No 3. CS (23) 2024
Papers
-
Detection of source code vulnerabilities using Nature language processing and deep graph network
Abstract views: 1492 / PDF downloads: 82
-
A Reversible Data Hiding Scheme with Security Enhancement Using a Secure Bit Selection Strategy for AMBTC-Compressed Images
Abstract views: 1347 / PDF downloads: 70
-
Paradigms in Security Protocol Verification: A Multi-Tool Analysis
Abstract views: 1422 / PDF downloads: 79
-
Amplified Gradient Inversion Attacks on Federated Learning Frameworks
Abstract views: 1441 / PDF downloads: 96
-
A Robust Watermarking Method Based on RDWT-DCT-SVD in the YCbCr Color Space
Abstract views: 1431 / PDF downloads: 131
-
Intrusion Detection Using Federated Learning in Non-IID Data Environments
Abstract views: 1436 / PDF downloads: 183
-
Proposed Optimized Hardware Implementation for the S-box of the PRESENT Algorithm Using Combinational Logic Circuits
Abstract views: 1409 / PDF downloads: 89