Message Recovery Attack of Kyber Based on Information Leakage in Decoding Operation |
What Data Do The Google Dialer and Messages Apps On Android Send to Google? |
CTDRB: Controllable Timed Data Release using Blockchains |
MetaPriv: Acting in Favor of Privacy on Social Media Platforms |
Coreference Resolution for Cybersecurity Entity: Towards Explicit, Comprehensive Cybersecurity Knowledge Graph with Low Redundancy |
Towards high transferability on neural network for black-box adversarial attacks |
DQR: A Double Q Learning Multi Agent Routing Protocol for Wireless Medical Sensor Network |
No-Fuzz: Efficient Anti-Fuzzing Techniques |
Generic 2-Party PFE with Constant Rounds and Linear Active Security, and Efficient Instantiation |
Language and platform independent attribution of heterogeneous code |
A Random Reversible Watermarking Schefme for Relational Data |
Granting Access Privileges using OpenID Connect in Permissioned Distributed Ledgers |
Assessing the Quality of Differentially Private Synthetic Data for Intrusion Detection |
Secure CV2X using COTS Smartphones over LTE Infrastructure |
PII-PSM: A New Targeted Password Strength Meter Using Personally Identifiable Information |
Enabling Accurate Data Recovery for Mobile Devices against Malware Attacks |
Another Lattice Attack against ECDSA with the wNAF to Recover More Bits per Signature |
Symmetrical Disguise: Realizing Homomorphic Encryption Services from Symmetric Primitives |
Blockchain-based Ciphertext Policy-hiding Access Control Scheme |
Forensic Analysis and Detection of Spoofing based Email Attack using Memory Forensics and Machine Learning |
Replicated additive secret sharing with the optimized number of shares |
Multi-relational Instruction Association Graph for Cross-architecture Binary Similarity Comparison |
Decentralized and Efficient Blockchain Rewriting with Bi-level Validity Verification |
An Evolutionary Learning Approach towards the Open Challenge of IoT Device Identification |
Classification-Based Anomaly Prediction in XACML Policies |
FairBlock: Preventing Blockchain Front-running with Minimal Overheads |
SecureBERT: A Domain-Specific Language Model for Cybersecurity |
A Cross-layer Plausibly Deniable Encryption System for Mobile Devices |
Detection and Privacy Leakage Analysis of Third-party Libraries in Android Apps |
Silver Surfers on the Tech Wave: Privacy Analysis of Android Apps for the Elderly |
Hiatus: Unsupervised Generative Approach for Detection of DoS and DDoS Attacks |
Breaking Embedded Software Homogeneity with Protocol Mutations |
MAG-PUF: Magnetic Physical Unclonable Functions for Device Authentication in the IoT |
eSROP attack: leveraging signal handler to implement Turing-complete attack under CFI defense |
Bootstrapping Trust in Community Repository Projects |
Cost-effective malware classification based on deep active learning |
CapsITD: Malicious Insider Threat Detection Based on Capsule Neural Network |
TERSE: Tiny Encryptions and Really Speedy Execution for Post-Quantum Private Stream Aggregation |
Adversary for Social Good: Leveraging Attribute-Obfuscating Attack to Protect User Privacy on Social Networks |
AttackMiner: A Graph Neural Network Based Approach for Attack Detection from Audit Logs |
BODM: Intrusion Detection System Based on Bayesian Optimization and Decision Model in the Internet of Things |
Research on the Grouping Method of Side-Channel Leakage Detection |
PREFHE, PREFHE-AES and PREFHE-SGX: Secure Multiparty Computation Protocols from Fully Homomorphic Encryption and Proxy ReEncryption With AES and Intel SGX |
A Generalized Unknown Malware Classification |