Stealthy Adversarial Attacks on Intrusion Detection Systems: A Functionality-Preserving Approach

X Li, W Dong, Y Sun, S Chen, D Kong… - … and Mobile Computing …, 2024 - ieeexplore.ieee.org
Intrusion Detection Systems (IDS) are essential tools in network security, which aims to
identify malicious traffic to safeguard computers. In recent years, with the application and …

Research on federal learning privacy protection based on secure multi-party computing

B Liu, EB Blancaflor - Proceedings of the 2024 3rd International …, 2024 - dl.acm.org
Federated learning (FL) exchanges model changes without sharing raw data. As an
innovative approach to solving data security and privacy protection issues, it has recently …

A Hierarchical PoW-Powered Access Mechanism for Shuffling-Based Moving Target Defense System

Z Guo, C Ren, L Yan, S Yang… - … and Mobile Computing …, 2024 - ieeexplore.ieee.org
For DDoS attacks, Moving Target Defense (MTD) has emerged as a promising solution.
However, existing MTD defense systems often overlook the issue of user access. In this …

Enhancing UAV‐HetNet security through functional encryption framework

SK Gupta, P Gupta, P Singh - Concurrency and Computation: Practice … - Wiley Online Library
In the current landscape, the rapid expansion of the internet has brought about a
corresponding surge in the number of data consumers. As user volume and diversity have …