咨询与建议

限定检索结果

文献类型

  • 22 篇 期刊文献
  • 12 篇 会议

馆藏范围

  • 34 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 27 篇 工学
    • 22 篇 计算机科学与技术...
    • 21 篇 软件工程
    • 6 篇 电气工程
    • 4 篇 信息与通信工程
    • 3 篇 生物工程
    • 2 篇 机械工程
    • 2 篇 电子科学与技术(可...
    • 2 篇 控制科学与工程
    • 1 篇 光学工程
    • 1 篇 化学工程与技术
    • 1 篇 环境科学与工程(可...
    • 1 篇 生物医学工程(可授...
    • 1 篇 安全科学与工程
  • 12 篇 理学
    • 6 篇 数学
    • 4 篇 生物学
    • 2 篇 物理学
    • 2 篇 系统科学
    • 1 篇 化学
    • 1 篇 统计学(可授理学、...
  • 5 篇 法学
    • 4 篇 法学
    • 1 篇 社会学
  • 2 篇 管理学
    • 1 篇 管理科学与工程(可...
    • 1 篇 工商管理
    • 1 篇 图书情报与档案管...
  • 1 篇 经济学
    • 1 篇 应用经济学

主题

  • 4 篇 generative adver...
  • 3 篇 machine learning
  • 2 篇 anomaly detectio...
  • 1 篇 virtual addresse...
  • 1 篇 support vector m...
  • 1 篇 empirical study
  • 1 篇 ecosystems
  • 1 篇 electric lines
  • 1 篇 neural networks
  • 1 篇 learning algorit...
  • 1 篇 convolution
  • 1 篇 static analysis
  • 1 篇 recovery
  • 1 篇 smart contract
  • 1 篇 tensors
  • 1 篇 custom permissio...
  • 1 篇 android
  • 1 篇 embeddings
  • 1 篇 blockchain
  • 1 篇 image classifica...

机构

  • 5 篇 huazhong univers...
  • 5 篇 delft university...
  • 5 篇 st electronics -...
  • 3 篇 huazhong univers...
  • 3 篇 st engineering-s...
  • 3 篇 jinyinhu laborat...
  • 2 篇 st engineering e...
  • 2 篇 zhengzhou univer...
  • 2 篇 information syst...
  • 2 篇 st electronics s...
  • 2 篇 school of inform...
  • 2 篇 pillar singapore...
  • 2 篇 cooperative chin...
  • 2 篇 department of so...
  • 2 篇 state key labora...
  • 2 篇 huazhong univers...
  • 2 篇 hubei key labora...
  • 2 篇 department of in...
  • 2 篇 st. francis xavi...
  • 2 篇 st engineering-s...

作者

  • 10 篇 cheung ngai-man
  • 6 篇 tan yi xiang mar...
  • 6 篇 binder alexander
  • 6 篇 elovici yuval
  • 5 篇 tran ngoc-trung
  • 4 篇 yang laurence t.
  • 3 篇 peng xu
  • 3 篇 kaitai liang
  • 3 篇 bui tuan-anh
  • 3 篇 sun jiamei
  • 3 篇 wang wei
  • 3 篇 chong penny
  • 3 篇 laurence t. yang
  • 3 篇 wei wang
  • 3 篇 xu peng
  • 2 篇 zhang xianglong
  • 2 篇 liang kaitai
  • 2 篇 manickam selvaku...
  • 2 篇 yin hongzhi
  • 2 篇 singh parminder

语言

  • 31 篇 英文
  • 3 篇 其他
检索条件"机构=ST Engineering-SUTD Cyber Security Laboratory"
34 条 记 录,以下是1-10 订阅
排序:
Forward Legal Anonymous Group Pairing-Onion Routing for Mobile Opportunistic Networks
收藏 引用
IEEE Transactions on Mobile Computing 2025年 第7期24卷 6595-6612页
作者: Zhu, Xiuzhen Lin, Limei Huang, Yanze Wang, Xiaoding Hsieh, Sun-Yuan Wu, Jie Fujian Normal University College of Computer and Cyber Security Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Fuzhou350117 China Fujian University of Technology School of Computer Science and Mathematics Fujian Fuzhou350118 China National Cheng Kung University Department of Computer Science and Information Engineering Tainan701 Taiwan Temple University Department of Computer and Information Science 1925 N. 12th St PhiladelphiaPA19122 United States
Mobile Opportunistic Networks (MONs) often experience frequent interruptions in end-to-end connections, which increases the likelihood of message loss during delivery and makes users more susceptible to various cyber ... 详细信息
来源: 评论
Analysing the Adversarial Landscape of Binary stochastic Networks  1
收藏 引用
iCatse International Conference on Information Science and Applications, ICISA 2020
作者: Tan, Yi Xiang Marcus Elovici, Yuval Binder, Alexander ST Engineering-SUTD Cyber Security Laboratory Singapore Singapore Information Systems Technology and Design Pillar Singapore University of Technology and Design Singapore Singapore Department of Software and Information Systems Engineering Ben-Gurion University of the Negev Beer-Sheva Israel
We investigate the robustness of stochastic ANNs to adversarial attacks. We perform experiments on three known datasets. Our experiments reveal similar susceptibility of stochastic ANNs compared to conventional ANNs w... 详细信息
来源: 评论
Detection of Adversarial Supports in Few-Shot Classifiers Using Self-Similarity and Filtering
Detection of Adversarial Supports in Few-Shot Classifiers Us...
收藏 引用
2021 International Workshop on Safety and security of Deep Learning, SSDL 2021
作者: Tan, Yi Xiang Marcus Chong, Penny Sun, Jiamei Cheung, Ngai-Man Elovici, Yuval Binder, Alexander Information Systems Technology and Design Pillar Singapore University of Technology and Design Singapore Department of Software and Information Systems Engineering Ben-Gurion University of the Negev Be’er Sheva Israel Department of Informatics University of Oslo Norway ST Engineering-SUTD Cyber Security Laboratory
Few-shot classifiers excel under limited training samples, making them useful in applications with sparsely user-provided labels. Their unique relative prediction setup offers opportunities for novel attacks, such as ... 详细信息
来源: 评论
SmartWitness: A proactive software transparency system using smart contracts  2
SmartWitness: A proactive software transparency system using...
收藏 引用
2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure, BSCI 2020, Co-located with AsiaCCS 2020
作者: Guarnizo, Juan Alangot, Bithin Szalachowski, Pawel ST Engineering-SUTD Cyber Security Laboratory Singapore University of Technology and Design Singapore Singapore Center for Cybersecurity Systems and Networks Amrita Vishwa Vidyapeetham Amritapuri India
Package managers have become essential for software distribution and management. Their goal is to allow users to install programs, drivers, or updates in their systems in a secure, quick, and often, unattended way. Ho... 详细信息
来源: 评论
Query recovery from easy to hard: jigsaw attack against SSE  24
Query recovery from easy to hard: jigsaw attack against SSE
收藏 引用
Proceedings of the 33rd USENIX Conference on security Symposium
作者: Hao Nie Wei Wang Peng Xu Xianglong Zhang Laurence T. Yang Kaitai Liang Huazhong University of Science and Technology Huazhong University of Science and Technology and Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering and JinYinHu Laboratory and State Key Laboratory of Cryptology Huazhong University of Science and Technology and St. Francis Xavier University Delft University of Technology
Searchable symmetric encryption schemes often unintentionally disclose certain sensitive information, such as access, volume, and search patterns. Attackers can exploit such leakages and other available knowledge rela...
来源: 评论
Query Recovery from Easy to Hard: Jigsaw Attack against SSE
arXiv
收藏 引用
arXiv 2024年
作者: Nie, Hao Wang, Wei Xu, Peng Zhang, Xianglong Yang, Laurence T. Liang, Kaitai Huazhong University of Science and Technology China Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering China JinYinHu Laboratory China State Key Laboratory of Cryptology China St. Francis Xavier University Canada Delft University of Technology Netherlands
Searchable symmetric encryption schemes often unintentionally disclose certain sensitive information, such as access, volume, and search patterns. Attackers can exploit such leakages and other available knowledge rela... 详细信息
来源: 评论
Understanding the Bad Development Practices of Android Custom Permissions in the Wild
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Zhang, Xiaohan Yu, Zhiyuan Li, Xinghua Zhang, Cen Sun, Cong Zhang, Ning Deng, Robert H. Xidian University State Key Laboratory of Integrated Service Networks School of Cyber Engineering Xi'an710071 China Ministry of Education Engineering Research Center of Big data Security China Washington University in St. Louis Department of Computer Science and Engineering St. LouisMO63130 United States Nanyang Technological University 639798 Singapore Singapore Management University 188065 Singapore
Android system provides application developers with the ability to define custom permissions, which serve to regulate the sharing of resources and functionalities with other applications. However, developers' impr... 详细信息
来源: 评论
d-DSE: distinct dynamic searchable encryption resisting volume leakage in encrypted databases  24
d-DSE: distinct dynamic searchable encryption resisting volu...
收藏 引用
Proceedings of the 33rd USENIX Conference on security Symposium
作者: Dongli Liu Wei Wang Peng Xu Laurence T. Yang Bo Luo Kaitai Liang Huazhong University of Science and Technology Huazhong University of Science and Technology and Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering and JinYinHu Laboratory and State Key Laboratory of Cryptology Huazhong University of Science and Technology and St. Francis Xavier University The University of Kansas Delft University of Technology
Dynamic Searchable Encryption (DSE) has emerged as a solution to efficiently handle and protect large-scale data storage in encrypted databases (EDBs). Volume leakage poses a significant threat' as it enables adve...
来源: 评论
d-DSE: Distinct Dynamic Searchable Encryption Resisting Volume Leakage in Encrypted Databases
arXiv
收藏 引用
arXiv 2024年
作者: Liu, Dongli Wang, Wei Xu, Peng Yang, Laurence T. Luo, Bo Liang, Kaitai Huazhong University of Science and Technology China Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering China JinYinHu Laboratory China State Key Laboratory of Cryptology China St. Francis Xavier University The University of Kansas United States Delft University of Technology Netherlands
Dynamic Searchable Encryption (DSE) has emerged as a solution to efficiently handle and protect large-scale data storage in encrypted databases (EDBs). Volume leakage poses a significant threat, as it enables adversar... 详细信息
来源: 评论
Tensor-Based Multi-Scale Correlation Anomaly Detection for AIoT-Enabled Consumer Applications
收藏 引用
IEEE Transactions on Consumer Electronics 2024年
作者: Zeng, Jiuzhen Yang, Laurence T. Wang, Chao Deng, Xianjun Yang, Xiangli Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China Huazhong University of Science and Technology School of Cyber Science and Engineering Wuhan430074 China Zhengzhou University School of Computer and Artificial Intelligence Zhengzhou450001 China St. Francis Xavier University Department of Computer Science AntigonishNSB2G 2W5 Canada University of South China School of Electrical Engineering Hengyang421001 China
Artificial Intelligence of Things (AIoT) is an innovative paradigm expected to enable various consumer applications that is transforming our lives. While enjoying benefits and services from these applications, we also... 详细信息
来源: 评论