


default search action
CSS 2019: Guangzhou, China - Part II
- Jaideep Vaidya, Xiao Zhang, Jin Li:

Cyberspace Safety and Security - 11th International Symposium, CSS 2019, Guangzhou, China, December 1-3, 2019, Proceedings, Part II. Lecture Notes in Computer Science 11983, Springer 2019, ISBN 978-3-030-37351-1
Network Security
- Yinqi Yang, Jian Wang, Baoqin Zhai, Jiqiang Liu:

IoT-Based DDoS Attack Detection and Mitigation Using the Edge of SDN. 3-17 - Xianglin Wei, Chaogang Tang:

Location Consistency-Based MITM Attack Detection in 802.11ad Networks. 18-29 - Yifu Liu, Jieren Cheng, Xiangyan Tang, Mengyang Li, Luyi Xie:

Multi-view DDoS Network Flow Feature Extraction Method via Convolutional Neural Network. 30-41 - Xiangyan Tang, Rui Cao, Jieren Cheng, Dong Fan, Wenxuan Tu:

DDoS Attack Detection Method Based on V-Support Vector Machine. 42-56 - Xiangyan Tang, Yiyang Zhang, Jieren Cheng, Jinying Xu, Hui Li:

DDOS Multivariate Information Fusion Model Based on Hierarchical Representation Learning. 57-66 - Mengying Wu, Zhendong Wu, Hao Lv, Jingjing Wang:

A Method of Malicious Bot Traffic Detection. 67-76 - Xiaochun Cheng

, Matus Mihok:
Intrusion Detection Traps within Live Network Environment. 77-89
System Security
- Xueshuo Xie, Zongming Jin, Qingqi Han, Shenwei Huang, Tao Li:

A Confidence-Guided Anomaly Detection Approach Jointly Using Multiple Machine Learning Algorithms. 93-100 - Xinxin Wang

, Yuanzhang Li, Quanxin Zhang, Xiaohui Kuang:
Boosting Training for PDF Malware Classifier via Active Learning. 101-110 - John Mark Andah

, Jinfu Chen
:
Malicious Intentions: Android Internet Permission Security Risks. 111-120 - Xiaohui Kuang, Ming Zhang

, Hu Li, Gang Zhao, Huayang Cao, Zhendong Wu, Xianmin Wang
:
DeepWAF: Detecting Web Attacks Based on CNN and LSTM Models. 121-136 - Jingjing Wang, Zhendong Wu, Zhang Zhang:

Research on Intrusion Detection Based on Semantic Re-encoding and Multi-space Projection. 137-150 - Mengtian Cui

, Yameng Huang, Jing Luo:
Software Defect Prediction Model Based on GA-BP Algorithm. 151-161 - Bahast Ali

, Xiaochun Cheng
:
Security Solution Based on Raspberry PI and IoT. 162-171
Information Security
- Haojia Zhu, Can Cui, Fengyin Li, Zhongxing Liu, Quanxin Zhang:

Design of Anonymous Communication Protocol Based on Group Signature. 175-181 - Chen Wang, Andi Wang, Xinyu Liu, Jian Xu

:
Research on K-Means Clustering Algorithm Over Encrypted Data. 182-191 - Wang Yao, Faguo Wu, Xiao Zhang:

Requester-Centric CP-ABE Combining Removing Escrow and Outsourcing Decryption. 192-204 - Xiaohan Yue

, Mingju Sun, Xibo Wang, Hong Shao, Yuan He
:
An Efficient Dynamic Group Signatures Scheme with CCA-Anonymity in Standard Model. 205-219 - Xiaohan Yue

, Xin Wang, Xibo Wang, Wencheng Cui, Yuan He
:
An Efficient Property-Based Authentication Scheme in the Standard Model. 220-233 - Ping Li, Jin Li, Alzubair Hassan:

Group Identification via Non-threshold Leakage-Resilient Secret Sharing Scheme. 234-241 - Pengtao Liu:

A Standard Model Secure Verifiably Encrypted Signature Scheme Based on Dual System. 242-252 - Yiming Qin

, Xinchun Cui, Yuefan Wang, Hong Qiao, Shancang Li:
Lightweight Encryption Algorithm Containing SPN Structure for IoT. 253-262 - Jilin Yang, Chunjie Cao, Jun Zhang, Jixin Ma

, Xiaoyi Zhou:
A Blind Watermarking Scheme Using Adaptive Neuro-Fuzzy Inference System Optimized by BP Network and LS Learning Model. 263-274 - Chuan Zhao, Shengnan Zhao, Bo Zhang

, Shan Jing, Zhenxiang Chen, Minghao Zhao:
Towards Secure Computation of Similar Patient Query on Genomic Data Under Multiple Keys. 275-284 - Ping Li, Jin Li:

Secure and Dynamic Outsourcing Computation of Machine Learning in Cloud Computing. 285-292 - Hua Yang, Zhendong Wu:

A Biometric Key Generation Method for Fingerprint and Finger Vein Fusion. 293-300 - Yaoping Wu, Zhendong Wu, Hua Yang:

A Fingerprint and Voiceprint Fusion Identity Authentication Method. 301-310
Trust and Privacy
- Rui Ge, Ying Zheng, Fengyin Li, Dongfeng Wang, Yuanzhang Li:

Research and Application of Trusted Service Evaluation Model in Social Network. 313-317 - Wantong Zheng, Yong Ma, Zhongyue Wang, Chunfu Jia, Peng Li:

Effective L-Diversity Anonymization Algorithm Based on Improved Clustering. 318-329 - Yonglu Wang, Kaizhong Zuo, Rui Liu, Liangmin Guo:

Semantic Location Privacy Protection Based on Privacy Preference for Road Network. 330-342 - Zhaohui Wei, Qingqi Pei, Xuefeng Liu, Lichuan Ma:

Efficient Privacy Preserving Cross-Datasets Collaborative Outlier Detection. 343-356 - Weifeng Sun, MingHan Jia, Shumiao Yu, Boxiang Dong, Xinyi Li:

An SVM Based Secural Image Steganography Algorithm for IoT. 357-371 - Baochang Zhang

, Juan Li, Xi Zheng, Jingjun Ge, Juan Sun:
A Blockchain-Based Mobile IOT Network Interconnection Security Trusted Protocol Model. 372-381 - Zhenhua Liu, Yan Liu, Jing Xu, Baocang Wang:

Privacy-Preserving Attribute-Based Multi-keyword Search Encryption Scheme with User Tracing. 382-397
Authentication
- Wei Li, Nan Li:

Facial Localization Based on Skin Color Modeling. 401-408 - Shudi Chen, Youwen Zhu:

A Textual Password Entry Method Resistant to Human Shoulder-Surfing Attack. 409-420 - Haojun Ai, Wuyang Xia, Quanxin Zhang:

Speaker Recognition Based on Lightweight Neural Network for Smart Home Solutions. 421-431 - Fan Wang

, Zheng Qin
, Hui Yin
:
A Fine-Grained Authorized Keyword Secure Search Scheme in the Cloud Computing. 432-447 - Xiaochun Cheng

, Andreas Pitziolis, Aboubaker Lasebae:
Implementing Fingerprint Recognition on One-Time Password Device to Enhance User Authentication. 448-461 - Tingting Lan, Hui Wang, Lin You

:
A Secure Authentication Scheme Based on Chen's Chaotic System and Finger Vein's Auxiliary Data. 462-476
Machine Learning and Security
- Juan Wang, Guanghui Li, Fei Du, Meng Wang, Yong Hu, Meng Yu, Aiyun Zhan, Yuejin Zhang:

Image Denoising Based on Sparse Representation over Learned Dictionaries. 479-486 - Di Jiang, Hui Liu, Qiang Guo, Caiming Zhang:

Cyclic DenseNet for Tumor Detection and Identification. 487-493 - Xin Liu, Hui Liu, Qiang Guo, Caiming Zhang:

Stock Prediction Model Based on Wavelet Packet Transform and Improved Neural Network. 494-500 - Guoyu Yang, Yilei Wang, Banghai Xu, Xiaofeng Zhang:

An Image Denoising Algorithm Based on Singular Value Decomposition and Non-local Self-similarity. 501-510 - Jiaji Pan, Jingkang Yang, Yining Liu:

Dummy Trajectory Generation Scheme Based on Deep Learning. 511-523 - Xiaolu Wang, Zhi Wang, Wei Shao, Chunfu Jia, Xiang Li:

Explaining Concept Drift of Deep Learning Models. 524-534 - Liyuan Liu, Lifeng Zhang, Shixiang Jia:

Attention Bilinear Pooling for Fine-Grained Facial Expression Recognition. 535-542
Cyberspace Safety
- Yuejin Zhang, Fei Du, Meng Wang, Juan Wang, Yong Hu, Meng Yu, Guanghui Li, Aiyun Zhan:

A Secure Collision Avoidance Warning Algorithm Based on Environmental Characteristics and Driver Characteristics. 545-552 - Aiyun Zhan, Meng Wang, Juan Wang, Fei Du, Yong Hu, Meng Yu, Guanghui Li, Yuejin Zhang:

Research on Safety Early Warning Transmission Control Algorithm Based on Driving Stability. 553-561 - Yu-an Zhang, Xiaofeng Qin

, Minghao Zhao, Meiyun Du, Rende Song:
Body-Weight Estimation of Plateau Yak with Simple Dimensional Measurement. 562-571 - Wei Li, Zhilin Song:

Bank Card Number Identification Based on Template Matching Method. 572-578 - Xiangyan Tang, Meizhu Chen, Jieren Cheng, Jinying Xu, Hui Li:

A Security Situation Assessment Method Based on Neural Network. 579-587 - Lei Shi, Xiao Chen

, Sheng Wen, Yang Xiang
:
Main Enabling Technologies in Industry 4.0 and Cybersecurity Threats. 588-597

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














