


default search action
UbiSec 2021: Guangzhou, China
- Guojun Wang

, Kim-Kwang Raymond Choo
, Ryan K. L. Ko
, Yang Xu
, Bruno Crispo
:
Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers. Communications in Computer and Information Science 1557, Springer 2022, ISBN 978-981-19-0467-7 - Meirong Liu

, Hong Zheng
, Qin Liu
, Xiaofei Xing
, Yinglong Dai
:
A Backdoor Embedding Method for Backdoor Detection in Deep Neural Networks. 1-12 - Wei Liu, Wenlong Feng, Benguo Yu, Tao Peng:

Security and Privacy for Sharing Electronic Medical Records Based on Blockchain and Federated Learning. 13-24 - Shaobo Zhang

, Shuo Yang, Gengming Zhu, Entao Luo, Jiyong Zhang, Desheng Xiang:
A Fine-Grained Access Control Scheme for Electronic Health Records Based on Roles and Attributes. 25-37 - Yuting Tang, Dafang Zhang, Wei Liang

, Kuan-Ching Li
, Nitin Sukhija:
Active Malicious Accounts Detection with Multimodal Fusion Machine Learning Algorithm. 38-52 - John Carter

, Spiros Mancoridis
:
Evaluation of an Anomaly Detector for Routers Using Parameterizable Malware in an IoT Ecosystem. 53-65 - Aiswarya S. Nair, Sabu M. Thampi

:
PUFloc: PUF and Location Based Hierarchical Mutual Authentication Protocol for Surveillance Drone Networks. 66-89 - Qiang Zhang, Guihua Duan, Shukun Liu:

Smart Search over Encrypted Educational Resources in Cloud Storage. 90-101 - Abigail M. Y. Koay

, Miao Xie, Ryan K. L. Ko
, Charles Sterner, Taejun Choi, Naipeng Dong
:
SDGen: A Scalable, Reproducible and Flexible Approach to Generate Real World Cyber Security Datasets. 102-115 - Wahid Sadique Koly

, Abu Kaisar Jamil, Mohammad Shahriar Rahman, Hanif Bhuiyan, Md. Zakirul Alam Bhuiyan, Abdullah Al Omar:
Towards a Location-Aware Blockchain-Based Solution to Distinguish Fake News in Social Media. 116-130 - Shaila Sharmin

, Hafizah Mansor
, Andi Fitriah Abdul Kadir
, Normaziah Abdul Aziz:
Using Streaming Data Algorithm for Intrusion Detection on the Vehicular Controller Area Network. 131-144 - Yuzhu Wang, Peiheng Zhang, Haitao Zhan, Mingwu Zhang:

Privacy-Enhanced Mean-Variance Scheme Against Malicious Signature Attacks in Smart Grids. 145-158 - Peng Yang

, Shaohong Zhang
, Liu Yang:
Privacy-Preserving Cluster Validity. 159-170 - Andrei-Cristian Iosif

, Tiago Espinha Gasiba
, Tiange Zhao
, Ulrike Lechner
, Maria Pinto-Albuquerque
:
A Large-Scale Study on the Security Vulnerabilities of Cloud Deployments. 171-188 - Tristan Corrick, Vimal Kumar

:
Design and Architecture of Progger 3: A Low-Overhead, Tamper-Proof Provenance System. 189-202 - Jiangchang Cheng

, Fumin Yu
, Hongliang Zhang
, Yinglong Dai
:
Skill Reward for Safe Deep Reinforcement Learning. 203-213 - Hossein Keipour, Saptarshi Hazra, Niclas Finne, Thiemo Voigt:

Generalizing Supervised Learning for Intrusion Detection in IoT Mesh Networks. 214-228 - Yipeng Zou, Tao Peng

, Wentao Zhong, Kejian Guan, Guojun Wang
:
Reliable and Controllable Data Sharing Based on Blockchain. 229-240 - Xuehua Liu, Liping Ding, Tao Zheng, Fang Yu, Zhen Jia, Wang Xiao:

A Network Forensics Investigating Method Based on Weak Consistency for Distributed SDN. 241-254 - Jiaying Lin, Yehua Wei, Wenjia Li, Jing Long:

Intrusion Detection System Based on Deep Neural Network and Incremental Learning for In-Vehicle CAN Networks. 255-267 - Shakil, Muhammad Arif, Shahab Saquib Sohail

, Mohammed Talha Alam, Syed Ubaid, Md. Tabrez Nafis, Guojun Wang
:
Towards a Two-Tier Architecture for Privacy-Enabled Recommender Systems (PeRS). 268-278 - A. N. M. Bazlur Rashid

, Mohiuddin Ahmed, Sheikh Rabiul Islam:
A Supervised Rare Anomaly Detection Technique via Cooperative Co-evolution-Based Feature Selection Using Benchmark UNSW_NB15 Dataset. 279-291 - Ashley Woodiss-Field, Michael N. Johnstone, Paul S. Haskell-Dowland:

Towards Evaluating the Effectiveness of Botnet Detection Techniques. 292-308 - Wenjia Li, Juecong Cai, Zi Wang, Sihua Cheng:

A Robust Malware Detection Approach for Android System Based on Ensemble Learning. 309-321 - Xingshen Wei

, Yongjian Cao, Peng Gao, Junxian Xu:
A Reverse Auction Based Efficient D2D Transmission Mechanism for Ubiquitous Power Terminals. 322-335 - Xianggang Zhang

, Jing Zeng, Guoyu Wang
:
A Fine-Tuning Strategy Based on Real Scenes in Gait Identification. 336-350 - Li Ma, Huihong Yang, Yiming Chai, Jiawen Fan, Wenyin Yang:

An Online Automated Anti-anti-virus Method. 351-362 - Hongling Chen, Zhiwen Liao, Qin Liu:

Research on Bandwidth Reservation Algorithm of Teaching Resources in Cloud Computing Environment. 363-370 - Lei Xu, Dingkun Yang:

An Edge-Cloud Collaborative Object Detection System. 371-378

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














