


default search action
Security and Communication Networks, Volume 2020
Volume 2020, 2020
- Xianwei Zhu
, ChaoWen Chang
, Qin Xi, ZhiBin Zuo
:
Attribute-Guard: Attribute-Based Flow Access Control Framework in Software-Defined Networking. 6302739:1-6302739:18 - Mingfu Xue
, Chengxiang Yuan, Jian Wang
, Weiqiang Liu
:
DPAEG: A Dependency Parse-Based Adversarial Examples Generation Method for Intelligent Q&A Robots. 5890820:1-5890820:15 - Congge Xie
, Jian Weng
, Jinming Wen
:
Scalable Revocable Identity-Based Signature Scheme with Signing Key Exposure Resistance from Lattices. 1743421:1-1743421:11 - Jiaye Pan
, Yi Zhuang
, Binglin Sun:
BAHK: Flexible Automated Binary Analysis Method with the Assistance of Hardware and System Kernel. 8702017:1-8702017:19 - Mingjiang Huang
, Liming Wang
:
Automatic Search for the Linear (Hull) Characteristics of ARX Ciphers: Applied to SPECK, SPARX, Chaskey, and CHAM-64. 4898612:1-4898612:14 - JeongYeon Kim
:
Protecting Metadata of Access Indicator and Region of Interests for Image Files. 4836109:1-4836109:10 - Hua Dai
, Xuelong Dai
, Xiao Li, Xun Yi, Fu Xiao
, Geng Yang
:
A Multibranch Search Tree-Based Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data. 7307315:1-7307315:15 - Smitha Rajagopal, Poornima Panduranga Kundapur, Katiganere Siddaramappa Hareesha
:
A Stacking Ensemble for Network Intrusion Detection Using Heterogeneous Datasets. 4586875:1-4586875:9 - Gyeong-Hoon Lee
, Jeil Jo
, Cheong Hee Park
:
Jamming Prediction for Radar Signals Using Machine Learning Methods. 2151570:1-2151570:9 - S. Mary Virgil Nithya
, V. Rhymend Uthariaraj:
Identity-Based Public Auditing Scheme for Cloud Storage with Strong Key-Exposure Resilience. 4838497:1-4838497:13 - Abigail Akosua Addobea
, Jun Hou
, Qianmu Li
:
MHCOOS: An Offline-Online Certificateless Signature Scheme for M-Health Devices. 7085623:1-7085623:12 - Xingguang Zhou, Jianwei Liu
, Zongyang Zhang
, Qianhong Wu:
Secure Outsourced Medical Data against Unexpected Leakage with Flexible Access Control in a Cloud Storage System. 8347213:1-8347213:20 - Xingting Dong, Yanhua Zhang
, Baocang Wang
, Jiangshan Chen
:
Server-Aided Revocable Attribute-Based Encryption from Lattices. 1460531:1-1460531:13 - Zhiyan Xu
, Debiao He
, Neeraj Kumar
, Kim-Kwang Raymond Choo
:
Efficient Certificateless Aggregate Signature Scheme for Performing Secure Routing in VANETs. 5276813:1-5276813:12 - Taeyun Kim, Yongwoo Oh, Hyoungshick Kim
:
Efficient Privacy-Preserving Fingerprint-Based Authentication System Using Fully Homomorphic Encryption. 4195852:1-4195852:11 - Na Lv
, Tianyu Chen
, Shuangyi Zhu, Jing Yang, Yuan Ma, Jiwu Jing, Jingqiang Lin:
High-Efficiency Min-Entropy Estimation Based on Neural Network for Random Number Generators. 4241713:1-4241713:18 - Taehoon Eom
, Jin B. Hong
, SeongMo An, Jong Sou Park, Dong Seong Kim
:
A Framework for Real-Time Intrusion Response in Software Defined Networking Using Precomputed Graphical Security Models. 7235043:1-7235043:15 - Jiaqing Mo
, Zhongwang Hu, Yuhua Lin:
Cryptanalysis and Security Improvement of Two Authentication Schemes for Healthcare Systems Using Wireless Medical Sensor Networks. 5047379:1-5047379:11 - Anchit Bijalwan
:
Botnet Forensic Analysis Using Machine Learning. 9302318:1-9302318:9 - Jingmei Li
, Di Xue
, Weifei Wu, Jiaxiang Wang:
Incremental Learning for Malware Classification in Small Datasets. 6309243:1-6309243:12 - Lingyun Jiang
, Kai Qiao
, Ruoxi Qin
, Linyuan Wang
, Wanting Yu, Jian Chen
, Haibing Bu, Bin Yan
:
Cycle-Consistent Adversarial GAN: The Integration of Adversarial Attack and Defense. 3608173:1-3608173:9 - John Foley, Naghmeh Moradpoor
, Henry Ochenyi:
Employing a Machine Learning Approach to Detect Combined Internet of Things Attacks against Two Objective Functions Using a Novel Dataset. 2804291:1-2804291:17 - Kun Tang
, Wenjuan Tang, Entao Luo
, Zhiyuan Tan, Weizhi Meng
, Lianyong Qi
:
Secure Information Transmissions in Wireless-Powered Cognitive Radio Networks for Internet of Medical Things. 7542726:1-7542726:10 - Trevor J. Bihl
, Todd J. Paciencia, Kenneth W. Bauer Jr., Michael A. Temple
:
Cyber-Physical Security with RF Fingerprint Classification through Distance Measure Extensions of Generalized Relevance Learning Vector Quantization. 3909763:1-3909763:12 - Shumaila Shahzadi, Bushra Khaliq, Muhammad Rizwan
, Fahad Ahmad
:
Security of Cloud Computing Using Adaptive Neural Fuzzy Inference System. 5352108:1-5352108:15 - Ömer Aslan
, Refik Samet
, Ömer Özgür Tanriöver
:
Using a Subtractive Center Behavioral Model to Detect Malware. 7501894:1-7501894:17 - Subin Moon, Younho Lee
:
An Efficient Encrypted Floating-Point Representation Using HEAAN and TFHE. 1250295:1-1250295:18 - Sanghoon Lee, Ik Rae Jeong
:
On the Unlinkability of Fingerprint Shell. 8256929:1-8256929:8 - Ying Zou, Zhen Zhao, Sha Shi, Lei Wang, Yunfeng Peng, Yuan Ping
, Baocang Wang
:
Highly Secure Privacy-Preserving Outsourced k-Means Clustering under Multiple Keys in Cloud Computing. 1238505:1-1238505:11 - Xiaohui Yang
, Ying Sun
:
User Audit Model Based on Attribute Measurement and Similarity Measurement. 8387672:1-8387672:9 - Ping Zhang
, Qian Yuan:
Minimizing Key Materials: The Even-Mansour Cipher Revisited and Its Application to Lightweight Authenticated Encryption. 4180139:1-4180139:6 - Donatas Mazeika
, Rimantas Butleris
:
Integrating Security Requirements Engineering into MBSE: Profile and Guidelines. 5137625:1-5137625:12 - Chao Ma
, Haiying Gao, Duo Wei:
A CP-ABE Scheme Supporting Arithmetic Span Programs. 3265871:1-3265871:16 - Shenyong Xiao, Zhijun Yu, Ya Shuang Deng
:
Design and Analysis of a Novel Chaos-Based Image Encryption Algorithm via Switch Control Mechanism. 7913061:1-7913061:12 - Jiangheng Kou
, Mingxing He
, Ling Xiong
, Zeqiong Lv:
Efficient Hierarchical Authentication Protocol for Multiserver Architecture. 2523834:1-2523834:14 - Jing Liu
, Changbo Yuan, Yingxu Lai
, Hua Qin:
Protection of Sensitive Data in Industrial Internet Based on Three-Layer Local/Fog/Cloud Storage. 2017930:1-2017930:16 - Thaier Hayajneh, Razvi Doomun, Ghada Almashaqbeh, Bassam Jamil Mohd:
Erratum to "An Energy-Efficient and Security Aware Route Selection Protocol for Wireless Sensor Networks". 4093210:1-4093210:1 - Alper Egitmen
, Irfan Bulut, R. Can Aygun, Ayse Bilge Gunduz
, Omer Seyrekbasan, Ali Gökhan Yavuz
:
Combat Mobile Evasive Malware via Skip-Gram-Based Malware Detection. 6726147:1-6726147:10 - S. Milton Ganesh
, S. P. Manikandan:
An Efficient Integrity Verification and Authentication Scheme over the Remote Data in the Public Clouds for Mobile Users. 9809874:1-9809874:13 - Shazia Afzal, Muhammad Yousaf
, Humaira Afzal, Nawaf Alharbe
, Muhammad Rafiq Mufti
:
Cryptographic Strength Evaluation of Key Schedule Algorithms. 3189601:1-3189601:9 - Xiangshi Wang, Lei Su
, Qihang Zhou, Liping Wu:
Group Recommender Systems Based on Members' Preference for Trusted Social Networks. 1924140:1-1924140:11 - Xiujuan Wang, Qianqian Zheng
, Kangfeng Zheng
, Tong Wu:
User Authentication Method Based on MKL for Keystroke and Mouse Behavioral Feature Fusion. 9282380:1-9282380:14 - Xiaoyi Duan
, Dong Chen, Xiaohong Fan, Xiuying Li, Ding Ding, You Li:
Research and Implementation on Power Analysis Attacks for Unbalanced Data. 5695943:1-5695943:10 - Guangjia Song
, Hui Wang, Fuquan Liu:
Using FDAD to Prevent DAD Attack in SEcure Neighbor Discovery Protocol. 2408792:1-2408792:15 - Gaofeng He, Bingfeng Xu, Lu Zhang, Haiting Zhu
:
On-Device Detection of Repackaged Android Malware via Traffic Clustering. 8630748:1-8630748:19 - Xue-yuan Yin
, Xingshu Chen
, Lin Chen, Hui Li:
Extension of Research on Security as a Service for VMs in IaaS Platform. 8538519:1-8538519:16 - Bo Liu
, Qilin Wu
, Yiwen Zhang
, Qian Cao
:
Exploiting the Relationship between Pruning Ratio and Compression Effect for Neural Network Model Based on TensorFlow. 5218612:1-5218612:8 - Shu-Chuan Chu, Lili Chen, Sachin Kumar
, Saru Kumari
, Joel J. P. C. Rodrigues
, Chien-Ming Chen
:
Decentralized Private Information Sharing Protocol on Social Networks. 7137480:1-7137480:12 - Kyungroul Lee, Sun-Young Lee
, Kangbin Yim
:
Classification and Analysis of Security Techniques for the User Terminal Area in the Internet Banking Service. 7672941:1-7672941:16 - Xiaotong Xu, Gaocai Wang
, Jintian Hu, Yuting Lu
:
Study on Stochastic Differential Game Model in Network Attack and Defense. 3417039:1-3417039:15 - Jinglei Tan
, Hengwei Zhang
, Hongqi Zhang, Cheng Lei
, Hui Jin, Bo-wen Li, Hao Hu
:
Optimal Timing Selection Approach to Moving Target Defense: A FlipIt Attack-Defense Game Model. 3151495:1-3151495:12 - Qinju Liu
, Xianhui Lu, Fucai Luo, Shuai Zhou, Jingnan He, Kunpeng Wang:
SecureBP from Homomorphic Encryption. 5328059:1-5328059:9 - Haining Yu
, Hongli Zhang, Xiangzhan Yu:
Hail the Closest Driver on Roads: Privacy-Preserving Ride Matching in Online Ride Hailing Services. 4948387:1-4948387:13 - Xiaohui Yang
, Ying Sun
:
Abnormal User Detection Based on the Correlation Probabilistic Model. 8014958:1-8014958:11 - Yongtao Liu, Ruizhi Sun
, Tianyi Zhang, Xiangnan Zhang, Li Li, Guoqing Shi:
Warehouse-Oriented Optimal Path Planning for Autonomous Mobile Fire-Fighting Robots. 6371814:1-6371814:13 - Shaoqiang Liu, Chaiyang Peng
, Chunjiang Li:
Research on SKINNY Optimal Differential Trail Search. 6789281:1-6789281:9 - Xingran Li
, Wei Yu
, Bao Li:
Parallel and Regular Algorithm of Elliptic Curve Scalar Multiplication over Binary Fields. 4087873:1-4087873:10 - Yuyan Guo, Jiguo Li
, Mingming Jiang, Lei Yu, Shimin Wei:
Certificate-Based Encryption Resilient to Continual Leakage in the Standard Model. 1492681:1-1492681:11 - Mingqian Wang
, Shuai Cao, Yunliang Wang:
VoNR-IPD: A Novel Timing-Based Network Steganography for Industrial Internet. 8846230:1-8846230:14 - Yousheng Zhou
, Longan Wang:
A Lattice-Based Authentication Scheme for Roaming Service in Ubiquitous Networks with Anonymity. 2637916:1-2637916:19 - Shaddrack Yaw Nusenu
:
Authentication and Secrecy of Multicast Communication Scenario: Artificial Noise-Aided Costas Sequence Matrix FDA Approach. 2194840:1-2194840:13 - Jiangtao Zhai
, Huaifeng Shi, Mingqian Wang, Zhongjun Sun, Junjun Xing:
An Encrypted Traffic Identification Scheme Based on the Multilevel Structure and Variational Automatic Encoder. 8863169:1-8863169:10 - Zhe Xia
, Yining Liu, Ching-Fang Hsu, Chinchen Chang:
Cryptanalysis and Improvement of a Group Authentication Scheme with Multiple Trials and Multiple Authentications. 6183861:1-6183861:8 - Xiaoping Li, Hefeng Chen, Yanjun Liu, Chin-Chen Chang
:
Unordered Multisecret Sharing Based on Generalized Chinese Remainder Theorem. 6073721:1-6073721:8 - Meijuan Yin
, Wen Yang, Xiaonan Liu, Xiangyang Luo:
Evaluator: A Multilevel Decision Approach for Web-Based Landmark Evaluation. 8843188:1-8843188:15 - Nabil Moukafih
, Ghizlane Orhanou, Said Elhajji:
Neural Network-Based Voting System with High Capacity and Low Computation for Intrusion Detection in SIEM/IDS Systems. 3512737:1-3512737:15 - Yu Zhang
, Yin Li, Yifan Wang:
Efficient Searchable Symmetric Encryption Supporting Dynamic Multikeyword Ranked Search. 7298518:1-7298518:16 - Bonwook Koo
, Younghoon Jung
, Woo-Hwan Kim:
Rotational-XOR Rectangle Cryptanalysis on Round-Reduced Simon. 5968584:1-5968584:12 - Hussain M. J. Almohri
, Mohammad Al-Mutawa, Mahmoud Alawadh, Karim O. Elish
:
A Client Bootstrapping Protocol for DoS Attack Mitigation on Entry Point Services in the Cloud. 8873258:1-8873258:12 - Hui Liu
, Bo Zhao
, Jianwen Zou, Linquan Huang, Yifan Liu:
A Lightweight Image Encryption Algorithm Based on Message Passing and Chaotic Map. 7151836:1-7151836:12 - Juan Zhang, Changsheng Wan
, Chunyu Zhang, Xiaojun Guo, Yongyong Chen:
Noninteractive Lightweight Privacy-Preserving Auditing on Images in Mobile Crowdsourcing Networks. 8827364:1-8827364:11 - Rongfeng Zheng, Jiayong Liu
, Weina Niu, Liang Liu, Kai Li, Shan Liao:
Preprocessing Method for Encrypted Traffic Based on Semisupervised Clustering. 8824659:1-8824659:13 - Yang Wang
, Haijin Gui, Lei Ma
:
A Survey on Services Provision and Distribution of Official and Commercial Intellectual Property Platforms. 8833416:1-8833416:14 - Bingfeng Xu, Zhicheng Zhong, Gaofeng He
:
A Minimum Defense Cost Calculation Method for Attack Defense Trees. 8870734:1-8870734:12 - Davy Preuveneers
, Wouter Joosen, Jorge Bernal Bernabé
, Antonio F. Skarmeta
:
Distributed Security Framework for Reliable Threat Intelligence Sharing. 8833765:1-8833765:15 - Pengpeng Ding
, Jinguo Li
, Liangliang Wang, Mi Wen, Yuyao Guan:
HYBRID-CNN: An Efficient Scheme for Abnormal Flow Detection in the SDN-Based Smart Grid. 8850550:1-8850550:20 - Wangli Hao, Ruixian Zhang, Shancang Li, Junyu Li, Fuzhong Li
, Shanshan Zhao, Wuping Zhang:
Anomaly Event Detection in Security Surveillance Using Two-Stream Based Model. 8876056:1-8876056:15 - Xiaoping Zhao, Yonghong Zhang
, Fan Shao:
A Multifault Diagnosis Method of Gear Box Running on Edge Equipment. 8854236:1-8854236:13 - Shujiang Xu, Qixian Hao, Bin Ma
, Chunpeng Wang
, Jian Li
:
Accurate Computation of Fractional-Order Exponential Moments. 8822126:1-8822126:16 - Supriyanto Praptodiyono
, Teguh Firmansyah
, Mudrik Alaydrus, M. Iman Santoso, Azlan Osman, Rosni Abdullah:
Mobile IPv6 Vertical Handover Specifications, Threats, and Mitigation Methods: A Survey. 5429630:1-5429630:18 - Bandar Almaslukh
:
An Efficient and Effective Approach for Flooding Attack Detection in Optical Burst Switching Networks. 8840058:1-8840058:11 - Jing Tian
, Gang Xiong
, Zhen Li, Gaopeng Gou
:
A Survey of Key Technologies for Constructing Network Covert Channel. 8892896:1-8892896:20 - Huihua Xia, Yan Xiong, Wenchao Huang
, Zhaoyi Meng, Fuyou Miao
:
Limiting Privacy Breaches in Average-Distance Query. 8895281:1-8895281:24 - Jielin Jiang, Xing Zhang, Shengjun Li
:
A Task Offloading Method with Edge for 5G-Envisioned Cyber-Physical-Social Systems. 8867094:1-8867094:9 - Yuan Liu, Licheng Wang
, Xiaoying Shen, Lixiang Li, Dezhi An:
Space-Efficient Key-Policy Attribute-Based Encryption from Lattices and Two-Dimensional Attributes. 2345369:1-2345369:11 - Nadiya El Kamel
, Mohamed Eddabbah
, Youssef Lmoumen, Raja Touahni:
A Smart Agent Design for Cyber Security Based on Honeypot and Machine Learning. 8865474:1-8865474:9 - Pan Jun Sun
:
Research on the Optimization Management of Cloud Privacy Strategy Based on Evolution Game. 6515328:1-6515328:18 - Gaocai Wang
, Ning Yu:
Risk Situation Assessment Model Based on Interdomain Interaction in Cloud Computing Environment. 7816925:1-7816925:12 - Li Li, Jiayong Liu
, Peng Jia
:
SPCTR: Sealed Auction-Based Procurement for Closest Pre-Tender with Range Validation. 8872617:1-8872617:12 - Xuefei Cao
, Yulong Fu
, Bo Chen:
Packet-Based Intrusion Detection Using Bayesian Topic Models in Mobile Edge Computing. 8860418:1-8860418:12 - Fangchao Yu, Li Wang
, Xianjin Fang, Youwen Zhang:
The Defense of Adversarial Example with Conditional Generative Adversarial Networks. 3932584:1-3932584:12 - Junyan Guo
, Ye Du
:
A Novel RLWE-Based Anonymous Mutual Authentication Protocol for Space Information Network. 5167832:1-5167832:12 - Youngjoo Shin
, Junbeom Hur, Dongyoung Koo
, Joobeom Yun
:
Toward Serverless and Efficient Encrypted Deduplication in Mobile Cloud Computing Environments. 3046595:1-3046595:15 - Mariano Di Martino
, Peter Quax
, Wim Lamotte
:
Knocking on IPs: Identifying HTTPS Websites for Zero-Rated Traffic. 7285786:1-7285786:14 - Yirui Wu
, Dabao Wei, Jun Feng
:
Network Attacks Detection Methods Based on Deep Learning Techniques: A Survey. 8872923:1-8872923:17 - Rongbin Xu, Jianguo Wu, Yongliang Cheng, Zhiqiang Liu, Yuanmo Lin, Ying Xie
:
Dynamic Security Exchange Scheduling Model for Business Workflow Based on Queuing Theory in Cloud Computing. 8886640:1-8886640:12 - Tianen Liu
, Yingjie Wang
, Zhipeng Cai
, Xiangrong Tong, Qingxian Pan, Jindong Zhao
:
A Dynamic Privacy Protection Mechanism for Spatiotemporal Crowdsourcing. 8892954:1-8892954:13 - Xuefei Cao
, Lanjun Dang, Yingzi Luan, Wei You:
A Certificateless Noninteractive Key Exchange Protocol with Provable Security. 8862476:1-8862476:8 - Tianliang Lu, Yanhui Du
, Li Ouyang, Qiuyu Chen, Xirui Wang:
Android Malware Detection Based on a Hybrid Deep Learning Model. 8863617:1-8863617:11 - Seyed Amir Hosseini Beghaeiraveri
, Mohammad Izadi, Mohsen Rezvani
:
Broadcast Complexity and Adaptive Adversaries in Verifiable Secret Sharing. 9428457:1-9428457:10 - Pengfei Sun, Pengju Liu, Qi Li, Chenxi Liu, Xiangling Lu, Ruochen Hao, Jinpeng Chen
:
DL-IDS: Extracting Features Using CNN-LSTM Hybrid Network for Intrusion Detection System. 8890306:1-8890306:11 - Piotr Bialczak
, Wojciech Mazurczyk
:
Characterizing Anomalies in Malware-Generated HTTP Traffic. 8848863:1-8848863:26 - Ou Ruan
, Hao Mao:
Efficient Private Set Intersection Using Point-Value Polynomial Representation. 8890677:1-8890677:12 - Haiping Huang
, Qinglong Huang, Fu Xiao, Wenming Wang, Qi Li, Ting Dai:
An Improved Broadcast Authentication Protocol for Wireless Sensor Networks Based on the Self-Reinitializable Hash Chains. 8897282:1-8897282:17 - Ijaz Ahmad Awan, Muhammad Shiraz, Muhammad Usman Hashmi, Qaisar Shaheen
, Rizwan Akhtar, Allah Ditta:
Secure Framework Enhancing AES Algorithm in Cloud Computing. 8863345:1-8863345:16 - Diqun Yan
, Xiaowen Li, Li Dong, Rangding Wang:
An Antiforensic Method against AMR Compression Detection. 8849902:1-8849902:8 - Bo Liu
, Qilin Wu
, Qian Cao
:
An Improved Elman Network for Stock Price Prediction Service. 8824430:1-8824430:9 - Jinlong Hu
, Tenghui Li, Yi Zhuang, Song Huang, Shoubin Dong:
GFD: A Weighted Heterogeneous Graph Embedding Based Approach for Fraud Detection in Mobile Advertising. 8810817:1-8810817:12 - Zhiyong Wang, Shengwei Xu, Guoai Xu, Yongfeng Yin
, Miao Zhang, Dawei Sun:
Game Theoretical Method for Anomaly-Based Intrusion Detection. 8824163:1-8824163:10 - Jianbang Gao
, Zhaohui Yuan, Bin Qiu, Jing Zhou:
Secure Multiusers Directional Modulation Scheme Based on Random Frequency Diverse Arrays in Broadcasting Systems. 4198595:1-4198595:11 - Toni Perkovic
, Ante Dagelic, Marin Bugaric, Mario Cagalj:
On WPA2-Enterprise Privacy in High Education and Science. 3731529:1-3731529:11 - Nanliang Shan
, Zecong Ye, Xiaolong Cui:
Collaborative Intelligence: Accelerating Deep Neural Network Inference via Device-Edge Synergy. 8831341:1-8831341:10 - Huige Wang
, Kefei Chen, Tianyu Pan, Yunlei Zhao:
Practical CCA-Secure Functional Encryptions for Deterministic Functions. 8823788:1-8823788:14 - Omar Abou Selo, Maan Haj Rachid
, Abdullatif Shikfa
, Yongge Wang
, Qutaibah M. Malluhi:
Private Function Evaluation Using Intel's SGX. 3042642:1-3042642:10 - Toan-Thinh Truong
, Minh-Triet Tran
, Anh Duc Duong:
Chebyshev Polynomial-Based Authentication Scheme in Multiserver Environment. 3579705:1-3579705:21 - Ying Zou, Yanting Chai, Sha Shi, Lei Wang, Yunfeng Peng, Yuan Ping
, Baocang Wang
:
Improved Cloud-Assisted Privacy-Preserving Profile-Matching Scheme in Mobile Social Networks. 4938736:1-4938736:12 - Jiangfeng Sun, Zhisong Bie
, Hongxia Bie, Pengfei He, Machao Jin:
Secrecy Analysis of Cognitive Radio Networks over Generalized Fading Channels. 8842012:1-8842012:9 - Gholamreza Farahani
:
Feature Selection Based on Cross-Correlation for the Intrusion Detection System. 8875404:1-8875404:17 - Zufan Zhang
, Anqi Liu, Yinxue Yi, Maobin Yang:
Exploring the Dynamical Behavior of Information Diffusion in D2D Communication Environment. 8848576:1-8848576:8 - Xulong Zhang
, Xiaoxia Song:
Stability Analysis of a Dynamical Model for Malware Propagation with Generic Nonlinear Countermeasure and Infection Probabilities. 8859883:1-8859883:7 - Jorge Sancho
, José García, Álvaro Alesanco Iglesias:
Oblivious Inspection: On the Confrontation between System Security and Data Privacy at Domain Boundaries. 8856379:1-8856379:9 - Huili Wang
, Wenping Ma, Lang Liao, Yushan Li, Linfeng Zheng:
Impossible Differential Distinguishers of Two Generalized Feistel Structures. 8828504:1-8828504:9 - Qiang Wei, Hu Wang, Gongxuan Zhang
:
A Robust Image Watermarking Approach Using Cycle Variational Autoencoder. 8869096:1-8869096:9 - Naixuan Guo
, Junzhou Luo, Zhen Ling, Ming Yang, Wenjia Wu, Xiaodan Gu:
A Novel IM Sync Message-Based Cross-Device Tracking. 8891664:1-8891664:15 - Ziwang Wang
, Yi Zhuang
, Zujia Yan:
TZ-MRAS: A Remote Attestation Scheme for the Mobile Terminal Based on ARM TrustZone. 1756130:1-1756130:16 - Yu Qin
, Jingbin Liu, Shijun Zhao, Dengguo Feng, Wei Feng:
RIPTE: Runtime Integrity Protection Based on Trusted Execution for IoT Device. 8957641:1-8957641:14 - Tao Li, Yuling Chen, Yanli Wang, Yilei Wang, Minghao Zhao, Haojia Zhu, Youliang Tian, Xiaomei Yu, Yixian Yang:
Rational Protocols and Attacks in Blockchain System. 8839047:1-8839047:11 - Sajjad Shaukat Jamal
, Dawood Shah, Abdulaziz Deajim, Tariq Shah:
The Effect of the Primitive Irreducible Polynomial on the Quality of Cryptographic Properties of Block Ciphers. 8883884:1-8883884:14 - Yuhei Watanabe
, Hideki Yamamoto, Hirotaka Yoshida:
Lightweight Crypto Stack for TPMS Using Lesamnta-LW. 5738215:1-5738215:12 - Mingyue Shi
, Rong Jiang, Wei Zhou, Sen Liu, Savio Sciancalepore:
A Privacy Risk Assessment Model for Medical Big Data Based on Adaptive Neuro-Fuzzy Theory. 5610839:1-5610839:18 - Zhidong Shen
, Si Chen:
A Survey of Automatic Software Vulnerability Detection, Program Repair, and Defect Prediction Techniques. 8858010:1-8858010:16 - Baskoro Adi Pratomo
, Pete Burnap, George Theodorakopoulos:
BLATTA: Early Exploit Detection on Network Traffic with Recurrent Neural Networks. 8826038:1-8826038:15 - Shimao Yao, Ravi Sankar, In-ho Ra
:
A Collusion-Resistant Identity-Based Proxy Reencryption Scheme with Ciphertext Evolution for Secure Cloud Sharing. 8833693:1-8833693:16 - Pan Lv
, Hong Li, Jinsong Qiu
, Yiqi Li, Gang Pan:
Cyborgan OS: A Lightweight Real-Time Operating System for Artificial Organ. 8871626:1-8871626:9 - Qiuhua Zheng, Yinhao Hu, Tao Pei, Shengwang Xu, Junzhe Yu, Ting Wu, Yanzhao Shen, Yingpei Zeng, Tingting Cui
:
Improved Single-Key Attacks on 2-GOST. 8886032:1-8886032:10 - Jaewoo So
:
Deep Learning-Based Cryptanalysis of Lightweight Block Ciphers. 3701067:1-3701067:11 - Behnam Zahednejad
, Lishan Ke
, Jing Li:
A Novel Machine Learning-Based Approach for Security Analysis of Authentication and Key Agreement Protocols. 8848389:1-8848389:15 - Jian Zhou
, Qian Bo, Lijuan Sun
, Juan Wang, Xiaoyong Yan:
Routing Strategy for LEO Satellite Networks Based on Membership Degree Functions. 8822985:1-8822985:9 - Fei Tang
, Jiali Bao
, Yonghong Huang, Dong Huang, Fuqun Wang:
Identity-Based Identification Scheme without Trusted Party against Concurrent Attacks. 8820271:1-8820271:9 - Guofeng Wei
, Bangning Zhang
, Guoru Ding
, Bing Zhao
, Kefeng Guo
, Daoxing Guo
:
On the Detection of a Non-Cooperative Beam Signal Based on Wireless Sensor Networks. 8830092:1-8830092:12 - Xi Zhang, Ye Su
, Jing Qin
:
A Dynamic Searchable Symmetric Encryption Scheme for Multiuser with Forward and Backward Security. 8893016:1-8893016:13 - Yaowei Wang
, Chen Chen
, Zhenwei Chen
, Jiangyong He
:
Attribute-Based User Revocable Data Integrity Audit for Internet-of-Things Devices in Cloud Storage. 8837456:1-8837456:10 - Xiaoyan Hu
, Liang Jin
, Kaizhi Huang, Keming Ma, Changcheng Song, Shuaifang Xiao:
A Secure Communication Scheme Based on Equivalent Interference Channel Assisted by Physical Layer Secret Keys. 8840645:1-8840645:15 - Shuo Wang
, Qingqi Pei
, Yuchen Zhang, Xiaohu Liu, Guangming Tang:
A Hybrid Cyber Defense Mechanism to Mitigate the Persistent Scan and Foothold Attack. 8882200:1-8882200:15 - Sa Math
, Lejun Zhang, Seokhoon Kim
, Intae Ryoo
:
An Intelligent Real-Time Traffic Control Based on Mobile Edge Computing for Individual Private Environment. 8881640:1-8881640:11 - Na Lv
, Tianyu Chen
, Shuangyi Zhu, Jing Yang, Yuan Ma, Jiwu Jing, Jingqiang Lin:
Erratum to "High-Efficiency Min-Entropy Estimation Based on Neural Network for Random Number Generators". 3451823:1-3451823:1 - Pan Jun Sun
:
Research on Selection Method of Privacy Parameter ε. 8845038:1-8845038:12 - Jianyu Chen
, Xiaofeng Wang
, Leiting Tao
, Yuan Liu
:
High-Performance Routing Emulation Technologies Based on a Cloud Platform. 8825749:1-8825749:17 - Leila Mohammadpour
, Teck Chaw Ling
, Chee Sun Liew
, Alihossein Aryanfar
:
A Mean Convolutional Layer for Intrusion Detection System. 8891185:1-8891185:16 - Marwan Ali Albahar
, Muhammad Binsawad
:
Deep Autoencoders and Feedforward Networks Based on a New Regularization for Anomaly Detection. 7086367:1-7086367:9 - Deukjo Hong
:
Known-Key Distinguishing and Partial-Collision Attacks on GFN-2 with SP F-Function. 8864102:1-8864102:8 - Xiaohu Liu
, Hengwei Zhang
, Yuchen Zhang, Lulu Shao:
Optimal Network Defense Strategy Selection Method Based on Evolutionary Network Game. 5381495:1-5381495:11 - Jie Cai
, Han Jiang
, Hao Wang, Qiuliang Xu:
Lattice-Based Linearly Homomorphic Signature Scheme over F 2. 8857815:1-8857815:7 - Yiliang Han
, Yu Li, Zhe Li, Shuaishuai Zhu:
An Improved Method to Evaluate the Synchronization in Neural Key Exchange Protocol. 8869688:1-8869688:10 - Xiabing Zhou, Bin Li
, Yanrong Qi, Wanying Dong:
Mimic Encryption Box for Network Multimedia Data Security. 8868672:1-8868672:24 - Tzung-Han Jeng
, Yi-Ming Chen
, Chien-Chih Chen
, Chuan-Chiang Huang
:
MD-MinerP: Interaction Profiling Bipartite Graph Mining for Malware-Control Domain Detection. 8841544:1-8841544:20 - Miaoqing Tian
, Ruobing Jiang
, Haipeng Qu
, Qian Lu, Xiaoyun Zhou:
Advanced Temperature-Varied ECU Fingerprints for Source Identification and Intrusion Detection in Controller Area Networks. 8834845:1-8834845:17 - Jianbing Zhang
, Bowen Ma
, Jiwei Huang
:
Deploying GIS Services into the Edge: A Study from Performance Evaluation and Optimization Viewpoint. 8822990:1-8822990:13 - Zhike Han
, Xiuchao Wu
, Meng Chi
, Jun Tang
, Lijing Yang
:
A Novel Approach to Transform Bitmap to Vector Image for Data Reliable Visualization considering the Image Triangulation and Color Selection. 8871588:1-8871588:13 - Kaixin Jiao, Guodong Ye
, Youxia Dong, Xiaoling Huang, Jianqing He:
Image Encryption Scheme Based on a Generalized Arnold Map and RSA Algorithm. 9721675:1-9721675:14 - Yinwei Li
, Guo-Ping Jiang, Meng Wu, Yurong Song
:
Methods to Measure the Network Path Connectivity. 8836590:1-8836590:10 - Yonghua Gong
, Lei Chen
, Tinghuai Ma:
A Comprehensive Trust Model Based on Social Relationship and Transaction Attributes. 8887596:1-8887596:10 - Bowen Zhang
, Benedetta Tondi, Xixiang Lv
, Mauro Barni
:
Challenging the Adversarial Robustness of DNNs Based on Error-Correcting Output Codes. 8882494:1-8882494:11 - Leixiao Cheng
, Fei Meng
, Xianmeng Meng
, Qixin Zhang
:
AKC-Based Revocable ABE Schemes from LWE Assumption. 8834872:1-8834872:16 - Xiulei Liu
, Shoulu Hou
, Qiang Tong
, Xuhong Liu
, Zhihui Qin
, Junyang Yu
:
A Prediction Approach for Video Hits in Mobile Edge Computing Environment. 8857564:1-8857564:6 - Jiong Chen, Kun He
, Jing Chen, Yingying Fang, Ruiying Du:
PowerPrint: Identifying Smartphones through Power Consumption of the Battery. 3893106:1-3893106:13 - Imran Memon
, Riaz Ahmed Shaikh, Mohammad Kamrul Hasan
, Rosilah Hassan
, Amin Ul Haq
, Khairul Akram Zainol
:
Protect Mobile Travelers Information in Sensitive Region Based on Fuzzy Logic in IoT Technology. 8897098:1-8897098:12 - Hongjian Jin
, Xingshu Chen
, Xiao Lan
, Hui Guo, Hongxia Zhang
, Qi Cao
:
BNRDT: When Data Transmission Meets Blockchain. 8828984:1-8828984:16 - Jie Zhou
, Jian Bai
, Meng Shan Jiang
:
White-Box Implementation of ECDSA Based on the Cloud Plus Side Mode. 8881116:1-8881116:10 - Yunfang Chen
, Li Wang
, Dehao Qi, Tinghuai Ma
, Wei Zhang
:
Community Detection Based on DeepWalk Model in Large-Scale Networks. 8845942:1-8845942:13 - Javier Carrillo Mondéjar
, Juan Manuel Castelo Gómez
, Carlos Núñez-Gómez
, José Roldán Gómez
, José Luis Martínez
:
Automatic Analysis Architecture of IoT Malware Samples. 8810708:1-8810708:12 - Lurong Jiang, Qiaoyu Xu, Hangyi Pan, Yanyun Dai, Jijun Tong
:
Virus Propagation in Wireless Sensor Networks with Media Access Control Mechanism. 6513920:1-6513920:11 - Yaojie Wang
, Xiaolong Cui, Zhiqiang Gao, Bo Gan:
Fed-SCNN: A Federated Shallow-CNN Recognition Framework for Distracted Driving. 6626471:1-6626471:10 - Bora Aslan
, Füsun Yavuzer Aslan
, M. Tolga Sakalli
:
Energy Consumption Analysis of Lightweight Cryptographic Algorithms That Can Be Used in the Security of Internet of Things Applications. 8837671:1-8837671:15 - Yongqiang Yu
, Longlong Li
, Yuliang Lu, Xuehu Yan
:
On the Value of Order Number and Power in Secret Image Sharing. 6627178:1-6627178:13 - Xavier Salleras
, Vanesa Daza
:
SANS: Self-Sovereign Authentication for Network Slices. 8823573:1-8823573:8 - Jiazhong Lu, Xiaolei Liu
, Shibin Zhang, Yan Chang:
Research and Analysis of Electromagnetic Trojan Detection Based on Deep Learning. 6641844:1-6641844:13 - Huiqing Huang
, Dongsheng Cheng
:
3-Image Bit-Level Encryption Algorithm Based on 3D Nonequilateral Arnold Transformation and Hyperchaotic System. 8841302:1-8841302:13 - Si-Wan Noh
, Sang-Uk Shin
, Kyung-Hyune Rhee
:
PyRos: A State Channel-Based Access Control System for a Public Blockchain Network. 8891183:1-8891183:13 - Afifa Maryam, Usman Ahmed
, Muhammad Aleem, Jerry Chun-Wei Lin
, Muhammad Arshad Islam, Muhammad Azhar Iqbal:
cHybriDroid: A Machine Learning-Based Hybrid Technique for Securing the Edge Computing. 8861639:1-8861639:14 - Feng Feng
, Xiabing Zhou
, Bin Li
, Qinglei Zhou
:
Modelling the Mimic Defence Technology for Multimedia Cloud Servers. 8819958:1-8819958:22 - Qiao Ke
, Zengguo Sun, Yang Liu, Wei Wei, Marcin Wozniak
, Rafal Scherer
:
High-Resolution SAR Image Despeckling Based on Nonlocal Means Filter and Modified AA Model. 8889317:1-8889317:8 - Isaac Amankona Obiri
, Qi Xia, Hu Xia
, Kwame Opuni-Boachie Obour Agyekum
, Kwame Omono Asamoah
, Emmanuel Boateng Sifah
, Xiaosong Zhang, Jianbin Gao
:
A Fully Secure KP-ABE Scheme on Prime-Order Bilinear Groups through Selective Techniques. 8869057:1-8869057:18 - Yitong Meng
, Jinlong Fei
:
Hidden Service Website Response Fingerprinting Attacks Based on Response Time Feature. 8850472:1-8850472:21 - Jorge Aguilar Santiago
, Octavio Flores Siordia
, José Trinidad Guillen Bonilla, Juan Carlos Estrada Gutiérrez
, María G. González Novoa
, Maricela Jiménez Rodríguez
:
Chaotic Cryptosystem for Selective Encryption of Faces in Photographs. 8848356:1-8848356:22 - Xiang Ji, Xianjia Meng
, Anwen Wang
, Qingyi Hua, Fuwei Wang, Rui Chen, Jing Zhang, Dingyi Fang:
E2PP: An Energy-Efficient Path Planning Method for UAV-Assisted Data Collection. 8850505:1-8850505:13 - Jielin Jiang
, Zheng Li
, Yuan Tian
, Najla Al-Nabhan:
A Review of Techniques and Methods for IoT Applications in Collaborative Cloud-Fog Environment. 8849181:1-8849181:15 - Yuezhong Wu
, Qiang Liu
, Rongrong Chen, Changyun Li
, Ziran Peng:
A Group Recommendation System of Network Document Resource Based on Knowledge Graph and LSTM in Edge Computing. 8843803:1-8843803:11 - Yousheng Zhou
, Xinyun Chen
, Meihuan Chen
:
Privacy-Preserving Multidimensional Data Aggregation Scheme for Smart Grid. 8845959:1-8845959:14 - Rongxin Tu
, Wenying Wen
, Changsheng Hua:
An Unequal Image Privacy Protection Method Based on Saliency Detection. 8842376:1-8842376:13 - Yixin Wu
, Cheng Huang
, Xing Zhang, Hongyi Zhou:
GroupTracer: Automatic Attacker TTP Profile Extraction and Group Cluster in Internet of Things. 8842539:1-8842539:14 - Hui Guo
, Shuguang Huang
, Cheng Huang
, Fan Shi
, Min Zhang
, Zulie Pan
:
Binary File's Visualization and Entropy Features Analysis Combined with Multiple Deep Learning Networks for Malware Classification. 8881760:1-8881760:19 - Shengnan Zhao
, Xiangfu Song
, Han Jiang
, Ming Ma
, Zhihua Zheng
, Qiuliang Xu
:
An Efficient Outsourced Oblivious Transfer Extension Protocol and Its Applications. 8847487:1-8847487:12 - Wajih El Hadj Youssef
, Ali Abdelli
, Fethi Dridi
, Mohsen Machhout
:
Hardware Implementation of Secure Lightweight Cryptographic Designs for IoT Applications. 8860598:1-8860598:13 - Daegeon Kim
, Do Hyung Gu, Huy Kang Kim
:
Beyond PS-LTE: Security Model Design Framework for PPDR Operational Environment. 8869418:1-8869418:13 - Zhenxing Wang
, Wanbo Zheng
, Peng Chen
, Yong Ma
, Yunni Xia
, Wei Liu
, Xiaobo Li
, Kunyin Guo
:
A Novel Coevolutionary Approach to Reliability Guaranteed Multi-Workflow Scheduling upon Edge Computing Infrastructures. 6697640:1-6697640:11 - Liang Zong
, Yong Bai, Chenglin Zhao, Gaofeng Luo, Zeyu Zhang, Huawei Ma
:
On Enhancing TCP to Deal with High Latency and Transmission Errors in Geostationary Satellite Network for 5G-IoT. 6693094:1-6693094:7 - Xinyu Huang
, Yunzhe Tian
, Yifei He
, Endong Tong
, Wenjia Niu
, Chenyang Li
, Jiqiang Liu
, Liang Chang
:
Exposing Spoofing Attack on Flocking-Based Unmanned Aerial Vehicle Cluster: A Threat to Swarm Intelligence. 8889122:1-8889122:15 - Randa Aljably, Yuan Tian
, Mznah Al-Rodhaan:
Preserving Privacy in Multimedia Social Networks Using Machine Learning Anomaly Detection. 5874935:1-5874935:14 - Dawei Li
, Jia Yu, Xue Gao, Najla Al-Nabhan:
Research on Multidomain Authentication of IoT Based on Cross-Chain Technology. 6679022:1-6679022:12 - María-Dolores Cano
, Antonio Cañavate-Sanchez:
Preserving Data Privacy in the Internet of Medical Things Using Dual Signature ECDSA. 4960964:1-4960964:9 - Wenzhi Cheng
, Wei Ou
, Xiangdong Yin, Wanqin Yan, Dingwan Liu, Chunyan Liu:
A Privacy-Protection Model for Patients. 6647562:1-6647562:12 - Chaoxia Qing
, Bing Guo
, Yan Shen, Tao Li, Yun Zhang
, Zhen Zhang:
A Secure and Effective Construction Scheme for Blockchain Networks. 8881881:1-8881881:20 - Xingxing Xiong
, Shubo Liu
, Dan Li, Zhaohui Cai, Xiaoguang Niu:
A Comprehensive Survey on Local Differential Privacy. 8829523:1-8829523:29 - Yang Xu, Zixi Fu, Guiyong Xu, Sicong Zhang, Xiaoyao Xie:
DRHNet: A Deep Residual Network Based on Heterogeneous Kernel for Steganalysis. 8847741:1-8847741:9 - Lixia Xie
, Huiyu Ni
, Hongyu Yang
, Jiyong Zhang:
A Key Business Node Identification Model for Internet of Things Security. 6654283:1-6654283:11 - Nan Jia
, Shaojing Fu
, Ming Xu
:
Privacy-Preserving Blockchain-Based Nonlinear SVM Classifier Training for Social Networks. 8872853:1-8872853:10 - Min Yang
, Xingshu Chen
, Yonggang Luo
, Hang Zhang:
An Android Malware Detection Model Based on DT-SVM. 8841233:1-8841233:11 - Guosheng Yang, Qisheng Wei:
Visual Object Multimodality Tracking Based on Correlation Filters for Edge Computing. 8891035:1-8891035:13 - Wenyu Zhang
, Yaqun Zhao, Sijie Fan
:
Cryptosystem Identification Scheme Based on ASCII Code Statistics. 8875864:1-8875864:10 - Min Li
, Yingming Zeng
, Yue Guo, Yun Guo:
A Movie Recommendation System Based on Differential Privacy Protection. 6611463:1-6611463:10 - Jiayong Liu, Yu Su, Shun Lv, Cheng Huang
:
Detecting Web Spam Based on Novel Features from Web Page Source Code. 6662166:1-6662166:14 - Fazhan Tao, Longlong Zhu
, Baofeng Ji, Pengju Si, Zhumu Fu
:
Energy Management Strategy Using Equivalent Consumption Minimization Strategy for Hybrid Electric Vehicles. 6642304:1-6642304:8 - Dengyong Zhang
, Xiao Chen, Feng Li
, Arun Kumar Sangaiah
, Xiangling Ding
:
Seam-Carved Image Tampering Detection Based on the Cooccurrence of Adjacent LBPs. 8830310:1-8830310:12 - Di Xue
, Jingmei Li
, Weifei Wu, Jiaxiang Wang:
Erratum to "Incremental Learning for Malware Classification in Small Datasets". 9697548:1-9697548:1 - Jiqiang Lu
, Hwajung Seo:
A Key Selected S-Box Mechanism and Its Investigation in Modern Block Cipher Design. 1457419:1-1457419:26 - Zhe Liu
, Fuqun Wang
, Kefei Chen
, Fei Tang
:
A New User Revocable Ciphertext-Policy Attribute-Based Encryption with Ciphertext Update. 8856592:1-8856592:11 - Wenwu Xie, Jinxia Yang, Xinzhong Liu
, Zhihe Yang, Xin Peng, Jianwu Liao, Tingyu Huang:
Secrecy Performance Analysis of the NOMA System on High-Speed Railway. 8868550:1-8868550:6 - Kai Zhang
, Yanping Li
, Yun Song
, Laifeng Lu
, Tao Zhang
, Qi Jiang
:
A Traceable and Revocable Multiauthority Attribute-Based Encryption Scheme with Fast Access. 6661243:1-6661243:14 - Haiyan Zhang
, Yonglong Luo
, Qingying Yu, Liping Sun, Xuejing Li, Zhenqiang Sun:
A Framework of Abnormal Behavior Detection and Classification Based on Big Trajectory Data for Mobile Networks. 8858444:1-8858444:15 - Jingjing Guo
, Jiacong Sun:
Order-Revealing Encryption Scheme with Comparison Token for Cloud Computing. 8837904:1-8837904:13 - Yuhuan Gong
, Yuchang Mo
:
Qualitative Analysis of Commercial Services in MEC as Phased-Mission Systems. 8823952:1-8823952:11 - Jie Yang
, Li Feng
, Tong Jin, Hong Liang
, Fangxin Xu
, Liwei Tian:
Enabling Sector Scheduling for 5G-CPE Dense Networks. 6684681:1-6684681:18 - Pelayo Nuño
, Carla Suárez
, Eva Suárez
, Francisco G. Bulnes
, Francisco J. delaCalle
, Juan C. Granda
:
A Diagnosis and Hardening Platform for an Asterisk VoIP PBX. 8853625:1-8853625:14 - Yongli Tang
, Mingjie Zhao
, Lixiang Li
:
Secure and Efficient Image Compression-Encryption Scheme Using New Chaotic Structure and Compressive Sensing. 6665702:1-6665702:15 - Xiaolin Zhao
, Hui Peng
, Xiang Li
, Yue Li, Jingfeng Xue
, Yaoyuan Liang
, Mingzhe Pei
:
Defending Application Layer DDoS Attacks via Multidimensional Parallelotope. 6679304:1-6679304:11 - Shaohua Duan
, Hanwen Wang
, Yunpeng Liu
, Li Huang
, Xiaoyi Zhou
:
A Novel Comprehensive Watermarking Scheme for Color Images. 8840779:1-8840779:12 - Fu Chen
, Peng Liu, Jianming Zhu, Sheng Gao
, Yanmei Zhang, Meijiao Duan, Youwei Wang, Kai Hwang:
Improving Topic-Based Data Exchanges among IoT Devices. 8884924:1-8884924:14 - Arshad Ahmad
, Ayaz Ullah, Chong Feng
, Muzammil Khan
, Shahzad Ashraf
, Muhammad Adnan, Shah Nazir
, Habib Ullah Khan
:
Towards an Improved Energy Efficient and End-to-End Secure Protocol for IoT Healthcare Applications. 8867792:1-8867792:10 - Arshad Ahmad
, Chong Feng
, Muzammil Khan
, Asif Khan
, Ayaz Ullah, Shah Nazir
, Adnan Tahir
:
A Systematic Literature Review on Using Machine Learning Algorithms for Software Requirements Identification on Stack Overflow. 8830683:1-8830683:19 - Luo GuangJun
, Shah Nazir
, Habib Ullah Khan
, Amin Ul Haq
:
Spam Detection Approach for Secure Mobile Message Communication Using Machine Learning Algorithms. 8873639:1-8873639:6 - Hongyu Yang
, Renyun Zeng
, Fengyan Wang
, Guangquan Xu, Jiyong Zhang:
An Unsupervised Learning-Based Network Threat Situation Assessment Model for Internet of Things. 6656066:1-6656066:11 - Jinhua Fu
, Sihai Qiao, Yongzhong Huang, Xueming Si, Bin Li
, Chao Yuan:
A Study on the Optimization of Blockchain Hashing Algorithm Based on PRCA. 8876317:1-8876317:12 - Jinghua Yu
, Feng Luo
:
A Systematic Approach for Cybersecurity Design of In-Vehicle Network Systems with Trade-Off Considerations. 7169720:1-7169720:14 - Chian Techapanupreeda, Werasak Kurutach:
Enhancing Transaction Security for Handling Accountability in Electronic Health Records. 8899409:1-8899409:18 - Meilian Li, Shah Nazir
, Habib Ullah Khan
, Sara Shahzad, Rohul Amin
:
Modelling Features-Based Birthmarks for Security of End-to-End Communication System. 8852124:1-8852124:9 - Jibin Zhang
, Shah Nazir, Ansheng Huang
, Abdullah Alharbi:
Multicriteria Decision and Machine Learning Algorithms for Component Security Evaluation: Library-Based Overview. 8886877:1-8886877:14 - Zhiwei Gu
, Shah Nazir
, Cheng Hong, Sulaiman Khan
:
Convolution Neural Network-Based Higher Accurate Intrusion Identification System for the Network Security and Communication. 8830903:1-8830903:10 - Mostafa Yavari
, Masoumeh Safkhani
, Saru Kumari
, Sachin Kumar
, Chien-Ming Chen
:
An Improved Blockchain-Based Authentication Protocol for IoT Network Management. 8836214:1-8836214:16 - Zhanyang Xu, Wentao Liu
, Jingwang Huang, Chenyi Yang, Jiawei Lu, Haozhe Tan:
Artificial Intelligence for Securing IoT Services in Edge Computing: A Survey. 8872586:1-8872586:13 - Jun Chen
, Shize Guo, Xin Ma, Haiying Li, Jinhong Guo, Ming Chen, Zhisong Pan
:
SLAM: A Malware Detection Method Based on Sliding Local Attention Mechanism. 6724513:1-6724513:11 - Xucheng Huang
, Shah Nazir
:
Evaluating Security of Internet of Medical Things Using the Analytic Network Process Method. 8829595:1-8829595:14 - Huaijun Wang, Jing Zhao, Junhuai Li
, Ling Tian, Pengjia Tu, Ting Cao, Yang An, Kan Wang, Shancang Li:
Wearable Sensor-Based Human Activity Recognition Using Hybrid Deep Learning Techniques. 2132138:1-2132138:12

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.