Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Blockchain meets covert communication: A survey
Covert communication enables covert information transmission in an undetectable way to
prevent the exposure of communication behaviors. Blockchain-based covert communication …
prevent the exposure of communication behaviors. Blockchain-based covert communication …
The security of machine learning in an adversarial setting: A survey
Abstract Machine learning (ML) methods have demonstrated impressive performance in
many application fields such as autopilot, facial recognition, and spam detection …
many application fields such as autopilot, facial recognition, and spam detection …
A survey of key technologies for constructing network covert channel
J Tian, G **ong, Z Li, G Gou - Security and Communication …, 2020 - Wiley Online Library
In order to protect user privacy or guarantee free access to the Internet, the network covert
channel has become a hot research topic. It refers to an information channel in which the …
channel has become a hot research topic. It refers to an information channel in which the …
Covert channel detection: machine learning approaches
MA Elsadig, A Gafar - IEEE Access, 2022 - ieeexplore.ieee.org
The advanced development of computer networks and communication technologies has
made covert communications easier to construct, faster, undetectable and more secure than …
made covert communications easier to construct, faster, undetectable and more secure than …
Model architecture level privacy leakage in neural networks
Privacy leakage is one of the most critical issues in machine learning and has attracted
growing interest for tasks such as demonstrating potential threats in model attacks and …
growing interest for tasks such as demonstrating potential threats in model attacks and …
Network security situation prediction based on MR-SVM
J Hu, D Ma, C Liu, Z Shi, H Yan, C Hu - IEEE Access, 2019 - ieeexplore.ieee.org
The support vector machine (SVM) is verified to be effective for predicting cyber security
situations, however, the long training time of the prediction model is a drawback to its use …
situations, however, the long training time of the prediction model is a drawback to its use …
Practical covert wireless unidirectional communication in IEEE 802.11 environment
H Seong, I Kim, Y Jeon, MK Oh, S Lee… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
Covert communications, or covert channels, are commonly exploited to establish a data
exfiltration channel from an insider on a trusted network to a malicious receiver outside the …
exfiltration channel from an insider on a trusted network to a malicious receiver outside the …
An optimizing and differentially private clustering algorithm for mixed data in SDN-based smart grid
Software-defined network (SDN) is widely used in smart grid for monitoring and managing
the communication network. Big data analytics for SDN-based smart grid has got increasing …
the communication network. Big data analytics for SDN-based smart grid has got increasing …
DLchain: A covert channel over blockchain based on dynamic labels
With the continuous improvement of the traffic analysis techniques, traditional network covert
channels based on the TCP/IP architecture are facing many risks. Blockchain is a new kind …
channels based on the TCP/IP architecture are facing many risks. Blockchain is a new kind …
EBDL: Effective blockchain-based covert storage channel with dynamic labels
Blockchain-based covert communication has opened up a new research direction for the
covert communication field. In blockchain-based storage covert communication, reliability …
covert communication field. In blockchain-based storage covert communication, reliability …