default search action
Cybersecurity, Volume 7
Volume 7, Number 1, December 2024
- Keya Xu, Guang Cheng:
F3l: an automated and secure function-level low-overhead labeled encrypted traffic dataset construction method for IM in Android. 1 - Shuang Song, Neng Gao, Yifei Zhang, Cunqing Ma:
BRITD: behavior rhythm insider threat detection with time awareness and user adaptation. 2 - Md. Alamgir Hossain, Md. Saiful Islam:
Enhanced detection of obfuscated malware in memory dumps: a machine learning approach for advanced cybersecurity. 16 - Yanjun Li, Weiguo Zhang, Yiping Lin, Jian Zou, Jian Liu:
A circuit area optimization of MK-3 S-box. 17 - Yanwei Gong, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Jianhua Wang, Haoran Zhu:
Practical solutions in fully homomorphic encryption: a survey analyzing existing acceleration methods. 5 - Haoran Lyu, Yajie Wang, Yu-An Tan, Huipeng Zhou, Yuhang Zhao, Quanxin Zhang:
Maxwell's Demon in MLP-Mixer: towards transferable adversarial attacks. 6 - Ximing Li, Hao Wang, Sha Ma, Meiyan Xiao, Qiong Huang:
Revocable and verifiable weighted attribute-based encryption with collaborative access for electronic health record in cloud. 18 - Xi Lin, Heyang Cao, Feng-Hao Liu, Zhedong Wang, Mingsheng Wang:
Shorter ZK-SNARKs from square span programs over ideal lattices. 33 - Fengxia Liu, Zhiyong Zheng, Zixian Gong, Kun Tian, Yi Zhang, Zhe Hu, Jia Li, Qun Xu:
A survey on lattice-based digital signature. 7 - Renyang Liu, Wei Zhou, Xin Jin, Song Gao, Yuanyu Wang, Ruxin Wang:
DTA: distribution transform-based attack for query-limited scenario. 8 - Chenxi Hu, Tao Wu, Chunsheng Liu, Chao Chang:
Joint contrastive learning and belief rule base for named entity recognition in cybersecurity. 19 - Alex Shafarenko:
Winternitz stack protocols for embedded systems and IoT. 34 - Linwei Fang, Liming Wang, Hongjia Li:
Iterative and mixed-spaces image gradient inversion attack in federated learning. 35 - Mahdi Soltani, Khashayar Khajavi, Mahdi Jafari Siavoshani, Amir Hossein Jahangir:
A multi-agent adaptive deep learning framework for online intrusion detection. 9 - Batoul Achaal, Mehdi Adda, Maxime Berger, Hussein Ibrahim, Ali Awde:
Study of smart grid cyber-security, examining architectures, communication networks, cyber-attacks, countermeasure techniques, and challenges. 10 - Chunwen Liu, Ru Tan, Yang Wu, Yun Feng, Ze Jin, Fangjiao Zhang, Yuling Liu, Qixu Liu:
Dissecting zero trust: research landscape and its implementation in IoT. 20 - Chen An, Mengjie Huang, Xianhui Lu, Lei Bi, Weijie Li:
Polar code-based secure transmission with higher message rate combining channel entropy and computational entropy. 36 - Yuantu Luo, Jun Tao, Yuehao Zhu, Yifan Xu:
HSS: enhancing IoT malicious traffic classification leveraging hybrid sampling strategy. 11 - Zeshuo Zhu, Rui Zhang, Yang Tao:
Atomic cross-chain swap based on private key exchange. 12 - Huaxin Wang, Yiwen Gao, Yuejun Liu, Qian Zhang, Yongbin Zhou:
In-depth Correlation Power Analysis Attacks on a Hardware Implementation of CRYSTALS-Dilithium. 21 - Chaoqun Wang, Ning Li, Shujuan Ji, Xianwen Fang, Zhen Wang:
Enhancing fairness of trading environment: discovering overlapping spammer groups with dynamic co-review graph optimization. 37 - Zheng Sun, Jinxiao Zhao, Feng Guo, Yuxuan Chen, Lei Ju:
CommanderUAP: a practical and transferable universal adversarial attacks on speech recognition models. 38 - Ruida Wang, Ziyi Li, Xianhui Lu, Zhenfei Zhang, Kunpeng Wang:
Key derivable signature and its application in blockchain stealth address. 43 - Tin Lai, Farnaz Farid, Abubakar Bello, Fariza Sabrina:
Ensemble learning based anomaly detection for IoT cybersecurity via Bayesian hyperparameters sensitivity analysis. 44 - Chuyi Yan, Xueying Han, Yan Zhu, Dan Du, Zhigang Lu, Yuling Liu:
Phishing behavior detection on different blockchains via adversarial domain adaptation. 45 - Edward Chuah, Neeraj Suri:
An empirical study of reflection attacks using NetFlow data. 13 - Benqiang Wei, Xianhui Lu:
Improved homomorphic evaluation for hash function based on TFHE. 14 - Miao Tian, Yushu Zhang, Yongming Zhang, Xiangli Xiao, Wenying Wen:
A privacy-preserving image retrieval scheme with access control based on searchable encryption in media cloud. 22 - Yao Pan, Zheng Chao, He Wang, Jing Yang, Hongjia Li, Liming Wang:
FedSHE: privacy preserving and efficient federated learning with adaptive segmented CKKS homomorphic encryption. 40 - Huizhuo Wang, Yang Tao, Rui Zhang:
Threshold ring signature: generic construction and logarithmic size instantiation. 46 - Qintao Shen, Guozhu Meng, Kai Chen:
Revealing the exploitability of heap overflow through PoC analysis. 47 - Wenbo Wang, Peng Yi, Taotao Kou, Weitao Han, Chengyu Wang:
GLDOC: detection of implicitly malicious MS-Office documents using graph convolutional networks. 48 - Haobin Chen, Yue Yang, Siyi Lv:
Revisiting frequency-smoothing encryption: new security definitions and efficient construction. 15 - Urikhimbam Boby Clinton, Nazrul Hoque, Kh Robindro Singh:
Classification of DDoS attack traffic on SDN network environment using deep learning. 23 - Mingxing Hu, Zhen Liu, Yunhong Zhou:
Efficient post-quantum secure deterministic wallet scheme. 24 - Jie Yuan, Rui Xu, Xinghai Wei, Keji Miao, Dongxiao Liu:
TVRAVNF: an efficient low-cost TEE-based virtual remote attestation scheme for virtual network functions. 39 - Yinghong Xie, Yan Hao, Xiaowei Han, Qiang Gao, Biao Yin:
A multi-channel spatial information feature based human pose estimation algorithm. 49 - Zhuo Zhao, Ching-Fang Hsu, Lein Harn, Zhe Xia, Xinyu Jiang, Liu Liu:
Lightweight ring-neighbor-based user authentication and group-key agreement for internet of drones. 50 - Boyuan Xu, Yiru Gong, Xiaoyu Geng, Yun Li, Cong Dong, Song Liu, Yuling Liu, Bo Jiang, Zhigang Lu:
ProcSAGE: an efficient host threat detection method based on graph representation learning. 51 - Juntao He, Haoran Dai, Runqi Sui, Xuejing Yuan, Dun Liu, Hao Feng, Xinyue Liu, Wenchuan Yang, Baojiang Cui, Kedan Li:
EvilPromptFuzzer: generating inappropriate content based on text-to-image models. 70 - Kaini Chen, Peisong Shen, Kewei Lv, Xue Tian, Chi Chen:
Dynamic group fuzzy extractor. 25 - Ziming Jiang, Yongbin Zhou, Yuejun Liu:
New partial key exposure attacks on RSA with additive exponent blinding. 26 - Chenset Kim, Chakchai So-In, Yanika Kongsorot, Phet Aimtongkham:
FLSec-RPL: a fuzzy logic-based intrusion detection scheme for securing RPL-based IoT networks against DIO neighbor suppression attacks. 27 - Mikhail Kuznetsov, Evgenia Novikova, Igor V. Kotenko:
Modelling user notification scenarios in privacy policies. 41 - Shahid Alam, Alper Kamil Demir:
SIFT: Sifting file types - application of explainable artificial intelligence in cyber forensics. 52 - Yamei Wang, Weijing You, Yuexin Zhang, Ayong Ye, Li Xu:
Cloud EMRs auditing with decentralized (t, n)-threshold ownership transfer. 53 - Sachin Kadam, Anna Scaglione, Nikhil Ravi, Sean Peisert, Brent Lunghino, Aram Shumavon:
Optimum noise mechanism for differentially private queries in discrete finite sets. 54 - Bin Huang, Yanhui Du:
Break-Pad: effective padding machines for tor with break burst padding. 28 - Wenhan Xu, Hui Ma, Rui Zhang:
GAPS: GPU-accelerated processing service for SM9. 29 - Zhongxu Yin, Yiran Song, Guoxiao Zong:
Discovering API usage specifications for security detection using two-stage code mining. 30 - Chao An, Yuting Xiao, HaiHang Liu, Han Wu, Rui Zhang:
Honey password vaults tolerating leakage of both personally identifiable information and passwords. 42 - Jingjie Xu, Ting Wang, Mingqi Lv, Tieming Chen, Tiantian Zhu, Baiyang Ji:
MVD-HG: multigranularity smart contract vulnerability detection method based on heterogeneous graphs. 55 - Nansen Wang, Jianing Zhang, Ju Huang, Wei Ou, Wenbao Han, Qionglu Zhang:
Telemedicine data secure sharing scheme based on heterogeneous federated learning. 56 - Jingzhi Liu, Hongyi Yang, Quanlei Qu, Zhidong Liu, Yang Cao:
Research on distribution automation security situational awareness technology based on risk transmission path and multi-source information fusion. 57 - Yincen Chen, Yi Guo, Xuanyu Liang, Ling Song, Qianqian Yang:
Revisiting the shuffle of generalized Feistel structure. 31 - Md. Alamin Talukder, Rakib Hossen, Md. Ashraf Uddin, Mohammed Nasir Uddin, Uzzal Kumar Acharjee:
Securing transactions: a hybrid dependable ensemble machine learning model using IHT-LR and grid search. 32 - Yuming Liu, Yong Wang, Hao Feng:
A proactive defense method against eavesdropping attack in SDN-based storage environment. 58 - Ismail El Gaabouri, Mohamed Senhadji, Mostafa Belkasmi, Brahim El Bhiri:
A new S-box pattern generation based on chaotic enhanced logistic map: case of 5-bit S-box. 59 - Wei Zhu, Yi Deng:
Simultaneously resettable zero knowledge protocol in Public Key model. 60 - Aulia Arham, Hanung Adi Nugroho:
Enhanced reversible data hiding using difference expansion and modulus function with selective bit blocks in images. 61 - Haoran Yu, Wenchuan Yang, Baojiang Cui, Runqi Sui, Xuedong Wu:
Enhanced anomaly traffic detection framework using BiGAN and contrastive learning. 71 - Baowei Wang, Fengxiao Guo, Yuting Liu, Bin Li, Yi Yuan:
An efficient and versatile e-voting scheme on blockchain. 62 - Anyi Li, Qiqing Xia, Qianru Zhu, Li Yang:
The quantum circuit implementation and feasibility analysis of quantum public-key cryptosystem based on the QSCDff problem. 63 - Yulong Ji, Kunjin Zou, Bin Zou:
Mi-maml: classifying few-shot advanced malware using multi-improved model-agnostic meta-learning. 72
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.