3-Party Adversarial Steganography (English)
- New search for: Meraouche, Ishak
- New search for: Dutta, Sabyasachi
- New search for: Sakurai, Kouichi
- New search for: Meraouche, Ishak
- New search for: Dutta, Sabyasachi
- New search for: Sakurai, Kouichi
In:
Information security applications
; 89-100
;
2020
-
ISBN:
- Conference paper / Print
-
Title:3-Party Adversarial Steganography
-
Contributors:
-
Conference:WISA ; 21. ; 2020 ; Online
-
Published in:Information security applications ; 89-100
-
Publisher:
- New search for: Springer
-
Place of publication:Cham
-
Publication date:2020
-
ISBN:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
- New search for: 54.38
- Further information on Basic classification
-
Keywords:
-
Classification:
BKL: 54.38 Computersicherheit -
Source:
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 3
-
Spatially Localized Perturbation GAN (SLP-GAN) for Generating Invisible Adversarial PatchesKim, Yongsu / Kang, Hyoeun / Mukaroh, Afifatul / Suryanto, Naufal / Larasati, Harashta Tatimma / Kim, Howon et al. | 2020
- 16
-
Detecting Block Cipher Encryption for Defense Against Crypto Ransomware on Low-End Internet of ThingsKim, Hyunji / Park, Jaehoon / Kwon, Hyeokdong / Jang, Kyoungbae / Choi, Seung Ju / Seo, Hwajeong et al. | 2020
- 31
-
CAPTCHAs Are Still in Danger: An Efficient Scheme to Bypass Adversarial CAPTCHAsNa, Dongbin / Park, Namgyu / Ji, Sangwoo / Kim, Jong et al. | 2020
- 45
-
Unsupervised Intrusion Detection System for Unmanned Aerial Vehicle with Less Labeling EffortPark, Kyung Ho / Park, Eunji / Kim, Huy Kang et al. | 2020
- 59
-
Entropy-Based Feature Grouping in Machine Learning for Android Malware ClassificationShim, Hyunseok / Jung, Souhwan et al. | 2020
- 73
-
DLDDO: Deep Learning to Detect Dummy OperationsLee, JongHyeok / Han, Dong-Guk et al. | 2020
- 89
-
3-Party Adversarial SteganographyMeraouche, Ishak / Dutta, Sabyasachi / Sakurai, Kouichi et al. | 2020
- 101
-
Accessibility Service Utilization Rates in Android Applications Shared on TwitterIchioka, Shuichi / Pouget, Estelle / Mimura, Takao / Nakajima, Jun / Yamauchi, Toshihiro et al. | 2020
- 112
-
Novel Reversible Acoustic Steganography Based on Carrier OrthogonalityShiu, Hung-Jr / Leu, Fang-Yie / Lai, Chun-Ming / Huang, Yu-Chun et al. | 2020
- 127
-
Compact Implementation of CHAM Block Cipher on Low-End MicrocontrollersKwon, Hyeokdong / Kim, Hyunji / Choi, Seung Ju / Jang, Kyoungbae / Park, Jaehoon / Kim, Hyunjun / Seo, Hwajeong et al. | 2020
- 142
-
The Gravy Value: A Set of Features for Pinpointing BOT Detection MethodPark, Semi / Lee, Kyungho et al. | 2020
- 154
-
Impact of Optimized Operations A· B, A· C for Binary Field Inversion on Quantum ComputersJang, Kyoungbae / Choi, Seung Ju / Kwon, Hyeokdong / Hu, Zhi / Seo, Hwajeong et al. | 2020
- 167
-
Virtualization Technologies in the Android Framework and Compatibility with SEAndroidYoon, Jaehyeon / Ngoc, Tu Chau / Huy, Hoang Nguyen / Jung, Souhwan et al. | 2020
- 179
-
Toward a Fine-Grained Evaluation of the Pwnable CTFKim, Sung-Kyung / Jang, Eun-Tae / Park, Ki-Woong et al. | 2020
- 191
-
A Statistical Approach Towards Fraud Detection in the Horse RacingMin, Moohong / Lee, Jemin Justin / Park, Hyunbeom / Shin, Hyojoung / Lee, Kyungho et al. | 2020
- 203
-
On the Cost-Effectiveness of TrustZone Defense on ARM PlatformLiu, Naiwei / Yu, Meng / Zang, Wanyu / Sandhu, Ravi et al. | 2020
- 215
-
Detection on GPS Spoofing in Location Based Mobile GamesWong, Shing Ki / Yiu, Siu Ming et al. | 2020
- 227
-
Push for More: On Comparison of Data Augmentation and SMOTE with Optimised Deep Learning Architecture for Side-ChannelWon, Yoo-Seung / Jap, Dirmanto / Bhasin, Shivam et al. | 2020
- 245
-
Identity-Based Unidirectional Proxy Re-encryption in Standard Model: A Lattice-Based ConstructionDutta, Priyanka / Susilo, Willy / Duong, Dung Hoang / Baek, Joonsang / Roy, Partha Sarathi et al. | 2020
- 258
-
Efficient Algorithm for Computing Odd-Degree Isogenies on Montgomery CurvesKodera, Kenta / Cheng, Chen-Mou / Miyaji, Atsuko et al. | 2020
- 276
-
An Efficient Implementation of AES on 8-Bit AVR-Based Sensor NodesKim, YoungBeom / Seo, Seog Chung et al. | 2020
- 291
-
Revisiting the Minrank Problem on Multivariate CryptographyWang, Yacheng / Ikematsu, Yasuhiko / Nakamura, Shuhei / Takagi, Tsuyoshi et al. | 2020
- 308
-
Paid and Anonymous Usage of Cloud SoftwarePeng, Kun et al. | 2020
- 321
-
Optimization of PBKDF2-HMAC-SHA256 and PBKDF2-HMAC-LSH256 in CPU EnvironmentsChoi, Hojin / Seo, Seog Chung et al. | 2020
- 334
-
Cryptanalysis of Two Fully Anonymous Attribute-Based Group Signature Schemes with Verifier-Local Revocation from LatticesZhang, Yanhua / Liu, Ximeng / Hu, Yupu / Zhang, Qikun / Jia, Huiwen et al. | 2020
- 349
-
Analysis on Malicious Residential Hosts Activities Exploited by Residential IP Proxy ServicesHanzawa, Akihiro / Kikuchi, Hiroaki et al. | 2020
- 362
-
Insights into Attacks’ Progression: Prediction of Spatio-Temporal Behavior of DDoS AttacksAbusnaina, Ahmed / Abuhamad, Mohammed / Nyang, DaeHun / Chen, Songqing / Wang, An / Mohaisen, David et al. | 2020
- 375
-
Methods to Select Features for Android Malware Detection Based on the Protection Level AnalysisLee, Chaeeun / Ko, Eunnarae / Lee, Kyungho et al. | 2020
- 389
-
Filtering-Based Correlation Power Analysis (CPA) with Signal Envelopes Against Shuffling MethodsJeon, Youngbae / Yoon, Ji Won et al. | 2020
- 403
-
Security Problems of 5G Voice CommunicationPark, Seongmin / Cho, HyungJin / Park, Youngkwon / Choi, Bomin / Kim, Dowon / Yim, Kangbin et al. | 2020