Search

Your search keyword '"Luo, Bo"' showing total 95 results

Search Constraints

Start Over You searched for: Author "Luo, Bo" Remove constraint Author: "Luo, Bo" Publisher springer international publishing Remove constraint Publisher: springer international publishing
95 results on '"Luo, Bo"'

Search Results

2. CONTRA: Defending Against Poisoning Attacks in Federated Learning

3. CANSentry: Securing CAN-Based Cyber-Physical Systems against Denial and Spoofing Attacks

4. Tear Off Your Disguise: Phishing Website Detection Using Visual and Network Identities

5. Arcana: Enabling Private Posts on Public Microblog Platforms

7. FGFDect: A Fine-Grained Features Classification Model for Android Malware Detection

8. A-Tor: Accountable Anonymity in Tor

9. Hide Your Hackable Smart Home from Remote Attacks: The Multipath Onion IoT Gateways

10. CryptMe: Data Leakage Prevention for Unmodified Programs on ARM Devices

13. FamilyID: A Hybrid Approach to Identify Family Information from Microblogs

20. Policy Modeling and Anomaly Detection in ABAC Policies

21. Designing a Service for Compliant Sharing of Sensitive Research Data

22. Authenticated Multi-proxy Accumulation Schemes for Delegated Membership Proofs

23. Extending the Exposure Score of Web Browsers by Incorporating CVSS

24. A Stakeholder-Centric Approach for Defining Metrics for Information Security Management Systems

25. Path-Preserving Anonymization for Inter-domain Routing Policies

26. Threat Modeling of Cyber-Physical Systems in Practice

27. Intelligent Decision Support for Cybersecurity Incident Response Teams: Autonomic Architecture and Mitigation Search

28. Using Garbled Circuit for Secure Brokering

29. A Novel Approach for Attack Tree to Attack Graph Transformation

30. A TSX-Based KASLR Break: Bypassing UMIP and Descriptor-Table Exiting

31. AVSDA: Autonomous Vehicle Security Decay Assessment

32. Quantum Computing Threat Modelling on a Generic CPS Setup

33. Model Evasion Attacks Against Partially Encrypted Deep Neural Networks in Isolated Execution Environment

34. POSTER: Resistance Analysis of Two AES-Like Against the Boomerang Attack

35. Pass-As-You-Go: A Direct Anonymous Attestation-Based Untraceable Contactless Transit Pass

36. Towards Demystifying Adversarial Robustness of Binarized Neural Networks

37. POSTER: Optimizing Device Implementation of Linear Layers with Automated Tools

38. POSTER: Another Look at Boyar-Peralta’s Algorithm

39. Kryptonite: An Adversarial Attack Using Regional Focus

40. POSTER: LHSA: Lightweight Hardware Security Arbitrator

41. PoliCT: Flexible Policy in Certificate Transparency Enabling Lightweight Self-monitor

42. Aggregate Signature with Traceability of Devices Dynamically Generating Invalid Signatures

43. An Efficient Proactive Secret Sharing Scheme for Cloud Storage

44. Combating the OS-Level Malware in Mobile Devices by Leveraging Isolation and Steganography

45. Demand Manipulation Attack Resilient Privacy Aware Smart Grid Using PUFs and Blockchain

46. WiP: Distributed Intrusion Detection System for TCP/IP-Based Connections in Industrial Environments Using Self-organizing Maps

47. A (Bit)slice of Rainbow

48. Cryptanalysis of a Lattice-Based Group Signature with Verifier-Local Revocation Achieving Full Security

49. Attacklets to Test Anomaly Detectors for Critical Infrastructure

50. BFV, CKKS, TFHE: Which One is the Best for a Secure Neural Network Evaluation in the Cloud?

Catalog

Books, media, physical & digital resources