![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Improving Adversarial Robustness of 3D Point Cloud Classification Models
3D point cloud classification models based on deep neural networks were proven to be vulnerable to adversarial examples, with a quantity of novel attack techniques proposed by researchers recently. It is of pa...
-
Article
Model Uncertainty Based Annotation Error Fixing for Web Attack Detection
Deep learning (DL) techniques have been widely used in web attack detection domain. With the stronger ability to fit data, DL models are also more sensitive to the training data, annotation errors can mislead ...
-
Chapter and Conference Paper
SDAC: A New Software-Defined Access Control Paradigm for Cloud-Based Systems
A cloud-based system usually runs in multiple geographically distributed datacenters, making the deployment of effective access control models extremely challenging. This paper presents a novel software-define...
-
Chapter and Conference Paper
Towards a Software-Defined Security Framework for Supporting Distributed Cloud
Cloud computing provides new facilities for building elaborated services hosted through various infrastructures over the Internet. In the meantime, these ones pose new important challenges in terms of security...
-
Chapter and Conference Paper
A DSL for Specifying Autonomic Security Management Strategies
Existing self-protection frameworks so far hardly addressed the specification of autonomic security adaptation strategies which guide risk-aware selection or reconfiguration of security mechanisms. Domain-Specifi...
-
Article
A component-based policy-neutral architecture for kernel-level access control
Protection should fundamentally be flexible for devices roaming in Beyond 3G networks. In this federation of heterogeneous access networks, each sub-network comes with its own security requirements, policies, ...
-
Chapter and Conference Paper
Brief Announcement: An OS Architecture for Device Self-protection
By introducing context-awareness in the system layer, pervasive computing is a turning point in OS design. Device mobility and dynamicity of situations raise strong challenges for run-time adaptability of embe...