95 results on '"Luo, Bo"'
Search Results
2. CONTRA: Defending Against Poisoning Attacks in Federated Learning
3. CANSentry: Securing CAN-Based Cyber-Physical Systems against Denial and Spoofing Attacks
4. Tear Off Your Disguise: Phishing Website Detection Using Visual and Network Identities
5. Arcana: Enabling Private Posts on Public Microblog Platforms
6. CONTRA: Defending Against Poisoning Attacks in Federated Learning
7. FGFDect: A Fine-Grained Features Classification Model for Android Malware Detection
8. A-Tor: Accountable Anonymity in Tor
9. Hide Your Hackable Smart Home from Remote Attacks: The Multipath Onion IoT Gateways
10. CryptMe: Data Leakage Prevention for Unmodified Programs on ARM Devices
11. Tear Off Your Disguise: Phishing Website Detection Using Visual and Network Identities
12. CANSentry: Securing CAN-Based Cyber-Physical Systems against Denial and Spoofing Attacks
13. FamilyID: A Hybrid Approach to Identify Family Information from Microblogs
14. Arcana: Enabling Private Posts on Public Microblog Platforms
15. Hide Your Hackable Smart Home from Remote Attacks: The Multipath Onion IoT Gateways
16. CryptMe: Data Leakage Prevention for Unmodified Programs on ARM Devices
17. Nosema sp. PM-1, a new isolate of microsporidian from infected Papilio machaon Linnaeus, based on ultrastructure and molecular identification
18. High-resolution remote sensing image segmentation based on improved RIU-LBP and SRM
19. FamilyID: A Hybrid Approach to Identify Family Information from Microblogs
20. Policy Modeling and Anomaly Detection in ABAC Policies
21. Designing a Service for Compliant Sharing of Sensitive Research Data
22. Authenticated Multi-proxy Accumulation Schemes for Delegated Membership Proofs
23. Extending the Exposure Score of Web Browsers by Incorporating CVSS
24. A Stakeholder-Centric Approach for Defining Metrics for Information Security Management Systems
25. Path-Preserving Anonymization for Inter-domain Routing Policies
26. Threat Modeling of Cyber-Physical Systems in Practice
27. Intelligent Decision Support for Cybersecurity Incident Response Teams: Autonomic Architecture and Mitigation Search
28. Using Garbled Circuit for Secure Brokering
29. A Novel Approach for Attack Tree to Attack Graph Transformation
30. A TSX-Based KASLR Break: Bypassing UMIP and Descriptor-Table Exiting
31. AVSDA: Autonomous Vehicle Security Decay Assessment
32. Quantum Computing Threat Modelling on a Generic CPS Setup
33. Model Evasion Attacks Against Partially Encrypted Deep Neural Networks in Isolated Execution Environment
34. POSTER: Resistance Analysis of Two AES-Like Against the Boomerang Attack
35. Pass-As-You-Go: A Direct Anonymous Attestation-Based Untraceable Contactless Transit Pass
36. Towards Demystifying Adversarial Robustness of Binarized Neural Networks
37. POSTER: Optimizing Device Implementation of Linear Layers with Automated Tools
38. POSTER: Another Look at Boyar-Peralta’s Algorithm
39. Kryptonite: An Adversarial Attack Using Regional Focus
40. POSTER: LHSA: Lightweight Hardware Security Arbitrator
41. PoliCT: Flexible Policy in Certificate Transparency Enabling Lightweight Self-monitor
42. Aggregate Signature with Traceability of Devices Dynamically Generating Invalid Signatures
43. An Efficient Proactive Secret Sharing Scheme for Cloud Storage
44. Combating the OS-Level Malware in Mobile Devices by Leveraging Isolation and Steganography
45. Demand Manipulation Attack Resilient Privacy Aware Smart Grid Using PUFs and Blockchain
46. WiP: Distributed Intrusion Detection System for TCP/IP-Based Connections in Industrial Environments Using Self-organizing Maps
47. A (Bit)slice of Rainbow
48. Cryptanalysis of a Lattice-Based Group Signature with Verifier-Local Revocation Achieving Full Security
49. Attacklets to Test Anomaly Detectors for Critical Infrastructure
50. BFV, CKKS, TFHE: Which One is the Best for a Secure Neural Network Evaluation in the Cloud?
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.