1 |
PACSafe: Leveraging ARM Pointer Authentication for Memory Safety in C/C++ ...
|
|
|
|
BASE
|
|
Show details
|
|
2 |
A Framework for Server Authentication using Communication Protocol Dialects ...
|
|
|
|
BASE
|
|
Show details
|
|
3 |
Few-Shot Cross-lingual Transfer for Coarse-grained De-identification of Code-Mixed Clinical Texts ...
|
|
|
|
BASE
|
|
Show details
|
|
5 |
Semantic-Preserving Linguistic Steganography by Pivot Translation and Semantic-Aware Bins Coding ...
|
|
|
|
BASE
|
|
Show details
|
|
6 |
Autoregressive Linguistic Steganography Based on BERT and Consistency Coding ...
|
|
|
|
BASE
|
|
Show details
|
|
7 |
Perturbations in the Wild: Leveraging Human-Written Text Perturbations for Realistic Adversarial Attack and Defense ...
|
|
|
|
BASE
|
|
Show details
|
|
9 |
An Adversarial Attack Analysis on Malicious Advertisement URL Detection Framework ...
|
|
|
|
BASE
|
|
Show details
|
|
10 |
Comprehensive Survey of Multimedia Steganalysis: Techniques, Evaluations, and Trends in Future Research
|
|
|
|
In: Symmetry; Volume 14; Issue 1; Pages: 117 (2022)
|
|
BASE
|
|
Show details
|
|
11 |
Detecting Privacy Requirements from User Stories with NLP Transfer Learning Models ...
|
|
|
|
BASE
|
|
Show details
|
|
12 |
Actionable Intelligence-Oriented Cyber Threat Modeling Framework
|
|
|
|
BASE
|
|
Show details
|
|
13 |
Bilingual Problems: Studying the Security Risks Incurred by Native Extensions in Scripting Languages ...
|
|
|
|
BASE
|
|
Show details
|
|
14 |
Applied use of Leontiev's intersectoral balance model for solving the problems of neutralizing the risks of ICT implementation ...
|
|
|
|
BASE
|
|
Show details
|
|
15 |
Mechanism for preventing and counteracting legalization (laundering) of proceeds from crime in the financial security system of the banking system ...
|
|
|
|
BASE
|
|
Show details
|
|
16 |
Applied use of Leontiev's intersectoral balance model for solving the problems of neutralizing the risks of ICT implementation ...
|
|
|
|
BASE
|
|
Show details
|
|
17 |
Mechanism for preventing and counteracting legalization (laundering) of proceeds from crime in the financial security system of the banking system ...
|
|
|
|
BASE
|
|
Show details
|
|
18 |
Pifthon: A Compile-Time Information Flow Analyzer For An Imperative Language ...
|
|
|
|
BASE
|
|
Show details
|
|
20 |
MPD: Moving Target Defense through Communication Protocol Dialects ...
|
|
|
|
BASE
|
|
Show details
|
|
|
|