The rapid expansion of intra-vehicle networks has increased the number of threats to such networks.Most modern vehicles implement various physical and data-link layer technologies.Vehicles are becoming increasingly au...
supported in part by National Natural Science Foundation of China under Grant No.62272028 and 6230203.
Fully homomorphic encryption(FHE)has experienced signifcant development and continuous breakthroughs in theory,enabling its widespread application in various felds,like outsourcing computation and secure multiparty co...
supported by the General Program of the National Natural Science Foundation of China under Grant No.62172093.
Fine-grained function-level encrypted traffic classification is an essential approach to maintaining network security.Machine learning and deep learning have become mainstream methods to analyze traffic,and labeled da...
supported by the Open Project of Henan Key Laboratory of Network Cryptography Technology(NO.LNCT2021-A09);the Advanced Discipline Construction Project of Beijing Universities(20210101Z0401).
In MILCOM 2015,Kelly et al.proposed the authentication encryption algorithm MK-3,which applied the 16-bit S-box.This paper aims to implement the 16-bit S-box with less circuit area.First,we classifed the irreducible p...
Supported by the National Natural Science Foundation of China(No.62002028,No.62102040 and No.62202066).
Federated Learning(FL)sufers from the Non-IID problem in practice,which poses a challenge for efcient and accurate model training.To address this challenge,prior research has introduced clustered FL(CFL),which involve...
supported in part by NSFC No.62202275 and Shandong-SF No.ZR2022QF012 projects.
In recent years,deep learning(DL)models have achieved signifcant progress in many domains,such as autonomous driving,facial recognition,and speech recognition.However,the vulnerability of deep learning models to adver...
In the realm of cybersecurity,the detection and analysis of obfuscated malware remain a critical challenge,especially in the context of memory dumps.This research paper presents a novel machine learning-based framewor...
Due to the anonymous and contract transfer nature of blockchain cryptocurrencies,they are susceptible to fraudulent incidents such as phishing.This poses a threat to the property security of users and hinders the heal...
supported by Beijing Natural Science Foundation(No:4232034);the Fundamental Research Funds for the Central Universities(No:328202222).
The attacker in white-box model has full access to software implementation of a cryptographic algorithm and full control over its execution environment.In order to solve the issues of high storage cost and inadequate ...