default search action
DSC 2019: Hangzhou, China
- 2019 IEEE Conference on Dependable and Secure Computing, DSC 2019, Hangzhou, China, November 18-20, 2019. IEEE 2019, ISBN 978-1-7281-2319-6
- Yiran Zhang, Fan Zhang, Bolin Yang, Guorui Xu, Bin Shao, Xinjie Zhao, Kui Ren:
Persistent Fault Injection in FPGA via BRAM Modification. 1-6 - Jiasheng Li, Zijian Zhang, Meng Li:
BanFEL: A Blockchain Based Smart Contract for Fair and Efficient Lottery Scheme. 1-8 - Jingyi Zhang, Qiao Hu, Gerhard Petrus Hancke:
Correlation-Based Search against Friendly Jamming Data Exchange Schemes. 1-8 - Le Tong, Jia Yu, Hanlin Zhang:
Secure Outsourcing Algorithm for Bilinear Pairings without Pre-Computation. 1-7 - Ziqi Yang:
Fidelity: Towards Measuring the Trustworthiness of Neural Network Classification. 1-8 - Jinchun Choi, Ahmed Abusnaina, Afsah Anwar, An Wang, Songqing Chen, DaeHun Nyang, Aziz Mohaisen:
Honor among Thieves: Towards Understanding the Dynamics and Interdependencies in IoT Botnets. 1-8 - Baicheng Chen, Kun Woo Cho, Chenhan Xu, Feng Lin, Zhanpeng Jin, Wenyao Xu:
Exploiting Mallows Distance to Quantify EEG Distribution for Personal Identification. 1-8 - Chun-Han Lin, Shan-Hsin Lee, Hsiu-Chuan Huang, Chi-Wei Wang, Chia-Wei Hsu, Shiuh-Pyng Shieh:
DT-Track: Using DNS-Timing Side Channel for Mobile User Tracking. 1-8 - Hao Wu, Zheng Qin, Xuejin Tian, Edward Sun, Fengyuan Xu, Sheng Zhong:
Broken Relationship of Mobile User Intentions and Permission Control of Shared System Resources. 1-8 - Mingli Wu, Tsz Hon Yuen:
Securely Perturb Big Data by using Inner Product. 1-8 - Yongdong Wu, Jian Weng, Bo Qiu, Zhuo Wei, Fan Qian, Robert H. Deng:
Random Delay Attack and Its Applications on Load Frequency Control of Power Systems. 1-8 - Huy Quoc Le, Willy Susilo, Thanh Xuan Khuc, Minh Kim Bui, Dung Hoang Duong:
A Blind Signature from Module Latices. 1-8 - Shengmin Xu, Jiaming Yuan, Yingjiu Li, Ximeng Liu, Yinghui Zhang:
Super Payment Channel for Decentralized Cryptocurrencies. 1-8 - Jing Yao, Helei Cui, Xiaolin Gui:
Secure Boolean Queries over Encrypted Data from Indistinguishability Obfuscation. 1-8 - Isabelle Choi, Qiyang Song, Kun Sun:
Federated-Cloud Based Deep Neural Networks with Privacy Preserving Image Filtering Techniques. 1-8 - Nasser Alsalami, Bingsheng Zhang:
Utilizing Public Blockchains for Censorship-Circumvention and IoT Communication. 1-7 - Suryadipta Majumdar, Azadeh Tabiban, Meisam Mohammady, Alaa Oqaily, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
Multi-Level Proactive Security Auditing for Clouds. 1-8 - Xiuming Liu, Edith Cheuk-Han Ngai:
Gaussian Process Learning for Distributed Sensor Networks under False Data Injection Attacks. 1-6 - Jixin Zhang, Mohammad Faham Khan, Xiaodong Lin, Zheng Qin:
An Optimized Positive-Unlabeled Learning Method for Detecting a Large Scale of Malware Variants. 1-8 - Ya Xiao, Qingying Hao, Danfeng Daphne Yao:
Neural Cryptanalysis: Metrics, Methodology, and Applications in CPS Ciphers. 1-8 - Tao Jiang, Xu Yuan:
Traceable Private Set Intersection in Cloud Computing. 1-7 - Majid Salehi, Danny Hughes, Bruno Crispo:
MicroGuard: Securing Bare-Metal Microcontrollers against Code-Reuse Attacks. 1-8 - Ahmed Abusnaina, Aminollah Khormali, DaeHun Nyang, Murat Yuksel, Aziz Mohaisen:
Examining the Robustness of Learning-Based DDoS Detection in Software Defined Networks. 1-8 - Xuhua Bao, Xiaokun Zhang, Jingqiang Lin, Dawei Chu, Qiongxiao Wang, Fengjun Li:
Towards the Trust-Enhancements of Single Sign-On Services. 1-8 - Nasser Alsalami, Bingsheng Zhang:
SoK: A Systematic Study of Anonymity in Cryptocurrencies. 1-9 - Guoxing Chen, Mengyuan Li, Fengwei Zhang, Yinqian Zhang:
Defeating Speculative-Execution Attacks on SGX with HyperRace. 1-8 - Tieming Geng, Hatim Alsuwat, Chin-Tser Huang, Csilla Farkas:
Securing Relational Database Storage with Attribute Association Aware Shuffling. 1-8 - Ahmad Alagil, Yao Liu:
Randomized Positioning DSSS with Message Shuffling for Anti-Jamming Wireless Communications. 1-8 - Jianfei Sun, Hu Xiong, Robert H. Deng, Yinghui Zhang, Ximeng Liu, Mingsheng Cao:
Lightweight Attribute-Based Keyword Search with Policy Protection for Cloud-Assisted IoT. 1-8 - Samiran Bag, Feng Hao:
E2E Verifiable Electronic Voting System for Shareholders. 1-8 - Baole Wei, Min Yu, Kai Chen, Jianguo Jiang:
Deep-BIF: Blind Image Forensics Based on Deep Learning. 1-6 - Sultan Alasmari, Weichao Wang, Tuanfa Qin, Yu Wang:
Proof of Encryption: Enforcement of Security Service Level Agreement for Encryption Outsourcing. 1-8 - Xingliang Yuan, Chengjun Cai, Qian Wang, Qi Li:
Towards a Ledger-Assisted Architecture for Secure Query Processing over Distributed IoT Data. 1-8
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.