Sign in
UbiSec
2021
2022
2023
2021
2023
Keyphrases
Publications
volume 1768, 2023
Ubiquitous Security - Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28-31, 2022, Revised Selected Papers
UbiSec
1768 (2023)
2022
Yanbin Weng
,
Zuochuang Li
,
Xiaobin Huang
,
Xiahu Chen
Improved DeepLabV3+ based Railway Track Extraction to Enhance Railway Transportation Safety.
UbiSec
(2022)
Xiaoqian Ran
,
Yufeng Zhuang
,
Hongping Wang
,
Danni Cao
,
Yulian Cao
,
Wenjuan Gu
Sensor Cloud Data Privacy Protection Model Based on Collaborative Deep Learning.
UbiSec
(2022)
Mohamad Jamil Al Bouhairi
,
Mostakim Mullick
,
Marvin Wolf
,
Ivan Gudymenko
,
Sebastian Clauss
Encryption Proxies in a Confidential Computing Environment.
UbiSec
(2022)
Mohammed Kharma
,
Adel Taweel
Threat Modeling in Cloud Computing - A Literature Review.
UbiSec
(2022)
Henrique Dias
,
Nirvana Meratnia
BlockLearning: A Modular Framework for Blockchain-Based Vertical Federated Learning.
UbiSec
(2022)
Khalid Hamid
,
Muhammad Waseem Iqbal
,
Muhammad Aqeel
,
Xiangyong Liu
,
Muhammad Arif
Analysis of Techniques for Detection and Removal of Zero-Day Attacks (ZDA).
UbiSec
(2022)
Kai Cheng
,
Liandong Chen
,
Huifeng Yang
,
Dan Luo
,
Shuai Yuan
,
Zhitao Guan
Differentially Private Clustering Algorithm for Mixed Data.
UbiSec
(2022)
Xiangbin Li
,
Xiaofei Xing
,
Guojun Wang
,
Peiqiang Li
,
Xiangyong Liu
Detecting Unknown Vulnerabilities in Smart Contracts with Binary Classification Model Using Machine Learning.
UbiSec
(2022)
Nuno Torres
,
Ana Chaves
,
César Toscano
,
Pedro Pinto
Prototyping the IDS Security Components in the Context of Industry 4.0 - A Textile and Clothing Industry Case Study.
UbiSec
(2022)
Shuqi Liu
,
Yufeng Zhuang
,
Xinyu Ma
,
Hongping Wang
,
Danni Cao
An Adversarial Sample Defense Method Based on Saliency Information.
UbiSec
(2022)
Li Duan
,
Yong Li
High-Speed Anonymous Device Authentication Without Asymmetric Cryptography in the Internet-of-Things.
UbiSec
(2022)
Tiange Zhao
,
Ulrike Lechner
,
Maria Pinto-Albuquerque
,
Ece Ata
,
Tiago Gasiba
CATS: A Serious Game in Industry Towards Stronger Cloud Security.
UbiSec
(2022)
Michael Tsai
,
Vimal Kumar
Listen to the Music: Evaluating the Use of Music in Audio Based Authentication.
UbiSec
(2022)
Akram Louati
,
Tiago Gasiba
Source Code Vulnerability Detection Using Deep Learning Algorithms for Industrial Applications.
UbiSec
(2022)
Songlv Feng
,
Cuina Cheng
,
Liping Mo
An Improved Cuckoo Search Algorithm and Its Application in Function Optimization.
UbiSec
(2022)
Wenti Yang
,
Zhaoyang He
,
Yalei Li
,
Haiyan Zhang
,
Zhitao Guan
A Hybrid Secure Two-Party Protocol for Vertical Federated Learning.
UbiSec
(2022)
Irfan Ali
,
Muhammad Naeem Shehzad
,
Qaisar Bashir
,
Haroon Elahi
,
Muhammad Naeem Awais
,
Oana Geman
,
Pin Liu
A Thermal-Aware Scheduling Algorithm for Reducing Thermal Risks in DAG-Based Applications in Cyber-Physical Systems.
UbiSec
(2022)
Mst. Shapna Akter
,
Hossain Shahriar
,
Zakirul Alam Bhuiya
Automated Vulnerability Detection in Source Code Using Quantum Natural Language Processing.
UbiSec
(2022)
Bo Zheng
,
Yong Xie
A New Signal Packing Algorithm for CAN-FD with Security Consideration.
UbiSec
(2022)
Shitao Wang
,
Wenjun Jiang
,
Shuhong Chen
An Aspect-Based Semi-supervised Generative Model for Online Review Spam Detection.
UbiSec
(2022)
Xiangyong Liu
,
Pengfei Yin
,
Pin Liu
,
Shuhong Chen
Decentralized Collaborative Filtering Algorithm with Privacy Preserving for Recommendation in Mobile Edge Computing.
UbiSec
(2022)
Xin Qi
,
Hongling Chen
,
Qin Liu
Empirical Likelihood for PLSIM with Missing Response Variables and Error-Prone Covariates.
UbiSec
(2022)
Muntaha Alawneh
,
Imad M. Abbadi
Approaches for Zero Trust Adoption Based upon Organization Security Level.
UbiSec
(2022)
Omar Alshaikh
,
Simon Parkinson
,
Saad Khan
On the Variability in the Application and Measurement of Supervised Machine Learning in Cyber Security.
UbiSec
(2022)
Fumin Yu
,
Feng Gao
,
Yao Yuan
,
Xiaofei Xing
,
Yinglong Dai
Hierarchical Policies of Subgoals for Safe Deep Reinforcement Learning.
UbiSec
(2022)
Saad Khan
,
Tariq A. A. Alsboui
,
Richard Hill
,
Hussain Al-Aqrabi
Multi-Mobile Agent Security by Design Itinerary Planning Approach in Wireless Sensor Network.
UbiSec
(2022)
Haiyang Huang
,
Falong Xiao
,
Xiaofang Zhang
,
Wanting Yan
,
Fumin Liu
,
Yuezhong Wu
Garbage Recognition Algorithm Based on Self-attention Mechanism and Deep Sorting.
UbiSec
(2022)
John Carter
,
Spiros Mancoridis
,
Malvin Nkomo
,
Steven Weber
,
Kapil R. Dandekar
System Call Processing Using Lightweight NLP for IoT Behavioral Malware Detection.
UbiSec
(2022)
Yun Duan
,
Laifu Wang
,
Dongxin Liu
,
Boren Deng
,
Yunfan Tian
Malware Traffic Classification Based on GAN and BP Neural Networks.
UbiSec
(2022)
Guanghui Feng
,
Wenyin Yang
,
Tao Peng
,
Xiaofei Xing
,
Shuhong Chen
,
Yuting Li
An Interactive Query Differential Privacy Protection Model Based on Big Data Analysis.
UbiSec
(2022)
Wanyi Gu
,
Guojun Wang
,
Peiqiang Li
,
Xubin Li
,
Guangxin Zhai
,
Xiangbin Li
,
Mingfei Chen
Detecting Unknown Vulnerabilities in Smart Contracts with Multi-Label Classification Model Using CNN-BiLSTM.
UbiSec
(2022)
Anam Fatima
,
Muhammad Waseem Iqbal
,
Muhammad Aqeel
,
Toqir A. Rana
,
Shuhong Chen
,
Muhammad Arif
Impact of Reenactment Programs on Young Generation.
UbiSec
(2022)
Sabrina Friedl
,
Ludwig Englbrecht
,
Fabian Böhm
,
Günther Pernul
Support Tool Selection in Digital Forensics Training.
UbiSec
(2022)
Zhiqiang Wang
,
Sulong Meng
,
Ying Chen
Vulnerability Detection with Representation Learning.
UbiSec
(2022)
Yuting Li
,
Guojun Wang
,
Tao Peng
,
Guanghui Feng
FedTA: Locally-Differential Federated Learning with Top-k Mechanism and Adam Optimization.
UbiSec
(2022)
Zijing Zhang
,
Vimal Kumar
,
Michael Mayo
,
Albert Bifet
Assessing Vulnerability from Its Description.
UbiSec
(2022)
Zhenru Huo
,
Guoqing Jia
,
Weidong Fang
,
Wei Chen
,
Wuxiong Zhang
A-VMD: Adaptive Variational Mode Decomposition Scheme for Noise Reduction in Sensor-Cloud.
UbiSec
(2022)
Ahmed Sabbah
,
Adel Taweel
,
Samer Zein
Android Malware Detection: A Literature Review.
UbiSec
(2022)
volume 1557, 2022
Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers
UbiSec
1557 (2022)
2021
Xingshen Wei
,
Yongjian Cao
,
Peng Gao
,
Junxian Xu
A Reverse Auction Based Efficient D2D Transmission Mechanism for Ubiquitous Power Terminals.
UbiSec
(2021)
Hossein Keipour
,
Saptarshi Hazra
,
Niclas Finne
,
Thiemo Voigt
Generalizing Supervised Learning for Intrusion Detection in IoT Mesh Networks.
UbiSec
(2021)
Lei Xu
,
Dingkun Yang
An Edge-Cloud Collaborative Object Detection System.
UbiSec
(2021)
Shaobo Zhang
,
Shuo Yang
,
Gengming Zhu
,
Entao Luo
,
Jiyong Zhang
,
Desheng Xiang
A Fine-Grained Access Control Scheme for Electronic Health Records Based on Roles and Attributes.
UbiSec
(2021)
Jiaying Lin
,
Yehua Wei
,
Wenjia Li
,
Jing Long
Intrusion Detection System Based on Deep Neural Network and Incremental Learning for In-Vehicle CAN Networks.
UbiSec
(2021)
Meirong Liu
,
Hong Zheng
,
Qin Liu
,
Xiaofei Xing
,
Yinglong Dai
A Backdoor Embedding Method for Backdoor Detection in Deep Neural Networks.
UbiSec
(2021)
Yuzhu Wang
,
Peiheng Zhang
,
Haitao Zhan
,
Mingwu Zhang
Privacy-Enhanced Mean-Variance Scheme Against Malicious Signature Attacks in Smart Grids.
UbiSec
(2021)
Abigail M. Y. Koay
,
Miao Xie
,
Ryan K. L. Ko
,
Charles Sterner
,
Taejun Choi
,
Naipeng Dong
SDGen: A Scalable, Reproducible and Flexible Approach to Generate Real World Cyber Security Datasets.
UbiSec
(2021)
Li Ma
,
Huihong Yang
,
Yiming Chai
,
Jiawen Fan
,
Wenyin Yang
An Online Automated Anti-anti-virus Method.
UbiSec
(2021)
Iosif Andrei-Cristian
,
Tiago Espinha Gasiba
,
Tiange Zhao
,
Ulrike Lechner
,
Maria Pinto-Albuquerque
A Large-Scale Study on the Security Vulnerabilities of Cloud Deployments.
UbiSec
(2021)