GX

Guangquan Xu

Authored

9 records found

ID-SR

Privacy-Preserving Social Recommendation Based on Infinite Divisibility for Trustworthy AI

Recommendation systems powered by artificial intelligence (AI) are widely used to improve user experience. However, AI inevitably raises privacy leakage and other security issues due to the utilization of extensive user data. Addressing these challenges can protect users' persona ...

Trust2Privacy

A novel fuzzy trust-to-privacy mechanism for mobile social networks

Mobile social applications have been widely used by Internet users. Users can efficiently acquire many kinds of information and share their statuses by various social platforms. However, when a user intends to share information through the user's social applications, the user can ...
Existing approaches to defending Use-After-Free (UAF) exploits are usually done using static or dynamic analysis. However, both static and dynamic analysis suffer from intrinsic deficiencies. The existing static analysis is limited in handling loops, optimization of memory repres ...
With the increasing rates of interconnected Internet of Things (IoT) devices within Software-Defined Networking (SDN) environments, distributed denial of service (DDoS) attacks have become increasingly common. As a result of this challenge, novel detection and classification meth ...

Contributed

1 records found

Frontiers in Cyber Security

Third International Conference, FCS 2020, Tianjin, China, November 15–17, 2020, Proceedings

This book constitutes the proceedings of the Third International Conference on Frontiers in Cyber Security, FCS 2020, held in Tianjin, China*, in November 2020. The 39 full papers along with the 10 short papers presented were carefully reviewed and selected from 143 submissions. ...