中国机械工程学会生产工程分会知识服务平台

会议文集


文集名Computer Security - ESORICS 2025
会议名30th European Symposium on Research in Computer Security (ESORICS 2025)
中译名《第三十届欧洲计算机安全研究专题研讨会,卷1》
会议日期September 22-24, 2025
会议地点Toulouse, France
出版年2026
馆藏号359411


题名作者出版年
Time-Distributed Backdoor Attacks on Federated Spiking LearningGorka Abad; Stjepan Picek; Aitor Urbieta2026
TATA: Benchmark NIDS Test Sets Assessment and Targeted AugmentationOmar Anser; Jerome Francois; Isabelle Chrisment; Daishi Kondo2026
Abuse-Resistant Evaluation of AI-as-a-Service via Function-Hiding Homomorphic SignaturesNuttapong Attrapadung; Goichiro Hanaoaka; Ryo Hiromasa; Yoshihiro Koseki; Takahiro Matsuda; Yutaro Nishida; Yusuke Sakai; Jacob C. N. Schuldt; Satoshi Yasuda2026
PriSM: A Privacy-Friendly Support Vector MachineMichele Barbato; Alberto Ceselli; Sabrina De Capitani di Vimercati; Sara Foresti; Pierangela Samarati2026
Towards Context-Aware Log Anomaly Detection Using Fine-Tuned Large Language ModelsHugo Breniaux; Djedjiga Mouheb2026
PROTEAN: Federated Intrusion Detection in Non-IID Environments Through Prototype-Based Knowledge SharingSara Chennoufi; Yufei Han; Gregory Blanc; Emiliano De Cristofaro; Christophe Kiennert2026
KeTS: Kernel-Based Trust Segmentation Against Model Poisoning AttacksAnkit Gangwal; Mauro Conti; Tommaso Pauselli2026
Machine Learning Vulnerabilities in 6G: Adversarial Attacks and Their Impact on Channel Gain Prediction and Resource Allocation in UC-CFmMIMOMahmoud Ghorbel; Selina Cheggour; Valeria Loscri; Youcef Imine; Hamza Ouarnoughi; Smail Niar2026
FuncVul: An Effective Function Level Vulnerability Detection Model Using LLM and Code ChunkSajal Halder; Muhammad Ejaz Ahmed; Seyit Camtepe2026
LUMIA: Linear Probing for Unimodal and MultiModal Membership Inference Attacks Leveraging Internal LLM StatesLuis Ibanez-Lissen; Lorena Gonzalez-Manzano; Jose Maria de Fuentes; Nicolas Anciaux; Joaquin Garcia-Alfaro2026
Membership Privacy Evaluation in Deep Spiking Neural NetworksJiaxin Li; Gorka Abad; Stjepan Picek; Mauro Conti2026
DUMB and DUMBer: Is Adversarial Training Worth It in the Real World?Francesco Marchiori; Marco Alecci; Luca Pajola; Mauro Conti2026
Countering Jailbreak Attacks with Two-Axis Pre-detection and Conditional Warning WrappersHyunsik Na; Hajun Kim; Dooshik Yoon; Daeseon Choi2026
How Dataset Diversity Affects Generalization in ML-Based NIDSBenoit Nougnanke; Gregory Blanc; Thomas Robert2026
Llama-Based Source Code Vulnerability Detection: Prompt Engineering vs Fine TuningDyna Soumhane Ouchebara; Stephane Dupont2026
DBBA: Diffusion-Based Backdoor Attacks on Open-Set Face Recognition ModelsFuqi Qi; Haichang Gao; Boling Li; Guangyu He; Yuhong Zhang; Jiacheng Luo2026
Evaluation of Autonomous Intrusion Response Agents in Adversarial and Normal ScenariosMatthew Reaney; Kieran McLaughlin; Sandra Scott-Hayward2026
Trigger-Based Fragile Model Watermarking for Image Transformation NetworksPreston K. Robinette; Thuy Dung Nguyen; Samuel Sasaki; Taylor T. Johnson2026
Let the Noise Speak: Harnessing Noise for a Unified Defense Against Adversarial and Backdoor AttacksMd Hasan Shahriar; Ning Wang; Naren Ramakrishnan; Y. Thomas Hou; Wenjing Lou2026
On the Adversarial Robustness of Graph Neural Networks with Graph ReductionKerui Wu; Ka-Ho Chow; Wenqi Wei; Lei Yu2026
12