


default search action
13th SpaCCS 2020: Nanjing, China
- Guojun Wang

, Bing Chen
, Wei Li
, Roberto Di Pietro
, Xuefeng Yan, Hao Han
:
Security, Privacy, and Anonymity in Computation, Communication, and Storage - 13th International Conference, SpaCCS 2020, Nanjing, China, December 18-20, 2020, Proceedings. Lecture Notes in Computer Science 12382, Springer 2021, ISBN 978-3-030-68850-9 - Min Xiao, Zhongyue Ma, Tao Li:

Privacy-Preserving and Scalable Data Access Control Based on Self-sovereign Identity Management in Large-Scale Cloud Storage. 1-18 - Jinyin Chen

, Xueke Wang
, Yan Zhang, Haibin Zheng, Shouling Ji:
Attention Mechanism Based Adversarial Attack Against Deep Reinforcement Learning. 19-43 - Xinyu Song, Zhan Zhou, Weijie Duan, Zhongyi Liu, Chungen Xu

:
Attribute-Based Searchable Encryption Scheme with Fuzzy Keywords. 44-61 - Yu Zhu, Zongfei Li, Fengyuan Xu, Sheng Zhong:

Improving Deep Neural Network Robustness with Siamese Empowered Adversarial Training. 62-75 - Zitong Li, Xiang Cheng, Jiale Zhang, Bing Chen:

Predicting Advanced Persistent Threats for IoT Systems Based on Federated Learning. 76-89 - Chenyu Zhao, Hao Han:

DFspliter: Data Flow Oriented Program Partitioning Against Data Stitching Attacks. 90-103 - Ziyan Fang, Weijun Zhang, Zongfei Li, Huaao Tang, Hao Han, Fengyuan Xu:

Revisiting Attacks and Defenses in Connected and Autonomous Vehicles. 104-117 - Wei Peng

, Shang Song
, Wenzheng Liu
:
An Improved Cryptanalysis Algorithm for Chebyshev Map-Based Discrete Logarithm Problem. 118-130 - Ze Liu:

Reinforcement-Learning Based Network Intrusion Detection with Human Interaction in the Loop. 131-144 - Zhengdong Cui, Feng Xu:

Research on Security of Access Control for Cloud Computing Environment. 145-158 - Panfei Liu, Feng Xu, Ying Zhu:

Research and Development of Privacy Protection of WSN Routing Protocol. 159-172 - Vincent C. Hu:

Apply Quantum Search to the Safety Check for Mono Operational Attribute Based Protection Systems. 173-187 - Xiangtong Du

, Yongzhong Li, Zunlei Feng:
A Semi-supervised Intrusion Detection Algorithm Based on Auto-encoder. 188-199 - Pengfei Guo

, Yingjian Yan, Chunsheng Zhu, Junjie Wang:
Research on Arm TrustZone and Understanding the Security Vulnerability in Its Cache Architecture. 200-213 - Ha Xuan Son, Hai Trieu Le, Tan Tai Phan, Hung Nguyen Duc Huy, Hong Khanh Vo

, Nghia Duong-Trung:
Scrutinizing Trust and Transparency in Cash on Delivery Systems. 214-227 - Cheng Chi Qin, Tan Saw Chin, Ching Kwang Lee, Zulfadzli Yusoff, Rizaluddin Kaspin:

Expansion Adaptation of Attack-Aware Controller-Link-Switch Cost Minimization Placement in Software-Defined Networking. 228-240 - Fengpan Zhao, Yan Huang, Saide Zhu, Venkata Malladi, Yubao Wu:

A Weighted Federated Averaging Framework to Reduce the Negative Influence from the Dishonest Users. 241-250 - Wei-Yang Chiu

, Weizhi Meng
, Wenjuan Li
:
I Can Think Like You! Towards Reaction Spoofing Attack on Brainwave-Based Authentication. 251-265 - Hongwei Luo, Wanyi Feng, Baolin Sun, Ying Song:

Cubic Permutation Polynomials-Based Block RLNC Algorithm in Wireless Networks. 266-275 - Seyedvalyallah Ayobi, Yongli Wang, Mahdi Rabbani, Ali Dorri, Hamed Jelodar, Hucheng Huang, Siamak Yarmohammadi:

A Lightweight Blockchain-Based Trust Model for Smart Vehicles in VANETs. 276-289 - Gaofei Sun, Xiaoshuang Xing, Zhenjiang Qian, Zhiguo Wang, Saide Zhu:

Light Intensity Based IoT Device Positioning for Indoor Monitoring. 290-300 - Gongzhe Qiao

, Yi Zhuang
:
A Blockchain-Based Reconstruction Framework for UAV Network. 301-311 - Yihong Wen, Yi Yang, Shicheng Wang, Li Li, Min Luo:

A New Certificateless Aggregate Signature Scheme for Wireless Sensor Networks. 312-330 - Muhammad Shakeel Faridi

, Saqib Ali
, Guihua Duan
, Guojun Wang
:
Blockchain and IoT Based Textile Manufacturing Traceability System in Industry 4.0. 331-344 - Sai Lu, Yi Zhuang:

A Network Security Situational Awareness Framework Based on Situation Fusion. 345-355 - Songpeng Zhang, Yi Zhuang, Zining Cao:

Intelligent Medical Security Framework of Body Area Network Based on Fog Computing. 356-366 - Ruili Yang, Jiageng Chen

, Shangle Li
:
Secure and Traceable Attribute-Based Sequential Aggregate Signature. 367-381 - Shupeng Li, F. Jiang, Yunbai Qin, Kunkun Zheng:

Social Spammer Detection Based on PSO-CatBoost. 382-395 - Muhammad Zubair Baloch, Shahid Hussain, Humaira Afzal, Muhammad Rafiq Mufti, Bashir Ahmad:

Software Developer Recommendation in Terms of Reducing Bug Tossing Length. 396-407 - Khudema Zahra, Shahid Hussain, Humaira Afzal, Muhammad Rafiq Mufti, Dost Muhammad Khan, Mohammad Khalid Sohail:

A Methodology to Automate the Security Patterns Selection. 408-419

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














