International Conference on Cyber Security Cryptography and Machine Learning最新文献

筛选
英文 中文
Enhancing Image Steganalysis with Adversarially Generated Examples 用对抗生成的例子增强图像隐写分析
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2019-06-27 DOI: 10.1007/978-3-030-20951-3_15
K. Zhang, K. Veeramachaneni
{"title":"Enhancing Image Steganalysis with Adversarially Generated Examples","authors":"K. Zhang, K. Veeramachaneni","doi":"10.1007/978-3-030-20951-3_15","DOIUrl":"https://doi.org/10.1007/978-3-030-20951-3_15","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"433 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123601881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Everything Is in the Name - A URL Based Approach for Phishing Detection 一切都在名称-基于URL的网络钓鱼检测方法
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2019-06-27 DOI: 10.1007/978-3-030-20951-3_21
Harshal Tupsamudre, A. Singh, S. Lodha
{"title":"Everything Is in the Name - A URL Based Approach for Phishing Detection","authors":"Harshal Tupsamudre, A. Singh, S. Lodha","doi":"10.1007/978-3-030-20951-3_21","DOIUrl":"https://doi.org/10.1007/978-3-030-20951-3_21","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123849158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Jamming Strategies in Covert Communication 秘密通信中的干扰策略
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2019-06-27 DOI: 10.1007/978-3-030-20951-3_1
O. Shmuel, A. Cohen, Omer Gurewitz
{"title":"Jamming Strategies in Covert Communication","authors":"O. Shmuel, A. Cohen, Omer Gurewitz","doi":"10.1007/978-3-030-20951-3_1","DOIUrl":"https://doi.org/10.1007/978-3-030-20951-3_1","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133676282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rethinking Identification Protocols from the Point of View of the GDPR 从GDPR的角度重新思考身份协议
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2019-06-27 DOI: 10.1007/978-3-030-20951-3_25
Mirosław Kutyłowski, L. Krzywiecki, Xiaofeng Chen
{"title":"Rethinking Identification Protocols from the Point of View of the GDPR","authors":"Mirosław Kutyłowski, L. Krzywiecki, Xiaofeng Chen","doi":"10.1007/978-3-030-20951-3_25","DOIUrl":"https://doi.org/10.1007/978-3-030-20951-3_25","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127064809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Amended Cross-Entropy Cost: An Approach for Encouraging Diversity in Classification Ensemble (Brief Announcement) 修正交叉熵代价:一种鼓励分类集成多样性的方法(简要公告)
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2019-06-27 DOI: 10.1007/978-3-030-20951-3_18
Ron Shoham, H. Permuter
{"title":"Amended Cross-Entropy Cost: An Approach for Encouraging Diversity in Classification Ensemble (Brief Announcement)","authors":"Ron Shoham, H. Permuter","doi":"10.1007/978-3-030-20951-3_18","DOIUrl":"https://doi.org/10.1007/978-3-030-20951-3_18","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116908025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
New Goal Recognition Algorithms Using Attack Graphs 基于攻击图的新目标识别算法
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2019-06-27 DOI: 10.1007/978-3-030-20951-3_23
Reuth Mirsky, Yaar Shalom, Ahmad Majadly, Y. Gal, Rami Puzis, Ariel Felner
{"title":"New Goal Recognition Algorithms Using Attack Graphs","authors":"Reuth Mirsky, Yaar Shalom, Ahmad Majadly, Y. Gal, Rami Puzis, Ariel Felner","doi":"10.1007/978-3-030-20951-3_23","DOIUrl":"https://doi.org/10.1007/978-3-030-20951-3_23","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122189633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Self-stabilizing Byzantine Consensus for Blockchain - (Brief Announcement) 区块链的自稳定拜占庭共识-(简短公告)
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2019-06-27 DOI: 10.1007/978-3-030-20951-3_10
Alexander Binun, S. Dolev, T. Hadad
{"title":"Self-stabilizing Byzantine Consensus for Blockchain - (Brief Announcement)","authors":"Alexander Binun, S. Dolev, T. Hadad","doi":"10.1007/978-3-030-20951-3_10","DOIUrl":"https://doi.org/10.1007/978-3-030-20951-3_10","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115688407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Governance and Regulations Implications on Machine Learning (Brief Announcement) 治理和法规对机器学习的影响(简要公告)
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2019-06-27 DOI: 10.1007/978-3-030-20951-3_19
Sima Nadler, O. Raz, Marcel Zalmanovici
{"title":"Governance and Regulations Implications on Machine Learning (Brief Announcement)","authors":"Sima Nadler, O. Raz, Marcel Zalmanovici","doi":"10.1007/978-3-030-20951-3_19","DOIUrl":"https://doi.org/10.1007/978-3-030-20951-3_19","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114553567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effects of Weather on Drone to IoT QKD 天气对无人机对物联网QKD的影响
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2019-06-27 DOI: 10.1007/978-3-030-20951-3_5
S. Arnon, J. Kupferman
{"title":"Effects of Weather on Drone to IoT QKD","authors":"S. Arnon, J. Kupferman","doi":"10.1007/978-3-030-20951-3_5","DOIUrl":"https://doi.org/10.1007/978-3-030-20951-3_5","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130757391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Generating a Random String with a Fixed Weight 生成具有固定权重的随机字符串
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2019-06-27 DOI: 10.1007/978-3-030-20951-3_13
Nir Drucker, S. Gueron
{"title":"Generating a Random String with a Fixed Weight","authors":"Nir Drucker, S. Gueron","doi":"10.1007/978-3-030-20951-3_13","DOIUrl":"https://doi.org/10.1007/978-3-030-20951-3_13","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115531736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信