Abstract is missing.
- Network Data Collection, Fusion, Mining and Analytics for Cyber SecurityZheng Yan. 1-5 [doi]
- Malicious Web Request Detection Using Character-Level CNNWei Rong, Bowen Zhang, Xixiang Lv. 6-16 [doi]
- A LBP Texture Analysis Based Liveness Detection for Face AuthenticationZhiqiong Yang, Qiuheng Li, Yan Li, Zilong Wang. 17-28 [doi]
- A Survey on Deep Learning Techniques for Privacy-PreservingHarry Chandra Tanuwidjaja, Rakyong Choi, Kwangjo Kim. 29-46 [doi]
- Quantifiable Network Security Measurement: A Study Based on an Index SystemGuoquan Li, Yulong Fu, Zheng Yan, Weilin Hao. 47-62 [doi]
- CatraDroid: A Call Trace Driven Detection of Malicious Behaiviors in Android ApplicationsCong Sun 0001, Jun Chen, Pengbin Feng, Jianfeng Ma. 63-77 [doi]
- Password Guessing via Neural Language ModelingHang Li, Mengqi Chen, Shengbo Yan, Chunfu Jia, Zhaohui Li. 78-93 [doi]
- A Cooperative Placement Method for Machine Learning Workflows and Meteorological Big Data Security Protection in Cloud ComputingXinzhao Jiang, Wei Kong, Xin Jin, Jian Shen. 94-111 [doi]
- A Lightweight Certificateless User Authentication Scheme for Mobile EnvironmentAlzubair Hassan, Rafik Hamza, Vittor Gift Mawutor, Akash Suresh Patil, Fagen Li. 112-122 [doi]
- Detection of GPS Spoofing Attack on Unmanned Aerial Vehicle SystemChen Liang, Meixia Miao, Jianfeng Ma, Hongyan Yan, Qun Zhang, Xinghua Li, Teng Li 0003. 123-139 [doi]
- SwipeVLock: A Supervised Unlocking Mechanism Based on Swipe Behavior on SmartphonesWenjuan Li, Jiao Tan, Weizhi Meng, Yu Wang 0017, Jing Li. 140-153 [doi]
- An Enumeration-Like Vector Sampling Method for Solving Approximate SVPLuan Luan, Chunxiang Gu, Yonghui Zheng. 154-172 [doi]
- Secure Multiparty Learning from Aggregation of Locally Trained ModelsXu Ma, Cunmei Ji, Xiaoyu Zhang, Jianfeng Wang, Jin Li, Kuan-Ching Li. 173-182 [doi]
- Data-Driven Android Malware Intelligence: A SurveyJunyang Qiu, Surya Nepal, Wei Luo, Lei Pan 0002, Yonghang Tai, Jun Zhang 0010, Yang Xiang 0001. 183-202 [doi]
- Semantically Secure and Verifiable Multi-keyword Search in Cloud ComputingLili Zhang, Wenjie Wang, Yuqing Zhang. 203-223 [doi]
- Content Recognition of Network Traffic Using Wavelet Transform and CNNYu Liang, Yi Xie, Xingrui Fei, Xincheng Tan, Haishou Ma. 224-238 [doi]
- Compositional Information Flow Verification for Inter Application Communications in Android SystemXue Rao, Ning Xi 0002, Jing Lv, Pengbin Feng. 239-252 [doi]
- A Blackboard Sharing Mechanism for Community Cyber Threat Intelligence Based on Multi-Agent SystemYue Lin, He Wang, Bowen Yang, Mingrui Liu, Yin Li, Yuqing Zhang. 253-270 [doi]
- A Lightweight Secure IoT Surveillance Framework Based on DCT-DFRT AlgorithmsRafik Hamza, Alzubair Hassan, Akash Suresh Patil. 271-278 [doi]
- Interpretable Encrypted Searchable Neural NetworksKai Chen, Zhongrui Lin, Jian Wan, Chungen Xu. 279-289 [doi]
- Game Theory Based Dynamic Defense Mechanism for SDNDeming Mao, Shuwen Zhang, Ling Zhang, Yu Feng. 290-303 [doi]
- A Visualization-Based Analysis on Classifying Android MalwareRory Coulter, Lei Pan 0002, Jun Zhang, Yang Xiang 0001. 304-319 [doi]
- Protecting the Visual Fidelity of Machine Learning Datasets Using QR CodesYang-Wai Chow, Willy Susilo, Jianfeng Wang, Richard Buckland, Joonsang Baek, Jongkil Kim, Nan Li 0007. 320-335 [doi]
- Reinforcement Learning Based UAV Trajectory and Power Control Against JammingZihan Lin, Xiaozhen Lu, Canhuang Dai, Geyi Sheng, Liang Xiao 0003. 336-347 [doi]
- A Fair and Efficient Secret Sharing Scheme Based on Cloud AssistingMingwu Zhang, Xiao Chen, Gang Shen 0003, Yong Ding 0005. 348-360 [doi]
- Secure and Fast Decision Tree Evaluation on Outsourced Cloud DataLin Liu, Jinshu Su, Rongmao Chen, Jinrong Chen, Guangliang Sun, Jie Li. 361-377 [doi]
- Who Activated My Voice Assistant? A Stealthy Attack on Android Phones Without Users' AwarenessRongjunchen Zhang, Xiao Chen 0002, Sheng Wen, James Zheng. 378-396 [doi]