default search action
2nd SciSec 2019: Nanjing, China
- Feng Liu, Jia Xu, Shouhuai Xu, Moti Yung:
Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers. Lecture Notes in Computer Science 11933, Springer 2019, ISBN 978-3-030-34636-2
Artificial Intelligence for Cybersecurity
- Yuan Wang, Jinzhi Wang, Jianhong Gao, Shengsheng Hu, Huacheng Sun, Yongli Wang:
Cross-Domain Recommendation System Based on Tensor Decomposition for Cybersecurity Data Analytics. 3-19 - Yun Chen, Yunlan Du, Xiaomei Cao:
Density Peak Clustering Algorithm Based on Differential Privacy Preserving. 20-32 - Kangyang Chen, Xinyi Zou, Xingguo Chen, Huihui Wang:
An Automated Online Spam Detector Based on Deep Cascade Forest. 33-46 - Xiao Tu, Guo-Ping Jiang, Yurong Song:
Multiplex PageRank in Multilayer Networks Considering Shunt. 47-58
Machine Learning for Cybersecurity
- Bin Xia, Junjie Yin, Jian Xu, Yun Li:
LogGAN: A Sequence-Based Generative Adversarial Network for Anomaly Detection Based on System Logs. 61-76 - Zhaofeng Liu, Zhen Jia, Wenlian Lu:
Security Comparison of Machine Learning Models Facing Different Attack Targets. 77-91 - Binghui Liu, Keji Han, Jie Hang, Yun Li:
Adversarial Training Based Feature Selection. 92-105 - Shikang Yu, Yang Wu, Yurong Song, Guoping Jiang, Xiaoping Su:
Application of DeepWalk Based on Hyperbolic Coordinates on Unsupervised Clustering. 106-118
Attack and Defense
- Xin Huang, Fei Yan, Liqiang Zhang, Kai Wang:
HoneyGadget: A Deception Based ROP Detection Scheme. 121-135 - Jie Zhang, Zhihao Zhang:
LET-Attack: Latent Encodings of Normal-Data Manifold Transferring to Adversarial Examples. 136-150 - Yinwei Li, Bo Song, Xu Zhang, Guo-Ping Jiang, Yurong Song:
New Robustness Measures of Communication Networks Against Virus Attacks. 151-162 - Shuai Jiang, Xiaolong Xu:
Application and Performance Analysis of Data Preprocessing for Intrusion Detection System. 163-177
Blockchain, Attack and Defense
- Zhi Qiao, Congcong Zhu, Zhiwei Wang, Nianhua Yang:
Anonymous IoT Data Storage and Transaction Protocol Based on Blockchain and Edge Computing. 181-189 - Gang Xue, Jia Xu, Hanwen Wu, Weifeng Lu, Lijie Xu:
Incentive Mechanism for Bitcoin Mining Pool Based on Stackelberg Game. 190-198 - Qian (Guenevere) Chen, Sheikh Rabiul Islam, Henry Haswell, Robert A. Bridges:
Automated Ransomware Behavior Analysis: Pattern Extraction and Early Detection. 199-214 - Hang Ling, Jing Han, Jiayi Pang, Jianwei Liu, Jia Xu, Zheng Liu:
Behavior Flow Graph Construction from System Logs for Anomaly Analysis. 215-223 - Yin Hongji, Chen Wei:
Knowledge Graph Based Semi-automatic Code Auditing System. 224-231
Encryption and Application
- Hao Zhou, Geng Yang, Yahong Xu, Weiya Wang:
Effective Matrix Factorization for Recommendation with Local Differential Privacy. 235-249 - Tianfu Chen, Zhenghua Qi, Jiagen Cheng:
Fully Anonymous Blockchain Constructed Based on Aggregate Signature and Ring Signature. 250-261 - Datian Peng, Jianmin Dong, Qinke Peng, Bo Zeng, Zhi-Hong Mao:
FDIA-Identified Overloaded Power Lines. 262-277 - Shaohui Wang, Yanxuan Zhang, Changbo Ke, Fu Xiao, Ruchuan Wang:
Optimal Key-Tree for RFID Authentication Protocols with Storage Constraints. 278-292 - Lin Mei, Chungen Xu, Lei Xu, Zhongyi Liu, Xiaoling Yu, Zhigang Yao:
Towards Realizing Authorized Encrypted Search with Designed Access Policy. 293-307 - Zhigang Yao, Chungen Xu, Lei Xu, Lin Mei:
Forward Private Searchable Encryption with Conjunctive Keywords Query. 308-322 - Yuxi Li, Fucai Zhou, Zifeng Xu:
PAFR: Privacy-Aware Friends Retrieval over Online Social Networks. 323-338 - Zhiwei Wang, Zhiyuan Cheng, Nianhua Yang:
An ID-Based Linear Homomorphic Cryptosystem and Its Applications for the Isolated Smart Grid Devices. 339-353 - Mengce Zheng, Honggang Hu:
Implicit-Key Attack on the RSA Cryptosystem. 354-362 - Yang Wu, Shikang Yu, Yurong Song, Guoping Jiang, Xiao Tu:
High-Efficiency Triangle Counting on the GPU. 363-370 - Zhenchao Zhang, Yali Liu, Xinchun Yin, Xincheng Li:
A New Pairing-Free Certificateless Signature Scheme for Internet of Things. 371-379
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.