Skip to main content

Page of 16
and
  1. No Access

    Chapter and Conference Paper

    Privacy Prediction of Lightweight Convolutional Neural Network

    The growing popularity of cloud-based deep learning raises a problem about accurate prediction and data privacy. Previous studies have implemented privacy prediction for simple neural networks. Since more comp...

    Shiyin Yang, Yongbiao Li, Dehua Zhou, Linfeng Wei in Frontiers in Cyber Security (2020)

  2. No Access

    Chapter and Conference Paper

    An Efficient Secondary Index for Spatial Data Based on LevelDB

    Spatial data has the characteristics of spatial location, unstructured, spatial relationships, massive data. However, the general commercial database itself is difficult to meet the requirements, it’s non-triv...

    Rui Xu, Zihao Liu, Huiqi Hu, Weining Qian in Database Systems for Advanced Applications (2020)

  3. No Access

    Chapter and Conference Paper

    A Novel Measure to Quantify the Robustness of Social Network Under the Virus Attacks

    Combining the spread velocity, the epidemic threshold and the infection scale at steady state, a new network robust measure with respect to the virus attacks is proposed in this paper. Through examples, we sh...

    Bo Song, Zhengjun **g, Y. Jay Guo in Security and Privacy in Social Networks an… (2020)

  4. Chapter and Conference Paper

    A Template-Based Method for the Generation of Attack Trees

    Attack trees are used in cybersecurity analysis to give an analyst a view of all the ways in which an attack can be carried out. Attack trees can become large, and develo** them by hand can be tedious and e...

    Jeremy Bryans, Lin Shen Liew, Hoang Nga Nguyen in Information Security Theory and Practice (2020)

  5. No Access

    Chapter and Conference Paper

    Research on Database Anomaly Access Detection Based on User Profile Construction

    As a platform for data storage and administration, database contains private and large information, which makes it a target of malicious personnel attacks. To prevent attacks from outsiders, database administr...

    Xuren Wang, Zhou Fang, Dong Wang, Anran Feng, Qiuyun Wang in Frontiers in Cyber Security (2020)

  6. No Access

    Chapter and Conference Paper

    Privacy-Preserving and Outsourced Density Peaks Clustering Algorithm

    With the powerful platform of cloud, it is attractive for an organization with massive data to outsource to a cloud provider. However, the data owner may have concerns about the privacy of its data. In this pa...

    Shaopeng Liang, Haomiao Yang, Qixian Zhou, Minglu Zhang in Frontiers in Cyber Security (2020)

  7. No Access

    Chapter and Conference Paper

    Path Query Processing Using Typical Snapshots in Dynamic Road Networks

    The shortest path query in road network is a fundamental operation in navigation and location-based services. The existing shortest path algorithms aim at improving efficiency in the static/time-dependent envi...

    Mengxuan Zhang, Lei Li, **fu Chao, Wen Hua in Database Systems for Advanced Applications (2020)

  8. No Access

    Chapter and Conference Paper

    Decentralized Embedding Framework for Large-Scale Networks

    Network embedding aims to learn vector representations of vertices, that preserve both network structures and properties. However, most existing embedding methods fail to scale to large networks. A few framewo...

    Mubashir Imran, Hongzhi Yin, Tong Chen in Database Systems for Advanced Applications (2020)

  9. No Access

    Chapter and Conference Paper

    2-hop Blockchain: Combining Proof-of-Work and Proof-of-Stake Securely

    Bitcoin-like blockchains use a proof-of-work (PoW) mechanism, where security holds if the majority of the computing power is under the control of honest players. However, this assumption has been seriously cha...

    Tuyet Duong, Lei Fan, Jonathan Katz, Phuc Thai in Computer Security – ESORICS 2020 (2020)

  10. No Access

    Chapter and Conference Paper

    Finding Attribute Diversified Communities in Complex Networks

    Recently, finding communities by considering both structure cohesiveness and attribute cohesiveness has begun to generate considerable interest. However, existing works only consider attribute cohesiveness fro...

    Afzal Azeem Chowdhary, Chengfei Liu, Lu Chen in Database Systems for Advanced Applications (2020)

  11. No Access

    Chapter and Conference Paper

    DDFL: A Deep Dual Function Learning-Based Model for Recommender Systems

    Over the last two decades, latent-based collaborative filtering (CF) has been extensively studied in recommender systems to match users with appropriate items. In general, CF can be categorized into two types:...

    Syed Tauhid Ullah Shah, Jianjun Li in Database Systems for Advanced Applications (2020)

  12. No Access

    Chapter and Conference Paper

    Detection by Attack: Detecting Adversarial Samples by Undercover Attack

    The safety of artificial intelligence systems has aroused great concern due to the vulnerability of deep neural networks. Studies show that malicious modifications to the inputs of a network classifier, can fo...

    Qifei Zhou, Rong Zhang, Bo Wu, Wei** Li, Tong Mo in Computer Security – ESORICS 2020 (2020)

  13. No Access

    Chapter and Conference Paper

    RoLMA: A Practical Adversarial Attack Against Deep Learning-Based LPR Systems

    With the advances of deep learning, license plate recognition (LPR) based on deep learning has been widely used in public transport such as electronic toll collection, car parking management and law enforcemen...

    Mingming Zha, Guozhu Meng, Chaoyang Lin, Zhe Zhou in Information Security and Cryptology (2020)

  14. No Access

    Chapter and Conference Paper

    A Tale of Two Testbeds: A Comparative Study of Attack Detection Techniques in CPS

    Attack detection in cyber-physical systems (CPS) has been approached in several ways due to the complex interactions among the physical and cyber components. A comprehensive study is presented in this paper to...

    Surabhi Athalye, Chuadhry Mujeeb Ahmed in Critical Information Infrastructures Secur… (2020)

  15. No Access

    Chapter and Conference Paper

    Adversarial Ranking Attack and Defense

    Deep Neural Network (DNN) classifiers are vulnerable to adversarial attack, where an imperceptible perturbation could result in misclassification. However, the vulnerability of DNN-based image ranking systems ...

    Mo Zhou, Zhenxing Niu, Le Wang, Qilin Zhang, Gang Hua in Computer Vision – ECCV 2020 (2020)

  16. No Access

    Chapter and Conference Paper

    Privacy-Preserving Graph Operations for Social Network Analysis

    Nowadays, our daily life is surrounded by various social networks, and they play an important role for people to communicate with others. The social networks contain large amount of valuable information, that ...

    Peng Li, Fucai Zhou, Zifeng Xu, Yuxi Li in Security and Privacy in Social Networks an… (2020)

  17. No Access

    Chapter and Conference Paper

    MetaDistiller: Network Self-Boosting via Meta-Learned Top-Down Distillation

    Knowledge Distillation (KD) has been one of the most popular methods to learn a compact model. However, it still suffers from high demand in time and computational resources caused by sequential training pipel...

    Benlin Liu, Yongming Rao, Jiwen Lu, Jie Zhou, Cho-Jui Hsieh in Computer Vision – ECCV 2020 (2020)

  18. Chapter and Conference Paper

    DeepHTTP: Anomalous HTTP Traffic Detection and Malicious Pattern Mining Based on Deep Learning

    Hypertext Transfer Protocol (HTTP) accounts for a large portion of Internet application-layer traffic. Since the payload of HTTP traffic can record website status and user request information, many studies use...

    Yuqi Yu, Hanbing Yan, Yuan Ma, Hao Zhou, Hongchao Guan in Cyber Security (2020)

  19. Chapter and Conference Paper

    Practical DDoS Attack Group Discovery and Tracking with Complex Graph-Based Network

    In recent years, a large number of users continuously suffer from DDoS attacks. DDoS attack volume is on the rise and the scale of botnets is also getting larger. Many security organizations began to use data-...

    Yu Rao, Weixin Liu, Tian Zhu, Hanbin Yan, Hao Zhou, **ghua Bai in Cyber Security (2020)

  20. No Access

    Book and Conference Proceedings

    Applied Cryptography and Network Security Workshops

    ACNS 2019 Satellite Workshops, SiMLA, Cloud S&P, AIBlock, and AIoTS, Bogota, Colombia, June 5–7, 2019, Proceedings

    Jianying Zhou, Prof. Robert Deng in Lecture Notes in Computer Science (2019)

Page of 16