- Jingzhi Liu, Hongyi Yang, Quanlei Qu, Zhidong Liu, Yang Cao:
Research on distribution automation security situational awareness technology based on risk transmission path and multi-source information fusion. Cybersecur. 7(1): 57 (2024) - Fengxia Liu, Zhiyong Zheng, Zixian Gong
, Kun Tian, Yi Zhang, Zhe Hu, Jia Li, Qun Xu:
A survey on lattice-based digital signature. Cybersecur. 7(1): 7 (2024) - Renyang Liu
, Wei Zhou, Xin Jin, Song Gao, Yuanyu Wang, Ruxin Wang:
DTA: distribution transform-based attack for query-limited scenario. Cybersecur. 7(1): 8 (2024) - Yuantu Luo
, Jun Tao, Yuehao Zhu, Yifan Xu:
HSS: enhancing IoT malicious traffic classification leveraging hybrid sampling strategy. Cybersecur. 7(1): 11 (2024) - Haoran Lyu, Yajie Wang, Yu-An Tan, Huipeng Zhou, Yuhang Zhao, Quanxin Zhang
:
Maxwell's Demon in MLP-Mixer: towards transferable adversarial attacks. Cybersecur. 7(1): 6 (2024) - Yao Pan
, Zheng Chao, He Wang, Jing Yang, Hongjia Li, Liming Wang:
FedSHE: privacy preserving and efficient federated learning with adaptive segmented CKKS homomorphic encryption. Cybersecur. 7(1): 40 (2024) - Alex Shafarenko
:
Winternitz stack protocols for embedded systems and IoT. Cybersecur. 7(1): 34 (2024) - Qintao Shen
, Guozhu Meng, Kai Chen:
Revealing the exploitability of heap overflow through PoC analysis. Cybersecur. 7(1): 47 (2024) - Mahdi Soltani
, Khashayar Khajavi
, Mahdi Jafari Siavoshani
, Amir Hossein Jahangir
:
A multi-agent adaptive deep learning framework for online intrusion detection. Cybersecur. 7(1): 9 (2024) - Shuang Song, Neng Gao
, Yifei Zhang, Cunqing Ma:
BRITD: behavior rhythm insider threat detection with time awareness and user adaptation. Cybersecur. 7(1): 2 (2024) - Zheng Sun, Jinxiao Zhao, Feng Guo, Yuxuan Chen
, Lei Ju:
CommanderUAP: a practical and transferable universal adversarial attacks on speech recognition models. Cybersecur. 7(1): 38 (2024) - Md. Alamin Talukder
, Rakib Hossen, Md. Ashraf Uddin, Mohammed Nasir Uddin, Uzzal Kumar Acharjee:
Securing transactions: a hybrid dependable ensemble machine learning model using IHT-LR and grid search. Cybersecur. 7(1): 32 (2024) - Miao Tian, Yushu Zhang, Yongming Zhang, Xiangli Xiao, Wenying Wen:
A privacy-preserving image retrieval scheme with access control based on searchable encryption in media cloud. Cybersecur. 7(1): 22 (2024) - Baowei Wang, Fengxiao Guo
, Yuting Liu, Bin Li, Yi Yuan:
An efficient and versatile e-voting scheme on blockchain. Cybersecur. 7(1): 62 (2024) - Huaxin Wang, Yiwen Gao, Yuejun Liu, Qian Zhang, Yongbin Zhou:
In-depth Correlation Power Analysis Attacks on a Hardware Implementation of CRYSTALS-Dilithium. Cybersecur. 7(1): 21 (2024) - Chaoqun Wang, Ning Li, Shujuan Ji
, Xianwen Fang, Zhen Wang:
Enhancing fairness of trading environment: discovering overlapping spammer groups with dynamic co-review graph optimization. Cybersecur. 7(1): 37 (2024) - Ruida Wang
, Ziyi Li
, Xianhui Lu, Zhenfei Zhang, Kunpeng Wang:
Key derivable signature and its application in blockchain stealth address. Cybersecur. 7(1): 43 (2024) - Huizhuo Wang
, Yang Tao, Rui Zhang:
Threshold ring signature: generic construction and logarithmic size instantiation. Cybersecur. 7(1): 46 (2024) - Wenbo Wang
, Peng Yi, Taotao Kou, Weitao Han, Chengyu Wang:
GLDOC: detection of implicitly malicious MS-Office documents using graph convolutional networks. Cybersecur. 7(1): 48 (2024) - Yamei Wang, Weijing You, Yuexin Zhang
, Ayong Ye, Li Xu:
Cloud EMRs auditing with decentralized (t, n)-threshold ownership transfer. Cybersecur. 7(1): 53 (2024) - Nansen Wang, Jianing Zhang, Ju Huang, Wei Ou, Wenbao Han, Qionglu Zhang:
Telemedicine data secure sharing scheme based on heterogeneous federated learning. Cybersecur. 7(1): 56 (2024) - Benqiang Wei
, Xianhui Lu:
Improved homomorphic evaluation for hash function based on TFHE. Cybersecur. 7(1): 14 (2024) - Yinghong Xie, Yan Hao
, Xiaowei Han, Qiang Gao, Biao Yin:
A multi-channel spatial information feature based human pose estimation algorithm. Cybersecur. 7(1): 49 (2024) - Keya Xu, Guang Cheng:
F3l: an automated and secure function-level low-overhead labeled encrypted traffic dataset construction method for IM in Android. Cybersecur. 7(1): 1 (2024) - Boyuan Xu, Yiru Gong, Xiaoyu Geng, Yun Li, Cong Dong, Song Liu
, Yuling Liu, Bo Jiang, Zhigang Lu:
ProcSAGE: an efficient host threat detection method based on graph representation learning. Cybersecur. 7(1): 51 (2024) - Wenhan Xu, Hui Ma, Rui Zhang
:
GAPS: GPU-accelerated processing service for SM9. Cybersecur. 7(1): 29 (2024) - Jingjie Xu, Ting Wang, Mingqi Lv, Tieming Chen
, Tiantian Zhu, Baiyang Ji:
MVD-HG: multigranularity smart contract vulnerability detection method based on heterogeneous graphs. Cybersecur. 7(1): 55 (2024) - Chuyi Yan, Xueying Han, Yan Zhu, Dan Du, Zhigang Lu, Yuling Liu:
Phishing behavior detection on different blockchains via adversarial domain adaptation. Cybersecur. 7(1): 45 (2024) - Zhongxu Yin, Yiran Song, Guoxiao Zong:
Discovering API usage specifications for security detection using two-stage code mining. Cybersecur. 7(1): 30 (2024) - Haoran Yu, Wenchuan Yang, Baojiang Cui, Runqi Sui, Xuedong Wu:
Enhanced anomaly traffic detection framework using BiGAN and contrastive learning. Cybersecur. 7(1): 71 (2024)