default search action
UbiSec 2022: Zhangjiajie, China
- Guojun Wang, Kim-Kwang Raymond Choo, Jie Wu, Ernesto Damiani:
Ubiquitous Security - Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28-31, 2022, Revised Selected Papers. Communications in Computer and Information Science 1768, Springer 2023, ISBN 978-981-99-0271-2
Cyberspace Security
- Sabrina Friedl, Ludwig Englbrecht, Fabian Böhm, Günther Pernul:
Support Tool Selection in Digital Forensics Training. 3-21 - Michael Tsai, Vimal Kumar:
Listen to the Music: Evaluating the Use of Music in Audio Based Authentication. 22-37 - Wenti Yang, Zhaoyang He, Yalei Li, Haiyan Zhang, Zhitao Guan:
A Hybrid Secure Two-Party Protocol for Vertical Federated Learning. 38-51 - Wanyi Gu, Guojun Wang, Peiqiang Li, Xubin Li, Guangxin Zhai, Xiangbin Li, Mingfei Chen:
Detecting Unknown Vulnerabilities in Smart Contracts with Multi-Label Classification Model Using CNN-BiLSTM. 52-63 - Tiange Zhao, Ulrike Lechner, Maria Pinto-Albuquerque, Ece Ata, Tiago Gasiba:
CATS: A Serious Game in Industry Towards Stronger Cloud Security. 64-82 - Mst. Shapna Akter, Hossain Shahriar, Zakirul Alam Bhuiya:
Automated Vulnerability Detection in Source Code Using Quantum Natural Language Processing. 83-102 - John Carter, Spiros Mancoridis, Malvin Nkomo, Steven Weber, Kapil R. Dandekar:
System Call Processing Using Lightweight NLP for IoT Behavioral Malware Detection. 103-115 - Zhiqiang Wang, Sulong Meng, Ying Chen:
Vulnerability Detection with Representation Learning. 116-128 - Zijing Zhang, Vimal Kumar, Michael Mayo, Albert Bifet:
Assessing Vulnerability from Its Description. 129-143 - Yun Duan, Laifu Wang, Dongxin Liu, Boren Deng, Yunfan Tian:
Malware Traffic Classification Based on GAN and BP Neural Networks. 144-160 - Akram Louati, Tiago Gasiba:
Source Code Vulnerability Detection Using Deep Learning Algorithms for Industrial Applications. 161-178 - Xiangbin Li, Xiaofei Xing, Guojun Wang, Peiqiang Li, Xiangyong Liu:
Detecting Unknown Vulnerabilities in Smart Contracts with Binary Classification Model Using Machine Learning. 179-192 - Nuno Torres, Ana Chaves, César Toscano, Pedro Pinto:
Prototyping the IDS Security Components in the Context of Industry 4.0 - A Textile and Clothing Industry Case Study. 193-206 - Shitao Wang, Wenjun Jiang, Shuhong Chen:
An Aspect-Based Semi-supervised Generative Model for Online Review Spam Detection. 207-219 - Fumin Yu, Feng Gao, Yao Yuan, Xiaofei Xing, Yinglong Dai:
Hierarchical Policies of Subgoals for Safe Deep Reinforcement Learning. 220-232 - Yanbin Weng, Zuochuang Li, Xiaobin Huang, Xiahu Chen:
Improved DeepLabV3+ based Railway Track Extraction to Enhance Railway Transportation Safety. 233-247 - Khalid Hamid, Muhammad Waseem Iqbal, Muhammad Aqeel, Xiangyong Liu, Muhammad Arif:
Analysis of Techniques for Detection and Removal of Zero-Day Attacks (ZDA). 248-262 - Ahmed Sabbah, Adel Taweel, Samer Zein:
Android Malware Detection: A Literature Review. 263-278 - Mohammed Kharma, Adel Taweel:
Threat Modeling in Cloud Computing - A Literature Review. 279-291 - Bo Zheng, Yong Xie:
A New Signal Packing Algorithm for CAN-FD with Security Consideration. 292-303 - Shuqi Liu, Yufeng Zhuang, Xinyu Ma, Hongping Wang, Danni Cao:
An Adversarial Sample Defense Method Based on Saliency Information. 304-318 - Henrique Dias, Nirvana Meratnia:
BlockLearning: A Modular Framework for Blockchain-Based Vertical Federated Learning. 319-333
Cyberspace Privacy
- Guanghui Feng, Wenyin Yang, Tao Peng, Xiaofei Xing, Shuhong Chen, Yuting Li:
An Interactive Query Differential Privacy Protection Model Based on Big Data Analysis. 337-351 - Xiangyong Liu, Pengfei Yin, Pin Liu, Shuhong Chen:
Decentralized Collaborative Filtering Algorithm with Privacy Preserving for Recommendation in Mobile Edge Computing. 352-365 - Mohamad Jamil Al Bouhairi, Mostakim Mullick, Marvin Wolf, Ivan Gudymenko, Sebastian Clauss:
Encryption Proxies in a Confidential Computing Environment. 366-379 - Yuting Li, Guojun Wang, Tao Peng, Guanghui Feng:
FedTA: Locally-Differential Federated Learning with Top-k Mechanism and Adam Optimization. 380-391 - Kai Cheng, Liandong Chen, Huifeng Yang, Dan Luo, Shuai Yuan, Zhitao Guan:
Differentially Private Clustering Algorithm for Mixed Data. 392-405 - Anam Fatima, Muhammad Waseem Iqbal, Muhammad Aqeel, Toqir A. Rana, Shuhong Chen, Muhammad Arif:
Impact of Reenactment Programs on Young Generation. 406-422 - Xiaoqian Ran, Yufeng Zhuang, Hongping Wang, Danni Cao, Yulian Cao, Wenjuan Gu:
Sensor Cloud Data Privacy Protection Model Based on Collaborative Deep Learning. 423-435
Cyberspace Anonymity
- Songlv Feng, Cuina Cheng, Liping Mo:
An Improved Cuckoo Search Algorithm and Its Application in Function Optimization. 439-455 - Xin Qi, Hongling Chen, Qin Liu:
Empirical Likelihood for PLSIM with Missing Response Variables and Error-Prone Covariates. 456-470 - Li Duan, Yong Li:
High-Speed Anonymous Device Authentication Without Asymmetric Cryptography in the Internet-of-Things. 471-484 - Zhenru Huo, Guoqing Jia, Weidong Fang, Wei Chen, Wuxiong Zhang:
A-VMD: Adaptive Variational Mode Decomposition Scheme for Noise Reduction in Sensor-Cloud. 485-496 - Irfan Ali, Muhammad Naeem Shehzad, Qaisar Bashir, Haroon Elahi, Muhammad Naeem Awais, Oana Geman, Pin Liu:
A Thermal-Aware Scheduling Algorithm for Reducing Thermal Risks in DAG-Based Applications in Cyber-Physical Systems. 497-508
Short Papers
- Haiyang Huang, Falong Xiao, Xiaofang Zhang, Wanting Yan, Fumin Liu, Yuezhong Wu:
Garbage Recognition Algorithm Based on Self-attention Mechanism and Deep Sorting. 511-522 - Muntaha Alawneh, Imad M. Abbadi:
Approaches for Zero Trust Adoption Based upon Organization Security Level. 523-533 - Saad Khan, Tariq A. A. Alsboui, Richard Hill, Hussain Al-Aqrabi:
Multi-Mobile Agent Security by Design Itinerary Planning Approach in Wireless Sensor Network. 534-544 - Omar Alshaikh, Simon Parkinson, Saad Khan:
On the Variability in the Application and Measurement of Supervised Machine Learning in Cyber Security. 545-555
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.