-
41
DEFENDIFY: defense amplified with transfer learning for obfuscated malware framework
Published 2025-04-01“…Cybersecurity…”
Get full text
Article -
42
-
43
An improved BKW algorithm on the learning with rounding problem
Published 2025-06-01“…Cybersecurity…”
Get full text
Article -
44
Spammer group detection based on cascading and clustering of core figures
Published 2025-07-01“…Cybersecurity…”
Get full text
Article -
45
Adaptively secure, splittable, and robust threshold unsigncryption
Published 2025-05-01“…Cybersecurity…”
Get full text
Article -
46
UDAP: ultra-lightweight dot product-based authentication protocol for RFID systems
Published 2024-12-01“…Cybersecurity…”
Get full text
Article -
47
Improved integral neural distinguisher model for lightweight cipher PRESENT
Published 2024-12-01“…Cybersecurity…”
Get full text
Article -
48
Federated two-stage transformer-based network for intrusion detection in non-IID data of controller area networks
Published 2025-05-01“…Cybersecurity…”
Get full text
Article -
49
Improved machine learning-aided linear cryptanalysis: application to DES
Published 2025-04-01“…Cybersecurity…”
Get full text
Article -
50
Designated confirmer threshold signature and its applications in blockchains
Published 2024-12-01“…Cybersecurity…”
Get full text
Article -
51
LLM4TDG: test-driven generation of large language models based on enhanced constraint reasoning
Published 2025-05-01“…Cybersecurity…”
Get full text
Article -
52
Telemedicine data secure sharing scheme based on heterogeneous federated learning
Published 2024-10-01“…Cybersecurity…”
Get full text
Article -
53
Correction: A multi-image steganography: ISS
Published 2025-05-01“…Cybersecurity…”
Get full text
Article -
54
Mi-maml: classifying few-shot advanced malware using multi-improved model-agnostic meta-learning
Published 2024-11-01“…Cybersecurity…”
Get full text
Article -
55
A combined feature selection approach for malicious email detection based on a comprehensive email dataset
Published 2025-02-01“…Cybersecurity…”
Get full text
Article -
56
The quantum circuit implementation and feasibility analysis of quantum public-key cryptosystem based on the $$QSCD_{ff}$$ Q S C D ff problem
Published 2024-12-01“…Cybersecurity…”
Get full text
Article -
57
Enhanced logistic map with infinite chaos and its applicability in lightweight and high-speed pseudo-random bit generation
Published 2025-04-01“…Cybersecurity…”
Get full text
Article -
58
The SEIRS-NIMFA epidemiological model for malware propagation analysis in IoT networks
Published 2025-01-01“…Cybersecurity…”
Get full text
Article -
59
Clean-label backdoor attack on link prediction task
Published 2025-08-01“…Cybersecurity…”
Get full text
Article -
60
IRMAOC: an interpretable role mining algorithm based on overlapping clustering
Published 2025-01-01“…Cybersecurity…”
Get full text
Article