


default search action
CSS 2017: Xi'an, China
- Sheng Wen, Wei Wu, Aniello Castiglione:

Cyberspace Safety and Security - 9th International Symposium, CSS 2017, Xi'an, China, October 23-25, 2017, Proceedings. Lecture Notes in Computer Science 10581, Springer 2017, ISBN 978-3-319-69470-2 - Flora Amato

, Aniello Castiglione
, Vincenzo Moscato, Antonio Picariello, Giancarlo Sperlì:
Detection of Lurkers in Online Social Networks. 1-15 - Bin Xiong, Guangli Xiang, Tianyu Du, Jing (Selena) He, Shouling Ji:

Static Taint Analysis Method for Intent Injection Vulnerability in Android Applications. 16-31 - Hui Cao, Shubo Liu, Zhitao Guan, Longfei Wu, Tian Wang:

Achieving Differential Privacy of Data Disclosure from Non-intrusive Load Monitoring in Smart Grid. 32-42 - Yuxia Cheng, Qing Wu, Bei Wang, Wenzhi Chen:

Protecting In-memory Data Cache with Secure Enclaves in Untrusted Cloud. 43-56 - Jianmin Han, Juan Yu, Jianfeng Lu, Hao Peng, Jiandang Wu:

An Anonymization Method to Improve Data Utility for Classification. 57-71 - Hui Huang, Kuan-Ching Li

, Xiaofeng Chen:
A Fair Three-Party Contract Singing Protocol Based on Blockchain. 72-85 - Jiameng Sun, Jing Qin

, Jixin Ma
:
Securely Outsourcing Decentralized Multi-authority Attribute Based Signature. 86-102 - Dawei Li, Jie Chen, Jianwei Liu

, Qianhong Wu, Weiran Liu:
Efficient CCA2 Secure Revocable Multi-authority Large-Universe Attribute-Based Encryption. 103-118 - Jie Li, Jinshu Su, Xiaofeng Wang, Hao Sun, Shuhui Chen:

CloudDPI: Cloud-Based Privacy-Preserving Deep Packet Inspection via Reversible Sketch. 119-134 - Yuying Liu, Yonggang Huang, Jun Zhang

, Xu Liu, Hualei Shen:
Noisy Smoothing Image Source Identification. 135-147 - Qian Meng, Jianfeng Ma, Kefei Chen, Yinbin Miao, Tengfei Yang:

Privacy-Preserving Comparable Encryption Scheme in Cloud Computing. 148-162 - Weizhi Meng

, Wenjuan Li
, Yu Wang, Man Ho Au:
Detecting Malicious Nodes in Medical Smartphone Networks Through Euclidean Distance-Based Behavioral Profiling. 163-175 - Lianyong Qi, Wanchun Dou, Xuyun Zhang

:
Two-Phase Locality-Sensitive Hashing for Privacy-Preserving Distributed Service Recommendation. 176-188 - Tao Shang, Zheng Zhao, Zhenyu Guan, Jianwei Liu:

A DP Canopy K-Means Algorithm for Privacy Preservation of Hadoop Platform. 189-198 - Dong Shen, Xiaojing Su, Zhoujun Li:

HypTracker: A Hypervisor to Detect Malwares Through System Call Analysis on ARM. 199-214 - Jian Shen

, Jun Shen, Chen Wang, Anxi Wang
:
A Fibonacci Based Batch Auditing Protocol for Cloud Data. 215-222 - Wenqi Shi, Xiangyang Luo, Fan Zhao, Ziru Peng, Yong Gan:

A WeChat User Geolocating Algorithm Based on the Relation Between Reported and Actual Distance. 223-235 - Donghai Tian, Xiaoqi Jia, Li Zhan, Changzhen Hu, Jingfeng Xue:

An Online Approach to Defeating Return-Oriented-Programming Attacks. 236-247 - Liangliang Wang, Mi Wen, Kefei Chen, Zhongqin Bi, Yu Long:

An Efficient and Provably Secure Pairing-Free Certificateless Signature Scheme Based on Variant of RSA. 248-266 - Yu Wang, Lin Xie, Wenjuan Li

, Weizhi Meng
, Jin Li:
A Privacy-Preserving Framework for Collaborative Intrusion Detection Networks Through Fog Computing. 267-279 - Shengjun Wei, Xiaojiang Du, Changzhen Hu, Chun Shan:

Predicting Vulnerable Software Components Using Software Network Graph. 280-290 - Jun Xie, Sha Wu, Yansong Li, Jun Guo, Wen Sun, Jiajia Liu:

My Smartphone Knows Your Health Data: Exploiting Android-Based Deception Attacks Against Smartbands. 291-306 - Binxuan Xu, Zhongyun Hua

, Hejiao Huang:
A Novel Image Encryption Scheme Using Josephus Permutation and Image Filtering. 307-319 - Yu Yao, Qiang Fu, Chuan Sheng, Wei Yang:

Modeling and Hopf Bifurcation Analysis of Benign Worms with Quarantine Strategy. 320-336 - Gang Yu, Xiaoxiao Ma, Zhenfu Cao

, Weihua Zhu, Junjie Zeng:
Accountable Multi-authority Ciphertext-Policy Attribute-Based Encryption Without Key Escrow and Key Abuse. 337-351 - Lei Zhang, Dongjin Yu, Hongsheng Zheng:

Optimization of Cloud Workflow Scheduling Based on Balanced Clustering. 352-366 - Beibei Zhao, Zhanyong Tang, Zhen Li, Lina Song, Xiaoqing Gong, Dingyi Fang, Fangyuan Liu, Zheng Wang

:
DexPro: A Bytecode Level Code Protection System for Android Applications. 367-382 - Fan Zhao, Xiangyang Luo, Yong Gan, Shuodi Zu, Fenlin Liu:

IP Geolocation Base on Local Delay Distribution Similarity. 383-395 - Xingwen Zhao, Hui Li:

Privacy Preserving Authenticating and Billing Scheme for Video Streaming Service. 396-410 - Xingguang Zhou, Jie Chen, Zongyang Zhang, Jianwei Liu

, Qianhong Wu:
Secure Role-Based Access Control over Outsourced EMRs Against Unwanted Leakage. 411-426 - Yun Zhou

, Alexander Raake
, Tao Xu, Xuyun Zhang
:
Users' Perceived Control, Trust and Expectation on Privacy Settings of Smartphone. 427-441 - Zhiqiang Gao, Yong Ding, Huiyong Wang, Jilin Wang:

A New Way for Extracting Region of Interest from Palmprint by Detecting Key Points. 442-451 - Jing He, Yiming Wu, Guangli Xiang, Zhendong Wu, Shouling Ji:

Efficient Privacy-Preservation Multi-factor Ranking with Approximate Search over Encrypted Big Cloud Data. 452-459 - Hongyu Liu, Leiting Chen, Liyao Zeng:

Cloud Data Integrity Checking with Deduplication for Confidential Data Storage. 460-467 - Jianfeng Lu, Yun Xin, Hao Peng, Jianmin Han, Feilong Lin:

Supporting User Authorization Queries in RBAC Systems by Role-Permission Reassignment. 468-476 - Liang Luo, Li Tao, Hongyi Xu, Zhenyun Yuan, Hong Lai, Zili Zhang:

An Information Theory Based Approach for Identifying Influential Spreaders in Temporal Networks. 477-484 - Yu Qin, Yingjun Zhang, Wei Feng:

TICS: Trusted Industry Control System Based on Hardware Security Module. 485-493 - Chao Shen

, Ziqiang Ren, Yufei Chen
, Zhao Wang:
On Using Wearable Devices to Steal Your Passwords: A Fuzzy Inference Approach. 494-502 - Huiyong Wang, Yong Ding, Shijie Tang, Jilin Wang:

An Efficient Privacy-Preserving Palmprint Authentication Scheme Based on Homomorphic Encryption. 503-512 - Pei Wang, Hua Guo, Yuanfei Huang:

An Improved Authentication Scheme for the Integrated EPR Information System. 513-522 - Wei Wang

, Rong Jiang, Yan Jia, Aiping Li, Yi Chen:
KGBIAC: Knowledge Graph Based Intelligent Alert Correlation Framework. 523-530

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














