|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 9948 occurrences of 4956 keywords
|
|
|
Results
Found 9558 publication records. Showing 9558 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
49 | XiaoFeng Wang 0001, Zhuowei Li 0001, Jong Youl Choi, Jun Xu 0003, Michael K. Reiter, Chongkyung Kil |
Fast and Black-box Exploit Detection and Signature Generation for Commodity Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 12(2), pp. 11:1-11:35, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
black-box defense, exploit detection, vaccine injection, worm, signature generation |
49 | David Brumley, Pongsin Poosankam, Dawn Xiaodong Song, Jiang Zheng 0002 |
Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SP ![In: 2008 IEEE Symposium on Security and Privacy (SP 2008), 18-21 May 2008, Oakland, California, USA, pp. 143-157, 2008, IEEE Computer Society, 978-0-7695-3168-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
exploit generation, combined execution, symbolic execution, test case generation, patch |
49 | XiaoFeng Wang 0001, Zhuowei Li 0001, Jun Xu 0003, Michael K. Reiter, Chongkyung Kil, Jong Youl Choi |
Packet vaccine: black-box exploit detection and signature generation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, October 30 - November 3, 2006, pp. 37-46, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
black-box defense, exploit detection, vaccine injection, worm, signature generation |
46 | Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Purushothaman Iyer |
Analyzing network traffic to detect self-decrypting exploit code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, Singapore, March 20-22, 2007, pp. 4-12, 2007, ACM, 1-59593-574-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
exploit code, static analysis, emulation, detection, polymorphic, decryption |
46 | Alex McMahon, Dan Scott 0002, William N. L. Browne |
An autonomous explore/exploit strategy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO Workshops ![In: Genetic and Evolutionary Computation Conference, GECCO 2005, Workshop Proceedings, Washington DC, USA, June 25-26, 2005, pp. 103-108, 2005, ACM. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
explore/exploit strategy, learning classifier systems, genetics-based machine learning |
35 | Mohammad M. Masud 0001, Latifur Khan, Bhavani Thuraisingham, Xinran Wang, Peng Liu 0005, Sencun Zhu |
Detecting Remote Exploits Using Data Mining. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
IFIP Int. Conf. Digital Forensics ![In: Advances in Digital Forensics IV, Fourth Annual IFIP WG 11.9 Conference on Digital Forensics, Kyoto University, Kyoto, Japan, January 28-30, 2008, pp. 177-189, 2008, Springer, 978-0-387-84926-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Server attacks, exploit code, data mining, attack detection |
35 | Vinod Ganapathy, Sanjit A. Seshia, Somesh Jha, Thomas W. Reps, Randal E. Bryant |
Automatic discovery of API-level exploits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE ![In: 27th International Conference on Software Engineering (ICSE 2005), 15-21 May 2005, St. Louis, Missouri, USA, pp. 312-321, 2005, ACM. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
API-level exploit, bounded model checking |
35 | Paul Ammann, Duminda Wijesekera, Saket Kaushik |
Scalable, graph-based network vulnerability analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, Washington, DC, USA, November 18-22, 2002, pp. 217-224, 2002, ACM, 1-58113-612-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
monotonic analysis, model checking, scalability, network security, vulnerability, exploit |
32 | Thomas Toth, Christopher Krügel |
Accurate Buffer Overflow Detection via Abstract Payload Execution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 5th International Symposium, RAID 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings, pp. 274-291, 2002, Springer, 3-540-00020-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Intrusion Detecion, Buffer Overflow Exploit, Network Security |
29 | Zhehui Liu, Zhongru Wang, Yuntao Zhang, Tong Liu, Binxing Fang, Zhengyuan Pang |
Automated Crash Analysis and Exploit Generation with Extendable Exploit Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSC ![In: 7th IEEE International Conference on Data Science in Cyberspace, DSC 2022, Guilin, China, July 11-13, 2022, pp. 71-78, 2022, IEEE, 978-1-6654-7480-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Clément Laverdet |
Relations publiques et Exploitation des RéSeaux sociaux NUMéRiques en gestion des Crises: quels Rôles de Facebook pour les gestionnaires FrançAIS, et comment Exploiter CE canal de FAçon pertinente ? (Communicate and Exploit Digital Social Networks in Crisis Management: What are the Facebook Capacities for French Managers, and How to Exploit this Medium in a Relevant Way ?). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2021 |
RDF |
|
29 | Fadi Yilmaz, Meera Sridhar, Wontae Choi |
Guide Me to Exploit: Assisted ROP Exploit Generation for ActionScript Virtual Machine. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: ACSAC '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020, pp. 386-400, 2020, ACM, 978-1-4503-8858-0. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
29 | Murat Yilmaz |
Contracting with a naïve time-inconsistent agent: To exploit or not to exploit? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Math. Soc. Sci. ![In: Math. Soc. Sci. 77, pp. 46-51, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
29 | Chao Yang, Tao Zheng, Zhitian Lin |
A-R Exploit: An Automatic ROP Exploit Based on Long Sequence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SERE (Companion) ![In: IEEE Eighth International Conference on Software Security and Reliability, SERE 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion Volume, pp. 50-56, 2014, IEEE. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
29 | Vadim Kotov, Fabio Massacci |
Anatomy of Exploit Kits - Preliminary Analysis of Exploit Kits as Software Artefacts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESSoS ![In: Engineering Secure Software and Systems - 5th International Symposium, ESSoS 2013, Paris, France, February 27 - March 1, 2013. Proceedings, pp. 181-196, 2013, Springer, 978-3-642-36562-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Amontip Jumratjaroenvanit, Yunyong Teng-Amnuay |
Probability of Attack Based on System Vulnerability Life Cycle. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISECS ![In: Proceedings of The International Symposium on Electronic Commerce and Security, ISECS 2008, August 3-5, 2008, Guangzhou, China, pp. 531-535, 2008, IEEE Computer Society, 978-0-7695-3258-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Zero-day attack, Exploit code, Risk window, Radar chart, Vulnerability, Exploits, Life cycle, Exposure, POA |
28 | Daewon Kim, Yangseo Choi, Ikkyun Kim, Jintae Oh, Jongsoo Jang |
Function Call Mechanism Based Executable Code Detection for the Network Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT ![In: Proceedings of the 2008 International Symposium on Applications and the Internet, SAINT 2008, 28 July - 1 August 2008, Turku, Finland, pp. 62-67, 2008, IEEE Computer Society, 978-0-7695-3297-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
shellcode, security, network, exploit |
28 | Ramkumar Chinchani, Eric van den Berg |
A Fast Static Analysis Approach to Detect Exploit Code Inside Network Flows. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 8th International Symposium, RAID 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers, pp. 284-308, 2005, Springer, 3-540-31778-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Yang Yu, Hariharan Kolam, Lap-Chung Lam, Tzi-cker Chiueh |
Applications of a feather-weight virtual machine. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VEE ![In: Proceedings of the 4th International Conference on Virtual Execution Environments, VEE 2008, Seattle, WA, USA, March 5-7, 2008, pp. 171-180, 2008, ACM, 978-1-59593-796-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
binary server, browser exploit, information theft, virtual machine, web crawler |
25 | Mustapha Refai |
Exploiting a buffer overflow using metasploit framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 74, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
metasploit, framework, buffer overflow, exploit, buffer overrun |
25 | Iván Arce |
The Kernel Craze. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 2(3), pp. 79-81, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
kernel bugs, kernel security, exploit code, vulnerabilities |
25 | Richard Lippmann, Seth E. Webster, Douglas Stetson |
The Effect of Identifying Vulnerabilities and Patching Software on the Utility of Network Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 5th International Symposium, RAID 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings, pp. 307-326, 2002, Springer, 3-540-00020-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Internet, network, Intrusion detection, DoS, attack, signature, worm, scan, vulnerability, probe, patch, exploit, false alarm |
25 | Christophe Baraer, Kaustubh S. Phanse, Johan Nykvist, Luka Birsa |
ExPLoIT: Exploiting Past Location Information and Transitivity for positioning in mobile sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMSWARE ![In: Proceedings of the Second International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2007), January 7-12, 2007, Bangalore, India, 2007, IEEE, 1-4244-0614-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Daniele Paolo Scarpazza, Praveen Raghavan, David Novo, Francky Catthoor, Diederik Verkest |
Software Simultaneous Multi-Threading, a Technique to Exploit Task-Level Parallelism to Improve Instruction- and Data-Level Parallelism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PATMOS ![In: Integrated Circuit and System Design. Power and Timing Modeling, Optimization and Simulation, 16th International Workshop, PATMOS 2006, Montpellier, France, September 13-15, 2006, Proceedings, pp. 12-23, 2006, Springer, 3-540-39094-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Zhiyuan Zhang, Yao Zhao |
A New Transform with Extended Product to Exploit Different Scale Redundance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICIC (2) ![In: First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August - 1 September 2006, Beijing, China, pp. 362-365, 2006, IEEE Computer Society, 0-7695-2616-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Sabyasachi Saha, Sandip Sen |
Aggressive Pricing to Exploit Market Niches in Supply Chains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Intell. Syst. ![In: IEEE Intell. Syst. 20(1), pp. 36-41, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
pricing and scheduling strategies, wealth maximization, market niche, software agents, supply chain management |
22 | Ariel Futoransky, Fernando Miranda, José Ignacio Orlicki, Carlos Sarraute |
Simulating cyber-attacks for fun and profit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SimuTools ![In: Proceedings of the 2nd International Conference on Simulation Tools and Techniques for Communications, Networks and Systems, SimuTools 2009, Rome, Italy, March 2-6, 2009, pp. 4, 2009, ICST/ACM, 978-963-9799-45-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
0-day, network security, training, network simulation, vulnerability, exploit, penetration test, cyber-attack |
22 | Luis Campo-Giralte, Ricardo Jiménez-Peris, Marta Patiño-Martínez |
PolyVaccine: Protecting Web Servers against Zero-Day, Polymorphic and Metamorphic Exploits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SRDS ![In: 28th IEEE Symposium on Reliable Distributed Systems (SRDS 2009), Niagara Falls, New York, USA, September 27-30, 2009, pp. 91-99, 2009, IEEE Computer Society, 978-0-7695-3826-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
polymorphic malware, metamorphic malware, zero-day malware, web server, vulnerability, exploit |
22 | Leevar Williams, Richard Lippmann, Kyle Ingols |
GARNET: A Graphical Attack Graph and Reachability Network Evaluation Tool. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 5th International Workshop on Visualization for Computer Security, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings, pp. 44-59, 2008, Springer, 978-3-540-85931-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
attack path, visualization, network, recommendation, vulnerability, treemap, security metrics, attack graph, exploit, adversary model |
22 | Scott O'Hare, Steven Noel, Kenneth Prole |
A Graph-Theoretic Visualization Approach to Network Risk Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 5th International Workshop on Visualization for Computer Security, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings, pp. 60-67, 2008, Springer, 978-3-540-85931-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
exploit analysis, visualization, network security, situational awareness, attack graph, vulnerability assessment |
22 | Melanie Tupper, Nur Zincir-Heywood |
VEA-bility Security Metric: A Network Security Analysis Tool. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 950-957, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
network security, Attackability, Vulnerability, security metric, attack graphs, exploit, Exploitability, quantitative measure |
22 | Joseph Pamula, Sushil Jajodia, Paul Ammann, Vipin Swarup |
A weakest-adversary security metric for network configuration security analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QoP ![In: Proceedings of the 2nd ACM Workshop on Quality of Protection, QoP 2006, Alexandria, VA, USA, October 30, 2006, pp. 31-38, 2006, ACM, 1-59593-553-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
network security, vulnerability, security metric, attack graphs, exploit, quantitative measure |
22 | Joseph Pamula, Paul Ammann, Sushil Jajodia, Ronald W. Ritchey |
A framework for establishing, assessing, and managing trust in inter-organizational relationships. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SWS ![In: Proceedings of the 3rd ACM Workshop On Secure Web Services, SWS 2006, Alexandria, VA, USA, November 3, 2006, pp. 23-32, 2006, ACM, 1-59593-546-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
access graphs, network sharing, scalability, network security, vulnerability, attack graphs, exploit |
22 | Misha Zitser, Richard Lippmann, Tim Leek |
Testing static analysis tools using exploitable buffer overflows from open source code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGSOFT FSE ![In: Proceedings of the 12th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2004, Newport Beach, CA, USA, October 31 - November 6, 2004, pp. 97-106, 2004, ACM, 1-58113-855-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
test detection, security, evaluation, static analysis, source code, buffer overflow, exploit, false alarm |
21 | Omer Khan, Sandip Kundu |
A model to exploit power-performance efficiency in superscalar processors via structure resizing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Great Lakes Symposium on VLSI ![In: Proceedings of the 20th ACM Great Lakes Symposium on VLSI 2009, Providence, Rhode Island, USA, May 16-18 2010, pp. 215-220, 2010, ACM, 978-1-4503-0012-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
modeling, power |
21 | Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu 0005 |
STILL: Exploit Code Detection via Static Taint and Initialization Analyses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Fourth Annual Computer Security Applications Conference, ACSAC 2008, Anaheim, California, USA, 8-12 December 2008, pp. 289-298, 2008, IEEE Computer Society, 978-0-7695-3447-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Woo-Cheol Kwon, Sungjoo Yoo, Sung-Min Hong, Byeong Min, Kyu-Myung Choi, Soo-Kwan Eo |
A practical approach of memory access parallelization to exploit multiple off-chip DDR memories. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DAC ![In: Proceedings of the 45th Design Automation Conference, DAC 2008, Anaheim, CA, USA, June 8-13, 2008, pp. 447-452, 2008, ACM, 978-1-60558-115-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
parallelization, memory, arbitration |
21 | Ashish Deshpande, Jonathan E. Luntz |
A method to characterize and exploit actuation redundancy in mobility and manipulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IROS ![In: 2007 IEEE/RSJ International Conference on Intelligent Robots and Systems, October 29 - November 2, 2007, Sheraton Hotel and Marina, San Diego, California, USA, pp. 3515-3521, 2007, IEEE, 978-1-4244-0912-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Venkat Pothamsetty, Prabhaker Mateti |
A case for exploit-robust and attack-aware protocol RFCs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), Proceedings, 25-29 April 2006, Rhodes Island, Greece, 2006, IEEE. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Yabo Li, Xiang-Gen Xia 0001, Genyuan Wang |
Simple iterative methods to exploit the signal-space diversity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Commun. ![In: IEEE Trans. Commun. 53(1), pp. 32-38, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Jingyu Zhou, Giovanni Vigna |
Detecting Attacks That Exploit Application-Logic Errors Through Application-Level Auditing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 20th Annual Computer Security Applications Conference (ACSAC 2004), 6-10 December 2004, Tucson, AZ, USA, pp. 168-178, 2004, IEEE Computer Society, 0-7695-2252-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Steven Noel, Sushil Jajodia, Brian O'Berry, Michael Jacobs 0001 |
Efficient Minimum-Cost Network Hardening Via Exploit Dependency Graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 19th Annual Computer Security Applications Conference (ACSAC 2003), 8-12 December 2003, Las Vegas, NV, USA, pp. 86-95, 2003, IEEE Computer Society, 0-7695-2041-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
18 | Hilmi Günes Kayacik, Nur Zincir-Heywood, Malcolm I. Heywood, Stefan Burschka |
Testing Detector Parameterization Using Evolutionary Exploit Generation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EvoWorkshops ![In: Applications of Evolutionary Computing, EvoWorkshops 2009: EvoCOMNET, EvoENVIRONMENT, EvoFIN, EvoGAMES, EvoHOT, EvoIASP, EvoINTERACTION, EvoMUSART, EvoNUM, EvoSTOC, EvoTRANSLOG, Tübingen, Germany, April 15-17, 2009. Proceedings, pp. 105-110, 2009, Springer, 978-3-642-01128-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Pedro M. Q. Aguiar, João M. F. Xavier, Marko Stosic |
Globally optimal solution to exploit rigidity when recovering structure from motion under occlusion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP ![In: Proceedings of the International Conference on Image Processing, ICIP 2008, October 12-15, 2008, San Diego, California, USA, pp. 197-200, 2008, IEEE, 978-1-4244-1765-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu 0005 |
Protecting web services from remote exploit code: a static analysis approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 17th International Conference on World Wide Web, WWW 2008, Beijing, China, April 21-25, 2008, pp. 1139-1140, 2008, ACM, 978-1-60558-085-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
static analysis, http, code injection attack |
18 | Carlos Morra, João Bispo, João M. P. Cardoso, Jürgen Becker 0001 |
Combining Rewriting-Logic, Architecture Generation, and Simulation to Exploit Coarse-Grained Reconfigurable Architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCCM ![In: 16th IEEE International Symposium on Field-Programmable Custom Computing Machines, FCCM 2008, 14-15 April 2008, Stanford, Palo Alto, California, USA, pp. 320-321, 2008, IEEE Computer Society, 978-0-7695-3307-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Fan Ding, Bin Wang 0004 |
An Axiomatic Approach to Exploit Term Dependencies in Language Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AIRS ![In: Information Retrieval Technology, 4th Asia Infomation Retrieval Symposium, AIRS 2008, Harbin, China, January 15-18, 2008, Revised Selected Papers, pp. 586-591, 2008, Springer, 978-3-540-68633-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Language Model, Term Dependency, Axiomatic Approach, Retrieval Heuristics |
18 | Maristella Agosti, Tullio Coppotelli, Nicola Ferro 0001, Luca Pretto |
An Approach for the Construction of an Experimental Test Collection to Evaluate Search Systems that Exploit Annotations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DELOS ![In: Digital Libraries: Research and Development, First International DELOS Conference, Pisa, Italy, February 13-14, 2007, Revised Selected Papers, pp. 167-176, 2007, Springer, 978-3-540-77087-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Kejing Liu, Javier Garcia-Frías |
Hidden Markov Models as Self-Organizing Maps to Exploit Time Dependencies in Data Clustering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISS ![In: Proceedings of the 41st Annual Conference on Information Sciences and Systems, CISS 2007, 14-16 March 2007, Johns Hopkins University, Department of Electrical Engineering, Baltimore, MD, USA, pp. 444-449, 2007, IEEE, 1-4244-1037-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Taehee Lee 0001, Junho Shim, Hyunja Lee, Sang-goo Lee |
A Pragmatic Approach to Model and Exploit the Semantics of Product Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Data Semantics ![In: Journal on Data Semantics VII, pp. 242-266, 2006, Springer, 3-540-46329-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Lixin Shi, Jian-Yun Nie |
Filtering or adapting: two strategies to exploit noisy parallel corpora for cross-language information retrieval. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIKM ![In: Proceedings of the 2006 ACM CIKM International Conference on Information and Knowledge Management, Arlington, Virginia, USA, November 6-11, 2006, pp. 814-815, 2006, ACM, 1-59593-433-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
alignment score, parallel corpus, noise filtering |
18 | Prashant Jain, Andrew Laffely, Wayne P. Burleson, Russell Tessier, Dennis Goeckel |
Dynamically Parameterized Algorithms and Architectures to Exploit Signal Variations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. VLSI Signal Process. ![In: J. VLSI Signal Process. 36(1), pp. 27-40, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
VLSI, motion estimation, digital signal processing, MPEG, power-aware |
18 | Franco Frattolillo |
A PVM Extension to Exploit Cluster Grids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PVM/MPI ![In: Recent Advances in Parallel Virtual Machine and Message Passing Interface, 11th European PVM/MPI Users' Group Meeting, Budapest, Hungary, September 19-22, 2004, Proceedings, pp. 362-369, 2004, Springer, 3-540-23163-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
18 | Jike Cui, Mansur H. Samadzadeh |
A new hybrid approach to exploit localities: LRFU with adaptive prefetching. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMETRICS Perform. Evaluation Rev. ![In: SIGMETRICS Perform. Evaluation Rev. 31(3), pp. 37-43, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
18 | Per Stenström |
One Chip, One Server: How Do We Exploit Its Power? ![Search on Bibsonomy](Pics/bibsonomy.png) |
HiPC ![In: High Performance Computing - HiPC 2003, 10th International Conference, Hyderabad, India, December 17-20, 2003, Proceedings, pp. 405, 2003, Springer, 3-540-20626-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
18 | Stavroula Zoi, Dimitrios Loukatos, Lambros Sarakis, Panagiotis Stathopoulos, Nikolas Mitrou |
Extending an Open MPEG-4 Video Streaming Platform to Exploit a Differentiated Services Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HSNMC ![In: High Speed Networks and Multimedia Communications, 6th IEEE International Conference HSNMC 2003, Estoril, Portugal, July 23-25, 2003, Proceedings, pp. 385-394, 2003, Springer, 3-540-40542-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
18 | Kaushal R. Gandhi, Nihar R. Mahapatra |
A Study of Hardware Techniques That Dynamically Exploit Frequent Operands to Reduce Power Consumption in Integer Function Units. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCD ![In: 21st International Conference on Computer Design (ICCD 2003),VLSI in Computers and Processors, 13-15 October 2003, San Jose, CA, USA, Proceedings, pp. 426-, 2003, IEEE Computer Society, 0-7695-2025-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
18 | Narasimhan Ramasubramanian, Ram Subramanian, Santosh Pande |
Automatic Compilation of Loops to Exploit Operator Parallelism on Configurable Arithmetic Logic Units. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 13(1), pp. 45-66, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
operator parallelism, FPGAs, parallel computing, Compilers, loop transformation, reconfigurable systems |
18 | Petko Faber, Bob Fisher |
How can we exploit typical architectural structures to improve model recovery? ![Search on Bibsonomy](Pics/bibsonomy.png) |
3DPVT ![In: 1st International Symposium on 3D Data Processing Visualization and Transmission (3DPVT 2002), 19-21 June 2002, Padova, Italy, pp. 824-833, 2002, IEEE Computer Society, 0-7695-1521-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
18 | Yong Yan 0003, Xiaodong Zhang 0001, Zhao Zhang 0010 |
Cacheminer: A Runtime Approach to Exploit Cache Locality on SMP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 11(4), pp. 357-374, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
symmetric multiprocessors (SMP) and task scheduling, simulation, runtime systems, nested loops, Cache locality |
18 | Narasimhan Ramasubramanian, Ram Subramanian, Santosh Pande |
Automatic Analysis of Loops to Exploit Operator Parallelism on Reconfigurable Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCPC ![In: Languages and Compilers for Parallel Computing, 11th International Workshop, LCPC'98, Chapel Hill, NC, USA, August 7-9, 1998, Proceedings, pp. 305-322, 1998, Springer, 3-540-66426-2. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
15 | Sara Saponaro, Francesca Lizzi, Giacomo Serra, Francesca Mainas, Piernicola Oliva, Alessia Giuliano, Sara Calderoni, Alessandra Retico |
Deep learning based joint fusion approach to exploit anatomical and functional brain information in autism spectrum disorders. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Brain Informatics ![In: Brain Informatics 11(1), pp. 2, December 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Subhalakshmi Gooptu, Shiv Issar |
Book Reviews: Worn Out: How Retailers Surveil and Exploit Workers in the Digital Age and How Workers Are Fighting Back Madison Van Oort. ![Search on Bibsonomy](Pics/bibsonomy.png) |
New Media Soc. ![In: New Media Soc. 26(1), pp. 596-598, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Juncheng Zhang, Qingmin Liao, Haoyu Ma, Jing-Hao Xue, Wenming Yang, Shaojun Liu |
Exploit the Best of Both End-to-End and Map-Based Methods for Multi-Focus Image Fusion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Multim. ![In: IEEE Trans. Multim. 26, pp. 6411-6423, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Lilin Xu, Chaojie Gu, Rui Tan 0001, Shibo He, Jiming Chen |
MESEN: Exploit Multimodal Data to Design Unimodal Human Activity Recognition with Few Labels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2404.01958, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Cheng Qian, Shihao Liang, Yujia Qin, Yining Ye, Xin Cong, Yankai Lin, Yesai Wu, Zhiyuan Liu 0001, Maosong Sun 0001 |
Investigate-Consolidate-Exploit: A General Strategy for Inter-Task Agent Self-Evolution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2401.13996, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Siwei Liu 0012, Ke Ma, Stephan M. Goetz |
A Robbins-Monro Sequence That Can Exploit Prior Information For Faster Convergence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2401.03206, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Dandan Xu, Kai Chen 0012, Miaoqian Lin, Chaoyang Lin, Xiaofeng Wang |
AutoPwn: Artifact-Assisted Heap Exploit Generation for CTF PWN Competitions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 19, pp. 293-306, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Simona Bottani, Elina Thibeau-Sutre, Aurélien Maire, Sebastian Ströer, Didier Dormont, Olivier Colliot, Ninon Burgos |
Contrast-enhanced to non-contrast-enhanced image translation to exploit a clinical data warehouse of T1-weighted brain MRI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BMC Medical Imaging ![In: BMC Medical Imaging 24(1), pp. 67, December 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Yichi Zhang, Zhihao Duan, Ming Lu, Dandan Ding, Fengqing Zhu 0001, Zhan Ma |
Another Way to the Top: Exploit Contextual Clustering in Learned Image Coding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAAI ![In: Thirty-Eighth AAAI Conference on Artificial Intelligence, AAAI 2024, Thirty-Sixth Conference on Innovative Applications of Artificial Intelligence, IAAI 2024, Fourteenth Symposium on Educational Advances in Artificial Intelligence, EAAI 2014, February 20-27, 2024, Vancouver, Canada, pp. 9377-9386, 2024, AAAI Press. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Matteo Castiglioni, Alberto Latino, Alberto Marchesi 0001, Giulia Romano, Nicola Gatti 0001, Chokha Palayamkottai |
Finding Effective Ad Allocations: How to Exploit User History. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS ![In: Proceedings of the 23rd International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2024, Auckland, New Zealand, May 6-10, 2024, pp. 262-270, 2024, ACM. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP BibTeX RDF |
|
15 | Xingran Chen, Hesam Nikpey, Jungyeol Kim, Saswati Sarkar, Shirin Saeedi Bidokhti |
Containing a spread through sequential learning: to exploit or to explore? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trans. Mach. Learn. Res. ![In: Trans. Mach. Learn. Res. 2023, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
15 | Marta Catillo, Umberto Villano, Massimiliano Rak |
A survey on auto-scaling: how to exploit cloud elasticity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Grid Util. Comput. ![In: Int. J. Grid Util. Comput. 14(1), pp. 37-50, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Nikhil Iyer, V. Thejas, Nipun Kwatra, Ramachandran Ramjee, Muthian Sivathanu |
Wide-minima Density Hypothesis and the Explore-Exploit Learning Rate Schedule. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Mach. Learn. Res. ![In: J. Mach. Learn. Res. 24, pp. 65:1-65:37, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
15 | Mohammadreza Mohades Kasaei, Miguel Abreu, Nuno Lau, Artur Pereira, Luís Paulo Reis, Zhibin Li 0001 |
Learning hybrid locomotion skills - Learn to exploit residual actions and modulate model-based gait control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Frontiers Robotics AI ![In: Frontiers Robotics AI 10, February 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Mengxin Yu, Aimin Tang, Xudong Wang 0001, Jinnan Liu |
FDOE: Exploit Concurrent Communication Opportunities in Full-Duplex Wireless Mesh Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Mob. Comput. ![In: IEEE Trans. Mob. Comput. 22(7), pp. 3925-3939, July 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Lennert Van der Schraelen, Kristof Stouthuysen, Seppe K. L. M. vanden Broucke, Tim Verdonck |
Regularization oversampling for classification tasks: To exploit what you do not know. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Sci. ![In: Inf. Sci. 635, pp. 169-194, July 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Hao Tian, Hong Zhang, Juncheng Jia, Mianxiong Dong, Kaoru Ota |
FedBroadcast: Exploit Broadcast Channel for Fast Convergence in Wireless Federated Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 10(5), pp. 4652-4663, March 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Ronen Shaltiel |
Is it possible to improve Yao's XOR lemma using reductions that exploit the efficiency of their oracle? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Complex. ![In: Comput. Complex. 32(1), pp. 5, June 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Guifang Duan, Yunkun Xu, Zhenyu Liu 0005, Jianrong Tan |
Hand-in-Hand Guidance: An Explore-Exploit Based Reinforcement Learning Method for Performance Driven Assembly-Adjustment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Ind. Informatics ![In: IEEE Trans. Ind. Informatics 19(10), pp. 10045-10055, October 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Vincent Werner, Laurent Maingault, Marie-Laure Potet |
An end-to-end approach to identify and exploit multi-fault injection vulnerabilities on microcontrollers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptogr. Eng. ![In: J. Cryptogr. Eng. 13(2), pp. 149-165, June 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Hayley Hung |
How AI can Exploit Body Language to Understand Social Behaviour in the Wild. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ERCIM News ![In: ERCIM News 2023(132), 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
15 | Noah L. Schrick, Peter J. Hawrylak |
State Space Explosion Mitigation for Large-Scale Attack and Compliance Graphs Using Synchronous Exploit Firing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Open J. Comput. Soc. ![In: IEEE Open J. Comput. Soc. 4, pp. 147-157, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Yu Wang, Yipeng Zhang, Zhoujun Li 0001 |
AAHEG: Automatic Advanced Heap Exploit Generation Based on Abstract Syntax Tree. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Symmetry ![In: Symmetry 15(12), pp. 2197, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Scott Cheng-Hsin Yang, Chirag Rank, Jake Alden Whritner, Olfa Nasraoui, Patrick Shafto |
Human Variability and the Explore-Exploit Trade-Off in Recommendation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cogn. Sci. ![In: Cogn. Sci. 47(4), April 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Elena Fedorchenko, Evgenia Novikova, Andrey Fedorchenko, Sergey Verevkin |
An Analytical Review of the Source Code Models for Exploit Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. ![In: Inf. 14(9), pp. 497, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Iñigo Flores Ituarte, Suraj Panicker, Hari P. N. Nagarajan, Eric Coatanéa, David W. Rosen |
Optimisation-driven design to explore and exploit the process-structure-property-performance linkages in digital manufacturing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Intell. Manuf. ![In: J. Intell. Manuf. 34(1), pp. 219-241, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | David M. Bossens, Nicholas Bishop |
Explicit Explore, Exploit, or Escape (E4): near-optimal safety-constrained reinforcement learning in polynomial time. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mach. Learn. ![In: Mach. Learn. 112(3), pp. 817-858, March 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Debojyoti Biswas, Andrew G. Lamperski, Yu Yang, Kathleen Hoffman, John Guckenheimer, Eric S. Fortune, Noah J. Cowan |
Mode switching in organisms for solving explore-versus-exploit problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Nat. Mac. Intell. ![In: Nat. Mac. Intell. 5(11), pp. 1285-1296, October 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Sahibzada Adil Shahzad, Ammarah Hashmi, Yan-Tsung Peng, Yu Tsao 0001, Hsin-Min Wang |
AV-Lip-Sync+: Leveraging AV-HuBERT to Exploit Multimodal Inconsistency for Video Deepfake Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2311.02733, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Tong Wang 0036, Shuichi Kurabayashi |
Adaptive Multi-NeRF: Exploit Efficient Parallelism in Adaptive Multiple Scale Neural Radiance Field Rendering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2310.01881, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Michael Rodler, David Paaßen, Wenting Li, Lukas Bernhard, Thorsten Holz, Ghassan Karame, Lucas Davi |
EF/CF: High Performance Smart Contract Fuzzing for Exploit Generation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2304.06341, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Jiren Mai, Fei Zhang, Junjie Ye, Marcus Kalander, Xian Zhang, Wankou Yang, Tongliang Liu, Bo Han 0003 |
Exploit CAM by itself: Complementary Learning System for Weakly Supervised Semantic Segmentation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2303.02449, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Ke Xu, Jiangtao Wang 0001, Hongyuan Zhu, Dingchang Zheng |
Exploit the antenna response consistency to define the alignment criteria for CSI data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2310.06328, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Jay Jacobs, Sasha Romanosky, Octavian Suciuo, Benjamin Edwards, Armin Sarabi |
Enhancing Vulnerability Prioritization: Data-Driven Exploit Predictions with Community-Driven Insights. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2302.14172, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Yimeng Chen, Tianyang Hu, Fengwei Zhou, Zhenguo Li, Zhiming Ma |
Explore and Exploit the Diverse Knowledge in Model Zoo for Domain Generalization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2306.02595, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Andrea Apicella 0001, Luca Di Lorenzo, Francesco Isgrò, Andrea Pollastro, Roberto Prevete |
Strategies to exploit XAI to improve classification systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2306.05801, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Tanujay Saha, Tamjid Al Rahat, Najwa Aaraj, Yuan Tian 0001, Niraj K. Jha |
ML-FEED: Machine Learning Framework for Efficient Exploit Detection (Extended version). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2301.04314, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Bharath Muppasani, Vishal Pallagani, Biplav Srivastava, Raghava Mutharaju, Michael N. Huhns, Vignesh Narayanan |
A Planning Ontology to Represent and Exploit Planning Knowledge for Performance Efficiency. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2307.13549, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Francesco Bacchiocchi, Matteo Castiglioni, Alberto Marchesi 0001, Nicola Gatti 0001 |
Learning Optimal Contracts: How to Exploit Small Action Spaces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2309.09801, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 9558 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|