![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Cybersecurity, Volume 7
Volume 7, Number 1, December 2024
- Keya Xu, Guang Cheng:
F3l: an automated and secure function-level low-overhead labeled encrypted traffic dataset construction method for IM in Android. 1 - Shuang Song, Neng Gao
, Yifei Zhang, Cunqing Ma:
BRITD: behavior rhythm insider threat detection with time awareness and user adaptation. 2 - Md. Alamgir Hossain
, Md. Saiful Islam:
Enhanced detection of obfuscated malware in memory dumps: a machine learning approach for advanced cybersecurity. 16 - Yanjun Li, Weiguo Zhang, Yiping Lin
, Jian Zou, Jian Liu:
A circuit area optimization of MK-3 S-box. 17 - Yanwei Gong, Xiaolin Chang
, Jelena V. Misic, Vojislav B. Misic, Jianhua Wang, Haoran Zhu
:
Practical solutions in fully homomorphic encryption: a survey analyzing existing acceleration methods. 5 - Haoran Lyu, Yajie Wang, Yu-An Tan, Huipeng Zhou, Yuhang Zhao, Quanxin Zhang
:
Maxwell's Demon in MLP-Mixer: towards transferable adversarial attacks. 6 - Ximing Li, Hao Wang, Sha Ma, Meiyan Xiao, Qiong Huang:
Revocable and verifiable weighted attribute-based encryption with collaborative access for electronic health record in cloud. 18 - Xi Lin, Heyang Cao
, Feng-Hao Liu, Zhedong Wang, Mingsheng Wang:
Shorter ZK-SNARKs from square span programs over ideal lattices. 33 - Fengxia Liu, Zhiyong Zheng, Zixian Gong
, Kun Tian, Yi Zhang, Zhe Hu, Jia Li, Qun Xu:
A survey on lattice-based digital signature. 7 - Renyang Liu
, Wei Zhou, Xin Jin, Song Gao, Yuanyu Wang, Ruxin Wang:
DTA: distribution transform-based attack for query-limited scenario. 8 - Chenxi Hu, Tao Wu
, Chunsheng Liu, Chao Chang:
Joint contrastive learning and belief rule base for named entity recognition in cybersecurity. 19 - Alex Shafarenko
:
Winternitz stack protocols for embedded systems and IoT. 34 - Linwei Fang
, Liming Wang, Hongjia Li:
Iterative and mixed-spaces image gradient inversion attack in federated learning. 35 - Mahdi Soltani
, Khashayar Khajavi
, Mahdi Jafari Siavoshani
, Amir Hossein Jahangir
:
A multi-agent adaptive deep learning framework for online intrusion detection. 9 - Batoul Achaal
, Mehdi Adda, Maxime Berger, Hussein Ibrahim, Ali Awde:
Study of smart grid cyber-security, examining architectures, communication networks, cyber-attacks, countermeasure techniques, and challenges. 10 - Chunwen Liu, Ru Tan, Yang Wu, Yun Feng, Ze Jin, Fangjiao Zhang, Yuling Liu, Qixu Liu:
Dissecting zero trust: research landscape and its implementation in IoT. 20 - Chen An, Mengjie Huang, Xianhui Lu
, Lei Bi, Weijie Li:
Polar code-based secure transmission with higher message rate combining channel entropy and computational entropy. 36 - Yuantu Luo, Jun Tao, Yuehao Zhu, Yifan Xu:
HSS: enhancing IoT malicious traffic classification leveraging hybrid sampling strategy. 11 - Zeshuo Zhu, Rui Zhang, Yang Tao:
Atomic cross-chain swap based on private key exchange. 12 - Huaxin Wang, Yiwen Gao, Yuejun Liu, Qian Zhang, Yongbin Zhou:
In-depth Correlation Power Analysis Attacks on a Hardware Implementation of CRYSTALS-Dilithium. 21 - Chaoqun Wang, Ning Li, Shujuan Ji, Xianwen Fang, Zhen Wang:
Enhancing fairness of trading environment: discovering overlapping spammer groups with dynamic co-review graph optimization. 37 - Zheng Sun, Jinxiao Zhao, Feng Guo, Yuxuan Chen, Lei Ju:
CommanderUAP: a practical and transferable universal adversarial attacks on speech recognition models. 38 - Ruida Wang, Ziyi Li, Xianhui Lu, Zhenfei Zhang, Kunpeng Wang:
Key derivable signature and its application in blockchain stealth address. 43 - Tin Lai, Farnaz Farid, Abubakar Bello, Fariza Sabrina:
Ensemble learning based anomaly detection for IoT cybersecurity via Bayesian hyperparameters sensitivity analysis. 44 - Chuyi Yan, Xueying Han, Yan Zhu, Dan Du, Zhigang Lu, Yuling Liu:
Phishing behavior detection on different blockchains via adversarial domain adaptation. 45
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.