共 50 条
- [1] Threat models over space and time: A case study of end-to-end-encrypted messaging applications [J]. SOFTWARE-PRACTICE & EXPERIENCE, 2024,
- [2] Functional Architecture of End-to-End Reconfigurable Systems [J]. 2006 IEEE 63RD VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-6, 2006, : 196 - +
- [3] End-to-End Architecture for Adaptive Communication Systems [J]. 2006 IEEE 64TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-6, 2006, : 3027 - +
- [4] Traceback for End-to-End Encrypted Messaging [J]. PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 413 - 430
- [6] End-to-end Flow Inference of Encrypted MANET [J]. 2013 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY (ICIST), 2013, : 1104 - 1109
- [7] End-to-end Learning for Encrypted Image Retrieval [J]. 2021 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2021, : 1839 - 1845
- [8] End-to-End Encrypted Messaging Protocols: An Overview [J]. INTERNET SCIENCE, (INSCI 2016), 2016, 9934 : 244 - 254
- [9] DeepHash: An End-to-End Learning Approach for Metadata Management in Distributed File Systems [J]. PROCEEDINGS OF THE 48TH INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING (ICPP 2019), 2019,
- [10] Towards General Purpose Vision Systems: An End-to-End Task-Agnostic Vision-Language Architecture [J]. 2022 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2022), 2022, : 16378 - 16388