![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
314 Result(s)
-
Chapter and Conference Paper
Markov Decision Process for Automatic Cyber Defense
It is challenging for a security analyst to detect or defend against cyber-attacks. Moreover, traditional defense deployment methods require the security analyst to manually enforce the defenses in the presenc...
-
Chapter and Conference Paper
HuntFlow: Search the Arithmetic Vulnerability in Ethereum Smart Contract
With the development of blockchain technology, smart contracts have been applied in more and more industries. Smart contracts are immutable once deployed, so unaudited smart contracts can easily cause economic...
-
Chapter and Conference Paper
Survey on Bridge Discovery in Tor
To prevent users from using Tor for anonymous communication, many regulatory agencies have blocked the IP addresses of public Tor routers in Tor networks, resulting in the interception of traffic to Tor public...
-
Chapter and Conference Paper
D2D Authentication Scheme for IoT-enabled Smart Home
The rapid development of Internet of things (IoT) technology has created a good technical foundation for the establishment of the smart home. However, while a smart home brings convenience to people, it also h...
-
Chapter and Conference Paper
Neural Watermarking for 3D Morphable Models
3D morphable models (3DMMs) have been widely used in computer graphics applications. Therefore, digital watermarking for 3DMMs can also become a valuable research direction in the near future. However, previou...
-
Chapter and Conference Paper
A Secure and Privacy-Preserving Authentication Scheme in IoMT
The development of 5G communication and cloud computing and big data technology has promoted the rapid rise of the Internet of medical things (IoMT). IoMT is gradually entering all aspects of people’s lives an...
-
Chapter and Conference Paper
A Learning-Based Feature Extraction Method for Detecting Malicious Code
The identification of new malicious code has become an important research direction in the field of network security, nevertheless, most malicious programs can only get a small amount of operation code after a...
-
Chapter and Conference Paper
An Efficient Authenticated Group Key Agreement Protocol with Dynamic Batch Verification for Secure Distributed Networks
Distributed networks have attracted numerous attention since it was proposed. Most existing works mainly focus on the design and improvement of the structure of distributed networks but ignore the secure trans...
-
Chapter and Conference Paper
Dynamic Encryption of Power Internet of Things Data Based on National Secret Algorithm
The power Internet of Things is the evolution direction of the power industry. While improving the convenience of power grid operations, it also brings emerging network security risks to traditional industries...
-
Chapter and Conference Paper
Arbitrage Attack: Miners of the World, Unite!
Blockchain oracles are introduced to mitigate the gap between blockchain-based applications and real-world information. To solve the centralization problem of current oracle systems, many decentralized protoco...
-
Chapter and Conference Paper
Mobile Terminal Security Protection Method Based on Community Detection Algorithms and Graph Matching Networks
The rapid growth in the number of malware apps poses a great danger to users of power mobile terminals. Among smart devices, devices using the Android system are very popular and thus are easy targets for malw...
-
Chapter and Conference Paper
BSB: Bringing Safe Browsing to Blockchain Platform
Programmable Blockchain brings a new type of decentralized applications (Dapps) that facilitate transfer of assets across users without a third party. The popularity of Ethereum Dapps brings themselves great s...
-
Article
Reconfigurable TPM Implemented with Ultralow-Power Management in 28nm CMOS Process for IoT SoC Design
There have been amazing developments in the security applications of sensors for Internet of Things (IoT), which lead to the increasing demand for the System-on-a-Chip (SoC) based on Trusted Platform Module (T...
-
Chapter and Conference Paper
Succinct Scriptable NIZK via Trusted Hardware
Non-interactive zero-knowledge proof or argument (NIZK) systems are widely used in many security sensitive applications to enhance computation integrity, privacy and scalability. In such systems, a prover want...
-
Chapter and Conference Paper
Multi-sensor Fusion Detection Method for Vehicle Target Based on Kalman Filter and Data Association Filter
Multi-sensor data fusion is an emerging technology, which has been widely used in medical diagnosis, remote sensing, inertial navigation and many other fields. What’s more, the implementation and application o...
-
Chapter and Conference Paper
Anomaly Detection Based on Isolated Forests
Anomaly detection plays an important role in big data, which deals with high dimensional data effectively and quickly. In this paper is going to propose an anomaly detection method based on isolated forests. I...
-
Chapter and Conference Paper
Experiments of Federated Learning for COVID-19 Chest X-ray Images
AI plays an important role in COVID-19 identification. Computer vision and deep learning techniques can assist in determining COVID-19 infection with Chest X-ray Images. However, for the protection and respect...
-
Chapter and Conference Paper
Design of Abnormal Behavior Detection System in the State Grid Business Office
Nowadays, with the popularization of electricity, the status of grid business office in people’s lives has become more and more important. Grid business office often have a large flow of people, so it becomes ...
-
Chapter and Conference Paper
TFRA: Trajectory-Based Message Ferry Recognition Attack in UAV Network
The introduction of ferry UAVs (message ferry) in the UAV network is an effective means to solve the cooperative communication of multiple UAVs. The ferry UAVs act as message collectors and throwers in the net...
-
Chapter and Conference Paper
Deep Learning-Based Power Control for Uplink Cognitive Radio Networks
In this paper, we study deep-learning-based power control methods for an underlay cognitive radio (CR) interference channel network, where the SUs are allowed to access the network on the promise of ensuring t...