No 3. CS (23) 2024
Papers
-
Detection of source code vulnerabilities using Nature language processing and deep graph network
Abstract views: 1591 / PDF downloads: 197
-
A Reversible Data Hiding Scheme with Security Enhancement Using a Secure Bit Selection Strategy for AMBTC-Compressed Images
Abstract views: 1408 / PDF downloads: 83
-
Paradigms in Security Protocol Verification: A Multi-Tool Analysis
Abstract views: 1538 / PDF downloads: 136
-
Amplified Gradient Inversion Attacks on Federated Learning Frameworks
Abstract views: 1529 / PDF downloads: 124
-
A Robust Watermarking Method Based on RDWT-DCT-SVD in the YCbCr Color Space
Abstract views: 1579 / PDF downloads: 186
-
Intrusion Detection Using Federated Learning in Non-IID Data Environments
Abstract views: 1574 / PDF downloads: 348
-
Proposed Optimized Hardware Implementation for the S-box of the PRESENT Algorithm Using Combinational Logic Circuits
Abstract views: 1546 / PDF downloads: 140










