To avoid potential risks posed by vulnerabilities in third-party librari...
System auditing is a crucial technique for detecting APT attacks. Howeve...
Provenance-Based Endpoint Detection and Response (P-EDR) systems are dee...
To address security vulnerabilities arising from third-party libraries,
...
Self-supervised skeleton-based action recognition enjoys a rapid growth ...
Recently, anchor-based trajectory prediction methods have shown promisin...
Although existing techniques have proposed automated approaches to allev...
Recently, the first feature-rich NTFS implementation, NTFS3, has been
up...
This paper aims to tackle the interactive behavior prediction task, and
...
Temporal Action Localization (TAL) aims to predict both action category ...
In group activity recognition, hierarchical framework is widely adopted ...
Serverless computing is an emerging cloud computing paradigm that frees
...
Unified Diagnostic Services (UDS) is a diagnostic communication protocol...
Video moment retrieval aims to search the moment most relevant to a give...
The target of 2D human pose estimation is to locate the keypoints of bod...
Many users implicitly assume that software can only be exploited after i...
Detecting anomalies in dynamic graphs is a vital task, with numerous
pra...
Information systems have widely been the target of malware attacks.
Trad...
The need for countering Advanced Persistent Threat (APT) attacks has led...
Program or process is an integral part of almost every IT/OT system. Can...
Recently, advanced cyber attacks, which consist of a sequence of steps t...
Driven by the popularity of the Android system, Android app markets enjo...