-
Revocable and verifiable weighted attribute-based encryption with collaborative access for electronic health record in cloud Cybersecurity Pub Date : 2024-03-03 Ximing Li, Hao Wang, Sha Ma, Meiyan Xiao, Qiong Huang
-
Maxwell’s Demon in MLP-Mixer: towards transferable adversarial attacks Cybersecurity Pub Date : 2024-03-02 Haoran Lyu, Yajie Wang, Yu-an Tan, Huipeng Zhou, Yuhang Zhao, Quanxin Zhang
-
Practical solutions in fully homomorphic encryption: a survey analyzing existing acceleration methods Cybersecurity Pub Date : 2024-03-01 Yanwei Gong, Xiaolin Chang, Jelena Mišić, Vojislav B. Mišić, Jianhua Wang, Haoran Zhu
-
A circuit area optimization of MK-3 S-box Cybersecurity Pub Date : 2024-02-03 Yanjun Li, Weiguo Zhang, Yiping Lin, Jian Zou, Jian Liu
-
Intrusion detection system for controller area network Cybersecurity Pub Date : 2024-02-02 Vinayak Tanksale
-
CT-GCN+: a high-performance cryptocurrency transaction graph convolutional model for phishing node classification Cybersecurity Pub Date : 2024-02-01 Bingxue Fu, Yixuan Wang, Tao Feng
-
Enhanced detection of obfuscated malware in memory dumps: a machine learning approach for advanced cybersecurity Cybersecurity Pub Date : 2024-01-25 Md. Alamgir Hossain, Md. Saiful Islam
-
BRITD: behavior rhythm insider threat detection with time awareness and user adaptation Cybersecurity Pub Date : 2024-01-02
Abstract Researchers usually detect insider threats by analyzing user behavior. The time information of user behavior is an important concern in internal threat detection. Existing works on insider threat detection fail to make full use of the time information, which leads to their poor detection performance. In this paper, we propose a novel behavioral feature extraction scheme: we implicitly encode
-
F3l: an automated and secure function-level low-overhead labeled encrypted traffic dataset construction method for IM in Android Cybersecurity Pub Date : 2024-01-01 Keya Xu, Guang Cheng
-
WAS: improved white-box cryptographic algorithm over AS iteration Cybersecurity Pub Date : 2023-12-08 Yatao Yang, Yuying Zhai, Hui Dong, Yanshuo Zhang
-
Minimizing CNOT-count in quantum circuit of the extended Shor’s algorithm for ECDLP Cybersecurity Pub Date : 2023-12-06 Xia Liu, Huan Yang, Li Yang
-
Towards the transferable audio adversarial attack via ensemble methods Cybersecurity Pub Date : 2023-12-05 Feng Guo, Zheng Sun, Yuxuan Chen, Lei Ju
-
LayerCFL: an efficient federated learning with layer-wised clustering Cybersecurity Pub Date : 2023-12-04 Jie Yuan, Rui Qian, Tingting Yuan, Mingliang Sun, Jirui Li, Xiaoyong Li
-
A novel botnet attack detection for IoT networks based on communication graphs Cybersecurity Pub Date : 2023-12-03 David Concejal Muñoz, Antonio del-Corte Valiente
-
Machine learning based fileless malware traffic classification using image visualization Cybersecurity Pub Date : 2023-12-02 Fikirte Ayalke Demmese, Ajaya Neupane, Sajad Khorsandroo, May Wang, Kaushik Roy, Yu Fu
-
Research on privacy information retrieval model based on hybrid homomorphic encryption Cybersecurity Pub Date : 2023-12-01 Wei-tao Song, Guang Zeng, Wen-zheng Zhang, Dian-hua Tang
-
Verifiable delay functions and delay encryptions from hyperelliptic curves Cybersecurity Pub Date : 2023-11-08 Chao Chen, Fangguo Zhang
-
MSLFuzzer: black-box fuzzing of SOHO router devices via message segment list inference Cybersecurity Pub Date : 2023-11-07 Yixuan Cheng, Wenqing Fan, Wei Huang, Jingyu Yang, Gaoqing Yu, Wen Liu
-
A deep learning aided differential distinguisher improvement framework with more lightweight and universality Cybersecurity Pub Date : 2023-11-06 JiaShuo Liu, JiongJiong Ren, ShaoZhen Chen
-
Improved lower bound for the complexity of unique shortest vector problem Cybersecurity Pub Date : 2023-11-04 Baolong Jin, Rui Xue
-
EPASAD: ellipsoid decision boundary based Process-Aware Stealthy Attack Detector Cybersecurity Pub Date : 2023-11-01 Vikas Maurya, Rachit Agarwal, Saurabh Kumar, Sandeep Shukla
-
Generic attacks on small-state stream cipher constructions in the multi-user setting Cybersecurity Pub Date : 2023-10-08 Jianfu Huang, Ye Luo, Qinggan Fu, Yincen Chen, Chao Wang, Ling Song
-
Evicting and filling attack for linking multiple network addresses of Bitcoin nodes Cybersecurity Pub Date : 2023-10-07 Huashuang Yang, Jinqiao Shi, Yue Gao, Xuebin Wang, Yanwei Sun, Ruisheng Shi, Dongbin Wang
-
Aparecium: understanding and detecting scam behaviors on Ethereum via biased random walk Cybersecurity Pub Date : 2023-10-06 Chuyi Yan, Chen Zhang, Meng Shen, Ning Li, Jinhao Liu, Yinhao Qi, Zhigang Lu, Yuling Liu
-
An efficient permutation approach for SbPN-based symmetric block ciphers Cybersecurity Pub Date : 2023-10-05 Mir Nazish, M. Tariq Banday, Insha Syed, Sheena Banday
-
IHVFL: a privacy-enhanced intention-hiding vertical federated learning framework for medical data Cybersecurity Pub Date : 2023-10-04 Fei Tang, Shikai Liang, Guowei Ling, Jinyong Shan
-
Intrusion detection systems for wireless sensor networks using computational intelligence techniques Cybersecurity Pub Date : 2023-10-03 Vaishnavi Sivagaminathan, Manmohan Sharma, Santosh Kumar Henge
-
Detecting fake reviewers in heterogeneous networks of buyers and sellers: a collaborative training-based spammer group algorithm Cybersecurity Pub Date : 2023-10-02 Qi Zhang, Zhixiang Liang, Shujuan Ji, Benyong Xing, Dickson K. W. Chiu
-
Continuously non-malleable codes from block ciphers in split-state model Cybersecurity Pub Date : 2023-10-01 Anit Kumar Ghosal, Dipanwita Roychowdhury
-
Use of subword tokenization for domain generation algorithm classification Cybersecurity Pub Date : 2023-09-07 Sea Ran Cleon Liew, Ngai Fong Law
-
A buffer overflow detection and defense method based on RISC-V instruction set extension Cybersecurity Pub Date : 2023-09-06 Chang Liu, Yan-Jun Wu, Jing-Zheng Wu, Chen Zhao
-
Detecting compromised email accounts via login behavior characterization Cybersecurity Pub Date : 2023-09-04 Jianjun Zhao, Can Yang, Di Wu, Yaqin Cao, Yuling Liu, Xiang Cui, Qixu Liu
-
Security estimation of LWE via BKW algorithms Cybersecurity Pub Date : 2023-09-03 Yu Wei, Lei Bi, Xianhui Lu, Kunpeng Wang
-
A convolutional neural network to detect possible hidden data in spatial domain images Cybersecurity Pub Date : 2023-09-02 Jean De La Croix Ntivuguruzwa, Tohari Ahmad
-
Optimal monitoring and attack detection of networks modeled by Bayesian attack graphs Cybersecurity Pub Date : 2023-09-01 Armita Kazeminajafabadi, Mahdi Imani
-
Towards the universal defense for query-based audio adversarial attacks on speech recognition system Cybersecurity Pub Date : 2023-08-05 Feng Guo, Zheng Sun, Yuxuan Chen, Lei Ju
-
FMSA: a meta-learning framework-based fast model stealing attack technique against intelligent network intrusion detection systems Cybersecurity Pub Date : 2023-08-04 Kaisheng Fan, Weizhe Zhang, Guangrui Liu, Hui He
-
MRm-DLDet: a memory-resident malware detection framework based on memory forensics and deep neural network Cybersecurity Pub Date : 2023-08-03 Jiaxi Liu, Yun Feng, Xinyu Liu, Jianjun Zhao, Qixu Liu
-
AppChainer: investigating the chainability among payloads in android applications Cybersecurity Pub Date : 2023-08-02 Xiaobo Xiang, Yue Jiang, Qingli Guo, Xiu Zhang, Xiaorui Gong, Baoxu Liu
-
Enhancing non-profiled side-channel attacks by time-frequency analysis Cybersecurity Pub Date : 2023-08-01 Chengbin Jin, Yongbin Zhou
-
An efficient confidentiality protection solution for pub/sub system Cybersecurity Pub Date : 2023-07-04 Jinglei Pei, Yuyang Shi, Qingling Feng, Ruisheng Shi, Lina Lan, Shui Yu, Jinqiao Shi, Zhaofeng Ma
-
NBA: defensive distillation for backdoor removal via neural behavior alignment Cybersecurity Pub Date : 2023-07-03 Zonghao Ying, Bin Wu
-
Are our clone detectors good enough? An empirical study of code effects by obfuscation Cybersecurity Pub Date : 2023-07-02 Weihao Huang, Guozhu Meng, Chaoyang Lin, Qiucun Yan, Kai Chen, Zhuo Ma
-
SkillSim: voice apps similarity detection Cybersecurity Pub Date : 2023-07-01 Zhixiu Guo, Ruigang Liang, Guozhu Meng, Kai Chen
-
Rainbow: reliable personally identifiable information retrieval across multi-cloud Cybersecurity Pub Date : 2023-06-03 Zishuai Song, Hui Ma, Shuzhou Sun, Yansen Xin, Rui Zhang
-
Reversible data hiding based on histogram and prediction error for sharing secret data Cybersecurity Pub Date : 2023-06-02 Chaidir Chalaf Islamy, Tohari Ahmad, Royyana Muslim Ijtihadie
-
PosFuzz: augmenting greybox fuzzing with effective position distribution Cybersecurity Pub Date : 2023-06-01 Yanyan Zou, Wei Zou, JiaCheng Zhao, Nanyu Zhong, Yu Zhang, Ji Shi, Wei Huo
-
-
Confidential computing and related technologies: a critical review Cybersecurity Pub Date : 2023-05-02 Muhammad Usama Sardar, Christof Fetzer
-
DLP: towards active defense against backdoor attacks with decoupled learning process Cybersecurity Pub Date : 2023-05-01 Zonghao Ying, Bin Wu
-
Time sensitive networking security: issues of precision time protocol and its implementation Cybersecurity Pub Date : 2023-04-11 Davide Berardi, Nils O. Tippenhauer, Andrea Melis, Marco Prandini, Franco Callegati
-
Exploring best-matched embedding model and classifier for charging-pile fault diagnosis Cybersecurity Pub Date : 2023-04-04 Wen Wang, Jianhua Wang, Xiaofeng Peng, Ye Yang, Chun Xiao, Shuai Yang, Mingcai Wang, Lingfei Wang, Lin Li, Xiaolin Chang
-
Jeu de mots paronomasia: a StackOverflow-driven bug discovery approach Cybersecurity Pub Date : 2023-04-03 Yi Yang, Ying Li, Kai Chen, Jinghua Liu
-
Android malware category detection using a novel feature vector-based machine learning model Cybersecurity Pub Date : 2023-03-09 Hashida Haidros Rahima Manzil, S. Manohar Naik
-
An ensemble deep learning based IDS for IoT using Lambda architecture Cybersecurity Pub Date : 2023-03-02 Rubayyi Alghamdi, Martine Bellaiche
-
Tackling imbalanced data in cybersecurity with transfer learning: a case with ROP payload detection Cybersecurity Pub Date : 2023-01-05 Haizhou Wang, Anoop Singhal, Peng Liu
-
Subspace clustering via graph auto-encoder network for unknown encrypted traffic recognition Cybersecurity Pub Date : 2022-12-03 Ruipeng Yang, Aimin Yu, Lijun Cai, Dan Meng
-
Deep 3D mesh watermarking with self-adaptive robustness Cybersecurity Pub Date : 2022-12-02 Feng Wang, Hang Zhou, Han Fang, Weiming Zhang, Nenghai Yu
-
Unleashing the power of pseudo-code for binary code similarity analysis Cybersecurity Pub Date : 2022-12-01 Weiwei Zhang, Zhengzi Xu, Yang Xiao, Yinxing Xue
-
The differential fault analysis on block cipher FeW Cybersecurity Pub Date : 2022-11-03 Haiyan Xiao, Lifang Wang, Jinyong Chang