default search action
13th SpaCCS 2020: Nanjing, China
- Guojun Wang, Bing Chen, Wei Li, Roberto Di Pietro, Xuefeng Yan, Hao Han:
Security, Privacy, and Anonymity in Computation, Communication, and Storage - 13th International Conference, SpaCCS 2020, Nanjing, China, December 18-20, 2020, Proceedings. Lecture Notes in Computer Science 12382, Springer 2021, ISBN 978-3-030-68850-9 - Min Xiao, Zhongyue Ma, Tao Li:
Privacy-Preserving and Scalable Data Access Control Based on Self-sovereign Identity Management in Large-Scale Cloud Storage. 1-18 - Jinyin Chen, Xueke Wang, Yan Zhang, Haibin Zheng, Shouling Ji:
Attention Mechanism Based Adversarial Attack Against Deep Reinforcement Learning. 19-43 - Xinyu Song, Zhan Zhou, Weijie Duan, Zhongyi Liu, Chungen Xu:
Attribute-Based Searchable Encryption Scheme with Fuzzy Keywords. 44-61 - Yu Zhu, Zongfei Li, Fengyuan Xu, Sheng Zhong:
Improving Deep Neural Network Robustness with Siamese Empowered Adversarial Training. 62-75 - Zitong Li, Xiang Cheng, Jiale Zhang, Bing Chen:
Predicting Advanced Persistent Threats for IoT Systems Based on Federated Learning. 76-89 - Chenyu Zhao, Hao Han:
DFspliter: Data Flow Oriented Program Partitioning Against Data Stitching Attacks. 90-103 - Ziyan Fang, Weijun Zhang, Zongfei Li, Huaao Tang, Hao Han, Fengyuan Xu:
Revisiting Attacks and Defenses in Connected and Autonomous Vehicles. 104-117 - Wei Peng, Shang Song, Wenzheng Liu:
An Improved Cryptanalysis Algorithm for Chebyshev Map-Based Discrete Logarithm Problem. 118-130 - Ze Liu:
Reinforcement-Learning Based Network Intrusion Detection with Human Interaction in the Loop. 131-144 - Zhengdong Cui, Feng Xu:
Research on Security of Access Control for Cloud Computing Environment. 145-158 - Panfei Liu, Feng Xu, Ying Zhu:
Research and Development of Privacy Protection of WSN Routing Protocol. 159-172 - Vincent C. Hu:
Apply Quantum Search to the Safety Check for Mono Operational Attribute Based Protection Systems. 173-187 - Xiangtong Du, Yongzhong Li, Zunlei Feng:
A Semi-supervised Intrusion Detection Algorithm Based on Auto-encoder. 188-199 - Pengfei Guo, Yingjian Yan, Chunsheng Zhu, Junjie Wang:
Research on Arm TrustZone and Understanding the Security Vulnerability in Its Cache Architecture. 200-213 - Ha Xuan Son, Hai Trieu Le, Tan Tai Phan, Hung Nguyen Duc Huy, Hong Khanh Vo, Nghia Duong-Trung:
Scrutinizing Trust and Transparency in Cash on Delivery Systems. 214-227 - Cheng Chi Qin, Tan Saw Chin, Ching Kwang Lee, Zulfadzli Yusoff, Rizaluddin Kaspin:
Expansion Adaptation of Attack-Aware Controller-Link-Switch Cost Minimization Placement in Software-Defined Networking. 228-240 - Fengpan Zhao, Yan Huang, Saide Zhu, Venkata Malladi, Yubao Wu:
A Weighted Federated Averaging Framework to Reduce the Negative Influence from the Dishonest Users. 241-250 - Wei-Yang Chiu, Weizhi Meng, Wenjuan Li:
I Can Think Like You! Towards Reaction Spoofing Attack on Brainwave-Based Authentication. 251-265 - Hongwei Luo, Wanyi Feng, Baolin Sun, Ying Song:
Cubic Permutation Polynomials-Based Block RLNC Algorithm in Wireless Networks. 266-275 - Seyedvalyallah Ayobi, Yongli Wang, Mahdi Rabbani, Ali Dorri, Hamed Jelodar, Hucheng Huang, Siamak Yarmohammadi:
A Lightweight Blockchain-Based Trust Model for Smart Vehicles in VANETs. 276-289 - Gaofei Sun, Xiaoshuang Xing, Zhenjiang Qian, Zhiguo Wang, Saide Zhu:
Light Intensity Based IoT Device Positioning for Indoor Monitoring. 290-300 - Gongzhe Qiao, Yi Zhuang:
A Blockchain-Based Reconstruction Framework for UAV Network. 301-311 - Yihong Wen, Yi Yang, Shicheng Wang, Li Li, Min Luo:
A New Certificateless Aggregate Signature Scheme for Wireless Sensor Networks. 312-330 - Muhammad Shakeel Faridi, Saqib Ali, Guihua Duan, Guojun Wang:
Blockchain and IoT Based Textile Manufacturing Traceability System in Industry 4.0. 331-344 - Sai Lu, Yi Zhuang:
A Network Security Situational Awareness Framework Based on Situation Fusion. 345-355 - Songpeng Zhang, Yi Zhuang, Zining Cao:
Intelligent Medical Security Framework of Body Area Network Based on Fog Computing. 356-366 - Ruili Yang, Jiageng Chen, Shangle Li:
Secure and Traceable Attribute-Based Sequential Aggregate Signature. 367-381 - Shupeng Li, F. Jiang, Yunbai Qin, Kunkun Zheng:
Social Spammer Detection Based on PSO-CatBoost. 382-395 - Muhammad Zubair Baloch, Shahid Hussain, Humaira Afzal, Muhammad Rafiq Mufti, Bashir Ahmad:
Software Developer Recommendation in Terms of Reducing Bug Tossing Length. 396-407 - Khudema Zahra, Shahid Hussain, Humaira Afzal, Muhammad Rafiq Mufti, Dost Muhammad Khan, Mohammad Khalid Sohail:
A Methodology to Automate the Security Patterns Selection. 408-419
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.