Ausgabe 4/2021
Special Issue: Security and Privacy Challenges in Real World Situations
Inhalt (36 Artikel)
Editorial: Security and Privacy in Computing and Communications
Zheli Liu, Jin Li, Ilsun You, Siu-Ming Yiu
A Revocable Group Signatures Scheme to Provide Privacy-Preserving Authentications
Xiaohan Yue, Mengzhe Xi, Bing Chen, Mingchao Gao, Yuan He, Jian Xu
Privacy-Preserving Top-k Location-based Services Retrieval in Mobile Internet
Na Wang, Jian Li, Junsong Fu, Yan Zheng
Throughput Analysis of Smart Buildings-oriented Wireless Networks under Jamming Attacks
Xianglin Wei, Tongxiang Wang, Chaogang Tang
Cognitive Radio Based System for Best Effort Communications in Sound-based Covert Channel for IoT Environments
Jorge E. Coyac-Torres, Mario E. Rivero-Angeles, Eleazar Aguirre-Anaya
Intrusion Detection System for IoT Heterogeneous Perceptual Network
Man Zhou, Lansheng Han, Hongwei Lu, Cai Fu
Role-Based Access Control Model for Cloud Storage Using Identity-Based Cryptosystem
Jian Xu, Yanbo Yu, Qingyu Meng, Qiyu Wu, Fucai Zhou
A Timestamp-Regulating VoLTE Covert Channel against Statistical Analysis
Zhang Quanxin, Zhu Mengyan, Liang Chen, Wang Kunqing, Yang Kai, Li Yuanzhang
An Efficient Bounded Model Checking Approach for Web Service Composition
Yuanzhang Li, Dongyan Ma, Chen Liu, Wencong Han, Hongwei Jiang, Jingjing Hu
PRIA: a Multi-source Recognition Method Based on Partial Observation in SIR Model
Yong Ding, Xiaoqing Cui, Huiyong Wang, Kun Zhang
A Privacy-sensitive Service Selection Method Based on Artificial Fish Swarm Algorithm in the Internet of Things
Bing Jia, Lifei Hao, Chuxuan Zhang, Baoqi Huang
Security Assessment for Interdependent Heterogeneous Cyber Physical Systems
Hao Peng, Zhe Kan, Dandan Zhao, Jianmin Han
Identity-based Multi-Recipient Public Key Encryption Scheme and Its Application in IoT
Jing Li, Xiangyan Tang, Zhijun Wei, Yu Wang, Wenbin Chen, Yu-an Tan
Correction to: Identity-based Multi-Recipient Public Key Encryption Scheme and Its Application in IoT
Jing Li, Xiangyan Tang, Zhijun Wei, Yu Wang, Wenbin Chen, Yu-an Tan
A Novel Algorithm for Improving Malicious Node Detection Effect in Wireless Sensor Networks
Hongyu Yang, Xugao Zhang, Fang Cheng
A Privacy-preserving Fuzzy Search Scheme Supporting Logic Query over Encrypted Cloud Data
Shaojing Fu, Qi Zhang, Nan Jia, Ming Xu
Cryptanalysis of a Public Key Cryptosystem Based on Data Complexity under Quantum Environment
Zhengjun Jing, Chunsheng Gu, Chunpeng Ge, Peizhong Shi
An Evolutionary-Based Black-Box Attack to Deep Neural Network Classifiers
Yutian Zhou, Yu-an Tan, Quanxin Zhang, Xiaohui Kuang, Yahong Han, Jingjing Hu
Network Risk Assessment Based on Baum Welch Algorithm and HMM
Chundong Wang, Kongbo Li, Xiaonan He
A Confidence-Guided Evaluation for Log Parsers Inner Quality
Xueshuo Xie, Zhi Wang, Xuhang Xiao, Ye Lu, Shenwei Huang, Tao Li
A Fault Tolerant Mechanism for UE Authentication in 5G Networks
Fang-Yie Leu, Kun-Lin Tsai, Heru Susanto, Cheng-Yan Gu, Ilsun You
Malware Detection Based on Multi-level and Dynamic Multi-feature Using Ensemble Learning at Hypervisor
Jian Zhang, Cheng Gao, Liangyi Gong, Zhaojun Gu, Dapeng Man, Wu Yang, Wenzhen Li
Secure Encrypted Data Deduplication Based on Data Popularity
Yunlong He, Hequn Xian, Liming Wang, Shuguang Zhang
Accurate and Cognitive Intrusion Detection System (ACIDS): a Novel Black Hole Detection Mechanism in Mobile Ad Hoc Networks
S. Sivanesh, V. R. Sarma Dhulipala
MF-CNN: a New Approach for LDoS Attack Detection Based on Multi-feature Fusion and CNN
Dan Tang, Liu Tang, Wei Shi, Sijia Zhan, Qiuwei Yang
Research on Intelligent Detection of Command Level Stack Pollution for Binary Program Analysis
Hui Lu, Chengjie Jin, Xiaohan Helu, Man Zhang, Yanbin Sun, Yi Han, Zhihong Tian
ShadowFPE: New Encrypted Web Application Solution Based on Shadow DOM
Xiaojie Guo, Yanyu Huang, Jinhui Ye, Sijie Yin, Min Li, Zhaohui Li, Siu-Ming Yiu, Xiaochun Cheng
Convergence of 5G Technologies, Artificial Intelligence and Cybersecurity of Networked Societies for the Cities of Tomorrow
Trung Q. Duong, Van-Phuc Hoang, Cong-Kha Pham
Energy efficiency of full-duplex cognitive radio in low-power regimes under imperfect spectrum sensing
M. Ranjbar, H. L. Nguyen, N. H. Tran, T. Karacolak, S. Sastry, L. D. Nguyen
ClusTi: Clustering Method for Table Structure Recognition in Scanned Images
Arthur Zucker, Younes Belkada, Hanh Vu, Van Nam Nguyen
Evaluating the Performance of Full-Duplex Energy Harvesting Vehicle-to-Vehicle Communication System over Double Rayleigh Fading Channels
Ba Cao Nguyen, Tran Manh Hoang, Xuan Nam Tran, Xuan Nghia Pham, Le The Dung
Meteorological and Hydrological Drought Assessment for Dong Nai River Basin, Vietnam under Climate Change
Vu Thuy Linh, Vo Ngoc Quynh Tram, Ho Minh Dung, Dang Nguyen Dong Phuong, Nguyen Duy Liem, Long D. Nguyen, Cheng Yin, Ayse Kortun, Nguyen Kim Loi
A Reliable Link-Adaptive Position-Based Routing Protocol for Flying ad hoc Network
Qamar Usman, Omer Chughtai, Nadia Nawaz, Zeeshan Kaleem, Kishwer Abdul Khaliq, Long D. Nguyen