default search action
UbiSec 2021: Guangzhou, China
- Guojun Wang, Kim-Kwang Raymond Choo, Ryan K. L. Ko, Yang Xu, Bruno Crispo:
Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers. Communications in Computer and Information Science 1557, Springer 2022, ISBN 978-981-19-0467-7 - Meirong Liu, Hong Zheng, Qin Liu, Xiaofei Xing, Yinglong Dai:
A Backdoor Embedding Method for Backdoor Detection in Deep Neural Networks. 1-12 - Wei Liu, Wenlong Feng, Benguo Yu, Tao Peng:
Security and Privacy for Sharing Electronic Medical Records Based on Blockchain and Federated Learning. 13-24 - Shaobo Zhang, Shuo Yang, Gengming Zhu, Entao Luo, Jiyong Zhang, Desheng Xiang:
A Fine-Grained Access Control Scheme for Electronic Health Records Based on Roles and Attributes. 25-37 - Yuting Tang, Dafang Zhang, Wei Liang, Kuan-Ching Li, Nitin Sukhija:
Active Malicious Accounts Detection with Multimodal Fusion Machine Learning Algorithm. 38-52 - John Carter, Spiros Mancoridis:
Evaluation of an Anomaly Detector for Routers Using Parameterizable Malware in an IoT Ecosystem. 53-65 - Aiswarya S. Nair, Sabu M. Thampi:
PUFloc: PUF and Location Based Hierarchical Mutual Authentication Protocol for Surveillance Drone Networks. 66-89 - Qiang Zhang, Guihua Duan, Shukun Liu:
Smart Search over Encrypted Educational Resources in Cloud Storage. 90-101 - Abigail M. Y. Koay, Miao Xie, Ryan K. L. Ko, Charles Sterner, Taejun Choi, Naipeng Dong:
SDGen: A Scalable, Reproducible and Flexible Approach to Generate Real World Cyber Security Datasets. 102-115 - Wahid Sadique Koly, Abu Kaisar Jamil, Mohammad Shahriar Rahman, Hanif Bhuiyan, Md. Zakirul Alam Bhuiyan, Abdullah Al Omar:
Towards a Location-Aware Blockchain-Based Solution to Distinguish Fake News in Social Media. 116-130 - Shaila Sharmin, Hafizah Mansor, Andi Fitriah Abdul Kadir, Normaziah Abdul Aziz:
Using Streaming Data Algorithm for Intrusion Detection on the Vehicular Controller Area Network. 131-144 - Yuzhu Wang, Peiheng Zhang, Haitao Zhan, Mingwu Zhang:
Privacy-Enhanced Mean-Variance Scheme Against Malicious Signature Attacks in Smart Grids. 145-158 - Peng Yang, Shaohong Zhang, Liu Yang:
Privacy-Preserving Cluster Validity. 159-170 - Andrei-Cristian Iosif, Tiago Espinha Gasiba, Tiange Zhao, Ulrike Lechner, Maria Pinto-Albuquerque:
A Large-Scale Study on the Security Vulnerabilities of Cloud Deployments. 171-188 - Tristan Corrick, Vimal Kumar:
Design and Architecture of Progger 3: A Low-Overhead, Tamper-Proof Provenance System. 189-202 - Jiangchang Cheng, Fumin Yu, Hongliang Zhang, Yinglong Dai:
Skill Reward for Safe Deep Reinforcement Learning. 203-213 - Hossein Keipour, Saptarshi Hazra, Niclas Finne, Thiemo Voigt:
Generalizing Supervised Learning for Intrusion Detection in IoT Mesh Networks. 214-228 - Yipeng Zou, Tao Peng, Wentao Zhong, Kejian Guan, Guojun Wang:
Reliable and Controllable Data Sharing Based on Blockchain. 229-240 - Xuehua Liu, Liping Ding, Tao Zheng, Fang Yu, Zhen Jia, Wang Xiao:
A Network Forensics Investigating Method Based on Weak Consistency for Distributed SDN. 241-254 - Jiaying Lin, Yehua Wei, Wenjia Li, Jing Long:
Intrusion Detection System Based on Deep Neural Network and Incremental Learning for In-Vehicle CAN Networks. 255-267 - Shakil, Muhammad Arif, Shahab Saquib Sohail, Mohammed Talha Alam, Syed Ubaid, Md. Tabrez Nafis, Guojun Wang:
Towards a Two-Tier Architecture for Privacy-Enabled Recommender Systems (PeRS). 268-278 - A. N. M. Bazlur Rashid, Mohiuddin Ahmed, Sheikh Rabiul Islam:
A Supervised Rare Anomaly Detection Technique via Cooperative Co-evolution-Based Feature Selection Using Benchmark UNSW_NB15 Dataset. 279-291 - Ashley Woodiss-Field, Michael N. Johnstone, Paul S. Haskell-Dowland:
Towards Evaluating the Effectiveness of Botnet Detection Techniques. 292-308 - Wenjia Li, Juecong Cai, Zi Wang, Sihua Cheng:
A Robust Malware Detection Approach for Android System Based on Ensemble Learning. 309-321 - Xingshen Wei, Yongjian Cao, Peng Gao, Junxian Xu:
A Reverse Auction Based Efficient D2D Transmission Mechanism for Ubiquitous Power Terminals. 322-335 - Xianggang Zhang, Jing Zeng, Guoyu Wang:
A Fine-Tuning Strategy Based on Real Scenes in Gait Identification. 336-350 - Li Ma, Huihong Yang, Yiming Chai, Jiawen Fan, Wenyin Yang:
An Online Automated Anti-anti-virus Method. 351-362 - Hongling Chen, Zhiwen Liao, Qin Liu:
Research on Bandwidth Reservation Algorithm of Teaching Resources in Cloud Computing Environment. 363-370 - Lei Xu, Dingkun Yang:
An Edge-Cloud Collaborative Object Detection System. 371-378
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.