News

Recent years have witnessed deep learning techniques endowing modern audio systems with powerful capabilities. However, the latest studies have revealed its strong reliance on training data, raising ...
Advance Persistent Threats (APTs), adopted by most delicate attackers, are becoming increasing common and pose great threat to various enterprises and institutions. Data provenance analysis on ...
Divyanshu Bhardwaj and Sumair Ijaz Hashmi, CISPA Helmholtz Center for Information Security, Saarland University; Katharina Krombholz and Maximilian Golla, CISPA Helmholtz Center for Information ...
Deep learning has proven to be promising for traffic fingerprinting that explores features of packet timing and sizes. Although well-known for automatic feature extraction, it is faced with a gap ...
Pascal Lafourcade and Dhekra Mahmoud, Université Clermont Auvergne, CNRS, Clermont Auvergne INP, Mines Saint-Etienne, LIMOS, 63000 Clermont-Ferrand, France; Sylvain Ruhault and Abdul Rahman Taleb, ...
Yizhong Liu, Zixiao Jia, Zian Jin, Xiao Chen, Song Bian, Runhua Xu, Dawei Li, and Jianwei Liu, Beihang University; Yuan Lu, Institute of Software Chinese Academy of Sciences ...
Sai Ritvik Tanksalkar, Siddharth Muralee, Datta manikanta sri hari Danduri, Paschal Amusuo, Antonio Bianchi, James C Davis, and Aravind Machiry, Purdue University ...
Wei-Che Kao, Yen-Chia Chen, Yu-Sheng Lin, Yu-Cheng Yang, Chi-Yu Li, and Chun-Ying Huang, National Yang Ming Chiao Tung University ...
Houda Naji, Felix Reichmann, Tobias Bruns, and M. Angela Sasse, Ruhr University Bochum; Alena Naiakshina, University of Cologne ...
Zibo Gao, Junjie Hu, Feng Guo, Yixin Zhang, Yinglong Han, Siyuan Liu, Haiyang Li, and Zhiqiang Lv, Institute of Information Engineering, Chinese Academy of Sciences. School of Cyber Security, ...