0 | -- | 0 | Shushan Arakelyan, Sima Arasteh, Christophe Hauser, Erik Kline, Aram Galstyan. Bin2vec: learning representations of binary executable programs for security tasks |
0 | -- | 0 | Xiang Yin, Yanni Han, Zhen Xu, Jie Liu. VAECGAN: a generating framework for long-term prediction in multivariate time series |
0 | -- | 0 | Yiru Sun, Yanyan Liu. An efficient fully dynamic group signature with message dependent opening from lattice |
0 | -- | 0 | Lulu Yang, Chen Li, Ruibang You, Bibo Tu, Linghui Li. TKCA: a timely keystroke-based continuous user authentication with short keystroke sequence in uncontrolled settings |
0 | -- | 0 | Chen Gao, Xuan Zhang, Hui Liu. Data and knowledge-driven named entity recognition for cyber security |
1 | -- | 13 | Wenbo Liu, Qiong Huang, Xinjian Chen, Hongbo Li. Efficient functional encryption for inner product with simulation-based security |
1 | -- | 0 | Raphael Anaadumba, Qi Liu, Bockarie Daniel Marah, Francis Mawuli Nakoty, Xiaodong Liu, Yonghong Zhang. A renewable energy forecasting and control approach to secured edge-level efficiency in a distributed micro-grid |
3 | -- | 0 | Runchen Gao, Shen Li, Yuqi Gao, Rui Guo. A lightweight cryptographic algorithm for the transmission of images from road environments in self-driving |
4 | -- | 0 | Alex Shafarenko. A PLS blockchain for IoT applications: protocols and architecture |
5 | -- | 0 | Ruigang Liang, Ying Cao, Peiwei Hu, Kai Chen 0012. Neutron: an attention-based neural decompiler |
6 | -- | 0 | Cheah Huei Yoong, Venkata Reddy Palleti, Rajib Ranjan Maiti, Arlindo Silva, Christopher M. Poskitt. Deriving invariant checkers for critical infrastructure using axiomatic design principles |
7 | -- | 0 | Jianguo Jiang, Baole Wei, Min Yu, Gang Li 0009, Boquan Li, Chao Liu 0020, Min Li, Weiqing Huang. An end-to-end text spotter with text relation networks |
8 | -- | 0 | Venkata Reddy Palleti, Sridhar Adepu, Vishrut Kumar Mishra, Aditya Mathur. Cascading effects of cyber-attacks on interconnected critical infrastructure |
10 | -- | 0 | Md. Shafiur Rahman, Sajal Halder, Md. Ashraf Uddin, Uzzal Kumar Acharjee. An efficient hybrid system for anomaly detection in social networks |
11 | -- | 0 | Shafi Ullah, Raja Zahilah Raja Mohd Radzi. Curve25519 based lightweight end-to-end encryption in resource constrained autonomous 8-bit IoT devices |
12 | -- | 0 | Waleed Alghamdi, Michael Schukat. Precision time protocol attack strategies and their resistance to existing security extensions |
14 | -- | 0 | Jingdian Ming, Yongbin Zhou, Huizhong Li, Qian Zhang 0042. A secure and highly efficient first-order masking scheme for AES linear operations |
16 | -- | 0 | Chun Yang, Jinghui Xu, Shuangshuang Liang, Yanna Wu, Yu Wen, Boyang Zhang, Dan Meng. DeepMal: maliciousness-Preserving adversarial instruction learning against static malware detection |
17 | -- | 0 | Xuzi Wang, Baofeng Wu, Lin Hou, Dongdai Lin. Searching for impossible subspace trails and improved impossible differential characteristics for SIMON-like block ciphers |
18 | -- | 0 | Ansam Khraisat, Ammar Alazab. A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges |
19 | -- | 0 | Roee Leon, Michael Kiperberg, Anat Anatey Leon Zabag, Nezer Jacob Zaidenberg. Hypervisor-assisted dynamic malware analysis |
20 | -- | 0 | Yuhang Zhao, Ruigang Liang, Xiang Chen, Jing Zou. Evaluation indicators for open-source software: a review |
21 | -- | 0 | Gu Ban, Lili Xu, Yang Xiao, Xinhua Li, Zimu Yuan, Wei Huo. B2SMatcher: fine-Grained version identification of open-Source software in binary files |
23 | -- | 0 | Hui Liu, Li Yang. Quantum key recovery attack on SIMON32/64 |
24 | -- | 0 | Yu Zhang, Wei Huo, Kunpeng Jian, Ji Shi, Longquan Liu, Yanyan Zou, Chao Zhang, Baoxu Liu. ESRFuzzer: an enhanced fuzzing framework for physical SOHO router devices to discover multi-Type vulnerabilities |
25 | -- | 0 | Jonah Burgess, Philip O'Kane, Sakir Sezer, Domhnall Carlin. LSTM RNN: detecting exploit kits using redirection chain sequences |
27 | -- | 0 | M. R. Gauthama Raman, Chuadhry Mujeeb Ahmed, Aditya Mathur. Machine learning for intrusion detection in industrial control systems: challenges and lessons from experimental evaluation |
28 | -- | 0 | Pei-Yi Lin, Chia-Wei Tien, Ting-Chun Huang, Chin-Wei Tien. ICPFuzzer: proprietary communication protocol fuzzing by using machine learning and feedback strategies |
29 | -- | 0 | Sabarathinam Chockalingam, Wolter Pieters, André Teixeira 0001, Pieter H. A. J. M. Van Gelder. Bayesian network model to distinguish between intentional attacks and accidental technical failures: a case study of floodgates |
30 | -- | 0 | Sagar Sharma, Keke Chen. Confidential machine learning on untrusted platforms: a survey |
31 | -- | 0 | Zuoguang Wang, Hongsong Zhu, Peipei Liu, Limin Sun. Social engineering in cybersecurity: a domain ontology and knowledge graph application examples |
32 | -- | 0 | Wenqin Cao, Wentao Zhang. Multidimensional linear cryptanalysis with key difference invariant bias for block ciphers |
33 | -- | 0 | Zhilong Wang, Peng Liu. Position paper: GPT conjecture: understanding the trade-offs between granularity, performance and timeliness in control-flow integrity |
34 | -- | 0 | Junpeng Xu, Haixia Chen, Xu Yang, Wei Wu, Yongcheng Song. Verifiable image revision from chameleon hashes |
35 | -- | 0 | Huizhong Li, Guang Yang, Jingdian Ming, Yongbin Zhou, Chengbin Jin. Transparency order versus confusion coefficient: a case study of NIST lightweight cryptography S-Boxes |
36 | -- | 0 | Alex Shafarenko. Indexing structures for the PLS blockchain |
37 | -- | 0 | Bingyu Liu, Shangyu Xie, Yuanzhou Yang, Rujia Wang, Yuan Hong. Privacy preserving divisible double auction with a hybridized TEE-blockchain system |
38 | -- | 0 | Jianhua Wang, Xiaolin Chang, Yixiang Wang, Ricardo J. RodrÃguez, Jianan Zhang. LSGAN-AT: enhancing malware detector robustness against adversarial examples |