default search action
CSS 2019: Guangzhou, China - Part II
- Jaideep Vaidya, Xiao Zhang, Jin Li:
Cyberspace Safety and Security - 11th International Symposium, CSS 2019, Guangzhou, China, December 1-3, 2019, Proceedings, Part II. Lecture Notes in Computer Science 11983, Springer 2019, ISBN 978-3-030-37351-1
Network Security
- Yinqi Yang, Jian Wang, Baoqin Zhai, Jiqiang Liu:
IoT-Based DDoS Attack Detection and Mitigation Using the Edge of SDN. 3-17 - Xianglin Wei, Chaogang Tang:
Location Consistency-Based MITM Attack Detection in 802.11ad Networks. 18-29 - Yifu Liu, Jieren Cheng, Xiangyan Tang, Mengyang Li, Luyi Xie:
Multi-view DDoS Network Flow Feature Extraction Method via Convolutional Neural Network. 30-41 - Xiangyan Tang, Rui Cao, Jieren Cheng, Dong Fan, Wenxuan Tu:
DDoS Attack Detection Method Based on V-Support Vector Machine. 42-56 - Xiangyan Tang, Yiyang Zhang, Jieren Cheng, Jinying Xu, Hui Li:
DDOS Multivariate Information Fusion Model Based on Hierarchical Representation Learning. 57-66 - Mengying Wu, Zhendong Wu, Hao Lv, Jingjing Wang:
A Method of Malicious Bot Traffic Detection. 67-76 - Xiaochun Cheng, Matus Mihok:
Intrusion Detection Traps within Live Network Environment. 77-89
System Security
- Xueshuo Xie, Zongming Jin, Qingqi Han, Shenwei Huang, Tao Li:
A Confidence-Guided Anomaly Detection Approach Jointly Using Multiple Machine Learning Algorithms. 93-100 - Xinxin Wang, Yuanzhang Li, Quanxin Zhang, Xiaohui Kuang:
Boosting Training for PDF Malware Classifier via Active Learning. 101-110 - John Mark Andah, Jinfu Chen:
Malicious Intentions: Android Internet Permission Security Risks. 111-120 - Xiaohui Kuang, Ming Zhang, Hu Li, Gang Zhao, Huayang Cao, Zhendong Wu, Xianmin Wang:
DeepWAF: Detecting Web Attacks Based on CNN and LSTM Models. 121-136 - Jingjing Wang, Zhendong Wu, Zhang Zhang:
Research on Intrusion Detection Based on Semantic Re-encoding and Multi-space Projection. 137-150 - Mengtian Cui, Yameng Huang, Jing Luo:
Software Defect Prediction Model Based on GA-BP Algorithm. 151-161 - Bahast Ali, Xiaochun Cheng:
Security Solution Based on Raspberry PI and IoT. 162-171
Information Security
- Haojia Zhu, Can Cui, Fengyin Li, Zhongxing Liu, Quanxin Zhang:
Design of Anonymous Communication Protocol Based on Group Signature. 175-181 - Chen Wang, Andi Wang, Xinyu Liu, Jian Xu:
Research on K-Means Clustering Algorithm Over Encrypted Data. 182-191 - Wang Yao, Faguo Wu, Xiao Zhang:
Requester-Centric CP-ABE Combining Removing Escrow and Outsourcing Decryption. 192-204 - Xiaohan Yue, Mingju Sun, Xibo Wang, Hong Shao, Yuan He:
An Efficient Dynamic Group Signatures Scheme with CCA-Anonymity in Standard Model. 205-219 - Xiaohan Yue, Xin Wang, Xibo Wang, Wencheng Cui, Yuan He:
An Efficient Property-Based Authentication Scheme in the Standard Model. 220-233 - Ping Li, Jin Li, Alzubair Hassan:
Group Identification via Non-threshold Leakage-Resilient Secret Sharing Scheme. 234-241 - Pengtao Liu:
A Standard Model Secure Verifiably Encrypted Signature Scheme Based on Dual System. 242-252 - Yiming Qin, Xinchun Cui, Yuefan Wang, Hong Qiao, Shancang Li:
Lightweight Encryption Algorithm Containing SPN Structure for IoT. 253-262 - Jilin Yang, Chunjie Cao, Jun Zhang, Jixin Ma, Xiaoyi Zhou:
A Blind Watermarking Scheme Using Adaptive Neuro-Fuzzy Inference System Optimized by BP Network and LS Learning Model. 263-274 - Chuan Zhao, Shengnan Zhao, Bo Zhang, Shan Jing, Zhenxiang Chen, Minghao Zhao:
Towards Secure Computation of Similar Patient Query on Genomic Data Under Multiple Keys. 275-284 - Ping Li, Jin Li:
Secure and Dynamic Outsourcing Computation of Machine Learning in Cloud Computing. 285-292 - Hua Yang, Zhendong Wu:
A Biometric Key Generation Method for Fingerprint and Finger Vein Fusion. 293-300 - Yaoping Wu, Zhendong Wu, Hua Yang:
A Fingerprint and Voiceprint Fusion Identity Authentication Method. 301-310
Trust and Privacy
- Rui Ge, Ying Zheng, Fengyin Li, Dongfeng Wang, Yuanzhang Li:
Research and Application of Trusted Service Evaluation Model in Social Network. 313-317 - Wantong Zheng, Yong Ma, Zhongyue Wang, Chunfu Jia, Peng Li:
Effective L-Diversity Anonymization Algorithm Based on Improved Clustering. 318-329 - Yonglu Wang, Kaizhong Zuo, Rui Liu, Liangmin Guo:
Semantic Location Privacy Protection Based on Privacy Preference for Road Network. 330-342 - Zhaohui Wei, Qingqi Pei, Xuefeng Liu, Lichuan Ma:
Efficient Privacy Preserving Cross-Datasets Collaborative Outlier Detection. 343-356 - Weifeng Sun, MingHan Jia, Shumiao Yu, Boxiang Dong, Xinyi Li:
An SVM Based Secural Image Steganography Algorithm for IoT. 357-371 - Baochang Zhang, Juan Li, Xi Zheng, Jingjun Ge, Juan Sun:
A Blockchain-Based Mobile IOT Network Interconnection Security Trusted Protocol Model. 372-381 - Zhenhua Liu, Yan Liu, Jing Xu, Baocang Wang:
Privacy-Preserving Attribute-Based Multi-keyword Search Encryption Scheme with User Tracing. 382-397
Authentication
- Wei Li, Nan Li:
Facial Localization Based on Skin Color Modeling. 401-408 - Shudi Chen, Youwen Zhu:
A Textual Password Entry Method Resistant to Human Shoulder-Surfing Attack. 409-420 - Haojun Ai, Wuyang Xia, Quanxin Zhang:
Speaker Recognition Based on Lightweight Neural Network for Smart Home Solutions. 421-431 - Fan Wang, Zheng Qin, Hui Yin:
A Fine-Grained Authorized Keyword Secure Search Scheme in the Cloud Computing. 432-447 - Xiaochun Cheng, Andreas Pitziolis, Aboubaker Lasebae:
Implementing Fingerprint Recognition on One-Time Password Device to Enhance User Authentication. 448-461 - Tingting Lan, Hui Wang, Lin You:
A Secure Authentication Scheme Based on Chen's Chaotic System and Finger Vein's Auxiliary Data. 462-476
Machine Learning and Security
- Juan Wang, Guanghui Li, Fei Du, Meng Wang, Yong Hu, Meng Yu, Aiyun Zhan, Yuejin Zhang:
Image Denoising Based on Sparse Representation over Learned Dictionaries. 479-486 - Di Jiang, Hui Liu, Qiang Guo, Caiming Zhang:
Cyclic DenseNet for Tumor Detection and Identification. 487-493 - Xin Liu, Hui Liu, Qiang Guo, Caiming Zhang:
Stock Prediction Model Based on Wavelet Packet Transform and Improved Neural Network. 494-500 - Guoyu Yang, Yilei Wang, Banghai Xu, Xiaofeng Zhang:
An Image Denoising Algorithm Based on Singular Value Decomposition and Non-local Self-similarity. 501-510 - Jiaji Pan, Jingkang Yang, Yining Liu:
Dummy Trajectory Generation Scheme Based on Deep Learning. 511-523 - Xiaolu Wang, Zhi Wang, Wei Shao, Chunfu Jia, Xiang Li:
Explaining Concept Drift of Deep Learning Models. 524-534 - Liyuan Liu, Lifeng Zhang, Shixiang Jia:
Attention Bilinear Pooling for Fine-Grained Facial Expression Recognition. 535-542
Cyberspace Safety
- Yuejin Zhang, Fei Du, Meng Wang, Juan Wang, Yong Hu, Meng Yu, Guanghui Li, Aiyun Zhan:
A Secure Collision Avoidance Warning Algorithm Based on Environmental Characteristics and Driver Characteristics. 545-552 - Aiyun Zhan, Meng Wang, Juan Wang, Fei Du, Yong Hu, Meng Yu, Guanghui Li, Yuejin Zhang:
Research on Safety Early Warning Transmission Control Algorithm Based on Driving Stability. 553-561 - Yu-an Zhang, Xiaofeng Qin, Minghao Zhao, Meiyun Du, Rende Song:
Body-Weight Estimation of Plateau Yak with Simple Dimensional Measurement. 562-571 - Wei Li, Zhilin Song:
Bank Card Number Identification Based on Template Matching Method. 572-578 - Xiangyan Tang, Meizhu Chen, Jieren Cheng, Jinying Xu, Hui Li:
A Security Situation Assessment Method Based on Neural Network. 579-587 - Lei Shi, Xiao Chen, Sheng Wen, Yang Xiang:
Main Enabling Technologies in Industry 4.0 and Cybersecurity Threats. 588-597
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.