


default search action
4th FCS 2021: Haikou, China
- Chunjie Cao, Yuqing Zhang, Yuan Hong

, Ding Wang:
Frontiers in Cyber Security - 4th International Conference, FCS 2021, Haikou, China, December 17-19, 2021, Revised Selected Papers. Communications in Computer and Information Science 1558, Springer 2022, ISBN 978-981-19-0522-3
Intelligent Security
- Binghui Zou

, Chunjie Cao, Longjuan Wang, Fangjian Tao:
DACN: Malware Classification Based on Dynamic Analysis and Capsule Networks. 3-13 - Hongwen Wu, Xiaoming Wang, Ke Zhou, Jianming Zou, Congyun Wu, Wenjian Wen, Zhicheng Huang, Jiezhen Deng, Tingyu Qiu:

Research on Automatic Analysis and Exploitation Technology of Remote Code Execution Vulnerability for Grid System. 14-29 - Xiang Shu, Chunjie Cao, Longjuan Wang, Fangjian Tao:

GWDGA: An Effective Adversarial DGA. 30-48 - Jiawei Zhang, Jinwei Wang, Xiangyang Luo, Bin Ma, Naixue Xiong:

Imperceptible and Reliable Adversarial Attack. 49-62 - Xianglin Wei, Chao Wang, Xiang Jiao, Qiang Duan, Yongyang Hu:

Architecture and Security Analysis of Federated Learning-Based Automatic Modulation Classification. 63-77 - Hansong Ren, Xuejun Li, Liao Lei, Guoliang Ou, Hongyu Sun, Gaofei Wu, Xiao Tian, Jinglu Hu, Yuqing Zhang:

Detecting Inconsistent Vulnerable Software Version in Security Vulnerability Reports. 78-99
System Security
- Xi Luo, Chunjie Cao, Longjuan Wang:

Multi-modal Universal Embedding Representations for Language Understanding. 103-119 - Xin Ji, Haifeng Zhang, Juan Chu, Linxiao Dong, Chengyue Yang:

New Federation Algorithm Based on End-Edge-Cloud Architecture for Smart Grid. 120-133 - Egide Nkurunziza, Mwitende Gervais, Lawrence Tandoh, Fagen Li:

Certificateless Authentication and Consensus for the Blockchain-Based Smart Grid. 134-151 - Xinjian Lv, Nan Shi, Jing Wei, Yuan Tian, Jie Li, Jian Li:

Information System Security Risk Assessment Based on Entropy Weight Method - Bayesian Network. 152-162 - Jiayuan Zhang, Mengyue Feng, Yuhang Huang, Tao Feng, Wenjie Wang, He Wang, Han Zhang:

Survey of 3D Printer Security Offensive and Defensive. 163-178
Network Security
- Lawrence Tandoh, Fagen Li, Ikram Ali

, Charles Roland Haruna, Michael Y. Kpiebaareh, Christopher Tandoh:
Requirements for Total Resistance to Pollution Attacks in HMAC-Based Authentication Schemes for Network Coding. 181-196 - Kejun Zhang

, Xinrui Jiang
, Xinying Yu
, Liwen Feng
:
Network Security Situation Assessment Method Based on MHSA-FL Model. 197-213 - Jieru Mu, Hua He, Lin Li, Shanchen Pang, Cong Liu

:
A Hybrid Network Intrusion Detection Model Based on CNN-LSTM and Attention Mechanism. 214-229 - Hao Peng, Zhen Qian, Ming Zhong, Dandan Zhao, Guangquan Xu, Songyang Wu, Jianming Han:

System Security Analysis of Different Link Proportions Between Nodes in the Cyber-Physical System Against Target Attack. 230-242
Multimedia Security
- Bin Ma, Yongkang Fu, Jian Li, Chunpeng Wang, Yuli Wang:

A GDIoU Loss Function-Based YOLOv4 Deep Learning Network for High-Performance Insulator Location in Field Images. 245-256 - Terui Mao

, Diqun Yan
, Yongkang Gong
, Rangding Wang
:
Identification of Synthetic Spoofed Speech with Deep Capsule Network. 257-265
Privacy, Risk and Trust
- Yanhua Zhang, Ximeng Liu, Yupu Hu, Huiwen Jia:

Cloud-Aided Scalable Revocable Identity-Based Encryption with Ciphertext Update from Lattices. 269-287 - Ming Cheng, Yang Yang

, Yingqiu Ding, Weiming Zhang
:
A Privacy-Preserving Medical Image Scheme Based on Secret Sharing and Reversible Data Hiding. 288-307 - Zhixuan Gao, Shuang Wang, Yaoling Ding, An Wang, Qingjun Yuan:

Correlation Power Analysis and Protected Implementation on Block Cipher RainDrop. 308-323
Data and Application Security
- Na Wang, Gaofei Wu, Qiuling Yue, Jinglu Hu, Yuqing Zhang:

Research on Security Assessment of Cross Border Data Flow. 327-341 - Ying Li, Mianxue Gu, Hongyu Sun, Yuhao Lin, Qiuling Yue, Zhen Guo, Jinglu Hu, He Wang, Yuqing Zhang:

A Review of Data Representation Methods for Vulnerability Mining Using Deep Learning. 342-351

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














