Palm Vein Recognition Under Unconstrained and Weak-Cooperative Conditions (English)
- New search for: Luo, Dacan
- Further information on Luo, Dacan:
- https://orcid.org/0000-0001-7358-5036
- New search for: Qiao, Yitao
- New search for: Xie, Di
- Further information on Xie, Di:
- https://orcid.org/0000-0001-8065-5901
- New search for: Zhang, Shifeng
- Further information on Zhang, Shifeng:
- https://orcid.org/0000-0003-0499-8130
- New search for: Kang, Wenxiong
- Further information on Kang, Wenxiong:
- https://orcid.org/0000-0001-9023-7252
- New search for: Luo, Dacan
- Further information on Luo, Dacan:
- https://orcid.org/0000-0001-7358-5036
- New search for: Qiao, Yitao
- New search for: Xie, Di
- Further information on Xie, Di:
- https://orcid.org/0000-0001-8065-5901
- New search for: Zhang, Shifeng
- Further information on Zhang, Shifeng:
- https://orcid.org/0000-0003-0499-8130
- New search for: Kang, Wenxiong
- Further information on Kang, Wenxiong:
- https://orcid.org/0000-0001-9023-7252
In:
IEEE Transactions on Information Forensics and Security
;
19
;
4601-4614
;
2024
- Article (Journal) / Electronic Resource
-
Title:Palm Vein Recognition Under Unconstrained and Weak-Cooperative Conditions
-
Contributors:Luo, Dacan ( author ) / Qiao, Yitao ( author ) / Xie, Di ( author ) / Zhang, Shifeng ( author ) / Kang, Wenxiong ( author )
-
Published in:IEEE Transactions on Information Forensics and Security ; 19 ; 4601-4614
-
Publisher:
- New search for: IEEE
-
Publication date:2024-01-01
-
Size:5855997 byte
-
ISSN:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Electronic Resource
-
Language:English
-
Source:
Table of contents – Volume 19
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Gait Attribute Recognition: A New Benchmark for Learning Richer Attributes From Human Gait PatternsSong, Xu / Hou, Saihui / Huang, Yan / Cao, Chunshui / Liu, Xu / Huang, Yongzhen / Shan, Caifeng et al. | 2024
- 15
-
Steganography Embedding Cost Learning With Generative Multi-Adversarial NetworkHuang, Dongxia / Luo, Weiqi / Liu, Minglin / Tang, Weixuan / Huang, Jiwu et al. | 2024
- 30
-
WF-Transformer: Learning Temporal Features for Accurate Anonymous Traffic Identification by Using Transformer NetworksZhou, Qiang / Wang, Liangmin / Zhu, Huijuan / Lu, Tong / Sheng, Victor S. et al. | 2024
- 44
-
BG: A Modular Treatment of BFT Consensus Toward a Unified Theory of BFT ReplicationSui, Xiao / Duan, Sisi / Zhang, Haibin et al. | 2024
- 59
-
A Causality-Aligned Structure Rationalization Scheme Against Adversarial Biased Perturbations for Graph Neural NetworksJia, Ju / Ma, Siqi / Liu, Yang / Wang, Lina / Deng, Robert H. et al. | 2024
- 74
-
Differentially Private Federated Learning With an Adaptive Noise MechanismXue, Rui / Xue, Kaiping / Zhu, Bin / Luo, Xinyi / Zhang, Tianwei / Sun, Qibin / Lu, Jun et al. | 2024
- 88
-
DeCloak: Enable Secure and Cheap Multi-Party Transactions on Legacy Blockchains by a Minimally Trusted TEE NetworkRen, Qian / Li, Yue / Wu, Yingjun / Wu, Yuchen / Lei, Hong / Wang, Lei / Chen, Bangdao et al. | 2024
- 104
-
NTD: Non-Transferability Enabled Deep Learning Backdoor DetectionLi, Yinshan / Ma, Hua / Zhang, Zhi / Gao, Yansong / Abuadbba, Alsharif / Xue, Minhui / Fu, Anmin / Zheng, Yifeng / Al-Sarawi, Said F. / Abbott, Derek et al. | 2024
- 120
-
Region Generation and Assessment Network for Occluded Person Re-IdentificationHe, Shuting / Chen, Weihua / Wang, Kai / Luo, Hao / Wang, Fan / Jiang, Wei / Ding, Henghui et al. | 2024
- 133
-
MCRe: A Unified Framework for Handling Malicious Traffic With Noise Labels Based on Multidimensional Constraint RepresentationYuan, Qingjun / Gou, Gaopeng / Zhu, Yanbei / Zhu, Yuefei / Xiong, Gang / Wang, Yongjuan et al. | 2024
- 148
-
Robust Camera Model Identification Over Online Social Network Shared Images via Multi-Scenario LearningWu, Haiwei / Zhou, Jiantao / Zhang, Xinyu / Tian, Jinyu / Sun, Weiwei et al. | 2024
- 163
-
To Act or Not to Act: An Adversarial Game for Securing Vehicle PlatoonsSun, Guoxin / Alpcan, Tansu / Rubinstein, Benjamin I. P. / Camtepe, Seyit et al. | 2024
- 178
-
Two-User Gaussian Broadcast Wiretap Channel With Common Message and Feedback: RevisitYuan, Haoheng / Feng, Yanghe / Yang, Chuanchuan / Zhuang, Zhuojun / Dai, Bin et al. | 2024
- 194
-
Dr. Defender: Proactive Detection of Autopilot Drones Based on CSIDeng, Jiangyi / Ji, Xiaoyu / Wang, Beibei / Wang, Bin / Xu, Wenyuan et al. | 2024
- 207
-
An Efficient and Dynamic Privacy-Preserving Federated Learning System for Edge ComputingTang, Xinyu / Guo, Cheng / Choo, Kim-Kwang Raymond / Liu, Yining et al. | 2024
- 221
-
Encrypted and Compressed Key-Value Store With Pattern-Analysis Security in Cloud SystemsZhang, Chen / Ming, Yulong / Wang, Mingyue / Guo, Yu / Jia, Xiaohua et al. | 2024
- 235
-
CGFormer: ViT-Based Network for Identifying Computer-Generated Images With Token LabelingQuan, Weize / Deng, Pengfei / Wang, Kai / Yan, Dong-Ming et al. | 2024
- 251
-
A Lightweight Certificateless Multi-User Matchmaking Encryption for Mobile Devices: Enhancing Security and PerformanceYang, Ningbin / Tang, Chunming / He, Debiao et al. | 2024
- 265
-
Masked Face TransformerZhao, Weisong / Zhu, Xiangyu / Guo, Kaiwen / Shi, Haichao / Zhang, Xiao-Yu / Lei, Zhen et al. | 2024
- 280
-
Backdoor Attack on Deep Learning-Based Medical Image Encryption and Decryption NetworkDing, Yi / Wang, Zi / Qin, Zhen / Zhou, Erqiang / Zhu, Guobin / Qin, Zhiguang / Choo, Kim-Kwang Raymond et al. | 2024
- 293
-
AutoPwn: Artifact-Assisted Heap Exploit Generation for CTF PWN CompetitionsXu, Dandan / Chen, Kai / Lin, Miaoqian / Lin, Chaoyang / Wang, Xiaofeng et al. | 2024
- 307
-
Invisible Backdoor Attack With Dynamic Triggers Against Person Re-IdentificationSun, Wenli / Jiang, Xinyang / Dou, Shuguang / Li, Dongsheng / Miao, Duoqian / Deng, Cheng / Zhao, Cairong et al. | 2024
- 320
-
A Perspective of Using Frequency-Mixing as Entropy in Random Number Generation for Portable Hardware Cybersecurity IPWei, Xiangye / Xiu, Liming / Cai, Yimao et al. | 2024
- 334
-
Fuzzy Linguistic Knowledge Reasoning-Based Secure Control for Connected Nonlinear ServosystemLi, Meng / Pei, Zheng / Chen, Yong / Miao, Zhenhai et al. | 2024
- 344
-
Domain Generalization via Aggregation and Separation for Audio Deepfake DetectionXie, Yuankun / Cheng, Haonan / Wang, Yutian / Ye, Long et al. | 2024
- 359
-
Output Positioning to Derive Maximum Entropy From Physical Unclonable FunctionsAbdolinezhad, Saeed / Zimmermann, Lukas / Sikora, Axel et al. | 2024
- 372
-
Confidence-Calibrated Face and Kinship VerificationXu, Min / Zhang, Ximiao / Zhou, Xiuzhuang et al. | 2024
- 385
-
An Adaptive Method for Camera Attribution Under Complex Radial Distortion CorrectionsMontibeller, Andrea / Perez-Gonzalez, Fernando et al. | 2024
- 401
-
Constructing New Backbone Networks via Space-Frequency Interactive Convolution for Deepfake DetectionGuo, Zhiqing / Jia, Zhenhong / Wang, Liejun / Wang, Dewang / Yang, Gaobo / Kasabov, Nikola et al. | 2024
- 414
-
Heavy Hitter Identification Over Large-Domain Set-Valued Data With Local Differential PrivacyZhu, Youwen / Cao, Yiran / Xue, Qiao / Wu, Qihui / Zhang, Yushu et al. | 2024
- 427
-
Gradient-Leaks: Enabling Black-Box Membership Inference Attacks Against Machine Learning ModelsLiu, Gaoyang / Xu, Tianlong / Zhang, Rui / Wang, Zixiong / Wang, Chen / Liu, Ling et al. | 2024
- 441
-
Finger-Knuckle Assisted Slap Fingerprint Identification System for Higher Security and ConvenienceZhou, Zhenyu / Kumar, Ajay et al. | 2024
- 455
-
Toward a Critical Evaluation of Robustness for Deep Learning Backdoor CountermeasuresQiu, Huming / Ma, Hua / Zhang, Zhi / Abuadbba, Alsharif / Kang, Wei / Fu, Anmin / Gao, Yansong et al. | 2024
- 469
-
Hardening Password-Based Credential DatabasesSong, Yaqing / Xu, Chunxiang / Zhang, Yuan / Li, Shiyu et al. | 2024
- 485
-
BR-HIDF: An Anti-Sparsity and Effective Host Intrusion Detection Framework Based on Multi-Granularity Feature ExtractionHe, Junjiang / Tang, Cong / Li, Wenshan / Li, Tao / Chen, Li / Lan, Xiaolong et al. | 2024
- 500
-
Overcoming Data Limitations: A Few-Shot Specific Emitter Identification Method Using Self-Supervised Learning and Adversarial AugmentationLiu, Chao / Fu, Xue / Wang, Yu / Guo, Lantu / Liu, Yuchao / Lin, Yun / Zhao, Haitao / Gui, Guan et al. | 2024
- 514
-
On the Instability of Softmax Attention-Based Deep Learning Models in Side-Channel AnalysisHajra, Suvadeep / Alam, Manaar / Saha, Sayandeep / Picek, Stjepan / Mukhopadhyay, Debdeep et al. | 2024
- 529
-
Reversible Contrast Enhancement by Histogram Specification and Very Low Distortion Data HidingColtuc, Dinu / Coanda, Henri George et al. | 2024
- 540
-
GAZETA: GAme-Theoretic ZEro-Trust Authentication for Defense Against Lateral Movement in 5G IoT NetworksGe, Yunfei / Zhu, Quanyan et al. | 2024
- 555
-
Dynamic Analysis of Multiplex Networks With Hybrid Maintenance StrategiesPeng, Baihao / Liu, Junfeng / Zeng, Jun et al. | 2024
- 571
-
PRIMϵ: Novel Privacy-Preservation Model With Pattern Mining and Genetic AlgorithmMadhusudhanan, Sheema / Jose, Arun Cyril / Sahoo, Jayakrushna / Malekian, Reza et al. | 2024
- 586
-
Optimizing Linear Correctors: A Tight Output Min-Entropy Bound and Selection TechniqueGrujic, Milos / Verbauwhede, Ingrid et al. | 2024
- 601
-
IMap: Toward a Fast, Scalable and Reconfigurable In-Network Scanner With Programmable SwitchesZhang, Menghao / Li, Guanyu / Guo, Cheng / Bao, Han / Xu, Mingwei / Hu, Hongxin / Li, Fenghua et al. | 2024
- 616
-
Breaking the Anonymity of Ethereum Mixing Services Using Graph Feature LearningDu, Hanbiao / Che, Zheng / Shen, Meng / Zhu, Liehuang / Hu, Jiankun et al. | 2024
- 632
-
Linked Fault AnalysisBeigizad, Ali Asghar / Soleimany, Hadi / Zarei, Sara / Ramzanipour, Hamed et al. | 2024
- 646
-
Federated Supervised Principal Component AnalysisBriguglio, William / Yousef, Waleed A. / Traore, Issa / Mamun, Mohammad et al. | 2024
- 661
-
IdentifierIDS: A Practical Voltage-Based Intrusion Detection System for Real In-Vehicle NetworksDeng, Zhouyan / Liu, Jiajia / Xun, Yijie / Qin, Junman et al. | 2024
- 677
-
PRIDN: A Privacy Preserving Data Sharing on Named Data NetworkingXia, Qi / Obiri, Isaac Amankona / Gao, Jianbin / Xia, Hu / Zhang, Xiaosong / Asamoah, Kwame Omono / Amofa, Sandro et al. | 2024
- 693
-
Privacy-Enhancing and Robust Backdoor Defense for Federated Learning on Heterogeneous DataChen, Zekai / Yu, Shengxing / Fan, Mingyuan / Liu, Ximeng / Deng, Robert H. et al. | 2024
- 708
-
Verifying in the Dark: Verifiable Machine Unlearning by Using Invisible Backdoor TriggersGuo, Yu / Zhao, Yu / Hou, Saihui / Wang, Cong / Jia, Xiaohua et al. | 2024
- 722
-
A Credential Usage Study: Flow-Aware Leakage Detection in Open-Source ProjectsHan, Ruidong / Gong, Huihui / Ma, Siqi / Li, Juanru / Xu, Chang / Bertino, Elisa / Nepal, Surya / Ma, Zhuo / Ma, Jianfeng et al. | 2024
- 735
-
Universal Heterogeneous Face Analysis via Multi-Domain Feature DisentanglementLiu, Decheng / Gao, Xinbo / Peng, Chunlei / Wang, Nannan / Li, Jie et al. | 2024
- 748
-
Backdoor Attack Against Split Neural Network-Based Vertical Federated LearningHe, Ying / Shen, Zhili / Hua, Jingyu / Dong, Qixuan / Niu, Jiacheng / Tong, Wei / Huang, Xu / Li, Chen / Zhong, Sheng et al. | 2024
- 764
-
Toward Automated Field Semantics Inference for Binary Protocol Reverse EngineeringZhan, Mengqi / Li, Yang / Li, Bo / Zhang, Jinchao / Li, Chuanrong / Wang, Weiping et al. | 2024
- 777
-
FedComm: A Privacy-Enhanced and Efficient Authentication Protocol for Federated Learning in Vehicular Ad-Hoc NetworksYuan, Xiaohan / Liu, Jiqiang / Wang, Bin / Wang, Wei / Li, Tao / Ma, Xiaobo / Pedrycz, Witold et al. | 2024
- 793
-
Robust Domain Misinformation Detection via Multi-Modal Feature AlignmentLiu, Hui / Wang, Wenya / Sun, Hao / Rocha, Anderson / Li, Haoliang et al. | 2024
- 807
-
Efficient Coded Multi-Party Computation at Edge NetworksVedadi, Elahe / Keshtkarjahromi, Yasaman / Seferoglu, Hulya et al. | 2024
- 821
-
Dynamic Trust-Based Redactable Blockchain Supporting Update and TraceabilityZhang, Yuqing / Ma, Zhaofeng / Luo, Shoushan / Duan, Pengfei et al. | 2024
- 835
-
Optimal Selfish Mining-Based Denial-of-Service AttackWang, Qiuhua / Li, Chengyu / Xia, Tianyu / Ren, Yizhi / Wang, Dong / Zhang, Guoyan / Choo, Kim-Kwang Raymond et al. | 2024
- 851
-
Dual Sampling Based Causal Intervention for Face Anti-Spoofing With Identity DebiasingLong, Xingming / Zhang, Jie / Wu, Shuzhe / Jin, Xin / Shan, Shiguang et al. | 2024
- 863
-
Realistic Fingerprint Presentation Attacks Based on an Adversarial ApproachCasula, Roberto / Orru, Giulia / Marrone, Stefano / Gagliardini, Umberto / Marcialis, Gian Luca / Sansone, Carlo et al. | 2024
- 878
-
Privacy Preserving Palmprint Recognition via Federated Metric LearningShao, Huikai / Liu, Chengcheng / Li, Xiaojiang / Zhong, Dexing et al. | 2024
- 892
-
CSRA: Robust Incentive Mechanism Design for Differentially Private Federated LearningYang, Yunchao / Hu, Miao / Zhou, Yipeng / Liu, Xuezheng / Wu, Di et al. | 2024
- 907
-
Toward Adversarially Robust Recommendation From Adaptive Fraudster DetectionLai, Yuni / Zhu, Yulin / Fan, Wenqi / Zhang, Xiaoge / Zhou, Kai et al. | 2024
- 920
-
Adaptive Domain-Invariant Feature Extraction for Cross-Domain Linguistic SteganalysisXue, Yiming / Wu, Jiaxuan / Ji, Ronghua / Zhong, Ping / Wen, Juan / Peng, Wanli et al. | 2024
- 934
-
Large Pose Face Recognition via Facial Representation LearningXin, Jingwei / Wei, Zikai / Wang, Nannan / Li, Jie / Gao, Xinbo et al. | 2024
- 947
-
An Accurate and Efficient Algorithm to Identify Malicious Nodes of a GraphGaeta, Rossano et al. | 2024
- 959
-
Joint Discriminative Analysis With Low-Rank Projection for Finger Vein Feature ExtractionLi, Shuyi / Ma, Ruijun / Zhou, Jianhang / Zhang, Bob / Wu, Lifang et al. | 2024
- 970
-
Universal Detection of Backdoor Attacks via Density-Based Clustering and Centroids AnalysisGuo, Wei / Tondi, Benedetta / Barni, Mauro et al. | 2024
- 985
-
Physical-Layer Secret and Private Key Generation in Wireless Relay Networks With Correlated Eavesdropping ChannelsXu, Peng / Yang, Jun / Chen, Gaojie / Yang, Zheng / Li, Yong / Win, Moe Z. et al. | 2024
- 1001
-
Locally Verifiable Batch Authentication in IoMTMao, Wenze / Jiang, Peng / Zhu, Liehuang et al. | 2024
- 1015
-
LDS-FL: Loss Differential Strategy Based Federated Learning for Privacy PreservingWang, Taiyu / Yang, Qinglin / Zhu, Kaiming / Wang, Junbo / Su, Chunhua / Sato, Kento et al. | 2024
- 1031
-
A Comprehensive Data Retrieval and Correction Approach From 40-nm Flash Memory With Selective Chemical EngravingZeng, Xiao Mei / Liu, Qing / Gan, Chee Lip et al. | 2024
- 1041
-
Multi-Surface Multi-Technique (MUST) Latent Fingerprint DatabaseMalhotra, Aakarsh / Vatsa, Mayank / Singh, Richa / Morris, Keith B. / Noore, Afzel et al. | 2024
- 1056
-
Lightweight Radio Frequency Fingerprint Identification Scheme for V2X Based on Temporal CorrelationQi, Xinyu / Hu, Aiqun / Chen, Tianshu et al. | 2024
- 1071
-
Verifiable Arbitrary Queries With Zero Knowledge Confidentiality in Decentralized StorageWang, Haodi / Guo, Yu / Bie, Rongfang / Jia, Xiaohua et al. | 2024
- 1086
-
Secret Key Generation for IRS-Assisted Multi-Antenna Systems: A Machine Learning-Based ApproachChen, Chen / Zhang, Junqing / Lu, Tianyu / Sandell, Magnus / Chen, Liquan et al. | 2024
- 1099
-
Machine Unlearning via Representation Forgetting With Parameter Self-SharingWang, Weiqi / Zhang, Chenhan / Tian, Zhiyi / Yu, Shui et al. | 2024
- 1112
-
Robust and Generalized Physical Adversarial Attacks via Meta-GANFeng, Weiwei / Xu, Nanqing / Zhang, Tianzhu / Wu, Baoyuan / Zhang, Yongdong et al. | 2024
- 1126
-
Systematically Quantifying Cryptanalytic Nonlinearities in Strong PUFsChatterjee, Durba / Pratihar, Kuheli / Hazra, Aritra / Ruhrmair, Ulrich / Mukhopadhyay, Debdeep et al. | 2024
- 1142
-
ResNeXt+: Attention Mechanisms Based on ResNeXt for Malware Detection and ClassificationHe, Yuewang / Kang, Xiangui / Yan, Qiben / Li, Enping et al. | 2024
- 1156
-
TMG-GAN: Generative Adversarial Networks-Based Imbalanced Learning for Network Intrusion DetectionDing, Hongwei / Sun, Yu / Huang, Nana / Shen, Zhidong / Cui, Xiaohui et al. | 2024
- 1168
-
Beyond the Prior Forgery Knowledge: Mining Critical Clues for General Face Forgery DetectionLuo, Anwei / Kong, Chenqi / Huang, Jiwu / Hu, Yongjian / Kang, Xiangui / Kot, Alex C. et al. | 2024
- 1183
-
MalPatch: Evading DNN-Based Malware Detection With Adversarial PatchesZhan, Dazhi / Duan, Yexin / Hu, Yue / Li, Weili / Guo, Shize / Pan, Zhisong et al. | 2024
- 1199
-
Attention-Based API Locating for Malware TechniquesWong, Guo-Wei / Huang, Yi-Ting / Guo, Ying-Ren / Sun, Yeali / Chen, Meng Chang et al. | 2024
- 1213
-
Cross-User Leakage Mitigation for Authorized Multi-User Encrypted Data SharingWang, Mingyue / Chen, Zizhuo / Miao, Yinbin / Huang, Hejiao / Wang, Cong / Jia, Xiaohua et al. | 2024
- 1227
-
Pluggable Attack for Visual Object TrackingZhao, Shaochuan / Xu, Tianyang / Wu, Xiao-Jun / Kittler, Josef et al. | 2024
- 1241
-
AgrAmplifier: Defending Federated Learning Against Poisoning Attacks Through Local Update AmplificationGong, Zirui / Shen, Liyue / Zhang, Yanjun / Zhang, Leo Yu / Wang, Jingwei / Bai, Guangdong / Xiang, Yong et al. | 2024
- 1251
-
URadar: Discovering Unrestricted File Upload Vulnerabilities via Adaptive Dynamic TestingChen, Yuanchao / Li, Yuwei / Pan, Zulie / Lu, Yuliang / Chen, Juxing / Ji, Shouling et al. | 2024
- 1267
-
Imperceptible and Robust Backdoor Attack in 3D Point CloudGao, Kuofeng / Bai, Jiawang / Wu, Baoyuan / Ya, Mengxi / Xia, Shu-Tao et al. | 2024
- 1283
-
Distortion Model-Based Spectral Augmentation for Generalized Recaptured Document DetectionChen, Changsheng / Li, Bokang / Cai, Rizhao / Zeng, Jishen / Huang, Jiwu et al. | 2024
- 1299
-
SLIM: A Secure and Lightweight Multi-Authority Attribute-Based Signcryption Scheme for IoTGong, Bei / Guo, Chong / Guo, Chen / Sun, Yao / Waqas, Muhammad / Chen, Sheng et al. | 2024
- 1313
-
Video-Based Visible-Infrared Person Re-Identification With Auxiliary SamplesDu, Yunhao / Lei, Cheng / Zhao, Zhicheng / Dong, Yuan / Su, Fei et al. | 2024
- 1326
-
SecKNN: FSS-Based Secure Multi-Party KNN Classification Under General Distance FunctionsLi, Zhi / Wang, Hao / Zhang, Songnian / Zhang, Wenying / Lu, Rongxing et al. | 2024
- 1342
-
Similarity Distance Learning on SPD Manifold for Writer Independent Offline Signature VerificationZois, Elias N. / Tsourounis, Dimitrios / Kalivas, Dimitrios et al. | 2024
- 1357
-
WFDefProxy: Real World Implementation and Evaluation of Website Fingerprinting DefensesGong, Jiajun / Zhang, Wuqi / Zhang, Charles / Wang, Tao et al. | 2024
- 1372
-
SepBIN: Binary Feature Separation for Better Semantic Comparison and Authorship VerificationSong, Qige / Sang, Yafei / Zhang, Yongzheng / Li, Shuhao / Xu, Xiaolin et al. | 2024
- 1388
-
Server-Aided Public Key Authenticated Searchable Encryption With Constant Ciphertext and Constant TrapdoorCheng, Leixiao / Meng, Fei et al. | 2024
- 1401
-
Optimality of the Proper Gaussian Signal in Complex MIMO Wiretap ChannelsDong, Yong / Xu, Yinfei / Zhang, Tong / Xia, Yili et al. | 2024
- 1415
-
Information Embedding With Stegotext ReconstructionXu, Yinfei / Lu, Jian / Guang, Xuan / Xu, Wei et al. | 2024
- 1429
-
HODA: Hardness-Oriented Detection of Model Extraction AttacksSadeghzadeh, Amir Mahdi / Sobhanian, Amir Mohammad / Dehghan, Faezeh / Jalili, Rasool et al. | 2024
- 1440
-
STDA: Secure Time Series Data Analytics With Practical Efficiency in Wide-Area NetworkLi, Xiaoguo / Huang, Zixi / Zhao, Bowen / Yang, Guomin / Xiang, Tao / Deng, Robert H. et al. | 2024
- 1455
-
DOMR: Toward Deep Open-World Malware RecognitionLu, Tingting / Wang, Junfeng et al. | 2024
- 1469
-
Channel Correlation in Multi-User Covert Communication: Friend or Foe?Lee, Jinyoung / Yeom, Hyeonsik / Lee, Si-Hyeon / Ha, Jeongseok et al. | 2024
- 1483
-
HiPDS: A Storage Hardware-Independent Plausibly Deniable Storage SystemChen, Niusen / Chen, Bo et al. | 2024
- 1496
-
Efficient Image Classification via Structured Low-Rank Matrix Factorization RegressionZhang, Hengmin / Yang, Jian / Qian, Jianjun / Gao, Guangwei / Lan, Xiangyuan / Zha, Zhiyuan / Wen, Bihan et al. | 2024
- 1510
-
Diffusion Containment in Complex Networks Through Collective Influence of ConnectionsLiu, Yang / Liang, Guangbo / Wang, Xi / Zhu, Peican / Wang, Zhen et al. | 2024
- 1525
-
Event-Triggered Impulsive Control for Complex Networks Under Stochastic Deception AttacksYang, Ni / Gao, Ruiyi / Feng, Youzhi / Su, Huan et al. | 2024
- 1535
-
Surveillance Face Anti-SpoofingFang, Hao / Liu, Ajian / Wan, Jun / Escalera, Sergio / Zhao, Chenxu / Zhang, Xu / Li, Stan Z. / Lei, Zhen et al. | 2024
- 1547
-
Coreset Learning-Based Sparse Black-Box Adversarial Attack for Video RecognitionChen, Jiefu / Chen, Tong / Xu, Xing / Zhang, Jingran / Yang, Yang / Shen, Heng Tao et al. | 2024
- 1561
-
Low-Rank and Sparse Decomposition for Low-Query Decision-Based Adversarial AttacksEsmaeili, Ashkan / Edraki, Marzieh / Rahnavard, Nazanin / Mian, Ajmal / Shah, Mubarak et al. | 2024
- 1576
-
Robust and Secure Federated Learning Against Hybrid Attacks: A Generic ArchitectureHao, Xiaohan / Lin, Chao / Dong, Wenhan / Huang, Xinyi / Xiong, Hui et al. | 2024
- 1589
-
SanIdea: Exploiting Secure Blockchain-Based Access Control via Sanitizable EncryptionJiang, Peng / Liu, Qi / Zhu, Liehuang et al. | 2024
- 1601
-
SPGNN-API: A Transferable Graph Neural Network for Attack Paths Identification and Autonomous MitigationJmal, Houssem / Hmida, Firas Ben / Basta, Nardine / Ikram, Muhammad / Kaafar, Mohamed Ali / Walker, Andy et al. | 2024
- 1614
-
Privacy-Enhanced Graph Neural Network for Decentralized Local GraphsPei, Xinjun / Deng, Xiaoheng / Tian, Shengwei / Liu, Jianqing / Xue, Kaiping et al. | 2024
- 1630
-
Classification Utility, Fairness, and Compactness via Tunable Information Bottleneck and Rényi MeasuresGronowski, Adam / Paul, William / Alajaji, Fady / Gharesifard, Bahman / Burlina, Philippe et al. | 2024
- 1646
-
PaReNTT: Low-Latency Parallel Residue Number System and NTT-Based Long Polynomial Modular Multiplication for Homomorphic EncryptionTan, Weihang / Chiu, Sin-Wei / Wang, Antian / Lao, Yingjie / Parhi, Keshab K. et al. | 2024
- 1660
-
Sizzler: Sequential Fuzzing in Ladder Diagrams for Vulnerability Detection and Discovery in Programmable Logic ControllersFeng, Kai / Cook, Marco M. / Marnerides, Angelos K. et al. | 2024
- 1672
-
Deep Learning-Based Detection for Multiple Cache Side-Channel AttacksKim, Hodong / Hahn, Changhee / Kim, Hyunwoo J. / Shin, Youngjoo / Hur, Junbeom et al. | 2024
- 1687
-
Verifiable Blind Quantum Computation With Identity Authentication for Multi-Type ClientsQuan, Junyu / Li, Qin / Li, Lvzhou et al. | 2024
- 1699
-
AG-NAS: An Attention GRU-Based Neural Architecture Search for Finger-Vein RecognitionQin, Huafeng / Fan, Chao / Deng, Shaojiang / Li, Yantao / El-Yacoubi, Mounim A. / Zhou, Gang et al. | 2024
- 1714
-
A Class-Incremental Approach With Self-Training and Prototype Augmentation for Specific Emitter IdentificationLi, Dingzhao / Qi, Jie / Hong, Shaohua / Deng, Pengfei / Sun, Haixin et al. | 2024
- 1728
-
Preserving Privacy in GANs Against Membership Inference AttackShateri, Mohammadhadi / Messina, Francisco / Labeau, Fabrice / Piantanida, Pablo et al. | 2024
- 1744
-
The Economics of Privacy and Utility: Investment StrategiesSharma, Chandra / Amariucai, George / Wei, Shuangqing et al. | 2024
- 1756
-
Accountable Fine-Grained Blockchain Rewriting in the Permissionless SettingTian, Yangguang / Liu, Bowen / Li, Yingjiu / Szalachowski, Pawel / Zhou, Jianying et al. | 2024
- 1767
-
Dual Consistency-Constrained Learning for Unsupervised Visible-Infrared Person Re-IdentificationYang, Bin / Chen, Jun / Chen, Cuiqun / Ye, Mang et al. | 2024
- 1780
-
Adaptive Differentially Quantized Subspace Perturbation (ADQSP): A Unified Framework for Privacy-Preserving Distributed Average ConsensusLi, Qiongxiu / Gundersen, Jaron Skovsted / Lopuhaa-Zwakenberg, Milan / Heusdens, Richard et al. | 2024
- 1794
-
AGILE: Automated Assertion Generation to Detect Information Leakage VulnerabilitiesDipu, Nusrat Farzana / Ayalasomayajula, Avinash / Tehranipoor, Mark M. / Farahmandi, Farimah et al. | 2024
- 1810
-
Toward Universal Detection of Adversarial Examples via Pseudorandom ClassifiersZhu, Boyu / Dong, Changyu / Zhang, Yuan / Mao, Yunlong / Zhong, Sheng et al. | 2024
- 1826
-
A Multi-Modal Vertical Federated Learning Framework Based on Homomorphic EncryptionGong, Maoguo / Zhang, Yuanqiao / Gao, Yuan / Qin, A. K. / Wu, Yue / Wang, Shanfeng / Zhang, Yihong et al. | 2024
- 1840
-
Exploring Uncharted Waters of Website FingerprintingKarunanayake, Ishan / Jiang, Jiaojiao / Ahmed, Nadeem / Jha, Sanjay K. et al. | 2024
- 1855
-
LED-RFF: LTE DMRS-Based Channel Robust Radio Frequency Fingerprint Identification SchemeYang, Xuan / Li, Dongming et al. | 2024
- 1870
-
Adversarial Learning From Imbalanced Data: A Robust Industrial Fault Classification MethodYin, Zhenqin / Zhang, Xinmin / Song, Zhihuan / Ge, Zhiqiang et al. | 2024
- 1883
-
Detection and Mitigation of Position Spoofing Attacks on Cooperative UAV Swarm FormationsBi, Siguo / Li, Kai / Hu, Shuyan / Ni, Wei / Wang, Cong / Wang, Xin et al. | 2024
- 2186
-
Dual-Adversarial Representation Disentanglement for Visible Infrared Person Re-IdentificationWei, Ziyu / Yang, Xi / Wang, Nannan / Gao, Xinbo et al. | 2024
- 2201
-
P²FRPSI: Privacy-Preserving Feature Retrieved Private Set IntersectionLing, Guowei / Tang, Fei / Cai, Chaochao / Shan, Jinyong / Xue, Haiyang / Li, Wulu / Tang, Peng / Huang, Xinyi / Qiu, Weidong et al. | 2024
- 2217
-
Decentralized Threshold Signatures With Dynamically Private AccountabilityLi, Meng / Ding, Hanni / Wang, Qing / Zhang, Mingwei / Meng, Weizhi / Zhu, Liehuang / Zhang, Zijian / Lin, Xiaodong et al. | 2024
- 2231
-
OLBS: Oblivious Location-Based ServicesHan, Jinguang / Susilo, Willy / Li, Nan / Huang, Xinyi et al. | 2024
- 2244
-
Graph-Based Covert Transaction Detection and Protection in BlockchainGuo, Zhenyu / Li, Xin / Liu, Jiamou / Zhang, Zijian / Li, Meng / Hu, Jingjing / Zhu, Liehuang et al. | 2024
- 2258
-
An Efficient and Scalable FHE-Based PDQ Scheme: Utilizing FFT to Design a Low Multiplication Depth Large-Integer Comparison AlgorithmZhang, Fahong / Yang, Chen / Zong, Rui / Zheng, Xinran / Wang, Jianfei / Meng, Yishuo et al. | 2024
- 2273
-
AFPM: A Low-Cost and Universal Adversarial Defense for Speaker Recognition SystemsSun, Zongkun / Ren, Yanzhen / Huang, Yihuan / Liu, Wuyang / Zhu, Hongcheng et al. | 2024
- 2288
-
SDSS: Sequential Data Sharing System in IoTLai, Jianchang / Susilo, Willy / Deng, Robert H. / Guo, Fuchun et al. | 2024
- 2300
-
Secure Communication Optimization in NOMA Systems With UAV-Mounted STAR-RISGuo, Liang / Jia, Jie / Chen, Jian / Wang, Xingwei et al. | 2024
- 2315
-
Adaptive Control of Strict-Feedback Nonlinear Systems Under Denial-of-Service: A Synthetic AnalysisGao, Rui / Huang, Jiangshuai / Su, Xiaojie / Zhao, Ling et al. | 2024
- 2328
-
Efficient Sparse Least Absolute Deviation Regression With Differential PrivacyLiu, Weidong / Mao, Xiaojun / Zhang, Xiaofei / Zhang, Xin et al. | 2024
- 2340
-
Deep Learning Gradient Visualization-Based Pre-Silicon Side-Channel Leakage LocationLi, Yanbin / Zhu, Jiajie / Liu, Zhe / Tang, Ming / Ren, Shougang et al. | 2024
- 2356
-
On Model Outsourcing Adaptive Attacks to Deep Learning Backdoor DefensesPeng, Huaibing / Qiu, Huming / Ma, Hua / Wang, Shuo / Fu, Anmin / Al-Sarawi, Said F. / Abbott, Derek / Gao, Yansong et al. | 2024
- 2370
-
Dynamic Searchable Symmetric Encryption With Strong Security and RobustnessDou, Haochen / Dan, Zhenwu / Xu, Peng / Wang, Wei / Xu, Shuning / Chen, Tianyang / Jin, Hai et al. | 2024
- 2385
-
Congruent Differential Cluster for Binary SPN CiphersCui, Ting / Mao, Yiming / Yang, Yang / Zhang, Yi / Zhang, Jiyan / Jin, Chenhui et al. | 2024
- 2398
-
FastTextDodger: Decision-Based Adversarial Attack Against Black-Box NLP Models With Extremely High EfficiencyHu, Xiaoxue / Liu, Geling / Zheng, Baolin / Zhao, Lingchen / Wang, Qian / Zhang, Yufei / Du, Minxin et al. | 2024
- 2412
-
Manipulating Pre-Trained Encoder for Targeted Poisoning Attacks in Contrastive LearningChen, Jian / Gao, Yuan / Liu, Gaoyang / Abdelmoniem, Ahmed M. / Wang, Chen et al. | 2024
- 2425
-
PRBFPT: A Practical Redactable Blockchain Framework With a Public TrapdoorDai, Weiqi / Liu, Jinkai / Zhou, Yang / Choo, Kim-Kwang Raymond / Xie, Xia / Zou, Deqing / Jin, Hai et al. | 2024
- 2438
-
Anonymity-Enhancing Multi-Hop Locks for Monero-Enabled Payment Channel NetworksWang, Xiaohu / Lin, Chao / Huang, Xinyi / He, Debiao et al. | 2024
- 2454
-
Secure and Efficient Similarity Retrieval in Cloud Computing Based on Homomorphic EncryptionWang, Na / Zhou, Wen / Wang, Jingjing / Guo, Yifan / Fu, Junsong / Liu, Jianwei et al. | 2024
- 2470
-
BGKey: Group Key Generation for Backscatter Communications Among Multiple DevicesLi, Jiajun / Wang, Pu / Yan, Zheng / Yang, Yishan / Zeng, Kai et al. | 2024
- 2487
-
Static Multi Feature-Based Malware Detection Using Multi SPP-net in Smart IoT EnvironmentsJeon, Jueun / Jeong, Byeonghui / Baek, Seungyeon / Jeong, Young-Sik et al. | 2024
- 2501
-
Distributed Differential Privacy via Shuffling Versus Aggregation: A Curious StudyWei, Yu / Jia, Jingyu / Wu, Yuduo / Hu, Changhui / Dong, Changyu / Liu, Zheli / Chen, Xiaofeng / Peng, Yun / Wang, Shaowei et al. | 2024
- 2517
-
EVM-Shield: In-Contract State Access Control for Fast Vulnerability Detection and PreventionZhang, Xiaoli / Sun, Wenxiang / Xu, Zhicheng / Cheng, Hongbing / Cai, Chengjun / Cui, Helei / Li, Qi et al. | 2024
- 2533
-
Division of Regulatory Power: Collaborative Regulation for Privacy-Preserving BlockchainsZhaolu, Tianyu / Wan, Zhiguo / Wang, Huaqun et al. | 2024
- 2549
-
Generic Construction of Threshold Credential Management With User-Autonomy AggregationJia, Meng / Chen, Jing / He, Kun / Shi, Min / Wang, Yuanzheng / Du, Ruiying et al. | 2024
- 2565
-
FASTEN: Fast Ensemble Learning for Improved Adversarial RobustnessHuang, Lifeng / Huang, Qiong / Qiu, Peichao / Wei, Shuxin / Gao, Chengying et al. | 2024
- 2581
-
One-Class Neural Network With Directed Statistics Pooling for Spoofing Speech DetectionLin, Guoyuan / Luo, Weiqi / Luo, Da / Huang, Jiwu et al. | 2024
- 2594
-
NEMO: Practical Distributed Boolean Queries With Minimal LeakageLi, Jianhao / Wang, Jiabei / Zhang, Rui / Xin, Yansen / Xu, Wenhan et al. | 2024
- 2609
-
Outlier-Resistant Non-Fragile Control of Nonlinear Networked Systems Under DoS Attacks and Multi-Variable Event-Triggered SC ProtocolLiu, Jian / Ke, Jiachen / Liu, Jinliang / Xie, Xiangpeng / Tian, Engang et al. | 2024
- 2623
-
AdvSQLi: Generating Adversarial SQL Injections Against Real-World WAF-as-a-ServiceQu, Zhenqing / Ling, Xiang / Wang, Ting / Chen, Xiang / Ji, Shouling / Wu, Chunming et al. | 2024
- 2639
-
Multisource Heterogeneous Specific Emitter Identification Using Attention Mechanism-Based RFF Fusion MethodZhang, Yibin / Zhang, Qianyun / Zhao, Haitao / Lin, Yun / Gui, Guan / Sari, Hikmet et al. | 2024
- 2651
-
Covertly Controlling a Linear SystemAmihood, Barak / Cohen, Asaf et al. | 2024
- 2664
-
Secrecy Rate Analysis and Active Pilot Attack Detection for IRS-Aided Massive MIMO SystemsDassanayake, Janith Kavindu / Gunasinghe, Dulaj / Aruma Baduge, Gayan Amarasuriya et al. | 2024
- 2680
-
Quantum-Safe HIBE: Does It Cost a Latte?Zhao, Raymond K. / McCarthy, Sarah / Steinfeld, Ron / Sakzad, Amin / O'Neill, Maire et al. | 2024
- 2696
-
DMA: Dual Modality-Aware Alignment for Visible-Infrared Person Re-IdentificationCui, Zhenyu / Zhou, Jiahuan / Peng, Yuxin et al. | 2024
- 2709
-
Robust and Sparse Least Square Regression for Finger Vein and Finger Knuckle Print RecognitionLi, Shuyi / Zhang, Bob / Wu, Lifang / Ma, Ruijun / Ning, Xin et al. | 2024
- 2720
-
A Preference-Driven Malicious Platform Detection Mechanism for Users in Mobile CrowdsensingWang, Haotian / Tao, Jun / Chi, Dingwen / Gao, Yu / Wang, Zuyan / Zou, Dikai / Xu, Yifan et al. | 2024
- 2732
-
Lavida: Large-Universe, Verifiable, and Dynamic Fine-Grained Access Control for E-Health CloudZhao, Jun / Zhang, Kai / Gong, Junqing / Qian, Haifeng et al. | 2024
- 2746
-
Beyond Result Verification: Efficient Privacy-Preserving Spatial Keyword Query With Suppressed LeakageTong, Qiuyun / Li, Xinghua / Miao, Yinbin / Wang, Yunwei / Liu, Ximeng / Deng, Robert H. et al. | 2024
- 2761
-
Quantum-Safe Puncturable Signatures With Their Application in BlockchainJiang, Mei / Li, Yannan / Susilo, Willy / Duong, Dung et al. | 2024
- 2771
-
Improving Bounded Model Checkers Scalability for Circuit De-Obfuscation: An ExplorationAzar, Kimia Zamiri / Kamali, Hadi Mardani / Farahmandi, Farimah / Tehranipoor, Mark et al. | 2024
- 2786
-
Secure Adaptive Group TestingCohen, Alejandro / Cohen, Asaf / Gurewitz, Omer et al. | 2024
- 2800
-
Robust Visible-Infrared Person Re-Identification Based on Polymorphic Mask and Wavelet Graph Convolutional NetworkSun, Rui / Chen, Long / Zhang, Lei / Xie, Ruirui / Gao, Jun et al. | 2024
- 2814
-
Detection of Adversarial Attacks via Disentangling Natural Images and PerturbationsQing, Yuanyuan / Bai, Tao / Liu, Zhuotao / Moulin, Pierre / Wen, Bihan et al. | 2024
- 2826
-
Joint Cost Learning and Payload Allocation With Image-Wise Attention for Batch SteganographyTang, Weixuan / Zhou, Zhili / Li, Bin / Choo, Kim-Kwang Raymond / Huang, Jiwu et al. | 2024
- 2840
-
SecureReID: Privacy-Preserving Anonymization for Person Re-IdentificationYe, Mang / Shen, Wei / Zhang, Junwu / Yang, Yao / Du, Bo et al. | 2024
- 2854
-
m-Eligibility With Minimum Counterfeits and Deletions for Privacy Protection in Continuous Data PublishingNicolau, Adrian Tobar / Parra-Arnau, Javier / Forne, Jordi / Pallares, Esteve et al. | 2024
- 2865
-
Secure Channel Establishment Scheme for Task Delivery in Vehicular Cloud ComputingZhang, Rui / Zhang, Lei / Wu, Qian / Zhou, Jianying et al. | 2024
- 2881
-
Similarity-Based Label Inference Attack Against Training and Inference of Split LearningLiu, Junlin / Lyu, Xinchen / Cui, Qimei / Tao, Xiaofeng et al. | 2024
- 2896
-
AG-ReID.v2: Bridging Aerial and Ground Views for Person Re-IdentificationNguyen, Huy / Nguyen, Kien / Sridharan, Sridha / Fookes, Clinton et al. | 2024
- 2909
-
DRAM-Based PUF Utilizing the Variation of Adjacent CellsAbulibdeh, Enas / Younes, Leen / Mohammad, Baker / Humood, Khaled / Saleh, Hani / Al-Qutayri, Mahmoud et al. | 2024
- 2919
-
Public Trace-and-Revoke Proxy Re-Encryption for Secure Data Sharing in CloudsLuo, Fucai / Wang, Haiyan / Susilo, Willy / Yan, Xingfu / Zheng, Xiaofan et al. | 2024
- 2935
-
Toward Secure and Verifiable Hybrid Federated LearningDu, Runmeng / Li, Xuru / He, Daojing / Choo, Kim-Kwang Raymond et al. | 2024
- 2951
-
RoseAgg: Robust Defense Against Targeted Collusion Attacks in Federated LearningYang, He / Xi, Wei / Shen, Yuhao / Wu, Canhui / Zhao, Jizhong et al. | 2024
- 2967
-
Bidirectional Stackable Recurrent Generative Adversarial Imputation Network for Specific Emitter Missing Data ImputationLi, Haozhe / Liao, Yilin / Tian, Zijian / Liu, Zhaoran / Liu, Jiaqi / Liu, Xinggao et al. | 2024
- 2981
-
Privacy-Preserving Password Cracking: How a Third Party Can Crack Our Password Hash Without Learning the Hash Value or the CleartextTihanyi, Norbert / Bisztray, Tamas / Borsos, Bertalan / Raveau, Sebastien et al. | 2024
- 2997
-
DCS-Gait: A Class-Level Domain Adaptation Approach for Cross-Scene and Cross-State Gait Recognition Using Wi-Fi CSILiang, Ying / Wu, Wenjie / Li, Haobo / Chang, Xiaojun / Chen, Xiaojiang / Peng, Jinye / Xu, Pengfei et al. | 2024
- 3008
-
MC-Net: Realistic Sample Generation for Black-Box AttacksDuan, Mingxing / Jiao, Kailun / Yu, Siyang / Yang, Zhibang / Xiao, Bin / Li, Kenli et al. | 2024
- 3023
-
UCG: A Universal Cross-Domain Generator for Transferable Adversarial ExamplesLi, Zhankai / Wang, Weiping / Li, Jie / Chen, Kai / Zhang, Shigeng et al. | 2024
- 3038
-
Fishing for Fraudsters: Uncovering Ethereum Phishing Gangs With Blockchain DataLiu, Jieli / Chen, Jinze / Wu, Jiajing / Wu, Zhiying / Fang, Junyuan / Zheng, Zibin et al. | 2024
- 3051
-
Face De-Morphing Based on Diffusion AutoencodersLong, Min / Yao, Quantao / Zhang, Le-Bing / Peng, Fei et al. | 2024
- 3064
-
RIS-Assisted UAV Secure Communications With Artificial Noise-Aware Trajectory Design Against Multiple Colluding Curious UsersWen, Yun / Chen, Gaojie / Fang, Sisai / Wen, Miaowen / Tomasin, Stefano / Renzo, Marco Di et al. | 2024
- 3077
-
Scanner-Hunter: An Effective ICS Scanning Group Identification SystemSheng, Chuan / Yao, Yu / Zhao, Lianxiang / Zeng, Peng / Zhao, Jianming et al. | 2024
- 3093
-
Cross-Scenario Unknown-Aware Face Anti-Spoofing With Evidential Semantic Consistency LearningJiang, Fangling / Liu, Yunfan / Si, Haolin / Meng, Jingjing / Li, Qi et al. | 2024
- 3109
-
Unlabeled Data Assistant: Improving Mask Robustness for Face RecognitionHuang, Baojin / Wang, Zhongyuan / Yang, Jifan / Han, Zhen / Liang, Chao et al. | 2024
- 3124
-
Authentication of Copy Detection Patterns: A Pattern Reliability Based ApproachTutt, Joakim / Taran, Olga / Chaban, Roman / Pulfer, Brian / Belousov, Yury / Holotyak, Taras / Voloshynovskiy, Slava et al. | 2024
- 3135
-
Identifying Cross-User Privacy Leakage in Mobile Mini-Apps at a Large ScaleLi, Shuai / Yang, Zhemin / Yang, Yunteng / Liu, Dingyi / Yang, Min et al. | 2024
- 3148
-
Provably Secure Public-Key Steganography Based on Elliptic Curve CryptographyZhang, Xin / Chen, Kejiang / Ding, Jinyang / Yang, Yuqi / Zhang, Weiming / Yu, Nenghai et al. | 2024
- 3164
-
Perception-Driven Imperceptible Adversarial Attack Against Decision-Based Black-Box ModelsZhang, Shenyi / Zheng, Baolin / Jiang, Peipei / Zhao, Lingchen / Shen, Chao / Wang, Qian et al. | 2024
- 3178
-
CHERUBIM: A Secure and Highly Parallel Cross-Shard Consensus Using Quadruple Pipelined Two-Phase Commit for Sharding BlockchainsLiu, Andi / Liu, Yizhong / Wu, Qianhong / Zhao, Boyu / Li, Dongyu / Lu, Yuan / Lu, Rongxing / Susilo, Willy et al. | 2024
- 3194
-
Improving RF-DNA Fingerprinting Performance in an Indoor Multipath Environment Using Semi-Supervised LearningFadul, Mohamed K. M. / Reising, Donald R. / Weerasena, Lakmali P. / Loveless, T. Daniel / Sartipi, Mina / Tyler, Joshua H. et al. | 2024
- 3210
-
Adversarial Attacks on Scene Graph GenerationZhao, Mengnan / Zhang, Lihe / Wang, Wei / Kong, Yuqiu / Yin, Baocai et al. | 2024
- 3226
-
Secure Dual Asynchronous Tracking Control for Markov Jump Systems Under Hybrid CyberattacksWen, Daolin / Mu, Xiaowu et al. | 2024
- 3237
-
Toward Secure and Robust Steganography for Black-Box Generated ImagesZeng, Kai / Chen, Kejiang / Zhang, Jiansong / Zhang, Weiming / Yu, Nenghai et al. | 2024
- 3251
-
Self-Attentive Contrastive Learning for Conditioned Periocular and Face BiometricsNg, Tiong-Sik / Chai, Jacky Chen Long / Low, Cheng-Yaw / Beng Jin Teoh, Andrew et al. | 2024
- 3265
-
Quantization Aware Attack: Enhancing Transferable Adversarial Attacks by Model QuantizationYang, Yulong / Lin, Chenhao / Li, Qian / Zhao, Zhengyu / Fan, Haoran / Zhou, Dawei / Wang, Nannan / Liu, Tongliang / Shen, Chao et al. | 2024
- 3279
-
Multiple Access Wiretap Channel With Partial Rate-Limited FeedbackXu, Peng / Chen, Gaojie / Yang, Zheng / Li, Yong / Tomasin, Stefano et al. | 2024
- 3295
-
Defending Against Label-Only Attacks via Meta-Reinforcement LearningYe, Dayong / Zhu, Tianqing / Gao, Kun / Zhou, Wanlei et al. | 2024
- 3309
-
Proof of Unlearning: Definitions and InstantiationWeng, Jiasi / Yao, Shenglong / Du, Yuefeng / Huang, Junjie / Weng, Jian / Wang, Cong et al. | 2024
- 3324
-
Polar Coding for Wiretap Channels With Random States Non-Causally Available at the EncoderChen, Xingyu / Wu, Huici / Tao, Xiaofeng / Wang, Haowei et al. | 2024
- 3339
-
Approaching the Information-Theoretic Limit of Privacy Disclosure With Utility GuaranteesYang, Qing / Wang, Cheng / Yuan, Haifeng / Cui, Jipeng / Teng, Hu / Chen, Xue / Jiang, Changjun et al. | 2024
- 3353
-
Zero-Value Filtering for Accelerating Non-Profiled Side-Channel Attack on Incomplete NTT-Based Implementations of Lattice-Based CryptographyTosun, Tolun / Savas, Erkay et al. | 2024
- 3366
-
Watch Your Speed: Injecting Malicious Voice Commands via Time-Scale ModificationJi, Xiaoyu / Jiang, Qinhong / Li, Chaohao / Shi, Zhuoyang / Xu, Wenyuan et al. | 2024
- 3380
-
Exploring Unobservable Blockchain-Based Covert Channel for Censorship-Resistant SystemsChen, Zhuo / Zhu, Liehuang / Jiang, Peng / Zhang, Can / Gao, Feng / Guo, Fuchun et al. | 2024
- 3395
-
A Machine Learning-Based Digital Twin for Anti-Counterfeiting Applications With Copy Detection PatternsBelousov, Yury / Quetant, Guillaume / Pulfer, Brian / Chaban, Roman / Tutt, Joakim / Taran, Olga / Holotyak, Taras / Voloshynovskiy, Slava et al. | 2024
- 3409
-
MMNet: Multi-Collaboration and Multi-Supervision Network for Sequential Deepfake DetectionXia, Ruiyang / Liu, Decheng / Li, Jie / Yuan, Lin / Wang, Nannan / Gao, Xinbo et al. | 2024
- 3423
-
DoS-Resilient Load Frequency Control of Multi-Area Power Systems: An Attack-Parameter-Dependent ApproachHu, Songlin / Ge, Xiaohua / Zhang, Wei / Yue, Dong et al. | 2024
- 3435
-
HashVFL: Defending Against Data Reconstruction Attacks in Vertical Federated LearningQiu, Pengyu / Zhang, Xuhong / Ji, Shouling / Fu, Chong / Yang, Xing / Wang, Ting et al. | 2024
- 3451
-
An Effectively Applicable to Resource Constrained Devices and Semi-Trusted Servers Authenticated Key Agreement SchemeXie, Dong / Yang, Jinghua / Wu, Bin / Bian, Weixin / Chen, Fulong / Wang, Taochun et al. | 2024
- 3465
-
Data-Agnostic Model Poisoning Against Federated Learning: A Graph Autoencoder ApproachLi, Kai / Zheng, Jingjing / Yuan, Xin / Ni, Wei / Akan, Ozgur B. / Poor, H. Vincent et al. | 2024
- 3481
-
On the Security of “LSFL: A Lightweight and Secure Federated Learning Scheme for Edge Computing”Wu, Jiahui / Zhang, Weizhe / Luo, Fucai et al. | 2024
- 3483
-
Distributed Secure Filtering Against Eavesdropping Attacks in SINR-Based Sensor NetworksFu, Xingquan / Wen, Guanghui / Niu, Mengfei / Zheng, Wei Xing et al. | 2024
- 3495
-
An Identity-Preserved Framework for Human Motion TransferMa, Jingzhe / Zhang, Xiaoqing / Yu, Shiqi et al. | 2024
- 3510
-
Dual-Mode Learning for Multi-Dataset X-Ray Security Image DetectionYang, Fenghong / Jiang, Runqing / Yan, Yan / Xue, Jing-Hao / Wang, Biao / Wang, Hanzi et al. | 2024
- 3525
-
MC-DSC: A Dynamic Secure Resource Configuration Scheme Based on Medical Consortium BlockchainLiang, Wei / Xie, Siqi / Li, Kuan-Ching / Li, Xiong / Kui, Xiaoyan / Zomaya, Albert Y. et al. | 2024
- 3539
-
BaseSAP: Modular Stealth Address Protocol for Programmable BlockchainsWahrstatter, Anton / Solomon, Matthew / DiFrancesco, Ben / Buterin, Vitalik / Svetinovic, Davor et al. | 2024
- 3554
-
Malicious Internet Entity Detection Using Local Graph InferenceMandlik, Simon / Pevny, Tomas / Smidl, Vaclav / Bajer, Lukas et al. | 2024
- 3567
-
Toward Secrecy-Aware Attacks Against Trust Prediction in Signed Social NetworksZhu, Yulin / Michalak, Tomasz / Luo, Xiapu / Zhang, Xiaoge / Zhou, Kai et al. | 2024
- 3581
-
cuXCMP: CUDA-Accelerated Private Comparison Based on Homomorphic EncryptionYang, Hao / Shen, Shiyu / Liu, Zhe / Zhao, Yunlei et al. | 2024
- 3593
-
Cross-Modal Learning Based Flexible Bimodal Biometric Authentication With Template ProtectionJiang, Qi / Zhao, Guichuan / Ma, Xindi / Li, Meng / Tian, Youliang / Li, Xinghua et al. | 2024
- 3608
-
Hiding Information for Secure and Covert Data Storage in Commercial ReRAM ChipsFerdaus, Farah / Talukder, B. M. S. Bahar / Rahman, Md. Tauhidur et al. | 2024
- 3620
-
Anchor Link Prediction for Cross-Network Digital Forensics From Local and Global PerspectivesWang, Huanran / Yang, Wu / Man, Dapeng / Lv, Jiguang / Han, Shuai / Tan, Jingwen / Liu, Tao et al. | 2024
- 3636
-
Analysis of a Programmable Quantum Annealer as a Random Number GeneratorPelofske, Elijah et al. | 2024
- 3644
-
PPGloVe: Privacy-Preserving GloVe for Training Word Vectors in the DarkHua, Zhongyun / Tong, Yan / Zheng, Yifeng / Li, Yuhong / Zhang, Yushu et al. | 2024
- 3659
-
Defense Against Adversarial Attacks Using Topology Aligning Adversarial TrainingKuang, Huafeng / Liu, Hong / Lin, Xianming / Ji, Rongrong et al. | 2024
- 3674
-
Vulnerabilities of Data Protection in Vertical Federated Learning Training and CountermeasuresZhu, Derui / Chen, Jinfu / Zhou, Xuebing / Shang, Weiyi / Hassan, Ahmed E. / Grossklags, Jens et al. | 2024
- 3690
-
Learn to Defend: Adversarial Multi-Distillation for Automatic Modulation Recognition ModelsChen, Zhuangzhi / Wang, Zhangwei / Xu, Dongwei / Zhu, Jiawei / Shen, Weiguo / Zheng, Shilian / Xuan, Qi / Yang, Xiaoniu et al. | 2024
- 3703
-
A Latent Fingerprint in the Wild DatabaseLiu, Xinwei / Raja, Kiran / Wang, Renfang / Qiu, Hong / Wu, Hucheng / Sun, Dechao / Zheng, Qiguang / Liu, Nian / Wang, Xiaoxia / Huang, Gehang et al. | 2024
- 3719
-
Lossless Data Hiding in NTRU Cryptosystem by Polynomial Encoding and ModulationWu, Hao-Tian / Cheung, Yiu-Ming / Tian, Zhihong / Liu, Dingcai / Luo, Xiangyang / Hu, Jiankun et al. | 2024
- 3733
-
Fuzzing Android Native System Libraries via Dynamic Data Dependency GraphZhu, Xiaogang / Zhang, Siyu / Li, Chaoran / Wen, Sheng / Xiang, Yang et al. | 2024
- 3745
-
Cancellable Deep Learning Framework for EEG BiometricsWang, Min / Yin, Xuefei / Hu, Jiankun et al. | 2024
- 3758
-
RECAST: Mitigating Conflict-Based Cache Attacks Through Fine-Grained Dynamic MappingZhang, Xingjian / Gong, Haochen / Chang, Rui / Zhou, Yajin et al. | 2024
- 3772
-
RVE-PFL: Robust Variational Encoder-Based Personalized Federated Learning Against Model Inversion AttacksIssa, Wael / Moustafa, Nour / Turnbull, Benjamin / Choo, Kim-Kwang Raymond et al. | 2024
- 3788
-
Learning to Generalize Unseen Dataset for Cross-Dataset Palmprint RecognitionShao, Huikai / Zou, Yuchen / Liu, Chengcheng / Guo, Qiang / Zhong, Dexing et al. | 2024
- 3800
-
Yet Another Improvement of Plantard Arithmetic for Faster Kyber on Low-End 32-bit IoT DevicesHuang, Junhao / Zhao, Haosong / Zhang, Jipeng / Dai, Wangchen / Zhou, Lu / Cheung, Ray C. C. / Koc, Cetin Kaya / Chen, Donglong et al. | 2024
- 3814
-
Learning to Discover Forgery Cues for Face Forgery DetectionTian, Jiahe / Chen, Peng / Yu, Cai / Fu, Xiaomeng / Wang, Xi / Dai, Jiao / Han, Jizhong et al. | 2024
- 3829
-
MetaCluster: A Universal Interpretable Classification Framework for CybersecurityGe, Wenhan / Cui, Zeyuan / Wang, Junfeng / Tang, Binhui / Li, Xiaohui et al. | 2024
- 3844
-
Two-Factor Authenticated Key Exchange From Biometrics With Low Entropy RatesJiang, Changsong / Xu, Chunxiang / Han, Yunxia / Zhang, Zhao / Chen, Kefei et al. | 2024
- 3857
-
Stability Analysis of Networked Control Systems Under DoS Attacks and Security Controller Design With Mini-Batch Machine Learning SupervisionCai, Xiao / Shi, Kaibo / Sun, Yanbin / Cao, Jinde / Wen, Shiping / Qiao, Cheng / Tian, Zhihong et al. | 2024
- 3866
-
Toward Dual-View X-Ray Baggage Inspection: A Large-Scale Benchmark and Adaptive Hierarchical Cross Refinement for Prohibited Item DiscoveryMa, Bowen / Jia, Tong / Li, Mingyuan / Wu, Songsheng / Wang, Hao / Chen, Dongyue et al. | 2024
- 3879
-
DIBAD: A Disentangled Information Bottleneck Adversarial Defense Method Using Hilbert-Schmidt Independence Criterion for Spectrum SecurityZhang, Sicheng / Yang, Yandie / Zhou, Ziyao / Sun, Zhi / Lin, Yun et al. | 2024
- 3892
-
Blockchain-Based Secure Cross-Domain Data Sharing for Edge-Assisted Industrial Internet of ThingsWang, Fengqun / Cui, Jie / Zhang, Qingyang / He, Debiao / Zhong, Hong et al. | 2024
- 3906
-
SAE+: One-Round Provably Secure Asymmetric SAE Protocol for Client-Server ModelQi, Mingping / Hu, Wei / Tai, Yu et al. | 2024
- 3914
-
Exploring the Abyss? Unveiling Systems-on-Chip Hardware Vulnerabilities Beneath SoftwareRajendran, Sree Ranjani / Dipu, Nusrat Farzana / Tarek, Shams / Kamali, Hadi Mardani / Farahmandi, Farimah / Tehranipoor, Mark et al. | 2024
- 3927
-
Fully Symmetrical Obfuscated Interconnection and Weak-PUF-Assisted Challenge Obfuscation Strong PUFs Against Machine-Learning Modeling AttacksXu, Chongyao / Zhang, Litao / Mak, Pui-In / Martins, Rui P. / Law, Man-Kay et al. | 2024
- 3943
-
DF-RAP: A Robust Adversarial Perturbation for Defending Against Deepfakes in Real-World Social Network ScenariosQu, Zuomin / Xi, Zuping / Lu, Wei / Luo, Xiangyang / Wang, Qian / Li, Bin et al. | 2024
- 3958
-
Unstoppable Attack: Label-Only Model Inversion Via Conditional Diffusion ModelLiu, Rongke / Wang, Dong / Ren, Yizhi / Wang, Zhen / Guo, Kaitian / Qin, Qianqian / Liu, Xiaolei et al. | 2024
- 3974
-
Fingerprint Presentation Attack Detection by Region DecompositionFei, Hongyan / Huang, Chuanwei / Wu, Song / Wang, Zheng / Jia, Zexi / Feng, Jufu et al. | 2024
- 3986
-
UltraVCS: Ultra-Fine-Grained Variable-Based Code Slicing for Automated Vulnerability DetectionWu, Tongshuai / Chen, Liwei / Du, Gewangzi / Meng, Dan / Shi, Gang et al. | 2024
- 4001
-
Frequency-Selective Adversarial Attack Against Deep Learning-Based Wireless Signal ClassifiersKe, Da / Wang, Xiang / Huang, Zhitao et al. | 2024
- 4012
-
Intrusion Device Detection in Fieldbus Networks Based on Channel-State Group FingerprintWang, Xiangming / Liu, Yang / Jiao, Kexin / Liu, Pengfei / Luo, Xiapu / Liu, Ting et al. | 2024
- 4028
-
Puncturable Attribute-Based Encryption From Lattices for Classified Document SharingYang, Mengxue / Wang, Huaqun / He, Debiao et al. | 2024
- 4043
-
On Hardware Security Bug Code Fixes by Prompting Large Language ModelsAhmad, Baleegh / Thakur, Shailja / Tan, Benjamin / Karri, Ramesh / Pearce, Hammond et al. | 2024
- 4058
-
MFAE: Masked Frequency Autoencoders for Domain Generalization Face Anti-SpoofingZheng, Tianyi / Li, Bo / Wu, Shuang / Wan, Ben / Mu, Guodong / Liu, Shice / Ding, Shouhong / Wang, Jia et al. | 2024
- 4070
-
Secure and Efficient Federated Learning With Provable Performance Guarantees via Stochastic QuantizationLyu, Xinchen / Hou, Xinyun / Ren, Chenshan / Ge, Xin / Yang, Penglin / Cui, Qimei / Tao, Xiaofeng et al. | 2024
- 4086
-
A Cryptographic Protocol for Efficient Mutual Location Privacy Through Outsourcing in Indoor Wi-Fi LocalizationEshun, Samuel N. / Palmieri, Paolo et al. | 2024
- 4100
-
Protected Face Templates Generation Based on Multiple Partial Walsh Transformations and SimhashGao, Ce / Zhang, Kang / Wang, Weiwei / Cao, Zhicheng / Pang, Liaojun / Liu, Eryun / Zhao, Heng et al. | 2024
- 4114
-
A Robust Reversible Watermarking Scheme Using Attack-Simulation-Based Adaptive Normalization and EmbeddingTang, Yichao / Wang, Chuntao / Xiang, Shijun / Cheung, Yiu-Ming et al. | 2024
- 4130
-
Inversion-Guided Defense: Detecting Model Stealing Attacks by Output InvertingZhou, Shuai / Zhu, Tianqing / Ye, Dayong / Zhou, Wanlei / Zhao, Wei et al. | 2024
- 4146
-
Privacy-Preserving Approximate Minimum Community Search on Large NetworksSun, Fangyuan / Yu, Jia / Hu, Jiankun et al. | 2024
- 4161
-
Efficient Verifiably Encrypted ECDSA Schemes From Castagnos-Laguillaumie and Joye-Libert EncryptionsYang, Xiao / Zhang, Chengru / Xue, Haiyang / Au, Man Ho et al. | 2024
- 4174
-
A Flexible and Scalable Malicious Secure Aggregation Protocol for Federated LearningTang, Jinling / Xu, Haixia / Wang, Mingsheng / Tang, Tao / Peng, Chunying / Liao, Huimei et al. | 2024
- 4188
-
Reinforcement Learning-Based Tracking Control for Networked Control Systems With DoS AttacksLiu, Jinliang / Dong, Yanhui / Zha, Lijuan / Xie, Xiangpeng / Tian, Engang et al. | 2024
- 4198
-
Correction to “A New Construction Method for Keystream Generators”Gul, Cagdas / Kara, Orhun et al. | 2024
- 4199
-
PhaDe: Practical Phantom Spoofing Attack Detection for Autonomous VehiclesLin, Feng / Yan, Hao / Li, Jin / Liu, Ziwei / Lu, Li / Ba, Zhongjie / Ren, Kui et al. | 2024
- 4215
-
GuessFuse: Hybrid Password Guessing With Multi-ViewXie, Zhijie / Shi, Fan / Zhang, Min / Ma, Huimin / Wang, Huaixi / Li, Zhenhan / Zhang, Yunyi et al. | 2024
- 4231
-
QPASE: Quantum-Resistant Password-Authenticated Searchable Encryption for Cloud StorageJiang, Jingwei / Wang, Ding et al. | 2024
- 4247
-
Armor: Protecting Software Against Hardware Tracing TechniquesYue, Tai / Zhang, Fengwei / Ning, Zhenyu / Wang, Pengfei / Zhou, Xu / Lu, Kai / Zhou, Lei et al. | 2024
- 4263
-
On the Semantic Security in the General Bounded Storage Model: A New ProofMoltafet, Mohammad / Sadjadpour, Hamid R. / Rezki, Zouheir et al. | 2024
- 4272
-
VGGM: Variational Graph Gaussian Mixture Model for Unsupervised Change Point Detection in Dynamic NetworksZhang, Xinxun / Jiao, Pengfei / Gao, Mengzhou / Li, Tianpeng / Wu, Yiming / Wu, Huaming / Zhao, Zhidong et al. | 2024
- 4285
-
BDMMT: Backdoor Sample Detection for Language Models Through Model Mutation TestingWei, Jiali / Fan, Ming / Jiao, Wenjing / Jin, Wuxia / Liu, Ting et al. | 2024
- 4301
-
Toward Efficient Key Extraction of LBC Over Ring: Fast Non-Spherical G-Lattice Sampler and Optimized Perturbation GenerationLu, Hai / Zhu, Yan / Chen, Cecilia E. / Ma, Di et al. | 2024
- 4316
-
Privacy-Preserving and Trusted Keyword Search for Multi-Tenancy CloudZhu, Xiaojie / Shen, Peisong / Dai, Yueyue / Xu, Lei / Hu, Jiankun et al. | 2024
- 4331
-
STAR-RIS-Assisted-Full-Duplex Jamming Design for Secure Wireless Communications SystemWen, Yun / Chen, Gaojie / Fang, Sisai / Chu, Zheng / Xiao, Pei / Tafazolli, Rahim et al. | 2024
- 4344
-
Group-Wise Verifiable Coded Computing Under Byzantine Attacks and StragglersHong, Sangwoo / Yang, Heecheol / Yoon, Youngseok / Lee, Jungwoo et al. | 2024
- 4358
-
Efficiently Achieving Privacy Preservation and Poisoning Attack Resistance in Federated LearningLi, Xueyang / Yang, Xue / Zhou, Zhengchun / Lu, Rongxing et al. | 2024
- 4374
-
(Security) Assertions by Large Language ModelsKande, Rahul / Pearce, Hammond / Tan, Benjamin / Dolan-Gavitt, Brendan / Thakur, Shailja / Karri, Ramesh / Rajendran, Jeyavijayan et al. | 2024
- 4390
-
Online Context-Aware Streaming Data Release With Sequence Information PrivacyJiang, Bo / Li, Ming / Tandon, Ravi et al. | 2024
- 4406
-
Embedding Secret Message in Chinese Characters via Glyph Perturbation and Style TransferYao, Ye / Wang, Chen / Wang, Hui / Wang, Ke / Ren, Yizhi / Meng, Weizhi et al. | 2024
- 4420
-
Size-Independent Reliable CNN for RJCA SteganalysisButora, Jan / Bas, Patrick et al. | 2024
- 4432
-
Covert Transmission in Water-to-Air Optical Wireless Communication SystemsHu, Qingqing / Lin, Tianrui / Wei, Tianjian / Huang, Nuo / Zhu, Yi-Jun / Gong, Chen et al. | 2024
- 4448
-
Provably and Physically Secure UAV-Assisted Authentication Protocol for IoT Devices in Unattended SettingsTian, Chuang / Ma, Jianfeng / Li, Teng / Zhang, Junwei / Ma, Chengyan / Xi, Ning et al. | 2024
- 4464
-
Efficient Group Key Generation Based on Satellite Cluster State Information for Drone SwarmWang, Ning / Duan, Jixuan / Chen, Biwen / Guo, Shangwei / Xiang, Tao / Zeng, Kai et al. | 2024
- 4480
-
On Mixing Authenticated and Non-Authenticated Signals Against GNSS SpoofingArdizzon, Francesco / Crosara, Laura / Tomasin, Stefano / Laurenti, Nicola et al. | 2024
- 4494
-
NSPFL: A Novel Secure and Privacy-Preserving Federated Learning With Data Integrity AuditingZhang, Zehu / Li, Yanping et al. | 2024
- 4507
-
Where Deepfakes Gaze at? Spatial–Temporal Gaze Inconsistency Analysis for Video Face Forgery DetectionPeng, Chunlei / Miao, Zimin / Liu, Decheng / Wang, Nannan / Hu, Ruimin / Gao, Xinbo et al. | 2024
- 4518
-
MLaD²: A Semi-Supervised Money Laundering Detection Framework Based on Decoupling TrainingLuo, Xuejiao / Han, Xiaohui / Zuo, Wenbo / Wu, Xiaoming / Liu, Wenyin et al. | 2024
- 4534
-
Sweeper: Breaking the Validity-Latency Tradeoff in Asynchronous Common SubsetYang, Guoyu / Chen, Chang / Chen, Qi / Jiang, Jianan / Li, Jin / He, Debiao et al. | 2024
- 4547
-
Fast Propagation Is Better: Accelerating Single-Step Adversarial Training via Sampling SubnetworksJia, Xiaojun / Li, Jianshu / Gu, Jindong / Bai, Yang / Cao, Xiaochun et al. | 2024
- 4560
-
Minimalism is King! High-Frequency Energy-Based Screening for Data-Efficient Backdoor AttacksXun, Yuan / Jia, Xiaojun / Gu, Jindong / Liu, Xinwei / Guo, Qing / Cao, Xiaochun et al. | 2024
- 4572
-
SStore: An Efficient and Secure Provable Data Auditing Platform for CloudWang, Lipeng / Hu, Mingsheng / Jia, Zhijuan / Guan, Zhi / Chen, Zhong et al. | 2024
- 4585
-
Vulnerability of State-of-the-Art Face Recognition Models to Template Inversion AttackOtroshi Shahreza, Hatef / Hahn, Vedrana Krivokuca / Marcel, Sebastien et al. | 2024
- 4601
-
Palm Vein Recognition Under Unconstrained and Weak-Cooperative ConditionsLuo, Dacan / Qiao, Yitao / Xie, Di / Zhang, Shifeng / Kang, Wenxiong et al. | 2024
- 4615
-
Deeper Insight Into Why Authentication Schemes in IoT Environments Fail to Achieve the Desired SecurityGuo, Yimin / Guo, Yajun / Xiong, Ping / Yang, Fan / Zhang, Chengde et al. | 2024
- 4628
-
Dual Defense: Adversarial, Traceable, and Invisible Robust Watermarking Against Face SwappingZhang, Yunming / Ye, Dengpan / Xie, Caiyun / Tang, Long / Liao, Xin / Liu, Ziyi / Chen, Chuanxi / Deng, Jiacheng et al. | 2024
- 4642
-
PHY-Layer Authentication Exploiting Channel Sparsity in MmWave MIMO UAV-Ground SystemsTeng, Yulin / Zhang, Pinchang / Chen, Xiao / Jiang, Xiaohong / Xiao, Fu et al. | 2024
- 4658
-
Secure Stabilization of Networked Lur’e Systems Suffering From DoS Attacks: A Resilient Memory-Based Event-Trigger MechanismNi, Yanyan / Wang, Zhen / Fan, Yingjie / Huang, Xia / Shen, Hao et al. | 2024
- 4670
-
On the Economics of Adversarial Machine LearningMerkle, Florian / Samsinger, Maximilian / Schottle, Pascal / Pevny, Tomas et al. | 2024
- 4686
-
On the Privacy Effect of Data Enhancement via the Lens of MemorizationLi, Xiao / Li, Qiongxiu / Hu, Zhanhao / Hu, Xiaolin et al. | 2024
- 4700
-
SimLESS: A Secure Deduplication System Over Similar Data in Cloud Media SharingSong, Mingyang / Hua, Zhongyun / Zheng, Yifeng / Xiang, Tao / Jia, Xiaohua et al. | 2024
- 4716
-
Integral Pose Learning via Appearance Transfer for Gait RecognitionHuang, Panjian / Hou, Saihui / Cao, Chunshui / Liu, Xu / Hu, Xuecai / Huang, Yongzhen et al. | 2024
- 4728
-
AugSteal: Advancing Model Steal With Data Augmentation in Active Learning FrameworksGao, Lijun / Liu, Wenjun / Liu, Kai / Wu, Jiehong et al. | 2024
- 4741
-
Double-Layer Detection of Internal Threat in Enterprise Systems Based on Deep LearningHe, Daojing / Lv, Xin / Xu, Xueqian / Chan, Sammy / Choo, Kim-Kwang Raymond et al. | 2024
- 4752
-
FLPurifier: Backdoor Defense in Federated Learning via Decoupled Contrastive TrainingZhang, Jiale / Zhu, Chengcheng / Sun, Xiaobing / Ge, Chunpeng / Chen, Bing / Susilo, Willy / Yu, Shui et al. | 2024
- 4767
-
Steganalysis of AI Models LSB AttacksGilkarov, Daniel / Dubin, Ran et al. | 2024
- 4780
-
HomeSentinel: Intelligent Anti-Fingerprinting for IoT Traffic in Smart HomesLi, Beibei / Chen, Youtong / Zhang, Lei / Wang, Licheng / Cheng, Yanyu et al. | 2024
- 4794
-
A Unified Optimization Framework for Feature-Based Transferable AttacksXu, Nanqing / Feng, Weiwei / Zhang, Tianzhu / Zhang, Yongdong et al. | 2024
- 4809
-
Defending Against Malicious Influence Control in Online Leader-Follower Social NetworksZhu, Liwang / Zhou, Xiaotian / Tian, Jiahe / Li, Wei / Zhang, Zhongzhi et al. | 2024
- 4820
-
Employing Reinforcement Learning to Construct a Decision-Making Environment for Image Forgery LocalizationPeng, Rongxuan / Tan, Shunquan / Mo, Xianbo / Li, Bin / Huang, Jiwu et al. | 2024
- 4835
-
Privacy-Preserving Multi-Biometric Indexing Based on Frequent Binary PatternsOsorio-Roig, Daile / Gonzalez-Soler, Lazaro Janier / Rathgeb, Christian / Busch, Christoph et al. | 2024
- 4851
-
Practical Cyber Attack Detection With Continuous Temporal Graph in Dynamic Network SystemDuan, Guanghan / Lv, Hongwu / Wang, Huiqiang / Feng, Guangsheng / Li, Xiaoli et al. | 2024
- 4865
-
BAGM: A Backdoor Attack for Manipulating Text-to-Image Generative ModelsVice, Jordan / Akhtar, Naveed / Hartley, Richard / Mian, Ajmal et al. | 2024
- 4881
-
MalGNE: Enhancing the Performance and Efficiency of CFG-Based Malware Detector by Graph Node Embedding in Low Dimension SpacePeng, Hao / Yang, Jieshuai / Zhao, Dandan / Xu, Xiaogang / Pu, Yuwen / Han, Jianmin / Yang, Xing / Zhong, Ming / Ji, Shouling et al. | 2024
- 4897
-
Dynamic Group Time-Based One-Time PasswordsCao, Xuelian / Yang, Zheng / Ning, Jianting / Jin, Chenglu / Lu, Rongxing / Liu, Zhiming / Zhou, Jianying et al. | 2024
- 4914
-
Discrete Spectral Encryption of Single-Carrier Signals With Pseudo Random Dynamic KeysAbbade, Marcelo L. F. / Souza, Welerson S. / Santos, Melissa O. / Rodrigues, Ivan E. L. / Aldaya, Ivan / Bonani, Luiz. H. / Romero, Murilo A. et al. | 2024
- 4930
-
PRO-Face C: Privacy-Preserving Recognition of Obfuscated Face via Feature CompensationYuan, Lin / Chen, Wu / Pu, Xiao / Zhang, Yan / Li, Hongbo / Zhang, Yushu / Gao, Xinbo / Ebrahimi, Touradj et al. | 2024
- 4945
-
An Intelligent Reflecting Surface-Based Attack Scheme Against Dual-Functional Radar and Communication SystemsLiu, Beiyuan / Jiang, Jinjing / Liu, Qian / Liu, Jiajia / Xu, Sai et al. | 2024
- 4957
-
Privacy-Enhanced Frequent Sequence Mining and Retrieval for Personalized Behavior PredictionChang, Shuyu / Shi, Zhenqi / Xiao, Fu / Huang, Haiping / Liu, Xingchen / Sun, Chaorun et al. | 2024
- 4970
-
NeuralSanitizer: Detecting Backdoors in Neural NetworksZhu, Hong / Zhao, Yue / Zhang, Shengzhi / Chen, Kai et al. | 2024
- 4986
-
Attribute-Guided Cross-Modal Interaction and Enhancement for Audio-Visual MatchingWang, Jiaxiang / Zheng, Aihua / Yan, Yan / He, Ran / Tang, Jin et al. | 2024
- 4999
-
SeCoSe: Toward Searchable and Communicable Healthcare Service Seeking in Flexible and Secure EHR SharingLiu, Zhihuang / Hu, Ling / Cai, Zhiping / Liu, Ximeng / Liu, Yanhua et al. | 2024
- 5015
-
PUF-Assisted Radio Frequency Fingerprinting Exploiting Power Amplifier Active Load-PullingLi, Yuepei / Xu, Kai / Zhang, Junqing / Gu, Chongyan / Ding, Yuan / Goussetis, George / Podilchak, Symon K. et al. | 2024
- 5030
-
Optimal Signaling for Covert Communications Under Peak Power ConstraintKang, Bichen / Ye, Neng / An, Jianping et al. | 2024
- 5046
-
Understanding Visual Privacy Protection: A Generalized Framework With an Instance on Facial PrivacyZhang, Yushu / Ji, Junhao / Wen, Wenying / Zhu, Youwen / Xia, Zhihua / Weng, Jian et al. | 2024
- 5060
-
Secret Multiple Leaders & Committee Election With Application to Sharding BlockchainZhai, Mingzhe / Wu, Qianhong / Liu, Yizhong / Qin, Bo / Dai, Xiaopeng / Gao, Qiyuan / Susilo, Willy et al. | 2024
- 5075
-
PrivSSO: Practical Single-Sign-On Authentication Against Subscription/Access Pattern LeakageGao, Ge / Zhang, Yuan / Song, Yaqing / Li, Shiyu et al. | 2024
- 5090
-
RIS-Jamming: Breaking Key Consistency in Channel Reciprocity-Based Key GenerationLi, Guyue / Staat, Paul / Li, Haoyu / Heinrichs, Markus / Zenger, Christian / Kronberger, Rainer / Elders-Boll, Harald / Paar, Christof / Hu, Aiqun et al. | 2024
- 5106
-
ForensicsForest Family: A Series of Multi-Scale Hierarchical Cascade Forests for Detecting GAN-Generated FacesLu, Jiucui / Zhou, Jiaran / Dong, Junyu / Li, Bin / Lyu, Siwei / Li, Yuezun et al. | 2024
- 5120
-
Vulnerability Detection Based on Enhanced Graph Representation LearningXiao, Peng / Xiao, Qibin / Zhang, Xusheng / Wu, Yumei / Yang, Fengyu et al. | 2024
- 5136
-
Sparsity and Privacy in Secret Sharing: A Fundamental Trade-OffBitar, Rawad / Egger, Maximilian / Wachter-Zeh, Antonia / Xhemrishi, Marvin et al. | 2024
- 5151
-
On the Impact of Voice Anonymization on Speech Diagnostic Applications: A Case Study on COVID-19 DetectionZhu, Yi / Imoussaine-Aikous, Mohamed / Cote-Lussier, Carolyn / Falk, Tiago H. et al. | 2024
- 5166
-
Contrast-Then-Approximate: Analyzing Keyword Leakage of Generative Language ModelsZeng, Zhirui / Xiang, Tao / Guo, Shangwei / He, Jialing / Zhang, Qiao / Xu, Guowen / Zhang, Tianwei et al. | 2024
- 5181
-
MMQW: Multi-Modal Quantum Watermarking SchemeXing, Zheng / Lam, Chan-Tong / Yuan, Xiaochen / Im, Sio-Kei / Machado, Penousal et al. | 2024
- 5196
-
Purified Authorization Service With Encrypted Message ModerationJiang, Peng / Liu, Qi / Zhu, Liehuang et al. | 2024
- 5207
-
Boosting Black-Box Attack to Deep Neural Networks With Conditional Diffusion ModelsLiu, Renyang / Zhou, Wei / Zhang, Tianwei / Chen, Kangjie / Zhao, Jun / Lam, Kwok-Yan et al. | 2024
- 5220
-
Data Generation and Augmentation Method for Deep Learning-Based VDU Leakage Signal Restoration AlgorithmNam, Taesik / Choi, Dong-Hoon / Lee, Euibum / Jo, Han-Shin / Yook, Jong-Gwan et al. | 2024
- 5235
-
Vulnerability Analysis of Distributed State Estimator Under False Data Injection AttacksLi, Pengyu / Ye, Dan et al. | 2024
- 5245
-
Enhanced Few-Shot Malware Traffic Classification via Integrating Knowledge Transfer With Neural Architecture SearchZhang, Xixi / Wang, Qin / Qin, Maoyang / Wang, Yu / Ohtsuki, Tomoaki / Adebisi, Bamidele / Sari, Hikmet / Gui, Guan et al. | 2024
- 5257
-
MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation LearningAly, Ahmed / Iqbal, Shahrear / Youssef, Amr / Mansour, Essam et al. | 2024
- 5272
-
Performance Enhanced Secure Spatial Keyword Similarity Query With Arbitrary Spatial RangesZhang, Songnian / Lu, Rongxing / Zhu, Hui / Zheng, Yandong / Guan, Yunguo / Wang, Fengwei / Shao, Jun / Li, Hui et al. | 2024
- 5286
-
Foolmix: Strengthen the Transferability of Adversarial Examples by Dual-Blending and Direction Update StrategyLi, Zhankai / Wang, Weiping / Li, Jie / Chen, Kai / Zhang, Shigeng et al. | 2024
- 5301
-
CSI-RFF: Leveraging Micro-Signals on CSI for RF Fingerprinting of Commodity WiFiKong, Ruiqi / Chen, He et al. | 2024
- 5316
-
Causal Learning for Robust Specific Emitter Identification Over Unknown Channel StatisticsTang, Peng / Ding, Guoru / Xu, Yitao / Jiao, Yutao / Song, Yehui / Wei, Guofeng et al. | 2024
- 5330
-
Consistency of Stackelberg and Nash Equilibria in Three-Player Leader-Follower GamesXu, Gehui / Chen, Guanpu / Cheng, Zhaoyang / Hong, Yiguang / Qi, Hongsheng et al. | 2024
- 5345
-
Improving Generalization of Deepfake Detectors by Imposing Gradient RegularizationGuan, Weinan / Wang, Wei / Dong, Jing / Peng, Bo et al. | 2024
- 5357
-
Client-Side Embedding of Screen-Shooting Resilient Image WatermarkingXiao, Xiangli / Zhang, Yushu / Hua, Zhongyun / Xia, Zhihua / Weng, Jian et al. | 2024
- 5373
-
Reconfigurable Intelligent Surface-Assisted Key Generation for Millimeter-Wave Multi-User SystemsLu, Tianyu / Chen, Liquan / Zhang, Junqing / Chen, Chen / Duong, Trung Q. et al. | 2024
- 5389
-
Revocable and Privacy-Preserving Bilateral Access Control for Cloud Data SharingZhao, Mingyang / Zhang, Chuan / Wu, Tong / Ni, Jianbing / Liu, Ximeng / Zhu, Liehuang et al. | 2024
- 5405
-
Depriving the Survival Space of Adversaries Against Poisoned Gradients in Federated LearningLu, Jianrong / Hu, Shengshan / Wan, Wei / Li, Minghui / Zhang, Leo Yu / Xue, Lulu / Jin, Hai et al. | 2024
- 5419
-
CP-IPFE: Ciphertext-Policy Based Inner Product Functional EncryptionYang, Haoxuan / Peng, Changgen et al. | 2024
- 5434
-
The Dark Forest: Understanding Security Risks of Cross-Party Delegated Resources in Mobile App-in-App EcosystemsZhang, Zhibo / Zhang, Lei / Yang, Guangliang / Chen, Yanjun / Xu, Jiahao / Yang, Min et al. | 2024
- 5449
-
Generic Construction of Conditional Privacy-Preserving Certificateless Signatures With Efficient Instantiations for VANETsPu, Lang / Lin, Chao / Gu, Jingjing / Huang, Xinyi / He, Debiao et al. | 2024
- 5464
-
Vulnerability of Deep Forest to Adversarial AttacksAli, Ziad / Mohammed, Ameer / Ahmad, Imtiaz et al. | 2024
- 5476
-
ProGen: Projection-Based Adversarial Attack Generation Against Network Intrusion DetectionWang, Minxiao / Yang, Ning / Forcade-Perkins, Nicolas J. / Weng, Ning et al. | 2024
- 5492
-
A Lightweight and Noise-Robust Method for Internal OCT Fingerprint ReconstructionLiu, Feng / Zeng, Wenfeng / Li, Yin / Shen, Linlin et al. | 2024
- 5506
-
Toward Transferable Attack via Adversarial Diffusion in Face RecognitionHu, Cong / Li, Yuanbo / Feng, Zhenhua / Wu, Xiaojun et al. | 2024
- 5520
-
RL and Fingerprinting to Select Moving Target Defense Mechanisms for Zero-Day Attacks in IoTHuertas Celdran, Alberto / Miguel Sanchez Sanchez, Pedro / von der Assen, Jan / Schenk, Timo / Bovet, Gerome / Martinez Perez, Gregorio / Stiller, Burkhard et al. | 2024
- 5530
-
Fast Evaluation of S-Boxes With Garbled CircuitsPohle, Erik / Abidin, Aysajan / Preneel, Bart et al. | 2024
- 5545
-
Privacy-Preserved Data Disturbance and Truthfulness Verification for Data TradingZhang, Man / Li, Xinghua / Miao, Yinbin / Luo, Bin / Xu, Wanyun / Ren, Yanbing / Deng, Robert H. et al. | 2024
- 5561
-
Achieving Covert Communication With a Probabilistic Jamming StrategyChen, Xun / Gao, Fujun / Qiu, Min / Zhang, Jia / Shu, Feng / Yan, Shihao et al. | 2024
- 5575
-
Split Aggregation: Lightweight Privacy-Preserving Federated Learning Resistant to Byzantine AttacksLu, Zhi / Lu, SongFeng / Cui, YongQuan / Tang, XueMing / Wu, JunJun et al. | 2024
- 5591
-
DARD: Deceptive Approaches for Robust Defense Against IP TheftMongardini, Alberto Maria / La Morgia, Massimo / Jajodia, Sushil / Vincenzo Mancini, Luigi / Mei, Alessandro et al. | 2024
- 5607
-
SOCI+: An Enhanced Toolkit for Secure Outsourced Computation on IntegersZhao, Bowen / Deng, Weiquan / Li, Xiaoguo / Liu, Ximeng / Pei, Qingqi / Deng, Robert H. et al. | 2024
- 5620
-
Balancing Privacy and Regulation of Cross-Chain Transaction Systems via SoK-Assisted Policy EnhancementJiang, Peng / Zhu, Jun / Zhu, Liehuang et al. | 2024
- 5630
-
Approximation of Pufferfish Privacy for Gaussian PriorsDing, Ni et al. | 2024
- 5641
-
Pilot Spoofing Attack on the Downlink of Cell-Free Massive MIMO: From the Perspective of AdversariesXu, Weiyang / Wang, Ruiguang / Zhang, Yuan / Quoc Ngo, Hien / Xiang, Wei et al. | 2024
- 5655
-
Stealthy Targeted Backdoor Attacks Against Image CaptioningFan, Wenshu / Li, Hongwei / Jiang, Wenbo / Hao, Meng / Yu, Shui / Zhang, Xiao et al. | 2024
- 5668
-
Online Self-Supervised Deep Learning for Intrusion Detection SystemsNakip, Mert / Gelenbe, Erol et al. | 2024
- 5684
-
Lattice-Aided Extraction of Spread-Spectrum Hidden DataYang, Fan / Cheng, Hao / Lyu, Shanxiang / Wen, Jinming / Chen, Hao et al. | 2024
- 5696
-
Enhancing the Physical Layer Security of Two-Way Relay Systems With RIS and BeamformingZhang, Yu / Zhao, Shuangrui / Shen, Yulong / Jiang, Xiaohong / Shiratori, Norio et al. | 2024
- 5712
-
Phase-Aggregated Dual-Branch Network for Efficient Fingerprint Dense RegistrationGuan, Xiongjun / Feng, Jianjiang / Zhou, Jie et al. | 2024
- 5725
-
Libras: A Fair, Secure, Verifiable, and Scalable Outsourcing Computation Scheme Based on BlockchainHuo, Lijuan / Wu, Libing / Zhang, Zhuangzhuang / Li, Chunshuo / He, Debiao / Wang, Jing et al. | 2024
- 5738
-
Federated Learning With Long-Tailed Data via Representation Unification and Classifier RectificationHuang, Wenke / Liu, Yuxia / Ye, Mang / Chen, Jun / Du, Bo et al. | 2024
- 5751
-
Efficient Privacy-Preserving Logistic Model With Malicious SecurityMiao, Guanhong / Wu, Samuel S. et al. | 2024
- 5767
-
CMXsafe: A Proxy Layer for Securing Internet-of-Things Communicationsde Hoz Diego, Jorge David / Madi, Taous / Konstantinou, Charalambos et al. | 2024
- 5783
-
DP-Norm: Differential Privacy Primal-Dual Algorithm for Decentralized Federated LearningFukami, Takumi / Murata, Tomoya / Niwa, Kenta / Tyou, Iifan et al. | 2024
- 5798
-
Securing Collaborative Authentication: A Weighted Voting Strategy to Counter Unreliable CooperatorsZhou, Yudi / Huo, Yan / Gao, Qinghe / Wu, Yue / Jing, Tao / Mao, Jian et al. | 2024
- 5814
-
RFed: Robustness-Enhanced Privacy-Preserving Federated Learning Against Poisoning AttackMiao, Yinbin / Yan, Xinru / Li, Xinghua / Xu, Shujiang / Liu, Ximeng / Li, Hongwei / Deng, Robert H. et al. | 2024
- 5828
-
Privacy-Preserving Asynchronous Federated Learning Under Non-IID SettingsMiao, Yinbin / Kuang, Da / Li, Xinghua / Xu, Shujiang / Li, Hongwei / Raymond Choo, Kim-Kwang / Deng, Robert H. et al. | 2024
- 5842
-
Shuffle Private Decentralized Convex OptimizationZhang, Lingjie / Zhang, Hai et al. | 2024
- 5852
-
Toward Stealthy Backdoor Attacks Against Speech Recognition via Elements of SoundCai, Hanbo / Zhang, Pengcheng / Dong, Hai / Xiao, Yan / Koffas, Stefanos / Li, Yiming et al. | 2024
- 5867
-
On the Privacy of Adaptive Cuckoo Filters: Analysis and ProtectionReviriego, Pedro / Apple, Jim / Larrabeiti, David / Liu, Shanshan / Lombardi, Fabrizio et al. | 2024
- 5880
-
Exploiting the Adversarial Example Vulnerability of Transfer Learning of Source CodeYang, Yulong / Fan, Haoran / Lin, Chenhao / Li, Qian / Zhao, Zhengyu / Shen, Chao et al. | 2024
- 5895
-
RFG-HELAD: A Robust Fine-Grained Network Traffic Anomaly Detection Model Based on Heterogeneous Ensemble LearningZhong, Ying / Wang, Zhiliang / Shi, Xingang / Yang, Jiahai / Li, Keqin et al. | 2024
- 5911
-
A Secure and Efficient Blockchain Sharding Scheme via Hybrid Consensus and Dynamic ManagementLi, Meiqi / Luo, Xinyi / Xue, Kaiping / Xue, Yingjie / Sun, Wentuo / Li, Jian et al. | 2024
- 5925
-
RFTrack: Stealthy Location Inference and Tracking Attack on Wi-Fi DevicesLi, Ronghua / Hu, Haibo / Ye, Qingqing et al. | 2024
- 5940
-
CSFAdv: Critical Semantic Fusion Guided Least-Effort Adversarial Example AttacksPeng, Da-Tian / Dong, Jianmin / Zhang, Mingjiang / Yang, Jungang / Wang, Zhen et al. | 2024
- 5956
-
Lawful Remote Forensics Mechanism With Admissibility of Evidence in Stochastic and Unpredictable Transnational CrimeChew, Chit-Jie / Lee, Wei-Bin / Sung, Tzu-Li / Chen, Ying-Chin / Wang, Shiuh-Jeng / Lee, Jung-San et al. | 2024
- 5971
-
Dedicated Quantum Attacks on XOR-Type Function With Applications to Beyond-Birthday- Bound MACsShi, Tairong / Wu, Wenling / Hu, Bin / Guan, Jie / Sui, Han / Wang, Senpeng / Zhang, Mengyuan et al. | 2024
- 5985
-
SingleADV: Single-Class Target-Specific Attack Against Interpretable Deep Learning SystemsAbdukhamidov, Eldor / Abuhamad, Mohammed / Thiruvathukal, George K. / Kim, Hyoungshick / Abuhmed, Tamer et al. | 2024
- 5999
-
eGrass: An Encrypted Attributed Subgraph Matching System With Malicious SecurityWang, Songlei / Zheng, Yifeng / Jia, Xiaohua / Wang, Cong et al. | 2024
- 6015
-
Multi-Faceted Knowledge-Driven Graph Neural Network for Iris SegmentationWei, Jianze / Wang, Yunlong / Gao, Xingyu / He, Ran / Sun, Zhenan et al. | 2024
- 6028
-
HoneyJudge: A PLC Honeypot Identification Framework Based on Device Memory TestingZhu, Hengye / Liu, Mengxiang / Chen, Binbin / Che, Xin / Cheng, Peng / Deng, Ruilong et al. | 2024
- 6044
-
On the Secret-Key Capacity Over Multipath Fading ChannelGuo, Dengke / Ma, Dongtang / Xiong, Jun / Liu, Xiaoran / Wei, Jibo et al. | 2024
- 6055
-
A Steganography Immunoprocessing Framework Against CNN-Based and Handcrafted SteganalysisChen, Yijing / Wang, Hongxia / Li, Wanjie / Li, Wenshan et al. | 2024
- 6070
-
Enhancing Sparse Mobile CrowdSensing With Manifold Optimization and Differential PrivacyLi, Chengxin / Long, Saiqin / Liu, Haolin / Choi, Youngjune / Sekiya, Hiroo / Li, Zhetao et al. | 2024
- 6097
-
PkT-SIN: A Secure Communication Protocol for Space Information Networks With Periodic k-Time Anonymous AuthenticationYang, Yang / Xue, Wenyi / Sun, Jianfei / Yang, Guomin / Li, Yingjiu / Hwa Pang, Hwee / Deng, Robert H. et al. | 2024
- 6113
-
Ranker: Early Ransomware Detection Through Kernel-Level Behavioral AnalysisZhang, Huan / Zhao, Lixin / Yu, Aimin / Cai, Lijun / Meng, Dan et al. | 2024
- 6128
-
SIa-CBc: Sensitive Intent-Assisted and Crucial Behavior-Cognized Malware Detection Based on Human Brain Cognitive TheoryJing, Chao / Cui, Chaoyuan / Wu, Yun et al. | 2024
- 6144
-
EGST: An Efficient Solution for Human Gaits Recognition Using Neuromorphic Vision SensorChen, Liaogehao / Zhang, Zhenjun / Xiao, Yang / Wang, Yaonan et al. | 2024
- 6155
-
Nebula: Self-Attention for Dynamic Malware AnalysisTrizna, Dmitrijs / Demetrio, Luca / Biggio, Battista / Roli, Fabio et al. | 2024