default search action
Security and Communication Networks, Volume 2020
Volume 2020, 2020
- Xianwei Zhu, ChaoWen Chang, Qin Xi, ZhiBin Zuo:
Attribute-Guard: Attribute-Based Flow Access Control Framework in Software-Defined Networking. 6302739:1-6302739:18 - Mingfu Xue, Chengxiang Yuan, Jian Wang, Weiqiang Liu:
DPAEG: A Dependency Parse-Based Adversarial Examples Generation Method for Intelligent Q&A Robots. 5890820:1-5890820:15 - Congge Xie, Jian Weng, Jinming Wen:
Scalable Revocable Identity-Based Signature Scheme with Signing Key Exposure Resistance from Lattices. 1743421:1-1743421:11 - Jiaye Pan, Yi Zhuang, Binglin Sun:
BAHK: Flexible Automated Binary Analysis Method with the Assistance of Hardware and System Kernel. 8702017:1-8702017:19 - Mingjiang Huang, Liming Wang:
Automatic Search for the Linear (Hull) Characteristics of ARX Ciphers: Applied to SPECK, SPARX, Chaskey, and CHAM-64. 4898612:1-4898612:14 - JeongYeon Kim:
Protecting Metadata of Access Indicator and Region of Interests for Image Files. 4836109:1-4836109:10 - Hua Dai, Xuelong Dai, Xiao Li, Xun Yi, Fu Xiao, Geng Yang:
A Multibranch Search Tree-Based Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data. 7307315:1-7307315:15 - Smitha Rajagopal, Poornima Panduranga Kundapur, Katiganere Siddaramappa Hareesha:
A Stacking Ensemble for Network Intrusion Detection Using Heterogeneous Datasets. 4586875:1-4586875:9 - Gyeong-Hoon Lee, Jeil Jo, Cheong Hee Park:
Jamming Prediction for Radar Signals Using Machine Learning Methods. 2151570:1-2151570:9 - S. Mary Virgil Nithya, V. Rhymend Uthariaraj:
Identity-Based Public Auditing Scheme for Cloud Storage with Strong Key-Exposure Resilience. 4838497:1-4838497:13 - Abigail Akosua Addobea, Jun Hou, Qianmu Li:
MHCOOS: An Offline-Online Certificateless Signature Scheme for M-Health Devices. 7085623:1-7085623:12 - Xingguang Zhou, Jianwei Liu, Zongyang Zhang, Qianhong Wu:
Secure Outsourced Medical Data against Unexpected Leakage with Flexible Access Control in a Cloud Storage System. 8347213:1-8347213:20 - Xingting Dong, Yanhua Zhang, Baocang Wang, Jiangshan Chen:
Server-Aided Revocable Attribute-Based Encryption from Lattices. 1460531:1-1460531:13 - Zhiyan Xu, Debiao He, Neeraj Kumar, Kim-Kwang Raymond Choo:
Efficient Certificateless Aggregate Signature Scheme for Performing Secure Routing in VANETs. 5276813:1-5276813:12 - Taeyun Kim, Yongwoo Oh, Hyoungshick Kim:
Efficient Privacy-Preserving Fingerprint-Based Authentication System Using Fully Homomorphic Encryption. 4195852:1-4195852:11 - Na Lv, Tianyu Chen, Shuangyi Zhu, Jing Yang, Yuan Ma, Jiwu Jing, Jingqiang Lin:
High-Efficiency Min-Entropy Estimation Based on Neural Network for Random Number Generators. 4241713:1-4241713:18 - Taehoon Eom, Jin B. Hong, SeongMo An, Jong Sou Park, Dong Seong Kim:
A Framework for Real-Time Intrusion Response in Software Defined Networking Using Precomputed Graphical Security Models. 7235043:1-7235043:15 - Jiaqing Mo, Zhongwang Hu, Yuhua Lin:
Cryptanalysis and Security Improvement of Two Authentication Schemes for Healthcare Systems Using Wireless Medical Sensor Networks. 5047379:1-5047379:11 - Anchit Bijalwan:
Botnet Forensic Analysis Using Machine Learning. 9302318:1-9302318:9 - Jingmei Li, Di Xue, Weifei Wu, Jiaxiang Wang:
Incremental Learning for Malware Classification in Small Datasets. 6309243:1-6309243:12 - Lingyun Jiang, Kai Qiao, Ruoxi Qin, Linyuan Wang, Wanting Yu, Jian Chen, Haibing Bu, Bin Yan:
Cycle-Consistent Adversarial GAN: The Integration of Adversarial Attack and Defense. 3608173:1-3608173:9 - John Foley, Naghmeh Moradpoor, Henry Ochenyi:
Employing a Machine Learning Approach to Detect Combined Internet of Things Attacks against Two Objective Functions Using a Novel Dataset. 2804291:1-2804291:17 - Kun Tang, Wenjuan Tang, Entao Luo, Zhiyuan Tan, Weizhi Meng, Lianyong Qi:
Secure Information Transmissions in Wireless-Powered Cognitive Radio Networks for Internet of Medical Things. 7542726:1-7542726:10 - Trevor J. Bihl, Todd J. Paciencia, Kenneth W. Bauer Jr., Michael A. Temple:
Cyber-Physical Security with RF Fingerprint Classification through Distance Measure Extensions of Generalized Relevance Learning Vector Quantization. 3909763:1-3909763:12 - Shumaila Shahzadi, Bushra Khaliq, Muhammad Rizwan, Fahad Ahmad:
Security of Cloud Computing Using Adaptive Neural Fuzzy Inference System. 5352108:1-5352108:15 - Ömer Aslan, Refik Samet, Ömer Özgür Tanriöver:
Using a Subtractive Center Behavioral Model to Detect Malware. 7501894:1-7501894:17 - Subin Moon, Younho Lee:
An Efficient Encrypted Floating-Point Representation Using HEAAN and TFHE. 1250295:1-1250295:18 - Sanghoon Lee, Ik Rae Jeong:
On the Unlinkability of Fingerprint Shell. 8256929:1-8256929:8 - Ying Zou, Zhen Zhao, Sha Shi, Lei Wang, Yunfeng Peng, Yuan Ping, Baocang Wang:
Highly Secure Privacy-Preserving Outsourced k-Means Clustering under Multiple Keys in Cloud Computing. 1238505:1-1238505:11 - Xiaohui Yang, Ying Sun:
User Audit Model Based on Attribute Measurement and Similarity Measurement. 8387672:1-8387672:9 - Ping Zhang, Qian Yuan:
Minimizing Key Materials: The Even-Mansour Cipher Revisited and Its Application to Lightweight Authenticated Encryption. 4180139:1-4180139:6 - Donatas Mazeika, Rimantas Butleris:
Integrating Security Requirements Engineering into MBSE: Profile and Guidelines. 5137625:1-5137625:12 - Chao Ma, Haiying Gao, Duo Wei:
A CP-ABE Scheme Supporting Arithmetic Span Programs. 3265871:1-3265871:16 - Shenyong Xiao, Zhijun Yu, Ya Shuang Deng:
Design and Analysis of a Novel Chaos-Based Image Encryption Algorithm via Switch Control Mechanism. 7913061:1-7913061:12 - Jiangheng Kou, Mingxing He, Ling Xiong, Zeqiong Lv:
Efficient Hierarchical Authentication Protocol for Multiserver Architecture. 2523834:1-2523834:14 - Jing Liu, Changbo Yuan, Yingxu Lai, Hua Qin:
Protection of Sensitive Data in Industrial Internet Based on Three-Layer Local/Fog/Cloud Storage. 2017930:1-2017930:16 - Thaier Hayajneh, Razvi Doomun, Ghada Almashaqbeh, Bassam Jamil Mohd:
Erratum to "An Energy-Efficient and Security Aware Route Selection Protocol for Wireless Sensor Networks". 4093210:1-4093210:1 - Alper Egitmen, Irfan Bulut, R. Can Aygun, Ayse Bilge Gunduz, Omer Seyrekbasan, Ali Gökhan Yavuz:
Combat Mobile Evasive Malware via Skip-Gram-Based Malware Detection. 6726147:1-6726147:10 - S. Milton Ganesh, S. P. Manikandan:
An Efficient Integrity Verification and Authentication Scheme over the Remote Data in the Public Clouds for Mobile Users. 9809874:1-9809874:13 - Shazia Afzal, Muhammad Yousaf, Humaira Afzal, Nawaf Alharbe, Muhammad Rafiq Mufti:
Cryptographic Strength Evaluation of Key Schedule Algorithms. 3189601:1-3189601:9 - Xiangshi Wang, Lei Su, Qihang Zhou, Liping Wu:
Group Recommender Systems Based on Members' Preference for Trusted Social Networks. 1924140:1-1924140:11 - Xiujuan Wang, Qianqian Zheng, Kangfeng Zheng, Tong Wu:
User Authentication Method Based on MKL for Keystroke and Mouse Behavioral Feature Fusion. 9282380:1-9282380:14 - Xiaoyi Duan, Dong Chen, Xiaohong Fan, Xiuying Li, Ding Ding, You Li:
Research and Implementation on Power Analysis Attacks for Unbalanced Data. 5695943:1-5695943:10 - Guangjia Song, Hui Wang, Fuquan Liu:
Using FDAD to Prevent DAD Attack in SEcure Neighbor Discovery Protocol. 2408792:1-2408792:15 - Gaofeng He, Bingfeng Xu, Lu Zhang, Haiting Zhu:
On-Device Detection of Repackaged Android Malware via Traffic Clustering. 8630748:1-8630748:19 - Xue-yuan Yin, Xingshu Chen, Lin Chen, Hui Li:
Extension of Research on Security as a Service for VMs in IaaS Platform. 8538519:1-8538519:16 - Bo Liu, Qilin Wu, Yiwen Zhang, Qian Cao:
Exploiting the Relationship between Pruning Ratio and Compression Effect for Neural Network Model Based on TensorFlow. 5218612:1-5218612:8 - Shu-Chuan Chu, Lili Chen, Sachin Kumar, Saru Kumari, Joel J. P. C. Rodrigues, Chien-Ming Chen:
Decentralized Private Information Sharing Protocol on Social Networks. 7137480:1-7137480:12 - Kyungroul Lee, Sun-Young Lee, Kangbin Yim:
Classification and Analysis of Security Techniques for the User Terminal Area in the Internet Banking Service. 7672941:1-7672941:16 - Xiaotong Xu, Gaocai Wang, Jintian Hu, Yuting Lu:
Study on Stochastic Differential Game Model in Network Attack and Defense. 3417039:1-3417039:15 - Jinglei Tan, Hengwei Zhang, Hongqi Zhang, Cheng Lei, Hui Jin, Bo-wen Li, Hao Hu:
Optimal Timing Selection Approach to Moving Target Defense: A FlipIt Attack-Defense Game Model. 3151495:1-3151495:12 - Qinju Liu, Xianhui Lu, Fucai Luo, Shuai Zhou, Jingnan He, Kunpeng Wang:
SecureBP from Homomorphic Encryption. 5328059:1-5328059:9 - Haining Yu, Hongli Zhang, Xiangzhan Yu:
Hail the Closest Driver on Roads: Privacy-Preserving Ride Matching in Online Ride Hailing Services. 4948387:1-4948387:13 - Xiaohui Yang, Ying Sun:
Abnormal User Detection Based on the Correlation Probabilistic Model. 8014958:1-8014958:11 - Yongtao Liu, Ruizhi Sun, Tianyi Zhang, Xiangnan Zhang, Li Li, Guoqing Shi:
Warehouse-Oriented Optimal Path Planning for Autonomous Mobile Fire-Fighting Robots. 6371814:1-6371814:13 - Shaoqiang Liu, Chaiyang Peng, Chunjiang Li:
Research on SKINNY Optimal Differential Trail Search. 6789281:1-6789281:9 - Xingran Li, Wei Yu, Bao Li:
Parallel and Regular Algorithm of Elliptic Curve Scalar Multiplication over Binary Fields. 4087873:1-4087873:10 - Yuyan Guo, Jiguo Li, Mingming Jiang, Lei Yu, Shimin Wei:
Certificate-Based Encryption Resilient to Continual Leakage in the Standard Model. 1492681:1-1492681:11 - Mingqian Wang, Shuai Cao, Yunliang Wang:
VoNR-IPD: A Novel Timing-Based Network Steganography for Industrial Internet. 8846230:1-8846230:14 - Yousheng Zhou, Longan Wang:
A Lattice-Based Authentication Scheme for Roaming Service in Ubiquitous Networks with Anonymity. 2637916:1-2637916:19 - Shaddrack Yaw Nusenu:
Authentication and Secrecy of Multicast Communication Scenario: Artificial Noise-Aided Costas Sequence Matrix FDA Approach. 2194840:1-2194840:13 - Jiangtao Zhai, Huaifeng Shi, Mingqian Wang, Zhongjun Sun, Junjun Xing:
An Encrypted Traffic Identification Scheme Based on the Multilevel Structure and Variational Automatic Encoder. 8863169:1-8863169:10 - Zhe Xia, Yining Liu, Ching-Fang Hsu, Chinchen Chang:
Cryptanalysis and Improvement of a Group Authentication Scheme with Multiple Trials and Multiple Authentications. 6183861:1-6183861:8 - Xiaoping Li, Hefeng Chen, Yanjun Liu, Chin-Chen Chang:
Unordered Multisecret Sharing Based on Generalized Chinese Remainder Theorem. 6073721:1-6073721:8 - Meijuan Yin, Wen Yang, Xiaonan Liu, Xiangyang Luo:
Evaluator: A Multilevel Decision Approach for Web-Based Landmark Evaluation. 8843188:1-8843188:15 - Nabil Moukafih, Ghizlane Orhanou, Said Elhajji:
Neural Network-Based Voting System with High Capacity and Low Computation for Intrusion Detection in SIEM/IDS Systems. 3512737:1-3512737:15 - Yu Zhang, Yin Li, Yifan Wang:
Efficient Searchable Symmetric Encryption Supporting Dynamic Multikeyword Ranked Search. 7298518:1-7298518:16 - Bonwook Koo, Younghoon Jung, Woo-Hwan Kim:
Rotational-XOR Rectangle Cryptanalysis on Round-Reduced Simon. 5968584:1-5968584:12 - Hussain M. J. Almohri, Mohammad Al-Mutawa, Mahmoud Alawadh, Karim O. Elish:
A Client Bootstrapping Protocol for DoS Attack Mitigation on Entry Point Services in the Cloud. 8873258:1-8873258:12 - Hui Liu, Bo Zhao, Jianwen Zou, Linquan Huang, Yifan Liu:
A Lightweight Image Encryption Algorithm Based on Message Passing and Chaotic Map. 7151836:1-7151836:12 - Juan Zhang, Changsheng Wan, Chunyu Zhang, Xiaojun Guo, Yongyong Chen:
Noninteractive Lightweight Privacy-Preserving Auditing on Images in Mobile Crowdsourcing Networks. 8827364:1-8827364:11 - Rongfeng Zheng, Jiayong Liu, Weina Niu, Liang Liu, Kai Li, Shan Liao:
Preprocessing Method for Encrypted Traffic Based on Semisupervised Clustering. 8824659:1-8824659:13 - Yang Wang, Haijin Gui, Lei Ma:
A Survey on Services Provision and Distribution of Official and Commercial Intellectual Property Platforms. 8833416:1-8833416:14 - Bingfeng Xu, Zhicheng Zhong, Gaofeng He:
A Minimum Defense Cost Calculation Method for Attack Defense Trees. 8870734:1-8870734:12 - Davy Preuveneers, Wouter Joosen, Jorge Bernal Bernabé, Antonio F. Skarmeta:
Distributed Security Framework for Reliable Threat Intelligence Sharing. 8833765:1-8833765:15 - Pengpeng Ding, Jinguo Li, Liangliang Wang, Mi Wen, Yuyao Guan:
HYBRID-CNN: An Efficient Scheme for Abnormal Flow Detection in the SDN-Based Smart Grid. 8850550:1-8850550:20 - Wangli Hao, Ruixian Zhang, Shancang Li, Junyu Li, Fuzhong Li, Shanshan Zhao, Wuping Zhang:
Anomaly Event Detection in Security Surveillance Using Two-Stream Based Model. 8876056:1-8876056:15 - Xiaoping Zhao, Yonghong Zhang, Fan Shao:
A Multifault Diagnosis Method of Gear Box Running on Edge Equipment. 8854236:1-8854236:13 - Shujiang Xu, Qixian Hao, Bin Ma, Chunpeng Wang, Jian Li:
Accurate Computation of Fractional-Order Exponential Moments. 8822126:1-8822126:16 - Supriyanto Praptodiyono, Teguh Firmansyah, Mudrik Alaydrus, M. Iman Santoso, Azlan Osman, Rosni Abdullah:
Mobile IPv6 Vertical Handover Specifications, Threats, and Mitigation Methods: A Survey. 5429630:1-5429630:18 - Bandar Almaslukh:
An Efficient and Effective Approach for Flooding Attack Detection in Optical Burst Switching Networks. 8840058:1-8840058:11 - Jing Tian, Gang Xiong, Zhen Li, Gaopeng Gou:
A Survey of Key Technologies for Constructing Network Covert Channel. 8892896:1-8892896:20 - Huihua Xia, Yan Xiong, Wenchao Huang, Zhaoyi Meng, Fuyou Miao:
Limiting Privacy Breaches in Average-Distance Query. 8895281:1-8895281:24 - Jielin Jiang, Xing Zhang, Shengjun Li:
A Task Offloading Method with Edge for 5G-Envisioned Cyber-Physical-Social Systems. 8867094:1-8867094:9 - Yuan Liu, Licheng Wang, Xiaoying Shen, Lixiang Li, Dezhi An:
Space-Efficient Key-Policy Attribute-Based Encryption from Lattices and Two-Dimensional Attributes. 2345369:1-2345369:11 - Nadiya El Kamel, Mohamed Eddabbah, Youssef Lmoumen, Raja Touahni:
A Smart Agent Design for Cyber Security Based on Honeypot and Machine Learning. 8865474:1-8865474:9 - Pan Jun Sun:
Research on the Optimization Management of Cloud Privacy Strategy Based on Evolution Game. 6515328:1-6515328:18 - Gaocai Wang, Ning Yu:
Risk Situation Assessment Model Based on Interdomain Interaction in Cloud Computing Environment. 7816925:1-7816925:12 - Li Li, Jiayong Liu, Peng Jia:
SPCTR: Sealed Auction-Based Procurement for Closest Pre-Tender with Range Validation. 8872617:1-8872617:12 - Xuefei Cao, Yulong Fu, Bo Chen:
Packet-Based Intrusion Detection Using Bayesian Topic Models in Mobile Edge Computing. 8860418:1-8860418:12 - Fangchao Yu, Li Wang, Xianjin Fang, Youwen Zhang:
The Defense of Adversarial Example with Conditional Generative Adversarial Networks. 3932584:1-3932584:12 - Junyan Guo, Ye Du:
A Novel RLWE-Based Anonymous Mutual Authentication Protocol for Space Information Network. 5167832:1-5167832:12 - Youngjoo Shin, Junbeom Hur, Dongyoung Koo, Joobeom Yun:
Toward Serverless and Efficient Encrypted Deduplication in Mobile Cloud Computing Environments. 3046595:1-3046595:15 - Mariano Di Martino, Peter Quax, Wim Lamotte:
Knocking on IPs: Identifying HTTPS Websites for Zero-Rated Traffic. 7285786:1-7285786:14 - Yirui Wu, Dabao Wei, Jun Feng:
Network Attacks Detection Methods Based on Deep Learning Techniques: A Survey. 8872923:1-8872923:17 - Rongbin Xu, Jianguo Wu, Yongliang Cheng, Zhiqiang Liu, Yuanmo Lin, Ying Xie:
Dynamic Security Exchange Scheduling Model for Business Workflow Based on Queuing Theory in Cloud Computing. 8886640:1-8886640:12 - Tianen Liu, Yingjie Wang, Zhipeng Cai, Xiangrong Tong, Qingxian Pan, Jindong Zhao:
A Dynamic Privacy Protection Mechanism for Spatiotemporal Crowdsourcing. 8892954:1-8892954:13 - Xuefei Cao, Lanjun Dang, Yingzi Luan, Wei You:
A Certificateless Noninteractive Key Exchange Protocol with Provable Security. 8862476:1-8862476:8 - Tianliang Lu, Yanhui Du, Li Ouyang, Qiuyu Chen, Xirui Wang:
Android Malware Detection Based on a Hybrid Deep Learning Model. 8863617:1-8863617:11 - Seyed Amir Hosseini Beghaeiraveri, Mohammad Izadi, Mohsen Rezvani:
Broadcast Complexity and Adaptive Adversaries in Verifiable Secret Sharing. 9428457:1-9428457:10 - Pengfei Sun, Pengju Liu, Qi Li, Chenxi Liu, Xiangling Lu, Ruochen Hao, Jinpeng Chen:
DL-IDS: Extracting Features Using CNN-LSTM Hybrid Network for Intrusion Detection System. 8890306:1-8890306:11 - Piotr Bialczak, Wojciech Mazurczyk:
Characterizing Anomalies in Malware-Generated HTTP Traffic. 8848863:1-8848863:26 - Ou Ruan, Hao Mao:
Efficient Private Set Intersection Using Point-Value Polynomial Representation. 8890677:1-8890677:12 - Haiping Huang, Qinglong Huang, Fu Xiao, Wenming Wang, Qi Li, Ting Dai:
An Improved Broadcast Authentication Protocol for Wireless Sensor Networks Based on the Self-Reinitializable Hash Chains. 8897282:1-8897282:17 - Ijaz Ahmad Awan, Muhammad Shiraz, Muhammad Usman Hashmi, Qaisar Shaheen, Rizwan Akhtar, Allah Ditta:
Secure Framework Enhancing AES Algorithm in Cloud Computing. 8863345:1-8863345:16 - Diqun Yan, Xiaowen Li, Li Dong, Rangding Wang:
An Antiforensic Method against AMR Compression Detection. 8849902:1-8849902:8 - Bo Liu, Qilin Wu, Qian Cao:
An Improved Elman Network for Stock Price Prediction Service. 8824430:1-8824430:9 - Jinlong Hu, Tenghui Li, Yi Zhuang, Song Huang, Shoubin Dong:
GFD: A Weighted Heterogeneous Graph Embedding Based Approach for Fraud Detection in Mobile Advertising. 8810817:1-8810817:12 - Zhiyong Wang, Shengwei Xu, Guoai Xu, Yongfeng Yin, Miao Zhang, Dawei Sun:
Game Theoretical Method for Anomaly-Based Intrusion Detection. 8824163:1-8824163:10 - Jianbang Gao, Zhaohui Yuan, Bin Qiu, Jing Zhou:
Secure Multiusers Directional Modulation Scheme Based on Random Frequency Diverse Arrays in Broadcasting Systems. 4198595:1-4198595:11 - Toni Perkovic, Ante Dagelic, Marin Bugaric, Mario Cagalj:
On WPA2-Enterprise Privacy in High Education and Science. 3731529:1-3731529:11 - Nanliang Shan, Zecong Ye, Xiaolong Cui:
Collaborative Intelligence: Accelerating Deep Neural Network Inference via Device-Edge Synergy. 8831341:1-8831341:10 - Huige Wang, Kefei Chen, Tianyu Pan, Yunlei Zhao:
Practical CCA-Secure Functional Encryptions for Deterministic Functions. 8823788:1-8823788:14 - Omar Abou Selo, Maan Haj Rachid, Abdullatif Shikfa, Yongge Wang, Qutaibah M. Malluhi:
Private Function Evaluation Using Intel's SGX. 3042642:1-3042642:10 - Toan-Thinh Truong, Minh-Triet Tran, Anh Duc Duong:
Chebyshev Polynomial-Based Authentication Scheme in Multiserver Environment. 3579705:1-3579705:21 - Ying Zou, Yanting Chai, Sha Shi, Lei Wang, Yunfeng Peng, Yuan Ping, Baocang Wang:
Improved Cloud-Assisted Privacy-Preserving Profile-Matching Scheme in Mobile Social Networks. 4938736:1-4938736:12 - Jiangfeng Sun, Zhisong Bie, Hongxia Bie, Pengfei He, Machao Jin:
Secrecy Analysis of Cognitive Radio Networks over Generalized Fading Channels. 8842012:1-8842012:9 - Gholamreza Farahani:
Feature Selection Based on Cross-Correlation for the Intrusion Detection System. 8875404:1-8875404:17 - Zufan Zhang, Anqi Liu, Yinxue Yi, Maobin Yang:
Exploring the Dynamical Behavior of Information Diffusion in D2D Communication Environment. 8848576:1-8848576:8 - Xulong Zhang, Xiaoxia Song:
Stability Analysis of a Dynamical Model for Malware Propagation with Generic Nonlinear Countermeasure and Infection Probabilities. 8859883:1-8859883:7 - Jorge Sancho, José García, Álvaro Alesanco Iglesias:
Oblivious Inspection: On the Confrontation between System Security and Data Privacy at Domain Boundaries. 8856379:1-8856379:9 - Huili Wang, Wenping Ma, Lang Liao, Yushan Li, Linfeng Zheng:
Impossible Differential Distinguishers of Two Generalized Feistel Structures. 8828504:1-8828504:9 - Qiang Wei, Hu Wang, Gongxuan Zhang:
A Robust Image Watermarking Approach Using Cycle Variational Autoencoder. 8869096:1-8869096:9 - Naixuan Guo, Junzhou Luo, Zhen Ling, Ming Yang, Wenjia Wu, Xiaodan Gu:
A Novel IM Sync Message-Based Cross-Device Tracking. 8891664:1-8891664:15 - Ziwang Wang, Yi Zhuang, Zujia Yan:
TZ-MRAS: A Remote Attestation Scheme for the Mobile Terminal Based on ARM TrustZone. 1756130:1-1756130:16 - Yu Qin, Jingbin Liu, Shijun Zhao, Dengguo Feng, Wei Feng:
RIPTE: Runtime Integrity Protection Based on Trusted Execution for IoT Device. 8957641:1-8957641:14 - Tao Li, Yuling Chen, Yanli Wang, Yilei Wang, Minghao Zhao, Haojia Zhu, Youliang Tian, Xiaomei Yu, Yixian Yang:
Rational Protocols and Attacks in Blockchain System. 8839047:1-8839047:11 - Sajjad Shaukat Jamal, Dawood Shah, Abdulaziz Deajim, Tariq Shah:
The Effect of the Primitive Irreducible Polynomial on the Quality of Cryptographic Properties of Block Ciphers. 8883884:1-8883884:14 - Yuhei Watanabe, Hideki Yamamoto, Hirotaka Yoshida:
Lightweight Crypto Stack for TPMS Using Lesamnta-LW. 5738215:1-5738215:12 - Mingyue Shi, Rong Jiang, Wei Zhou, Sen Liu, Savio Sciancalepore:
A Privacy Risk Assessment Model for Medical Big Data Based on Adaptive Neuro-Fuzzy Theory. 5610839:1-5610839:18 - Zhidong Shen, Si Chen:
A Survey of Automatic Software Vulnerability Detection, Program Repair, and Defect Prediction Techniques. 8858010:1-8858010:16 - Baskoro Adi Pratomo, Pete Burnap, George Theodorakopoulos:
BLATTA: Early Exploit Detection on Network Traffic with Recurrent Neural Networks. 8826038:1-8826038:15 - Shimao Yao, Ravi Sankar, In-ho Ra:
A Collusion-Resistant Identity-Based Proxy Reencryption Scheme with Ciphertext Evolution for Secure Cloud Sharing. 8833693:1-8833693:16 - Pan Lv, Hong Li, Jinsong Qiu, Yiqi Li, Gang Pan:
Cyborgan OS: A Lightweight Real-Time Operating System for Artificial Organ. 8871626:1-8871626:9 - Qiuhua Zheng, Yinhao Hu, Tao Pei, Shengwang Xu, Junzhe Yu, Ting Wu, Yanzhao Shen, Yingpei Zeng, Tingting Cui:
Improved Single-Key Attacks on 2-GOST. 8886032:1-8886032:10 - Jaewoo So:
Deep Learning-Based Cryptanalysis of Lightweight Block Ciphers. 3701067:1-3701067:11 - Behnam Zahednejad, Lishan Ke, Jing Li:
A Novel Machine Learning-Based Approach for Security Analysis of Authentication and Key Agreement Protocols. 8848389:1-8848389:15 - Jian Zhou, Qian Bo, Lijuan Sun, Juan Wang, Xiaoyong Yan:
Routing Strategy for LEO Satellite Networks Based on Membership Degree Functions. 8822985:1-8822985:9 - Fei Tang, Jiali Bao, Yonghong Huang, Dong Huang, Fuqun Wang:
Identity-Based Identification Scheme without Trusted Party against Concurrent Attacks. 8820271:1-8820271:9 - Guofeng Wei, Bangning Zhang, Guoru Ding, Bing Zhao, Kefeng Guo, Daoxing Guo:
On the Detection of a Non-Cooperative Beam Signal Based on Wireless Sensor Networks. 8830092:1-8830092:12 - Xi Zhang, Ye Su, Jing Qin:
A Dynamic Searchable Symmetric Encryption Scheme for Multiuser with Forward and Backward Security. 8893016:1-8893016:13 - Yaowei Wang, Chen Chen, Zhenwei Chen, Jiangyong He:
Attribute-Based User Revocable Data Integrity Audit for Internet-of-Things Devices in Cloud Storage. 8837456:1-8837456:10 - Xiaoyan Hu, Liang Jin, Kaizhi Huang, Keming Ma, Changcheng Song, Shuaifang Xiao:
A Secure Communication Scheme Based on Equivalent Interference Channel Assisted by Physical Layer Secret Keys. 8840645:1-8840645:15 - Shuo Wang, Qingqi Pei, Yuchen Zhang, Xiaohu Liu, Guangming Tang:
A Hybrid Cyber Defense Mechanism to Mitigate the Persistent Scan and Foothold Attack. 8882200:1-8882200:15 - Sa Math, Lejun Zhang, Seokhoon Kim, Intae Ryoo:
An Intelligent Real-Time Traffic Control Based on Mobile Edge Computing for Individual Private Environment. 8881640:1-8881640:11 - Na Lv, Tianyu Chen, Shuangyi Zhu, Jing Yang, Yuan Ma, Jiwu Jing, Jingqiang Lin:
Erratum to "High-Efficiency Min-Entropy Estimation Based on Neural Network for Random Number Generators". 3451823:1-3451823:1 - Pan Jun Sun:
Research on Selection Method of Privacy Parameter ε. 8845038:1-8845038:12 - Jianyu Chen, Xiaofeng Wang, Leiting Tao, Yuan Liu:
High-Performance Routing Emulation Technologies Based on a Cloud Platform. 8825749:1-8825749:17 - Leila Mohammadpour, Teck Chaw Ling, Chee Sun Liew, Alihossein Aryanfar:
A Mean Convolutional Layer for Intrusion Detection System. 8891185:1-8891185:16 - Marwan Ali Albahar, Muhammad Binsawad:
Deep Autoencoders and Feedforward Networks Based on a New Regularization for Anomaly Detection. 7086367:1-7086367:9 - Deukjo Hong:
Known-Key Distinguishing and Partial-Collision Attacks on GFN-2 with SP F-Function. 8864102:1-8864102:8 - Xiaohu Liu, Hengwei Zhang, Yuchen Zhang, Lulu Shao:
Optimal Network Defense Strategy Selection Method Based on Evolutionary Network Game. 5381495:1-5381495:11 - Jie Cai, Han Jiang, Hao Wang, Qiuliang Xu:
Lattice-Based Linearly Homomorphic Signature Scheme over F 2. 8857815:1-8857815:7 - Yiliang Han, Yu Li, Zhe Li, Shuaishuai Zhu:
An Improved Method to Evaluate the Synchronization in Neural Key Exchange Protocol. 8869688:1-8869688:10 - Xiabing Zhou, Bin Li, Yanrong Qi, Wanying Dong:
Mimic Encryption Box for Network Multimedia Data Security. 8868672:1-8868672:24 - Tzung-Han Jeng, Yi-Ming Chen, Chien-Chih Chen, Chuan-Chiang Huang:
MD-MinerP: Interaction Profiling Bipartite Graph Mining for Malware-Control Domain Detection. 8841544:1-8841544:20 - Miaoqing Tian, Ruobing Jiang, Haipeng Qu, Qian Lu, Xiaoyun Zhou:
Advanced Temperature-Varied ECU Fingerprints for Source Identification and Intrusion Detection in Controller Area Networks. 8834845:1-8834845:17 - Jianbing Zhang, Bowen Ma, Jiwei Huang:
Deploying GIS Services into the Edge: A Study from Performance Evaluation and Optimization Viewpoint. 8822990:1-8822990:13 - Zhike Han, Xiuchao Wu, Meng Chi, Jun Tang, Lijing Yang:
A Novel Approach to Transform Bitmap to Vector Image for Data Reliable Visualization considering the Image Triangulation and Color Selection. 8871588:1-8871588:13 - Kaixin Jiao, Guodong Ye, Youxia Dong, Xiaoling Huang, Jianqing He:
Image Encryption Scheme Based on a Generalized Arnold Map and RSA Algorithm. 9721675:1-9721675:14 - Yinwei Li, Guo-Ping Jiang, Meng Wu, Yurong Song:
Methods to Measure the Network Path Connectivity. 8836590:1-8836590:10 - Yonghua Gong, Lei Chen, Tinghuai Ma:
A Comprehensive Trust Model Based on Social Relationship and Transaction Attributes. 8887596:1-8887596:10 - Bowen Zhang, Benedetta Tondi, Xixiang Lv, Mauro Barni:
Challenging the Adversarial Robustness of DNNs Based on Error-Correcting Output Codes. 8882494:1-8882494:11 - Leixiao Cheng, Fei Meng, Xianmeng Meng, Qixin Zhang:
AKC-Based Revocable ABE Schemes from LWE Assumption. 8834872:1-8834872:16 - Xiulei Liu, Shoulu Hou, Qiang Tong, Xuhong Liu, Zhihui Qin, Junyang Yu:
A Prediction Approach for Video Hits in Mobile Edge Computing Environment. 8857564:1-8857564:6 - Jiong Chen, Kun He, Jing Chen, Yingying Fang, Ruiying Du:
PowerPrint: Identifying Smartphones through Power Consumption of the Battery. 3893106:1-3893106:13 - Imran Memon, Riaz Ahmed Shaikh, Mohammad Kamrul Hasan, Rosilah Hassan, Amin Ul Haq, Khairul Akram Zainol:
Protect Mobile Travelers Information in Sensitive Region Based on Fuzzy Logic in IoT Technology. 8897098:1-8897098:12 - Hongjian Jin, Xingshu Chen, Xiao Lan, Hui Guo, Hongxia Zhang, Qi Cao:
BNRDT: When Data Transmission Meets Blockchain. 8828984:1-8828984:16 - Jie Zhou, Jian Bai, Meng Shan Jiang:
White-Box Implementation of ECDSA Based on the Cloud Plus Side Mode. 8881116:1-8881116:10 - Yunfang Chen, Li Wang, Dehao Qi, Tinghuai Ma, Wei Zhang:
Community Detection Based on DeepWalk Model in Large-Scale Networks. 8845942:1-8845942:13 - Javier Carrillo Mondéjar, Juan Manuel Castelo Gómez, Carlos Núñez-Gómez, José Roldán Gómez, José Luis Martínez:
Automatic Analysis Architecture of IoT Malware Samples. 8810708:1-8810708:12 - Lurong Jiang, Qiaoyu Xu, Hangyi Pan, Yanyun Dai, Jijun Tong:
Virus Propagation in Wireless Sensor Networks with Media Access Control Mechanism. 6513920:1-6513920:11 - Yaojie Wang, Xiaolong Cui, Zhiqiang Gao, Bo Gan:
Fed-SCNN: A Federated Shallow-CNN Recognition Framework for Distracted Driving. 6626471:1-6626471:10 - Bora Aslan, Füsun Yavuzer Aslan, M. Tolga Sakalli:
Energy Consumption Analysis of Lightweight Cryptographic Algorithms That Can Be Used in the Security of Internet of Things Applications. 8837671:1-8837671:15 - Yongqiang Yu, Longlong Li, Yuliang Lu, Xuehu Yan:
On the Value of Order Number and Power in Secret Image Sharing. 6627178:1-6627178:13 - Xavier Salleras, Vanesa Daza:
SANS: Self-Sovereign Authentication for Network Slices. 8823573:1-8823573:8 - Jiazhong Lu, Xiaolei Liu, Shibin Zhang, Yan Chang:
Research and Analysis of Electromagnetic Trojan Detection Based on Deep Learning. 6641844:1-6641844:13 - Huiqing Huang, Dongsheng Cheng:
3-Image Bit-Level Encryption Algorithm Based on 3D Nonequilateral Arnold Transformation and Hyperchaotic System. 8841302:1-8841302:13 - Si-Wan Noh, Sang-Uk Shin, Kyung-Hyune Rhee:
PyRos: A State Channel-Based Access Control System for a Public Blockchain Network. 8891183:1-8891183:13 - Afifa Maryam, Usman Ahmed, Muhammad Aleem, Jerry Chun-Wei Lin, Muhammad Arshad Islam, Muhammad Azhar Iqbal:
cHybriDroid: A Machine Learning-Based Hybrid Technique for Securing the Edge Computing. 8861639:1-8861639:14 - Feng Feng, Xiabing Zhou, Bin Li, Qinglei Zhou:
Modelling the Mimic Defence Technology for Multimedia Cloud Servers. 8819958:1-8819958:22 - Qiao Ke, Zengguo Sun, Yang Liu, Wei Wei, Marcin Wozniak, Rafal Scherer:
High-Resolution SAR Image Despeckling Based on Nonlocal Means Filter and Modified AA Model. 8889317:1-8889317:8 - Isaac Amankona Obiri, Qi Xia, Hu Xia, Kwame Opuni-Boachie Obour Agyekum, Kwame Omono Asamoah, Emmanuel Boateng Sifah, Xiaosong Zhang, Jianbin Gao:
A Fully Secure KP-ABE Scheme on Prime-Order Bilinear Groups through Selective Techniques. 8869057:1-8869057:18 - Yitong Meng, Jinlong Fei:
Hidden Service Website Response Fingerprinting Attacks Based on Response Time Feature. 8850472:1-8850472:21 - Jorge Aguilar Santiago, Octavio Flores Siordia, José Trinidad Guillen Bonilla, Juan Carlos Estrada Gutiérrez, María G. González Novoa, Maricela Jiménez Rodríguez:
Chaotic Cryptosystem for Selective Encryption of Faces in Photographs. 8848356:1-8848356:22 - Xiang Ji, Xianjia Meng, Anwen Wang, Qingyi Hua, Fuwei Wang, Rui Chen, Jing Zhang, Dingyi Fang:
E2PP: An Energy-Efficient Path Planning Method for UAV-Assisted Data Collection. 8850505:1-8850505:13 - Jielin Jiang, Zheng Li, Yuan Tian, Najla Al-Nabhan:
A Review of Techniques and Methods for IoT Applications in Collaborative Cloud-Fog Environment. 8849181:1-8849181:15 - Yuezhong Wu, Qiang Liu, Rongrong Chen, Changyun Li, Ziran Peng:
A Group Recommendation System of Network Document Resource Based on Knowledge Graph and LSTM in Edge Computing. 8843803:1-8843803:11 - Yousheng Zhou, Xinyun Chen, Meihuan Chen:
Privacy-Preserving Multidimensional Data Aggregation Scheme for Smart Grid. 8845959:1-8845959:14 - Rongxin Tu, Wenying Wen, Changsheng Hua:
An Unequal Image Privacy Protection Method Based on Saliency Detection. 8842376:1-8842376:13 - Yixin Wu, Cheng Huang, Xing Zhang, Hongyi Zhou:
GroupTracer: Automatic Attacker TTP Profile Extraction and Group Cluster in Internet of Things. 8842539:1-8842539:14 - Hui Guo, Shuguang Huang, Cheng Huang, Fan Shi, Min Zhang, Zulie Pan:
Binary File's Visualization and Entropy Features Analysis Combined with Multiple Deep Learning Networks for Malware Classification. 8881760:1-8881760:19 - Shengnan Zhao, Xiangfu Song, Han Jiang, Ming Ma, Zhihua Zheng, Qiuliang Xu:
An Efficient Outsourced Oblivious Transfer Extension Protocol and Its Applications. 8847487:1-8847487:12 - Wajih El Hadj Youssef, Ali Abdelli, Fethi Dridi, Mohsen Machhout:
Hardware Implementation of Secure Lightweight Cryptographic Designs for IoT Applications. 8860598:1-8860598:13 - Daegeon Kim, Do Hyung Gu, Huy Kang Kim:
Beyond PS-LTE: Security Model Design Framework for PPDR Operational Environment. 8869418:1-8869418:13 - Zhenxing Wang, Wanbo Zheng, Peng Chen, Yong Ma, Yunni Xia, Wei Liu, Xiaobo Li, Kunyin Guo:
A Novel Coevolutionary Approach to Reliability Guaranteed Multi-Workflow Scheduling upon Edge Computing Infrastructures. 6697640:1-6697640:11 - Liang Zong, Yong Bai, Chenglin Zhao, Gaofeng Luo, Zeyu Zhang, Huawei Ma:
On Enhancing TCP to Deal with High Latency and Transmission Errors in Geostationary Satellite Network for 5G-IoT. 6693094:1-6693094:7 - Xinyu Huang, Yunzhe Tian, Yifei He, Endong Tong, Wenjia Niu, Chenyang Li, Jiqiang Liu, Liang Chang:
Exposing Spoofing Attack on Flocking-Based Unmanned Aerial Vehicle Cluster: A Threat to Swarm Intelligence. 8889122:1-8889122:15 - Randa Aljably, Yuan Tian, Mznah Al-Rodhaan:
Preserving Privacy in Multimedia Social Networks Using Machine Learning Anomaly Detection. 5874935:1-5874935:14 - Dawei Li, Jia Yu, Xue Gao, Najla Al-Nabhan:
Research on Multidomain Authentication of IoT Based on Cross-Chain Technology. 6679022:1-6679022:12 - María-Dolores Cano, Antonio Cañavate-Sanchez:
Preserving Data Privacy in the Internet of Medical Things Using Dual Signature ECDSA. 4960964:1-4960964:9 - Wenzhi Cheng, Wei Ou, Xiangdong Yin, Wanqin Yan, Dingwan Liu, Chunyan Liu:
A Privacy-Protection Model for Patients. 6647562:1-6647562:12 - Chaoxia Qing, Bing Guo, Yan Shen, Tao Li, Yun Zhang, Zhen Zhang:
A Secure and Effective Construction Scheme for Blockchain Networks. 8881881:1-8881881:20 - Xingxing Xiong, Shubo Liu, Dan Li, Zhaohui Cai, Xiaoguang Niu:
A Comprehensive Survey on Local Differential Privacy. 8829523:1-8829523:29 - Yang Xu, Zixi Fu, Guiyong Xu, Sicong Zhang, Xiaoyao Xie:
DRHNet: A Deep Residual Network Based on Heterogeneous Kernel for Steganalysis. 8847741:1-8847741:9 - Lixia Xie, Huiyu Ni, Hongyu Yang, Jiyong Zhang:
A Key Business Node Identification Model for Internet of Things Security. 6654283:1-6654283:11 - Nan Jia, Shaojing Fu, Ming Xu:
Privacy-Preserving Blockchain-Based Nonlinear SVM Classifier Training for Social Networks. 8872853:1-8872853:10 - Min Yang, Xingshu Chen, Yonggang Luo, Hang Zhang:
An Android Malware Detection Model Based on DT-SVM. 8841233:1-8841233:11 - Guosheng Yang, Qisheng Wei:
Visual Object Multimodality Tracking Based on Correlation Filters for Edge Computing. 8891035:1-8891035:13 - Wenyu Zhang, Yaqun Zhao, Sijie Fan:
Cryptosystem Identification Scheme Based on ASCII Code Statistics. 8875864:1-8875864:10 - Min Li, Yingming Zeng, Yue Guo, Yun Guo:
A Movie Recommendation System Based on Differential Privacy Protection. 6611463:1-6611463:10 - Jiayong Liu, Yu Su, Shun Lv, Cheng Huang:
Detecting Web Spam Based on Novel Features from Web Page Source Code. 6662166:1-6662166:14 - Fazhan Tao, Longlong Zhu, Baofeng Ji, Pengju Si, Zhumu Fu:
Energy Management Strategy Using Equivalent Consumption Minimization Strategy for Hybrid Electric Vehicles. 6642304:1-6642304:8 - Dengyong Zhang, Xiao Chen, Feng Li, Arun Kumar Sangaiah, Xiangling Ding:
Seam-Carved Image Tampering Detection Based on the Cooccurrence of Adjacent LBPs. 8830310:1-8830310:12 - Di Xue, Jingmei Li, Weifei Wu, Jiaxiang Wang:
Erratum to "Incremental Learning for Malware Classification in Small Datasets". 9697548:1-9697548:1 - Jiqiang Lu, Hwajung Seo:
A Key Selected S-Box Mechanism and Its Investigation in Modern Block Cipher Design. 1457419:1-1457419:26 - Zhe Liu, Fuqun Wang, Kefei Chen, Fei Tang:
A New User Revocable Ciphertext-Policy Attribute-Based Encryption with Ciphertext Update. 8856592:1-8856592:11 - Wenwu Xie, Jinxia Yang, Xinzhong Liu, Zhihe Yang, Xin Peng, Jianwu Liao, Tingyu Huang:
Secrecy Performance Analysis of the NOMA System on High-Speed Railway. 8868550:1-8868550:6 - Kai Zhang, Yanping Li, Yun Song, Laifeng Lu, Tao Zhang, Qi Jiang:
A Traceable and Revocable Multiauthority Attribute-Based Encryption Scheme with Fast Access. 6661243:1-6661243:14 - Haiyan Zhang, Yonglong Luo, Qingying Yu, Liping Sun, Xuejing Li, Zhenqiang Sun:
A Framework of Abnormal Behavior Detection and Classification Based on Big Trajectory Data for Mobile Networks. 8858444:1-8858444:15 - Jingjing Guo, Jiacong Sun:
Order-Revealing Encryption Scheme with Comparison Token for Cloud Computing. 8837904:1-8837904:13 - Yuhuan Gong, Yuchang Mo:
Qualitative Analysis of Commercial Services in MEC as Phased-Mission Systems. 8823952:1-8823952:11 - Jie Yang, Li Feng, Tong Jin, Hong Liang, Fangxin Xu, Liwei Tian:
Enabling Sector Scheduling for 5G-CPE Dense Networks. 6684681:1-6684681:18 - Pelayo Nuño, Carla Suárez, Eva Suárez, Francisco G. Bulnes, Francisco J. delaCalle, Juan C. Granda:
A Diagnosis and Hardening Platform for an Asterisk VoIP PBX. 8853625:1-8853625:14 - Yongli Tang, Mingjie Zhao, Lixiang Li:
Secure and Efficient Image Compression-Encryption Scheme Using New Chaotic Structure and Compressive Sensing. 6665702:1-6665702:15 - Xiaolin Zhao, Hui Peng, Xiang Li, Yue Li, Jingfeng Xue, Yaoyuan Liang, Mingzhe Pei:
Defending Application Layer DDoS Attacks via Multidimensional Parallelotope. 6679304:1-6679304:11 - Shaohua Duan, Hanwen Wang, Yunpeng Liu, Li Huang, Xiaoyi Zhou:
A Novel Comprehensive Watermarking Scheme for Color Images. 8840779:1-8840779:12 - Fu Chen, Peng Liu, Jianming Zhu, Sheng Gao, Yanmei Zhang, Meijiao Duan, Youwei Wang, Kai Hwang:
Improving Topic-Based Data Exchanges among IoT Devices. 8884924:1-8884924:14 - Arshad Ahmad, Ayaz Ullah, Chong Feng, Muzammil Khan, Shahzad Ashraf, Muhammad Adnan, Shah Nazir, Habib Ullah Khan:
Towards an Improved Energy Efficient and End-to-End Secure Protocol for IoT Healthcare Applications. 8867792:1-8867792:10 - Arshad Ahmad, Chong Feng, Muzammil Khan, Asif Khan, Ayaz Ullah, Shah Nazir, Adnan Tahir:
A Systematic Literature Review on Using Machine Learning Algorithms for Software Requirements Identification on Stack Overflow. 8830683:1-8830683:19 - Luo GuangJun, Shah Nazir, Habib Ullah Khan, Amin Ul Haq:
Spam Detection Approach for Secure Mobile Message Communication Using Machine Learning Algorithms. 8873639:1-8873639:6 - Hongyu Yang, Renyun Zeng, Fengyan Wang, Guangquan Xu, Jiyong Zhang:
An Unsupervised Learning-Based Network Threat Situation Assessment Model for Internet of Things. 6656066:1-6656066:11 - Jinhua Fu, Sihai Qiao, Yongzhong Huang, Xueming Si, Bin Li, Chao Yuan:
A Study on the Optimization of Blockchain Hashing Algorithm Based on PRCA. 8876317:1-8876317:12 - Jinghua Yu, Feng Luo:
A Systematic Approach for Cybersecurity Design of In-Vehicle Network Systems with Trade-Off Considerations. 7169720:1-7169720:14 - Chian Techapanupreeda, Werasak Kurutach:
Enhancing Transaction Security for Handling Accountability in Electronic Health Records. 8899409:1-8899409:18 - Meilian Li, Shah Nazir, Habib Ullah Khan, Sara Shahzad, Rohul Amin:
Modelling Features-Based Birthmarks for Security of End-to-End Communication System. 8852124:1-8852124:9 - Jibin Zhang, Shah Nazir, Ansheng Huang, Abdullah Alharbi:
Multicriteria Decision and Machine Learning Algorithms for Component Security Evaluation: Library-Based Overview. 8886877:1-8886877:14 - Zhiwei Gu, Shah Nazir, Cheng Hong, Sulaiman Khan:
Convolution Neural Network-Based Higher Accurate Intrusion Identification System for the Network Security and Communication. 8830903:1-8830903:10 - Mostafa Yavari, Masoumeh Safkhani, Saru Kumari, Sachin Kumar, Chien-Ming Chen:
An Improved Blockchain-Based Authentication Protocol for IoT Network Management. 8836214:1-8836214:16 - Zhanyang Xu, Wentao Liu, Jingwang Huang, Chenyi Yang, Jiawei Lu, Haozhe Tan:
Artificial Intelligence for Securing IoT Services in Edge Computing: A Survey. 8872586:1-8872586:13 - Jun Chen, Shize Guo, Xin Ma, Haiying Li, Jinhong Guo, Ming Chen, Zhisong Pan:
SLAM: A Malware Detection Method Based on Sliding Local Attention Mechanism. 6724513:1-6724513:11 - Xucheng Huang, Shah Nazir:
Evaluating Security of Internet of Medical Things Using the Analytic Network Process Method. 8829595:1-8829595:14 - Huaijun Wang, Jing Zhao, Junhuai Li, Ling Tian, Pengjia Tu, Ting Cao, Yang An, Kan Wang, Shancang Li:
Wearable Sensor-Based Human Activity Recognition Using Hybrid Deep Learning Techniques. 2132138:1-2132138:12
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.