


default search action
Cybersecurity, Volume 8
Volume 8, Number 1, December 2025
- Xiaogang Xing, Ming Xu
, Yujing Bai, Dongdong Yang:
A graph backdoor detection method for data collection scenarios. 1 - Laura Quiroga-Sánchez, Germán Adolfo Montoya, Carlos Andres Lozano-Garzon:
The SEIRS-NIMFA epidemiological model for malware propagation analysis in IoT networks. 2 - Xueqi Zhu, Fangzhou Liu, Yan Jia, Jun Xu, Peng Wang
:
Cryptanalysis of IAR-CTR and IAR-CFB and a fixing method. 3 - Yucheng Ma, Peisong Shen, Xue Tian, Kewei Lv, Chi Chen:
Reusable and robust fuzzy extractor for CRS-dependent sources. 4 - Malte Kerl
, Ulf Bodin, Olov Schelén:
Privacy-preserving attribute-based access control using homomorphic encryption. 5 - Lin Wu, Yulai Xie, Jin Li, Dan Feng, Jinyuan Liang, Yafeng Wu:
Angus: efficient active learning strategies for provenance based intrusion detection. 6 - Hongfang Zhou, Heng Pan, Kangyun Zheng, Zongling Wu, Qingyu Xiang:
A novel oversampling method based on Wasserstein CGAN for imbalanced classification. 7 - Jian Zheng, Shumiao Ren, Jingyue Zhang, Yu Kui, Jingyi Li, Qin Jiang, Shiyan Wang:
Detection to false data for smart grid. 8 - Guangli Wu, Xingyue Wang:
A privacy-enhanced framework with deep learning for botnet detection. 9 - Lianglin Yan
, Ming Luo, Mingsheng Wang:
Speedup signing: pre-rejection sampling towards dilithium. 10 - Huanwei Wang
, Weining Hao, Yonghe Tang, Bing Zhu, Weiyu Dong, Wei Liu:
Deep neural network modeling attacks on arbiter-PUF-based designs. 11 - Ri Wang, Chen Li
, Kun Zhang, Bibo Tu:
Zero-trust based dynamic access control for cloud computing. 12 - Ruiqi Huang, Hua Wu
, Xiaohui Wang, Guang Cheng, Xiaoyan Hu:
The secret behind instant messaging: video identification attack against complex protocols. 13 - Han Zhang, Yong Shi, Ming Liu, Libo Chen, Songyang Wu, Zhi Xue:
A combined feature selection approach for malicious email detection based on a comprehensive email dataset. 14 - Yaqi Yang, Jun'e Li
, Tao Zhang, Lu Chen, Guirong Huang, Zhuo Lv:
IRMAOC: an interpretable role mining algorithm based on overlapping clustering. 54 - Jie Zhang
, Haoyu Bu, Hui Wen, Yongji Liu, Haiqiang Fei, Rongrong Xi, Lun Li, Yun Yang, Hongsong Zhu, Dan Meng:
When LLMs meet cybersecurity: a systematic literature review. 55 - Qiuxiang Li, Jianping Wu:
Efficient network attack path optimization method based on prior knowledge-based PPO algorithm. 15 - Yanjun Li
, Lixian Zhang, Yiping Lin, Jian Liu, Yani Sun:
Integral cryptanalysis on reduce-round SAILFISH-I. 16 - Tian Tian, Chen Zhang, Bo Jiang, Huamin Feng, Zhigang Lu:
Insider threat detection for specific threat scenarios. 17 - Weixuan Tang, Yuan Rao
, Zuopeng Yang, Fei Peng, Xutong Cui, Junhao Huang, Peijun Zhu:
Reversible generative steganography with distribution-preserving. 18 - Kai He, Shengyuan Shi, Chunxiao Yin, Hongyan Wan, Jiaoli Shi:
Private, efficient, and flexible: protecting names based on message-derived encryption in named data networking. 19 - Shihao Zhang, Yanhui Xiao, Huawei Tian, Xiaolong Li:
A multi-image steganography: ISS. 20 - Yaguan Qian, Renhui Tao, Huabin Du, Bin Wang:
Unveiling the veil: high-frequency components as the key to understanding medical DNNs' vulnerability to adversarial examples. 21 - Zezhou Hou, Jiongjiong Ren
, Shaozhen Chen:
Improved machine learning-aided linear cryptanalysis: application to DES. 22 - Jiachen Zhang, Daoqi Han, Zhaoxuan Lv, Yueming Lu
, Junke Duan, Yang Liu, Xinyu Zhang:
Bag2image: a multi-instance network traffic representation for network security event prediction. 31 - Shihao Zhang, Yanhui Xiao, Huawei Tian, Xiaolong Li:
A multi-image steganography: ISS. 20 - Pengcheng Zhu, Xin Jin, Qian Jiang, Xueshuai Gao, Puming Wang, Shaowen Yao, Wei Zhou:
Transferable adversarial attacks for multi-model systems coupling image fusion with classification models. 23 - Mir Nazish
, Munika Javid, M. Tariq Banday
:
Enhanced logistic map with infinite chaos and its applicability in lightweight and high-speed pseudo-random bit generation. 24 - Nan Liu, Chenhui Jin, Junwei Yu
:
Key committing attack on Tiaoxin-346 algorithm. 25 - Mengmeng Ge, Ruitao Feng, Likun Liu, Xiangzhan Yu, Vinay Sachidananda, Xie Xiaofei
, Yang Liu:
Enmob: Unveil the Behavior with Multi-flow Analysis of Encrypted App Traffic. 26 - Yalu Wang
, Zhijie Han, Ying Du, Jie Li, Xin He:
BS-GAT: a network intrusion detection system based on graph neural network for edge computing. 27 - Chen Yang Lin, Hui Zhao
, Jing Han Liu:
A lightweight vulnerability detection method for long smart contracts based on bimodal feature fusion. 28 - Yuan Zhang, Jiaru Song, Yongxiong Sun, Zhanheng Gao, Zhe Hu, Minghui Sun
:
Federated two-stage transformer-based network for intrusion detection in non-IID data of controller area networks. 29 - Shujiao Cao
, Rui Xue:
Quantum commitments from structured one-way quantum state generators, and more. 30 - Birong Xu
, Ximei Ye, Xiaoyuan Wang, Zhipeng Zhang:
Image encryption scheme based on compressed sensing and fractional quantum logistic-tent map. 56 - Ying Gao
, Lin Qi:
Upper bounds of differential branch number of n-bit permutations. 58 - Rodrigo Castillo Camargo, Juan Murcia Nieto, Nicolás Rojas, Daniel Díaz López, Santiago Alférez, Ángel Luis Perales Gómez, Pantaleone Nespoli, Félix Gómez Mármol, Umit Karabiyik:
DEFENDIFY: defense amplified with transfer learning for obfuscated malware framework. 97 - Shihao Zhang, Yanhui Xiao, Huawei Tian, Xiaolong Li:
Correction: A multi-image steganography: ISS. 99 - Jingqiang Liu, Ruigang Liang, Xiaoxi Zhu, Yue Zhang, Yuling Liu, Qixu Liu:
LLM4TDG: test-driven generation of large language models based on enhanced constraint reasoning. 32 - Daniel Scheliga
, Patrick Mäder
, Marco Seeland
:
Privacy preserving federated learning with convolutional variational bottlenecks. 33 - Qinggan Fu, Ye Luo, Qianqian Yang, Ling Song
:
Preimage and collision attacks on reduced Ascon using algebraic strategies. 34 - Mohammad Alshinwan, Osama Ahmed Khashan
, Zakwan Al-Arnaout, Salam Salameh Shreem, Ahmed Younes Shdefat, Nader Abdel Karim:
A novel Smishing defense approach based on meta-heuristic optimization algorithms. 35 - Yuxin Tong, Shimin Li, Zhiwei Wang, Rui Zhang, Rui Xue:
Adaptively secure, splittable, and robust threshold unsigncryption. 57 - Xinxin Yue, Zhiyong Zhang, Junchang Jing, Weiguo Wang:
Ctta: a novel chain-of-thought transfer adversarial attacks framework for large language models. 36 - Mohammad Moshawrab, Mehdi Adda, Abdenour Bouzouane, Hussein Ibrahim, Ali Raad:
HP_FLAP: homomorphic and polymorphic federated learning aggregation of parameters framework. 37 - Jesús E. Díaz Verdejo, Rafael Estepa, Antonio Jose Estepa, Javier Muñoz-Calle, Germán Madinabeitia:
Building a large, realistic and labeled HTTP URI dataset for anomaly-based intrusion detection systems: Biblio-US17. 38 - Yu Wei, Lei Bi, Kunpeng Wang, Xianhui Lu:
An improved BKW algorithm on the learning with rounding problem. 39 - Qinyou Huang, Luping Wang, Jie Chen:
An efficient video slice encryption scheme and its application. 40 - Yajie Guo, Shujuan Ji, Xianwen Fang, Dickson K. W. Chiu, Ning Cao, Ho-fung Leung:
An Unsupervised Fake News Detection Framework Based on Structural Contrastive Learning. 41 - Sai Hu, Ruwei Huang, Liang Zhou:
An efficient multi-key BFV fully homomorphic encryption scheme with optimized relinearization. 42 - Liyou Liu, Ming Xu:
A network intrusion detection method based on contrastive learning and Bayesian Gaussian Mixture Model. 59 - Zhuoyu Tian, Lei Chen, Shengyu Fan, Xianglong Deng, Rui Hou, Dan Meng, Mingzhe Zhang:
LP-HENN: fully homomorphic encryption accelerator with high energy efficiency. 98

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.