Skip to main content

Page of 16
and
  1. No Access

    Chapter and Conference Paper

    Revisit Raft Consistency Protocol on Private Blockchain System in High Network Latency

    Raft’s good performance in the CFT system makes it a mainstream implementation solution for the consistency of the private chain system. However, we found in practice that Raft’s performance degradation is ver...

    Ning Cao, Dianheng Jiang, Yang Liu in Advances in Artificial Intelligence and Se… (2021)

  2. No Access

    Chapter and Conference Paper

    Towards Secure and Trustworthy Crowdsourcing with Versatile Data Analytics

    Crowdsourcing enables the harnessing of crowd wisdom for data collection. While being widely successful, almost all existing crowdsourcing platforms store and process plaintext data only. Such a practice would...

    Rui Lian, Anxin Zhou, Yifeng Zheng in Quality, Reliability, Security and Robustn… (2021)

  3. No Access

    Chapter and Conference Paper

    Exploiting API Description Information to Improve Code Comment Generation

    Code comments can improve the readability of program and help the programmer to efficiently promote the maintenance of the software. Therefore, the code comment generation task has important research significa...

    Guang Yang, Qian Zhang, Yufei Wu in Advances in Artificial Intelligence and Se… (2021)

  4. No Access

    Chapter and Conference Paper

    Zero Knowledge Contingent Payments for Trained Neural Networks

    Nowadays, neural networks have been widely used in many machine learning tasks. In practice, one might not have enough expertise to fine-tune a neural network model; therefore, it becomes increasingly popular ...

    Zhelei Zhou, **nle Cao, Jian Liu, Bingsheng Zhang in Computer Security – ESORICS 2021 (2021)

  5. No Access

    Chapter and Conference Paper

    Security Comparisons and Performance Analyses of Post-quantum Signature Algorithms

    Quantum computing challenges the computational hardness assumptions anchoring the security of public-key ciphers, such as the prime factorization and the discrete logarithm problem. To prepare for the quantum ...

    Manohar Raavi, Simeon Wuthier in Applied Cryptography and Network Security (2021)

  6. No Access

    Chapter and Conference Paper

    An Information Identification Method for Venture Firms Based on Frequent Itemset Discovery

    In recent years, the emergence of a large number of venture firms has brought great profits to venture capital firms. However, it is not easy to identify venture firms with investment prospects. Therefore, bas...

    Ning Cao, Yansong Wang, **aoyu Chen in Advances in Artificial Intelligence and Se… (2021)

  7. No Access

    Chapter and Conference Paper

    A Local Collaborative Distributed Reinforcement Learning Approach for Resource Allocation in V2X Networks

    In this paper, we propose a resource allocation approach for V2X networks based on distributed reinforcement learning with local collaboration. We construct a local collaborative mechanism for sharing informat...

    Yue Zhang, Guo** Tan, Siyuan Zhou in Wireless Algorithms, Systems, and Applications (2021)

  8. No Access

    Chapter and Conference Paper

    SnakeGX: A Sneaky Attack Against SGX Enclaves

    Intel Software Guard eXtension (SGX) is a technology to create enclaves (i.e., trusted memory regions) hardware isolated from a compromised operating system. Recently, researchers showed that unprivileged adversa...

    Flavio Toffalini, Mariano Graziano in Applied Cryptography and Network Security (2021)

  9. No Access

    Chapter and Conference Paper

    Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit

    Credit allows a lender to loan out surplus capital to a borrower. In the traditional economy, credit bears the risk that the borrower may default on its debt, the lender hence requires upfront collateral from ...

    Kaihua Qin, Liyi Zhou, Benjamin Livshits in Financial Cryptography and Data Security (2021)

  10. No Access

    Chapter and Conference Paper

    Transparent Electricity Pricing with Privacy

    Smart grids leverage data from smart meters to improve operations management and to achieve cost reductions. The fine-grained meter data also enable pricing schemes that simultaneously benefit electricity reta...

    Daniël Reijsbergen, Zheng Yang, Aung Maw in Computer Security – ESORICS 2021 (2021)

  11. No Access

    Chapter and Conference Paper

    Bank of Models: Sensor Attack Detection and Isolation in Industrial Control Systems

    Attacks on sensor measurements can take the system to an unwanted state. The disadvantage of using a system model-based approach for attack detection is that it could not isolate which sensor was under attack....

    Chuadhry Mujeeb Ahmed, Jianying Zhou in Critical Information Infrastructures Security (2021)

  12. No Access

    Chapter and Conference Paper

    ORMD: Online Learning Real-Time Malicious Node Detection for the IoT Network

    With the rapid development of the Internet of Things and its widespread deployment in daily life and production, malicious node detection is becoming more and more important. The attackers can invade the norma...

    **gxiu Yang, Lu Zhou, Liang Liu, Zuchao Ma in Wireless Algorithms, Systems, and Applicat… (2021)

  13. No Access

    Book and Conference Proceedings

    Security and Trust Management

    17th International Workshop, STM 2021, Darmstadt, Germany, October 8, 2021, Proceedings

    Rodrigo Roman, Jianying Zhou in Lecture Notes in Computer Science (2021)

  14. No Access

    Chapter and Conference Paper

    Correlated Randomness Teleportation via Semi-trusted Hardware—Enabling Silent Multi-party Computation

    With the advancement of the trusted execution environment (TEE) technologies, hardware-supported secure computing becomes increasingly popular due to its efficiency. During the protocol execution, typically, the ...

    Yibiao Lu, Bingsheng Zhang, Hong-Sheng Zhou, Weiran Liu in Computer Security – ESORICS 2021 (2021)

  15. Book and Conference Proceedings

    Cyber Security

    17th China Annual Conference, CNCERT 2020, Bei**g, China, August 12, 2020, Revised Selected Papers

    Wei Lu, Qiaoyan Wen, Yuqing Zhang, Bo Lang, Wei** Wen in Communications in Computer and Information Science (2020)

  16. No Access

    Chapter and Conference Paper

    An Elastic Data Processing Method Based on Data-Center-Platform

    This paper analyzes the business value and application prospect of data-center-platform as a big data service platform. Based on the existing technology, it describes the organizational structure and data mana...

    Zhang Pan, Lai Fenggang, Du **g in Security and Privacy in Social Networks an… (2020)

  17. No Access

    Chapter and Conference Paper

    A System for Risk Assessment of Privacy Disclosure

    The wide spread and sharing of considerable information promotes the development of many industries such as the health care and so on. However, data owners should pay attention to the problem of privacy preser...

    Zhihui Wang, Siqin Li, Xuchen Zhou, Yu Wang in Database Systems for Advanced Applications (2020)

  18. No Access

    Chapter and Conference Paper

    Adapt Swarm Path Planning for UAV Based on Artificial Potential Field with Birds Intelligence Extensions

    Artificial potential field (APF), a concept from physic field, has been successfully adopted for path planning of unmanned aerial vehicle (UAV). The cooperation between the expulsion against obstacle and the g...

    Yifei He, Jiqiang Liu, Endong Tong in Security and Privacy in Social Networks an… (2020)

  19. No Access

    Chapter and Conference Paper

    An Effective Occlusion Edge Prediction Method in Light Field Depth Estimation

    Occlusion is one of the most complicated and difficult problem to deal with in light field depth estimation. Previous methods usually use edge detection of central view as the basis for subsequent depth estima...

    Chao Zhou, Qian Zhang, Bin Wang, Yunzhang Du, Tao Yan in Frontiers in Cyber Security (2020)

  20. No Access

    Chapter and Conference Paper

    Adaptive Loading Plan Decision Based upon Limited Transport Capacity

    Cargo distribution is one of most critical issues for steel logistics industry, whose core task is to determine cargo loading plan for each truck. Due to cargos far outnumber available transport capacity in st...

    Jiaye Liu, Jiali Mao, Jiajun Liao in Database Systems for Advanced Applications (2020)

Page of 16