《Cybersecurity》

作品数:261被引量:197H指数:6
导出分析报告
《Cybersecurity》
主办单位:Institute of Information Engineering;The Chinese Academy of Sciences(IIECAS);China Science Publishing & Media LTD
最新期次:2025年1期更多>>
发文主题:ATTACKSMACHINE_LEARNINGMALWAREATTACKSECURITY更多>>
发文领域:自动化与计算机技术电子电信理学语言文字更多>>
发文基金:国家自然科学基金国家社会科学基金北京市自然科学基金广西壮族自治区自然科学基金更多>>
-

检索结果分析

结果分析中...
条 记 录,以下是1-10
视图:
排序:
Editorial Board
《Cybersecurity》2025年第1期F0002-F0002,共1页
Intrusion detection system for controller area network
《Cybersecurity》2025年第1期1-21,共21页Vinayak Tanksale 
The rapid expansion of intra-vehicle networks has increased the number of threats to such networks.Most modern vehicles implement various physical and data-link layer technologies.Vehicles are becoming increasingly au...
关键词:Controller area network Deep learning Intrusion detection system Long short-term memory Machine learning Recurrent neural networks 
Practical solutions in fully homomorphic encryption:a survey analyzing existing acceleration methods
《Cybersecurity》2025年第1期22-44,共23页Yanwei Gong Xiaolin Chang Jelena Mišić Vojislav BMišić Jianhua Wang Haoran Zhu 
supported in part by National Natural Science Foundation of China under Grant No.62272028 and 6230203.
Fully homomorphic encryption(FHE)has experienced signifcant development and continuous breakthroughs in theory,enabling its widespread application in various felds,like outsourcing computation and secure multiparty co...
关键词:ACCELERATION BOOTSTRAPPING FPGA Fully homomorphic encryption GPU NTT 
F3l:an automated and secure function-level low-overhead labeled encrypted traffic dataset construction method for IM in Android
《Cybersecurity》2025年第1期45-60,共16页Keya Xu Guang Cheng 
supported by the General Program of the National Natural Science Foundation of China under Grant No.62172093.
Fine-grained function-level encrypted traffic classification is an essential approach to maintaining network security.Machine learning and deep learning have become mainstream methods to analyze traffic,and labeled da...
关键词:Encrypted traffic Deep learning ANDROID Labeled dataset 
A circuit area optimization of MK-3 S-box
《Cybersecurity》2025年第1期61-71,共11页Yanjun Li Weiguo Zhang Yiping Lin Jian Zou Jian Liu 
supported by the Open Project of Henan Key Laboratory of Network Cryptography Technology(NO.LNCT2021-A09);the Advanced Discipline Construction Project of Beijing Universities(20210101Z0401).
In MILCOM 2015,Kelly et al.proposed the authentication encryption algorithm MK-3,which applied the 16-bit S-box.This paper aims to implement the 16-bit S-box with less circuit area.First,we classifed the irreducible p...
关键词:IRREDUCIBLE operations OPTIMIZATION 
LayerCFL:an efcient federated learning with layer-wised clustering
《Cybersecurity》2025年第1期72-85,共14页Jie Yuan Rui Qian Tingting Yuan Mingliang Sun Jirui Li Xiaoyong Li 
Supported by the National Natural Science Foundation of China(No.62002028,No.62102040 and No.62202066).
Federated Learning(FL)sufers from the Non-IID problem in practice,which poses a challenge for efcient and accurate model training.To address this challenge,prior research has introduced clustered FL(CFL),which involve...
关键词:Federated learning Clustered federated learning Non-IID Layer-wised clustering 
Towards the transferable audio adversarial attack via ensemble methods
《Cybersecurity》2025年第1期86-102,共17页Feng Guo Zheng Sun Yuxuan Chen Lei Ju 
supported in part by NSFC No.62202275 and Shandong-SF No.ZR2022QF012 projects.
In recent years,deep learning(DL)models have achieved signifcant progress in many domains,such as autonomous driving,facial recognition,and speech recognition.However,the vulnerability of deep learning models to adver...
关键词:Adversarial attacks Dynamic gradient weighting Transferability Ensemble methods 
Enhanced detection of obfuscated malware in memory dumps:a machine learning approach for advanced cybersecurity被引量:1
《Cybersecurity》2025年第1期103-125,共23页Md.Alamgir Hossain Md.Saiful Islam 
In the realm of cybersecurity,the detection and analysis of obfuscated malware remain a critical challenge,especially in the context of memory dumps.This research paper presents a novel machine learning-based framewor...
关键词:Obfuscated malware detection Memory dump analysis Advanced malware analytics Malware behavioral patterns Advanced malware analytics Machine learning in cybersecurity 
CT-GCN+:a high-performance cryptocurrency transaction graph convolutional model for phishing node classification被引量:1
《Cybersecurity》2025年第1期126-141,共16页Bingxue Fu Yixuan Wang Tao Feng 
Due to the anonymous and contract transfer nature of blockchain cryptocurrencies,they are susceptible to fraudulent incidents such as phishing.This poses a threat to the property security of users and hinders the heal...
关键词:Blockchain Information security Phishing detection Imbalance data Transaction graph 
WAS:improved white-box cryptographic algorithm over AS iteration
《Cybersecurity》2025年第1期142-152,共11页Yatao Yang Yuying Zhai Hui Dong Yanshuo Zhang 
supported by Beijing Natural Science Foundation(No:4232034);the Fundamental Research Funds for the Central Universities(No:328202222).
The attacker in white-box model has full access to software implementation of a cryptographic algorithm and full control over its execution environment.In order to solve the issues of high storage cost and inadequate ...
关键词:White-box cryptography Block cipher Substitution permutation network structure Anti-key extraction Anti-code lifting 
检索报告 对象比较 聚类工具 使用帮助 返回顶部