![](https://dblp.dagstuhl.de/img/logo.ua.320x120.png)
![](https://dblp.dagstuhl.de/img/dropdown.dark.16x16.png)
![](https://dblp.dagstuhl.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
![search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
default search action
Journal of Information Security and Applications, Volume 82
Volume 82, 2024
- Junwei Tang
, Wei Xu, Tao Peng, Sijie Zhou, Qiaosen Pi, Ruhan He, Xinrong Hu:
Android malware detection based on a novel mixed bytecode image combined with attention mechanism. 103721 - Yuan Yuan
, Hongjie He, Fan Chen, Lingfeng Qu:
On the security of JPEG image encryption with RS pairs permutation. 103722 - Huipeng Liu
, Lin Teng
, Salahuddin Unar, Pengbo Liu
, Xingyuan Wang:
Fingerprint image encryption based on chaos and nonlinear dynamic "X" model diffusion. 103723 - Giacomo Longo
, Francesco Lupia
, Andrea Pugliese
, Enrico Russo
:
Physics-aware targeted attacks against maritime industrial control systems. 103724 - Yuhao Zhang
, Min Tang:
VPPLR: Privacy-preserving logistic regression on vertically partitioned data using vectorization sharing. 103725 - Haotian Cheng
, Xiaofeng Li
, He Zhao, Tong Zhou
, Bin Yu, Nianzu Sheng
:
S-Cred: An accountable anonymous credential scheme with decentralized verification and flexible revocation. 103735 - Antonio Coscia, Vincenzo Dentamaro, Stefano Galantucci, Antonio Maci, Giuseppe Pirlo:
Automatic decision tree-based NIDPS ruleset generation for DoS/DDoS attacks. 103736 - Jiali Shi
, Guoqiang Liu
, Chao Li
, Ting Fan
:
Improved (related-key) differential cryptanalysis on LBlock. 103737 - Diana-Elena Petrean
, Rodica Potolea
:
Homomorphic encrypted Yara rules evaluation. 103738 - Hairuo Xu, Tao Shu:
Attack-model-agnostic defense against model poisonings in distributed learning. 103739 - Shreyansh Sharma
, Anil K. Saini, Santanu Chaudhury:
Multimodal biometric user authentication using improved decentralized fuzzy vault scheme based on Blockchain network. 103740 - Janaka Senanayake
, Harsha Kalutarage
, Andrei Petrovski
, Luca Piras
, M. Omar Al-Kadri
:
Defendroid: Real-time Android code vulnerability detection via blockchain federated neural network with XAI. 103741 - Jiaqi Guo
, Cong Tian, Xu Lu
, Liang Zhao, Zhenhua Duan:
Multi-keyword ranked search with access control for multiple data owners in the cloud. 103742 - Ye Peng, Qi Yu, Guobin Fu, Wenwen Zhang, Chaofan Duan:
Improving the robustness of steganalysis in the adversarial environment with Generative Adversarial Network. 103743 - Hairuo Xu, Tao Shu:
Defending against model poisoning attack in federated learning: A variance-minimization approach. 103744 - Daniil Sigalov
, Dennis Gamayunov:
Dead or alive: Discovering server HTTP endpoints in both reachable and dead client-side code. 103746 - Saher Tegane, Khaled Hamouid, Mawloud Omar, Fouzi Semchedine, Abdelmalek Boudries:
Corrigendum to "An extended Attribute-based access control with controlled delegation in IoT" [Journal of Information Systems and Applications 76 (2023) 103473]. 103747 - Ali Ismail Awad
, Aiswarya Babu
, Ezedin Barka
, Khaled Shuaib:
AI-powered biometrics for Internet of Things security: A review and future vision. 103748 - Yuanmeng Zhao, Jian Weng
, Jia-Nan Liu
, Mei Cai
:
Enabling privacy-preserving medication analysis in distributed EHR systems. 103749 - Jinwei Wang
, Wanyun Huang, Jiawei Zhang, Xiangyang Luo, Bin Ma:
Adversarial watermark: A robust and reliable watermark against removal. 103750 - Huifen Wang, Dong Guo
, Jinrui Wei, Jinze Li:
A method of classifying IoT devices based on attack sensitivity. 103751 - Yun-Fei Yao, Hui-Yan Chen, You Gao, Ke Wang, Haoyang Yu
:
A decentralized multi-authority CP-ABE scheme from LWE. 103752 - Tiewei Qin, Bingwen Feng
, Bing Chen, Zecheng Peng, Zhihua Xia, Wei Lu:
Moiré pattern generation-based image steganography. 103753 - Komal Pursharthi
, Dheerendra Mishra:
Towards post-quantum authenticated key agreement scheme for mobile devices. 103754 - Javad Chaharlang, Mohammad Mosleh
, Saeed Rasouli Heikalabad:
Quantum Reversible Audio Steganalysis Using Quantum Schmidt Decomposition and Quantum Support Vector Machine. 103755 - Dongsu Shen
, Yijian Song, Yuan Lu
, Saiqin Long, Shujuan Tian:
Neural differential distinguishers for GIFT-128 and ASCON. 103758
![](https://dblp.dagstuhl.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.