supported partially by the National Natural Science Foundation of China(Nos.62172378,61572448,and 61827810);by the National Key Research and Development Program of China(No.2020YFB1707701).
Recent advancements in deep learning(DL)have introduced new security challenges in the form of side-channel attacks.A prime example is the website fingerprinting attack(WFA),which targets anonymity networks like Tor,e...
the Key JCJQ Program of China:2020-JCJQ-ZD-021-00 and 2020-JCJQ-ZD-024-12.
Website fingerprinting,also known asWF,is a traffic analysis attack that enables local eavesdroppers to infer a user’s browsing destination,even when using the Tor anonymity network.While advanced attacks based on de...
Phishing is the easiest method for gathering sensitive information from unwary people.Phishers seek to get private data including passwords,login information,and bank account details.Cyber security experts are activel...
Shifting to negativity is more and more prevalent in online communities and may play a key role in group polarization.While current research indicates a close relationship between group polarization and negative senti...
supported by Zhejiang Provincial Natural Science Foundation of China(Grant No.LGF20G030001);Ministry of Public Security Science and Technology Plan Project(2022LL16);Key scientific research projects of agricultural and social development in Hangzhou in 2020(202004A06).
The feature analysis of fraudulent websites is of great significance to the combat,prevention and control of telecom fraud crimes.Aiming to address the shortcomings of existing analytical approaches,i.e.single dimensi...
Several threats are propagated by malicious websites largely classified as phishing. Its function is important information for users with the purpose of criminal practice. In summary, phishing is a technique used on t...
partially supported by the National Key R&D Program of China(No.2017YFB1003000);the National Natural Science Foundation of China(Nos.61572130,61320106007,61632008,61502100,61532013,and 61402104);the Jiangsu Provincial Natural Science Foundation(No.BK20150637);the Jiangsu Provincial Key Technology R&D Program(No.BE2014603);the Qing Lan Project of Jiangsu Province,Jiangsu Provincial Key Laboratory of Network and Information Security(No.BM2003201);the Key Laboratory of Computer Network and Information Integration of the Ministry of Education of China(No.93K-9)
Tor is pervasively used to conceal target websites that users are visiting. A de-anonymization technique against Tor, referred to as website fingerprinting attack, aims to infer the websites accessed by Tor clients by...
This paper mainly analysis of group buying website based on O2O model. This new e-business model which has great development potential attracted many entrepreneurs. The related theories of network group-buying model w...
Comparative studies of trait evolution require accounting for the shared evolutionary history. This is done by includ- ing phylogenetic hypotheses into statistical analyses of species' traits, for which birds often s...
E-Business now is developing fast in China and the development of E-Business strategy is crucial as the right strategy can make the E-Business select the correct direction and get a better development. In this paper, ...