- Zuquan Liu, Guopu Zhu
, Yu Zhang, Hongli Zhang, Sam Kwong:
An efficient cheating-detectable secret image sharing scheme with smaller share sizes. J. Inf. Secur. Appl. 81: 103709 (2024) - Giacomo Longo
, Francesco Lupia
, Andrea Pugliese
, Enrico Russo
:
Physics-aware targeted attacks against maritime industrial control systems. J. Inf. Secur. Appl. 82: 103724 (2024) - Caio C. Moreira
, Davi C. Moreira, Claudomiro Sales:
A comprehensive analysis combining structural features for detection of new ransomware families. J. Inf. Secur. Appl. 81: 103716 (2024) - Ye Peng, Qi Yu, Guobin Fu, Wenwen Zhang, Chaofan Duan:
Improving the robustness of steganalysis in the adversarial environment with Generative Adversarial Network. J. Inf. Secur. Appl. 82: 103743 (2024) - Diana-Elena Petrean
, Rodica Potolea
:
Homomorphic encrypted Yara rules evaluation. J. Inf. Secur. Appl. 82: 103738 (2024) - Komal Pursharthi
, Dheerendra Mishra:
Towards post-quantum authenticated key agreement scheme for mobile devices. J. Inf. Secur. Appl. 82: 103754 (2024) - Jianxiang Qi, Ning Zheng, Ming Xu
, Ping Chen, Wenqiang Li:
A hybrid-trust-based emergency message dissemination model for vehicular ad hoc networks. J. Inf. Secur. Appl. 81: 103699 (2024) - Tiewei Qin, Bingwen Feng
, Bing Chen, Zecheng Peng, Zhihua Xia, Wei Lu:
Moiré pattern generation-based image steganography. J. Inf. Secur. Appl. 82: 103753 (2024) - Mobashshirur Rahman, Anita Murmu, Piyush Kumar, Nageswara Rao Moparthi, Suyel Namasudra
:
A novel compression-based 2D-chaotic sine map for enhancing privacy and security of biometric identification systems. J. Inf. Secur. Appl. 80: 103677 (2024) - Payel Sadhukhan
, Labani Halder
, Sarbani Palit:
Approximate DBSCAN on obfuscated data. J. Inf. Secur. Appl. 80: 103664 (2024) - Ankit Kumar Saini, Samayveer Singh:
HSB based reversible data hiding using sorting and pairwise expansion. J. Inf. Secur. Appl. 80: 103663 (2024) - Janaka Senanayake
, Harsha Kalutarage
, Andrei Petrovski
, Luca Piras
, M. Omar Al-Kadri
:
Defendroid: Real-time Android code vulnerability detection via blockchain federated neural network with XAI. J. Inf. Secur. Appl. 82: 103741 (2024) - Shreyansh Sharma
, Anil K. Saini, Santanu Chaudhury:
Multimodal biometric user authentication using improved decentralized fuzzy vault scheme based on Blockchain network. J. Inf. Secur. Appl. 82: 103740 (2024) - Dongsu Shen
, Yijian Song, Yuan Lu
, Saiqin Long, Shujuan Tian:
Neural differential distinguishers for GIFT-128 and ASCON. J. Inf. Secur. Appl. 82: 103758 (2024) - Jiali Shi
, Guoqiang Liu
, Chao Li
, Ting Fan
:
Improved (related-key) differential cryptanalysis on LBlock. J. Inf. Secur. Appl. 82: 103737 (2024) - Danial Shiraly, Ziba Eslami
, Nasrollah Pakniat:
Certificate-based authenticated encryption with keyword search: Enhanced security model and a concrete construction for Internet of Things. J. Inf. Secur. Appl. 80: 103683 (2024) - Daniil Sigalov
, Dennis Gamayunov:
Dead or alive: Discovering server HTTP endpoints in both reachable and dead client-side code. J. Inf. Secur. Appl. 82: 103746 (2024) - Diego Soi
, Alessandro Sanna
, Davide Maiorca
, Giorgio Giacinto
:
Enhancing android malware detection explainability through function call graph APIs. J. Inf. Secur. Appl. 80: 103691 (2024) - Wei Song
, Chong Fu, Yu Zheng
, Yanfeng Zhang, Junxin Chen
, Peipei Wang:
Batch image encryption using cross image permutation and diffusion. J. Inf. Secur. Appl. 80: 103686 (2024) - Junwei Tang
, Wei Xu, Tao Peng, Sijie Zhou, Qiaosen Pi, Ruhan He, Xinrong Hu:
Android malware detection based on a novel mixed bytecode image combined with attention mechanism. J. Inf. Secur. Appl. 82: 103721 (2024) - Saher Tegane, Khaled Hamouid, Mawloud Omar, Fouzi Semchedine, Abdelmalek Boudries:
Corrigendum to "An extended Attribute-based access control with controlled delegation in IoT" [Journal of Information Systems and Applications 76 (2023) 103473]. J. Inf. Secur. Appl. 82: 103747 (2024) - Risto Vaarandi
, Alejandro Guerra-Manzanares
:
Network IDS alert classification with active learning techniques. J. Inf. Secur. Appl. 81: 103687 (2024) - Sirintra Vaiwsri
, Thilina Ranbaduge
, Peter Christen
:
Encryption-based sub-string matching for privacy-preserving record linkage. J. Inf. Secur. Appl. 81: 103712 (2024) - Huifen Wang, Dong Guo
, Jinrui Wei, Jinze Li:
A method of classifying IoT devices based on attack sensitivity. J. Inf. Secur. Appl. 82: 103751 (2024) - Jinwei Wang
, Wanyun Huang, Jiawei Zhang, Xiangyang Luo, Bin Ma:
Adversarial watermark: A robust and reliable watermark against removal. J. Inf. Secur. Appl. 82: 103750 (2024) - Benxuan Wang
, Kwok-Tung Lo
:
Autoencoder-based joint image compression and encryption. J. Inf. Secur. Appl. 80: 103680 (2024) - Wiraj Udara Wickramaarachchi
, Dongdong Zhao, Junwei Zhou, Jianwen Xiang:
An effective iris biometric privacy protection scheme with renewability. J. Inf. Secur. Appl. 80: 103684 (2024) - Kuan-Wai Wong
, Wun-She Yap
, Bok-Min Goi
, Denis Chee-Keong Wong, Guodong Ye
:
Cryptanalysis of an image encryption scheme based on two-point diffusion strategy and Henon map. J. Inf. Secur. Appl. 81: 103692 (2024) - Yuexin Xiang
, Tiantian Li, Wei Ren, Jie He, Tianqing Zhu, Kim-Kwang Raymond Choo:
AdvEWM: Generating image adversarial examples by embedding digital watermarks. J. Inf. Secur. Appl. 80: 103662 (2024) - Hairuo Xu, Tao Shu:
Attack-model-agnostic defense against model poisonings in distributed learning. J. Inf. Secur. Appl. 82: 103739 (2024)