default search action
4th FCS 2021: Haikou, China
- Chunjie Cao, Yuqing Zhang, Yuan Hong, Ding Wang:
Frontiers in Cyber Security - 4th International Conference, FCS 2021, Haikou, China, December 17-19, 2021, Revised Selected Papers. Communications in Computer and Information Science 1558, Springer 2022, ISBN 978-981-19-0522-3
Intelligent Security
- Binghui Zou, Chunjie Cao, Longjuan Wang, Fangjian Tao:
DACN: Malware Classification Based on Dynamic Analysis and Capsule Networks. 3-13 - Hongwen Wu, Xiaoming Wang, Ke Zhou, Jianming Zou, Congyun Wu, Wenjian Wen, Zhicheng Huang, Jiezhen Deng, Tingyu Qiu:
Research on Automatic Analysis and Exploitation Technology of Remote Code Execution Vulnerability for Grid System. 14-29 - Xiang Shu, Chunjie Cao, Longjuan Wang, Fangjian Tao:
GWDGA: An Effective Adversarial DGA. 30-48 - Jiawei Zhang, Jinwei Wang, Xiangyang Luo, Bin Ma, Naixue Xiong:
Imperceptible and Reliable Adversarial Attack. 49-62 - Xianglin Wei, Chao Wang, Xiang Jiao, Qiang Duan, Yongyang Hu:
Architecture and Security Analysis of Federated Learning-Based Automatic Modulation Classification. 63-77 - Hansong Ren, Xuejun Li, Liao Lei, Guoliang Ou, Hongyu Sun, Gaofei Wu, Xiao Tian, Jinglu Hu, Yuqing Zhang:
Detecting Inconsistent Vulnerable Software Version in Security Vulnerability Reports. 78-99
System Security
- Xi Luo, Chunjie Cao, Longjuan Wang:
Multi-modal Universal Embedding Representations for Language Understanding. 103-119 - Xin Ji, Haifeng Zhang, Juan Chu, Linxiao Dong, Chengyue Yang:
New Federation Algorithm Based on End-Edge-Cloud Architecture for Smart Grid. 120-133 - Egide Nkurunziza, Mwitende Gervais, Lawrence Tandoh, Fagen Li:
Certificateless Authentication and Consensus for the Blockchain-Based Smart Grid. 134-151 - Xinjian Lv, Nan Shi, Jing Wei, Yuan Tian, Jie Li, Jian Li:
Information System Security Risk Assessment Based on Entropy Weight Method - Bayesian Network. 152-162 - Jiayuan Zhang, Mengyue Feng, Yuhang Huang, Tao Feng, Wenjie Wang, He Wang, Han Zhang:
Survey of 3D Printer Security Offensive and Defensive. 163-178
Network Security
- Lawrence Tandoh, Fagen Li, Ikram Ali, Charles Roland Haruna, Michael Y. Kpiebaareh, Christopher Tandoh:
Requirements for Total Resistance to Pollution Attacks in HMAC-Based Authentication Schemes for Network Coding. 181-196 - Kejun Zhang, Xinrui Jiang, Xinying Yu, Liwen Feng:
Network Security Situation Assessment Method Based on MHSA-FL Model. 197-213 - Jieru Mu, Hua He, Lin Li, Shanchen Pang, Cong Liu:
A Hybrid Network Intrusion Detection Model Based on CNN-LSTM and Attention Mechanism. 214-229 - Hao Peng, Zhen Qian, Ming Zhong, Dandan Zhao, Guangquan Xu, Songyang Wu, Jianming Han:
System Security Analysis of Different Link Proportions Between Nodes in the Cyber-Physical System Against Target Attack. 230-242
Multimedia Security
- Bin Ma, Yongkang Fu, Jian Li, Chunpeng Wang, Yuli Wang:
A GDIoU Loss Function-Based YOLOv4 Deep Learning Network for High-Performance Insulator Location in Field Images. 245-256 - Terui Mao, Diqun Yan, Yongkang Gong, Rangding Wang:
Identification of Synthetic Spoofed Speech with Deep Capsule Network. 257-265
Privacy, Risk and Trust
- Yanhua Zhang, Ximeng Liu, Yupu Hu, Huiwen Jia:
Cloud-Aided Scalable Revocable Identity-Based Encryption with Ciphertext Update from Lattices. 269-287 - Ming Cheng, Yang Yang, Yingqiu Ding, Weiming Zhang:
A Privacy-Preserving Medical Image Scheme Based on Secret Sharing and Reversible Data Hiding. 288-307 - Zhixuan Gao, Shuang Wang, Yaoling Ding, An Wang, Qingjun Yuan:
Correlation Power Analysis and Protected Implementation on Block Cipher RainDrop. 308-323
Data and Application Security
- Na Wang, Gaofei Wu, Qiuling Yue, Jinglu Hu, Yuqing Zhang:
Research on Security Assessment of Cross Border Data Flow. 327-341 - Ying Li, Mianxue Gu, Hongyu Sun, Yuhao Lin, Qiuling Yue, Zhen Guo, Jinglu Hu, He Wang, Yuqing Zhang:
A Review of Data Representation Methods for Vulnerability Mining Using Deep Learning. 342-351
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.