基于生成式对抗网络的联邦学习后门攻击方案 https://dl.ccf.org.cn/file_server/20211108/159_226_43_5/yjyfz21-11/62d42e5f94c44c61a5898a5d59f09d90.jpg 2022-03-25
https://dl.ccf.org.cn/article/articleDetail.html?type=qkwz&_ack=1&id=5693486330415104
面向数字货币特征的细粒度代码注入攻击检测 https://dl.ccf.org.cn/file_server/20210527/159_226_43_5/yjyfz21-5/fcb05a3685c24c2b8a6af693736db77f.jpg 2022-03-25
https://dl.ccf.org.cn/article/articleDetail.html?type=qkwz&_ack=1&id=5460117536983040
基于随机博弈与禁忌搜索的网络防御策略选取 https://dl.ccf.org.cn/file_server/20200508/222_130_142_179/jsjyjyfz4/58eae2859f794bcbacb5313aa1e252a3.jpg 2022-03-25
https://dl.ccf.org.cn/article/articleDetail.html?type=qkwz&_ack=1&id=4916385236813824
缓存侧信道防御研究综述 https://dl.ccf.org.cn/file_server/20210421/159_226_43_5/yjyfz21-4/6425e1c3de4f454cb1a643021e5b929f.jpg 2022-03-25
https://dl.ccf.org.cn/article/articleDetail.html?type=qkwz&_ack=1&id=5408960246646784
一种基于运行时信息的以太坊智能合约防御技术 https://dl.ccf.org.cn/file_server/20210421/159_226_43_5/yjyfz21-4/0e3c3a4b72774e94951891e20186cb26.jpg 2022-03-25
https://dl.ccf.org.cn/article/articleDetail.html?type=qkwz&_ack=1&id=5408960247613440
一种面向图神经网络的图重构防御方法 https://dl.ccf.org.cn/file_server/20210527/159_226_43_5/yjyfz21-5/7786892c43604fdc92a26aefe5936fe1.jpg 2022-03-25
https://dl.ccf.org.cn/article/articleDetail.html?type=qkwz&_ack=1&id=5460117536688128
有限资源条件下的软件漏洞自动挖掘与利用 https://dl.ccf.org.cn/file_server/20200219/59_109_150_21/jsjyjyfz11/aab14ec5e6eb40efabb54fcce7a5af45.jpg 2022-03-25
https://dl.ccf.org.cn/article/articleDetail.html?type=qkwz&_ack=1&id=4804745859958784
基于代码属性图及注意力双向LSTM的漏洞挖掘方法 https://dl.ccf.org.cn/file_server/20201215/159_226_43_5/rjxb11/7db4ce23407e43588e7dde4712400949.jpg 2022-03-25
https://dl.ccf.org.cn/article/articleDetail.html?type=qkwz&_ack=1&id=5229541919279104