researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
OR
AND
NOT
1
2011
2012
2013
2016
2017
2018
2019
2020
2021
2022
Filter by Tag
Filter by Author
[+]
OR
AND
NOT
1
Aiyun Zhan
Buhong Wang
Chunjie Cao
Fangguo Zhang
Fei Du
Fengyin Li
George Loukas
Guanghui Li 0003
Hongyu Yang
Hui Li
Jianwei Liu
Jieren Cheng
Jin Li
JingBing Li
Juan Wang
Ning Cao 0002
Quanxin Zhang
Wei Li
Xiangyan Tang
Zhendong Wu
Filter by Top terms
[+]
OR
AND
NOT
1
algorithm
authentication
blockchain
cloud
data
detection
efficient
encryption
learning
method
model
multi
network
preserving
privacy
scheme
secure
security
system
using
CSS (css)
Editions
Publications
Viewing Publication 1 - 100 from 310
2022
Updatable Hybrid Encryption Scheme with No-Directional Key Update for Cloud Storage
Zhenhua Liu 0001
,
Yuanju Ma
,
Yaxin Niu
,
Jingwan Gong
,
Baocang Wang
.
css 2022
:
71-85
[doi]
Cyberspace Safety and Security - 13th International Symposium, CSS 2021, Virtual Event, November 9-11, 2021, Proceedings
Weizhi Meng 0001
,
Mauro Conti
, editors,
Volume 13172 of
Lecture Notes in Computer Science
, Springer,
2022.
[doi]
Quartet: A Logarithmic Size Linkable Ring Signature Scheme from DualRing
Zijian Bao
,
Debiao He
,
Yulin Liu
,
Cong Peng
,
Qi Feng
,
Min Luo 0002
.
css 2022
:
56-70
[doi]
Cyberspace Safety and Security - 14th International Symposium, CSS 2022, Xi'an, China, October 16-18, 2022, Proceedings
Xiaofeng Chen
,
Jian Shen 0001
,
Willy Susilo
, editors,
Volume 13547 of
Lecture Notes in Computer Science
, Springer,
2022.
[doi]
Anomalous Network Traffic Detection Based on CK Sketch and Machine Learning
Yaping Chi
,
Defan Xue
,
Ziyan Yue
,
Zhiqiang Wang 0006
,
Liang Jiaming
.
css 2022
:
225-243
[doi]
Improvised Model for Blockchain in Distributed Cloud Environment
Meeraj Mahendra Gawde
,
Gaurav Choudhary
,
Shishir Kumar Shandilya
,
Rizwan Ur Rahman
,
Hoonyong Park
,
Ilsun You
.
css 2022
:
327-341
[doi]
A Collaborative Access Control Scheme Based on Incentive Mechanisms
Yifei Li
,
Yinghui Zhang 0002
,
Wei Liu
,
Jianting Ning
,
Dong Zheng 0001
.
css 2022
:
48-55
[doi]
Multi-hop Multi-key Homomorphic Encryption with Less Noise Under CRS Model
Hui Li
,
Xuelian Li
,
Juntao Gao
,
Runsong Wang
.
css 2022
:
342-357
[doi]
Substitution Attacks Against Sigma Protocols
Yuliang Lin
,
Rongmao Chen
,
Yi Wang
,
Baosheng Wang
,
Lin Liu
.
css 2022
:
192-208
[doi]
Design of Anti Machine Learning Malicious Node System Based on Blockchain
Yuanzhen Liu
,
Yanbo Yang
,
Jiawei Zhang
,
Baoshan Li
.
css 2022
:
358-373
[doi]
Working Mechanism of Eternalblue and Its Application in Ransomworm
Zian Liu
,
Chao Chen
,
Leo Yu Zhang
,
Shang Gao 0003
.
css 2022
:
178-191
[doi]
FDLedger: Dynamic and Efficient Anonymous Audit for Distributed Ledgers
Yao Liu
,
Zhonghao Yuan
,
Yunhan Hu
.
css 2022
:
89-108
[doi]
Membership Inference Attacks Against Robust Graph Neural Network
Zhengyang Liu
,
Xiaoyu Zhang
,
Chenyang Chen
,
Shen Lin
,
Jingjin Li
.
css 2022
:
259-273
[doi]
A Secure and Efficient Certificateless Authenticated Key Agreement Scheme for Smart Healthcare
Yuqian Ma
,
Yongliu Ma
,
Yidan Liu
,
Qingfeng Cheng
.
css 2022
:
17-31
[doi]
Multi-user Verifiable Database with Efficient Keyword Search
Meixia Miao
,
Panru Wu
,
Yunling Wang
.
css 2022
:
133-146
[doi]
Publicly Verifiable Conjunctive Keyword Search with Balanced Verification Overhead
Qitian Sheng
,
Jiaojiao Wu
,
Jianfeng Wang
.
css 2022
:
3-16
[doi]
A Distributed Threshold Additive Homomorphic Encryption for Federated Learning with Dropout Resiliency Based on Lattice
Haibo Tian
,
Yanchuan Wen
,
Fangguo Zhang
,
Yunfeng Shao
,
Bingshuai Li
.
css 2022
:
277-292
[doi]
Digital Signature Scheme to Match Generalized Reed-Solomon Code over GF(q)
Yong Wang
,
Hao Xie
,
Ruyi Wang
.
css 2022
:
32-47
[doi]
Efficient and Collusion Resistant Multi-party Private Set Intersection Protocols for Large Participants and Small Sets Setting
Lifei Wei
,
Jihai Liu
,
Lei Zhang
,
Wuji Zhang
.
css 2022
:
118-132
[doi]
A Blockchain-Based Collaborative Auditing Scheme for Cloud Storage
Jie Xiao
,
Hui Huang 0010
,
Chenhuang Wu
,
Qunshan Chen
,
Zhenjie Huang
.
css 2022
:
147-159
[doi]
A Defect Level Assessment Method Based on Weighted Probability Ensemble
Lixia Xie
,
Siyu Liu
,
Hongyu Yang
,
Liang Zhang 0018
.
css 2022
:
293-300
[doi]
A Multi-stage APT Attack Detection Method Based on Sample Enhancement
Lixia Xie
,
Xueou Li
,
Hongyu Yang
,
Liang Zhang
.
css 2022
:
209-216
[doi]
FedMCS: A Privacy-Preserving Mobile Crowdsensing Defense Scheme
Mengfan Xu
,
Xinghua Li
.
css 2022
:
244-258
[doi]
A Method of Traceless File Deletion for NTFS File System
Shujiang Xu
,
Fansheng Wang
,
Lianhai Wang
,
Xu Chang
,
Tongfeng Yang
,
Weijun Yang
.
css 2022
:
109-117
[doi]
VDHGT: A Source Code Vulnerability Detection Method Based on Heterogeneous Graph Transformer
Hongyu Yang
,
Haiyun Yang
,
Liang Zhang
.
css 2022
:
217-224
[doi]
A Decentralized Ride-Hailing Mode Based on Blockchain and Attribute Encryption
Yifan Zhang
,
Yuping Zhou
,
Yu Hu
,
Hui Huang 0010
.
css 2022
:
301-313
[doi]
High Quality Audio Adversarial Examples Without Using Psychoacoustics
Wei Zong
,
Yang-Wai Chow
,
Willy Susilo
.
css 2022
:
163-177
[doi]
Post-quantum Privacy-Preserving Aggregation in Federated Learning Based on Lattice
Ruozhou Zuo
,
Haibo Tian
,
Zhiyuan An
,
Fangguo Zhang
.
css 2022
:
314-326
[doi]
2021
Vulnerability and Transaction Behavior Based Detection of Malicious Smart Contracts
Rachit Agarwal 0004
,
Tanmay Thapliyal
,
Sandeep Kumar Shukla
.
css 2022
:
79-96
[doi]
A Novel Method of Template Protection and Two-Factor Authentication Protocol Based on Biometric and PUF
Hui Zhang 0039
,
Weixin Bian
,
Biao Jie
,
Shuwan Sun
.
css 2022
:
97-106
[doi]
Post-quantum Key Escrow for Supervised Secret Data Sharing on Consortium Blockchain
Xiaowen Cai
,
Wenjing Cheng
,
Minghui Zhang
,
Chen Qian
,
Zhengwei Ren
,
Shiwei Xu
,
Jianying Zhou
.
css 2022
:
164-181
[doi]
A Privacy-Preserving Logistics Information System with Traceability
Quanru Chen
,
Jinguang Han
,
Jiguo Li 0001
,
Liquan Chen
,
Song Li
.
css 2022
:
145-163
[doi]
Cyberspace Safety and Security - 12th International Symposium, CSS 2020, Haikou, China, December 1-3, 2020, Proceedings
Jieren Cheng
,
Xiangyan Tang
,
Xiaozhang Liu
, editors,
Volume 12653 of
Lecture Notes in Computer Science
, Springer,
2021.
[doi]
Flexible and Survivable Single Sign-On
Federico Magnanini
,
Luca Ferretti
,
Michele Colajanni
.
css 2022
:
182-197
[doi]
Realizing Information Flow Control in ABAC Mining
B. S. Radhika
,
R. K. Shyamasundar
.
css 2022
:
107-119
[doi]
The Analysis and Implication of Data Deduplication in Digital Forensics
Izabela Savic
,
Xiaodong Lin
.
css 2022
:
198-215
[doi]
Dissecting Membership Inference Risk in Machine Learning
Navoda Senavirathne
,
Vicenç Torra
.
css 2022
:
36-54
[doi]
Environmental Adaptive Privacy Preserving Contact Tracing System for Respiratory Infectious Diseases
Pengfei Wang
,
Xiangyu Su
,
Maxim Jourenko
,
Zixian Jiang
,
Mario Larangeira
,
Keisuke Tanaka
.
css 2022
:
131-144
[doi]
A Federated Learning Assisted Conditional Privacy Preserving Scheme for Vehicle Networks
Zhe Xia
,
Yifeng Shu
,
Hua Shen
,
Mingwu Zhang
.
css 2022
:
16-35
[doi]
Encrypted Malicious Traffic Detection Based on Ensemble Learning
Fengrui Xiao
,
Feng Yang
,
Shuangwu Chen
,
Jian Yang 0014
.
css 2022
:
1-15
[doi]
Weak Password Scanning System for Penetration Testing
Bailin Xie
,
Qi Li
,
Hao Qian
.
css 2022
:
120-130
[doi]
Webshell Detection Based on Explicit Duration Recurrent Network
Bailin Xie
,
Qi Li
.
css 2022
:
55-65
[doi]
A Practical Botnet Traffic Detection System Using GNN
Bonan Zhang
,
Jingjin Li
,
Chao Chen
,
Kyungmi Lee
,
Ickjai Lee
.
css 2022
:
66-78
[doi]
2020
Camdar-Adv: Method for Generating Adversarial Patches on 3D Object
Chang Chen
,
Teng Huang
.
css 2021
:
1-8
[doi]
An Empirical Study on the Status Quo of Higher Vocational Teachers' Informatization Teaching Ability - A Case Study of Hainan Province
Yi-nan Chen
,
Peng Sun
,
Xia Liu
.
css 2021
:
43-57
[doi]
A Robust Zero Watermarking Algorithm for Medical Images Based on Tetrolet-DCT
Wenfeng Cui
,
Jing Liu 0041
,
JingBing Li
,
Yangxiu Fang
,
Xiliang Xiao
,
Uzair Aslam Bhatti
,
Saqib Ali Nawaz
.
css 2021
:
109-119
[doi]
The Detection and Segmentation of Pulmonary Nodules Based on U-Net
Guilai Han
,
Wei Liu
,
Benguo Yu
,
Lin Niu
,
Xiaoling Li
,
Lu Liu
,
Haixia Li
.
css 2021
:
236-244
[doi]
Analysis on Influencing Factors of Electricity Sales for Electric Data Security
Hailing He
,
Wei Zou
,
Qinghong Guo
,
Wenxian Wu
,
Kejiang Xiao
.
css 2021
:
157-171
[doi]
Universal Adversarial Perturbations of Malware
Ruitao Hou
,
Xiaoyu Xiang
,
Qixiang Zhang
,
Jiabao Liu
,
Teng Huang
.
css 2021
:
9-19
[doi]
Training Aggregation in Federated Learning
Li Hu
,
Hongyang Yan
,
Zulong Zhang
.
css 2021
:
87-94
[doi]
SDSBT: A Secure Multi-party Data Sharing Platform Based on Blockchain and TEE
Hong Lei
,
Yun Yan
,
Zijian Bao
,
Qinghao Wang
,
Yongxin Zhang
,
Wenbo Shi
.
css 2021
:
184-196
[doi]
Electricity Sales Forecasting Based on Model Fusion and Prophet Model
Kai Li
,
Jian Li
,
Jun Tang
,
Siming Chen
,
Jiao Wu
,
Yaoheng Xie
,
Kejiang Xiao
.
css 2021
:
299-315
[doi]
Research on Electricity Sales Forecast Model Based on Big Data
Kai Li
,
Jian Li
,
Siming Chen
,
Jun Tang
,
Jiao Wu
,
Yingping Zhang
,
Kejiang Xiao
.
css 2021
:
316-328
[doi]
Kernel Optimization in SVM for Defense Against Adversarial Attacks
Wanman Li
,
Xiaozhang Liu
.
css 2021
:
32-42
[doi]
Malware Variants Detection Based on Feature Fusion
Jianbin Mai
,
Chunjie Cao
,
Qian Wu
.
css 2021
:
67-77
[doi]
Trajectory Shaping Guidance Law of Homing Missile with High Maneuver and Low Overload and Its Database Security
Li Miao
,
Wang Lei
,
Xu Chao
.
css 2021
:
245-260
[doi]
Reliability Optimization and Trust Computing of Composite Wing Based on Sparse PC Method
Li Miao
,
Wang Lei
,
Xu Chao
.
css 2021
:
58-66
[doi]
HOUGH-DCT Based Robust Watermarking for Medical Image
Ruiqi Mo
,
Jing Liu
,
JingBing Li
,
Yulin Wang
,
Jingjun Zhou
.
css 2021
:
120-131
[doi]
A Semi-supervised Learning Approach for High Dimensional Android Malware Classification
Qiao Shang
,
Ni Li
,
Qi Qi
,
Xiao-Wei Lin
.
css 2021
:
20-31
[doi]
Privacy-Preserving Movie Scoring Algorithm Based on Deep Neural Network
Weinan Song
,
Xinyu Fan
,
Jing Li
,
Aslam Niaz Khan
,
Lei Wang
.
css 2021
:
275-289
[doi]
Bibliometric and Graph Analysis in Document Data Mining Based on the Cultivation of New Type Professional Farmers
Chaosheng Tang
,
Lijin Qin
.
css 2021
:
261-274
[doi]
Research on Global Map Construction and Location of Intelligent Vehicles Based on Lidar
Bi-Yao Wang
,
Yi Han 0004
,
Jing Jin
.
css 2021
:
210-224
[doi]
The Blind Separation of Cockpit Mixed Signals Based on Fast Independent Component Analysis
Zhengmao Wu
,
Sihai Li
,
Jing Sun
,
Mingrui Chen
.
css 2021
:
132-143
[doi]
Robust GAN Based on Attention Mechanism
Qian Wu
,
Chunjie Cao
,
Jianbin Mai
,
Fangjian Tao
.
css 2021
:
78-86
[doi]
A Zero-Watermarking Algorithm for Medical Images Based on Gabor-DCT
Xiliang Xiao
,
Jing Liu
,
JingBing Li
,
Yangxiu Fang
,
Cheng Zeng
,
Jiabin Hu
,
Uzair Aslam Bhatti
.
css 2021
:
144-156
[doi]
Research on a Malicious Code Detection Method Based on Convolutional Neural Network in a Domestic Sandbox Environment
Jianhua Xing
,
Hong Sheng
,
Yuning Zheng
,
Wei Li
.
css 2021
:
290-298
[doi]
A Robust Digital Watermarking for Medical Images Based on PHTs-DCT
Dan Yi
,
Jing Liu 0041
,
JingBing Li
,
Jingjun Zhou
,
Uzair Aslam Bhatti
,
Yangxiu Fang
,
Saqib Ali Nawaz
.
css 2021
:
95-108
[doi]
A Regularization-Based Positive and Unlabeled Learning Algorithm for One-Class Classification of Remote Sensing Data
Yan Zhang
,
Tianjiao Yang
,
Chenguang Zhang
.
css 2021
:
172-183
[doi]
BID-HCP: Blockchain Identifier Based Health Certificate Passport System
Yuwen Zhang
,
Yang Liu
,
Cheng Chi
.
css 2021
:
197-209
[doi]
A Problem-Driven Discussion Teaching Method Based on Progressive Cycle
Xiaoyi Zhou
,
Shaohua Duan
,
Wei Li
.
css 2021
:
225-235
[doi]
2019
Achieving Data Security, Access Control and Authentication of Controllers in Hierarchical Software Defined Networking with Attribute Based Encryption
Yuhua Xu 0004
,
Zhixin Sun
.
css 2019
:
203-213
[doi]
Speaker Recognition Based on Lightweight Neural Network for Smart Home Solutions
Haojun Ai
,
Wuyang Xia
,
Quanxin Zhang
.
css 2019
:
421-431
[doi]
Security Solution Based on Raspberry PI and IoT
Bahast Ali
,
Xiaochun Cheng
.
css 2019
:
162-171
[doi]
Malicious Intentions: Android Internet Permission Security Risks
John Mark Andah
,
Jinfu Chen
.
css 2019
:
111-120
[doi]
Research on Collaborative Filtering Recommendation Method Based on Context and User Credibility
Hongli Chen
,
Shanguo Lv
.
css 2019
:
489-500
[doi]
A Textual Password Entry Method Resistant to Human Shoulder-Surfing Attack
Shudi Chen
,
Youwen Zhu
.
css 2019
:
409-420
[doi]
Implementing Fingerprint Recognition on One-Time Password Device to Enhance User Authentication
Xiaochun Cheng
,
Andreas Pitziolis
,
Aboubaker Lasebae
.
css 2019
:
448-461
[doi]
Intrusion Detection Traps within Live Network Environment
Xiaochun Cheng
,
Matus Mihok
.
css 2019
:
77-89
[doi]
A New Algorithm for Retrieving Diffuse Attenuation Coefficient Based on Big LiDAR Bathymetry Data
Kai Ding
,
Chisheng Wang
,
Ming Tao
,
Peican Huang
.
css 2019
:
133-142
[doi]
The Fuzzy Integral Evaluation Method Based on Feature Weighting for the Level of Complex Social Development
Meifang Du
,
Haojia Zhu
.
css 2019
:
444-454
[doi]
Research on Cloud Computing Security Problems and Protection Countermeasures
Xiani Fan
,
Jiayu Yao
,
Ning Cao 0002
.
css 2019
:
542-551
[doi]
Spoofing Attack Detection for Radar Network System State Estimation
Tianqi Huang
,
Buhong Wang
,
Dong Lin
.
css 2019
:
21-33
[doi]
DeepWAF: Detecting Web Attacks Based on CNN and LSTM Models
Xiaohui Kuang
,
Ming Zhang
,
Hu Li
,
Gang Zhao
,
Huayang Cao
,
Zhendong Wu
,
Xianmin Wang
.
css 2019
:
121-136
[doi]
A Standard Model Secure Verifiably Encrypted Signature Scheme Based on Dual System
Pengtao Liu
.
css 2019
:
242-252
[doi]
Non-linguistic Features for Cyberbullying Detection on a Social Media Platform Using Machine Learning
Yuyi Liu
,
Pavol Zavarsky
,
Yasir Malik
.
css 2019
:
391-406
[doi]
Efficient Privacy Protection Authentication Scheme in Vehicle Ad Hoc Networks
Shanguo Lv
.
css 2019
:
279-288
[doi]
Mobile Recommendation Method for Fusing Item Features and User Trust Relationship
Shanguo Lv
.
css 2019
:
477-488
[doi]
IMES: An Automatically Scalable Invisible Membrane Image Encryption for Privacy Protection on IoT Sensors
Song-Zhan Lv
,
Yining Liu
,
Jingtao Sun
.
css 2019
:
265-273
[doi]
Dummy Trajectory Generation Scheme Based on Deep Learning
Jiaji Pan
,
Jingkang Yang
,
Yining Liu
.
css 2019
:
511-523
[doi]
An SVM Based Secural Image Steganography Algorithm for IoT
Weifeng Sun
,
MingHan Jia
,
Shumiao Yu
,
Boxiang Dong
,
Xinyi Li
.
css 2019
:
357-371
[doi]
Big Data Based E-commerce Search Advertising Recommendation
Ming Tao
,
Peican Huang
,
Xueqiang Li
,
Kai Ding
.
css 2019
:
457-466
[doi]
Automated Detection System for Adversarial Examples with High-Frequency Noises Sieve
Dang Duy Thang
,
Toshihiro Matsui
.
css 2019
:
348-362
[doi]
An Efficient Attribute Based Encryption Scheme in Smart Grid
Wenti Yang
,
Zhitao Guan
.
css 2019
:
159-172
[doi]
Survey of Network Security Situational Awareness
Jiayu Yao
,
Xiani Fan
,
Ning Cao 0002
.
css 2019
:
34-44
[doi]
An Efficient Dynamic Group Signatures Scheme with CCA-Anonymity in Standard Model
Xiaohan Yue
,
Mingju Sun
,
Xibo Wang
,
Hong Shao
,
Yuan He 0002
.
css 2019
:
205-219
[doi]
Body-Weight Estimation of Plateau Yak with Simple Dimensional Measurement
Yu-an Zhang
,
Xiaofeng Qin
,
Minghao Zhao
,
Meiyun Du
,
Rende Song
.
css 2019
:
562-571
[doi]
2: Error Correcting Code and Elliptic Curve Based Cryptosystem
Fangguo Zhang
,
Zhuoran Zhang
.
css 2019
:
214-229
[doi]
Cloud Security Solution Based on Software Defined Network
Shengli Zhao
,
Zhaochan Li
,
Ning Cao 0002
.
css 2019
:
562-574
[doi]
Towards Secure Computation of Similar Patient Query on Genomic Data Under Multiple Keys
Chuan Zhao
,
Shengnan Zhao
,
Bo Zhang 0020
,
Shan Jing
,
Zhenxiang Chen
,
Minghao Zhao
.
css 2019
:
275-284
[doi]
Design of Anonymous Communication Protocol Based on Group Signature
Haojia Zhu
,
Can Cui
,
Fengyin Li
,
Zhongxing Liu
,
Quanxin Zhang
.
css 2019
:
175-181
[doi]
Sign in
or
sign up
to see more results.