researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
OR
AND
NOT
1
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
Filter by Tag
Filter by Author
[+]
OR
AND
NOT
1
Arshad Jhumka
Chen Cheng
Dan Meng
Guojun Wang
Jie Zhang
Kim-Kwang Raymond Choo
Konstantinos Markantonakis
Lei Ju
Lexi Xu
Lirong Wang
Priyadarsi Nanda
Raja Naeem Akram
Ryan K. L. Ko
Vijay Varadharajan
Xiangjian He
Xinzhou Cheng
Yang Liu
Yongzheng Zhang 0002
Zheng Yan
Zhiping Jia
Filter by Top terms
[+]
OR
AND
NOT
1
algorithm
analysis
cloud
data
detection
efficient
learning
method
model
multi
network
networks
preserving
privacy
scheme
secure
security
system
trust
using
TrustCom (trustcom)
Editions
Publications
Viewing Publication 1 - 100 from 3493
2024
A Reliable Edge Server Deployment Algorithm Based on Spectral Clustering and a Deep Q-network Strategy using Multi-objective Optimization
Zhou Zhou 0001
,
Taotao Yu
,
Mohammad Shojafar
,
Xia Ou
,
Hongbing Cheng
.
trustcom 2024
:
2447-2452
[doi]
Data Privacy-Preserving and Communication Efficient Federated Multilinear Compressed Learning
Di Xiao 0001
,
Zhuyan Yang
,
Maolan Zhang
,
Lvjun Chen
.
trustcom 2024
:
1472-1479
[doi]
A Reliable Encrypted Traffic Classification Method Based on Attention Mechanisms
Zhijun Wu 0001
,
Shanhe Niu
,
Meng Yue
.
trustcom 2024
:
1286-1295
[doi]
Efficient and Verifiable Dynamic Skyline Queries in Blockchain Networks
Bo Yin 0004
,
Hang Chen
,
Binyao Xu
,
Mariam Suleiman Silima
,
Ke Gu 0002
.
trustcom 2024
:
1551-1556
[doi]
LightRL-AD: A Lightweight Online Reinforcement Learning Approach for Autonomous Defense against Network Attacks
Fengyuan Shi 0005
,
Zhou Zhou 0007
,
Jiang Guo
,
Renjie Li
,
Zhongyi Zhang
,
Shu Li
,
Qingyun Liu 0001
,
Xiuguo Bao
.
trustcom 2024
:
1614-1621
[doi]
Blind Signature Based Anonymous Authentication on Trust for Decentralized Mobile Crowdsourcing
Wei Feng 0010
,
Dongyuan Wei
,
Qianqian Wang 0001
.
trustcom 2024
:
49-56
[doi]
Single-sign-on Authentication with Anonymous Token and Restricted Covert Channel
Zhao Zhang 0026
,
Chunxiang Xu
,
Man Ho Allen Au
.
trustcom 2024
:
1413-1422
[doi]
23rd IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024
IEEE,
2024.
[doi]
AdvPurRec: Strengthening Network Intrusion Detection with Diffusion Model Reconstruction Against Adversarial Attacks
Nour Alhussien
,
Ahmed AlEroud
.
trustcom 2024
:
1638-1646
[doi]
*
Naila Azam
,
Alex Chak
,
Anna Lito Michala
,
Shuja Ansari
,
Nguyen Binh Truong
.
trustcom 2024
:
2060-2067
[doi]
NLP and Neural Networks for Insider Threat Detection
Neda Baghalizadeh-Moghadam
,
Christopher Neal
,
Frédéric Cuppens
,
Nora Boulahia-Cuppens
.
trustcom 2024
:
2010-2018
[doi]
IoT Vulnerability Detection using Featureless LLM CyBert Model
Sarah Binhulayyil
,
Shancang Li
,
Neetesh Saxena
.
trustcom 2024
:
2474-2480
[doi]
Analyzing the Effectiveness of Image Preprocessing Defenses Under Runtime Constraints
Niklas Bunzel
,
Gerrit Klause
.
trustcom 2024
:
994-999
[doi]
HTV: Measuring Circuit Vulnerability to Hardware Trojan Insertion Based on Node Co-activation Analysis
Shuiliang Chai
,
Zhanhui Shi
,
Yanjiao Gao
,
Yuhao Huang
,
Aizhu Liu
,
Jie Xiao 0003
.
trustcom 2024
:
1589-1594
[doi]
FCSec: An Open-source Testbed for Security Evaluation on UAV Communications
Indu Chandran
,
Mukesh Narayana Gadde
,
Kizheppatt Vipin
.
trustcom 2024
:
1217-1224
[doi]
T-ABE: A practical ABE scheme to provide trustworthy key hosting on untrustworthy cloud
Shuaishuai Chang
,
Yuzhe Li
,
Jinchao Zhang
,
Bo Li 0063
.
trustcom 2024
:
960-967
[doi]
Improved Rectangle and Linear Attacks on Lightweight Block Cipher WARP
Yaxin Cui
,
Hong Xu 0008
,
Zhichao Xu
.
trustcom 2024
:
1797-1802
[doi]
A Dual Defense Design Against Data Poisoning Attacks in Deep Learning-Based Recommendation Systems
Xiaocui Dang
,
Priyadarsi Nanda
,
Manoranjan Mohanty
,
Haiyu Deng
.
trustcom 2024
:
2115-2122
[doi]
DMA: A Persistent Threat to Embedded Systems Isolation
Jean de Bonfils Lavernelle
,
Pierre-François Bonnefoi
,
Benoît Gonzalvo
,
Damien Sauveron
.
trustcom 2024
:
101-108
[doi]
Three-Body Problem: An Empirical Study on Smartphone-based TEEs, TEE-based Apps, and their Interactions
Xianghui Dong
,
Yin Liu
,
Xuejun Yu
.
trustcom 2024
:
968-977
[doi]
SCENE: Shape-based Clustering for Enhanced Noise-resilient Encrypted Traffic Classification
Meijie Du
,
Mingqi Hu
,
Shu Li
,
Zhao Li 0010
,
Qingyun Liu 0001
.
trustcom 2024
:
306-315
[doi]
Distributed Data Possession - Blockchain Based Scalability
Bartlomiej Dzikowski
,
Lukasz Krzywiecki
,
Ksawery Mozdzynski
,
Karol Niczyj
,
Hannes Salin
.
trustcom 2024
:
2523-2528
[doi]
Hierarchical Graph Feature Extraction Based on Multi-Information Contract Graph for Enhanced Smart Contract Vulnerability Detection
Tao Fang
,
Zhihao Hou
,
Jiahao He
,
Junjie Zhou
,
Gansen Zhao
.
trustcom 2024
:
1604-1613
[doi]
Designing Secret Embedding Scheme Based on Bitcoin Transactions Pattern Controlling
Zheng Feng
,
Chunyu Xing
,
Chen Liang
.
trustcom 2024
:
1007-1014
[doi]
Deepfakes: A New Kind of Adversarial Attacks Against Face Recognition Systems?
Raphael Antonius Frick
,
Lukas Graner
.
trustcom 2024
:
2462-2467
[doi]
RTM-CMD: Exploring Advanced Underground Target Detection in Coal Mines through Modified RTMDET Methodology
Longlong Gao
,
Tao Xue
,
Long Xi
.
trustcom 2024
:
2612-2618
[doi]
AI empowered senstive information detection and anonymisation in PDF files
Zheng Gao
,
Hongping Li
.
trustcom 2024
:
2481-2485
[doi]
Contextual Transformer-based Node Embedding for Vulnerability Detection using Graph Learning
Joseph Gear
,
Yue Xu 0001
,
Ernest Foo
,
Praveen Gauravaram
,
Zahra Jadidi
,
Leonie Simpson
.
trustcom 2024
:
2031-2038
[doi]
MIND: A Privacy-Preserving Model Inference Framework via End-Cloud Collaboration
Siyuan Guan
,
Ziheng Hu
,
Guotao Xu
,
Yao Zhu
,
Bowen Zhao
.
trustcom 2024
:
582-589
[doi]
Enhancing Graph-Based Vulnerability Detection through Standardized Deep Learning Pipelines
Jiashun Hao
,
Young-Woo Kwon 0001
.
trustcom 2024
:
1231-1238
[doi]
SPDID: A Secure and Privacy-Preserving Decentralized Identity utilizing Blockchain and PUF
Yueyue He
,
Wenxuan Fan
,
Koji Inoue
.
trustcom 2024
:
1622-1631
[doi]
Robust Hardware Trojan Detection: Conventional Machine Learning vs. Graph Learning Approaches
Liang Hong
,
Xingguo Guo
,
Zeyar Aung
,
Wei Hu 0008
.
trustcom 2024
:
1572-1579
[doi]
A LLM-based agent for the automatic generation and generalization of IDS rules
Xiaowei Hu
,
Haoning Chen
,
Huaifeng Bao
,
Wen Wang 0008
,
Feng Liu 0001
,
Guoqiao Zhou
,
Peng Yin
.
trustcom 2024
:
1875-1880
[doi]
LLM4MDG: Leveraging Large Language Model to Construct Microservices Dependency Graph
Jiekang Hu
,
Yakai Li
,
Zhaoxi Xiang
,
Luping Ma
,
Xiaoqi Jia
,
Qingjia Huang
.
trustcom 2024
:
859-869
[doi]
Malware Traffic Classification Based on Multidimensional Features Learning
Yijie Huang
,
Wei Ding
,
Mian Huang
.
trustcom 2024
:
1963-1971
[doi]
Privacy-Preserving Secure Neighbor Discovery for Wireless Networks
Ahmed Mohamed Hussain
,
Panos Papadimitratos
.
trustcom 2024
:
1310-1319
[doi]
Privacy-Preserving Real-Time Gesture Recognition using Cloud-Trained Neural Networks
Kewin Ignasiak
,
Wojciech Kowalczyk
,
Lukasz Krzywiecki
,
Mateusz Nasewicz
,
Hannes Salin
,
Marcin Zawada
.
trustcom 2024
:
2388-2393
[doi]
RAG-based Cyber Threat Tracing Graph Modeling Method
Jong Hee Jeon
,
Jahoon Koo
,
Young-Gab Kim
.
trustcom 2024
:
608-615
[doi]
StrucTrans: Zero-Query Structural Adversarial Attack Transferred from Masked Autoencoders to Image Classifiers
Yi Ji
,
Isao Echizen
.
trustcom 2024
:
870-879
[doi]
WaShadow: Effectively Protecting WebAssembly Memory Through Virtual Machine-Aware Shadow Memory
Zhuochen Jiang
,
Baojian Hua
.
trustcom 2024
:
222-233
[doi]
WhisperMQTT: Lightweight Secure Communication Scheme for Subscription-Heavy MQTT Network
Youbin Kim
,
Man-Ki Yoon
.
trustcom 2024
:
1276-1285
[doi]
Transfer Learning-Based Robust Insider Threat Detection
Yujun Kim
,
Deok-Han Kim
,
Young-Gab Kim
.
trustcom 2024
:
2287-2292
[doi]
A Method for Quantitative Object De-Identification Analysis of Anonymized Video
Deok-Han Kim
,
Yujun Kim
,
Young-Gab Kim
.
trustcom 2024
:
2221-2226
[doi]
Privacy Preservation in Cloud-Based Distributed Learning through Data Encoding and Partitioning
Lukasz Krzywiecki
,
Krzysztof Szymaniak
,
Marcin Zawada
.
trustcom 2024
:
2424-2429
[doi]
Detectable Mislabeling - Can Faulty AI Models be Recognized from Incomplete Memory Traces?
Lukasz Krzywiecki
,
Tadeusz Kulczycki
,
Christian Emmanuel Nteranya
,
Andrzej Stos
.
trustcom 2024
:
2382-2387
[doi]
Red Team Redemption: A Structured Comparison of Open-Source Tools for Adversary Emulation
Max Landauer
,
Klaus Mayer
,
Florian Skopik
,
Markus Wurzenberger
,
Manuel Kern
.
trustcom 2024
:
117-128
[doi]
A Lightweight Privacy-Preserving and Verifiable Federated Learning-Based Protocol
Jiaqi Lei
,
Ke Gu
,
Long Cai
.
trustcom 2024
:
2394-2399
[doi]
GraySniffer: A Cliques Discovering Method for Illegal SIM Card Vendor Based on Multi-Source Data
Tao Leng
,
Chang You
,
Shuangchun Luo
,
Junyi Liu
,
Yutong Zeng
,
Cheng Huang
.
trustcom 2024
:
316-325
[doi]
EffiTaint: Boosting Sensitive Data Tracking with Accurate Taint Behavior Modeling and Efficient Access Path Optimization
Haocheng Li
,
Haipeng Qu
,
Gaozhou Wang
,
Xiangjian Ge
.
trustcom 2024
:
1397-1404
[doi]
Multiplicative Masked M&M: An Attempt at Combined Countermeasures with Reduced Randomness
Kaiyuan Li
,
Haruka Hirata
,
Daiki Miyahara
,
Kazuo Sakiyama
,
Yuko Hara
,
Yang Li 0001
.
trustcom 2024
:
726-733
[doi]
DUDPA-TATD: A Lightweight Privacy-Preserving Anomaly Traffic Detection Method for Edge Computing Scenarios
Guanghan Li
,
Wenzhong Yang
,
Xiaodan Tian
,
Jiaren Peng
.
trustcom 2024
:
1741-1748
[doi]
2FL: Dimensional Disaster-oriented Backdoor Attack Defense Of Federated Learning
Yilong Li
,
Jianyi Zhang
,
Ziyin Zhou
,
Zezheng Sun
,
Xu Ji
,
Zeping Li
,
Jiameng Han
,
Zhangchi Zhao
.
trustcom 2024
:
1790-1796
[doi]
Attack Data is Not Solely Paramount: A Universal Model Extraction Enhancement Method
Chuang Liang
,
Jie Huang 0016
.
trustcom 2024
:
1666-1674
[doi]
A Quiet Place: An In-Depth Study of Mobile Public-to-Private Attacks
Yin Liu
.
trustcom 2024
:
1405-1412
[doi]
Investigating Patterns of Adversarial Techniques for Cyberattack Forensics
Liming Lu
,
Zhenlin Yu
,
Peter Kok Keong Loh
,
Tuhin Isfaque Al Kaderi
.
trustcom 2024
:
2262-2268
[doi]
OFLGI: An Optimization-based Feature-Level Gradient Inversion Attack
Yongwei Lu
,
Xiaoyan Liang
,
Ruizhong Du
,
Junfeng Tian
.
trustcom 2024
:
197-204
[doi]
A Blockchain-based PHR Sharing Scheme with Attribute Privacy Protection
Chaohe Lu
,
Zhongyuan Yu
,
Guijuan Wang
,
Anming Dong
,
Xiang Tian 0005
.
trustcom 2024
:
2068-2077
[doi]
Trustworthy Approaches to RSA: Efficient Exploitation Strategies Based on Common Modulus
Mahdi Mahdavi
,
Navid Abapour
,
Zahra Ahmadian
.
trustcom 2024
:
2535-2540
[doi]
Trustworthy Analysis of Drain3-based Cold Storage Behavior in Judicial Depository Scenarios
Xiangyu Meng
,
Xuejun Yu
.
trustcom 2024
:
1809-1816
[doi]
Discriminating Malware Families using Partitional Clustering
Pooja Mishra
,
Paul Black
,
Adil Bagirov
,
Shaoning Pang
.
trustcom 2024
:
2256-2261
[doi]
Compressed Video Action Recognition Based on Neural Video Compression
Yuting Mou
,
Ke Xu 0003
,
Xinghao Jiang
,
Tanfeng Sun
.
trustcom 2024
:
2244-2249
[doi]
Improving Security in Internet of Medical Things through Hierarchical Cyberattacks Classification
Vince Noort
,
Nhien-An Le-Khac
,
Hong-Hanh Nguyen-Le
.
trustcom 2024
:
1304-1309
[doi]
Destruction and Reconstruction Chain: An Adaptive Adversarial Purification Framework
Zeshan Pang
,
Shasha Guo
,
Xuehu Yan
,
Yuliang Lu
.
trustcom 2024
:
2336-2341
[doi]
A Self-Adaptive Framework for Responding to Uncertainty in Access Control Process with Deep Neural Networks
JiHoon Park
,
Giluk Kang
,
Young-Gab Kim
.
trustcom 2024
:
1863-1868
[doi]
CFE: Secure Filtered Words in End-to-End Encrypted Messaging System
Tran Viet Xuan Phuong
,
Albert Baker
,
Philip D. Huff
,
Jan P. Springer
,
Tho Thi Ngoc Le
.
trustcom 2024
:
1458-1465
[doi]
A Novel Approach to Network Traffic Analysis: the HERA tool
Daniela Pinto
,
Ivone Amorim
,
Eva Maia
,
Isabel Praça
.
trustcom 2024
:
1850-1856
[doi]
VisualAuth: Secure Transaction Authentication and Trusted UI on COTS Android Devices
Mykolai Protsenko
,
Albert Stark
,
Andreas Papon
,
Sandra Kostic
.
trustcom 2024
:
129-140
[doi]
Dynamic Differential Privacy in Hierarchical Federated Learning: A Layerwise Adaptive Framework
Zhongyuan Qin
,
Dinglian Wang
,
Minghua Wang
.
trustcom 2024
:
2207-2212
[doi]
Attack-Defense Graph Generation: Instantiating Incident Response Actions on Attack Graphs
Kéren Saint-Hilaire
,
Christopher Neal
,
Frédéric Cuppens
,
Nora Boulahia-Cuppens
,
Francesca Bassi
.
trustcom 2024
:
295-305
[doi]
Anticipated Failure Determination-based Weakness Analysis with Common Weakness Enumeration
Toru Sakon
.
trustcom 2024
:
2627-2634
[doi]
Privacy-aware data aggregation using Functional Encryption
Sehrish Shafeeq
,
Mathias Fischer 0001
.
trustcom 2024
:
2159-2168
[doi]
A Revocable Pairing-Free Certificateless Signature Scheme Based on RSA Accumulator
Zhuowei Shen
,
Xiao Kou
,
Taiyao Yang
,
Haoqin Xu
,
Dongbin Wang
,
Shaobo Niu
.
trustcom 2024
:
149-156
[doi]
WAPITI - A Weighted Bayesian Method for Private Information Inference on Social Ego Networks
Hervais Simo
,
Michael Kreutzer 0001
.
trustcom 2024
:
2269-2280
[doi]
Cyber Risk Analysis on Electric Vehicle Systems via NIST CSF
Spyridon Sourmelis
,
Weizhi Meng
.
trustcom 2024
:
378-386
[doi]
A Defensive Framework Against Adversarial Attacks on Machine Learning-Based Network Intrusion Detection Systems
Benyamin Tafreshian
,
Shengzhi Zhang
.
trustcom 2024
:
2436-2441
[doi]
Research on Energy Management Strategy of Microgrid Based on Improved Deep Q network Algorithm
Le Tian
,
ChangShen Ou
,
Weilin Huang
.
trustcom 2024
:
2694-2700
[doi]
An Automated PM2.5 Analysis and Prediction System with Encoder-Decoder Architecture and Continual Learning Mechanism
Le Anh Duc Vu
,
Minh Hai Vu
,
Bao Ngoc Tran
,
Minh Tung Hoang
,
Duc Anh Nguyen
,
Minh-Quan Hoang
,
Phi-Le Nguyen
.
trustcom 2024
:
2661-2668
[doi]
BGAS: Blockchain and Group Decentralized Identifiers Assisted Authentication Scheme for UAV Networks
Tingyu Wang
,
Qiang Cao 0006
,
Shihong Zou
,
Yueming Lu
.
trustcom 2024
:
1326-1335
[doi]
Machine Learning-based Optimal Data Trading Mechanism with Randomized Privacy Protection Scheme
Xiaohong Wu
,
Yujun Lin
,
Jie Tao 0001
,
Yonggen Gu
.
trustcom 2024
:
461-468
[doi]
SSC-IDS: A Robust In-vehicle Intrusion Detection System Based on Self-Supervised Contrastive Learning
Zhuoqun Xia
,
Yongbin Yu
,
Jingjing Tan
,
Kejun Long
.
trustcom 2024
:
2004-2009
[doi]
An Intelligent Charging Service Selection Scheme Under the Cross-Area Consensus of Blockchain for the IoV
Shuming Xiong
,
Junfeng Zhu
,
Qiqi Xu
.
trustcom 2024
:
2310-2315
[doi]
Real-time Private Data Aggregation over Distributed Spatial-temporal Infinite Streams with Local Differential Privacy
Xingxing Xiong
,
Shubo Liu
,
Xiping Liu
,
Xiaoguang Niu
,
Wenyu You
.
trustcom 2024
:
1343-1352
[doi]
Tibetan microblogging user data analysis and topic identification
Guixian Xu
,
Wenhui Gao
.
trustcom 2024
:
1077-1082
[doi]
Machine Learning Enhanced Indoor Positioning with RIS-aided Channel Configuration and Analysis
Yanhong Xu
,
Zhao Li
,
Ziru Zhao
,
Blaise Herroine Aguenoukoun
,
Jia Liu
,
Zhixian Chang
,
Yicheng Liu
.
trustcom 2024
:
2653-2660
[doi]
Enhancing Privacy-Preserving Multi-Authority Attribute-Based Encryption: Addressing Rogue-Key Attacks Under Adaptive Corruption of Authorities
Jingchi Zhang
,
Anwitaman Datta
.
trustcom 2024
:
524-531
[doi]
OHSS: Optimizing Homomorphic Secret Sharing to Support Fast Matrix Multiplication
Shuguang Zhang
,
Jianli Bai
,
Kun Tu
,
Ziyue Yin
,
Chan Liu
.
trustcom 2024
:
2213-2220
[doi]
TransFront: Bi-path Feature Fusion for Detecting Front-running Attack in Decentralized Finance
Yuheng Zhang
,
Guojun Wang 0001
,
Peiqiang Li
,
Xubin Li
,
Wanyi Gu
,
Mingfei Chen
,
Houji Chen
.
trustcom 2024
:
600-607
[doi]
Enhancing Security and Efficiency in Vehicle-to-Sensor Authentication: A Multi-Factor Approach with Cloud Assistance
Xinrui Zhang
,
Pincan Zhao
,
Jason Jaskolka
.
trustcom 2024
:
1632-1637
[doi]
Construction of Cyber-attack Attribution Framework Based on LLM
Jingye Zhang
,
Ken Cheng
,
Xinli Xiong
,
Rongcheng Dong
,
Jun Huang
,
She Jie
.
trustcom 2024
:
2250-2255
[doi]
CNN-KOA-BiGRU: A high-accuracy APT detection model based on deep learning networks
Chaoqin Zhang
,
Maoqi Sun
,
Guangwu Hu
.
trustcom 2024
:
2342-2347
[doi]
Active Source Inference Attack Based on Label-Flipping in Federated Learning
Lening Zhang
,
Hui Xia
.
trustcom 2024
:
1675-1680
[doi]
Behavior Speaks Louder: Rethinking Malware Analysis Beyond Family Classification
Fei Zhang
,
Xiaohong Li 0001
,
Sen Chen 0001
,
Ruitao Feng
.
trustcom 2024
:
166-175
[doi]
Paa-Tee: A Practical Adversarial Attack on Thermal Infrared Detectors with Temperature and Pose Adaptability
Zhangchi Zhao
,
Jianyi Zhang
,
Liqun Shan
,
Ziyin Zhou
,
Kaiying Han
,
Xiali Hei 0001
.
trustcom 2024
:
952-959
[doi]
End-To-End Speaker Anonymization Based on Location-Variable Convolution and Multi-Head Self-Attention
Feiyu Zhao
,
Jianguo Wei
,
Wenhuan Lu
,
Yongwei Li
.
trustcom 2024
:
1733-1740
[doi]
Privacy-Preserving Multi-Soft Biometrics through Generative Adversarial Networks with Chaotic Encryption
Hongying Zheng
,
Hongdie Li
,
Di Xiao 0001
,
Maolan Zhang
.
trustcom 2024
:
1466-1471
[doi]
Budget-Feasible Double Auction Mechanisms for Model Training Services in Federated Learning Market
Ting Zhou
,
Hongtao Lv
,
Ning Liu 0014
,
Lei Liu 0003
.
trustcom 2024
:
501-507
[doi]
AIDE: Attack Inference Based on Heterogeneous Dependency Graphs with MITRE ATT&CK
Weidong Zhou
,
Chunhe Xia
,
Nan Feng
,
Xinyi Pan
,
Tianbo Wang
,
Xiaojian Li
.
trustcom 2024
:
410-417
[doi]
Leveraging Large Language Models for Challenge Solving in Capture-the-Flag
Yuwen Zou
,
Yang Hong
,
Jingyi Xu
,
Lekun Liu
,
Wenjun Fan
.
trustcom 2024
:
1541-1550
[doi]
Navigating Time's Possibilities: Plausible Counterfactual Explanations for Multivariate Time-Series Forecast through Genetic Algorithms
Gianlucca L. Zuin
,
Adriano Veloso
.
trustcom 2024
:
2575-2582
[doi]
MAXPOWR: Memory Attestation and Export in Process-based Trusted Execution Environments
Hendrik Meyer zum Felde
,
Andrei-Cosmin Aprodu
.
trustcom 2024
:
1-12
[doi]
Sign in
or
sign up
to see more results.