UNI-MB - logo
UMNIK - logo
 

Search results

Basic search    Expert search   

Currently you are NOT authorised to access e-resources UM. For full access, REGISTER.

1 2 3 4 5
hits: 31,355
1.
  • Hybrid sequence‐based Andro... Hybrid sequence‐based Android malware detection using natural language processing
    Zhang, Nan; Xue, Jingfeng; Ma, Yuxi ... International journal of intelligent systems, October 2021, 2021-10-00, 20211001, Volume: 36, Issue: 10
    Journal Article
    Peer reviewed
    Open access

    Android platform has been the target of attackers due to its openness and increasing popularity. Android malware has explosively increased in recent years, which poses serious threats to Android ...
Full text
2.
  • The security of machine lea... The security of machine learning in an adversarial setting: A survey
    Wang, Xianmin; Li, Jing; Kuang, Xiaohui ... Journal of parallel and distributed computing, August 2019, 2019-08-00, Volume: 130
    Journal Article
    Peer reviewed

    Machine learning (ML) methods have demonstrated impressive performance in many application fields such as autopilot, facial recognition, and spam detection. Traditionally, ML models are trained and ...
Full text
3.
  • Secure Multi-Party Computat... Secure Multi-Party Computation: Theory, practice and applications
    Zhao, Chuan; Zhao, Shengnan; Zhao, Minghao ... Information sciences, February 2019, 2019-02-00, Volume: 476
    Journal Article
    Peer reviewed

    Secure Multi-Party Computation (SMPC) is a generic cryptographic primitive that enables distributed parties to jointly compute an arbitrary functionality without revealing their own private inputs ...
Full text
4.
  • Data security sharing model... Data security sharing model based on privacy protection for blockchain‐enabled industrial Internet of Things
    Zhang, Qikun; Li, Yongjiao; Wang, Ruifang ... International journal of intelligent systems, January 2021, 2021-01-00, 20210101, Volume: 36, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    With the widespread application of Industrial Internet of Things (IIoT) technology in the industry, the security threats are also increasing. To ensure the safe sharing of resources in IIoT, this ...
Full text
5.
  • DPPDL: A Dynamic Partial-Pa... DPPDL: A Dynamic Partial-Parallel Data Layout for Green Video Surveillance Storage
    Sun, Zhizhuo; Zhang, Quanxin; Li, Yuanzhang ... IEEE transactions on circuits and systems for video technology, 01/2018, Volume: 28, Issue: 1
    Journal Article
    Peer reviewed

    Video surveillance requires storing massive amounts of video data, which results in the rapid increasing of storage energy consumption. With the popularization of video surveillance, green storage ...
Full text
6.
  • A fine‐grained and traceabl... A fine‐grained and traceable multidomain secure data‐sharing model for intelligent terminals in edge‐cloud collaboration scenarios
    Sun, Haipeng; Tan, Yu‐an; Zhu, Liang ... International journal of intelligent systems, March 2022, 2022-03-00, 20220301, Volume: 37, Issue: 3
    Journal Article
    Peer reviewed
    Open access

    Secure data‐sharing technology is a bridge for various collaborative operations among intelligent terminals in the edge‐cloud collaborative application scenario. For the shared data ...
Full text
7.
  • Search pattern leakage in s... Search pattern leakage in searchable encryption: Attacks and new construction
    Liu, Chang; Zhu, Liehuang; Wang, Mingzhong ... Information sciences, 05/2014, Volume: 265
    Journal Article
    Peer reviewed
    Open access

    Searching on remote encrypted data (commonly known as searchable encryption) has become an important issue in secure data outsourcing, since it allows users to outsource encrypted data to an ...
Full text

PDF
8.
  • Deep learning feature explo... Deep learning feature exploration for Android malware detection
    Zhang, Nan; Tan, Yu-an; Yang, Chen ... Applied soft computing, April 2021, 2021-04-00, Volume: 102
    Journal Article
    Peer reviewed

    Android mobile devices and applications are widely deployed and used in industry and smart city. Malware detection is one of the most powerful and effective approaches to guarantee security of ...
Full text
9.
  • Boosting cross‐task adversa... Boosting cross‐task adversarial attack with random blur
    Zhang, Yaoyuan; Tan, Yu‐an; Lu, Mingfeng ... International journal of intelligent systems, October 2022, 2022-10-00, 20221001, Volume: 37, Issue: 10
    Journal Article
    Peer reviewed
    Open access

    Deep neural networks are highly vulnerable to adversarial examples, and these adversarial examples stay malicious when transferred to other neural networks. Many works exploit this transferability of ...
Full text
10.
  • A High-Imperceptibility and... A High-Imperceptibility and Histogram-Shifting Data Hiding Scheme for JPEG Images
    Li, Yuanzhang; Yao, Shangjun; Yang, Kai ... IEEE access, 2019, Volume: 7
    Journal Article
    Peer reviewed
    Open access

    Data hiding technology plays an important role in many areas related to people's life, such as military and medical images. However, it is difficult to obtain high embedding capacity in compressed ...
Full text

PDF
1 2 3 4 5
hits: 31,355

Load filters