Linked to North Korean fake job-recruitment campaigns, the poisoned repositories are aimed at establishing persistent C2 ...
A developer-targeting campaign leveraged malicious Next.js repositories to trigger a covert RCE-to-C2 chain through standard ...
A Python code obfuscator built with AST-based transformations. Supports Python 3.8 through 3.14 (including the latest stable release). Provides reliable name mangling, string encoding, and code ...
Abstract: Federated learning (FL) is a promising privacy-preserving distributed machine learning paradigm. However, data privacy leakage and Byzantine clients are common challenges in the FL ...
Abstract: Plethora of image encryption schemes exist in literature based on the construct of magic square for realizing the purpose of image obfuscation. This magic square carries out the scrambling ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results