Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Fuzzing Drone Control System Configurations Based on Quality-Diversity Enhanced Genetic Algorithm

    As drones are becoming widely used in various fields, drone security is a growing challenge nowadays. Drone control systems use various configuration parameters to control their positions and attitudes. If the...

    Zhiwei Chang, Hanfeng Zhang, Yue Yang in Artificial Intelligence Security and Priva… (2024)

  2. No Access

    Book and Conference Proceedings

    Cloud Computing, Security, Privacy in New Computing Environments

    7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25–26, and December 15–16, 2016, Proceedings

    Jiafu Wan, Kai Lin, Delu Zeng, ** Li in Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (2018)

  3. No Access

    Chapter and Conference Paper

    DMSD-FPE: Data Masking System for Database Based on Format-Preserving Encryption

    The traditional data masking systems cannot provide reversible operations for database, and they will destroy the referential integrity of database. To solve the problems above, we provide a new data masking s...

    Mingming Zhang, Guiyang **e, Shimeng Wei in Cloud Computing, Security, Privacy in New … (2018)

  4. No Access

    Chapter and Conference Paper

    Generalized Format-Preserving Encryption for Character Data

    We studied the problem on applying format-preserving encryption (FPE) to character data, specifically the uncertainty of the binary size of ciphertexts caused by variable-width encoding. In this paper, we sugg...

    Yanyu Huang, Bo Li, Shuang Liang, Haoyu Ma in Cloud Computing, Security, Privacy in New … (2018)

  5. No Access

    Chapter

    Coarser-Grained Multi-user Searchable Encryption in Hybrid Cloud

    The task of searchable encryption schemes in multi-user setting is to handle the problem of dynamical user injection and revocation with consideration of feasibility. Especially, we have to make sure that user...

    Zheli Liu, Chuan Fu, Jun Yang, Zhusong Liu in Transactions on Computational Collective I… (2015)