共 50 条
- [42] Reconstruction of attacks against cryptographic protocols 18TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2005, : 140 - 154
- [45] Reconstruction Attacks in Template-Based ECG Biometric Recognition Systems IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (08): : 14971 - 14984
- [46] BadHash: Invisible Backdoor Attacks against Deep Hashing with Clean Label PROCEEDINGS OF THE 30TH ACM INTERNATIONAL CONFERENCE ON MULTIMEDIA, MM 2022, 2022,
- [47] Ensuring Secure Platooning of Constrained Intelligent and Connected Vehicles Against Byzantine Attacks: A Distributed MPC Framework ENGINEERING, 2024, 33 : 35 - 46
- [48] Resistance against general iterated attacks ADVANCES IN CRYPTOLOGY - EUROCRYPT'99, 1999, 1592 : 255 - 271
- [49] SECURE ESTIMATION AGAINST COMPLEX-VALUED ATTACKS 2016 IEEE STATISTICAL SIGNAL PROCESSING WORKSHOP (SSP), 2016,
- [50] A Secure Network Coding System Against Wiretap Attacks 2019 34RD YOUTH ACADEMIC ANNUAL CONFERENCE OF CHINESE ASSOCIATION OF AUTOMATION (YAC), 2019, : 62 - 67