International Conference on Information, Communications and Signal Processing最新文献

筛选
英文 中文
Towards Homograph-Confusable Domain Name Detection Using Dual-Channel CNN 基于双通道CNN的同音易混淆域名检测
International Conference on Information, Communications and Signal Processing Pub Date : 2019-12-15 DOI: 10.1007/978-3-030-41579-2_32
Guangxi Yu, Xinghua Yang, Yan Zhang, Huajun Cui, Huiran Yang, Yang Li
{"title":"Towards Homograph-Confusable Domain Name Detection Using Dual-Channel CNN","authors":"Guangxi Yu, Xinghua Yang, Yan Zhang, Huajun Cui, Huiran Yang, Yang Li","doi":"10.1007/978-3-030-41579-2_32","DOIUrl":"https://doi.org/10.1007/978-3-030-41579-2_32","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121657891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tear Off Your Disguise: Phishing Website Detection Using Visual and Network Identities 撕下你的伪装:网络钓鱼网站检测使用视觉和网络身份
International Conference on Information, Communications and Signal Processing Pub Date : 2019-12-15 DOI: 10.1007/978-3-030-41579-2_44
Zhaoyu Zhou, Lingjing Yu, Qingyun Liu, Yang Liu, Bo Luo
{"title":"Tear Off Your Disguise: Phishing Website Detection Using Visual and Network Identities","authors":"Zhaoyu Zhou, Lingjing Yu, Qingyun Liu, Yang Liu, Bo Luo","doi":"10.1007/978-3-030-41579-2_44","DOIUrl":"https://doi.org/10.1007/978-3-030-41579-2_44","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126882474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SecFlush: A Hardware/Software Collaborative Design for Real-Time Detection and Defense Against Flush-Based Cache Attacks SecFlush:一种硬件/软件协同设计,用于实时检测和防御基于flush的缓存攻击
International Conference on Information, Communications and Signal Processing Pub Date : 2019-12-15 DOI: 10.1007/978-3-030-41579-2_15
Churan Tang, Zongbin Liu, Cunqing Ma, Jingquan Ge, Chenyang Tu
{"title":"SecFlush: A Hardware/Software Collaborative Design for Real-Time Detection and Defense Against Flush-Based Cache Attacks","authors":"Churan Tang, Zongbin Liu, Cunqing Ma, Jingquan Ge, Chenyang Tu","doi":"10.1007/978-3-030-41579-2_15","DOIUrl":"https://doi.org/10.1007/978-3-030-41579-2_15","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126912443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Neuron Selecting: Defending Against Adversarial Examples in Deep Neural Networks 神经元选择:深度神经网络中对抗实例的防御
International Conference on Information, Communications and Signal Processing Pub Date : 2019-12-15 DOI: 10.1007/978-3-030-41579-2_36
Ming Zhang, Hu Li, Xiaohui Kuang, Ling Pang, Zhendong Wu
{"title":"Neuron Selecting: Defending Against Adversarial Examples in Deep Neural Networks","authors":"Ming Zhang, Hu Li, Xiaohui Kuang, Ling Pang, Zhendong Wu","doi":"10.1007/978-3-030-41579-2_36","DOIUrl":"https://doi.org/10.1007/978-3-030-41579-2_36","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121950795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Parallel Steepest Ascent Hill-Climbing for High Nonlinear Boolean and Vectorial Boolean Functions (S-Boxes) 高非线性布尔函数和向量布尔函数(s - box)的平行最陡爬坡
International Conference on Information, Communications and Signal Processing Pub Date : 2019-12-15 DOI: 10.1007/978-3-030-41579-2_24
Athmane Seghier, Jianxin Li
{"title":"Parallel Steepest Ascent Hill-Climbing for High Nonlinear Boolean and Vectorial Boolean Functions (S-Boxes)","authors":"Athmane Seghier, Jianxin Li","doi":"10.1007/978-3-030-41579-2_24","DOIUrl":"https://doi.org/10.1007/978-3-030-41579-2_24","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123383054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Comprehensive Security Analysis of Hidden Services Using Binding Guard Relays 基于绑定保护继电器的隐藏服务综合安全性分析
International Conference on Information, Communications and Signal Processing Pub Date : 2019-12-15 DOI: 10.1007/978-3-030-41579-2_30
Muqian Chen, Xuebin Wang, Jinqiao Shi, Yue Gao, Can Zhao, Wei Sun
{"title":"Towards Comprehensive Security Analysis of Hidden Services Using Binding Guard Relays","authors":"Muqian Chen, Xuebin Wang, Jinqiao Shi, Yue Gao, Can Zhao, Wei Sun","doi":"10.1007/978-3-030-41579-2_30","DOIUrl":"https://doi.org/10.1007/978-3-030-41579-2_30","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129890657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Ciphertext Policy Attribute-Based Encryption for Circuits from LWE Assumption 基于LWE假设的电路密文策略属性加密
International Conference on Information, Communications and Signal Processing Pub Date : 2019-12-15 DOI: 10.1007/978-3-030-41579-2_22
Geng Wang, Z. Liu, Dawu Gu
{"title":"Ciphertext Policy Attribute-Based Encryption for Circuits from LWE Assumption","authors":"Geng Wang, Z. Liu, Dawu Gu","doi":"10.1007/978-3-030-41579-2_22","DOIUrl":"https://doi.org/10.1007/978-3-030-41579-2_22","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124452501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Cloning Vulnerability Detection in Driver Layer of IoT Devices 物联网设备驱动层克隆漏洞检测
International Conference on Information, Communications and Signal Processing Pub Date : 2019-12-15 DOI: 10.1007/978-3-030-41579-2_6
Weipeng Jiang, Bin Wu, Zhou Jiang, Shaobo Yang
{"title":"Cloning Vulnerability Detection in Driver Layer of IoT Devices","authors":"Weipeng Jiang, Bin Wu, Zhou Jiang, Shaobo Yang","doi":"10.1007/978-3-030-41579-2_6","DOIUrl":"https://doi.org/10.1007/978-3-030-41579-2_6","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116573334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Context-Aware IPv6 Address Hopping 上下文感知的IPv6地址跳变
International Conference on Information, Communications and Signal Processing Pub Date : 2019-12-15 DOI: 10.1007/978-3-030-41579-2_31
Matthias Marx, Monina Schwarz, M. Blochberger, Frederik Wille, H. Federrath
{"title":"Context-Aware IPv6 Address Hopping","authors":"Matthias Marx, Monina Schwarz, M. Blochberger, Frederik Wille, H. Federrath","doi":"10.1007/978-3-030-41579-2_31","DOIUrl":"https://doi.org/10.1007/978-3-030-41579-2_31","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125122908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
WSLD: Detecting Unknown Webshell Using Fuzzy Matching and Deep Learning WSLD:基于模糊匹配和深度学习的未知Webshell检测
International Conference on Information, Communications and Signal Processing Pub Date : 2019-12-15 DOI: 10.1007/978-3-030-41579-2_42
Zihao Zhao, Qixu Liu, Tiantian Song, Zhi Wang, Xianda Wu
{"title":"WSLD: Detecting Unknown Webshell Using Fuzzy Matching and Deep Learning","authors":"Zihao Zhao, Qixu Liu, Tiantian Song, Zhi Wang, Xianda Wu","doi":"10.1007/978-3-030-41579-2_42","DOIUrl":"https://doi.org/10.1007/978-3-030-41579-2_42","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126354736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信