„Data Encryption.“
Suchergebnisse
7.742 Treffer
-
Fourier aids CNN and transformer for semantic segmentation of remote sensing images
-
Enhanced prediction of persistent earthquake-induced groundwater level changes with advanced feature engineering and machine learning
-
Attention-guided few-shot learning for metal surface defect classification
-
Ecca-unet: edge-aware and channel-enhanced cross-attention network for medical image segmentation
-
Fine-tuning CLIP for difference-guided composed image retrieval
-
Wavelet-guided spatial-frequency transformer with physics-based refinement for remote sensing image dehazing
-
MCLSC-Fusion: a multi-scale cross-modality long-short connection fusion network for infrared and visible images
-
Shadow feature refinement network: progressive feature refinement based on knowledge distillation for effective shadow removal
-
A Non-Interactive and Secure Dynamic Multi-Party FHE Scheme
-
Flow Hijacking in eBPF: Exploitation and Mitigation Across both Interpreter and JIT Execution
-
A Framework for Drift Detection and Adaptation in AI-driven Anomaly and Threat Detection Systems
-
Scheduling periodic queries in multi-channel on-demand broadcasting environments
-
An Efficient Scheme for Preventing Cache Poisoning Attack Against DNS Forwarders Based on Redactable Signature
-
Awcf-yolo11: hierarchical attention fusion and adaptive channel refinement for object detection in remote sensing imagery
-
Enhancing ROS 2 (robot operating system 2) security with standardized post-quantum cryptosystems
-
Evaluation of the maturity of LLMs in the cybersecurity domain
-
CADDroid: an efficient android app collusion dataset to instigate the development of modern malware detection methodologies
-
A fuzzy logic-based trust framework against sybil and rank attacks in cyber-physical systems
-
A panoramic survey of the advanced encryption standard: from architecture to security analysis, key management, real-world applications, and post-quantum challenges
-
SIEM-SC initial assessments: Towards a Sustainable and Compliant proposal for Security Information and Event Management