default search action
CSS 2017: Xi'an, China
- Sheng Wen, Wei Wu, Aniello Castiglione:
Cyberspace Safety and Security - 9th International Symposium, CSS 2017, Xi'an, China, October 23-25, 2017, Proceedings. Lecture Notes in Computer Science 10581, Springer 2017, ISBN 978-3-319-69470-2 - Flora Amato, Aniello Castiglione, Vincenzo Moscato, Antonio Picariello, Giancarlo Sperlì:
Detection of Lurkers in Online Social Networks. 1-15 - Bin Xiong, Guangli Xiang, Tianyu Du, Jing (Selena) He, Shouling Ji:
Static Taint Analysis Method for Intent Injection Vulnerability in Android Applications. 16-31 - Hui Cao, Shubo Liu, Zhitao Guan, Longfei Wu, Tian Wang:
Achieving Differential Privacy of Data Disclosure from Non-intrusive Load Monitoring in Smart Grid. 32-42 - Yuxia Cheng, Qing Wu, Bei Wang, Wenzhi Chen:
Protecting In-memory Data Cache with Secure Enclaves in Untrusted Cloud. 43-56 - Jianmin Han, Juan Yu, Jianfeng Lu, Hao Peng, Jiandang Wu:
An Anonymization Method to Improve Data Utility for Classification. 57-71 - Hui Huang, Kuan-Ching Li, Xiaofeng Chen:
A Fair Three-Party Contract Singing Protocol Based on Blockchain. 72-85 - Jiameng Sun, Jing Qin, Jixin Ma:
Securely Outsourcing Decentralized Multi-authority Attribute Based Signature. 86-102 - Dawei Li, Jie Chen, Jianwei Liu, Qianhong Wu, Weiran Liu:
Efficient CCA2 Secure Revocable Multi-authority Large-Universe Attribute-Based Encryption. 103-118 - Jie Li, Jinshu Su, Xiaofeng Wang, Hao Sun, Shuhui Chen:
CloudDPI: Cloud-Based Privacy-Preserving Deep Packet Inspection via Reversible Sketch. 119-134 - Yuying Liu, Yonggang Huang, Jun Zhang, Xu Liu, Hualei Shen:
Noisy Smoothing Image Source Identification. 135-147 - Qian Meng, Jianfeng Ma, Kefei Chen, Yinbin Miao, Tengfei Yang:
Privacy-Preserving Comparable Encryption Scheme in Cloud Computing. 148-162 - Weizhi Meng, Wenjuan Li, Yu Wang, Man Ho Au:
Detecting Malicious Nodes in Medical Smartphone Networks Through Euclidean Distance-Based Behavioral Profiling. 163-175 - Lianyong Qi, Wanchun Dou, Xuyun Zhang:
Two-Phase Locality-Sensitive Hashing for Privacy-Preserving Distributed Service Recommendation. 176-188 - Tao Shang, Zheng Zhao, Zhenyu Guan, Jianwei Liu:
A DP Canopy K-Means Algorithm for Privacy Preservation of Hadoop Platform. 189-198 - Dong Shen, Xiaojing Su, Zhoujun Li:
HypTracker: A Hypervisor to Detect Malwares Through System Call Analysis on ARM. 199-214 - Jian Shen, Jun Shen, Chen Wang, Anxi Wang:
A Fibonacci Based Batch Auditing Protocol for Cloud Data. 215-222 - Wenqi Shi, Xiangyang Luo, Fan Zhao, Ziru Peng, Yong Gan:
A WeChat User Geolocating Algorithm Based on the Relation Between Reported and Actual Distance. 223-235 - Donghai Tian, Xiaoqi Jia, Li Zhan, Changzhen Hu, Jingfeng Xue:
An Online Approach to Defeating Return-Oriented-Programming Attacks. 236-247 - Liangliang Wang, Mi Wen, Kefei Chen, Zhongqin Bi, Yu Long:
An Efficient and Provably Secure Pairing-Free Certificateless Signature Scheme Based on Variant of RSA. 248-266 - Yu Wang, Lin Xie, Wenjuan Li, Weizhi Meng, Jin Li:
A Privacy-Preserving Framework for Collaborative Intrusion Detection Networks Through Fog Computing. 267-279 - Shengjun Wei, Xiaojiang Du, Changzhen Hu, Chun Shan:
Predicting Vulnerable Software Components Using Software Network Graph. 280-290 - Jun Xie, Sha Wu, Yansong Li, Jun Guo, Wen Sun, Jiajia Liu:
My Smartphone Knows Your Health Data: Exploiting Android-Based Deception Attacks Against Smartbands. 291-306 - Binxuan Xu, Zhongyun Hua, Hejiao Huang:
A Novel Image Encryption Scheme Using Josephus Permutation and Image Filtering. 307-319 - Yu Yao, Qiang Fu, Chuan Sheng, Wei Yang:
Modeling and Hopf Bifurcation Analysis of Benign Worms with Quarantine Strategy. 320-336 - Gang Yu, Xiaoxiao Ma, Zhenfu Cao, Weihua Zhu, Junjie Zeng:
Accountable Multi-authority Ciphertext-Policy Attribute-Based Encryption Without Key Escrow and Key Abuse. 337-351 - Lei Zhang, Dongjin Yu, Hongsheng Zheng:
Optimization of Cloud Workflow Scheduling Based on Balanced Clustering. 352-366 - Beibei Zhao, Zhanyong Tang, Zhen Li, Lina Song, Xiaoqing Gong, Dingyi Fang, Fangyuan Liu, Zheng Wang:
DexPro: A Bytecode Level Code Protection System for Android Applications. 367-382 - Fan Zhao, Xiangyang Luo, Yong Gan, Shuodi Zu, Fenlin Liu:
IP Geolocation Base on Local Delay Distribution Similarity. 383-395 - Xingwen Zhao, Hui Li:
Privacy Preserving Authenticating and Billing Scheme for Video Streaming Service. 396-410 - Xingguang Zhou, Jie Chen, Zongyang Zhang, Jianwei Liu, Qianhong Wu:
Secure Role-Based Access Control over Outsourced EMRs Against Unwanted Leakage. 411-426 - Yun Zhou, Alexander Raake, Tao Xu, Xuyun Zhang:
Users' Perceived Control, Trust and Expectation on Privacy Settings of Smartphone. 427-441 - Zhiqiang Gao, Yong Ding, Huiyong Wang, Jilin Wang:
A New Way for Extracting Region of Interest from Palmprint by Detecting Key Points. 442-451 - Jing He, Yiming Wu, Guangli Xiang, Zhendong Wu, Shouling Ji:
Efficient Privacy-Preservation Multi-factor Ranking with Approximate Search over Encrypted Big Cloud Data. 452-459 - Hongyu Liu, Leiting Chen, Liyao Zeng:
Cloud Data Integrity Checking with Deduplication for Confidential Data Storage. 460-467 - Jianfeng Lu, Yun Xin, Hao Peng, Jianmin Han, Feilong Lin:
Supporting User Authorization Queries in RBAC Systems by Role-Permission Reassignment. 468-476 - Liang Luo, Li Tao, Hongyi Xu, Zhenyun Yuan, Hong Lai, Zili Zhang:
An Information Theory Based Approach for Identifying Influential Spreaders in Temporal Networks. 477-484 - Yu Qin, Yingjun Zhang, Wei Feng:
TICS: Trusted Industry Control System Based on Hardware Security Module. 485-493 - Chao Shen, Ziqiang Ren, Yufei Chen, Zhao Wang:
On Using Wearable Devices to Steal Your Passwords: A Fuzzy Inference Approach. 494-502 - Huiyong Wang, Yong Ding, Shijie Tang, Jilin Wang:
An Efficient Privacy-Preserving Palmprint Authentication Scheme Based on Homomorphic Encryption. 503-512 - Pei Wang, Hua Guo, Yuanfei Huang:
An Improved Authentication Scheme for the Integrated EPR Information System. 513-522 - Wei Wang, Rong Jiang, Yan Jia, Aiping Li, Yi Chen:
KGBIAC: Knowledge Graph Based Intelligent Alert Correlation Framework. 523-530
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.