default search action
3rd FCS 2020: Tianjin, China
- Guangquan Xu, Kaitai Liang, Chunhua Su:
Frontiers in Cyber Security - Third International Conference, FCS 2020, Tianjin, China, November 15-17, 2020, Proceedings. Communications in Computer and Information Science 1286, Springer 2020, ISBN 978-981-15-9738-1
IoT Security
- Mande Xie, Jifei Hu, Haibo Hong:
Blockchain-Based CP-ABE with Publicly Verifiable Outsourced Decryption in IoT. 3-18 - Xudong He, Jian Wang, Jiqiang Liu, Zhen Han, Zhuo Lv, Wei Wang:
DNS Rebinding Detection for Local Internet of Things Devices. 19-29 - Chundong Wang, Chuang Li, Tongle An, Xiaochun Cheng:
Low-Speed Injection Attack Detection on CAN Bus. 30-43 - Yuan Gao, Hequn Xian, Yan Teng:
User Similarity-Aware Data Deduplication Scheme for IoT Applications. 44-52
Artificial Intelligence
- Lixia Xie, Liping Yan, Guangquan Xu, Jiyong Zhang:
Analysis Model of Node Failures and Impact for AANET. 55-64 - Lina Wang, Wenqi Wang, Tong Chen, Jianpeng Ke, Benxiao Tang:
Deep Attention Model with Multiple Features for Rumor Identification. 65-82 - Jiale Zhang, Di Wu, Chengyong Liu, Bing Chen:
Defending Poisoning Attacks in Federated Learning via Adversarial Training Method. 83-94 - Xiaomeng Wang, Zhibin Guan, Wei Xin, Jiajie Wang:
Multi-type Source Code Defect Detection Based on TextCNN. 95-103 - Lu Bing, Yudong Li, Wen Si:
Noninvasive Research on Cardiac Electrical Activity by Non-Gaussian Prior Bayesian Matching Pursuit. 104-110 - Jun Xing, Guangquan Xu, Chengbo Yin:
Video Investigation Analysis System Enhanced by Explicable Model. 111-117
Blockchain
- Rong Tan, Yudong Li, Jing Zhang, Wen Si:
Application of Blockchain Technology to the Credit Management of Supply Chain. 121-132 - Fang Peng, Hui Tian, Hanyu Quan, Jing Lu:
Data Auditing for the Internet of Things Environments Leveraging Smart Contract. 133-149 - Haibo Tian, Huizhi Lin, Fangguo Zhang:
Design a Proof of Stake Based Directed Acyclic Graph Chain. 150-165 - Jing Zhang, Rong Tan, Yudong Li:
Design of Personal Credit Information Sharing Platform Based on Consortium Blockchain. 166-177 - Zhenyu Li, Yujue Wang, Sheng Wen, Yong Ding:
Evil Chaincode: APT Attacks Based on Smart Contract. 178-196 - Wei-Yang Chiu, Weizhi Meng, Christian Damsgaard Jensen:
NoPKI - a Point-to-Point Trusted Third Party Service Based on Blockchain Consensus Algorithm. 197-214 - Zhijie Zhang, Lejun Zhang, Waqas Rasheed, Zilong Jin, Tinghuai Ma, Huiling Chen, Guangquan Xu:
The Research on Covert Communication Model Based on Blockchain: A Case Study of Ethereum's Whisper Protocol. 215-230
Cyber-Physical Systems Security
- Gangting Liu, Jianhong Lin, Yifan Ding, Shihong Yang, Yunhua Xu:
A New Face Detection Framework Based on Adaptive Cascaded Network. 233-242 - Chenkai Tan, Zhengjun Jing, Shaoyi Bei:
Atomic Cross-Chain Swap-Based Decentralized Management System in Vehicular Networks. 243-253 - Yuming Fan, Kaiyuan Tian, Xuyu Wang, Zhuo Lv, Jian Wang:
Detecting Intrusions in Railway Signal Safety Data Networks with DBSCAN-ARIMA. 254-270 - Changqi Zhang, Jiang Yu, Yudong Li, Wen Si:
Dynamic Trajectory for Visual Perception of Abnormal Behavior. 271-282 - Hongyu Yang, Yuhao Feng, Guangquan Xu, Jiyong Zhang:
Fuzzy Petri Nets Based Information System Security Situation Assessment Model. 283-293 - Hao Peng, Can Liu, Dandan Zhao, Zhaolong Hu, Jianmin Han:
Invulnerability of Heterogeneous CPFS Under Different Intranal Border-adding Strategies. 294-304 - Hao Peng, Can Liu, Dandan Zhao, Jianmin Han, Zhonglong Zheng:
Robustness Enhancement Analysis of CPS Systems Under the Swapping Strategies Between Different Networks. 305-314 - Hao Peng, Zhen Qian, Zhe Kan, Hongxia Ye, Zian Fang, Dandan Zhao:
Security Assessment for Cascading Failures of Cyber-Physical Systems Under Target Attack Strategy. 315-327
Cryptography
- Chunhua Jin, Ge Kan, Guanhua Chen, Changhui Yu, Chengjie Xu:
Heterogeneous Deniable Authenticated Encryption Protocol. 331-346 - Han Wang, Xu An Wang, Jiasen Liu, Chuan Lin:
Identify-Based Outsourcing Data Auditing Scheme with Lattice. 347-358
Database Security
- Zhen Gao, Dongbin Zhang, Jiuzhi Zhang:
A Security Problem Caused by the State Database in Hyperledger Fabric. 361-372 - Xueling Zhu, Huaping Hu, Shaojing Fu, Qing Wu, Bo Liu:
Efficient Boolean SSE: A Novel Encrypted Database (EDB). 373-387 - Xuren Wang, Zhou Fang, Dong Wang, Anran Feng, Qiuyun Wang:
Research on Database Anomaly Access Detection Based on User Profile Construction. 388-399
Depth Estimation
- Chao Zhou, Qian Zhang, Bin Wang, Yunzhang Du, Tao Yan, Wen Si:
An Effective Occlusion Edge Prediction Method in Light Field Depth Estimation. 403-416
Mobile Security
- Naitian Hu, Xingkong Ma, Fuqiang Lin, Bo Liu, Tong Lu:
DexFus: An Android Obfuscation Technique Based on Dalvik Bytecode Translation. 419-431 - Yonghao Gu, Liangxun Li, Yong Zhang:
Robust Android Malware Detection Based on Attributed Heterogenous Graph Embedding. 432-446
Network Security
- Yong Ma, Yang Hu, Chang Cai:
A Network Traffic Classification Method Based on Hierarchical Clustering. 449-458 - Xianliang Jiang, Jiahua Zhu, Guang Jin:
DPC: A Delay-Driven Prioritized TCP Congestion Control Algorithm for Data Center Networks. 459-474 - Li Su, Meiling Chen, Wei Li, Peng Ran, Yang Sun:
SA Dots: A Sensitive and Self-adaptable Framework for Cross-Region DDoS Processing. 475-488
Privacy
- Yanan Cheng, Han Wang, Zhaoxin Zhang, Ning Li:
Characterizing the Security Threats of Disposable Phone Numbers. 491-507 - Wenlong Dun, Youwen Zhu:
Efficient Discrete Distribution Estimation Schemes Under Local Differential Privacy. 508-523 - Shiyin Yang, Yongbiao Li, Dehua Zhou, Linfeng Wei, Qingqing Gan:
Privacy Prediction of Lightweight Convolutional Neural Network. 524-537 - Shaopeng Liang, Haomiao Yang, Qixian Zhou, Minglu Zhang:
Privacy-Preserving and Outsourced Density Peaks Clustering Algorithm. 538-552 - Feras N. Al-Obeidat, Anoud Bani-Hani, Oluwasegun A. Adedugbe, Munir Majdalawieh, Elhadj Benkhelifa:
The Socio-economic Impacts of Social Media Privacy and Security Challenges. 553-563
Program Analysis
- Yukun Dong, Li Zhang, Shanchen Pang, Hao Liu, Wenjing Yin, Mengying Wu, Meng Wu, Haojie Li:
Automatic Repair of Semantic Defects Using Restraint Mechanisms. 567-583 - Zhibin Guan, Xiaomeng Wang, Wei Xin, Jiajie Wang:
Code Property Graph-Based Vulnerability Dataset Generation for Source Code Detection. 584-591
Quantum Cryptography
- Dan-Li Zhi, Zhi-Hui Li, Li-Juan Liu, Zhao-Wei Han:
A Hybrid Quantum Secret Sharing Scheme Based on Mutually Unbiased Bases. 595-607
Steganography
- Kymbat Taalaibekova, Xianjin Fang, Zhifeng Xu:
A Novel Method to Improve Security and Imperceptibility of Image Steganography. 611-627 - Jiang Yu, Changqi Zhang, Yudong Li, Wen Si:
Multi-resolution Steganalysis of JPEG Images Using the Contrast of DCT Coefficients. 628-640
Web Security
- Lixia Xie, Huiyu Ni, Guangquan Xu, Jiyong Zhang:
A Key Business Node Identification Model for Business Process Based on AE-VIKOR Method. 643-653 - Yichao Zang, Tairan Hu, Rongrong Cao, Junhu Zhu:
An Adaptive Utility Quantification Strategy for Penetration Semantic Knowledge Mining. 654-666 - Wenzhuang Kang, Shangping Zhong, Kaizhi Chen, Jianhua Lai, Guangquan Xu:
RF-AdaCost: WebShell Detection Method that Combines Statistical Features and Opcode. 667-682
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.