-
1
-
2
HP_FLAP: homomorphic and polymorphic federated learning aggregation of parameters framework
Published 2025-06-01“…Cybersecurity…”
Get full text
Article -
3
Dual-verification-based model fingerprints against ambiguity attacks
Published 2024-12-01“…Cybersecurity…”
Get full text
Article -
4
Upper bounds of differential branch number of $$n$$ n -bit permutations
Published 2025-05-01“…Cybersecurity…”
Get full text
Article -
5
A novel Smishing defense approach based on meta-heuristic optimization algorithms
Published 2025-05-01“…Cybersecurity…”
Get full text
Article -
6
Enmob: Unveil the Behavior with Multi-flow Analysis of Encrypted App Traffic
Published 2025-04-01“…Cybersecurity…”
Get full text
Article -
7
Enabling per-file data recovery from ransomware attacks via file system forensics and flash translation layer data extraction
Published 2024-12-01“…Cybersecurity…”
Get full text
Article -
8
Grouped Byzantine fault tolerant consensus algorithm based on aggregated signatures
Published 2025-07-01“…Cybersecurity…”
Get full text
Article -
9
Double-sided: tight proofs for guessing games in the quantum random oracle model
Published 2024-12-01“…Cybersecurity…”
Get full text
Article -
10
E-DoH: elegantly detecting the depths of open DoH service on the internet
Published 2025-07-01“…Cybersecurity…”
Get full text
Article -
11
XFP-recognizer: detecting cross-file browser fingerprinting
Published 2025-07-01“…Cybersecurity…”
Get full text
Article -
12
A novel approach for detecting malicious hosts based on RE-GCN in intranet
Published 2024-12-01“…Cybersecurity…”
Get full text
Article -
13
A Robust joint coverless image steganography scheme based on two independent modules
Published 2024-12-01“…Cybersecurity…”
Get full text
Article -
14
LP-HENN: fully homomorphic encryption accelerator with high energy efficiency
Published 2025-05-01“…Cybersecurity…”
Get full text
Article -
15
Towards enhancing security for upcoming 6G-ready smart grids through federated learning and cloud solutions
Published 2025-08-01“…Cybersecurity…”
Get full text
Article -
16
Fedrtid: an efficient shuffle federated learning via random participation and adaptive time constraint
Published 2024-12-01“…Cybersecurity…”
Get full text
Article -
17
When LLMs meet cybersecurity: a systematic literature review
Published 2025-02-01“…Cybersecurity…”
Get full text
Article -
18
Unitanony: a fine-grained and practical anonymization framework for better data utility
Published 2025-07-01“…Cybersecurity…”
Get full text
Article -
19
Angus: efficient active learning strategies for provenance based intrusion detection
Published 2025-01-01“…Cybersecurity…”
Get full text
Article -
20
A lightweight vulnerability detection method for long smart contracts based on bimodal feature fusion
Published 2025-04-01“…Cybersecurity…”
Get full text
Article