TrustCom B

350 papers

YearTitle / Authors
202423rd IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024
20245G-PPDE: A Novel Adaptive Scaling Framework for Enhancing the Resilience of the 5G Cloud Core Network.
Xinyu Huang, Xingxing Liao, Jie Yang, Wei You, Wenhao Wu, Shiru Min, Xinsheng Ji
2024A Blockchain-based PHR Sharing Scheme with Attribute Privacy Protection.
Chaohe Lu, Zhongyuan Yu, Guijuan Wang, Anming Dong, Xiang Tian
2024A Cross-Site Scripting Attack Protection Framework Based on Managed Proxy.
Cheng Tang, Qingfeng Wang, Guozhen Cheng, Hao Liang, Jianhua Peng, Meiyue Yang, Wenyan Liu, Ming Liu, Lei Sha
2024A Defensive Framework Against Adversarial Attacks on Machine Learning-Based Network Intrusion Detection Systems.
Benyamin Tafreshian, Shengzhi Zhang
2024A Digital Traditional Chinese Medicine Splint for Treatment of Distal Radius Fracture.
Siyuan Wang, Shuchen Liu, Zheng Jin, Zheng Yan, Tao Chen, Qinglei Bu, Zhiqiang Wang, Jintao Liu, Jie Sun
2024A Dual Defense Design Against Data Poisoning Attacks in Deep Learning-Based Recommendation Systems.
Xiaocui Dang, Priyadarsi Nanda, Manoranjan Mohanty, Haiyu Deng
2024A Federated Learning Scheme with Adaptive Hierarchical Protection and Multiple Aggregation.
Zhiqiang Wang, Xinyue Yu, Ziqing Tian
2024A Framework for Detecting Hidden Partners in App Collusion.
Qinchen Guan, Shaoyong Du, Kerong Wang, Chunfang Yang, Xiangyang Luo
2024A GPU-Based Privacy-Preserving Machine Learning Acceleration Scheme.
Jie Hou, Zengrui Huang, Zhiyong Zhang, Wei Zhang, Lei Ju
2024A High-Accuracy Unknown Traffic Identification Method Based on Multi-View Contrastive Learning.
Yuwei Xu, Zizhi Zhu, Chufan Zhang, Kehui Song, Guang Cheng
2024A Knowledge Graph Completion Method Based on Gated Adaptive Fusion and Conditional Generative Adversarial Networks.
Zhixuan Zhang, Yanhui Zhu, Yuezhong Wu, Fangteng Man, Hao Chen, Xujian Ying
2024A LLM-based agent for the automatic generation and generalization of IDS rules.
Xiaowei Hu, Haoning Chen, Huaifeng Bao, Wen Wang, Feng Liu, Guoqiao Zhou, Peng Yin
2024A Lightweight Privacy-Preserving and Verifiable Federated Learning-Based Protocol.
Jiaqi Lei, Ke Gu, Long Cai
2024A Low-cost Black-box Jailbreak Based on Custom Mapping Dictionary with Multi-round Induction.
Feng Wu, Weiqi Wang, Youyang Qu, Shui Yu
2024A Method for Quantitative Object De-Identification Analysis of Anonymized Video.
Deok-Han Kim, Yujun Kim, Young-Gab Kim
2024A Multi-Blockchain Based Anonymous Cross-Domain Authentication Scheme for Industrial Internet of Things.
Chengqi Hou, Wei Yang, Yu Wang, Zhiming Zhang, Shaolong Chen, Beibei Li
2024A Multi-Stage Spike Stream Processing and Image Reconstruction Method for Industrial Applications.
Shuaipeng Wu, Changhao Yuan, Kejiang Ye
2024A Multi-hop Reasoning Framework for Cyber Threat Intelligence Knowledge Graph.
Kai Zhou, Yong Xie, Xin Liu
2024A Novel Approach to Network Traffic Analysis: the HERA tool.
Daniela Pinto, Ivone Amorim, Eva Maia, Isabel Praça
2024A Novel Time Series Approach to Anomaly Detection and Correction for Complex Blockchain Transaction Networks.
Qi Xia, Ansu Badjie, Jianbin Gao, Grace Mupoyi Ntuala, Hu Xia, Isaac Amankona Obiri
2024A Novel zk-SNARKs Method for Cross-chain Transactions in Multi-chain System.
Pengcheng Xia, Jingyu Wu, Yiyang Ni, Jun Li
2024A Quiet Place: An In-Depth Study of Mobile Public-to-Private Attacks.
Yin Liu
2024A Reliable Edge Server Deployment Algorithm Based on Spectral Clustering and a Deep Q-network Strategy using Multi-objective Optimization.
Zhou Zhou, Taotao Yu, Mohammad Shojafar, Xia Ou, Hongbing Cheng
2024A Reliable Encrypted Traffic Classification Method Based on Attention Mechanisms.
Zhijun Wu, Shanhe Niu, Meng Yue
2024A Revocable Pairing-Free Certificateless Signature Scheme Based on RSA Accumulator.
Zhuowei Shen, Xiao Kou, Taiyao Yang, Haoqin Xu, Dongbin Wang, Shaobo Niu
2024A Self-Adaptive Framework for Responding to Uncertainty in Access Control Process with Deep Neural Networks.
Jihoon Park, Giluk Kang, Young-Gab Kim
2024A Self-Supervised Targeted Process Anomaly Detection Method Based on the Minimum Set of Observed Events.
Haojun Xia, Limin Sun, Wenliang Liu, Jingyi Xie, Zhanwei Song, Bibo Tu
2024A Semi-Fragile Reversible Watermarking for 3D Models Based on IQIM with Dual-Strategy Partition Modulation.
Fei Peng, Yousheng Liang, Min Long
2024A Study of Backdoor Attacks on Data Distillation for Text Classification Tasks.
Sixian Sun, Hongyu Sun, Haoxing Zhang, Yuqing Zhang
2024A Sustainable Storage Compensation Method for Consortium Blockchain-based Computing Power Trading.
Guangzhuo Zhu, Qian Wang, Bei Gong
2024A Trust Model with Fitness-Based Clustering Scheme in FANETs.
Junqiao Gao, Chaklam Cheong, Mansi Zhang, Yue Cao, Tao Peng, Shahbaz Pervez
2024A Universally Composable Key Management System Using Trusted Hardware.
Zhenghao Lu, Ding Ma, Lei Fan, Xiuzhen Chen, Yongshuai Duan, Jia Zhang
2024A Vulnerability Detection Method for Intermediate Code Based on a Relational Dependency Graph.
Bing Xia, Chongjun Tang, Wenbo Liu, Shihao Chu, Yu Dong
2024A corrected method for parameters in the signal propagation model.
Yan Liang, Xin Dong, Song Chen, Zhengda Li, Zhimin Chang
2024A cross-domain authentication scheme based on quantized trust relationship for smart grid.
Tianang Chen, Haojie Qin, Jin Qian, Jun Luo, Yinghua Jiang, Liquan Chen
2024A review of data security research in energy storage systems.
Meiqi Liu, Yongqiang Chen, Chaoyang Zhu, Shuang Yao, Jingfeng Rong, Xiaolong Zhao, Xijuan Si, Guang Yang, Yuqing Zhang
2024ADIoT: An Anomaly Detection Model for IoT Devices Based on Behavioral Feature Analysis.
Liang Wang, Zhipeng Wang, Meng Wang
2024AI empowered senstive information detection and anonymisation in PDF files.
Zheng Gao, Hongping Li
2024AIDE: Attack Inference Based on Heterogeneous Dependency Graphs with MITRE ATT&CK.
Weidong Zhou, Chunhe Xia, Nan Feng, Xinyi Pan, Tianbo Wang, Xiaojian Li
2024AS-FIBA: Adaptive Selective Frequency-Injection for Backdoor Attack on Deep Face Restoration.
Zhenbo Song, Wenhao Gao, Zhenyuan Zhang, Jianfeng Lu
2024ASK-LTL Checker: A Tailored Model Checker for Linear Temporal Logic of CPN State Space.
Jing Li, Tao Sun, Wenjie Zhong
2024Abstraction-Based Training for Robust Classification Models via Image Pixelation.
Yang Chen, Min Wu, Min Zhang
2024Achieving Trusted GPU Allocation: An Empirical Study on Efficiency Changes of Deep Learning Training Tasks.
Ziheng Zhang, Lei Liu, Zhongmin Yan
2024Active Defense Research: A New Perspective Integrating Traps and Vulnerabilities.
Quan Hong, Yang Yu, Lvyang Zhang, Lidong Zhai
2024Active Source Inference Attack Based on Label-Flipping in Federated Learning.
Lening Zhang, Hui Xia
2024AdaptFL: Adaptive Client Task Allocation-Based Synchronous Federated Learning.
Xiaoshuang Li, Mingjun Wang, Yilong Guo, Wenxiu Ding
2024AdvPurRec: Strengthening Network Intrusion Detection with Diffusion Model Reconstruction Against Adversarial Attacks.
Nour Alhussien, Ahmed Aleroud
2024An Adaptive Reputation Update Mechanism for Primary Nodes in PBFT.
Limin Yu, Yongdong Wu, Jiao Lu, Tong Li
2024An Automated PM2.5 Analysis and Prediction System with Encoder-Decoder Architecture and Continual Learning Mechanism.
Le Anh Duc Vu, Minh Hai Vu, Bao Ngoc Tran, Minh Tung Hoang, Duc Anh Nguyen, Minh Quan Hoang, Phi Le Nguyen
2024An Effective Adversarial Text Attack through a Block-Sparse Approach with Hamiltonian Insights.
Yaling Zhang, Xiang Sun, Yichuan Wang, Dongtai Tang, Chen Zhao
2024An Efficient and Privacy-Preserving Participant Selection Scheme based on Location in Mobile Crowdsensing.
Yudan Cheng, Tao Feng, Zhiquan Liu, Xian Guo, Lulu Han, Jianfeng Ma
2024An Efficient and Secure Anonymous Query Protocol.
Wenjv Hu, Yin Li
2024An Experimental Study on Half-Closed TCP Connections in Public Cloud Gateways.
Zhuang Yuan, Rui Li, Fa Zhang, Kejing Xu, Liang Xu, Weizhan Zhang
2024An Intelligent Affinity Strategy for Dynamic Task Scheduling in Cloud-Edge-End Collaboration.
Jingsen Zhang, Shoulu Hou, Yi Gong, Tao Wang, Changyuan Lan, Xiulei Liu
2024An Intelligent Charging Service Selection Scheme Under the Cross-Area Consensus of Blockchain for the IoV.
Shuming Xiong, Junfeng Zhu, Qiqi Xu
2024Analysis of Data Export Business Processes Based on Petri Nets.
Yongqiang Chen, Meiqi Liu, Jingfeng Rong, Xujie Liu, Anmin Fu, Anshun Zhou, Yuqing Zhang
2024Analyzing Relationship Consistency in Digital Forensic Knowledge Graphs with Graph Learning.
Ruoyao Xiao, Yu Luo, Weifeng Xu, Harshmeet Lamba, Dianxiang Xu
2024Analyzing the Effectiveness of Image Preprocessing Defenses Under Runtime Constraints.
Niklas Bunzel, Gerrit Klause
2024Android Malware Detection Technology Based on SC-ViT and Multi-Feature Fusion.
Qiulong Yu, Zhiqiang Wang, Lei Ju, Sicheng Yuan, Ying Zhang
2024Anticipated Failure Determination-based Weakness Analysis with Common Weakness Enumeration.
Toru Sakon
2024AttDet: Attitude Angles-Based UAV GNSS Spoofing Detection.
Luyao Wang, Xiaomin Wei, Hongtao Zhang, Lingtao Jia
2024Attack Data is Not Solely Paramount: A Universal Model Extraction Enhancement Method.
Chuang Liang, Jie Huang
2024Attack-Defense Graph Generation: Instantiating Incident Response Actions on Attack Graphs.
Kéren Saint-Hilaire, Christopher Neal, Frédéric Cuppens, Nora Boulahia-Cuppens, Francesca Bassi
2024Attacking High-Performance SBCs: A Generic Preprocessing Framework for EMA.
Debao Wang, Yiwen Gao, Jingdian Ming, Yongbin Zhou, Xian Huang
2024Attacking High-order Masked Cryptosystem via Deep Learning-based Side-Channel Analysis.
Zelong Zhang, Wei Cheng, Yongbin Zhou, Zehua Qiao, Yuhan Zhao, Jian Weng
2024BGAS: Blockchain and Group Decentralized Identifiers Assisted Authentication Scheme for UAV Networks.
Tingyu Wang, Qiang Cao, Shihong Zou, Yueming Lu
2024BIG: A Practical Framework for Balancing the Conflict Between Group and Individual Fairness in Graph Neural Networks.
Kuan Yan, Dmytro Matsypura, Junbin Gao
2024BWG: An IOC Identification Method for Imbalanced Threat Intelligence Datasets.
Juncheng Lu, Yiyang Zhao, Yan Wang, Jiyuan Cui, Sanfeng Zhang
2024Backdoor Attacks Optimized through Genetic Algorithm-Driven Data Augmentation Combinations in Deep Neural Networks.
Yilun Lyu, Xu Ma, Yuan Ma
2024BedIDS: An Effective Network Anomaly Detection Method by Fusing Behavior Evolution characteristics.
Zhen Liu, Changzhen Hu, Chun Shan, Junkai Yi
2024Behavior Speaks Louder: Rethinking Malware Analysis Beyond Family Classification.
Fei Zhang, Xiaohong Li, Sen Chen, Ruitao Feng
2024Blind Signature Based Anonymous Authentication on Trust for Decentralized Mobile Crowdsourcing.
Wei Feng, Dongyuan Wei, Qianqian Wang
2024Block-Feature Fusion for Privacy-Protected Iris Recognition.
Wiraj Udara Wickramaarachchi, Junwei Zhou, Dongdong Zhao, Jianwen Xiang
2024Boosting Transferability of Adversarial Examples by Joint Training and Dual Feature Mixup.
Mengmeng Tang, Shuhong Chen, Guojun Wang, Hanjun Li, Zhuyi Yao, Sheng Wen
2024Broader but More Efficient: Broad Learning in Power Side-channel Attacks.
Yilin Yang, Changhai Ou, Yongzhuang Wei, Wei Li, Yifan Fan, Xuan Shen
2024Budget-Feasible Double Auction Mechanisms for Model Training Services in Federated Learning Market.
Ting Zhou, Hongtao Lv, Ning Liu, Lei Liu
2024CFB-DSSE: Efficient Secure Dynamic Searchable Encryption Scheme with Conjunctive Search for Smart Healthcare.
Ruiwei Hou, Fucai Zhou, Zongye Zhang, Jiacheng Li, Chongyang Wang
2024CFE: Secure Filtered Words in End-to-End Encrypted Messaging System.
Tran Viet Xuan Phuong, Albert Baker, Philip D. Huff, Jan P. Springer, Tho Thi Ngoc Le
2024CNN-KOA-BiGRU: A high-accuracy APT detection model based on deep learning networks.
Chaoqin Zhang, Maoqi Sun, Guangwu Hu
2024CPCED: a container escape detection system based on CNI plugin.
Yu Hao, Xu Zhang, Dongbin Wang
2024CTWF: Website Fingerprinting Attack based on Compact Convolutional Transformer.
Guangfa Lyu, Jian Kong, Yinglong Chen, Fengyu Wang
2024CVALLM: A Cloud Platform Security Assessment Framework Based on Large Language Models.
Wangyuan Jing, Chi Zhang, Bingbing Zhang, Lingbo Wei
2024CVchain: A Cross-Voting-Based Low Latency Parallel Chain System.
Jianrong Wang, Yacong Ren, Dengcheng Hu, Qi Li, Sen Li, Xuewei Li, Xiulong Liu
2024CaptchaSAM: Segment Anything in Text-based Captchas.
Yijun Wang, Ziyi Zhou, Weiqi Bai, Ruijie Zhao, Xianwen Deng
2024CertRob: Detecting PDF Malware with Certified Adversarial Robustness via Randomization Smoothing.
Lijun Gao, Zheng Yan
2024ClusterX: Adaptive Collaborative Scheduling of Layered User-Proxy Mapping to Enhance DDoS Defense in Distributed Clusters.
Jianbo Lin, Lin Yan, Zhi Lin, Zan Zhou, Shujie Yang
2024Compressed Video Action Recognition Based on Neural Video Compression.
Yuting Mou, Ke Xu, Xinghao Jiang, Tanfeng Sun
2024ConfigKG: Identify Routing Security Issues from Configurations Based on Knowledge Graph.
Pengfei Li, Yujing Liu, Jinshu Su, Bo Yu
2024Construction of Cyber-attack Attribution Framework Based on LLM.
Jingye Zhang, Ken Cheng, Xinli Xiong, Rongcheng Dong, Jun Huang, She Jie
2024Contextual Transformer-based Node Embedding for Vulnerability Detection using Graph Learning.
Joseph Gear, Yue Xu, Ernest Foo, Praveen Gauravaram, Zahra Jadidi, Leonie Simpson
2024Controllable Quantum Computing Privacy via Inherent Noises and Quantum Error Mitigation.
Keyi Ju, Hui Zhong, Xinyue Zhang, Xiaoqi Qin, Miao Pan
2024Correcting the Bound Estimation of Mohawk.
Mingjie Yu, Wei Jin, Fenghua Li, Yunchuan Guo, Zheng Yan, Xiao Wang, Nenghai Yu
2024Cross-platform Network User Alignment Interference Methods Based on Obfuscation Strategy.
Luyao Wang, Yan Liu, Xiaoyu Guo, Ziqi Long, Chunfang Yang
2024Custom Permission Misconfigurations in Android: A Large-Scale Security Analysis.
Rui Li, Wenrui Diao, Debin Gao
2024Cyber Resilience Framework for Web Server.
Wanqiu Zhou, Zheng Zhang, Yuan Yao, Jiang Wang, Jiaxin Ma, Hui Liu
2024Cyber Risk Analysis on Electric Vehicle Systems via NIST CSF.
Spyridon Sourmelis, Weizhi Meng
2024D
Yilong Li, Jianyi Zhang, Ziyin Zhou, Zezheng Sun, Xu Ji, Zeping Li, Jiameng Han, Zhangchi Zhao
2024D
Yaobing Xu, Yunchuan Guo, Wenlong Kou, Junhai Yang, Ziyan Zhou, Fenghua Li
2024DA-CPVD: Vulnerability Detection Method based on Dual Attention Composite Pooling.
Mengxuan Shi, Jinfu Chen, Saihua Cai, Ziyan Liu, Jiapeng Zhou
2024DDF-Net: A Cloud Computing Load Forecasting Method Integrating Spatiotemporal and Time-Frequency Domain Information.
Yingjian Li, Yongsheng Wang, Gang Wang
2024DI-GAE: A Dynamic and Resource-Efficient Attack Detection Framework with Incremental Learning and Graph Autoencoders.
Mengmi Tan, Jianyi Liu, Ru Zhang
2024DMA: A Persistent Threat to Embedded Systems Isolation.
Jean de Bonfils Lavernelle, Pierre-François Bonnefoi, Benoît Gonzalvo, Damien Sauveron
2024DMASP: Dynamic Multi-keyword Searchable Encryption for Protected Access and Search Patterns with Differential Privacy.
Yue Quan, Kai Fan, Haoyang Wang, Hui Li, Yintang Yang
2024DMPA: A Compact and Effective Pipeline for Detecting Multiple Phishing Attacks.
Xiaodong Huang, Gangliang Li, Chengfeng Chen, Shouqiang Liu
2024DPFCIL: Differentially Private Federated Class-Incremental Learning on non-IID Data.
Fuyao Zhang, Dan Wang, Chuyang Liang
2024DTAME: A Interpretable and Efficient Approach for ABAC Policy Mining and Evaluation Using Decision Trees.
Zejun Lan, Jianfeng Guan, Xianming Gao, Tao Feng, Kexian Liu, Jianbang Chen
2024DUDPA-TATD: A Lightweight Privacy-Preserving Anomaly Traffic Detection Method for Edge Computing Scenarios.
Guanghan Li, Wenzhong Yang, Xiaodan Tian, Jiaren Peng
2024Data Privacy-Preserving and Communication Efficient Federated Multilinear Compressed Learning.
Di Xiao, Zhuyan Yang, Maolan Zhang, Lvjun Chen
2024DcChain: A Novel Blockchain Sharding Method Based on Dual-constraint Label Propagating.
Hao Zhou, Pengcheng Xia, Yiyang Ni, Jun Li
2024Decentralized and Lightweight Cross-Chain Transaction Scheme Based on Proxy Re-signature.
Huiying Zou, Jia Duan, Xi Liu, Wei Ren, Tao Li, Xianghan Zheng, Kim-Kwang Raymond Choo
2024Deep Learning-Based DDoS Attack Detection Using Adversarial Optimization.
Dahai Yu, Jianming Cui, Yungang Jia, Peiguo Fu, Ming Liu
2024Deep Reinforcement Learning for Active RIS-Assisted Full-Duplex Integrated Sensing and Communication Systems.
Bingxin Zhang, Kang Zheng, Chao Tong, Kun Yang, Kang Yan
2024Deepfakes: A New Kind of Adversarial Attacks Against Face Recognition Systems?
Raphael Antonius Frick, Lukas Graner
2024Defending Against Backdoor Attacks through Causality-Augmented Diffusion Models for Dataset Purification.
Yuefeng Lai, Lizhao Wu, Hui Lin, Xiaokang Zhou
2024Defending Against Model Poisoning Attacks in Federated Learning via Client-guided Trust.
Xiangxiang Wang, Hui Xia, Yingqi Zhang
2024Design and Implementation of Data Encryption Mechanism in Fiber Channel Network.
Hongke Zhang, Zheng Yan
2024Designing Secret Embedding Scheme Based on Bitcoin Transactions Pattern Controlling.
Zheng Feng, Chunyu Xing, Chen Liang
2024Destruction and Reconstruction Chain: An Adaptive Adversarial Purification Framework.
Zeshan Pang, Shasha Guo, Xuehu Yan, Yuliang Lu
2024Detectable Mislabeling - Can Faulty AI Models be Recognized from Incomplete Memory Traces?
Lukasz Krzywiecki, Tadeusz Kulczycki, Christian Emmanuel Nteranya, Andrzej Stos
2024Detection of Sensitive Information Based on Transient Data in Store Buffer and Cache.
Yan Chang, Yaqin Wu, Jianwu Rui, Ming Cao, Yawei Yue, Yu Feng, Tingting He, Haihui Gao, Zhen Lv
2024Differentially Private Graph Convolutional Networks with Privacy Amplification.
Yifan Sun, Meng Song
2024Discriminating Malware Families using Partitional Clustering.
Pooja Mishra, Paul Black, Adil M. Bagirov, Shaoning Pang
2024Distributed Data Possession - Blockchain Based Scalability.
Bartlomiej Dzikowski, Lukasz Krzywiecki, Ksawery Mozdzynski, Karol Niczyj, Hannes Salin
2024DualConvNet: Enhancing CNN Inference Efficiency Through Compressed Convolutions and Reparameterization.
Haipeng Du, Muyan Jiao, Jiageng Zhang, Xin Lv, Jie Zhang
2024DyCom: A Dynamic Community Partitioning Technique for System Audit Logs.
Zhaoyang Wang, Yanfei Hu, Shuailou Li, Wenbo Wang, Lisong Zhang, Boyang Zhang, Yu Wen, Dan Meng
2024DyGCN: Dynamic Graph Convolution Network-based Anomaly Network Traffic Detection.
Yonghao Gu, Xiaoqing Zhang, Hao Xu, Tiejun Wu
2024Dynamic Differential Privacy in Hierarchical Federated Learning: A Layerwise Adaptive Framework.
Zhongyuan Qin, Dinglian Wang, Minghua Wang
2024EUREKHA: Enhancing User Representation for Key Hackers Identification in Underground Forums.
Abdoul Nasser Hassane Amadou, Anas Motii, Saida Elouardi, El Houcine Bergou
2024EasyDetector: Using Linear Probe to Detect the Provenance of Large Language Models.
Jie Zhang, Jiayuan Li, Haiqiang Fei, Lun Li, Hongsong Zhu
2024EffiTaint: Boosting Sensitive Data Tracking with Accurate Taint Behavior Modeling and Efficient Access Path Optimization.
Haocheng Li, Haipeng Qu, Gaozhou Wang, Xiangjian Ge
2024Efficient DDoS Detection and Mitigation in Cloud Data Centers Using eBPF and XDP.
Ziyue Chen, He Kong, Shuai Ding, Quanfeng Lv, Guo Wei
2024Efficient FSS-based Private Statistics for Traffic Monitoring.
Zhichao Wang, Qi Feng, Min Luo, Xiaolin Yang, Zizhong Wei
2024Efficient Multi-subset Fine-grained Authorization PSI over Outsourced Encrypted Datasets.
Jinlong Zheng, Jia-Nan Liu, Minhua Su, Dingcheng Li, Kai He, Xueqiao Liu
2024Efficient and Accurate Min-entropy Estimation Based on Decision Tree for Random Number Generators.
Yuan Ma, Maosen Sun, Wei Wang, Tianyu Chen, Na Lv, Dongchi Han
2024Efficient and Practical Multi-party Private Set Intersection Cardinality Protocol.
Shengzhe Meng, Xiaodong Wang, Zijie Lu, Bei Liang
2024Efficient and Secure Federated Learning via Enhanced Quantization and Encryption.
Chengming Zhang, Bo Tang, Yifan Bian, Bingtao Han, Yongcheng Wang, Tao Liu
2024Efficient and Verifiable Dynamic Skyline Queries in Blockchain Networks.
Bo Yin, Hang Chen, Binyao Xu, Mariam Suleiman Silima, Ke Gu
2024Efficiently Detecting DDoS in Heterogeneous Networks: A Parameter-Compressed Vertical Federated Learning approach.
Cao Chen, Fenghua Li, Yunchuan Guo, Zifu Li, Wenlong Kou
2024Enabling Robust Android Malicious Packet Capturing and Detection via Android Kernel.
Mingyang Li, Weina Niu, Xinglong Chen, Jiacheng Gong, Kegang Hao, Xiaosong Zhang
2024End-To-End Speaker Anonymization Based on Location-Variable Convolution and Multi-Head Self-Attention.
Feiyu Zhao, Jianguo Wei, Wenhuan Lu, Yongwei Li
2024Enhanced Privacy Policy Comprehension via Pre-trained and Retrieval-Augmented Models.
Xin Zhang, Bingbing Zhang, Chi Zhang, Lingbo Wei
2024Enhancing Adversarial Robustness through Self-Supervised Confidence-Based Denoising.
Yongkang Chen, Tong Wang, Wei Kong, Taotao Gu, Guiling Cao, Xiaohui Kuang
2024Enhancing Consistency in Container Migration via TEE: A Secure Architecture.
Qingyu Gao, Liantao Song, Yan Lei, Feng Wang, Lei Wang, Shize Zong, Yan Ding
2024Enhancing Graph-Based Vulnerability Detection through Standardized Deep Learning Pipelines.
Jiashun Hao, Young-Woo Kwon
2024Enhancing Higher-Order Masking: A Faster and Secure Implementation to Mitigate Bit Interaction Leakage.
Jiahao Zhang, Yuejun Liu, Jingdian Ming, Yiwen Gao, Yongbin Zhou, Debao Wang
2024Enhancing IoT Privacy: Why DNS-over-HTTPS Alone Falls Short?
Samuel Pélissier, Gianluca Anselmi, Abhishek Kumar Mishra, Anna Maria Mandalari, Mathieu Cunche
2024Enhancing Privacy-Preserving Multi-Authority Attribute-Based Encryption: Addressing Rogue-Key Attacks Under Adaptive Corruption of Authorities.
Jingchi Zhang, Anwitaman Datta
2024Enhancing Security and Efficiency in Vehicle-to-Sensor Authentication: A Multi-Factor Approach with Cloud Assistance.
Xinrui Zhang, Pincan Zhao, Jason Jaskolka
2024Enhancing Security and Privacy in Connected and Autonomous Vehicles: A Post-Quantum Revocable Ring Signature Approach.
Qingmei Yang, Pincan Zhao, Yuchuan Fu, F. Richard Yu
2024Evaluating Web-Based Privacy Controls: A User Study on Expectations and Preferences.
Yuemeng Yin, Rahat Masood, Suranga Seneviratne, Aruna Seneviratne
2024Exploring Permission Control Flaws in Mini-apps.
Jun Li, Yuting Zhang, Wu Zhou, Shengzhi Zhang
2024FCADD: Robust Watermarking Resisting JPEG Compression with Frequency Channel Attention and Distortion De-gradient.
Dong Yang, Weihai Li, Zikai Xu, Zhiling Zhang, Yiling Chen
2024FCSec: An Open-source Testbed for Security Evaluation on UAV Communications.
Indu Chandran, Mukesh Narayana Gadde, Kizheppatt Vipin
2024FD-WF: A Multi-tab Website Fingerprinting Attack Based on Fixed Dimensions for Tor Network.
Ruizhe Zhang, Shangnan Yin, Jinfu Chen
2024FMTD: Federated Learning-Based Multi-Angle Feature Fusion Framework for Abnormal Transaction Detection in Digital Currency.
Yaru Lv, Lijun Sun, Xiao Chen
2024FREDet: Fine-Grained Malicious Traffic Detection Based on Frequency Domain Features.
Zekai Song, Yunpeng Li, Jian Qin, Changzhi Zhao, Dongxu Han, Yuling Liu
2024Face Anti-spoofing based on Multi-modal Dual-stream Anomaly Detection.
Jiuyao Jing, Yu Zheng, Qi He, Chunlei Peng
2024FedNIFW: Non-Interfering Fragmented Watermarking for Federated Deep Neural Network.
Haiyu Deng, Xiaocui Dang, Yanna Jiang, Xu Wang, Guangsheng Yu, Wei Ni, Ren Ping Liu
2024FedSGProx: Mitigating Data Heterogeneity and Isolated Nodes in Graph Federated Learning.
Xutao Meng, Qingming Li, Yong Li, Li Zhou, Xiaoran Yan
2024Federated Knowledge-enhanced Graph Attention Network for Privacy-preserving Social Recommendation.
Xiaofei Hao, Liyuan Liu, Yimeng Wang, Fengyu Li, Wanqing Wu
2024Federated Learning Greedy Aggregation Optimization for Non-Independently Identically Distributed Data.
Bosong Zhang, Qian Sun, Hai Wang, Linna Zhang, Danyang Li
2024Federated Unlearning for Samples Based on Adaptive Gradient Ascent of Angles.
Ying Hua, Hui Xia, Shuo Xu
2024Fedfair: A Debiasing Algorithm for Federated Learning Systems.
Haibin Zheng, TianXin Zhang, Jinyin Chen
2024Few-shot Encrypted Malicious Traffic Classification via Hierarchical Semantics and Adaptive Prototype Learning.
Yuan Zhao, Chunhe Xia, Tianbo Wang, Mengyao Liu, Yang Li
2024FlexiContracts: A Novel and Efficient Scheme for Upgrading Smart Contracts in Ethereum Blockchain.
Tahrim Hossain, Sakib Hassan, Faisal Haque Bappy, Muhammad Nur Yanhaona, Sarker T. Ahmed Rumee, Moinul Islam Zaber, Tariqul Islam
2024Fraud Detection in Supply Chain Order Management via Kolmogorov-Arnold Networks.
Haowei Huo, Ting Lv, Ningbo Zhao, Gefan Ai, Qi He, Ying Kong, Yu Zhang, Yiwei Li, Jiangyao Wei, Chen Liu, Yuan Liu, Lichuan Ma
2024From Data to Action: CTI Analysis and ATT&CK Technique Correlation.
Khanh-Duy Nguyen, Hsi-Ching Chu, Quoc-Viet Nguyen, Min-Te Sun, Kazuya Sakai, Wei-Shinn Ku
2024From Liberty to 1984: A Methodology for Systematically Deteriorating LLM Outputs through Habituation Tendencies.
Dong Zhang, Zhiyuan Hu, Huijun Chen, Guangming Liu, YinFeng Zheng, Jinghui Lu
2024From Scarcity to Clarity: Few-Shot Learning for DoH Tunnel Detection Through Prototypical Network.
Beibei Feng, Qi Wang, Xiaolin Xu, Yijing Wang, Tianning Zang, Jingrun Ma
2024Front-running Attacks in Hash-Based Transaction Sharding Blockchains.
Yusen Wang, Jiong Lou, Zihan Wang, Jie Li
2024FusTP-FL: Enhancing Differential Federated Learning through Personalized Layers and Data Transformation.
Xiong Yan, Kedong Yan, Chanying Huang, Dan Yin, Shan Xiao
2024GTree: GPU-friendly Privacy-preserving Decision Tree Training and Inference.
Qifan Wang, Shujie Cui, Lei Zhou, Ye Dong, Jianli Bai, Yun Sing Koh, Giovanni Russello
2024GeMuFuzz: Integrating Generative and Mutational Fuzzing with Deep Learning.
Zheng Zhang, Rui Ma, Yuqi Zhai, Yuche Yang, Siqi Zhao, Hongming Chen
2024GraySniffer: A Cliques Discovering Method for Illegal SIM Card Vendor Based on Multi-Source Data.
Tao Leng, Chang You, Shuangchun Luo, Junyi Liu, Yutong Zeng, Cheng Huang
2024HFI: High-Frequency Component Injection based Invisible Image Backdoor Attack.
Huanlai Xing, Xuxu Li, Jing Song, Lexi Xu, Jincheng Peng, Bowen Zhao, Li Feng
2024HFL-AD: A Hierarchical Federated Learning Framework for Solving Data Contamination in DDoS Detection.
Haishi Huang, Jiaping Gui, Jianan Hong, Cunqing Hua
2024HTV: Measuring Circuit Vulnerability to Hardware Trojan Insertion Based on Node Co-activation Analysis.
Shuiliang Chai, Zhanhui Shi, Yanjiao Gao, Yuhao Huang, Aizhu Liu, Jie Xiao
2024Hardware Latency-Aware Differential Architecture Search: Search for Latency-Friendly Architectures on Different Hardware.
Jiaqi Han, Dan Wang, Hong Luo, Ye Zhou, Bin Song
2024Hardware assisted security gateway system: combined with FPGA shielding protection.
Jihong Liu, Chenyang Tu, Yifei Zhang
2024Hierarchical Graph Feature Extraction Based on Multi-Information Contract Graph for Enhanced Smart Contract Vulnerability Detection.
Tao Fang, Zhihao Hou, Jiahao He, Junjie Zhou, Gansen Zhao
2024High-Capacity and High-Security Data Hiding in Encrypted Image Using Image Filtering and Image Blocking.
Yanpeng Xiang, Tao Zhang, Jiahao Liu, Xinbo Zhang, Yu Zhang
2024Honeybee-RS: Enhancing Trust through Lightweight Result Validation in Mobile Crowd Computing.
Sanjay Segu Nagesh, Niroshinie Fernando, Seng W. Loke, Azadeh Ghari Neiat, Pubudu N. Pathirana
2024Human Action Recognition by Invisible Sensing with the Constraint of Privacy Preservation.
Jun Guo, Minjuan Sun, Weiwei Zhang, Baoying Liu, Anwen Wang, Li Liu
2024Improved Packet-Level Synthetic Network Traffic Generation.
Jacob Soper, Yue Xu, Ernest Foo, Zahra Jadidi, Kien Nguyen Thanh
2024Improved Rectangle and Linear Attacks on Lightweight Block Cipher WARP.
Yaxin Cui, Hong Xu, Zhichao Xu
2024Improving Security in Internet of Medical Things through Hierarchical Cyberattacks Classification.
Vince Noort, Nhien-An Le-Khac, Hong-Hanh Nguyen-Le
2024Individual Fair Density-Peaks Clustering Based on Local Similar Center Graph and Similar Decision Matrix.
Yiding Tang, Zhijing Yang, Yufan Peng, Hui Zhang
2024Interactive Verifiable Local Differential Privacy Protocols for Mean Estimation.
Liang Wang, Li Liu, Pei Zhan, Peng Tang, Puwen Wei, Shanqing Guo
2024Investigating Patterns of Adversarial Techniques for Cyberattack Forensics.
Liming Lu, Zhenlin Yu, Peter Kok Keong Loh, Tuhin Isfaque Al Kaderi
2024IoT Device Fingerprinting From Periodic Traffic Using Locality-Sensitive Hashing.
Jianhui Ming, Weiping Wang, Linlin Zhang, Yingjie Hu, Shigeng Zhang
2024IoT Vulnerability Detection using Featureless LLM CyBert Model.
Sarah Binhulayyil, Shancang Li, Neetesh Saxena
2024JasFree: Grammar-free Program Analysis for JavaScript Bytecode.
Hao Jiang, Haiwei Lai, Si Wu, Baojian Hua
2024LAPAID: A Lightweight, Adaptive and Perspicacious Active Intrusion Detection Method on Network Traffic Streams.
Bin Li, Li Cheng, Zhongshan Zhang, Yu Pan, Feng Yao, Renjie He
2024LLM4MDG: Leveraging Large Language Model to Construct Microservices Dependency Graph.
Jiekang Hu, Yakai Li, Zhaoxi Xiang, Luping Ma, Xiaoqi Jia, Qingjia Huang
2024LLMUZZ: LLM-based seed optimization for black-box device fuzzing.
Guangming Gao, Shuitao Gan, Xiaofeng Wang, Shengkai Zhu
2024LSD Attack: Exploiting Inconsistencies between Design and Implementation of Ethereum Protocols.
Chenyu Li, Xiu Zhang, Xueping Liang, Xiaorui Gong
2024LSTM-Diff: A Data Generation Method for Imbalanced Insider Threat Detection.
Tian Tian, Yan Zhu, Ning An, Bo Jiang, Huamin Feng, Zhigang Lu
2024Large Language Model and Behaviour Tree Based Real-World Test Scenario Generation for Autonomous Vehicles.
Yuliang Li, Zhonglin Hou, Hong Liu
2024Large-Scale Thermo-Hydraulic Analysis of Fuel Rod Bundles Based on YH-ACT.
Min Song, Chao Li, Xiaowei Guo, Jie Liu, Huajian Zhang, Rui Xia
2024Lattice-based Multi-Stage Secret Sharing 3D Secure Encryption Scheme.
Xu Li, Yinghao Wu, Yang Liu, Baosheng Wang, Bei Wang, Yijun Cui
2024LayyerX: Unveiling the Hidden Layers of DoH Server via Differential Fingerprinting.
Yunyang Qin, Yujia Zhu, Linkang Zhang, Baiyang Li, Yong Ding, Qingyun Liu
2024Learning Robust and Repeatable Physical Camouflage for Aerial Object Detectors.
Zilong He, Hua Zhang
2024Leveraging Large Language Models for Challenge Solving in Capture-the-Flag.
Yuwen Zou, Yang Hong, Jingyi Xu, Lekun Liu, Wenjun Fan
2024Leveraging Semi-supervised Learning for Enhancing Anomaly-based IDS in Automotive Ethernet.
Jia Liu, Wenjun Fan, Yifan Dai, Enggee Lim, Zhoujin Pan, Alexei Lisitsa
2024LightRL-AD: A Lightweight Online Reinforcement Learning Approach for Autonomous Defense against Network Attacks.
Fengyuan Shi, Zhou Zhou, Jiang Guo, Renjie Li, Zhongyi Zhang, Shu Li, Qingyun Liu, Xiuguo Bao
2024Lightweight Leakage-Resilient Authenticated Key Exchange for Industrial Internet of Things.
Wenxin Jia, Zheng Yang, Zhiqiang Ma
2024Local Drift Correction and Attention Aggregation for Self-Organized Federated Learning.
Haiying Liu, Ruichun Gu, Jingyu Wang, Xiaolin Zhang, Bolin Zhang, Xuebao Li
2024LogContrast: Log-based Anomaly Detection Using BERT and Contrastive Learning.
Wei Yuan, Hongyu Sun, Mo Pang, He Wang, Gaofei Wu, Yuqing Zhang
2024Long-Term Privacy-Preserving Incentive Scheme Design for Federated Learning.
Xin Liu, Rui Wang, Pengfeng Zhang, Liang Xie, Yiliang Liu, Zhou Su, Donglan Liu, Yingxian Chang
2024M-ETC: Improving Multi-Task Encrypted Traffic Classification by Reducing Inter-Task Interference.
Yuwei Xu, Xiaotian Fang, Zhengxin Xu, Kehui Song, Yali Yuan, Guang Cheng
2024MARS: Robustness Certification for Deep Network Intrusion Detectors via Multi-Order Adaptive Randomized Smoothing.
Mengdie Huang, Yingjun Lin, Xiaofeng Chen, Elisa Bertino
2024MAXPOWR: Memory Attestation and Export in Process-based Trusted Execution Environments.
Hendrik Meyer zum Felde, Andrei-Cosmin Aprodu
2024MIND: A Privacy-Preserving Model Inference Framework via End-Cloud Collaboration.
Siyuan Guan, Ziheng Hu, Guotao Xu, Yao Zhu, Bowen Zhao
2024MSMP: A Centralized Shared-memory Management for Building Efficient and Reliable File Systems on Microkernels.
Feng He, Shijun Zhao, Dan Meng, Rui Hou
2024MT-Index: A Trustworthy Index For Multimodal Data Sharing.
Qianyue Fan, Shiqian Wang, Zhe Feng, Li Di
2024MVSS: Blockchain Cross-shard Account Migration Based on Multi-version State Synchronization.
Weihan Wang, Xiulong Liu, Liyuan Ma, Hao Xu, Gaowei Shi, Juncheng Ma, Keqiu Li
2024Machine Learning Enhanced Indoor Positioning with RIS-aided Channel Configuration and Analysis.
Yanhong Xu, Zhao Li, Ziru Zhao, Blaise Herroine Aguenoukoun, Jia Liu, Zhixian Chang, Yicheng Liu
2024Machine Learning-Based Power Allocation Optimization Algorithm for Enhanced CR-NOMA Network.
Yu Fu, Bingcai Chen, Qian Ning, Kai Lin
2024Machine Learning-based Optimal Data Trading Mechanism with Randomized Privacy Protection Scheme.
Xiaohong Wu, Yujun Lin, Jie Tao, Yonggen Gu
2024Maldet: An Automated Malicious npm Package Detector Based on Behavior Characteristics and Attack Vectors.
Yu Zhang, Haipeng Qu, Lingyun Ying, Linghui Wang
2024Malware Traffic Classification Based on Multidimensional Features Learning.
Yijie Huang, Wei Ding, Mian Huang
2024Membership Inference Attacks via Dynamic Adversarial Perturbations Reduction.
Zehua Ding, Youliang Tian, Guorong Wang, Jinbo Xiong, Jianfeng Ma
2024Model-based Data Markets: A Multi-Broker Game Theoretic Approach.
Yizhou Ma, Xikun Jiang, Evan W. Wu, Luis-Daniel Ibáñez, Jian Shi
2024Modelling GDPR-compliance based on Defeasible Logic Reasoning: Insights from Time Complexity Perspective
Naila Azam, Alex Chak, Anna Lito Michala, Shuja Ansari, Nguyen Binh Truong
2024Multi-Authority Ciphertext-Policy Attribute-based Encryption with Hidden Policy for Securing Internet-of-Vehicles.
Jie Cui, Jing Zhang, Lu Wei, Minghui Zhu, Hong Zhong, Geyong Min
2024Multi-Channel Leakage Detection Based on χ
Xiaoyong Kou, Wei Yang, Peijin Cong, Gongxuan Zhang
2024Multi-Dimensional Data Collection Under Personalized Local Differential Privacy.
Kunpeng Song, Mingzhang Sun, Kui Zhou, Peng Tang, Ning Wang, Shanqing Guo
2024Multi-Scale Fuzzy Graph Convolutional Network for Hyperspectral Image Classification.
Mingxin Jin, Cong Wang, Shanglin Yang, Heng Wang, Ju Huang, Jun Zhao
2024Multi-sensor Fusion-based Cow Health Monitoring IoT System.
Zhenyu Lai, Yijia Xu, Jialei Zhang, Bowen Jia, Liangyan Wang, Qinglei Bu, Jie Sun, Quan Zhang
2024Multiplicative Masked M&M: An Attempt at Combined Countermeasures with Reduced Randomness.
Kaiyuan Li, Haruka Hirata, Daiki Miyahara, Kazuo Sakiyama, Yuko Hara, Yang Li
2024NAGG: Noised graph node feature aggregations for preserving privacy.
Yinghao Song, Long Yan, Yang Li, Mingjian Ni, Shengzhong Tan, Dazhong Li, Huiting Zhao, Yulun Song
2024NLP and Neural Networks for Insider Threat Detection.
Neda Baghalizadeh-Moghadam, Christopher Neal, Frédéric Cuppens, Nora Boulahia-Cuppens
2024Navigating Time's Possibilities: Plausible Counterfactual Explanations for Multivariate Time-Series Forecast through Genetic Algorithms.
Gianlucca L. Zuin, Adriano Veloso
2024Network Traffic Anomaly Detection Method Based on CTA-BiLSTM.
Wenlong Liu, Bin Wen, Mengshuai Ma, Wanrong Du
2024New Compact Construction of FHE from Cyclic Algebra LWE.
Yuan Liu, Licheng Wang, Yongbin Zhou
2024OFLGI: An Optimization-based Feature-Level Gradient Inversion Attack.
Yongwei Lu, Xiaoyan Liang, Ruizhong Du, Junfeng Tian
2024OHSS: Optimizing Homomorphic Secret Sharing to Support Fast Matrix Multiplication.
Shuguang Zhang, Jianli Bai, Kun Tu, Ziyue Yin, Chan Liu
2024OSN Bots Traffic Transformer : MAE-Based Multimodal Social Bots Behavior Pattern Mining.
Haonan Zhai, Ruiqi Liang, Zhenzhen Li, Zhen Li, Wei Xia, Bingxu Wang, Qingya Yang
2024Orchestrating Security Protection Resource for Space-Ground Integrated Networks.
Dongbin Chen, Yunchuan Guo, Xiao Wang, Fenghua Li, Zifu Li
2024Paa-Tee: A Practical Adversarial Attack on Thermal Infrared Detectors with Temperature and Pose Adaptability.
Zhangchi Zhao, Jianyi Zhang, Liqun Shan, Ziyin Zhou, Kaiying Han, Xiali Hei
2024Path Generation Method of Anti-Tracking Network based on Dynamic Asymmetric Hierarchical Architecture.
Zhefeng Nan, Qi Wang, Changbo Tian, Yijing Wang, Tianning Zang, Dongwei Zhu
2024Payload Level Anomaly Network Traffic Detection via Semi-Supervised Contrastive Learning.
Xinglin Lian, Yang Liu, Shanfeng Wang, Yu Zheng
2024Peering Through the Veil: A Segment-Based Approach for VPN Encapsulated Video Title Identification.
Zhenyu Xu, Xurui Ren, Yi Zhang, Guang Cheng, Hua Wu
2024Perturbing Vulnerable Bytes in Packets to Generate Adversarial Samples Resisting DNN-Based Traffic Monitoring.
Jie Cao, Zhengxin Xu, Yunpeng Bai, Yuwei Xu, Qiao Xiang, Guang Cheng
2024Phase Shift Matrix Optimization and Channel Quantization Alternating in RIS-Assisted Physical Layer Key Generation.
Liquan Chen, Yufan Song, Wanting Ma, Tianyu Lu, Peng Zhang
2024Privacy Leak Detection in LLM Interactions with a User-Centric Approach.
Tan Su, Bingbing Zhang, Chi Zhang, Lingbo Wei
2024Privacy Preservation in Cloud-Based Distributed Learning through Data Encoding and Partitioning.
Lukasz Krzywiecki, Krzysztof Szymaniak, Marcin Zawada
2024Privacy-Preserving Multi-Soft Biometrics through Generative Adversarial Networks with Chaotic Encryption.
Hongying Zheng, Hongdie Li, Di Xiao, Maolan Zhang
2024Privacy-Preserving Real-Time Gesture Recognition using Cloud-Trained Neural Networks.
Kewin Ignasiak, Wojciech Kowalczyk, Lukasz Krzywiecki, Mateusz Nasewicz, Hannes Salin, Marcin Zawada
2024Privacy-Preserving Secure Neighbor Discovery for Wireless Networks.
Ahmed Mohamed Hussain, Panos Papadimitratos
2024Privacy-aware data aggregation using Functional Encryption.
Sehrish Shafeeq, Mathias Fischer
2024Private Data Aggregation Enabling Verifiable Multisubset Dynamic Billing in Smart Grids.
Qian Yang, Chen Wang, Jian Shen, Yi Li, Dengzhi Liu
2024RAG-based Cyber Threat Tracing Graph Modeling Method.
Jong-Hee Jeon, Jahoon Koo, Young-Gab Kim
2024ROSE
Jinquan Nie, Lejun Ji, Yirui Jiang, Young Ma, Yuanlong Cao
2024RPG-Diff: Precise Adversarial Defense Based on Regional Positioning Guidance.
Haotian Wang, Jing Liu
2024RTM-CMD: Exploring Advanced Underground Target Detection in Coal Mines through Modified RTMDET Methodology.
Longlong Gao, Tao Xue, Long Xi
2024RTS: A Training-time Backdoor Defense Strategy Based on Weight Residual Tendency.
Fan Xiang, Xueyang Li, Guozhu Meng
2024Rabbit: Secure Encrypted Property Graph Search Scheme Supporting Data and Key Updates.
Yingying Wu, Jiabei Wang, Dandan Xu, Yongbin Zhou, Yang Wang
2024Real-time Private Data Aggregation over Distributed Spatial-temporal Infinite Streams with Local Differential Privacy.
Xingxing Xiong, Shubo Liu, Xiping Liu, Xiaoguang Niu, Wenyu You
2024Red Team Redemption: A Structured Comparison of Open-Source Tools for Adversary Emulation.
Max Landauer, Klaus Mayer, Florian Skopik, Markus Wurzenberger, Manuel Kern
2024Research on Adaptive Attention Dense Network Structure in Camera Source Recognition Method.
Haoxuan Wu, Zhiqiang Wen
2024Research on Energy Management Strategy of Microgrid Based on Improved Deep Q network Algorithm.
Le Tian, ChangShen Ou, Weilin Huang
2024Research on Intelligent Joint Detection Technology for Application Privacy Behavior Compliance.
Ruoding Zhang, Tao Liu, Qifeng Shi, Yan Zhang, Xiaoyi Song, Xinrui Geng
2024Research on Lifecycle-Driven Government Data Security Model and Data Grouping Technology.
Siyu Chen, Jingfeng Rong, Zhiyuan Fu, Qiuling Yue, Anmin Fu, Xujie Liu, Anshun Zhou, Yuqing Zhang
2024Research on Toxic Speech Detection Based on Large Language Models.
Weihao Li, Yongbing Gao, Yu Zhang, Lidong Yang, Ruiping Gao
2024Research on distributed machine learning defence strategies under Byzantine attacks.
Chen Jin, Xi Chen, Junyu Pu, Boyu Fan
2024Rethinking Mutation Strategies in Fuzzing Smart Contracts.
Jingzhang Cao, Meng Wang, Shenao Lin
2024Risk Assessment Based on Dataflow Dynamic Hypergraph for Cross-Border Data Transfer.
Zhou Fang, Kai Zhang, Yigang Diao, Yixuan Song, Yanwei Sun, Jinqiao Shi
2024Robust Hardware Trojan Detection: Conventional Machine Learning vs. Graph Learning Approaches.
Liang Hong, Xingguo Guo, Zeyar Aung, Wei Hu
2024Robust purification defense for transfer attacks based on probabilistic scheduling algorithm of pre-trained models: A model difference perspective.
Xinlei Liu, Jichao Xie, Tao Hu, Hailong Ma, Baolin Li, Peng Yi, Zhen Zhang
2024SAMOC: Enabling Atomic Invocations for Cross-chain Crowdsourcing Testing DApps in Industrial Control Through Trusted Smart Community and Lock Mechanism.
Weiguo Huang, Yong Ding, Jun Li, Yujue Wang, Hai Liang, Changsong Yang
2024SBCM: Semantic-Driven Reverse Engineering Framework for Binary Code Modularization.
Shuang Duan, Hui Shu, Zihan Sha, Yuyao Huang
2024SBOM Generation Tools in the Python Ecosystem: an In-Detail Analysis.
Serena Cofano, Giacomo Benedetti, Matteo Dell'Amico
2024SCENE: Shape-based Clustering for Enhanced Noise-resilient Encrypted Traffic Classification.
Meijie Du, Mingqi Hu, Shu Li, Zhao Li, Qingyun Liu
2024SGCML: Detecting Hacker Community Hidden in Chat Group.
Tao Leng, Junyi Liu, Zhen Yang, Chang You, Yutong Zeng, Cheng Huang
2024SP
Mingjun Wang, Yixuan Liu, Wenxiu Ding
2024SPDID: A Secure and Privacy-Preserving Decentralized Identity utilizing Blockchain and PUF.
Yueyue He, Wenxuan Fan, Koji Inoue
2024SSC-IDS: A Robust In-vehicle Intrusion Detection System Based on Self-Supervised Contrastive Learning.
Zhuoqun Xia, Yongbin Yu, Jingjing Tan, Kejun Long
2024STGCN-Based Link Flooding Attack Detection and Mitigation in Software-Defined Network.
Yue Li, Runcheng Fang, Qipeng Song, Xilei Yang
2024Scalable Client-side Encrypted Deduplication beyond Secret Sharing of the Master Key.
Yuchen Chen, Guanxiong Ha, Xuan Shan, Chunfu Jia, Qiaowen Jia
2024SeChannel: A Secure and Lightweight Channel Protection Approach for TEE Systems.
Nan Jiang, Yuanbo Zhao, Qihang Zhou, Xiaoqi Jia, Jing Tang
2024Sec-Reduce: Secure Reduction of Redundant and Similar Data for Cloud Storage based on Zero-Knowledge Proof.
Zhihuan Yang, Wenlong Tian, Emma Zhang, Zhiyong Xu
2024Secure Federated Learning Schemes Based on Multi-Key Homomorphic Encryption.
Wenxiu Ding, Hongjiang Guo, Zheng Yan, Mingjun Wang
2024Secure Join and Compute in Encrypted Database.
Tanusree Parbat, Ayantika Chatterjee
2024Secure Microwave QR Code Communication Using Pseudo-Random Constellation Rotation.
Chunpeng Guo, Beiyuan Liu, Zeyang Sun, Chen Chen, Sai Xu
2024SecureNet-AWMI: Safeguarding Network with Optimal Feature Selection Algorithm.
Ming Zhou, Zhijian Zheng, Peng Zhang, Sixue Lu, Yamin Xie, Zhongfeng Jin
2024Security Assessment of Customizations in Android Smartwatch Firmware.
Yifan Yu, Ruoyan Lin, Shuang Li, Qinsheng Hou, Peng Tang, Wenrui Diao
2024Security Enhancement of UAV Swarm Empowered Downlink Transmission with Integrated Sensing and Communication.
Runze Dong, Buhong Wang, Jiang Weng, Kunrui Cao, Jiwei Tian, Tianhao Cheng
2024Shapley-value-based Explanations for Cryptocurrency Blacklist Detection.
Feixue Yan, Sheng Wen, Yang Xiang, Shiping Chen
2024Shield-U: Safeguarding Traffic Sign Recognition Against Perturbation Attacks.
Shengmin Xu, Jianfei Sun, Hangcheng Cao, Yulan Gao, Ziyang He, Cong Wu
2024Signcryption based on Elliptic Curve CL-PKC for Low Earth Orbit Satellite Security Networking.
Meiling Chen, Yuanyuan Yang, Sixu Guo, Jin Cao, Haitao Du, Li Su
2024SimLog: System Log Anomaly Detection Method Based on Simhash.
Weiping Wang, Huijuan Wang, Yulu Hong, Chenyu Wang, Hong Song, Shigeng Zhang
2024Single-sign-on Authentication with Anonymous Token and Restricted Covert Channel.
Zhao Zhang, Chunxiang Xu, Man Ho Allen Au
2024Smart Contract-Based Auditing of Edge Data for Vehicular Networks.
Yu Zhao, Yangguang Tian, Chunbo Wang, Xiaoqiang Di, Hui Qi
2024Sparse Silhouette Jump: Adversarial Attack Targeted at Binary Image for Gait Privacy Protection.
Jiayi Li, Ke Xu, Xinghao Jiang, Tanfeng Sun
2024StegaFDS: Generative Steganography Based on First-Order DPM-Solver.
Chengyu Li, Weihai Li, Zikai Xu, Nenghai Yu
2024StegoFL: Using Steganography and Federated Learning to Transmit Malware.
Rong Wang, Junchuan Liang, Haiting Jiang, Chaosheng Feng, Chin-Chen Chang
2024StrucTrans: Zero-Query Structural Adversarial Attack Transferred from Masked Autoencoders to Image Classifiers.
Yi Ji, Isao Echizen
2024Sustainable and Trusted Vehicular Energy Trading Enabled by Scalable Blockchains.
Qingmei Yang, Lijun Sun, Xiao Chen, Lingling Wang
2024SyntaxBridge: Protocol Description Transformer for Enhanced Formal Analysis of Security Protocols.
Liujia Cai, Tong Yu, Yumeng Li, Siqi Lu, Hanjie Dong, Guangying Cai, Guangsong Li, Yongjuan Wang
2024T-ABE: A practical ABE scheme to provide trustworthy key hosting on untrustworthy cloud.
Shuaishuai Chang, Yuzhe Li, Jinchao Zhang, Bo Li
2024THEF: A Privacy-Preserving Framework for Transformer Inference leveraging HE and TEE.
Zehao Li, Jiachun Liao, Jinhao Yu, Lei Zhang
2024TOScorr: Transformer-based Flow Correlation Attack on Tor Onion Service.
Yilin Zhu, Guang Cheng, Shunyu Zheng, Hantao Mei
2024TTFL: Towards Trustworthy Federated Learning with Arm Confidential Computing.
Lizhi Sun, Jingzhou Zhu, Boyu Chang, Yixin Xu, Bo Yang, Hao Wu, Fengyuan Xu, Sheng Zhong
2024TWCF: Trust Weighted Collaborative Filtering based on Quantitative Modeling of Trust.
Wenting Song, K. Suzanne Barber
2024Three-Body Problem: An Empirical Study on Smartphone-based TEEs, TEE-based Apps, and their Interactions.
Xianghui Dong, Yin Liu, Xuejun Yu
2024Tibetan microblogging user data analysis and topic identification.
Guixian Xu, Wenhui Gao
2024TierFlow: A Pipelined Layered BFT Consensus Protocol for Large-Scale Blockchain.
Yongkang Yu, Jinchun He, Xinwei Xu, Qinnan Zhang, Wangjie Qiu, Hongwei Zheng, Binghui Guo, Jin Dong
2024Topic-Aware Sensitive Information Detection in Chinese Large Language Model.
Yalin Sun, Ruiying Lu, Kang Li, Yu Zheng
2024Toward Privacy-Preserving and Verifiable XGBoost Training for Horizontal Federated Learning.
Wei Xu, Hui Zhu, Chang Xiao, Fengwei Wang, Dengguo Feng, Hui Li
2024Towards High-Quality Electromagnetic Leakage Acquisition in Side-Channel Analysis.
Xiaoran Huang, Yiwen Gao, Wei Cheng, Yuejun Liu, Jingdian Ming, Yongbin Zhou, Jian Weng
2024Towards Privacy-aware IoT Communications: Delegable, Revocable, and Efficient.
Pengfei Wu, Jianfei Sun, Guomin Yang, Robert H. Deng
2024Towards Securing ASCON Implementation by Inner Product Masking.
Yuming Liu, Wei Cheng, Jihao Fan, Yongbin Zhou
2024Towards Understanding and Detecting File Types in Encrypted Files for Law Enforcement Applications.
Adam L. Hooker, Wenjian Huang, Shalini Kapali Kurumathur, Nishant Vishwamitra, Kim-Kwang Raymond Choo
2024Towards a Robust Medical Record System: Integrating Logical Reasoning for Trustworthy Data Management.
Hanning Zhang, Guansheng Wang, Junwei Feng, Lei Feng, Quan Gan, Long Ji
2024Traceable AI-driven Avatars Using Multi-factors of Physical World and Metaverse.
Kedi Yang, Zhenyong Zhang, Youliang Tian
2024TransFront: Bi-path Feature Fusion for Detecting Front-running Attack in Decentralized Finance.
Yuheng Zhang, Guojun Wang, Peiqiang Li, Xubin Li, Wanyi Gu, Mingfei Chen, Houji Chen
2024Transfer Learning-Based Robust Insider Threat Detection.
Yujun Kim, Deok-Han Kim, Young-Gab Kim
2024TriViewNet: Achieve Accurate Tor Hidden Service Classification by Multi-View Feature Extraction and Fusion.
Yuwei Xu, Jiangfeng Li, Yujie Hou, Xinxu Huang, Yali Yuan, Guang Cheng
2024Trust Evaluation in Mobile Crowd Sensing Networks Based on Age of Trust (AoT).
Xiayue Wang, Mingyang Li, Yuting Tao, Xuanzhe Wang, Hao Wu
2024TrustNotify: A Lightweight Framework for Complete and Trustworthy Data Deletion Notification Distribution.
Qipeng Song, Ruiyun Wang, Yue Li, Yiheng Yan, Xingyue Zhu, Hui Li
2024Trusted Networking for Drones: Reputation-Based Security Mechanisms for Node Access and Information Synchronization.
Ruizhong Du, Jiajia Kang, Jin Tian
2024Trusted and Spectrum-Efficient Crowd Computing in Massive MIMO Cellular Networks.
Pengfeng Zhang, Lei Li, Xin Liu, Rui Wang, Donglan Liu, Bing Su, Yuntao Wang, Yiliang Liu, Zhou Su
2024Trustworthiness and path regularity based contrastive learning for noisy knowledge graph error assertion detection.
Zhuohan Ao, Yi Wang, Ying Wang, Yu Zhan
2024Trustworthy Analysis of Drain3-based Cold Storage Behavior in Judicial Depository Scenarios.
Xiangyu Meng, Xuejun Yu
2024Trustworthy Approaches to RSA: Efficient Exploitation Strategies Based on Common Modulus.
Mahdi Mahdavi, Navid Abapour, Zahra Ahmadian
2024Two-Stage Federated Learning Strategy for Fairness and Security in Vehicular Networks.
Xin Zhang, Chao Guo, Buxin Guo
2024UNIRE: Secure Trajectory-User Linking Model Aggregation with Knowledge Transfer.
Jiezhen Tang, Hui Zhu, Yandong Zheng, Junpeng Zhang, Fengwei Wang, Jiaqi Zhao, Hui Li
2024USB Catcher: Detection of Controlled Emissions via Conducted Compromising Emanations.
Yixin Zhang, Fuqiang Du, Xinge Chi, Zhiqiang Lv
2024UniTTP: A Unified Framework for Tactics, Techniques, and Procedures Mapping in Cyber Threats.
Jie Zhang, Hui Wen, Lun Li, Hongsong Zhu
2024Unlocking Insights: An Extensible Framework for Automated Metadata Extraction from Online Documents.
Raffaele Pizzolante, Arcangelo Castiglione, Francesco Palmieri
2024Unsupervised Evaluation Method of Relative Coordination Degree from Group Perspective.
Chenghan Zhang, Yan Liu, Daofu Gong, Ling Wang
2024User Authentication Based on the Integration of Musical Signals and Ear Canal Acoustics.
Tongxi Chen, Weizhi Meng, Wenjuan Li
2024VCaDID: Verifiable Credentials with Anonymous Decentralized Identities.
Yalan Wang, Liqun Chen, Long Meng, Christopher J. P. Newton
2024VDPSRQ: Achieving Verifiable and Dynamic Private Spatial Range Queries over Outsourced Database.
Haoyang Wang, Kai Fan, Yue Quan, Fenghua Li, Hui Li
2024VisualAuth: Secure Transaction Authentication and Trusted UI on COTS Android Devices.
Mykolai Protsenko, Albert Stark, Andreas Papon, Sandra Kostic
2024Vulnerabilities are collaborating to compromise your system: A network risk assessment method based on cooperative game and attack graph.
Xin Deng, Rui Wang, Weihong Han, Zhihong Tian
2024WAPITI - A Weighted Bayesian Method for Private Information Inference on Social Ego Networks.
Hervais Simo, Michael Kreutzer
2024WCDGA: BERT-Based and Character-Transforming Adversarial DGA with High Anti-Detection Ability.
Zhujie Guan, Mengmeng Tian, Yuwei Xu, Kehui Song, Guang Cheng
2024WaShadow: Effectively Protecting WebAssembly Memory Through Virtual Machine-Aware Shadow Memory.
Zhuochen Jiang, Baojian Hua
2024WhisperMQTT: Lightweight Secure Communication Scheme for Subscription-Heavy MQTT Network.
Youbin Kim, Man-Ki Yoon
2024Who Owns the Cloud Data? Exploring a non-interactive way for secure proof of ownership.
Zhihuan Yang, Wenlong Tian, Ruixuan Li, Xuming Ye, Zhiyong Xu
2024Witness Encryption based on the SAT Problem
Xingbo Wang, Yuzhu Wang, Mingwu Zhang
2024You Are as You Type: Investigating the Influence of Timestamp Accuracy on the Robustness of Keystroke Biometrics.
Florian Dehling, Sebastian Koch, Luigi Lo Iacono, Hannes Federrath
2024Your Data is Leaking! An Empirical Study of User Habits during Smartphone Charging.
Steven Krudsen, Wenjuan Li
2024ZKFDT: A Fair Exchange Scheme for Data Trading Based on Efficient Zero-Knowledge Proofs.
Jianwei Liu, Wei Wan, Chun Long, Jing Li, Fan Yang, Yuhao Fu
2024Zephyr: A High-Performance Framework for Graph Attention Networks on Heterogeneous Data.
Wenxiu Ding, Muzhi Liu, Yuxuan Cai, Mingxin Chen, Zheng Yan, Mingjun Wang
2024scE(match): Privacy-Preserving Cluster Matching of Single-Cell Data.
Johannes Lohmöller, Jannis Scheiber, Rafael Kramann, Klaus Wehrle, Sikander Hayat, Jan Pennekamp
2024xIDS-EnsembleGuard: An Explainable Ensemble Learning-based Intrusion Detection System.
Muhammad Adil, Mian Ahmad Jan, Safayat Bin Hakim, Houbing Herbert Song, Zhanpeng Jin