​
Login / Signup
CSS (1)
2019
2019
2019
Keyphrases
Publications
2019
Hongwei Jiang
,
Kai Yang
,
Lianfang Wang
,
Jinbao Gao
,
Sikang Hu
A Code Protection Scheme via Inline Hooking for Android Applications.
CSS (1)
(2019)
Yuyi Liu
,
Pavol Zavarsky
,
Yasir Malik
Non-linguistic Features for Cyberbullying Detection on a Social Media Platform Using Machine Learning.
CSS (1)
(2019)
Tianqi Huang
,
Buhong Wang
,
Dong Lin
Spoofing Attack Detection for Radar Network System State Estimation.
CSS (1)
(2019)
Lixia Xie
,
Ying Ding
,
Hongyu Yang
Mitigating Link-Flooding Attack with Segment Rerouting in SDN.
CSS (1)
(2019)
Haojun Ai
,
Yifeng Wang
,
Yuhong Yang
,
Quanxin Zhang
An Improvement of the Degradation of Speaker Recognition in Continuous Cold Speech for Home Assistant.
CSS (1)
(2019)
Shang Ci
,
Liping Sun
,
Xiaoqing Liu
,
Tingli Du
,
Xiaoyao Zheng
A Secure Density Peaks Clustering Algorithm on Cloud Computing.
CSS (1)
(2019)
Jun Luo
,
Hong Liu
,
Qianyang Cheng
Cooperative Privacy Preservation for Internet of Vehicles with Mobile Edge Computing.
CSS (1)
(2019)
Hui Sun
,
Cheng Huang
,
Xu Cheng
,
Fulong Chen
Data Privacy Protection in Medical Alliance Chain Based on K-Anonymity.
CSS (1)
(2019)
Fangguo Zhang
,
Zhuoran Zhang
: Error Correcting Code and Elliptic Curve Based Cryptosystem.
CSS (1)
(2019)
Jingbin Liu
,
Qin Yu
,
Wei Liu
,
Shijun Zhao
,
Dengguo Feng
,
Weifeng Luo
Log-Based Control Flow Attestation for Embedded Devices.
CSS (1)
(2019)
Wenmin Lin
,
Xuan Sheng
,
Lianyong Qi
An Optimized Multi-Paxos Consensus Protocol for Practical Cloud Storage Applications.
CSS (1)
(2019)
ShanGuo Lv
Efficient Privacy Protection Authentication Scheme in Vehicle Ad Hoc Networks.
CSS (1)
(2019)
Kai Ding
,
Chisheng Wang
,
Ming Tao
,
Peican Huang
A New Algorithm for Retrieving Diffuse Attenuation Coefficient Based on Big LiDAR Bathymetry Data.
CSS (1)
(2019)
Jiawei Li
,
Bo Liu
,
Weiwei Lin
,
Pengfei Li
,
Qian Gao
An Improved Container Scheduling Algorithm Based on PSO for Big Data Applications.
CSS (1)
(2019)
Yuhua Xu
,
Zhixin Sun
Achieving Data Security, Access Control and Authentication of Controllers in Hierarchical Software Defined Networking with Attribute Based Encryption.
CSS (1)
(2019)
Yifang Zhi
,
Li Yang
,
Shui Yu
,
Jianfeng Ma
BQSV: Protecting SDN Controller Cluster's Network Topology View Based on Byzantine Quorum System with Verification Function.
CSS (1)
(2019)
Tengyao Li
,
Buhong Wang
,
Fute Shang
,
Jiwei Tian
,
Kunrui Cao
ADS-B Data Attack Detection Based on Generative Adversarial Networks.
CSS (1)
(2019)
Yao Wang
,
Wencong Han
,
Lianfang Wang
,
Lu Liu
,
Xiao Yu
Encrypting VoLTE Communication via Baseband Firmware Extension.
CSS (1)
(2019)
Ying Xia
,
Yao Lin
,
Hao Wang
A Differentially Private Trajectory Publishing Mechanism Based on Stay Points.
CSS (1)
(2019)
Huwei Liu
,
Yan Zhao
,
Ning Cao
Research on Logistics Distribution Vehicle Scheduling Algorithm Based on Cloud Computing.
CSS (1)
(2019)
Jiwei Tian
,
Buhong Wang
,
Tengyao Li
,
Fute Shang
,
Kunrui Cao
,
Jing Li
Stealthy and Sparse False Data Injection Attacks Based on Machine Learning.
CSS (1)
(2019)
Song-Zhan Lv
,
Yining Liu
,
Jingtao Sun
IMES: An Automatically Scalable Invisible Membrane Image Encryption for Privacy Protection on IoT Sensors.
CSS (1)
(2019)
Xin Xie
,
Xunyi Jiang
,
Weiru Wang
,
Bin Wang
,
Tiancheng Wan
,
Hao Yang
An Intrusion Detection Method Based on Hierarchical Feature Learning and Its Application.
CSS (1)
(2019)
Hongli Chen
,
ShanGuo Lv
Research on Collaborative Filtering Recommendation Method Based on Context and User Credibility.
CSS (1)
(2019)
Jiaxi Hu
,
Zhiqiang Xu
,
Debiao He
,
Sherali Zeadally
,
Kim-Kwang Raymond Choo
Efficient and Secure Three-Factor User Authentication and Key Agreement Using Chaotic Maps.
CSS (1)
(2019)
Huaijuan Zang
,
Qiuyu Li
,
Ailian Chen
,
Jinlong Chen
,
Shu Zhan
Shuffle Dense Networks for Biometric Authentication.
CSS (1)
(2019)
Jiayu Yao
,
Xiani Fan
,
Ning Cao
Survey of Network Security Situational Awareness.
CSS (1)
(2019)
Wenti Yang
,
Zhitao Guan
An Efficient Attribute Based Encryption Scheme in Smart Grid.
CSS (1)
(2019)
Shengli Zhao
,
Zhaochan Li
,
Ning Cao
Cloud Security Solution Based on Software Defined Network.
CSS (1)
(2019)
Yaxiao Wang
,
Yuanzhang Li
,
Quanxin Zhang
,
Jingjing Hu
,
Xiaohui Kuang
Evading PDF Malware Classifiers with Generative Adversarial Network.
CSS (1)
(2019)
Xin Xie
,
Bin Wang
,
Tiancheng Wan
,
Xunyi Jiang
,
Weiru Wang
,
Wenliang Tang
Research and Application of Anomaly Detection of Industrial Control System Based on Improved Zoe Algorithm.
CSS (1)
(2019)
Dang Duy Thang
,
Toshihiro Matsui
Automated Detection System for Adversarial Examples with High-Frequency Noises Sieve.
CSS (1)
(2019)
Qi Wu
Another Look at a Proposed Cubic Chaotic Mapping.
CSS (1)
(2019)
Yan Zhao
,
Huwei Liu
,
Ning Cao
Research on Drug Regulation Mode in the Age of the Internet of Things.
CSS (1)
(2019)
Xihua Liu
,
Lianyong Qi
,
Xiaolong Xu
,
Xuyun Zhang
,
Shaohua Wan
Privacy-Aware Service Migration for Edge Computing in Urban Cities.
CSS (1)
(2019)
Kai Yang
,
Xiaoya Ma
,
Hongwei Jiang
,
Yuan Xue
,
Wencong Han
,
Lianfang Wang
,
Lu Liu
A Data Protection Scheme via Isolating Android Partitions.
CSS (1)
(2019)
Dongfeng Wang
,
Qinghua Li
,
Fengyin Li
,
Quanxin Zhang
,
Banghai Xu
Privacy-Awareness Fair Contract Signing Protocol Based on Blockchain.
CSS (1)
(2019)
Chao Zhang
,
Shaojing Fu
,
Weijun Ao
A Blockchain Based Searchable Encryption Scheme for Multiple Cloud Storage.
CSS (1)
(2019)
Ming Tao
,
Peican Huang
,
Xueqiang Li
,
Kai Ding
Big Data Based E-commerce Search Advertising Recommendation.
CSS (1)
(2019)
Shanguo Lv
Mobile Recommendation Method for Fusing Item Features and User Trust Relationship.
CSS (1)
(2019)
Qunshan Chen
,
Zhenjie Huang
,
Yong Ding
,
Yuping Zhou
,
Hui Huang
A New Provably Secure Identity-Based Multi-proxy Signature Scheme.
CSS (1)
(2019)
Changjiang Li
,
Haiqin Weng
,
Shouling Ji
,
Jianfeng Dong
,
Qinming He
DeT: Defending Against Adversarial Examples via Decreasing Transferability.
CSS (1)
(2019)
Yanhua Zhang
,
Ximeng Liu
,
Yupu Hu
,
Qikun Zhang
,
Huiwen Jia
Attribute-Based Signatures for Inner-Product Predicate from Lattices.
CSS (1)
(2019)
Xu Chang
,
Fanchang Hao
,
Jian Wu
,
Guorui Feng
File Recovery of High-Order Clearing First Cluster Based on FAT32.
CSS (1)
(2019)
Meifang Du
,
Haojia Zhu
The Fuzzy Integral Evaluation Method Based on Feature Weighting for the Level of Complex Social Development.
CSS (1)
(2019)
Xiani Fan
,
Jiayu Yao
,
Ning Cao
Research on Cloud Computing Security Problems and Protection Countermeasures.
CSS (1)
(2019)
Hong Shu
,
Fulong Chen
,
Dong Xie
,
Ping Qi
,
Yongqing Huang
A Certificateless Aggregate Signature Scheme Based on Blockchain for EMR.
CSS (1)
(2019)
Jingjun Zhou
,
Jingbing Li
,
Hui Li
,
Jing Liu
,
Jialing Liu
,
Qianning Dai
,
Saqib Ali Nawaz
Multi-watermarking Algorithm for Medical Image Based on NSCT-RDWT-DCT.
CSS (1)
(2019)
volume 11982, 2019
Cyberspace Safety and Security - 11th International Symposium, CSS 2019, Guangzhou, China, December 1-3, 2019, Proceedings, Part I
CSS (1)
11982 (2019)