Abstract: The vast majority of web applications' databases are vulnerable to SQL Query Injection Attacks, which let clients directly insert sensitive data. They carry out their operations by inserting ...
Tracing of basic set of events (Batch/RPC/SP:Stmt Starting/Completed, Audit login/logout, User error messages, Blocked Process report) and columns (Event Class, Text ...
Abstract: Physical adversarial examples (AEs) have become an increasing threat to deploying deep neural network (DNN) models in the real world. Popular approaches adopt sticking-based or ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results