共 50 条
- [31] Countering targeted file attacks using LocationGuard USENIX Association Proceedings of the 14th USENIX Security Symposium, 2005, : 81 - 96
- [32] TransMIA: Membership Inference Attacks Using Transfer Shadow Training 2021 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2021,
- [33] Improved Self Adaptive Honeypots Capable of Detecting Rootkit Malware 2012 9TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2012, : 281 - 284
- [36] Shadow detecting and shadow interpolation algorithm for InSAS ADVANCED DESIGNS AND RESEARCHES FOR MANUFACTURING, PTS 1-3, 2013, 605-607 : 2121 - +
- [37] Shadow Attacks on MEDA Biochips 2018 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD) DIGEST OF TECHNICAL PAPERS, 2018,
- [38] Detecting VoIP Fuzzing Attacks By Using a Honeypot System 2017 25TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2017,
- [39] Detecting Medley of Iris Spoofing Attacks using DESIST 2016 IEEE 8TH INTERNATIONAL CONFERENCE ON BIOMETRICS THEORY, APPLICATIONS AND SYSTEMS (BTAS), 2016,