2024
Structure attack on full-round DBST.
Frontiers Comput. Sci., August, 2024
S2FB IoU: Improving Boundary-based Object-Centric Image Segmentation Quality Evaluation.
Proceedings of the 6th ACM International Conference on Multimedia in Asia, 2024
2023
DAFuzz: data-aware fuzzing of in-memory data stores.
PeerJ Comput. Sci., 2023
Fine-grained Face Anti-Spoofing based on Recursive Self-Attention and Multi-Scale Fusion.
Proceedings of the Asia Pacific Signal and Information Processing Association Annual Summit and Conference, 2023
2022
A GAN-Based Intrusion Detection Model for 5G Enabled Future Metaverse.
Mob. Networks Appl., December, 2022
Multi-Step Attack Detection Based on Pre-Trained Hidden Markov Models.
Sensors, 2022
Correction to: A lossless secret image sharing scheme using a larger finite field.
Multim. Tools Appl., 2022
A survey of lattice based expressive attribute based encryption.
Comput. Sci. Rev., 2022
Improved Collision Detection Of MD5 Using Sufficient Condition Combination.
Comput. J., 2022
Multiple Genetic Syndromes Recognition Based on a Deep Learning Framework and Cross-Loss Training.
,
,
,
,
,
,
,
,
,
,
,
,
IEEE Access, 2022
Weighted Mean-Field Multi-Agent Reinforcement Learning via Reward Attribution Decomposition.
Proceedings of the Database Systems for Advanced Applications. DASFAA 2022 International Workshops, 2022
2021
Fiden: Intelligent Fingerprint Learning for Attacker Identification in the Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2021
Adaptive Steganalysis Based on Statistical Model of Quantized DCT Coefficients for JPEG Images.
IEEE Trans. Dependable Secur. Comput., 2021
Identification of Private ICS Protocols Based on Raw Traffic.
Symmetry, 2021
A lossless secret image sharing scheme using a larger finite field.
Multim. Tools Appl., 2021
Intrusion Detecting System Based on Temporal Convolutional Network for In-Vehicle CAN Networks.
Mob. Inf. Syst., 2021
An Identity-Based Cross-Domain Authenticated Asymmetric Group Key Agreement.
Inf., 2021
2020
DSM: Delayed Signature Matching in Deep Packet Inspection.
Symmetry, 2020
MultiFuzz: A Coverage-Based Multiparty-Protocol Fuzzer for IoT Publish/Subscribe Protocols.
Sensors, 2020
Improved Single-Key Attacks on 2-GOST.
Secur. Commun. Networks, 2020
Attribute Based Encryption with Efficient Revocation from Lattices.
Int. J. Netw. Secur., 2020
HSE-Voting: A secure high-efficiency electronic voting scheme based on homomorphic signcryption.
Future Gener. Comput. Syst., 2020
Query-efficient label-only attacks against black-box machine learning models.
Comput. Secur., 2020
An eigenvalue-based immunization scheme for node attacks in networks with uncertainty.
Sci. China Inf. Sci., 2020
2019
Deep Learning for Secure Mobile Edge Computing in Cyber-Physical Transportation Systems.
IEEE Netw., 2019
When Traffic Flow Prediction and Wireless Big Data Analytics Meet.
IEEE Netw., 2019
A Game Theoretic Reward and Punishment Unwanted Traffic Control Mechanism.
Mob. Networks Appl., 2019
Editorial: Securing Internet of Things Through Big Data Analytics.
Mob. Networks Appl., 2019
Designing Statistical Model-based Discriminator for Identifying Computer-generated Graphics from Natural Images.
J. Univers. Comput. Sci., 2019
Cyberspace-Oriented Access Control: A Cyberspace Characteristics-Based Model and its Policies.
IEEE Internet Things J., 2019
Editorial: Dependable wireless industrial communications.
Trans. Emerg. Telecommun. Technol., 2019
A Vulnerability Assessment Method for Network System Based on Cooperative Game Theory.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019
DHS-Voting: A Distributed Homomorphic Signcryption E-Voting.
Proceedings of the Dependability in Sensor, Cloud, and Big Data Systems and Applications, 2019
2018
Distinguishing Computer-Generated Graphics from Natural Images Based on Sensor Pattern Noise and Deep Learning.
Sensors, 2018
Large universe attribute based access control with efficient decryption in cloud storage system.
J. Syst. Softw., 2018
Generating stable biometric keys for flexible cloud computing authentication using finger vein.
Inf. Sci., 2018
Multi-User Searchable Symmetric Encryption with Dynamic Updates for Cloud Computing.
Inf., 2018
Neighbor-considered migration facilitates cooperation in prisoner's dilemma games.
Appl. Math. Comput., 2018
Identifying WeChat Red Packets and Fund Transfers Via Analyzing Encrypted Network Traffic.
Proceedings of the 17th IEEE International Conference On Trust, 2018
Node Immunization in Networks with Uncertainty.
Proceedings of the 17th IEEE International Conference On Trust, 2018
A deep learning model for secure cyber-physical transportation systems.
Proceedings of the IEEE INFOCOM 2018, 2018
Resilient Consensus for Multi-agent Networks with Mobile Detectors.
Proceedings of the Neural Information Processing - 25th International Conference, 2018
Evolution of Resource Sharing Cooperation Based on Reciprocity in Social Networks.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018
CPS: A Community Priority Based Vaccine Distribution Strategy in Different Networks.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018
A Location Spoofing Detection Method for Social Networks (Short Paper).
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2018
2017
DeepTFP: Mobile Time Series Data Analytics based Traffic Flow Prediction.
CoRR, 2017
Poster: DeepTFP: Mobile Time Series Data Analytics based Traffic Flow Prediction.
Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking, 2017
Cyberspace-Oriented Access Control: Model and Policies.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017
An Efficient Black-Box Vulnerability Scanning Method for Web Application.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2017
2016
Fine-grained Database Field Search Using Attribute-Based Encryption for E-Healthcare Clouds.
J. Medical Syst., 2016
A MapReduce-Based Distributed SVM for Scalable Data Type Classification.
Proceedings of the Collaborate Computing: Networking, Applications and Worksharing, 2016
2015
AN H.264/AVC HDTV watermarking algorithm robust to camcorder recording.
J. Vis. Commun. Image Represent., 2015
Geo-Localization Based Scene Recognition.
Proceedings of the 2015 IEEE International Conference on Multimedia Big Data, BigMM 2015, 2015
A Fragment Classification Method Depending on Data Type.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015
2014
Improvement of a Uniqueness-and-Anonymity-Preserving User Authentication Scheme for Connected Health Care.
J. Medical Syst., 2014
2008
Improved Algorithm for Tate Pairing Computation.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008
2005
Comment: A new blind signature based on the discrete logarithm problem for untraceability.
Appl. Math. Comput., 2005