Skip to main content

and
Your search also matched 94 preview-only Content is preview-only when you or your institution have not yet subscribed to it.

By making our abstracts and previews universally accessible we help you purchase only the content that is relevant to you.
results, e.g.

Chameleon DNN Watermarking: Dynamically Public Model Ownership Verification

Include preview-only content
  1. Book and Conference Proceedings

    Cyber Security

    17th China Annual Conference, CNCERT 2020, Bei**g, China, August 12, 2020, Revised Selected Papers

    Wei Lu, Qiaoyan Wen, Yuqing Zhang, Bo Lang, Wei** Wen in Communications in Computer and Information Science (2020)

  2. Chapter and Conference Paper

    A Survey on Cyberspace Search Engines

    This paper introduces the concept of cyberspace search engine, and makes a deep survey on 5 well-known search engines, say Shodan, Censys, BinaryEdge, ZoomEye and Fofa, by querying official websites, analyzing...

    Ruiguang Li, Meng Shen, Hao Yu, Chao Li, Pengyu Duan, Lihuang Zhu in Cyber Security (2020)

  3. Chapter and Conference Paper

    Research Status and Prospect of Blockchain Technology in Agriculture Field

    Agriculture 4.0 is the era of integrating intelligent technologies in agriculture. Problems such as low informatization, food safety, high management cost and imbalance between supply and demand in agriculture...

    Dawei Xu, Weiqi Wang, Liehuang Zhu, Ruiguang Li in Cyber Security (2020)

  4. Chapter and Conference Paper

    Crowdsourcing Under Data Poisoning Attacks: A Comparative Study

    Crowdsourcing is a paradigm that provides a cost-effective solution for obtaining services or data from a large group of users. It is increasingly being used in modern society for data collection in domains su...

    Farnaz Tahmasebian, Li **ong, Mani Sotoodeh in Data and Applications Security and Privacy… (2020)

  5. Chapter and Conference Paper

    MinerGate: A Novel Generic and Accurate Defense Solution Against Web Based Cryptocurrency Mining Attacks

    Web-based cryptocurrency mining attacks, also known as cryptojacking, become increasingly popular. A large number of diverse platforms (e.g., Windows, Linux, Android, and iOS) and devices (e.g., PC, smartphone...

    Guorui Yu, Guangliang Yang, Tongxin Li, **nhui Han, Shijie Guan in Cyber Security (2020)

  6. Chapter and Conference Paper

    Non-malleable Codes, Extractors and Secret Sharing for Interleaved Tampering and Composition of Tampering

    Non-malleable codes were introduced by Dziembowski, Pietrzak, and Wichs (JACM 2018) as a generalization of standard error correcting codes to handle severe forms of tampering on codewords. This notion has attr...

    Eshan Chattopadhyay, **n Li in Theory of Cryptography (2020)