Skip to main content

previous disabled Page of 16
and
  1. No Access

    Chapter and Conference Paper

    Markov Decision Process for Automatic Cyber Defense

    It is challenging for a security analyst to detect or defend against cyber-attacks. Moreover, traditional defense deployment methods require the security analyst to manually enforce the defenses in the presenc...

    **aofan Zhou, Simon Yusuf Enoch, Dong Seong Kim in Information Security Applications (2023)

  2. No Access

    Chapter and Conference Paper

    HuntFlow: Search the Arithmetic Vulnerability in Ethereum Smart Contract

    With the development of blockchain technology, smart contracts have been applied in more and more industries. Smart contracts are immutable once deployed, so unaudited smart contracts can easily cause economic...

    Ke Zhou, Jieren Cheng, Le Liu in Advances in Artificial Intelligence and Se… (2022)

  3. No Access

    Chapter and Conference Paper

    Survey on Bridge Discovery in Tor

    To prevent users from using Tor for anonymous communication, many regulatory agencies have blocked the IP addresses of public Tor routers in Tor networks, resulting in the interception of traffic to Tor public...

    Fucai Yu, Ruoshui Zhou, Xuemeng Zhai, Youyang Qu in Ad Hoc Networks and Tools for IT (2022)

  4. No Access

    Chapter and Conference Paper

    D2D Authentication Scheme for IoT-enabled Smart Home

    The rapid development of Internet of things (IoT) technology has created a good technical foundation for the establishment of the smart home. However, while a smart home brings convenience to people, it also h...

    Qingru Ma, Tianqi Zhou, Haowen Tan in Security and Privacy in Social Networks and Big Data (2022)

  5. No Access

    Chapter and Conference Paper

    Neural Watermarking for 3D Morphable Models

    3D morphable models (3DMMs) have been widely used in computer graphics applications. Therefore, digital watermarking for 3DMMs can also become a valuable research direction in the near future. However, previou...

    Feng Wang, Hang Zhou, Weiming Zhang in Advances in Artificial Intelligence and Se… (2022)

  6. No Access

    Chapter and Conference Paper

    A Secure and Privacy-Preserving Authentication Scheme in IoMT

    The development of 5G communication and cloud computing and big data technology has promoted the rapid rise of the Internet of medical things (IoMT). IoMT is gradually entering all aspects of people’s lives an...

    Yuxiang Zhou, Haowen Tan in Security and Privacy in Social Networks an… (2022)

  7. No Access

    Chapter and Conference Paper

    A Learning-Based Feature Extraction Method for Detecting Malicious Code

    The identification of new malicious code has become an important research direction in the field of network security, nevertheless, most malicious programs can only get a small amount of operation code after a...

    Zhiqiang Ruan, Lixin Zhou, Haibo Luo in Advances in Artificial Intelligence and Se… (2022)

  8. No Access

    Chapter and Conference Paper

    An Efficient Authenticated Group Key Agreement Protocol with Dynamic Batch Verification for Secure Distributed Networks

    Distributed networks have attracted numerous attention since it was proposed. Most existing works mainly focus on the design and improvement of the structure of distributed networks but ignore the secure trans...

    Tianqi Zhou, Wenying Zheng, Haowen Tan in Network and System Security (2022)

  9. No Access

    Chapter and Conference Paper

    Dynamic Encryption of Power Internet of Things Data Based on National Secret Algorithm

    The power Internet of Things is the evolution direction of the power industry. While improving the convenience of power grid operations, it also brings emerging network security risks to traditional industries...

    **g Zhou, Qian Wu, ** Li, Jiaxin Li in Advances in Artificial Intelligence and Security (2022)

  10. No Access

    Chapter and Conference Paper

    Arbitrage Attack: Miners of the World, Unite!

    Blockchain oracles are introduced to mitigate the gap between blockchain-based applications and real-world information. To solve the centralization problem of current oracle systems, many decentralized protoco...

    Yuheng Wang, Jiliang Li, Zhou Su, Yuyi Wang in Financial Cryptography and Data Security (2022)

  11. No Access

    Chapter and Conference Paper

    Mobile Terminal Security Protection Method Based on Community Detection Algorithms and Graph Matching Networks

    The rapid growth in the number of malware apps poses a great danger to users of power mobile terminals. Among smart devices, devices using the Android system are very popular and thus are easy targets for malw...

    Mu Chen, Zaojian Dai, Yong Li, Juling Zhang in Advances in Artificial Intelligence and Se… (2022)

  12. No Access

    Chapter and Conference Paper

    BSB: Bringing Safe Browsing to Blockchain Platform

    Programmable Blockchain brings a new type of decentralized applications (Dapps) that facilitate transfer of assets across users without a third party. The popularity of Ethereum Dapps brings themselves great s...

    Zhuang Zhou, Cheng Tan, Shiyun Liu, Rongwei Yu, Siwei Wu in Network and System Security (2022)

  13. No Access

    Chapter and Conference Paper

    Succinct Scriptable NIZK via Trusted Hardware

    Non-interactive zero-knowledge proof or argument (NIZK) systems are widely used in many security sensitive applications to enhance computation integrity, privacy and scalability. In such systems, a prover want...

    Bingsheng Zhang, Yuan Chen, Jiaqi Li, Ya** Zhou in Computer Security – ESORICS 2021 (2021)

  14. No Access

    Chapter and Conference Paper

    Multi-sensor Fusion Detection Method for Vehicle Target Based on Kalman Filter and Data Association Filter

    Multi-sensor data fusion is an emerging technology, which has been widely used in medical diagnosis, remote sensing, inertial navigation and many other fields. What’s more, the implementation and application o...

    Xuting Duan, Chengming Sun, Daxin Tian in Advances in Artificial Intelligence and Se… (2021)

  15. No Access

    Chapter and Conference Paper

    Anomaly Detection Based on Isolated Forests

    Anomaly detection plays an important role in big data, which deals with high dimensional data effectively and quickly. In this paper is going to propose an anomaly detection method based on isolated forests. I...

    Jun-Liang Li, Yi-Feng Zhou, Zhi-Yang Ying in Advances in Artificial Intelligence and Se… (2021)

  16. No Access

    Chapter and Conference Paper

    Experiments of Federated Learning for COVID-19 Chest X-ray Images

    AI plays an important role in COVID-19 identification. Computer vision and deep learning techniques can assist in determining COVID-19 infection with Chest X-ray Images. However, for the protection and respect...

    Bingjie Yan, Jun Wang, Jieren Cheng in Advances in Artificial Intelligence and Se… (2021)

  17. No Access

    Chapter and Conference Paper

    Design of Abnormal Behavior Detection System in the State Grid Business Office

    Nowadays, with the popularization of electricity, the status of grid business office in people’s lives has become more and more important. Grid business office often have a large flow of people, so it becomes ...

    Xueming Qiao, Weiyi Zhu, Dan Guo, Ting Jiang in Advances in Artificial Intelligence and Se… (2021)

  18. No Access

    Chapter and Conference Paper

    TFRA: Trajectory-Based Message Ferry Recognition Attack in UAV Network

    The introduction of ferry UAVs (message ferry) in the UAV network is an effective means to solve the cooperative communication of multiple UAVs. The ferry UAVs act as message collectors and throwers in the net...

    Yuting Wu, Yulei Liu, Liang Liu, Feng Wang in Wireless Algorithms, Systems, and Applicat… (2021)

  19. No Access

    Chapter and Conference Paper

    Deep Learning-Based Power Control for Uplink Cognitive Radio Networks

    In this paper, we study deep-learning-based power control methods for an underlay cognitive radio (CR) interference channel network, where the SUs are allowed to access the network on the promise of ensuring t...

    Feng Liang, Anming Dong, Jiguo Yu, You Zhou in Wireless Algorithms, Systems, and Applicat… (2021)

  20. No Access

    Chapter and Conference Paper

    ParkLSTM: Periodic Parking Behavior Prediction Based on LSTM with Multi-source Data for Contract Parking Spaces

    With the rapid development of urbanization and the swift rising of the number of vehicles in cities, the process of finding a suitable parking space not only wastes a lot of time but also indirectly aggravates...

    Taiwei Ling, **n Zhu, **aolei Zhou in Wireless Algorithms, Systems, and Applicat… (2021)

previous disabled Page of 16