System auditing is a crucial technique for detecting APT attacks. Howeve...
Provenance-Based Endpoint Detection and Response (P-EDR) systems are dee...
Although existing techniques have proposed automated approaches to allev...
EOSIO, as one of the most representative blockchain 3.0 platforms, invol...
Federated learning (FL) has become a prevalent distributed machine learn...
The increasing of pre-trained models has significantly facilitated the
p...
Automated input generators are widely used for large-scale dynamic analy...
We propose a traffic danger recognition model that works with arbitrary
...
Personalized services are in need of a rich and powerful personal knowle...
Multiplayer Online Battle Arena (MOBA) is currently one of the most popu...