News
Adversarial perturbations of clean images are usually imperceptible for human eyes, but can confidently fool deep neural networks (DNNs) to make incorrect predictions. Such vulnerability of DNNs ...
In recent years, provenance graph-based methods have gained widespread usage in system threat detection. However, the sheer volume of data within system logs poses significant challenges for the ...
This repository provides UML diagrams (Use Case, Class, Sequence, Activity), Data Flow Diagrams (DFD), and Excel sheets to help visualize and document software architectures, workflows, and system ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results