- Maoli Wang, XiaoDong Zang, Jianbo Cao, Bowen Zhang, Shengbao Li. PhishHunter: Detecting camouflaged IDN-based phishing attacks via Siamese neural network. Computers & Security, 138:103668, March 2024.
- Jiahao Huang, Mi Wen, Minjie Wei, Yanbing Bi. Enhancing the transferability of adversarial samples with random noise techniques. Computers & Security, 136:103541, January 2024.
- Ming Liu, Xiao Song, Yong Li, Wenxin Li. Correlated differential privacy based logistic regression for supplier data protection. Computers & Security, 136:103542, January 2024.
- Junhao Li, Junjiang He, Wenshan Li, Wenbo Fang, Geying Yang, Tao Li. SynDroid: An adaptive enhanced Android malware classification method based on CTGAN-SVM. Computers & Security, 137:103604, February 2024.
- Jiayi Chen, Urs Hengartner, Hassan Khan. SHRIMPS: A framework for evaluating multi-user, multi-modal implicit authentication systems. Computers & Security, 137:103594, February 2024.
- Kamal Taha, Paul D. Yoo, Yousof Al-Hammadi, Sami Muhaidat, Chan Yeob Yeun. Learning a deep-feature clustering model for gait-based individual identification. Computers & Security, 136:103559, January 2024.
- Xiyuan Zhang, Gang Xiong 0001, Zhen Li 0011, Chen Yang, Xinjie Lin, Gaopeng Gou, Binxing Fang. Traffic spills the beans: A robust video identification attack against YouTube. Computers & Security, 137:103623, February 2024.
- Syed Rizvi 0001, Iyonna Williams. Analyzing transparency and malicious insiders prevention for cloud computing environment. Computers & Security, 137:103622, February 2024.
- Side Liu, Guojun Peng, Haitao Zeng, Jianming Fu. A survey on the evolution of fileless attacks and detection techniques. Computers & Security, 137:103653, February 2024.
- Dimitri Van Landuyt, Vincent Wijshoff, Wouter Joosen. A study of NoSQL query injection in Neo4j. Computers & Security, 137:103590, February 2024.