default search action
Cybersecurity, Volume 6
Volume 6, Number 1, December 2023
- Hasan Torabi, Seyedeh Leili Mirtaheri, Sergio Greco:
Practical autoencoder based anomaly detection by using vector reconstruction error. 1 - Haizhou Wang, Anoop Singhal, Peng Liu:
Tackling imbalanced data in cybersecurity with transfer learning: a case with ROP payload detection. 2 - Sohel Rana, M. Rubaiyat Hossain Mondal, Joarder Kamruzzaman:
RBFK cipher: a randomized butterfly architecture-based lightweight block cipher for IoT devices in the edge computing environment. 3 - Yubing Jiang, Peisong Shen, Li Zeng, Xiaojie Zhu, Di Jiang, Chi Chen:
Cancelable biometric schemes for Euclidean metric and Cosine metric. 4 - Rubayyi Alghamdi, Martine Bellaïche:
An ensemble deep learning based IDS for IoT using Lambda architecture. 5 - Hashida Haidros Rahima Manzil, S. Manohar Naik:
Android malware category detection using a novel feature vector-based machine learning model. 6 - Wen Wang, Jianhua Wang, Xiaofeng Peng, Ye Yang, Chun Xiao, Shuai Yang, Mingcai Wang, Lingfei Wang, Lin Li, Xiaolin Chang:
Exploring best-matched embedding model and classifier for charging-pile fault diagnosis. 7 - Davide Berardi, Nils Ole Tippenhauer, Andrea Melis, Marco Prandini, Franco Callegati:
Time sensitive networking security: issues of precision time protocol and its implementation. 8 - Yi Yang, Ying Li, Kai Chen, Jinghua Liu:
Jeu de mots paronomasia: a StackOverflow-driven bug discovery approach. 17 - Zonghao Ying, Bin Wu:
DLP: towards active defense against backdoor attacks with decoupled learning process. 9 - Muhammad Usama Sardar, Christof Fetzer:
Confidential computing and related technologies: a critical review. 10 - Yisroel Mirsky:
IPatch: a remote adversarial patch. 18 - Yanyan Zou, Wei Zou, JiaCheng Zhao, Nanyu Zhong, Yu Zhang, Ji Shi, Wei Huo:
PosFuzz: augmenting greybox fuzzing with effective position distribution. 11 - Chaidir Chalaf Islamy, Tohari Ahmad, Royyana Muslim Ijtihadie:
Reversible data hiding based on histogram and prediction error for sharing secret data. 12 - Zishuai Song, Hui Ma, Shuzhou Sun, Yansen Xin, Rui Zhang:
Rainbow: reliable personally identifiable information retrieval across multi-cloud. 19 - Zhixiu Guo, Ruigang Liang, Guozhu Meng, Kai Chen:
SkillSim: voice apps similarity detection. 13 - Weihao Huang, Guozhu Meng, Chaoyang Lin, Qiucun Yan, Kai Chen, Zhuo Ma:
Are our clone detectors good enough? An empirical study of code effects by obfuscation. 14 - Zonghao Ying, Bin Wu:
NBA: defensive distillation for backdoor removal via neural behavior alignment. 20 - Jinglei Pei, Yuyang Shi, Qingling Feng, Ruisheng Shi, Lina Lan, Shui Yu, Jinqiao Shi, Zhaofeng Ma:
An efficient confidentiality protection solution for pub/sub system. 34 - Chengbin Jin, Yongbin Zhou:
Enhancing non-profiled side-channel attacks by time-frequency analysis. 15 - Xiaobo Xiang, Yue Jiang, Qingli Guo, Xiu Zhang, Xiaorui Gong, Baoxu Liu:
AppChainer: investigating the chainability among payloads in android applications. 16 - Jiaxi Liu, Yun Feng, Xinyu Liu, Jianjun Zhao, Qixu Liu:
MRm-DLDet: a memory-resident malware detection framework based on memory forensics and deep neural network. 21 - Kaisheng Fan, Weizhe Zhang, Guangrui Liu, Hui He:
FMSA: a meta-learning framework-based fast model stealing attack technique against intelligent network intrusion detection systems. 35 - Feng Guo, Zheng Sun, Yuxuan Chen, Lei Ju:
Towards the universal defense for query-based audio adversarial attacks on speech recognition system. 40 - Armita Kazeminajafabadi, Mahdi Imani:
Optimal monitoring and attack detection of networks modeled by Bayesian attack graphs. 22 - Jean De La Croix Ntivuguruzwa, Tohari Ahmad:
A convolutional neural network to detect possible hidden data in spatial domain images. 23 - Yu Wei, Lei Bi, Xianhui Lu, Kunpeng Wang:
Security estimation of LWE via BKW algorithms. 24 - Jianjun Zhao, Can Yang, Di Wu, Yaqin Cao, Yuling Liu, Xiang Cui, Qixu Liu:
Detecting compromised email accounts via login behavior characterization. 36 - B. S. Sharmila, Rohini Nagapadma:
Quantized autoencoder (QAE) intrusion detection system for anomaly detection in resource-constrained IoT devices using RT-IoT2022 dataset. 41 - Chang Liu, Yan-Jun Wu, Jing-Zheng Wu, Chen Zhao:
A buffer overflow detection and defense method based on RISC-V instruction set extension. 45 - Sea Ran Cleon Liew, Ngai-Fong Law:
Use of subword tokenization for domain generation algorithm classification. 49 - Anit Kumar Ghosal, Dipanwita Roychowdhury:
Continuously non-malleable codes from block ciphers in split-state model. 25 - Qi Zhang, Zhixiang Liang, Shujuan Ji, Benyong Xing, Dickson K. W. Chiu:
Detecting fake reviewers in heterogeneous networks of buyers and sellers: a collaborative training-based spammer group algorithm. 26 - Vaishnavi Sivagaminathan, Manmohan Sharma, Santosh Kumar Henge:
Intrusion detection systems for wireless sensor networks using computational intelligence techniques. 27 - Fei Tang, Shikai Liang, Guowei Ling, Jinyong Shan:
IHVFL: a privacy-enhanced intention-hiding vertical federated learning framework for medical data. 37 - Mir Nazish, M. Tariq Banday, Insha Syed, Sheena Banday:
An efficient permutation approach for SbPN-based symmetric block ciphers. 42 - Chuyi Yan, Chen Zhang, Meng Shen, Ning Li, Jinhao Liu, Yinhao Qi, Zhigang Lu, Yuling Liu:
Aparecium: understanding and detecting scam behaviors on Ethereum via biased random walk. 46 - Huashuang Yang, Jinqiao Shi, Yue Gao, Xuebin Wang, Yanwei Sun, Ruisheng Shi, Dongbin Wang:
Evicting and filling attack for linking multiple network addresses of Bitcoin nodes. 50 - Jianfu Huang, Ye Luo, Qinggan Fu, Yincen Chen, Chao Wang, Ling Song:
Generic attacks on small-state stream cipher constructions in the multi-user setting. 53 - Vikas Maurya, Rachit Agarwal, Saurabh Kumar, Sandeep K. Shukla:
EPASAD: ellipsoid decision boundary based Process-Aware Stealthy Attack Detector. 28 - Peng Liu, Wenzhe Ye, Haiying Duan, Xianxian Li, Shuyi Zhang, Chuanjian Yao, Yongnan Li:
Graph neural network based approach to automatically assigning common weakness enumeration identifiers for vulnerabilities. 29 - Ziad Hussein, May A. Salama, Sahar A. El-Rahman:
Evolution of blockchain consensus algorithms: a review on the latest milestones of blockchain consensus algorithms. 30 - Baolong Jin, Rui Xue:
Improved lower bound for the complexity of unique shortest vector problem. 38 - Yuyao Ge, Zhongguo Yang, Lizhe Chen, Yiming Wang, Chengyang Li:
Attack based on data: a novel perspective to attack sensitive points directly. 43 - Jiashuo Liu, Jiongjiong Ren, Shaozhen Chen:
A deep learning aided differential distinguisher improvement framework with more lightweight and universality. 47 - Yixuan Cheng, Wenqing Fan, Wei Huang, Jingyu Yang, Gaoqing Yu, Wen Liu:
MSLFuzzer: black-box fuzzing of SOHO router devices via message segment list inference. 51 - Chao Chen, Fangguo Zhang:
Verifiable delay functions and delay encryptions from hyperelliptic curves. 54 - Jun Cui, Changqi Huang, Huan Meng, Ran Wei:
Tor network anonymity evaluation based on node anonymity. 55 - María-Dolores Cano, Antonio Villafranca, Igor Tasic:
Performance evaluation of Cuckoo filters as an enhancement tool for password cracking. 57 - Wei-Tao Song, Guang Zeng, Wenzheng Zhang, Dianhua Tang:
Research on privacy information retrieval model based on hybrid homomorphic encryption. 31 - Fikirte Ayalke Demmese, Ajaya Neupane, Sajad Khorsandroo, May Wang, Kaushik Roy, Yu Fu:
Machine learning based fileless malware traffic classification using image visualization. 32 - David Concejal Muñoz, Antonio del Corte-Valiente:
A novel botnet attack detection for IoT networks based on communication graphs. 33 - Jie Yuan, Rui Qian, Tingting Yuan, Mingliang Sun, Jirui Li, Xiaoyong Li:
LayerCFL: an efficient federated learning with layer-wised clustering. 39 - Feng Guo, Zheng Sun, Yuxuan Chen, Lei Ju:
Towards the transferable audio adversarial attack via ensemble methods. 44 - Xia Liu, Huan Yang, Li Yang:
Minimizing CNOT-count in quantum circuit of the extended Shor's algorithm for ECDLP. 48 - Yuting Liu, Yongqiang Li, Huiqin Chen, Mingsheng Wang:
Full-round impossible differential attack on shadow block cipher. 52 - Yatao Yang, Yuying Zhai, Hui Dong, Yanshuo Zhang:
WAS: improved white-box cryptographic algorithm over AS iteration. 56
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.