


default search action
Security and Safety, Volume 4
Volume 4, 2025
- Cheng Hong:

Recent advances of privacy-preserving machine learning based on (Fully) Homomorphic Encryption. 2024012 - Yang Hong

, Jun Wu, Xinping Guan:
A survey of joint security-safety for function, information and human in industry 5.0. 2024014 - Ping Chen, Jin Wei, Zhuyang Yu, Jiwei Chen

:
Key-area cyberspace mimic defense against data-oriented attacks. 2024015 - Zheng Li

, Yang Zhang
:
Advancing membership inference attacks: The present and the future. 2024017 - Chengrui Hu

, Zheng Li
, Siyuan Wu
, Bowen Shu, Min Zhang
, Hao Li:
Trajectory-user linking via supervised encoding. 2024018 - Xiayu Xiang, Changchang Ma, Liyi Zeng

, Wenying Feng, Yushun Xie, Zhaoquan Gu:
Uncovering multi-step attacks with threat knowledge graph reasoning. 2024019 - Axin Wu, Dengguo Feng, Min Zhang

, Jialin Chi, Yinghui Zhang
:
Efficient verifiable searchable encryption with search and access pattern privacy. 2024022 - Wentao Huang

, Han Wu, Zeyu Li, Xiaqing Xie, Qingfeng Zhang
, Xuebin Wang, Jiapeng Zhao, Jinqiao Shi:
K8s-enhanced lightweight simulation method for the Tor network. 2024024 - Dengguo Feng, Jian Ren, Yang Zhang

:
Preface: Security and safety of data in cloud computing. 2025001 - Shiliang Ao

, Binxing Fang, Xinguang Xiao, Hongli Zhang:
Threat ripple model: A model to characterize business-oriented attacks based on business dependencies. 2025003 - Zhaoquan Gu

, Guandong Xu, Ning Hu
:
Preface: Security and safety in network simulation and evaluation. 2025004

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














