Guangquan Xu
10 records found
1
Authored
—With the increasing rates of interconnected Internet of Things (IoT) devices within software-defined networking (SDN) environments, Distributed Denial-of-Service (DDoS) attacks have become increasingly common. As a result of this challenge, novel detection and classification ...
ID-SR
Privacy-Preserving Social Recommendation Based on Infinite Divisibility for Trustworthy AI
Recommendation systems powered by artificial intelligence (AI) are widely used to improve user experience. However, AI inevitably raises privacy leakage and other security issues due to the utilization of extensive user data. Addressing these challenges can protect users' pers ...
Existing approaches to defending Use-After-Free (UAF) exploits are usually done using static or dynamic analysis. However, both static and dynamic analysis suffer from intrinsic deficiencies. The existing static analysis is limited in handling loops, optimization of memory rep ...
Trust2Privacy
A novel fuzzy trust-to-privacy mechanism for mobile social networks
Mobile social applications have been widely used by Internet users. Users can efficiently acquire many kinds of information and share their statuses by various social platforms. However, when a user intends to share information through the user's social applications, the user ...
Contributed
Frontiers in Cyber Security
Third International Conference, FCS 2020, Tianjin, China, November 15–17, 2020, Proceedings
The 39 full papers along with the 10 short papers presented were carefully reviewed and selected from 143 submissi ...