达姆施塔特工业大学 | Phantom:针对半监督学习的无目标投毒攻击
原文标题:Phantom: Untargeted Poisoning Attacks on Semi-Supervised Learning原文作者:Jonathan Knauer, Phillip
阅读全文原文标题:Phantom: Untargeted Poisoning Attacks on Semi-Supervised Learning原文作者:Jonathan Knauer, Phillip
阅读全文大家好,我即将在芝大计算机系结束自己的博士学习,将于2025年8月加入香港大学数据与系统工程系(Department of Data and Systems Engineering, DASE),出任
阅读全文原文标题:Robust Detection of Malicious Encrypted Traffic via Contrastive Learning原文作者:Meng Shen, Jinhe W
阅读全文尊敬的学者同仁:本特刊旨在征集计算机科学领域内网络空间安全技术的基础理论与应用实践方面的高质量原创研究论文及综述文章,尤其欢迎提出创新理论模型、实践解决方案及跨学科方法的投稿。特刊主题包括但不限于以下
阅读全文原文标题:A Multi-modal Learning-Based Behavior Identification Scheme for Obfuscated Tunneling Traffic原文作
阅读全文Yuchen Yang 现正招收博士生(2026年秋季入学)、科研实习生与访问学者(长期)。欢迎具有高度科研热情、具备系统构建能力,并在可信 AI、生成模型、对抗机器学习、高效机器学习或人机交互等方向
阅读全文With the rapid advancement and convergence of Internet of Things (IoT), big data, and artificial int
阅读全文上海市计算机软件评测重点实验室(以下简称“重点实验室”)是上海市科学技术委员会设立的重点实验室,依托单位是上海计算机软件技术开发中心。作为全国最早的第三方专业测评机构之一,重点实验室具有三十余年的丰富
阅读全文报名方式大会日程、酒店预定等更多详情请点击下方链接常安论坛倒计时|主旨报告、专题论坛、特色活动抢先看特邀嘉宾(按照姓氏拼音排序)安建平北京理工大学巴钟杰浙江大学蔡成涛哈尔滨工程大学曹春杰海南大学曹玖新
阅读全文原文标题:A Generalization-Enhanced Method for Encrypted Proxy Traffic Identification Based on Autoencode
阅读全文原文标题:Exploring the Unknown DTLS Universe: Analysis of the DTLS Server Ecosystem on the Internet原文作者:
阅读全文原文标题:New Directions in Automated Traffic Analysis原文作者:Jordan Holland, Paul Schmitt, Nick Feamster, P
阅读全文原文标题:Categorically Analyzing the Network Traffic in the Snowflake Bridge of Tor 原文作者:Sibashreeta Das
阅读全文原文标题:Markov Chain Fingerprinting to Classify Encrypted Traffic原文作者:Maciej Korczynski, Andrzej Duda原
阅读全文原文标题:CKGFuzzer: LLM-Based Fuzz Driver Generation Enhanced By Code Knowledge Graph原文作者:徐晗翔,马威(共同第一作者)
阅读全文原文标题:Detecting Tor Bridge from Sampled Traffic in Backbone Networks原文作者:Hua Wu, Shuyi Guo, Guang Ch
阅读全文原文标题:Early-MFC: Enhanced Flow Correlation Attacks on Tor via Multi-view Triplet Networks with Early
阅读全文第一届大模型供应链研讨会(LLMSC@ISSTA)时间:2025年6月25日(暂定)地点:挪威 特隆赫姆网站:https://llmsc.github.io/论文提交:https://llmsc25.
阅读全文原文标题:Model Context Protocol (MCP): Landscape, Security Threats, and Future Research Directions原文作者:侯
阅读全文原文标题:Network traffic classification: Techniques, datasets, and challenges原文作者:Ahmad Azab, Mahmoud Kh
阅读全文原文标题:DIDarknet: A Contemporary Approach to Detect and Characterize the Darknet Traffic using Deep Im
阅读全文原文标题:Robust Multi-tab Website Fingerprinting Attacks in the Wild原文作者:Xinhao Deng, Qilei Yin, Zhuotao
阅读全文安全学术圈招募队友-ing 有兴趣加入学术圈的请联系 secdr#qq.com专题最新征文期刊征文 | 暗网抑制前沿进展 (中文核心)期刊征文 | 网络攻击分析与研判 (CCF T2)期刊征文 | 域
阅读全文原文标题:Seeing Traffic Paths: Encrypted Traffic Classification With Path Signature Features原文作者:Shijie
阅读全文原文标题:Machine Learning Classification on Traffic of Secondary Encryption原文作者:Meng Shen, Jinpeng Zhan
阅读全文原文标题:Do Not Trust What They Tell: Exposing Malicious Accomplices in Tor via Anomalous Circuit Detect
阅读全文原文标题:Snowflake Anonymous Network Traffic Identification原文作者:Yuying Wang, Guilong Yang, Dawei Xu, Che
阅读全文原文标题:Attention! Your Copied Data is Under Monitoring: A Systematic Study of Clipboard Usage in Andro
阅读全文原文标题:Enhanced detection of obfuscated HTTPS tunnel traffic using heterogeneous information network原文
阅读全文The 2025 International Conference on Information and Communications Security (ICICS 2025, 中国计算机学会CCF
阅读全文