- Jiaru Song, Guihe Qin, Yanhua Liang, Jie Yan, Minghui Sun:
SIDiLDNG: A similarity-based intrusion detection system using improved Levenshtein Distance and N-gram for CAN. Comput. Secur. 142: 103847 (2024) - Yunlong Tang, Jing Sun, Huan Wang, Junyi Deng, Liang Tong, Wenhong Xu:
A method of network attack-defense game and collaborative defense decision-making based on hierarchical multi-agent reinforcement learning. Comput. Secur. 142: 103871 (2024) - Fadhila Tlili
, Samiha Ayed, Lamia Chaari Fourati:
Exhaustive distributed intrusion detection system for UAVs attacks detection and security enforcement (E-DIDS). Comput. Secur. 142: 103878 (2024) - Zhiying Wang, Guiyun Li, Yajing Diao, Nianxin Wang:
Warning deterrence or knowledge guidance? Research on triggering mechanism of phishing sensitivity. Comput. Secur. 142: 103875 (2024) - Qiannan Wang, Changchun Yin, Liming Fang, Zhe Liu
, Run Wang, Chenhao Lin:
GhostEncoder: Stealthy backdoor attacks with dynamic triggers to pre-trained encoders in self-supervised learning. Comput. Secur. 142: 103855 (2024) - Chengyi Yang
, Kun Jia, Deli Kong, Jiayin Qi, Aimin Zhou:
DP-GSGLD: A Bayesian optimizer inspired by differential privacy defending against privacy leakage in federated learning. Comput. Secur. 142: 103839 (2024)