The proceedings contain 67 papers. The topics discussed include: intrusion detection model based on GA-BP;Internet of things-oriented data security risk monitoring system;program completeness verification mechanism ba...
ISBN:
(纸本)9781510666511
The proceedings contain 67 papers. The topics discussed include: intrusion detection model based on GA-BP;Internet of things-oriented data security risk monitoring system;program completeness verification mechanism based on static analysis;DeCsmith, an automatic generation tool of equivalent program;P2P based on network behavior analysis trust value calculation method;research on sea surface garbage classification algorithm based on improved VGG network;a dynamic program analysis-based method for floating-point program precision loss detection;an admission control method for CAN networks based on voltage fingerprinting;a deep reinforce learning based intrusion detection method for safeguarding Internet of Things;and optimize value-flow analysis based static vulnerability detection by solver rating.
The proceedings contain 71 papers. The topics discussed include: performance optimization method for distributed storage system based on hybrid storage device;controllable text-to-image generation with enhanced text e...
The proceedings contain 71 papers. The topics discussed include: performance optimization method for distributed storage system based on hybrid storage device;controllable text-to-image generation with enhanced text encoder and edge-preserving embedding;research on database programming technology in computersoftwareengineering;a privacy-preserving scheme for JPEG image retrieval based on deep learning;web page design of automobile energy saving and emission reduction system based on neural network;DRTaint: a dynamic taint analysis framework supporting correlation analysis between data regions;research and design of distributed key-value storage system based on raft consensus algorithm;and research on key technologies of intelligent operation and maintenance of communication network.
The proceedings contain 68 papers. The topics discussed include: isolate cache shield: defending cache attacks via cache set isolation;physical layer secure transmission method based on MSK modulator structure hopping...
ISBN:
(纸本)9781510680234
The proceedings contain 68 papers. The topics discussed include: isolate cache shield: defending cache attacks via cache set isolation;physical layer secure transmission method based on MSK modulator structure hopping;research on malicious code detection and classification based on dynamic and static features;real-time traffic intrusion detection based on CNN-LSTM deep neural networks;privacy federation learning framework based on principal component analysis;low-code vulnerability identification based on TextCNN;research on health evaluation method of data center security protection system;design of a flow detection system for high pressure reducing valves in ships;a secure routing protocol for wireless sensor network;zero trust-based federated autonomous technology for code repository;and a hierarchical software architecture for ‘smart firefighting’ platform.
The proceedings contain 48 papers. The topics discussed include: research on modeling method of network attack chain efficiency;audio adversarial attack: his attack;a measure for enhancing Hreik network lookup;a priva...
ISBN:
(纸本)9781510655980
The proceedings contain 48 papers. The topics discussed include: research on modeling method of network attack chain efficiency;audio adversarial attack: his attack;a measure for enhancing Hreik network lookup;a privacy-preserving data collection scheme for smart agriculture based on edge blockchain;a conformance check method for evaluating the fitness of a process model with duplicate tasks;a de-obfuscation system based on Markov models;research on the construction method of encrypted malicious traffic detection system based on machine learning;a fast and robust mesh construction method for medial axis transform;research on the aggregation of V2G security authentication and privacy data based on blockchain;network intrusion monitoring based on improved ant colony algorithm;and toward more efficient iris recognition using a lightweight CNN framework with attention mechanism.
作者:
Yang, ShuoLi, HongruGuo, JianECNU
MoE Engn Res Ctr Software Hardware Codesign Technol & Applicat Shanghai Peoples R China ECNU
Shanghai Trusted Ind Internet Software Collaborat Shanghai Peoples R China ECNU
Xinjiang Teachers Coll Shanghai Peoples R China ECNU
Natl Trusted Embedded Software Engn Technol Res C Shanghai Peoples R China
With the increasing use of robots in various fields, the importance of communication security between robots and their components has become a pressing concern. As the primary development framework for robot applicati...
详细信息
ISBN:
(纸本)9783031649530;9783031649547
With the increasing use of robots in various fields, the importance of communication security between robots and their components has become a pressing concern. As the primary development framework for robot applications, ROS2 is replacing ROS1 at a rapid pace, and its security issues have direct implications for the security of robot systems. This paper presents an exploration and study of the communication security issues of ROS2 by combining CIA triad with the ROS2 communication mechanism. We propose the fundamental security requirements of the ROS2 system under different communication mechanisms and provide formal modeling and definition. Moreover, we classify and analyze network attacks at the ROS2 level and implement a tool, ROS2Tester, to conduct modeling the ROS2 formal security modules, penetration testing and evaluating the security of ROS2 systems.
The increasing complexity of machine learning models drives the emergence of Machine-Learning-as-a-Service (MLaaS) solutions provided by cloud service providers. With MLaaS, customers can leverage existing data center...
详细信息
ISBN:
(纸本)9783031649479;9783031649486
The increasing complexity of machine learning models drives the emergence of Machine-Learning-as-a-Service (MLaaS) solutions provided by cloud service providers. With MLaaS, customers can leverage existing data center infrastructures for model training and inference. To improve training efficiency, modern machine learning platforms introduce communication optimization mechanisms, which can lead to information leakage. In this work, we present a network side channel based attack to steal model sensitive information. Specifically, we leverage the unique communication patterns during training to learn the model architectures. To further improve accuracy, we also collect information from software based power side channels and correlate it with the information extracted from network. Such temporal and spatial correlation helps reduce the search space of the target model architecture significantly. Through evaluations, we show that we can achieve more than 90% accuracy for model hyper-parameters reconstruction. We also demonstrate that our proposed attack is robust against background noise by evaluating with memory and traffic intensive co-located applications.
Although traditional protection methods can improve the security of the network to a certain extent, its effect is often limited in the face of complex network environment and various attacks. Therefore, it is an impo...
详细信息
Rapid developments in cellular communications are accompanied by rising privacy and security worries. Many people refrain from participating in activities like social networking, shopping, transactions, and conducting...
详细信息
ISBN:
(纸本)9783031815690;9783031815706
Rapid developments in cellular communications are accompanied by rising privacy and security worries. Many people refrain from participating in activities like social networking, shopping, transactions, and conducting a lot of business because networksecurity and user privacy are major concerns in our daily lives. However, there is now a greater need for a private, highly secure business. This was accompanied by an increase in the requirements for it due to the growing hazards and programmers in our daily activities. The Fifth Generations (5G) groups are rapidly developing, as evidenced by the fact that the number of supporters is increasing by several times per second around the world in light of the ongoing revelations. According to statistics, 80% of people worldwide claim to use 5G mobile phones, and the percentage has been steadily rising for a very long time. Ahigh level of security is also necessary because the 5G network serves as the basis for the 5G network. From there, this article gives an overview of some of the different 5G network vulnerabilities that can occur. Additionally, certain recent advancements in 5G security have revealed several flaws that still exist, allowing experts to concentrate on and fix these flaws.
In the rapidly evolving landscape of software Defined networks (SDNs), networksecurity is of paramount importance. This research paper presents a comprehensive study on anomaly detection and traffic analysis in SDNs ...
详细信息
The assimilation of technology into the financial sector, often referred to as FinTech, has brought about a significant transformation. This shift has not only widened the scope of financial inclusivity but has also f...
详细信息
暂无评论