


default search action
Cybersecurity, Volume 8
Volume 8, Number 1, December 2025
- Xiaogang Xing, Ming Xu

, Yujing Bai, Dongdong Yang:
A graph backdoor detection method for data collection scenarios. 1 - Laura Quiroga-Sánchez, Germán Adolfo Montoya, Carlos Andres Lozano-Garzon:

The SEIRS-NIMFA epidemiological model for malware propagation analysis in IoT networks. 2 - Xueqi Zhu, Fangzhou Liu, Yan Jia, Jun Xu, Peng Wang

:
Cryptanalysis of IAR-CTR and IAR-CFB and a fixing method. 3 - Yucheng Ma, Peisong Shen, Xue Tian, Kewei Lv, Chi Chen:

Reusable and robust fuzzy extractor for CRS-dependent sources. 4 - Malte Kerl

, Ulf Bodin, Olov Schelén:
Privacy-preserving attribute-based access control using homomorphic encryption. 5 - Lin Wu, Yulai Xie, Jin Li, Dan Feng, Jinyuan Liang, Yafeng Wu:

Angus: efficient active learning strategies for provenance based intrusion detection. 6 - Hongfang Zhou, Heng Pan, Kangyun Zheng, Zongling Wu, Qingyu Xiang:

A novel oversampling method based on Wasserstein CGAN for imbalanced classification. 7 - Jian Zheng, Shumiao Ren, Jingyue Zhang, Yu Kui, Jingyi Li, Qin Jiang, Shiyan Wang:

Detection to false data for smart grid. 8 - Guangli Wu, Xingyue Wang:

A privacy-enhanced framework with deep learning for botnet detection. 9 - Lianglin Yan

, Ming Luo, Mingsheng Wang:
Speedup signing: pre-rejection sampling towards dilithium. 10 - Huanwei Wang

, Weining Hao, Yonghe Tang, Bing Zhu, Weiyu Dong, Wei Liu:
Deep neural network modeling attacks on arbiter-PUF-based designs. 11 - Ri Wang, Chen Li

, Kun Zhang, Bibo Tu:
Zero-trust based dynamic access control for cloud computing. 12 - Ruiqi Huang, Hua Wu

, Xiaohui Wang, Guang Cheng, Xiaoyan Hu:
The secret behind instant messaging: video identification attack against complex protocols. 13 - Han Zhang, Yong Shi, Ming Liu, Libo Chen, Songyang Wu, Zhi Xue:

A combined feature selection approach for malicious email detection based on a comprehensive email dataset. 14 - Yaqi Yang, Jun'e Li

, Tao Zhang, Lu Chen, Guirong Huang, Zhuo Lv:
IRMAOC: an interpretable role mining algorithm based on overlapping clustering. 54 - Jie Zhang

, Haoyu Bu, Hui Wen, Yongji Liu, Haiqiang Fei, Rongrong Xi, Lun Li, Yun Yang, Hongsong Zhu, Dan Meng:
When LLMs meet cybersecurity: a systematic literature review. 55 - Qiuxiang Li, Jianping Wu:

Efficient network attack path optimization method based on prior knowledge-based PPO algorithm. 15 - Yanjun Li

, Lixian Zhang, Yiping Lin, Jian Liu, Yani Sun:
Integral cryptanalysis on reduce-round SAILFISH-I. 16 - Tian Tian, Chen Zhang, Bo Jiang, Huamin Feng, Zhigang Lu:

Insider threat detection for specific threat scenarios. 17 - Weixuan Tang, Yuan Rao

, Zuopeng Yang, Fei Peng, Xutong Cui, Junhao Huang, Peijun Zhu:
Reversible generative steganography with distribution-preserving. 18 - Kai He, Shengyuan Shi, Chunxiao Yin, Hongyan Wan, Jiaoli Shi:

Private, efficient, and flexible: protecting names based on message-derived encryption in named data networking. 19 - Shihao Zhang, Yanhui Xiao, Huawei Tian, Xiaolong Li:

A multi-image steganography: ISS. 20 - Yaguan Qian, Renhui Tao, Huabin Du, Bin Wang:

Unveiling the veil: high-frequency components as the key to understanding medical DNNs' vulnerability to adversarial examples. 21 - Zezhou Hou, Jiongjiong Ren

, Shaozhen Chen:
Improved machine learning-aided linear cryptanalysis: application to DES. 22 - Jiachen Zhang, Daoqi Han, Zhaoxuan Lv, Yueming Lu

, Junke Duan, Yang Liu, Xinyu Zhang:
Bag2image: a multi-instance network traffic representation for network security event prediction. 31 - Pengcheng Zhu, Xin Jin, Qian Jiang, Xueshuai Gao, Puming Wang, Shaowen Yao, Wei Zhou:

Transferable adversarial attacks for multi-model systems coupling image fusion with classification models. 23 - Mir Nazish

, Munika Javid
, M. Tariq Banday
:
Enhanced logistic map with infinite chaos and its applicability in lightweight and high-speed pseudo-random bit generation. 24 - Nan Liu, Chenhui Jin, Junwei Yu

:
Key committing attack on Tiaoxin-346 algorithm. 25 - Mengmeng Ge, Ruitao Feng

, Likun Liu, Xiangzhan Yu, Vinay Sachidananda, Xiaofei Xie
, Yang Liu:
Enmob: Unveil the Behavior with Multi-flow Analysis of Encrypted App Traffic. 26 - Yalu Wang

, Zhijie Han, Ying Du, Jie Li, Xin He:
BS-GAT: a network intrusion detection system based on graph neural network for edge computing. 27 - Chen Yang Lin, Hui Zhao

, Jing Han Liu:
A lightweight vulnerability detection method for long smart contracts based on bimodal feature fusion. 28 - Yuan Zhang, Jiaru Song, Yongxiong Sun, Zhanheng Gao, Zhe Hu, Minghui Sun

:
Federated two-stage transformer-based network for intrusion detection in non-IID data of controller area networks. 29 - Shujiao Cao

, Rui Xue:
Quantum commitments from structured one-way quantum state generators, and more. 30 - Birong Xu

, Ximei Ye, Xiaoyuan Wang, Zhipeng Zhang:
Image encryption scheme based on compressed sensing and fractional quantum logistic-tent map. 56 - Ying Gao

, Lin Qi:
Upper bounds of differential branch number of n-bit permutations. 58 - Rodrigo Castillo Camargo, Juan Murcia Nieto, Nicolás Rojas, Daniel Díaz López, Santiago Alférez, Ángel Luis Perales Gómez, Pantaleone Nespoli, Félix Gómez Mármol, Umit Karabiyik:

DEFENDIFY: defense amplified with transfer learning for obfuscated malware framework. 97 - Shihao Zhang, Yanhui Xiao, Huawei Tian, Xiaolong Li:

Correction: A multi-image steganography: ISS. 99 - Jingqiang Liu, Ruigang Liang, Xiaoxi Zhu, Yue Zhang, Yuling Liu, Qixu Liu:

LLM4TDG: test-driven generation of large language models based on enhanced constraint reasoning. 32 - Daniel Scheliga

, Patrick Mäder
, Marco Seeland
:
Privacy preserving federated learning with convolutional variational bottlenecks. 33 - Qinggan Fu, Ye Luo, Qianqian Yang, Ling Song

:
Preimage and collision attacks on reduced Ascon using algebraic strategies. 34 - Mohammad Alshinwan, Osama Ahmed Khashan

, Zakwan Al-Arnaout
, Salam Salameh Shreem, Ahmed Younes Shdefat, Nader Abdel Karim:
A novel Smishing defense approach based on meta-heuristic optimization algorithms. 35 - Yuxin Tong, Shimin Li, Zhiwei Wang, Rui Zhang, Rui Xue:

Adaptively secure, splittable, and robust threshold unsigncryption. 57 - Xinxin Yue

, Zhiyong Zhang
, Junchang Jing, Weiguo Wang:
Ctta: a novel chain-of-thought transfer adversarial attacks framework for large language models. 36 - Mohammad Moshawrab, Mehdi Adda, Abdenour Bouzouane, Hussein Ibrahim, Ali Raad:

HP_FLAP: homomorphic and polymorphic federated learning aggregation of parameters framework. 37 - Jesús E. Díaz Verdejo, Rafael Estepa

, Antonio Jose Estepa
, Javier Muñoz-Calle
, Germán Madinabeitia
:
Building a large, realistic and labeled HTTP URI dataset for anomaly-based intrusion detection systems: Biblio-US17. 38 - Yu Wei, Lei Bi, Kunpeng Wang, Xianhui Lu:

An improved BKW algorithm on the learning with rounding problem. 39 - Qinyou Huang, Luping Wang, Jie Chen:

An efficient video slice encryption scheme and its application. 40 - Yajie Guo, Shujuan Ji

, Xianwen Fang, Dickson K. W. Chiu, Ning Cao, Ho-fung Leung:
An Unsupervised Fake News Detection Framework Based on Structural Contrastive Learning. 41 - Sai Hu, Ruwei Huang, Liang Zhou:

An efficient multi-key BFV fully homomorphic encryption scheme with optimized relinearization. 42 - Liyou Liu, Ming Xu

:
A network intrusion detection method based on contrastive learning and Bayesian Gaussian Mixture Model. 59 - Zhuoyu Tian, Lei Chen, Shengyu Fan, Xianglong Deng, Rui Hou, Dan Meng, Mingzhe Zhang:

LP-HENN: fully homomorphic encryption accelerator with high energy efficiency. 98 - Shuguang Yuan

, Jing Yu, Tengfei Yang, Chi Chen:
Unitanony: a fine-grained and practical anonymization framework for better data utility. 43 - Xiaoxi Wang, Zhenxu Liu, Chunyang Zheng, Xinyu Liu

, Wei Liu, Yuling Liu, Qixu Liu:
XFP-recognizer: detecting cross-file browser fingerprinting. 44 - Zibo Zhou, Zongyang Zhang

, Jianwei Liu, Haifeng Qian:
Efficient inner product arguments with sublogarithmic proof and sub-square-root verifier. 45 - Shancheng Zhang, Gang Qu, Zongyang Zhang

, Minzhe Huang, Haochun Jin, Liqun Yang:
Efficient and secure multi-party computation protocol supporting deep learning. 46 - Qianqian Jiang, Chunrong Zhang, Ning Li

, Dickson K. W. Chiu, Xianwen Fang, Shujuan Ji:
Spammer group detection based on cascading and clustering of core figures. 47 - Yatao Yang

, Zhaofu Li, Yucheng Ding, Man Hu:
MAT-FHE: arbitrary dimension matrix multiplication scheme for floating point over fully homomorphic encryption. 48 - Yong Wang, Qiancheng Wan

, Yifan Wu, Lijie Chen:
Grouped Byzantine fault tolerant consensus algorithm based on aggregated signatures. 60 - Birou Gao, Rui Zhang

, Yang Tao, Shihan Qin:
Cocoon: certificateless blockchain wallet supporting both stealth address and revocation. 100 - Nagaraj Hediyal

, B. P. Divakar, K. Narayanaswamy:
SCAN-C: a lightweight cryptographic algorithm to secure CAN communications in modern vehicles. 49 - Anton Firc

, Kamil Malinka, Petr Hanácek:
Evaluation framework for deepfake speech detection: a comparative study of state-of-the-art deepfake speech detectors. 50 - Junming Mo, Ming Xu

, Xiaogang Xing:
Clean-label backdoor attack on link prediction task. 51 - J. Jithish, Nagarajan Mahalingam, Bo Wang, Kiat Seng Yeo:

Towards enhancing security for upcoming 6G-ready smart grids through federated learning and cloud solutions. 61 - Xue Zhou, Guihe Qin, Yanhua Liang, Jiaru Song, Wanning Liu, Qingxin Liu:

CGTS: graph transformer-based anomaly detection in controller area networks. 62 - Qingwang Chen, Yuling Liu, Ru Tan, Ze Jin

, Juxin Xiao, Xiao Wang, Fangjiao Zhang, Qixu Liu:
Shadowkube: enhancing Kubernetes security with behavioral monitoring and honeypot integration. 63 - Tingli Yuan, Yunhua He, Pengyue Xiao, Ke Xiao, Bin Wu:

A Blockchain-based cross-platform authentication scheme for EV aggregate charging platform. 64 - Zhaoyu Qiu

, Shishuai Yang, Yifan Yu, Yujia Luo, Wenrui Diao:
Understanding security risks in mobile-to-PC screen mirroring: an empirical study. 68 - Fan Zhou, Dongxia Wang

, Yanhai Xiong, Kun Sun, Wenhai Wang:
Androfim: few-shot android malware family detection based on image representation. 69 - Yunlv Lv, Rui Zhang

, Yang Tao, Zeshuo Zhu:
Faster threshold-SM2 with identifiable abort and non-interactive online signing. 70 - Mir Nazish

, M. Tariq Banday:
e-CM: A novel approach to advancing chaotic dynamics in discrete one-dimensional maps for secure IoT applications. 71 - Xiaotong Dong, Bo Li, Xiaojie Zhu, Yong Li, Weiping Wang:

Efficient shortest distance approximate query on large scale encrypted graph data. 102 - Kavita S. Kumavat, Joanne Gomes:

Multi-layer DDoS attacks detection with mitigation in IoT-enabled sensor network. 72 - Yali Yuan, Jian Ge, Guang Cheng:

A network flow fingerprinting method with adaptive embedding strength. 73 - Wanqing Wu, Jipeng Zhou

:
Development and application of new 2D Cubic-Sine hyperchaotic map. 74 - Zhuobin Hu, Jiabei Wang

, Zhengkai Chen, Zhaoxuan Ge, Mingyu Bian, Lei Chen, Yongbin Zhou:
SEAC: dynamic searchable symmetric encryption with lightweight update-search permission control. 75 - Yuan Liu

, Licheng Wang, Yongbin Zhou:
A novel CLWE-based attribute-based encryption scheme from lattices with privacy preserving. 76 - Hailong Yu, Chingfang Hsu, Lein Harn, Zhuo Zhao:

A new robust PKC encryption method based on invertible matrix multiplication for HIE in medical IoT systems. 77 - Zijin Lin

, Jinwen He, Yue Zhao, Ruigang Liang, Hu Li, Zhendong Wu:
EGRTE: adversarially training a self-explaining smoothed classifier for certified robustness. 78

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














