Advanced Search

  • SEARCHING...
  • SEARCHING...

Detail Record


XML

Cybersecurity, Vol. 7, 2024

Articles

1. GLDOC: detection of implicitly malicious MS-Office documents using graph convolutional networks. --Wenbo Wang, Peng Yi, Taotao Kou, Weitao Han and Chengyu Wang
2. Revealing the exploitability of heap overflow through PoC analysis. --Qintao Shen, Guozhu Meng and Kai Chen
3. Threshold ring signature: generic construction and logarithmic size instantiation. --Huizhuo Wang, Yang Tao and Rui Zhang
4. FedSHE: privacy preserving and efficient federated learning with adaptive segmented CKKS homomorphic encryption. --Yao Pan, Zheng Chao, Wang He, Yang Jing, Li Hongjia and Wang Liming
5. A privacy-preserving image retrieval scheme with access control based on searchable encryption in media cloud. --Miao Tian, Yushu Zhang, Yongming Zhang, Xiangli Xiao and Wenying Wen
6. Improved homomorphic evaluation for hash function based on TFHE. --Benqiang Wei and Xianhui Lu
7. An empirical study of reflection attacks using NetFlow data. --Edward Chuah and Neeraj Suri
8. Phishing behavior detection on different blockchains via adversarial domain adaptation. --Chuyi Yan, Xueying Han, Yan Zhu, Dan Du, Zhigang Lu and Yuling Liu
9. Ensemble learning based anomaly detection for IoT cybersecurity via Bayesian hyperparameters sensitivity analysis. --Tin Lai, Farnaz Farid, Abubakar Bello and Fariza Sabrina
10. CommanderUAP: a practical and transferable universal adversarial attacks on speech recognition models. --Zheng Sun, Jinxiao Zhao, Feng Guo, Yuxuan Chen and Lei Ju
11. Enhancing fairness of trading environment: discovering overlapping spammer groups with dynamic co-review graph optimization. --Chaoqun Wang, Ning Li, Shujuan Ji, Xianwen Fang and Zhen Wang
12. In-depth Correlation Power Analysis Attacks on a Hardware Implementation of CRYSTALS-Dilithium. --Huaxin Wang, Yiwen Gao, Yuejun Liu, Qian Zhang and Yongbin Zhou
13. Atomic cross-chain swap based on private key exchange. --Zeshuo Zhu, Rui Zhang and Yang Tao
14. HSS: enhancing IoT malicious traffic classification leveraging hybrid sampling strategy. --Yuantu Luo, Jun Tao, Yuehao Zhu and Yifan Xu
15. Key derivable signature and its application in blockchain stealth address. --Ruida Wang, Ziyi Li, Xianhui Lu, Zhenfei Zhang and Kunpeng Wang
Wang, Wenbo - Personal Name
Luo, Yuantu - Personal Name
Zhu, Zeshuo - Personal Name
Wang, Huaxin - Personal Name
Wang, Chaoqun - Personal Name
Sun, Zheng - Personal Name
Lai, Tin - Personal Name
Yan, Chuyi - Personal Name
Chuah, Edward - Personal Name
Wei, Benqiang - Personal Name
Tian, Miao - Personal Name
Pan, Yao - Personal Name
Wang, Huizhuo - Personal Name
Shen, Qintao - Personal Name
Wang, Ruida - Personal Name
Vol. 7, 2024
2523-3246
e-Journal PTI
Inggris
Springer Nature Singapore Pte Ltd.
2024
Cambridge, United Kingdom
LOADING LIST...
LOADING LIST...