


Остановите войну!
for scientists:


default search action
Security and Communication Networks, Volume 2021
Volume 2021, 2021
- Changguang Wang
, Ziqiu Zhao, Fangwei Wang
, Qingru Li
:
A Novel Malware Detection and Family Classification Scheme for IoT Based on DEAM and DenseNet. 6658842:1-6658842:16 - Zhifei Wang
, Gang Xu
, Na Zhang, Zhihan Qi, Fengqi Wei, Liqiang He:
Ferry Node Identification Model for the Security of Mobile Ad Hoc Network. 6682311:1-6682311:13 - Hui Li, Limin Shen
, Yuying Wang, Jiayin Feng, Honglei Tan, Zhiming Li:
Risk Measurement Method of Collusion Privilege Escalation Attacks for Android Apps Based on Feature Weight and Behavior Determination. 8814844:1-8814844:18 - Xin Li
, Peng Yi
, Wei Wei, Yiming Jiang, Le Tian
:
LNNLS-KH: A Feature Selection Method for Network Intrusion Detection. 8830431:1-8830431:22 - Yawei Yue, Shancang Li
, Phil Legg
, Fuzhong Li
:
Deep Learning-Based Security Behaviour Analysis in IoT Environments: A Survey. 8873195:1-8873195:13 - Shichang Ding
, Fan Zhao
, Xiangyang Luo
:
A Street-Level IP Geolocation Method Based on Delay-Distance Correlation and Multilayered Common Routers. 6658642:1-6658642:11 - Tao Feng, Xusheng Wang
, Chunyan Liu, Junli Fang:
Secure Data Collaborative Computing Scheme Based on Blockchain. 6630291:1-6630291:9 - Menghui Lou
, Xiaolei Dong
, Zhenfu Cao
, Jiachen Shen
:
SESCF: A Secure and Efficient Supply Chain Framework via Blockchain-Based Smart Contracts. 8884478:1-8884478:18 - Khalid M. Al-Gethami
, Mousa T. Al-Akhras
, Mohammed Alawairdhi
:
Empirical Evaluation of Noise Influence on Supervised Machine Learning Algorithms Using Intrusion Detection Datasets. 8836057:1-8836057:28 - Youxia Dong, Xiaoling Huang
, Qixiang Mei, Yuanju Gan:
Self-Adaptive Image Encryption Algorithm Based on Quantum Logistic Map. 6674948:1-6674948:12 - Yajing Hao, Xinrong Yan, Jianbin Wu
, Huijun Wang, Linfeng Yuan:
Multimedia Communication Security in 5G/6G Coverless Steganography Based on Image Text Semantic Association. 6628034:1-6628034:12 - Yusheng Dai
, Hui Li
, Yekui Qian, Yunling Guo, Min Zheng:
Anticoncept Drift Method for Malware Detector Based on Generative Adversarial Network. 6644107:1-6644107:12 - Juhong Namgung, Siwoon Son
, Yang-Sae Moon
:
Efficient Deep Learning Models for DGA Domain Detection. 8887881:1-8887881:15 - Zhenwei Chen
, Axin Wu
, Yifei Li
, Qixuan Xing
, Shengling Geng
:
Blockchain-Enabled Public Key Encryption with Multi-Keyword Search in Cloud Computing. 6619689:1-6619689:11 - Tao Zhang
, Xiongfei Song
, Lele Zheng, Yani Han, Kai Zhang
, Qi Li:
Towards Time-Sensitive and Verifiable Data Aggregation for Mobile Crowdsensing. 6679157:1-6679157:14 - Sivleen Kaur, Sheetal Chaturvedi, Aabha Sharma, Jayaprakash Kar
:
A Research Survey on Applications of Consensus Protocols in Blockchain. 6693731:1-6693731:22 - Zhengguo Wu, Kai Zhang, Yannan Ren, Jing Li, Jiande Sun, Wenbo Wan
:
Visual Security Assessment via Saliency-Weighted Structure and Orientation Similarity for Selective Encrypted Images. 6675354:1-6675354:16 - Suleyman Alterkavi
, Hasan Erbay
:
Design and Analysis of a Novel Authorship Verification Framework for Hijacked Social Media Accounts Compromised by a Human. 8869681:1-8869681:12 - Chongzhen Zhang, Yanli Chen, Yang Meng, Fangming Ruan
, Runze Chen, Yidan Li, Yaru Yang:
A Novel Framework Design of Network Intrusion Detection Based on Machine Learning Techniques. 6610675:1-6610675:15 - Jiasheng Qu, Wei Song
, Xiangchun Liu, Lizhi Zhao, Xiaobing Zhao:
A Novel Improved Reversible Visible Image Watermarking Algorithm Based on Grad-CAM and JND. 6652897:1-6652897:17 - Tao Wang
, Hongchang Chen:
A Lightweight SDN Fingerprint Attack Defense Mechanism Based on Probabilistic Scrambling and Controller Dynamic Scheduling Strategies. 6688489:1-6688489:23 - Xiaokang Xiong
, Yuhang Dai
, Zhuhua Hu
, Kejia Huo
, Yong Bai
, Hui Li
, Dake Liu
:
Hardware Sharing for Channel Interleavers in 5G NR Standard. 8872140:1-8872140:13 - Diqun Yan
, Mingyu Dong, Jinxing Gao:
Exposing Speech Transsplicing Forgery with Noise Level Inconsistency. 6659371:1-6659371:6 - Shiyue Qin
, Zhenhua Tan
, Fucai Zhou
, Jian Xu, Zongye Zhang:
A Verifiable Steganography-Based Secret Image Sharing Scheme in 5G Networks. 6629726:1-6629726:14 - Lei Du, Songsong Dai
, Haifeng Song
, Yuelong Chuang, Yingying Xu:
Weighted Nuclear Norm Minimization on Multimodality Clustering. 6662989:1-6662989:7 - Zixuan Shen
, Zhihua Xia
, Peipeng Yu
:
PLDP: Personalized Local Differential Privacy for Multidimensional Data Aggregation. 6684179:1-6684179:13 - Shengxu Xie
, Chang-you Xing
, Guomin Zhang
, Jinlong Zhao
:
A Table Overflow LDoS Attack Defending Mechanism in Software-Defined Networks. 6667922:1-6667922:16 - Parimah Ziayi, Seyed Mostafa Farmanbar, Mohsen Rezvani
:
YAICD: Yet Another IMSI Catcher Detector in GSM. 8847803:1-8847803:13 - Chuqiao Xiao
, Xueqing Gong
, Yefeng Xia
, Qian Zhang
:
PB: A Product-Bitmatrix Construction to Reduce the Complexity of XOR Operations of PM-MSR and PM-MBR Codes over GF 2 w. 6642121:1-6642121:18 - Asad Ullah, Jing Wang
, Muhammad Shahid Anwar
, Arshad Ahmad
, Shah Nazir
, Habib Ullah Khan
, Zesong Fei:
Fusion of Machine Learning and Privacy Preserving for Secure Facial Expression Recognition. 6673992:1-6673992:12 - Suliman A. Alsuhibany
:
A Camouflage Text-Based Password Approach for Mobile Devices against Shoulder-Surfing Attack. 6653076:1-6653076:11 - Rahul Johari
, Sawan Kalra
, Sonika Dahiya
, Kalpana Gupta
:
S2NOW: Secure Social Network Ontology Using WhatsApp. 7940103:1-7940103:21 - Tsu-Yang Wu
, Tao Wang
, Yu-Qi Lee
, Weimin Zheng
, Saru Kumari
, Sachin Kumar
:
Improved Authenticated Key Agreement Scheme for Fog-Driven IoT Healthcare System. 6658041:1-6658041:16 - Zhe Ren
, Xinghua Li
, Qi Jiang
, Qingfeng Cheng
, Jianfeng Ma:
Fast and Universal Inter-Slice Handover Authentication with Privacy Protection in 5G Network. 6694058:1-6694058:19 - Kaiqing Huang
, Xueli Wang, Zhiqiang Lin:
Practical Multiauthority Attribute-Based Access Control for Edge-Cloud-Aided Internet of Things. 8872699:1-8872699:22 - Fei Zhang
, Aisuo Jin, Yin Hu:
Two-Dimensional DOA Estimation of MIMO Radar Coherent Source Based on Toeplitz Matrix Set Reconstruction. 6631196:1-6631196:9 - Sooyong Jeong
, Cheolhee Park
, Dowon Hong
, Changho Seo
, Nam-Su Jho
:
Neural Cryptography Based on Generalized Tree Parity Machine for Real-Life Systems. 6680782:1-6680782:12 - Jingwei Wang
, Xinchun Yin
, Jianting Ning:
Fine-Grained Task Access Control System for Mobile Crowdsensing. 6682456:1-6682456:13 - Jie Zeng, Chunhua Wang
:
A Novel Hyperchaotic Image Encryption System Based on Particle Swarm Optimization Algorithm and Cellular Automata. 6675565:1-6675565:15 - Mansoor Fateh
, Mohsen Rezvani
, Yasser Irani
:
A New Method of Coding for Steganography Based on LSB Matching Revisited. 6610678:1-6610678:15 - Zhongguo Yang
, Irshad Ahmed Abbasi
, Elfatih Elmubarak Mustafa
, Sikandar Ali
, Mingzhu Zhang:
An Anomaly Detection Algorithm Selection Service for IoT Stream Data Based on Tsfresh Tool and Genetic Algorithm. 6677027:1-6677027:10 - Juan Tang
, Hualu Xu
, Pengsen Cheng
, Jiayong Liu
, Cheng Huang
, Xun Tang
:
Zombie Follower Recognition Based on Industrial Chain Feature Analysis. 6656470:1-6656470:12 - Yishan Du
, Tianzhong Zhao
:
Network Teaching Technology Based on Big Data Mining and Information Fusion. 6629563:1-6629563:9 - Yuqing Zhong
, Zhaohua Li
, Liping Liao
:
A Privacy-Preserving Caching Scheme for Device-to-Device Communications. 6696149:1-6696149:8 - Hongwei Luo
, Yijie Shen
, Feng Lin
, Guoai Xu
:
Spoofing Speaker Verification System by Adversarial Examples Leveraging the Generalized Speaker Difference. 6664578:1-6664578:10 - Jonathan Jen-Rong Chen, Yi-Yuan Chiang, Wang-Hsin Hsu, Wen-Yen Lin
:
Fail-Stop Group Signature Scheme. 6693726:1-6693726:6 - Iram Javed
, Xianlun Tang, Kamran Shaukat
, Muhammad Umer Sarwar, Talha Mahboob Alam
, Ibrahim A. Hameed
, Muhammad Asim Saleem
:
V2X-Based Mobile Localization in 3D Wireless Sensor Network. 6677896:1-6677896:13 - Xinzhi Feng
, Yang Yang
, Xiaozhong Qi, Chunming Xu, Ze Ji
:
Output Feedback NCS of DoS Attacks Triggered by Double-Ended Events. 6643034:1-6643034:14 - Zishuai Cheng
, Baojiang Cui
, Tao Qi
, Wenchuan Yang
, Junsong Fu
:
An Improved Feature Extraction Approach for Web Anomaly Detection Based on Semantic Structure. 6661124:1-6661124:11 - Yi-Fan Tseng, Zi-Yuan Liu
, Jen-Chieh Hsu, Raylin Tso:
Private Predicate Encryption for Inner Product from Key-Homomorphic Pseudorandom Function. 6678194:1-6678194:12 - Zhonghua Wang
, Siwei Duan, Chengli Sun:
Infrared Small Target Detection Method Combined with Bilateral Filter and Local Entropy. 6661852:1-6661852:10 - Jinxiong Zhao
, Xun Zhang, Fuqiang Di, Sensen Guo, Xiaoyu Li, Xiao Jing, Panfei Huang, Dejun Mu:
Exploring the Optimum Proactive Defense Strategy for the Power Systems from an Attack Perspective. 6699108:1-6699108:14 - Zitian Liao
, Shah Nazir
, Habib Ullah Khan
, Muhammad Shafiq:
Assessing Security of Software Components for Internet of Things: A Systematic Review and Future Directions. 6677867:1-6677867:22 - Xin Tang
, Linna Zhou
, Bingwei Hu
, Haowen Wu
:
Aggregation-Based Tag Deduplication for Cloud Storage with Resistance against Side Channel Attack. 6686281:1-6686281:15 - Daiki Yamakawa
, Takashi Okimoto
, Songpon Teerakanok
, Atsuo Inomata
, Tetsutaro Uehara
:
Enhancing Digital Certificate Usability in Long Lifespan IoT Devices by Utilizing Private CA. 6610863:1-6610863:14 - Shuaijianni Xu
:
An Efficient HPRA-Based Multiclient Verifiable Computation: Transform and Instantiation. 6612614:1-6612614:18 - Aodi Liu
, Xuehui Du
, Na Wang
:
Efficient Access Control Permission Decision Engine Based on Machine Learning. 3970485:1-3970485:11 - Maria Azees
, Pandi Vijayakumar
, Lazarus Jegatha Deborah
, Marimuthu Karuppiah
, Mary Subaja Christo
:
BBAAS: Blockchain-Based Anonymous Authentication Scheme for Providing Secure Communication in VANETs. 6679882:1-6679882:11 - Jui-Chan Huang
, Po-Chang Ko, Cher-Min Fong, Sn-Man Lai
, Hsin-Hung Chen, Ching-Tang Hsieh:
Statistical Modeling and Simulation of Online Shopping Customer Loyalty Based on Machine Learning and Big Data Analysis. 5545827:1-5545827:12 - Daoqi Han
, Songqi Wu, Zhuoer Hu, Hui Gao, Enjie Liu, Yueming Lu
:
A Novel Classified Ledger Framework for Data Flow Protection in AIoT Networks. 6671132:1-6671132:11 - Yan Wang, Jixin Li, Wansheng Liu, Aiping Tan
:
Efficient Concurrent Execution of Smart Contracts in Blockchain Sharding. 6688168:1-6688168:15 - Zhouhuo Wang
:
Research on Digital Economy and Human Resources Based on Fuzzy Clustering and Edge Computing. 5583967:1-5583967:8 - Lejun Gong
, Xingxing Zhang, Tianyin Chen, Li Zhang:
Recognition of Disease Genetic Information from Unstructured Text Data Based on BiLSTM-CRF for Molecular Mechanisms. 6635027:1-6635027:8 - Youxia Dong, Xiaoling Huang
, Guodong Ye
:
Visually Meaningful Image Encryption Scheme Based on DWT and Schur Decomposition. 6677325:1-6677325:16 - Ziyue Chen
:
Research on Accounting Intelligence System Modeling of Financial Performance Evaluation. 5550382:1-5550382:9 - Deepak Prashar, Nishant Jha
, Muhammad Shafiq
, Nazir Ahmad, Mamoon Rashid
, Shoeib Amin Banday, Habib Ullah Khan
:
Blockchain-Based Automated System for Identification and Storage of Networks. 6694281:1-6694281:7 - Li-Hua Gong, Jin Du, Jing Wan, Nan-Run Zhou
:
Image Encryption Scheme Based on Block Scrambling, Closed-Loop Diffusion, and DNA Molecular Mutation. 6627005:1-6627005:16 - Bingbing Jiang
:
Two-Party Secure Computation for Any Polynomial Function on Ciphertexts under Different Secret Keys. 6695304:1-6695304:7 - Hongtao Li
, Feng Guo
, Lili Wang, Jie Wang, Bo Wang, Chuankun Wu:
A Blockchain-Based Public Auditing Protocol with Self-Certified Public Keys for Cloud Data. 6623639:1-6623639:10 - Ping Yu
, Wei Ni, Guangsheng Yu, Hua Zhang
, Ren Ping Liu, Qiaoyan Wen
:
Efficient Anonymous Data Authentication for Vehicular Ad Hoc Networks. 6638453:1-6638453:14 - Li Miao
, Shuai Li:
Stochastic Differential Game-Based Malware Propagation in Edge Computing-Based IoT. 8896715:1-8896715:11 - Fengyin Li
, Pei Ren
, Guoyu Yang
, Yuhong Sun
, Yilei Wang
, Yanli Wang
, Siyuan Li
, Huiyu Zhou
:
An Efficient Anonymous Communication Scheme to Protect the Privacy of the Source Node Location in the Internet of Things. 6670847:1-6670847:16 - Lee Mariel Heucheun Yepdia
, Alain Tiedeu
, Guillaume Kom
:
A Robust and Fast Image Encryption Scheme Based on a Mixing Technique. 6615708:1-6615708:17 - Jia Fan, Lanfei Qiao
, Yunfei Cao, Shanglin Liu, Wenke Zhang, Lin Tang:
A New Password- and Position-Based Authenticated Key Exchange. 6613392:1-6613392:9 - Tsu-Yang Wu
, Lei Yang
, Zhiyuan Lee
, Chien-Ming Chen
, Jeng-Shyang Pan
, SK Hafizul Islam
:
Improved ECC-Based Three-Factor Multiserver Authentication Scheme. 6627956:1-6627956:14 - Junyi He, Junnan Zhang
, Cheng Song
, Mengxiang Wu
:
Spectral Efficiency of the Multiway Massive System over Rician Fading Channels. 6618363:1-6618363:8 - Binjie Chen
, Fushan Wei
, Chunxiang Gu
:
Bitcoin Theft Detection Based on Supervised Machine Learning Algorithms. 6643763:1-6643763:10 - Ahmad Alanezi, Bassem Abd-El-Atty
, Hoshang Kolivand
, Ahmed A. Abd El-Latif
, Basma Abd El-Rahiem, Syam Sankar, Hany S. Khalifa
:
Securing Digital Images through Simple Permutation-Substitution Mechanism in Cloud-Based Smart City Environment. 6615512:1-6615512:17 - Jie Ling
, Junwei Chen
, Jiahui Chen
, Wensheng Gan
:
Multiauthority Attribute-Based Encryption with Traceable and Dynamic Policy Updating. 6661450:1-6661450:13 - Wenyan Pan
, Meimin Wang
, Jiaohua Qin
, Zhili Zhou
:
Improved CNN-Based Hashing for Encrypted Image Retrieval. 5556634:1-5556634:8 - Songjie Wei
, Zedong Zhang, Shasha Li, Pengfei Jiang:
Calibrating Network Traffic with One-Dimensional Convolutional Neural Network with Autoencoder and Independent Recurrent Neural Network for Mobile Malware Detection. 6695858:1-6695858:10 - Jiawei Zhang
, Jianfeng Ma, Teng Li
, Qi Jiang
:
Efficient Hierarchical and Time-Sensitive Data Sharing with User Revocation in Mobile Crowdsensing. 6646445:1-6646445:17 - Mengmeng Cui
, Yiming Fei
, Yin Liu
:
A Survey on Secure Deployment of Mobile Services in Edge Computing. 8846239:1-8846239:8 - Teng Li
, Jiawei Zhang
, Yangxu Lin, Shengkai Zhang, Jianfeng Ma:
Blockchain-Based Fine-Grained Data Sharing for Multiple Groups in Internet of Things. 6689448:1-6689448:13 - Yuting Li
, Qingfeng Cheng
, Wenbo Shi:
Security Analysis of a Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for IIoT Environments. 5573886:1-5573886:6 - Hira Nazir
, Imran Sarwar Bajwa
, Muhammad Samiullah
, Waheed Anwar
, Muhammad Moosa
:
Robust Secure Color Image Watermarking Using 4D Hyperchaotic System, DWT, HbD, and SVD Based on Improved FOA Algorithm. 6617944:1-6617944:17 - Ming Li, Qinsheng Li, Yuening Li, Yunkun Cui, Xiufeng Zhao, Lei Guo
:
Analysis of Characteristics of Tennis Singles Matches Based on 5G and Data Mining Technology. 5549309:1-5549309:9 - Xiao-wei Liu
:
Research on Transmission Line Fault Location Based on the Fusion of Machine Learning and Artificial Intelligence. 6648257:1-6648257:8 - Yidong Yuan, Yao Zhang
, Yiqiang Zhao, Xige Zhang, Ming Tang
:
Process Variation-Resistant Golden-Free Hardware Trojan Detection through a Power Side Channel. 8839222:1-8839222:15 - Jiantao Shi
, Xiangzhan Yu
, Zechao Liu
:
Nowhere to Hide: A Novel Private Protocol Identification Algorithm. 6672911:1-6672911:10 - Wenfa Qi
, Yuxin Liu
, Sirui Guo
, Xiang Wang
, Zongming Guo
:
An Adaptive Visible Watermark Embedding Method based on Region Selection. 6693343:1-6693343:11 - Peijun Zhang
, Lianhai Wang
, Wei Wang
, Kunlun Fu
, Jinpeng Wang
:
A Blockchain System Based on Quantum-Resistant Digital Signature. 6671648:1-6671648:13 - Tongchen Shen
, Fuqun Wang
, Kefei Chen, Zhonghua Shen, Renjun Zhang:
Compressible Multikey and Multi-Identity Fully Homomorphic Encryption. 6619476:1-6619476:14 - Wei Yang
, Anni Jia:
Side-Channel Leakage Detection with One-Way Analysis of Variance. 6614702:1-6614702:13 - Jun Lin
:
Research on the Performance of Impressionist Painting Color Visual Communication Based on Wireless Communication and Machine Vision. 5511252:1-5511252:6 - Jianan Zhao
, Ruwei Huang
, Bo Yang
:
Efficient GSW-Style Fully Homomorphic Encryption over the Integers. 8823787:1-8823787:13 - (Withdrawn) An Exploratory Research on Constructing a Model of Innovation and Entrepreneurship Education for College Students Based on Fuzzy Neural Network Algorithm. 5533376:1-5533376:8
- Chirag Sharma
, Bagga Amandeep
, Rajeev Sobti
, Tarun Kumar Lohani
, Mohammad Shabaz
:
A Secured Frame Selection Based Video Watermarking Technique to Address Quality Loss of Data: Combining Graph Based Transform, Singular Valued Decomposition, and Hyperchaotic Encryption. 5536170:1-5536170:19 - Pengcheng He
, Kehui Sun
, Congxu Zhu
:
A Novel Image Encryption Algorithm Based on the Delayed Maps and Permutation-Confusion-Diffusion Architecture. 6679288:1-6679288:16 - Jie Yang
, Xinsheng Ji, Kaizhi Huang
, Xiaoli Sun, Yi Wang:
Enhanced Secure SWIPT in Heterogeneous Network via Intelligent Reflecting Surface. 8836757:1-8836757:12 - Yihang Song
, Songfan Li
, Chong Zhang
, Li Lu
:
A Spectrum-Efficient Cross-Layer RF Distance Bounding Scheme. 6668498:1-6668498:15 - Yuanju Gan
:
A Fully Adaptively Secure Threshold Signature Scheme Based on Dual-Form Signatures Technology. 6697295:1-6697295:11 - Yang Qiao
, Yunjie Tian
, Yue Liu
, Jianbin Jiao
:
Genetic Feature Fusion for Object Skeleton Detection. 6621760:1-6621760:9 - Jiaxi Sun
:
Research on the Credibility of Social Media Information Based on User Perception. 5567610:1-5567610:10 - Yunzhe Tian
, Jiqiang Liu
, Endong Tong
, Wenjia Niu
, Liang Chang
, Qi Alfred Chen
, Gang Li
, Wei Wang
:
Towards Revealing Parallel Adversarial Attack on Politician Socialnet of Graph Structure. 6631247:1-6631247:13 - Zhongguo Yang
, Irshad Ahmed Abbasi
, Fahad Algarni
, Sikandar Ali
, Mingzhu Zhang:
An IoT Time Series Data Security Model for Adversarial Attack Based on Thermometer Encoding. 5537041:1-5537041:11 - Ricardo Ávila
, Raphaël Khoury
, Richard Khoury
, Fábio Petrillo
:
Use of Security Logs for Data Leak Detection: A Systematic Literature Review. 6615899:1-6615899:29 - Zhen Zhang
, Bing Guo, Yan Shen, Chengjie Li
, Xinhua Suo, Hong Su
:
Nakamoto Consensus to Accelerate Supervised Classification Algorithms for Multiparty Computing. 6629433:1-6629433:11 - Muhua Liu
, Lin Wang
, Qingtao Wu
, Jianqiang Song
:
Distributed Functional Signature with Function Privacy and Its Application. 6699974:1-6699974:14 - Wenfeng Xu
, Yongxian Fan
, Changyong Li
:
I2DS: Interpretable Intrusion Detection System Using Autoencoder and Additive Tree. 5564354:1-5564354:9 - Qun Wang, Zhonghao Sun, Zhangquan Wang, Shiping Ye, Ziyi Su, Hao Chen, Chao Hu
:
A Practical Format and Semantic Reverse Analysis Approach for Industrial Control Protocols. 6690988:1-6690988:11 - Elmustafa Sayed Ali
, Mohammad Kamrul Hasan
, Rosilah Hassan
, Rashid A. Saeed
, Mona Bakri Hassan, Shayla Islam, Nazmus Shaker Nafi, Savitri Bevinakoppa:
Machine Learning Technologies for Secure Vehicular Communication in Internet of Vehicles: Recent Advances and Applications. 8868355:1-8868355:23 - Fei Zhao
, Yang Xin
, Kai Zhang, Xinxin Niu:
Representativeness-Based Instance Selection for Intrusion Detection. 6638134:1-6638134:13 - Hui Liu, Hanxing Xue, Hui Lu:
A Sensitive File Abnormal Access Detection Method Based on Application Classification. 6684456:1-6684456:7