GX
Guangquan Xu
9 records found
1
—With the increasing rates of interconnected Internet of Things (IoT) devices within software-defined networking (SDN) environments, Distributed Denial-of-Service (DDoS) attacks have become increasingly common. As a result of this challenge, novel detection and classification met
...
ID-SR
Privacy-Preserving Social Recommendation Based on Infinite Divisibility for Trustworthy AI
Recommendation systems powered by artificial intelligence (AI) are widely used to improve user experience. However, AI inevitably raises privacy leakage and other security issues due to the utilization of extensive user data. Addressing these challenges can protect users' persona
...
Existing approaches to defending Use-After-Free (UAF) exploits are usually done using static or dynamic analysis. However, both static and dynamic analysis suffer from intrinsic deficiencies. The existing static analysis is limited in handling loops, optimization of memory repres
...
Trust2Privacy
A novel fuzzy trust-to-privacy mechanism for mobile social networks
Mobile social applications have been widely used by Internet users. Users can efficiently acquire many kinds of information and share their statuses by various social platforms. However, when a user intends to share information through the user's social applications, the user can
...