default search action
Security and Communication Networks, Volume 2021
Volume 2021, 2021
- Changguang Wang, Ziqiu Zhao, Fangwei Wang, Qingru Li:
A Novel Malware Detection and Family Classification Scheme for IoT Based on DEAM and DenseNet. 6658842:1-6658842:16 - Zhifei Wang, Gang Xu, Na Zhang, Zhihan Qi, Fengqi Wei, Liqiang He:
Ferry Node Identification Model for the Security of Mobile Ad Hoc Network. 6682311:1-6682311:13 - Hui Li, Limin Shen, Yuying Wang, Jiayin Feng, Honglei Tan, Zhiming Li:
Risk Measurement Method of Collusion Privilege Escalation Attacks for Android Apps Based on Feature Weight and Behavior Determination. 8814844:1-8814844:18 - Xin Li, Peng Yi, Wei Wei, Yiming Jiang, Le Tian:
LNNLS-KH: A Feature Selection Method for Network Intrusion Detection. 8830431:1-8830431:22 - Yawei Yue, Shancang Li, Phil Legg, Fuzhong Li:
Deep Learning-Based Security Behaviour Analysis in IoT Environments: A Survey. 8873195:1-8873195:13 - Shichang Ding, Fan Zhao, Xiangyang Luo:
A Street-Level IP Geolocation Method Based on Delay-Distance Correlation and Multilayered Common Routers. 6658642:1-6658642:11 - Tao Feng, Xusheng Wang, Chunyan Liu, Junli Fang:
Secure Data Collaborative Computing Scheme Based on Blockchain. 6630291:1-6630291:9 - Menghui Lou, Xiaolei Dong, Zhenfu Cao, Jiachen Shen:
SESCF: A Secure and Efficient Supply Chain Framework via Blockchain-Based Smart Contracts. 8884478:1-8884478:18 - Khalid M. Al-Gethami, Mousa T. Al-Akhras, Mohammed Alawairdhi:
Empirical Evaluation of Noise Influence on Supervised Machine Learning Algorithms Using Intrusion Detection Datasets. 8836057:1-8836057:28 - Youxia Dong, Xiaoling Huang, Qixiang Mei, Yuanju Gan:
Self-Adaptive Image Encryption Algorithm Based on Quantum Logistic Map. 6674948:1-6674948:12 - Yajing Hao, Xinrong Yan, Jianbin Wu, Huijun Wang, Linfeng Yuan:
Multimedia Communication Security in 5G/6G Coverless Steganography Based on Image Text Semantic Association. 6628034:1-6628034:12 - (Withdrawn) Anticoncept Drift Method for Malware Detector Based on Generative Adversarial Network. 6644107:1-6644107:12
- Juhong Namgung, Siwoon Son, Yang-Sae Moon:
Efficient Deep Learning Models for DGA Domain Detection. 8887881:1-8887881:15 - Zhenwei Chen, Axin Wu, Yifei Li, Qixuan Xing, Shengling Geng:
Blockchain-Enabled Public Key Encryption with Multi-Keyword Search in Cloud Computing. 6619689:1-6619689:11 - Tao Zhang, Xiongfei Song, Lele Zheng, Yani Han, Kai Zhang, Qi Li:
Towards Time-Sensitive and Verifiable Data Aggregation for Mobile Crowdsensing. 6679157:1-6679157:14 - Sivleen Kaur, Sheetal Chaturvedi, Aabha Sharma, Jayaprakash Kar:
A Research Survey on Applications of Consensus Protocols in Blockchain. 6693731:1-6693731:22 - Zhengguo Wu, Kai Zhang, Yannan Ren, Jing Li, Jiande Sun, Wenbo Wan:
Visual Security Assessment via Saliency-Weighted Structure and Orientation Similarity for Selective Encrypted Images. 6675354:1-6675354:16 - Suleyman Alterkavi, Hasan Erbay:
Design and Analysis of a Novel Authorship Verification Framework for Hijacked Social Media Accounts Compromised by a Human. 8869681:1-8869681:12 - Chongzhen Zhang, Yanli Chen, Yang Meng, Fangming Ruan, Runze Chen, Yidan Li, Yaru Yang:
A Novel Framework Design of Network Intrusion Detection Based on Machine Learning Techniques. 6610675:1-6610675:15 - Jiasheng Qu, Wei Song, Xiangchun Liu, Lizhi Zhao, Xiaobing Zhao:
A Novel Improved Reversible Visible Image Watermarking Algorithm Based on Grad-CAM and JND. 6652897:1-6652897:17 - Tao Wang, Hongchang Chen:
A Lightweight SDN Fingerprint Attack Defense Mechanism Based on Probabilistic Scrambling and Controller Dynamic Scheduling Strategies. 6688489:1-6688489:23 - Xiaokang Xiong, Yuhang Dai, Zhuhua Hu, Kejia Huo, Yong Bai, Hui Li, Dake Liu:
Hardware Sharing for Channel Interleavers in 5G NR Standard. 8872140:1-8872140:13 - Diqun Yan, Mingyu Dong, Jinxing Gao:
Exposing Speech Transsplicing Forgery with Noise Level Inconsistency. 6659371:1-6659371:6 - Shiyue Qin, Zhenhua Tan, Fucai Zhou, Jian Xu, Zongye Zhang:
A Verifiable Steganography-Based Secret Image Sharing Scheme in 5G Networks. 6629726:1-6629726:14 - Lei Du, Songsong Dai, Haifeng Song, Yuelong Chuang, Yingying Xu:
Weighted Nuclear Norm Minimization on Multimodality Clustering. 6662989:1-6662989:7 - Zixuan Shen, Zhihua Xia, Peipeng Yu:
PLDP: Personalized Local Differential Privacy for Multidimensional Data Aggregation. 6684179:1-6684179:13 - Shengxu Xie, Chang-you Xing, Guomin Zhang, Jinlong Zhao:
A Table Overflow LDoS Attack Defending Mechanism in Software-Defined Networks. 6667922:1-6667922:16 - Parimah Ziayi, Seyed Mostafa Farmanbar, Mohsen Rezvani:
YAICD: Yet Another IMSI Catcher Detector in GSM. 8847803:1-8847803:13 - Chuqiao Xiao, Xueqing Gong, Yefeng Xia, Qian Zhang:
PB: A Product-Bitmatrix Construction to Reduce the Complexity of XOR Operations of PM-MSR and PM-MBR Codes over GF 2 w. 6642121:1-6642121:18 - Asad Ullah, Jing Wang, Muhammad Shahid Anwar, Arshad Ahmad, Shah Nazir, Habib Ullah Khan, Zesong Fei:
Fusion of Machine Learning and Privacy Preserving for Secure Facial Expression Recognition. 6673992:1-6673992:12 - Suliman A. Alsuhibany:
A Camouflage Text-Based Password Approach for Mobile Devices against Shoulder-Surfing Attack. 6653076:1-6653076:11 - Rahul Johari, Sawan Kalra, Sonika Dahiya, Kalpana Gupta:
S2NOW: Secure Social Network Ontology Using WhatsApp. 7940103:1-7940103:21 - Tsu-Yang Wu, Tao Wang, Yu-Qi Lee, Weimin Zheng, Saru Kumari, Sachin Kumar:
Improved Authenticated Key Agreement Scheme for Fog-Driven IoT Healthcare System. 6658041:1-6658041:16 - Zhe Ren, Xinghua Li, Qi Jiang, Qingfeng Cheng, Jianfeng Ma:
Fast and Universal Inter-Slice Handover Authentication with Privacy Protection in 5G Network. 6694058:1-6694058:19 - Kaiqing Huang, Xueli Wang, Zhiqiang Lin:
Practical Multiauthority Attribute-Based Access Control for Edge-Cloud-Aided Internet of Things. 8872699:1-8872699:22 - Fei Zhang, Aisuo Jin, Yin Hu:
Two-Dimensional DOA Estimation of MIMO Radar Coherent Source Based on Toeplitz Matrix Set Reconstruction. 6631196:1-6631196:9 - Sooyong Jeong, Cheolhee Park, Dowon Hong, Changho Seo, Nam-Su Jho:
Neural Cryptography Based on Generalized Tree Parity Machine for Real-Life Systems. 6680782:1-6680782:12 - Jingwei Wang, Xinchun Yin, Jianting Ning:
Fine-Grained Task Access Control System for Mobile Crowdsensing. 6682456:1-6682456:13 - Jie Zeng, Chunhua Wang:
A Novel Hyperchaotic Image Encryption System Based on Particle Swarm Optimization Algorithm and Cellular Automata. 6675565:1-6675565:15 - Mansoor Fateh, Mohsen Rezvani, Yasser Irani:
A New Method of Coding for Steganography Based on LSB Matching Revisited. 6610678:1-6610678:15 - Zhongguo Yang, Irshad Ahmed Abbasi, Elfatih Elmubarak Mustafa, Sikandar Ali, Mingzhu Zhang:
An Anomaly Detection Algorithm Selection Service for IoT Stream Data Based on Tsfresh Tool and Genetic Algorithm. 6677027:1-6677027:10 - Juan Tang, Hualu Xu, Pengsen Cheng, Jiayong Liu, Cheng Huang, Xun Tang:
Zombie Follower Recognition Based on Industrial Chain Feature Analysis. 6656470:1-6656470:12 - (Withdrawn) Network Teaching Technology Based on Big Data Mining and Information Fusion. 6629563:1-6629563:9
- Yuqing Zhong, Zhaohua Li, Liping Liao:
A Privacy-Preserving Caching Scheme for Device-to-Device Communications. 6696149:1-6696149:8 - Hongwei Luo, Yijie Shen, Feng Lin, Guoai Xu:
Spoofing Speaker Verification System by Adversarial Examples Leveraging the Generalized Speaker Difference. 6664578:1-6664578:10 - Jonathan Jen-Rong Chen, Yi-Yuan Chiang, Wang-Hsin Hsu, Wen-Yen Lin:
Fail-Stop Group Signature Scheme. 6693726:1-6693726:6 - Iram Javed, Xianlun Tang, Kamran Shaukat, Muhammad Umer Sarwar, Talha Mahboob Alam, Ibrahim A. Hameed, Muhammad Asim Saleem:
V2X-Based Mobile Localization in 3D Wireless Sensor Network. 6677896:1-6677896:13 - Xinzhi Feng, Yang Yang, Xiaozhong Qi, Chunming Xu, Ze Ji:
Output Feedback NCS of DoS Attacks Triggered by Double-Ended Events. 6643034:1-6643034:14 - Zishuai Cheng, Baojiang Cui, Tao Qi, Wenchuan Yang, Junsong Fu:
An Improved Feature Extraction Approach for Web Anomaly Detection Based on Semantic Structure. 6661124:1-6661124:11 - Yi-Fan Tseng, Zi-Yuan Liu, Jen-Chieh Hsu, Raylin Tso:
Private Predicate Encryption for Inner Product from Key-Homomorphic Pseudorandom Function. 6678194:1-6678194:12 - Zhonghua Wang, Siwei Duan, Chengli Sun:
Infrared Small Target Detection Method Combined with Bilateral Filter and Local Entropy. 6661852:1-6661852:10 - Jinxiong Zhao, Xun Zhang, Fuqiang Di, Sensen Guo, Xiaoyu Li, Xiao Jing, Panfei Huang, Dejun Mu:
Exploring the Optimum Proactive Defense Strategy for the Power Systems from an Attack Perspective. 6699108:1-6699108:14 - Zitian Liao, Shah Nazir, Habib Ullah Khan, Muhammad Shafiq:
Assessing Security of Software Components for Internet of Things: A Systematic Review and Future Directions. 6677867:1-6677867:22 - Xin Tang, Linna Zhou, Bingwei Hu, Haowen Wu:
Aggregation-Based Tag Deduplication for Cloud Storage with Resistance against Side Channel Attack. 6686281:1-6686281:15 - Daiki Yamakawa, Takashi Okimoto, Songpon Teerakanok, Atsuo Inomata, Tetsutaro Uehara:
Enhancing Digital Certificate Usability in Long Lifespan IoT Devices by Utilizing Private CA. 6610863:1-6610863:14 - Shuaijianni Xu:
An Efficient HPRA-Based Multiclient Verifiable Computation: Transform and Instantiation. 6612614:1-6612614:18 - Aodi Liu, Xuehui Du, Na Wang:
Efficient Access Control Permission Decision Engine Based on Machine Learning. 3970485:1-3970485:11 - Maria Azees, Pandi Vijayakumar, Lazarus Jegatha Deborah, Marimuthu Karuppiah, Mary Subaja Christo:
BBAAS: Blockchain-Based Anonymous Authentication Scheme for Providing Secure Communication in VANETs. 6679882:1-6679882:11 - (Withdrawn) Statistical Modeling and Simulation of Online Shopping Customer Loyalty Based on Machine Learning and Big Data Analysis. 5545827:1-5545827:12
- Daoqi Han, Songqi Wu, Zhuoer Hu, Hui Gao, Enjie Liu, Yueming Lu:
A Novel Classified Ledger Framework for Data Flow Protection in AIoT Networks. 6671132:1-6671132:11 - Yan Wang, Jixin Li, Wansheng Liu, Aiping Tan:
Efficient Concurrent Execution of Smart Contracts in Blockchain Sharding. 6688168:1-6688168:15 - (Withdrawn) Research on Digital Economy and Human Resources Based on Fuzzy Clustering and Edge Computing. 5583967:1-5583967:8
- Lejun Gong, Xingxing Zhang, Tianyin Chen, Li Zhang:
Recognition of Disease Genetic Information from Unstructured Text Data Based on BiLSTM-CRF for Molecular Mechanisms. 6635027:1-6635027:8 - Youxia Dong, Xiaoling Huang, Guodong Ye:
Visually Meaningful Image Encryption Scheme Based on DWT and Schur Decomposition. 6677325:1-6677325:16 - (Withdrawn) Research on Accounting Intelligence System Modeling of Financial Performance Evaluation. 5550382:1-5550382:9
- Deepak Prashar, Nishant Jha, Muhammad Shafiq, Nazir Ahmad, Mamoon Rashid, Shoeib Amin Banday, Habib Ullah Khan:
Blockchain-Based Automated System for Identification and Storage of Networks. 6694281:1-6694281:7 - Li-Hua Gong, Jin Du, Jing Wan, Nan-Run Zhou:
Image Encryption Scheme Based on Block Scrambling, Closed-Loop Diffusion, and DNA Molecular Mutation. 6627005:1-6627005:16 - Bingbing Jiang:
Two-Party Secure Computation for Any Polynomial Function on Ciphertexts under Different Secret Keys. 6695304:1-6695304:7 - Hongtao Li, Feng Guo, Lili Wang, Jie Wang, Bo Wang, Chuankun Wu:
A Blockchain-Based Public Auditing Protocol with Self-Certified Public Keys for Cloud Data. 6623639:1-6623639:10 - Ping Yu, Wei Ni, Guangsheng Yu, Hua Zhang, Ren Ping Liu, Qiaoyan Wen:
Efficient Anonymous Data Authentication for Vehicular Ad Hoc Networks. 6638453:1-6638453:14 - Li Miao, Shuai Li:
Stochastic Differential Game-Based Malware Propagation in Edge Computing-Based IoT. 8896715:1-8896715:11 - Fengyin Li, Pei Ren, Guoyu Yang, Yuhong Sun, Yilei Wang, Yanli Wang, Siyuan Li, Huiyu Zhou:
An Efficient Anonymous Communication Scheme to Protect the Privacy of the Source Node Location in the Internet of Things. 6670847:1-6670847:16 - Lee Mariel Heucheun Yepdia, Alain Tiedeu, Guillaume Kom:
A Robust and Fast Image Encryption Scheme Based on a Mixing Technique. 6615708:1-6615708:17 - Jia Fan, Lanfei Qiao, Yunfei Cao, Shanglin Liu, Wenke Zhang, Lin Tang:
A New Password- and Position-Based Authenticated Key Exchange. 6613392:1-6613392:9 - Tsu-Yang Wu, Lei Yang, Zhiyuan Lee, Chien-Ming Chen, Jeng-Shyang Pan, SK Hafizul Islam:
Improved ECC-Based Three-Factor Multiserver Authentication Scheme. 6627956:1-6627956:14 - Junyi He, Junnan Zhang, Cheng Song, Mengxiang Wu:
Spectral Efficiency of the Multiway Massive System over Rician Fading Channels. 6618363:1-6618363:8 - Binjie Chen, Fushan Wei, Chunxiang Gu:
Bitcoin Theft Detection Based on Supervised Machine Learning Algorithms. 6643763:1-6643763:10 - Ahmad Alanezi, Bassem Abd-El-Atty, Hoshang Kolivand, Ahmed A. Abd El-Latif, Basma Abd El-Rahiem, Syam Sankar, Hany S. Khalifa:
Securing Digital Images through Simple Permutation-Substitution Mechanism in Cloud-Based Smart City Environment. 6615512:1-6615512:17 - Jie Ling, Junwei Chen, Jiahui Chen, Wensheng Gan:
Multiauthority Attribute-Based Encryption with Traceable and Dynamic Policy Updating. 6661450:1-6661450:13 - Wenyan Pan, Meimin Wang, Jiaohua Qin, Zhili Zhou:
Improved CNN-Based Hashing for Encrypted Image Retrieval. 5556634:1-5556634:8 - Songjie Wei, Zedong Zhang, Shasha Li, Pengfei Jiang:
Calibrating Network Traffic with One-Dimensional Convolutional Neural Network with Autoencoder and Independent Recurrent Neural Network for Mobile Malware Detection. 6695858:1-6695858:10 - Jiawei Zhang, Jianfeng Ma, Teng Li, Qi Jiang:
Efficient Hierarchical and Time-Sensitive Data Sharing with User Revocation in Mobile Crowdsensing. 6646445:1-6646445:17 - Mengmeng Cui, Yiming Fei, Yin Liu:
A Survey on Secure Deployment of Mobile Services in Edge Computing. 8846239:1-8846239:8 - Teng Li, Jiawei Zhang, Yangxu Lin, Shengkai Zhang, Jianfeng Ma:
Blockchain-Based Fine-Grained Data Sharing for Multiple Groups in Internet of Things. 6689448:1-6689448:13 - Yuting Li, Qingfeng Cheng, Wenbo Shi:
Security Analysis of a Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for IIoT Environments. 5573886:1-5573886:6 - Hira Nazir, Imran Sarwar Bajwa, Muhammad Samiullah, Waheed Anwar, Muhammad Moosa:
Robust Secure Color Image Watermarking Using 4D Hyperchaotic System, DWT, HbD, and SVD Based on Improved FOA Algorithm. 6617944:1-6617944:17 - (Withdrawn) Analysis of Characteristics of Tennis Singles Matches Based on 5G and Data Mining Technology. 5549309:1-5549309:9
- (Withdrawn) Research on Transmission Line Fault Location Based on the Fusion of Machine Learning and Artificial Intelligence. 6648257:1-6648257:8
- Yidong Yuan, Yao Zhang, Yiqiang Zhao, Xige Zhang, Ming Tang:
Process Variation-Resistant Golden-Free Hardware Trojan Detection through a Power Side Channel. 8839222:1-8839222:15 - Jiantao Shi, Xiangzhan Yu, Zechao Liu:
Nowhere to Hide: A Novel Private Protocol Identification Algorithm. 6672911:1-6672911:10 - Wenfa Qi, Yuxin Liu, Sirui Guo, Xiang Wang, Zongming Guo:
An Adaptive Visible Watermark Embedding Method based on Region Selection. 6693343:1-6693343:11 - Peijun Zhang, Lianhai Wang, Wei Wang, Kunlun Fu, Jinpeng Wang:
A Blockchain System Based on Quantum-Resistant Digital Signature. 6671648:1-6671648:13 - Tongchen Shen, Fuqun Wang, Kefei Chen, Zhonghua Shen, Renjun Zhang:
Compressible Multikey and Multi-Identity Fully Homomorphic Encryption. 6619476:1-6619476:14 - Wei Yang, Anni Jia:
Side-Channel Leakage Detection with One-Way Analysis of Variance. 6614702:1-6614702:13 - (Withdrawn) Research on the Performance of Impressionist Painting Color Visual Communication Based on Wireless Communication and Machine Vision. 5511252:1-5511252:6
- Jianan Zhao, Ruwei Huang, Bo Yang:
Efficient GSW-Style Fully Homomorphic Encryption over the Integers. 8823787:1-8823787:13 - (Withdrawn) An Exploratory Research on Constructing a Model of Innovation and Entrepreneurship Education for College Students Based on Fuzzy Neural Network Algorithm. 5533376:1-5533376:8
- Chirag Sharma, Bagga Amandeep, Rajeev Sobti, Tarun Kumar Lohani, Mohammad Shabaz:
A Secured Frame Selection Based Video Watermarking Technique to Address Quality Loss of Data: Combining Graph Based Transform, Singular Valued Decomposition, and Hyperchaotic Encryption. 5536170:1-5536170:19 - Pengcheng He, Kehui Sun, Congxu Zhu:
A Novel Image Encryption Algorithm Based on the Delayed Maps and Permutation-Confusion-Diffusion Architecture. 6679288:1-6679288:16 - Jie Yang, Xinsheng Ji, Kaizhi Huang, Xiaoli Sun, Yi Wang:
Enhanced Secure SWIPT in Heterogeneous Network via Intelligent Reflecting Surface. 8836757:1-8836757:12 - Yihang Song, Songfan Li, Chong Zhang, Li Lu:
A Spectrum-Efficient Cross-Layer RF Distance Bounding Scheme. 6668498:1-6668498:15 - Yuanju Gan:
A Fully Adaptively Secure Threshold Signature Scheme Based on Dual-Form Signatures Technology. 6697295:1-6697295:11 - Yang Qiao, Yunjie Tian, Yue Liu, Jianbin Jiao:
Genetic Feature Fusion for Object Skeleton Detection. 6621760:1-6621760:9 - (Withdrawn) Research on the Credibility of Social Media Information Based on User Perception. 5567610:1-5567610:10
- Yunzhe Tian, Jiqiang Liu, Endong Tong, Wenjia Niu, Liang Chang, Qi Alfred Chen, Gang Li, Wei Wang:
Towards Revealing Parallel Adversarial Attack on Politician Socialnet of Graph Structure. 6631247:1-6631247:13 - Zhongguo Yang, Irshad Ahmed Abbasi, Fahad Algarni, Sikandar Ali, Mingzhu Zhang:
An IoT Time Series Data Security Model for Adversarial Attack Based on Thermometer Encoding. 5537041:1-5537041:11 - Ricardo Ávila, Raphaël Khoury, Richard Khoury, Fábio Petrillo:
Use of Security Logs for Data Leak Detection: A Systematic Literature Review. 6615899:1-6615899:29 - Zhen Zhang, Bing Guo, Yan Shen, Chengjie Li, Xinhua Suo, Hong Su:
Nakamoto Consensus to Accelerate Supervised Classification Algorithms for Multiparty Computing. 6629433:1-6629433:11 - Muhua Liu, Lin Wang, Qingtao Wu, Jianqiang Song:
Distributed Functional Signature with Function Privacy and Its Application. 6699974:1-6699974:14 - Wenfeng Xu, Yongxian Fan, Changyong Li:
I2DS: Interpretable Intrusion Detection System Using Autoencoder and Additive Tree. 5564354:1-5564354:9 - Qun Wang, Zhonghao Sun, Zhangquan Wang, Shiping Ye, Ziyi Su, Hao Chen, Chao Hu:
A Practical Format and Semantic Reverse Analysis Approach for Industrial Control Protocols. 6690988:1-6690988:11 - Elmustafa Sayed Ali, Mohammad Kamrul Hasan, Rosilah Hassan, Rashid A. Saeed, Mona Bakri Hassan, Shayla Islam, Nazmus Shaker Nafi, Savitri Bevinakoppa:
Machine Learning Technologies for Secure Vehicular Communication in Internet of Vehicles: Recent Advances and Applications. 8868355:1-8868355:23 - Fei Zhao, Yang Xin, Kai Zhang, Xinxin Niu:
Representativeness-Based Instance Selection for Intrusion Detection. 6638134:1-6638134:13 - Hui Liu, Hanxing Xue, Hui Lu:
A Sensitive File Abnormal Access Detection Method Based on Application Classification. 6684456:1-6684456:7