All Stories

  1. Slot : Provenance-Driven APT Detection through Graph Reinforcement Learning
  2. DPFuzzer: Discovering Safety Critical Vulnerabilities for Drone Path Planners
  3. OBIR-tree: An Efficient Oblivious Index for Spatial Keyword Queries on Secure Enclaves
  4. A new security paradigm for next-generation wireless networks
  5. Boosting Practical Control-Flow Integrity with Complete Field Sensitivity and Origin Awareness
  6. Watch the Rhythm: Breaking Privacy with Accelerometer at the Extremely-Low Sampling Rate of 5Hz
  7. Real-time Rectifying Flight Control Misconfiguration Using Intelligent Agent
  8. Take Over the Whole Cluster: Attacking Kubernetes via Excessive Permissions of Third-party Applications
  9. TypeSqueezer: When Static Recovery of Function Signatures for Binary Executables Meets Dynamic Analysis
  10. Travelling the Hypervisor and SSD: A Tag-Based Approach Against Crypto Ransomware with Fine-Grained Data Recovery
  11. Eyes See Hazy while Algorithms Recognize Who You Are
  12. TEE-Assisted Time-Scale Database Management System on IoT devices
  13. SEBD: Sensor Emulation Based Backdoor for Autopilot
  14. A Semi-Supervised Anomaly Network Traffic Detection Framework via Multimodal Traffic Information Fusion
  15. A Survey on Searchable Symmetric Encryption
  16. IRGA: An Intelligent Implicit Real-time Gait Authentication System in Heterogeneous Complex Scenarios
  17. Control parameters considered harmful
  18. Demons in the Shared Kernel
  19. Graph Embedding Based on Euclidean Distance Matrix and its Applications
  20. Controlling Neural Learning Network with Multiple Scales for Image Splicing Forgery Detection
  21. Achieving Secure and Convenient WLAN Sharing in Personal
  22. Fingerprint Protected Password Authentication Protocol
  23. Designated Verifier Proxy Blind Signature Scheme for Unmanned Aerial Vehicle Network Based on Mobile Edge Computing
  24. LIP-PA: A Logistics Information Privacy Protection Scheme with Position and Attribute-Based Access Control on Mobile Devices
  25. Selecting Critical Data Flows in Android Applications for Abnormal Behavior Detection
  26. Comparable Encryption Scheme over Encrypted Cloud Data in Internet of Everything
  27. Feasibility study of context-awareness device comfort calculation methods and their application to comfort-based access control
  28. GetReal