为了提供给您更好的使用体验,请启用此功能。';window.onload=function(){1==navigator.cookieEnabled||(document.body.insertAdjacentHTML("beforeend",ck_html),window.onscroll=function(i){console.log(i),document.body.setAttribute("style","position:fixed")})}
1. An Effective Ensemble Algorithm for Short-Term Load Forecasting NSTL国家科技图书文献中心
En-Wei Zhang | Luo-Fan Wu... - 《Information Security Applications》 - International Conference on Information Security Applications - 2025, - 164~176 - 共13页
2. PUF-Based Authentication and Authorization Protocol for IoT NSTL国家科技图书文献中心
Yu-Tse Shih | Shih-Ming Huang... - 《Information Security Applications》 - International Conference on Information Security Applications - 2025, - 179~190 - 共12页
3. A Survey on Attack Cases with VBS Malware in Windows NSTL国家科技图书文献中心
GyuHyun Jeon | Seungho Jeon... - 《Information Security Applications》 - International Conference on Information Security Applications - 2025, - 284~296 - 共13页
4. VoteGAN: Generalized Membership Inference Attack Against Generative Models by Multiple Discriminators NSTL国家科技图书文献中心
Gyeongsup Lim | Wonjun Oh... - 《Information Security Applications》 - International Conference on Information Security Applications - 2025, - 71~82 - 共12页
5. Boosting Black-Box Transferability of Weak Audio Adversarial Attacks with Random Masking NSTL国家科技图书文献中心
Mai Bui | Thien-Phuc Doan... - 《Information Security Applications》 - International Conference on Information Security Applications - 2025, - 96~108 - 共13页
6. ARP Spoofing Mitigation for the E2 Interface in Open RAN: An xApp Approach NSTL国家科技图书文献中心
Jihye Kim | Jaehyoung Park... - 《Information Security Applications》 - International Conference on Information Security Applications - 2025, - 31~43 - 共13页
7. Fuzzing JavaScript Engines with Diversified Mutation Strategies NSTL国家科技图书文献中心
Cheng-Han Shie | Pin-Huang Fang... - 《Information Security Applications》 - International Conference on Information Security Applications - 2025, - 243~254 - 共12页
8. Field Testing and Detection of Camera Interference for Autonomous Driving NSTL国家科技图书文献中心
Ki Beom Park | Huy Kang Kim - 《Information Security Applications》 - International Conference on Information Security Applications - 2025, - 191~202 - 共12页
9. Plotting OSS-Based Supply Chain Attack Strategies and the Defense Failure NSTL国家科技图书文献中心
Arpita Dinesh Sarang | Sang-Hoon Choi... - 《Information Security Applications》 - International Conference on Information Security Applications - 2025, - 311~323 - 共13页
10. LLM Guardrail Framework: A Novel Approach for Implementing Zero Trust Architecture NSTL国家科技图书文献中心
Bogeum Kim | Hyejin Sim... - 《Information Security Applications》 - International Conference on Information Security Applications - 2025, - 138~148 - 共11页
服务站
成员单位
友情链接