Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Advances in adversarial attacks and defenses in computer vision: A survey
Deep Learning is the most widely used tool in the contemporary field of computer vision. Its
ability to accurately solve complex problems is employed in vision research to learn deep …
ability to accurately solve complex problems is employed in vision research to learn deep …
Backdoor learning: A survey
Backdoor attack intends to embed hidden backdoors into deep neural networks (DNNs), so
that the attacked models perform well on benign samples, whereas their predictions will be …
that the attacked models perform well on benign samples, whereas their predictions will be …
Serverless computing: a security perspective
In this article we review the current serverless architectures, abstract and categorize their
founding principles, and provide an in-depth security analysis. In particular, we: show the …
founding principles, and provide an in-depth security analysis. In particular, we: show the …
Plundervolt: Software-based fault injection attacks against Intel SGX
Dynamic frequency and voltage scaling features have been introduced to manage ever-
growing heat and power consumption in modern processors. Design restrictions ensure …
growing heat and power consumption in modern processors. Design restrictions ensure …
RIDL: Rogue in-flight data load
We present Rogue In-flight Data Load (RIDL), a new class of speculative unprivileged and
constrained attacks to leak arbitrary data across address spaces and privilege boundaries …
constrained attacks to leak arbitrary data across address spaces and privilege boundaries …
Threat of adversarial attacks on deep learning in computer vision: A survey
Deep learning is at the heart of the current rise of artificial intelligence. In the field of
computer vision, it has become the workhorse for applications ranging from self-driving cars …
computer vision, it has become the workhorse for applications ranging from self-driving cars …
A modern primer on processing in memory
Modern computing systems are overwhelmingly designed to move data to computation. This
design choice goes directly against at least three key trends in computing that cause …
design choice goes directly against at least three key trends in computing that cause …
Rowpress: Amplifying read disturbance in modern dram chips
Memory isolation is critical for system reliability, security, and safety. Unfortunately, read
disturbance can break memory isolation in modern DRAM chips. For example, RowHammer …
disturbance can break memory isolation in modern DRAM chips. For example, RowHammer …
TRRespass: Exploiting the many sides of target row refresh
After a plethora of high-profile RowHammer attacks, CPU and DRAM vendors scrambled to
deliver what was meant to be the definitive hardware solution against the RowHammer …
deliver what was meant to be the definitive hardware solution against the RowHammer …
Rowhammer: A retrospective
This retrospective paper describes the RowHammer problem in dynamic random access
memory (DRAM), which was initially introduced by Kim et al. at the ISCA 2014 Conference …
memory (DRAM), which was initially introduced by Kim et al. at the ISCA 2014 Conference …