-
1
Speedup signing: pre-rejection sampling towards dilithium
Published 2025-02-01“…Cybersecurity…”
Get full text
Article -
2
When LLMs meet cybersecurity: a systematic literature review
Published 2025-02-01“…Cybersecurity…”
Get full text
Article -
3
Angus: efficient active learning strategies for provenance based intrusion detection
Published 2025-01-01“…Cybersecurity…”
Get full text
Article -
4
A novel oversampling method based on Wasserstein CGAN for imbalanced classification
Published 2025-02-01“…Cybersecurity…”
Get full text
Article -
5
-
6
IRMAOC: an interpretable role mining algorithm based on overlapping clustering
Published 2025-01-01“…Cybersecurity…”
Get full text
Article -
7
Reusable and robust fuzzy extractor for CRS-dependent sources
Published 2025-01-01“…Cybersecurity…”
Get full text
Article -
8
A privacy-enhanced framework with deep learning for botnet detection
Published 2025-01-01“…Cybersecurity…”
Get full text
Article -
9
Privacy-preserving attribute-based access control using homomorphic encryption
Published 2025-01-01“…Cybersecurity…”
Get full text
Article