Detection of Hardware-Assisted Virtualization Based on Low-Level Feature | 0 | 0.34 | 2022 |
SP Attack: Single-Perspective Attack for Generating Adversarial Omnidirectional Images. | 0 | 0.34 | 2022 |
A Byte-level Autoencoder-based Method to Detect Malicious Open Resolver | 0 | 0.34 | 2022 |
Dual-Channel Convolution Network With Image-Based Global Learning Framework for Hyperspectral Image Classification | 1 | 0.35 | 2022 |
RAPMiner: A Generic Anomaly Localization Mechanism for CDN System with Multi-dimensional KPIs | 0 | 0.34 | 2022 |
360-Attack: Distortion-Aware Perturbations from Perspective-Views | 0 | 0.34 | 2022 |
Job Completion Time Under Migration-Based Dynamic Platform Technique | 0 | 0.34 | 2022 |
Output Security for Multi-user Augmented Reality using Federated Reinforcement Learning | 0 | 0.34 | 2021 |
360-Degree VR Video Watermarking Based on Spherical Wavelet Transform | 0 | 0.34 | 2021 |
Empowering Adaptive Early-Exit Inference With Latency Awareness | 0 | 0.34 | 2021 |
Improved Face Detector on Fisheye Images via Spherical-Domain Attention | 0 | 0.34 | 2021 |
DyDom: Detecting Malicious Domains with Spatial-Temporal Analysis on Dynamic Graphs | 0 | 0.34 | 2021 |
Commercial hypervisor-based task sandboxing mechanisms are unsecured? But we can fix it! | 0 | 0.34 | 2021 |
QuickCDC: A Quick Content Defined Chunking Algorithm Based on Jumping and Dynamically Adjusting Mask Bits | 0 | 0.34 | 2021 |
SDFVAE: Static and Dynamic Factorized VAE for Anomaly Detection of Multivariate CDN KPIs | 6 | 0.43 | 2021 |
Secure and Efficient Allocation of Virtual Machines in Cloud Data Center | 0 | 0.34 | 2021 |
A Novel Trojan Attack against Co-learning Based ASR DNN System | 0 | 0.34 | 2021 |
Security Analysis of DNS Open Resolvers by Continuous and Ambulatory Detection | 0 | 0.34 | 2021 |
A novel network traffic classification approach via discriminative feature learning | 0 | 0.34 | 2020 |
SiegeCannon: Detecting Malicious Infrastructures by Analyzing Integral Characteristics of Involved Server Flocks | 0 | 0.34 | 2020 |
An enhanced saturation attack and its mitigation mechanism in software-defined networking. | 1 | 0.35 | 2020 |
A Feedback Mechanism For Prediction-Based Anomaly Detection In Content Delivery Networks | 0 | 0.34 | 2020 |
End-Edge Coordinated Inference For Real-Time Byod Malware Detection Using Deep Learning | 0 | 0.34 | 2020 |
A Machine Learning-Assisted Compartmentalization Scheme for Bare-Metal Systems. | 0 | 0.34 | 2020 |
Comments On "Dropping Activation Outputs With Localized First-Layer Deep Network For Enhancing User Privacy And Data Security" | 0 | 0.34 | 2020 |
ConfigRand - A Moving Target Defense Framework against the Shared Kernel Information Leakages for Container-based Cloud. | 0 | 0.34 | 2020 |
ConnSpoiler: Disrupting C&C Communication of IoT-Based Botnet Through Fast Detection of Anomalous Domain Queries. | 2 | 0.38 | 2020 |
Automated Honeynet Deployment Strategy for Active Defense in Container-based Cloud | 0 | 0.34 | 2020 |
A Multivariate Time Series Prediction Schema Based On Multi-Attention In Recurrent Neural Network | 0 | 0.34 | 2020 |
Prihook: Differentiated Context-Aware Hook Placement for Different Owners' Smartphones | 0 | 0.34 | 2020 |
LAPE: A Lightweight Attestation of Program Execution Scheme for Bare-Metal Systems | 0 | 0.34 | 2020 |
A Novel Polarimetric SAR Classification Method Integrating Pixel-Based and Patch-Based Classification | 2 | 0.36 | 2020 |
Adaptive SDN Master Controller Assignment for Maximizing Network Throughput | 0 | 0.34 | 2019 |
Minimizing Multi-Controller Deployment Cost in Software-Defined Networking | 0 | 0.34 | 2019 |
SwiftFabric: Optimizing Fabric Private Data Transaction Flow TPS | 0 | 0.34 | 2019 |
An Effective Table-Overflow Attack and Defense in Software-Defined Networking | 0 | 0.34 | 2019 |
A Secure Container Deployment Strategy by Genetic Algorithm to Defend against Co-Resident Attacks in Cloud Computing. | 0 | 0.34 | 2019 |
Towards Scalable and Flexible Path Control Schema in Software Defined Networking | 0 | 0.34 | 2019 |
Using memory propagation tree to improve performance of protocol fuzzer when testing ICS. | 1 | 0.35 | 2019 |
Prototype-Based Malware Traffic Classification With Novelty Detection | 0 | 0.34 | 2019 |
T-Tracker: Compressing System Audit Log by Taint Tracking | 0 | 0.34 | 2018 |
Understanding User Behavior in Online Banking System. | 0 | 0.34 | 2018 |
Panoramic Image Saliency Detection by Fusing Visual Frequency Feature and Viewing Behavior Pattern. | 1 | 0.36 | 2018 |
A Game Theoretical Framework For Improving The Quality Of Service In Cooperative Ran Caching | 0 | 0.34 | 2017 |
IM-Visor: A Pre-IME Guard to Prevent IME Apps from Stealing Sensitive Keystrokes Using TrustZone | 1 | 0.36 | 2017 |
Real-world traffic analysis and joint caching and scheduling for in-RAN caching networks. | 4 | 0.44 | 2017 |
DC2-MTCP: Light-Weight Coding for Efficient Multi-Path Transmission in Data Center Network. | 0 | 0.34 | 2017 |
Thwart eavesdropping attacks on network communication based on moving target defense | 0 | 0.34 | 2016 |
Defending Blind DDoS Attack on SDN Based on Moving Target Defense. | 1 | 0.41 | 2014 |
Real-Time Remote Attestation Of Iaas Cloud | 1 | 0.34 | 2012 |