default search action
SPDE 2020: Quzhou, China
- Shui Yu, Peter Mueller, Jiangbo Qian:
Security and Privacy in Digital Economy - First International Conference, SPDE 2020, Quzhou, China, October 30 - November 1, 2020, Proceedings. Communications in Computer and Information Science 1268, Springer 2020, ISBN 978-981-15-9128-0
Cyberspace Security
- Yan Xu, Jinxing Ma, Sheng Zhong:
Detection and Defense Against DDoS Attack on SDN Controller Based on Spatiotemporal Feature. 3-18 - Pu Zhao, Wentao Zhao, Qiang Liu, Anbang Wang:
Trusted Link-Separation Multipath Selection for Software-Defined Wireless Sensor Networks in Adversarial Environments. 19-32 - Hongqing Huang, Lin Zhang:
Secure Radio Frequency DCS Watermark-Aided Physical Layer Authentication Design for NB-IoT Systems. 33-49 - Yifang Zhi, Li Yang, Gaolei Yang, Yuehong Zhang:
Protecting the Data Plane of SDN From Malicious Flow Entries Based on P4. 50-64 - Zhicheng Luo, Weijia Ding, Anmin Fu, Zhiyi Zhang, Linjie Zhang:
High-Speed Network Attack Detection Framework Based on Optimized Feature Selection. 65-78 - Jiahua Zhu, Xianliang Jiang, Guang Jin, Penghui Li:
CaaS: Enabling Congestion Control as a Service to Optimize WAN Data Transfer. 79-90 - Shuaishuai Zhu, Yiliang Han, Xiaoyuan Yang, Xuguang Wu:
Efficient and Evolvable Key Reconciliation Mechanism in Multi-party Networks Based on Automatic Learning Structure. 91-99 - Kun Li, Huachun Zhou, Zhe Tu, Bohao Feng:
CSKB: A Cyber Security Knowledge Base Based on Knowledge Graph. 100-113 - Gongxuan Zhang, Mingyue Zhang, Xinyi Fan:
Improvements Based on JWT and RBAC for Spring Security Framework. 114-128
Privacy Protection
- Hongbin Fan, Yining Liu, Zhixin Zeng:
Decentralizing Privacy-Preserving Data Aggregation Scheme Using Blockchain in Smart Grid. 131-142 - Xianjin Fang, Qingkui Zeng, Gaoming Yang:
Local Differential Privacy for Data Streams. 143-160 - Datong Wu, Xiaotong Wu, Jiaquan Gao, Genlin Ji, Xiaolong Xu, Lianyong Qi, Wanchun Dou:
A Personalized Preservation Mechanism Satisfying Local Differential Privacy in Location-Based Services. 161-175 - Bruce Gu, Xiaodong Wang, Youyang Qu, Jiong Jin, Yong Xiang, Longxiang Gao:
Location-Aware Privacy Preserving Scheme in SDN-Enabled Fog Computing. 176-190 - Feng Wu:
PLFG: A Privacy Attack Method Based on Gradients for Federated Learning. 191-204 - Datong Wu, Xiaotong Wu, Jiaquan Gao, Genlin Ji, Taotao Wu, Xuyun Zhang, Wanchun Dou:
A Survey of Game Theoretical Privacy Preservation for Data Sharing and Publishing. 205-216
Anomaly and Intrusion Detection
- Ying Zhao, Junjun Chen, Qianling Guo, Jian Teng, Di Wu:
Network Anomaly Detection Using Federated Learning and Transfer Learning. 219-231 - Xiaolong Deng, Zhengge Dai, Mingdong Sun, Tiejun Lv:
Variational Autoencoder Based Enhanced Behavior Characteristics Classification for Social Robot Detection. 232-248 - Yang Song, Zhuzhu Wang, Junwei Zhang, Zhuo Ma, Jianfeng Ma:
A Decentralized Weighted Vote Traffic Congestion Detection Framework for ITS. 249-262 - Mu Han, Pengzhou Cheng, Shidian Ma:
CVNNs-IDS: Complex-Valued Neural Network Based In-Vehicle Intrusion Detection System. 263-277 - Weidong Zhai, Zhou Su:
Intrusion Detection Scheme for Autonomous Driving Vehicles. 278-291 - Chenjun Tang, Hai Liang, Yong Ding, Yujue Wang, Shijie Tang:
Hyperparameter Optimization of ICS Intrusion Detection Classifier Based on Improved Hybrid Algorithm. 292-305
Trust Computation and Forensics
- Duo Zhang, Xiaodong Zhang, Sheng Gao, Youliang Tian:
Bitcoin-Based Anti-collusion Fair Payments for Outsourcing Computations in Cloud Computing. 309-321 - Xiaoxia Jiang, Youliang Tian:
Rational Delegation of Computation Based on Reputation and Contract Theory in the UC Framework. 322-335 - Shenchen Zhu, Ziyan Zhang, Liquan Chen, Hui Chen, Yanbo Wang:
A PBFT Consensus Scheme with Reputation Value Voting Based on Dynamic Clustering. 336-354 - Shanshan Li, Chunxiang Xu, Yuan Zhang, Xinsheng Wen:
Multi-user Dynamic Symmetric Searchable Encryption for Attribute-Value Type Database in Cloud Storage. 355-368 - Hu Xiong, Jinhao Chen, Minghao Yang, Xin Huang:
Revocable Attribute-Based Encryption Scheme with Arithmetic Span Program for Cloud-Assisted IoT. 369-383 - Li Ma, Jia Geng, Dongchao Ma, Yingxun Fu, Ailing Xiao:
A Multi-data Collaborative Encryption in Concealed Data Aggregation for WSNs. 384-398 - Laila Tul Badar, Chungen Xu, Ali Zakir:
Multi-owner Encrypted Ranked Keyword Search Using Machine Learning Techniques. 399-412
Attacks and Countermeasures
- Diqun Yan, Tingting Wu:
Detection of Various Speech Forgery Operations Based on Recurrent Neural Network. 415-426 - Jie Wang, Rangding Wang, Li Dong, Diqun Yan:
Robust, Imperceptible and End-to-End Audio Steganography Based on CNN. 427-442 - Donghua Wang, Rangding Wang, Li Dong, Diqun Yan, Xueyuan Zhang, Yongkang Gong:
Adversarial Examples Attack and Countermeasure for Speech Recognition System: A Survey. 443-468 - Wanping Liu, Zhaoping Li:
Enhancing Adversarial Examples with Flip-Invariance and Brightness-Invariance. 469-481 - Jun Yang, Mengyu Zhou, Baojiang Cui:
MLAB-BiLSTM: Online Web Attack Detection Via Attention-Based Deep Neural Networks. 482-492 - Yongmei Zhang, Jianzhe Ma, Qian Guo, Weifeng Lv:
A Moving Target Tracking Algorithm Based on Motion State Estimation and Convolutional Neural Network. 493-517 - Zitong Li, Jiale Chen, Jiale Zhang, Xiang Cheng, Bing Chen:
Detecting Advanced Persistent Threat in Edge Computing via Federated Learning. 518-532
Covert Communication
- Zhenxing Qian, Zichi Wang, Xinpeng Zhang:
Data Computing in Covert Domain. 535-545 - Xueyuan Zhang, Rangding Wang, Li Dong, Diqun Yan:
Post-processing for Enhancing Audio Steganographic Undetectability. 546-559 - Jialin Li, Xiangyang Luo, Yi Zhang, Pei Zhang, Chunfang Yang, Fenlin Liu:
Steganalysis of Adaptive Steganography Under the Known Cover Image. 560-574
Security Protocol
- Minglu Zhang, Qixian Zhou, Shaopeng Liang, Haomiao Yang:
Improving Communication Efficiency for Encrypted Distributed Training. 577-590 - Yiwenjin Fu, Huahui Chen, Jiangbo Qian, Yihong Dong:
A PoL Protocol for Spatiotemporal Blockchain. 591-605 - Chenglong Yang, Cai Fu, Yekui Qian, Hong Yao, Guanyun Feng, Lansheng Han:
Deep Learning-Based Reverse Method of Binary Protocol. 606-624 - Shuaishuai Zhu, Yiliang Han:
Analysis Toward RLWE-Based Key Exchange Protocol Based on Automatic Learning Structure. 625-639
Anonymous Communication
- Pu Wang, Limei He, Zheng Yan, Wei Feng:
AnonyTrust: An Anonymous Trust Authentication System for Pervasive Social Networking. 643-660 - Meng Shen, Junxian Duan, Ning Shang, Liehuang Zhu:
Transaction Deanonymization in Large-Scale Bitcoin Systems via Propagation Pattern Analysis. 661-675 - Qichao Lai, Li Xu, Manli Yuan, Feng Wang, He Fang:
User Privacy-Preserving Scheme Based on Anonymous Authentication in Smart Grid. 676-691
Security and Privacy from Social Science
- Jun Hou, Yutao Song, Qianmu Li, Huaqiu Long, Jian Jiang:
Behavior Prediction and Its Design for Safe Departure Intervals Based on Huang Yan-Pei Thought. 695-710 - Yu Wu, Li Pan, Fang Liu:
Making Privacy Protection Investment Decisions in Social Networks: An Interdependent Security Game Approach. 711-725 - Hongyan Zhang, Li Xu, Limei Lin, Xiaoding Wang:
De-anonymizing Social Networks with Edge-Neighborhood Graph Attacks. 726-737 - Peng Yang, Yan Zhang, Qiming Wu, Dapeng Wu, Zhidu Li:
User Grouping Privacy-Preserving Strategy Based on Edge Computing for Mobile Crowdsensing. 738-749
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.