- 博客(7)
- 收藏
- 关注
原创 论文学习:Who-is-Real-Bob-Adversarial-Attacks-on-Speaker-Recognition-Systems
文章题目:Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems 来源:2021 IEEE Symposium on Security and Privacy (SP) 链接:https://ieeexplore.ieee.org/document/9519486/ Introduction Motivation the impacts of adversarial attack in the practical blac.
2021-09-25 22:59:16 764 1
原创 论文学习:Lip Reading-Based User Authentication Through Acoustic Sensing on Smartphones
文章题目:Lip Reading-Based User Authentication Through Acoustic Sensing on Smartphones 来源:IEEE/ACM Transactions on Networking 2019 链接:https://ieeexplore.ieee.org/abstract/document/8624590 文章概述 为了防止用户隐私泄露,越来越多的移动设备采用基于生物特征的身份验证方法(例如指纹,面部识别,声纹身份验证等)来增强隐私保护。但是,.
2021-09-23 21:33:47 1700
原创 论文学习:Practical Adversarial Attacks Against Speaker Recognition Systems
文章题目:Practical Adversarial Attacks Against Speaker Recognition Systems 来源:ACM HotMobile 2020 链接:https://dl.acm.org/doi/abs/10.1145/3376897.3377856 文章概述 对基于X-vector的multi-class speaker recognition system(其实就是一个闭集多分类模型,speaker identificaiton)进行adversarial .
2021-09-23 21:30:16 369
原创 论文学习:On Training Robust PDF Malware Classifiers
论文题目:On Training Robust PDF Malware Classifiers 来源:29th USENIX Security Symposium 2020 链接:https://www.usenix.org/conference/usenixsecurity20/presentation/chen-yizheng 文章目录知识点文章内容难点:创新点: 知识点 参考https://blog.csdn.net/Shall_ByeBye/article/details/106883218 文章内
2020-10-01 23:33:50 464
原创 论文学习:Humpty Dumpty:Controlling Word Meanings via Corpus Poisoning
论文题目:Humpty Dumpty:Controlling Word Meanings via Corpus Poisoning 来源:2020 IEEE Symposium on Security and Privacy (S&P) 链接:https://ieeexplore.ieee.org/document/9152608 文章目录文章内容难点:创新点:攻击过程:毒害实验: 文章内容 通过对公共语料库如twitter、Wikipedia进行毒害,如修改一些词条,或者故意加入一些词条等,从而让
2020-10-01 23:32:48 219
原创 论文学习:Seeing is Not Believing:Camouflage Attacks on Image Scaling Algorithms
论文题目:Seeing is Not Believing:Camouflage Attacks on Image Scaling Algorithms 来源:28th USENIX Security Symposium 2019 链接:https://www.usenix.org/conference/usenixsecurity19/presentation/xiao 文章目录主要内容:攻击流程:创新点:可能的攻击应用:防范与检测:防范:检测:缺点:总结: 主要内容: 作者发现了**一种在图像处理过程中潜
2020-10-01 23:29:11 976
原创 论文学习:Austere Flash Caching with Deduplication and Compression
论文题目 :Austere Flash Caching with Deduplication and Compression 来源:USENIX ATC 2020 链接:https://www.usenix.org/conference/atc20/presentation/wang-qiuping 文章目录关键概念deduplication(去重)compression(压缩)flashflashcacheLBA-index:LBA->FPFP-index:FP->CA,lengthWrite
2020-10-01 23:24:40 900
空空如也
空空如也
TA创建的收藏夹 TA关注的收藏夹
TA关注的人