Search Results - "Baojiang Cui"

Refine Results
  1. 1

    Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage by Cui, Baojiang, Liu, Zheli, Wang, Lingyu

    Published in IEEE transactions on computers (01-08-2016)
    “…The capability of selectively sharing encrypted data with different users via public cloud storage may greatly ease security concerns over inadvertent data…”
    Get full text
    Journal Article
  2. 2

    Detecting Malicious URLs via a Keyword-Based Convolutional Gated-Recurrent-Unit Neural Network by Yang, Wenchuan, Zuo, Wen, Cui, Baojiang

    Published in IEEE access (2019)
    “…With the continuous development of Web attacks, many web applications have been suffering from various forms of security threats and network attacks. The…”
    Get full text
    Journal Article
  3. 3

    On-Demand Anonymous Access and Roaming Authentication Protocols for 6G Satellite-Ground Integrated Networks by Tao, Ya, Du, Haitao, Xu, Jie, Su, Li, Cui, Baojiang

    Published in Sensors (Basel, Switzerland) (25-05-2023)
    “…Satellite-ground integrated networks (SGIN) are in line with 6th generation wireless network technology (6G) requirements. However, security and privacy issues…”
    Get full text
    Journal Article
  4. 4

    Malicious JavaScript Detection Based on Bidirectional LSTM Model by Song, Xuyan, Chen, Chen, Cui, Baojiang, Fu, Junsong

    Published in Applied sciences (01-05-2020)
    “…JavaScript has been widely used on the Internet because of its powerful features, and almost all the websites use it to provide dynamic functions. However,…”
    Get full text
    Journal Article
  5. 5

    Analyzing and Discovering Spatial Algorithm Complexity Vulnerabilities in Recursion by Wang, Ziqi, Bu, Debao, Tian, Weihan, Cui, Baojiang

    Published in Applied sciences (01-03-2024)
    “…The algorithmic complexity vulnerability (ACV) that may lead to denial of service attacks greatly disrupts the security and availability of applications, and…”
    Get full text
    Journal Article
  6. 6

    Grey-Box Fuzzing Based on Reinforcement Learning for XSS Vulnerabilities by Song, Xuyan, Zhang, Ruxian, Dong, Qingqing, Cui, Baojiang

    Published in Applied sciences (01-02-2023)
    “…Cross-site scripting (XSS) vulnerabilities are significant threats to web applications. The number of XSS vulnerabilities reported has increased annually for…”
    Get full text
    Journal Article
  7. 7

    Rethinking the Operation Pattern for Anomaly Detection in Industrial Cyber–Physical Systems by Cheng, Zishuai, Cui, Baojiang, Fu, Junsong

    Published in Applied sciences (01-03-2023)
    “…Anomaly detection has been proven to be an efficient way to detect malicious behaviour and cyberattacks in industrial cyber–physical systems (ICPSs). However,…”
    Get full text
    Journal Article
  8. 8

    PSOFuzzer: A Target-Oriented Software Vulnerability Detection Technology Based on Particle Swarm Optimization by Chen, Chen, Xu, Han, Cui, Baojiang

    Published in Applied sciences (01-01-2021)
    “…Coverage-oriented and target-oriented fuzzing are widely used in vulnerability detection. Compared with coverage-oriented fuzzing, target-oriented fuzzing…”
    Get full text
    Journal Article
  9. 9

    EvilPromptFuzzer: generating inappropriate content based on text-to-image models by He, Juntao, Dai, Haoran, Sui, Runqi, Yuan, Xuejing, Liu, Dun, Feng, Hao, Liu, Xinyue, Yang, Wenchuan, Cui, Baojiang, Li, Kedan

    Published in Cybersecurity (Singapore) (01-12-2024)
    “…Text-to-image (TTI) models provide huge innovation ability for many industries, while the content security triggered by them has also attracted wide attention…”
    Get full text
    Journal Article
  10. 10

    Firmware code instrumentation technology for internet of things-based services by Chen, Chen, Ma, Jinxin, Qi, Tao, Cui, Baojiang, Qi, Weikong, Zhang, Zhaolei, Sun, Peng

    Published in World wide web (Bussum) (01-05-2021)
    “…With the rapid development of electronic and information technology, Internet of Things (IoT) devices have become extensively utilised in various fields…”
    Get full text
    Journal Article
  11. 11

    IoTSIT: A Static Instrumentation Tool for IoT Devices by Chen, Chen, Jing, Zhe, Ma, Jinxin, Cui, Baojiang, Xu, Han, Zou, Quanchen

    Published in IEEE access (2020)
    “…In recent years, an increasing number of Internet of Things (IoT) devices have been employed in various fields, which has caused an increased demand for IoT…”
    Get full text
    Journal Article
  12. 12

    A Novel Fuzzing Method for Zigbee Based on Finite State Machine by Cui, Baojiang, Liang, Shurui, Chen, Shilei, Zhao, Bing, Liang, Xiaobing

    “…With the extensive application of Zigbee, some bodies of literature were devoted into finding the vulnerabilities of Zigbee by fuzzing. According to earlier…”
    Get full text
    Journal Article
  13. 13

    A Secure Hierarchical Key Management Scheme in Wireless Sensor Network by Zhang, Yiying, Li, Xiangzhen, Liu, Jianming, Yang, Jucheng, Cui, Baojiang

    “…Due to the vulnerable environment, limited recourse and open communication channel, wireless sensor networks (WSNs) are necessary to be protected from various…”
    Get full text
    Journal Article
  14. 14

    Defect Detection Technique Based on Similarity Comparison of Token by Tao, Guo, Guowei, Dong, Hu, Qin, Baolian, Long, Tong, Qu, Baojiang, Cui

    “…Similarity detection technique of code has been widely used. At present, the technique is mainly used for the judgment of plagiarized code. In this study, on…”
    Get full text
    Journal Article
  15. 15

    Synthesis Algorithm of Homology Detection Based on AHP by Cui, Baojiang, Fan, Wenhao, Bian, Ce, Guo, Tao, Hao, Yongle, Wang, Jianxin

    “…Traditional software homology detection techniques based on text, token, abstract syntax tree in many cases get the real similarity inaccurately when they work…”
    Get full text
    Journal Article
  16. 16

    A Method of Information Protection for Collaborative Deep Learning under GAN Model Attack by Yan, Xiaodan, Cui, Baojiang, Xu, Yang, Shi, Peilin, Wang, Ziqi

    “…Deep learning is widely used in the medical field owing to its high accuracy in medical image classification and biological applications. However, under…”
    Get full text
    Journal Article
  17. 17

    Trustworthy Network Anomaly Detection Based on an Adaptive Learning Rate and Momentum in IIoT by Yan, Xiaodan, Xu, Yang, Xing, Xiaofei, Cui, Baojiang, Guo, Zihao, Guo, Taibiao

    “…While the industrial Internet of Things (IIoT) brings convenience to the industry, it also brings security problems. Due to the massive amount of data…”
    Get full text
    Journal Article
  18. 18

    A novel model for anomaly detection in network traffic based on kernel support vector machine by Ma, Qian, Sun, Cong, Cui, Baojiang, Jin, Xiaohui

    Published in Computers & security (01-05-2021)
    “…Machine learning models are widely used for anomaly detection in network traffic. Effective transformation of the raw traffic data into mathematical…”
    Get full text
    Journal Article
  19. 19

    Learning URL Embedding for Malicious Website Detection by Yan, Xiaodan, Xu, Yang, Cui, Baojiang, Zhang, Shuhan, Guo, Taibiao, Li, Chaoliang

    “…The emergence of artificial intelligence technology has promoted the development of the Internet of Things. However, this promising cyber technology can…”
    Get full text
    Journal Article
  20. 20

    A novel privacy-aware model for nonparametric decentralized detection by Ma, Qian, Cui, Baojiang, Sun, Cong

    Published in Computers & security (01-06-2022)
    “…In recent years, the increasing development of the Internet of Things (IoT) demands the enhancement of both network security and user privacy protection. In…”
    Get full text
    Journal Article