No 3. CS (23) 2024
Papers
-
Detection of source code vulnerabilities using Nature language processing and deep graph network
Abstract views: 1616 / PDF downloads: 209
-
A Reversible Data Hiding Scheme with Security Enhancement Using a Secure Bit Selection Strategy for AMBTC-Compressed Images
Abstract views: 1411 / PDF downloads: 88
-
Paradigms in Security Protocol Verification: A Multi-Tool Analysis
Abstract views: 1550 / PDF downloads: 160
-
Amplified Gradient Inversion Attacks on Federated Learning Frameworks
Abstract views: 1544 / PDF downloads: 133
-
A Robust Watermarking Method Based on RDWT-DCT-SVD in the YCbCr Color Space
Abstract views: 1599 / PDF downloads: 210
-
Intrusion Detection Using Federated Learning in Non-IID Data Environments
Abstract views: 1596 / PDF downloads: 369
-
Proposed Optimized Hardware Implementation for the S-box of the PRESENT Algorithm Using Combinational Logic Circuits
Abstract views: 1555 / PDF downloads: 144










