Search Results - "Baojiang Cui"
-
1
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage
Published in IEEE transactions on computers (01-08-2016)“…The capability of selectively sharing encrypted data with different users via public cloud storage may greatly ease security concerns over inadvertent data…”
Get full text
Journal Article -
2
Detecting Malicious URLs via a Keyword-Based Convolutional Gated-Recurrent-Unit Neural Network
Published in IEEE access (2019)“…With the continuous development of Web attacks, many web applications have been suffering from various forms of security threats and network attacks. The…”
Get full text
Journal Article -
3
On-Demand Anonymous Access and Roaming Authentication Protocols for 6G Satellite-Ground Integrated Networks
Published in Sensors (Basel, Switzerland) (25-05-2023)“…Satellite-ground integrated networks (SGIN) are in line with 6th generation wireless network technology (6G) requirements. However, security and privacy issues…”
Get full text
Journal Article -
4
Malicious JavaScript Detection Based on Bidirectional LSTM Model
Published in Applied sciences (01-05-2020)“…JavaScript has been widely used on the Internet because of its powerful features, and almost all the websites use it to provide dynamic functions. However,…”
Get full text
Journal Article -
5
Analyzing and Discovering Spatial Algorithm Complexity Vulnerabilities in Recursion
Published in Applied sciences (01-03-2024)“…The algorithmic complexity vulnerability (ACV) that may lead to denial of service attacks greatly disrupts the security and availability of applications, and…”
Get full text
Journal Article -
6
Grey-Box Fuzzing Based on Reinforcement Learning for XSS Vulnerabilities
Published in Applied sciences (01-02-2023)“…Cross-site scripting (XSS) vulnerabilities are significant threats to web applications. The number of XSS vulnerabilities reported has increased annually for…”
Get full text
Journal Article -
7
Rethinking the Operation Pattern for Anomaly Detection in Industrial Cyber–Physical Systems
Published in Applied sciences (01-03-2023)“…Anomaly detection has been proven to be an efficient way to detect malicious behaviour and cyberattacks in industrial cyber–physical systems (ICPSs). However,…”
Get full text
Journal Article -
8
PSOFuzzer: A Target-Oriented Software Vulnerability Detection Technology Based on Particle Swarm Optimization
Published in Applied sciences (01-01-2021)“…Coverage-oriented and target-oriented fuzzing are widely used in vulnerability detection. Compared with coverage-oriented fuzzing, target-oriented fuzzing…”
Get full text
Journal Article -
9
EvilPromptFuzzer: generating inappropriate content based on text-to-image models
Published in Cybersecurity (Singapore) (01-12-2024)“…Text-to-image (TTI) models provide huge innovation ability for many industries, while the content security triggered by them has also attracted wide attention…”
Get full text
Journal Article -
10
Firmware code instrumentation technology for internet of things-based services
Published in World wide web (Bussum) (01-05-2021)“…With the rapid development of electronic and information technology, Internet of Things (IoT) devices have become extensively utilised in various fields…”
Get full text
Journal Article -
11
IoTSIT: A Static Instrumentation Tool for IoT Devices
Published in IEEE access (2020)“…In recent years, an increasing number of Internet of Things (IoT) devices have been employed in various fields, which has caused an increased demand for IoT…”
Get full text
Journal Article -
12
A Novel Fuzzing Method for Zigbee Based on Finite State Machine
Published in International journal of distributed sensor networks (01-01-2014)“…With the extensive application of Zigbee, some bodies of literature were devoted into finding the vulnerabilities of Zigbee by fuzzing. According to earlier…”
Get full text
Journal Article -
13
A Secure Hierarchical Key Management Scheme in Wireless Sensor Network
Published in International journal of distributed sensor networks (01-01-2012)“…Due to the vulnerable environment, limited recourse and open communication channel, wireless sensor networks (WSNs) are necessary to be protected from various…”
Get full text
Journal Article -
14
Defect Detection Technique Based on Similarity Comparison of Token
Published in Journal of applied sciences (Asian Network for Scientific Information) (2013)“…Similarity detection technique of code has been widely used. At present, the technique is mainly used for the judgment of plagiarized code. In this study, on…”
Get full text
Journal Article -
15
Synthesis Algorithm of Homology Detection Based on AHP
Published in International journal of computational intelligence systems (2013)“…Traditional software homology detection techniques based on text, token, abstract syntax tree in many cases get the real similarity inaccurately when they work…”
Get full text
Journal Article -
16
A Method of Information Protection for Collaborative Deep Learning under GAN Model Attack
Published in IEEE/ACM transactions on computational biology and bioinformatics (01-05-2021)“…Deep learning is widely used in the medical field owing to its high accuracy in medical image classification and biological applications. However, under…”
Get full text
Journal Article -
17
Trustworthy Network Anomaly Detection Based on an Adaptive Learning Rate and Momentum in IIoT
Published in IEEE transactions on industrial informatics (01-09-2020)“…While the industrial Internet of Things (IIoT) brings convenience to the industry, it also brings security problems. Due to the massive amount of data…”
Get full text
Journal Article -
18
A novel model for anomaly detection in network traffic based on kernel support vector machine
Published in Computers & security (01-05-2021)“…Machine learning models are widely used for anomaly detection in network traffic. Effective transformation of the raw traffic data into mathematical…”
Get full text
Journal Article -
19
Learning URL Embedding for Malicious Website Detection
Published in IEEE transactions on industrial informatics (01-10-2020)“…The emergence of artificial intelligence technology has promoted the development of the Internet of Things. However, this promising cyber technology can…”
Get full text
Journal Article -
20
A novel privacy-aware model for nonparametric decentralized detection
Published in Computers & security (01-06-2022)“…In recent years, the increasing development of the Internet of Things (IoT) demands the enhancement of both network security and user privacy protection. In…”
Get full text
Journal Article