2024
Privacy preserving and secure robust federated learning: A survey.
Concurr. Comput. Pract. Exp., June, 2024
A systematic review of fuzzing.
Soft Comput., March, 2024
Identity-Based Matchmaking Encryption with Equality Test.
Entropy, January, 2024
A hybrid framework for effective and efficient machine unlearning.
CoRR, 2024
On The Security Of A Novel Construction Of Certificateless Aggregate Signature Scheme For Healthcare Wireless Medical Sensor Networks.
Comput. J., 2024
Enhanced Fast and Reliable Statistical Vulnerability Root Cause Analysis with Sanitizer.
Proceedings of the IEEE Conference on Software Testing, Verification and Validation, 2024
Adversarial Attacks on Network Intrusion Detection Systems Based on Federated Learning.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024
2023
Identity-based proxy matchmaking encryption for cloud-based anonymous messaging systems.
J. Syst. Archit., September, 2023
Improving transferable adversarial attack via feature-momentum.
Comput. Secur., May, 2023
LoadLord: Loading on the Fly to Defend Against Code-Reuse Attacks.
CoRR, 2023
BSGAT: A Graph Attention Network for Binary Code Similarity Detection.
Proceedings of the 28th IEEE Pacific Rim International Symposium on Dependable Computing, 2023
Deep CNN- RNN with Self- Attention Model for Electric IoT Traffic Classification.
Proceedings of the 4th International Conference on Big Data & Artificial Intelligence & Software Engineering, 2023
A Personalized Federated Multi-task Learning Scheme for Encrypted Traffic Classification.
Proceedings of the Artificial Neural Networks and Machine Learning, 2023
Course Design and Tool Development for Functional Programming Integrating with Program Verification: from the Perspective of the Interactive Theorem Prover.
Proceedings of the ACM Turing Award Celebration Conference - China 2023, 2023
The Talent Cultivation System for Computer Science by integrating curriculum and industry practice through knowledge ability matrix.
Proceedings of the ACM Turing Award Celebration Conference - China 2023, 2023
Construction of Hardware Course Group in New Engineering Computer Specialty Facing Complex Engineering Problems.
Proceedings of the ACM Turing Award Celebration Conference - China 2023, 2023
Lazy Machine Unlearning Strategy for Random Forests.
Proceedings of the Web Information Systems and Applications, 2023
2022
AMSFuzz: An adaptive mutation schedule for fuzzing.
Expert Syst. Appl., 2022
Enhancing the Transferability via Feature-Momentum Adversarial Attack.
CoRR, 2022
AcoFuzz: Adaptive Energy Allocation for Greybox Fuzzing.
Proceedings of the 15th IEEE International Conference on Software Testing, 2022
A Composite Discover Method for Gadget Chains in Java Deserialization Vulnerability.
Proceedings of the Joint Proceedings of the 10th International Workshop on Quantitative Approaches to Software Quality (QuASoQ 2022) & the 6th Software Engineering Education Workshop (SEED 2022) co-located with 29th Asia Pacific Software Engineering Conference 2022, 2022
Spatial Data Publication Under Local Differential Privacy.
Proceedings of the Web Information Systems and Applications, 2022
2021
Cryptanalysis of an Anonymous and Traceable Group Data Sharing in Cloud Computing.
IEEE Trans. Inf. Forensics Secur., 2021
Identity-based encryption with equality test and datestamp-based authorization mechanism.
Theor. Comput. Sci., 2021
Public key encryption supporting equality test and flexible authorization without bilinear pairings.
Comput. Commun., 2021
OTA: An Operation-oriented Time Allocation Strategy for Greybox Fuzzing.
Proceedings of the 28th IEEE International Conference on Software Analysis, 2021
2020
Advanced Temperature-Varied ECU Fingerprints for Source Identification and Intrusion Detection in Controller Area Networks.
Secur. Commun. Networks, 2020
BiRe: A client-side Bi-directional SYN Reflection mechanism against multi-model evil twin attacks.
Comput. Secur., 2020
On the Security Of A Certificateless Signcryption With Known Session-Specific Temporary Information Security In The Standard Model.
Comput. J., 2020
Leakage-free ID-Based Signature, Revisited.
Comput. J., 2020
Frobenius groups which are the automorphism groups of orientably-regular maps.
Ars Math. Contemp., 2020
Regular balanced Cayley maps on nonabelian metacyclic groups of odd order.
Art Discret. Appl. Math., 2020
PEDR: A Novel Evil Twin Attack Detection Scheme Based on Phase Error Drift Range.
Proceedings of the Security and Privacy in Communication Networks, 2020
AFLTurbo: Speed up Path Discovery for Greybox Fuzzing.
Proceedings of the 31st IEEE International Symposium on Software Reliability Engineering, 2020
Temperature-sensitive Fingerprinting on ECU Clock Offset for CAN Intrusion Detection and Source Identification.
Proceedings of the ACM TUR-C'20: ACM Turing Celebration Conference, 2020
2019
<i>SLFAT</i>: Client-Side Evil Twin Detection Approach Based on Arrival Time of Special Length Frames.
Secur. Commun. Networks, 2019
Cryptanalysis of a Compact Anonymous HIBE with Constant Size Private Keys.
Comput. J., 2019
Exploiting Temperature-Varied ECU Fingerprints for Source Identification in In-vehicle Network Intrusion Detection.
Proceedings of the 38th IEEE International Performance Computing and Communications Conference, 2019
2018
Certificateless public key encryption with equality test.
Inf. Sci., 2018
Generic construction of public key encryption, identity-based encryption and signcryption with equality test.
Inf. Sci., 2018
Client-Side Evil Twin Attacks Detection Using Statistical Characteristics of 802.11 Data Frames.
IEICE Trans. Inf. Syst., 2018
An efficient RSA-based certificateless public key encryption scheme.
Discret. Appl. Math., 2018
On the Security of Secure Server-Designation Public Key Encryption with Keyword Search.
Comput. J., 2018
Cryptanalysis of A Pairing-Free Certificateless Signcryption Scheme.
Comput. J., 2018
Classification of regular balanced Cayley maps of minimal non-abelian metacyclic groups.
Ars Math. Contemp., 2018
2017
Editorial: On the Security of the First Leakage-Free Certificateless Signcryption Scheme.
Comput. J., 2017
A Passive Client-based Approach to Detect Evil Twin Attacks.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
2016
New Approaches for Secure Outsourcing Algorithm for Modular Exponentiations.
IACR Cryptol. ePrint Arch., 2016
Public Key Encryption Supporting Equality Test and Flexible Authorization without Bilinear Pairings.
IACR Cryptol. ePrint Arch., 2016
New Efficient and Flexible Algorithms for Secure Outsourcing of Bilinear Pairings.
IACR Cryptol. ePrint Arch., 2016
Comparison of Security Frameworks for Governmental Clouds between United States and European Union.
Proceedings of the 6th International Conference on Communication and Network Security, 2016
2015
Cryptanalysis of A Privacy-Preserving Smart Metering Scheme Using Linkable Anonymous Credential.
IACR Cryptol. ePrint Arch., 2015
Insecurity of an anonymous authentication for privacy-preserving IoT target-driven applications.
Comput. Secur., 2015
2013
LCCWS: Lightweight Copyfree Cross-layer Web Server.
J. Networks, 2013
Localization with Single Stationary Anchor for Mobile Node in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2013
2009
UD-TDMA: A Distributed TDMA Protocol for Underwater Acoustic Sensor Network.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009
2005
Detecting the Deviations of Privileged Process Execution.
Proceedings of the Networking, 2005
A Packet Marking Scheme for IP Traceback.
Proceedings of the Networking, 2005
1997
On isomorphisms of Cayley digraphs on dihedral groups.
Australas. J Comb., 1997