supported by Australian Research Council under the Streams of Future Fellowship(Grant No.FT210100624);Discovery Project(Grant No.DP240101108);Linkage Project(Grant No.LP230200892)。
Federated recommender systems(FedRecs)have garnered increasing attention recently,thanks to their privacypreserving benefits.However,the decentralized and open characteristics of current FedRecs present at least two d...
the National Key Research and Development Program of China(2023YFB3907300);the National Natural Science Foundation of China(U2268206,T2222015);the Beijing Natural Science Foundation(4232031).
Global Navigation Satellite Systems(GNSSs)are vulnerable to both unintentional interference and intentional attacks,making it difficult to meet the stringent safety requirements of railway train control systems.The gr...
A decentralized network made up of mobile nodes is termed the Mobile Ad-hoc Network(MANET).Mobility and a finite battery lifespan are the two main problems with MANETs.Advanced methods are essential for enhancing MANE...
supported in part by NSFC No.62202275 and Shandong-SF No.ZR2022QF012 projects.
In recent years,deep learning(DL)models have achieved signifcant progress in many domains,such as autonomous driving,facial recognition,and speech recognition.However,the vulnerability of deep learning models to adver...
supported by the Natural Science Basic Research Plan in Shaanxi Province of China(Program No.2022JM-381,2017JQ6070);National Natural Science Foundation of China(Grant No.61703256),Foundation of State Key Laboratory of Public Big Data(No.PBD2022-08);the Fundamental Research Funds for the Central Universities,China(Program No.GK202201014,GK202202003,GK201803020).
Studies show that Graph Neural Networks(GNNs)are susceptible to minor perturbations.Therefore,analyzing adversarial attacks on GNNs is crucial in current research.Previous studies used Generative Adversarial Networks ...
supported by the National Natural Science Foundation of China(No.12371525).
Lightweight block ciphers are the essential encryption algorithm for devices with limited resources.Its goal is to ensure the security of data transmission through resource-constrained devices.Impossible diferential c...
supported by Hainan Provincial Natural Science Foundation of China(No.524RC532);Research Startup Funding from Hainan Institute of Zhejiang University(No.0210-6602-A12202);Project of Sanya Yazhou Bay Science and Technology City(No.SKJC-2022-PTDX-009/010/011).
Given the rapid development of advanced information systems,microgrids(MGs)suffer from more potential attacks that affect their operational performance.Conventional distributed secondary control with a small,fixed sam...
supported by the National Defense Basic Scientific Research Program of China(No.JCKY2023602C026);the funding of Key Laboratory of Mobile Application Innovation and Governance Technology,Ministry of Industry and Information Technology(2023IFS080601-K).
Website fingerprinting (WF) attacks can reveal information about the websites users browse by de-anonymizing encrypted traffic. Traditional website fingerprinting attack models, focusing solely on a single spatial fea...
supported by the Ministry of Trade,Industry and Energy(MOTIE)under Training Industrial Security Specialist for High-Tech Industry(RS-2024-00415520)supervised by the Korea Institute for Advancement of Technology(KIAT);the Ministry of Science and ICT(MSIT)under the ICT Challenge and Advanced Network of HRD(ICAN)Program(No.IITP-2022-RS-2022-00156310)supervised by the Institute of Information&Communication Technology Planning&Evaluation(IITP).
As the density of wireless networks increases globally, the vulnerability of overlapped dense wireless communications to interference by hidden nodes and denial-of-service (DoS) attacks is becoming more apparent. Ther...
funded by the Office of Gas and Electricity Markets(Ofgem)and supported by De Montfort University(DMU)and Nottingham Trent University(NTU),UK.
This paper introduces the Integrated Security Embedded Resilience Architecture (ISERA) as an advanced resilience mechanism for Industrial Control Systems (ICS) and Operational Technology (OT) environments. The ISERA f...