Journal: Cybersecurity

Volume 7, Issue 1

0 -- 0Bingxue Fu, Yixuan Wang, Tao Feng. CT-GCN+: a high-performance cryptocurrency transaction graph convolutional model for phishing node classification
0 -- 0Vinayak Tanksale. Intrusion detection system for controller area network
1 -- 0Keya Xu, Guang Cheng. F3l: an automated and secure function-level low-overhead labeled encrypted traffic dataset construction method for IM in Android
2 -- 0Shuang Song, Neng Gao, Yifei Zhang, Cunqing Ma. BRITD: behavior rhythm insider threat detection with time awareness and user adaptation
5 -- 0Yanwei Gong, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Jianhua Wang, Haoran Zhu. Practical solutions in fully homomorphic encryption: a survey analyzing existing acceleration methods
6 -- 0Haoran Lyu, Yajie Wang, Yu-an Tan 0001, Huipeng Zhou, Yuhang Zhao, Quanxin Zhang. Maxwell's Demon in MLP-Mixer: towards transferable adversarial attacks
7 -- 0Fengxia Liu, Zhiyong Zheng, Zixian Gong, Kun Tian, Yi Zhang, Zhe Hu, Jia Li, Qun Xu. A survey on lattice-based digital signature
8 -- 0RenYang Liu, Wei Zhou, Xin Jin 0005, Song Gao, Yuanyu Wang, Ruxin Wang 0002. DTA: distribution transform-based attack for query-limited scenario
9 -- 0Mahdi Soltani, Khashayar Khajavi, Mahdi Jafari Siavoshani, Amir-Hossein Jahangir. A multi-agent adaptive deep learning framework for online intrusion detection
10 -- 0Batoul Achaal, Mehdi Adda, Maxime Berger, Hussein Ibrahim, Ali Awde. Study of smart grid cyber-security, examining architectures, communication networks, cyber-attacks, countermeasure techniques, and challenges
11 -- 0Yuantu Luo, Jun Tao, Yuehao Zhu, Yifan Xu 0002. HSS: enhancing IoT malicious traffic classification leveraging hybrid sampling strategy
12 -- 0Zeshuo Zhu, Rui Zhang, Yang Tao. Atomic cross-chain swap based on private key exchange
13 -- 0Edward Chuah, Neeraj Suri. An empirical study of reflection attacks using NetFlow data
14 -- 0Benqiang Wei, Xianhui Lu. Improved homomorphic evaluation for hash function based on TFHE
15 -- 0Haobin Chen, Yue Yang, Siyi Lv. Revisiting frequency-smoothing encryption: new security definitions and efficient construction
16 -- 0Md. Alamgir Hossain, Md. Saiful Islam. Enhanced detection of obfuscated malware in memory dumps: a machine learning approach for advanced cybersecurity
17 -- 0Yanjun Li, Weiguo Zhang, Yiping Lin, Jian Zou, Jian Liu. A circuit area optimization of MK-3 S-box
18 -- 0Ximing Li 0001, Hao Wang, Sha Ma, Meiyan Xiao, Qiong Huang 0001. Revocable and verifiable weighted attribute-based encryption with collaborative access for electronic health record in cloud
19 -- 0Chenxi Hu, Tao Wu 0011, Chunsheng Liu, Chao Chang. Joint contrastive learning and belief rule base for named entity recognition in cybersecurity
20 -- 0Chunwen Liu, Ru Tan, Yang Wu, Yun-feng, Ze Jin, Fangjiao Zhang, Yuling Liu, Qixu Liu. Dissecting zero trust: research landscape and its implementation in IoT
21 -- 0Huaxin Wang, Yiwen Gao 0001, Yuejun Liu, Qian Zhang, Yongbin Zhou. In-depth Correlation Power Analysis Attacks on a Hardware Implementation of CRYSTALS-Dilithium
22 -- 0Miao Tian, Yushu Zhang 0001, YongMing Zhang, Xiangli Xiao, Wenying Wen. A privacy-preserving image retrieval scheme with access control based on searchable encryption in media cloud
23 -- 0Urikhimbam Boby Clinton, Nazrul Hoque, Kh Robindro Singh. Classification of DDoS attack traffic on SDN network environment using deep learning
24 -- 0Mingxing Hu, Zhen Liu, Yunhong Zhou. Efficient post-quantum secure deterministic wallet scheme
25 -- 0Kaini Chen, Peisong Shen, Kewei Lv, Xue Tian, Chi Chen 0001. Dynamic group fuzzy extractor
26 -- 0Ziming Jiang, Yongbin Zhou, Yuejun Liu. New partial key exposure attacks on RSA with additive exponent blinding
27 -- 0Chenset Kim, Chakchai So-In, Yanika Kongsorot, Phet Aimtongkham. FLSec-RPL: a fuzzy logic-based intrusion detection scheme for securing RPL-based IoT networks against DIO neighbor suppression attacks
28 -- 0Bin Huang, Yanhui Du. Break-Pad: effective padding machines for tor with break burst padding
29 -- 0Wenhan Xu, Hui Ma 0002, Rui Zhang 0002. GAPS: GPU-accelerated processing service for SM9
30 -- 0Zhongxu Yin, Yiran Song, Guoxiao Zong. Discovering API usage specifications for security detection using two-stage code mining
31 -- 0Yincen Chen, Yi Guo, Xuanyu Liang, Ling Song 0001, Qianqian Yang 0003. Revisiting the shuffle of generalized Feistel structure
32 -- 0Md. Alamin Talukder, Rakib Hossen, Md. Ashraf Uddin 0001, Mohammed Nasir Uddin, Uzzal Kumar Acharjee. Securing transactions: a hybrid dependable ensemble machine learning model using IHT-LR and grid search
33 -- 0Xi Lin, Heyang Cao, Feng-Hao Liu, Zhedong Wang, Mingsheng Wang. Shorter ZK-SNARKs from square span programs over ideal lattices
34 -- 0Alex Shafarenko. Winternitz stack protocols for embedded systems and IoT
35 -- 0Linwei Fang, Liming Wang, Hongjia Li. Iterative and mixed-spaces image gradient inversion attack in federated learning
36 -- 0Chen An, Mengjie Huang, Xianhui Lu, Lei Bi 0002, Weijie Li. Polar code-based secure transmission with higher message rate combining channel entropy and computational entropy
37 -- 0Chaoqun Wang, Ning Li, Shujuan Ji, Xianwen Fang, Zhen Wang. Enhancing fairness of trading environment: discovering overlapping spammer groups with dynamic co-review graph optimization
38 -- 0Zheng Sun, Jinxiao Zhao, Feng Guo, Yuxuan Chen, Lei Ju 0001. CommanderUAP: a practical and transferable universal adversarial attacks on speech recognition models
39 -- 0Jie Yuan, Rui Xu, Xinghai Wei, Keji Miao, Dongxiao Liu. TVRAVNF: an efficient low-cost TEE-based virtual remote attestation scheme for virtual network functions
40 -- 0Yao Pan, Zheng Chao, He Wang, Jing Yang 0032, Hongjia Li, Liming Wang. FedSHE: privacy preserving and efficient federated learning with adaptive segmented CKKS homomorphic encryption
41 -- 0Mikhail Kuznetsov, Evgenia Novikova, Igor V. Kotenko. Modelling user notification scenarios in privacy policies
42 -- 0Chao An, Yuting Xiao, HaiHang Liu, Han Wu, Rui Zhang. Honey password vaults tolerating leakage of both personally identifiable information and passwords
43 -- 0Ruida Wang, Ziyi Li, Xianhui Lu, Zhenfei Zhang, Kunpeng Wang. Key derivable signature and its application in blockchain stealth address
44 -- 0Tin Lai, Farnaz Farid, Abubakar Bello, Fariza Sabrina. Ensemble learning based anomaly detection for IoT cybersecurity via Bayesian hyperparameters sensitivity analysis
45 -- 0Chuyi Yan, Xueying Han, Yan Zhu, Dan Du, Zhigang Lu 0002, Yuling Liu. Phishing behavior detection on different blockchains via adversarial domain adaptation
46 -- 0Huizhuo Wang, Yang Tao, Rui Zhang. Threshold ring signature: generic construction and logarithmic size instantiation
47 -- 0Qintao Shen, Guozhu Meng, Kai Chen 0012. Revealing the exploitability of heap overflow through PoC analysis
48 -- 0Wenbo Wang, Peng Yi, Taotao Kou, Weitao Han, Chengyu Wang 0010. GLDOC: detection of implicitly malicious MS-Office documents using graph convolutional networks
49 -- 0Yinghong Xie, Yan Hao, Xiaowei Han, Qiang Gao, Biao Yin. A multi-channel spatial information feature based human pose estimation algorithm
50 -- 0Zhuo Zhao, Ching-Fang Hsu 0001, Lein Harn, Zhe Xia, Xinyu Jiang, Liu Liu. Lightweight ring-neighbor-based user authentication and group-key agreement for internet of drones
51 -- 0Boyuan Xu, Yiru Gong, Xiaoyu Geng, Yun Li, Cong Dong, Song Liu, Yuling Liu, Bo Jiang, Zhigang Lu 0002. ProcSAGE: an efficient host threat detection method based on graph representation learning
52 -- 0Shahid Alam, Alper Kamil Demir. SIFT: Sifting file types - application of explainable artificial intelligence in cyber forensics
53 -- 0Yamei Wang, Weijing You, Yuexin Zhang, Ayong Ye, Li Xu. Cloud EMRs auditing with decentralized (t, n)-threshold ownership transfer
54 -- 0Sachin Kadam, Anna Scaglione, Nikhil Ravi, Sean Peisert, Brent Lunghino, Aram Shumavon. Optimum noise mechanism for differentially private queries in discrete finite sets
55 -- 0Jingjie Xu, Ting Wang 0004, Mingqi Lv, Tieming Chen, Tiantian Zhu, Baiyang Ji. MVD-HG: multigranularity smart contract vulnerability detection method based on heterogeneous graphs
57 -- 0Jingzhi Liu, Hongyi Yang, Quanlei Qu, Zhidong Liu, Yang Cao. Research on distribution automation security situational awareness technology based on risk transmission path and multi-source information fusion
58 -- 0Yuming Liu, Yong Wang, Hao Feng. A proactive defense method against eavesdropping attack in SDN-based storage environment
59 -- 0Ismail El Gaabouri, Mohamed Senhadji, Mostafa Belkasmi, Brahim El Bhiri. A new S-box pattern generation based on chaotic enhanced logistic map: case of 5-bit S-box
60 -- 0Wei Zhu, Yi Deng 0002. Simultaneously resettable zero knowledge protocol in Public Key model
61 -- 0Aulia Arham, Hanung Adi Nugroho. Enhanced reversible data hiding using difference expansion and modulus function with selective bit blocks in images
62 -- 0Baowei Wang, Fengxiao Guo, Yuting Liu, Bin Li, Yi Yuan. An efficient and versatile e-voting scheme on blockchain
63 -- 0Anyi Li, Qiqing Xia, Qianru Zhu, Li Yang. ff problem
64 -- 0Haoran Yu, Wenchuan Yang, Baojiang Cui, Runqi Sui, Xuedong Wu. Renyi entropy-driven network traffic anomaly detection with dynamic threshold
65 -- 0Wanqing Wu, Mingyu Guo. Improved integral neural distinguisher model for lightweight cipher PRESENT
66 -- 0Jiawei Bao, Jiangxia Ge, Rui Xue. Double-sided: tight proofs for guessing games in the quantum random oracle model
67 -- 0Yunfeng Ji, Rui Zhang 0002, Yang Tao 0001, Birou Gao. Designated confirmer threshold signature and its applications in blockchains
68 -- 0Ziad Akiirne, Abdellah Sghir, Driss Bouzidi. UDAP: ultra-lightweight dot product-based authentication protocol for RFID systems
69 -- 0Haochen Xu, Xiaoyu Geng, Junrong Liu, Zhigang Lu, Bo Jiang, Yuling Liu. A novel approach for detecting malicious hosts based on RE-GCN in intranet
70 -- 0Juntao He, Haoran Dai, Runqi Sui, Xuejing Yuan, Dun Liu, Hao Feng, Xinyue Liu, Wenchuan Yang, Baojiang Cui, Kedan Li. EvilPromptFuzzer: generating inappropriate content based on text-to-image models
71 -- 0Haoran Yu, Wenchuan Yang, Baojiang Cui, Runqi Sui, Xuedong Wu. Enhanced anomaly traffic detection framework using BiGAN and contrastive learning
72 -- 0Yulong Ji, Kunjin Zou, Bin Zou 0002. Mi-maml: classifying few-shot advanced malware using multi-improved model-agnostic meta-learning
73 -- 0Chang Ren, Bin Wu 0011. A Robust joint coverless image steganography scheme based on two independent modules
74 -- 0Mengce Zheng, Hao Kang. Lattice-based cryptanalysis of RSA-type cryptosystems: a bibliometric analysis
75 -- 0Josh Dafoe, Niusen Chen, Bo Chen 0028, Zhenlin Wang. Enabling per-file data recovery from ransomware attacks via file system forensics and flash translation layer data extraction
76 -- 0Qiantao Yang, Xuehui Du, Xiangyu Wu, Wenjuan Wang, Aodi Liu, Shihao Wang. Fedrtid: an efficient shuffle federated learning via random participation and adaptive time constraint
77 -- 0Peng Yin, Sanli Zhu, Yang Yu, Ziqian Wang, Zhuangzhi Chen. Analysis on dendritic deep learning model for AMR task
78 -- 0Boyao Zhao, Haozhe Chen, Jie Zhang, Weiming Zhang, Nenghai Yu. Dual-verification-based model fingerprints against ambiguity attacks
79 -- 0Xiangyang Luo, Xingxing Chen, Xiaofeng Chen, Qingfeng Cheng. A survey on the application of blockchain in cryptographic protocols