


default search action
Journal of Information Security and Applications, Volume 93
Volume 93, 2025
- Jan von der Assen

, Chao Feng
, Alberto Huertas Celdrán
, Róbert Oles, Gérôme Bovet
, Burkhard Stiller
:
GuardFS: A file system for integrated detection and mitigation of Linux-based ransomware. 104078 - Kai Tian, Chunxiang Gu

, Fushan Wei, Xieli Zhang, Jiaxing Guo:
Combining model learning and formal analysis: A framework for protocol implementation verification. 104079 - Koi Yee Ng

, Wenting Zhu
, Simying Ong
:
Improving data extraction accuracy for median filter-based data hiding method. 104097 - Keiichi Iwamura, Ahmad Akmal Aminuddin Mohd Kamal:

Improving the security of asymmetric secret sharing scheme and its new applications. 104098 - Chao Fu, Guohua Shen

, Zhiqiu Huang, Jian Xie, Jiazhou Fu:
Automatic IoT permission assignment with transformer models under spatiotemporal constraints. 104099 - Jumei Zhang

, Zhenhua Liu, Dongdong Yao:
Lattice-based puncturable blind signature scheme: Enhancing privacy and security in large language models. 104100 - Yilei Wang, Yijia Wang, Tao Li, Mingyue Zhang, Salabat Khan

:
GAN-VPC: A virtual payment channel with GAN-based noise against timing attack. 104101 - Xin Xu, Zhen Yang, Quanwei Cai, Jingqiang Lin, Liangqin Ren

, Bo Chen
, Yongfeng Huang:
Enforcing cryptographic distributed-VCS access control with no trust on servers. 104103 - Dima Rabadi

, Jia Yi Loo, Amudha Narayanan, Yuexuan Wang
, Sin G. Teo, Tram Truong-Huu
:
FETA: A systematic and efficient approach for feature engineering on anti-static and anti-dynamic malware analysis. 104104 - Muhammad Luqman Naseem

, Zipeng Ye, Qi Zhou, Wenjian Luo
:
NID: A privacy-preserving operator based on Neural Information Diffusion. 104105 - Hang Gao, Tiegang Gao:

Reversible data hiding in encrypted image based on multiple linear regressions and adaptive adjustment of the prediction data. 104106 - Kamel Mohamed Faraoun

:
Extending constant-time simplified SWU mapping to handle twists of BLS24 and BLS48 pairing-friendly curves. 104107 - Wenhao Liu

, Chenhui Jin
:
Differential fault attack on the XOR version of SNOW 5G stream cipher. 104108 - Daniel Commey

, Matilda Nkoom
, Sena G. Hounsinou
, Garth V. Crosby
:
Blockchain-enabled dynamic honeypot conversion for resource-efficient IoT security. 104109 - Thomas Prantl

, Lukas Horn
, Simon Engel
, André Bauer
, Samuel Kounev
:
Quo Vadis CKKS: Comparison of the realization of basic mathematical functions for the homomorphic cryptosystem CKKS using De Bello and polynomial approximations. 104110 - Jinyuan Liu

, Yong Wang
, Kun Wang, Zhuo Liu:
A secure and efficient face template protection scheme based on chaos. 104111 - Arslan Shafique, Abid Mehmood, Moatsum Alawida, Abdul Nasir Khan

:
Enhancing privacy in data transmission between IoT devices: A robust encryption and embedding framework for secure and meaningful image communication. 104112 - Xiaobing Shi, Jiawen Wu

, Yifan Xu
, Zhimei Sui, Lifei Wei
, Kai Zhang
:
VMC2-PS: Blockchain-based multi-copy data Pub/Sub service with fine-grained access control for multi-cloud storage. 104113 - Chunming Zhang

, Fengji Luo:
Bargaining game theoretical analysis framework for ransomware attacks. 104115 - Mansi Gupta, Mohit Kumar

, Renu Dhir:
Privacy-preserving federated learning in asynchronous environment using homomorphic encryption. 104116 - Claudia Greco

, Michele Ianni
:
A cross-architecture malware detection approach based on intermediate representation. 104117 - Chen Liang, Ziqi Wang, Xuan Sun

, Thar Baker
, Yuanzhang Li, Ning Shi:
Gradient whispering in decentralized federated learning: Covert channel through AI model update paths. 104118 - Jiajia Wu

, Ming Xu
:
Covert secret-key agreement based on rate-splitting polar code. 104119 - David Escudero García

, Noemí DeCastro-García
:
Conformal prediction for labelling and updating online models in the presence of concept drift in cybersecurity. 104120 - Partha Sarathi Chakraborty

, Somanath Tripathy
:
SESIV: Secure and efficient smart contract based integrity verification of outsourced data. 104121 - Dongmei Zhao, Huiqian Song, Shuiguang Zeng

:
SDT-CNN-based network security situation awareness. 104122 - Yuan Zhai, Haochen Yang, Jingyu Yao

, Tao Wang, Yanwei Zhou, Feng Zhu, Bo Yang:
DRAC: A dynamic fine-grained access control scheme for cloud storage with censorship-coerced resistance. 104123 - Ziqi Liu, Yuan Guo, Liansuo Wei, Debao Jia, Liying Zou:

Multi-image hiding based on deep learning reconstruction enhancement and channel replacement. 104124 - Luis Ibañez-Lissen

, Lorena González-Manzano
, José María de Fuentes, Nicolas Anciaux:
LPASS: Linear Probes as Stepping Stones for vulnerability detection using compressed LLMs. 104125 - Md Sabuj Khan

, Ting Zhong
, Fan Zhou, Hengjian Li:
Secure and cancelable fingerprint templates with privacy-preserving mapping and template encoding. 104126 - Vasilis Ieropoulos

, Eirini Anthi
, Theodoros Spyridopoulos
, Pete Burnap, Ioannis Mavromatis
, Aftab Khan
, Pietro Carnelli
:
Collaborative intrusion detection in resource-constrained IoT environments: Challenges, methods, and future directions a review. 104127 - Luyao Yang, Weiming Tong

, Zhongwei Li, Jinxiao Zhao, Feng Pan, Xianji Jin:
PECD-DSIIoT: Privacy-enhanced cross-domain data sharing scheme for IIoT. 104128 - Afamefuna Umejiaku

, Moroti Sonde
, Victor S. Sheng
:
Enhancing password security with honeywords and LLMs. 104129 - Tolgahan Gulsoy

, Elif Kanca Gulsoy
, Arda Ustubioglu, Beste Ustubioglu, Elif Baykal Kablan, Selen Ayas
, Güzin Ulutas, Gul Tahaoglu
, Mohamed Elhoseny:
Detecting audio splicing forgery: A noise-robust approach with Swin Transformer and cochleagram. 104130 - Yijie Lin, Chia-Chen Lin, Ching-Chun Chang, Chin-Chen Chang:

Hiding information in encrypted images with ( ) secret sharing for IoT and cloud services. 104137 - Deyu Tong

, Hongxin Han, Can Li, Fengting Wang
, Weilong Kong, Na Ren:
ConZWNet: A contrastive learning-based zero-watermarking network for high robustness and distinguishability. 104139 - Tamir Tassa

, Lihi Dery
, Arthur Zamarin
:
Secure order based voting using distributed tallying. 104141 - Wenxuan Xu, Xiaolong Xu

, Huaqun Wang:
Fed-HA: A Privacy-Preserving Robust Federated Learning Scheme based on Homomorphic Assessment. 104144 - Yang Yang

, Xiangjie Huang, Han Fang
, Weiming Zhang:
IPMN: Invertible privacy-preserving mask network with intellectual property protection. 104149 - Xiaoyi Ge, Xiongwei Zhang, Meng Sun

, Yimin Wang, Li Li, Kunkun SongGong:
Cross-domain redundancy exploration by a deep encoder-decoder network for speech steganography. 104150 - Pengbo Liu

, Lin Teng
, Herbert Ho-Ching Iu, Mingxu Wang, Qi Li
, Xianping Fu:
High sensitivity image encryption algorithm based on cascaded chaotic system. 104153 - Amir Javadpour

, Forough Ja'fari, Chafika Benzaïd, Tarik Taleb
:
An optimized reinforcement learning based MTD mutation strategy for securing edge IoT against DDoS attack. 104138 - Abrar Chowdhury

, Machbah Uddin
, Md. Rakib Hassan, Muhammad Mustagis Billah
:
Image encryption algorithm based on DNA sequence-driven key scrambling and secure hashing. 104140 - Mingjun Ma, Tiantian Zhu, Jie Ying, Yu Cheng, Jiayuan Chen, Jian-Ping Mei, Xue Leng

, Xiangyang Zheng, Zhengqiu Weng:
ThreatCog: An adaptive and lightweight mobile user authentication system with enhanced motion sensory signals. 104142 - Peng Yang, Zhuoyang Xie, Hongmei Pei, Tianwai Zhou, Kun Song:

A secure distributed resolution model for industrial internet identifier based on ordered multi-group signature. 104143 - Cristian H. Martins de Souza, Túlio Pascoal, Emidio P. Neto, Galileu B. Sousa, Francisco Sales de Lima Filho

, Daniel M. Batista
, Felipe Sampaio Dantas da Silva
:
SDN-based solutions for malware analysis and detection: State-of-the-art, open issues and research challenges. 104145 - Jiale Liao, Huanyu Wang, Junnian Wang, Yun Tang:

Switch-T: A novel multi-task deep-learning network for cross-device side-channel attack. 104146 - Peifang Ni

, Jing Xu
:
ppLeader: Achieving the Privacy-Preserving Leaders in PoS Protocols. 104147 - Weinan Liu, Jiawen Shi, Hong Wang, Tingting Chen, Zhaoyang Han, Qingqing Li:

Coordinate plane based authentication method for detecting clone node in wireless sensor networks. 104148 - Xian Guo, Yongjie Zhao, Yudan Cheng, Wenjuan Jia

, Yongbo Jiang:
AsCred: An anonymous credential system based on batch partial blind signature and polymath. 104151 - Mahzabin Tamanna

, Mohd Anwar, Joseph D. W. Stephens:
Security implications of user non-compliance behavior to software updates: A risk assessment study. 104152 - Yali Liu, Yuliang Lu, Rui Wang

, Yongqiang Yu
, Xuehu Yan
:
Multi-image secret sharing for general access structure without size expansion. 104154 - Ke Li, Xinrong Sun, Yunting Tao, Fanyu Kong

, Guoqiang Yang, Chunpeng Ge, Qiuliang Xu:
Efficient privacy-preserving outsourcing of imbalanced clustering in cloud computing. 104155 - Yi-Hua Zhou, Xiongkai Liu, Yu-Guang Yang, Weimin Shi, Zhenhu Ning:

Lattice-based forward and backward secure group signature with selective linkability for VANETs. 104156 - Zhen-Zhen Li, Zhao Zhang, Ya-Jing Li, Dong-Fei Wang, Han Zhang:

Multi-party quantum homomorphic encryption scheme based on quantum teleportation. 104157 - Stefano Berlato, Roberto Carbone, Silvio Ranise

:
A methodology for the experimental performance evaluation of Access Control enforcement mechanisms based on business processes. 104158 - Lixin Zhang, Xinyan Gao, Bihe Zhao

, Zhenyu Guan, Song Bian:
GRAMSSAT: An efficient label inference attack against two-party split learning based on gradient matching and semi-supervised learning. 104159 - Khanh Luong, Arash Mahboubi, Geoff Jarrad, Seyit Camtepe

, Michael Bewong
, Mohammed Bahutair, Hamed Aboutorab
, Hang Thanh Bui
:
ConceptUML: Multiphase unsupervised threat detection via latent concept learning, Hidden Markov Models and topic modelling. 104160 - Binghao Xu, Shuai Wang

, Youliang Tian
:
Efficient verifiable secure aggregation protocols for federated learning. 104161 - Dincy R. Arikkat, P. Vinod, Rafidha Rehiman K. A., Serena Nicolazzo

, Marco Arazzi
, Antonino Nocera
, Mauro Conti
:
DroidTTP: Mapping android applications with TTP for Cyber Threat Intelligence. 104162 - Suriya U.-ruekolan, Manot Rattananen, Jukkrapong Ponharn, Naiyana Sahavechaphan:

Enforcing data access control and privacy: The graph-driven data regulatory approach. 104163 - Kun Gao

, Tianqing Zhu, Dayong Ye, Longxiang Gao, Wanlei Zhou
:
Federated Unlearning With Reinforcement Learning: Adaptive Privacy Preservation for Clients. 104164 - Parnika Bhat, Ajay K. Sharma, Geeta Sikka:

GHR-Optimizer: An ensemble-based feature selection approach for classifying android malware. 104165 - Ye Su, Lili Li, Yongxiang Liu, Yushu Zhang, Yichen Ye, Xiao Jiang, Zhuang Chen, Yiyuan Xie:

A novel scheme to encrypting autonomous driving scene point clouds based on optical chaos. 104166 - Li Li, Xinpeng Zhang, Guorui Feng, Zichi Wang, Deyang Wu, Hanzhou Wu:

Robust watermarking for diffusion models based on STDM and latent space fine-tuning. 104167 - Shaowu Wu, Yimao Guo, Liting Zeng, Xiaolin Yin, Wei Lu:

Robust watermarking based on optimal synchronization signal. 104168 - Haihua Zhu, Yu Cheng, Xiuli Song, Yunlong Zhou, Fan Liu, Zigang Chen:

Enhancing transparency and traceability in complex supply chains: Fine-grained access control, accuracy evaluation, and secure storage. 104169 - Yacine Belhocine

, Abdallah Meraoumia
, Hakim Bendjenna, Lakhdar Laimeche, Wojdan Binsaeedan
, Waad Alhoshan, Mohamed Gasmi
:
MedBioCh: Advancing security and privacy in digital healthcare with revocable biometric systems and blockchain. 104170 - Han Cao, Qindong Sun, Rong Geng, Xiaoxiong Wang, Rui Yang

:
Decision attribution and local extremum-guided black-box adversarial attack with adjustable sparsity and discreteness. 104172 - Hoang V. Vo

, Hanh Phuong Du
, Hoa N. Nguyen
:
MDOB: Enhancing resilient and explainable AI-powered malware detection using feature set optimization and Mutual Deep+Boosting Ensemble Inference. 104175 - Xiang Zhang, Fei Peng

, Lizhi Xiong, Zhangjie Fu:
An end-to-end image hiding model based on skip connected dense block and edge loss. 104180 - Cheng-Ta Huang

, Thi Thu-Ha Dang, Chi-Yao Weng:
Reversible data hiding in encrypted images based on bidirectional encoding for payload enhancing. 104183 - Jiajun Wang, Sha Ma, Qiong Huang:

Verifiable keyword searchable encryption with enhanced security using aggregate key in blockchain-based smart healthcare. 104173 - Samuel Wairimu

, Leonardo Horn Iwaya, Lothar Fritsch
, Stefan Lindskog:
Understanding practitioner perspectives on using privacy harm categories for privacy risk assessment. 104174 - Tomás Pelayo-Benedet

, Ricardo J. Rodríguez
, Carlos Hernandez Gañán
:
The machines are watching: Exploring the potential of Large Language Models for detecting Algorithmically Generated Domains. 104176 - Ghada Alsuhli, Hani H. Saleh

, Mahmoud Al-Qutayri, Baker Mohammad, Thanos Stouraitis
:
Efficient NTT/INTT processor for FALCON post-quantum cryptography. 104177 - Ponjit Borgohain, Hiten Choudhury

:
D2DSec: An efficient quantum-safe authentication scheme for secure in coverage Device-to-Device communication in 5G networks. 104178 - Linh Hoang Dinh, Tran Thi Luong

, Van Long Nguyen:
New proofs for pseudorandomness of HMAC-based key derivation functions (RFC 5869). 104179 - Ao Liu, Jing Chen, Shixiong Yao, Kun He, Ruiying Du:

An auditable and privacy-preserving user-controllable group signature scheme in blockchain. 104181 - Wen Khai Lai, Ming Jie Lee, KaiLin Chia

, Yen-Lung Lai:
Improved biometric data protection: Bounded brute-force strategy for maximum likelihood decoding. 104182 - Aissa Ben Yahya

, Hicham El Akhal
, Abdelbaki El Belrhiti El Alaoui
:
Improving critical infrastructure security through hybrid embeddings for vulnerability classification. 104185 - Kumar Anurupam

, Karthick Seshadri:
Lightweight representation learning for network traffic towards malicious traffic detection in edge devices. 104186 - Huanwei Wang

, Fushan Wei, Fagen Li
, Jing Jing
, Tieming Liu, Wei Liu
:
A feature vector-based modeling attack method on symmetrical obfuscated interconnection PUF. 104187 - Iman Mirzaali, Alireza Javadi, Sadegh Sadeghi, Peyman Pahlevani, Nasour Bagheri, Ygal Bendavid

, Samad Rostampour:
Evaluating security pitfalls of ultra-lightweight IoT authentication: A critical analysis of permutation functions. 104188 - Qinghao Li, Wei Liu

, Yisen Wang
, Weiyu Dong:
MLAF-VD: A vulnerability detection model based on multi-level abstract features. 104189 - Qiqi Xie, Hong Zhang, Liqiang Wang, Miao Wang, Wanqing Wu, Yilong Liu

:
SecureLoc: A fully homomorphic encryption-based privacy protection scheme for location-based services. 104190 - Masumeh Najibi, Amir Jalaly Bidgoly:

Towards a robust android malware detection model using explainable deep learning. 104191 - Sana Said

, Jalel Eddine Hajlaoui, Mohamed Nazih Omri:
New privacy-respecting access control-based approach for data placement in an Internet of Things environment. 104192 - Guangyun Yang, Xinhui Lu, Yu Lu, Xiangguang Xiong

:
Robust zero-watermarking method for medical images based on FFST and Daisy descriptor. 104193

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














