All Stories

  1. A new security paradigm for next-generation wireless networks
  2. Boosting Practical Control-Flow Integrity with Complete Field Sensitivity and Origin Awareness
  3. Watch the Rhythm: Breaking Privacy with Accelerometer at the Extremely-Low Sampling Rate of 5Hz
  4. Real-time Rectifying Flight Control Misconfiguration Using Intelligent Agent
  5. Take Over the Whole Cluster: Attacking Kubernetes via Excessive Permissions of Third-party Applications
  6. TypeSqueezer: When Static Recovery of Function Signatures for Binary Executables Meets Dynamic Analysis
  7. Travelling the Hypervisor and SSD: A Tag-Based Approach Against Crypto Ransomware with Fine-Grained Data Recovery
  8. Eyes See Hazy while Algorithms Recognize Who You Are
  9. TEE-Assisted Time-Scale Database Management System on IoT devices
  10. SEBD: Sensor Emulation Based Backdoor for Autopilot
  11. A Semi-Supervised Anomaly Network Traffic Detection Framework via Multimodal Traffic Information Fusion
  12. A Survey on Searchable Symmetric Encryption
  13. IRGA: An Intelligent Implicit Real-time Gait Authentication System in Heterogeneous Complex Scenarios
  14. Control parameters considered harmful
  15. Demons in the Shared Kernel
  16. Graph Embedding Based on Euclidean Distance Matrix and its Applications
  17. Controlling Neural Learning Network with Multiple Scales for Image Splicing Forgery Detection
  18. Achieving Secure and Convenient WLAN Sharing in Personal
  19. Fingerprint Protected Password Authentication Protocol
  20. Designated Verifier Proxy Blind Signature Scheme for Unmanned Aerial Vehicle Network Based on Mobile Edge Computing
  21. LIP-PA: A Logistics Information Privacy Protection Scheme with Position and Attribute-Based Access Control on Mobile Devices
  22. Selecting Critical Data Flows in Android Applications for Abnormal Behavior Detection
  23. Comparable Encryption Scheme over Encrypted Cloud Data in Internet of Everything
  24. Feasibility study of context-awareness device comfort calculation methods and their application to comfort-based access control
  25. GetReal