We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 101-120 of 2,529 results
  1. Reporting

    An assessment is only as good as its report. The report is your final opportunity to communicate the value that your team produced for the client....
    Michael Butler, Jacob G. Oakley in The Business of Hacking
    Chapter 2024
  2. Operational Management

    The execution of offensive cybersecurity projects requires a coordinated team, communication with the client, and a properly prepared project. Each...
    Michael Butler, Jacob G. Oakley in The Business of Hacking
    Chapter 2024
  3. The Wedge

    Your team has conducted a world-class assessment. They communicated with the client throughout the whole process, so the client is thoroughly aware...
    Michael Butler, Jacob G. Oakley in The Business of Hacking
    Chapter 2024
  4. Application of Lattice-Based Unique Ring Signature in Blockchain Transactions

    Ring signature schemes provide anonymity but suffer from the double-spending problem if uncontrolled overused in blockchain transactions. In the...
    Fengyin Li, Junhui Wang, ... **long Yu in Artificial Intelligence Security and Privacy
    Conference paper 2024
  5. Email Reading Behavior-Informed Machine Learning Model to Predict Phishing Susceptibility

    As phishing threats intensify, incidents like the “COVID-19 vaccination form” phishing website underscore the limitations of relying solely on...
    Ning Xu, Jiluan Fan, Zikai Wen in Artificial Intelligence Security and Privacy
    Conference paper 2024
  6. A Privacy-Preserving Face Recognition Scheme Combining Homomorphic Encryption and Parallel Computing

    Face recognition technology is widely used in various fields, such as law enforcement, payment systems, transportation, and access control....
    Gong Wang, **anghan Zheng, ... Weipeng **e in Artificial Intelligence Security and Privacy
    Conference paper 2024
  7. An Image Copyright Authentication Model Based on Blockchain and Digital Watermark

    To solve the problems of digital image leakage and tampering as well as the low imperceptibility of watermarking algorithms in the traditional...
    Conference paper 2024
  8. Member Inference Attacks in Federated Contrastive Learning

    In the past, the research community has studied privacy issues in federated learning, self-supervised learning, and deep models. However, privacy...
    Zixin Wang, Bing Mi, Kongyang Chen in Artificial Intelligence Security and Privacy
    Conference paper 2024
  9. Digital Watermarking: Pathway to Secure!

    The progression in information technology has led to some thoughtful anxieties about the piracy and exclusive rights of digital content. The...
    Chapter 2024
  10. Secure Position-Aware Graph Neural Networks for Session-Based Recommendation

    Session-based recommendation, a specific type of recommendation system, leverages users’ interaction sequences to provide recommendations....
    Hongzhe Liu, Fengyin Li, Huayu Cheng in Artificial Intelligence Security and Privacy
    Conference paper 2024
  11. Using the SGE-CGAM Method to Address Class Imbalance Issues in Network Intrusion Detection

    Network Intrusion Detection Systems (NIDS) play a crucial role in safeguarding network security and data integrity. Nevertheless, the challenge of...
    Conference paper 2024
  12. Design of a Fast Recognition Method for College Students’ Classroom Expression Images Based on Deep Learning

    The expressions of students in class will directly reflect their classroom state. Therefore, this paper proposes a fast recognition method for...
    **yun Jiang, Jia Yu, Luying Min in Artificial Intelligence Security and Privacy
    Conference paper 2024
  13. A Graph-Based Vertical Federation Broad Learning System

    A broad learning system is a lightweight deep neural network with breadth expansion, which is widely used in face recognition, error detection, and...
    Junrong Ge, Fengyin Li, ... Liangna Sun in Artificial Intelligence Security and Privacy
    Conference paper 2024
  14. EPoLORE: Efficient and Privacy Preserved Logistic Regression Scheme

    Logistic regression, as one of the classification method, is widely used in machine learning. Due to the complexity of training process, outsourcing...
    Wendan Zhang, Yuhong Sun, ... Chen Zhang in Artificial Intelligence Security and Privacy
    Conference paper 2024
  15. Secured Digital Watermarking Using Neural Networks

    Neural network has evolved as a technological breakthrough that has the potential to solve hard computational complexity. In the recent past, the...
    Purba Pal, Sharmila Ghosh, ... Joy Lal Sarkar in Multimedia Watermarking
    Chapter 2024
  16. Advances in Privacy Preservation Technologies

    The rapid development of information technology and the continuous evolution of new business paradigms and personalized services have promoted...
    Fenghua Li, Hui Li, Ben Niu in Privacy Computing
    Chapter 2024
  17. The Future Development Trends of Privacy Computing

    We propose to abstract, condense, and foresee the future development trends of privacy computing from three aspects: the research scope of privacy...
    Fenghua Li, Hui Li, Ben Niu in Privacy Computing
    Chapter 2024
  18. Behavior-Based Detection Method for Android Malware

    The behavior-based Android malware detection method is a method that detects the presence of malicious behavior by observing and analyzing the...
    Weina Niu, **aosong Zhang, ... Jiacheng Gong in Android Malware Detection and Adversarial Methods
    Chapter 2024
  19. Menschen und andere Crown Jewels

    Krisenmanagement erfordert das Setzen von Schwerpunkten. Je nach Ausrichtung der Organisation auf Geschäftsfelder, auf Regionen oder auf Produkte –...
    Holger Kaschner in Cyber Crisis Management
    Chapter 2024
  20. Cyber Crisis Preparation

    Ziel und Zweck vorbereitender Maßnahmen ist, die Effizienz der Krisenbewältigung zu steigern. Sämtliche Lösungen erst unter dem unmittelbaren Druck...
    Holger Kaschner in Cyber Crisis Management
    Chapter 2024
Did you find what you were looking for? Share feedback.