


default search action
Cybersecurity, Volume 8
Volume 8, Number 1, December 2025
- Xiaogang Xing, Ming Xu

, Yujing Bai, Dongdong Yang:
A graph backdoor detection method for data collection scenarios. 1 - Laura Quiroga-Sánchez, Germán Adolfo Montoya, Carlos Andres Lozano-Garzon:

The SEIRS-NIMFA epidemiological model for malware propagation analysis in IoT networks. 2 - Xueqi Zhu, Fangzhou Liu, Yan Jia, Jun Xu, Peng Wang

:
Cryptanalysis of IAR-CTR and IAR-CFB and a fixing method. 3 - Yucheng Ma, Peisong Shen, Xue Tian, Kewei Lv, Chi Chen:

Reusable and robust fuzzy extractor for CRS-dependent sources. 4 - Malte Kerl

, Ulf Bodin, Olov Schelén:
Privacy-preserving attribute-based access control using homomorphic encryption. 5 - Lin Wu, Yulai Xie, Jin Li, Dan Feng, Jinyuan Liang, Yafeng Wu:

Angus: efficient active learning strategies for provenance based intrusion detection. 6 - Hongfang Zhou, Heng Pan, Kangyun Zheng, Zongling Wu, Qingyu Xiang:

A novel oversampling method based on Wasserstein CGAN for imbalanced classification. 7 - Jian Zheng, Shumiao Ren, Jingyue Zhang, Yu Kui, Jingyi Li, Qin Jiang, Shiyan Wang:

Detection to false data for smart grid. 8 - Guangli Wu, Xingyue Wang:

A privacy-enhanced framework with deep learning for botnet detection. 9 - Lianglin Yan

, Ming Luo, Mingsheng Wang:
Speedup signing: pre-rejection sampling towards dilithium. 10 - Huanwei Wang

, Weining Hao, Yonghe Tang, Bing Zhu, Weiyu Dong, Wei Liu:
Deep neural network modeling attacks on arbiter-PUF-based designs. 11 - Ri Wang, Chen Li

, Kun Zhang, Bibo Tu:
Zero-trust based dynamic access control for cloud computing. 12 - Ruiqi Huang, Hua Wu

, Xiaohui Wang, Guang Cheng, Xiaoyan Hu:
The secret behind instant messaging: video identification attack against complex protocols. 13 - Han Zhang, Yong Shi, Ming Liu, Libo Chen, Songyang Wu

, Zhi Xue:
A combined feature selection approach for malicious email detection based on a comprehensive email dataset. 14 - Yaqi Yang, Jun'e Li

, Tao Zhang, Lu Chen, Guirong Huang, Zhuo Lv:
IRMAOC: an interpretable role mining algorithm based on overlapping clustering. 54 - Jie Zhang

, Haoyu Bu, Hui Wen, Yongji Liu, Haiqiang Fei, Rongrong Xi, Lun Li, Yun Yang, Hongsong Zhu, Dan Meng:
When LLMs meet cybersecurity: a systematic literature review. 55 - Qiuxiang Li, Jianping Wu:

Efficient network attack path optimization method based on prior knowledge-based PPO algorithm. 15 - Yanjun Li

, Lixian Zhang, Yiping Lin, Jian Liu, Yani Sun:
Integral cryptanalysis on reduce-round SAILFISH-I. 16 - Tian Tian, Chen Zhang, Bo Jiang, Huamin Feng, Zhigang Lu:

Insider threat detection for specific threat scenarios. 17 - Weixuan Tang, Yuan Rao

, Zuopeng Yang, Fei Peng, Xutong Cui, Junhao Huang, Peijun Zhu:
Reversible generative steganography with distribution-preserving. 18 - Kai He, Shengyuan Shi, Chunxiao Yin, Hongyan Wan, Jiaoli Shi:

Private, efficient, and flexible: protecting names based on message-derived encryption in named data networking. 19 - Shihao Zhang, Yanhui Xiao, Huawei Tian, Xiaolong Li:

A multi-image steganography: ISS. 20 - Yaguan Qian, Renhui Tao, Huabin Du

, Bin Wang:
Unveiling the veil: high-frequency components as the key to understanding medical DNNs' vulnerability to adversarial examples. 21 - Zezhou Hou, Jiongjiong Ren

, Shaozhen Chen:
Improved machine learning-aided linear cryptanalysis: application to DES. 22 - Jiachen Zhang, Daoqi Han, Zhaoxuan Lv, Yueming Lu

, Junke Duan, Yang Liu, Xinyu Zhang:
Bag2image: a multi-instance network traffic representation for network security event prediction. 31 - Pengcheng Zhu, Xin Jin, Qian Jiang, Xueshuai Gao, Puming Wang, Shaowen Yao, Wei Zhou:

Transferable adversarial attacks for multi-model systems coupling image fusion with classification models. 23 - Mir Nazish

, Munika Javid
, M. Tariq Banday
:
Enhanced logistic map with infinite chaos and its applicability in lightweight and high-speed pseudo-random bit generation. 24 - Nan Liu, Chenhui Jin, Junwei Yu

:
Key committing attack on Tiaoxin-346 algorithm. 25 - Mengmeng Ge, Ruitao Feng

, Likun Liu, Xiangzhan Yu, Vinay Sachidananda, Xiaofei Xie
, Yang Liu:
Enmob: Unveil the Behavior with Multi-flow Analysis of Encrypted App Traffic. 26 - Yalu Wang

, Zhijie Han, Ying Du, Jie Li, Xin He:
BS-GAT: a network intrusion detection system based on graph neural network for edge computing. 27 - Chen Yang Lin, Hui Zhao

, Jing Han Liu:
A lightweight vulnerability detection method for long smart contracts based on bimodal feature fusion. 28 - Yuan Zhang, Jiaru Song, Yongxiong Sun, Zhanheng Gao, Zhe Hu, Minghui Sun

:
Federated two-stage transformer-based network for intrusion detection in non-IID data of controller area networks. 29 - Shujiao Cao

, Rui Xue:
Quantum commitments from structured one-way quantum state generators, and more. 30 - Birong Xu

, Ximei Ye, Xiaoyuan Wang, Zhipeng Zhang:
Image encryption scheme based on compressed sensing and fractional quantum logistic-tent map. 56 - Ying Gao

, Lin Qi:
Upper bounds of differential branch number of n-bit permutations. 58 - Rodrigo Castillo Camargo, Juan Murcia Nieto, Nicolás Rojas, Daniel Díaz López, Santiago Alférez, Ángel Luis Perales Gómez, Pantaleone Nespoli, Félix Gómez Mármol, Umit Karabiyik:

DEFENDIFY: defense amplified with transfer learning for obfuscated malware framework. 97 - Shihao Zhang, Yanhui Xiao, Huawei Tian, Xiaolong Li:

Correction: A multi-image steganography: ISS. 99 - Jingqiang Liu, Ruigang Liang, Xiaoxi Zhu, Yue Zhang, Yuling Liu, Qixu Liu:

LLM4TDG: test-driven generation of large language models based on enhanced constraint reasoning. 32 - Daniel Scheliga

, Patrick Mäder
, Marco Seeland
:
Privacy preserving federated learning with convolutional variational bottlenecks. 33 - Qinggan Fu, Ye Luo, Qianqian Yang, Ling Song

:
Preimage and collision attacks on reduced Ascon using algebraic strategies. 34 - Mohammad Alshinwan, Osama Ahmed Khashan

, Zakwan Al-Arnaout
, Salam Salameh Shreem, Ahmed Younes Shdefat, Nader Abdel Karim:
A novel Smishing defense approach based on meta-heuristic optimization algorithms. 35 - Yuxin Tong, Shimin Li, Zhiwei Wang, Rui Zhang, Rui Xue:

Adaptively secure, splittable, and robust threshold unsigncryption. 57 - Xinxin Yue

, Zhiyong Zhang
, Junchang Jing, Weiguo Wang:
Ctta: a novel chain-of-thought transfer adversarial attacks framework for large language models. 36 - Mohammad Moshawrab, Mehdi Adda, Abdenour Bouzouane, Hussein Ibrahim, Ali Raad:

HP_FLAP: homomorphic and polymorphic federated learning aggregation of parameters framework. 37 - Jesús E. Díaz Verdejo, Rafael Estepa

, Antonio Jose Estepa
, Javier Muñoz-Calle
, Germán Madinabeitia
:
Building a large, realistic and labeled HTTP URI dataset for anomaly-based intrusion detection systems: Biblio-US17. 38 - Yu Wei, Lei Bi, Kunpeng Wang, Xianhui Lu:

An improved BKW algorithm on the learning with rounding problem. 39 - Qinyou Huang, Luping Wang, Jie Chen:

An efficient video slice encryption scheme and its application. 40 - Yajie Guo, Shujuan Ji

, Xianwen Fang, Dickson K. W. Chiu, Ning Cao, Ho-fung Leung:
An Unsupervised Fake News Detection Framework Based on Structural Contrastive Learning. 41 - Sai Hu, Ruwei Huang, Liang Zhou:

An efficient multi-key BFV fully homomorphic encryption scheme with optimized relinearization. 42 - Liyou Liu, Ming Xu

:
A network intrusion detection method based on contrastive learning and Bayesian Gaussian Mixture Model. 59 - Zhuoyu Tian, Lei Chen, Shengyu Fan, Xianglong Deng, Rui Hou, Dan Meng, Mingzhe Zhang:

LP-HENN: fully homomorphic encryption accelerator with high energy efficiency. 98 - Shuguang Yuan

, Jing Yu, Tengfei Yang, Chi Chen:
Unitanony: a fine-grained and practical anonymization framework for better data utility. 43 - Xiaoxi Wang, Zhenxu Liu, Chunyang Zheng, Xinyu Liu

, Wei Liu, Yuling Liu, Qixu Liu:
XFP-recognizer: detecting cross-file browser fingerprinting. 44 - Zibo Zhou, Zongyang Zhang

, Jianwei Liu, Haifeng Qian:
Efficient inner product arguments with sublogarithmic proof and sub-square-root verifier. 45 - Shancheng Zhang, Gang Qu, Zongyang Zhang

, Minzhe Huang, Haochun Jin, Liqun Yang:
Efficient and secure multi-party computation protocol supporting deep learning. 46 - Qianqian Jiang, Chunrong Zhang, Ning Li

, Dickson K. W. Chiu, Xianwen Fang, Shujuan Ji:
Spammer group detection based on cascading and clustering of core figures. 47 - Yatao Yang

, Zhaofu Li, Yucheng Ding, Man Hu:
MAT-FHE: arbitrary dimension matrix multiplication scheme for floating point over fully homomorphic encryption. 48 - Yong Wang, Qiancheng Wan

, Yifan Wu, Lijie Chen:
Grouped Byzantine fault tolerant consensus algorithm based on aggregated signatures. 60 - Birou Gao, Rui Zhang

, Yang Tao, Shihan Qin:
Cocoon: certificateless blockchain wallet supporting both stealth address and revocation. 100 - Nagaraj Hediyal

, B. P. Divakar, K. Narayanaswamy:
SCAN-C: a lightweight cryptographic algorithm to secure CAN communications in modern vehicles. 49 - Anton Firc

, Kamil Malinka, Petr Hanácek:
Evaluation framework for deepfake speech detection: a comparative study of state-of-the-art deepfake speech detectors. 50 - Junming Mo, Ming Xu

, Xiaogang Xing:
Clean-label backdoor attack on link prediction task. 51 - J. Jithish, Nagarajan Mahalingam, Bo Wang, Kiat Seng Yeo

:
Towards enhancing security for upcoming 6G-ready smart grids through federated learning and cloud solutions. 61 - Xue Zhou, Guihe Qin, Yanhua Liang, Jiaru Song, Wanning Liu, Qingxin Liu:

CGTS: graph transformer-based anomaly detection in controller area networks. 62 - Qingwang Chen, Yuling Liu, Ru Tan, Ze Jin

, Juxin Xiao, Xiao Wang, Fangjiao Zhang, Qixu Liu:
Shadowkube: enhancing Kubernetes security with behavioral monitoring and honeypot integration. 63 - Tingli Yuan, Yunhua He, Pengyue Xiao, Ke Xiao, Bin Wu:

A Blockchain-based cross-platform authentication scheme for EV aggregate charging platform. 64 - Zhaoyu Qiu

, Shishuai Yang, Yifan Yu, Yujia Luo, Wenrui Diao:
Understanding security risks in mobile-to-PC screen mirroring: an empirical study. 68 - Fan Zhou, Dongxia Wang

, Yanhai Xiong, Kun Sun, Wenhai Wang:
Androfim: few-shot android malware family detection based on image representation. 69 - Yunlv Lv, Rui Zhang

, Yang Tao, Zeshuo Zhu:
Faster threshold-SM2 with identifiable abort and non-interactive online signing. 70 - Mir Nazish

, M. Tariq Banday:
e-CM: A novel approach to advancing chaotic dynamics in discrete one-dimensional maps for secure IoT applications. 71 - Xiaotong Dong, Bo Li, Xiaojie Zhu, Yong Li, Weiping Wang:

Efficient shortest distance approximate query on large scale encrypted graph data. 102 - Kavita S. Kumavat

, Joanne Gomes:
Multi-layer DDoS attacks detection with mitigation in IoT-enabled sensor network. 72 - Yali Yuan, Jian Ge

, Guang Cheng:
A network flow fingerprinting method with adaptive embedding strength. 73 - Wanqing Wu, Jipeng Zhou

:
Development and application of new 2D Cubic-Sine hyperchaotic map. 74 - Zhuobin Hu, Jiabei Wang

, Zhengkai Chen, Zhaoxuan Ge, Mingyu Bian, Lei Chen, Yongbin Zhou:
SEAC: dynamic searchable symmetric encryption with lightweight update-search permission control. 75 - Yuan Liu

, Licheng Wang, Yongbin Zhou:
A novel CLWE-based attribute-based encryption scheme from lattices with privacy preserving. 76 - Hailong Yu, Chingfang Hsu, Lein Harn, Zhuo Zhao:

A new robust PKC encryption method based on invertible matrix multiplication for HIE in medical IoT systems. 77 - Zijin Lin

, Jinwen He, Yue Zhao, Ruigang Liang, Hu Li, Zhendong Wu:
EGRTE: adversarially training a self-explaining smoothed classifier for certified robustness. 78 - Chenxu Pei, Huiying Du, Xuan Sun

:
Classifying encrypted traffic using quad-directional convolution on pulse sequences. 79 - Jianming Li, Ye Wang, Yan Jia, Liyi Zeng, Wenying Feng, Xiao Jing, Cui Luo, Zhaoquan Gu, Binxing Fang:

IL-IDS: an incremental learning approach with confined data streams for intrusion detection. 80 - Zhiming Li

, Shuquan Zhou, Xiaokan Luo, Heping Wei, Guangkang Zhang:
CAFLnet: a network protocol fuzzing framework based on selection algorithm with enhanced contextual information. 81 - Junxiu Liu, Zhewei Liang, Yuling Luo, Qiang Fu, Sheng Qin, Junjie Liu:

A compact hardware STBCS design by using stochastic computation. 82 - Ruiyuan Li

:
Electronic music assassin: towards imperceptible physical adversarial attacks against black-box automatic speech recognitions. 83 - Jinyuan Liu, Yong Wang

, Kun Wang, Zhuo Liu:
A face template protection scheme based on chaotic map, error correction code and locality sensitive hashing. 84 - Wanqing Wang, Xiangxue Li

, Xiaogang Zhou:
Communication-efficient public key encryption with (fine-grained delegated) equality test. 85 - Yingmei Han, Bin Li, Kun Li, Qinglei Zhou:

AMMF: cross-architectures vulnerability detection based on attention mechanism and multi-feature fusion. 86 - Huajie Shen, Qian Xu, Bo Yu, Yuhan Yang, Wei He

:
Bootstrapping in approximate fully homomorphic encryption: a research survey. 87 - Mohsen Moradi, Amir Hossein Jahangir

:
Enhanced time-delay attack detection algorithm for precision time protocol. 88 - Francesco Buccafurri

, Vincenzo De Angelis, Sara Lazzaro:
Extending Tor to achieve recipient anonymity. 89 - Wenwu Yan, Bo Hu, Weiqing Huang, Chao Ma, Xiaobin Tian, Min Yu:

SPPsolver: a SAT-based algorithm for solving any stable paths problem correctly. 103 - Mohamed El-Sherif, Ahmed Khattab, Magdy S. El-Soudani:

Intrusion detection using TCP/IP single packet header binary image for IoT networks. 104 - Xiaokang Dai, Jingwei Chen, Wenyuan Wu, Yong Feng:

Lattice-based, LWE-leakage model for Gaussian and uniform secret and its application in decentralization. 105 - Haoran Yin, Jun Tao

, Dingwen Chi, Yongji Chen:
Incentive mechanisms for crowdsensing: safeguarding against malicious behaviors. 106 - Ruixin Song, Youliang Tian

, Mengqian Li, Ze Yang, Ruohan Wang:
InfoShadow: NTK & MI guided adversarial attacks on speaker identification systems. 107 - Caimei Wang, Kangjian Xu, An He, Zhipeng Sun, Jianzhong Pan, Yudong Ren:

Untargeted poisoning attack based on fake clients and its defense in federated learning. 90 - Chong Chen

, Siquan Huang, Leyu Shi, Yanhong Li, Ying Gao:
Distributed clustering meets federated learning: a clustering-based approach to data poisoning mitigation. 108 - Hong-Min Wang

, Qiang Wei, Shao-Yun Han, Hui-Hui Huang, Yang-Yang Geng, Yun-Kai Song:
Research on intrusion detection of IEC 61850 protocol based on feature selection and triadic concept analysis. 109 - Alia Umrani

, Paolo Palmieri:
Quantum secure threshold password authenticated key exchange scheme for VANET. 110 - Torge Hinrichs

, Emanuele Iannone, Riccardo Scandariato:
Beyond prompting: the role of phrasing tasks in vulnerability prediction for Java. 111 - Yue Wang, Meng Yue, Zhiqiang Yao, Zheyu Chen, Renyuan Hu, Biao Jin

:
MAP-GAN: multi-attribute facial privacy protection model without losing identification. 112 - Xudong Zhu, Xuyang Song, Yi Deng

, Gang Yang:
Fast and designated-verifier friendly zk-SNARKs in the BPK model. 113 - Yang Hou, Qiuling Yue, Lujia Chai, Guozhao Liao, Wenbao Han, Wei Ou:

Double landmines: invisible textual backdoor attacks based on dual-trigger. 114 - Haiteng Cao, Zichi Wang

, Xinpeng Zhang:
On improving steganalysis against cover selection steganography. 115 - Yingchang Jiang, Hao Hu, Yunpeng Li, Feiyang Li, Changzhi Zhao, Canhua Chen, Yuling Liu:

A zero-shot self-improving NER method for cyber threat intelligence via knowledge injection. 116 - Yan Huang, Du Zeng, Chao Chen

, Zijian Zhou, Fangguo Zhang:
Quantum algorithm for solving binary hyperelliptic curve discrete logarithm problem. 117 - Changchang Ding, Yan Huang

:
Revisiting virgo: a study of vulnerabilities, limitations, and optimizations. 118 - Zihao Yang, Mengxin Zheng, Shengyu Fan, Qian Lou, Rui Hou, Dan Meng, Mingzhe Zhang

:
Corrosion Hammer: a self-activated bit-flip attack to the processing-in-memory accelerator. 119 - Haiyue Li, Jun Tao, Linxiao Yu, Yuantu Luo, Zuyan Wang:

GSPB: a global-statistic and packet-byte fusion framework for encrypted traffic classification. 120 - Pengchuan Wang

, Deqiang Li, Qianmu Li:
Towards optimal adversarial texts: character, word, and sentence. 121 - Zhangwen Li, Xuehui Du

, Xiangyu Wu, Aodi Liu
, Shihao Wang:
Gatac: Research on microservice access control techniques based on trust assessment and game analysis. 122 - Fatemeh Ebrahimi, Reza Javidan

, Reza Akbari, Yasin Hosseini:
Intrusion detection in the internet of things using convolutional neural networks: an explainable AI approach. - Zhiyuan Chen, Meiying Jin, Jingwei Jiang, Hongpeng Zhang:

FADIC: a fine-grained attribute-based dynamic group key agreement scheme for IoT. - Meiting Xue, Hao Zhong, Yukun Shi, Yan Zeng

, Jilin Zhang, Nailiang Zhao:
A correlation analysis-based federated learning framework for defending against collusion-free-riding attacks. - Cong Dong, Jiahai Yang, Yun Li, Haoran Jiao, Chenglong Li, Xia Yin, Yuling Liu:

E-DoH: elegantly detecting the depths of open DoH service on the internet. - Qi Zhang, Shujuan Ji

, Dickson K. W. Chiu, Ning Li, Xianwen Fang:
A cross-view contrastive learning-based spammer group detection algorithm for heterogeneous networks. - Dong Fang, Guifang Huang

, Shuai Chang, Haonan Yang, Lei Hu, Dingfeng Ye:
Shorter lattice-based verifiable encryption using bimodal Gaussian. - Wei Liu, Xinyu Liu

, Yun Feng, Kerui Huang, Ze Jin, Yaqin Cao, Yuling Liu, Qixu Liu:
WTDetect: a third-party website tracking detection framework for android applications. - Guoyuan Lin, Jiazhen Cai, Yonggang Li, Haonan Li, Jiahui Zhou

, Wei Chen, Zhong Chen, Shanqing Guo:
A hot-repair method for the running software with zero suspends. - Sinka Gao, Guoqiang Li:

A ZK-based multi-blockchain transaction layer for minimal trust base. - Yu Wang

, Zhoujun Li, Yipeng Zhang:
Pbaeg: combine-vulnerabilities AEG to defeat protection mechanisms. - Fen Liu, Yongqiang Li, Huiqin Chen, Li Ma, Zhengbin Liu, Wenyin Yang:

Impossible differential cryptanalysis of lightweight tweakable block cipher CRAFT. - Yingbo Li, Jie Yuan, Faqun Jiang, Rui Qian, Xiang Liu, Xinghai Wei, Xiaoyong Li:

Rlaph: a lightweight and dynamic proactive defense method in cloud-edge collaboration.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














