​
Login / Signup
Cybersecur.
2018
2021
2024
2018
2024
Keyphrases
Publications
volume 7, number 1, 2024
Mingxing Hu
,
Zhen Liu
,
Yunhong Zhou
Efficient post-quantum secure deterministic wallet scheme.
Cybersecur.
7 (1) (2024)
Tin Lai
,
Farnaz Farid
,
Abubakar Bello
,
Fariza Sabrina
Ensemble learning based anomaly detection for IoT cybersecurity via Bayesian hyperparameters sensitivity analysis.
Cybersecur.
7 (1) (2024)
Ruida Wang
,
Ziyi Li
,
Xianhui Lu
,
Zhenfei Zhang
,
Kunpeng Wang
Key derivable signature and its application in blockchain stealth address.
Cybersecur.
7 (1) (2024)
Boyuan Xu
,
Yiru Gong
,
Xiaoyu Geng
,
Yun Li
,
Cong Dong
,
Song Liu
,
Yuling Liu
,
Bo Jiang
,
Zhigang Lu
ProcSAGE: an efficient host threat detection method based on graph representation learning.
Cybersecur.
7 (1) (2024)
Chuyi Yan
,
Xueying Han
,
Yan Zhu
,
Dan Du
,
Zhigang Lu
,
Yuling Liu
Phishing behavior detection on different blockchains via adversarial domain adaptation.
Cybersecur.
7 (1) (2024)
Jie Yuan
,
Rui Xu
,
Xinghai Wei
,
Keji Miao
,
Dongxiao Liu
TVRAVNF: an efficient low-cost TEE-based virtual remote attestation scheme for virtual network functions.
Cybersecur.
7 (1) (2024)
Renyang Liu
,
Wei Zhou
,
Xin Jin
,
Song Gao
,
Yuanyu Wang
,
Ruxin Wang
DTA: distribution transform-based attack for query-limited scenario.
Cybersecur.
7 (1) (2024)
Xi Lin
,
Heyang Cao
,
Feng-Hao Liu
,
Zhedong Wang
,
Mingsheng Wang
Shorter ZK-SNARKs from square span programs over ideal lattices.
Cybersecur.
7 (1) (2024)
Zeshuo Zhu
,
Rui Zhang
,
Yang Tao
Atomic cross-chain swap based on private key exchange.
Cybersecur.
7 (1) (2024)
Yuantu Luo
,
Jun Tao
,
Yuehao Zhu
,
Yifan Xu
HSS: enhancing IoT malicious traffic classification leveraging hybrid sampling strategy.
Cybersecur.
7 (1) (2024)
Yao Pan
,
Zheng Chao
,
He Wang
,
Jing Yang
,
Hongjia Li
,
Liming Wang
FedSHE: privacy preserving and efficient federated learning with adaptive segmented CKKS homomorphic encryption.
Cybersecur.
7 (1) (2024)
Md. Alamgir Hossain
,
Md. Saiful Islam
Enhanced detection of obfuscated malware in memory dumps: a machine learning approach for advanced cybersecurity.
Cybersecur.
7 (1) (2024)
Chaoqun Wang
,
Ning Li
,
Shujuan Ji
,
Xianwen Fang
,
Zhen Wang
Enhancing fairness of trading environment: discovering overlapping spammer groups with dynamic co-review graph optimization.
Cybersecur.
7 (1) (2024)
Haobin Chen
,
Yue Yang
,
Siyi Lv
Revisiting frequency-smoothing encryption: new security definitions and efficient construction.
Cybersecur.
7 (1) (2024)
Zhuo Zhao
,
Ching-Fang Hsu
,
Lein Harn
,
Zhe Xia
,
Xinyu Jiang
,
Liu Liu
Lightweight ring-neighbor-based user authentication and group-key agreement for internet of drones.
Cybersecur.
7 (1) (2024)
Benqiang Wei
,
Xianhui Lu
Improved homomorphic evaluation for hash function based on TFHE.
Cybersecur.
7 (1) (2024)
Qintao Shen
,
Guozhu Meng
,
Kai Chen
Revealing the exploitability of heap overflow through PoC analysis.
Cybersecur.
7 (1) (2024)
Fengxia Liu
,
Zhiyong Zheng
,
Zixian Gong
,
Kun Tian
,
Yi Zhang
,
Zhe Hu
,
Jia Li
,
Qun Xu
A survey on lattice-based digital signature.
Cybersecur.
7 (1) (2024)
Wenbo Wang
,
Peng Yi
,
Taotao Kou
,
Weitao Han
,
Chengyu Wang
GLDOC: detection of implicitly malicious MS-Office documents using graph convolutional networks.
Cybersecur.
7 (1) (2024)
Alex Shafarenko
Winternitz stack protocols for embedded systems and IoT.
Cybersecur.
7 (1) (2024)
Chenxi Hu
,
Tao Wu
,
Chunsheng Liu
,
Chao Chang
Joint contrastive learning and belief rule base for named entity recognition in cybersecurity.
Cybersecur.
7 (1) (2024)
Batoul Achaal
,
Mehdi Adda
,
Maxime Berger
,
Hussein Ibrahim
,
Ali Awde
Study of smart grid cyber-security, examining architectures, communication networks, cyber-attacks, countermeasure techniques, and challenges.
Cybersecur.
7 (1) (2024)
Linwei Fang
,
Liming Wang
,
Hongjia Li
Iterative and mixed-spaces image gradient inversion attack in federated learning.
Cybersecur.
7 (1) (2024)
Zheng Sun
,
Jinxiao Zhao
,
Feng Guo
,
Yuxuan Chen
,
Lei Ju
CommanderUAP: a practical and transferable universal adversarial attacks on speech recognition models.
Cybersecur.
7 (1) (2024)
Ximing Li
,
Hao Wang
,
Sha Ma
,
Meiyan Xiao
,
Qiong Huang
Revocable and verifiable weighted attribute-based encryption with collaborative access for electronic health record in cloud.
Cybersecur.
7 (1) (2024)
Chunwen Liu
,
Ru Tan
,
Yang Wu
,
Yun Feng
,
Ze Jin
,
Fangjiao Zhang
,
Yuling Liu
,
Qixu Liu
Dissecting zero trust: research landscape and its implementation in IoT.
Cybersecur.
7 (1) (2024)
Keya Xu
,
Guang Cheng
F3l: an automated and secure function-level low-overhead labeled encrypted traffic dataset construction method for IM in Android.
Cybersecur.
7 (1) (2024)
Yanwei Gong
,
Xiaolin Chang
,
Jelena V. Misic
,
Vojislav B. Misic
,
Jianhua Wang
,
Haoran Zhu
Practical solutions in fully homomorphic encryption: a survey analyzing existing acceleration methods.
Cybersecur.
7 (1) (2024)
Mahdi Soltani
,
Khashayar Khajavi
,
Mahdi Jafari Siavoshani
,
Amir Hossein Jahangir
A multi-agent adaptive deep learning framework for online intrusion detection.
Cybersecur.
7 (1) (2024)
Haoran Lyu
,
Yajie Wang
,
Yu-An Tan
,
Huipeng Zhou
,
Yuhang Zhao
,
Quanxin Zhang
Maxwell's Demon in MLP-Mixer: towards transferable adversarial attacks.
Cybersecur.
7 (1) (2024)
Urikhimbam Boby Clinton
,
Nazrul Hoque
,
Kh Robindro Singh
Classification of DDoS attack traffic on SDN network environment using deep learning.
Cybersecur.
7 (1) (2024)
Juntao He
,
Haoran Dai
,
Runqi Sui
,
Xuejing Yuan
,
Dun Liu
,
Hao Feng
,
Xinyue Liu
,
Wenchuan Yang
,
Baojiang Cui
,
Kedan Li
EvilPromptFuzzer: generating inappropriate content based on text-to-image models.
Cybersecur.
7 (1) (2024)
Yinghong Xie
,
Yan Hao
,
Xiaowei Han
,
Qiang Gao
,
Biao Yin
A multi-channel spatial information feature based human pose estimation algorithm.
Cybersecur.
7 (1) (2024)
Edward Chuah
,
Neeraj Suri
An empirical study of reflection attacks using NetFlow data.
Cybersecur.
7 (1) (2024)
Huizhuo Wang
,
Yang Tao
,
Rui Zhang
Threshold ring signature: generic construction and logarithmic size instantiation.
Cybersecur.
7 (1) (2024)
Miao Tian
,
Yushu Zhang
,
Yongming Zhang
,
Xiangli Xiao
,
Wenying Wen
A privacy-preserving image retrieval scheme with access control based on searchable encryption in media cloud.
Cybersecur.
7 (1) (2024)
Huaxin Wang
,
Yiwen Gao
,
Yuejun Liu
,
Qian Zhang
,
Yongbin Zhou
In-depth Correlation Power Analysis Attacks on a Hardware Implementation of CRYSTALS-Dilithium.
Cybersecur.
7 (1) (2024)
Chen An
,
Mengjie Huang
,
Xianhui Lu
,
Lei Bi
,
Weijie Li
Polar code-based secure transmission with higher message rate combining channel entropy and computational entropy.
Cybersecur.
7 (1) (2024)
Yanjun Li
,
Weiguo Zhang
,
Yiping Lin
,
Jian Zou
,
Jian Liu
A circuit area optimization of MK-3 S-box.
Cybersecur.
7 (1) (2024)
Shuang Song
,
Neng Gao
,
Yifei Zhang
,
Cunqing Ma
BRITD: behavior rhythm insider threat detection with time awareness and user adaptation.
Cybersecur.
7 (1) (2024)
volume 6, number 1, 2023
Yanyan Zou
,
Wei Zou
,
JiaCheng Zhao
,
Nanyu Zhong
,
Yu Zhang
,
Ji Shi
,
Wei Huo
PosFuzz: augmenting greybox fuzzing with effective position distribution.
Cybersecur.
6 (1) (2023)
B. S. Sharmila
,
Rohini Nagapadma
Quantized autoencoder (QAE) intrusion detection system for anomaly detection in resource-constrained IoT devices using RT-IoT2022 dataset.
Cybersecur.
6 (1) (2023)
Chuyi Yan
,
Chen Zhang
,
Meng Shen
,
Ning Li
,
Jinhao Liu
,
Yinhao Qi
,
Zhigang Lu
,
Yuling Liu
Aparecium: understanding and detecting scam behaviors on Ethereum via biased random walk.
Cybersecur.
6 (1) (2023)
Yuyao Ge
,
Zhongguo Yang
,
Lizhe Chen
,
Yiming Wang
,
Chengyang Li
Attack based on data: a novel perspective to attack sensitive points directly.
Cybersecur.
6 (1) (2023)
Jean De La Croix Ntivuguruzwa
,
Tohari Ahmad
A convolutional neural network to detect possible hidden data in spatial domain images.
Cybersecur.
6 (1) (2023)
Jiashuo Liu
,
Jiongjiong Ren
,
Shaozhen Chen
A deep learning aided differential distinguisher improvement framework with more lightweight and universality.
Cybersecur.
6 (1) (2023)
Chaidir Chalaf Islamy
,
Tohari Ahmad
,
Royyana Muslim Ijtihadie
Reversible data hiding based on histogram and prediction error for sharing secret data.
Cybersecur.
6 (1) (2023)
Yixuan Cheng
,
Wenqing Fan
,
Wei Huang
,
Jingyu Yang
,
Gaoqing Yu
,
Wen Liu
MSLFuzzer: black-box fuzzing of SOHO router devices via message segment list inference.
Cybersecur.
6 (1) (2023)
Chang Liu
,
Yan-Jun Wu
,
Jing-Zheng Wu
,
Chen Zhao
A buffer overflow detection and defense method based on RISC-V instruction set extension.
Cybersecur.
6 (1) (2023)
Yisroel Mirsky
IPatch: a remote adversarial patch.
Cybersecur.
6 (1) (2023)