Results 11 to 20 of about 77,587 (303)

FedSCOPE: Federated cross-domain sequential recommendation with decoupled contrastive learning and privacy-preserving semantic enhancement [PDF]

open access: yesScientific Reports
Cross-domain sequential recommendation (CDSR) models users’ dynamic preferences by exploiting behavioral signals from multiple domains, but it faces challenges in data sparsity, domain heterogeneity, and privacy protection.
Lujin Zhao   +6 more
doaj   +2 more sources

Cryptographic core design security verification and vulnerability detection based on information flow analysis

open access: yesXibei Gongye Daxue Xuebao, 2022
Cryptographic cores are the key components to enforce information security properties related to confidentiality and integrity. Since the security of a cryptographic core implementation and the security of the cryptographic algorithm itself from the ...
MA Yixin   +4 more
doaj   +1 more source

Adversarial Attack for Deep Steganography Based on Surrogate Training and Knowledge Diffusion

open access: yesApplied Sciences, 2023
Deep steganography (DS), using neural networks to hide one image in another, has performed well in terms of invisibility, embedding capacity, etc. Current steganalysis methods for DS can only detect or remove secret images hidden in natural images and ...
Fangjian Tao   +5 more
doaj   +1 more source

Image Security Based on Three-Dimensional Chaotic System and Random Dynamic Selection

open access: yesEntropy, 2022
Image encryption based on a chaos system can effectively protect the privacy of digital images. It is said that a 3D chaotic system has a larger parameter range, better unpredictability and more complex behavior compared to low-dimension chaotic systems.
Bo Ran   +4 more
doaj   +1 more source

Governing by internet architecture [PDF]

open access: yes, 2014
In the past thirty years, the exponential rise in the number of Internet users around the word and the intensive use of the digital networks have brought to light crucial political issues. Internet is now the object of regulations. Namely, it is a policy
Amoretti, Francesco, Santaniello, Mauro
core   +7 more sources

Beyond state-centrism: international law and non-state actors in cyberspace [PDF]

open access: yes, 2016
Classically, States and non-State actors were differentiated not only by disparities in legal status but also by significant imbalances in resources and capabilities. Not surprisingly, international law developed a State-centric bias to account for these
Schmitt, Michael N., Watts, Sean
core   +1 more source

An Identity-Based Cross-Domain Authenticated Asymmetric Group Key Agreement

open access: yesInformation, 2021
Cross-domain authenticated asymmetric group key agreement allows group members in different domains to establish a secure group communication channel and the senders can be anyone.
Qingnan Chen   +4 more
doaj   +1 more source

Two-Stream Xception Structure Based on Feature Fusion for DeepFake Detection

open access: yesInternational Journal of Computational Intelligence Systems, 2023
DeepFake may have a crucial impact on people’s lives and reduce the trust in digital media, so DeepFake detection methods have developed rapidly. Most existing detection methods rely on single-space features (mostly RGB features), and there is still ...
Bin Wang   +3 more
doaj   +1 more source

A Neighbor Discovery Algorithm for UAV Networking Based on Directional Antennas

open access: yesXibei Gongye Daxue Xuebao, 2020
Using directional antennas in Unmanned Aerial Vehicle (UAV) swarm has many advantages, such as longer transmission range, spatial reuse, anti-jamming and low probability of intercept.

doaj   +1 more source

SECURITY IN CYBERSPACE

open access: yesNational Security Studies, 2022
Rozwój technologii sprawił, że internet stał się wirtualnym światem, który odgrywa kluczową rolę w realnej rzeczywistości. Obecnie, nie jest jedynie miejscem rozrywki. W Internecie znajdują się oficjalne strony rządowe, witryny państwowe, e-urzędy, czy też e-bankowość. Temat artykułu skupia się na cyberbepieczeństwie.
openaire   +1 more source

Home - About - Disclaimer - Privacy