Frequency-Selective Adversarial Attack Against Deep Learning-Based Wireless Signal Classifiers (Englisch)
Freier Zugriff
- Neue Suche nach: Ke, Da
- Weitere Informationen zu Ke, Da:
- https://orcid.org/0000-0001-5149-0669
- Neue Suche nach: Wang, Xiang
- Weitere Informationen zu Wang, Xiang:
- https://orcid.org/0000-0002-3208-2042
- Neue Suche nach: Huang, Zhitao
- Weitere Informationen zu Huang, Zhitao:
- https://orcid.org/0000-0001-7135-5181
- Neue Suche nach: Ke, Da
- Weitere Informationen zu Ke, Da:
- https://orcid.org/0000-0001-5149-0669
- Neue Suche nach: Wang, Xiang
- Weitere Informationen zu Wang, Xiang:
- https://orcid.org/0000-0002-3208-2042
- Neue Suche nach: Huang, Zhitao
- Weitere Informationen zu Huang, Zhitao:
- https://orcid.org/0000-0001-7135-5181
In:
IEEE Transactions on Information Forensics and Security
;
19
;
4001-4011
;
2024
- Aufsatz (Zeitschrift) / Elektronische Ressource
-
Titel:Frequency-Selective Adversarial Attack Against Deep Learning-Based Wireless Signal Classifiers
-
Beteiligte:
-
Erschienen in:IEEE Transactions on Information Forensics and Security ; 19 ; 4001-4011
-
Verlag:
- Neue Suche nach: IEEE
-
Erscheinungsdatum:01.01.2024
-
Format / Umfang:12415449 byte
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz (Zeitschrift)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Lizenzbestimmungen:
-
Datenquelle:
Inhaltsverzeichnis – Band 19
Zeige alle Jahrgänge und Ausgaben
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Gait Attribute Recognition: A New Benchmark for Learning Richer Attributes From Human Gait PatternsSong, Xu / Hou, Saihui / Huang, Yan / Cao, Chunshui / Liu, Xu / Huang, Yongzhen / Shan, Caifeng et al. | 2024
- 15
-
Steganography Embedding Cost Learning With Generative Multi-Adversarial NetworkHuang, Dongxia / Luo, Weiqi / Liu, Minglin / Tang, Weixuan / Huang, Jiwu et al. | 2024
- 30
-
WF-Transformer: Learning Temporal Features for Accurate Anonymous Traffic Identification by Using Transformer NetworksZhou, Qiang / Wang, Liangmin / Zhu, Huijuan / Lu, Tong / Sheng, Victor S. et al. | 2024
- 44
-
BG: A Modular Treatment of BFT Consensus Toward a Unified Theory of BFT ReplicationSui, Xiao / Duan, Sisi / Zhang, Haibin et al. | 2024
- 59
-
A Causality-Aligned Structure Rationalization Scheme Against Adversarial Biased Perturbations for Graph Neural NetworksJia, Ju / Ma, Siqi / Liu, Yang / Wang, Lina / Deng, Robert H. et al. | 2024
- 74
-
Differentially Private Federated Learning With an Adaptive Noise MechanismXue, Rui / Xue, Kaiping / Zhu, Bin / Luo, Xinyi / Zhang, Tianwei / Sun, Qibin / Lu, Jun et al. | 2024
- 88
-
DeCloak: Enable Secure and Cheap Multi-Party Transactions on Legacy Blockchains by a Minimally Trusted TEE NetworkRen, Qian / Li, Yue / Wu, Yingjun / Wu, Yuchen / Lei, Hong / Wang, Lei / Chen, Bangdao et al. | 2024
- 104
-
NTD: Non-Transferability Enabled Deep Learning Backdoor DetectionLi, Yinshan / Ma, Hua / Zhang, Zhi / Gao, Yansong / Abuadbba, Alsharif / Xue, Minhui / Fu, Anmin / Zheng, Yifeng / Al-Sarawi, Said F. / Abbott, Derek et al. | 2024
- 120
-
Region Generation and Assessment Network for Occluded Person Re-IdentificationHe, Shuting / Chen, Weihua / Wang, Kai / Luo, Hao / Wang, Fan / Jiang, Wei / Ding, Henghui et al. | 2024
- 133
-
MCRe: A Unified Framework for Handling Malicious Traffic With Noise Labels Based on Multidimensional Constraint RepresentationYuan, Qingjun / Gou, Gaopeng / Zhu, Yanbei / Zhu, Yuefei / Xiong, Gang / Wang, Yongjuan et al. | 2024
- 148
-
Robust Camera Model Identification Over Online Social Network Shared Images via Multi-Scenario LearningWu, Haiwei / Zhou, Jiantao / Zhang, Xinyu / Tian, Jinyu / Sun, Weiwei et al. | 2024
- 163
-
To Act or Not to Act: An Adversarial Game for Securing Vehicle PlatoonsSun, Guoxin / Alpcan, Tansu / Rubinstein, Benjamin I. P. / Camtepe, Seyit et al. | 2024
- 178
-
Two-User Gaussian Broadcast Wiretap Channel With Common Message and Feedback: RevisitYuan, Haoheng / Feng, Yanghe / Yang, Chuanchuan / Zhuang, Zhuojun / Dai, Bin et al. | 2024
- 194
-
Dr. Defender: Proactive Detection of Autopilot Drones Based on CSIDeng, Jiangyi / Ji, Xiaoyu / Wang, Beibei / Wang, Bin / Xu, Wenyuan et al. | 2024
- 207
-
An Efficient and Dynamic Privacy-Preserving Federated Learning System for Edge ComputingTang, Xinyu / Guo, Cheng / Choo, Kim-Kwang Raymond / Liu, Yining et al. | 2024
- 221
-
Encrypted and Compressed Key-Value Store With Pattern-Analysis Security in Cloud SystemsZhang, Chen / Ming, Yulong / Wang, Mingyue / Guo, Yu / Jia, Xiaohua et al. | 2024
- 235
-
CGFormer: ViT-Based Network for Identifying Computer-Generated Images With Token LabelingQuan, Weize / Deng, Pengfei / Wang, Kai / Yan, Dong-Ming et al. | 2024
- 251
-
A Lightweight Certificateless Multi-User Matchmaking Encryption for Mobile Devices: Enhancing Security and PerformanceYang, Ningbin / Tang, Chunming / He, Debiao et al. | 2024
- 265
-
Masked Face TransformerZhao, Weisong / Zhu, Xiangyu / Guo, Kaiwen / Shi, Haichao / Zhang, Xiao-Yu / Lei, Zhen et al. | 2024
- 280
-
Backdoor Attack on Deep Learning-Based Medical Image Encryption and Decryption NetworkDing, Yi / Wang, Zi / Qin, Zhen / Zhou, Erqiang / Zhu, Guobin / Qin, Zhiguang / Choo, Kim-Kwang Raymond et al. | 2024
- 293
-
AutoPwn: Artifact-Assisted Heap Exploit Generation for CTF PWN CompetitionsXu, Dandan / Chen, Kai / Lin, Miaoqian / Lin, Chaoyang / Wang, Xiaofeng et al. | 2024
- 307
-
Invisible Backdoor Attack With Dynamic Triggers Against Person Re-IdentificationSun, Wenli / Jiang, Xinyang / Dou, Shuguang / Li, Dongsheng / Miao, Duoqian / Deng, Cheng / Zhao, Cairong et al. | 2024
- 320
-
A Perspective of Using Frequency-Mixing as Entropy in Random Number Generation for Portable Hardware Cybersecurity IPWei, Xiangye / Xiu, Liming / Cai, Yimao et al. | 2024
- 334
-
Fuzzy Linguistic Knowledge Reasoning-Based Secure Control for Connected Nonlinear ServosystemLi, Meng / Pei, Zheng / Chen, Yong / Miao, Zhenhai et al. | 2024
- 344
-
Domain Generalization via Aggregation and Separation for Audio Deepfake DetectionXie, Yuankun / Cheng, Haonan / Wang, Yutian / Ye, Long et al. | 2024
- 359
-
Output Positioning to Derive Maximum Entropy From Physical Unclonable FunctionsAbdolinezhad, Saeed / Zimmermann, Lukas / Sikora, Axel et al. | 2024
- 372
-
Confidence-Calibrated Face and Kinship VerificationXu, Min / Zhang, Ximiao / Zhou, Xiuzhuang et al. | 2024
- 385
-
An Adaptive Method for Camera Attribution Under Complex Radial Distortion CorrectionsMontibeller, Andrea / Perez-Gonzalez, Fernando et al. | 2024
- 401
-
Constructing New Backbone Networks via Space-Frequency Interactive Convolution for Deepfake DetectionGuo, Zhiqing / Jia, Zhenhong / Wang, Liejun / Wang, Dewang / Yang, Gaobo / Kasabov, Nikola et al. | 2024
- 414
-
Heavy Hitter Identification Over Large-Domain Set-Valued Data With Local Differential PrivacyZhu, Youwen / Cao, Yiran / Xue, Qiao / Wu, Qihui / Zhang, Yushu et al. | 2024
- 427
-
Gradient-Leaks: Enabling Black-Box Membership Inference Attacks Against Machine Learning ModelsLiu, Gaoyang / Xu, Tianlong / Zhang, Rui / Wang, Zixiong / Wang, Chen / Liu, Ling et al. | 2024
- 441
-
Finger-Knuckle Assisted Slap Fingerprint Identification System for Higher Security and ConvenienceZhou, Zhenyu / Kumar, Ajay et al. | 2024
- 455
-
Toward a Critical Evaluation of Robustness for Deep Learning Backdoor CountermeasuresQiu, Huming / Ma, Hua / Zhang, Zhi / Abuadbba, Alsharif / Kang, Wei / Fu, Anmin / Gao, Yansong et al. | 2024
- 469
-
Hardening Password-Based Credential DatabasesSong, Yaqing / Xu, Chunxiang / Zhang, Yuan / Li, Shiyu et al. | 2024
- 485
-
BR-HIDF: An Anti-Sparsity and Effective Host Intrusion Detection Framework Based on Multi-Granularity Feature ExtractionHe, Junjiang / Tang, Cong / Li, Wenshan / Li, Tao / Chen, Li / Lan, Xiaolong et al. | 2024
- 500
-
Overcoming Data Limitations: A Few-Shot Specific Emitter Identification Method Using Self-Supervised Learning and Adversarial AugmentationLiu, Chao / Fu, Xue / Wang, Yu / Guo, Lantu / Liu, Yuchao / Lin, Yun / Zhao, Haitao / Gui, Guan et al. | 2024
- 514
-
On the Instability of Softmax Attention-Based Deep Learning Models in Side-Channel AnalysisHajra, Suvadeep / Alam, Manaar / Saha, Sayandeep / Picek, Stjepan / Mukhopadhyay, Debdeep et al. | 2024
- 529
-
Reversible Contrast Enhancement by Histogram Specification and Very Low Distortion Data HidingColtuc, Dinu / Coanda, Henri George et al. | 2024
- 540
-
GAZETA: GAme-Theoretic ZEro-Trust Authentication for Defense Against Lateral Movement in 5G IoT NetworksGe, Yunfei / Zhu, Quanyan et al. | 2024
- 555
-
Dynamic Analysis of Multiplex Networks With Hybrid Maintenance StrategiesPeng, Baihao / Liu, Junfeng / Zeng, Jun et al. | 2024
- 571
-
PRIMϵ: Novel Privacy-Preservation Model With Pattern Mining and Genetic AlgorithmMadhusudhanan, Sheema / Jose, Arun Cyril / Sahoo, Jayakrushna / Malekian, Reza et al. | 2024
- 586
-
Optimizing Linear Correctors: A Tight Output Min-Entropy Bound and Selection TechniqueGrujic, Milos / Verbauwhede, Ingrid et al. | 2024
- 601
-
IMap: Toward a Fast, Scalable and Reconfigurable In-Network Scanner With Programmable SwitchesZhang, Menghao / Li, Guanyu / Guo, Cheng / Bao, Han / Xu, Mingwei / Hu, Hongxin / Li, Fenghua et al. | 2024
- 616
-
Breaking the Anonymity of Ethereum Mixing Services Using Graph Feature LearningDu, Hanbiao / Che, Zheng / Shen, Meng / Zhu, Liehuang / Hu, Jiankun et al. | 2024
- 632
-
Linked Fault AnalysisBeigizad, Ali Asghar / Soleimany, Hadi / Zarei, Sara / Ramzanipour, Hamed et al. | 2024
- 646
-
Federated Supervised Principal Component AnalysisBriguglio, William / Yousef, Waleed A. / Traore, Issa / Mamun, Mohammad et al. | 2024
- 661
-
IdentifierIDS: A Practical Voltage-Based Intrusion Detection System for Real In-Vehicle NetworksDeng, Zhouyan / Liu, Jiajia / Xun, Yijie / Qin, Junman et al. | 2024
- 677
-
PRIDN: A Privacy Preserving Data Sharing on Named Data NetworkingXia, Qi / Obiri, Isaac Amankona / Gao, Jianbin / Xia, Hu / Zhang, Xiaosong / Asamoah, Kwame Omono / Amofa, Sandro et al. | 2024
- 693
-
Privacy-Enhancing and Robust Backdoor Defense for Federated Learning on Heterogeneous DataChen, Zekai / Yu, Shengxing / Fan, Mingyuan / Liu, Ximeng / Deng, Robert H. et al. | 2024
- 708
-
Verifying in the Dark: Verifiable Machine Unlearning by Using Invisible Backdoor TriggersGuo, Yu / Zhao, Yu / Hou, Saihui / Wang, Cong / Jia, Xiaohua et al. | 2024
- 722
-
A Credential Usage Study: Flow-Aware Leakage Detection in Open-Source ProjectsHan, Ruidong / Gong, Huihui / Ma, Siqi / Li, Juanru / Xu, Chang / Bertino, Elisa / Nepal, Surya / Ma, Zhuo / Ma, Jianfeng et al. | 2024
- 735
-
Universal Heterogeneous Face Analysis via Multi-Domain Feature DisentanglementLiu, Decheng / Gao, Xinbo / Peng, Chunlei / Wang, Nannan / Li, Jie et al. | 2024
- 748
-
Backdoor Attack Against Split Neural Network-Based Vertical Federated LearningHe, Ying / Shen, Zhili / Hua, Jingyu / Dong, Qixuan / Niu, Jiacheng / Tong, Wei / Huang, Xu / Li, Chen / Zhong, Sheng et al. | 2024
- 764
-
Toward Automated Field Semantics Inference for Binary Protocol Reverse EngineeringZhan, Mengqi / Li, Yang / Li, Bo / Zhang, Jinchao / Li, Chuanrong / Wang, Weiping et al. | 2024
- 777
-
FedComm: A Privacy-Enhanced and Efficient Authentication Protocol for Federated Learning in Vehicular Ad-Hoc NetworksYuan, Xiaohan / Liu, Jiqiang / Wang, Bin / Wang, Wei / Li, Tao / Ma, Xiaobo / Pedrycz, Witold et al. | 2024
- 793
-
Robust Domain Misinformation Detection via Multi-Modal Feature AlignmentLiu, Hui / Wang, Wenya / Sun, Hao / Rocha, Anderson / Li, Haoliang et al. | 2024
- 807
-
Efficient Coded Multi-Party Computation at Edge NetworksVedadi, Elahe / Keshtkarjahromi, Yasaman / Seferoglu, Hulya et al. | 2024
- 821
-
Dynamic Trust-Based Redactable Blockchain Supporting Update and TraceabilityZhang, Yuqing / Ma, Zhaofeng / Luo, Shoushan / Duan, Pengfei et al. | 2024
- 835
-
Optimal Selfish Mining-Based Denial-of-Service AttackWang, Qiuhua / Li, Chengyu / Xia, Tianyu / Ren, Yizhi / Wang, Dong / Zhang, Guoyan / Choo, Kim-Kwang Raymond et al. | 2024
- 851
-
Dual Sampling Based Causal Intervention for Face Anti-Spoofing With Identity DebiasingLong, Xingming / Zhang, Jie / Wu, Shuzhe / Jin, Xin / Shan, Shiguang et al. | 2024
- 863
-
Realistic Fingerprint Presentation Attacks Based on an Adversarial ApproachCasula, Roberto / Orru, Giulia / Marrone, Stefano / Gagliardini, Umberto / Marcialis, Gian Luca / Sansone, Carlo et al. | 2024
- 878
-
Privacy Preserving Palmprint Recognition via Federated Metric LearningShao, Huikai / Liu, Chengcheng / Li, Xiaojiang / Zhong, Dexing et al. | 2024
- 892
-
CSRA: Robust Incentive Mechanism Design for Differentially Private Federated LearningYang, Yunchao / Hu, Miao / Zhou, Yipeng / Liu, Xuezheng / Wu, Di et al. | 2024
- 907
-
Toward Adversarially Robust Recommendation From Adaptive Fraudster DetectionLai, Yuni / Zhu, Yulin / Fan, Wenqi / Zhang, Xiaoge / Zhou, Kai et al. | 2024
- 920
-
Adaptive Domain-Invariant Feature Extraction for Cross-Domain Linguistic SteganalysisXue, Yiming / Wu, Jiaxuan / Ji, Ronghua / Zhong, Ping / Wen, Juan / Peng, Wanli et al. | 2024
- 934
-
Large Pose Face Recognition via Facial Representation LearningXin, Jingwei / Wei, Zikai / Wang, Nannan / Li, Jie / Gao, Xinbo et al. | 2024
- 947
-
An Accurate and Efficient Algorithm to Identify Malicious Nodes of a GraphGaeta, Rossano et al. | 2024
- 959
-
Joint Discriminative Analysis With Low-Rank Projection for Finger Vein Feature ExtractionLi, Shuyi / Ma, Ruijun / Zhou, Jianhang / Zhang, Bob / Wu, Lifang et al. | 2024
- 970
-
Universal Detection of Backdoor Attacks via Density-Based Clustering and Centroids AnalysisGuo, Wei / Tondi, Benedetta / Barni, Mauro et al. | 2024
- 985
-
Physical-Layer Secret and Private Key Generation in Wireless Relay Networks With Correlated Eavesdropping ChannelsXu, Peng / Yang, Jun / Chen, Gaojie / Yang, Zheng / Li, Yong / Win, Moe Z. et al. | 2024
- 1001
-
Locally Verifiable Batch Authentication in IoMTMao, Wenze / Jiang, Peng / Zhu, Liehuang et al. | 2024
- 1015
-
LDS-FL: Loss Differential Strategy Based Federated Learning for Privacy PreservingWang, Taiyu / Yang, Qinglin / Zhu, Kaiming / Wang, Junbo / Su, Chunhua / Sato, Kento et al. | 2024
- 1031
-
A Comprehensive Data Retrieval and Correction Approach From 40-nm Flash Memory With Selective Chemical EngravingZeng, Xiao Mei / Liu, Qing / Gan, Chee Lip et al. | 2024
- 1041
-
Multi-Surface Multi-Technique (MUST) Latent Fingerprint DatabaseMalhotra, Aakarsh / Vatsa, Mayank / Singh, Richa / Morris, Keith B. / Noore, Afzel et al. | 2024
- 1056
-
Lightweight Radio Frequency Fingerprint Identification Scheme for V2X Based on Temporal CorrelationQi, Xinyu / Hu, Aiqun / Chen, Tianshu et al. | 2024
- 1071
-
Verifiable Arbitrary Queries With Zero Knowledge Confidentiality in Decentralized StorageWang, Haodi / Guo, Yu / Bie, Rongfang / Jia, Xiaohua et al. | 2024
- 1086
-
Secret Key Generation for IRS-Assisted Multi-Antenna Systems: A Machine Learning-Based ApproachChen, Chen / Zhang, Junqing / Lu, Tianyu / Sandell, Magnus / Chen, Liquan et al. | 2024
- 1099
-
Machine Unlearning via Representation Forgetting With Parameter Self-SharingWang, Weiqi / Zhang, Chenhan / Tian, Zhiyi / Yu, Shui et al. | 2024
- 1112
-
Robust and Generalized Physical Adversarial Attacks via Meta-GANFeng, Weiwei / Xu, Nanqing / Zhang, Tianzhu / Wu, Baoyuan / Zhang, Yongdong et al. | 2024
- 1126
-
Systematically Quantifying Cryptanalytic Nonlinearities in Strong PUFsChatterjee, Durba / Pratihar, Kuheli / Hazra, Aritra / Ruhrmair, Ulrich / Mukhopadhyay, Debdeep et al. | 2024
- 1142
-
ResNeXt+: Attention Mechanisms Based on ResNeXt for Malware Detection and ClassificationHe, Yuewang / Kang, Xiangui / Yan, Qiben / Li, Enping et al. | 2024
- 1156
-
TMG-GAN: Generative Adversarial Networks-Based Imbalanced Learning for Network Intrusion DetectionDing, Hongwei / Sun, Yu / Huang, Nana / Shen, Zhidong / Cui, Xiaohui et al. | 2024
- 1168
-
Beyond the Prior Forgery Knowledge: Mining Critical Clues for General Face Forgery DetectionLuo, Anwei / Kong, Chenqi / Huang, Jiwu / Hu, Yongjian / Kang, Xiangui / Kot, Alex C. et al. | 2024
- 1183
-
MalPatch: Evading DNN-Based Malware Detection With Adversarial PatchesZhan, Dazhi / Duan, Yexin / Hu, Yue / Li, Weili / Guo, Shize / Pan, Zhisong et al. | 2024
- 1199
-
Attention-Based API Locating for Malware TechniquesWong, Guo-Wei / Huang, Yi-Ting / Guo, Ying-Ren / Sun, Yeali / Chen, Meng Chang et al. | 2024
- 1213
-
Cross-User Leakage Mitigation for Authorized Multi-User Encrypted Data SharingWang, Mingyue / Chen, Zizhuo / Miao, Yinbin / Huang, Hejiao / Wang, Cong / Jia, Xiaohua et al. | 2024
- 1227
-
Pluggable Attack for Visual Object TrackingZhao, Shaochuan / Xu, Tianyang / Wu, Xiao-Jun / Kittler, Josef et al. | 2024
- 1241
-
AgrAmplifier: Defending Federated Learning Against Poisoning Attacks Through Local Update AmplificationGong, Zirui / Shen, Liyue / Zhang, Yanjun / Zhang, Leo Yu / Wang, Jingwei / Bai, Guangdong / Xiang, Yong et al. | 2024
- 1251
-
URadar: Discovering Unrestricted File Upload Vulnerabilities via Adaptive Dynamic TestingChen, Yuanchao / Li, Yuwei / Pan, Zulie / Lu, Yuliang / Chen, Juxing / Ji, Shouling et al. | 2024
- 1267
-
Imperceptible and Robust Backdoor Attack in 3D Point CloudGao, Kuofeng / Bai, Jiawang / Wu, Baoyuan / Ya, Mengxi / Xia, Shu-Tao et al. | 2024
- 1283
-
Distortion Model-Based Spectral Augmentation for Generalized Recaptured Document DetectionChen, Changsheng / Li, Bokang / Cai, Rizhao / Zeng, Jishen / Huang, Jiwu et al. | 2024
- 1299
-
SLIM: A Secure and Lightweight Multi-Authority Attribute-Based Signcryption Scheme for IoTGong, Bei / Guo, Chong / Guo, Chen / Sun, Yao / Waqas, Muhammad / Chen, Sheng et al. | 2024
- 1313
-
Video-Based Visible-Infrared Person Re-Identification With Auxiliary SamplesDu, Yunhao / Lei, Cheng / Zhao, Zhicheng / Dong, Yuan / Su, Fei et al. | 2024
- 1326
-
SecKNN: FSS-Based Secure Multi-Party KNN Classification Under General Distance FunctionsLi, Zhi / Wang, Hao / Zhang, Songnian / Zhang, Wenying / Lu, Rongxing et al. | 2024
- 1342
-
Similarity Distance Learning on SPD Manifold for Writer Independent Offline Signature VerificationZois, Elias N. / Tsourounis, Dimitrios / Kalivas, Dimitrios et al. | 2024
- 1357
-
WFDefProxy: Real World Implementation and Evaluation of Website Fingerprinting DefensesGong, Jiajun / Zhang, Wuqi / Zhang, Charles / Wang, Tao et al. | 2024
- 1372
-
SepBIN: Binary Feature Separation for Better Semantic Comparison and Authorship VerificationSong, Qige / Sang, Yafei / Zhang, Yongzheng / Li, Shuhao / Xu, Xiaolin et al. | 2024
- 1388
-
Server-Aided Public Key Authenticated Searchable Encryption With Constant Ciphertext and Constant TrapdoorCheng, Leixiao / Meng, Fei et al. | 2024
- 1401
-
Optimality of the Proper Gaussian Signal in Complex MIMO Wiretap ChannelsDong, Yong / Xu, Yinfei / Zhang, Tong / Xia, Yili et al. | 2024
- 1415
-
Information Embedding With Stegotext ReconstructionXu, Yinfei / Lu, Jian / Guang, Xuan / Xu, Wei et al. | 2024
- 1429
-
HODA: Hardness-Oriented Detection of Model Extraction AttacksSadeghzadeh, Amir Mahdi / Sobhanian, Amir Mohammad / Dehghan, Faezeh / Jalili, Rasool et al. | 2024
- 1440
-
STDA: Secure Time Series Data Analytics With Practical Efficiency in Wide-Area NetworkLi, Xiaoguo / Huang, Zixi / Zhao, Bowen / Yang, Guomin / Xiang, Tao / Deng, Robert H. et al. | 2024
- 1455
-
DOMR: Toward Deep Open-World Malware RecognitionLu, Tingting / Wang, Junfeng et al. | 2024
- 1469
-
Channel Correlation in Multi-User Covert Communication: Friend or Foe?Lee, Jinyoung / Yeom, Hyeonsik / Lee, Si-Hyeon / Ha, Jeongseok et al. | 2024
- 1483
-
HiPDS: A Storage Hardware-Independent Plausibly Deniable Storage SystemChen, Niusen / Chen, Bo et al. | 2024
- 1496
-
Efficient Image Classification via Structured Low-Rank Matrix Factorization RegressionZhang, Hengmin / Yang, Jian / Qian, Jianjun / Gao, Guangwei / Lan, Xiangyuan / Zha, Zhiyuan / Wen, Bihan et al. | 2024
- 1510
-
Diffusion Containment in Complex Networks Through Collective Influence of ConnectionsLiu, Yang / Liang, Guangbo / Wang, Xi / Zhu, Peican / Wang, Zhen et al. | 2024
- 1525
-
Event-Triggered Impulsive Control for Complex Networks Under Stochastic Deception AttacksYang, Ni / Gao, Ruiyi / Feng, Youzhi / Su, Huan et al. | 2024
- 1535
-
Surveillance Face Anti-SpoofingFang, Hao / Liu, Ajian / Wan, Jun / Escalera, Sergio / Zhao, Chenxu / Zhang, Xu / Li, Stan Z. / Lei, Zhen et al. | 2024
- 1547
-
Coreset Learning-Based Sparse Black-Box Adversarial Attack for Video RecognitionChen, Jiefu / Chen, Tong / Xu, Xing / Zhang, Jingran / Yang, Yang / Shen, Heng Tao et al. | 2024
- 1561
-
Low-Rank and Sparse Decomposition for Low-Query Decision-Based Adversarial AttacksEsmaeili, Ashkan / Edraki, Marzieh / Rahnavard, Nazanin / Mian, Ajmal / Shah, Mubarak et al. | 2024
- 1576
-
Robust and Secure Federated Learning Against Hybrid Attacks: A Generic ArchitectureHao, Xiaohan / Lin, Chao / Dong, Wenhan / Huang, Xinyi / Xiong, Hui et al. | 2024
- 1589
-
SanIdea: Exploiting Secure Blockchain-Based Access Control via Sanitizable EncryptionJiang, Peng / Liu, Qi / Zhu, Liehuang et al. | 2024
- 1601
-
SPGNN-API: A Transferable Graph Neural Network for Attack Paths Identification and Autonomous MitigationJmal, Houssem / Hmida, Firas Ben / Basta, Nardine / Ikram, Muhammad / Kaafar, Mohamed Ali / Walker, Andy et al. | 2024
- 1614
-
Privacy-Enhanced Graph Neural Network for Decentralized Local GraphsPei, Xinjun / Deng, Xiaoheng / Tian, Shengwei / Liu, Jianqing / Xue, Kaiping et al. | 2024
- 1630
-
Classification Utility, Fairness, and Compactness via Tunable Information Bottleneck and Rényi MeasuresGronowski, Adam / Paul, William / Alajaji, Fady / Gharesifard, Bahman / Burlina, Philippe et al. | 2024
- 1646
-
PaReNTT: Low-Latency Parallel Residue Number System and NTT-Based Long Polynomial Modular Multiplication for Homomorphic EncryptionTan, Weihang / Chiu, Sin-Wei / Wang, Antian / Lao, Yingjie / Parhi, Keshab K. et al. | 2024
- 1660
-
Sizzler: Sequential Fuzzing in Ladder Diagrams for Vulnerability Detection and Discovery in Programmable Logic ControllersFeng, Kai / Cook, Marco M. / Marnerides, Angelos K. et al. | 2024
- 1672
-
Deep Learning-Based Detection for Multiple Cache Side-Channel AttacksKim, Hodong / Hahn, Changhee / Kim, Hyunwoo J. / Shin, Youngjoo / Hur, Junbeom et al. | 2024
- 1687
-
Verifiable Blind Quantum Computation With Identity Authentication for Multi-Type ClientsQuan, Junyu / Li, Qin / Li, Lvzhou et al. | 2024
- 1699
-
AG-NAS: An Attention GRU-Based Neural Architecture Search for Finger-Vein RecognitionQin, Huafeng / Fan, Chao / Deng, Shaojiang / Li, Yantao / El-Yacoubi, Mounim A. / Zhou, Gang et al. | 2024
- 1714
-
A Class-Incremental Approach With Self-Training and Prototype Augmentation for Specific Emitter IdentificationLi, Dingzhao / Qi, Jie / Hong, Shaohua / Deng, Pengfei / Sun, Haixin et al. | 2024
- 1728
-
Preserving Privacy in GANs Against Membership Inference AttackShateri, Mohammadhadi / Messina, Francisco / Labeau, Fabrice / Piantanida, Pablo et al. | 2024
- 1744
-
The Economics of Privacy and Utility: Investment StrategiesSharma, Chandra / Amariucai, George / Wei, Shuangqing et al. | 2024
- 1756
-
Accountable Fine-Grained Blockchain Rewriting in the Permissionless SettingTian, Yangguang / Liu, Bowen / Li, Yingjiu / Szalachowski, Pawel / Zhou, Jianying et al. | 2024
- 1767
-
Dual Consistency-Constrained Learning for Unsupervised Visible-Infrared Person Re-IdentificationYang, Bin / Chen, Jun / Chen, Cuiqun / Ye, Mang et al. | 2024
- 1780
-
Adaptive Differentially Quantized Subspace Perturbation (ADQSP): A Unified Framework for Privacy-Preserving Distributed Average ConsensusLi, Qiongxiu / Gundersen, Jaron Skovsted / Lopuhaa-Zwakenberg, Milan / Heusdens, Richard et al. | 2024
- 1794
-
AGILE: Automated Assertion Generation to Detect Information Leakage VulnerabilitiesDipu, Nusrat Farzana / Ayalasomayajula, Avinash / Tehranipoor, Mark M. / Farahmandi, Farimah et al. | 2024
- 1810
-
Toward Universal Detection of Adversarial Examples via Pseudorandom ClassifiersZhu, Boyu / Dong, Changyu / Zhang, Yuan / Mao, Yunlong / Zhong, Sheng et al. | 2024
- 1826
-
A Multi-Modal Vertical Federated Learning Framework Based on Homomorphic EncryptionGong, Maoguo / Zhang, Yuanqiao / Gao, Yuan / Qin, A. K. / Wu, Yue / Wang, Shanfeng / Zhang, Yihong et al. | 2024
- 1840
-
Exploring Uncharted Waters of Website FingerprintingKarunanayake, Ishan / Jiang, Jiaojiao / Ahmed, Nadeem / Jha, Sanjay K. et al. | 2024
- 1855
-
LED-RFF: LTE DMRS-Based Channel Robust Radio Frequency Fingerprint Identification SchemeYang, Xuan / Li, Dongming et al. | 2024
- 1870
-
Adversarial Learning From Imbalanced Data: A Robust Industrial Fault Classification MethodYin, Zhenqin / Zhang, Xinmin / Song, Zhihuan / Ge, Zhiqiang et al. | 2024
- 1883
-
Detection and Mitigation of Position Spoofing Attacks on Cooperative UAV Swarm FormationsBi, Siguo / Li, Kai / Hu, Shuyan / Ni, Wei / Wang, Cong / Wang, Xin et al. | 2024
- 2186
-
Dual-Adversarial Representation Disentanglement for Visible Infrared Person Re-IdentificationWei, Ziyu / Yang, Xi / Wang, Nannan / Gao, Xinbo et al. | 2024
- 2201
-
P²FRPSI: Privacy-Preserving Feature Retrieved Private Set IntersectionLing, Guowei / Tang, Fei / Cai, Chaochao / Shan, Jinyong / Xue, Haiyang / Li, Wulu / Tang, Peng / Huang, Xinyi / Qiu, Weidong et al. | 2024
- 2217
-
Decentralized Threshold Signatures With Dynamically Private AccountabilityLi, Meng / Ding, Hanni / Wang, Qing / Zhang, Mingwei / Meng, Weizhi / Zhu, Liehuang / Zhang, Zijian / Lin, Xiaodong et al. | 2024
- 2231
-
OLBS: Oblivious Location-Based ServicesHan, Jinguang / Susilo, Willy / Li, Nan / Huang, Xinyi et al. | 2024
- 2244
-
Graph-Based Covert Transaction Detection and Protection in BlockchainGuo, Zhenyu / Li, Xin / Liu, Jiamou / Zhang, Zijian / Li, Meng / Hu, Jingjing / Zhu, Liehuang et al. | 2024
- 2258
-
An Efficient and Scalable FHE-Based PDQ Scheme: Utilizing FFT to Design a Low Multiplication Depth Large-Integer Comparison AlgorithmZhang, Fahong / Yang, Chen / Zong, Rui / Zheng, Xinran / Wang, Jianfei / Meng, Yishuo et al. | 2024
- 2273
-
AFPM: A Low-Cost and Universal Adversarial Defense for Speaker Recognition SystemsSun, Zongkun / Ren, Yanzhen / Huang, Yihuan / Liu, Wuyang / Zhu, Hongcheng et al. | 2024
- 2288
-
SDSS: Sequential Data Sharing System in IoTLai, Jianchang / Susilo, Willy / Deng, Robert H. / Guo, Fuchun et al. | 2024
- 2300
-
Secure Communication Optimization in NOMA Systems With UAV-Mounted STAR-RISGuo, Liang / Jia, Jie / Chen, Jian / Wang, Xingwei et al. | 2024
- 2315
-
Adaptive Control of Strict-Feedback Nonlinear Systems Under Denial-of-Service: A Synthetic AnalysisGao, Rui / Huang, Jiangshuai / Su, Xiaojie / Zhao, Ling et al. | 2024
- 2328
-
Efficient Sparse Least Absolute Deviation Regression With Differential PrivacyLiu, Weidong / Mao, Xiaojun / Zhang, Xiaofei / Zhang, Xin et al. | 2024
- 2340
-
Deep Learning Gradient Visualization-Based Pre-Silicon Side-Channel Leakage LocationLi, Yanbin / Zhu, Jiajie / Liu, Zhe / Tang, Ming / Ren, Shougang et al. | 2024
- 2356
-
On Model Outsourcing Adaptive Attacks to Deep Learning Backdoor DefensesPeng, Huaibing / Qiu, Huming / Ma, Hua / Wang, Shuo / Fu, Anmin / Al-Sarawi, Said F. / Abbott, Derek / Gao, Yansong et al. | 2024
- 2370
-
Dynamic Searchable Symmetric Encryption With Strong Security and RobustnessDou, Haochen / Dan, Zhenwu / Xu, Peng / Wang, Wei / Xu, Shuning / Chen, Tianyang / Jin, Hai et al. | 2024
- 2385
-
Congruent Differential Cluster for Binary SPN CiphersCui, Ting / Mao, Yiming / Yang, Yang / Zhang, Yi / Zhang, Jiyan / Jin, Chenhui et al. | 2024
- 2398
-
FastTextDodger: Decision-Based Adversarial Attack Against Black-Box NLP Models With Extremely High EfficiencyHu, Xiaoxue / Liu, Geling / Zheng, Baolin / Zhao, Lingchen / Wang, Qian / Zhang, Yufei / Du, Minxin et al. | 2024
- 2412
-
Manipulating Pre-Trained Encoder for Targeted Poisoning Attacks in Contrastive LearningChen, Jian / Gao, Yuan / Liu, Gaoyang / Abdelmoniem, Ahmed M. / Wang, Chen et al. | 2024
- 2425
-
PRBFPT: A Practical Redactable Blockchain Framework With a Public TrapdoorDai, Weiqi / Liu, Jinkai / Zhou, Yang / Choo, Kim-Kwang Raymond / Xie, Xia / Zou, Deqing / Jin, Hai et al. | 2024
- 2438
-
Anonymity-Enhancing Multi-Hop Locks for Monero-Enabled Payment Channel NetworksWang, Xiaohu / Lin, Chao / Huang, Xinyi / He, Debiao et al. | 2024
- 2454
-
Secure and Efficient Similarity Retrieval in Cloud Computing Based on Homomorphic EncryptionWang, Na / Zhou, Wen / Wang, Jingjing / Guo, Yifan / Fu, Junsong / Liu, Jianwei et al. | 2024
- 2470
-
BGKey: Group Key Generation for Backscatter Communications Among Multiple DevicesLi, Jiajun / Wang, Pu / Yan, Zheng / Yang, Yishan / Zeng, Kai et al. | 2024
- 2487
-
Static Multi Feature-Based Malware Detection Using Multi SPP-net in Smart IoT EnvironmentsJeon, Jueun / Jeong, Byeonghui / Baek, Seungyeon / Jeong, Young-Sik et al. | 2024
- 2501
-
Distributed Differential Privacy via Shuffling Versus Aggregation: A Curious StudyWei, Yu / Jia, Jingyu / Wu, Yuduo / Hu, Changhui / Dong, Changyu / Liu, Zheli / Chen, Xiaofeng / Peng, Yun / Wang, Shaowei et al. | 2024
- 2517
-
EVM-Shield: In-Contract State Access Control for Fast Vulnerability Detection and PreventionZhang, Xiaoli / Sun, Wenxiang / Xu, Zhicheng / Cheng, Hongbing / Cai, Chengjun / Cui, Helei / Li, Qi et al. | 2024
- 2533
-
Division of Regulatory Power: Collaborative Regulation for Privacy-Preserving BlockchainsZhaolu, Tianyu / Wan, Zhiguo / Wang, Huaqun et al. | 2024
- 2549
-
Generic Construction of Threshold Credential Management With User-Autonomy AggregationJia, Meng / Chen, Jing / He, Kun / Shi, Min / Wang, Yuanzheng / Du, Ruiying et al. | 2024
- 2565
-
FASTEN: Fast Ensemble Learning for Improved Adversarial RobustnessHuang, Lifeng / Huang, Qiong / Qiu, Peichao / Wei, Shuxin / Gao, Chengying et al. | 2024
- 2581
-
One-Class Neural Network With Directed Statistics Pooling for Spoofing Speech DetectionLin, Guoyuan / Luo, Weiqi / Luo, Da / Huang, Jiwu et al. | 2024
- 2594
-
NEMO: Practical Distributed Boolean Queries With Minimal LeakageLi, Jianhao / Wang, Jiabei / Zhang, Rui / Xin, Yansen / Xu, Wenhan et al. | 2024
- 2609
-
Outlier-Resistant Non-Fragile Control of Nonlinear Networked Systems Under DoS Attacks and Multi-Variable Event-Triggered SC ProtocolLiu, Jian / Ke, Jiachen / Liu, Jinliang / Xie, Xiangpeng / Tian, Engang et al. | 2024
- 2623
-
AdvSQLi: Generating Adversarial SQL Injections Against Real-World WAF-as-a-ServiceQu, Zhenqing / Ling, Xiang / Wang, Ting / Chen, Xiang / Ji, Shouling / Wu, Chunming et al. | 2024
- 2639
-
Multisource Heterogeneous Specific Emitter Identification Using Attention Mechanism-Based RFF Fusion MethodZhang, Yibin / Zhang, Qianyun / Zhao, Haitao / Lin, Yun / Gui, Guan / Sari, Hikmet et al. | 2024
- 2651
-
Covertly Controlling a Linear SystemAmihood, Barak / Cohen, Asaf et al. | 2024
- 2664
-
Secrecy Rate Analysis and Active Pilot Attack Detection for IRS-Aided Massive MIMO SystemsDassanayake, Janith Kavindu / Gunasinghe, Dulaj / Aruma Baduge, Gayan Amarasuriya et al. | 2024
- 2680
-
Quantum-Safe HIBE: Does It Cost a Latte?Zhao, Raymond K. / McCarthy, Sarah / Steinfeld, Ron / Sakzad, Amin / O'Neill, Maire et al. | 2024
- 2696
-
DMA: Dual Modality-Aware Alignment for Visible-Infrared Person Re-IdentificationCui, Zhenyu / Zhou, Jiahuan / Peng, Yuxin et al. | 2024
- 2709
-
Robust and Sparse Least Square Regression for Finger Vein and Finger Knuckle Print RecognitionLi, Shuyi / Zhang, Bob / Wu, Lifang / Ma, Ruijun / Ning, Xin et al. | 2024
- 2720
-
A Preference-Driven Malicious Platform Detection Mechanism for Users in Mobile CrowdsensingWang, Haotian / Tao, Jun / Chi, Dingwen / Gao, Yu / Wang, Zuyan / Zou, Dikai / Xu, Yifan et al. | 2024
- 2732
-
Lavida: Large-Universe, Verifiable, and Dynamic Fine-Grained Access Control for E-Health CloudZhao, Jun / Zhang, Kai / Gong, Junqing / Qian, Haifeng et al. | 2024
- 2746
-
Beyond Result Verification: Efficient Privacy-Preserving Spatial Keyword Query With Suppressed LeakageTong, Qiuyun / Li, Xinghua / Miao, Yinbin / Wang, Yunwei / Liu, Ximeng / Deng, Robert H. et al. | 2024
- 2761
-
Quantum-Safe Puncturable Signatures With Their Application in BlockchainJiang, Mei / Li, Yannan / Susilo, Willy / Duong, Dung et al. | 2024
- 2771
-
Improving Bounded Model Checkers Scalability for Circuit De-Obfuscation: An ExplorationAzar, Kimia Zamiri / Kamali, Hadi Mardani / Farahmandi, Farimah / Tehranipoor, Mark et al. | 2024
- 2786
-
Secure Adaptive Group TestingCohen, Alejandro / Cohen, Asaf / Gurewitz, Omer et al. | 2024
- 2800
-
Robust Visible-Infrared Person Re-Identification Based on Polymorphic Mask and Wavelet Graph Convolutional NetworkSun, Rui / Chen, Long / Zhang, Lei / Xie, Ruirui / Gao, Jun et al. | 2024
- 2814
-
Detection of Adversarial Attacks via Disentangling Natural Images and PerturbationsQing, Yuanyuan / Bai, Tao / Liu, Zhuotao / Moulin, Pierre / Wen, Bihan et al. | 2024
- 2826
-
Joint Cost Learning and Payload Allocation With Image-Wise Attention for Batch SteganographyTang, Weixuan / Zhou, Zhili / Li, Bin / Choo, Kim-Kwang Raymond / Huang, Jiwu et al. | 2024
- 2840
-
SecureReID: Privacy-Preserving Anonymization for Person Re-IdentificationYe, Mang / Shen, Wei / Zhang, Junwu / Yang, Yao / Du, Bo et al. | 2024
- 2854
-
m-Eligibility With Minimum Counterfeits and Deletions for Privacy Protection in Continuous Data PublishingNicolau, Adrian Tobar / Parra-Arnau, Javier / Forne, Jordi / Pallares, Esteve et al. | 2024
- 2865
-
Secure Channel Establishment Scheme for Task Delivery in Vehicular Cloud ComputingZhang, Rui / Zhang, Lei / Wu, Qian / Zhou, Jianying et al. | 2024
- 2881
-
Similarity-Based Label Inference Attack Against Training and Inference of Split LearningLiu, Junlin / Lyu, Xinchen / Cui, Qimei / Tao, Xiaofeng et al. | 2024
- 2896
-
AG-ReID.v2: Bridging Aerial and Ground Views for Person Re-IdentificationNguyen, Huy / Nguyen, Kien / Sridharan, Sridha / Fookes, Clinton et al. | 2024
- 2909
-
DRAM-Based PUF Utilizing the Variation of Adjacent CellsAbulibdeh, Enas / Younes, Leen / Mohammad, Baker / Humood, Khaled / Saleh, Hani / Al-Qutayri, Mahmoud et al. | 2024
- 2919
-
Public Trace-and-Revoke Proxy Re-Encryption for Secure Data Sharing in CloudsLuo, Fucai / Wang, Haiyan / Susilo, Willy / Yan, Xingfu / Zheng, Xiaofan et al. | 2024
- 2935
-
Toward Secure and Verifiable Hybrid Federated LearningDu, Runmeng / Li, Xuru / He, Daojing / Choo, Kim-Kwang Raymond et al. | 2024
- 2951
-
RoseAgg: Robust Defense Against Targeted Collusion Attacks in Federated LearningYang, He / Xi, Wei / Shen, Yuhao / Wu, Canhui / Zhao, Jizhong et al. | 2024
- 2967
-
Bidirectional Stackable Recurrent Generative Adversarial Imputation Network for Specific Emitter Missing Data ImputationLi, Haozhe / Liao, Yilin / Tian, Zijian / Liu, Zhaoran / Liu, Jiaqi / Liu, Xinggao et al. | 2024
- 2981
-
Privacy-Preserving Password Cracking: How a Third Party Can Crack Our Password Hash Without Learning the Hash Value or the CleartextTihanyi, Norbert / Bisztray, Tamas / Borsos, Bertalan / Raveau, Sebastien et al. | 2024
- 2997
-
DCS-Gait: A Class-Level Domain Adaptation Approach for Cross-Scene and Cross-State Gait Recognition Using Wi-Fi CSILiang, Ying / Wu, Wenjie / Li, Haobo / Chang, Xiaojun / Chen, Xiaojiang / Peng, Jinye / Xu, Pengfei et al. | 2024
- 3008
-
MC-Net: Realistic Sample Generation for Black-Box AttacksDuan, Mingxing / Jiao, Kailun / Yu, Siyang / Yang, Zhibang / Xiao, Bin / Li, Kenli et al. | 2024
- 3023
-
UCG: A Universal Cross-Domain Generator for Transferable Adversarial ExamplesLi, Zhankai / Wang, Weiping / Li, Jie / Chen, Kai / Zhang, Shigeng et al. | 2024
- 3038
-
Fishing for Fraudsters: Uncovering Ethereum Phishing Gangs With Blockchain DataLiu, Jieli / Chen, Jinze / Wu, Jiajing / Wu, Zhiying / Fang, Junyuan / Zheng, Zibin et al. | 2024
- 3051
-
Face De-Morphing Based on Diffusion AutoencodersLong, Min / Yao, Quantao / Zhang, Le-Bing / Peng, Fei et al. | 2024
- 3064
-
RIS-Assisted UAV Secure Communications With Artificial Noise-Aware Trajectory Design Against Multiple Colluding Curious UsersWen, Yun / Chen, Gaojie / Fang, Sisai / Wen, Miaowen / Tomasin, Stefano / Renzo, Marco Di et al. | 2024
- 3077
-
Scanner-Hunter: An Effective ICS Scanning Group Identification SystemSheng, Chuan / Yao, Yu / Zhao, Lianxiang / Zeng, Peng / Zhao, Jianming et al. | 2024
- 3093
-
Cross-Scenario Unknown-Aware Face Anti-Spoofing With Evidential Semantic Consistency LearningJiang, Fangling / Liu, Yunfan / Si, Haolin / Meng, Jingjing / Li, Qi et al. | 2024
- 3109
-
Unlabeled Data Assistant: Improving Mask Robustness for Face RecognitionHuang, Baojin / Wang, Zhongyuan / Yang, Jifan / Han, Zhen / Liang, Chao et al. | 2024
- 3124
-
Authentication of Copy Detection Patterns: A Pattern Reliability Based ApproachTutt, Joakim / Taran, Olga / Chaban, Roman / Pulfer, Brian / Belousov, Yury / Holotyak, Taras / Voloshynovskiy, Slava et al. | 2024
- 3135
-
Identifying Cross-User Privacy Leakage in Mobile Mini-Apps at a Large ScaleLi, Shuai / Yang, Zhemin / Yang, Yunteng / Liu, Dingyi / Yang, Min et al. | 2024
- 3148
-
Provably Secure Public-Key Steganography Based on Elliptic Curve CryptographyZhang, Xin / Chen, Kejiang / Ding, Jinyang / Yang, Yuqi / Zhang, Weiming / Yu, Nenghai et al. | 2024
- 3164
-
Perception-Driven Imperceptible Adversarial Attack Against Decision-Based Black-Box ModelsZhang, Shenyi / Zheng, Baolin / Jiang, Peipei / Zhao, Lingchen / Shen, Chao / Wang, Qian et al. | 2024
- 3178
-
CHERUBIM: A Secure and Highly Parallel Cross-Shard Consensus Using Quadruple Pipelined Two-Phase Commit for Sharding BlockchainsLiu, Andi / Liu, Yizhong / Wu, Qianhong / Zhao, Boyu / Li, Dongyu / Lu, Yuan / Lu, Rongxing / Susilo, Willy et al. | 2024
- 3194
-
Improving RF-DNA Fingerprinting Performance in an Indoor Multipath Environment Using Semi-Supervised LearningFadul, Mohamed K. M. / Reising, Donald R. / Weerasena, Lakmali P. / Loveless, T. Daniel / Sartipi, Mina / Tyler, Joshua H. et al. | 2024
- 3210
-
Adversarial Attacks on Scene Graph GenerationZhao, Mengnan / Zhang, Lihe / Wang, Wei / Kong, Yuqiu / Yin, Baocai et al. | 2024
- 3226
-
Secure Dual Asynchronous Tracking Control for Markov Jump Systems Under Hybrid CyberattacksWen, Daolin / Mu, Xiaowu et al. | 2024
- 3237
-
Toward Secure and Robust Steganography for Black-Box Generated ImagesZeng, Kai / Chen, Kejiang / Zhang, Jiansong / Zhang, Weiming / Yu, Nenghai et al. | 2024
- 3251
-
Self-Attentive Contrastive Learning for Conditioned Periocular and Face BiometricsNg, Tiong-Sik / Chai, Jacky Chen Long / Low, Cheng-Yaw / Beng Jin Teoh, Andrew et al. | 2024
- 3265
-
Quantization Aware Attack: Enhancing Transferable Adversarial Attacks by Model QuantizationYang, Yulong / Lin, Chenhao / Li, Qian / Zhao, Zhengyu / Fan, Haoran / Zhou, Dawei / Wang, Nannan / Liu, Tongliang / Shen, Chao et al. | 2024
- 3279
-
Multiple Access Wiretap Channel With Partial Rate-Limited FeedbackXu, Peng / Chen, Gaojie / Yang, Zheng / Li, Yong / Tomasin, Stefano et al. | 2024
- 3295
-
Defending Against Label-Only Attacks via Meta-Reinforcement LearningYe, Dayong / Zhu, Tianqing / Gao, Kun / Zhou, Wanlei et al. | 2024
- 3309
-
Proof of Unlearning: Definitions and InstantiationWeng, Jiasi / Yao, Shenglong / Du, Yuefeng / Huang, Junjie / Weng, Jian / Wang, Cong et al. | 2024
- 3324
-
Polar Coding for Wiretap Channels With Random States Non-Causally Available at the EncoderChen, Xingyu / Wu, Huici / Tao, Xiaofeng / Wang, Haowei et al. | 2024
- 3339
-
Approaching the Information-Theoretic Limit of Privacy Disclosure With Utility GuaranteesYang, Qing / Wang, Cheng / Yuan, Haifeng / Cui, Jipeng / Teng, Hu / Chen, Xue / Jiang, Changjun et al. | 2024
- 3353
-
Zero-Value Filtering for Accelerating Non-Profiled Side-Channel Attack on Incomplete NTT-Based Implementations of Lattice-Based CryptographyTosun, Tolun / Savas, Erkay et al. | 2024
- 3366
-
Watch Your Speed: Injecting Malicious Voice Commands via Time-Scale ModificationJi, Xiaoyu / Jiang, Qinhong / Li, Chaohao / Shi, Zhuoyang / Xu, Wenyuan et al. | 2024
- 3380
-
Exploring Unobservable Blockchain-Based Covert Channel for Censorship-Resistant SystemsChen, Zhuo / Zhu, Liehuang / Jiang, Peng / Zhang, Can / Gao, Feng / Guo, Fuchun et al. | 2024
- 3395
-
A Machine Learning-Based Digital Twin for Anti-Counterfeiting Applications With Copy Detection PatternsBelousov, Yury / Quetant, Guillaume / Pulfer, Brian / Chaban, Roman / Tutt, Joakim / Taran, Olga / Holotyak, Taras / Voloshynovskiy, Slava et al. | 2024
- 3409
-
MMNet: Multi-Collaboration and Multi-Supervision Network for Sequential Deepfake DetectionXia, Ruiyang / Liu, Decheng / Li, Jie / Yuan, Lin / Wang, Nannan / Gao, Xinbo et al. | 2024
- 3423
-
DoS-Resilient Load Frequency Control of Multi-Area Power Systems: An Attack-Parameter-Dependent ApproachHu, Songlin / Ge, Xiaohua / Zhang, Wei / Yue, Dong et al. | 2024
- 3435
-
HashVFL: Defending Against Data Reconstruction Attacks in Vertical Federated LearningQiu, Pengyu / Zhang, Xuhong / Ji, Shouling / Fu, Chong / Yang, Xing / Wang, Ting et al. | 2024
- 3451
-
An Effectively Applicable to Resource Constrained Devices and Semi-Trusted Servers Authenticated Key Agreement SchemeXie, Dong / Yang, Jinghua / Wu, Bin / Bian, Weixin / Chen, Fulong / Wang, Taochun et al. | 2024
- 3465
-
Data-Agnostic Model Poisoning Against Federated Learning: A Graph Autoencoder ApproachLi, Kai / Zheng, Jingjing / Yuan, Xin / Ni, Wei / Akan, Ozgur B. / Poor, H. Vincent et al. | 2024
- 3481
-
On the Security of “LSFL: A Lightweight and Secure Federated Learning Scheme for Edge Computing”Wu, Jiahui / Zhang, Weizhe / Luo, Fucai et al. | 2024
- 3483
-
Distributed Secure Filtering Against Eavesdropping Attacks in SINR-Based Sensor NetworksFu, Xingquan / Wen, Guanghui / Niu, Mengfei / Zheng, Wei Xing et al. | 2024
- 3495
-
An Identity-Preserved Framework for Human Motion TransferMa, Jingzhe / Zhang, Xiaoqing / Yu, Shiqi et al. | 2024
- 3510
-
Dual-Mode Learning for Multi-Dataset X-Ray Security Image DetectionYang, Fenghong / Jiang, Runqing / Yan, Yan / Xue, Jing-Hao / Wang, Biao / Wang, Hanzi et al. | 2024
- 3525
-
MC-DSC: A Dynamic Secure Resource Configuration Scheme Based on Medical Consortium BlockchainLiang, Wei / Xie, Siqi / Li, Kuan-Ching / Li, Xiong / Kui, Xiaoyan / Zomaya, Albert Y. et al. | 2024
- 3539
-
BaseSAP: Modular Stealth Address Protocol for Programmable BlockchainsWahrstatter, Anton / Solomon, Matthew / DiFrancesco, Ben / Buterin, Vitalik / Svetinovic, Davor et al. | 2024
- 3554
-
Malicious Internet Entity Detection Using Local Graph InferenceMandlik, Simon / Pevny, Tomas / Smidl, Vaclav / Bajer, Lukas et al. | 2024
- 3567
-
Toward Secrecy-Aware Attacks Against Trust Prediction in Signed Social NetworksZhu, Yulin / Michalak, Tomasz / Luo, Xiapu / Zhang, Xiaoge / Zhou, Kai et al. | 2024
- 3581
-
cuXCMP: CUDA-Accelerated Private Comparison Based on Homomorphic EncryptionYang, Hao / Shen, Shiyu / Liu, Zhe / Zhao, Yunlei et al. | 2024
- 3593
-
Cross-Modal Learning Based Flexible Bimodal Biometric Authentication With Template ProtectionJiang, Qi / Zhao, Guichuan / Ma, Xindi / Li, Meng / Tian, Youliang / Li, Xinghua et al. | 2024
- 3608
-
Hiding Information for Secure and Covert Data Storage in Commercial ReRAM ChipsFerdaus, Farah / Talukder, B. M. S. Bahar / Rahman, Md. Tauhidur et al. | 2024
- 3620
-
Anchor Link Prediction for Cross-Network Digital Forensics From Local and Global PerspectivesWang, Huanran / Yang, Wu / Man, Dapeng / Lv, Jiguang / Han, Shuai / Tan, Jingwen / Liu, Tao et al. | 2024
- 3636
-
Analysis of a Programmable Quantum Annealer as a Random Number GeneratorPelofske, Elijah et al. | 2024
- 3644
-
PPGloVe: Privacy-Preserving GloVe for Training Word Vectors in the DarkHua, Zhongyun / Tong, Yan / Zheng, Yifeng / Li, Yuhong / Zhang, Yushu et al. | 2024
- 3659
-
Defense Against Adversarial Attacks Using Topology Aligning Adversarial TrainingKuang, Huafeng / Liu, Hong / Lin, Xianming / Ji, Rongrong et al. | 2024
- 3674
-
Vulnerabilities of Data Protection in Vertical Federated Learning Training and CountermeasuresZhu, Derui / Chen, Jinfu / Zhou, Xuebing / Shang, Weiyi / Hassan, Ahmed E. / Grossklags, Jens et al. | 2024
- 3690
-
Learn to Defend: Adversarial Multi-Distillation for Automatic Modulation Recognition ModelsChen, Zhuangzhi / Wang, Zhangwei / Xu, Dongwei / Zhu, Jiawei / Shen, Weiguo / Zheng, Shilian / Xuan, Qi / Yang, Xiaoniu et al. | 2024
- 3703
-
A Latent Fingerprint in the Wild DatabaseLiu, Xinwei / Raja, Kiran / Wang, Renfang / Qiu, Hong / Wu, Hucheng / Sun, Dechao / Zheng, Qiguang / Liu, Nian / Wang, Xiaoxia / Huang, Gehang et al. | 2024
- 3719
-
Lossless Data Hiding in NTRU Cryptosystem by Polynomial Encoding and ModulationWu, Hao-Tian / Cheung, Yiu-Ming / Tian, Zhihong / Liu, Dingcai / Luo, Xiangyang / Hu, Jiankun et al. | 2024
- 3733
-
Fuzzing Android Native System Libraries via Dynamic Data Dependency GraphZhu, Xiaogang / Zhang, Siyu / Li, Chaoran / Wen, Sheng / Xiang, Yang et al. | 2024
- 3745
-
Cancellable Deep Learning Framework for EEG BiometricsWang, Min / Yin, Xuefei / Hu, Jiankun et al. | 2024
- 3758
-
RECAST: Mitigating Conflict-Based Cache Attacks Through Fine-Grained Dynamic MappingZhang, Xingjian / Gong, Haochen / Chang, Rui / Zhou, Yajin et al. | 2024
- 3772
-
RVE-PFL: Robust Variational Encoder-Based Personalized Federated Learning Against Model Inversion AttacksIssa, Wael / Moustafa, Nour / Turnbull, Benjamin / Choo, Kim-Kwang Raymond et al. | 2024
- 3788
-
Learning to Generalize Unseen Dataset for Cross-Dataset Palmprint RecognitionShao, Huikai / Zou, Yuchen / Liu, Chengcheng / Guo, Qiang / Zhong, Dexing et al. | 2024
- 3800
-
Yet Another Improvement of Plantard Arithmetic for Faster Kyber on Low-End 32-bit IoT DevicesHuang, Junhao / Zhao, Haosong / Zhang, Jipeng / Dai, Wangchen / Zhou, Lu / Cheung, Ray C. C. / Koc, Cetin Kaya / Chen, Donglong et al. | 2024
- 3814
-
Learning to Discover Forgery Cues for Face Forgery DetectionTian, Jiahe / Chen, Peng / Yu, Cai / Fu, Xiaomeng / Wang, Xi / Dai, Jiao / Han, Jizhong et al. | 2024
- 3829
-
MetaCluster: A Universal Interpretable Classification Framework for CybersecurityGe, Wenhan / Cui, Zeyuan / Wang, Junfeng / Tang, Binhui / Li, Xiaohui et al. | 2024
- 3844
-
Two-Factor Authenticated Key Exchange From Biometrics With Low Entropy RatesJiang, Changsong / Xu, Chunxiang / Han, Yunxia / Zhang, Zhao / Chen, Kefei et al. | 2024
- 3857
-
Stability Analysis of Networked Control Systems Under DoS Attacks and Security Controller Design With Mini-Batch Machine Learning SupervisionCai, Xiao / Shi, Kaibo / Sun, Yanbin / Cao, Jinde / Wen, Shiping / Qiao, Cheng / Tian, Zhihong et al. | 2024
- 3866
-
Toward Dual-View X-Ray Baggage Inspection: A Large-Scale Benchmark and Adaptive Hierarchical Cross Refinement for Prohibited Item DiscoveryMa, Bowen / Jia, Tong / Li, Mingyuan / Wu, Songsheng / Wang, Hao / Chen, Dongyue et al. | 2024
- 3879
-
DIBAD: A Disentangled Information Bottleneck Adversarial Defense Method Using Hilbert-Schmidt Independence Criterion for Spectrum SecurityZhang, Sicheng / Yang, Yandie / Zhou, Ziyao / Sun, Zhi / Lin, Yun et al. | 2024
- 3892
-
Blockchain-Based Secure Cross-Domain Data Sharing for Edge-Assisted Industrial Internet of ThingsWang, Fengqun / Cui, Jie / Zhang, Qingyang / He, Debiao / Zhong, Hong et al. | 2024
- 3906
-
SAE+: One-Round Provably Secure Asymmetric SAE Protocol for Client-Server ModelQi, Mingping / Hu, Wei / Tai, Yu et al. | 2024
- 3914
-
Exploring the Abyss? Unveiling Systems-on-Chip Hardware Vulnerabilities Beneath SoftwareRajendran, Sree Ranjani / Dipu, Nusrat Farzana / Tarek, Shams / Kamali, Hadi Mardani / Farahmandi, Farimah / Tehranipoor, Mark et al. | 2024
- 3927
-
Fully Symmetrical Obfuscated Interconnection and Weak-PUF-Assisted Challenge Obfuscation Strong PUFs Against Machine-Learning Modeling AttacksXu, Chongyao / Zhang, Litao / Mak, Pui-In / Martins, Rui P. / Law, Man-Kay et al. | 2024
- 3943
-
DF-RAP: A Robust Adversarial Perturbation for Defending Against Deepfakes in Real-World Social Network ScenariosQu, Zuomin / Xi, Zuping / Lu, Wei / Luo, Xiangyang / Wang, Qian / Li, Bin et al. | 2024
- 3958
-
Unstoppable Attack: Label-Only Model Inversion Via Conditional Diffusion ModelLiu, Rongke / Wang, Dong / Ren, Yizhi / Wang, Zhen / Guo, Kaitian / Qin, Qianqian / Liu, Xiaolei et al. | 2024
- 3974
-
Fingerprint Presentation Attack Detection by Region DecompositionFei, Hongyan / Huang, Chuanwei / Wu, Song / Wang, Zheng / Jia, Zexi / Feng, Jufu et al. | 2024
- 3986
-
UltraVCS: Ultra-Fine-Grained Variable-Based Code Slicing for Automated Vulnerability DetectionWu, Tongshuai / Chen, Liwei / Du, Gewangzi / Meng, Dan / Shi, Gang et al. | 2024
- 4001
-
Frequency-Selective Adversarial Attack Against Deep Learning-Based Wireless Signal ClassifiersKe, Da / Wang, Xiang / Huang, Zhitao et al. | 2024
- 4012
-
Intrusion Device Detection in Fieldbus Networks Based on Channel-State Group FingerprintWang, Xiangming / Liu, Yang / Jiao, Kexin / Liu, Pengfei / Luo, Xiapu / Liu, Ting et al. | 2024
- 4028
-
Puncturable Attribute-Based Encryption From Lattices for Classified Document SharingYang, Mengxue / Wang, Huaqun / He, Debiao et al. | 2024
- 4043
-
On Hardware Security Bug Code Fixes by Prompting Large Language ModelsAhmad, Baleegh / Thakur, Shailja / Tan, Benjamin / Karri, Ramesh / Pearce, Hammond et al. | 2024
- 4058
-
MFAE: Masked Frequency Autoencoders for Domain Generalization Face Anti-SpoofingZheng, Tianyi / Li, Bo / Wu, Shuang / Wan, Ben / Mu, Guodong / Liu, Shice / Ding, Shouhong / Wang, Jia et al. | 2024
- 4070
-
Secure and Efficient Federated Learning With Provable Performance Guarantees via Stochastic QuantizationLyu, Xinchen / Hou, Xinyun / Ren, Chenshan / Ge, Xin / Yang, Penglin / Cui, Qimei / Tao, Xiaofeng et al. | 2024
- 4086
-
A Cryptographic Protocol for Efficient Mutual Location Privacy Through Outsourcing in Indoor Wi-Fi LocalizationEshun, Samuel N. / Palmieri, Paolo et al. | 2024
- 4100
-
Protected Face Templates Generation Based on Multiple Partial Walsh Transformations and SimhashGao, Ce / Zhang, Kang / Wang, Weiwei / Cao, Zhicheng / Pang, Liaojun / Liu, Eryun / Zhao, Heng et al. | 2024
- 4114
-
A Robust Reversible Watermarking Scheme Using Attack-Simulation-Based Adaptive Normalization and EmbeddingTang, Yichao / Wang, Chuntao / Xiang, Shijun / Cheung, Yiu-Ming et al. | 2024
- 4130
-
Inversion-Guided Defense: Detecting Model Stealing Attacks by Output InvertingZhou, Shuai / Zhu, Tianqing / Ye, Dayong / Zhou, Wanlei / Zhao, Wei et al. | 2024
- 4146
-
Privacy-Preserving Approximate Minimum Community Search on Large NetworksSun, Fangyuan / Yu, Jia / Hu, Jiankun et al. | 2024
- 4161
-
Efficient Verifiably Encrypted ECDSA Schemes From Castagnos-Laguillaumie and Joye-Libert EncryptionsYang, Xiao / Zhang, Chengru / Xue, Haiyang / Au, Man Ho et al. | 2024
- 4174
-
A Flexible and Scalable Malicious Secure Aggregation Protocol for Federated LearningTang, Jinling / Xu, Haixia / Wang, Mingsheng / Tang, Tao / Peng, Chunying / Liao, Huimei et al. | 2024
- 4188
-
Reinforcement Learning-Based Tracking Control for Networked Control Systems With DoS AttacksLiu, Jinliang / Dong, Yanhui / Zha, Lijuan / Xie, Xiangpeng / Tian, Engang et al. | 2024
- 4198
-
Correction to “A New Construction Method for Keystream Generators”Gul, Cagdas / Kara, Orhun et al. | 2024
- 4199
-
PhaDe: Practical Phantom Spoofing Attack Detection for Autonomous VehiclesLin, Feng / Yan, Hao / Li, Jin / Liu, Ziwei / Lu, Li / Ba, Zhongjie / Ren, Kui et al. | 2024
- 4215
-
GuessFuse: Hybrid Password Guessing With Multi-ViewXie, Zhijie / Shi, Fan / Zhang, Min / Ma, Huimin / Wang, Huaixi / Li, Zhenhan / Zhang, Yunyi et al. | 2024
- 4231
-
QPASE: Quantum-Resistant Password-Authenticated Searchable Encryption for Cloud StorageJiang, Jingwei / Wang, Ding et al. | 2024
- 4247
-
Armor: Protecting Software Against Hardware Tracing TechniquesYue, Tai / Zhang, Fengwei / Ning, Zhenyu / Wang, Pengfei / Zhou, Xu / Lu, Kai / Zhou, Lei et al. | 2024
- 4263
-
On the Semantic Security in the General Bounded Storage Model: A New ProofMoltafet, Mohammad / Sadjadpour, Hamid R. / Rezki, Zouheir et al. | 2024
- 4272
-
VGGM: Variational Graph Gaussian Mixture Model for Unsupervised Change Point Detection in Dynamic NetworksZhang, Xinxun / Jiao, Pengfei / Gao, Mengzhou / Li, Tianpeng / Wu, Yiming / Wu, Huaming / Zhao, Zhidong et al. | 2024
- 4285
-
BDMMT: Backdoor Sample Detection for Language Models Through Model Mutation TestingWei, Jiali / Fan, Ming / Jiao, Wenjing / Jin, Wuxia / Liu, Ting et al. | 2024
- 4301
-
Toward Efficient Key Extraction of LBC Over Ring: Fast Non-Spherical G-Lattice Sampler and Optimized Perturbation GenerationLu, Hai / Zhu, Yan / Chen, Cecilia E. / Ma, Di et al. | 2024
- 4316
-
Privacy-Preserving and Trusted Keyword Search for Multi-Tenancy CloudZhu, Xiaojie / Shen, Peisong / Dai, Yueyue / Xu, Lei / Hu, Jiankun et al. | 2024
- 4331
-
STAR-RIS-Assisted-Full-Duplex Jamming Design for Secure Wireless Communications SystemWen, Yun / Chen, Gaojie / Fang, Sisai / Chu, Zheng / Xiao, Pei / Tafazolli, Rahim et al. | 2024
- 4344
-
Group-Wise Verifiable Coded Computing Under Byzantine Attacks and StragglersHong, Sangwoo / Yang, Heecheol / Yoon, Youngseok / Lee, Jungwoo et al. | 2024
- 4358
-
Efficiently Achieving Privacy Preservation and Poisoning Attack Resistance in Federated LearningLi, Xueyang / Yang, Xue / Zhou, Zhengchun / Lu, Rongxing et al. | 2024
- 4374
-
(Security) Assertions by Large Language ModelsKande, Rahul / Pearce, Hammond / Tan, Benjamin / Dolan-Gavitt, Brendan / Thakur, Shailja / Karri, Ramesh / Rajendran, Jeyavijayan et al. | 2024
- 4390
-
Online Context-Aware Streaming Data Release With Sequence Information PrivacyJiang, Bo / Li, Ming / Tandon, Ravi et al. | 2024
- 4406
-
Embedding Secret Message in Chinese Characters via Glyph Perturbation and Style TransferYao, Ye / Wang, Chen / Wang, Hui / Wang, Ke / Ren, Yizhi / Meng, Weizhi et al. | 2024
- 4420
-
Size-Independent Reliable CNN for RJCA SteganalysisButora, Jan / Bas, Patrick et al. | 2024
- 4432
-
Covert Transmission in Water-to-Air Optical Wireless Communication SystemsHu, Qingqing / Lin, Tianrui / Wei, Tianjian / Huang, Nuo / Zhu, Yi-Jun / Gong, Chen et al. | 2024
- 4448
-
Provably and Physically Secure UAV-Assisted Authentication Protocol for IoT Devices in Unattended SettingsTian, Chuang / Ma, Jianfeng / Li, Teng / Zhang, Junwei / Ma, Chengyan / Xi, Ning et al. | 2024
- 4464
-
Efficient Group Key Generation Based on Satellite Cluster State Information for Drone SwarmWang, Ning / Duan, Jixuan / Chen, Biwen / Guo, Shangwei / Xiang, Tao / Zeng, Kai et al. | 2024
- 4480
-
On Mixing Authenticated and Non-Authenticated Signals Against GNSS SpoofingArdizzon, Francesco / Crosara, Laura / Tomasin, Stefano / Laurenti, Nicola et al. | 2024
- 4494
-
NSPFL: A Novel Secure and Privacy-Preserving Federated Learning With Data Integrity AuditingZhang, Zehu / Li, Yanping et al. | 2024
- 4507
-
Where Deepfakes Gaze at? Spatial–Temporal Gaze Inconsistency Analysis for Video Face Forgery DetectionPeng, Chunlei / Miao, Zimin / Liu, Decheng / Wang, Nannan / Hu, Ruimin / Gao, Xinbo et al. | 2024
- 4518
-
MLaD²: A Semi-Supervised Money Laundering Detection Framework Based on Decoupling TrainingLuo, Xuejiao / Han, Xiaohui / Zuo, Wenbo / Wu, Xiaoming / Liu, Wenyin et al. | 2024
- 4534
-
Sweeper: Breaking the Validity-Latency Tradeoff in Asynchronous Common SubsetYang, Guoyu / Chen, Chang / Chen, Qi / Jiang, Jianan / Li, Jin / He, Debiao et al. | 2024
- 4547
-
Fast Propagation Is Better: Accelerating Single-Step Adversarial Training via Sampling SubnetworksJia, Xiaojun / Li, Jianshu / Gu, Jindong / Bai, Yang / Cao, Xiaochun et al. | 2024
- 4560
-
Minimalism is King! High-Frequency Energy-Based Screening for Data-Efficient Backdoor AttacksXun, Yuan / Jia, Xiaojun / Gu, Jindong / Liu, Xinwei / Guo, Qing / Cao, Xiaochun et al. | 2024
- 4572
-
SStore: An Efficient and Secure Provable Data Auditing Platform for CloudWang, Lipeng / Hu, Mingsheng / Jia, Zhijuan / Guan, Zhi / Chen, Zhong et al. | 2024
- 4585
-
Vulnerability of State-of-the-Art Face Recognition Models to Template Inversion AttackOtroshi Shahreza, Hatef / Hahn, Vedrana Krivokuca / Marcel, Sebastien et al. | 2024
- 4601
-
Palm Vein Recognition Under Unconstrained and Weak-Cooperative ConditionsLuo, Dacan / Qiao, Yitao / Xie, Di / Zhang, Shifeng / Kang, Wenxiong et al. | 2024
- 4615
-
Deeper Insight Into Why Authentication Schemes in IoT Environments Fail to Achieve the Desired SecurityGuo, Yimin / Guo, Yajun / Xiong, Ping / Yang, Fan / Zhang, Chengde et al. | 2024
- 4628
-
Dual Defense: Adversarial, Traceable, and Invisible Robust Watermarking Against Face SwappingZhang, Yunming / Ye, Dengpan / Xie, Caiyun / Tang, Long / Liao, Xin / Liu, Ziyi / Chen, Chuanxi / Deng, Jiacheng et al. | 2024
- 4642
-
PHY-Layer Authentication Exploiting Channel Sparsity in MmWave MIMO UAV-Ground SystemsTeng, Yulin / Zhang, Pinchang / Chen, Xiao / Jiang, Xiaohong / Xiao, Fu et al. | 2024
- 4658
-
Secure Stabilization of Networked Lur’e Systems Suffering From DoS Attacks: A Resilient Memory-Based Event-Trigger MechanismNi, Yanyan / Wang, Zhen / Fan, Yingjie / Huang, Xia / Shen, Hao et al. | 2024
- 4670
-
On the Economics of Adversarial Machine LearningMerkle, Florian / Samsinger, Maximilian / Schottle, Pascal / Pevny, Tomas et al. | 2024
- 4686
-
On the Privacy Effect of Data Enhancement via the Lens of MemorizationLi, Xiao / Li, Qiongxiu / Hu, Zhanhao / Hu, Xiaolin et al. | 2024
- 4700
-
SimLESS: A Secure Deduplication System Over Similar Data in Cloud Media SharingSong, Mingyang / Hua, Zhongyun / Zheng, Yifeng / Xiang, Tao / Jia, Xiaohua et al. | 2024
- 4716
-
Integral Pose Learning via Appearance Transfer for Gait RecognitionHuang, Panjian / Hou, Saihui / Cao, Chunshui / Liu, Xu / Hu, Xuecai / Huang, Yongzhen et al. | 2024
- 4728
-
AugSteal: Advancing Model Steal With Data Augmentation in Active Learning FrameworksGao, Lijun / Liu, Wenjun / Liu, Kai / Wu, Jiehong et al. | 2024
- 4741
-
Double-Layer Detection of Internal Threat in Enterprise Systems Based on Deep LearningHe, Daojing / Lv, Xin / Xu, Xueqian / Chan, Sammy / Choo, Kim-Kwang Raymond et al. | 2024
- 4752
-
FLPurifier: Backdoor Defense in Federated Learning via Decoupled Contrastive TrainingZhang, Jiale / Zhu, Chengcheng / Sun, Xiaobing / Ge, Chunpeng / Chen, Bing / Susilo, Willy / Yu, Shui et al. | 2024
- 4767
-
Steganalysis of AI Models LSB AttacksGilkarov, Daniel / Dubin, Ran et al. | 2024
- 4780
-
HomeSentinel: Intelligent Anti-Fingerprinting for IoT Traffic in Smart HomesLi, Beibei / Chen, Youtong / Zhang, Lei / Wang, Licheng / Cheng, Yanyu et al. | 2024
- 4794
-
A Unified Optimization Framework for Feature-Based Transferable AttacksXu, Nanqing / Feng, Weiwei / Zhang, Tianzhu / Zhang, Yongdong et al. | 2024
- 4809
-
Defending Against Malicious Influence Control in Online Leader-Follower Social NetworksZhu, Liwang / Zhou, Xiaotian / Tian, Jiahe / Li, Wei / Zhang, Zhongzhi et al. | 2024
- 4820
-
Employing Reinforcement Learning to Construct a Decision-Making Environment for Image Forgery LocalizationPeng, Rongxuan / Tan, Shunquan / Mo, Xianbo / Li, Bin / Huang, Jiwu et al. | 2024
- 4835
-
Privacy-Preserving Multi-Biometric Indexing Based on Frequent Binary PatternsOsorio-Roig, Daile / Gonzalez-Soler, Lazaro Janier / Rathgeb, Christian / Busch, Christoph et al. | 2024
- 4851
-
Practical Cyber Attack Detection With Continuous Temporal Graph in Dynamic Network SystemDuan, Guanghan / Lv, Hongwu / Wang, Huiqiang / Feng, Guangsheng / Li, Xiaoli et al. | 2024
- 4865
-
BAGM: A Backdoor Attack for Manipulating Text-to-Image Generative ModelsVice, Jordan / Akhtar, Naveed / Hartley, Richard / Mian, Ajmal et al. | 2024
- 4881
-
MalGNE: Enhancing the Performance and Efficiency of CFG-Based Malware Detector by Graph Node Embedding in Low Dimension SpacePeng, Hao / Yang, Jieshuai / Zhao, Dandan / Xu, Xiaogang / Pu, Yuwen / Han, Jianmin / Yang, Xing / Zhong, Ming / Ji, Shouling et al. | 2024
- 4897
-
Dynamic Group Time-Based One-Time PasswordsCao, Xuelian / Yang, Zheng / Ning, Jianting / Jin, Chenglu / Lu, Rongxing / Liu, Zhiming / Zhou, Jianying et al. | 2024
- 4914
-
Discrete Spectral Encryption of Single-Carrier Signals With Pseudo Random Dynamic KeysAbbade, Marcelo L. F. / Souza, Welerson S. / Santos, Melissa O. / Rodrigues, Ivan E. L. / Aldaya, Ivan / Bonani, Luiz. H. / Romero, Murilo A. et al. | 2024
- 4930
-
PRO-Face C: Privacy-Preserving Recognition of Obfuscated Face via Feature CompensationYuan, Lin / Chen, Wu / Pu, Xiao / Zhang, Yan / Li, Hongbo / Zhang, Yushu / Gao, Xinbo / Ebrahimi, Touradj et al. | 2024
- 4945
-
An Intelligent Reflecting Surface-Based Attack Scheme Against Dual-Functional Radar and Communication SystemsLiu, Beiyuan / Jiang, Jinjing / Liu, Qian / Liu, Jiajia / Xu, Sai et al. | 2024
- 4957
-
Privacy-Enhanced Frequent Sequence Mining and Retrieval for Personalized Behavior PredictionChang, Shuyu / Shi, Zhenqi / Xiao, Fu / Huang, Haiping / Liu, Xingchen / Sun, Chaorun et al. | 2024
- 4970
-
NeuralSanitizer: Detecting Backdoors in Neural NetworksZhu, Hong / Zhao, Yue / Zhang, Shengzhi / Chen, Kai et al. | 2024
- 4986
-
Attribute-Guided Cross-Modal Interaction and Enhancement for Audio-Visual MatchingWang, Jiaxiang / Zheng, Aihua / Yan, Yan / He, Ran / Tang, Jin et al. | 2024
- 4999
-
SeCoSe: Toward Searchable and Communicable Healthcare Service Seeking in Flexible and Secure EHR SharingLiu, Zhihuang / Hu, Ling / Cai, Zhiping / Liu, Ximeng / Liu, Yanhua et al. | 2024
- 5015
-
PUF-Assisted Radio Frequency Fingerprinting Exploiting Power Amplifier Active Load-PullingLi, Yuepei / Xu, Kai / Zhang, Junqing / Gu, Chongyan / Ding, Yuan / Goussetis, George / Podilchak, Symon K. et al. | 2024
- 5030
-
Optimal Signaling for Covert Communications Under Peak Power ConstraintKang, Bichen / Ye, Neng / An, Jianping et al. | 2024
- 5046
-
Understanding Visual Privacy Protection: A Generalized Framework With an Instance on Facial PrivacyZhang, Yushu / Ji, Junhao / Wen, Wenying / Zhu, Youwen / Xia, Zhihua / Weng, Jian et al. | 2024
- 5060
-
Secret Multiple Leaders & Committee Election With Application to Sharding BlockchainZhai, Mingzhe / Wu, Qianhong / Liu, Yizhong / Qin, Bo / Dai, Xiaopeng / Gao, Qiyuan / Susilo, Willy et al. | 2024
- 5075
-
PrivSSO: Practical Single-Sign-On Authentication Against Subscription/Access Pattern LeakageGao, Ge / Zhang, Yuan / Song, Yaqing / Li, Shiyu et al. | 2024
- 5090
-
RIS-Jamming: Breaking Key Consistency in Channel Reciprocity-Based Key GenerationLi, Guyue / Staat, Paul / Li, Haoyu / Heinrichs, Markus / Zenger, Christian / Kronberger, Rainer / Elders-Boll, Harald / Paar, Christof / Hu, Aiqun et al. | 2024
- 5106
-
ForensicsForest Family: A Series of Multi-Scale Hierarchical Cascade Forests for Detecting GAN-Generated FacesLu, Jiucui / Zhou, Jiaran / Dong, Junyu / Li, Bin / Lyu, Siwei / Li, Yuezun et al. | 2024
- 5120
-
Vulnerability Detection Based on Enhanced Graph Representation LearningXiao, Peng / Xiao, Qibin / Zhang, Xusheng / Wu, Yumei / Yang, Fengyu et al. | 2024
- 5136
-
Sparsity and Privacy in Secret Sharing: A Fundamental Trade-OffBitar, Rawad / Egger, Maximilian / Wachter-Zeh, Antonia / Xhemrishi, Marvin et al. | 2024
- 5151
-
On the Impact of Voice Anonymization on Speech Diagnostic Applications: A Case Study on COVID-19 DetectionZhu, Yi / Imoussaine-Aikous, Mohamed / Cote-Lussier, Carolyn / Falk, Tiago H. et al. | 2024
- 5166
-
Contrast-Then-Approximate: Analyzing Keyword Leakage of Generative Language ModelsZeng, Zhirui / Xiang, Tao / Guo, Shangwei / He, Jialing / Zhang, Qiao / Xu, Guowen / Zhang, Tianwei et al. | 2024
- 5181
-
MMQW: Multi-Modal Quantum Watermarking SchemeXing, Zheng / Lam, Chan-Tong / Yuan, Xiaochen / Im, Sio-Kei / Machado, Penousal et al. | 2024
- 5196
-
Purified Authorization Service With Encrypted Message ModerationJiang, Peng / Liu, Qi / Zhu, Liehuang et al. | 2024
- 5207
-
Boosting Black-Box Attack to Deep Neural Networks With Conditional Diffusion ModelsLiu, Renyang / Zhou, Wei / Zhang, Tianwei / Chen, Kangjie / Zhao, Jun / Lam, Kwok-Yan et al. | 2024
- 5220
-
Data Generation and Augmentation Method for Deep Learning-Based VDU Leakage Signal Restoration AlgorithmNam, Taesik / Choi, Dong-Hoon / Lee, Euibum / Jo, Han-Shin / Yook, Jong-Gwan et al. | 2024
- 5235
-
Vulnerability Analysis of Distributed State Estimator Under False Data Injection AttacksLi, Pengyu / Ye, Dan et al. | 2024
- 5245
-
Enhanced Few-Shot Malware Traffic Classification via Integrating Knowledge Transfer With Neural Architecture SearchZhang, Xixi / Wang, Qin / Qin, Maoyang / Wang, Yu / Ohtsuki, Tomoaki / Adebisi, Bamidele / Sari, Hikmet / Gui, Guan et al. | 2024
- 5257
-
MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation LearningAly, Ahmed / Iqbal, Shahrear / Youssef, Amr / Mansour, Essam et al. | 2024
- 5272
-
Performance Enhanced Secure Spatial Keyword Similarity Query With Arbitrary Spatial RangesZhang, Songnian / Lu, Rongxing / Zhu, Hui / Zheng, Yandong / Guan, Yunguo / Wang, Fengwei / Shao, Jun / Li, Hui et al. | 2024
- 5286
-
Foolmix: Strengthen the Transferability of Adversarial Examples by Dual-Blending and Direction Update StrategyLi, Zhankai / Wang, Weiping / Li, Jie / Chen, Kai / Zhang, Shigeng et al. | 2024
- 5301
-
CSI-RFF: Leveraging Micro-Signals on CSI for RF Fingerprinting of Commodity WiFiKong, Ruiqi / Chen, He et al. | 2024
- 5316
-
Causal Learning for Robust Specific Emitter Identification Over Unknown Channel StatisticsTang, Peng / Ding, Guoru / Xu, Yitao / Jiao, Yutao / Song, Yehui / Wei, Guofeng et al. | 2024
- 5330
-
Consistency of Stackelberg and Nash Equilibria in Three-Player Leader-Follower GamesXu, Gehui / Chen, Guanpu / Cheng, Zhaoyang / Hong, Yiguang / Qi, Hongsheng et al. | 2024
- 5345
-
Improving Generalization of Deepfake Detectors by Imposing Gradient RegularizationGuan, Weinan / Wang, Wei / Dong, Jing / Peng, Bo et al. | 2024
- 5357
-
Client-Side Embedding of Screen-Shooting Resilient Image WatermarkingXiao, Xiangli / Zhang, Yushu / Hua, Zhongyun / Xia, Zhihua / Weng, Jian et al. | 2024
- 5373
-
Reconfigurable Intelligent Surface-Assisted Key Generation for Millimeter-Wave Multi-User SystemsLu, Tianyu / Chen, Liquan / Zhang, Junqing / Chen, Chen / Duong, Trung Q. et al. | 2024
- 5389
-
Revocable and Privacy-Preserving Bilateral Access Control for Cloud Data SharingZhao, Mingyang / Zhang, Chuan / Wu, Tong / Ni, Jianbing / Liu, Ximeng / Zhu, Liehuang et al. | 2024
- 5405
-
Depriving the Survival Space of Adversaries Against Poisoned Gradients in Federated LearningLu, Jianrong / Hu, Shengshan / Wan, Wei / Li, Minghui / Zhang, Leo Yu / Xue, Lulu / Jin, Hai et al. | 2024
- 5419
-
CP-IPFE: Ciphertext-Policy Based Inner Product Functional EncryptionYang, Haoxuan / Peng, Changgen et al. | 2024
- 5434
-
The Dark Forest: Understanding Security Risks of Cross-Party Delegated Resources in Mobile App-in-App EcosystemsZhang, Zhibo / Zhang, Lei / Yang, Guangliang / Chen, Yanjun / Xu, Jiahao / Yang, Min et al. | 2024
- 5449
-
Generic Construction of Conditional Privacy-Preserving Certificateless Signatures With Efficient Instantiations for VANETsPu, Lang / Lin, Chao / Gu, Jingjing / Huang, Xinyi / He, Debiao et al. | 2024
- 5464
-
Vulnerability of Deep Forest to Adversarial AttacksAli, Ziad / Mohammed, Ameer / Ahmad, Imtiaz et al. | 2024
- 5476
-
ProGen: Projection-Based Adversarial Attack Generation Against Network Intrusion DetectionWang, Minxiao / Yang, Ning / Forcade-Perkins, Nicolas J. / Weng, Ning et al. | 2024
- 5492
-
A Lightweight and Noise-Robust Method for Internal OCT Fingerprint ReconstructionLiu, Feng / Zeng, Wenfeng / Li, Yin / Shen, Linlin et al. | 2024
- 5506
-
Toward Transferable Attack via Adversarial Diffusion in Face RecognitionHu, Cong / Li, Yuanbo / Feng, Zhenhua / Wu, Xiaojun et al. | 2024
- 5520
-
RL and Fingerprinting to Select Moving Target Defense Mechanisms for Zero-Day Attacks in IoTHuertas Celdran, Alberto / Miguel Sanchez Sanchez, Pedro / von der Assen, Jan / Schenk, Timo / Bovet, Gerome / Martinez Perez, Gregorio / Stiller, Burkhard et al. | 2024
- 5530
-
Fast Evaluation of S-Boxes With Garbled CircuitsPohle, Erik / Abidin, Aysajan / Preneel, Bart et al. | 2024
- 5545
-
Privacy-Preserved Data Disturbance and Truthfulness Verification for Data TradingZhang, Man / Li, Xinghua / Miao, Yinbin / Luo, Bin / Xu, Wanyun / Ren, Yanbing / Deng, Robert H. et al. | 2024
- 5561
-
Achieving Covert Communication With a Probabilistic Jamming StrategyChen, Xun / Gao, Fujun / Qiu, Min / Zhang, Jia / Shu, Feng / Yan, Shihao et al. | 2024
- 5575
-
Split Aggregation: Lightweight Privacy-Preserving Federated Learning Resistant to Byzantine AttacksLu, Zhi / Lu, SongFeng / Cui, YongQuan / Tang, XueMing / Wu, JunJun et al. | 2024
- 5591
-
DARD: Deceptive Approaches for Robust Defense Against IP TheftMongardini, Alberto Maria / La Morgia, Massimo / Jajodia, Sushil / Vincenzo Mancini, Luigi / Mei, Alessandro et al. | 2024
- 5607
-
SOCI+: An Enhanced Toolkit for Secure Outsourced Computation on IntegersZhao, Bowen / Deng, Weiquan / Li, Xiaoguo / Liu, Ximeng / Pei, Qingqi / Deng, Robert H. et al. | 2024
- 5620
-
Balancing Privacy and Regulation of Cross-Chain Transaction Systems via SoK-Assisted Policy EnhancementJiang, Peng / Zhu, Jun / Zhu, Liehuang et al. | 2024
- 5630
-
Approximation of Pufferfish Privacy for Gaussian PriorsDing, Ni et al. | 2024
- 5641
-
Pilot Spoofing Attack on the Downlink of Cell-Free Massive MIMO: From the Perspective of AdversariesXu, Weiyang / Wang, Ruiguang / Zhang, Yuan / Quoc Ngo, Hien / Xiang, Wei et al. | 2024
- 5655
-
Stealthy Targeted Backdoor Attacks Against Image CaptioningFan, Wenshu / Li, Hongwei / Jiang, Wenbo / Hao, Meng / Yu, Shui / Zhang, Xiao et al. | 2024
- 5668
-
Online Self-Supervised Deep Learning for Intrusion Detection SystemsNakip, Mert / Gelenbe, Erol et al. | 2024
- 5684
-
Lattice-Aided Extraction of Spread-Spectrum Hidden DataYang, Fan / Cheng, Hao / Lyu, Shanxiang / Wen, Jinming / Chen, Hao et al. | 2024
- 5696
-
Enhancing the Physical Layer Security of Two-Way Relay Systems With RIS and BeamformingZhang, Yu / Zhao, Shuangrui / Shen, Yulong / Jiang, Xiaohong / Shiratori, Norio et al. | 2024
- 5712
-
Phase-Aggregated Dual-Branch Network for Efficient Fingerprint Dense RegistrationGuan, Xiongjun / Feng, Jianjiang / Zhou, Jie et al. | 2024
- 5725
-
Libras: A Fair, Secure, Verifiable, and Scalable Outsourcing Computation Scheme Based on BlockchainHuo, Lijuan / Wu, Libing / Zhang, Zhuangzhuang / Li, Chunshuo / He, Debiao / Wang, Jing et al. | 2024
- 5738
-
Federated Learning With Long-Tailed Data via Representation Unification and Classifier RectificationHuang, Wenke / Liu, Yuxia / Ye, Mang / Chen, Jun / Du, Bo et al. | 2024
- 5751
-
Efficient Privacy-Preserving Logistic Model With Malicious SecurityMiao, Guanhong / Wu, Samuel S. et al. | 2024
- 5767
-
CMXsafe: A Proxy Layer for Securing Internet-of-Things Communicationsde Hoz Diego, Jorge David / Madi, Taous / Konstantinou, Charalambos et al. | 2024
- 5783
-
DP-Norm: Differential Privacy Primal-Dual Algorithm for Decentralized Federated LearningFukami, Takumi / Murata, Tomoya / Niwa, Kenta / Tyou, Iifan et al. | 2024
- 5798
-
Securing Collaborative Authentication: A Weighted Voting Strategy to Counter Unreliable CooperatorsZhou, Yudi / Huo, Yan / Gao, Qinghe / Wu, Yue / Jing, Tao / Mao, Jian et al. | 2024
- 5814
-
RFed: Robustness-Enhanced Privacy-Preserving Federated Learning Against Poisoning AttackMiao, Yinbin / Yan, Xinru / Li, Xinghua / Xu, Shujiang / Liu, Ximeng / Li, Hongwei / Deng, Robert H. et al. | 2024
- 5828
-
Privacy-Preserving Asynchronous Federated Learning Under Non-IID SettingsMiao, Yinbin / Kuang, Da / Li, Xinghua / Xu, Shujiang / Li, Hongwei / Raymond Choo, Kim-Kwang / Deng, Robert H. et al. | 2024
- 5842
-
Shuffle Private Decentralized Convex OptimizationZhang, Lingjie / Zhang, Hai et al. | 2024
- 5852
-
Toward Stealthy Backdoor Attacks Against Speech Recognition via Elements of SoundCai, Hanbo / Zhang, Pengcheng / Dong, Hai / Xiao, Yan / Koffas, Stefanos / Li, Yiming et al. | 2024
- 5867
-
On the Privacy of Adaptive Cuckoo Filters: Analysis and ProtectionReviriego, Pedro / Apple, Jim / Larrabeiti, David / Liu, Shanshan / Lombardi, Fabrizio et al. | 2024
- 5880
-
Exploiting the Adversarial Example Vulnerability of Transfer Learning of Source CodeYang, Yulong / Fan, Haoran / Lin, Chenhao / Li, Qian / Zhao, Zhengyu / Shen, Chao et al. | 2024
- 5895
-
RFG-HELAD: A Robust Fine-Grained Network Traffic Anomaly Detection Model Based on Heterogeneous Ensemble LearningZhong, Ying / Wang, Zhiliang / Shi, Xingang / Yang, Jiahai / Li, Keqin et al. | 2024
- 5911
-
A Secure and Efficient Blockchain Sharding Scheme via Hybrid Consensus and Dynamic ManagementLi, Meiqi / Luo, Xinyi / Xue, Kaiping / Xue, Yingjie / Sun, Wentuo / Li, Jian et al. | 2024
- 5925
-
RFTrack: Stealthy Location Inference and Tracking Attack on Wi-Fi DevicesLi, Ronghua / Hu, Haibo / Ye, Qingqing et al. | 2024
- 5940
-
CSFAdv: Critical Semantic Fusion Guided Least-Effort Adversarial Example AttacksPeng, Da-Tian / Dong, Jianmin / Zhang, Mingjiang / Yang, Jungang / Wang, Zhen et al. | 2024
- 5956
-
Lawful Remote Forensics Mechanism With Admissibility of Evidence in Stochastic and Unpredictable Transnational CrimeChew, Chit-Jie / Lee, Wei-Bin / Sung, Tzu-Li / Chen, Ying-Chin / Wang, Shiuh-Jeng / Lee, Jung-San et al. | 2024
- 5971
-
Dedicated Quantum Attacks on XOR-Type Function With Applications to Beyond-Birthday- Bound MACsShi, Tairong / Wu, Wenling / Hu, Bin / Guan, Jie / Sui, Han / Wang, Senpeng / Zhang, Mengyuan et al. | 2024
- 5985
-
SingleADV: Single-Class Target-Specific Attack Against Interpretable Deep Learning SystemsAbdukhamidov, Eldor / Abuhamad, Mohammed / Thiruvathukal, George K. / Kim, Hyoungshick / Abuhmed, Tamer et al. | 2024
- 5999
-
eGrass: An Encrypted Attributed Subgraph Matching System With Malicious SecurityWang, Songlei / Zheng, Yifeng / Jia, Xiaohua / Wang, Cong et al. | 2024
- 6015
-
Multi-Faceted Knowledge-Driven Graph Neural Network for Iris SegmentationWei, Jianze / Wang, Yunlong / Gao, Xingyu / He, Ran / Sun, Zhenan et al. | 2024
- 6028
-
HoneyJudge: A PLC Honeypot Identification Framework Based on Device Memory TestingZhu, Hengye / Liu, Mengxiang / Chen, Binbin / Che, Xin / Cheng, Peng / Deng, Ruilong et al. | 2024
- 6044
-
On the Secret-Key Capacity Over Multipath Fading ChannelGuo, Dengke / Ma, Dongtang / Xiong, Jun / Liu, Xiaoran / Wei, Jibo et al. | 2024
- 6055
-
A Steganography Immunoprocessing Framework Against CNN-Based and Handcrafted SteganalysisChen, Yijing / Wang, Hongxia / Li, Wanjie / Li, Wenshan et al. | 2024
- 6070
-
Enhancing Sparse Mobile CrowdSensing With Manifold Optimization and Differential PrivacyLi, Chengxin / Long, Saiqin / Liu, Haolin / Choi, Youngjune / Sekiya, Hiroo / Li, Zhetao et al. | 2024
- 6097
-
PkT-SIN: A Secure Communication Protocol for Space Information Networks With Periodic k-Time Anonymous AuthenticationYang, Yang / Xue, Wenyi / Sun, Jianfei / Yang, Guomin / Li, Yingjiu / Hwa Pang, Hwee / Deng, Robert H. et al. | 2024
- 6113
-
Ranker: Early Ransomware Detection Through Kernel-Level Behavioral AnalysisZhang, Huan / Zhao, Lixin / Yu, Aimin / Cai, Lijun / Meng, Dan et al. | 2024
- 6128
-
SIa-CBc: Sensitive Intent-Assisted and Crucial Behavior-Cognized Malware Detection Based on Human Brain Cognitive TheoryJing, Chao / Cui, Chaoyuan / Wu, Yun et al. | 2024
- 6144
-
EGST: An Efficient Solution for Human Gaits Recognition Using Neuromorphic Vision SensorChen, Liaogehao / Zhang, Zhenjun / Xiao, Yang / Wang, Yaonan et al. | 2024
- 6155
-
Nebula: Self-Attention for Dynamic Malware AnalysisTrizna, Dmitrijs / Demetrio, Luca / Biggio, Battista / Roli, Fabio et al. | 2024