1939-0114
Volume 2020, 2020
Wearable Sensor-Based Human Activity Recognition Using Hybrid Deep Learning Techniques.

Huaijun Wang Jing Zhao Junhuai Li Ling Tian Pengjia Tu Ting Cao Yang An Kan Wang Shancang Li

Evaluating Security of Internet of Medical Things Using the Analytic Network Process Method.

Xucheng Huang Shah Nazir

SLAM: A Malware Detection Method Based on Sliding Local Attention Mechanism.

Jun Chen Shize Guo Xin Ma Haiying Li Jinhong Guo Ming Chen Zhisong Pan

Artificial Intelligence for Securing IoT Services in Edge Computing: A Survey.

Zhanyang Xu Wentao Liu Jingwang Huang Chenyi Yang Jiawei Lu Haozhe Tan

An Improved Blockchain-Based Authentication Protocol for IoT Network Management.

Mostafa Yavari Masoumeh Safkhani Saru Kumari Sachin Kumar Chien-Ming Chen

Convolution Neural Network-Based Higher Accurate Intrusion Identification System for the Network Security and Communication.

Zhiwei Gu Shah Nazir Cheng Hong Sulaiman Khan

Multicriteria Decision and Machine Learning Algorithms for Component Security Evaluation: Library-Based Overview.

Jibin Zhang Shah Nazir Ansheng Huang Abdullah Alharbi

Modelling Features-Based Birthmarks for Security of End-to-End Communication System.

Meilian Li Shah Nazir Habib Ullah Khan Sara Shahzad Rohul Amin

Enhancing Transaction Security for Handling Accountability in Electronic Health Records.

Chian Techapanupreed Werasak Kurutach

A Systematic Approach for Cybersecurity Design of In-Vehicle Network Systems with Trade-Off Considerations.

Jinghua Yu Feng Luo

A Study on the Optimization of Blockchain Hashing Algorithm Based on PRCA.

Jinhua Fu Sihai Qiao Yongzhong Huang Xueming Si Bin Li Chao Yuan

An Unsupervised Learning-Based Network Threat Situation Assessment Model for Internet of Things.

Hongyu Yang Renyun Zeng Fengyan Wang Guangquan Xu Jiyong Zhang

Spam Detection Approach for Secure Mobile Message Communication Using Machine Learning Algorithms.

Luo GuangJun Shah Nazir Habib Ullah Khan Amin Ul Haq

A Systematic Literature Review on Using Machine Learning Algorithms for Software Requirements Identification on Stack Overflow.

Arshad Ahmad Chong Feng Muzammil Khan Asif Khan Ayaz Ullah Shah Nazir Adnan Tahir

Towards an Improved Energy Efficient and End-to-End Secure Protocol for IoT Healthcare Applications.

Arshad Ahmad Ayaz Ullah Chong Feng Muzammil Khan Shahzad Ashraf Muhammad Adnan Shah Nazir Habib Ullah Khan

Improving Topic-Based Data Exchanges among IoT Devices.

Fu Chen Peng Liu Jianming Zhu Sheng Gao Yanmei Zhang Meijiao Duan Youwei Wang Kai Hwang

A Novel Comprehensive Watermarking Scheme for Color Images.

Shaohua Duan Hanwen Wang Yunpeng Liu Li Huang Xiaoyi Zhou

Defending Application Layer DDoS Attacks via Multidimensional Parallelotope.

Xiaolin Zhao Hui Peng Xiang Li Yue Li Jingfeng Xue Yaoyuan Liang Mingzhe Pei

Secure and Efficient Image Compression-Encryption Scheme Using New Chaotic Structure and Compressive Sensing.

Yongli Tang Mingjie Zhao Lixiang Li

A Diagnosis and Hardening Platform for an Asterisk VoIP PBX.

Pelayo Nuño Carla Suárez Eva Suárez Francisco G. Bulnes Francisco J. delaCalle Juan C. Granda

Enabling Sector Scheduling for 5G-CPE Dense Networks.

Jie Yang Li Feng Tong Jin Hong Liang Fangxin Xu Liwei Tian

Qualitative Analysis of Commercial Services in MEC as Phased-Mission Systems.

Yuhuan Gong Yuchang Mo

Order-Revealing Encryption Scheme with Comparison Token for Cloud Computing.

Jingjing Guo Jiacong Sun

A Framework of Abnormal Behavior Detection and Classification Based on Big Trajectory Data for Mobile Networks.

Haiyan Zhang Yonglong Luo Qingying Yu Liping Sun Xuejing Li Zhenqiang Sun

A Traceable and Revocable Multiauthority Attribute-Based Encryption Scheme with Fast Access.

Kai Zhang Yanping Li Yun Song Laifeng Lu Tao Zhang Qi Jiang

Secrecy Performance Analysis of the NOMA System on High-Speed Railway.

Wenwu Xie Jinxia Yang Xinzhong Liu Zhihe Yang Xin Peng Jianwu Liao Tingyu Huang

A New User Revocable Ciphertext-Policy Attribute-Based Encryption with Ciphertext Update.

Zhe Liu Fuqun Wang Kefei Chen Fei Tang

A Key Selected S-Box Mechanism and Its Investigation in Modern Block Cipher Design.

Jiqiang Lu Hwajung Seo

Erratum to "Incremental Learning for Malware Classification in Small Datasets".

Di Xue Jingmei Li Weifei Wu Jiaxiang Wang

Seam-Carved Image Tampering Detection Based on the Cooccurrence of Adjacent LBPs.

Dengyong Zhang Xiao Chen Feng Li Arun Kumar Sangaiah Xiangling Ding

Energy Management Strategy Using Equivalent Consumption Minimization Strategy for Hybrid Electric Vehicles.

Fazhan Tao Longlong Zhu Baofeng Ji Pengju Si Zhumu Fu

Detecting Web Spam Based on Novel Features from Web Page Source Code.

Jiayong Liu Yu Su Shun Lv Cheng Huang

A Movie Recommendation System Based on Differential Privacy Protection.

Min Li Yingming Zeng Yue Guo Yun Guo

Cryptosystem Identification Scheme Based on ASCII Code Statistics.

Wenyu Zhang Yaqun Zhao Sijie Fan

Visual Object Multimodality Tracking Based on Correlation Filters for Edge Computing.

Guosheng Yang Qisheng Wei

An Android Malware Detection Model Based on DT-SVM.

Min Yang Xingshu Chen Yonggang Luo Hang Zhang

Privacy-Preserving Blockchain-Based Nonlinear SVM Classifier Training for Social Networks.

Nan Jia Shaojing Fu Ming Xu

A Key Business Node Identification Model for Internet of Things Security.

Lixia Xie Huiyu Ni Hongyu Yang Jiyong Zhang

DRHNet: A Deep Residual Network Based on Heterogeneous Kernel for Steganalysis.

Yang Xu Zixi Fu Guiyong Xu Sicong Zhang Xiaoyao Xie

A Comprehensive Survey on Local Differential Privacy.

Xingxing Xiong Shubo Liu Dan Li Zhaohui Cai Xiaoguang Niu

A Secure and Effective Construction Scheme for Blockchain Networks.

Chaoxia Qing Bing Guo Yan Shen Tao Li Yun Zhang Zhen Zhang

A Privacy-Protection Model for Patients.

Wenzhi Cheng Wei Ou Xiangdong Yin Wanqin Yan Dingwan Liu Chunyan Liu

Preserving Data Privacy in the Internet of Medical Things Using Dual Signature ECDSA.

María-Dolores Cano Antonio Cañavate-Sanchez

Research on Multidomain Authentication of IoT Based on Cross-Chain Technology.

Dawei Li Jia Yu Xue Gao Najla Al-Nabhan

Preserving Privacy in Multimedia Social Networks Using Machine Learning Anomaly Detection.

Randa Aljably Yuan Tian Mznah Al-Rodhaan

Exposing Spoofing Attack on Flocking-Based Unmanned Aerial Vehicle Cluster: A Threat to Swarm Intelligence.

Xinyu Huang Yunzhe Tian Yifei He Endong Tong Wenjia Niu Chenyang Li Jiqiang Liu Liang Chang

On Enhancing TCP to Deal with High Latency and Transmission Errors in Geostationary Satellite Network for 5G-IoT.

Liang Zong Yong Bai Chenglin Zhao Gaofeng Luo Zeyu Zhang Huawei Ma

A Novel Coevolutionary Approach to Reliability Guaranteed Multi-Workflow Scheduling upon Edge Computing Infrastructures.

Zhenxing Wang Wanbo Zheng Peng Chen Yong Ma Yunni Xia Wei Liu Xiaobo Li Kunyin Guo

Beyond PS-LTE: Security Model Design Framework for PPDR Operational Environment.

Daegeon Kim Do Hyung Gu Huy Kang Kim

Hardware Implementation of Secure Lightweight Cryptographic Designs for IoT Applications.

Wajih El Hadj Youssef Ali Abdelli Fethi Dridi Mohsen Machhout

An Efficient Outsourced Oblivious Transfer Extension Protocol and Its Applications.

Shengnan Zhao Xiangfu Song Han Jiang Ming Ma Zhihua Zheng Qiuliang Xu

Binary File's Visualization and Entropy Features Analysis Combined with Multiple Deep Learning Networks for Malware Classification.

Hui Guo Shuguang Huang Cheng Huang Fan Shi Min Zhang Zulie Pan

GroupTracer: Automatic Attacker TTP Profile Extraction and Group Cluster in Internet of Things.

Yixin Wu Cheng Huang Xing Zhang Hongyi Zhou

An Unequal Image Privacy Protection Method Based on Saliency Detection.

Rongxin Tu Wenying Wen Changsheng Hua

Privacy-Preserving Multidimensional Data Aggregation Scheme for Smart Grid.

Yousheng Zhou Xinyun Chen Meihuan Chen

A Group Recommendation System of Network Document Resource Based on Knowledge Graph and LSTM in Edge Computing.

Yuezhong Wu Qiang Liu Rongrong Chen Changyun Li Ziran Peng

A Review of Techniques and Methods for IoT Applications in Collaborative Cloud-Fog Environment.

Jielin Jiang Zheng Li Yuan Tian Najla Al-Nabhan

E2PP: An Energy-Efficient Path Planning Method for UAV-Assisted Data Collection.

Xiang Ji Xianjia Meng Anwen Wang Qingyi Hua Fuwei Wang Rui Chen Jing Zhang Dingyi Fang

Chaotic Cryptosystem for Selective Encryption of Faces in Photographs.

Jorge Aguilar Santiago Octavio Flores Siordia José Trinidad Guillen Bonilla Juan Carlos Estrada Gutiérrez María G. González Novoa Maricela Jiménez Rodríguez

Hidden Service Website Response Fingerprinting Attacks Based on Response Time Feature.

Yitong Meng Jinlong Fei

A Fully Secure KP-ABE Scheme on Prime-Order Bilinear Groups through Selective Techniques.

Isaac Amankona Obiri Qi Xia Hu Xia Kwame Opuni-Boachie Obour Agyekum Kwame Omono Asamoah Emmanuel Boateng Sifah Xiaosong Zhang Jianbin Gao

High-Resolution SAR Image Despeckling Based on Nonlocal Means Filter and Modified AA Model.

Qiao Ke Zengguo Sun Yang Liu Wei Wei Marcin Wozniak Rafal Scherer

Modelling the Mimic Defence Technology for Multimedia Cloud Servers.

Feng Feng Xiabing Zhou Bin Li Qinglei Zhou

cHybriDroid: A Machine Learning-Based Hybrid Technique for Securing the Edge Computing.

Afifa Maryam Usman Ahmed Muhammad Aleem Jerry Chun-Wei Lin Muhammad Arshad Islam Muhammad Azhar Iqbal

PyRos: A State Channel-Based Access Control System for a Public Blockchain Network.

Si-Wan Noh Sang-Uk Shin Kyung-Hyune Rhee

3-Image Bit-Level Encryption Algorithm Based on 3D Nonequilateral Arnold Transformation and Hyperchaotic System.

Huiqing Huang Dongsheng Cheng

Research and Analysis of Electromagnetic Trojan Detection Based on Deep Learning.

Jiazhong Lu Xiaolei Liu Shibin Zhang Yan Chang

SANS: Self-Sovereign Authentication for Network Slices.

Xavier Salleras Vanesa Daza

On the Value of Order Number and Power in Secret Image Sharing.

Yongqiang Yu Longlong Li Yuliang Lu Xuehu Yan

Energy Consumption Analysis of Lightweight Cryptographic Algorithms That Can Be Used in the Security of Internet of Things Applications.

Bora Aslan Füsun Yavuzer Aslan M. Tolga Sakalli

Fed-SCNN: A Federated Shallow-CNN Recognition Framework for Distracted Driving.

Yaojie Wang Xiaolong Cui Zhiqiang Gao Bo Gan

Virus Propagation in Wireless Sensor Networks with Media Access Control Mechanism.

Lurong Jiang Qiaoyu Xu Hangyi Pan Yanyun Dai Jijun Tong

Automatic Analysis Architecture of IoT Malware Samples.

Javier Carrillo Mondéjar Juan Manuel Castelo Gómez Carlos Núñez-Gómez José Roldán Gómez José Luis Martínez

Community Detection Based on DeepWalk Model in Large-Scale Networks.

Yunfang Chen Li Wang Dehao Qi Tinghuai Ma Wei Zhang

White-Box Implementation of ECDSA Based on the Cloud Plus Side Mode.

Jie Zhou Jian Bai Meng Shan Jiang

BNRDT: When Data Transmission Meets Blockchain.

Hongjian Jin Xingshu Chen Xiao Lan Hui Guo Hongxia Zhang Qi Cao

Protect Mobile Travelers Information in Sensitive Region Based on Fuzzy Logic in IoT Technology.

Imran Memon Riaz Ahmed Shaikh Mohammad Kamrul Hasan Rosilah Hassan Amin Ul Haq Khairul Akram Zainol

PowerPrint: Identifying Smartphones through Power Consumption of the Battery.

Jiong Chen Kun He Jing Chen Yingying Fang Ruiying Du

A Prediction Approach for Video Hits in Mobile Edge Computing Environment.

Xiulei Liu Shoulu Hou Qiang Tong Xuhong Liu Zhihui Qin Junyang Yu

AKC-Based Revocable ABE Schemes from LWE Assumption.

Leixiao Cheng Fei Meng Xianmeng Meng Qixin Zhang

Challenging the Adversarial Robustness of DNNs Based on Error-Correcting Output Codes.

Bowen Zhang Benedetta Tondi Xixiang Lv Mauro Barni

A Comprehensive Trust Model Based on Social Relationship and Transaction Attributes.

Yonghua Gong Lei Chen Tinghuai Ma

Methods to Measure the Network Path Connectivity.

Yinwei Li Guo-Ping Jiang Meng Wu Yurong Song

Image Encryption Scheme Based on a Generalized Arnold Map and RSA Algorithm.

Kaixin Jiao Guodong Ye Youxia Dong Xiaoling Huang Jianqing He

A Novel Approach to Transform Bitmap to Vector Image for Data Reliable Visualization considering the Image Triangulation and Color Selection.

Zhike Han Xiuchao Wu Meng Chi Jun Tang Lijing Yang

Deploying GIS Services into the Edge: A Study from Performance Evaluation and Optimization Viewpoint.

Jianbing Zhang Bowen Ma Jiwei Huang

Advanced Temperature-Varied ECU Fingerprints for Source Identification and Intrusion Detection in Controller Area Networks.

Miaoqing Tian Ruobing Jiang Haipeng Qu Qian Lu Xiaoyun Zhou

MD-MinerP: Interaction Profiling Bipartite Graph Mining for Malware-Control Domain Detection.

Tzung-Han Jeng Yi-Ming Chen Chien-Chih Chen Chuan-Chiang Huang

Mimic Encryption Box for Network Multimedia Data Security.

Xiabing Zhou Bin Li Yanrong Qi Wanying Dong

An Improved Method to Evaluate the Synchronization in Neural Key Exchange Protocol.

Yiliang Han Yu Li Zhe Li Shuaishuai Zhu

Lattice-Based Linearly Homomorphic Signature Scheme over F 2.

Jie Cai Han Jiang Hao Wang Qiuliang Xu

Optimal Network Defense Strategy Selection Method Based on Evolutionary Network Game.

Xiaohu Liu Hengwei Zhang Yuchen Zhang Lulu Shao

Known-Key Distinguishing and Partial-Collision Attacks on GFN-2 with SP F-Function.

Deukjo Hong

Deep Autoencoders and Feedforward Networks Based on a New Regularization for Anomaly Detection.

Marwan Ali Albahar Muhammad Binsawad

A Mean Convolutional Layer for Intrusion Detection System.

Leila Mohammadpour Teck Chaw Ling Chee Sun Liew Alihossein Aryanfar

High-Performance Routing Emulation Technologies Based on a Cloud Platform.

Jianyu Chen Xiaofeng Wang Leiting Tao Yuan Liu

Research on Selection Method of Privacy Parameter ε.

Pan Jun Sun

Erratum to "High-Efficiency Min-Entropy Estimation Based on Neural Network for Random Number Generators".

Na Lv Tianyu Chen Shuangyi Zhu Jing Yang Yuan Ma Jiwu Jing Jingqiang Lin

An Intelligent Real-Time Traffic Control Based on Mobile Edge Computing for Individual Private Environment.

Sa Math Lejun Zhang Seokhoon Kim Intae Ryoo

A Hybrid Cyber Defense Mechanism to Mitigate the Persistent Scan and Foothold Attack.

Shuo Wang Qingqi Pei Yuchen Zhang Xiaohu Liu Guangming Tang

A Secure Communication Scheme Based on Equivalent Interference Channel Assisted by Physical Layer Secret Keys.

Xiaoyan Hu Liang Jin Kaizhi Huang Keming Ma Changcheng Song Shuaifang Xiao

Attribute-Based User Revocable Data Integrity Audit for Internet-of-Things Devices in Cloud Storage.

Yaowei Wang Chen Chen Zhenwei Chen Jiangyong He

A Dynamic Searchable Symmetric Encryption Scheme for Multiuser with Forward and Backward Security.

Xi Zhang Ye Su Jing Qin

On the Detection of a Non-Cooperative Beam Signal Based on Wireless Sensor Networks.

Guofeng Wei Bangning Zhang Guoru Ding Bing Zhao Kefeng Guo Daoxing Guo

Identity-Based Identification Scheme without Trusted Party against Concurrent Attacks.

Fei Tang Jiali Bao Yonghong Huang Dong Huang Fuqun Wang

Routing Strategy for LEO Satellite Networks Based on Membership Degree Functions.

Jian Zhou Qian Bo Lijuan Sun Juan Wang Xiaoyong Yan

A Novel Machine Learning-Based Approach for Security Analysis of Authentication and Key Agreement Protocols.

Behnam Zahednejad Lishan Ke Jing Li

Deep Learning-Based Cryptanalysis of Lightweight Block Ciphers.

Jaewoo So

Improved Single-Key Attacks on 2-GOST.

Qiuhua Zheng Yinhao Hu Tao Pei Shengwang Xu Junzhe Yu Ting Wu Yanzhao Shen Yingpei Zeng Tingting Cui

Cyborgan OS: A Lightweight Real-Time Operating System for Artificial Organ.

Pan Lv Hong Li Jinsong Qiu Yiqi Li Gang Pan

A Collusion-Resistant Identity-Based Proxy Reencryption Scheme with Ciphertext Evolution for Secure Cloud Sharing.

Shimao Yao Ravi Sankar In-ho Ra

BLATTA: Early Exploit Detection on Network Traffic with Recurrent Neural Networks.

Baskoro Adi Pratomo Pete Burnap George Theodorakopoulos

A Survey of Automatic Software Vulnerability Detection, Program Repair, and Defect Prediction Techniques.

Zhidong Shen Si Chen

A Privacy Risk Assessment Model for Medical Big Data Based on Adaptive Neuro-Fuzzy Theory.

Mingyue Shi Rong Jiang Wei Zhou Sen Liu Savio Sciancalepore

Lightweight Crypto Stack for TPMS Using Lesamnta-LW.

Yuhei Watanabe Hideki Yamamoto Hirotaka Yoshida

The Effect of the Primitive Irreducible Polynomial on the Quality of Cryptographic Properties of Block Ciphers.

Sajjad Shaukat Jamal Dawood Shah Abdulaziz Deajim Tariq Shah

Rational Protocols and Attacks in Blockchain System.

Tao Li Yuling Chen Yanli Wang Yilei Wang Minghao Zhao Haojia Zhu Youliang Tian Xiaomei Yu Yixian Yang

RIPTE: Runtime Integrity Protection Based on Trusted Execution for IoT Device.

Yu Qin Jingbin Liu Shijun Zhao Dengguo Feng Wei Feng

TZ-MRAS: A Remote Attestation Scheme for the Mobile Terminal Based on ARM TrustZone.

Ziwang Wang Yi Zhuang Zujia Yan

A Novel IM Sync Message-Based Cross-Device Tracking.

Naixuan Guo Junzhou Luo Zhen Ling Ming Yang Wenjia Wu Xiaodan Gu

A Robust Image Watermarking Approach Using Cycle Variational Autoencoder.

Qiang Wei Hu Wang Gongxuan Zhang

Impossible Differential Distinguishers of Two Generalized Feistel Structures.

Huili Wang Wenping Ma Lang Liao Yushan Li Linfeng Zheng

Oblivious Inspection: On the Confrontation between System Security and Data Privacy at Domain Boundaries.

Jorge Sancho José García Álvaro Alesanco Iglesias

Stability Analysis of a Dynamical Model for Malware Propagation with Generic Nonlinear Countermeasure and Infection Probabilities.

Xulong Zhang Xiaoxia Song

Exploring the Dynamical Behavior of Information Diffusion in D2D Communication Environment.

Zufan Zhang Anqi Liu Yinxue Yi Maobin Yang

Feature Selection Based on Cross-Correlation for the Intrusion Detection System.

Gholamreza Farahani

Secrecy Analysis of Cognitive Radio Networks over Generalized Fading Channels.

Jiangfeng Sun Zhisong Bie Hongxia Bie Pengfei He Machao Jin

Improved Cloud-Assisted Privacy-Preserving Profile-Matching Scheme in Mobile Social Networks.

Ying Zou Yanting Chai Sha Shi Lei Wang Yunfeng Peng Yuan Ping Baocang Wang

Chebyshev Polynomial-Based Authentication Scheme in Multiserver Environment.

Toan-Thinh Truong Minh-Triet Tran Anh Duc Duong

Private Function Evaluation Using Intel's SGX.

Omar Abou Selo Maan Haj Rachid Abdullatif Shikfa Yongge Wang Qutaibah M. Malluhi

Practical CCA-Secure Functional Encryptions for Deterministic Functions.

Huige Wang Kefei Chen Tianyu Pan Yunlei Zhao

Collaborative Intelligence: Accelerating Deep Neural Network Inference via Device-Edge Synergy.

Nanliang Shan Zecong Ye Xiaolong Cui

On WPA2-Enterprise Privacy in High Education and Science.

Toni Perkovic Ante Dagelic Marin Bugaric Mario Cagalj

Secure Multiusers Directional Modulation Scheme Based on Random Frequency Diverse Arrays in Broadcasting Systems.

Jianbang Gao Zhaohui Yuan Bin Qiu Jing Zhou

Game Theoretical Method for Anomaly-Based Intrusion Detection.

Zhiyong Wang Shengwei Xu Guoai Xu Yongfeng Yin Miao Zhang Dawei Sun

GFD: A Weighted Heterogeneous Graph Embedding Based Approach for Fraud Detection in Mobile Advertising.

Jinlong Hu Tenghui Li Yi Zhuang Song Huang Shoubin Dong

An Improved Elman Network for Stock Price Prediction Service.

Bo Liu Qilin Wu Qian Cao

An Antiforensic Method against AMR Compression Detection.

Diqun Yan Xiaowen Li Li Dong Rangding Wang

Secure Framework Enhancing AES Algorithm in Cloud Computing.

Ijaz Ahmad Awan Muhammad Shiraz Muhammad Usman Hashmi Qaisar Shaheen Rizwan Akhtar Allah Ditta

An Improved Broadcast Authentication Protocol for Wireless Sensor Networks Based on the Self-Reinitializable Hash Chains.

Haiping Huang Qinglong Huang Fu Xiao Wenming Wang Qi Li Ting Dai

Efficient Private Set Intersection Using Point-Value Polynomial Representation.

Ou Ruan Hao Mao

Characterizing Anomalies in Malware-Generated HTTP Traffic.

Piotr Bialczak Wojciech Mazurczyk

DL-IDS: Extracting Features Using CNN-LSTM Hybrid Network for Intrusion Detection System.

Pengfei Sun Pengju Liu Qi Li Chenxi Liu Xiangling Lu Ruochen Hao Jinpeng Chen

Broadcast Complexity and Adaptive Adversaries in Verifiable Secret Sharing.

Seyed Amir Hosseini Beghaeiraveri Mohammad Izadi Mohsen Rezvani

Android Malware Detection Based on a Hybrid Deep Learning Model.

Tianliang Lu Yanhui Du Li Ouyang Qiuyu Chen Xirui Wang

A Certificateless Noninteractive Key Exchange Protocol with Provable Security.

Xuefei Cao Lanjun Dang Yingzi Luan Wei You

A Dynamic Privacy Protection Mechanism for Spatiotemporal Crowdsourcing.

Tianen Liu Yingjie Wang Zhipeng Cai Xiangrong Tong Qingxian Pan Jindong Zhao

Dynamic Security Exchange Scheduling Model for Business Workflow Based on Queuing Theory in Cloud Computing.

Rongbin Xu Jianguo Wu Yongliang Cheng Zhiqiang Liu Yuanmo Lin Ying Xie

Network Attacks Detection Methods Based on Deep Learning Techniques: A Survey.

Yirui Wu Dabao Wei Jun Feng

Knocking on IPs: Identifying HTTPS Websites for Zero-Rated Traffic.

Mariano Di Martino Peter Quax Wim Lamotte

Toward Serverless and Efficient Encrypted Deduplication in Mobile Cloud Computing Environments.

Youngjoo Shin Junbeom Hur Dongyoung Koo Joobeom Yun

A Novel RLWE-Based Anonymous Mutual Authentication Protocol for Space Information Network.

Junyan Guo Ye Du

The Defense of Adversarial Example with Conditional Generative Adversarial Networks.

Fangchao Yu Li Wang Xianjin Fang Youwen Zhang

Packet-Based Intrusion Detection Using Bayesian Topic Models in Mobile Edge Computing.

Xuefei Cao Yulong Fu Bo Chen

SPCTR: Sealed Auction-Based Procurement for Closest Pre-Tender with Range Validation.

Li Li Jiayong Liu Peng Jia

Risk Situation Assessment Model Based on Interdomain Interaction in Cloud Computing Environment.

Gaocai Wang Ning Yu

Research on the Optimization Management of Cloud Privacy Strategy Based on Evolution Game.

Pan Jun Sun

A Smart Agent Design for Cyber Security Based on Honeypot and Machine Learning.

Nadiya El Kamel Mohamed Eddabbah Youssef Lmoumen Raja Touahni

Space-Efficient Key-Policy Attribute-Based Encryption from Lattices and Two-Dimensional Attributes.

Yuan Liu Licheng Wang Xiaoying Shen Lixiang Li Dezhi An

A Task Offloading Method with Edge for 5G-Envisioned Cyber-Physical-Social Systems.

Jielin Jiang Xing Zhang Shengjun Li

Limiting Privacy Breaches in Average-Distance Query.

Huihua Xia Yan Xiong Wenchao Huang Zhaoyi Meng Fuyou Miao

A Survey of Key Technologies for Constructing Network Covert Channel.

Jing Tian Gang Xiong Zhen Li Gaopeng Gou

An Efficient and Effective Approach for Flooding Attack Detection in Optical Burst Switching Networks.

Bandar Almaslukh

Mobile IPv6 Vertical Handover Specifications, Threats, and Mitigation Methods: A Survey.

Supriyanto Praptodiyono Teguh Firmansyah Mudrik Alaydrus M. Iman Santoso Azlan Osman Rosni Abdullah

Accurate Computation of Fractional-Order Exponential Moments.

Shujiang Xu Qixian Hao Bin Ma Chunpeng Wang Jian Li

A Multifault Diagnosis Method of Gear Box Running on Edge Equipment.

Xiaoping Zhao Yonghong Zhang Fan Shao

Anomaly Event Detection in Security Surveillance Using Two-Stream Based Model.

Wangli Hao Ruixian Zhang Shancang Li Junyu Li Fuzhong Li Shanshan Zhao Wuping Zhang

HYBRID-CNN: An Efficient Scheme for Abnormal Flow Detection in the SDN-Based Smart Grid.

Pengpeng Ding Jinguo Li Liangliang Wang Mi Wen Yuyao Guan

Distributed Security Framework for Reliable Threat Intelligence Sharing.

Davy Preuveneers Wouter Joosen Jorge Bernal Bernabé Antonio F. Skarmeta

A Minimum Defense Cost Calculation Method for Attack Defense Trees.

Bingfeng Xu Zhicheng Zhong Gaofeng He

A Survey on Services Provision and Distribution of Official and Commercial Intellectual Property Platforms.

Yang Wang Haijin Gui Lei Ma

Preprocessing Method for Encrypted Traffic Based on Semisupervised Clustering.

Rongfeng Zheng Jiayong Liu Weina Niu Liang Liu Kai Li Shan Liao

Noninteractive Lightweight Privacy-Preserving Auditing on Images in Mobile Crowdsourcing Networks.

Juan Zhang Changsheng Wan Chunyu Zhang Xiaojun Guo Yongyong Chen

A Lightweight Image Encryption Algorithm Based on Message Passing and Chaotic Map.

Hui Liu Bo Zhao Jianwen Zou Linquan Huang Yifan Liu

A Client Bootstrapping Protocol for DoS Attack Mitigation on Entry Point Services in the Cloud.

Hussain M. J. Almohri Mohammad Al-Mutawa Mahmoud Alawadh Karim O. Elish

Rotational-XOR Rectangle Cryptanalysis on Round-Reduced Simon.

Bonwook Koo Younghoon Jung Woo-Hwan Kim

Efficient Searchable Symmetric Encryption Supporting Dynamic Multikeyword Ranked Search.

Yu Zhang Yin Li Yifan Wang

Neural Network-Based Voting System with High Capacity and Low Computation for Intrusion Detection in SIEM/IDS Systems.

Nabil Moukafih Ghizlane Orhanou Said Elhajji

Evaluator: A Multilevel Decision Approach for Web-Based Landmark Evaluation.

Meijuan Yin Wen Yang Xiaonan Liu Xiangyang Luo

Unordered Multisecret Sharing Based on Generalized Chinese Remainder Theorem.

Xiaoping Li Hefeng Chen Yanjun Liu Chin-Chen Chang

Cryptanalysis and Improvement of a Group Authentication Scheme with Multiple Trials and Multiple Authentications.

Zhe Xia Yining Liu Ching-Fang Hsu Chinchen Chang

An Encrypted Traffic Identification Scheme Based on the Multilevel Structure and Variational Automatic Encoder.

Jiangtao Zhai Huaifeng Shi Mingqian Wang Zhongjun Sun Junjun Xing

Authentication and Secrecy of Multicast Communication Scenario: Artificial Noise-Aided Costas Sequence Matrix FDA Approach.

Shaddrack Yaw Nusenu

A Lattice-Based Authentication Scheme for Roaming Service in Ubiquitous Networks with Anonymity.

Yousheng Zhou Longan Wang

VoNR-IPD: A Novel Timing-Based Network Steganography for Industrial Internet.

Mingqian Wang Shuai Cao Yunliang Wang

Certificate-Based Encryption Resilient to Continual Leakage in the Standard Model.

Yuyan Guo Jiguo Li Mingming Jiang Lei Yu Shimin Wei

Parallel and Regular Algorithm of Elliptic Curve Scalar Multiplication over Binary Fields.

Xingran Li Wei Yu Bao Li

Research on SKINNY Optimal Differential Trail Search.

Shaoqiang Liu Chaiyang Peng Chunjiang Li

Warehouse-Oriented Optimal Path Planning for Autonomous Mobile Fire-Fighting Robots.

Yongtao Liu Ruizhi Sun Tianyi Zhang Xiangnan Zhang Li Li Guoqing Shi

Abnormal User Detection Based on the Correlation Probabilistic Model.

Xiaohui Yang Ying Sun

Hail the Closest Driver on Roads: Privacy-Preserving Ride Matching in Online Ride Hailing Services.

Haining Yu Hongli Zhang Xiangzhan Yu

SecureBP from Homomorphic Encryption.

Qinju Liu Xianhui Lu Fucai Luo Shuai Zhou Jingnan He Kunpeng Wang

Optimal Timing Selection Approach to Moving Target Defense: A FlipIt Attack-Defense Game Model.

Jinglei Tan Hengwei Zhang Hongqi Zhang Cheng Lei Hui Jin Bo-wen Li Hao Hu

Study on Stochastic Differential Game Model in Network Attack and Defense.

Xiaotong Xu Gaocai Wang Jintian Hu Yuting Lu

Classification and Analysis of Security Techniques for the User Terminal Area in the Internet Banking Service.

Kyungroul Lee Sun-Young Lee Kangbin Yim

Decentralized Private Information Sharing Protocol on Social Networks.

Shu-Chuan Chu Lili Chen Sachin Kumar Saru Kumari Joel J. P. C. Rodrigues Chien-Ming Chen

Exploiting the Relationship between Pruning Ratio and Compression Effect for Neural Network Model Based on TensorFlow.

Bo Liu Qilin Wu Yiwen Zhang Qian Cao

Extension of Research on Security as a Service for VMs in IaaS Platform.

Xue-yuan Yin Xingshu Chen Lin Chen Hui Li

On-Device Detection of Repackaged Android Malware via Traffic Clustering.

Gaofeng He Bingfeng Xu Lu Zhang Haiting Zhu

Using FDAD to Prevent DAD Attack in SEcure Neighbor Discovery Protocol.

Guangjia Song Hui Wang Fuquan Liu

Research and Implementation on Power Analysis Attacks for Unbalanced Data.

Xiaoyi Duan Dong Chen Xiaohong Fan Xiuying Li Ding Ding You Li

User Authentication Method Based on MKL for Keystroke and Mouse Behavioral Feature Fusion.

Xiujuan Wang Qianqian Zheng Kangfeng Zheng Tong Wu

Group Recommender Systems Based on Members' Preference for Trusted Social Networks.

Xiangshi Wang Lei Su Qihang Zhou Liping Wu

Cryptographic Strength Evaluation of Key Schedule Algorithms.

Shazia Afzal Muhammad Yousaf Humaira Afzal Nawaf Alharbe Muhammad Rafiq Mufti

An Efficient Integrity Verification and Authentication Scheme over the Remote Data in the Public Clouds for Mobile Users.

S. Milton Ganesh S. P. Manikandan

Combat Mobile Evasive Malware via Skip-Gram-Based Malware Detection.

Alper Egitmen Irfan Bulut R. Can Aygun Ayse Bilge Gunduz Omer Seyrekbasan Ali Gökhan Yavuz

Erratum to "An Energy-Efficient and Security Aware Route Selection Protocol for Wireless Sensor Networks".

Thaier Hayajneh Razvi Doomun Ghada Almashaqbeh Bassam Jamil Mohd

Protection of Sensitive Data in Industrial Internet Based on Three-Layer Local/Fog/Cloud Storage.

Jing Liu Changbo Yuan Yingxu Lai Hua Qin

Efficient Hierarchical Authentication Protocol for Multiserver Architecture.

Jiangheng Kou Mingxing He Ling Xiong Zeqiong Lv

Design and Analysis of a Novel Chaos-Based Image Encryption Algorithm via Switch Control Mechanism.

Shenyong Xiao Zhijun Yu Ya Shuang Deng

A CP-ABE Scheme Supporting Arithmetic Span Programs.

Chao Ma Haiying Gao Duo Wei

Integrating Security Requirements Engineering into MBSE: Profile and Guidelines.

Donatas Mazeika Rimantas Butleris

Minimizing Key Materials: The Even-Mansour Cipher Revisited and Its Application to Lightweight Authenticated Encryption.

Ping Zhang Qian Yuan

User Audit Model Based on Attribute Measurement and Similarity Measurement.

Xiaohui Yang Ying Sun

Highly Secure Privacy-Preserving Outsourced k-Means Clustering under Multiple Keys in Cloud Computing.

Ying Zou Zhen Zhao Sha Shi Lei Wang Yunfeng Peng Yuan Ping Baocang Wang

On the Unlinkability of Fingerprint Shell.

Sanghoon Lee Ik Rae Jeong

An Efficient Encrypted Floating-Point Representation Using HEAAN and TFHE.

Subin Moon Younho Lee

Using a Subtractive Center Behavioral Model to Detect Malware.

Ömer Aslan Refik Samet Ömer Özgür Tanriöver

Security of Cloud Computing Using Adaptive Neural Fuzzy Inference System.

Shumaila Shahzadi Bushra Khaliq Muhammad Rizwan Fahad Ahmad

Cyber-Physical Security with RF Fingerprint Classification through Distance Measure Extensions of Generalized Relevance Learning Vector Quantization.

Trevor J. Bihl Todd J. Paciencia Kenneth W. Bauer Jr. Michael A. Temple

Secure Information Transmissions in Wireless-Powered Cognitive Radio Networks for Internet of Medical Things.

Kun Tang Wenjuan Tang Entao Luo Zhiyuan Tan Weizhi Meng Lianyong Qi

Employing a Machine Learning Approach to Detect Combined Internet of Things Attacks against Two Objective Functions Using a Novel Dataset.

John Foley Naghmeh Moradpoor Henry Ochenyi

Cycle-Consistent Adversarial GAN: The Integration of Adversarial Attack and Defense.

Lingyun Jiang Kai Qiao Ruoxi Qin Linyuan Wang Wanting Yu Jian Chen Haibing Bu Bin Yan

Incremental Learning for Malware Classification in Small Datasets.

Jingmei Li Di Xue Weifei Wu Jiaxiang Wang

Botnet Forensic Analysis Using Machine Learning.

Anchit Bijalwan

Cryptanalysis and Security Improvement of Two Authentication Schemes for Healthcare Systems Using Wireless Medical Sensor Networks.

Jiaqing Mo Zhongwang Hu Yuhua Lin

A Framework for Real-Time Intrusion Response in Software Defined Networking Using Precomputed Graphical Security Models.

Taehoon Eom Jin B. Hong SeongMo An Jong Sou Park Dong Seong Kim

High-Efficiency Min-Entropy Estimation Based on Neural Network for Random Number Generators.

Na Lv Tianyu Chen Shuangyi Zhu Jing Yang Yuan Ma Jiwu Jing Jingqiang Lin

Efficient Privacy-Preserving Fingerprint-Based Authentication System Using Fully Homomorphic Encryption.

Taeyun Kim Yongwoo Oh Hyoungshick Kim

Efficient Certificateless Aggregate Signature Scheme for Performing Secure Routing in VANETs.

Zhiyan Xu Debiao He Neeraj Kumar Kim-Kwang Raymond Choo

Server-Aided Revocable Attribute-Based Encryption from Lattices.

Xingting Dong Yanhua Zhang Baocang Wang Jiangshan Chen

Secure Outsourced Medical Data against Unexpected Leakage with Flexible Access Control in a Cloud Storage System.

Xingguang Zhou Jianwei Liu Zongyang Zhang Qianhong Wu

MHCOOS: An Offline-Online Certificateless Signature Scheme for M-Health Devices.

Abigail Akosua Addobea Jun Hou Qianmu Li

Identity-Based Public Auditing Scheme for Cloud Storage with Strong Key-Exposure Resilience.

S. Mary Virgil Nithya V. Rhymend Uthariaraj

Jamming Prediction for Radar Signals Using Machine Learning Methods.

Gyeong-Hoon Lee Jeil Jo Cheong Hee Park

A Stacking Ensemble for Network Intrusion Detection Using Heterogeneous Datasets.

Smitha Rajagopal Poornima Panduranga Kundapur Katiganere Siddaramappa Hareesha

A Multibranch Search Tree-Based Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data.

Hua Dai Xuelong Dai Xiao Li Xun Yi Fu Xiao Geng Yang

Protecting Metadata of Access Indicator and Region of Interests for Image Files.

JeongYeon Kim

Automatic Search for the Linear (Hull) Characteristics of ARX Ciphers: Applied to SPECK, SPARX, Chaskey, and CHAM-64.

Mingjiang Huang Liming Wang

BAHK: Flexible Automated Binary Analysis Method with the Assistance of Hardware and System Kernel.

Jiaye Pan Yi Zhuang Binglin Sun

Scalable Revocable Identity-Based Signature Scheme with Signing Key Exposure Resistance from Lattices.

Congge Xie Jian Weng Jinming Wen

DPAEG: A Dependency Parse-Based Adversarial Examples Generation Method for Intelligent Q&A Robots.

Mingfu Xue Chengxiang Yuan Jian Wang Weiqiang Liu

Attribute-Guard: Attribute-Based Flow Access Control Framework in Software-Defined Networking.

Xianwei Zhu ChaoWen Chang Qin Xi ZhiBin Zuo