Alireza Hafez,Dorsa Nahid,Majid Khabbazian
Alireza Hafez
Nearly all modern smartphones are now equipped with a barometer to sample air pressure. Accessing these samples is deemed harmless, hence does not require permission. In this work, we demonstrate that barometer samples can reveal sensitive ...
Study of smart grid cyber-security, examining architectures, communication networks, cyber-attacks, countermeasure techniques, and challenges [0.03%]
智能电网网络安全研究:体系结构、通信网络、黑客攻击、防范技术及挑战分析
Batoul Achaal,Mehdi Adda,Maxime Berger et al.
Batoul Achaal et al.
Smart Grid (SG) technology utilizes advanced network communication and monitoring technologies to manage and regulate electricity generation and transport. However, this increased reliance on technology and connectivity also introduces new ...
Rainbow: reliable personally identifiable information retrieval across multi-cloud [0.03%]
可靠的跨多云的个人识别信息检索技术
Zishuai Song,Hui Ma,Shuzhou Sun et al.
Zishuai Song et al.
Personally identifiable information (PII) refers to any information that links to an individual. Sharing PII is extremely useful in public affairs yet hard to implement due to the worries about privacy violations. Building a PII retrieval s...
Tackling imbalanced data in cybersecurity with transfer learning: a case with ROP payload detection [0.03%]
利用迁移学习解决网络安全中的不平衡数据问题:以ROP载荷检测为例
Haizhou Wang,Anoop Singhal,Peng Liu
Haizhou Wang
In recent years, deep learning gained proliferating popularity in the cybersecurity application domain, since when being compared to traditional machine learning methods, it usually involves less human efforts, produces better results, and ...
Phishing website prediction using base and ensemble classifier techniques with cross-validation [0.03%]
使用基分类器和集成分类器技术带交叉验证的网络钓鱼网站预测
Anjaneya Awasthi,Noopur Goel
Anjaneya Awasthi
Internet or public internetwork has become a vulnerable place nowadays as there are so many threats available for the novice or careless users because there exist many types of tools and techniques being used by notorious people on it to vi...
Study of methods for endpoint aware inspection in a next generation firewall [0.03%]
面向下一代防火墙的终点感知检测方法研究
Jenny Heino,Antti Hakkala,Seppo Virtanen
Jenny Heino
Given the global increase in remote work with the COVID-19 pandemic and deperimeterization due to cloud deployment of next generation firewalls, the concept of a next generation firewall is at a breaking point. It is becoming more difficult...
Sarve: synthetic data and local differential privacy for private frequency estimation [0.03%]
Sarve:用于私有频率估计的合成数据和本地差异隐私技术
Gatha Varma,Ritu Chauhan,Dhananjay Singh
Gatha Varma
The collection of user attributes by service providers is a double-edged sword. They are instrumental in driving statistical analysis to train more accurate predictive models like recommenders. The analysis of the collected user data includ...
Sharma Sagar,Chen Keke
Sharma Sagar
With the ever-growing data and the need for developing powerful machine learning models, data owners increasingly depend on various untrusted platforms (e.g., public clouds, edges, and machine learning service providers) for scalable proces...