All Stories

  1. OBIR-tree: An Efficient Oblivious Index for Spatial Keyword Queries on Secure Enclaves
  2. A new security paradigm for next-generation wireless networks
  3. Boosting Practical Control-Flow Integrity with Complete Field Sensitivity and Origin Awareness
  4. Watch the Rhythm: Breaking Privacy with Accelerometer at the Extremely-Low Sampling Rate of 5Hz
  5. Real-time Rectifying Flight Control Misconfiguration Using Intelligent Agent
  6. Take Over the Whole Cluster: Attacking Kubernetes via Excessive Permissions of Third-party Applications
  7. TypeSqueezer: When Static Recovery of Function Signatures for Binary Executables Meets Dynamic Analysis
  8. Travelling the Hypervisor and SSD: A Tag-Based Approach Against Crypto Ransomware with Fine-Grained Data Recovery
  9. Eyes See Hazy while Algorithms Recognize Who You Are
  10. TEE-Assisted Time-Scale Database Management System on IoT devices
  11. SEBD: Sensor Emulation Based Backdoor for Autopilot
  12. A Semi-Supervised Anomaly Network Traffic Detection Framework via Multimodal Traffic Information Fusion
  13. A Survey on Searchable Symmetric Encryption
  14. IRGA: An Intelligent Implicit Real-time Gait Authentication System in Heterogeneous Complex Scenarios
  15. Control parameters considered harmful
  16. Demons in the Shared Kernel
  17. Graph Embedding Based on Euclidean Distance Matrix and its Applications
  18. Controlling Neural Learning Network with Multiple Scales for Image Splicing Forgery Detection
  19. Achieving Secure and Convenient WLAN Sharing in Personal
  20. Fingerprint Protected Password Authentication Protocol
  21. Designated Verifier Proxy Blind Signature Scheme for Unmanned Aerial Vehicle Network Based on Mobile Edge Computing
  22. LIP-PA: A Logistics Information Privacy Protection Scheme with Position and Attribute-Based Access Control on Mobile Devices
  23. Selecting Critical Data Flows in Android Applications for Abnormal Behavior Detection
  24. Comparable Encryption Scheme over Encrypted Cloud Data in Internet of Everything
  25. Feasibility study of context-awareness device comfort calculation methods and their application to comfort-based access control
  26. GetReal