筛选条件 共查询到8条结果
排序方式
EI-MTD: Moving Target Defense for Edge Intelligence against Adversarial Attacks

期刊: ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2022; 25 (3)

Edge intelligence has played an important role in constructing smart cities, but the vulnerability of edge nodes to adversarial attacks becomes an urg......

SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems

期刊: ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2022; 25 (3)

With the wide use of Automatic Speech Recognition (ASR) in applications such as human machine interaction, simultaneous interpretation, audio transcri......

Vulnerabilities of Unattended Face Verification Systems to Facial Components-based Presentation Attacks: An Empirical Study

期刊: ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2022; 25 (1)

As face presentation attacks (PAs) are realistic threats for unattended face verification systems, face presentation attack detection (PAD) has been i......

Privacy-preserving Dynamic Symmetric Searchable Encryption with Controllable Leakage

期刊: ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2021; 24 (3)

Searchable Encryption (SE) is a technique that allows Cloud Service Providers to search over encrypted datasets without learning the content of querie......

Privacy-preserving Dynamic Symmetric Searchable Encryption with Controllable Leakage

期刊: ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2021; 24 (3)

Searchable Encryption (SE) is a technique that allows Cloud Service Providers to search over encrypted datasets without learning the content of querie......

Using Generative Adversarial Networks to Break and Protect Text Captchas

期刊: ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2020; 23 (2)

Text-based CAPTCHAs remains a popular scheme for distinguishing between a legitimate human user and an automated program. This article presents a nove......

Following Passive DNS Traces to Detect Stealthy Malicious Domains Via Graph Inference

期刊: ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2020; 23 (4)

Malicious domains, including phishing websites, spam servers, and command and control servers, are the reason for many of the cyber attacks nowadays. ......

A Video-based Attack for Android Pattern Lock

期刊: ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2018; 21 (4)

Pattern lock is widely used for identification and authentication on Android devices. This article presents a novel video-based side channel attack th......

JIF:1.71

共8条页码: 1/1页15条/页