This work was supported in part by the National Key R&D Program of China(2018AAA0101100);the National Natural Science Foundation of China(Grant Nos.62022008 and 92067204).
In Internet of Things(loT),data sharing among different devices can improve manufacture efficiency and reduce workload,and yet make the network systems be more vulnerable to various intrusion attacks.There has been re...
supported by the National Natural Science Foundation of China (Grand Nos.62072128,11901579,11801564);the Natural Science Foundation of Shaanxi (2022JQ-046,2021JQ-335,2021JM-216).
Federated learning(FL)has emerged to break data-silo and protect clients’privacy in the field of artificial intelligence.However,deep leakage from gradient(DLG)attack can fully reconstruct clients’data from the subm...
This work was supported in part by the National Natural Science Foundation of China(Grant No.61671471)。
Recently revealed beam stealing attacks could greatly threaten the security and privacy of IEEE 802.11ad communications.The premise to restore normal network service is detecting and locating beam stealing attackers w...
supported by the National Natural Science Foundation of China (Grand Nos.11901579,11801564).
1 Introduction As a new mode of distributed learning,Federated Learning(FL)helps multiple organizations or clients to jointly train an artificial intelligence model without sharing their own datasets.Compared with the...
Currently,security-critical server programs are well protected by various defense techniques,such as Address Space Layout Randomization(ASLR),eXecute Only Memory(XOM),and Data Execution Prevention(DEP),against modern ...
This research was supported by the National Natural Science Foundation of China(Grant No.61572174);Hunan Province Special Funds of Central Government for Guiding Local Science and Technology Development(2018CT5001);Hunan Provincial Natural Science Foundation of China(2019JJ60004);the Scientific Research Fund of Hunan Provincial Education Department with(19A072);Subject group construction project of Hengyang Normal University(18XKQ02);Application-oriented Special Disciplines,Double First-Class University Project of Hunan Province(Xiangjiaotong[2018]469);the Science and Technology Plan Project of Hunan Province(2016TP1020).
There has been a growing interest in the sidechannel analysis(SCA)field based on deep learning(DL)technology.Various DL network or model has been developed to improve the efficiency of SCA.However,few studies have inv...
supported by the National Natural Science Foundation of China(NSFC)(Grant Nos.61532021,U1811264 and U1501252).
1 Introduction and main contributions Location-based services are springing up around us,while leakages of users'privacy are inevitable during services.Even worse,adversaries may analyze intercepted service data,and e...
Identification of attacks by a network intrusion detection system (NIDS) is an important task. In signature or rule based detection, the previously encountered attacks are modded, and signatures/rules are extracted....
Privacy preservation has recently received considerable attention for location-based mobile services. A lot of location cloaking approaches focus on identity and location protection, but few algorithms pay attention t...
Recently, He et al. (Computers and Mathematics with Applications, 2012) proposed an efficient pairing-free certificateless authenticated key agreement (CL-AKA) protocol and claimed their protocol was provably secu...