Network and System Security
12th International Conference, NSS 2018, Hong Kong, China, August 27-29, 2018, Proceedings
Article
In modern industry, maintaining continuous machine operations is important for improving production efficiency and reducing costs. Therefore, the smart technology of acoustic monitoring to detect anomalous mac...
Chapter and Conference Paper
This paper focuses on automatic detection of anomalies in audio files. We introduce an automated unsupervised algorithm which integrates AEC-guided Genetic Algorithm and Incremental PCA and DBSCAN to detect th...
Chapter and Conference Paper
Traceability, being the ability to access information of an item throughout its lifecycle, plays an important part in current supply chain, facilitating prompt response in case of incidents. In recent years, b...
Chapter and Conference Paper
Bitcoin is a decentralized peer-to-peer cryptocurrency. Bitcoin’s strong cryptography ensures anonymity that makes it possible to profit from crimes such as ransomware attacks and money laundering. Unfortunate...
Chapter and Conference Paper
In the problem of two-party private function evaluation (PFE), one party \(\mathsf {P}_{\mathsf {A}}\) ...
Chapter and Conference Paper
Data trading is an emerging business, in which data sellers provide buyers with, for example, their private datasets and get paid from buyers. In many scenarios, sellers prefer to sell pieces of data, such as ...
Chapter and Conference Paper
Executing data mining algorithms locally is usually computationally intensive. A promising solution is to outsource the heavy data mining tasks and datasets. On the other hand, combining data from multiple ins...
Chapter and Conference Paper
The classical related-key attack (RKA) model fails to capture some real world systems that introduce related secret keys by design. In some blockchain applications, public keys are generated in a way that th...
Book and Conference Proceedings
12th International Conference, NSS 2018, Hong Kong, China, August 27-29, 2018, Proceedings
Chapter and Conference Paper
There is an urgent need to discover or deduce drug-drug interactions (DDIs), which would cause serious adverse drug reactions. However, preclinical detection of DDIs bears a high cost. Machine learning-based c...
Article
The fastest known algorithms for computing the R* consensus tree of k rooted phylogenetic trees with n leaves each and identical leaf label sets run in ...
Article
With the first human DNA being decoded into a sequence of about 2.8 billion characters, much biological research has been centered on analyzing this sequence. Theoretically speaking, it is now feasible to acco...