Akademska digitalna zbirka SLovenije - logo

Search results

Basic search    Expert search   

Currently you are NOT authorised to access e-resources SI consortium. For full access, REGISTER.

1 2 3 4 5
hits: 38,459
1.
  • Hybrid sequence‐based Andro... Hybrid sequence‐based Android malware detection using natural language processing
    Zhang, Nan; Xue, Jingfeng; Ma, Yuxi ... International journal of intelligent systems, October 2021, 2021-10-00, 20211001, Volume: 36, Issue: 10
    Journal Article
    Peer reviewed
    Open access

    Android platform has been the target of attackers due to its openness and increasing popularity. Android malware has explosively increased in recent years, which poses serious threats to Android ...
Full text
Available for: FZAB, GIS, IJS, KILJ, NLZOH, NUK, OILJ, SAZU, SBCE, SBMB, UL, UM, UPUK
2.
  • The security of machine lea... The security of machine learning in an adversarial setting: A survey
    Wang, Xianmin; Li, Jing; Kuang, Xiaohui ... Journal of parallel and distributed computing, August 2019, 2019-08-00, Volume: 130
    Journal Article
    Peer reviewed

    Machine learning (ML) methods have demonstrated impressive performance in many application fields such as autopilot, facial recognition, and spam detection. Traditionally, ML models are trained and ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
3.
  • Secure Multi-Party Computat... Secure Multi-Party Computation: Theory, practice and applications
    Zhao, Chuan; Zhao, Shengnan; Zhao, Minghao ... Information sciences, February 2019, 2019-02-00, Volume: 476
    Journal Article
    Peer reviewed

    Secure Multi-Party Computation (SMPC) is a generic cryptographic primitive that enables distributed parties to jointly compute an arbitrary functionality without revealing their own private inputs ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
4.
  • Data security sharing model... Data security sharing model based on privacy protection for blockchain‐enabled industrial Internet of Things
    Zhang, Qikun; Li, Yongjiao; Wang, Ruifang ... International journal of intelligent systems, January 2021, 2021-01-00, 20210101, Volume: 36, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    With the widespread application of Industrial Internet of Things (IIoT) technology in the industry, the security threats are also increasing. To ensure the safe sharing of resources in IIoT, this ...
Full text
Available for: FZAB, GIS, IJS, KILJ, NLZOH, NUK, OILJ, SAZU, SBCE, SBMB, UL, UM, UPUK
5.
  • DPPDL: A Dynamic Partial-Pa... DPPDL: A Dynamic Partial-Parallel Data Layout for Green Video Surveillance Storage
    Sun, Zhizhuo; Zhang, Quanxin; Li, Yuanzhang ... IEEE transactions on circuits and systems for video technology, 01/2018, Volume: 28, Issue: 1
    Journal Article
    Peer reviewed

    Video surveillance requires storing massive amounts of video data, which results in the rapid increasing of storage energy consumption. With the popularization of video surveillance, green storage ...
Full text
Available for: IJS, NUK, UL
6.
  • A fine‐grained and traceabl... A fine‐grained and traceable multidomain secure data‐sharing model for intelligent terminals in edge‐cloud collaboration scenarios
    Sun, Haipeng; Tan, Yu‐an; Zhu, Liang ... International journal of intelligent systems, March 2022, 2022-03-00, 20220301, Volume: 37, Issue: 3
    Journal Article
    Peer reviewed
    Open access

    Secure data‐sharing technology is a bridge for various collaborative operations among intelligent terminals in the edge‐cloud collaborative application scenario. For the shared data ...
Full text
Available for: FZAB, GIS, IJS, KILJ, NLZOH, NUK, OILJ, SAZU, SBCE, SBMB, UL, UM, UPUK
7.
  • Search pattern leakage in s... Search pattern leakage in searchable encryption: Attacks and new construction
    Liu, Chang; Zhu, Liehuang; Wang, Mingzhong ... Information sciences, 05/2014, Volume: 265
    Journal Article
    Peer reviewed
    Open access

    Searching on remote encrypted data (commonly known as searchable encryption) has become an important issue in secure data outsourcing, since it allows users to outsource encrypted data to an ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK

PDF
8.
  • Deep learning feature explo... Deep learning feature exploration for Android malware detection
    Zhang, Nan; Tan, Yu-an; Yang, Chen ... Applied soft computing, April 2021, 2021-04-00, Volume: 102
    Journal Article
    Peer reviewed

    Android mobile devices and applications are widely deployed and used in industry and smart city. Malware detection is one of the most powerful and effective approaches to guarantee security of ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
9.
  • Edge-Cloud Collaborative De... Edge-Cloud Collaborative Defense against Backdoor Attacks in Federated Learning
    Yang, Jie; Zheng, Jun; Wang, Haochen ... Sensors, 01/2023, Volume: 23, Issue: 3
    Journal Article
    Peer reviewed
    Open access

    Federated learning has a distributed collaborative training mode, widely used in IoT scenarios of edge computing intelligent services. However, federated learning is vulnerable to malicious attacks, ...
Full text
Available for: IZUM, KILJ, NUK, PILJ, PNG, SAZU, UL, UM, UPUK
10.
  • A Robust Packet-Dropout Cov... A Robust Packet-Dropout Covert Channel over Wireless Networks
    Li, Yuanzhang; Zhang, Xiaosong; Xu, Xinting ... IEEE wireless communications, 2020-June, 2020-6-00, 20200601, Volume: 27, Issue: 3
    Journal Article
    Peer reviewed

    Wireless communication is the most important carrier for covert channels because increasing security threats have made covert channels an alternative to transmitting confidential information in ...
Full text
Available for: IJS, NUK, UL
1 2 3 4 5
hits: 38,459

Load filters