


default search action
Cybersecurity, Volume 9
Volume 9, Number 1, December 2026
- Shibo Sun, Shixiong Yao

, Jiageng Chen, Pei Li:
Javascript global identifier conflicts detection based on static analysis. 1 - Huading Su, Zhen Xu, Yan Zhang, Qian Tan:

Source code vulnerability detection based on deep learning: a review. 2 - Shihao Wang, Xuehui Du, Xiangyu Wu, Aodi Liu, Wenjuan Wang, Yu Cao:

An updatable encryption scheme for blockchain oracle based on post-quantum cryptography. 3 - Tiantian Zhu

, Jie Zheng, Tieming Chen, Mingqi Lv, Chunlin Xiong, Zhengqiu Weng, Xiangyang Zheng:
Lotldetector: living off the land attacks detection system based on feature fusion. 4 - Shilong Yu

, Binglong Li, Yong Zhao, Yanru Chen, Yifeng Sun, Heyu Chang:
Intelligent malware detection method based on memory segments. 5 - Fei Tang

, Ruixue Li, Huihui Zhu, Mingjie Han:
SecOutPIR: privacy preservation for data owner and access control for data user in outsourced private information retrieval. 6 - Tianming Zheng, Fanchao Meng, Ping Yi, Yue Wu:

Automating fuzz driver generation for deep learning libraries with large language models. 7 - Saad M. Darwish

, Samah EL-Naggar, Saleh M. El-Kaffas:
Securing financial transactions: exploring the role of lightweight blockchain-enabled deep learning for fraud detection in FinTech systems. 8 - Wei Ou, Chengliang Sun, Mengxue Pang, Qiuling Yue, Yanshuo Zhang, Wenbao Han:

Improving targeted password guessing attacks by using personally identifiable information and old password. 9 - Xiaoyang Yi, Linyu Li, Jian Zhang

, Zedong Jia:
Heterogeneous federated learning for imbalanced phishing email detection. 10 - Binbin Tu, Haoyuan Zhou

, Linfei Zhao, Jiawei Bao, Xiaotian Wang, Xiaowei Han:
Low-visibility adversarial sample generation method based on human visual perception. 11 - Tianrui Bai, Yuan Liu, Yiwen Gao, Yongbin Zhou:

Ats-dta: adaptive two-stage DDoS detection with dynamic threshold adjustment in SDN networks. 12 - Fengrui Yu, Yanhui Du:

VDM-IOG, a framework of inference on graph in retrieval-augmented generation for vulnerability description mapping. 14 - Alireza Hafez, Dorsa Nahid, Majid Khabbazian:

Smartphone barometer can hear, and sense finger taps. 15 - Siqi Zhu, Lang Li

, Ruihan Xu, Zhiwen Hu, Yemao Hu:
Cakr: a collision-aware cryptanalysis scheme for lightweight block ciphers. 16 - Zixiang Liu, Peisong Shen

, Chi Chen, Shuguang Yuan, Xiaojie Zhu, Houzhe Wang:
Detecting photo-taking actions in surveillance videos based on CPU-only devices. 17 - Da Zhang

, Haojun Xia, Xiaotong Wang, Bibo Tu:
Software-Defined platform management for data center: security, low entropy, and efficiency. 18 - Tong Wu

, Xueguang Zhou, Wei Fu:
Security issues in software-defined radio: a review. 19 - Binh Le Thanh Thai

, Hidema Tanaka:
Security and characteristics of Japanese user-created passwords: a comprehensive analysis. 20 - Jiajia Zhou, Yian Zhu

:
Fined-grained unmanned aerial vehicle anomaly detection by fusing multi-domain features. 21 - Peidong Guan, Shuai Wang:

Lattice-based verifiably encrypted group signatures. 94 - Peizhe Song, Mingsheng Wang:

HET-PIR: practical Keyword PIR via a Novel homomorphic equality test Algorithm. 95 - Fariha Tasmin Jaigirdar

, Asangi Jayatilaka, Muhammad Ali Babar:
Software vulnerability management in IoT systems: a systematic mapping study. 96 - Yuxin Xia, Ziyang Ji, Jie Zhang

, Wanxin Li, Ka Lok Man, Steven Guan, Dominik Wojtczak:
Revocable signature: handling valid but unauthorized Non-Fungible Token through Auxiliary Embedded Key. 97 - Conghuan Ye, Li Shi, Shenglong Tan, Jun Wang, Qiankun Zuo, Wei Feng

:
A controllable medical image security scheme using selective encryption and watermarking for bit-planes in the TSH domain. 98 - Min Yang, Caiming Liu:

XGA-E: an explainability-enhanced graph neural network for network traffic anomaly detection. 99 - Yunong Wu, Yanyan Zhou, Zongsheng Zhang, Tairong Shi, Bin Hu, Kai Zhang, Senpeng Wang

:
Improved search models of boomerang distinguishers and application to LILLIPUT. 100 - Thien D. Nguyen, Ammar Alazab

, Ansam Khraisat, Tony Jan:
Feature reduction in federated learning for intrusion detection in IoT networks. 102 - Zhuo Liu, Yong Wang

, Jinyuan Liu, Jun Feng, Leo Yu Zhang:
A newly image encryption scheme based on 3-D coupled map lattice and Baker map. 103 - Yu Cheng

, Xiaofang Qi, Yanhui Li:
Investigating red packet fraud in android applications: insights from user reviews. 104 - Chao Wang, Jun Tao

, Shengyu Su, Dingwen Chi, Wenqiang Li:
Privacy-preserving task assignment in mobile crowdsensing: a bilateral location fingerprint-based approach. 105 - Xiuzhang Yang

, Ruijie Zhong, Yuling Chen, Guojun Peng, Di Yao, Chaofan Chen, Chenyang Wang, Dongni Zhang, Yilin Zhou, Zixuan Yang:
CTI-Thinker: an LLM-driven system for CTI knowledge graph construction and attack reasoning. 106 - Hao Guo, Caibing Wang, Qianqian Yang, Lei Hu:

Practical weak-key attack against full-round Loong: an involutional lightweight block cipher. 107 - Ruipu Ma, Yi Zhang

, Jinwei Wang, Wei Lu, Xiangyang Luo:
Advancements in adversarial example defense for deep learning models: a review. 108 - Oussama Sbai

, Benjamin Allaert, Patrick Sondi
, Ahmed Meddahi:
SIP-DDoS framework based on federated learning for collaborative anomaly detection. 109 - Zhichao Wang, Xudong Zhu, Xinxuan Zhang, Yi Deng

, Xuyang Song:
Sending zero-knowledge proofs to the future. 110 - Sefatun-Noor Puspa, Abyad Enan

, Reek Majumder
, M. Sabbir Salek
, Gurcan Comert
, Mashrur Chowdhury
:
Robust hardware Trojan detection leveraging dual-domain features and stacked ensemble learning. 111 - Fan Li, Xi Luo, Weihong Han, Binxing Fang, Lihua Yin:

MTDecipher: robust encrypted malicious traffic detection via multi-task graph neural networks. 112 - Shenjin Wang, Shunfang Hu, Junhua Chen, Kaixuan Ma, Wei Wang, Ya Zhang:

Lightweight anonymous authentication and key agreement protocol resistant to desynchronization attacks. 113 - Mengfan Wang

, Guifang Huang, Dong Fang, Lei Hu:
Proving multiplicative relations for lattice commitments in batch. 114 - Zhuo Wu

, Shi Qi, Xinxuan Zhang, Yi Deng
, Kun Lai, Hailong Wang:
Proof of exponentiation: enhanced prover efficiency for algebraic statements. 115 - Yuqi Zhang, Chen Li

, Zixuan Ma, Xuefei Chen, Bibo Tu:
Efficient packet classification with updatable learned index for online network defense. 22 - Yu Zhang, Yutao Hu, Bing Sun, Rui Lou, Huanwei Wang, Weiyu Dong:

Rator: detecting fine-grained semantic code clones using tree encoding based on node degrees of freedom. 23 - Ting Peng, Wentao Zhang, Jingsui Weng:

On relationship between differential/linear clustering effects and the number of active S-boxes in block ciphers. 24 - Ying Gao

, Bowen Zheng, Yi Wang
, Bo Zhou:
GPU-accelerated Batch Private Information Retrieval with lower communication overheads. 25 - Yueting Wan, Chun Guo

, Yuan Ping, Yunhe Cui, Xiaodan Lyu, Guowei Shen:
A packer identification method based on section-entropy plot. 29 - Mohammad Fathian

, Alireza Seifousadati:
A real-time machine-learning model for detecting and mitigating DDoS attacks. 30 - Junjie Wang, Ruwei Huang, Xiaolong Tang:

Dynamic multi-key FHE without CRS from LWE. 31 - Guangyu Qian

, Wei He:
A new intrusion detection model based on belief rule base with variable interval structure for industrial control system. 32 - Giuseppina Andresini

, Annalisa Appice, Vincenzo Belvedere, Giuseppe Fiameni, Donato Malerba:
Anakin: explainable android malware detection with graph neural networks. 116 - Juan Ignacio Iturbe Araya

, Helena Rifà-Pous
:
Evaluating hyperparameter transferability in unsupervised anomaly detection for smart home environments. 117 - Gabriela Mogos

, Ho-Pun Lam
:
Quantum steganography for secure data transmission. 118 - Lu Yuan, Dexian Chang, Hao Hu, Yingchang Jiang, Heyu Chang, Liguo Fang, Yuling Liu:

FusionITD: enhanced cross-modal insider threat perception framework via behavior-semantic fusion. 119 - Shymaa M. Arafat

:
A study of blockchain consensus protocols. 120 - Yu Gu

, Meicheng Liu
:
BONC: a framework for automatic cryptanalysis using the implementation code. 121 - Ali Tariq Al-Tamimi, Rasha Thabit

:
An efficient watermarking framework for multi-face image authentication using chaotic maps and 2D lazy IWT. 122 - Liang Zhang

, Xingyu Wu, Qiuling Yue, Haibin Kan, Jiheng Zhang:
Attribute-based publicly verifiable secret sharing. 123 - Obinna Johnphill

, Ali Safaa Sadiq
, Omprakash Kaiwartya, Mohammed Adam Taheir:
Cross: a cloud-native approach to automated remediation and self-healing in cyber-physical systems. 124 - Xuanmei Qin, Kun Zhu, Yongfeng Huang:

MDCV: a decentralized and collusion-resistant consistency verification scheme for multi-cloud storage. 125 - Mingshu Cong

, Tsz Hon Yuen, Siu Ming Yiu:
Dualmatrix: conquering zkSNARK for large matrix multiplication. 126 - Yan Ding, Ye Du

:
Privacy-preserving and efficient outsourcing computation scheme for principal component analysis. 127 - Sinho Jo, Youngho Cho

:
An enhanced backdoor attack using a backdoor trigger position searching algorithm for avoiding deep learning-based object detection systems. 128 - Lingbo Zhao, Shuquan Wang, Yuhui Zhang, Rui Hou:

Unveiling evasive ransomware and breaking through the predicament: a comprehensive review of evasion techniques and defense mechanisms. 129 - Tan Luo, Yaochi Zhao

, Zhuhua Hu, Jiezhuo Zhong, Haoran Liu:
Task-aware meta-balance-learning for better generalizable black-box adversarial attack. - Bingyang Guo

, Yunyi Zhang, Fan Shi, Min Zhang, Pengfei Xue, Chengxi Xu, Yi Shen, Miao Hu:
Darkness at dawn: understanding illicit websites in newly registered domain names. - Andrea Pinto

, Yezid Donoso, Jairo A. Gutiérrez
:
Balancing the trilemma: a survey of federated anomaly detection for secure cyber-physical systems. - Yifan Wang, Yanzhi Hou, Bin Wu

:
Program-plate: a method for identifying the ability to extract vulnerability features. - Shawal Khan

, Shahzad Khan, Weisheng Si, Bahman Javadi:
Privacy-preserving graph similarity search with attribute-based access control. - Chunying Zhang, Rui Sun, Jing Ren, Lu Liu, Liya Wang, Jiang Ma:

MAE-based image inpainting-steganography method. - Yonglin Zhao, Chun Guo, Yuan Ping, Yi Chen, Yunhe Cui, Guowei Shen:

MCPDS: image-based malware classification method using PE metadata alone. - Kelin Wang

, Mengda Chen, Liang He, Yanhao Wang, Purui Su, Jiongyi Chen, Yan Cai, Bin Zhang, Chao Feng, Chaojing Tang, Guojun Peng:
OSmartPro: a large language model-assisted option fuzzing approach. - Mengjie Huang, Xianhui Lu, Chen An, Ziyi Li, Ziyao Liu, Dongchi Han:

Computational wiretap coding: framework and practical construction. - Kexin Gao, Shujiao Cao, Tianshu Shan, Rui Xue:

QCCC commitment from quantum inaccessible entropy generator. - Pan Feng, Bing Li, Baofu Han, Yongli Ma, Yuanyuan Hu, Runan Zhao:

A Scalable Group Authentication Protocol for IoT Based on PUF-Derived Bases in Inner Product Spaces. - Tongchen Shen, Wanqing Wang, Xiangxue Li

, Xiaogang Zhou:
Communication-efficient and quantum-resistant PKE with multi-ciphertexts equality test. - Weizhan Jing, Xiaojun Chen, Xudong Chen, Ye Dong, Qiang Liu, Tingyu Fan:

JAGUAR: efficient and secure unbalanced PSI under malicious adversaries in the client-server setting. - Yunlong Gao, Zhiyong Zhang

, Han Liang, Bin Song:
Mgct: a multi-generator collaborative training approach for data-free model stealing. - Guofan Lv, Jinfu Chen, Haibo Chen, Saihua Cai, Wen Zhang:

Optimized mutation scheduling for fuzzing based on estimation of distribution algorithm. - Yuanhuang Liu, Ayong Ye, Wenting Lu, Longjing Yang:

Detecting advanced persistent threats via heterogeneous graph learning from homophily and heterogeneity views. - Yiran Dai, Binwu Xiang, Yi Deng, Jiang Zhang:

Accelerating MKFHE bootstrapping via parallel-friendly NTRU-based blind rotation. - Ibtissam Haddane, Badr Hirchoua, Hicham Moutachaouik:

React-d3qn: resilient adaptive concept-drift-aware dueling double deep Q-network for robust edge-centric intrusion detection. - Gaurav Kumar

, Mahendra Kumar Gurve, Nitin, Yamuna Prasad, Satyadev Ahlawat:
Secure and scalable access protocol for enhancing IEEE 1687 network security. - Ruijie Cai, Xiaoya Zhu, Shengli Liu:

ADIPD: adaptive network flow watermarking via relative windowed inter-packet delay modulation. - Yan Jia, Xueqi Zhu, Peng Wang, Lei Hu:

On committing security of PMAC, LightMAC, and UMAC. - Shaoyu Du, Weiping Gu, Bin Zhang:

Some observations of near collision attacks on grain v1. - Mohammad Wali Ur Rahman

, Yu-Zheng Lin, Carter Weeks, David Ruddell, Jeff Gabriellini, Bill Hayes, Salim Hariri, Pratik Satam, Edward V. Ziegler Jr:
Ai/ml based detection and categorization of covert communication in IPv6 network. - Jack Wilkie

, Hanan Hindy
, Ivan Andonovic
, Christos Tachtatzis
, Robert C. Atkinson
:
Signal-based malware classification using 1D CNNs. - Yi Guo, Danping Shi, Lei Hu, Xu Guo, Zhiru Chen:

Improved integral cryptanalysis of block cipher Zodiac. - Yucheng Yan, Jia Yang:

Secure group aggregation for privacy-protection federated learning. 138 - Peng Yuan, Shuhui Chen

, Ziling Wei, Fei Wang, Zhenhao Luo:
Exploring the android TLS certificate ecosystem in China. 139 - Zhaohui Liu, Wenjie Xie:

Litevul: a lightweight vulnerability detection via directed PPMI-weighted token graphs. 140 - Yali Gao

, Tianchao Luo, Kangqian Huang, Jialu Tang, Xiaoyong Li:
LogLAA: an adaptive integrated log anomaly analysis framework. 141 - Wenlin Liu, Linyuan Wang, Nuolin Sun, Dongyang Li, Bin Yan, Houqiang Li:

A spatial-frequency domain joint detection method of adversarial examples for signal modulation recognition network. 142 - Kaiwen Lou, Guosheng Zhao

, Jian Wang, Xiaodan Huang, Zixuan Wan:
Collaborative defense model for crowdsensing networks based on incomplete Information differential games. 143 - Sandhyarani Dash, John M. Acken:

Intrusion detection latency: the neglected metric. 144

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














