default search action
Security and Communication Networks, Volume 2018
Volume 2018, 2018
- Shin-Yan Chiou, Ching-Hsuan Lin:
An Efficient Three-Party Authentication Scheme for Data Exchange in Medical Environment. 9146297:1-9146297:15 - Pengcheng Cao, Weiwei Liu, Guangjie Liu, Xiaopeng Ji, Jiangtao Zhai, Yuewei Dai:
A Wireless Covert Channel Based on Constellation Shaping Modulation. 1214681:1-1214681:15 - Jinpei Yan, Yong Qi, Qifan Rao:
LSTM-Based Hierarchical Denoising Network for Android Malware Detection. 5249190:1-5249190:18 - Yadong Zhou, Kaiyue Chen, Junjie Zhang, Junyuan Leng, Yazhe Tang:
Exploiting the Vulnerability of Flow Table Overflow in Software-Defined Network: Attack Model, Evaluation, and Defense. 4760632:1-4760632:15 - Tao Wang, Hongchang Chen, Guozhen Cheng, Yulin Lu:
SDNManager: A Safeguard Architecture for SDN DoS Attacks Based on Bandwidth Prediction. 7545079:1-7545079:16 - Che Zhang, Hong Xu, Libin Liu, Zhixiong Niu, Peng Wang:
Kuijia: Traffic Rescaling in Software-Defined Data Center WANs. 6361901:1-6361901:12 - Min Zhao, Yan Xing, Xiao-Wei Li, Qiong-Hua Wang:
Two-Step Integral Imaging Coding Based Three-Dimensional Information Encryption Approach. 2658318:1-2658318:9 - Ahmed Almusawi, Haleh Amintoosi:
DNS Tunneling Detection Method Based on Multilabel Support Vector Machine. 6137098:1-6137098:9 - Xiaoguang Niu, Jiawei Wang, Qiongzan Ye, Yihao Zhang:
A Privacy-Preserving Incentive Mechanism for Participatory Sensing Systems. 2593537:1-2593537:15 - Wenwen Fu, Tao Li, Zhigang Sun:
FAS: Using FPGA to Accelerate and Secure SDN Software Switches. 5650205:1-5650205:13 - Owen Lo, William J. Buchanan, Paul Griffiths, Richard Macfarlane:
Distance Measurement Methods for Improved Insider Threat Detection. 5906368:1-5906368:18 - Yongjae Lee, Seunghyeon Lee, Hyunmin Seo, Changhoon Yoon, Seungwon Shin, Hyunsoo Yoon:
Duo: Software Defined Intrusion Tolerant System Using Dual Cluster. 6751042:1-6751042:13 - Huan Wang, Hongxia Wang:
Perceptual Hashing-Based Image Copy-Move Forgery Detection. 6853696:1-6853696:11 - Yu Sun, Rongrong Ni, Yao Zhao:
Nonoverlapping Blocks Based Copy-Move Forgery Detection. 1301290:1-1301290:11 - Chao Qi, Jiangxing Wu, Guozhen Cheng, Jianjian Ai, Shuo Zhao:
Security Analysis of Dynamic SDN Architectures Based on Game Theory. 4123736:1-4123736:10 - Jiawei Tang, Anfeng Liu, Ming Zhao, Tian Wang:
An Aggregate Signature Based Trust Routing for Data Gathering in Sensor Networks. 6328504:1-6328504:30 - Biao Han, Xiangrui Yang, Zhigang Sun, Jinfeng Huang, Jinshu Su:
OverWatch: A Cross-Plane DDoS Attack Defense Framework with Collaborative Intelligence in SDN. 9649643:1-9649643:15 - Jinsoo Park, Gangsan Kim, Hong-Yeop Song, Chanki Kim, Jong-Seon No, Suil Kim:
Analysis of Iterative Erasure Insertion and Decoding of FH/MFSK Systems without Channel State Information. 7318043:1-7318043:12 - Zhixiong Zheng, Haibo Cheng, Zijian Zhang, Yiming Zhao, Ping Wang:
An Alternative Method for Understanding User-Chosen Passwords. 6160125:1-6160125:12 - Fang Liu, Tong Li:
A Clustering k-Anonymity Privacy-Preserving Method for Wearable IoT Devices. 4945152:1-4945152:8 - Shang-Chiuan Su, Yi-Ren Chen, Shi-Chun Tsai, Yi-Bing Lin:
Detecting P2P Botnet in Software Defined Networks. 4723862:1-4723862:13 - Jian Shen, Jun Shen, Chin-Feng Lai, Qi Liu, Tianqi Zhou:
Cloud Based Data Protection in Anonymously Controlled SDN. 9845426:1-9845426:8 - Ihsan H. Abdulqadder, Deqing Zou, Israa T. Aziz, Bin Yuan:
Validating User Flows to Protect Software Defined Network Environments. 1308678:1-1308678:14 - Xianyi Chen, Haidong Zhong, Lizhi Xiong, Zhihua Xia:
Improved Encrypted-Signals-Based Reversible Data Hiding Using Code Division Multiplexing and Value Expansion. 1326235:1-1326235:9 - Dawen Xu, Kai Chen, Rangding Wang, Shubing Su:
Separable Reversible Data Hiding in Encrypted Images Based on Two-Dimensional Histogram Modification. 1734961:1-1734961:14 - ByungRae Cha, Sun Park, JongWon Kim, Sung Bum Pan, Juhyun Shin:
International Network Performance and Security Testing Based on Distributed Abyss Storage Cluster and Draft of Data Lake Framework. 1746809:1-1746809:14 - Tianliang Lu, Lu Zhang, Yixian Fu:
A Novel Immune-Inspired Shellcode Detection Algorithm Based on Hyperellipsoid Detectors. 2063089:1-2063089:10 - Haibo Yi:
Under Quantum Computer Attack: Is Rainbow a Replacement of RSA and Elliptic Curves on Hardware? 2369507:1-2369507:9 - Dongmei Niu, Hongxia Wang, Minquan Cheng, Canghong Shi:
Reference Sharing Mechanism-Based Self-Embedding Watermarking Scheme with Deterministic Content Reconstruction. 2516324:1-2516324:12 - Chong Fu, Gao-yuan Zhang, Mai Zhu, Zhe Chen, Weimin Lei:
A New Chaos-Based Color Image Encryption Scheme with an Efficient Substitution Keystream Generation Strategy. 2708532:1-2708532:13 - Hongchen Wu, Huaxiang Zhang, Lizhen Cui, Xinjun Wang:
A Heuristic Model for Supporting Users' Decision-Making in Privacy Disclosure for Recommendation. 2790373:1-2790373:13 - Pengdeng Li, Xiaofan Yang, Qingyu Xiong, Junhao Wen, Yuan Yan Tang:
Defending against the Advanced Persistent Threat: An Optimal Control Approach. 2975376:1-2975376:14 - Shuang Zhao, Xiapu Luo, Xiaobo Ma, Bo Bai, Yankang Zhao, Wei Zou, Zeming Yang, Man Ho Au, Xinliang Qiu:
Exploiting Proximity-Based Mobile Apps for Large-Scale Location Privacy Probing. 3182402:1-3182402:22 - Ady Wahyudi Paundu, Doudou Fall, Daisuke Miyamoto, Youki Kadobayashi:
Leveraging KVM Events to Detect Cache-Based Side Channel Attacks in a Virtualization Environment. 4216240:1-4216240:18 - Dongdong Zhao, Shu Fang, Jianwen Xiang, Jing Tian, Shengwu Xiong:
Iris Template Protection Based on Local Ranking. 4519548:1-4519548:9 - Zhihui Chu, Huaifeng Chen, Xiaoyun Wang, Xiaoyang Dong, Lu Li:
Improved Integral Attacks on SIMON32 and SIMON48 with Dynamic Key-Guessing Techniques. 5160237:1-5160237:11 - Ming Luo, Yi Luo, Yuwei Wan, Ze Wang:
Secure and Efficient Access Control Scheme for Wireless Sensor Networks in the Cross-Domain Context of the IoT. 6140978:1-6140978:10 - Xuyun Zhang, Julian Jang-Jaccard, Lianyong Qi, Md. Zakirul Alam Bhuiyan, Chang Liu:
Privacy Issues in Big Data Mining Infrastructure, Platforms, and Applications. 6238607:1-6238607:3 - Wilson S. Melo, Raphael C. S. Machado, Luiz Fernando Rust da Costa Carmo:
Using Physical Context-Based Authentication against External Attacks: Models and Protocols. 6590928:1-6590928:14 - Jin Cao, Hui Li, Maode Ma, Fenghua Li:
UPPGHA: Uniform Privacy Preservation Group Handover Authentication Mechanism for mMTC in LTE-A Networks. 6854612:1-6854612:16 - Miao Yu, Yongzheng Zhang, Tianning Zang, Yipeng Wang, Yijing Wang:
Information Propagation Prediction Based on Key Users Authentication in Microblogging. 7024842:1-7024842:7 - Junhui He, Junxi Chen, Shichang Xiao, Xiaoyu Huang, Shaohua Tang:
A Novel AMR-WB Speech Steganography Based on Diameter-Neighbor Codebook Partition. 7080673:1-7080673:11 - Michele De Donno, Nicola Dragoni, Alberto Giaretta, Angelo Spognardi:
DDoS-Capable IoT Malwares: Comparative Analysis and Mirai Investigation. 7178164:1-7178164:30 - Kang-Leng Chiew, Jeffrey Choo Soon Fatt, San-Nah Sze, Kelvin Sheng Chek Yong:
Leverage Website Favicon to Detect Phishing Websites. 7251750:1-7251750:11 - Binh Van Nguyen, Hyoyoung Jung, Kiseon Kim:
On the Antijamming Performance of the NR-DCSK System. 7963641:1-7963641:8 - Chenglong Cao, Xiaoling Zhu:
Practical Secure Transaction for Privacy-Preserving Ride-Hailing Services. 8053967:1-8053967:8 - Tianqi Zhou, Jian Shen, Xiong Li, Chen Wang, Jun Shen:
Quantum Cryptography for the Future Internet and the Security Analysis. 8214619:1-8214619:7 - Baraka D. Sija, Young-Hoon Goo, Kyu-Seok Shim, Huru Hasanova, Myung-Sup Kim:
A Survey of Automatic Protocol Reverse Engineering Approaches, Methods, and Tools on the Inputs and Outputs View. 8370341:1-8370341:17 - Hyeonseong Jo, Jaehyun Nam, Seungwon Shin:
NOSArmor: Building a Secure Network Operating System. 9178425:1-9178425:14 - Ping Zhang, Honggang Hu, Qian Yuan:
Close to Optimally Secure Variants of GCM. 9715947:1-9715947:12 - Yu Yao, Qiang Fu, Wei Yang, Ying Wang, Chuan Sheng:
An Epidemic Model of Computer Worms with Time Delay and Variable Infection Rate. 9756982:1-9756982:11 - Ming Li, Haiju Fan, Hua Ren, Dandan Lu, Di Xiao, Yang Li:
Meaningful Image Encryption Based on Reversible Data Hiding in Compressive Sensing Domain. 9803519:1-9803519:12 - Haitao He, Chun Shan, Xiangmin Tian, Yalei Wei, Guoyan Huang:
Analysis on Influential Functions in the Weighted Software Network. 1525186:1-1525186:10 - Rui Zhang, Di Xiao, Yanting Chang:
A Novel Image Authentication with Tamper Localization and Self-Recovery in Encrypted Domain Based on Compressive Sensing. 1591206:1-1591206:15 - Hyun-Gu Lee, Jung Yeon Hwang, Dong In Kim, Shincheol Lee, Sung-Hoon Lee, Ji Sun Shin:
Understanding Keystroke Dynamics for Smartphone Users Authentication and Keystroke Dynamics on Smartphones Built-In Motion Sensors. 2567463:1-2567463:10 - Suk-Hwan Lee:
Reversible Data Hiding for DNA Sequence Using Multilevel Histogram Shifting. 3530969:1-3530969:13 - So Ryoung Park, Ilku Nam, Sanguk Noh:
Modeling and Simulation for the Investigation of Radar Responses to Electronic Attacks in Electronic Warfare Environments. 3580536:1-3580536:13 - Tomás Bajtos, Andrej Gajdos, Lenka Kleinova, Katarína Lucivjanská, Pavol Sokol:
Network Intrusion Detection with Threat Agent Profiling. 3614093:1-3614093:17 - Kyle Coffey, Richard Smith, Leandros Maglaras, Helge Janicke:
Vulnerability Analysis of Network Scanning on SCADA Systems. 3794603:1-3794603:21 - Zhiyuan Jiang, Chao Feng, Chaojing Tang:
An Exploitability Analysis Technique for Binary Vulnerability Based on Automatic Exception Suppression. 4610320:1-4610320:21 - Tanping Zhou, Ningbo Li, Xiaoyuan Yang, Liqun Lv, Yitao Ding, Xu An Wang:
Secure Testing for Genetic Diseases on Encrypted Genomes with Homomorphic Encryption Scheme. 4635715:1-4635715:12 - Lu Ou, Hui Yin, Zheng Qin, Sheng Xiao, Guangyi Yang, Yupeng Hu:
An Efficient and Privacy-Preserving Multiuser Cloud-Based LBS Query Scheme. 4724815:1-4724815:11 - Dianyan Xiao, Yang Yu:
Cryptanalysis of Compact-LWE and Related Lightweight Public Key Encryption. 4957045:1-4957045:9 - HyunSeo Kang, YoonJe Sung, HyoungJun Kwon, SugJoon Yoon, SangYeong Choi:
An Open Architecture Framework for Electronic Warfare Based Approach to HLA Federate Development. 5150730:1-5150730:12 - Qian Wang, Jiadong Ren, Xiaoli Yang, Yongqiang Cheng, Darryl N. Davis, Changzhen Hu:
Security Feature Measurement for Frequent Dynamic Execution Paths in Software System. 5716878:1-5716878:10 - Hongliang Zhu, Meiqi Chen, Maohua Sun, Xin Liao, Lei Hu:
Outsourcing Set Intersection Computation Based on Bloom Filter for Privacy Preservation in Multimedia Processing. 5841967:1-5841967:12 - Wencheng Sun, Zhiping Cai, Yangyang Li, Fang Liu, Shengqun Fang, Guoyan Wang:
Security and Privacy in the Medical Internet of Things: A Review. 5978636:1-5978636:9 - Xiue Gao, Duoping Zhang, Keqiu Li, Bo Chen:
A Cascading Failure Model for Command and Control Networks with Hierarchy Structure. 6063837:1-6063837:14 - Xia ShuangKui, Jianbin Wu:
A Modification-Free Steganography Method Based on Image Information Entropy. 6256872:1-6256872:8 - Dan Li, Jiazhe Chen, An Wang, Xiaoyun Wang:
Analysis of Software Implemented Low Entropy Masking Schemes. 7206835:1-7206835:8 - Jinpei Yan, Yong Qi, Qifan Rao:
Detecting Malware with an Ensemble Method Based on Deep Neural Network. 7247095:1-7247095:16 - Zilong Jiang, Chenhui Jin:
Multiple Impossible Differentials Cryptanalysis on 7-Round ARIA-192. 7453572:1-7453572:11 - Pham-Duy Thanh, Hiep-Vu Van, Insoo Koo:
Efficient Channel Selection and Routing Algorithm for Multihop, Multichannel Cognitive Radio Networks with Energy Harvesting under Jamming Attacks. 7543212:1-7543212:12 - Shuhui Zhang, Xiangxu Meng, Lianhai Wang, Lijuan Xu, Xiaohui Han:
Secure Virtualization Environment Based on Advanced Memory Introspection. 9410278:1-9410278:16 - Emanuel Ferreira Jesus, Vanessa R. L. Chicarino, Célio Vinicius N. de Albuquerque, Antônio A. de A. Rocha:
A Survey of How to Use Blockchain to Secure Internet of Things and the Stalker Attack. 9675050:1-9675050:27 - Qi Zhang, An Wang, Yongchuan Niu, Ning Shang, Rixin Xu, Guoshuang Zhang, Liehuang Zhu:
Side-Channel Attacks and Countermeasures for Identity-Based Cryptographic Algorithm SM9. 9701756:1-9701756:14 - Yanan Chen, Zhenyu Lu, Hu Xiong, Weixiang Xu:
Privacy-Preserving Data Aggregation Protocol for Fog Computing-Assisted Vehicle-to-Infrastructure Scenario. 1378583:1-1378583:14 - Jorge Granjal, Artur Pedroso:
An Intrusion Detection and Prevention Framework for Internet-Integrated CoAP WSN. 1753897:1-1753897:14 - Barnali Gupta Banik, Samir Kumar Bandyopadhyay:
Blind Key Based Attack Resistant Audio Steganography Using Cocktail Party Effect. 1781384:1-1781384:21 - Yun Chen, Kun Lv, Changzhen Hu:
A Dynamic Hidden Forwarding Path Planning Method Based on Improved Q-Learning in SDN Environments. 2058429:1-2058429:12 - Chunming Zhang:
Global Behavior of a Computer Virus Propagation Model on Multilayer Networks. 2153195:1-2153195:9 - Heng Zhang, Zhiping Cai, Qiang Liu, Qingjun Xiao, Yangyang Li, Chak-Fong Cheang:
A Survey on Security-Aware Measurement in SDN. 2459154:1-2459154:14 - Hyunwoo Choi, Yongdae Kim:
Large-Scale Analysis of Remote Code Injection Attacks in Android Apps. 2489214:1-2489214:17 - Kevser Ovaz Akpinar, Ibrahim Özçelik:
Development of the ECAT Preprocessor with the Trust Communication Approach. 2639750:1-2639750:16 - Gaofeng He, Bingfeng Xu, Haiting Zhu:
AppFA: A Novel Approach to Detect Malicious Android Applications on the Network. 2854728:1-2854728:15 - Chun Shan, Benfu Jiang, Jingfeng Xue, Fang Guan, Na Xiao:
An Approach for Internal Network Security Metric Based on Attack Probability. 3652170:1-3652170:11 - Bryan Monk, Julianna Mitchell, Richard Frank, Garth Davies:
Uncovering Tor: An Examination of the Network Structure. 4231326:1-4231326:12 - Junxin Chen, Leo Yu Zhang, Yushu Zhang, Fabio Pareschi, Yu-Dong Yao:
Exploiting the Security Aspects of Compressive Sampling. 4740174:1 - Milad Taleby Ahvanooey, Qianmu Li, Hiuk Jae Shim, Yanyan Huang:
A Comparative Analysis of Information Hiding Techniques for Copyright Protection of Text Documents. 5325040:1-5325040:22 - Shahid Mahmood, Shabieh Farwa, Muhammad Rafiq, Syed Muhammad Jawwad Riaz, Tariq Shah, Sajjad Shaukat Jamal:
To Study the Effect of the Generating Polynomial on the Quality of Nonlinear Components in Block Ciphers. 5823230:1-5823230:8 - Fucai Luo, Fuqun Wang, Kunpeng Wang, Jie Li, Kefei Chen:
LWR-Based Fully Homomorphic Encryption, Revisited. 5967635:1-5967635:12 - Jean Caminha, Angelo Perkusich, Mirko Barbosa Perkusich:
A Smart Trust Management Method to Detect On-Off Attacks in the Internet of Things. 6063456:1-6063456:10 - Yao Wang, Wan-Dong Cai, Pin Lyu, Wei Shao:
A Combined Static and Dynamic Analysis Approach to Detect Malicious Browser Extensions. 7087239:1-7087239:16 - Qianqian Yang, Lei Hu, Danping Shi, Yosuke Todo, Siwei Sun:
On the Complexity of Impossible Differential Cryptanalysis. 7393401:1-7393401:11 - Krzysztof Szczypiorski, Liqiang Wang, Xiangyang Luo, Dengpan Ye:
Big Data Analytics for Information Security. 7657891:1-7657891:2 - Tongxiang Wang, Xianglin Wei, Jianhua Fan, Tao Liang:
Jammer Localization in Multihop Wireless Networks Based on Gravitational Search. 7670939:1-7670939:11 - Yongbin Zeng, Hui Guang, Guangsong Li:
Attribute-Based Anonymous Handover Authentication Protocol for Wireless Networks. 8470949:1-8470949:9 - Reihaneh Safavi-Naini, Alireza Poostindouz, Viliam Lisý:
Path Hopping: An MTD Strategy for Long-Term Quantum-Safe Communication. 8475818:1-8475818:15 - Chenyu Wang, Guoai Xu, Wenting Li:
A Secure and Anonymous Two-Factor Authentication Protocol in Multiserver Environment. 9062675:1-9062675:15 - Yuntao Zhao, Wenbo Zhang, Yongxin Feng, Bo Yu:
A Classification Detection Algorithm Based on Joint Entropy Vector against Application-Layer DDoS Attack. 9463653:1-9463653:8 - Hongyu Wang, Jin Xu, Mingyuan Ma, Hongyan Zhang:
A New Type of Graphical Passwords Based on Odd-Elegant Labelled Graphs. 9482345:1-9482345:11 - Luca Caviglione, Wojciech Mazurczyk, Steffen Wendzel, Sebastian Zander:
Emerging and Unconventional: New Attacks and Innovative Detection Techniques. 9672523:1 - Jin Ye, Xiangyang Cheng, Jian Zhu, Luting Feng, Ling Song:
A DDoS Attack Detection Method Based on SVM in Software Defined Network. 9804061:1-9804061:8 - Mohamed Idhammad, Karim Afdel, Mustapha Belouch:
Detection System of HTTP DDoS Attacks in a Cloud Environment Based on Information Theoretic Entropy and Random Forest. 1263123:1-1263123:13 - Wonsuk Choi, Youngkyung Lee, Duhyeong Lee, Hyoseung Kim, Jin Hyung Park, In Seok Kim, Dong Hoon Lee:
Less Communication: Energy-Efficient Key Exchange for Securing Implantable Medical Devices. 1809302:1-1809302:16 - Ali El Ksimi, Leghris Cherkaoui:
Towards a New Algorithm to Optimize IPv6 Neighbor Discovery Security for Small Objects Networks. 1816462:1-1816462:11 - Evgenia Novikova, Yana A. Bekeneva, Andrey Shorov:
The Motif-Based Approach to the Analysis of the Employee Trajectories within Organization. 2476968:1-2476968:12 - Ye Yuan, Liji Wu, Yijun Yang, Xiangmin Zhang:
A Novel Multiple-Bits Collision Attack Based on Double Detection with Error-Tolerant Mechanism. 2483619:1-2483619:13 - Yulong Wang, Junjie Yi, Jun Guo, Yanbo Qiao, Mingyue Qi, Qingyu Chen:
A Semistructured Random Identifier Protocol for Anonymous Communication in SDN Network. 2916356:1-2916356:20 - Bo Zhang, Zhongtian Jia, Chuan Zhao:
An Efficient Certificateless Generalized Signcryption Scheme. 3578942:1-3578942:11 - Chen Wang, Jian Shen, Qi Liu, Yongjun Ren, Tong Li:
A Novel Security Scheme Based on Instant Encrypted Transmission for Internet of Things. 3680851:1-3680851:7 - Xin Su, Ziyu Wang, Xiaofeng Liu, Chang Choi, Dongmin Choi:
Study to Improve Security for IoT Smart Device Controller: Drawbacks and Countermeasures. 4296934:1-4296934:14 - Manhua Liu, Shuxin Liu, Weiwu Yan:
Latent Fingerprint Segmentation Based on Ridge Density and Orientation Consistency. 4529652:1-4529652:10 - Yi-Hong Du, Shi-Hua Liu:
Epidemic Model of Algorithm-Enhanced Dedicated Virus through Networks. 4691203:1-4691203:7 - Jun Xu, Xiong Zhang, Meng Zhou:
A High-Security and Smart Interaction System Based on Hand Gesture Recognition for Internet of Things. 4879496:1-4879496:11 - Qingyi Zhu, Seng W. Loke, Ye Zhang:
State-Based Switching for Optimal Control of Computer Virus Propagation with External Device Blocking. 4982523:1-4982523:10 - Chunming Zhang, Jingwei Xiao:
Stability Analysis of an Advanced Persistent Distributed Denial-of-Service Attack Dynamical Model. 5353060:1-5353060:10 - Irene Arsuaga, Nerea Toledo, Igor Lopez, Marina Aguado:
A Framework for Vulnerability Detection in European Train Control Railway Communications. 5634181:1-5634181:9 - Ding Wang, Shujun Li, Qi Jiang:
User Authentication in the IoE Era: Attacks, Challenges, Evaluation, and New Designs. 6150491:1-6150491:2 - Zhen-Hao Zhang, Yurong Song, Ling-Ling Xia, Yinwei Li, Liang Zhang, Guo-Ping Jiang:
A Novel Load Capacity Model with a Tunable Proportion of Load Redistribution against Cascading Failures. 6254876:1-6254876:7 - Yang Xu, Wuqiang Gao, Quanrun Zeng, Guojun Wang, Ju Ren, Yaoxue Zhang:
A Feasible Fuzzy-Extended Attribute-Based Access Control Technique. 6476315:1-6476315:11 - Gábor Danner, Árpád Berta, István Hegedüs, Márk Jelasity:
Robust Fully Distributed Minibatch Gradient Descent with Privacy Preservation. 6728020:1-6728020:15 - Huanran Wang, Hui He, Weizhe Zhang:
Demadroid: Object Reference Graph-Based Malware Detection in Android. 7064131:1-7064131:16 - Faouzi Jaïdi, Faten Labbene Ayachi, Adel Bouhoula:
A Methodology and Toolkit for Deploying Reliable Security Policies in Critical Infrastructures. 7142170:1-7142170:22 - Songjie Wei, Shuai Li, Peilong Liu, Meilin Liu:
BAVP: Blockchain-Based Access Verification Protocol in LEO Constellation Using IBE Keys. 7202806:1-7202806:14 - Run Xie, Chanlian He, Dongqing Xie, Chongzhi Gao, Xiaojun Zhang:
A Secure Ciphertext Retrieval Scheme against Insider KGAs for Mobile Devices in Cloud Storage. 7254305:1-7254305:7 - Fangfang Shan, Hui Li, Fenghua Li, Yunchuan Guo, Ben Niu:
HAC: Hybrid Access Control for Online Social Networks. 7384194:1-7384194:11 - Lihua Yin, Yanwei Sun, Zhen Wang, Yunchuan Guo, Fenghua Li, Binxing Fang:
Security Measurement for Unknown Threats Based on Attack Preferences. 7412627:1-7412627:13 - Xiajing Wang, Rui Ma, Bowen Dou, Zefeng Jian, Hongzhou Chen:
OFFDTAN: A New Approach of Offline Dynamic Taint Analysis for Binaries. 7693861:1-7693861:13 - Zhiping Cai, Chengchen Hu, Kai Zheng, Yang Xu, Qiang Fu:
Network Security and Management in SDN. 7928503:1-7928503:2 - Guoquan Li, Zheng Yan, Yulong Fu, Hanlu Chen:
Data Fusion for Network Intrusion Detection: A Review. 8210614:1-8210614:16 - Zhuo Ma, Jiuxin Cao, Xiusheng Chen, Shuai Xu, Bo Liu, Yuntao Yang:
GLPP: A Game-Based Location Privacy-Preserving Framework in Account Linked Mixed Location-Based Services. 9148768:1-9148768:14 - Yan Zhao, Shiming Li, Liehui Jiang:
Secure and Efficient User Authentication Scheme Based on Password and Smart Card for Multiserver Environment. 9178941:1-9178941:13 - Jong-Hwan Lee, Jeungmin Joo, Kichul Kim, Jung-Hoon Lee, Young-Ju Park:
Practical Consideration Factors to Design Array Configuration of Direction Finding System for Airborne Signal Intelligence. 9185760:1-9185760:9 - Bruno Carpentieri:
Efficient Compression and Encryption for Digital Data Transmission. 9591768:1-9591768:9 - Thomas D. Wagner, Esther Palomar, Khaled Mahbub, Ali E. Abdallah:
A Novel Trust Taxonomy for Shared Cyber Threat Intelligence. 9634507:1-9634507:11 - Dongyoung Roh, Sangim Jung, Daesung Kwon:
Winternitz Signature Scheme Using Nonadjacent Forms. 1452457:1-1452457:12 - Christopher M. Rondeau, J. Addison Betances, Michael A. Temple:
Securing ZigBee Commercial Communications Using Constellation Based Distinct Native Attribute Fingerprinting. 1489347:1-1489347:14 - John Patrick Barrowclough, Rameez Asif:
Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures. 1681908:1-1681908:20 - Amir Anees, Iqtadar Hussain, Abdulmohsen Algarni, Muhammad Aslam:
A Robust Watermarking Scheme for Online Multimedia Copyright Protection Using New Chaotic Map. 1840207:1-1840207:20 - Libing Wu, Zhiyan Xu, Debiao He, Xianmin Wang:
New Certificateless Aggregate Signature Scheme for Healthcare Multimedia Social Network on Cloud Environment. 2595273:1-2595273:13 - Maha Shamseddine, Wassim Itani, Ali Chehab, Ayman I. Kayssi:
Network Programming and Probabilistic Sketching for Securing the Data Plane. 2905730:1-2905730:23 - Lianmin Shi, Yihuai Wang, Zhengqing Wen, Tao Peng:
Secure Data Delivery with Linear Network Coding for Multiple Multicasts with Multiple Streams in Internet of Things. 3729046:1-3729046:13 - Michal Trnka, Tomás Cerný, Nathaniel Stickney:
Survey of Authentication and Authorization for the Internet of Things. 4351603:1-4351603:17 - Erxue Min, Jun Long, Qiang Liu, Jianjing Cui, Wei Chen:
TR-IDS: Anomaly-Based Intrusion Detection through Text-Convolutional Neural Network and Random Forest. 4943509:1-4943509:9 - Martin Schramm, Reiner Dojen, Michael Heigl:
A Vendor-Neutral Unified Core for Cryptographic Operations in GF(p) and GF(sm) Based on Montgomery Arithmetic. 4983404:1-4983404:18 - Jiameng Sun, Binrui Zhu, Jing Qin, Jiankun Hu, Jixin Ma:
Confidentiality-Preserving Publicly Verifiable Computation Schemes for Polynomial Evaluation and Matrix-Vector Multiplication. 5275132:1-5275132:15 - Seog Chung Seo, Taek-Young Youn:
TLDA: An Efficient Two-Layered Data Authentication Mechanism for Content-Centric Networking. 5429798:1-5429798:17 - Ignacio Martín, José Alberto Hernández, Alfonso Muñoz, Antonio Guzmán:
Android Malware Characterization Using Metadata and Machine Learning Techniques. 5749481:1-5749481:11 - Youngho Park, Chul Sur, Kyung-Hyune Rhee:
A Secure Incentive Scheme for Vehicular Delay Tolerant Networks Using Cryptocurrency. 5932183:1-5932183:13 - Sungyong Cha, Seungsoo Baek, Sooyoung Kang, Seungjoo Kim:
Security Evaluation Framework for Military IoT Devices. 6135845:1-6135845:12 - Jaewoo Shim, Kyeonghwan Lim, Seong-je Cho, Sangchul Han, Minkyu Park:
Static and Dynamic Analysis of Android Malware and Goodware Written with Unity Framework. 6280768:1-6280768:12 - Gicheol Wang, Byoung-Sun Lee, Jae Young Ahn, Gihwan Cho:
A UAV-Aided Cluster Head Election Framework and Applying Such to Security-Driven Cluster Head Election Schemes: A Survey. 6475927:1-6475927:17 - Zhenyan Liu, Yifei Zeng, Pengfei Zhang, Jingfeng Xue, Ji Zhang, Jiangtao Liu:
An Imbalanced Malicious Domains Detection Method Based on Passive DNS Traffic Analysis. 6510381:1-6510381:7 - Yinghui Zhang, Pengzhen Lang, Dong Zheng, Menglei Yang, Rui Guo:
A Secure and Privacy-Aware Smart Health System with Secret Key Leakage Resilience. 7202598:1-7202598:13 - Efthimios Alepis, Constantinos Patsakis:
Session Fingerprinting in Android via Web-to-App Intercommunication. 7352030:1-7352030:13 - Guoxiu Liu, Geng Yang, Huaqun Wang, Yang Xiang, Hua Dai:
A Novel Secure Scheme for Supporting Complex SQL Queries over Encrypted Databases in Cloud Computing. 7383514:1-7383514:15 - Chao Qu, Ming Tao, Jie Zhang, Xiaoyu Hong, Ruifen Yuan:
Blockchain Based Credibility Verification Method for IoT Entities. 7817614:1-7817614:11 - Haihua Liang, Xinpeng Zhang, Hang Cheng, Qiuhan Wei:
Secure and Efficient Image Retrieval over Encrypted Cloud Data. 7915393:1-7915393:14 - Sahel Alouneh, Feras Al-Hawari, Ismail Omar Hababeh, Gheorghita Ghinea:
An Effective Classification Approach for Big Data Security Based on GMPLS/MPLS Networks. 8028960:1-8028960:10 - Ying-Ying Liu, Yun-kai Chu:
Control Method for Sampled-Data Systems with Multiple Channels Based on Deadband-Triggered Scheme. 8165383:1-8165383:10 - Sangwon Hyun, Junsung Cho, Geumhwan Cho, Hyoungshick Kim:
Design and Analysis of Push Notification-Based Malware on Android. 8510256:1-8510256:12 - Dongwoo Kang, Jaewook Jung, Hyoungshick Kim, Youngsook Lee, Dongho Won:
Efficient and Secure Biometric-Based User Authenticated Key Agreement Scheme with Anonymity. 9046064:1-9046064:14 - Tong Li, Wenbin Chen, Yi Tang, Hongyang Yan:
A Homomorphic Network Coding Signature Scheme for Multiple Sources and its Application in IoT. 9641273:1-9641273:6 - Blanca E. Carvajal-Gámez, Manuel Alejandro Díaz-Casco:
Steganography Algorithm Based on the Nonlocal Maximum Likelihood Noise Estimation for Mobile Applications. 1404826:1-1404826:29 - Xingshuo An, Fuhong Lin, Shenggang Xu, Li Miao, Chao Gong:
A Novel Differential Game Model-Based Intrusion Response Strategy in Fog Computing. 1821804:1-1821804:9 - Dinh-Chien Nguyen, Thai-Son Nguyen, Chin-Chen Chang, Huan-Sheng Hsueh, Fang-Rong Hsu:
High Embedding Capacity Data Hiding Algorithm for H.264/AVC Video Sequences without Intraframe Distortion Drift. 2029869:1-2029869:11 - Shuangjie Bai, Geng Yang, Jingqi Shi, Guoxiu Liu, Zhaoe Min:
Privacy-Preserving Oriented Floating-Point Number Fully Homomorphic Encryption Scheme. 2363928:1-2363928:14 - Ruixiang Li, Yuchen Sun, Jianwei Hu, Te Ma, Xiangyang Luo:
Street-Level Landmark Evaluation Based on Nearest Routers. 2507293:1-2507293:12 - Cheng Lei, Hongqi Zhang, Jing-Lei Tan, Yu-Chen Zhang, Xiao-Hu Liu:
Moving Target Defense Techniques: A Survey. 3759626:1-3759626:25 - Tirazheh Zare Garizy, Gilbert Fridgen, Lars Wederhake:
A Privacy Preserving Approach to Collaborative Systemic Risk Identification: The Use-Case of Supply Chain Networks. 3858592:1-3858592:18 - Ming Li, Hua Ren, En Zhang, Wei Wang, Lin Sun, Di Xiao:
A VQ-Based Joint Fingerprinting and Decryption Scheme for Secure and Efficient Image Distribution. 4313769:1-4313769:11 - Dafang Zhang, Guojun Wang, Xin Wang, Zhengyu Li, Wenjia Li:
Cyberspace Security for Future Internet. 5313980:1 - Zhaohui Zhang, Xinxin Zhou, Xiaobo Zhang, Lizhi Wang, Pengwei Wang:
A Model Based on Convolutional Neural Network for Online Transaction Fraud Detection. 5680264:1-5680264:9 - Suhri Kim, Kisoon Yoon, Jihoon Kwon, Seokhie Hong, Young-Ho Park:
Efficient Isogeny Computations on Twisted Edwards Curves. 5747642:1-5747642:11 - Hao Hu, Yuling Liu, Hongqi Zhang, Yuchen Zhang:
Security Metric Methods for Network Multistep Attacks Using AMC and Big Data Correlation Analysis. 5787102:1-5787102:14 - Mohammadreza Mohammadrezaei, Mohammad Ebrahim Shiri, Amir Masoud Rahmani:
Identifying Fake Accounts on Social Networks Based on Graph Analysis and Classification Algorithms. 5923156:1-5923156:8 - Zhizhu Lian, Yupu Hu, Hu Chen, Baocang Wang:
Bootstrapping of FHE over the Integers with Large Message Space. 6520258:1-6520258:11 - Won Park, Youngin You, Kyungho Lee:
Detecting Potential Insider Threat: Analyzing Insiders' Sentiment Exposed in Social Media. 7243296:1-7243296:8 - Nawal Ait Aali, Amine Baïna, Loubna Echabbi:
Trust Management in Collaborative Systems for Critical Infrastructure Protection. 7938727:1-7938727:15 - Jianjun Li, Jie Yu, Lanlan Xu, Xinying Xue, Chin-Chen Chang, Xiaoyang Mao, Junfeng Hu:
A Cascaded Algorithm for Image Quality Assessment and Image Denoising Based on CNN for Image Security and Authorization. 8176984:1-8176984:13 - Salabat Khan, Zijian Zhang, Liehuang Zhu, Meng Li, Qamas Gul Khan Safi, Xiaobing Chen:
Accountable and Transparent TLS Certificate Management: An Alternate Public-Key Infrastructure with Verifiable Trusted Parties. 8527010:1-8527010:16 - Renan C. A. Alves, Doriedson A. G. Oliveira, Geovandro C. C. F. Pereira, Bruno C. Albertini, Cíntia B. Margi:
WS3N: Wireless Secure SDN-Based Communication for Sensor Networks. 8734389:1-8734389:14 - Wisam Elmasry, Akhan Akbulut, Abdul Halim Zaim:
Deep Learning Approaches for Predictive Masquerade Detection. 9327215:1-9327215:24 - Xin Jiang, Mingzhe Liu, Kun Yang, Yanhua Liu, Ruili Wang:
A Security Sandbox Approach of Android Based on Hook Mechanism. 9856537:1-9856537:8 - Gandharba Swain:
High Capacity Image Steganography Using Modified LSB Substitution and PVD against Pixel Difference Histogram Analysis. 1505896:1-1505896:14 - Yiwen Zhang, Kaibin Wang, Yuanyuan Zhou, Qiang He:
Enhanced Adaptive Cloudlet Placement Approach for Mobile Application on Spark. 1937670:1-1937670:12 - Mehmet Simsek:
Corrigendum to "A New Metric for Flow-Level Filtering of Low-Rate DDoS Attacks". 2083430:1-2083430:2 - Hua Dai, Hui Ren, Zhiye Chen, Geng Yang, Xun Yi:
Privacy-Preserving Sorting Algorithms Based on Logistic Map for Clouds. 2373545:1-2373545:10 - Ruyan Wang, Xiaohan Meng, Yang Li, Jian Wang:
Towards Optimized DFA Attacks on AES under Multibyte Random Fault Model. 2870475:1-2870475:9 - Nanda Kumar Thanigaivelan, Ethiopia Nigussie, Seppo Virtanen, Jouni Isoaho:
Hybrid Internal Anomaly Detection System for IoT: Reactive Nodes with Cross-Layer Operation. 3672698:1-3672698:15 - Qassim Nasir, Ilham A. Qasse, Manar AbuTalib, Ali Bou Nassif:
Performance Analysis of Hyperledger Fabric Platforms. 3976093:1-3976093:14 - Marios Argyriou, Nicola Dragoni, Angelo Spognardi:
Analysis and Evaluation of SafeDroid v2.0, a Framework for Detecting Malicious Android Applications. 4672072:1-4672072:15 - Guanghui Liang, Jianmin Pang, Zheng Shan, Runqing Yang, Yihang Chen:
Automatic Benchmark Generation Framework for Malware Detection. 4947695:1-4947695:8 - Carlos Andres Lara-Nino, Arturo Diaz-Perez, Miguel Morales-Sandoval:
Energy and Area Costs of Lightweight Cryptographic Algorithms for Authenticated Encryption in WSN. 5087065:1-5087065:14 - Ming Wan, Yan Song, Yuan Jing, Junlu Wang:
Function-Aware Anomaly Detection Based on Wavelet Neural Network for Industrial Control Communication. 5103270:1-5103270:11 - Javier Hingant, Marcelo Zambrano, Francisco J. Pérez, Israel Pérez, Manuel Esteve:
HYBINT: A Hybrid Intelligence System for Critical Infrastructures Protection. 5625860:1-5625860:13 - Binghao Yan, Guodong Han:
LA-GRU: Building Combined Intrusion Detection Model Based on Imbalanced Learning and Gated Recurrent Unit Neural Network. 6026878:1-6026878:13 - Zhenxing Qian, Kim-Kwang Raymond Choo, Rémi Cogranne, Xinpeng Zhang:
Multimedia Security: Novel Steganography and Privacy Preserving. 6390945:1-6390945:2 - Qingsong Zhao, Qingkai Zeng, Ximeng Liu:
Improved Construction for Inner Product Functional Encryption. 6561418:1-6561418:12 - Guojiang Xin, Yuling Liu, Ting Yang, Yu Cao:
An Adaptive Audio Steganography for Covert Wireless Communication. 7096271:1-7096271:10 - Li Li, Siqin Zhou, Kim-Kwang Raymond Choo, Xiaohong Li, Debiao He:
An Efficient and Provably-Secure Certificateless Proxy-Signcryption Scheme for Electronic Prescription System. 7524102:1-7524102:11 - Chunhua Xiao, Lei Zhang, Yuhua Xie, Weichen Liu, Duo Liu:
Hardware/Software Adaptive Cryptographic Acceleration for Big Data Processing. 7631342:1-7631342:24 - Yinghui Zhang, Haonan Su, Menglei Yang, Dong Zheng, Fang Ren, Qinglan Zhao:
Secure Deduplication Based on Rabin Fingerprinting over Wireless Sensing Data in Cloud Computing. 9081814:1-9081814:12 - Chunqiang Yu, Xianquan Zhang, Zhenjun Tang, Yan Chen, Jingyu Huang:
Reversible Data Hiding with Pixel Prediction and Additive Homomorphism for Encrypted Image. 9103418:1-9103418:13 - Nancy Agarwal, Syed Zeeshan Hussain:
A Closer Look at Intrusion Detection System for Web Applications. 9601357:1-9601357:27 - Jungwoo Seo, Sangjin Lee:
Abnormal Behavior Detection to Identify Infected Systems Using the APChain Algorithm and Behavioral Profiling. 9706706:1-9706706:24 - Ye Yuan, Junting Xiao, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi:
Portable Implementation of Postquantum Encryption Schemes and Key Exchange Protocols on JavaScript-Enabled Platforms. 9846168:1-9846168:14 - Yu Xue, Weiwei Jia, Xuejian Zhao, Wei Pang:
An Evolutionary Computation Based Feature Selection Method for Intrusion Detection. 2492956:1-2492956:10 - Li Kuang, Yujia Zhu, Shuqi Li, Xuejin Yan, Han Yan, Shuiguang Deng:
A Privacy Protection Model of Data Publication Based on Game Theory. 3486529:1-3486529:13 - Gesu Li, Zhipeng Cai, Guisheng Yin, Zaobo He, Madhuri Siddula:
Differentially Private Recommendation System Based on Community Detection in Social Network Applications. 3530123:1-3530123:18 - Pei Zhang, Wenying Zhang:
Differential Cryptanalysis on Block Cipher Skinny with MILP Program. 3780407:1-3780407:11 - Xiaoyu Ji, Yushi Cheng, Wenyuan Xu, Xinyan Zhou:
User Presence Inference via Encrypted Traffic of Wireless Camera in Smart Homes. 3980371:1-3980371:10 - Abdul Razaq, Hanan A. Al-Olayan, Atta Ullah, Arshad Riaz, Adil Waheed:
A Novel Technique for the Construction of Safe Substitution Boxes Based on Cyclic and Symmetric Groups. 4987021:1-4987021:9 - Karl Andersson, Ilsun You, Francesco Palmieri:
Security and Privacy for Smart, Connected, and Mobile IoT Devices and Platforms. 5346596:1-5346596:2 - Dahee Choi, Kyungho Lee:
An Artificial Intelligence Approach to Financial Fraud Detection under IoT Environment: A Survey and Implementation. 5483472:1-5483472:15 - Haitham Elwahsh, Mona Gamal, A. A. Salama, Ibrahim M. El-Henawy:
A Novel Approach for Classifying MANETs Attacks with a Neutrosophic Intelligent System based on Genetic Algorithm. 5828517:1-5828517:10 - Lili Bo, Shujuan Jiang:
A Constraint-Aware Optimization Method for Concurrency Bug Diagnosis Service in a Distributed Cloud Environment. 6241921:1-6241921:11 - Zheng Yan, Yuqing Zhang, Kim-Kwang Raymond Choo, Yang Xiang:
Security Measurements of Cyber Networks. 6545314:1-6545314:3 - Taehwan Park, Hwajeong Seo, Junsub Kim, Haeryong Park, Howon Kim:
Efficient Parallel Implementation of Matrix Multiplication for Lattice-Based Cryptography on Modern ARM Processor. 7012056:1-7012056:10 - Hui Xia, Sanshun Zhang, Benxia Li, Li Li, Xiangguo Cheng:
Towards a Novel Trust-Based Multicast Routing for VANETs. 7608198:1-7608198:12 - Jinbao Wang, Ling Tian, Yan Huang, Donghua Yang, Hong Gao:
Achieving the Optimal k-Anonymity for Content Privacy in Interactive Cyberphysical Systems. 7963163:1-7963163:15 - Jiwei Tian, Buhong Wang, Xia Li:
Data-Driven and Low-Sparsity False Data Injection Attacks in Smart Grid. 8045909:1-8045909:11 - Khaled Riad, Lishan Ke:
RoughDroid: Operative Scheme for Functional Android Malware Detection. 8087303:1-8087303:10 - Yu Zheng, Jiezhong Zhu, Wei Fang, Lian-Hua Chi:
Deep Learning Hash for Wireless Multimedia Image Content Security. 8172725:1-8172725:13 - Yaojun Hao, Peng Zhang, Fuzhi Zhang:
Multiview Ensemble Method for Detecting Shilling Attacks in Collaborative Recommender Systems. 8174603:1-8174603:33 - Xiaolong Xu, Rui Huang, Ruihan Dou, Yuancheng Li, Jie Zhang, Tao Huang, Wenbin Yu:
Energy-Efficient Cloudlet Management for Privacy Preservation in Wireless Metropolitan Area Networks. 8180451:1-8180451:13 - Youngjoo An, Hyang-Sook Lee, Juhee Lee, Seongan Lim:
Key Substitution Attacks on Lattice Signature Schemes Based on SIS Problem. 8525163:1-8525163:13 - Qinlong Huang, Yue He, Wei Yue, Yixian Yang:
Adaptive Secure Cross-Cloud Data Collaboration with Identity-Based Cryptography and Conditional Proxy Re-Encryption. 8932325:1-8932325:12 - Weicheng Wang, Shengling Wang, Jianhui Huang:
Privacy Preservation for Friend-Recommendation Applications. 1265352:1-1265352:11 - Samira Haguouche, Zahi Jarir:
Towards a Secure and Borderless Collaboration between Organizations: An Automated Enforcement Mechanism. 1572812:1-1572812:13 - Bing Zhang, Zhiyang Liu, Yanguo Jia, Jiadong Ren, Xiaolin Zhao:
Network Intrusion Detection Method Based on PCA and Bayes Algorithm. 1914980:1-1914980:11 - Cheolhee Park, Hyunil Kim, Dowon Hong, Changho Seo:
A Symmetric Key Based Deduplicatable Proof of Storage for Encrypted Data in Cloud Storage Environments. 2193897:1-2193897:16 - Shaozhang Niu, Ruqiang Huang, Wenbo Chen, Yiming Xue:
An Improved Permission Management Scheme of Android Application Based on Machine Learning. 2329891:1-2329891:12 - Yunru Zhang, Min Luo, Kim-Kwang Raymond Choo, Debiao He:
A General Architecture for Multiserver Authentication Key Agreement with Provable Security. 2462901:1-2462901:9 - Jingtao Li, Yang Liu, Wengang Pei, Zhen Cao:
Security and Communication Networks Behaviors of High-Frequency Subscribers in Cellular Data Networks. 2506319:1-2506319:12 - Yi Zhang, Jin Sun, Zebin Wu, Shuangyu Xie, Ruitao Xu:
Scheduling Parallel Intrusion Detecting Applications on Hybrid Clouds. 2863793:1-2863793:12 - Weizhong Qiang, Shizhen Wang, Hai Jin:
Fine-Grained Control-Flow Integrity Based on Points-to Analysis for CPS. 3130652:1-3130652:11 - Baoyuan Kang, Lin Si, Hong Jiang, Chunqing Li, Mingming Xie:
ID-Based Public Auditing Protocol for Cloud Data Integrity Checking with Privacy-Preserving and Effective Aggregation Verification. 3205898:1-3205898:9 - Rutvij H. Jhaveri, Aneri Desai, Ankit Patel, Yubin Zhong:
A Sequence Number Prediction Based Bait Detection Scheme to Mitigate Sequence Number Attacks in MANETs. 3210207:1-3210207:13 - Weiwei Lin, Hongwei Zeng, Honghao Gao, Huaikou Miao, Xiaolin Wang:
Test Sequence Reduction of Wireless Protocol Conformance Testing to Internet of Things. 3723691:1-3723691:13 - Qilong Han, Zuobin Xiong, Kejia Zhang:
Research on Trajectory Data Releasing Method via Differential Privacy Based on Spatial Partition. 4248092:1-4248092:14 - Octavio Flores Siordia, Juan Carlos Estrada Gutiérrez, Carlos Eduardo Padilla Leyferman, Jorge Aguilar Santiago, Maricela Jiménez Rodríguez:
System to Safeguard the Identity of Persons in Photographs through Cryptography and Steganography Techniques Using Chaos. 4853134:1-4853134:16 - Riccardo Pecori, Luca Veltri:
A Balanced Trust-Based Method to Counter Sybil and Spartacus Attacks in Chord. 4963932:1-4963932:16 - Liming Fang, Liang Liu, Jinyue Xia, Maosheng Sun:
A Secure Multimedia Data Sharing Scheme for Wireless Network. 5037892:1-5037892:10 - Jieren Cheng, Chen Zhang, Xiangyan Tang, Victor S. Sheng, Zhe Dong, Junqi Li:
Adaptive DDoS Attack Detection Method Based on Multiple-Kernel Learning. 5198685:1-5198685:19 - Zhen Zhang, Yibing Li, Chao Wang, Meiyu Wang, Ya Tu, Jin Wang:
An Ensemble Learning Method for Wireless Multimedia Device Identification. 5264526:1-5264526:9 - Xin Wang, Bo Yang, Zhe Xia, Yanqi Zhao, Huifang Yu:
A Cheating Detectable Privacy-Preserving Data Sharing Scheme for Cloud Computing. 6174830:1-6174830:13 - Muhammad Bilal, Muhammad Asif, Abid Bashir:
Assessment of Secure OpenID-Based DAAA Protocol for Avoiding Session Hijacking in Web Applications. 6315039:1-6315039:10 - Chunpeng Ge, Jinyue Xia, Aaron Wu, Hongwei Li, Yao Wang:
A Source Hiding Identity-Based Proxy Reencryption Scheme for Wireless Sensor Network. 6395362:1-6395362:8 - Ugur Coruh, Oguz Bayat:
Hybrid Secure Authentication and Key Exchange Scheme for M2M Home Networks. 6563089:1-6563089:25 - Imen Nouioua, Nouredine Amardjia, Sarra Belilita:
A Novel Blind and Robust Video Watermarking Technique in Fast Motion Frames Based on SVD and MR-SVD. 6712065:1-6712065:17 - Jinquan Zhang, Yanfeng Yuan, Xiao Wang, Lina Ni, Jiguo Yu, Mengmeng Zhang:
RPAR: Location Privacy Preserving via Repartitioning Anonymous Region in Mobile Social Network. 6829326:1-6829326:10 - Youwen Zhu, Yue Zhang, Jiabin Yuan, Xianmin Wang:
FTP: An Approximate Fast Privacy-Preserving Equality Test Protocol for Authentication in Internet of Things. 6909703:1-6909703:9 - Zhaozheng Li, Weimin Lei, Wei Zhang, KwangHyok Jo:
A Relative Phase Based Audio Integrity Protection Method: Model and Strategy. 7139391:1-7139391:11 - Haosu Cheng, Jianwei Liu, Jian Mao, Mengmeng Wang, Jie Chen, Jingdong Bian:
A Compatible OpenFlow Platform for Enabling Security Enhancement in SDN. 8392080:1-8392080:20 - Guodong Ye, Kaixin Jiao, Chen Pan, Xiaoling Huang:
An Effective Framework for Chaotic Image Encryption Based on 3D Logistic Map. 8402578:1-8402578:11 - Jiguo Li, Shengzhou Hu, Yichen Zhang:
Two-Party Attribute-Based Key Agreement Protocol with Constant-Size Ciphertext and Key. 8738960:1-8738960:10 - Xiaolong Liu, Qiang Wei, Qingxian Wang, Zheng Zhao, Zhongxu Yin:
CAFA: A Checksum-Aware Fuzzing Assistant Tool for Coverage Improvement. 9071065:1-9071065:13 - Ke Yin:
A Study on Effectiveness Evaluation for the Physical Protection System of a High Security Prison Based on the Cloud Model. 9583982:1-9583982:9 - Rahul Saha, G. Geetha, Gulshan Kumar, Tai-Hoon Kim:
RK-AES: An Improved Version of AES Using a New Key Generation Process with Random Keys. 9802475:1-9802475:11 - Zied Kricha, Anis Kricha, Anis Sakly:
A Robust Watermarking Scheme Based on the Mean Modulation of DWT Coefficients. 1254081:1-1254081:16 - Zhenghong Wang, Zhangjie Fu, Xingming Sun:
Semantic Contextual Search Based on Conceptual Graphs over Encrypted Cloud. 1420930:1-1420930:10 - Sitalakshmi Venkatraman, Mamoun Alazab:
Use of Data Visualisation for Zero-Day Malware Detection. 1728303:1-1728303:13 - Kholoud Al-Saleh, Abdelfettah Belghith:
Practical Suitability and Experimental Assessment of Tree ORAMs. 2138147:1-2138147:15 - Xiling Luo, Zequan Zhou, Lin Zhong, Jian Mao, Chaoyong Chen:
An Effective Integrity Verification Scheme of Cloud Data Based on BLS Signature. 2615249:1-2615249:11 - Kiseon Kim, Jalel Ben-Othman, Prem Mahalik:
Covert Communication Networks in Hostile Environments. 2731859:1-2731859:2 - Thanh Hong Nguyen, Mason Wright, Michael P. Wellman, Satinder Singh:
Multistage Attack Graph Security Games: Heuristic Strategies, with Empirical Game-Theoretic Analysis. 2864873:1-2864873:28 - Naveed Ahmed Azam, Umar Hayat, Ikram Ullah:
An Injective S-Box Design Scheme over an Ordered Isomorphic Elliptic Curve and Its Characterization. 3421725:1-3421725:9 - Mirsat Yesiltepe, Muhammet Kurulay:
Fake and Real Massaging at the Same Time with QR Code in Web Services for Different Users. 3809462:1-3809462:10 - Iqtadar Hussain, Fawad Ahmed, Umar Mujahid Khokhar, Amir Anees:
Applied Cryptography and Noise Resistant Data Security. 3962821:1-3962821:2 - Longdan Tan, Kesheng Liu, Xuehu Yan, Lintao Liu, Tianqi Lu, Jinrui Chen, Feng Liu, Yuliang Lu:
Robust Visual Secret Sharing Scheme Applying to QR Code. 4036815:1-4036815:12 - Weiwei Liu, Guangjie Liu, Yang Xia, Xiaopeng Ji, Jiangtao Zhai, Yuewei Dai:
Using Insider Swapping of Time Intervals to Perform Highly Invisible Network Flow Watermarking. 5051270:1-5051270:16 - Hong Wang, Jianhua Li, Feng Zhu, Zhe Wang:
Asynchronous Group Authentication Based on Geometric Approach. 5289383:1-5289383:9 - Jian Song, Guangsong Li, Bo-ru Xu, Chuangui Ma:
A Novel Multiserver Authentication Protocol with Multifactors for Cloud Service. 5432960:1-5432960:13 - Zhendong Wu, Jiajia Yang, Jianwu Zhang, Hengli Yue:
Multibiometric Fusion Authentication in Wireless Multimedia Environment Using Dynamic Bayesian Method. 5783976:1-5783976:12 - Tan N. Nguyen, Minh Tran, Phuong T. Tran, Phu Tran Tin, Thanh-Long Nguyen, Duy-Hung Ha, Miroslav Voznák:
On the Performance of Power Splitting Energy Harvested Wireless Full-Duplex Relaying Network with Imperfect CSI over Dissimilar Channels. 6036087:1-6036087:11 - Minhye Seo, Jong Hwan Park, Youngsam Kim, Sangrae Cho, Dong Hoon Lee, Jung Yeon Hwang:
Construction of a New Biometric-Based Key Derivation Function and Its Application. 6107912:1-6107912:14 - Xiaodan Gu, Ming Yang, Yiting Zhang, Peilong Pan, Zhen Ling:
Fingerprinting Network Entities Based on Traffic Analysis in High-Speed Network Environment. 6124160:1-6124160:15 - Jieren Cheng, Mengyang Li, Xiangyan Tang, Victor S. Sheng, Yifu Liu, Wei Guo:
Flow Correlation Degree Optimization Driven Random Forest for Detecting DDoS Attacks in Cloud Computing. 6459326:1-6459326:14 - Xinyi Hu, Yaqun Zhao:
Research on Plaintext Restoration of AES Based on Neural Network. 6868506:1-6868506:9 - Chen Li, Yecai Guo, Qi Liu, Xiaodong Liu:
DR-Net: A Novel Generative Adversarial Network for Single Image Deraining. 7350324:1-7350324:14 - Inwoo Ro, Joong Soo Han, Eul Gyu Im:
Detection Method for Distributed Web-Crawlers: A Long-Tail Threshold Model. 9065424:1-9065424:7 - Dan Yin, Qing Yang:
GANs Based Density Distribution Privacy-Preservation on Mobility Data. 9203076:1-9203076:13 - Pablo Salva-Garcia, José M. Alcaraz Calero, Qi Wang, Jorge Bernal Bernabé, Antonio F. Skarmeta:
5G NB-IoT: Efficient Network Traffic Filtering for Multitenant IoT Cellular Networks. 9291506:1-9291506:21 - Huifang Yu, Zhicang Wang, Jianmin Li, Xinzhe Gao:
Identity-Based Proxy Signcryption Protocol with Universal Composability. 9531784:1-9531784:11 - Xuefei Liu, Chao Zhang, Pingzeng Liu, Maoling Yan, Baojia Wang, Jianyong Zhang, Russell Higgs:
Application of Temperature Prediction Based on Neural Network in Intrusion Detection of IoT. 1635081:1-1635081:10 - Weizhong Qiang, Shizhen Wang, Hai Jin, Jiangying Zhong:
Corrigendum to "Fine-Grained Control-Flow Integrity Based on Points-to Analysis for CPS". 5618453:1 - Xiufeng Zhao, Hefeng Mao, Shuai Liu, Weitao Song, Bo Zhang:
Analysis on Matrix GSW-FHE and Optimizing Bootstrapping. 6362010:1-6362010:9 - Xun Wang, Tao Luo, Jianfeng Li:
A More Efficient Fully Homomorphic Encryption Scheme Based on GSW and DM Schemes. 8706940:1-8706940:14 - Rafal Kozik, Marek Pawlicki, Michal Choras:
Cost-Sensitive Distributed Machine Learning for NetFlow-Based Botnet Activity Detection. 8753870:1-8753870:8 - Guilherme Oliveira, Evelio M. G. Fernández, Samuel Baraldi Mafra, Samuel Montejo Sánchez, Cesar A. Azurdia-Meza:
Optimal Improper Gaussian Signaling for Physical Layer Security in Cognitive Radio Networks. 9065856:1-9065856:13 - Xiufeng Zhao, Ailan Wang:
Generalized Bootstrapping Technique Based on Block Equality Test Algorithm. 9325082:1-9325082:8 - Duc-Minh Ngo, Cuong Pham-Quoc, Tran Ngoc Thinh:
An Efficient High-Throughput and Low-Latency SYN Flood Defender for High-Speed Networks. 9562801:1-9562801:14
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.