|
|
|
Saqib Ali, Sana Ashraf, Muhammad Sohaib Yousaf, Shazia Riaz and Guojun Wang
The successful outcomes of deep learning (DL) algorithms in diverse fields have prompted researchers to consider backdoor attacks on DL models to defend them in practical applications. Adversarial examples could deceive a safety-critical system, which co...
ver más
|
|
|
|
|
|
|
Tasniem Al-Yahya, Mohamed El Bachir Abdelkrim Menai and Hassan Mathkour
Boolean structural measures were introduced to explain the high performance of conflict-driven clause-learning (CDCL) SAT solvers on industrial SAT instances. Those considered in this study include measures related to backbones and backdoors: backbone si...
ver más
|
|
|
|
|
|
|
You Guo, Hector Marco-Gisbert and Paul Keir
A webshell is a command execution environment in the form of web pages. It is often used by attackers as a backdoor tool for web server operations. Accurately detecting webshells is of great significance to web server protection. Most security products d...
ver más
|
|
|
|
|
|
|
Gopal Vishwakarma and Wonjun Lee
Nowadays, companies are heavily investing in the development of ?Internet of Things(IoT)? products. These companies usually and obviously hunt for lucrative business models. Currently, each person owns at least 3?4 devices (such as mobiles, personal comp...
ver más
|
|
|
|