Linked e-resources

Details

Privacy-preserving and scalable data access control based on self-sovereign identity management in large-scale cloud storage / Min Xiao, Zhongyue Ma, Tao Li
Attention mechanism based adversarial attack against deep reinforcement learning / Jinyin Chen, Xueke Wang, Yan Zhang, Haibin Zheng, Shouling Ji
Attribute-based searchable encryption scheme with fuzzy keywords / Xinyu Song, Zhan Zhou, Weijie Duan, Zhongyi Liu, Chungen Xu
Improving deep neural network robustness with Siamese empowered adversarial training / Yu Zhu, Zongfei Li, Fengyuan Xu, Sheng Zhong
Predicting advanced persistent threats for IoT systems based on federated learning / Zitong Li, Xiang Cheng, Jiale Zhang, Bing Chen
DFspliter : data flow oriented program partitioning against data stitching attacks / Chenyu Zhao, Hao Han
Revisiting attacks and defenses in connected and autonomous vehicles / Ziyan Fang, Weijun Zhang, Zongfei Li, Huaao Tang, Hao Han, Fengyuan Xu
An improved cryptanalysis algorithm for Chebyshev map-based discrete logarithm problem / Wei Peng, Shang Song, Wenzheng Liu
Reinforcement-learning based network intrusion detection with human interaction in the loop / Ze Liu
Research on security of access control for cloud computing environment / Zhongdong Cui, Feng Yu

Research and development of privacy protection of WSN routing protocol / Panfei Liu, Feng Xu, Ying Zhu
Apply quantum search to the safety check for mono operational attribute based protection systems / Vincent C. Hu
A semi-supervised intrusion detection algorithm based on auto-encoder / Xiangtong Du, Yongzhong Li, Zunlei Feng
Resarch on arm TrustZone and understanding the security vulnerability in its cache architecture / Pengfei Guo, Yingjian Yan, Chunsheng Zhu, Junjie Wang
Scrutinizing trust and transparency in cash on delivery systems / Xuan Son Ha, Trieu Hai Le, Tan Tai Phan, Hung Huy Duc Nguyen, Hong Khanh Vo, Nghia Duong-Trung
Expansion adaption of attack-aware controller-link-switch cost minimization placement in software-defined networking / Cheng Chi Qin, Tan Saw Chin, Lee Ching Kwang, Zulfadzli Yusoff, Rizaluddin Kaspin
A weighted federated averaging framework to reduce the negative influence from the dishonest users / Fengpan Zhao, Yan Huang, Saide Zhu, Venkata Malladi, Yubao Wu
I can think like you! Towards reaction spoofing attack on brainwave-based authentication / Wei-Yang Chiu, Weizhi Meng, Wenjuan Li
Cubic permutation polynomials-based block RLNC algorithm in wireless networks / Hongwei Luo, Wanyi Feng, Baolin Sun, Ying Song
A lightweight blockchain-based trust model for smart vehicles in VANETs / Seyedvalyallah Ayobi, Yongli Wang, Mahdi Rabbani, Ali Dorri, Hamed Jelodar, Hucheng Huang et al.

Light intensity based IoT device positioning for indoor monitoring / Gaofei Sun, Xiaoshuang Xing, Zhenjiang Qian, Zhiguo Wang, Saide Zhu
A blockchain-based reconstruction framework for UAV network / Gongzhe Qiao, Yi Zhuang
A new certificateless aggregate signature scheme for wireless sensor networks / Yihong Wen, Yi Yang, Shicheng Wang, Li Li, Min Luo
Blockchain and IoT based textile manufacturing traceability system in Industry 4.0 / Muhammad Shakeel Faridi, Saqib Ali Guihua Duan, Guojun Wang
A network security situational awareness framework based on situation fusion / Sai Lu, Yi Zhuang
Intelligent medical security framework of body area network based on fog computing / Songpeng Zhang, Yi Zhuang, Zining Cao
Secure and traceable attribute-based sequential aggregate signature / Ruili Yang, Jiageng Chen, Shangle Li
Social spammer detection based on PSO-CatBoost / Shupeng Li, F. Jiang, Yunbai Qin, Kunkun Zheng
Software developer recommendation in terms of reducing bug tossing length / Muhammad Zubair Baloch, Shahid Hussain, Humaira Afzal, Muhammad Rafiq
A methodology to automate the security patterns selection / Khudema Zahra, Shahid Hussain, Humaira Afzal, Muhammad Rafiq Mufti, Dost Muhammad Khan, Muhammad Khalid Sohail.

Browse Subjects

Show more subjects...

Statistics

from
to
Export