![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
193 Result(s)
-
Chapter and Conference Paper
HuntFlow: Search the Arithmetic Vulnerability in Ethereum Smart Contract
With the development of blockchain technology, smart contracts have been applied in more and more industries. Smart contracts are immutable once deployed, so unaudited smart contracts can easily cause economic...
-
Chapter and Conference Paper
Survey on Bridge Discovery in Tor
To prevent users from using Tor for anonymous communication, many regulatory agencies have blocked the IP addresses of public Tor routers in Tor networks, resulting in the interception of traffic to Tor public...
-
Chapter and Conference Paper
D2D Authentication Scheme for IoT-enabled Smart Home
The rapid development of Internet of things (IoT) technology has created a good technical foundation for the establishment of the smart home. However, while a smart home brings convenience to people, it also h...
-
Chapter and Conference Paper
Neural Watermarking for 3D Morphable Models
3D morphable models (3DMMs) have been widely used in computer graphics applications. Therefore, digital watermarking for 3DMMs can also become a valuable research direction in the near future. However, previou...
-
Chapter and Conference Paper
A Secure and Privacy-Preserving Authentication Scheme in IoMT
The development of 5G communication and cloud computing and big data technology has promoted the rapid rise of the Internet of medical things (IoMT). IoMT is gradually entering all aspects of people’s lives an...
-
Chapter and Conference Paper
A Learning-Based Feature Extraction Method for Detecting Malicious Code
The identification of new malicious code has become an important research direction in the field of network security, nevertheless, most malicious programs can only get a small amount of operation code after a...
-
Chapter and Conference Paper
Dynamic Encryption of Power Internet of Things Data Based on National Secret Algorithm
The power Internet of Things is the evolution direction of the power industry. While improving the convenience of power grid operations, it also brings emerging network security risks to traditional industries...
-
Chapter and Conference Paper
Arbitrage Attack: Miners of the World, Unite!
Blockchain oracles are introduced to mitigate the gap between blockchain-based applications and real-world information. To solve the centralization problem of current oracle systems, many decentralized protoco...
-
Chapter and Conference Paper
Mobile Terminal Security Protection Method Based on Community Detection Algorithms and Graph Matching Networks
The rapid growth in the number of malware apps poses a great danger to users of power mobile terminals. Among smart devices, devices using the Android system are very popular and thus are easy targets for malw...
-
Chapter and Conference Paper
Multi-sensor Fusion Detection Method for Vehicle Target Based on Kalman Filter and Data Association Filter
Multi-sensor data fusion is an emerging technology, which has been widely used in medical diagnosis, remote sensing, inertial navigation and many other fields. What’s more, the implementation and application o...
-
Chapter and Conference Paper
Anomaly Detection Based on Isolated Forests
Anomaly detection plays an important role in big data, which deals with high dimensional data effectively and quickly. In this paper is going to propose an anomaly detection method based on isolated forests. I...
-
Chapter and Conference Paper
Experiments of Federated Learning for COVID-19 Chest X-ray Images
AI plays an important role in COVID-19 identification. Computer vision and deep learning techniques can assist in determining COVID-19 infection with Chest X-ray Images. However, for the protection and respect...
-
Chapter and Conference Paper
Design of Abnormal Behavior Detection System in the State Grid Business Office
Nowadays, with the popularization of electricity, the status of grid business office in people’s lives has become more and more important. Grid business office often have a large flow of people, so it becomes ...
-
Chapter and Conference Paper
TFRA: Trajectory-Based Message Ferry Recognition Attack in UAV Network
The introduction of ferry UAVs (message ferry) in the UAV network is an effective means to solve the cooperative communication of multiple UAVs. The ferry UAVs act as message collectors and throwers in the net...
-
Chapter and Conference Paper
Deep Learning-Based Power Control for Uplink Cognitive Radio Networks
In this paper, we study deep-learning-based power control methods for an underlay cognitive radio (CR) interference channel network, where the SUs are allowed to access the network on the promise of ensuring t...
-
Chapter and Conference Paper
ParkLSTM: Periodic Parking Behavior Prediction Based on LSTM with Multi-source Data for Contract Parking Spaces
With the rapid development of urbanization and the swift rising of the number of vehicles in cities, the process of finding a suitable parking space not only wastes a lot of time but also indirectly aggravates...
-
Chapter and Conference Paper
Revisit Raft Consistency Protocol on Private Blockchain System in High Network Latency
Raft’s good performance in the CFT system makes it a mainstream implementation solution for the consistency of the private chain system. However, we found in practice that Raft’s performance degradation is ver...
-
Chapter and Conference Paper
Towards Secure and Trustworthy Crowdsourcing with Versatile Data Analytics
Crowdsourcing enables the harnessing of crowd wisdom for data collection. While being widely successful, almost all existing crowdsourcing platforms store and process plaintext data only. Such a practice would...
-
Chapter and Conference Paper
Exploiting API Description Information to Improve Code Comment Generation
Code comments can improve the readability of program and help the programmer to efficiently promote the maintenance of the software. Therefore, the code comment generation task has important research significa...
-
Chapter and Conference Paper
Security Comparisons and Performance Analyses of Post-quantum Signature Algorithms
Quantum computing challenges the computational hardness assumptions anchoring the security of public-key ciphers, such as the prime factorization and the discrete logarithm problem. To prepare for the quantum ...