共 50 条
- [31] Things at the Edge of the World PHENOMENOLOGIES OF THE STRANGER: BETWEEN HOSTILITY AND HOSPITALITY, 2011, : 67 - 79
- [32] Enhancing security of internet of medical things in fog-edge environment: a study on attack detection performance SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2024, 49 (04):
- [35] Optimal Disintegration Strategy in Multiplex Networks:From an Edge-based Attack Perspective 2021 PROCEEDINGS OF THE 40TH CHINESE CONTROL CONFERENCE (CCC), 2021, : 788 - 794
- [36] Attacking Quality-of-Care Gaps in Transient Ischemic Attack STROKE, 2021, 52 (07) : 2379 - 2380
- [37] Diffusion Attack: Leveraging Stable Diffusion for Naturalistic Image Attacking 2024 IEEE CONFERENCE ON VIRTUAL REALITY AND 3D USER INTERFACES ABSTRACTS AND WORKSHOPS, VRW 2024, 2024, : 975 - 976
- [38] The Pushdown Attack and Attacking the Substitution Cipher Chaining mode (SCC) JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2009, 4 (04): : 546 - 559
- [40] Attack Some while Protecting Others: Selective Attack Strategies for Attacking and Protecting Multiple Concepts PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 801 - 814