401 | -- | 416 | Xiangjun Li, Ke Kong, Su Xu, Pengtao Qin, Daojing He. Feature selection-based android malware adversarial sample generation and detection method |
417 | -- | 427 | Wonhee Cho, Jiseung Kim 0001, Changmin Lee 0001. Extension of simultaneous Diophantine approximation algorithm for partial approximate common divisor variants |
428 | -- | 441 | Xingting Dong, Yupu Hu, Baocang Wang, Momeng Liu, Wen Gao 0010. Lattice-based revocable attribute-based encryption with decryption key exposure resistance |
442 | -- | 456 | Qingyun Zhang, Xing Zhang, Mingyue Wang, Xiaohui Li. DPLQ: Location-based service privacy protection scheme based on differential privacy |
457 | -- | 471 | Tao Hou, Ting Cui. Yoyo trick on type-II generalised Feistel networks |
472 | -- | 486 | Tanping Zhou, Ningbo Li, Qiqi Lai, Xiaoyuan Yang 0002, Yiliang Han, Wenchao Liu. Efficient multi-key fully homomorphic encryption over prime cyclotomic rings with fewer relinearisations |
487 | -- | 495 | Yanjun Li, Hao Lin, Meng Liang, Ying Sun. A new quantum cryptanalysis method on block cipher Camellia |