DE eng

Search in the Catalogues and Directories

Page: 1 2 3 4 5...15
Hits 1 – 20 of 282

1
PACSafe: Leveraging ARM Pointer Authentication for Memory Safety in C/C++ ...
BASE
Show details
2
A Framework for Server Authentication using Communication Protocol Dialects ...
BASE
Show details
3
Few-Shot Cross-lingual Transfer for Coarse-grained De-identification of Code-Mixed Clinical Texts ...
BASE
Show details
4
The VoicePrivacy 2022 Challenge Evaluation Plan ...
BASE
Show details
5
Semantic-Preserving Linguistic Steganography by Pivot Translation and Semantic-Aware Bins Coding ...
Yang, Tianyu; Wu, Hanzhou; Yi, Biao. - : arXiv, 2022
BASE
Show details
6
Autoregressive Linguistic Steganography Based on BERT and Consistency Coding ...
Zheng, Xiaoyan; Wu, Hanzhou. - : arXiv, 2022
BASE
Show details
7
Perturbations in the Wild: Leveraging Human-Written Text Perturbations for Realistic Adversarial Attack and Defense ...
Le, Thai; Lee, Jooyoung; Yen, Kevin. - : arXiv, 2022
BASE
Show details
8
Can Rationalization Improve Robustness? ...
BASE
Show details
9
An Adversarial Attack Analysis on Malicious Advertisement URL Detection Framework ...
BASE
Show details
10
Comprehensive Survey of Multimedia Steganalysis: Techniques, Evaluations, and Trends in Future Research
In: Symmetry; Volume 14; Issue 1; Pages: 117 (2022)
BASE
Show details
11
Detecting Privacy Requirements from User Stories with NLP Transfer Learning Models ...
BASE
Show details
12
Actionable Intelligence-Oriented Cyber Threat Modeling Framework
BASE
Show details
13
Bilingual Problems: Studying the Security Risks Incurred by Native Extensions in Scripting Languages ...
BASE
Show details
14
Applied use of Leontiev's intersectoral balance model for solving the problems of neutralizing the risks of ICT implementation ...
KOLODIYCHUK, A.V.. - : Zenodo, 2021
BASE
Show details
15
Mechanism for preventing and counteracting legalization (laundering) of proceeds from crime in the financial security system of the banking system ...
HUSHTAN, T.V.; KOVACH, M.Y.. - : Zenodo, 2021
BASE
Show details
16
Applied use of Leontiev's intersectoral balance model for solving the problems of neutralizing the risks of ICT implementation ...
KOLODIYCHUK, A.V.. - : Zenodo, 2021
BASE
Show details
17
Mechanism for preventing and counteracting legalization (laundering) of proceeds from crime in the financial security system of the banking system ...
HUSHTAN, T.V.; KOVACH, M.Y.. - : Zenodo, 2021
BASE
Show details
18
Pifthon: A Compile-Time Information Flow Analyzer For An Imperative Language ...
BASE
Show details
19
MESH: A Memory-Efficient Safe Heap for C/C++ ...
BASE
Show details
20
MPD: Moving Target Defense through Communication Protocol Dialects ...
BASE
Show details

Page: 1 2 3 4 5...15

Catalogues
0
0
0
0
0
0
0
Bibliographies
0
0
0
0
0
0
0
0
0
Linked Open Data catalogues
0
Online resources
0
0
0
0
Open access documents
282
0
0
0
0
© 2013 - 2024 Lin|gu|is|tik | Imprint | Privacy Policy | Datenschutzeinstellungen ändern