputs. To make DL more robust, several posthoc (or runtime) anomaly detection techniques to ...
Celotno besedilo

PDF
5.
  • Touchalytics: On the Applic... Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication
    Frank, M.; Biedert, R.; Ma, E. ... IEEE transactions on information forensics and security, 2013-Jan., 2013, 2013-1-00, 20130101, Letnik: 8, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    We investigate whether a classifier can continuously authenticate users based on the way they interact with the touchscreen of a smart phone. We propose a set of 30 behavioral touch features that can ...
Celotno besedilo

PDF
6.
Celotno besedilo

PDF
7.
  • FalconDB: Blockchain-based ... FalconDB: Blockchain-based Collaborative Database
    Peng, Yanqing; Du, Min; Li, Feifei ... Proceedings of the 2020 ACM SIGMOD International Conference on Management of Data, 06/2020
    Conference Proceeding
    Odprti dostop

    Nowadays an emerging class of applications are based oncollaboration over a shared database among different entities. However, the existing solutions on shared database may require trust on others, ...
Celotno besedilo

PDF
8.
  • Efficient task-specific dat... Efficient task-specific data valuation for nearest neighbor algorithms
    Jia, Ruoxi; Dao, David; Wang, Boxin ... Proceedings of the VLDB Endowment, 07/2019, Letnik: 12, Številka: 11
    Journal Article
    Recenzirano
    Odprti dostop

    Given a data set D containing millions of data points and a data consumer who is willing to pay for $ X to train a machine learning (ML) model over D , how should we distribute this $X to each data ...
Celotno besedilo

PDF
9.
  • A Symbolic Execution Framew... A Symbolic Execution Framework for JavaScript
    Saxena, Prateek; Akhawe, Devdatta; Hanna, Steve ... 2010 IEEE Symposium on Security and Privacy
    Conference Proceeding
    Odprti dostop

    As AJAX applications gain popularity, client-side JavaScript code is becoming increasingly complex. However, few automated vulnerability analysis tools for JavaScript exist. In this paper, we ...
Celotno besedilo

PDF
10.
  • NetworkProfiler: Towards au... NetworkProfiler: Towards automatic fingerprinting of Android apps
    Shuaifu Dai; Tongaonkar, Alok; Xiaoyin Wang ... 2013 Proceedings IEEE INFOCOM, 04/2013
    Conference Proceeding
    Odprti dostop

    Network operators need to have a clear visibility into the applications running in their network. This is critical for both security and network management. Recent years have seen an exponential ...
Celotno besedilo

PDF
1 2 3 4 5
zadetkov: 527

Nalaganje filtrov