MALICIOUS

作品数:83被引量:115H指数:6
导出分析报告
相关领域:自动化与计算机技术更多>>
相关机构:湖南大学清华大学更多>>
相关期刊:更多>>
相关基金:国家自然科学基金北京市自然科学基金广东省自然科学基金湖北省自然科学基金更多>>
-

检索结果分析

结果分析中...
条 记 录,以下是1-10
视图:
排序:
Defending Federated Learning System from Poisoning Attacks via Efficient Unlearning
《Computers, Materials & Continua》2025年第4期239-258,共20页Long Cai Ke Gu Jiaqi Lei 
supported in part by the National Social Science Foundation of China under Grant 20BTQ058;in part by the Natural Science Foundation of Hunan Province under Grant 2023JJ50033.
Large-scale neural networks-based federated learning(FL)has gained public recognition for its effective capabilities in distributed training.Nonetheless,the open system architecture inherent to federated learning syst...
关键词:Federated learning malicious client detection model recovery machine unlearning 
TB-Graph: Enhancing Encrypted Malicious Traffic Classification through Relational Graph Attention Networks
《Computers, Materials & Continua》2025年第2期2985-3004,共20页Ming Liu Qichao Yang Wenqing Wang Shengli Liu 
The proliferation of internet traffic encryption has become a double-edged sword. While it significantly enhances user privacy, it also inadvertently shields cyber-attacks from detection, presenting a formidable chall...
关键词:Encrypted malicious traffic classification traffic burst graph graph representation learning deep learning 
LEGF-DST:LLMs-Enhanced Graph-Fusion Dual-Stream Transformer for Fine-Grained Chinese Malicious SMS Detection
《Computers, Materials & Continua》2025年第2期1901-1924,共24页Xin Tong Jingya Wang Ying Yang Tian Peng Hanming Zhai Guangming Ling 
supported by the Fundamental Research Funds for the Central Universities(2024JKF13);the Beijing Municipal Education Commission General Program of Science and Technology(No.KM202414019003).
With the widespread use of SMS(Short Message Service),the proliferation of malicious SMS has emerged as a pressing societal issue.While deep learning-based text classifiers offer promise,they often exhibit suboptimal ...
关键词:Transformers malicious SMS multi-task learning large language models 
Malicious Document Detection Based on GGE Visualization
《Computers, Materials & Continua》2025年第1期1233-1254,共22页Youhe Wang Yi Sun Yujie Li Chuanqi Zhou 
supported by the Natural Science Foundation of Henan Province(Grant No.242300420297)awarded to Yi Sun.
With the development of anti-virus technology,malicious documents have gradually become the main pathway of Advanced Persistent Threat(APT)attacks,therefore,the development of effective malicious document classifiers ...
关键词:Malicious document VISUALIZATION EfficientNet-B0 convolutional block attention module GGE image 
Big Data & DDoS ATTACKS: A Discussion of Ensemble Algorithms to Detect Cyber Attacks
《Journal of Computer and Communications》2024年第12期246-265,共20页Anja Housden-Brooks 
The use of machine learning algorithms to identify characteristics in Distributed Denial of Service (DDoS) attacks has emerged as a powerful approach in cybersecurity. DDoS attacks, which aim to overwhelm a network or...
关键词:K-Means Clustering The KNN Algorithm PySpark Ensemble Learning Methods DDoS Attacks Veracity Malicious Traffic Alert Systems 
Robust cooperative spectrum sensing in cognitive radio blockchain network using SHA-3 algorithm
《Blockchain(Research and Applications)》2024年第4期61-69,共9页Evelyn Ezhilarasi I J.Christopher Clement 
support and facilities offered by Vellore Institute of Technology,Vellore,India,in carrying out this research.
Cognitive radio network(CRN)uses the available spectrum resources wisely.Spectrum sensing is the central element of a CRN.However,spectrum sensing is susceptible to multiple security breaches caused by malicious users...
关键词:Spectrum sensing Blockchain Cognitive radio network SHA-3 Malicious users 
Trust Score-Based Malicious Vehicle Detection Scheme in Vehicular Network Environments
《Computers, Materials & Continua》2024年第11期2517-2545,共29页Wenming Wang Zhiquan Liu Shumin Zhang Guijiang Liu 
supported the by Anhui Provincial Natural Science Foundation under Grant 2308085MF223;in part by the Open Fund of State Key Laboratory for Novel Software Technology under Grant KFKT2022B33;in part by the by the Foundation of Yunnan Key Laboratory of Service Computing under Grant YNSC23106;in part by the Key Project on Anhui Provincial Natural Science Study by Colleges and Universities under Grant 2023AH050495,2024AH051078 and Grant KJ2020A0513.
Advancements in the vehicular network technology enable real-time interconnection,data sharing,and intelligent cooperative driving among vehicles.However,malicious vehicles providing illegal and incorrect information ...
关键词:DISTRIBUTED trust mechanism vehicular network privacy protection 
A Probabilistic Trust Model and Control Algorithm to Protect 6G Networks against Malicious Data Injection Attacks in Edge Computing Environments被引量:1
《Computer Modeling in Engineering & Sciences》2024年第10期631-654,共24页Borja Bordel Sánchez Ramón Alcarria Tomás Robles 
funding by Comunidad de Madrid within the framework of the Multiannual Agreement with Universidad Politécnica de Madrid to encourage research by young doctors(PRINCE project).
Future 6G communications are envisioned to enable a large catalogue of pioneering applications.These will range from networked Cyber-Physical Systems to edge computing devices,establishing real-time feedback control l...
关键词:6G networks noise injection attacks Gaussian mixture model Bessel function traffic filter Volterra filter 
Fault-tolerant flocking control against multiple malicious agents under geometric configuration containment
《Science China(Information Sciences)》2024年第10期257-278,共22页Chencheng ZHANG Hao YANG Bin JIANG 
supported in part by National Natural Science Foundation of China (Grant Nos. 62073165, 62233009);Funding of Postgraduate Research & Practice Innovation Program of Jiangsu Province (Grant No. KYCX21-0222)。
Flocking control in the presence of malicious decisions is a crucial research topic since agents in swarms are likely to suffer from security issues in practice. This paper considers a swarm containing malicious agent...
关键词:flocking control fault-tolerant control multiple malicious agents geometric configuration 
Secure blockchain bidding auction protocol against malicious adversaries
《High-Confidence Computing》2024年第3期58-63,共6页Xiaobing Dai Jiajing Liu Xin Liu Xiaofen Tu Ruexue Wang 
supported by Inner Mongolia Natural Science Foundation(2021MS06006);2023 Inner Mongolia Young Science and Technology Talents Support Project(NJYT23106);2022 Basic Scientific Research Project of Direct Universities of Inner Mongolia(2022-101);2022 Fund Project of Central Government Guiding Local Science and Technology Development(2022ZY0024);2022 Chinese Academy of Sciences“Western Light”Talent Training Program“Western Young Scholars”Project(22040601);Open Foundation of State key Laboratory of Networking and Switching Technology(Beijing University of Posts and Telecommunications)(SKLNST-2023-1-08);Inner Mongolia Discipline Inspection and Supervision Big Data Laboratory Open Project Fund(IMDBD202020);Baotou Kundulun District Science and Technology Plan Project(YF2020013);the 14th Five Year Plan of Education and Science of Inner Mongolia(NGJGH2021167);Inner Mongolia Science and Technology Major Project(2019ZD025);2022 Inner Mongolia Postgraduate Education and Teaching Reform Project(JGSZ2022037);Inner Mongolia Postgraduate Scientific Research Innovation Project(S20231164Z);Research and Application Project of Big Data Privacy Security Computing System(2023)。
In recent years,with the development of blockchain,electronic bidding auction has received more and more attention.Aiming at the possible problems of privacy leakage in the current electronic bidding and auction,this ...
关键词:Blockchain Secure multi-party computation Electronic bidding auction Malicious model Real/ideal model paradigm 
检索报告 对象比较 聚类工具 使用帮助 返回顶部