


default search action
3rd FCS 2020: Tianjin, China
- Guangquan Xu

, Kaitai Liang
, Chunhua Su
:
Frontiers in Cyber Security - Third International Conference, FCS 2020, Tianjin, China, November 15-17, 2020, Proceedings. Communications in Computer and Information Science 1286, Springer 2020, ISBN 978-981-15-9738-1
IoT Security
- Mande Xie, Jifei Hu, Haibo Hong:

Blockchain-Based CP-ABE with Publicly Verifiable Outsourced Decryption in IoT. 3-18 - Xudong He, Jian Wang, Jiqiang Liu, Zhen Han, Zhuo Lv, Wei Wang:

DNS Rebinding Detection for Local Internet of Things Devices. 19-29 - Chundong Wang, Chuang Li

, Tongle An, Xiaochun Cheng
:
Low-Speed Injection Attack Detection on CAN Bus. 30-43 - Yuan Gao, Hequn Xian

, Yan Teng:
User Similarity-Aware Data Deduplication Scheme for IoT Applications. 44-52
Artificial Intelligence
- Lixia Xie

, Liping Yan
, Guangquan Xu
, Jiyong Zhang:
Analysis Model of Node Failures and Impact for AANET. 55-64 - Lina Wang, Wenqi Wang, Tong Chen, Jianpeng Ke, Benxiao Tang:

Deep Attention Model with Multiple Features for Rumor Identification. 65-82 - Jiale Zhang, Di Wu

, Chengyong Liu, Bing Chen:
Defending Poisoning Attacks in Federated Learning via Adversarial Training Method. 83-94 - Xiaomeng Wang, Zhibin Guan, Wei Xin, Jiajie Wang:

Multi-type Source Code Defect Detection Based on TextCNN. 95-103 - Lu Bing, Yudong Li, Wen Si:

Noninvasive Research on Cardiac Electrical Activity by Non-Gaussian Prior Bayesian Matching Pursuit. 104-110 - Jun Xing, Guangquan Xu, Chengbo Yin:

Video Investigation Analysis System Enhanced by Explicable Model. 111-117
Blockchain
- Rong Tan, Yudong Li, Jing Zhang, Wen Si:

Application of Blockchain Technology to the Credit Management of Supply Chain. 121-132 - Fang Peng, Hui Tian

, Hanyu Quan, Jing Lu:
Data Auditing for the Internet of Things Environments Leveraging Smart Contract. 133-149 - Haibo Tian, Huizhi Lin, Fangguo Zhang

:
Design a Proof of Stake Based Directed Acyclic Graph Chain. 150-165 - Jing Zhang, Rong Tan, Yudong Li:

Design of Personal Credit Information Sharing Platform Based on Consortium Blockchain. 166-177 - Zhenyu Li

, Yujue Wang
, Sheng Wen, Yong Ding
:
Evil Chaincode: APT Attacks Based on Smart Contract. 178-196 - Wei-Yang Chiu

, Weizhi Meng
, Christian Damsgaard Jensen:
NoPKI - a Point-to-Point Trusted Third Party Service Based on Blockchain Consensus Algorithm. 197-214 - Zhijie Zhang

, Lejun Zhang
, Waqas Rasheed
, Zilong Jin
, Tinghuai Ma
, Huiling Chen
, Guangquan Xu
:
The Research on Covert Communication Model Based on Blockchain: A Case Study of Ethereum's Whisper Protocol. 215-230
Cyber-Physical Systems Security
- Gangting Liu, Jianhong Lin, Yifan Ding, Shihong Yang, Yunhua Xu:

A New Face Detection Framework Based on Adaptive Cascaded Network. 233-242 - Chenkai Tan, Zhengjun Jing

, Shaoyi Bei:
Atomic Cross-Chain Swap-Based Decentralized Management System in Vehicular Networks. 243-253 - Yuming Fan, Kaiyuan Tian, Xuyu Wang, Zhuo Lv, Jian Wang:

Detecting Intrusions in Railway Signal Safety Data Networks with DBSCAN-ARIMA. 254-270 - Changqi Zhang, Jiang Yu, Yudong Li, Wen Si:

Dynamic Trajectory for Visual Perception of Abnormal Behavior. 271-282 - Hongyu Yang

, Yuhao Feng, Guangquan Xu
, Jiyong Zhang:
Fuzzy Petri Nets Based Information System Security Situation Assessment Model. 283-293 - Hao Peng, Can Liu, Dandan Zhao, Zhaolong Hu, Jianmin Han:

Invulnerability of Heterogeneous CPFS Under Different Intranal Border-adding Strategies. 294-304 - Hao Peng, Can Liu, Dandan Zhao, Jianmin Han, Zhonglong Zheng:

Robustness Enhancement Analysis of CPS Systems Under the Swapping Strategies Between Different Networks. 305-314 - Hao Peng, Zhen Qian, Zhe Kan, Hongxia Ye, Zian Fang, Dandan Zhao:

Security Assessment for Cascading Failures of Cyber-Physical Systems Under Target Attack Strategy. 315-327
Cryptography
- Chunhua Jin

, Ge Kan
, Guanhua Chen
, Changhui Yu
, Chengjie Xu
:
Heterogeneous Deniable Authenticated Encryption Protocol. 331-346 - Han Wang, Xu An Wang

, Jiasen Liu
, Chuan Lin:
Identify-Based Outsourcing Data Auditing Scheme with Lattice. 347-358
Database Security
- Zhen Gao

, Dongbin Zhang, Jiuzhi Zhang:
A Security Problem Caused by the State Database in Hyperledger Fabric. 361-372 - Xueling Zhu

, Huaping Hu
, Shaojing Fu
, Qing Wu
, Bo Liu
:
Efficient Boolean SSE: A Novel Encrypted Database (EDB). 373-387 - Xuren Wang, Zhou Fang, Dong Wang, Anran Feng, Qiuyun Wang:

Research on Database Anomaly Access Detection Based on User Profile Construction. 388-399
Depth Estimation
- Chao Zhou, Qian Zhang, Bin Wang, Yunzhang Du, Tao Yan, Wen Si:

An Effective Occlusion Edge Prediction Method in Light Field Depth Estimation. 403-416
Mobile Security
- Naitian Hu, Xingkong Ma, Fuqiang Lin, Bo Liu, Tong Lu:

DexFus: An Android Obfuscation Technique Based on Dalvik Bytecode Translation. 419-431 - Yonghao Gu, Liangxun Li, Yong Zhang:

Robust Android Malware Detection Based on Attributed Heterogenous Graph Embedding. 432-446
Network Security
- Yong Ma, Yang Hu, Chang Cai:

A Network Traffic Classification Method Based on Hierarchical Clustering. 449-458 - Xianliang Jiang

, Jiahua Zhu, Guang Jin:
DPC: A Delay-Driven Prioritized TCP Congestion Control Algorithm for Data Center Networks. 459-474 - Li Su, Meiling Chen, Wei Li, Peng Ran, Yang Sun:

SA Dots: A Sensitive and Self-adaptable Framework for Cross-Region DDoS Processing. 475-488
Privacy
- Yanan Cheng

, Han Wang, Zhaoxin Zhang, Ning Li:
Characterizing the Security Threats of Disposable Phone Numbers. 491-507 - Wenlong Dun, Youwen Zhu:

Efficient Discrete Distribution Estimation Schemes Under Local Differential Privacy. 508-523 - Shiyin Yang, Yongbiao Li, Dehua Zhou, Linfeng Wei, Qingqing Gan

:
Privacy Prediction of Lightweight Convolutional Neural Network. 524-537 - Shaopeng Liang, Haomiao Yang, Qixian Zhou, Minglu Zhang:

Privacy-Preserving and Outsourced Density Peaks Clustering Algorithm. 538-552 - Feras N. Al-Obeidat

, Anoud Bani-Hani, Oluwasegun A. Adedugbe, Munir Majdalawieh
, Elhadj Benkhelifa:
The Socio-economic Impacts of Social Media Privacy and Security Challenges. 553-563
Program Analysis
- Yukun Dong, Li Zhang, Shanchen Pang, Hao Liu, Wenjing Yin, Mengying Wu, Meng Wu, Haojie Li:

Automatic Repair of Semantic Defects Using Restraint Mechanisms. 567-583 - Zhibin Guan, Xiaomeng Wang, Wei Xin, Jiajie Wang:

Code Property Graph-Based Vulnerability Dataset Generation for Source Code Detection. 584-591
Quantum Cryptography
- Dan-Li Zhi, Zhi-Hui Li, Li-Juan Liu, Zhao-Wei Han:

A Hybrid Quantum Secret Sharing Scheme Based on Mutually Unbiased Bases. 595-607
Steganography
- Kymbat Taalaibekova, Xianjin Fang, Zhifeng Xu:

A Novel Method to Improve Security and Imperceptibility of Image Steganography. 611-627 - Jiang Yu, Changqi Zhang, Yudong Li, Wen Si:

Multi-resolution Steganalysis of JPEG Images Using the Contrast of DCT Coefficients. 628-640
Web Security
- Lixia Xie

, Huiyu Ni
, Guangquan Xu
, Jiyong Zhang:
A Key Business Node Identification Model for Business Process Based on AE-VIKOR Method. 643-653 - Yichao Zang, Tairan Hu, Rongrong Cao, Junhu Zhu:

An Adaptive Utility Quantification Strategy for Penetration Semantic Knowledge Mining. 654-666 - Wenzhuang Kang, Shangping Zhong, Kaizhi Chen, Jianhua Lai, Guangquan Xu:

RF-AdaCost: WebShell Detection Method that Combines Statistical Features and Opcode. 667-682

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














