


default search action
Journal of Information Security and Applications, Volume 89
Volume 89, 2025
- Akshay Agarwal
, Nalini K. Ratha:
Detection of identity swapping attacks in low-resolution image settings. 103911 - Xiaohan Wan
, Hao Lin, Mingqiang Wang, Wenting Shen:
Hierarchical Threshold Multi-Key Fully Homomorphic Encryption. 103919 - Qianwei Meng
, Qingjun Yuan
, Xiangbin Wang, Yongjuan Wang, Guangsong Li, Yanbei Zhu, Siqi Lu
:
Beyond known threats: A novel strategy for isolating and detecting unknown malicious traffic. 103920 - Yonghui Huang
, Qilin Zhang
, Yongbiao Zhao
:
Color image encryption algorithm based on hybrid chaos and layered strategies. 103921 - Min Han, Peng Xu:
Efficient and verifiable keyword search over public-key ciphertexts based on blockchain. 103924 - Danté Gray, Maryam Mehrnezhad:
PhotonKey: A key pairing system for IoT resource and input constrained devices using light sensors. 103926 - Debasmita Chakraborty
, Mridul Nandi
:
COLM under attack: A cryptanalytic exploration of COLM variants. 103936 - Xiaochao Wang, Qianqian Du, Ling Du, Huayan Zhang, Jianping Hu
:
Robust zero-watermarking algorithm via multi-scale feature analysis for medical images. 103937 - Dongming Huo
, Hanwen Wang, Guangxiang Ji, Chang Cheng, Xiaoqing Song, Lisheng Wei, Chuanzhao Zhang, Chao Han, Xin Zhou:
TPE-DNA: Approximate thumbnail preserving encryption based on difference expansion and DNA encoding. 103938 - Tuan Duc Nguyen
, Thanh Tinh Dao
:
A novel PVO-based RDH scheme utilizes an interleaved data embedding technique using dual-pixels. 103939 - Lianpeng Li
, Saifei Liu:
MSD-CDRL: A generic fusion detection framework for logic covert attack towards cyber-physical system security. 103947 - Li Yu
, Je Sen Teh
:
Revisiting boomerang attacks on lightweight ARX and AND-RX ciphers with applications to KATAN, SIMON and CHAM. 103950 - Xiaohong Zhang
, Shijun Xiang
, Hongbin Huang:
Hiding speech in music files. 103951 - Xin Pang
, Lanxiang Chen
:
Efficient and privacy-preserving butterfly counting on encrypted bipartite graphs. 103952 - Tayyaba Asif, Faiza Mehmood, Syed Ahmed Mazhar Gillani, Muhammad Nabeel Asim, Muhammad Usman Ghani, Waqar Mahmood, Andreas Dengel:
RPCP-PURI: A robust and precise computational predictor for Phishing Uniform Resource Identification. 103953 - Avi Shaked
, Nan Messe
:
BridgeSec: Facilitating effective communication between security engineering and systems engineering. 103954 - Changqing Zhu, Heyan Wang
, Yazhou Zhao, Xingxiang Jiang, Hua Sun, Jia Duan, Hui Li, Luanyun Hu, Na Ren:
Vector map zero-watermarking algorithm considering feature set granularity. 103955 - Lukás Sadlek, Muhammad Mudassar Yamin
, Pavel Celeda
, Basel Katt
:
Severity-based triage of cybersecurity incidents using kill chain attack graphs. 103956 - Kai Gao
, Ji-Hwei Horng
, Ching-Chun Chang, Chin-Chen Chang:
Crypto-space reversible data hiding for 3D mesh models with k-Degree neighbor diffusion. 103957 - Takanori Isobe, Ryoma Ito
, Kazuhiko Minematsu:
Security analysis of SFrame. 103958 - Yi-Fan Tseng
:
Blacklisting access control via negated subset predicate encryption: Constant-size ciphertexts/keys constructions with adaptive security or attribute hiding. 103959 - Abebe Diro
, Shahriar Kaisar
, Akanksha Saini
, Samar Fatima, Hiep Cong Pham
, Fikadu Erba:
Workplace security and privacy implications in the GenAI age: A survey. 103960 - Sandip Y. Bobade, Ravindra S. Apare, Ravindra H. Borhade, Parikshit N. Mahalle:
Intelligent detection framework for IoT-botnet detection: DBN-RNN with improved feature set. 103961 - Jiyou Chen, Zhi Lv, Ge Jiao
, Ming Xia, Gaobo Yang:
SPNet: Seam carving detection via spatial-phase learning. 103963 - Yibo Zhang
, Weiguo Lin
, Junfeng Xu
, Wanshang Xu
, Yikun Xu
:
MLPN: Multi-Scale Laplacian Pyramid Network for deepfake detection and localization. 103965 - Han Zhou
, Lunzhi Deng
, Yaying Wu, Sihua Zhou:
A pairing-free proxy re-encryption scheme suitable for cloud medical information systems. 103967 - Liang Xi
, Dong He, Han Liu:
PRAAD: Pseudo representation adversarial learning for unsupervised anomaly detection. 103968 - Xiangqian Kong
, Lanxiang Chen
, Yizhao Zhu
, Yi Mu:
Laconic updatable private set intersection. 103969 - Francisco Rodrigo Parente da Ponte
, Emanuel Bezerra Rodrigues
, César L. C. Mattos:
FRAPE: A Framework for Risk Assessment, Prioritization and Explainability of vulnerabilities in cybersecurity. 103971 - Rama Krishna Koppanati
, Sateesh K. Peddoju
:
MSG: Missing-sequence generator for metamorphic malware detection. 103962 - Hassan Yakout El-Arsh
, Amr Abdelaziz
, Ahmed S. Elliethy, Hussein A. Aly
, T. Aaron Gulliver:
Information-theoretic bounds for steganography in visual multimedia. 103966 - R. Lakshman Naik, Sourabh Jain, Manjula Bairam:
A heuristic assisted cyber attack detection system using multi-scale and attention-based adaptive hybrid network. 103970 - Mingyue Li
, Liudong Zheng, Xiaoxue Ma, Shuang Li:
Real-time monitoring model of DDoS attacks using distance thresholds in Edge cooperation networks. 103972 - Guodong Zhang, Tianyu Yao, Jiawei Qin, Yitao Li, Qiao Ma, Donghong Sun:
CodeSAGE: A multi-feature fusion vulnerability detection approach using code attribute graphs and attention mechanisms. 103973 - Wei Chen, Yunqi Zhang
:
CSA: Crafting adversarial examples via content and style attacks. 103974 - R. Sasirega, S. Prakash
:
Secure and incentivized V2G Participation with blockchain and game theory. 103975 - Jun Ye
, Zhaowang Hu, Zhengqi Zhang:
General-purpose multi-user privacy-preserving outsourced k-means clustering. 103976 - Xinzhe Zhang
, Lei Wu, Lijuan Xu, Zhien Liu, Ye Su
, Hao Wang
, Weizhi Meng
:
Privacy-preserving and verifiable multi-task data aggregation for IoT-based healthcare. 103977 - Kota Chin, Keita Emura
, Kazumasa Omote
:
An anonymous yet accountable contract wallet system using account abstraction. 103978 - Parichehr Dadkhah
, Parvin Rastegari, Mohammad Dakhilalian:
IoT-friendly certificateless signcryption schemes: Introducing a provably secure scheme in ROM. 103979 - Xuefeng Fan, Dahao Fu, Hangyu Gui, Xiaoyi Zhou
:
PCPT and ACPT: Copyright protection and traceability scheme for DNN models. 103980 - Hongsong Chen, Zimei Tao, Zhiheng Wang, Xinrui Liu:
Merkle multi-branch hash tree-based dynamic data integrity auditing for B5G network cloud storage. 103981 - Cien Chen, Yanli Ren, Chen Lin:
LDAC: A lightweight data access control scheme with constant size ciphertext in VSNs based on blockchain. 103982 - Gang Han, Weiran Ma, Yinghui Zhang, Yuyuan Liu
, Shuanggen Liu
:
BSFL: A blockchain-oriented secure federated learning scheme for 5G. 103983 - Jiabao Li
, Hanlin Sun, Zhanfei Du
, Yaxuan Wang, Ke Yuan
, Chunfu Jia:
A generic cryptographic algorithm identification scheme based on ciphertext features. 103984 - Bingbing Zhang, Heyuan Huang, Lingbo Wei, Chi Zhang:
Public data-enhanced multi-stage differentially private graph neural networks. 103985 - Junyan Ouyang
, Rui Han, Xiaojiang Zuo, Yunlai Cheng, Chi Harold Liu
:
Accuracy-aware differential privacy in federated learning of large transformer models. 103986 - Chongzhen Zhang, Zhiwang Hu, Xiangrui Xu, Yong Liu, Bin Wang, Jian Shen, Tao Li, Yu Huang, Baigen Cai, Wei Wang:
DMRP: Privacy-Preserving Deep Learning Model with Dynamic Masking and Random Permutation. 103987 - Lishuang Hu, Tao Xiang, Shangwei Guo, Xiaoguo Li, Yi Yang:
Perceptual visual security index: Analyzing image content leakage for vision language models. 103988 - Eslam Amer
, Bander Ali Saleh Al-rimy, Shaker H. Ali El-Sappagh:
Strengthening ICS defense: Modbus-NFA behavior model for enhanced anomaly detection. 103990 - Yi Wu, Tao Feng
, Chunhua Su, Chunyan Liu:
MSAUPL: A multi-server authentication and key agreement protocol for industrial IoT based on user privacy level. 103991 - Fangfang Shan, Yanlong Lu, Shuaifeng Li, Shiqi Mao, Yuang Li, Xin Wang:
Efficient adaptive defense scheme for differential privacy in federated learning. 103992 - Mi Wen, Yanbo Zhang, Pengsong Zhang
, Liduo Chen:
IDS-DWKAFL: An intrusion detection scheme based on Dynamic Weighted K-asynchronous Federated Learning for smart grid. 103993 - Zhimao Lai, Yun Zhang, Dong Li, Jiangqun Ni:
Leveraging High-Frequency Diversified Augmentation for general deepfake detection. 103994 - Kartikey Pandey, Deepmala Sharma:
Novel image encryption algorithm utilizing hybrid chaotic maps and Elliptic Curve Cryptography with genetic algorithm. 103995 - Arpita Srivastava, Ditipriya Sinha:
FP-growth-based signature extraction and unknown variants of DoS/DDoS attack detection on real-time data stream. 103996 - Simone Bussa
, Riccardo Sisto
, Fulvio Valenza:
Formal verification of a V2X scheme mixing traditional PKI and group signatures. 103998 - Shang Ci
, Sen Hu, Donghai Guan, Çetin Kaya Koç:
Privacy-preserving word vectors learning using partially homomorphic encryption. 103999 - Zhengjun Jing
, Yongkang Zhu, Quanyu Zhao, Yuanjian Zhou, Chunsheng Gu, Weizhi Meng
:
Equipment failure data trends focused privacy preserving scheme for Machine-as-a-Service. 104000 - Xiaoliang Wang, Peng Zeng, Guikai Liu, Kuan-Ching Li, Yuzhen Liu, Biao Hu
, Francesco Palmieri:
A privacy-preserving certificate-less aggregate signature scheme with detectable invalid signatures for VANETs. 104001 - Omid Torki, Maede Ashouri-Talouki
, Mina Alishahi:
Fed-GWAS: Privacy-preserving individualized incentive-based cross-device federated GWAS learning. 104002 - Lingfeng Qu
, Xu Wang, Yuan Yuan, Jiayu Zhou, Yao Xin
:
Reversible data hiding in Redundancy-Free cipher images through pixel rotation and multi-MSB replacement. 104003 - Yuan-Yu Tsai
, Wen-Ting Jao, Alfrindo Lin
, Shih-Yi Wang:
Advanced octree-based reversible data hiding in encrypted point clouds. 104006 - Cheng-Ta Huang
, Jing-Xuan Song, Thi Thu-Ha Dang:
Hybrid prediction error and histogram shifting method for reversible data hiding in video system. 104007 - Yanqing Yao, Zhoujun Li:
Novel improvements and extensions of the extractable results about (leakage-resilient) privacy schemes with imperfect randomness. 104008

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.