Skip to main content

previous disabled Page of 3
and
  1. No Access

    Chapter and Conference Paper

    Markov Decision Process for Automatic Cyber Defense

    It is challenging for a security analyst to detect or defend against cyber-attacks. Moreover, traditional defense deployment methods require the security analyst to manually enforce the defenses in the presenc...

    **aofan Zhou, Simon Yusuf Enoch, Dong Seong Kim in Information Security Applications (2023)

  2. No Access

    Chapter and Conference Paper

    Succinct Scriptable NIZK via Trusted Hardware

    Non-interactive zero-knowledge proof or argument (NIZK) systems are widely used in many security sensitive applications to enhance computation integrity, privacy and scalability. In such systems, a prover want...

    Bingsheng Zhang, Yuan Chen, Jiaqi Li, Ya** Zhou in Computer Security – ESORICS 2021 (2021)

  3. No Access

    Chapter and Conference Paper

    Zero Knowledge Contingent Payments for Trained Neural Networks

    Nowadays, neural networks have been widely used in many machine learning tasks. In practice, one might not have enough expertise to fine-tune a neural network model; therefore, it becomes increasingly popular ...

    Zhelei Zhou, **nle Cao, Jian Liu, Bingsheng Zhang in Computer Security – ESORICS 2021 (2021)

  4. No Access

    Chapter and Conference Paper

    SnakeGX: A Sneaky Attack Against SGX Enclaves

    Intel Software Guard eXtension (SGX) is a technology to create enclaves (i.e., trusted memory regions) hardware isolated from a compromised operating system. Recently, researchers showed that unprivileged adversa...

    Flavio Toffalini, Mariano Graziano in Applied Cryptography and Network Security (2021)

  5. No Access

    Chapter and Conference Paper

    Transparent Electricity Pricing with Privacy

    Smart grids leverage data from smart meters to improve operations management and to achieve cost reductions. The fine-grained meter data also enable pricing schemes that simultaneously benefit electricity reta...

    Daniël Reijsbergen, Zheng Yang, Aung Maw in Computer Security – ESORICS 2021 (2021)

  6. No Access

    Book and Conference Proceedings

    Security and Trust Management

    17th International Workshop, STM 2021, Darmstadt, Germany, October 8, 2021, Proceedings

    Rodrigo Roman, Jianying Zhou in Lecture Notes in Computer Science (2021)

  7. No Access

    Chapter and Conference Paper

    Correlated Randomness Teleportation via Semi-trusted Hardware—Enabling Silent Multi-party Computation

    With the advancement of the trusted execution environment (TEE) technologies, hardware-supported secure computing becomes increasingly popular due to its efficiency. During the protocol execution, typically, the ...

    Yibiao Lu, Bingsheng Zhang, Hong-Sheng Zhou, Weiran Liu in Computer Security – ESORICS 2021 (2021)

  8. No Access

    Chapter and Conference Paper

    A New Quantitative Evaluation Method for Fuzzing

    In order to ensure the network system security, many fuzzing strategies have been proposed recently, how to formally measure the performance of various fuzzing strategies, and choose the optimal strategy to im...

    Tiantian Tan, Baosheng Wang, Haitao Zhang in Artificial Intelligence and Security (2019)

  9. No Access

    Chapter and Conference Paper

    CCNET: Cascading Convolutions for Cardiac Segmentation

    Myocardial segmentation plays a pivotal role in the clinical diagno...

    Chao Luo, **aojie Li, Yucheng Chen, ** Wu, Jia He in Artificial Intelligence and Security (2019)

  10. No Access

    Chapter and Conference Paper

    Real-Time Estimation of Road Traffic Speeds from Cell-Based Vehicle Trajectories

    This paper presents a novel approach for urban road networks to estimate traffic speeds using vehicle trajectories captured by detectors on transportation cells. By scanning and analyzing dynamic traffic strea...

    **aoxiao Sun, Dong** Yu, Sai Liao in Service-Oriented Computing – ICSOC 2018 Wo… (2019)

  11. No Access

    Chapter and Conference Paper

    Mass Diffusion Recommendation Algorithm Based on Multi-subnet Composited Complex Network Model

    Social recommendation algorithm that integrates social networks is widely used in big data information recommendation. However, there are many relationships among users of social networks, and the influence o...

    Zhou Shuang, Bin Sheng, Sun Gengxin in Artificial Intelligence and Security (2019)

  12. No Access

    Chapter and Conference Paper

    TaxiC: A Taxi Route Recommendation Method Based on Urban Traffic Charge Heat Map

    A successful taxi route recommendation system is helpful to achieve a win-win situation for both increasing drivers’ income and improving passengers’ satisfaction. The critical problem in this system is how to...

    Yi**g Cheng, Qifeng Zhou in Service-Oriented Computing – ICSOC 2018 Workshops (2019)

  13. No Access

    Chapter and Conference Paper

    TL;DR Hazard: A Comprehensive Study of Levelsquatting Scams

    In this paper, we present a large-scale analysis about an emerging new type of domain-name fraud, which we call levelsquatting. Unlike existing frauds that impersonate well-known brand names (like google.com) by...

    Kun Du, Hao Yang, Zhou Li, Haixin Duan in Security and Privacy in Communication Netw… (2019)

  14. No Access

    Chapter and Conference Paper

    Cryptanalysis of Raindrop and FBC

    This paper introduces the results of several different security analysis of two new block ciphers: Raindrop and FBC, which are the two candidates of block cipher designs submitted to the Chinese Cryptographic...

    Bingqing Ren, Jiageng Chen, Shihao Zhou, **ushu **, Zhe **a in Network and System Security (2019)

  15. No Access

    Chapter and Conference Paper

    Nighthawk: Transparent System Introspection from Ring -3

    During the past decade, virtualization-based (e.g., virtual machine introspection) and hardware-assisted approaches (e.g., x86 SMM and ARM TrustZone) have been used to defend against low-level malware such as ...

    Lei Zhou, Jidong **ao, Kevin Leach, Westley Weimer in Computer Security – ESORICS 2019 (2019)

  16. No Access

    Chapter and Conference Paper

    Identifying Privilege Separation Vulnerabilities in IoT Firmware with Symbolic Execution

    Yao Yao, Wei Zhou, Yan Jia, Lipeng Zhu, Peng Liu in Computer Security – ESORICS 2019 (2019)

  17. No Access

    Book and Conference Proceedings

    Human Aspects of IT for the Aged Population. Acceptance, Communication and Participation

    4th International Conference, ITAP 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15–20, 2018, Proceedings, Part I

    Jia Zhou, Gavriel Salvendy in Lecture Notes in Computer Science (2018)

  18. No Access

    Book and Conference Proceedings

    Human Aspects of IT for the Aged Population. Applications in Health, Assistance, and Entertainment

    4th International Conference, ITAP 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15–20, 2018, Proceedings, Part II

    Jia Zhou, Gavriel Salvendy in Lecture Notes in Computer Science (2018)

  19. Chapter and Conference Paper

    Smart TV for Older Adults: A Comparative Study of the Mega Menu and Tiled Menu

    Navigation in a hierarchical menu on the current smart TVs (STVs) contributes to a poor user experience for older adults. Difficulty with navigation is caused by the design of an interface and users’ mental mo...

    **wen Ouyang, Jia Zhou in Human Aspects of IT for the Aged Populatio… (2018)

  20. Chapter and Conference Paper

    Pilot Study of Piano Learning with AR Smart Glasses Considering Both Single and Paired Play

    To ease the piano learning process for novices and to foster their interests, a piano learning app operated on the AR smart glasses, Epson Moeverio BT-300, was created considering both single and paired play. ...

    Honghu Pan, **ngxi He, Hong Zeng, Jia Zhou in Human Aspects of IT for the Aged Populatio… (2018)

previous disabled Page of 3