


default search action
Journal of Information Security and Applications, Volume 98
Volume 98, 2026
- Khushil Godhani

, Nihhar Shukla
, Janam Patel
, Rajesh Gupta
, Sudeep Tanwar
:
Zerovision: A privacy-preserving iris authentication framework using zero knowledge proofs and steganographic safeguards. 104323 - Ramkumar Devendiran, Anil V. Turukmane:

A secured cryptographic approach with extreme gradient boosting model for data aggregation and routing in WSN. 104372 - Junfeng Zhao

, Shen Wang
:
Decoupled framework for non-additive adversarial image steganography. 104376 - Longhang Xu

, Guanxin Chen
, Nan Yang
, Yipeng Liu
, Jianting Yuan
:
FedCPP: A hybrid proactive-passive defense framework for backdoor attack mitigation in federated learning. 104377 - Reyhane Falanji

, Mikael Asplund
, Niklas Carlsson
:
MoMEP: A formally verified protocol with modifiable signed messages. 104378 - Sakuna Harinda Jayasundara

, Nalin Asanka Gamagedara Arachchilage
, Giovanni Russello
:
AGentVLM: Access control policy generation and verification framework with language models. 104379 - Assem Utaliyeva

, Yoon-Ho Choi
:
A user-centric privacy transformation framework for federated learning in industrial internet of things. 104380 - Davide Basile

, Valerio Goretti
, Luca Barbaro
, Hajo A. Reijers
, Claudio Di Ciccio
:
A TEE-based approach for preserving data secrecy in process mining with decentralized sources. 104381 - Jinghang Song

, Fangyuan Gao
, Xin Deng
, Shengxi Li
, Mai Xu
:
Say the image: Auditory masking effect-driven invertible network for progressive image-in-audio steganography. 104382 - Mohammad Hormozi, Seyed Hossein Erfani

, Amir Sahafi, M. Moradi:
Fed-Adapt: A Federated Learning Framework for Adaptive Topology Reconfiguration Against Multi-Rate DDoS and Database Flooding Attacks. 104384 - Merve Çigdem Ipek

, Sevil Sen
:
Explainable android malware detection and malicious code localization using graph attention. 104385 - Guntuka Sudeep

, Syam Kumar Pasupuleti
, Satish Narayana Srirama
:
ML-CLSCKS: Module lattice based certificateless signcryption with keyword search in cloud storage. 104386 - Bo Wang

, Xiaorui Dai
, Wei Wang
, Zi Yang
, Zhaoning Wang
, Maozhen Zhang
:
AMF-CFL: Anomaly model filtering based on clustering in federated learning. 104387 - Fahad Sabah

, Yuwen Chen
, Zhen Yang
, Muhammad Azam
, Nadeem Ahmad
, Raheem Sarwar
:
MFTA-PFL : Multi-factor trust assessment-based personalized federated learning. 104388 - Deepankumar S.

, Rengaraj R.
, Pranesh R.
, Pooja Mishra
, Arup Kumar Pal
:
A 3D chaotic map-based novel intra and inter-level bit plane image content encryption. 104389 - Hamed Jelodar

, Samita Bai, Parisa Hamedi
, Hesamodin Mohammadian
, Roozbeh Razavi-Far
, Ali A. Ghorbani
:
Large language model (LLM) for software security: Code analysis, malware analysis, reverse engineering. 104390 - Xinchen Wang

, Duzhong Zhang
, Jingwen Meng
, Li Li
, Taiyong Li
:
Enhancing image steganography via frequency-guided iterative optimization. 104391 - Pablo Moriano

, Steven Hespeler
, Mingyan Li
, Robert A. Bridges
:
Evaluating lightweight unsupervised online IDS for masquerade attacks in CAN. 104392 - Dan Cristian Turicu

, Florin Oniga
:
Accelerating volatile memory forensics for bare-metal malware analysis with FPGA devices. 104393 - Yuan Gao

, Zhengxin Fu
, Xiaopeng Li
, Sensen Li
, Bin Yu
:
Reversible data hiding in encrypted images based on EMD and PSIS. 104405 - Sanaya Malik

, Narendra Singh
, Somanath Tripathy
:
Semantic characterization of android malware through runtime system call analysis. 104406 - Feng Luo

, Zhihao Li
, Yingpeng Tong
, Zeqi Liao
, Zhouping Zhang
, Qin Liu
:
PeTARA : A privacy-enhanced threat analysis and risk assessment method for intelligent connected vehicles. 104408 - Mizuki Hayashi, Keita Emura

:
Security analysis on a public-key inverted-index keyword search scheme with designated tester. 104410 - Martina Bonora

, Andrea Ceccon
, Leonardo Maccari
:
Preventing data loss in multinational companies: Two case studies on phishing simulation techniques and drive encryption. 104413 - Biyu Xiang

, Chunming Tang
, Qiuxia Xu
, Yunlu Cai
:
Hiding the input-size in private intersection-sum protocol. 104414 - Nina Cai

, Jinguang Han
, Yuxin Meng
:
VFEFL: Privacy-preserving federated learning against malicious clients via verifiable functional encryption. 104415

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














