TrustCom B

220 papers

YearTitle / Authors
2022"Comments Matter and The More The Better!": Improving Rumor Detection with User Comments.
Yang Xu, Jie Guo, Weidong Qiu, Zheng Huang, Enes Altuncu, Shujun Li
2022"The Need for Speed": Extracting Session Keys From the Main Memory Using Brute-force and Machine Learning.
Stewart Sentanoe, Christofer Fellicious, Hans P. Reiser, Michael Granitzer
20225G-A Capability Exposure Scheme based on Harmonized Communication and Sensing.
Lin Lin, Bin Zhu, Zelin Wang, Guangquan Wang, Jianzhi Wang, Lexi Xu, Sai Han, Yuwei Jia
2022A Blockchain-assisted Collaborative Ensemble Learning for Network Intrusion Detection.
Lijian Liu, Jinguo Li
2022A Blockchain-based Privacy-Preserving Scheme for Cross-domain Authentication.
Junfeng Jiang, Yujian Zhang, Junhao Li
2022A Comparative Study on the Security of Cryptocurrency Wallets in Android System.
Minfeng Qi, Zhiyu Xu, Tengyun Jiao, Sheng Wen, Yang Xiang, Gary Nan
2022A Compatible and Identity Privacy-preserving Security Protocol for ACARS.
Xinwei Li, Qianyun Zhang, Lexi Xu, Tao Shang
2022A Dynamic Transaction Pattern Aggregation Neural Network for Money Laundering Detection.
Xuejiao Luo, Xiaohui Han, Wenbo Zuo, Zhengyuan Xu, Zhiwen Wang, Xiaoming Wu
2022A Faster Blockchain Sharding Protocol for Decentralized Ledger.
Dongdong Liu, Mingsheng Wang, Taotao Li, Ya Han
2022A Flow Attack Strategy based on Critical Links for Cyber-attack.
Jiming Qi, Jiazheng Zhang, Qingxia Liu, Bang Wang
2022A General Backdoor Attack to Graph Neural Networks Based on Explanation Method.
Luyao Chen, Na Yan, Boyang Zhang, Zhaoyang Wang, Yu Wen, Yanfei Hu
2022A Green Neural Network with Privacy Preservation and Interpretability.
De Li, Hongyan Zheng, Zeming Gan, Xianxian Li, Jinyan Wang
2022A Hardware Security Isolation Architecture for Intelligent Accelerator.
Rui Gong, Lei Wang, Wei Shi, Wei Liu, Jianfeng Zhang
2022A Heart Sound Classification Method Based on Residual Block and Attention Mechanism.
Yujie Chen, Wenliang Zhu, Jinke Xu, Junwei Zhang, Zhanpeng Zhu, Lirong Wang
2022A K-Induction Method Extended with Value Analysis for C Program Safety Verification.
Hui Guo, Chunyan Hou, Jinsong Wang, Chen Chen
2022A Lightweight Graph-based Method to Detect Pornographic and Gambling Websites with Imperfect Datasets.
Xiaoqing Ma, Chao Zheng, Zhao Li, Jiangyi Yin, Qingyun Liu, Xunxun Chen
2022A Lightweight Honeynet Design In the Internet of Things.
Xiaoyu Du, Guanying Zhou, Yujing Wang, Song Tao
2022A Multidimensional Blockchain Framework For Mobile Internet of Things.
Hussein Zangoti, Alex Pissinou Makki, Niki Pissinou, Abdur Rahman Bin Shahid, Omar J. Guerra, Joel Rodriguez
2022A Novel Asynchronous Evolution Opinion Dynamics Model.
Xiao Xiao, Minghua Xu, Han Xu
2022A Novel User Mobility Prediction Scheme based on the Weighted Markov Chain Model.
Yuwei Jia, Kun Chao, Xinzhou Cheng, Lin Lin, Lijuan Cao, Yi Li, Yuchao Jin, Zixiang Di, Chen Cheng
2022A Secure Remote Password Protocol From The Learning With Errors Problem.
Huapeng Li, Baocheng Wang
2022A Study on the Exoskeleton Motion Intent Recognition Algorithm for Embedded Calculation.
Lei Shi, Peng Yin, Yang Ming, Shengguan Qu, Zhen Liu
2022A Terminal Security Authentication Protocol for Zero-Trust Satellite IoT.
Minqiu Tian, Zifu Li, Fenghua Li, Jin Cao, Chao Guo
2022A Thermal-Aware Digital Twin Model of Permanent Magnet Synchronous Motors (PMSM) Based on BP Neural Networks.
Heng Li, Zeyu Zhu, Peinan He, Yingze Yang, Bin Chen, Jun Peng, Zhiwu Huang
2022A Trusted, Verifiable and Differential Cyber Threat Intelligence Sharing Framework using Blockchain.
Kealan Dunnett, Shantanu Pal, Guntur Dharma Putra, Zahra Jadidi, Raja Jurdak
2022A formalization-based vulnerability detection method for cross-subject network components.
Jinfu Chen, Haodi Xie, Saihua Cai, Ye Geng, Yemin Yin, Zikang Zhang
2022A hybrid BCI system combining motor imagery and conceptual imagery in a smart home environment.
Ruixuan Liu, Muyang Lyu, Jiangrong Yang
2022A longitudinal Measurement and Analysis Study of Mozi, an Evolving P2P IoT Botnet.
Binglai Wang, Yafei Sang, Yongzheng Zhang, Shuhao Li, Xiaolin Xu
2022A quantum inspired differential evolution algorithm with multiple mutation strategies.
Jie Liu, Xingsheng Qin, Frank Jiang
2022AI based Collaborative Optimization Scheme for Multi-Frequency Heterogeneous 4G/5G Networks.
Tian Xiao, Guoping Xu, Bei Li, Lexi Xu, Xinzhou Cheng, Feibi Lyu, Guanghai Liu, Yi Zhang, Qingqing Zhang
2022APT Attribution for Malware Based on Time Series Shapelets.
Qinqin Wang, Hanbing Yan, Chang Zhao, Rui Mei, Zhihui Han, Yu Zhou
2022AVMiner: Expansible and Semantic-Preserving Anti-Virus Labels Mining Method.
Ligeng Chen, Zhongling He, Hao Wu, Yuhang Gong, Bing Mao
2022Action-Manipulation Attack and Defense to X-Armed Bandits.
Zhi Luo, Youqi Li, Lixing Chen, Zichuan Xu, Pan Zhou
2022Adap DP-FL: Differentially Private Federated Learning with Adaptive Noise.
Jie Fu, Zhili Chen, Xiao Han
2022Adversarial Attacks on Deep Learning-Based Methods for Network Traffic Classification.
Meimei Li, Yiyan Xu, Nan Li, Zhongfeng Jin
2022An Attribute-attack-proof Watermarking Technique for Relational Database.
Shuguang Yuan, Chi Chen, Ke Yang, Tengfei Yang, Jing Yu
2022An Efficient Certificateless Authentication Scheme for Satellite Internet.
Tongwei Liu, Baokang Zhao, Wei Peng
2022An Efficient Epsilon Selection Method for DP-ERM with Expected Accuracy Constraints.
Yuzhe Li, Bo Li, Weiping Wang, Nan Liu
2022An Efficient and Secure Scheme of Verifiable Computation for Intel SGX.
Wenxiu Ding, Wei Sun, Zheng Yan, Robert H. Deng, Zhiguo Wan
2022An Empirical Study Towards SAR Adversarial Examples.
Zhiwei Zhang, Xunzhang Gao, Shuowei Liu, Yujia Diao
2022An End-to-End Multi-label classification model for Arrhythmia based on varied-length ECG signals.
Yanfang Dong, Wenqiang Cai, Wenliang Zhu, Lirong Wang
2022An Energy-Efficient scheme for industrial wireless sensor network based on hierarchical network structure.
Huamei Qi, Li Jie, Wangping Xiong
2022An Improved Actor-Critic Method for Auto-Combating In Infantry Vehicles.
Ruizhu Chen, Rong Fei, Lili Wu, Lu Yang
2022An Optimized Isomorphic Design for the SM4 Block Cipher Over the Tower Field.
Chuang Wang, Yan Ding, Chenlin Huang, Liantao Song
2022An enhanced MinHash encryption scheme for encrypted deduplication.
Qiaowen Jia, Guanxiong Ha, Hanwei Wang, Haoyu Ma, Hang Chen
2022Arteriovenous fistula stenosis classification method based on Auxiliary Wave and Transformer.
Jinke Xu, Junwei Zhang, Yujie Chen, Gang Ma, Zhanpeng Zhu, Lirong Wang
2022AutoSlicer: Automatic Program Partitioning for Securing Sensitive Data Based-on Data Dependency Analysis and Code Refactoring.
Weizhong Qiang, Hao Luo
2022Automatic Association of Cross-Domain Network Topology.
Sai Han, Zelin Wang, Guangquan Wang, Qiukeng Fang, Hongbing Ma, Lin Lin, Lexi Xu, Heng Zhang
2022Battery Aging-Robust Driving Range Prediction of Electric Bus.
Heng Li, Zhijun Liu, Yongting Liu, Hui Peng, Rui Zhang, Jun Peng, Zhiwu Huang
2022Benchmark Tool for Detecting Anomalous Program Behaviour on Embedded Devices.
Michal Borowski, Sangeet Saha, Xiaojun Zhai, Klaus D. McDonald-Maier
2022Bidirectional LSTM-based attention mechanism for CNN power theft detection.
Zhuoqun Xia, Kaixin Zhou, Jingjing Tan, Hongmei Zhou
2022Big Data based Potential Fixed-Mobile Convergence User Mining.
Qingqing Zhang, Tao Zhang, Shikun Jiang, Qiang Zhang, Yuhui Han, Xinzhou Cheng, Yunyun Wang, Xin He, Tian Xiao
2022Booting IoT Terminal Device Securely with eMMC.
Siyuan Ma, Yuewu Wang, Lingguang Lei, Yingjiao Niu, Haotian Shi, Jie Wang
2022CAHOOT: a Context-Aware veHicular intrusiOn detectiOn sysTem.
Davide Micale, Gianpiero Costantino, Ilaria Matteucci, Florian Fenzl, Roland Rieke, Giuseppe Patanè
2022CCTV-FullyAware: toward end-to-end feasible privacy-enhancing and CCTV forensics applications.
Hannu Turtiainen, Andrei Costin, Timo Hämäläinen, Tuomo Lahtinen, Lauri Sintonen
2022CCTVCV: Computer Vision model/dataset supporting CCTV forensics and privacy applications.
Hannu Turtiainen, Andrei Costin, Timo Hämäläinen, Tuomo Lahtinen, Lauri Sintonen
2022CDEdit: Redactable Blockchain with Cross-audit and Diversity Editing.
Xiaofeng Chen, Ying Gao
2022CECAS: A cloud-edge collaboration authentication scheme based on V2G short randomizable signature.
Zhuoqun Xia, Hongrui Li, Ke Gu
2022CGDF-GNN: Cascaded GNN fraud detector with dual features facing imbalanced graphs with camouflaged fraudsters.
Qichang Wan, Peisen Wang, Xiaobing Pei
2022CNN-Based Autonomous Traffic Detection on Unknown Home Security Cameras.
Shuhe Liu, Xiaolin Xu, Zhefeng Nan
2022CPDT: A copyright-preserving data trading scheme based on smart contracts and perceptual hashing.
Baowei Wang, Bin Li, Yi Yuan, Changyu Dai, Yufeng Wu, Weiqian Zheng
2022CPGBERT: An Effective Model for Defect Detection by Learning Program Semantics via Code Property Graph.
Jingqiang Liu, Xiaoxi Zhu, Chaoge Liu, Xiang Cui, Qixu Liu
2022Cache Design Effect on Microarchitecture Security: A Contrast between Xuantie-910 and BOOM.
Zhe Zhou, Xiaoyu Cheng, Yang Sun, Fang Jiang, Fei Tong, Yuxing Mao, Ruilin Wang
2022Cache Top-level domain locally: make DNS respond quickly in mobile network.
Haisheng Yu, Yan Liu, Lihong Duan, Sanwei Liu, Wenyong Wang, Dong Liu, Zirui Peng, Daobiao Gong
2022Cdga: A GAN-based Controllable Domain Generation Algorithm.
You Zhai, Jian Yang, Zixiang Wang, Longtao He, Liqun Yang, Zhoujun Li
2022Challenges and Approaches for Mitigating Byzantine Attacks in Federated Learning.
Junyu Shi, Wei Wan, Shengshan Hu, Jianrong Lu, Leo Yu Zhang
2022Clean-label Backdoor Attack on Machine Learning-based Malware Detection Models and Countermeasures.
Wanjia Zheng, Kazumasa Omote
2022Code-based encryption algorithms for generating and verifying digital signature.
Aneta Poniszewska-Maranda, Kacper Pradzynski
2022Collaborative Improvement of User Experience and Network Quality Based on Big Data.
Chuntao Song, Jie Gao, Fan Zhang, Tao Zhang, Yi Zhang, Lixia Liu, Bei Li, Yong Wang, Lexi Xu
2022Confusing Traffic against Intra-domain Webpage Fingerprinting Attacks.
Weilin Yang, Zhonghui Du, Yonghui Wu, Yi Tang
2022Coverage Estimation of Wireless Network Using Attention U-Net.
Feibi Lyu, Xinzhou Cheng, Lexi Xu, Liang Liu, Jinjian Qiao, Lu Zhi, Zixiang Di, Tian Xiao, Chen Cheng
2022Coverage Reliability of IoT Intrusion Detection System based on Attack-Defense Game Design.
Siyu Sun, Xiaoxuan Fan, Yunzhi Xia, Chenlu Zhu, Shenghao Liu, Lingzhi Yi
2022Create Persona of Elderly Users by Clustering Analysis of Needs.
Xiaoying Li, Guangxiang Zhang, Yuzhou Wu, Yang Yang, Yuelei Wang, Zhen Liu
2022DCC-Find: DNS Covert Channel Detection by Features Concatenation-Based LSTM.
Dongxu Han, Pu Dong, Ning Li, Xiang Cui, Jiawen Diao, Qing Wang, Dan Du, Yuling Liu
2022DIV-SC: A Data Integrity Verification Scheme for Centralized Database Using Smart Contract.
Siqi He, Xiaofei Xing, Guojun Wang
2022DRICP: Defect Risk Identification Using Sample Category Perception.
Lixia Xie, Siyu Liu, Hongyu Yang, Liang Zhang
2022DRSN with Simple Parameter-Free Attention Module for Specific Emitter Identification.
Xiuhua Wen, Chunjie Cao, Yifan Li, Yang Sun
2022Data Driven based Malicious URL Detection using Explainable AI.
Saranda Poddar, Deepraj Chowdhury, Ashutosh Dhar Dwivedi, Raghava Rao Mukkamala
2022Data Integrity Verification Scheme Based on Blockchain Smart Contract.
Kai Zhang, He Xiao, Qiuming Liu
2022Data Poisoning Attack to X-armed Bandits.
Zhi Luo, Youqi Li, Lixing Chen, Zichuan Xu, Pan Zhou
2022Deceiving Learning-based Sketches to Cause Inaccurate Frequency Estimation.
Xuyang Jing, Xiaojun Cheng, Zheng Yan, Xian Li
2022Deepro: Provenance-based APT Campaigns Detection via GNN.
Na Yan, Yu Wen, Luyao Chen, Yanna Wu, Boyang Zhang, Zhaoyang Wang, Dan Meng
2022Denoising method of ECG signal based on Channel Attention Mechanism.
Junwei Zhang, Rui Bao, Lirong Wang, Jinke Xu, Yujie Chen, Xueqin Chen
2022Design and Development of Operation Status Monitoring System for Large Glass Substrate Handling Robot.
Xinhe Pu, Xiaofang Yuan, Liangsen Li, Weiming Ji
2022Detecting Unknown Network Attacks with Attention Encoding and Deep Metric Learning.
Chunlan Fu, Shirong Han, Gang Shen
2022Detection of impurity content in wheat based on cone-beam CT.
Gangyang Wang, Chunhua Zhu, Jianhou Wang
2022Development of Blockchain-based e-Voting System: Requirements, Design and Security Perspective.
Md. Jobair Hossain Faruk, Bilash Saha, Mazharul Islam, Fazlul Alam, Hossain Shahriar, Maria Valero, Akond Rahman, Fan Wu, Md. Zakirul Alam Bhuiyan
2022Diabetes Mellitus Type 2 Data Sharing System Based on Blockchain and Attribute-Encryption.
Weiqi Dai, Zhenhui Lu, Xia Xie, Duoqiang Wang, Hai Jin
2022Differential Game Approach for Modelling and Defense of False Data Injection Attacks Targeting Energy Metering Systems.
Jichao Bi, Shibo He, Fengji Luo, Jiming Chen, Da-Wen Huang, Mingyang Sun
2022Dynamic Resource Allocation for Beam Hopping Satellites Communication System: An Exploration.
Xinqing Du, Xin Hu, Yin Wang, Weidong Wang
2022Dynamic and Diverse Transformations for Defending Against Adversarial Examples.
Yongkang Chen, Ming Zhang, Jin Li, Xiaohui Kuang, Xuhong Zhang, Han Zhang
2022Dynamically Selected Mixup Machine Unlearning.
Zhiwen Zhou, Ximeng Liu, Jiayin Li, Junxi Ruan, Mingyuan Fan
2022EEG classification algorithm of motor imagery based on CNN-Transformer fusion network.
Haofeng Liu, Yuefeng Liu, Yue Wang, Bo Liu, Xiang Bao
2022Efficient SM2 Hardware Design for Digital Signature of Internet of Vehicles.
Mei Yang, Chong Liu, Huiyun Li, Cuiping Shao
2022Efficient and Highly Accurate Differentially Private Statistical Genomic Analysis using Discrete Fourier Transform.
Akito Yamamoto, Tetsuo Shibuya
2022Efficiently Constructing Topology of Dynamic Networks.
Fenghua Li, Cao Chen, Yunchuan Guo, Liang Fang, Chao Guo, Zifu Li
2022EnShare: Sharing Files Securely and Efficiently in the Cloud using Enclave.
Yun He, Xiaoqi Jia, Shengzhi Zhang, Lou Chitkushev
2022Enabling Anonymous Authenticated Encryption with a Novel Anonymous Authenticated Credential Key Agreement (AACKA).
Raphael Schermann, Rainer Urian, Ronald Toegl, Holger Bock, Christian Steger
2022End-to-End Speech Recognition Technology Based on Multi-Stream CNN.
Hao Xiao, Yuan Qiu, Rong Fei, Xiongbo Chen, Zuo Liu, Zongling Wu
2022Energy-Efficient Privacy-Preserving Time-Series Forecasting on User Health Data Streams.
Muhammad Arsalan, Davide Di Matteo, Sana Imtiaz, Zainab Abbas, Vladimir Vlassov, Vadim Issakov
2022Energy-efficient and Traffic-aware VNF Placement for Vertical Services in 5G Networks.
Yi Yue, Wencong Yang, Xiao Liang, Xihuizi Meng, Rong Huang, Xiongyang Tang
2022Extending Expressive Access Policies with Privacy Features.
Stefan More, Sebastian Ramacher, Lukas Alber, Marco Herzl
2022Eye-based keystroke prediction for natural texts - a feasibility analysis.
José Reverte Cazorla, José María de Fuentes, Lorena González-Manzano
2022FLightNER: A Federated Learning Approach to Lightweight Named-Entity Recognition.
Macarious Abadeer, Wei Shi, Jean-Pierre Corriveau
2022False Data Injection Attack Detection in a Platoon of CACC in RSU.
Kai Gao, Xiangyu Cheng, Hao Huang, Xunhao Li, Tingyu Yuan, Ronghua Du
2022Federated Learning Scheme with Dual Security of Identity Authentication and Verification.
Yuting Xu, Mang Su, Jinpeng Hou, Chong Nie
2022Ferrite microstrip limiter based on the equivalent nonlinear loss simulation model for the narrow microwave pulse environment.
Mingyu Yang, Tao Yang, Haiyang Wang, Hao Li, Tianming Li, Biao Hu
2022Forgery Detection Scheme of Deep Video Frame-rate Up-conversion Based on Dual-stream Multi-scale Spatial-temporal Representation.
Qing Gu, Xiangling Ding, Dengyong Zhang, Ce Yang
2022Forgery Trajectory Injection Attack Detection for Traffic Lights under Connected Vehicle Environment.
Yanghui Zhang, Kai Gao, Shuo Huang, Xunhao Li, Ronghua Du
2022From Passive to Active: Near-optimal DNS-based Data Exfiltration Defense Method Based on Sticky Mechanism.
Jiawen Diao, Binxing Fang, Xiang Cui, Zhongru Wang, Tian Wang, Shouyou Song
2022Fuzzy Keyword Search over Encrypted Cloud Data with Dynamic Fine-grained Access Control.
Boshen Shan, Yuanzhi Yao, Weihai Li, Xiaodong Zuo, Nenghai Yu
2022GTMS: A Gated Linear Unit Based Trust Management System for Internet of Vehicles Using Blockchain Technology.
Yong Kuang, Hongyun Xu, Rui Jiang, Zhikang Liu
2022Graph Encryption for Shortest Path Queries with k Unsorted Nodes.
Meng Li, Jianbo Gao, Zijian Zhang, Chaoping Fu, Chhagan Lal, Mauro Conti
2022Guide Tracking Method Based On Particle Filter Fusion.
Zilong Wang, Junhuai Li
2022Hash Proof System with Auxiliary Inputs and Its Application.
Cailing Cai, Tsz Hon Yuen, Siu-Ming Yiu
2022HashDroid:Extraction of malicious features of Android applications based on function call graph pruning.
Pengfei Liu, Weiping Wang, Hong Song, Shigeng Zhang, Yulu Hong
2022Haxss: Hierarchical Reinforcement Learning for XSS Payload Generation.
Myles Foley, Sergio Maffeis
2022Hierarchical Classification of Android Malware Traffic.
Giampaolo Bovenzi, Valerio Persico, Antonio Pescapè, Anna Piscitelli, Vincenzo Spadari
2022Holmes: An Efficient and Lightweight Semantic Based Anomalous Email Detector.
Peilun Wu, Hui Guo
2022HyperMean: Effective Multidimensional Mean Estimation with Local Differential Privacy.
Tao Zhang, Bowen Deng, Lele Zheng, Ze Tong, Qi Li
2022IDROP: Intelligently detecting Return-Oriented Programming using real-time execution flow and LSTM.
Jie Li, Weina Niu, Ran Yan, Zhiqin Duan, Beibei Li, Xiaosong Zhang
2022IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022
2022Image Encryption Algorithm based on Convolutional Neural Network and Four Square Matrix Encoding.
Bin Ge, Ting Wang, Chenxing Xia, Gaole Dai
2022Implementation of one-time editable blockchain chameleon hash function construction scheme.
Yixuan Qiao, Minghui Zheng, Jingyi Yang
2022Improved Zero-Knowledge Proofs for Commitments from Learning Parity with Noise.
Mengfan Wang, Guifang Huang, Hongmin Gao, Lei Hu
2022Intelligent Recognition Method of Web Application Categories Based on Multi-layer Simhash Algorithm.
Fuji Han, Dongjun Zhu
2022Kgastor: a Privacy By Design Knowledge Graph anonymized Store.
Maxime Thouvenot, Philippe Calvez, Olivier Curé
2022LLDP: A Layer-wise Local Differential Privacy in Federated Learning.
Qian Chen, Hongbo Wang, Zilong Wang, Jiawei Chen, Haonan Yan, Xiaodong Lin
2022Leveraging Model Poisoning Attacks on License Plate Recognition Systems.
Jian Chen, Yuan Gao, Yang Liu, Chen Wang, Kai Peng
2022Listing the ingredients for IFTTT recipes.
Shirin Kalantari, Danny Hughes, Bart De Decker
2022MATTER: A Multi-Level Attention-Enhanced Representation Learning Model for Network Intrusion Detection.
Jinghong Lan, Yanan Li, Bo Li, Xudong Liu
2022MCFM: Discover Sensitive Behavior from Encrypted Traffic in Industrial Control System.
Zhishen Zhu, Junzheng Shi, Chonghua Wang, Gang Xiong, Zhiqiang Hao, Gaopeng Gou
2022MFFAN: Multiple Features Fusion with Attention Networks for Malicious Traffic Detection.
Weiqing Huang, Xinbo Han, Meng Zhang, Min Li, Wen Liu, Zheng Yang, Haitian Yang
2022MGF-GAN: Multi Granularity Text Feature Fusion for Text-guided-Image Synthesis.
Xingfu Wang, Xiangyu Li, Ammar Hawbani, Liang Zhao, Saeed Hamood Alsamhi
2022MLIA: modulated LED illumination-based adversarial attack on traffic sign recognition system for autonomous vehicle.
Yixuan Shen, Yu Cheng, Yini Lin, Sicheng Long, Canjian Jiang, Danjie Li, Siyuan Dai, You Jiang, Junbin Fang, Zoe Lin Jiang, Siu-Ming Yiu
2022Mahalanobis Distance and Pauta Criterion based Log Anomaly Detection Algorithm for 5G Mobile Network.
Yuting Zheng, Yi Li, Yuchao Jin, Xiaomeng Zhu, Lexi Xu, Tian Xiao, Bei Li, Xinzhou Cheng
2022Mal-Bert-GCN: Malware Detection by Combining Bert and GCN.
Zhenquan Ding, Hui Xu, Yonghe Guo, Longchuan Yan, Lei Cui, Zhiyu Hao
2022Malicious Family Identify Combining Multi-channel Mapping Feature Image and Fine-Tuned CNN.
Chenghua Tang, Chen Zhou, Min Hu, Mengmeng Yang, Baohua Qiang
2022Marking based Obfuscation Strategy to resist Side Channel Attack in Cross-User Deduplication for Cloud Storage.
Xin Tang, Xiong Chen, Ran Zhou, Linchi Sui, Tian'e Zhou
2022Measurement of Malware Family Classification on a Large-Scale Real-World Dataset.
Qinqin Wang, Hanbing Yan, Chang Zhao, Rui Mei, Zhihui Han, Yu Zhou
2022Multi-channel Live Video Processing Method Based on Cloud-edge Collaboration.
Zhen Guo, Pengzhou Zhang, Junjie Xia, Zhe Zhou, Juan Cao
2022Multi-pipeline HotStuff: A High Performance Consensus for Permissioned Blockchain.
Taining Cheng, Wei Zhou, Shaowen Yao, Libo Feng, Jing He
2022Multimodal Graph Reasoning and Fusion for Video Question Answering.
Shuai Zhang, Xingfu Wang, Ammar Hawbani, Liang Zhao, Saeed Hamood Alsamhi
2022Near Field Air-Gap Covert Channel Attack.
Mordechai Guri
2022Neural-FacTOR: Neural Representation Learning for Website Fingerprinting Attack over TOR Anonymity.
Haili Sun, Yan Huang, Lansheng Han, Xiang Long, Hongle Liu, Chunjie Zhou
2022On the Performance of Deep Learning Methods for Identifying Abnormal Encrypted Proxy Traffic.
Hongce Zhao, Shunliang Zhang, Zhuang Qiao, Xianjin Huang, Xiaohui Zhang
2022One-Time Rewritable Blockchain with Traitor Tracing and Bilateral Access Control.
Lifeng Guo, Huide Lei, Wei-Chuen Yau
2022Optimal Block Propagation and Incentive Mechanism for Blockchain Networks in 6G.
Jinbo Wen, Xiaojun Liu, Zehui Xiong, Meng Shen, Siming Wang, Yutao Jiao, Jiawen Kang, He Li
2022PAPR Suppression in Radar Communication Integration System Based on Subcarrier Reservation.
Biao Yang, Shanshan Zhao, Hongfei Du, Minju Yi, Ziwei Liu
2022Performance Analysis for Bearings-only Geolocation Based on Constellation of Satellites.
Jinzhou Li, Shouye Lv, Liu Yang, Sheng Wu, Yang Liu, Qijun Luan
2022Performance Analysis of IEEE 802.11p for the Internet of Vehicles with Bursty Packet Errors.
Ning Wang, Jia Hu
2022Personalized User Profiles-based Insider Threat Detection for Distributed File System.
Wu Xin, Qingni Shen, Ke Feng, Yutang Xia, Zhonghai Wu, Zhenghao Lin
2022Practical Side-Channel Attack on Message Encoding in Masked Kyber.
Jian Wang, Weiqiong Cao, Hua Chen, Haoyuan Li
2022Pre-training Fine-tuning data Enhancement method based on active learning.
Deqi Cao, Zhaoyun Ding, Fei Wang, Haoyang Ma
2022Privacy-Preserving Data Analysis without Trusted Third Party.
Atsuko Miyaji, Tomoka Takahashi, Ping-Lun Wang, Tatsuhiro Yamatsuki, Tomoaki Mimoto
2022Privacy-Preserving Recommendation with Debiased Obfuscaiton.
Chennan Lin, Baisong Liu, Xueyuan Zhang, Zhiye Wang, Ce Hu, Linze Luo
2022Privacy-Preserving Robust Federated Learning with Distributed Differential Privacy.
Fayao Wang, Yuanyuan He, Yunchuan Guo, Peizhi Li, Xinyu Wei
2022Privacy-Preserving Smart Lock System for IoT-enabled Rental House Markets.
Bo Wang, Lingling Wang, Hongliang Guo, Peng Zhou
2022Privacy-Preserving Top-k Spatio-Textual Similarity Join.
Yiping Teng, Dongyue Jiang, Mengmeng Sun, Liang Zhao, Li Xu, Chunlong Fan
2022Privacy-Preserving and Verifiable Outsourcing Message Transmission and Authentication Protocol in IoT.
Hongjun Li, Fanyu Kong, Jia Yu, Hanlin Zhang, Luhong Diao, Yunting Tao
2022Privacy-preserving Decision Making Based on Q-Learning in Cloud Computing.
Zhipeng Zhou, Chenyu Dong, Donger Mo, Peijia Zheng
2022ProcGuard: Process Injection Behaviours Detection Using Fine-grained Analysis of API Call Chain with Deep Learning.
Juan Wang, Chenjun Ma, Ziang Li, Huanyu Yuan, Jie Wang
2022Pyramid Copy-move Forgery Detection Using Adversarial Optimized Self Deep Matching Network.
Yaqi Liu, Chao Xia, Qiang Cai, Xin Jin
2022Redactable Blockchain with K-Time Controllable Editing.
Yong Li, Zhenghao Zhang, Xi Chen, Ruxian Li, Liang Zhang
2022Reducing Gas Consumption of Tornado Cash and Other Smart Contracts in Ethereum.
Jingyan Yang, Shang Gao, Guyue Li, Rui Song, Bin Xiao
2022Research and Application of 5G Edge AI in Medical Industry.
Shangyu Tang, Mingde Huo, Yi Du, Yuwen Huo, Yan Zhang, Lexi Xu, Ying Ji, Guoyu Zhou
2022Research and Implementation of Fault Diagnosis of Switch Machine Based on Data Enhancement and CNN.
Mingyue Li, Rong Fei
2022Research on 5G Network Capacity and Expansion.
Xiaomeng Zhu, Yi Li, Yuting Zheng, Rui Xia, Lexi Xu, Bei Li, Zixiang Di, Lu Zhi, Xinzhou Cheng
2022Research on Capability Building of Mobile Network Data Analysis and Visualization.
Jian Guan, Xinzhou Cheng, Kun Chao, Xin He, Yuwei Jia, Lexi Xu, Yunyun Wang, Tian Xiao, Bei Li
2022Research on Enterprises Loss in Regional Economic Risk Management.
Heng Zhang, Wenyu Li, Lianbo Song, Lexi Xu, Xinzhou Cheng, Lijuan Cao, Kun Chao, Wei Xia, Qinqin Yu, Sai Han
2022Research on Intelligent 5G Remote Interference Avoidance and Clustering Scheme.
Tian Xiao, Bei Li, Zixiang Di, Guanghai Liu, Lexi Xu, Jian Guan, Zhaoning Wang, Chen Cheng, Yi Li
2022Research on OTFS Systems for 6G.
Bei Li, Tian Xiao, Kai Zhou, Lexi Xu, Guanghai Liu, Bo Wang, Jie Gao, Jian Guan, Zixiang Di
2022Research on User Complaint Problem Location and Complaint Early Warning Stragegy Based on Big Data Analysis.
Jie Gao, Lixia Liu, Tao Zhang, Shenghao Jia, Chuntao Song, Lexi Xu, Yang Wu, Bei Li, Yunyun Wang, Xinjie Hou
2022Research on Voice Quality Evaluation Method Based on Artificial Neural Network.
Zixiang Di, Tian Xiao, Yi Li, Xinzhou Cheng, Bei Li, Lexi Xu, Xiaomeng Zhu, Lu Zhi, Rui Xia
2022Robust Document Image Forgery Localization Against Image Blending.
Weipeng Liang, Li Dong, Rangding Wang, Diqun Yan, Yuanman Li
2022Robust Perception for Autonomous Vehicles using Dimensionality Reduction.
Shivam Garg, Nandish Chattopadhyay, Anupam Chattopadhyay
2022Robust Secure Aggregation with Lightweight Verification for Federated Learning.
Chao Huang, Yanqing Yao, Xiaojun Zhang, Da Teng, Yingdong Wang, Lei Zhou
2022SCEVD: Semantic-enhanced Code Embedding for Vulnerability Discovery.
Joseph Gear, Yue Xu, Ernest Foo, Praveen Gauravaram, Zahra Jadidi, Leonie Simpson
2022SEEKER: A Root Cause Analysis Method Based on Deterministic Replay for Multi-Type Network Protocol Vulnerabilities.
Runhao Liu, Bo Yu, Baosheng Wang, Jianbin Ye, Jianxin Huang, Xiangdong Kong
2022SecretHunter: A Large-scale Secret Scanner for Public Git Repositories.
Elliott Wen, Jia Wang, Jens Dietrich
2022Secure Access Control for eHealth Data in Emergency Rescue Case based on Traceable Attribute-Based Encryption.
Yuan Shen, Wei Song, Changsheng Zhao, Zhiyong Peng
2022Secure and efficient publicly verifiable ridge regression outsourcing scheme.
Ou Ruan, Shanshan Qin
2022Security Support on Memory Controller for Heap Memory Safety.
Chaochao Zhang, Rui Hou
2022Self-Supervised Adversarial Example Detection by Disentangled Representation.
Zhaoxi Zhang, Leo Yu Zhang, Xufei Zheng, Jinyu Tian, Jiantao Zhou
2022Shared Incentive System for Clinical Pathway Experience.
Weiqi Dai, Wenhao Zhao, Xia Xie, Song Wu, Hai Jin
2022Short Signatures via Multiple Hardware Security Modules with Key Splitting in Circuit Breaking Environments.
Lukasz Krzywiecki, Hannes Salin
2022Smarkchain: An Amendable and Correctable Blockchain Based on Smart Markers.
Chin-Tser Huang, Laurent Njilla, Tieming Geng
2022Smart Grid Data Aggregation Scheme Based on Local Differential Privacy.
Lei Zhang, Dong Mao, Zuge Chen, Yubo Song, Liquan Chen, Zhongyuan Qin
2022Software Side Channel Vulnerability Detection Based on Similarity Calculation and Deep Learning.
Wei Sun, Zheng Yan, Xi Xu, Wenxiu Ding, Lijun Gao
2022Source Code Vulnerability Detection Using Vulnerability Dependency Representation Graph.
Hongyu Yang, Haiyun Yang, Liang Zhang, Xiang Cheng
2022SpecRNet: Towards Faster and More Accessible Audio DeepFake Detection.
Piotr Kawa, Marcin Plata, Piotr Syga
2022Squeezing Network Performance for Secure and Efficient PoW with Better Difficulty Adjustment.
Yuhang Ding, Zihan Yang, Bo Qin, Qin Wang, Yanran Zhang, Qianhong Wu
2022Steganalysis for Small-Scale Training Image Pairs with Cover-Stego Feature Difference Model.
Chao Xia, Yaqi Liu, Qingxiao Guan, Sai Ma, Yu Nan, Jiahui Fu
2022Study on Gateway Station Deployment for Large Scale LEO Satellite Constellation Networks.
Lei Cheng, Shuaijun Liu, Lixaing Liu, Hailong Hu, Jingyi Chen, Xiandong Meng, Pengcheng Ding
2022Sybil-resistant Truth Discovery in Crowdsourcing by Exploiting the Long-tail Effect.
Dejia Lin, Yongdong Wu, Wensheng Gan
2022TECS: A Trust Model for VANETs Using Eigenvector Centrality and Social Metrics.
Yu'ang Zhang, Yujie Song, Yu Wang, Yue Cao, Xuefeng Ren, Fei Yan
2022TFCFI:Transparent Forward Fine-grained Control-Flow Integrity Protection.
Cairui She, Liwei Chen, Gang Shi
2022TINKER: A framework for Open source Cyberthreat Intelligence.
Nidhi Rastogi, Sharmishtha Dutta, Alex Gittens, Mohammed J. Zaki, Charu C. Aggarwal
2022TPIPD: A Robust Model for Online VPN Traffic Classification.
Yongwei Meng, Tao Qin, Haonian Wang, Zhouguo Chen
2022Technical architecture of integrated big data platform.
Yuan Liu, Yanmei Liu, Minjing Zhong
2022Telecom Big Data assisted Algorithm and System of Campus Safety Management.
Chen Cheng, Xinzhou Cheng, Shikun Jiang, Xin Zhao, Yuhui Han, Tao Zhang, Lijuan Cao, Yuwei Jia, Tian Xiao, Bei Li
2022Telecom Customer Chum Prediction based on Half Termination Dynamic Label and XGBoost.
Yi Zhang, Fan Zhang, Chuntao Song, Xinzhou Cheng, Chen Cheng, Lexi Xu, Tian Xiao, Bei Li
2022The Power Allocation for SWIPT-based Cognitive Two-Way Relay Networks with Rate Fairness Consideration.
Guozhong Wang, Chunling Peng, Yi Huang
2022To Fix or Not to Fix: A Critical Study of Crypto-misuses in the Wild.
Anna-Katharina Wickert, Lars Baumgärtner, Michael Schlichtig, Krishna Narasimhan, Mira Mezini
2022Towards Adversarial Robustness with Multidimensional Perturbations via Contrastive Learning.
Chuanxi Chen, Dengpan Ye, Hao Wang, Long Tang, Yue Xu
2022Towards Automated Detection and Prevention of Regrettable (Self-) Disclosures on Social Media.
Hervais Simo, Michael Kreutzer
2022Towards logical specification of adversarial examples in machine learning.
Marwa Zeroual, Brahim Hamid, Morayo Adedjouma, Jason Jaskolka
2022Towards the Concept of Trust Assurance Case.
Emilia Cioroaica, Barbora Buhnova, Daniel Schneider, Ioannis Sorokos, Thomas Kuhn, Emrah Tomur
2022Trusted Hart for Mobile RISC-V Security.
Vladimir Ushakov, Sampo Sovio, Qingchao Qi, Vijayanand Nayani, Valentin Manea, Philip Ginzboorg, Jan-Erik Ekberg
2022Truthfully Negotiating Usage Policy for Data Sovereignty.
Chunlei Yang, Yunchuan Guo, Mingjie Yu, Lingcui Zhang
2022Understanding the Penetration Test Workflow: a security test with Tramonto in an e-Government application.
Daniel Dalalana Bertoglio, Luis G. B. Schüler, Avelino F. Zorzo, Roben Castagna Lunardi
2022User Analysis and Traffic Prediction Method based on Behavior Slicing.
Xin He, Lijuan Cao, Yuwei Jia, Kun Chao, Miaoqiong Wang, Chao Wang, Yunyun Wang, Runsha Dong, Zhenqiao Zhao
2022Utility-Aware Privacy-Preserving Federated Learning through Information Bottleneck.
Shaolong Guo, Zhou Su, Zhiyi Tian, Shui Yu
2022VecSeeds: Generate fuzzing testcases from latent vectors based on VAE-GAN.
Xin Sun, Wen Wang, Xujian Liu, Jiarong Fan, Zeru Li, Yubo Song, Zhongyuan Qin
2022Vehicle Classification System with Mobile Edge Computing Based on Broad Learning.
Xiting Peng, Naixian Zhao, Lexi Xu, Shi Bai
2022VoiceSketch: a Privacy-Preserving Voiceprint Authentication System.
Baochen Yan, Rui Zhang, Zheng Yan
2022WBA: A Warping-based Approach to Generating Imperceptible Adversarial Examples.
Chengyao Hua, Shigeng Zhang, Weiping Wang, Zhankai Li, Jian Zhang
2022You Cannot Fully Trust Your Device: An Empirical Study of Client-Side Certificate Validation in WPA2-Enterprise Networks.
Li Song, Qiongxiao Wang, Shijie Jia, Jingqiang Lin, Linli Lu, Yanduo Fu
2022Zero Trust-NIDS: Extended Multi-View Approach for Network Trace Anonymization and Auto-Encoder CNN for Network Intrusion Detection.
Abeer Z. Alalmaie, Priyadarsi Nanda, Xiangjian He
2022tTree+: A Threat Tree Model for Representing Complex Semantics.
Zhitao Wu, Jingjing Hu, Xiaowei Zhang, Wei Ren