SCN - volume 2020 论文列表 |
点击这里查看 Security and Communication Networks 的JCR分区、影响因子等信息 |
Huaijun Wang Jing Zhao Junhuai Li Ling Tian Pengjia Tu Ting Cao Yang An Kan Wang Shancang Li
Evaluating Security of Internet of Medical Things Using the Analytic Network Process Method. SLAM: A Malware Detection Method Based on Sliding Local Attention Mechanism.Jun Chen Shize Guo Xin Ma Haiying Li Jinhong Guo Ming Chen Zhisong Pan
Artificial Intelligence for Securing IoT Services in Edge Computing: A Survey.Zhanyang Xu Wentao Liu Jingwang Huang Chenyi Yang Jiawei Lu Haozhe Tan
An Improved Blockchain-Based Authentication Protocol for IoT Network Management.Mostafa Yavari Masoumeh Safkhani Saru Kumari Sachin Kumar Chien-Ming Chen
Convolution Neural Network-Based Higher Accurate Intrusion Identification System for the Network Security and Communication.Zhiwei Gu Shah Nazir Cheng Hong Sulaiman Khan
Multicriteria Decision and Machine Learning Algorithms for Component Security Evaluation: Library-Based Overview.Jibin Zhang Shah Nazir Ansheng Huang Abdullah Alharbi
Modelling Features-Based Birthmarks for Security of End-to-End Communication System.Meilian Li Shah Nazir Habib Ullah Khan Sara Shahzad Rohul Amin
Enhancing Transaction Security for Handling Accountability in Electronic Health Records.Chian Techapanupreed Werasak Kurutach
A Systematic Approach for Cybersecurity Design of In-Vehicle Network Systems with Trade-Off Considerations. A Study on the Optimization of Blockchain Hashing Algorithm Based on PRCA.Jinhua Fu Sihai Qiao Yongzhong Huang Xueming Si Bin Li Chao Yuan
An Unsupervised Learning-Based Network Threat Situation Assessment Model for Internet of Things.Hongyu Yang Renyun Zeng Fengyan Wang Guangquan Xu Jiyong Zhang
Spam Detection Approach for Secure Mobile Message Communication Using Machine Learning Algorithms.Luo GuangJun Shah Nazir Habib Ullah Khan Amin Ul Haq
A Systematic Literature Review on Using Machine Learning Algorithms for Software Requirements Identification on Stack Overflow.Arshad Ahmad Chong Feng Muzammil Khan Asif Khan Ayaz Ullah Shah Nazir Adnan Tahir
Towards an Improved Energy Efficient and End-to-End Secure Protocol for IoT Healthcare Applications.Arshad Ahmad Ayaz Ullah Chong Feng Muzammil Khan Shahzad Ashraf Muhammad Adnan Shah Nazir Habib Ullah Khan
Improving Topic-Based Data Exchanges among IoT Devices.Fu Chen Peng Liu Jianming Zhu Sheng Gao Yanmei Zhang Meijiao Duan Youwei Wang Kai Hwang
A Novel Comprehensive Watermarking Scheme for Color Images.Shaohua Duan Hanwen Wang Yunpeng Liu Li Huang Xiaoyi Zhou
Defending Application Layer DDoS Attacks via Multidimensional Parallelotope.Xiaolin Zhao Hui Peng Xiang Li Yue Li Jingfeng Xue Yaoyuan Liang Mingzhe Pei
Secure and Efficient Image Compression-Encryption Scheme Using New Chaotic Structure and Compressive Sensing.Yongli Tang Mingjie Zhao Lixiang Li
A Diagnosis and Hardening Platform for an Asterisk VoIP PBX.Pelayo Nuño Carla Suárez Eva Suárez Francisco G. Bulnes Francisco J. delaCalle Juan C. Granda
Enabling Sector Scheduling for 5G-CPE Dense Networks.Jie Yang Li Feng Tong Jin Hong Liang Fangxin Xu Liwei Tian
Qualitative Analysis of Commercial Services in MEC as Phased-Mission Systems. Order-Revealing Encryption Scheme with Comparison Token for Cloud Computing. A Framework of Abnormal Behavior Detection and Classification Based on Big Trajectory Data for Mobile Networks.Haiyan Zhang Yonglong Luo Qingying Yu Liping Sun Xuejing Li Zhenqiang Sun
A Traceable and Revocable Multiauthority Attribute-Based Encryption Scheme with Fast Access.Kai Zhang Yanping Li Yun Song Laifeng Lu Tao Zhang Qi Jiang
Secrecy Performance Analysis of the NOMA System on High-Speed Railway.Wenwu Xie Jinxia Yang Xinzhong Liu Zhihe Yang Xin Peng Jianwu Liao Tingyu Huang
A New User Revocable Ciphertext-Policy Attribute-Based Encryption with Ciphertext Update.Zhe Liu Fuqun Wang Kefei Chen Fei Tang
A Key Selected S-Box Mechanism and Its Investigation in Modern Block Cipher Design. Erratum to "Incremental Learning for Malware Classification in Small Datasets".Di Xue Jingmei Li Weifei Wu Jiaxiang Wang
Seam-Carved Image Tampering Detection Based on the Cooccurrence of Adjacent LBPs.Dengyong Zhang Xiao Chen Feng Li Arun Kumar Sangaiah Xiangling Ding
Energy Management Strategy Using Equivalent Consumption Minimization Strategy for Hybrid Electric Vehicles.Fazhan Tao Longlong Zhu Baofeng Ji Pengju Si Zhumu Fu
Detecting Web Spam Based on Novel Features from Web Page Source Code.Jiayong Liu Yu Su Shun Lv Cheng Huang
A Movie Recommendation System Based on Differential Privacy Protection.Min Li Yingming Zeng Yue Guo Yun Guo
Cryptosystem Identification Scheme Based on ASCII Code Statistics.Wenyu Zhang Yaqun Zhao Sijie Fan
Visual Object Multimodality Tracking Based on Correlation Filters for Edge Computing. An Android Malware Detection Model Based on DT-SVM.Min Yang Xingshu Chen Yonggang Luo Hang Zhang
Privacy-Preserving Blockchain-Based Nonlinear SVM Classifier Training for Social Networks. A Key Business Node Identification Model for Internet of Things Security.Lixia Xie Huiyu Ni Hongyu Yang Jiyong Zhang
DRHNet: A Deep Residual Network Based on Heterogeneous Kernel for Steganalysis.Yang Xu Zixi Fu Guiyong Xu Sicong Zhang Xiaoyao Xie
A Comprehensive Survey on Local Differential Privacy.Xingxing Xiong Shubo Liu Dan Li Zhaohui Cai Xiaoguang Niu
A Secure and Effective Construction Scheme for Blockchain Networks.Chaoxia Qing Bing Guo Yan Shen Tao Li Yun Zhang Zhen Zhang
A Privacy-Protection Model for Patients.Wenzhi Cheng Wei Ou Xiangdong Yin Wanqin Yan Dingwan Liu Chunyan Liu
Preserving Data Privacy in the Internet of Medical Things Using Dual Signature ECDSA.María-Dolores Cano Antonio Cañavate-Sanchez
Research on Multidomain Authentication of IoT Based on Cross-Chain Technology.Dawei Li Jia Yu Xue Gao Najla Al-Nabhan
Preserving Privacy in Multimedia Social Networks Using Machine Learning Anomaly Detection.Randa Aljably Yuan Tian Mznah Al-Rodhaan
Exposing Spoofing Attack on Flocking-Based Unmanned Aerial Vehicle Cluster: A Threat to Swarm Intelligence.Xinyu Huang Yunzhe Tian Yifei He Endong Tong Wenjia Niu Chenyang Li Jiqiang Liu Liang Chang
On Enhancing TCP to Deal with High Latency and Transmission Errors in Geostationary Satellite Network for 5G-IoT.Liang Zong Yong Bai Chenglin Zhao Gaofeng Luo Zeyu Zhang Huawei Ma
A Novel Coevolutionary Approach to Reliability Guaranteed Multi-Workflow Scheduling upon Edge Computing Infrastructures.Zhenxing Wang Wanbo Zheng Peng Chen Yong Ma Yunni Xia Wei Liu Xiaobo Li Kunyin Guo
Beyond PS-LTE: Security Model Design Framework for PPDR Operational Environment.Daegeon Kim Do Hyung Gu Huy Kang Kim
Hardware Implementation of Secure Lightweight Cryptographic Designs for IoT Applications.Wajih El Hadj Youssef Ali Abdelli Fethi Dridi Mohsen Machhout
An Efficient Outsourced Oblivious Transfer Extension Protocol and Its Applications.Shengnan Zhao Xiangfu Song Han Jiang Ming Ma Zhihua Zheng Qiuliang Xu
Binary File's Visualization and Entropy Features Analysis Combined with Multiple Deep Learning Networks for Malware Classification.Hui Guo Shuguang Huang Cheng Huang Fan Shi Min Zhang Zulie Pan
GroupTracer: Automatic Attacker TTP Profile Extraction and Group Cluster in Internet of Things.Yixin Wu Cheng Huang Xing Zhang Hongyi Zhou
An Unequal Image Privacy Protection Method Based on Saliency Detection.Rongxin Tu Wenying Wen Changsheng Hua
Privacy-Preserving Multidimensional Data Aggregation Scheme for Smart Grid.Yousheng Zhou Xinyun Chen Meihuan Chen
A Group Recommendation System of Network Document Resource Based on Knowledge Graph and LSTM in Edge Computing.Yuezhong Wu Qiang Liu Rongrong Chen Changyun Li Ziran Peng
A Review of Techniques and Methods for IoT Applications in Collaborative Cloud-Fog Environment.Jielin Jiang Zheng Li Yuan Tian Najla Al-Nabhan
E2PP: An Energy-Efficient Path Planning Method for UAV-Assisted Data Collection.Xiang Ji Xianjia Meng Anwen Wang Qingyi Hua Fuwei Wang Rui Chen Jing Zhang Dingyi Fang
Chaotic Cryptosystem for Selective Encryption of Faces in Photographs.Jorge Aguilar Santiago Octavio Flores Siordia José Trinidad Guillen Bonilla Juan Carlos Estrada Gutiérrez María G. González Novoa Maricela Jiménez Rodríguez
Hidden Service Website Response Fingerprinting Attacks Based on Response Time Feature. A Fully Secure KP-ABE Scheme on Prime-Order Bilinear Groups through Selective Techniques.Isaac Amankona Obiri Qi Xia Hu Xia Kwame Opuni-Boachie Obour Agyekum Kwame Omono Asamoah Emmanuel Boateng Sifah Xiaosong Zhang Jianbin Gao
High-Resolution SAR Image Despeckling Based on Nonlocal Means Filter and Modified AA Model.Qiao Ke Zengguo Sun Yang Liu Wei Wei Marcin Wozniak Rafal Scherer
Modelling the Mimic Defence Technology for Multimedia Cloud Servers.Feng Feng Xiabing Zhou Bin Li Qinglei Zhou
cHybriDroid: A Machine Learning-Based Hybrid Technique for Securing the Edge Computing.Afifa Maryam Usman Ahmed Muhammad Aleem Jerry Chun-Wei Lin Muhammad Arshad Islam Muhammad Azhar Iqbal
PyRos: A State Channel-Based Access Control System for a Public Blockchain Network.Si-Wan Noh Sang-Uk Shin Kyung-Hyune Rhee
3-Image Bit-Level Encryption Algorithm Based on 3D Nonequilateral Arnold Transformation and Hyperchaotic System. Research and Analysis of Electromagnetic Trojan Detection Based on Deep Learning.Jiazhong Lu Xiaolei Liu Shibin Zhang Yan Chang
SANS: Self-Sovereign Authentication for Network Slices. On the Value of Order Number and Power in Secret Image Sharing.Yongqiang Yu Longlong Li Yuliang Lu Xuehu Yan
Energy Consumption Analysis of Lightweight Cryptographic Algorithms That Can Be Used in the Security of Internet of Things Applications.Bora Aslan Füsun Yavuzer Aslan M. Tolga Sakalli
Fed-SCNN: A Federated Shallow-CNN Recognition Framework for Distracted Driving.Yaojie Wang Xiaolong Cui Zhiqiang Gao Bo Gan
Virus Propagation in Wireless Sensor Networks with Media Access Control Mechanism.Lurong Jiang Qiaoyu Xu Hangyi Pan Yanyun Dai Jijun Tong
Automatic Analysis Architecture of IoT Malware Samples.Javier Carrillo Mondéjar Juan Manuel Castelo Gómez Carlos Núñez-Gómez José Roldán Gómez José Luis Martínez
Community Detection Based on DeepWalk Model in Large-Scale Networks.Yunfang Chen Li Wang Dehao Qi Tinghuai Ma Wei Zhang
White-Box Implementation of ECDSA Based on the Cloud Plus Side Mode.Jie Zhou Jian Bai Meng Shan Jiang
BNRDT: When Data Transmission Meets Blockchain.Hongjian Jin Xingshu Chen Xiao Lan Hui Guo Hongxia Zhang Qi Cao
Protect Mobile Travelers Information in Sensitive Region Based on Fuzzy Logic in IoT Technology.Imran Memon Riaz Ahmed Shaikh Mohammad Kamrul Hasan Rosilah Hassan Amin Ul Haq Khairul Akram Zainol
PowerPrint: Identifying Smartphones through Power Consumption of the Battery.Jiong Chen Kun He Jing Chen Yingying Fang Ruiying Du
A Prediction Approach for Video Hits in Mobile Edge Computing Environment.Xiulei Liu Shoulu Hou Qiang Tong Xuhong Liu Zhihui Qin Junyang Yu
AKC-Based Revocable ABE Schemes from LWE Assumption.Leixiao Cheng Fei Meng Xianmeng Meng Qixin Zhang
Challenging the Adversarial Robustness of DNNs Based on Error-Correcting Output Codes.Bowen Zhang Benedetta Tondi Xixiang Lv Mauro Barni
A Comprehensive Trust Model Based on Social Relationship and Transaction Attributes.Yonghua Gong Lei Chen Tinghuai Ma
Methods to Measure the Network Path Connectivity.Yinwei Li Guo-Ping Jiang Meng Wu Yurong Song
Image Encryption Scheme Based on a Generalized Arnold Map and RSA Algorithm.Kaixin Jiao Guodong Ye Youxia Dong Xiaoling Huang Jianqing He
A Novel Approach to Transform Bitmap to Vector Image for Data Reliable Visualization considering the Image Triangulation and Color Selection.Zhike Han Xiuchao Wu Meng Chi Jun Tang Lijing Yang
Deploying GIS Services into the Edge: A Study from Performance Evaluation and Optimization Viewpoint.Jianbing Zhang Bowen Ma Jiwei Huang
Advanced Temperature-Varied ECU Fingerprints for Source Identification and Intrusion Detection in Controller Area Networks.Miaoqing Tian Ruobing Jiang Haipeng Qu Qian Lu Xiaoyun Zhou
MD-MinerP: Interaction Profiling Bipartite Graph Mining for Malware-Control Domain Detection.Tzung-Han Jeng Yi-Ming Chen Chien-Chih Chen Chuan-Chiang Huang
Mimic Encryption Box for Network Multimedia Data Security.Xiabing Zhou Bin Li Yanrong Qi Wanying Dong
An Improved Method to Evaluate the Synchronization in Neural Key Exchange Protocol.Yiliang Han Yu Li Zhe Li Shuaishuai Zhu
Lattice-Based Linearly Homomorphic Signature Scheme over F 2.Jie Cai Han Jiang Hao Wang Qiuliang Xu
Optimal Network Defense Strategy Selection Method Based on Evolutionary Network Game.Xiaohu Liu Hengwei Zhang Yuchen Zhang Lulu Shao
Known-Key Distinguishing and Partial-Collision Attacks on GFN-2 with SP F-Function. Deep Autoencoders and Feedforward Networks Based on a New Regularization for Anomaly Detection.Marwan Ali Albahar Muhammad Binsawad
A Mean Convolutional Layer for Intrusion Detection System.Leila Mohammadpour Teck Chaw Ling Chee Sun Liew Alihossein Aryanfar
High-Performance Routing Emulation Technologies Based on a Cloud Platform.Jianyu Chen Xiaofeng Wang Leiting Tao Yuan Liu
Research on Selection Method of Privacy Parameter ε. Erratum to "High-Efficiency Min-Entropy Estimation Based on Neural Network for Random Number Generators".Na Lv Tianyu Chen Shuangyi Zhu Jing Yang Yuan Ma Jiwu Jing Jingqiang Lin
An Intelligent Real-Time Traffic Control Based on Mobile Edge Computing for Individual Private Environment.Sa Math Lejun Zhang Seokhoon Kim Intae Ryoo
A Hybrid Cyber Defense Mechanism to Mitigate the Persistent Scan and Foothold Attack.Shuo Wang Qingqi Pei Yuchen Zhang Xiaohu Liu Guangming Tang
A Secure Communication Scheme Based on Equivalent Interference Channel Assisted by Physical Layer Secret Keys.Xiaoyan Hu Liang Jin Kaizhi Huang Keming Ma Changcheng Song Shuaifang Xiao
Attribute-Based User Revocable Data Integrity Audit for Internet-of-Things Devices in Cloud Storage.Yaowei Wang Chen Chen Zhenwei Chen Jiangyong He
A Dynamic Searchable Symmetric Encryption Scheme for Multiuser with Forward and Backward Security. On the Detection of a Non-Cooperative Beam Signal Based on Wireless Sensor Networks.Guofeng Wei Bangning Zhang Guoru Ding Bing Zhao Kefeng Guo Daoxing Guo
Identity-Based Identification Scheme without Trusted Party against Concurrent Attacks.Fei Tang Jiali Bao Yonghong Huang Dong Huang Fuqun Wang
Routing Strategy for LEO Satellite Networks Based on Membership Degree Functions.Jian Zhou Qian Bo Lijuan Sun Juan Wang Xiaoyong Yan
A Novel Machine Learning-Based Approach for Security Analysis of Authentication and Key Agreement Protocols.Behnam Zahednejad Lishan Ke Jing Li
Deep Learning-Based Cryptanalysis of Lightweight Block Ciphers. Improved Single-Key Attacks on 2-GOST.Qiuhua Zheng Yinhao Hu Tao Pei Shengwang Xu Junzhe Yu Ting Wu Yanzhao Shen Yingpei Zeng Tingting Cui
Cyborgan OS: A Lightweight Real-Time Operating System for Artificial Organ.Pan Lv Hong Li Jinsong Qiu Yiqi Li Gang Pan
A Collusion-Resistant Identity-Based Proxy Reencryption Scheme with Ciphertext Evolution for Secure Cloud Sharing.Shimao Yao Ravi Sankar In-ho Ra
BLATTA: Early Exploit Detection on Network Traffic with Recurrent Neural Networks.Baskoro Adi Pratomo Pete Burnap George Theodorakopoulos
A Survey of Automatic Software Vulnerability Detection, Program Repair, and Defect Prediction Techniques. A Privacy Risk Assessment Model for Medical Big Data Based on Adaptive Neuro-Fuzzy Theory.Mingyue Shi Rong Jiang Wei Zhou Sen Liu Savio Sciancalepore
Lightweight Crypto Stack for TPMS Using Lesamnta-LW.Yuhei Watanabe Hideki Yamamoto Hirotaka Yoshida
The Effect of the Primitive Irreducible Polynomial on the Quality of Cryptographic Properties of Block Ciphers.Sajjad Shaukat Jamal Dawood Shah Abdulaziz Deajim Tariq Shah
Rational Protocols and Attacks in Blockchain System.Tao Li Yuling Chen Yanli Wang Yilei Wang Minghao Zhao Haojia Zhu Youliang Tian Xiaomei Yu Yixian Yang
RIPTE: Runtime Integrity Protection Based on Trusted Execution for IoT Device.Yu Qin Jingbin Liu Shijun Zhao Dengguo Feng Wei Feng
TZ-MRAS: A Remote Attestation Scheme for the Mobile Terminal Based on ARM TrustZone.Ziwang Wang Yi Zhuang Zujia Yan
A Novel IM Sync Message-Based Cross-Device Tracking.Naixuan Guo Junzhou Luo Zhen Ling Ming Yang Wenjia Wu Xiaodan Gu
A Robust Image Watermarking Approach Using Cycle Variational Autoencoder.Qiang Wei Hu Wang Gongxuan Zhang
Impossible Differential Distinguishers of Two Generalized Feistel Structures.Huili Wang Wenping Ma Lang Liao Yushan Li Linfeng Zheng
Oblivious Inspection: On the Confrontation between System Security and Data Privacy at Domain Boundaries.Jorge Sancho José García Álvaro Alesanco Iglesias
Stability Analysis of a Dynamical Model for Malware Propagation with Generic Nonlinear Countermeasure and Infection Probabilities. Exploring the Dynamical Behavior of Information Diffusion in D2D Communication Environment.Zufan Zhang Anqi Liu Yinxue Yi Maobin Yang
Feature Selection Based on Cross-Correlation for the Intrusion Detection System. Secrecy Analysis of Cognitive Radio Networks over Generalized Fading Channels.Jiangfeng Sun Zhisong Bie Hongxia Bie Pengfei He Machao Jin
Improved Cloud-Assisted Privacy-Preserving Profile-Matching Scheme in Mobile Social Networks.Ying Zou Yanting Chai Sha Shi Lei Wang Yunfeng Peng Yuan Ping Baocang Wang
Chebyshev Polynomial-Based Authentication Scheme in Multiserver Environment.Toan-Thinh Truong Minh-Triet Tran Anh Duc Duong
Private Function Evaluation Using Intel's SGX.Omar Abou Selo Maan Haj Rachid Abdullatif Shikfa Yongge Wang Qutaibah M. Malluhi
Practical CCA-Secure Functional Encryptions for Deterministic Functions.Huige Wang Kefei Chen Tianyu Pan Yunlei Zhao
Collaborative Intelligence: Accelerating Deep Neural Network Inference via Device-Edge Synergy.Nanliang Shan Zecong Ye Xiaolong Cui
On WPA2-Enterprise Privacy in High Education and Science.Toni Perkovic Ante Dagelic Marin Bugaric Mario Cagalj
Secure Multiusers Directional Modulation Scheme Based on Random Frequency Diverse Arrays in Broadcasting Systems.Jianbang Gao Zhaohui Yuan Bin Qiu Jing Zhou
Game Theoretical Method for Anomaly-Based Intrusion Detection.Zhiyong Wang Shengwei Xu Guoai Xu Yongfeng Yin Miao Zhang Dawei Sun
GFD: A Weighted Heterogeneous Graph Embedding Based Approach for Fraud Detection in Mobile Advertising.Jinlong Hu Tenghui Li Yi Zhuang Song Huang Shoubin Dong
An Improved Elman Network for Stock Price Prediction Service. An Antiforensic Method against AMR Compression Detection.Diqun Yan Xiaowen Li Li Dong Rangding Wang
Secure Framework Enhancing AES Algorithm in Cloud Computing.Ijaz Ahmad Awan Muhammad Shiraz Muhammad Usman Hashmi Qaisar Shaheen Rizwan Akhtar Allah Ditta
An Improved Broadcast Authentication Protocol for Wireless Sensor Networks Based on the Self-Reinitializable Hash Chains.Haiping Huang Qinglong Huang Fu Xiao Wenming Wang Qi Li Ting Dai
Efficient Private Set Intersection Using Point-Value Polynomial Representation. Characterizing Anomalies in Malware-Generated HTTP Traffic.Piotr Bialczak Wojciech Mazurczyk
DL-IDS: Extracting Features Using CNN-LSTM Hybrid Network for Intrusion Detection System.Pengfei Sun Pengju Liu Qi Li Chenxi Liu Xiangling Lu Ruochen Hao Jinpeng Chen
Broadcast Complexity and Adaptive Adversaries in Verifiable Secret Sharing.Seyed Amir Hosseini Beghaeiraveri Mohammad Izadi Mohsen Rezvani
Android Malware Detection Based on a Hybrid Deep Learning Model.Tianliang Lu Yanhui Du Li Ouyang Qiuyu Chen Xirui Wang
A Certificateless Noninteractive Key Exchange Protocol with Provable Security.Xuefei Cao Lanjun Dang Yingzi Luan Wei You
A Dynamic Privacy Protection Mechanism for Spatiotemporal Crowdsourcing.Tianen Liu Yingjie Wang Zhipeng Cai Xiangrong Tong Qingxian Pan Jindong Zhao
Dynamic Security Exchange Scheduling Model for Business Workflow Based on Queuing Theory in Cloud Computing.Rongbin Xu Jianguo Wu Yongliang Cheng Zhiqiang Liu Yuanmo Lin Ying Xie
Network Attacks Detection Methods Based on Deep Learning Techniques: A Survey. Knocking on IPs: Identifying HTTPS Websites for Zero-Rated Traffic.Mariano Di Martino Peter Quax Wim Lamotte
Toward Serverless and Efficient Encrypted Deduplication in Mobile Cloud Computing Environments.Youngjoo Shin Junbeom Hur Dongyoung Koo Joobeom Yun
A Novel RLWE-Based Anonymous Mutual Authentication Protocol for Space Information Network. The Defense of Adversarial Example with Conditional Generative Adversarial Networks.Fangchao Yu Li Wang Xianjin Fang Youwen Zhang
Packet-Based Intrusion Detection Using Bayesian Topic Models in Mobile Edge Computing. SPCTR: Sealed Auction-Based Procurement for Closest Pre-Tender with Range Validation. Risk Situation Assessment Model Based on Interdomain Interaction in Cloud Computing Environment. Research on the Optimization Management of Cloud Privacy Strategy Based on Evolution Game. A Smart Agent Design for Cyber Security Based on Honeypot and Machine Learning.Nadiya El Kamel Mohamed Eddabbah Youssef Lmoumen Raja Touahni
Space-Efficient Key-Policy Attribute-Based Encryption from Lattices and Two-Dimensional Attributes.Yuan Liu Licheng Wang Xiaoying Shen Lixiang Li Dezhi An
A Task Offloading Method with Edge for 5G-Envisioned Cyber-Physical-Social Systems.Jielin Jiang Xing Zhang Shengjun Li
Limiting Privacy Breaches in Average-Distance Query.Huihua Xia Yan Xiong Wenchao Huang Zhaoyi Meng Fuyou Miao
A Survey of Key Technologies for Constructing Network Covert Channel.Jing Tian Gang Xiong Zhen Li Gaopeng Gou
An Efficient and Effective Approach for Flooding Attack Detection in Optical Burst Switching Networks. Mobile IPv6 Vertical Handover Specifications, Threats, and Mitigation Methods: A Survey.Supriyanto Praptodiyono Teguh Firmansyah Mudrik Alaydrus M. Iman Santoso Azlan Osman Rosni Abdullah
Accurate Computation of Fractional-Order Exponential Moments.Shujiang Xu Qixian Hao Bin Ma Chunpeng Wang Jian Li
A Multifault Diagnosis Method of Gear Box Running on Edge Equipment.Xiaoping Zhao Yonghong Zhang Fan Shao
Anomaly Event Detection in Security Surveillance Using Two-Stream Based Model.Wangli Hao Ruixian Zhang Shancang Li Junyu Li Fuzhong Li Shanshan Zhao Wuping Zhang
HYBRID-CNN: An Efficient Scheme for Abnormal Flow Detection in the SDN-Based Smart Grid.Pengpeng Ding Jinguo Li Liangliang Wang Mi Wen Yuyao Guan
Distributed Security Framework for Reliable Threat Intelligence Sharing.Davy Preuveneers Wouter Joosen Jorge Bernal Bernabé Antonio F. Skarmeta
A Minimum Defense Cost Calculation Method for Attack Defense Trees.Bingfeng Xu Zhicheng Zhong Gaofeng He
A Survey on Services Provision and Distribution of Official and Commercial Intellectual Property Platforms. Preprocessing Method for Encrypted Traffic Based on Semisupervised Clustering.Rongfeng Zheng Jiayong Liu Weina Niu Liang Liu Kai Li Shan Liao
Noninteractive Lightweight Privacy-Preserving Auditing on Images in Mobile Crowdsourcing Networks.Juan Zhang Changsheng Wan Chunyu Zhang Xiaojun Guo Yongyong Chen
A Lightweight Image Encryption Algorithm Based on Message Passing and Chaotic Map.Hui Liu Bo Zhao Jianwen Zou Linquan Huang Yifan Liu
A Client Bootstrapping Protocol for DoS Attack Mitigation on Entry Point Services in the Cloud.Hussain M. J. Almohri Mohammad Al-Mutawa Mahmoud Alawadh Karim O. Elish
Rotational-XOR Rectangle Cryptanalysis on Round-Reduced Simon.Bonwook Koo Younghoon Jung Woo-Hwan Kim
Efficient Searchable Symmetric Encryption Supporting Dynamic Multikeyword Ranked Search. Neural Network-Based Voting System with High Capacity and Low Computation for Intrusion Detection in SIEM/IDS Systems.Nabil Moukafih Ghizlane Orhanou Said Elhajji
Evaluator: A Multilevel Decision Approach for Web-Based Landmark Evaluation.Meijuan Yin Wen Yang Xiaonan Liu Xiangyang Luo
Unordered Multisecret Sharing Based on Generalized Chinese Remainder Theorem.Xiaoping Li Hefeng Chen Yanjun Liu Chin-Chen Chang
Cryptanalysis and Improvement of a Group Authentication Scheme with Multiple Trials and Multiple Authentications.Zhe Xia Yining Liu Ching-Fang Hsu Chinchen Chang
An Encrypted Traffic Identification Scheme Based on the Multilevel Structure and Variational Automatic Encoder.Jiangtao Zhai Huaifeng Shi Mingqian Wang Zhongjun Sun Junjun Xing
Authentication and Secrecy of Multicast Communication Scenario: Artificial Noise-Aided Costas Sequence Matrix FDA Approach. A Lattice-Based Authentication Scheme for Roaming Service in Ubiquitous Networks with Anonymity. VoNR-IPD: A Novel Timing-Based Network Steganography for Industrial Internet.Mingqian Wang Shuai Cao Yunliang Wang
Certificate-Based Encryption Resilient to Continual Leakage in the Standard Model.Yuyan Guo Jiguo Li Mingming Jiang Lei Yu Shimin Wei
Parallel and Regular Algorithm of Elliptic Curve Scalar Multiplication over Binary Fields. Research on SKINNY Optimal Differential Trail Search.Shaoqiang Liu Chaiyang Peng Chunjiang Li
Warehouse-Oriented Optimal Path Planning for Autonomous Mobile Fire-Fighting Robots.Yongtao Liu Ruizhi Sun Tianyi Zhang Xiangnan Zhang Li Li Guoqing Shi
Abnormal User Detection Based on the Correlation Probabilistic Model. Hail the Closest Driver on Roads: Privacy-Preserving Ride Matching in Online Ride Hailing Services.Haining Yu Hongli Zhang Xiangzhan Yu
SecureBP from Homomorphic Encryption.Qinju Liu Xianhui Lu Fucai Luo Shuai Zhou Jingnan He Kunpeng Wang
Optimal Timing Selection Approach to Moving Target Defense: A FlipIt Attack-Defense Game Model.Jinglei Tan Hengwei Zhang Hongqi Zhang Cheng Lei Hui Jin Bo-wen Li Hao Hu
Study on Stochastic Differential Game Model in Network Attack and Defense.Xiaotong Xu Gaocai Wang Jintian Hu Yuting Lu
Classification and Analysis of Security Techniques for the User Terminal Area in the Internet Banking Service.Kyungroul Lee Sun-Young Lee Kangbin Yim
Decentralized Private Information Sharing Protocol on Social Networks.Shu-Chuan Chu Lili Chen Sachin Kumar Saru Kumari Joel J. P. C. Rodrigues Chien-Ming Chen
Exploiting the Relationship between Pruning Ratio and Compression Effect for Neural Network Model Based on TensorFlow.Bo Liu Qilin Wu Yiwen Zhang Qian Cao
Extension of Research on Security as a Service for VMs in IaaS Platform.Xue-yuan Yin Xingshu Chen Lin Chen Hui Li
On-Device Detection of Repackaged Android Malware via Traffic Clustering.Gaofeng He Bingfeng Xu Lu Zhang Haiting Zhu
Using FDAD to Prevent DAD Attack in SEcure Neighbor Discovery Protocol.Guangjia Song Hui Wang Fuquan Liu
Research and Implementation on Power Analysis Attacks for Unbalanced Data.Xiaoyi Duan Dong Chen Xiaohong Fan Xiuying Li Ding Ding You Li
User Authentication Method Based on MKL for Keystroke and Mouse Behavioral Feature Fusion.Xiujuan Wang Qianqian Zheng Kangfeng Zheng Tong Wu
Group Recommender Systems Based on Members' Preference for Trusted Social Networks.Xiangshi Wang Lei Su Qihang Zhou Liping Wu
Cryptographic Strength Evaluation of Key Schedule Algorithms.Shazia Afzal Muhammad Yousaf Humaira Afzal Nawaf Alharbe Muhammad Rafiq Mufti
An Efficient Integrity Verification and Authentication Scheme over the Remote Data in the Public Clouds for Mobile Users.S. Milton Ganesh S. P. Manikandan
Combat Mobile Evasive Malware via Skip-Gram-Based Malware Detection.Alper Egitmen Irfan Bulut R. Can Aygun Ayse Bilge Gunduz Omer Seyrekbasan Ali Gökhan Yavuz
Erratum to "An Energy-Efficient and Security Aware Route Selection Protocol for Wireless Sensor Networks".Thaier Hayajneh Razvi Doomun Ghada Almashaqbeh Bassam Jamil Mohd
Protection of Sensitive Data in Industrial Internet Based on Three-Layer Local/Fog/Cloud Storage.Jing Liu Changbo Yuan Yingxu Lai Hua Qin
Efficient Hierarchical Authentication Protocol for Multiserver Architecture.Jiangheng Kou Mingxing He Ling Xiong Zeqiong Lv
Design and Analysis of a Novel Chaos-Based Image Encryption Algorithm via Switch Control Mechanism.Shenyong Xiao Zhijun Yu Ya Shuang Deng
A CP-ABE Scheme Supporting Arithmetic Span Programs. Integrating Security Requirements Engineering into MBSE: Profile and Guidelines.Donatas Mazeika Rimantas Butleris
Minimizing Key Materials: The Even-Mansour Cipher Revisited and Its Application to Lightweight Authenticated Encryption. User Audit Model Based on Attribute Measurement and Similarity Measurement. Highly Secure Privacy-Preserving Outsourced k-Means Clustering under Multiple Keys in Cloud Computing.Ying Zou Zhen Zhao Sha Shi Lei Wang Yunfeng Peng Yuan Ping Baocang Wang
On the Unlinkability of Fingerprint Shell. An Efficient Encrypted Floating-Point Representation Using HEAAN and TFHE. Using a Subtractive Center Behavioral Model to Detect Malware.Ömer Aslan Refik Samet Ömer Özgür Tanriöver
Security of Cloud Computing Using Adaptive Neural Fuzzy Inference System.Shumaila Shahzadi Bushra Khaliq Muhammad Rizwan Fahad Ahmad
Cyber-Physical Security with RF Fingerprint Classification through Distance Measure Extensions of Generalized Relevance Learning Vector Quantization.Trevor J. Bihl Todd J. Paciencia Kenneth W. Bauer Jr. Michael A. Temple
Secure Information Transmissions in Wireless-Powered Cognitive Radio Networks for Internet of Medical Things.Kun Tang Wenjuan Tang Entao Luo Zhiyuan Tan Weizhi Meng Lianyong Qi
Employing a Machine Learning Approach to Detect Combined Internet of Things Attacks against Two Objective Functions Using a Novel Dataset.John Foley Naghmeh Moradpoor Henry Ochenyi
Cycle-Consistent Adversarial GAN: The Integration of Adversarial Attack and Defense.Lingyun Jiang Kai Qiao Ruoxi Qin Linyuan Wang Wanting Yu Jian Chen Haibing Bu Bin Yan
Incremental Learning for Malware Classification in Small Datasets.Jingmei Li Di Xue Weifei Wu Jiaxiang Wang
Botnet Forensic Analysis Using Machine Learning. Cryptanalysis and Security Improvement of Two Authentication Schemes for Healthcare Systems Using Wireless Medical Sensor Networks.Jiaqing Mo Zhongwang Hu Yuhua Lin
A Framework for Real-Time Intrusion Response in Software Defined Networking Using Precomputed Graphical Security Models.Taehoon Eom Jin B. Hong SeongMo An Jong Sou Park Dong Seong Kim
High-Efficiency Min-Entropy Estimation Based on Neural Network for Random Number Generators.Na Lv Tianyu Chen Shuangyi Zhu Jing Yang Yuan Ma Jiwu Jing Jingqiang Lin
Efficient Privacy-Preserving Fingerprint-Based Authentication System Using Fully Homomorphic Encryption.Taeyun Kim Yongwoo Oh Hyoungshick Kim
Efficient Certificateless Aggregate Signature Scheme for Performing Secure Routing in VANETs.Zhiyan Xu Debiao He Neeraj Kumar Kim-Kwang Raymond Choo
Server-Aided Revocable Attribute-Based Encryption from Lattices.Xingting Dong Yanhua Zhang Baocang Wang Jiangshan Chen
Secure Outsourced Medical Data against Unexpected Leakage with Flexible Access Control in a Cloud Storage System.Xingguang Zhou Jianwei Liu Zongyang Zhang Qianhong Wu
MHCOOS: An Offline-Online Certificateless Signature Scheme for M-Health Devices.Abigail Akosua Addobea Jun Hou Qianmu Li
Identity-Based Public Auditing Scheme for Cloud Storage with Strong Key-Exposure Resilience.S. Mary Virgil Nithya V. Rhymend Uthariaraj
Jamming Prediction for Radar Signals Using Machine Learning Methods.Gyeong-Hoon Lee Jeil Jo Cheong Hee Park
A Stacking Ensemble for Network Intrusion Detection Using Heterogeneous Datasets.Smitha Rajagopal Poornima Panduranga Kundapur Katiganere Siddaramappa Hareesha
A Multibranch Search Tree-Based Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data.Hua Dai Xuelong Dai Xiao Li Xun Yi Fu Xiao Geng Yang
Protecting Metadata of Access Indicator and Region of Interests for Image Files. Automatic Search for the Linear (Hull) Characteristics of ARX Ciphers: Applied to SPECK, SPARX, Chaskey, and CHAM-64. BAHK: Flexible Automated Binary Analysis Method with the Assistance of Hardware and System Kernel.Jiaye Pan Yi Zhuang Binglin Sun
Scalable Revocable Identity-Based Signature Scheme with Signing Key Exposure Resistance from Lattices.Congge Xie Jian Weng Jinming Wen
DPAEG: A Dependency Parse-Based Adversarial Examples Generation Method for Intelligent Q&A Robots. Attribute-Guard: Attribute-Based Flow Access Control Framework in Software-Defined Networking.