Blockchain-based Outsourcing Shared Car Risk Prediction Scheme Design
Zhai, (Qinghai university)
Fairness Protection Method of Vickery Auction Based on Smart Contract
Yu, yuan (xidian university); Qin, wenjing (Xidian University); Zhou, Yasheng (Xidian University); Yang, Li (Xidian University)
An Improved Needham-Schroeder Session Key Distribution Protocol For In-Vehicle CAN Network
Yin, Long (Software College, Northeastern University, China); Xu, Jian (Software College, Northeastern University, China); Wang, Chen (Software College, Northeastern University, China); Wang, Zihao (Software College, Northeastern University, China)
Research on Two-Party Cooperative Aigis-sig Digital Signature Protocol
(Information Engineering University); (Information Engineering University)
An Automated Attack Signature Generation System for Polymorphic Worm Detection
Li, Qingru (Hebei Normal University); Ma, Zerou (Hebei Normal University); Wang, Fangwei (Hebei Normal University); Wang, Changguang (Hebei Normal University)
An Efficient Unsupervised Domain Adaptation Deep Learning Model for Unknown Malware Detection
Wang, Fangwei (Hebei Normal University); Chai, Guofang (Hebei Normal University); Li, Qingru (Hebei Normal University); Wang, Changguang (Hebei Normal University)
A Lightweight PSIS Scheme Based on Multi-Node Collaboration in the IoT
Zhang, Lina (Shaanxi Normal University); Yang, Bo (Shaanxi Normal University); Wang, Tao (Shaanxi Normal University); Wang, Tong (Xi’an University of Science and Technology)
SAD: Website Fingerprint Defense based on Adversarial Examples
Tang, Renzhi (Guizhou University); Shen, Guowei (Guizhou University); Guo, Chun (Guizhou University); Cui, Yunhe (Guizhou University)
A Secure Medical Diagnosis Scheme with Privacy-Preserving Linear Regression based on Gradient Descent
Zhang, Mingwu (Hubei University of Technology); Ku, Hanchao (HBUT); Xia, Zhe (Wuhan University Of Technology, China)
A privacy-aware and time-limited data access control scheme with large universe and public traceability for Cloud-based IoD
Zhang, Jiawei (Xidian University); Yang, Yanbo (Inner Mongolia University of Science \& Technology); Lu, Ning (Northeastern University); Liu, Zhiwei (The 27th Research Institute of China Electronics Technology Group Corporation)
Multi-Party High-Dimensional Related Data Publishing via Probabilistic Principal Component Analysis and Differential Privacy
Gu, Zhen (Harbin Engineering University); Zhang, Guoyin (Harbin Engineering University); Yang, Chen (Harbin Engineering University)
Source code vulnerability detection method with multidimensional representation
YANG, Hongyu (Civil Aviation University of China, School of Computer Science and Technology); YING, Leyi (Civil Aviation University of China, School of Computer Science and Technology); ZHANG, Liang (University of Arizona,College of Information)
A Security Enhanced Verification Framework Based on Device Fingerprint in Internet of Things
Guangyan, zhang (Northeasten University)
RLPassGAN: Password Guessing Model Based on GAN with Policy Gradient
Huang, Deng (Sichuan University); Wang, Yufei (Sichuan University); Chen, Wen (Sichuan University)
Linear Policy Recommender Scheme for Large-Scale Attribute-based Access Control
Wang, Jing (Guilin University of Eletronic Technology); Huang, Weijia (Guilin University of Eletronic Technology); Liu, Wenfen (Guilin University of Eletronic Technology); Wang, Lingfu (Guilin University of Eletronic Technology); Zhang, Mingwu (Guilin University of Eletronic Technology)
CAFM: Precise Classication for Android Family Malware
Li, Dan (School of Computer Science and Engineering, Northeastern University, Shenyang, China.); Pan, Runbang (School of Computer Science and Engineering, Northeastern University, Shenyang, China.); Lu, Ning (School of Computer Science and Engineering, Northeastern University, Shenyang, China.); Shi, Wenbo (School of Computer Science and Engineering, Northeastern University, Shenyang, China.)
System anomaly detection based on call sequences using relaxed-SVM
Liao, Xiaoyao (School of Cyber Science and Engineering,Sichuan University,Chengdu); Wang, Changzhi (Zhihuiyuntian Technology Chengdu); Chen, Wen (School of Cyber Science and Engineering,Sichuan University,Chengdu)
BA-Audit: blockchain-based public auditing for aggregated data sharing in edge-assisted IoT
Liu, Mingxi (Northeastern University); Lu, Ning (Northeastern University); Yin, Jingli (Northeastern University); Shi, Wenbo (Northeastern University)
Predicting Congestion Attack of Variable Spoofing Frequency for Reliable Traffic Signal System
Xiang, Yingxiao (Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University); Chen, Tong (Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University); Li, Yike (Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University); Tian, Yunzhe (Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University); Niu, Wenjia (Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University); Tong, Endong (Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University); Liu, Jiqiang (Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University); Jia, Bowei (Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University); Wu, Yalun (Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University); Huang, Xinyu (Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University)
Key Node Recognition Method in Complex Networks with Comprehensive Degree
XIE, Lixia (Civil Aviation University of China, School of Computer Science and Technology); SUN, Honghong (Civil Aviation University of China,School of Computer Science and Technology); YANG, Hongyu (Civil Aviation University of China, School of Computer Science and Technology); ZHANG, Liang (University of Arizona, School of Information)
A Method of Security Risk Assessment for Network Host Nodes
YANG, Hongyu (Civil Aviation University of China,School of Safety Science and Engineering,School of Computer Science and Technology); YUAN, Haihang (Civil Aviation University of China,School of Computer Science and Technology); ZHANG, Liang (University of Arizona,School of Information)
Threat Detection-Oriented Network Security Situation Assessment Method
YANG, Hongyu (Civil Aviation University of China, School of Safety Science and Engineering,School of Computer Science and Technology); ZHANG, Zixin (Civil Aviation University of China, School of Computer Science and Technology); ZHANG, Liang (University of Arizona,School of Information)
System Business Affecting Impact Analysis Method with Crossover Probability Theory
XIE, Lixia (Civil Aviation University of China, School of Computer Science and Technology); ZHANG, Yijia (Civil Aviation University of China, School of Computer Science and Technology); YANG, Hongyu (Civil Aviation University of China, School of Computer Science and Technology); ZHANG, Liang (University of Arizona, School of Information)
RAP: A Lightweight Application Layer Defense against Website Fingerprinting
Zhang, Yan (Xidian University); Yang, Li (Xidian University); Ying, Shirui (Xidian University); Jia, Junbo (Xidian University); Zhou, Yasheng (Xidian University)
Privacy-preserving Naive Bayes Classifier Using Leveled Homomorphic Encryption
Chen Jingwei (Chongqing Institute of Green and Intelligent Technology, Chinese Academy of Sciences); Feng Yong (Chongqing Institute of Green and Intelligent Technology, Chinese Academy of Sciences); Liu Yang (Chongqing Jiaotong University); Wu Wenyuan (Chongqing Institute of Green and Intelligent Technology, Chinese Academy of Sciences); Yang Guanci (Guizhou University)
FL-iotDP: Differential Private Federated Neural Network
Lin, Wang (University of Jinan); Muhammad, Irfan Maaz (School of Information Science and Engineering, University of Jinan); Ali Sheraz (School of Information Science and Engineering, University of Jinan); Jing Shan (School of Information Science and Engineering, University of Jinan); Zhao Chuan (School of Information Science and Engineering, University of Jinan)
Analysis of Vulnerability of IPsec Protocol Implementa-tion Based on Differential Fuzzing
Kai Tian (Information University); Wei Fushan (State Key Laboratory of Mathematical Engineering and Advanced Computing,); Gu Chunxiang (Information Engineering University); Shi Yanan (Information Engineering University)
A Honeywords Generation Method Based on Deep Learning and Rule-based Password Attack
Yang Kunyu (State Key Laboratory of Mathematical Engineering and Advanced Computing); Hu Xuexian (State Key Laboratory of Mathematical Engineering and Advanced Computing); Zhang Qihui (State Key Laboratory of Mathematical Engineering and Advanced Computing); Wei Jianghong (State Key Laboratory of Mathematical Engineering and Advanced Computing); Liu Wenfen (Guilin University Of Electronic Technology)
Vulnerability Testing on the Key Scheduling Algorithm of PRESENT Using Deep Learning
Duan Ming (Information Engineering University); Zhou Rui (Information Engineering University); Fu Chaohui (Information Engineering University); Guo Sheng (Information Engineering University); Wu Qianqiong (Information Engineering University)
GLV/GLS Scalar Multiplication on Twisted Edwards Curves
Wei fushan (State Key Laboratory of Mathematical Engineering and Advanced Computing,); Zhang Ruijie (Information Engineering University); Ma Chuangui (Department of Basic, Army Aviation Institution); Niu Lei (Department of Basic, Army Aviation Institution)
Federated Learning-based IDS Against Poisoning Attacks
Xu Mengfan (Shaanxi Normal University); Li Xinghua (Xidian University)
Online Privacy of Personal Information – Perceptions v Reality
Gan Diane (University of Greenwich)
ARTPHIL: Reversible de-identification of free-text using an integrated model
Alabdullah Bayan (University of Sussex); Beloff Natalia (University of Sussex); White Martin (University of Sussex)