Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleDecember 2024
Watch the Rhythm: Breaking Privacy with Accelerometer at the Extremely-Low Sampling Rate of 5Hz
CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications SecurityPages 1776–1790https://doi.org/10.1145/3658644.3690370Considering the threat from on-board eavesdropping with smartphone motion sensors, Android 12 has limited the maximum sampling rate of motion sensors to 200Hz for zero-privilege access to prevent potential wiretapping. Unfortunately, there have been some ...
- research-articleDecember 2024
Boosting Practical Control-Flow Integrity with Complete Field Sensitivity and Origin Awareness
CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications SecurityPages 4524–4538https://doi.org/10.1145/3658644.3670308Control-flow integrity (CFI) is a strong and efficient defense mechanism against memory-corruption attacks. The practical versions of CFI, which have been integrated into compilers, employ static analysis to collect all possibly valid target functions of ...
- research-articleDecember 2024
Location-Aware and Privacy-Preserving Data Cleaning for Intelligent Transportation
IEEE Transactions on Intelligent Transportation Systems (ITS-TRANSACTIONS), Volume 25, Issue 12Pages 20405–20418https://doi.org/10.1109/TITS.2024.3453340The widespread use of machine learning in location-related scenarios is propelling the rapid development of intelligent transportation. To assist users in making more informed travel plans, the demand for improving prediction accuracy is growing. Prior to ...
- research-articleOctober 2024
PBAG: A Privacy-Preserving Blockchain-Based Authentication Protocol With Global-Updated Commitment in IoVs
IEEE Transactions on Intelligent Transportation Systems (ITS-TRANSACTIONS), Volume 25, Issue 10Pages 13524–13545https://doi.org/10.1109/TITS.2024.3399200Internet of Vehicles (IoVs) is increasingly used as a medium to propagate critical information via establishing connections between entities such as vehicles and infrastructures. During message transmission, privacy-preserving authentication is considered ...
- ArticleSeptember 2024
ZMAM: A ZKP-Based Mutual Authentication Scheme for the IoMT
AbstractIn the era of smart healthcare, the Internet of Medical Things (IoMT) ubiquitously collects, evaluates, monitors, and prescribes treatments for patients. Despite its significant benefits, IoMT faces substantial risks related to unauthorized access ...
-
- research-articleSeptember 2024
BiTDB: Constructing A Built-in TEE Secure Database for Embedded Systems
IEEE Transactions on Knowledge and Data Engineering (IEEECS_TKDE), Volume 36, Issue 9Pages 4472–4485https://doi.org/10.1109/TKDE.2024.3380367In this paper, we propose BiTDB, a built-in Trusted Execution Environment (TEE) database for embedded systems, to realize higher system availability while ensuring data confidentiality. With BiTDB, dilemmas that the state-of-the-art research work on ...
- research-articleAugust 2024
GNSS spoofing detection for UAVs using Doppler frequency and Carrier-to-Noise Density Ratio
Journal of Systems Architecture: the EUROMICRO Journal (JOSA), Volume 153, Issue Chttps://doi.org/10.1016/j.sysarc.2024.103212AbstractUnmanned Aerial Vehicles (UAVs) are typical real-time embedded systems, which require precise locations for completing flight missions. The Global Navigation Satellite System (GNSS) plays a crucial role in navigation and positioning for UAVs. ...
- ArticleJuly 2024
Action-Driven UAV Fingerprint Verification with Perception Data
AbstractUnmanned Aerial Vehicles (UAVs) have a wide range of applications in various industries. Their navigation in challenging environments like dense forests and urban areas requires a high degree of precision. However, vulnerabilities such as external ...
- research-articleJuly 2024
Effectively Improving Data Diversity of Substitute Training for Data-Free Black-Box Attack
IEEE Transactions on Dependable and Secure Computing (TDSC), Volume 21, Issue 4Pages 4206–4219https://doi.org/10.1109/TDSC.2023.3347753Recent substitute training methods have utilized the concept of Generative Adversarial Networks (GANs) to implement data-free black-box attacks. Specifically, in designing the generators, the substitute training methods use a similar structure to the ...
- research-articleJuly 2024
FairECom: Towards Proof of E-Commerce Fairness Against Price Discrimination
IEEE Transactions on Dependable and Secure Computing (TDSC), Volume 21, Issue 4Pages 3528–3544https://doi.org/10.1109/TDSC.2023.3334197Price discrimination has been empirically exposed where e-commercial platforms aim to gain additional profits by charging customers with different prices for the same product/service. This situation becomes even worse in nowadays’ Big Data era, ...
- research-articleJune 2024
PSMA: Layered Deployment Scheme for Secure VNF Multiplexing Based on Primary and Secondary Multiplexing Architecture
IEEE Transactions on Network and Service Management (ITNSM), Volume 21, Issue 3Pages 3609–3622https://doi.org/10.1109/TNSM.2024.3382676The adoption of SDN/NFV opens avenues for efficient network slicing deployment and cost control. However, the dynamic cost reduction brought by deployment location optimization is not suitable for all scenarios. To further reduce the cost, we recommend a ...
- research-articleJune 2024
RPPM: A Reputation-Based and Privacy-Preserving Platoon Management Scheme in Vehicular Networks
IEEE Transactions on Intelligent Transportation Systems (ITS-TRANSACTIONS), Volume 25, Issue 6Pages 6147–6160https://doi.org/10.1109/TITS.2023.3339659Platoon refers to a group of vehicles traveling in a train-like strategy with a lean inter-vehicle gap, which can increase road capacity and reduce energy consumption. A platoon is composed of several member vehicles and one leader vehicle which ...
- research-articleJune 2024
Defending against membership inference attacks: RM Learning is all you need
Information Sciences: an International Journal (ISCI), Volume 670, Issue Chttps://doi.org/10.1016/j.ins.2024.120636AbstractLarge-capacity machine learning models are vulnerable to membership inference attacks that disclose the privacy of the training dataset. The privacy concerns posed by membership inference attacks have inspired many defense strategies. ...
- research-articleMay 2024
T-Trace: Constructing the APTs Provenance Graphs Through Multiple Syslogs Correlation
IEEE Transactions on Dependable and Secure Computing (TDSC), Volume 21, Issue 3Pages 1179–1195https://doi.org/10.1109/TDSC.2023.3273918Advanced Persistent Threats (APTs) employ sophisticated and covert tactics to infiltrate target systems, leading to increased vulnerability and an elevated risk of exposure. Consequently, it is essential for us to proactively create an extensive and ...
- research-articleMay 2024
ADDITION: Detecting Adversarial Examples With Image-Dependent Noise Reduction
IEEE Transactions on Dependable and Secure Computing (TDSC), Volume 21, Issue 3Pages 1139–1154https://doi.org/10.1109/TDSC.2023.3269012Notwithstanding the tremendous success of deep neural networks in a range of realms, previous studies have shown that these learning models are exposed to an inherent hazard called <italic>adversarial example</italic> — images to which an elaborate ...
- research-articleMay 2024
Efficient and self-recoverable privacy-preserving k-NN classification system with robustness to network delay
Journal of Systems Architecture: the EUROMICRO Journal (JOSA), Volume 150, Issue Chttps://doi.org/10.1016/j.sysarc.2024.103111AbstractOnline classification services based on machine learning have been widely used in fields such as healthcare and finance. To enhance the data privacy and avoid server collusion, companies usually deploy servers on different cloud service providers ...
Graphical abstractDisplay Omitted
Highlights- Constant online communication rounds, efficient and robust classification service even under network delay.
- Secure redundant backup servers to enable fast system self-recovery without data re-upload.
- Client-friendly and lightweight ...
- review-articleMay 2024
DawnGNN: Documentation augmented windows malware detection using graph neural network
AbstractApplication Program Interface (API) calls are widely used in dynamic Windows malware analysis to characterize the run-time behavior of malware. Researchers have proposed various approaches to mine semantic information from API calls to improve ...
- research-articleMay 2024
GlareShell: Graph learning-based PHP webshell detection for web server of industrial internet
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 245, Issue Chttps://doi.org/10.1016/j.comnet.2024.110406AbstractWith the explosive growth of the Industrial Internet scale, cyberattacks targeting industrial control systems also increased. The management and operation of Industrial Internet are usually performed via web servers which retain a large attack ...
Highlights- We proposed a novel graph learning-based PHP Webshell detection framework, namely GlareShell, that integrates the semantic information extracted from word embedding techniques and derived risk levels to identify the maliciousness of PHP ...
- research-articleApril 2024
K-Backup: Load- and TCAM-Aware Multi-Backup Fast Failure Recovery in SDNs
IEEE/ACM Transactions on Networking (TON), Volume 32, Issue 4Pages 3347–3360https://doi.org/10.1109/TNET.2024.3386091The Proactive Recovery (PR) mechanism in Software-Defined Networking (SDN) provides good failure recovery resilience for the Beyond Fifth-Generation/Sixth-Generation (B5G/6G) delay-sensitive applications. However, PR’s fixed single backup path ...
- research-articleApril 2024
FlGan: GAN-Based Unbiased Federated Learning Under Non-IID Settings
IEEE Transactions on Knowledge and Data Engineering (IEEECS_TKDE), Volume 36, Issue 4Pages 1566–1581https://doi.org/10.1109/TKDE.2023.3309858Federated Learning (FL) suffers from low convergence and significant accuracy loss due to local biases caused by non-Independent and Identically Distributed (non-IID) data. To enhance the non-IID FL performance, a straightforward idea is to leverage the ...