default search action
CSS 2019: Guangzhou, China - Part I
- Jaideep Vaidya, Xiao Zhang, Jin Li:
Cyberspace Safety and Security - 11th International Symposium, CSS 2019, Guangzhou, China, December 1-3, 2019, Proceedings, Part I. Lecture Notes in Computer Science 11982, Springer 2019, ISBN 978-3-030-37336-8
Network Security
- Xin Xie, Bin Wang, Tiancheng Wan, Xunyi Jiang, Weiru Wang, Wenliang Tang:
Research and Application of Anomaly Detection of Industrial Control System Based on Improved Zoe Algorithm. 3-12 - Xin Xie, Xunyi Jiang, Weiru Wang, Bin Wang, Tiancheng Wan, Hao Yang:
An Intrusion Detection Method Based on Hierarchical Feature Learning and Its Application. 13-20 - Tianqi Huang, Buhong Wang, Dong Lin:
Spoofing Attack Detection for Radar Network System State Estimation. 21-33 - Jiayu Yao, Xiani Fan, Ning Cao:
Survey of Network Security Situational Awareness. 34-44 - Yao Wang, Wencong Han, Lianfang Wang, Lu Liu, Xiao Yu:
Encrypting VoLTE Communication via Baseband Firmware Extension. 45-56 - Lixia Xie, Ying Ding, Hongyu Yang:
Mitigating Link-Flooding Attack with Segment Rerouting in SDN. 57-69
System Security
- Yifang Zhi, Li Yang, Shui Yu, Jianfeng Ma:
BQSV: Protecting SDN Controller Cluster's Network Topology View Based on Byzantine Quorum System with Verification Function. 73-88 - Kai Yang, Xiaoya Ma, Hongwei Jiang, Yuan Xue, Wencong Han, Lianfang Wang, Lu Liu:
A Data Protection Scheme via Isolating Android Partitions. 89-101 - Hongwei Jiang, Kai Yang, Lianfang Wang, Jinbao Gao, Sikang Hu:
A Code Protection Scheme via Inline Hooking for Android Applications. 102-116 - Jingbin Liu, Qin Yu, Wei Liu, Shijun Zhao, Dengguo Feng, Weifeng Luo:
Log-Based Control Flow Attestation for Embedded Devices. 117-132 - Kai Ding, Chisheng Wang, Ming Tao, Peican Huang:
A New Algorithm for Retrieving Diffuse Attenuation Coefficient Based on Big LiDAR Bathymetry Data. 133-142 - Huaijuan Zang, Qiuyu Li, Ailian Chen, Jinlong Chen, Shu Zhan:
Shuffle Dense Networks for Biometric Authentication. 143-156
Information Security
- Wenti Yang, Zhitao Guan:
An Efficient Attribute Based Encryption Scheme in Smart Grid. 159-172 - Yanhua Zhang, Ximeng Liu, Yupu Hu, Qikun Zhang, Huiwen Jia:
Attribute-Based Signatures for Inner-Product Predicate from Lattices. 173-185 - Jiaxi Hu, Zhiqiang Xu, Debiao He, Sherali Zeadally, Kim-Kwang Raymond Choo:
Efficient and Secure Three-Factor User Authentication and Key Agreement Using Chaotic Maps. 186-202 - Yuhua Xu, Zhixin Sun:
Achieving Data Security, Access Control and Authentication of Controllers in Hierarchical Software Defined Networking with Attribute Based Encryption. 203-213 - Fangguo Zhang, Zhuoran Zhang:
ECC2: Error Correcting Code and Elliptic Curve Based Cryptosystem. 214-229 - Qunshan Chen, Zhenjie Huang, Yong Ding, Yuping Zhou, Hui Huang:
A New Provably Secure Identity-Based Multi-proxy Signature Scheme. 230-242
Privacy Preservation
- Ying Xia, Yao Lin, Hao Wang:
A Differentially Private Trajectory Publishing Mechanism Based on Stay Points. 245-257 - Hui Sun, Cheng Huang, Xu Cheng, Fulong Chen:
Data Privacy Protection in Medical Alliance Chain Based on K-Anonymity. 258-264 - Song-Zhan Lv, Yining Liu, Jingtao Sun:
IMES: An Automatically Scalable Invisible Membrane Image Encryption for Privacy Protection on IoT Sensors. 265-273 - Dongfeng Wang, Qinghua Li, Fengyin Li, Quanxin Zhang, Banghai Xu:
Privacy-Awareness Fair Contract Signing Protocol Based on Blockchain. 274-278 - ShanGuo Lv:
Efficient Privacy Protection Authentication Scheme in Vehicle Ad Hoc Networks. 279-288 - Jun Luo, Hong Liu, Qianyang Cheng:
Cooperative Privacy Preservation for Internet of Vehicles with Mobile Edge Computing. 289-303
Machine Learning and Security
- Changjiang Li, Haiqin Weng, Shouling Ji, Jianfeng Dong, Qinming He:
DeT: Defending Against Adversarial Examples via Decreasing Transferability. 307-322 - Tengyao Li, Buhong Wang, Fute Shang, Jiwei Tian, Kunrui Cao:
ADS-B Data Attack Detection Based on Generative Adversarial Networks. 323-336 - Jiwei Tian, Buhong Wang, Tengyao Li, Fute Shang, Kunrui Cao, Jing Li:
Stealthy and Sparse False Data Injection Attacks Based on Machine Learning. 337-347 - Dang Duy Thang, Toshihiro Matsui:
Automated Detection System for Adversarial Examples with High-Frequency Noises Sieve. 348-362 - Haojun Ai, Yifeng Wang, Yuhong Yang, Quanxin Zhang:
An Improvement of the Degradation of Speaker Recognition in Continuous Cold Speech for Home Assistant. 363-373 - Yaxiao Wang, Yuanzhang Li, Quanxin Zhang, Jingjing Hu, Xiaohui Kuang:
Evading PDF Malware Classifiers with Generative Adversarial Network. 374-387
Cyberspace Safety
- Yuyi Liu, Pavol Zavarsky, Yasir Malik:
Non-linguistic Features for Cyberbullying Detection on a Social Media Platform Using Machine Learning. 391-406 - Qi Wu:
Another Look at a Proposed Cubic Chaotic Mapping. 407-412 - Yan Zhao, Huwei Liu, Ning Cao:
Research on Drug Regulation Mode in the Age of the Internet of Things. 413-424 - Xihua Liu, Lianyong Qi, Xiaolong Xu, Xuyun Zhang, Shaohua Wan:
Privacy-Aware Service Migration for Edge Computing in Urban Cities. 425-436 - Hong Shu, Fulong Chen, Dong Xie, Ping Qi, Yongqing Huang:
A Certificateless Aggregate Signature Scheme Based on Blockchain for EMR. 437-443 - Meifang Du, Haojia Zhu:
The Fuzzy Integral Evaluation Method Based on Feature Weighting for the Level of Complex Social Development. 444-454
Big Data and Security
- Ming Tao, Peican Huang, Xueqiang Li, Kai Ding:
Big Data Based E-commerce Search Advertising Recommendation. 457-466 - Xu Chang, Fanchang Hao, Jian Wu, Guorui Feng:
File Recovery of High-Order Clearing First Cluster Based on FAT32. 467-476 - Shanguo Lv:
Mobile Recommendation Method for Fusing Item Features and User Trust Relationship. 477-488 - Hongli Chen, ShanGuo Lv:
Research on Collaborative Filtering Recommendation Method Based on Context and User Credibility. 489-500 - Jingjun Zhou, Jingbing Li, Hui Li, Jing Liu, Jialing Liu, Qianning Dai, Saqib Ali Nawaz:
Multi-watermarking Algorithm for Medical Image Based on NSCT-RDWT-DCT. 501-515 - Jiawei Li, Bo Liu, Weiwei Lin, Pengfei Li, Qian Gao:
An Improved Container Scheduling Algorithm Based on PSO for Big Data Applications. 516-530
Cloud and Security
- Shang Ci, Liping Sun, Xiaoqing Liu, Tingli Du, Xiaoyao Zheng:
A Secure Density Peaks Clustering Algorithm on Cloud Computing. 533-541 - Xiani Fan, Jiayu Yao, Ning Cao:
Research on Cloud Computing Security Problems and Protection Countermeasures. 542-551 - Huwei Liu, Yan Zhao, Ning Cao:
Research on Logistics Distribution Vehicle Scheduling Algorithm Based on Cloud Computing. 552-561 - Shengli Zhao, Zhaochan Li, Ning Cao:
Cloud Security Solution Based on Software Defined Network. 562-574 - Wenmin Lin, Xuan Sheng, Lianyong Qi:
An Optimized Multi-Paxos Consensus Protocol for Practical Cloud Storage Applications. 575-584 - Chao Zhang, Shaojing Fu, Weijun Ao:
A Blockchain Based Searchable Encryption Scheme for Multiple Cloud Storage. 585-600
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.