0 | -- | 0 | Bingxue Fu, Yixuan Wang, Tao Feng. CT-GCN+: a high-performance cryptocurrency transaction graph convolutional model for phishing node classification |
0 | -- | 0 | Vinayak Tanksale. Intrusion detection system for controller area network |
1 | -- | 0 | Keya Xu, Guang Cheng. F3l: an automated and secure function-level low-overhead labeled encrypted traffic dataset construction method for IM in Android |
2 | -- | 0 | Shuang Song, Neng Gao, Yifei Zhang, Cunqing Ma. BRITD: behavior rhythm insider threat detection with time awareness and user adaptation |
5 | -- | 0 | Yanwei Gong, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Jianhua Wang, Haoran Zhu. Practical solutions in fully homomorphic encryption: a survey analyzing existing acceleration methods |
6 | -- | 0 | Haoran Lyu, Yajie Wang, Yu-an Tan 0001, Huipeng Zhou, Yuhang Zhao, Quanxin Zhang. Maxwell's Demon in MLP-Mixer: towards transferable adversarial attacks |
7 | -- | 0 | Fengxia Liu, Zhiyong Zheng, Zixian Gong, Kun Tian, Yi Zhang, Zhe Hu, Jia Li, Qun Xu. A survey on lattice-based digital signature |
8 | -- | 0 | RenYang Liu, Wei Zhou, Xin Jin 0005, Song Gao, Yuanyu Wang, Ruxin Wang 0002. DTA: distribution transform-based attack for query-limited scenario |
9 | -- | 0 | Mahdi Soltani, Khashayar Khajavi, Mahdi Jafari Siavoshani, Amir-Hossein Jahangir. A multi-agent adaptive deep learning framework for online intrusion detection |
10 | -- | 0 | Batoul Achaal, Mehdi Adda, Maxime Berger, Hussein Ibrahim, Ali Awde. Study of smart grid cyber-security, examining architectures, communication networks, cyber-attacks, countermeasure techniques, and challenges |
11 | -- | 0 | Yuantu Luo, Jun Tao, Yuehao Zhu, Yifan Xu 0002. HSS: enhancing IoT malicious traffic classification leveraging hybrid sampling strategy |
12 | -- | 0 | Zeshuo Zhu, Rui Zhang, Yang Tao. Atomic cross-chain swap based on private key exchange |
13 | -- | 0 | Edward Chuah, Neeraj Suri. An empirical study of reflection attacks using NetFlow data |
14 | -- | 0 | Benqiang Wei, Xianhui Lu. Improved homomorphic evaluation for hash function based on TFHE |
15 | -- | 0 | Haobin Chen, Yue Yang, Siyi Lv. Revisiting frequency-smoothing encryption: new security definitions and efficient construction |
16 | -- | 0 | Md. Alamgir Hossain, Md. Saiful Islam. Enhanced detection of obfuscated malware in memory dumps: a machine learning approach for advanced cybersecurity |
17 | -- | 0 | Yanjun Li, Weiguo Zhang, Yiping Lin, Jian Zou, Jian Liu. A circuit area optimization of MK-3 S-box |
18 | -- | 0 | Ximing Li 0001, Hao Wang, Sha Ma, Meiyan Xiao, Qiong Huang 0001. Revocable and verifiable weighted attribute-based encryption with collaborative access for electronic health record in cloud |
19 | -- | 0 | Chenxi Hu, Tao Wu 0011, Chunsheng Liu, Chao Chang. Joint contrastive learning and belief rule base for named entity recognition in cybersecurity |
20 | -- | 0 | Chunwen Liu, Ru Tan, Yang Wu, Yun-feng, Ze Jin, Fangjiao Zhang, Yuling Liu, Qixu Liu. Dissecting zero trust: research landscape and its implementation in IoT |
21 | -- | 0 | Huaxin Wang, Yiwen Gao 0001, Yuejun Liu, Qian Zhang, Yongbin Zhou. In-depth Correlation Power Analysis Attacks on a Hardware Implementation of CRYSTALS-Dilithium |
22 | -- | 0 | Miao Tian, Yushu Zhang 0001, YongMing Zhang, Xiangli Xiao, Wenying Wen. A privacy-preserving image retrieval scheme with access control based on searchable encryption in media cloud |
23 | -- | 0 | Urikhimbam Boby Clinton, Nazrul Hoque, Kh Robindro Singh. Classification of DDoS attack traffic on SDN network environment using deep learning |
24 | -- | 0 | Mingxing Hu, Zhen Liu, Yunhong Zhou. Efficient post-quantum secure deterministic wallet scheme |
25 | -- | 0 | Kaini Chen, Peisong Shen, Kewei Lv, Xue Tian, Chi Chen 0001. Dynamic group fuzzy extractor |
26 | -- | 0 | Ziming Jiang, Yongbin Zhou, Yuejun Liu. New partial key exposure attacks on RSA with additive exponent blinding |
27 | -- | 0 | Chenset Kim, Chakchai So-In, Yanika Kongsorot, Phet Aimtongkham. FLSec-RPL: a fuzzy logic-based intrusion detection scheme for securing RPL-based IoT networks against DIO neighbor suppression attacks |
28 | -- | 0 | Bin Huang, Yanhui Du. Break-Pad: effective padding machines for tor with break burst padding |
29 | -- | 0 | Wenhan Xu, Hui Ma 0002, Rui Zhang 0002. GAPS: GPU-accelerated processing service for SM9 |
30 | -- | 0 | Zhongxu Yin, Yiran Song, Guoxiao Zong. Discovering API usage specifications for security detection using two-stage code mining |
31 | -- | 0 | Yincen Chen, Yi Guo, Xuanyu Liang, Ling Song 0001, Qianqian Yang 0003. Revisiting the shuffle of generalized Feistel structure |
32 | -- | 0 | Md. Alamin Talukder, Rakib Hossen, Md. Ashraf Uddin 0001, Mohammed Nasir Uddin, Uzzal Kumar Acharjee. Securing transactions: a hybrid dependable ensemble machine learning model using IHT-LR and grid search |
33 | -- | 0 | Xi Lin, Heyang Cao, Feng-Hao Liu, Zhedong Wang, Mingsheng Wang. Shorter ZK-SNARKs from square span programs over ideal lattices |
34 | -- | 0 | Alex Shafarenko. Winternitz stack protocols for embedded systems and IoT |
35 | -- | 0 | Linwei Fang, Liming Wang, Hongjia Li. Iterative and mixed-spaces image gradient inversion attack in federated learning |
36 | -- | 0 | Chen An, Mengjie Huang, Xianhui Lu, Lei Bi 0002, Weijie Li. Polar code-based secure transmission with higher message rate combining channel entropy and computational entropy |
37 | -- | 0 | Chaoqun Wang, Ning Li, Shujuan Ji, Xianwen Fang, Zhen Wang. Enhancing fairness of trading environment: discovering overlapping spammer groups with dynamic co-review graph optimization |
38 | -- | 0 | Zheng Sun, Jinxiao Zhao, Feng Guo, Yuxuan Chen, Lei Ju 0001. CommanderUAP: a practical and transferable universal adversarial attacks on speech recognition models |
39 | -- | 0 | Jie Yuan, Rui Xu, Xinghai Wei, Keji Miao, Dongxiao Liu. TVRAVNF: an efficient low-cost TEE-based virtual remote attestation scheme for virtual network functions |
40 | -- | 0 | Yao Pan, Zheng Chao, He Wang, Jing Yang 0032, Hongjia Li, Liming Wang. FedSHE: privacy preserving and efficient federated learning with adaptive segmented CKKS homomorphic encryption |
41 | -- | 0 | Mikhail Kuznetsov, Evgenia Novikova, Igor V. Kotenko. Modelling user notification scenarios in privacy policies |
42 | -- | 0 | Chao An, Yuting Xiao, HaiHang Liu, Han Wu, Rui Zhang. Honey password vaults tolerating leakage of both personally identifiable information and passwords |
43 | -- | 0 | Ruida Wang, Ziyi Li, Xianhui Lu, Zhenfei Zhang, Kunpeng Wang. Key derivable signature and its application in blockchain stealth address |
44 | -- | 0 | Tin Lai, Farnaz Farid, Abubakar Bello, Fariza Sabrina. Ensemble learning based anomaly detection for IoT cybersecurity via Bayesian hyperparameters sensitivity analysis |
45 | -- | 0 | Chuyi Yan, Xueying Han, Yan Zhu, Dan Du, Zhigang Lu 0002, Yuling Liu. Phishing behavior detection on different blockchains via adversarial domain adaptation |
46 | -- | 0 | Huizhuo Wang, Yang Tao, Rui Zhang. Threshold ring signature: generic construction and logarithmic size instantiation |
47 | -- | 0 | Qintao Shen, Guozhu Meng, Kai Chen 0012. Revealing the exploitability of heap overflow through PoC analysis |
48 | -- | 0 | Wenbo Wang, Peng Yi, Taotao Kou, Weitao Han, Chengyu Wang 0010. GLDOC: detection of implicitly malicious MS-Office documents using graph convolutional networks |
49 | -- | 0 | Yinghong Xie, Yan Hao, Xiaowei Han, Qiang Gao, Biao Yin. A multi-channel spatial information feature based human pose estimation algorithm |
50 | -- | 0 | Zhuo Zhao, Ching-Fang Hsu 0001, Lein Harn, Zhe Xia, Xinyu Jiang, Liu Liu. Lightweight ring-neighbor-based user authentication and group-key agreement for internet of drones |
51 | -- | 0 | Boyuan Xu, Yiru Gong, Xiaoyu Geng, Yun Li, Cong Dong, Song Liu, Yuling Liu, Bo Jiang, Zhigang Lu 0002. ProcSAGE: an efficient host threat detection method based on graph representation learning |
52 | -- | 0 | Shahid Alam, Alper Kamil Demir. SIFT: Sifting file types - application of explainable artificial intelligence in cyber forensics |
53 | -- | 0 | Yamei Wang, Weijing You, Yuexin Zhang, Ayong Ye, Li Xu. Cloud EMRs auditing with decentralized (t, n)-threshold ownership transfer |
54 | -- | 0 | Sachin Kadam, Anna Scaglione, Nikhil Ravi, Sean Peisert, Brent Lunghino, Aram Shumavon. Optimum noise mechanism for differentially private queries in discrete finite sets |
55 | -- | 0 | Jingjie Xu, Ting Wang 0004, Mingqi Lv, Tieming Chen, Tiantian Zhu, Baiyang Ji. MVD-HG: multigranularity smart contract vulnerability detection method based on heterogeneous graphs |
57 | -- | 0 | Jingzhi Liu, Hongyi Yang, Quanlei Qu, Zhidong Liu, Yang Cao. Research on distribution automation security situational awareness technology based on risk transmission path and multi-source information fusion |
58 | -- | 0 | Yuming Liu, Yong Wang, Hao Feng. A proactive defense method against eavesdropping attack in SDN-based storage environment |
59 | -- | 0 | Ismail El Gaabouri, Mohamed Senhadji, Mostafa Belkasmi, Brahim El Bhiri. A new S-box pattern generation based on chaotic enhanced logistic map: case of 5-bit S-box |
60 | -- | 0 | Wei Zhu, Yi Deng 0002. Simultaneously resettable zero knowledge protocol in Public Key model |
61 | -- | 0 | Aulia Arham, Hanung Adi Nugroho. Enhanced reversible data hiding using difference expansion and modulus function with selective bit blocks in images |
62 | -- | 0 | Baowei Wang, Fengxiao Guo, Yuting Liu, Bin Li, Yi Yuan. An efficient and versatile e-voting scheme on blockchain |
63 | -- | 0 | Anyi Li, Qiqing Xia, Qianru Zhu, Li Yang. ff problem |
64 | -- | 0 | Haoran Yu, Wenchuan Yang, Baojiang Cui, Runqi Sui, Xuedong Wu. Renyi entropy-driven network traffic anomaly detection with dynamic threshold |
65 | -- | 0 | Wanqing Wu, Mingyu Guo. Improved integral neural distinguisher model for lightweight cipher PRESENT |
66 | -- | 0 | Jiawei Bao, Jiangxia Ge, Rui Xue. Double-sided: tight proofs for guessing games in the quantum random oracle model |
67 | -- | 0 | Yunfeng Ji, Rui Zhang 0002, Yang Tao 0001, Birou Gao. Designated confirmer threshold signature and its applications in blockchains |
68 | -- | 0 | Ziad Akiirne, Abdellah Sghir, Driss Bouzidi. UDAP: ultra-lightweight dot product-based authentication protocol for RFID systems |
69 | -- | 0 | Haochen Xu, Xiaoyu Geng, Junrong Liu, Zhigang Lu, Bo Jiang, Yuling Liu. A novel approach for detecting malicious hosts based on RE-GCN in intranet |
70 | -- | 0 | Juntao He, Haoran Dai, Runqi Sui, Xuejing Yuan, Dun Liu, Hao Feng, Xinyue Liu, Wenchuan Yang, Baojiang Cui, Kedan Li. EvilPromptFuzzer: generating inappropriate content based on text-to-image models |
71 | -- | 0 | Haoran Yu, Wenchuan Yang, Baojiang Cui, Runqi Sui, Xuedong Wu. Enhanced anomaly traffic detection framework using BiGAN and contrastive learning |
72 | -- | 0 | Yulong Ji, Kunjin Zou, Bin Zou 0002. Mi-maml: classifying few-shot advanced malware using multi-improved model-agnostic meta-learning |
73 | -- | 0 | Chang Ren, Bin Wu 0011. A Robust joint coverless image steganography scheme based on two independent modules |
74 | -- | 0 | Mengce Zheng, Hao Kang. Lattice-based cryptanalysis of RSA-type cryptosystems: a bibliometric analysis |
75 | -- | 0 | Josh Dafoe, Niusen Chen, Bo Chen 0028, Zhenlin Wang. Enabling per-file data recovery from ransomware attacks via file system forensics and flash translation layer data extraction |
76 | -- | 0 | Qiantao Yang, Xuehui Du, Xiangyu Wu, Wenjuan Wang, Aodi Liu, Shihao Wang. Fedrtid: an efficient shuffle federated learning via random participation and adaptive time constraint |
77 | -- | 0 | Peng Yin, Sanli Zhu, Yang Yu, Ziqian Wang, Zhuangzhi Chen. Analysis on dendritic deep learning model for AMR task |
78 | -- | 0 | Boyao Zhao, Haozhe Chen, Jie Zhang, Weiming Zhang, Nenghai Yu. Dual-verification-based model fingerprints against ambiguity attacks |
79 | -- | 0 | Xiangyang Luo, Xingxing Chen, Xiaofeng Chen, Qingfeng Cheng. A survey on the application of blockchain in cryptographic protocols |