中国机械工程学会生产工程分会知识服务平台
主页
文献资源
外文期刊
外文会议
中文期刊
专业机构
生产工程
智能制造
高级检索
关于我们
版权声明
使用帮助
会议文集
文集名
Computer Security - ESORICS 2025
会议名
30th European Symposium on Research in Computer Security (ESORICS 2025)
中译名
《第三十届欧洲计算机安全研究专题研讨会,卷1》
会议日期
September 22-24, 2025
会议地点
Toulouse, France
出版年
2026
馆藏号
359411
题名
作者
出版年
Time-Distributed Backdoor Attacks on Federated Spiking Learning
Gorka Abad; Stjepan Picek; Aitor Urbieta
2026
TATA: Benchmark NIDS Test Sets Assessment and Targeted Augmentation
Omar Anser; Jerome Francois; Isabelle Chrisment; Daishi Kondo
2026
Abuse-Resistant Evaluation of AI-as-a-Service via Function-Hiding Homomorphic Signatures
Nuttapong Attrapadung; Goichiro Hanaoaka; Ryo Hiromasa; Yoshihiro Koseki; Takahiro Matsuda; Yutaro Nishida; Yusuke Sakai; Jacob C. N. Schuldt; Satoshi Yasuda
2026
PriSM: A Privacy-Friendly Support Vector Machine
Michele Barbato; Alberto Ceselli; Sabrina De Capitani di Vimercati; Sara Foresti; Pierangela Samarati
2026
Towards Context-Aware Log Anomaly Detection Using Fine-Tuned Large Language Models
Hugo Breniaux; Djedjiga Mouheb
2026
PROTEAN: Federated Intrusion Detection in Non-IID Environments Through Prototype-Based Knowledge Sharing
Sara Chennoufi; Yufei Han; Gregory Blanc; Emiliano De Cristofaro; Christophe Kiennert
2026
KeTS: Kernel-Based Trust Segmentation Against Model Poisoning Attacks
Ankit Gangwal; Mauro Conti; Tommaso Pauselli
2026
Machine Learning Vulnerabilities in 6G: Adversarial Attacks and Their Impact on Channel Gain Prediction and Resource Allocation in UC-CFmMIMO
Mahmoud Ghorbel; Selina Cheggour; Valeria Loscri; Youcef Imine; Hamza Ouarnoughi; Smail Niar
2026
FuncVul: An Effective Function Level Vulnerability Detection Model Using LLM and Code Chunk
Sajal Halder; Muhammad Ejaz Ahmed; Seyit Camtepe
2026
LUMIA: Linear Probing for Unimodal and MultiModal Membership Inference Attacks Leveraging Internal LLM States
Luis Ibanez-Lissen; Lorena Gonzalez-Manzano; Jose Maria de Fuentes; Nicolas Anciaux; Joaquin Garcia-Alfaro
2026
Membership Privacy Evaluation in Deep Spiking Neural Networks
Jiaxin Li; Gorka Abad; Stjepan Picek; Mauro Conti
2026
DUMB and DUMBer: Is Adversarial Training Worth It in the Real World?
Francesco Marchiori; Marco Alecci; Luca Pajola; Mauro Conti
2026
Countering Jailbreak Attacks with Two-Axis Pre-detection and Conditional Warning Wrappers
Hyunsik Na; Hajun Kim; Dooshik Yoon; Daeseon Choi
2026
How Dataset Diversity Affects Generalization in ML-Based NIDS
Benoit Nougnanke; Gregory Blanc; Thomas Robert
2026
Llama-Based Source Code Vulnerability Detection: Prompt Engineering vs Fine Tuning
Dyna Soumhane Ouchebara; Stephane Dupont
2026
DBBA: Diffusion-Based Backdoor Attacks on Open-Set Face Recognition Models
Fuqi Qi; Haichang Gao; Boling Li; Guangyu He; Yuhong Zhang; Jiacheng Luo
2026
Evaluation of Autonomous Intrusion Response Agents in Adversarial and Normal Scenarios
Matthew Reaney; Kieran McLaughlin; Sandra Scott-Hayward
2026
Trigger-Based Fragile Model Watermarking for Image Transformation Networks
Preston K. Robinette; Thuy Dung Nguyen; Samuel Sasaki; Taylor T. Johnson
2026
Let the Noise Speak: Harnessing Noise for a Unified Defense Against Adversarial and Backdoor Attacks
Md Hasan Shahriar; Ning Wang; Naren Ramakrishnan; Y. Thomas Hou; Wenjing Lou
2026
On the Adversarial Robustness of Graph Neural Networks with Graph Reduction
Kerui Wu; Ka-Ho Chow; Wenqi Wei; Lei Yu
2026
1
2
国家科技图书文献中心
全球文献资源网
京ICP备05055788号-26
京公网安备11010202008970号 机械工业信息研究院 2018-2026