- Jun Cui, Changqi Huang, Huan Meng, Ran Wei
:
Tor network anonymity evaluation based on node anonymity. Cybersecur. 6(1): 55 (2023) - Fikirte Ayalke Demmese
, Ajaya Neupane, Sajad Khorsandroo, May Wang, Kaushik Roy, Yu Fu:
Machine learning based fileless malware traffic classification using image visualization. Cybersecur. 6(1): 32 (2023) - Kaisheng Fan, Weizhe Zhang, Guangrui Liu, Hui He:
FMSA: a meta-learning framework-based fast model stealing attack technique against intelligent network intrusion detection systems. Cybersecur. 6(1): 35 (2023) - Yuyao Ge, Zhongguo Yang
, Lizhe Chen, Yiming Wang, Chengyang Li:
Attack based on data: a novel perspective to attack sensitive points directly. Cybersecur. 6(1): 43 (2023) - Anit Kumar Ghosal
, Dipanwita Roychowdhury:
Continuously non-malleable codes from block ciphers in split-state model. Cybersecur. 6(1): 25 (2023) - Zhixiu Guo, Ruigang Liang
, Guozhu Meng, Kai Chen:
SkillSim: voice apps similarity detection. Cybersecur. 6(1): 13 (2023) - Feng Guo, Zheng Sun, Yuxuan Chen
, Lei Ju:
Towards the universal defense for query-based audio adversarial attacks on speech recognition system. Cybersecur. 6(1): 40 (2023) - Feng Guo, Zheng Sun, Yuxuan Chen
, Lei Ju:
Towards the transferable audio adversarial attack via ensemble methods. Cybersecur. 6(1): 44 (2023) - Jianfu Huang, Ye Luo, Qinggan Fu, Yincen Chen, Chao Wang, Ling Song
:
Generic attacks on small-state stream cipher constructions in the multi-user setting. Cybersecur. 6(1): 53 (2023) - Weihao Huang, Guozhu Meng
, Chaoyang Lin, Qiucun Yan, Kai Chen, Zhuo Ma:
Are our clone detectors good enough? An empirical study of code effects by obfuscation. Cybersecur. 6(1): 14 (2023) - Ziad Hussein
, May A. Salama, Sahar A. El-Rahman:
Evolution of blockchain consensus algorithms: a review on the latest milestones of blockchain consensus algorithms. Cybersecur. 6(1): 30 (2023) - Chaidir Chalaf Islamy, Tohari Ahmad
, Royyana Muslim Ijtihadie:
Reversible data hiding based on histogram and prediction error for sharing secret data. Cybersecur. 6(1): 12 (2023) - Yubing Jiang, Peisong Shen
, Li Zeng, Xiaojie Zhu, Di Jiang, Chi Chen:
Cancelable biometric schemes for Euclidean metric and Cosine metric. Cybersecur. 6(1): 4 (2023) - Baolong Jin, Rui Xue
:
Improved lower bound for the complexity of unique shortest vector problem. Cybersecur. 6(1): 38 (2023) - Chengbin Jin, Yongbin Zhou:
Enhancing non-profiled side-channel attacks by time-frequency analysis. Cybersecur. 6(1): 15 (2023) - Armita Kazeminajafabadi
, Mahdi Imani:
Optimal monitoring and attack detection of networks modeled by Bayesian attack graphs. Cybersecur. 6(1): 22 (2023) - Sea Ran Cleon Liew, Ngai-Fong Law
:
Use of subword tokenization for domain generation algorithm classification. Cybersecur. 6(1): 49 (2023) - Jiaxi Liu
, Yun Feng, Xinyu Liu, Jianjun Zhao, Qixu Liu:
MRm-DLDet: a memory-resident malware detection framework based on memory forensics and deep neural network. Cybersecur. 6(1): 21 (2023) - Yuting Liu, Yongqiang Li, Huiqin Chen, Mingsheng Wang:
Full-round impossible differential attack on shadow block cipher. Cybersecur. 6(1): 52 (2023) - Jiashuo Liu, Jiongjiong Ren
, Shaozhen Chen:
A deep learning aided differential distinguisher improvement framework with more lightweight and universality. Cybersecur. 6(1): 47 (2023) - Chang Liu
, Yan-Jun Wu, Jing-Zheng Wu, Chen Zhao:
A buffer overflow detection and defense method based on RISC-V instruction set extension. Cybersecur. 6(1): 45 (2023) - Peng Liu, Wenzhe Ye
, Haiying Duan, Xianxian Li, Shuyi Zhang, Chuanjian Yao, Yongnan Li:
Graph neural network based approach to automatically assigning common weakness enumeration identifiers for vulnerabilities. Cybersecur. 6(1): 29 (2023) - Xia Liu, Huan Yang, Li Yang:
Minimizing CNOT-count in quantum circuit of the extended Shor's algorithm for ECDLP. Cybersecur. 6(1): 48 (2023) - Hashida Haidros Rahima Manzil
, S. Manohar Naik
:
Android malware category detection using a novel feature vector-based machine learning model. Cybersecur. 6(1): 6 (2023) - Vikas Maurya
, Rachit Agarwal, Saurabh Kumar, Sandeep K. Shukla:
EPASAD: ellipsoid decision boundary based Process-Aware Stealthy Attack Detector. Cybersecur. 6(1): 28 (2023) - Yisroel Mirsky
:
IPatch: a remote adversarial patch. Cybersecur. 6(1): 18 (2023) - David Concejal Muñoz
, Antonio del Corte-Valiente
:
A novel botnet attack detection for IoT networks based on communication graphs. Cybersecur. 6(1): 33 (2023) - Mir Nazish, M. Tariq Banday
, Insha Syed, Sheena Banday:
An efficient permutation approach for SbPN-based symmetric block ciphers. Cybersecur. 6(1): 42 (2023) - Jean De La Croix Ntivuguruzwa
, Tohari Ahmad
:
A convolutional neural network to detect possible hidden data in spatial domain images. Cybersecur. 6(1): 23 (2023) - Jinglei Pei, Yuyang Shi, Qingling Feng, Ruisheng Shi
, Lina Lan, Shui Yu
, Jinqiao Shi, Zhaofeng Ma:
An efficient confidentiality protection solution for pub/sub system. Cybersecur. 6(1): 34 (2023)