- Zhixiu Guo, Ruigang Liang, Guozhu Meng, Kai Chen:
SkillSim: voice apps similarity detection. Cybersecur. 6(1): 13 (2023) - Feng Guo, Zheng Sun, Yuxuan Chen, Lei Ju:
Towards the universal defense for query-based audio adversarial attacks on speech recognition system. Cybersecur. 6(1): 40 (2023) - Feng Guo, Zheng Sun, Yuxuan Chen, Lei Ju:
Towards the transferable audio adversarial attack via ensemble methods. Cybersecur. 6(1): 44 (2023) - Jianfu Huang, Ye Luo, Qinggan Fu, Yincen Chen, Chao Wang, Ling Song:
Generic attacks on small-state stream cipher constructions in the multi-user setting. Cybersecur. 6(1): 53 (2023) - Weihao Huang, Guozhu Meng, Chaoyang Lin, Qiucun Yan, Kai Chen, Zhuo Ma:
Are our clone detectors good enough? An empirical study of code effects by obfuscation. Cybersecur. 6(1): 14 (2023) - Ziad Hussein, May A. Salama, Sahar A. El-Rahman:
Evolution of blockchain consensus algorithms: a review on the latest milestones of blockchain consensus algorithms. Cybersecur. 6(1): 30 (2023) - Chaidir Chalaf Islamy, Tohari Ahmad, Royyana Muslim Ijtihadie:
Reversible data hiding based on histogram and prediction error for sharing secret data. Cybersecur. 6(1): 12 (2023) - Yubing Jiang, Peisong Shen, Li Zeng, Xiaojie Zhu, Di Jiang, Chi Chen:
Cancelable biometric schemes for Euclidean metric and Cosine metric. Cybersecur. 6(1): 4 (2023) - Baolong Jin, Rui Xue:
Improved lower bound for the complexity of unique shortest vector problem. Cybersecur. 6(1): 38 (2023) - Chengbin Jin, Yongbin Zhou:
Enhancing non-profiled side-channel attacks by time-frequency analysis. Cybersecur. 6(1): 15 (2023) - Armita Kazeminajafabadi, Mahdi Imani:
Optimal monitoring and attack detection of networks modeled by Bayesian attack graphs. Cybersecur. 6(1): 22 (2023) - Sea Ran Cleon Liew, Ngai-Fong Law:
Use of subword tokenization for domain generation algorithm classification. Cybersecur. 6(1): 49 (2023) - Jiaxi Liu, Yun Feng, Xinyu Liu, Jianjun Zhao, Qixu Liu:
MRm-DLDet: a memory-resident malware detection framework based on memory forensics and deep neural network. Cybersecur. 6(1): 21 (2023) - Yuting Liu, Yongqiang Li, Huiqin Chen, Mingsheng Wang:
Full-round impossible differential attack on shadow block cipher. Cybersecur. 6(1): 52 (2023) - Jiashuo Liu, Jiongjiong Ren, Shaozhen Chen:
A deep learning aided differential distinguisher improvement framework with more lightweight and universality. Cybersecur. 6(1): 47 (2023) - Chang Liu, Yan-Jun Wu, Jing-Zheng Wu, Chen Zhao:
A buffer overflow detection and defense method based on RISC-V instruction set extension. Cybersecur. 6(1): 45 (2023) - Peng Liu, Wenzhe Ye, Haiying Duan, Xianxian Li, Shuyi Zhang, Chuanjian Yao, Yongnan Li:
Graph neural network based approach to automatically assigning common weakness enumeration identifiers for vulnerabilities. Cybersecur. 6(1): 29 (2023) - Xia Liu, Huan Yang, Li Yang:
Minimizing CNOT-count in quantum circuit of the extended Shor's algorithm for ECDLP. Cybersecur. 6(1): 48 (2023) - Hashida Haidros Rahima Manzil, S. Manohar Naik:
Android malware category detection using a novel feature vector-based machine learning model. Cybersecur. 6(1): 6 (2023) - Vikas Maurya, Rachit Agarwal, Saurabh Kumar, Sandeep K. Shukla:
EPASAD: ellipsoid decision boundary based Process-Aware Stealthy Attack Detector. Cybersecur. 6(1): 28 (2023) - Yisroel Mirsky:
IPatch: a remote adversarial patch. Cybersecur. 6(1): 18 (2023) - David Concejal Muñoz, Antonio del Corte-Valiente:
A novel botnet attack detection for IoT networks based on communication graphs. Cybersecur. 6(1): 33 (2023) - Mir Nazish, M. Tariq Banday, Insha Syed, Sheena Banday:
An efficient permutation approach for SbPN-based symmetric block ciphers. Cybersecur. 6(1): 42 (2023) - Jean De La Croix Ntivuguruzwa, Tohari Ahmad:
A convolutional neural network to detect possible hidden data in spatial domain images. Cybersecur. 6(1): 23 (2023) - Jinglei Pei, Yuyang Shi, Qingling Feng, Ruisheng Shi, Lina Lan, Shui Yu, Jinqiao Shi, Zhaofeng Ma:
An efficient confidentiality protection solution for pub/sub system. Cybersecur. 6(1): 34 (2023) - Sohel Rana, M. Rubaiyat Hossain Mondal, Joarder Kamruzzaman:
RBFK cipher: a randomized butterfly architecture-based lightweight block cipher for IoT devices in the edge computing environment. Cybersecur. 6(1): 3 (2023) - Muhammad Usama Sardar, Christof Fetzer:
Confidential computing and related technologies: a critical review. Cybersecur. 6(1): 10 (2023) - B. S. Sharmila, Rohini Nagapadma:
Quantized autoencoder (QAE) intrusion detection system for anomaly detection in resource-constrained IoT devices using RT-IoT2022 dataset. Cybersecur. 6(1): 41 (2023) - Vaishnavi Sivagaminathan, Manmohan Sharma, Santosh Kumar Henge:
Intrusion detection systems for wireless sensor networks using computational intelligence techniques. Cybersecur. 6(1): 27 (2023) - Zishuai Song, Hui Ma, Shuzhou Sun, Yansen Xin, Rui Zhang:
Rainbow: reliable personally identifiable information retrieval across multi-cloud. Cybersecur. 6(1): 19 (2023)