


default search action
UbiSec 2022: Zhangjiajie, China
- Guojun Wang
, Kim-Kwang Raymond Choo
, Jie Wu
, Ernesto Damiani
:
Ubiquitous Security - Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28-31, 2022, Revised Selected Papers. Communications in Computer and Information Science 1768, Springer 2023, ISBN 978-981-99-0271-2
Cyberspace Security
- Sabrina Friedl
, Ludwig Englbrecht
, Fabian Böhm
, Günther Pernul
:
Support Tool Selection in Digital Forensics Training. 3-21 - Michael Tsai, Vimal Kumar
:
Listen to the Music: Evaluating the Use of Music in Audio Based Authentication. 22-37 - Wenti Yang
, Zhaoyang He, Yalei Li, Haiyan Zhang, Zhitao Guan
:
A Hybrid Secure Two-Party Protocol for Vertical Federated Learning. 38-51 - Wanyi Gu, Guojun Wang
, Peiqiang Li, Xubin Li, Guangxin Zhai, Xiangbin Li, Mingfei Chen:
Detecting Unknown Vulnerabilities in Smart Contracts with Multi-Label Classification Model Using CNN-BiLSTM. 52-63 - Tiange Zhao
, Ulrike Lechner
, Maria Pinto-Albuquerque
, Ece Ata
, Tiago Gasiba
:
CATS: A Serious Game in Industry Towards Stronger Cloud Security. 64-82 - Mst. Shapna Akter, Hossain Shahriar, Zakirul Alam Bhuiya:
Automated Vulnerability Detection in Source Code Using Quantum Natural Language Processing. 83-102 - John Carter
, Spiros Mancoridis
, Malvin Nkomo
, Steven Weber
, Kapil R. Dandekar
:
System Call Processing Using Lightweight NLP for IoT Behavioral Malware Detection. 103-115 - Zhiqiang Wang, Sulong Meng, Ying Chen:
Vulnerability Detection with Representation Learning. 116-128 - Zijing Zhang
, Vimal Kumar
, Michael Mayo
, Albert Bifet
:
Assessing Vulnerability from Its Description. 129-143 - Yun Duan, Laifu Wang, Dongxin Liu, Boren Deng, Yunfan Tian:
Malware Traffic Classification Based on GAN and BP Neural Networks. 144-160 - Akram Louati, Tiago Gasiba
:
Source Code Vulnerability Detection Using Deep Learning Algorithms for Industrial Applications. 161-178 - Xiangbin Li, Xiaofei Xing
, Guojun Wang
, Peiqiang Li, Xiangyong Liu:
Detecting Unknown Vulnerabilities in Smart Contracts with Binary Classification Model Using Machine Learning. 179-192 - Nuno Torres
, Ana Chaves
, César Toscano
, Pedro Pinto
:
Prototyping the IDS Security Components in the Context of Industry 4.0 - A Textile and Clothing Industry Case Study. 193-206 - Shitao Wang, Wenjun Jiang
, Shuhong Chen
:
An Aspect-Based Semi-supervised Generative Model for Online Review Spam Detection. 207-219 - Fumin Yu
, Feng Gao
, Yao Yuan
, Xiaofei Xing
, Yinglong Dai
:
Hierarchical Policies of Subgoals for Safe Deep Reinforcement Learning. 220-232 - Yanbin Weng, Zuochuang Li, Xiaobin Huang, Xiahu Chen:
Improved DeepLabV3+ based Railway Track Extraction to Enhance Railway Transportation Safety. 233-247 - Khalid Hamid
, Muhammad Waseem Iqbal, Muhammad Aqeel, Xiangyong Liu, Muhammad Arif:
Analysis of Techniques for Detection and Removal of Zero-Day Attacks (ZDA). 248-262 - Ahmed Sabbah
, Adel Taweel
, Samer Zein
:
Android Malware Detection: A Literature Review. 263-278 - Mohammed Kharma
, Adel Taweel
:
Threat Modeling in Cloud Computing - A Literature Review. 279-291 - Bo Zheng, Yong Xie:
A New Signal Packing Algorithm for CAN-FD with Security Consideration. 292-303 - Shuqi Liu, Yufeng Zhuang, Xinyu Ma, Hongping Wang, Danni Cao:
An Adversarial Sample Defense Method Based on Saliency Information. 304-318 - Henrique Dias
, Nirvana Meratnia:
BlockLearning: A Modular Framework for Blockchain-Based Vertical Federated Learning. 319-333
Cyberspace Privacy
- Guanghui Feng, Wenyin Yang
, Tao Peng
, Xiaofei Xing, Shuhong Chen, Yuting Li:
An Interactive Query Differential Privacy Protection Model Based on Big Data Analysis. 337-351 - Xiangyong Liu
, Pengfei Yin
, Pin Liu
, Shuhong Chen
:
Decentralized Collaborative Filtering Algorithm with Privacy Preserving for Recommendation in Mobile Edge Computing. 352-365 - Mohamad Jamil Al Bouhairi, Mostakim Mullick, Marvin Wolf, Ivan Gudymenko, Sebastian Clauss:
Encryption Proxies in a Confidential Computing Environment. 366-379 - Yuting Li, Guojun Wang
, Tao Peng, Guanghui Feng:
FedTA: Locally-Differential Federated Learning with Top-k Mechanism and Adam Optimization. 380-391 - Kai Cheng, Liandong Chen, Huifeng Yang, Dan Luo
, Shuai Yuan, Zhitao Guan
:
Differentially Private Clustering Algorithm for Mixed Data. 392-405 - Anam Fatima, Muhammad Waseem Iqbal, Muhammad Aqeel, Toqir A. Rana
, Shuhong Chen, Muhammad Arif:
Impact of Reenactment Programs on Young Generation. 406-422 - Xiaoqian Ran, Yufeng Zhuang, Hongping Wang, Danni Cao, Yulian Cao, Wenjuan Gu:
Sensor Cloud Data Privacy Protection Model Based on Collaborative Deep Learning. 423-435
Cyberspace Anonymity
- Songlv Feng, Cuina Cheng, Liping Mo:
An Improved Cuckoo Search Algorithm and Its Application in Function Optimization. 439-455 - Xin Qi, Hongling Chen, Qin Liu:
Empirical Likelihood for PLSIM with Missing Response Variables and Error-Prone Covariates. 456-470 - Li Duan, Yong Li:
High-Speed Anonymous Device Authentication Without Asymmetric Cryptography in the Internet-of-Things. 471-484 - Zhenru Huo, Guoqing Jia, Weidong Fang, Wei Chen, Wuxiong Zhang:
A-VMD: Adaptive Variational Mode Decomposition Scheme for Noise Reduction in Sensor-Cloud. 485-496 - Irfan Ali, Muhammad Naeem Shehzad, Qaisar Bashir, Haroon Elahi, Muhammad Naeem Awais, Oana Geman, Pin Liu:
A Thermal-Aware Scheduling Algorithm for Reducing Thermal Risks in DAG-Based Applications in Cyber-Physical Systems. 497-508
Short Papers
- Haiyang Huang, Falong Xiao, Xiaofang Zhang, Wanting Yan, Fumin Liu, Yuezhong Wu
:
Garbage Recognition Algorithm Based on Self-attention Mechanism and Deep Sorting. 511-522 - Muntaha Alawneh, Imad M. Abbadi:
Approaches for Zero Trust Adoption Based upon Organization Security Level. 523-533 - Saad Khan
, Tariq A. A. Alsboui
, Richard Hill
, Hussain Al-Aqrabi
:
Multi-Mobile Agent Security by Design Itinerary Planning Approach in Wireless Sensor Network. 534-544 - Omar Alshaikh
, Simon Parkinson
, Saad Khan
:
On the Variability in the Application and Measurement of Supervised Machine Learning in Cyber Security. 545-555

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.