Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (71)
  • Open Access

    ARTICLE

    Multi-UAV Cooperative GPS Spoofing Based on YOLO Nano

    Yongjie Ding1, Zhangjie Fu1,2,*

    Journal of Cyber Security, Vol.3, No.2, pp. 69-78, 2021, DOI:10.32604/jcs.2021.019105

    Abstract In recent years, with the rapid development of the drone industry, drones have been widely used in many fields such as aerial photography, plant protection, performance, and monitoring. To effectively control the unauthorized flight of drones, using GPS spoofing attacks to interfere with the flight of drones is a relatively simple and highly feasible attack method. However, the current method uses ground equipment to carry out spoofing attacks. The attack range is limited and the flexibility is not high. Based on the existing methods, this paper proposes a multi-UAV coordinated GPS spoofing scheme based on YOLO Nano, which can launch… More >

  • Open Access

    ARTICLE

    IoT Services: Realizing Private Real-Time Detection via Authenticated Conjunctive Searchable Encryption

    Chungen Xu1,*, Lin Mei1, Jinxue Cheng2, Yu Zhao1, Cong Zuo3

    Journal of Cyber Security, Vol.3, No.1, pp. 55-67, 2021, DOI:10.32604/jcs.2021.017217

    Abstract With the rapid development of wireless communication technology, the Internet of Things is playing an increasingly important role in our everyday. The amount of data generated by sensor devices is increasing as a large number of connectable devices are deployed in many fields, including the medical, agricultural, and industrial areas. Uploading data to the cloud solves the problem of data overhead but results in privacy issues. Therefore, the question of how to manage the privacy of uploading data and make it available to be interconnected between devices is a crucial issue. In this paper, we propose a scheme that supports… More >

  • Open Access

    ARTICLE

    Single-Choice Aided Marking System Research Based on Back Propagation Neural Network

    Yunzuo Zhang*, Yi Li, Wei Guo, Lei Huo, Jiayu Zhang, Kaina Guo

    Journal of Cyber Security, Vol.3, No.1, pp. 45-54, 2021, DOI:10.32604/jcs.2021.017071

    Abstract In the field of educational examination, automatic marking technology plays an essential role in improving the efficiency of marking and liberating the labor force. At present, the implementation of the policy of expanding erolments has caused a serious decline in the teacher-student ratio in colleges and universities. The traditional marking system based on Optical Mark Reader technology can no longer meet the requirements of liberating the labor force of teachers in small and medium-sized examinations. With the development of image processing and artificial neural network technology, the recognition of handwritten character in the field of pattern recognition has attracted the… More >

  • Open Access

    ARTICLE

    A Survey on Security Threats and Solutions of Bitcoin

    Le Lai1,*,Tongqing Zhou1, Zhiping Cai1, Zhiyao Liang2, Hao Bai1

    Journal of Cyber Security, Vol.3, No.1, pp. 29-44, 2021, DOI:10.32604/jcs.2021.016349

    Abstract Bitcoin is known as the first decentralized digital currency around the world. It uses blockchain technology to store transaction data in a distributed public ledger, is a distributed ledger that removes third-party trust institutions. Since its invention, bitcoin has achieved great success, has a market value of about $200 billion. However, while bitcoin has brought a wide and far-reaching impact in the financial field, it has also exposed some security problems, such as selfish mining attacks, Sybil attack, eclipse attacks, routing attacks, EREBUS attacks, and so on. This paper gives a comprehensive overview of various attack scenarios that the bitcoin… More >

  • Open Access

    ARTICLE

    An LSTM-Based Malware Detection Using Transfer Learning

    Zhangjie Fu1,2,3,*, Yongjie Ding1, Musaazi Godfrey1

    Journal of Cyber Security, Vol.3, No.1, pp. 11-28, 2021, DOI:10.32604/jcs.2021.016632

    Abstract Mobile malware occupies a considerable proportion of cyberattacks. With the update of mobile device operating systems and the development of software technology, more and more new malware keep appearing. The emergence of new malware makes the identification accuracy of existing methods lower and lower. There is an urgent need for more effective malware detection models. In this paper, we propose a new approach to mobile malware detection that is able to detect newly-emerged malware instances. Firstly, we build and train the LSTM-based model on original benign and malware samples investigated by both static and dynamic analysis techniques. Then, we build… More >

  • Open Access

    ARTICLE

    The Technical Design and Implementation of Cross-Platform Industrial Product Order System

    Yu Xue1,2,*, Xu Cai1, Shoubao Su2, Junxiang Han1, Romany F. Mansour3

    Journal of Cyber Security, Vol.3, No.1, pp. 1-10, 2021, DOI:10.32604/jcs.2021.016371

    Abstract According to some data in the Industrial Purchasing Trends report released by China in 2017, we can see that e-commerce purchasing channels have ranked first among all industrial products purchasing channels in China compared with European and American countries. In addition, in the whole industrial product purchasing market, we can also see that both manufacturers and suppliers are making active e-commerce transformation, and some other Internet giants are also actively entering the industrial product e-commerce industry. But at present, the revenue of all kinds of subjects is still a lot of room for improvement compared to the United States industrial… More >

  • Open Access

    REVIEW

    An Overview of Face Manipulation Detection

    Xingwang Ju*

    Journal of Cyber Security, Vol.2, No.4, pp. 197-207, 2020, DOI:10.32604/jcs.2020.014310

    Abstract Due to the power of editing tools, new types of fake faces are being created and synthesized, which has attracted great attention on social media. It is reasonable to acknowledge that one human cannot distinguish whether the face is manipulated from the real faces. Therefore, the detection of face manipulation becomes a critical issue in digital media forensics. This paper provides an overview of recent deep learning detection models for face manipulation. Some public dataset used for face manipulation detection is introduced. On this basis, the challenges for the research and the potential future directions are analyzed and discussed. More >

  • Open Access

    ARTICLE

    Improvement of the Firework Algorithm for Classification Problems

    Yu Xue, Sow Alpha Amadou*, Yan Zhao

    Journal of Cyber Security, Vol.2, No.4, pp. 191-196, 2020, DOI:10.32604/jcs.2020.014045

    Abstract Attracted numerous analysts’ consideration, classification is one of the primary issues in Machine learning. Numerous evolutionary algorithms (EAs) were utilized to improve their global search ability. In the previous years, many scientists have attempted to tackle this issue, yet regardless of the endeavors, there are still a few inadequacies. Based on solving the classification problem, this paper introduces a new optimization classification model, which can be applied to the majority of evolutionary computing (EC) techniques. Firework algorithm (FWA) is one of the EC methods, Although the Firework algorithm (FWA) is a proficient algorithm for solving complex optimization issue. The proficient… More >

  • Open Access

    ARTICLE

    A Two-Stage Highly Robust Text Steganalysis Model

    Enlu Li1, Zhangjie Fu1,2,3,*, Siyu Chen1, Junfu Chen1

    Journal of Cyber Security, Vol.2, No.4, pp. 183-190, 2020, DOI:10.32604/jcs.2020.015010

    Abstract With the development of natural language processing, deep learning, and other technologies, text steganography is rapidly developing. However, adversarial attack methods have emerged that gives text steganography the ability to actively spoof steganalysis. If terrorists use the text steganography method to spread terrorist messages, it will greatly disturb social stability. Steganalysis methods, especially those for resisting adversarial attacks, need to be further improved. In this paper, we propose a two-stage highly robust model for text steganalysis. The proposed method analyzes and extracts anomalous features at both intra-sentential and inter-sentential levels. In the first phase, every sentence is first transformed into… More >

  • Open Access

    ARTICLE

    Excellent Practical Byzantine Fault Tolerance

    Huanrong Tang, Yaojing Sun, Jianquan Ouyang*

    Journal of Cyber Security, Vol.2, No.4, pp. 167-182, 2020, DOI:10.32604/jcs.2020.011341

    Abstract With the rapid development of blockchain technology, more and more people are paying attention to the consensus mechanism of blockchain. Practical Byzantine Fault Tolerance (PBFT), as the first efficient consensus algorithm solving the Byzantine Generals Problem, plays an important role. But PBFT also has its problems. First, it runs in a completely closed environment, and any node can't join or exit without rebooting the system. Second, the communication complexity in the network is as high as O(n2), which makes the algorithm only applicable to small-scale networks. For these problems, this paper proposes an Optimized consensus algorithm, Excellent Practical Byzantine Fault… More >

Displaying 41-50 on page 5 of 71. Per Page