Applied Cryptography and Network Security Workshops
ACNS 2019 Satellite Workshops, SiMLA, Cloud S&P, AIBlock, and AIoTS, Bogota, Colombia, June 5–7, 2019, Proceedings
Chapter and Conference Paper
The growing popularity of cloud-based deep learning raises a problem about accurate prediction and data privacy. Previous studies have implemented privacy prediction for simple neural networks. Since more comp...
Chapter and Conference Paper
Spatial data has the characteristics of spatial location, unstructured, spatial relationships, massive data. However, the general commercial database itself is difficult to meet the requirements, it’s non-triv...
Chapter and Conference Paper
Combining the spread velocity, the epidemic threshold and the infection scale at steady state, a new network robust measure with respect to the virus attacks is proposed in this paper. Through examples, we sh...
Chapter and Conference Paper
Attack trees are used in cybersecurity analysis to give an analyst a view of all the ways in which an attack can be carried out. Attack trees can become large, and develo** them by hand can be tedious and e...
Chapter and Conference Paper
As a platform for data storage and administration, database contains private and large information, which makes it a target of malicious personnel attacks. To prevent attacks from outsiders, database administr...
Chapter and Conference Paper
With the powerful platform of cloud, it is attractive for an organization with massive data to outsource to a cloud provider. However, the data owner may have concerns about the privacy of its data. In this pa...
Chapter and Conference Paper
The shortest path query in road network is a fundamental operation in navigation and location-based services. The existing shortest path algorithms aim at improving efficiency in the static/time-dependent envi...
Chapter and Conference Paper
Network embedding aims to learn vector representations of vertices, that preserve both network structures and properties. However, most existing embedding methods fail to scale to large networks. A few framewo...
Chapter and Conference Paper
Bitcoin-like blockchains use a proof-of-work (PoW) mechanism, where security holds if the majority of the computing power is under the control of honest players. However, this assumption has been seriously cha...
Chapter and Conference Paper
Recently, finding communities by considering both structure cohesiveness and attribute cohesiveness has begun to generate considerable interest. However, existing works only consider attribute cohesiveness fro...
Chapter and Conference Paper
Over the last two decades, latent-based collaborative filtering (CF) has been extensively studied in recommender systems to match users with appropriate items. In general, CF can be categorized into two types:...
Chapter and Conference Paper
The safety of artificial intelligence systems has aroused great concern due to the vulnerability of deep neural networks. Studies show that malicious modifications to the inputs of a network classifier, can fo...
Chapter and Conference Paper
With the advances of deep learning, license plate recognition (LPR) based on deep learning has been widely used in public transport such as electronic toll collection, car parking management and law enforcemen...
Chapter and Conference Paper
Attack detection in cyber-physical systems (CPS) has been approached in several ways due to the complex interactions among the physical and cyber components. A comprehensive study is presented in this paper to...
Chapter and Conference Paper
Deep Neural Network (DNN) classifiers are vulnerable to adversarial attack, where an imperceptible perturbation could result in misclassification. However, the vulnerability of DNN-based image ranking systems ...
Chapter and Conference Paper
Nowadays, our daily life is surrounded by various social networks, and they play an important role for people to communicate with others. The social networks contain large amount of valuable information, that ...
Chapter and Conference Paper
Knowledge Distillation (KD) has been one of the most popular methods to learn a compact model. However, it still suffers from high demand in time and computational resources caused by sequential training pipel...
Chapter and Conference Paper
Hypertext Transfer Protocol (HTTP) accounts for a large portion of Internet application-layer traffic. Since the payload of HTTP traffic can record website status and user request information, many studies use...
Chapter and Conference Paper
In recent years, a large number of users continuously suffer from DDoS attacks. DDoS attack volume is on the rise and the scale of botnets is also getting larger. Many security organizations began to use data-...
Book and Conference Proceedings
ACNS 2019 Satellite Workshops, SiMLA, Cloud S&P, AIBlock, and AIoTS, Bogota, Colombia, June 5–7, 2019, Proceedings