researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
OR
AND
NOT
1
2021
2022
2023
2024
Filter by Tag
Filter by Author
[+]
OR
AND
NOT
1
Adel Taweel
Chin-Tser Huang
Chun-Fai Chan
Danni Cao
Fumin Yu
Guanghui Feng
Guojun Wang
Guojun Wang 0001
Hongling Chen
Hongping Wang
Peiqiang Li
Pin Liu
Qin Liu
Shuhong Chen
Tao Peng 0011
Vimal Kumar
Wenyin Yang
Xiangyong Liu
Xiaofei Xing
Yinglong Dai
Filter by Top terms
[+]
OR
AND
NOT
1
algorithm
architecture
blockchain
classification
cloud
data
deep
detection
federated
learning
malware
method
model
network
networks
privacy
security
smart
system
using
UbiSec (ubisec)
Editions
Publications
Viewing Publication 1 - 98 from 98
2024
Ubiquitous Security - Third International Conference, UbiSec 2023, Exeter, UK, November 1-3, 2023, Revised Selected Papers
Guojun Wang
,
Haozhe Wang
,
Geyong Min
,
Nektarios Georgalas
,
Weizhi Meng 0001
, editors,
Volume 2034 of
Communications in Computer and Information Science
, Springer,
2024.
[doi]
2023
Ubiquitous Security - Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28-31, 2022, Revised Selected Papers
Guojun Wang 0001
,
Kim-Kwang Raymond Choo
,
Jie Wu 0001
,
Ernesto Damiani
, editors,
Volume 1768 of
Communications in Computer and Information Science
, Springer,
2023.
[doi]
Research on Authorization Model of Attribute Access Control Based on Knowledge Graph
Li Ma 0011
,
Qidi Lao
,
Wenyin Yang
,
Zexian Yang
,
Dong Yuan
,
Zhaoxiong Bu
.
ubisec 2024
:
348-359
[doi]
BiBERT-AV: Enhancing Authorship Verification Through Siamese Networks with Pre-trained BERT and Bi-LSTM
Amirah Almutairi
,
Boojoong Kang
,
Nawfal Al Hashimy
.
ubisec 2024
:
17-30
[doi]
A Unified Knowledge Graph to Permit Interoperability of Heterogenous Digital Evidence
Ali Alshumrani
,
Nathan L. Clarke
,
Bogdan Ghita 0003
.
ubisec 2024
:
420-435
[doi]
Is It Really You Who Forgot the Password? When Account Recovery Meets Risk-Based Authentication
Andre Büttner
,
Andreas Thue Pedersen
,
Stephan Wiefling
,
Nils Gruschka
,
Luigi Lo Iacono
.
ubisec 2024
:
401-419
[doi]
Process Mining with Programmable Logic Controller Memory States
Chun-Fai Chan
,
Kam-Pui Chow
.
ubisec 2024
:
96-113
[doi]
Automatically Inferring Image Base Addresses of ARM32 Binaries Using Architecture Features
Daniel Chong
,
Junjie Zhang
,
Nathaniel Boland
,
Lingwei Chen
.
ubisec 2024
:
450-461
[doi]
A Comprehensive Survey of Attack Techniques, Implementation, and Mitigation Strategies in Large Language Models
Aysan Esmradi
,
Daniel Wankit Yip
,
Chun-Fai Chan
.
ubisec 2024
:
76-95
[doi]
Bilateral Personalized Information Fusion in Mobile Crowdsensing
Zheqi Feng
,
Tao Peng 0011
,
Guojun Wang 0001
,
Kejian Guan
.
ubisec 2024
:
3-16
[doi]
SCORD: Shuffling Column-Oriented Relational Database to Enhance Security
Tieming Geng
,
Chin-Tser Huang
,
Csilla Farkas
.
ubisec 2024
:
163-176
[doi]
Simulation of Mixmining Reward Parameters for the Nym Mixnet
Harry Halpin
.
ubisec 2024
:
363-379
[doi]
SMARPchain: A Smart Marker Based Reputational Probabilistic Blockchain for Multi-agent Systems
Chin-Tser Huang
,
Laurent Njilla
,
Matthew Sharp
,
Tieming Geng
.
ubisec 2024
:
436-449
[doi]
How Does Post-quantum Cryptography Affect Central Bank Digital Currency?
Lars Hupel
,
Makan Rafiee
.
ubisec 2024
:
45-62
[doi]
Privacy Preserving Elder Fall Detection Using Deep Learning
Faseeh Iftikhar
,
Muhammad Faizan Khan
,
Guojun Wang 0001
,
Fazli Wahid
.
ubisec 2024
:
335-347
[doi]
Detection of Cyberbullying in Social Media Texts Using Explainable Artificial Intelligence
Mohammad Rafsun Islam
,
Ahmed Saleh Bataineh
,
Mohammad Zulkernine
.
ubisec 2024
:
319-334
[doi]
Blockchain-Based Privacy-Preservation Platform for Data Storage and Query Processing
Michael Mireku Kwakye
,
Ken Barker 0001
.
ubisec 2024
:
380-400
[doi]
A Probability Mapping-Based Privacy Preservation Method for Social Networks
Qingru Li
,
Yahong Wang
,
Fangwei Wang
,
Zhiyuan Tan 0001
,
Changguang Wang
.
ubisec 2024
:
289-303
[doi]
Channel Spatio-Temporal Convolutional Network for Trajectory Prediction
Zhonghao Lu
,
Lina Xu
,
Ying Hu
,
Liping Sun
,
Yonglong Luo
.
ubisec 2024
:
205-218
[doi]
Impact of Library Code in Binary Similarity Systems
Andrei Vasile Mihalca
,
Ciprian Pavel Oprisa
.
ubisec 2024
:
31-44
[doi]
Deploying Post-quantum Algorithms in Existing Applications and Embedded Devices
Petr Muzikant
,
Jan Willemson
.
ubisec 2024
:
147-162
[doi]
Privacy-Preserving Blockchain-Based Traceability System with Decentralized Ciphertext-Policy Attribute-Based Encryption
Tsz Ho Pun
,
Yi Jun He
,
Siu-Ming Yiu
.
ubisec 2024
:
274-288
[doi]
Multi-NetDroid: Multi-layer Perceptron Neural Network for Android Malware Detection
Andri Rai
,
Eul-Gyu Im
.
ubisec 2024
:
219-235
[doi]
Honey-Gauge: Enabling User-Centric Honeypot Classification
Vinay Sachidananda
,
Berwyn Chai
,
Florian Gondesen
,
Kwok-Yan Lam
,
Yang Liu 0003
.
ubisec 2024
:
114-132
[doi]
TruFaaS - Trust Verification Framework for FaaS
Avishka Shamendra
,
Binoy Peries
,
Gayangi Seneviratne
,
Sunimal Rathnayake
.
ubisec 2024
:
304-318
[doi]
Improving DNS Data Exfiltration Detection Through Temporal Analysis
Georgios P. Spathoulas
,
Marios Anagnostopoulos
,
Konstantinos Papageorgiou
,
Georgios Kavallieratos
,
Georgios Theodoridis
.
ubisec 2024
:
133-146
[doi]
Poison Egg: Scrambling Federated Learning with Delayed Backdoor Attack
Masayoshi Tsutsui
,
Tatsuya Kaneko
,
Shinya Takamaeda-Yamazaki
.
ubisec 2024
:
191-204
[doi]
A SLAHP in the Face of DLL Search Order Hijacking
Antonin Verdier
,
Romain Laborde
,
Mohamed Ali Kandi
,
Abdelmalek Benzekri
.
ubisec 2024
:
177-190
[doi]
SmartBuoy: A Machine Learning-Based Detection Method for Interest Flooding Attacks in VNDN
Yuwei Xu
,
Tiantian Zhang
,
Junyu Zeng
,
Rongrong Wang
,
Kehui Song
,
Jingdong Xu
.
ubisec 2024
:
236-252
[doi]
Loft: An Architecture for Lifetime Management of Privacy Data in Service Cooperation
Cong Zha
,
Zhenan Xu
,
Ju Xing
,
Hao Yin
.
ubisec 2024
:
255-273
[doi]
FRAD: Front-Running Attacks Detection on Ethereum Using Ternary Classification Model
Yuheng Zhang
,
Pin Liu
,
Guojun Wang 0001
,
Peiqiang Li
,
Wanyi Gu
,
Houji Chen
,
Xuelei Liu
,
Jinyao Zhu
.
ubisec 2024
:
63-75
[doi]
2022
Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers
Guojun Wang 0001
,
Kim-Kwang Raymond Choo
,
Ryan K. L. Ko
,
Yang Xu 0013
,
Bruno Crispo
, editors,
Volume 1557 of
Communications in Computer and Information Science
, Springer,
2022.
[doi]
Automated Vulnerability Detection in Source Code Using Quantum Natural Language Processing
Mst. Shapna Akter
,
Hossain Shahriar
,
Zakirul Alam Bhuiya
.
ubisec 2023
:
83-102
[doi]
Approaches for Zero Trust Adoption Based upon Organization Security Level
Muntaha Alawneh
,
Imad M. Abbadi
.
ubisec 2023
:
523-533
[doi]
A Thermal-Aware Scheduling Algorithm for Reducing Thermal Risks in DAG-Based Applications in Cyber-Physical Systems
Irfan Ali
,
Muhammad Naeem Shehzad
,
Qaisar Bashir
,
Haroon Elahi
,
Muhammad Naeem Awais
,
Oana Geman
,
Pin Liu
.
ubisec 2023
:
497-508
[doi]
On the Variability in the Application and Measurement of Supervised Machine Learning in Cyber Security
Omar Alshaikh
,
Simon Parkinson
,
Saad Khan 0001
.
ubisec 2023
:
545-555
[doi]
Encryption Proxies in a Confidential Computing Environment
Mohamad Jamil Al Bouhairi
,
Mostakim Mullick
,
Marvin Wolf
,
Ivan Gudymenko
,
Sebastian Clauss
.
ubisec 2023
:
366-379
[doi]
System Call Processing Using Lightweight NLP for IoT Behavioral Malware Detection
John Carter
,
Spiros Mancoridis
,
Malvin Nkomo
,
Steven Weber 0001
,
Kapil R. Dandekar
.
ubisec 2023
:
103-115
[doi]
Differentially Private Clustering Algorithm for Mixed Data
Kai Cheng
,
Liandong Chen
,
HuiFeng Yang
,
Dan Luo
,
Shuai Yuan
,
Zhitao Guan
.
ubisec 2023
:
392-405
[doi]
BlockLearning: A Modular Framework for Blockchain-Based Vertical Federated Learning
Henrique Dias
,
Nirvana Meratnia
.
ubisec 2023
:
319-333
[doi]
Malware Traffic Classification Based on GAN and BP Neural Networks
Yun Duan
,
Laifu Wang
,
Dongxin Liu
,
Boren Deng
,
Yunfan Tian
.
ubisec 2023
:
144-160
[doi]
High-Speed Anonymous Device Authentication Without Asymmetric Cryptography in the Internet-of-Things
Li Duan
,
Yong Li
.
ubisec 2023
:
471-484
[doi]
Impact of Reenactment Programs on Young Generation
Anam Fatima
,
Muhammad Waseem Iqbal 0001
,
Muhammad Aqeel
,
Toqir A. Rana
,
Shuhong Chen
,
Muhammad Arif 0009
.
ubisec 2023
:
406-422
[doi]
An Improved Cuckoo Search Algorithm and Its Application in Function Optimization
Songlv Feng
,
Cuina Cheng
,
Liping Mo
.
ubisec 2023
:
439-455
[doi]
An Interactive Query Differential Privacy Protection Model Based on Big Data Analysis
Guanghui Feng
,
Wenyin Yang
,
Tao Peng 0011
,
Xiaofei Xing
,
Shuhong Chen
,
Yuting Li
.
ubisec 2023
:
337-351
[doi]
Support Tool Selection in Digital Forensics Training
Sabrina Friedl
,
Ludwig Englbrecht
,
Fabian Böhm
,
Günther Pernul
.
ubisec 2023
:
3-21
[doi]
Detecting Unknown Vulnerabilities in Smart Contracts with Multi-Label Classification Model Using CNN-BiLSTM
Wanyi Gu
,
Guojun Wang 0001
,
Peiqiang Li
,
Xubin Li
,
Guangxin Zhai
,
Xiangbin Li
,
Mingfei Chen
.
ubisec 2023
:
52-63
[doi]
Analysis of Techniques for Detection and Removal of Zero-Day Attacks (ZDA)
Khalid Hamid
,
Muhammad Waseem Iqbal 0001
,
Muhammad Aqeel
,
Xiangyong Liu
,
Muhammad Arif
.
ubisec 2023
:
248-262
[doi]
Garbage Recognition Algorithm Based on Self-attention Mechanism and Deep Sorting
Haiyang Huang
,
Falong Xiao
,
Xiaofang Zhang
,
Wanting Yan
,
Fumin Liu
,
Yuezhong Wu
.
ubisec 2023
:
511-522
[doi]
A-VMD: Adaptive Variational Mode Decomposition Scheme for Noise Reduction in Sensor-Cloud
Zhenru Huo
,
Guoqing Jia
,
Weidong Fang
,
Wei Chen 0036
,
Wuxiong Zhang
.
ubisec 2023
:
485-496
[doi]
Multi-Mobile Agent Security by Design Itinerary Planning Approach in Wireless Sensor Network
Saad Khan
,
Tariq A. A. Alsboui
,
Richard Hill
,
Hussain Al-Aqrabi
.
ubisec 2023
:
534-544
[doi]
Threat Modeling in Cloud Computing - A Literature Review
Mohammed Kharma
,
Adel Taweel
.
ubisec 2023
:
279-291
[doi]
Detecting Unknown Vulnerabilities in Smart Contracts with Binary Classification Model Using Machine Learning
Xiangbin Li
,
Xiaofei Xing
,
Guojun Wang
,
Peiqiang Li
,
Xiangyong Liu
.
ubisec 2023
:
179-192
[doi]
FedTA: Locally-Differential Federated Learning with Top-k Mechanism and Adam Optimization
Yuting Li
,
Guojun Wang
,
Tao Peng 0011
,
Guanghui Feng
.
ubisec 2023
:
380-391
[doi]
Decentralized Collaborative Filtering Algorithm with Privacy Preserving for Recommendation in Mobile Edge Computing
Xiangyong Liu
,
Pengfei Yin
,
Pin Liu
,
Shuhong Chen
.
ubisec 2023
:
352-365
[doi]
An Adversarial Sample Defense Method Based on Saliency Information
Shuqi Liu
,
Yufeng Zhuang
,
Xinyu Ma
,
Hongping Wang
,
Danni Cao
.
ubisec 2023
:
304-318
[doi]
Source Code Vulnerability Detection Using Deep Learning Algorithms for Industrial Applications
Akram Louati
,
Tiago Gasiba
.
ubisec 2023
:
161-178
[doi]
Empirical Likelihood for PLSIM with Missing Response Variables and Error-Prone Covariates
Xin Qi
,
Hongling Chen
,
Qin Liu
.
ubisec 2023
:
456-470
[doi]
Sensor Cloud Data Privacy Protection Model Based on Collaborative Deep Learning
Xiaoqian Ran
,
Yufeng Zhuang
,
Hongping Wang
,
Danni Cao
,
Yulian Cao
,
Wenjuan Gu
.
ubisec 2023
:
423-435
[doi]
Android Malware Detection: A Literature Review
Ahmed Sabbah
,
Adel Taweel
,
Samer Zein
.
ubisec 2023
:
263-278
[doi]
Prototyping the IDS Security Components in the Context of Industry 4.0 - A Textile and Clothing Industry Case Study
Nuno Torres
,
Ana Chaves
,
César Toscano
,
Pedro Pinto
.
ubisec 2023
:
193-206
[doi]
Listen to the Music: Evaluating the Use of Music in Audio Based Authentication
Michael Tsai
,
Vimal Kumar
.
ubisec 2023
:
22-37
[doi]
An Aspect-Based Semi-supervised Generative Model for Online Review Spam Detection
Shitao Wang
,
Wenjun Jiang
,
Shuhong Chen
.
ubisec 2023
:
207-219
[doi]
Vulnerability Detection with Representation Learning
Zhiqiang Wang
,
Sulong Meng
,
Ying Chen
.
ubisec 2023
:
116-128
[doi]
Improved DeepLabV3+ based Railway Track Extraction to Enhance Railway Transportation Safety
Yanbin Weng
,
Zuochuang Li
,
Xiaobin Huang
,
Xiahu Chen
.
ubisec 2023
:
233-247
[doi]
A Hybrid Secure Two-Party Protocol for Vertical Federated Learning
Wenti Yang
,
Zhaoyang He
,
Yalei Li
,
Haiyan Zhang
,
Zhitao Guan
.
ubisec 2023
:
38-51
[doi]
Hierarchical Policies of Subgoals for Safe Deep Reinforcement Learning
Fumin Yu
,
Feng Gao
,
Yao Yuan
,
Xiaofei Xing
,
Yinglong Dai
.
ubisec 2023
:
220-232
[doi]
Assessing Vulnerability from Its Description
Zijing Zhang
,
Vimal Kumar
,
Michael Mayo
,
Albert Bifet
.
ubisec 2023
:
129-143
[doi]
CATS: A Serious Game in Industry Towards Stronger Cloud Security
Tiange Zhao
,
Ulrike Lechner
,
Maria Pinto-Albuquerque
,
Ece Ata
,
Tiago Gasiba
.
ubisec 2023
:
64-82
[doi]
A New Signal Packing Algorithm for CAN-FD with Security Consideration
Bo Zheng
,
Yong Xie
.
ubisec 2023
:
292-303
[doi]
2021
Smart Search over Encrypted Educational Resources in Cloud Storage
Qiang Zhang 0017
,
Guihua Duan
,
Shukun Liu
.
ubisec 2022
:
90-101
[doi]
A Large-Scale Study on the Security Vulnerabilities of Cloud Deployments
Iosif Andrei-Cristian
,
Tiago Espinha Gasiba
,
Tiange Zhao
,
Ulrike Lechner
,
Maria Pinto-Albuquerque
.
ubisec 2022
:
171-188
[doi]
Evaluation of an Anomaly Detector for Routers Using Parameterizable Malware in an IoT Ecosystem
John Carter
,
Spiros Mancoridis
.
ubisec 2022
:
53-65
[doi]
Research on Bandwidth Reservation Algorithm of Teaching Resources in Cloud Computing Environment
Hongling Chen
,
Zhiwen Liao
,
Qin Liu
.
ubisec 2022
:
363-370
[doi]
Skill Reward for Safe Deep Reinforcement Learning
Jiangchang Cheng
,
Fumin Yu
,
Hongliang Zhang
,
Yinglong Dai
.
ubisec 2022
:
203-213
[doi]
Design and Architecture of Progger 3: A Low-Overhead, Tamper-Proof Provenance System
Tristan Corrick
,
Vimal Kumar
.
ubisec 2022
:
189-202
[doi]
Generalizing Supervised Learning for Intrusion Detection in IoT Mesh Networks
Hossein Keipour
,
Saptarshi Hazra
,
Niclas Finne
,
Thiemo Voigt
.
ubisec 2022
:
214-228
[doi]
SDGen: A Scalable, Reproducible and Flexible Approach to Generate Real World Cyber Security Datasets
Abigail M. Y. Koay
,
Miao Xie
,
Ryan K. L. Ko
,
Charles Sterner
,
Taejun Choi
,
Naipeng Dong
.
ubisec 2022
:
102-115
[doi]
Towards a Location-Aware Blockchain-Based Solution to Distinguish Fake News in Social Media
Wahid Sadique Koly
,
Abu Kaisar Jamil
,
Mohammad Shahriar Rahman
,
Hanif Bhuiyan
,
Md. Zakirul Alam Bhuiyan
,
Abdullah Al Omar
.
ubisec 2022
:
116-130
[doi]
A Robust Malware Detection Approach for Android System Based on Ensemble Learning
Wenjia Li
,
Juecong Cai
,
Zi Wang
,
Sihua Cheng
.
ubisec 2022
:
309-321
[doi]
Intrusion Detection System Based on Deep Neural Network and Incremental Learning for In-Vehicle CAN Networks
Jiaying Lin
,
Yehua Wei
,
Wenjia Li
,
Jing Long
.
ubisec 2022
:
255-267
[doi]
A Backdoor Embedding Method for Backdoor Detection in Deep Neural Networks
Meirong Liu
,
Hong Zheng
,
Qin Liu
,
Xiaofei Xing
,
Yinglong Dai
.
ubisec 2022
:
1-12
[doi]
A Network Forensics Investigating Method Based on Weak Consistency for Distributed SDN
Xuehua Liu
,
Liping Ding
,
Tao Zheng
,
Fang Yu
,
Zhen Jia
,
Wang Xiao
.
ubisec 2022
:
241-254
[doi]
Security and Privacy for Sharing Electronic Medical Records Based on Blockchain and Federated Learning
Wei Liu
,
Wenlong Feng
,
Benguo Yu
,
Tao Peng
.
ubisec 2022
:
13-24
[doi]
An Online Automated Anti-anti-virus Method
Li Ma
,
Huihong Yang
,
Yiming Chai
,
Jiawen Fan
,
Wenyin Yang
.
ubisec 2022
:
351-362
[doi]
PUFloc: PUF and Location Based Hierarchical Mutual Authentication Protocol for Surveillance Drone Networks
Aiswarya S. Nair
,
Sabu M. Thampi
.
ubisec 2022
:
66-89
[doi]
A Supervised Rare Anomaly Detection Technique via Cooperative Co-evolution-Based Feature Selection Using Benchmark UNSW_NB15 Dataset
A. N. M. Bazlur Rashid
,
Mohiuddin Ahmed
,
Sheikh Rabiul Islam
.
ubisec 2022
:
279-291
[doi]
Towards a Two-Tier Architecture for Privacy-Enabled Recommender Systems (PeRS)
Shakil
,
Muhammad Arif
,
Shahab Saquib Sohail
,
Mohammed Talha Alam
,
Syed Ubaid
,
Md. Tabrez Nafis
,
Guojun Wang
.
ubisec 2022
:
268-278
[doi]
Using Streaming Data Algorithm for Intrusion Detection on the Vehicular Controller Area Network
Shaila Sharmin
,
Hafizah Mansor
,
Andi Fitriah Abdul Kadir
,
Normaziah Abdul Aziz
.
ubisec 2022
:
131-144
[doi]
Active Malicious Accounts Detection with Multimodal Fusion Machine Learning Algorithm
Yuting Tang
,
Dafang Zhang
,
Wei Liang
,
Kuan-Ching Li
,
Nitin Sukhija
.
ubisec 2022
:
38-52
[doi]
Privacy-Enhanced Mean-Variance Scheme Against Malicious Signature Attacks in Smart Grids
Yuzhu Wang
,
Peiheng Zhang
,
Haitao Zhan
,
Mingwu Zhang
.
ubisec 2022
:
145-158
[doi]
A Reverse Auction Based Efficient D2D Transmission Mechanism for Ubiquitous Power Terminals
Xingshen Wei
,
Yongjian Cao
,
Peng Gao
,
Junxian Xu
.
ubisec 2022
:
322-335
[doi]
Towards Evaluating the Effectiveness of Botnet Detection Techniques
Ashley Woodiss-Field
,
Michael N. Johnstone
,
Paul S. Haskell-Dowland
.
ubisec 2022
:
292-308
[doi]
An Edge-Cloud Collaborative Object Detection System
Lei Xu
,
Dingkun Yang
.
ubisec 2022
:
371-378
[doi]
Privacy-Preserving Cluster Validity
Peng Yang
,
Shaohong Zhang
,
Liu Yang 0002
.
ubisec 2022
:
159-170
[doi]
A Fine-Grained Access Control Scheme for Electronic Health Records Based on Roles and Attributes
Shaobo Zhang
,
Shuo Yang
,
Gengming Zhu
,
Entao Luo
,
Jiyong Zhang
,
Desheng Xiang
.
ubisec 2022
:
25-37
[doi]
A Fine-Tuning Strategy Based on Real Scenes in Gait Identification
Xianggang Zhang
,
Jing Zeng
,
Guoyu Wang
.
ubisec 2022
:
336-350
[doi]
Reliable and Controllable Data Sharing Based on Blockchain
Yipeng Zou
,
Tao Peng 0011
,
Wentao Zhong
,
Kejian Guan
,
Guojun Wang 0001
.
ubisec 2022
:
229-240
[doi]
Sign in
or
sign up
to see more results.