default search action
Cybersecurity, Volume 7
Volume 7, Number 1, December 2024
- Keya Xu, Guang Cheng:
F3l: an automated and secure function-level low-overhead labeled encrypted traffic dataset construction method for IM in Android. 1 - Shuang Song, Neng Gao, Yifei Zhang, Cunqing Ma:
BRITD: behavior rhythm insider threat detection with time awareness and user adaptation. 2 - Md. Alamgir Hossain, Md. Saiful Islam:
Enhanced detection of obfuscated malware in memory dumps: a machine learning approach for advanced cybersecurity. 16 - Yanjun Li, Weiguo Zhang, Yiping Lin, Jian Zou, Jian Liu:
A circuit area optimization of MK-3 S-box. 17 - Yanwei Gong, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Jianhua Wang, Haoran Zhu:
Practical solutions in fully homomorphic encryption: a survey analyzing existing acceleration methods. 5 - Haoran Lyu, Yajie Wang, Yu-An Tan, Huipeng Zhou, Yuhang Zhao, Quanxin Zhang:
Maxwell's Demon in MLP-Mixer: towards transferable adversarial attacks. 6 - Ximing Li, Hao Wang, Sha Ma, Meiyan Xiao, Qiong Huang:
Revocable and verifiable weighted attribute-based encryption with collaborative access for electronic health record in cloud. 18 - Xi Lin, Heyang Cao, Feng-Hao Liu, Zhedong Wang, Mingsheng Wang:
Shorter ZK-SNARKs from square span programs over ideal lattices. 33 - Fengxia Liu, Zhiyong Zheng, Zixian Gong, Kun Tian, Yi Zhang, Zhe Hu, Jia Li, Qun Xu:
A survey on lattice-based digital signature. 7 - Renyang Liu, Wei Zhou, Xin Jin, Song Gao, Yuanyu Wang, Ruxin Wang:
DTA: distribution transform-based attack for query-limited scenario. 8 - Chenxi Hu, Tao Wu, Chunsheng Liu, Chao Chang:
Joint contrastive learning and belief rule base for named entity recognition in cybersecurity. 19 - Alex Shafarenko:
Winternitz stack protocols for embedded systems and IoT. 34 - Linwei Fang, Liming Wang, Hongjia Li:
Iterative and mixed-spaces image gradient inversion attack in federated learning. 35 - Mahdi Soltani, Khashayar Khajavi, Mahdi Jafari Siavoshani, Amir Hossein Jahangir:
A multi-agent adaptive deep learning framework for online intrusion detection. 9 - Batoul Achaal, Mehdi Adda, Maxime Berger, Hussein Ibrahim, Ali Awde:
Study of smart grid cyber-security, examining architectures, communication networks, cyber-attacks, countermeasure techniques, and challenges. 10 - Chunwen Liu, Ru Tan, Yang Wu, Yun Feng, Ze Jin, Fangjiao Zhang, Yuling Liu, Qixu Liu:
Dissecting zero trust: research landscape and its implementation in IoT. 20 - Chen An, Mengjie Huang, Xianhui Lu, Lei Bi, Weijie Li:
Polar code-based secure transmission with higher message rate combining channel entropy and computational entropy. 36 - Yuantu Luo, Jun Tao, Yuehao Zhu, Yifan Xu:
HSS: enhancing IoT malicious traffic classification leveraging hybrid sampling strategy. 11 - Zeshuo Zhu, Rui Zhang, Yang Tao:
Atomic cross-chain swap based on private key exchange. 12 - Huaxin Wang, Yiwen Gao, Yuejun Liu, Qian Zhang, Yongbin Zhou:
In-depth Correlation Power Analysis Attacks on a Hardware Implementation of CRYSTALS-Dilithium. 21 - Chaoqun Wang, Ning Li, Shujuan Ji, Xianwen Fang, Zhen Wang:
Enhancing fairness of trading environment: discovering overlapping spammer groups with dynamic co-review graph optimization. 37 - Zheng Sun, Jinxiao Zhao, Feng Guo, Yuxuan Chen, Lei Ju:
CommanderUAP: a practical and transferable universal adversarial attacks on speech recognition models. 38 - Ruida Wang, Ziyi Li, Xianhui Lu, Zhenfei Zhang, Kunpeng Wang:
Key derivable signature and its application in blockchain stealth address. 43 - Tin Lai, Farnaz Farid, Abubakar Bello, Fariza Sabrina:
Ensemble learning based anomaly detection for IoT cybersecurity via Bayesian hyperparameters sensitivity analysis. 44 - Chuyi Yan, Xueying Han, Yan Zhu, Dan Du, Zhigang Lu, Yuling Liu:
Phishing behavior detection on different blockchains via adversarial domain adaptation. 45 - Edward Chuah, Neeraj Suri:
An empirical study of reflection attacks using NetFlow data. 13 - Benqiang Wei, Xianhui Lu:
Improved homomorphic evaluation for hash function based on TFHE. 14 - Miao Tian, Yushu Zhang, Yongming Zhang, Xiangli Xiao, Wenying Wen:
A privacy-preserving image retrieval scheme with access control based on searchable encryption in media cloud. 22 - Yao Pan, Zheng Chao, He Wang, Jing Yang, Hongjia Li, Liming Wang:
FedSHE: privacy preserving and efficient federated learning with adaptive segmented CKKS homomorphic encryption. 40 - Huizhuo Wang, Yang Tao, Rui Zhang:
Threshold ring signature: generic construction and logarithmic size instantiation. 46 - Qintao Shen, Guozhu Meng, Kai Chen:
Revealing the exploitability of heap overflow through PoC analysis. 47 - Wenbo Wang, Peng Yi, Taotao Kou, Weitao Han, Chengyu Wang:
GLDOC: detection of implicitly malicious MS-Office documents using graph convolutional networks. 48 - Haobin Chen, Yue Yang, Siyi Lv:
Revisiting frequency-smoothing encryption: new security definitions and efficient construction. 15 - Urikhimbam Boby Clinton, Nazrul Hoque, Kh Robindro Singh:
Classification of DDoS attack traffic on SDN network environment using deep learning. 23 - Mingxing Hu, Zhen Liu, Yunhong Zhou:
Efficient post-quantum secure deterministic wallet scheme. 24 - Jie Yuan, Rui Xu, Xinghai Wei, Keji Miao, Dongxiao Liu:
TVRAVNF: an efficient low-cost TEE-based virtual remote attestation scheme for virtual network functions. 39 - Yinghong Xie, Yan Hao, Xiaowei Han, Qiang Gao, Biao Yin:
A multi-channel spatial information feature based human pose estimation algorithm. 49 - Zhuo Zhao, Ching-Fang Hsu, Lein Harn, Zhe Xia, Xinyu Jiang, Liu Liu:
Lightweight ring-neighbor-based user authentication and group-key agreement for internet of drones. 50 - Boyuan Xu, Yiru Gong, Xiaoyu Geng, Yun Li, Cong Dong, Song Liu, Yuling Liu, Bo Jiang, Zhigang Lu:
ProcSAGE: an efficient host threat detection method based on graph representation learning. 51 - Juntao He, Haoran Dai, Runqi Sui, Xuejing Yuan, Dun Liu, Hao Feng, Xinyue Liu, Wenchuan Yang, Baojiang Cui, Kedan Li:
EvilPromptFuzzer: generating inappropriate content based on text-to-image models. 70 - Kaini Chen, Peisong Shen, Kewei Lv, Xue Tian, Chi Chen:
Dynamic group fuzzy extractor. 25 - Ziming Jiang, Yongbin Zhou, Yuejun Liu:
New partial key exposure attacks on RSA with additive exponent blinding. 26 - Chenset Kim, Chakchai So-In, Yanika Kongsorot, Phet Aimtongkham:
FLSec-RPL: a fuzzy logic-based intrusion detection scheme for securing RPL-based IoT networks against DIO neighbor suppression attacks. 27 - Mikhail Kuznetsov, Evgenia Novikova, Igor V. Kotenko:
Modelling user notification scenarios in privacy policies. 41 - Shahid Alam, Alper Kamil Demir:
SIFT: Sifting file types - application of explainable artificial intelligence in cyber forensics. 52 - Yamei Wang, Weijing You, Yuexin Zhang, Ayong Ye, Li Xu:
Cloud EMRs auditing with decentralized (t, n)-threshold ownership transfer. 53 - Sachin Kadam, Anna Scaglione, Nikhil Ravi, Sean Peisert, Brent Lunghino, Aram Shumavon:
Optimum noise mechanism for differentially private queries in discrete finite sets. 54 - Bin Huang, Yanhui Du:
Break-Pad: effective padding machines for tor with break burst padding. 28 - Wenhan Xu, Hui Ma, Rui Zhang:
GAPS: GPU-accelerated processing service for SM9. 29 - Zhongxu Yin, Yiran Song, Guoxiao Zong:
Discovering API usage specifications for security detection using two-stage code mining. 30 - Chao An, Yuting Xiao, HaiHang Liu, Han Wu, Rui Zhang:
Honey password vaults tolerating leakage of both personally identifiable information and passwords. 42 - Jingjie Xu, Ting Wang, Mingqi Lv, Tieming Chen, Tiantian Zhu, Baiyang Ji:
MVD-HG: multigranularity smart contract vulnerability detection method based on heterogeneous graphs. 55 - Nansen Wang, Jianing Zhang, Ju Huang, Wei Ou, Wenbao Han, Qionglu Zhang:
Telemedicine data secure sharing scheme based on heterogeneous federated learning. 56 - Jingzhi Liu, Hongyi Yang, Quanlei Qu, Zhidong Liu, Yang Cao:
Research on distribution automation security situational awareness technology based on risk transmission path and multi-source information fusion. 57 - Yincen Chen, Yi Guo, Xuanyu Liang, Ling Song, Qianqian Yang:
Revisiting the shuffle of generalized Feistel structure. 31 - Md. Alamin Talukder, Rakib Hossen, Md. Ashraf Uddin, Mohammed Nasir Uddin, Uzzal Kumar Acharjee:
Securing transactions: a hybrid dependable ensemble machine learning model using IHT-LR and grid search. 32
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.