


default search action
Security and Communication Networks, Volume 2020
Volume 2020, 2020
- Xianwei Zhu

, ChaoWen Chang
, Qin Xi, ZhiBin Zuo
:
Attribute-Guard: Attribute-Based Flow Access Control Framework in Software-Defined Networking. 6302739:1-6302739:18 - Mingfu Xue

, Chengxiang Yuan, Jian Wang
, Weiqiang Liu
:
DPAEG: A Dependency Parse-Based Adversarial Examples Generation Method for Intelligent Q&A Robots. 5890820:1-5890820:15 - Congge Xie

, Jian Weng
, Jinming Wen
:
Scalable Revocable Identity-Based Signature Scheme with Signing Key Exposure Resistance from Lattices. 1743421:1-1743421:11 - Jiaye Pan

, Yi Zhuang
, Binglin Sun:
BAHK: Flexible Automated Binary Analysis Method with the Assistance of Hardware and System Kernel. 8702017:1-8702017:19 - Mingjiang Huang

, Liming Wang
:
Automatic Search for the Linear (Hull) Characteristics of ARX Ciphers: Applied to SPECK, SPARX, Chaskey, and CHAM-64. 4898612:1-4898612:14 - JeongYeon Kim

:
Protecting Metadata of Access Indicator and Region of Interests for Image Files. 4836109:1-4836109:10 - Hua Dai

, Xuelong Dai
, Xiao Li, Xun Yi, Fu Xiao
, Geng Yang
:
A Multibranch Search Tree-Based Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data. 7307315:1-7307315:15 - Smitha Rajagopal, Poornima Panduranga Kundapur, Katiganere Siddaramappa Hareesha

:
A Stacking Ensemble for Network Intrusion Detection Using Heterogeneous Datasets. 4586875:1-4586875:9 - Gyeong-Hoon Lee

, Jeil Jo
, Cheong Hee Park
:
Jamming Prediction for Radar Signals Using Machine Learning Methods. 2151570:1-2151570:9 - S. Mary Virgil Nithya

, V. Rhymend Uthariaraj:
Identity-Based Public Auditing Scheme for Cloud Storage with Strong Key-Exposure Resilience. 4838497:1-4838497:13 - Abigail Akosua Addobea

, Jun Hou
, Qianmu Li
:
MHCOOS: An Offline-Online Certificateless Signature Scheme for M-Health Devices. 7085623:1-7085623:12 - Xingguang Zhou, Jianwei Liu

, Zongyang Zhang
, Qianhong Wu:
Secure Outsourced Medical Data against Unexpected Leakage with Flexible Access Control in a Cloud Storage System. 8347213:1-8347213:20 - Xingting Dong, Yanhua Zhang

, Baocang Wang
, Jiangshan Chen
:
Server-Aided Revocable Attribute-Based Encryption from Lattices. 1460531:1-1460531:13 - Zhiyan Xu

, Debiao He
, Neeraj Kumar
, Kim-Kwang Raymond Choo
:
Efficient Certificateless Aggregate Signature Scheme for Performing Secure Routing in VANETs. 5276813:1-5276813:12 - Taeyun Kim, Yongwoo Oh, Hyoungshick Kim

:
Efficient Privacy-Preserving Fingerprint-Based Authentication System Using Fully Homomorphic Encryption. 4195852:1-4195852:11 - Na Lv

, Tianyu Chen
, Shuangyi Zhu, Jing Yang, Yuan Ma, Jiwu Jing, Jingqiang Lin:
High-Efficiency Min-Entropy Estimation Based on Neural Network for Random Number Generators. 4241713:1-4241713:18 - Taehoon Eom

, Jin B. Hong
, SeongMo An, Jong Sou Park, Dong Seong Kim
:
A Framework for Real-Time Intrusion Response in Software Defined Networking Using Precomputed Graphical Security Models. 7235043:1-7235043:15 - Jiaqing Mo

, Zhongwang Hu, Yuhua Lin:
Cryptanalysis and Security Improvement of Two Authentication Schemes for Healthcare Systems Using Wireless Medical Sensor Networks. 5047379:1-5047379:11 - Anchit Bijalwan

:
Botnet Forensic Analysis Using Machine Learning. 9302318:1-9302318:9 - Jingmei Li

, Di Xue
, Weifei Wu, Jiaxiang Wang:
Incremental Learning for Malware Classification in Small Datasets. 6309243:1-6309243:12 - Lingyun Jiang

, Kai Qiao
, Ruoxi Qin
, Linyuan Wang
, Wanting Yu, Jian Chen
, Haibing Bu, Bin Yan
:
Cycle-Consistent Adversarial GAN: The Integration of Adversarial Attack and Defense. 3608173:1-3608173:9 - John Foley, Naghmeh Moradpoor

, Henry Ochenyi:
Employing a Machine Learning Approach to Detect Combined Internet of Things Attacks against Two Objective Functions Using a Novel Dataset. 2804291:1-2804291:17 - Kun Tang

, Wenjuan Tang, Entao Luo
, Zhiyuan Tan, Weizhi Meng
, Lianyong Qi
:
Secure Information Transmissions in Wireless-Powered Cognitive Radio Networks for Internet of Medical Things. 7542726:1-7542726:10 - Trevor J. Bihl

, Todd J. Paciencia, Kenneth W. Bauer Jr., Michael A. Temple
:
Cyber-Physical Security with RF Fingerprint Classification through Distance Measure Extensions of Generalized Relevance Learning Vector Quantization. 3909763:1-3909763:12 - Shumaila Shahzadi, Bushra Khaliq, Muhammad Rizwan

, Fahad Ahmad
:
Security of Cloud Computing Using Adaptive Neural Fuzzy Inference System. 5352108:1-5352108:15 - Ömer Aslan

, Refik Samet
, Ömer Özgür Tanriöver
:
Using a Subtractive Center Behavioral Model to Detect Malware. 7501894:1-7501894:17 - Subin Moon, Younho Lee

:
An Efficient Encrypted Floating-Point Representation Using HEAAN and TFHE. 1250295:1-1250295:18 - Sanghoon Lee, Ik Rae Jeong

:
On the Unlinkability of Fingerprint Shell. 8256929:1-8256929:8 - Ying Zou, Zhen Zhao

, Sha Shi, Lei Wang, Yunfeng Peng, Yuan Ping
, Baocang Wang
:
Highly Secure Privacy-Preserving Outsourced k-Means Clustering under Multiple Keys in Cloud Computing. 1238505:1-1238505:11 - Xiaohui Yang

, Ying Sun
:
User Audit Model Based on Attribute Measurement and Similarity Measurement. 8387672:1-8387672:9 - Ping Zhang

, Qian Yuan:
Minimizing Key Materials: The Even-Mansour Cipher Revisited and Its Application to Lightweight Authenticated Encryption. 4180139:1-4180139:6 - Donatas Mazeika

, Rimantas Butleris
:
Integrating Security Requirements Engineering into MBSE: Profile and Guidelines. 5137625:1-5137625:12 - Chao Ma

, Haiying Gao, Duo Wei:
A CP-ABE Scheme Supporting Arithmetic Span Programs. 3265871:1-3265871:16 - Shenyong Xiao, Zhijun Yu, Ya Shuang Deng

:
Design and Analysis of a Novel Chaos-Based Image Encryption Algorithm via Switch Control Mechanism. 7913061:1-7913061:12 - Jiangheng Kou

, Mingxing He
, Ling Xiong
, Zeqiong Lv:
Efficient Hierarchical Authentication Protocol for Multiserver Architecture. 2523834:1-2523834:14 - Jing Liu

, Changbo Yuan, Yingxu Lai
, Hua Qin:
Protection of Sensitive Data in Industrial Internet Based on Three-Layer Local/Fog/Cloud Storage. 2017930:1-2017930:16 - Thaier Hayajneh, Razvi Doomun, Ghada Almashaqbeh, Bassam Jamil Mohd:

Erratum to "An Energy-Efficient and Security Aware Route Selection Protocol for Wireless Sensor Networks". 4093210:1-4093210:1 - Alper Egitmen

, Irfan Bulut, R. Can Aygun, Ayse Bilge Gunduz
, Omer Seyrekbasan, Ali Gökhan Yavuz
:
Combat Mobile Evasive Malware via Skip-Gram-Based Malware Detection. 6726147:1-6726147:10 - S. Milton Ganesh

, S. P. Manikandan:
An Efficient Integrity Verification and Authentication Scheme over the Remote Data in the Public Clouds for Mobile Users. 9809874:1-9809874:13 - Shazia Afzal, Muhammad Yousaf

, Humaira Afzal, Nawaf Alharbe
, Muhammad Rafiq Mufti
:
Cryptographic Strength Evaluation of Key Schedule Algorithms. 3189601:1-3189601:9 - Xiangshi Wang, Lei Su

, Qihang Zhou, Liping Wu:
Group Recommender Systems Based on Members' Preference for Trusted Social Networks. 1924140:1-1924140:11 - Xiujuan Wang, Qianqian Zheng

, Kangfeng Zheng
, Tong Wu:
User Authentication Method Based on MKL for Keystroke and Mouse Behavioral Feature Fusion. 9282380:1-9282380:14 - Xiaoyi Duan

, Dong Chen, Xiaohong Fan, Xiuying Li, Ding Ding, You Li:
Research and Implementation on Power Analysis Attacks for Unbalanced Data. 5695943:1-5695943:10 - Guangjia Song

, Hui Wang, Fuquan Liu:
Using FDAD to Prevent DAD Attack in SEcure Neighbor Discovery Protocol. 2408792:1-2408792:15 - Gaofeng He, Bingfeng Xu, Lu Zhang, Haiting Zhu

:
On-Device Detection of Repackaged Android Malware via Traffic Clustering. 8630748:1-8630748:19 - Xue-yuan Yin

, Xingshu Chen
, Lin Chen, Hui Li:
Extension of Research on Security as a Service for VMs in IaaS Platform. 8538519:1-8538519:16 - Bo Liu

, Qilin Wu
, Yiwen Zhang
, Qian Cao
:
Exploiting the Relationship between Pruning Ratio and Compression Effect for Neural Network Model Based on TensorFlow. 5218612:1-5218612:8 - Shu-Chuan Chu, Lili Chen, Sachin Kumar

, Saru Kumari
, Joel J. P. C. Rodrigues
, Chien-Ming Chen
:
Decentralized Private Information Sharing Protocol on Social Networks. 7137480:1-7137480:12 - Kyungroul Lee, Sun-Young Lee

, Kangbin Yim
:
Classification and Analysis of Security Techniques for the User Terminal Area in the Internet Banking Service. 7672941:1-7672941:16 - Xiaotong Xu, Gaocai Wang

, Jintian Hu, Yuting Lu
:
Study on Stochastic Differential Game Model in Network Attack and Defense. 3417039:1-3417039:15 - Jinglei Tan

, Hengwei Zhang
, Hongqi Zhang, Cheng Lei
, Hui Jin, Bowen Li, Hao Hu
:
Optimal Timing Selection Approach to Moving Target Defense: A FlipIt Attack-Defense Game Model. 3151495:1-3151495:12 - Qinju Liu

, Xianhui Lu, Fucai Luo, Shuai Zhou
, Jingnan He, Kunpeng Wang:
SecureBP from Homomorphic Encryption. 5328059:1-5328059:9 - Haining Yu

, Hongli Zhang, Xiangzhan Yu:
Hail the Closest Driver on Roads: Privacy-Preserving Ride Matching in Online Ride Hailing Services. 4948387:1-4948387:13 - Xiaohui Yang

, Ying Sun
:
Abnormal User Detection Based on the Correlation Probabilistic Model. 8014958:1-8014958:11 - Yongtao Liu, Ruizhi Sun

, Tianyi Zhang, Xiangnan Zhang, Li Li, Guoqing Shi:
Warehouse-Oriented Optimal Path Planning for Autonomous Mobile Fire-Fighting Robots. 6371814:1-6371814:13 - Shaoqiang Liu, Chaiyang Peng

, Chunjiang Li:
Research on SKINNY Optimal Differential Trail Search. 6789281:1-6789281:9 - Xingran Li

, Wei Yu
, Bao Li:
Parallel and Regular Algorithm of Elliptic Curve Scalar Multiplication over Binary Fields. 4087873:1-4087873:10 - Yuyan Guo, Jiguo Li

, Mingming Jiang, Lei Yu, Shimin Wei:
Certificate-Based Encryption Resilient to Continual Leakage in the Standard Model. 1492681:1-1492681:11 - Mingqian Wang

, Shuai Cao, Yunliang Wang:
VoNR-IPD: A Novel Timing-Based Network Steganography for Industrial Internet. 8846230:1-8846230:14 - Yousheng Zhou

, Longan Wang:
A Lattice-Based Authentication Scheme for Roaming Service in Ubiquitous Networks with Anonymity. 2637916:1-2637916:19 - Shaddrack Yaw Nusenu

:
Authentication and Secrecy of Multicast Communication Scenario: Artificial Noise-Aided Costas Sequence Matrix FDA Approach. 2194840:1-2194840:13 - Jiangtao Zhai

, Huaifeng Shi, Mingqian Wang, Zhongjun Sun, Junjun Xing:
An Encrypted Traffic Identification Scheme Based on the Multilevel Structure and Variational Automatic Encoder. 8863169:1-8863169:10 - Zhe Xia

, Yining Liu, Ching-Fang Hsu, Chinchen Chang:
Cryptanalysis and Improvement of a Group Authentication Scheme with Multiple Trials and Multiple Authentications. 6183861:1-6183861:8 - Xiaoping Li, Hefeng Chen, Yanjun Liu, Chin-Chen Chang

:
Unordered Multisecret Sharing Based on Generalized Chinese Remainder Theorem. 6073721:1-6073721:8 - Meijuan Yin

, Wen Yang, Xiaonan Liu, Xiangyang Luo:
Evaluator: A Multilevel Decision Approach for Web-Based Landmark Evaluation. 8843188:1-8843188:15 - Nabil Moukafih

, Ghizlane Orhanou, Said Elhajji:
Neural Network-Based Voting System with High Capacity and Low Computation for Intrusion Detection in SIEM/IDS Systems. 3512737:1-3512737:15 - Yu Zhang

, Yin Li, Yifan Wang:
Efficient Searchable Symmetric Encryption Supporting Dynamic Multikeyword Ranked Search. 7298518:1-7298518:16 - Bonwook Koo

, Younghoon Jung
, Woo-Hwan Kim:
Rotational-XOR Rectangle Cryptanalysis on Round-Reduced Simon. 5968584:1-5968584:12 - Hussain M. J. Almohri

, Mohammad Al-Mutawa, Mahmoud Alawadh, Karim O. Elish
:
A Client Bootstrapping Protocol for DoS Attack Mitigation on Entry Point Services in the Cloud. 8873258:1-8873258:12 - Hui Liu

, Bo Zhao
, Jianwen Zou, Linquan Huang, Yifan Liu:
A Lightweight Image Encryption Algorithm Based on Message Passing and Chaotic Map. 7151836:1-7151836:12 - Juan Zhang, Changsheng Wan

, Chunyu Zhang, Xiaojun Guo, Yongyong Chen:
Noninteractive Lightweight Privacy-Preserving Auditing on Images in Mobile Crowdsourcing Networks. 8827364:1-8827364:11 - Rongfeng Zheng, Jiayong Liu

, Weina Niu, Liang Liu, Kai Li, Shan Liao:
Preprocessing Method for Encrypted Traffic Based on Semisupervised Clustering. 8824659:1-8824659:13 - Yang Wang

, Haijin Gui, Lei Ma
:
A Survey on Services Provision and Distribution of Official and Commercial Intellectual Property Platforms. 8833416:1-8833416:14 - Bingfeng Xu, Zhicheng Zhong, Gaofeng He

:
A Minimum Defense Cost Calculation Method for Attack Defense Trees. 8870734:1-8870734:12 - Davy Preuveneers

, Wouter Joosen, Jorge Bernal Bernabé
, Antonio F. Skarmeta
:
Distributed Security Framework for Reliable Threat Intelligence Sharing. 8833765:1-8833765:15 - Pengpeng Ding

, Jinguo Li
, Liangliang Wang, Mi Wen, Yuyao Guan:
HYBRID-CNN: An Efficient Scheme for Abnormal Flow Detection in the SDN-Based Smart Grid. 8850550:1-8850550:20 - Wangli Hao, Ruixian Zhang, Shancang Li, Junyu Li, Fuzhong Li

, Shanshan Zhao, Wuping Zhang:
Anomaly Event Detection in Security Surveillance Using Two-Stream Based Model. 8876056:1-8876056:15 - Xiaoping Zhao, Yonghong Zhang

, Fan Shao:
A Multifault Diagnosis Method of Gear Box Running on Edge Equipment. 8854236:1-8854236:13 - Shujiang Xu, Qixian Hao, Bin Ma

, Chunpeng Wang
, Jian Li
:
Accurate Computation of Fractional-Order Exponential Moments. 8822126:1-8822126:16 - Supriyanto Praptodiyono

, Teguh Firmansyah
, Mudrik Alaydrus, M. Iman Santoso, Azlan Osman, Rosni Abdullah:
Mobile IPv6 Vertical Handover Specifications, Threats, and Mitigation Methods: A Survey. 5429630:1-5429630:18 - Bandar Almaslukh

:
An Efficient and Effective Approach for Flooding Attack Detection in Optical Burst Switching Networks. 8840058:1-8840058:11 - Jing Tian

, Gang Xiong
, Zhen Li, Gaopeng Gou
:
A Survey of Key Technologies for Constructing Network Covert Channel. 8892896:1-8892896:20 - Huihua Xia, Yan Xiong, Wenchao Huang

, Zhaoyi Meng, Fuyou Miao
:
Limiting Privacy Breaches in Average-Distance Query. 8895281:1-8895281:24 - Jielin Jiang, Xing Zhang, Shengjun Li

:
A Task Offloading Method with Edge for 5G-Envisioned Cyber-Physical-Social Systems. 8867094:1-8867094:9 - Yuan Liu, Licheng Wang

, Xiaoying Shen, Lixiang Li, Dezhi An:
Space-Efficient Key-Policy Attribute-Based Encryption from Lattices and Two-Dimensional Attributes. 2345369:1-2345369:11 - Nadiya El Kamel

, Mohamed Eddabbah
, Youssef Lmoumen, Raja Touahni:
A Smart Agent Design for Cyber Security Based on Honeypot and Machine Learning. 8865474:1-8865474:9 - Pan Jun Sun

:
Research on the Optimization Management of Cloud Privacy Strategy Based on Evolution Game. 6515328:1-6515328:18 - Gaocai Wang

, Ning Yu:
Risk Situation Assessment Model Based on Interdomain Interaction in Cloud Computing Environment. 7816925:1-7816925:12 - Li Li, Jiayong Liu

, Peng Jia
:
SPCTR: Sealed Auction-Based Procurement for Closest Pre-Tender with Range Validation. 8872617:1-8872617:12 - Xuefei Cao

, Yulong Fu
, Bo Chen:
Packet-Based Intrusion Detection Using Bayesian Topic Models in Mobile Edge Computing. 8860418:1-8860418:12 - Fangchao Yu, Li Wang

, Xianjin Fang, Youwen Zhang:
The Defense of Adversarial Example with Conditional Generative Adversarial Networks. 3932584:1-3932584:12 - Junyan Guo

, Ye Du
:
A Novel RLWE-Based Anonymous Mutual Authentication Protocol for Space Information Network. 5167832:1-5167832:12 - Youngjoo Shin

, Junbeom Hur, Dongyoung Koo
, Joobeom Yun
:
Toward Serverless and Efficient Encrypted Deduplication in Mobile Cloud Computing Environments. 3046595:1-3046595:15 - Mariano Di Martino

, Peter Quax
, Wim Lamotte
:
Knocking on IPs: Identifying HTTPS Websites for Zero-Rated Traffic. 7285786:1-7285786:14 - Yirui Wu

, Dabao Wei, Jun Feng
:
Network Attacks Detection Methods Based on Deep Learning Techniques: A Survey. 8872923:1-8872923:17 - Rongbin Xu, Jianguo Wu, Yongliang Cheng, Zhiqiang Liu, Yuanmo Lin, Ying Xie

:
Dynamic Security Exchange Scheduling Model for Business Workflow Based on Queuing Theory in Cloud Computing. 8886640:1-8886640:12 - Tianen Liu

, Yingjie Wang
, Zhipeng Cai
, Xiangrong Tong, Qingxian Pan, Jindong Zhao
:
A Dynamic Privacy Protection Mechanism for Spatiotemporal Crowdsourcing. 8892954:1-8892954:13 - Xuefei Cao

, Lanjun Dang, Yingzi Luan, Wei You:
A Certificateless Noninteractive Key Exchange Protocol with Provable Security. 8862476:1-8862476:8 - Tianliang Lu, Yanhui Du

, Li Ouyang, Qiuyu Chen, Xirui Wang:
Android Malware Detection Based on a Hybrid Deep Learning Model. 8863617:1-8863617:11 - Seyed Amir Hosseini Beghaeiraveri

, Mohammad Izadi, Mohsen Rezvani
:
Broadcast Complexity and Adaptive Adversaries in Verifiable Secret Sharing. 9428457:1-9428457:10 - Pengfei Sun, Pengju Liu, Qi Li, Chenxi Liu, Xiangling Lu, Ruochen Hao, Jinpeng Chen

:
DL-IDS: Extracting Features Using CNN-LSTM Hybrid Network for Intrusion Detection System. 8890306:1-8890306:11 - Piotr Bialczak

, Wojciech Mazurczyk
:
Characterizing Anomalies in Malware-Generated HTTP Traffic. 8848863:1-8848863:26 - Ou Ruan

, Hao Mao:
Efficient Private Set Intersection Using Point-Value Polynomial Representation. 8890677:1-8890677:12 - Haiping Huang

, Qinglong Huang, Fu Xiao, Wenming Wang, Qi Li, Ting Dai:
An Improved Broadcast Authentication Protocol for Wireless Sensor Networks Based on the Self-Reinitializable Hash Chains. 8897282:1-8897282:17 - Ijaz Ahmad Awan, Muhammad Shiraz, Muhammad Usman Hashmi, Qaisar Shaheen

, Rizwan Akhtar, Allah Ditta
:
Secure Framework Enhancing AES Algorithm in Cloud Computing. 8863345:1-8863345:16 - Diqun Yan

, Xiaowen Li, Li Dong, Rangding Wang:
An Antiforensic Method against AMR Compression Detection. 8849902:1-8849902:8 - Bo Liu

, Qilin Wu
, Qian Cao
:
An Improved Elman Network for Stock Price Prediction Service. 8824430:1-8824430:9 - Jinlong Hu

, Tenghui Li, Yi Zhuang, Song Huang, Shoubin Dong:
GFD: A Weighted Heterogeneous Graph Embedding Based Approach for Fraud Detection in Mobile Advertising. 8810817:1-8810817:12 - Zhiyong Wang, Shengwei Xu, Guoai Xu, Yongfeng Yin

, Miao Zhang, Dawei Sun:
Game Theoretical Method for Anomaly-Based Intrusion Detection. 8824163:1-8824163:10 - Jianbang Gao

, Zhaohui Yuan, Bin Qiu, Jing Zhou:
Secure Multiusers Directional Modulation Scheme Based on Random Frequency Diverse Arrays in Broadcasting Systems. 4198595:1-4198595:11 - Toni Perkovic

, Ante Dagelic, Marin Bugaric
, Mario Cagalj:
On WPA2-Enterprise Privacy in High Education and Science. 3731529:1-3731529:11 - Nanliang Shan

, Zecong Ye
, Xiaolong Cui:
Collaborative Intelligence: Accelerating Deep Neural Network Inference via Device-Edge Synergy. 8831341:1-8831341:10 - Huige Wang

, Kefei Chen, Tianyu Pan, Yunlei Zhao:
Practical CCA-Secure Functional Encryptions for Deterministic Functions. 8823788:1-8823788:14 - Omar Abou Selo, Maan Haj Rachid

, Abdullatif Shikfa
, Yongge Wang
, Qutaibah M. Malluhi:
Private Function Evaluation Using Intel's SGX. 3042642:1-3042642:10 - Toan-Thinh Truong

, Minh-Triet Tran
, Anh Duc Duong:
Chebyshev Polynomial-Based Authentication Scheme in Multiserver Environment. 3579705:1-3579705:21 - Ying Zou, Yanting Chai, Sha Shi, Lei Wang, Yunfeng Peng, Yuan Ping

, Baocang Wang
:
Improved Cloud-Assisted Privacy-Preserving Profile-Matching Scheme in Mobile Social Networks. 4938736:1-4938736:12 - Jiangfeng Sun, Zhisong Bie

, Hongxia Bie, Pengfei He, Machao Jin:
Secrecy Analysis of Cognitive Radio Networks over Generalized Fading Channels. 8842012:1-8842012:9 - Gholamreza Farahani

:
Feature Selection Based on Cross-Correlation for the Intrusion Detection System. 8875404:1-8875404:17 - Zufan Zhang

, Anqi Liu, Yinxue Yi, Maobin Yang:
Exploring the Dynamical Behavior of Information Diffusion in D2D Communication Environment. 8848576:1-8848576:8 - Xulong Zhang

, Xiaoxia Song:
Stability Analysis of a Dynamical Model for Malware Propagation with Generic Nonlinear Countermeasure and Infection Probabilities. 8859883:1-8859883:7 - Jorge Sancho

, José García, Álvaro Alesanco Iglesias:
Oblivious Inspection: On the Confrontation between System Security and Data Privacy at Domain Boundaries. 8856379:1-8856379:9 - Huili Wang

, Wenping Ma, Lang Liao, Yushan Li, Linfeng Zheng:
Impossible Differential Distinguishers of Two Generalized Feistel Structures. 8828504:1-8828504:9 - Qiang Wei, Hu Wang, Gongxuan Zhang

:
A Robust Image Watermarking Approach Using Cycle Variational Autoencoder. 8869096:1-8869096:9 - Naixuan Guo

, Junzhou Luo, Zhen Ling, Ming Yang, Wenjia Wu, Xiaodan Gu:
A Novel IM Sync Message-Based Cross-Device Tracking. 8891664:1-8891664:15 - Ziwang Wang

, Yi Zhuang
, Zujia Yan:
TZ-MRAS: A Remote Attestation Scheme for the Mobile Terminal Based on ARM TrustZone. 1756130:1-1756130:16 - Yu Qin

, Jingbin Liu, Shijun Zhao, Dengguo Feng, Wei Feng:
RIPTE: Runtime Integrity Protection Based on Trusted Execution for IoT Device. 8957641:1-8957641:14 - Tao Li, Yuling Chen, Yanli Wang, Yilei Wang, Minghao Zhao, Haojia Zhu, Youliang Tian, Xiaomei Yu, Yixian Yang:

Rational Protocols and Attacks in Blockchain System. 8839047:1-8839047:11 - Sajjad Shaukat Jamal

, Dawood Shah, Abdulaziz Deajim, Tariq Shah:
The Effect of the Primitive Irreducible Polynomial on the Quality of Cryptographic Properties of Block Ciphers. 8883884:1-8883884:14 - Yuhei Watanabe

, Hideki Yamamoto, Hirotaka Yoshida:
Lightweight Crypto Stack for TPMS Using Lesamnta-LW. 5738215:1-5738215:12 - Mingyue Shi

, Rong Jiang, Wei Zhou, Sen Liu, Savio Sciancalepore:
A Privacy Risk Assessment Model for Medical Big Data Based on Adaptive Neuro-Fuzzy Theory. 5610839:1-5610839:18 - Zhidong Shen

, Si Chen:
A Survey of Automatic Software Vulnerability Detection, Program Repair, and Defect Prediction Techniques. 8858010:1-8858010:16 - Baskoro Adi Pratomo

, Pete Burnap, George Theodorakopoulos:
BLATTA: Early Exploit Detection on Network Traffic with Recurrent Neural Networks. 8826038:1-8826038:15 - Shimao Yao, Ravi Sankar, In-ho Ra

:
A Collusion-Resistant Identity-Based Proxy Reencryption Scheme with Ciphertext Evolution for Secure Cloud Sharing. 8833693:1-8833693:16 - Pan Lv

, Hong Li, Jinsong Qiu
, Yiqi Li, Gang Pan:
Cyborgan OS: A Lightweight Real-Time Operating System for Artificial Organ. 8871626:1-8871626:9 - Qiuhua Zheng, Yinhao Hu, Tao Pei, Shengwang Xu, Junzhe Yu, Ting Wu, Yanzhao Shen, Yingpei Zeng, Tingting Cui

:
Improved Single-Key Attacks on 2-GOST. 8886032:1-8886032:10 - Jaewoo So

:
Deep Learning-Based Cryptanalysis of Lightweight Block Ciphers. 3701067:1-3701067:11 - Behnam Zahednejad

, Lishan Ke
, Jing Li:
A Novel Machine Learning-Based Approach for Security Analysis of Authentication and Key Agreement Protocols. 8848389:1-8848389:15 - Jian Zhou

, Qian Bo, Lijuan Sun
, Juan Wang, Xiaoyong Yan:
Routing Strategy for LEO Satellite Networks Based on Membership Degree Functions. 8822985:1-8822985:9 - Fei Tang

, Jiali Bao
, Yonghong Huang, Dong Huang, Fuqun Wang:
Identity-Based Identification Scheme without Trusted Party against Concurrent Attacks. 8820271:1-8820271:9 - Guofeng Wei

, Bangning Zhang
, Guoru Ding
, Bing Zhao
, Kefeng Guo
, Daoxing Guo
:
On the Detection of a Non-Cooperative Beam Signal Based on Wireless Sensor Networks. 8830092:1-8830092:12 - Xi Zhang, Ye Su

, Jing Qin
:
A Dynamic Searchable Symmetric Encryption Scheme for Multiuser with Forward and Backward Security. 8893016:1-8893016:13 - Yaowei Wang

, Chen Chen
, Zhenwei Chen
, Jiangyong He
:
Attribute-Based User Revocable Data Integrity Audit for Internet-of-Things Devices in Cloud Storage. 8837456:1-8837456:10 - Xiaoyan Hu

, Liang Jin
, Kaizhi Huang, Keming Ma, Changcheng Song, Shuaifang Xiao:
A Secure Communication Scheme Based on Equivalent Interference Channel Assisted by Physical Layer Secret Keys. 8840645:1-8840645:15 - Shuo Wang

, Qingqi Pei
, Yuchen Zhang, Xiaohu Liu, Guangming Tang:
A Hybrid Cyber Defense Mechanism to Mitigate the Persistent Scan and Foothold Attack. 8882200:1-8882200:15 - Sa Math

, Lejun Zhang, Seokhoon Kim
, Intae Ryoo
:
An Intelligent Real-Time Traffic Control Based on Mobile Edge Computing for Individual Private Environment. 8881640:1-8881640:11 - Na Lv

, Tianyu Chen
, Shuangyi Zhu, Jing Yang, Yuan Ma, Jiwu Jing, Jingqiang Lin:
Erratum to "High-Efficiency Min-Entropy Estimation Based on Neural Network for Random Number Generators". 3451823:1-3451823:1 - Pan Jun Sun

:
Research on Selection Method of Privacy Parameter ε. 8845038:1-8845038:12 - Jianyu Chen

, Xiaofeng Wang
, Leiting Tao
, Yuan Liu
:
High-Performance Routing Emulation Technologies Based on a Cloud Platform. 8825749:1-8825749:17 - Leila Mohammadpour

, Teck Chaw Ling
, Chee Sun Liew
, Alihossein Aryanfar
:
A Mean Convolutional Layer for Intrusion Detection System. 8891185:1-8891185:16 - Marwan Ali Albahar

, Muhammad Binsawad
:
Deep Autoencoders and Feedforward Networks Based on a New Regularization for Anomaly Detection. 7086367:1-7086367:9 - Deukjo Hong

:
Known-Key Distinguishing and Partial-Collision Attacks on GFN-2 with SP F-Function. 8864102:1-8864102:8 - Xiaohu Liu

, Hengwei Zhang
, Yuchen Zhang, Lulu Shao:
Optimal Network Defense Strategy Selection Method Based on Evolutionary Network Game. 5381495:1-5381495:11 - Jie Cai

, Han Jiang
, Hao Wang, Qiuliang Xu:
Lattice-Based Linearly Homomorphic Signature Scheme over F 2. 8857815:1-8857815:7 - Yiliang Han

, Yu Li, Zhe Li, Shuaishuai Zhu:
An Improved Method to Evaluate the Synchronization in Neural Key Exchange Protocol. 8869688:1-8869688:10 - Xiabing Zhou, Bin Li

, Yanrong Qi, Wanying Dong:
Mimic Encryption Box for Network Multimedia Data Security. 8868672:1-8868672:24 - Tzung-Han Jeng

, Yi-Ming Chen
, Chien-Chih Chen
, Chuan-Chiang Huang
:
MD-MinerP: Interaction Profiling Bipartite Graph Mining for Malware-Control Domain Detection. 8841544:1-8841544:20 - Miaoqing Tian

, Ruobing Jiang
, Haipeng Qu
, Qian Lu, Xiaoyun Zhou:
Advanced Temperature-Varied ECU Fingerprints for Source Identification and Intrusion Detection in Controller Area Networks. 8834845:1-8834845:17 - Jianbing Zhang

, Bowen Ma
, Jiwei Huang
:
Deploying GIS Services into the Edge: A Study from Performance Evaluation and Optimization Viewpoint. 8822990:1-8822990:13 - Zhike Han

, Xiuchao Wu
, Meng Chi
, Jun Tang
, Lijing Yang
:
A Novel Approach to Transform Bitmap to Vector Image for Data Reliable Visualization considering the Image Triangulation and Color Selection. 8871588:1-8871588:13 - Kaixin Jiao, Guodong Ye

, Youxia Dong, Xiaoling Huang, Jianqing He:
Image Encryption Scheme Based on a Generalized Arnold Map and RSA Algorithm. 9721675:1-9721675:14 - Yinwei Li

, Guo-Ping Jiang, Meng Wu, Yurong Song
:
Methods to Measure the Network Path Connectivity. 8836590:1-8836590:10 - Yonghua Gong

, Lei Chen
, Tinghuai Ma:
A Comprehensive Trust Model Based on Social Relationship and Transaction Attributes. 8887596:1-8887596:10 - Bowen Zhang

, Benedetta Tondi, Xixiang Lv
, Mauro Barni
:
Challenging the Adversarial Robustness of DNNs Based on Error-Correcting Output Codes. 8882494:1-8882494:11 - Leixiao Cheng

, Fei Meng
, Xianmeng Meng
, Qixin Zhang
:
AKC-Based Revocable ABE Schemes from LWE Assumption. 8834872:1-8834872:16 - Xiulei Liu

, Shoulu Hou
, Qiang Tong
, Xuhong Liu
, Zhihui Qin
, Junyang Yu
:
A Prediction Approach for Video Hits in Mobile Edge Computing Environment. 8857564:1-8857564:6 - Jiong Chen, Kun He

, Jing Chen, Yingying Fang, Ruiying Du:
PowerPrint: Identifying Smartphones through Power Consumption of the Battery. 3893106:1-3893106:13 - Imran Memon

, Riaz Ahmed Shaikh, Mohammad Kamrul Hasan
, Rosilah Hassan
, Amin Ul Haq
, Khairul Akram Zainol
:
Protect Mobile Travelers Information in Sensitive Region Based on Fuzzy Logic in IoT Technology. 8897098:1-8897098:12 - Hongjian Jin

, Xingshu Chen
, Xiao Lan
, Hui Guo, Hongxia Zhang
, Qi Cao
:
BNRDT: When Data Transmission Meets Blockchain. 8828984:1-8828984:16 - Jie Zhou

, Jian Bai
, Meng Shan Jiang
:
White-Box Implementation of ECDSA Based on the Cloud Plus Side Mode. 8881116:1-8881116:10 - Yunfang Chen

, Li Wang
, Dehao Qi, Tinghuai Ma
, Wei Zhang
:
Community Detection Based on DeepWalk Model in Large-Scale Networks. 8845942:1-8845942:13 - Javier Carrillo Mondéjar

, Juan Manuel Castelo Gómez
, Carlos Núñez-Gómez
, José Roldán Gómez
, José Luis Martínez
:
Automatic Analysis Architecture of IoT Malware Samples. 8810708:1-8810708:12 - Lurong Jiang, Qiaoyu Xu, Hangyi Pan, Yanyun Dai, Jijun Tong

:
Virus Propagation in Wireless Sensor Networks with Media Access Control Mechanism. 6513920:1-6513920:11 - Yaojie Wang

, Xiaolong Cui, Zhiqiang Gao, Bo Gan:
Fed-SCNN: A Federated Shallow-CNN Recognition Framework for Distracted Driving. 6626471:1-6626471:10 - Bora Aslan

, Füsun Yavuzer Aslan
, M. Tolga Sakalli
:
Energy Consumption Analysis of Lightweight Cryptographic Algorithms That Can Be Used in the Security of Internet of Things Applications. 8837671:1-8837671:15 - Yongqiang Yu

, Longlong Li
, Yuliang Lu, Xuehu Yan
:
On the Value of Order Number and Power in Secret Image Sharing. 6627178:1-6627178:13 - Xavier Salleras

, Vanesa Daza
:
SANS: Self-Sovereign Authentication for Network Slices. 8823573:1-8823573:8 - Jiazhong Lu, Xiaolei Liu

, Shibin Zhang, Yan Chang:
Research and Analysis of Electromagnetic Trojan Detection Based on Deep Learning. 6641844:1-6641844:13 - Huiqing Huang

, Dongsheng Cheng
:
3-Image Bit-Level Encryption Algorithm Based on 3D Nonequilateral Arnold Transformation and Hyperchaotic System. 8841302:1-8841302:13 - Si-Wan Noh

, Sang-Uk Shin
, Kyung-Hyune Rhee
:
PyRos: A State Channel-Based Access Control System for a Public Blockchain Network. 8891183:1-8891183:13 - Afifa Maryam, Usman Ahmed

, Muhammad Aleem, Jerry Chun-Wei Lin
, Muhammad Arshad Islam, Muhammad Azhar Iqbal:
cHybriDroid: A Machine Learning-Based Hybrid Technique for Securing the Edge Computing. 8861639:1-8861639:14 - Feng Feng

, Xiabing Zhou
, Bin Li
, Qinglei Zhou
:
Modelling the Mimic Defence Technology for Multimedia Cloud Servers. 8819958:1-8819958:22 - Qiao Ke

, Zengguo Sun, Yang Liu, Wei Wei, Marcin Wozniak
, Rafal Scherer
:
High-Resolution SAR Image Despeckling Based on Nonlocal Means Filter and Modified AA Model. 8889317:1-8889317:8 - Isaac Amankona Obiri

, Qi Xia, Hu Xia
, Kwame Opuni-Boachie Obour Agyekum
, Kwame Omono Asamoah
, Emmanuel Boateng Sifah
, Xiaosong Zhang, Jianbin Gao
:
A Fully Secure KP-ABE Scheme on Prime-Order Bilinear Groups through Selective Techniques. 8869057:1-8869057:18 - Yitong Meng

, Jinlong Fei
:
Hidden Service Website Response Fingerprinting Attacks Based on Response Time Feature. 8850472:1-8850472:21 - Jorge Aguilar Santiago

, Octavio Flores Siordia
, José Trinidad Guillen Bonilla, Juan Carlos Estrada Gutiérrez
, María G. González Novoa
, Maricela Jiménez Rodríguez
:
Chaotic Cryptosystem for Selective Encryption of Faces in Photographs. 8848356:1-8848356:22 - Xiang Ji, Xianjia Meng

, Anwen Wang
, Qingyi Hua, Fuwei Wang, Rui Chen, Jing Zhang, Dingyi Fang:
E2PP: An Energy-Efficient Path Planning Method for UAV-Assisted Data Collection. 8850505:1-8850505:13 - Jielin Jiang

, Zheng Li
, Yuan Tian
, Najla Al-Nabhan:
A Review of Techniques and Methods for IoT Applications in Collaborative Cloud-Fog Environment. 8849181:1-8849181:15 - Yuezhong Wu

, Qiang Liu
, Rongrong Chen, Changyun Li
, Ziran Peng:
A Group Recommendation System of Network Document Resource Based on Knowledge Graph and LSTM in Edge Computing. 8843803:1-8843803:11 - Yousheng Zhou

, Xinyun Chen
, Meihuan Chen
:
Privacy-Preserving Multidimensional Data Aggregation Scheme for Smart Grid. 8845959:1-8845959:14 - Rongxin Tu

, Wenying Wen
, Changsheng Hua:
An Unequal Image Privacy Protection Method Based on Saliency Detection. 8842376:1-8842376:13 - Yixin Wu

, Cheng Huang
, Xing Zhang, Hongyi Zhou:
GroupTracer: Automatic Attacker TTP Profile Extraction and Group Cluster in Internet of Things. 8842539:1-8842539:14 - Hui Guo

, Shuguang Huang
, Cheng Huang
, Fan Shi
, Min Zhang
, Zulie Pan
:
Binary File's Visualization and Entropy Features Analysis Combined with Multiple Deep Learning Networks for Malware Classification. 8881760:1-8881760:19 - Shengnan Zhao

, Xiangfu Song
, Han Jiang
, Ming Ma
, Zhihua Zheng
, Qiuliang Xu
:
An Efficient Outsourced Oblivious Transfer Extension Protocol and Its Applications. 8847487:1-8847487:12 - Wajih El Hadj Youssef

, Ali Abdelli
, Fethi Dridi
, Mohsen Machhout
:
Hardware Implementation of Secure Lightweight Cryptographic Designs for IoT Applications. 8860598:1-8860598:13 - Daegeon Kim

, Do Hyung Gu, Huy Kang Kim
:
Beyond PS-LTE: Security Model Design Framework for PPDR Operational Environment. 8869418:1-8869418:13 - Zhenxing Wang

, Wanbo Zheng
, Peng Chen
, Yong Ma
, Yunni Xia
, Wei Liu
, Xiaobo Li
, Kunyin Guo
:
A Novel Coevolutionary Approach to Reliability Guaranteed Multi-Workflow Scheduling upon Edge Computing Infrastructures. 6697640:1-6697640:11 - Liang Zong

, Yong Bai, Chenglin Zhao, Gaofeng Luo, Zeyu Zhang
, Huawei Ma
:
On Enhancing TCP to Deal with High Latency and Transmission Errors in Geostationary Satellite Network for 5G-IoT. 6693094:1-6693094:7 - Xinyu Huang

, Yunzhe Tian
, Yifei He
, Endong Tong
, Wenjia Niu
, Chenyang Li
, Jiqiang Liu
, Liang Chang
:
Exposing Spoofing Attack on Flocking-Based Unmanned Aerial Vehicle Cluster: A Threat to Swarm Intelligence. 8889122:1-8889122:15 - Randa Aljably, Yuan Tian

, Mznah Al-Rodhaan:
Preserving Privacy in Multimedia Social Networks Using Machine Learning Anomaly Detection. 5874935:1-5874935:14 - Dawei Li

, Jia Yu, Xue Gao, Najla Al-Nabhan:
Research on Multidomain Authentication of IoT Based on Cross-Chain Technology. 6679022:1-6679022:12 - María-Dolores Cano

, Antonio Cañavate-Sanchez:
Preserving Data Privacy in the Internet of Medical Things Using Dual Signature ECDSA. 4960964:1-4960964:9 - Wenzhi Cheng

, Wei Ou
, Xiangdong Yin, Wanqin Yan, Dingwan Liu, Chunyan Liu:
A Privacy-Protection Model for Patients. 6647562:1-6647562:12 - Chaoxia Qing

, Bing Guo
, Yan Shen, Tao Li, Yun Zhang
, Zhen Zhang:
A Secure and Effective Construction Scheme for Blockchain Networks. 8881881:1-8881881:20 - Xingxing Xiong

, Shubo Liu
, Dan Li, Zhaohui Cai, Xiaoguang Niu:
A Comprehensive Survey on Local Differential Privacy. 8829523:1-8829523:29 - Yang Xu, Zixi Fu, Guiyong Xu, Sicong Zhang, Xiaoyao Xie:

DRHNet: A Deep Residual Network Based on Heterogeneous Kernel for Steganalysis. 8847741:1-8847741:9 - Lixia Xie

, Huiyu Ni
, Hongyu Yang
, Jiyong Zhang:
A Key Business Node Identification Model for Internet of Things Security. 6654283:1-6654283:11 - Nan Jia

, Shaojing Fu
, Ming Xu
:
Privacy-Preserving Blockchain-Based Nonlinear SVM Classifier Training for Social Networks. 8872853:1-8872853:10 - Min Yang

, Xingshu Chen
, Yonggang Luo
, Hang Zhang:
An Android Malware Detection Model Based on DT-SVM. 8841233:1-8841233:11 - Guosheng Yang, Qisheng Wei:

Visual Object Multimodality Tracking Based on Correlation Filters for Edge Computing. 8891035:1-8891035:13 - Wenyu Zhang

, Yaqun Zhao, Sijie Fan
:
Cryptosystem Identification Scheme Based on ASCII Code Statistics. 8875864:1-8875864:10 - Min Li

, Yingming Zeng
, Yue Guo, Yun Guo:
A Movie Recommendation System Based on Differential Privacy Protection. 6611463:1-6611463:10 - Jiayong Liu, Yu Su, Shun Lv, Cheng Huang

:
Detecting Web Spam Based on Novel Features from Web Page Source Code. 6662166:1-6662166:14 - Fazhan Tao, Longlong Zhu

, Baofeng Ji, Pengju Si, Zhumu Fu
:
Energy Management Strategy Using Equivalent Consumption Minimization Strategy for Hybrid Electric Vehicles. 6642304:1-6642304:8 - Dengyong Zhang

, Xiao Chen, Feng Li
, Arun Kumar Sangaiah
, Xiangling Ding
:
Seam-Carved Image Tampering Detection Based on the Cooccurrence of Adjacent LBPs. 8830310:1-8830310:12 - Di Xue

, Jingmei Li
, Weifei Wu, Jiaxiang Wang:
Erratum to "Incremental Learning for Malware Classification in Small Datasets". 9697548:1-9697548:1 - Jiqiang Lu

, Hwajung Seo:
A Key Selected S-Box Mechanism and Its Investigation in Modern Block Cipher Design. 1457419:1-1457419:26 - Zhe Liu

, Fuqun Wang
, Kefei Chen
, Fei Tang
:
A New User Revocable Ciphertext-Policy Attribute-Based Encryption with Ciphertext Update. 8856592:1-8856592:11 - Wenwu Xie, Jinxia Yang, Xinzhong Liu

, Zhihe Yang, Xin Peng, Jianwu Liao, Tingyu Huang:
Secrecy Performance Analysis of the NOMA System on High-Speed Railway. 8868550:1-8868550:6 - Kai Zhang

, Yanping Li
, Yun Song
, Laifeng Lu
, Tao Zhang
, Qi Jiang
:
A Traceable and Revocable Multiauthority Attribute-Based Encryption Scheme with Fast Access. 6661243:1-6661243:14 - Haiyan Zhang

, Yonglong Luo
, Qingying Yu, Liping Sun, Xuejing Li
, Zhenqiang Sun:
A Framework of Abnormal Behavior Detection and Classification Based on Big Trajectory Data for Mobile Networks. 8858444:1-8858444:15 - Jingjing Guo

, Jiacong Sun:
Order-Revealing Encryption Scheme with Comparison Token for Cloud Computing. 8837904:1-8837904:13 - Yuhuan Gong

, Yuchang Mo
:
Qualitative Analysis of Commercial Services in MEC as Phased-Mission Systems. 8823952:1-8823952:11 - Jie Yang

, Li Feng
, Tong Jin, Hong Liang
, Fangxin Xu
, Liwei Tian:
Enabling Sector Scheduling for 5G-CPE Dense Networks. 6684681:1-6684681:18 - Pelayo Nuño

, Carla Suárez
, Eva Suárez
, Francisco G. Bulnes
, Francisco J. delaCalle
, Juan C. Granda
:
A Diagnosis and Hardening Platform for an Asterisk VoIP PBX. 8853625:1-8853625:14 - Yongli Tang

, Mingjie Zhao
, Lixiang Li
:
Secure and Efficient Image Compression-Encryption Scheme Using New Chaotic Structure and Compressive Sensing. 6665702:1-6665702:15 - Xiaolin Zhao

, Hui Peng
, Xiang Li
, Yue Li, Jingfeng Xue
, Yaoyuan Liang
, Mingzhe Pei
:
Defending Application Layer DDoS Attacks via Multidimensional Parallelotope. 6679304:1-6679304:11 - Shaohua Duan

, Hanwen Wang
, Yunpeng Liu
, Li Huang
, Xiaoyi Zhou
:
A Novel Comprehensive Watermarking Scheme for Color Images. 8840779:1-8840779:12 - Fu Chen

, Peng Liu, Jianming Zhu, Sheng Gao
, Yanmei Zhang, Meijiao Duan, Youwei Wang, Kai Hwang:
Improving Topic-Based Data Exchanges among IoT Devices. 8884924:1-8884924:14 - Arshad Ahmad

, Ayaz Ullah, Chong Feng
, Muzammil Khan
, Shahzad Ashraf
, Muhammad Adnan, Shah Nazir
, Habib Ullah Khan
:
Towards an Improved Energy Efficient and End-to-End Secure Protocol for IoT Healthcare Applications. 8867792:1-8867792:10 - Arshad Ahmad

, Chong Feng
, Muzammil Khan
, Asif Khan
, Ayaz Ullah, Shah Nazir
, Adnan Tahir
:
A Systematic Literature Review on Using Machine Learning Algorithms for Software Requirements Identification on Stack Overflow. 8830683:1-8830683:19 - Luo GuangJun

, Shah Nazir
, Habib Ullah Khan
, Amin Ul Haq
:
Spam Detection Approach for Secure Mobile Message Communication Using Machine Learning Algorithms. 8873639:1-8873639:6 - Hongyu Yang

, Renyun Zeng
, Fengyan Wang
, Guangquan Xu, Jiyong Zhang:
An Unsupervised Learning-Based Network Threat Situation Assessment Model for Internet of Things. 6656066:1-6656066:11 - Jinhua Fu

, Sihai Qiao, Yongzhong Huang, Xueming Si, Bin Li
, Chao Yuan:
A Study on the Optimization of Blockchain Hashing Algorithm Based on PRCA. 8876317:1-8876317:12 - Jinghua Yu

, Feng Luo
:
A Systematic Approach for Cybersecurity Design of In-Vehicle Network Systems with Trade-Off Considerations. 7169720:1-7169720:14 - Chian Techapanupreeda, Werasak Kurutach:

Enhancing Transaction Security for Handling Accountability in Electronic Health Records. 8899409:1-8899409:18 - Meilian Li, Shah Nazir

, Habib Ullah Khan
, Sara Shahzad, Rohul Amin
:
Modelling Features-Based Birthmarks for Security of End-to-End Communication System. 8852124:1-8852124:9 - Jibin Zhang

, Shah Nazir, Ansheng Huang
, Abdullah Alharbi:
Multicriteria Decision and Machine Learning Algorithms for Component Security Evaluation: Library-Based Overview. 8886877:1-8886877:14 - Zhiwei Gu

, Shah Nazir
, Cheng Hong
, Sulaiman Khan
:
Convolution Neural Network-Based Higher Accurate Intrusion Identification System for the Network Security and Communication. 8830903:1-8830903:10 - Mostafa Yavari

, Masoumeh Safkhani
, Saru Kumari
, Sachin Kumar
, Chien-Ming Chen
:
An Improved Blockchain-Based Authentication Protocol for IoT Network Management. 8836214:1-8836214:16 - Zhanyang Xu, Wentao Liu

, Jingwang Huang, Chenyi Yang, Jiawei Lu, Haozhe Tan:
Artificial Intelligence for Securing IoT Services in Edge Computing: A Survey. 8872586:1-8872586:13 - Jun Chen

, Shize Guo, Xin Ma, Haiying Li, Jinhong Guo, Ming Chen, Zhisong Pan
:
SLAM: A Malware Detection Method Based on Sliding Local Attention Mechanism. 6724513:1-6724513:11 - Xucheng Huang

, Shah Nazir
:
Evaluating Security of Internet of Medical Things Using the Analytic Network Process Method. 8829595:1-8829595:14 - Huaijun Wang, Jing Zhao, Junhuai Li

, Ling Tian, Pengjia Tu, Ting Cao, Yang An, Kan Wang, Shancang Li:
Wearable Sensor-Based Human Activity Recognition Using Hybrid Deep Learning Techniques. 2132138:1-2132138:12

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














