


default search action
CSS 2019: Guangzhou, China - Part I
- Jaideep Vaidya, Xiao Zhang, Jin Li:

Cyberspace Safety and Security - 11th International Symposium, CSS 2019, Guangzhou, China, December 1-3, 2019, Proceedings, Part I. Lecture Notes in Computer Science 11982, Springer 2019, ISBN 978-3-030-37336-8
Network Security
- Xin Xie, Bin Wang, Tiancheng Wan, Xunyi Jiang, Weiru Wang, Wenliang Tang:

Research and Application of Anomaly Detection of Industrial Control System Based on Improved Zoe Algorithm. 3-12 - Xin Xie, Xunyi Jiang, Weiru Wang, Bin Wang, Tiancheng Wan, Hao Yang:

An Intrusion Detection Method Based on Hierarchical Feature Learning and Its Application. 13-20 - Tianqi Huang, Buhong Wang, Dong Lin:

Spoofing Attack Detection for Radar Network System State Estimation. 21-33 - Jiayu Yao, Xiani Fan, Ning Cao:

Survey of Network Security Situational Awareness. 34-44 - Yao Wang, Wencong Han, Lianfang Wang, Lu Liu, Xiao Yu:

Encrypting VoLTE Communication via Baseband Firmware Extension. 45-56 - Lixia Xie, Ying Ding, Hongyu Yang:

Mitigating Link-Flooding Attack with Segment Rerouting in SDN. 57-69
System Security
- Yifang Zhi, Li Yang, Shui Yu

, Jianfeng Ma:
BQSV: Protecting SDN Controller Cluster's Network Topology View Based on Byzantine Quorum System with Verification Function. 73-88 - Kai Yang, Xiaoya Ma, Hongwei Jiang, Yuan Xue, Wencong Han, Lianfang Wang, Lu Liu:

A Data Protection Scheme via Isolating Android Partitions. 89-101 - Hongwei Jiang, Kai Yang, Lianfang Wang, Jinbao Gao, Sikang Hu:

A Code Protection Scheme via Inline Hooking for Android Applications. 102-116 - Jingbin Liu, Qin Yu, Wei Liu, Shijun Zhao, Dengguo Feng, Weifeng Luo:

Log-Based Control Flow Attestation for Embedded Devices. 117-132 - Kai Ding

, Chisheng Wang
, Ming Tao
, Peican Huang
:
A New Algorithm for Retrieving Diffuse Attenuation Coefficient Based on Big LiDAR Bathymetry Data. 133-142 - Huaijuan Zang, Qiuyu Li, Ailian Chen, Jinlong Chen, Shu Zhan:

Shuffle Dense Networks for Biometric Authentication. 143-156
Information Security
- Wenti Yang, Zhitao Guan:

An Efficient Attribute Based Encryption Scheme in Smart Grid. 159-172 - Yanhua Zhang, Ximeng Liu, Yupu Hu, Qikun Zhang, Huiwen Jia:

Attribute-Based Signatures for Inner-Product Predicate from Lattices. 173-185 - Jiaxi Hu, Zhiqiang Xu, Debiao He, Sherali Zeadally, Kim-Kwang Raymond Choo

:
Efficient and Secure Three-Factor User Authentication and Key Agreement Using Chaotic Maps. 186-202 - Yuhua Xu, Zhixin Sun:

Achieving Data Security, Access Control and Authentication of Controllers in Hierarchical Software Defined Networking with Attribute Based Encryption. 203-213 - Fangguo Zhang

, Zhuoran Zhang:
ECC2: Error Correcting Code and Elliptic Curve Based Cryptosystem. 214-229 - Qunshan Chen

, Zhenjie Huang
, Yong Ding
, Yuping Zhou, Hui Huang:
A New Provably Secure Identity-Based Multi-proxy Signature Scheme. 230-242
Privacy Preservation
- Ying Xia, Yao Lin, Hao Wang:

A Differentially Private Trajectory Publishing Mechanism Based on Stay Points. 245-257 - Hui Sun, Cheng Huang, Xu Cheng, Fulong Chen:

Data Privacy Protection in Medical Alliance Chain Based on K-Anonymity. 258-264 - Song-Zhan Lv, Yining Liu, Jingtao Sun:

IMES: An Automatically Scalable Invisible Membrane Image Encryption for Privacy Protection on IoT Sensors. 265-273 - Dongfeng Wang, Qinghua Li, Fengyin Li, Quanxin Zhang, Banghai Xu:

Privacy-Awareness Fair Contract Signing Protocol Based on Blockchain. 274-278 - ShanGuo Lv:

Efficient Privacy Protection Authentication Scheme in Vehicle Ad Hoc Networks. 279-288 - Jun Luo, Hong Liu, Qianyang Cheng:

Cooperative Privacy Preservation for Internet of Vehicles with Mobile Edge Computing. 289-303
Machine Learning and Security
- Changjiang Li, Haiqin Weng, Shouling Ji, Jianfeng Dong, Qinming He:

DeT: Defending Against Adversarial Examples via Decreasing Transferability. 307-322 - Tengyao Li

, Buhong Wang, Fute Shang, Jiwei Tian
, Kunrui Cao:
ADS-B Data Attack Detection Based on Generative Adversarial Networks. 323-336 - Jiwei Tian

, Buhong Wang, Tengyao Li, Fute Shang, Kunrui Cao, Jing Li:
Stealthy and Sparse False Data Injection Attacks Based on Machine Learning. 337-347 - Dang Duy Thang

, Toshihiro Matsui:
Automated Detection System for Adversarial Examples with High-Frequency Noises Sieve. 348-362 - Haojun Ai, Yifeng Wang, Yuhong Yang, Quanxin Zhang:

An Improvement of the Degradation of Speaker Recognition in Continuous Cold Speech for Home Assistant. 363-373 - Yaxiao Wang

, Yuanzhang Li, Quanxin Zhang, Jingjing Hu, Xiaohui Kuang:
Evading PDF Malware Classifiers with Generative Adversarial Network. 374-387
Cyberspace Safety
- Yuyi Liu, Pavol Zavarsky, Yasir Malik:

Non-linguistic Features for Cyberbullying Detection on a Social Media Platform Using Machine Learning. 391-406 - Qi Wu:

Another Look at a Proposed Cubic Chaotic Mapping. 407-412 - Yan Zhao, Huwei Liu

, Ning Cao:
Research on Drug Regulation Mode in the Age of the Internet of Things. 413-424 - Xihua Liu, Lianyong Qi, Xiaolong Xu

, Xuyun Zhang
, Shaohua Wan
:
Privacy-Aware Service Migration for Edge Computing in Urban Cities. 425-436 - Hong Shu

, Fulong Chen
, Dong Xie, Ping Qi
, Yongqing Huang:
A Certificateless Aggregate Signature Scheme Based on Blockchain for EMR. 437-443 - Meifang Du, Haojia Zhu:

The Fuzzy Integral Evaluation Method Based on Feature Weighting for the Level of Complex Social Development. 444-454
Big Data and Security
- Ming Tao

, Peican Huang
, Xueqiang Li
, Kai Ding
:
Big Data Based E-commerce Search Advertising Recommendation. 457-466 - Xu Chang, Fanchang Hao, Jian Wu, Guorui Feng:

File Recovery of High-Order Clearing First Cluster Based on FAT32. 467-476 - Shanguo Lv:

Mobile Recommendation Method for Fusing Item Features and User Trust Relationship. 477-488 - Hongli Chen, ShanGuo Lv:

Research on Collaborative Filtering Recommendation Method Based on Context and User Credibility. 489-500 - Jingjun Zhou

, Jingbing Li, Hui Li, Jing Liu
, Jialing Liu, Qianning Dai, Saqib Ali Nawaz
:
Multi-watermarking Algorithm for Medical Image Based on NSCT-RDWT-DCT. 501-515 - Jiawei Li, Bo Liu, Weiwei Lin, Pengfei Li, Qian Gao:

An Improved Container Scheduling Algorithm Based on PSO for Big Data Applications. 516-530
Cloud and Security
- Shang Ci

, Liping Sun, Xiaoqing Liu, Tingli Du, Xiaoyao Zheng:
A Secure Density Peaks Clustering Algorithm on Cloud Computing. 533-541 - Xiani Fan, Jiayu Yao, Ning Cao:

Research on Cloud Computing Security Problems and Protection Countermeasures. 542-551 - Huwei Liu

, Yan Zhao, Ning Cao:
Research on Logistics Distribution Vehicle Scheduling Algorithm Based on Cloud Computing. 552-561 - Shengli Zhao, Zhaochan Li, Ning Cao:

Cloud Security Solution Based on Software Defined Network. 562-574 - Wenmin Lin, Xuan Sheng, Lianyong Qi:

An Optimized Multi-Paxos Consensus Protocol for Practical Cloud Storage Applications. 575-584 - Chao Zhang, Shaojing Fu, Weijun Ao:

A Blockchain Based Searchable Encryption Scheme for Multiple Cloud Storage. 585-600

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














