


default search action
SPDE 2020: Quzhou, China
- Shui Yu

, Peter Mueller
, Jiangbo Qian:
Security and Privacy in Digital Economy - First International Conference, SPDE 2020, Quzhou, China, October 30 - November 1, 2020, Proceedings. Communications in Computer and Information Science 1268, Springer 2020, ISBN 978-981-15-9128-0
Cyberspace Security
- Yan Xu

, Jinxing Ma
, Sheng Zhong:
Detection and Defense Against DDoS Attack on SDN Controller Based on Spatiotemporal Feature. 3-18 - Pu Zhao, Wentao Zhao, Qiang Liu

, Anbang Wang:
Trusted Link-Separation Multipath Selection for Software-Defined Wireless Sensor Networks in Adversarial Environments. 19-32 - Hongqing Huang

, Lin Zhang
:
Secure Radio Frequency DCS Watermark-Aided Physical Layer Authentication Design for NB-IoT Systems. 33-49 - Yifang Zhi, Li Yang, Gaolei Yang, Yuehong Zhang:

Protecting the Data Plane of SDN From Malicious Flow Entries Based on P4. 50-64 - Zhicheng Luo, Weijia Ding, Anmin Fu

, Zhiyi Zhang, Linjie Zhang:
High-Speed Network Attack Detection Framework Based on Optimized Feature Selection. 65-78 - Jiahua Zhu, Xianliang Jiang

, Guang Jin, Penghui Li:
CaaS: Enabling Congestion Control as a Service to Optimize WAN Data Transfer. 79-90 - Shuaishuai Zhu, Yiliang Han, Xiaoyuan Yang, Xuguang Wu:

Efficient and Evolvable Key Reconciliation Mechanism in Multi-party Networks Based on Automatic Learning Structure. 91-99 - Kun Li, Huachun Zhou, Zhe Tu, Bohao Feng:

CSKB: A Cyber Security Knowledge Base Based on Knowledge Graph. 100-113 - Gongxuan Zhang, Mingyue Zhang, Xinyi Fan:

Improvements Based on JWT and RBAC for Spring Security Framework. 114-128
Privacy Protection
- Hongbin Fan, Yining Liu, Zhixin Zeng:

Decentralizing Privacy-Preserving Data Aggregation Scheme Using Blockchain in Smart Grid. 131-142 - Xianjin Fang, Qingkui Zeng

, Gaoming Yang
:
Local Differential Privacy for Data Streams. 143-160 - Datong Wu, Xiaotong Wu

, Jiaquan Gao, Genlin Ji, Xiaolong Xu, Lianyong Qi, Wanchun Dou:
A Personalized Preservation Mechanism Satisfying Local Differential Privacy in Location-Based Services. 161-175 - Bruce Gu, Xiaodong Wang

, Youyang Qu, Jiong Jin
, Yong Xiang, Longxiang Gao:
Location-Aware Privacy Preserving Scheme in SDN-Enabled Fog Computing. 176-190 - Feng Wu:

PLFG: A Privacy Attack Method Based on Gradients for Federated Learning. 191-204 - Datong Wu, Xiaotong Wu

, Jiaquan Gao, Genlin Ji, Taotao Wu, Xuyun Zhang
, Wanchun Dou:
A Survey of Game Theoretical Privacy Preservation for Data Sharing and Publishing. 205-216
Anomaly and Intrusion Detection
- Ying Zhao, Junjun Chen, Qianling Guo, Jian Teng, Di Wu

:
Network Anomaly Detection Using Federated Learning and Transfer Learning. 219-231 - Xiaolong Deng

, Zhengge Dai, Mingdong Sun, Tiejun Lv
:
Variational Autoencoder Based Enhanced Behavior Characteristics Classification for Social Robot Detection. 232-248 - Yang Song, Zhuzhu Wang, Junwei Zhang, Zhuo Ma, Jianfeng Ma:

A Decentralized Weighted Vote Traffic Congestion Detection Framework for ITS. 249-262 - Mu Han

, Pengzhou Cheng, Shidian Ma:
CVNNs-IDS: Complex-Valued Neural Network Based In-Vehicle Intrusion Detection System. 263-277 - Weidong Zhai, Zhou Su:

Intrusion Detection Scheme for Autonomous Driving Vehicles. 278-291 - Chenjun Tang, Hai Liang, Yong Ding, Yujue Wang, Shijie Tang:

Hyperparameter Optimization of ICS Intrusion Detection Classifier Based on Improved Hybrid Algorithm. 292-305
Trust Computation and Forensics
- Duo Zhang, Xiaodong Zhang, Sheng Gao

, Youliang Tian:
Bitcoin-Based Anti-collusion Fair Payments for Outsourcing Computations in Cloud Computing. 309-321 - Xiaoxia Jiang, Youliang Tian

:
Rational Delegation of Computation Based on Reputation and Contract Theory in the UC Framework. 322-335 - Shenchen Zhu, Ziyan Zhang, Liquan Chen, Hui Chen, Yanbo Wang:

A PBFT Consensus Scheme with Reputation Value Voting Based on Dynamic Clustering. 336-354 - Shanshan Li, Chunxiang Xu, Yuan Zhang, Xinsheng Wen:

Multi-user Dynamic Symmetric Searchable Encryption for Attribute-Value Type Database in Cloud Storage. 355-368 - Hu Xiong, Jinhao Chen, Minghao Yang, Xin Huang:

Revocable Attribute-Based Encryption Scheme with Arithmetic Span Program for Cloud-Assisted IoT. 369-383 - Li Ma, Jia Geng, Dongchao Ma, Yingxun Fu, Ailing Xiao:

A Multi-data Collaborative Encryption in Concealed Data Aggregation for WSNs. 384-398 - Laila Tul Badar

, Chungen Xu
, Ali Zakir
:
Multi-owner Encrypted Ranked Keyword Search Using Machine Learning Techniques. 399-412
Attacks and Countermeasures
- Diqun Yan

, Tingting Wu
:
Detection of Various Speech Forgery Operations Based on Recurrent Neural Network. 415-426 - Jie Wang, Rangding Wang, Li Dong, Diqun Yan:

Robust, Imperceptible and End-to-End Audio Steganography Based on CNN. 427-442 - Donghua Wang

, Rangding Wang, Li Dong, Diqun Yan, Xueyuan Zhang, Yongkang Gong:
Adversarial Examples Attack and Countermeasure for Speech Recognition System: A Survey. 443-468 - Wanping Liu, Zhaoping Li:

Enhancing Adversarial Examples with Flip-Invariance and Brightness-Invariance. 469-481 - Jun Yang, Mengyu Zhou, Baojiang Cui:

MLAB-BiLSTM: Online Web Attack Detection Via Attention-Based Deep Neural Networks. 482-492 - Yongmei Zhang, Jianzhe Ma, Qian Guo, Weifeng Lv:

A Moving Target Tracking Algorithm Based on Motion State Estimation and Convolutional Neural Network. 493-517 - Zitong Li, Jiale Chen, Jiale Zhang, Xiang Cheng, Bing Chen:

Detecting Advanced Persistent Threat in Edge Computing via Federated Learning. 518-532
Covert Communication
- Zhenxing Qian

, Zichi Wang
, Xinpeng Zhang
:
Data Computing in Covert Domain. 535-545 - Xueyuan Zhang, Rangding Wang, Li Dong, Diqun Yan:

Post-processing for Enhancing Audio Steganographic Undetectability. 546-559 - Jialin Li, Xiangyang Luo, Yi Zhang, Pei Zhang, Chunfang Yang, Fenlin Liu:

Steganalysis of Adaptive Steganography Under the Known Cover Image. 560-574
Security Protocol
- Minglu Zhang, Qixian Zhou, Shaopeng Liang, Haomiao Yang:

Improving Communication Efficiency for Encrypted Distributed Training. 577-590 - Yiwenjin Fu

, Huahui Chen, Jiangbo Qian
, Yihong Dong:
A PoL Protocol for Spatiotemporal Blockchain. 591-605 - Chenglong Yang, Cai Fu, Yekui Qian, Hong Yao, Guanyun Feng, Lansheng Han:

Deep Learning-Based Reverse Method of Binary Protocol. 606-624 - Shuaishuai Zhu, Yiliang Han:

Analysis Toward RLWE-Based Key Exchange Protocol Based on Automatic Learning Structure. 625-639
Anonymous Communication
- Pu Wang, Limei He, Zheng Yan

, Wei Feng:
AnonyTrust: An Anonymous Trust Authentication System for Pervasive Social Networking. 643-660 - Meng Shen, Junxian Duan, Ning Shang, Liehuang Zhu:

Transaction Deanonymization in Large-Scale Bitcoin Systems via Propagation Pattern Analysis. 661-675 - Qichao Lai, Li Xu, Manli Yuan, Feng Wang, He Fang:

User Privacy-Preserving Scheme Based on Anonymous Authentication in Smart Grid. 676-691
Security and Privacy from Social Science
- Jun Hou, Yutao Song, Qianmu Li, Huaqiu Long

, Jian Jiang:
Behavior Prediction and Its Design for Safe Departure Intervals Based on Huang Yan-Pei Thought. 695-710 - Yu Wu

, Li Pan, Fang Liu:
Making Privacy Protection Investment Decisions in Social Networks: An Interdependent Security Game Approach. 711-725 - Hongyan Zhang, Li Xu, Limei Lin, Xiaoding Wang:

De-anonymizing Social Networks with Edge-Neighborhood Graph Attacks. 726-737 - Peng Yang

, Yan Zhang, Qiming Wu
, Dapeng Wu
, Zhidu Li
:
User Grouping Privacy-Preserving Strategy Based on Edge Computing for Mobile Crowdsensing. 738-749

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














