1,016 results on '"Zhou,Li"'
Search Results
2. NetDPSyn: Synthesizing Network Traces under Differential Privacy.
3. Design and Implementation of Spacecraft Network System Based on Dual-Information.
4. Understanding and Bridging the Gap Between Unsupervised Network Representation Learning and Security Analytics.
5. TuDoor Attack: Systematically Exploring and Exploiting Logic Vulnerabilities in DNS Response Pre-processing with Malformed Packets.
6. ResolverFuzz: Automated Discovery of DNS Resolver Vulnerabilities with Query-Response Fuzzing.
7. Userspace Bypass: Accelerating Syscall-intensive Applications.
8. Using Inference and Graph Convolutional Networks for APT Attack Detection.
9. On Adversarial Robustness of Point Cloud Semantic Segmentation.
10. PROGRAPHER: An Anomaly Detection System based on Provenance Graph Embedding.
11. The Maginot Line: Attacking the Boundary of DNS Caching Protection.
12. Differentially Private Resource Allocation.
13. On Extremal Rates of Storage over Graphs.
14. Weakly Secure Summation with Colluding Users.
15. Maestro: A Gamified Platform for Teaching AI Robustness.
16. Hide and Seek: Revisiting DNS-based User Tracking.
17. Research on the Operational Efficiency of Internet Service Companies Based on DEA-Malmquist.
18. MeshUp: Stateless Cache Side-channel Attack on CPU Mesh.
19. Play the Imitation Game: Model Extraction Attack against Autonomous Driving Localization.
20. Application Research of MES in Intelligent Manufacturing Training Factory.
21. Short-term photovoltaic power generation forecasting method based on optimized long and short memory neural networks.
22. Benchmark for Arbitrary-Oriented SAR Ship Detection.
23. Ghost Domain Reloaded: Vulnerable Links in Domain Name Delegation and Revocation.
24. A Real-Time Gait Phase Recognition Method Based on Multi-Information Fusion.
25. Implantable Sufficiently Integrated Multimodal Flexible Sensor for Intracranial Monitoring.
26. SEAL: Storage-efficient Causality Analysis on Enterprise Logs with Query-friendly Compression.
27. Invisible Probe: Timing Attacks with PCIe Congestion Side-channel.
28. Android Custom Permissions Demystified: From Privilege Escalation to Design Shortcomings.
29. Detecting and Characterizing SMS Spearphishing Attacks.
30. The Many-faced God: Attacking Face Verification System with Embedding and Image Recovery.
31. On the Linear Capacity of Conditional Disclosure of Secrets.
32. Rusted Anchors: A National Client-Side View of Hidden Root CAs in the Web PKI Ecosystem.
33. Android on PC: On the Security of End-user Android Emulators.
34. Continuous Release of Data Streams under both Centralized and Local Differential Privacy.
35. A Comprehensive Measurement-based Investigation of DNS Hijacking.
36. Arbitrary-Oriented SAR Ship Detection Via Frequency Learning.
37. AdaFL: Adaptive Client Selection and Dynamic Contribution Evaluation for Efficient Federated Learning
38. MLPs Compass: What is Learned When MLPs are Combined with PLMs?
39. Leaky DNN: Stealing Deep-Learning Model Secret with GPU Context-Switching Side-Channel.
40. Argot: Generating Adversarial Readable Chinese Texts.
41. Understanding Promotion-as-a-Service on GitHub.
42. Conditional Disclosure of Secrets: A Noise and Signal Alignment Approach.
43. Lies in the Air: Characterizing Fake-base-station Spam Ecosystem in China.
44. Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of IoT Traffic.
45. The application research of multi-source heterogeneous energy big data analysis.
46. Fusion of Linear and Nonlinear Classifiers for Kernel Dictionary Learning: Application to Sar Target Recognition.
47. SAR Target Classification with Limited Data via Data Driven Active Learning.
48. Design Factors of Maestro: A Serious Game for Robust AI Education.
49. An investigation on information leakage of DNS over TLS.
50. TraffickStop: Detecting and Measuring Illicit Traffic Monetization Through Large-Scale DNS Analysis.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.