Skip to main content

previous disabled Page of 7
and
  1. No Access

    Chapter and Conference Paper

    HuntFlow: Search the Arithmetic Vulnerability in Ethereum Smart Contract

    With the development of blockchain technology, smart contracts have been applied in more and more industries. Smart contracts are immutable once deployed, so unaudited smart contracts can easily cause economic...

    Ke Zhou, Jieren Cheng, Le Liu in Advances in Artificial Intelligence and Se… (2022)

  2. No Access

    Chapter and Conference Paper

    Neural Watermarking for 3D Morphable Models

    3D morphable models (3DMMs) have been widely used in computer graphics applications. Therefore, digital watermarking for 3DMMs can also become a valuable research direction in the near future. However, previou...

    Feng Wang, Hang Zhou, Weiming Zhang in Advances in Artificial Intelligence and Se… (2022)

  3. No Access

    Chapter and Conference Paper

    A Learning-Based Feature Extraction Method for Detecting Malicious Code

    The identification of new malicious code has become an important research direction in the field of network security, nevertheless, most malicious programs can only get a small amount of operation code after a...

    Zhiqiang Ruan, Lixin Zhou, Haibo Luo in Advances in Artificial Intelligence and Se… (2022)

  4. No Access

    Chapter and Conference Paper

    Dynamic Encryption of Power Internet of Things Data Based on National Secret Algorithm

    The power Internet of Things is the evolution direction of the power industry. While improving the convenience of power grid operations, it also brings emerging network security risks to traditional industries...

    **g Zhou, Qian Wu, ** Li, Jiaxin Li in Advances in Artificial Intelligence and Security (2022)

  5. No Access

    Chapter and Conference Paper

    Mobile Terminal Security Protection Method Based on Community Detection Algorithms and Graph Matching Networks

    The rapid growth in the number of malware apps poses a great danger to users of power mobile terminals. Among smart devices, devices using the Android system are very popular and thus are easy targets for malw...

    Mu Chen, Zaojian Dai, Yong Li, Juling Zhang in Advances in Artificial Intelligence and Se… (2022)

  6. No Access

    Chapter and Conference Paper

    Succinct Scriptable NIZK via Trusted Hardware

    Non-interactive zero-knowledge proof or argument (NIZK) systems are widely used in many security sensitive applications to enhance computation integrity, privacy and scalability. In such systems, a prover want...

    Bingsheng Zhang, Yuan Chen, Jiaqi Li, Ya** Zhou in Computer Security – ESORICS 2021 (2021)

  7. No Access

    Chapter and Conference Paper

    An Effective Occlusion Edge Prediction Method in Light Field Depth Estimation

    Occlusion is one of the most complicated and difficult problem to deal with in light field depth estimation. Previous methods usually use edge detection of central view as the basis for subsequent depth estima...

    Chao Zhou, Qian Zhang, Bin Wang, Yunzhang Du, Tao Yan in Frontiers in Cyber Security (2020)

  8. No Access

    Chapter and Conference Paper

    Privacy Prediction of Lightweight Convolutional Neural Network

    The growing popularity of cloud-based deep learning raises a problem about accurate prediction and data privacy. Previous studies have implemented privacy prediction for simple neural networks. Since more comp...

    Shiyin Yang, Yongbiao Li, Dehua Zhou, Linfeng Wei in Frontiers in Cyber Security (2020)

  9. No Access

    Chapter and Conference Paper

    Research on Database Anomaly Access Detection Based on User Profile Construction

    As a platform for data storage and administration, database contains private and large information, which makes it a target of malicious personnel attacks. To prevent attacks from outsiders, database administr...

    Xuren Wang, Zhou Fang, Dong Wang, Anran Feng, Qiuyun Wang in Frontiers in Cyber Security (2020)

  10. No Access

    Chapter and Conference Paper

    Privacy-Preserving and Outsourced Density Peaks Clustering Algorithm

    With the powerful platform of cloud, it is attractive for an organization with massive data to outsource to a cloud provider. However, the data owner may have concerns about the privacy of its data. In this pa...

    Shaopeng Liang, Haomiao Yang, Qixian Zhou, Minglu Zhang in Frontiers in Cyber Security (2020)

  11. No Access

    Book and Conference Proceedings

    Advances in Knowledge Discovery and Data Mining

    23rd Pacific-Asia Conference, PAKDD 2019, Macau, China, April 14-17, 2019, Proceedings, Part I

    Qiang Yang, Zhi-Hua Zhou in Lecture Notes in Computer Science (2019)

  12. No Access

    Book and Conference Proceedings

    Advances in Knowledge Discovery and Data Mining

    23rd Pacific-Asia Conference, PAKDD 2019, Macau, China, April 14-17, 2019, Proceedings, Part III

    Qiang Yang, Zhi-Hua Zhou in Lecture Notes in Computer Science (2019)

  13. No Access

    Book and Conference Proceedings

    Advances in Knowledge Discovery and Data Mining

    23rd Pacific-Asia Conference, PAKDD 2019, Macau, China, April 14-17, 2019, Proceedings, Part II

    Qiang Yang, Zhi-Hua Zhou in Lecture Notes in Computer Science (2019)

  14. No Access

    Chapter and Conference Paper

    A New Quantitative Evaluation Method for Fuzzing

    In order to ensure the network system security, many fuzzing strategies have been proposed recently, how to formally measure the performance of various fuzzing strategies, and choose the optimal strategy to im...

    Tiantian Tan, Baosheng Wang, Haitao Zhang in Artificial Intelligence and Security (2019)

  15. No Access

    Chapter and Conference Paper

    A Recency Effect Hidden Markov Model for Repeat Consumption Behavior Prediction

    With the rapid development of mobile payment technology in China, people can use smartphone with some mobile payment apps (such as Alipay, WeChat pay and Apple pay etc.) to pay bills instead of paying cash. S...

    Zengwei Zheng, Yanzhen Zhou, Lin Sun in Green, Pervasive, and Cloud Computing (2019)

  16. No Access

    Chapter and Conference Paper

    Positioning Improvement Algorithm Based on LoRa Wireless Networks

    Internet of Things (IOT) has been maturing due to multiple applications and high demand, and LoRa technology is hotter and hotter in this area. This paper explains an optimization of positioning accuracy withi...

    Longyu Zhou, Ning Yang, Ke Zhang in Artificial Intelligence and Security (2019)

  17. No Access

    Chapter and Conference Paper

    Multitask Learning for Sparse Failure Prediction

    Sparsity is a problem which occurs inherently in many real-world datasets. Sparsity induces an imbalance in data, which has an adverse effect on machine learning and hence reducing the predictability. Previous...

    Simon Luo, Victor W. Chu, Zhidong Li in Advances in Knowledge Discovery and Data M… (2019)

  18. No Access

    Chapter and Conference Paper

    Knowledge Graph Embedding by Translation Model on Subgraph

    In this paper, we propose a translation model on subgragh representing knowledge graph. The model builds an ensemble TransE model on subgraph divided by features of relations in triplets by training the model...

    Yifan Tan, Rongjun Li, Jianjun Zhou, Shuhua Zhu in Human Centered Computing (2019)

  19. No Access

    Chapter and Conference Paper

    Searching the Internet of Things Using Coding Enabled Index Technology

    With the Internet of Things (IoT) becoming a major component of our daily life, IoT search engines, which can crawl heterogeneous data sources and search in highly dynamic contexts, attract increasing attenti...

    **e Tang, Zhangbing Zhou in Green, Pervasive, and Cloud Computing (2019)

  20. No Access

    Chapter and Conference Paper

    Image Retrieval Using Inception Structure with Hash Layer for Intelligent Monitoring Platform

    In view of the problem of low efficiency and accuracy in traditional image retrievals, a method using inception structure with hash layers of image retrieval is presented for intelligent monitoring platform. ...

    BaoHua Qiang, **na Shi, Yufeng Wang, Zhi Xu in Green, Pervasive, and Cloud Computing (2019)

previous disabled Page of 7