Search

Your search keyword '"Luo, Bo"' showing total 103 results

Search Constraints

Start Over You searched for: Author "Luo, Bo" Remove constraint Author: "Luo, Bo" Database Springer Nature eBooks Remove constraint Database: Springer Nature eBooks
103 results on '"Luo, Bo"'

Search Results

1. Companion Apps or Backdoors? On the Security of Automotive Companion Apps

2. The Adversarial AI-Art: Understanding, Generation, Detection, and Benchmarking

9. A Magnetic Field Energy Harvester to Power Micro-power Sensors on the Freight Train for Railway Application

10. Another Lattice Attack Against ECDSA with the wNAF to Recover More Bits per Signature

11. Hide and Seek: On the Stealthiness of Attacks Against Deep Learning Systems

12. IoTPrivComp: A Measurement Study of Privacy Compliance in IoT Apps

13. CONTRA: Defending Against Poisoning Attacks in Federated Learning

14. CANSentry: Securing CAN-Based Cyber-Physical Systems against Denial and Spoofing Attacks

15. Tear Off Your Disguise: Phishing Website Detection Using Visual and Network Identities

17. Arcana: Enabling Private Posts on Public Microblog Platforms

18. FGFDect: A Fine-Grained Features Classification Model for Android Malware Detection

19. A-Tor: Accountable Anonymity in Tor

20. Hide Your Hackable Smart Home from Remote Attacks: The Multipath Onion IoT Gateways

21. CryptMe: Data Leakage Prevention for Unmodified Programs on ARM Devices

23. FamilyID: A Hybrid Approach to Identify Family Information from Microblogs

25. A Complete Methodology for Estimating Dynamics of the Heavy Machine Tool Structure

26. Privacy Preserving Group Linkage

27. Defending against Attribute-Correlation Attacks in Privacy-Aware Information Brokering

28. Security-Conscious XML Indexing

29. Pragmatic XML Access Control Using Off-the-Shelf RDBMS

30. A Flexible Framework for Architecting XML Access Control Enforcement Mechanisms

31. Policy Modeling and Anomaly Detection in ABAC Policies

32. Designing a Service for Compliant Sharing of Sensitive Research Data

33. Authenticated Multi-proxy Accumulation Schemes for Delegated Membership Proofs

34. Extending the Exposure Score of Web Browsers by Incorporating CVSS

35. A Stakeholder-Centric Approach for Defining Metrics for Information Security Management Systems

36. Path-Preserving Anonymization for Inter-domain Routing Policies

37. Threat Modeling of Cyber-Physical Systems in Practice

38. Intelligent Decision Support for Cybersecurity Incident Response Teams: Autonomic Architecture and Mitigation Search

39. Using Garbled Circuit for Secure Brokering

40. A Novel Approach for Attack Tree to Attack Graph Transformation

41. A TSX-Based KASLR Break: Bypassing UMIP and Descriptor-Table Exiting

42. AVSDA: Autonomous Vehicle Security Decay Assessment

43. Quantum Computing Threat Modelling on a Generic CPS Setup

44. Model Evasion Attacks Against Partially Encrypted Deep Neural Networks in Isolated Execution Environment

45. POSTER: Resistance Analysis of Two AES-Like Against the Boomerang Attack

46. Pass-As-You-Go: A Direct Anonymous Attestation-Based Untraceable Contactless Transit Pass

47. Towards Demystifying Adversarial Robustness of Binarized Neural Networks

48. POSTER: Optimizing Device Implementation of Linear Layers with Automated Tools

49. POSTER: Another Look at Boyar-Peralta’s Algorithm

50. Kryptonite: An Adversarial Attack Using Regional Focus

Catalog

Books, media, physical & digital resources