GX
Guangquan Xu
info
Please Note
<p>This page displays the records of the person named above and is not linked to a unique person identifier. This record may need to be merged to a profile.</p>
10 records found
1
ID-SR
Privacy-Preserving Social Recommendation Based on Infinite Divisibility for Trustworthy AI
Recommendation systems powered by artificial intelligence (AI) are widely used to improve user experience. However, AI inevitably raises privacy leakage and other security issues due to the utilization of extensive user data. Addressing these challenges can protect users' persona
...
—With the increasing rates of interconnected Internet of Things (IoT) devices within software-defined networking (SDN) environments, Distributed Denial-of-Service (DDoS) attacks have become increasingly common. As a result of this challenge, novel detection and classification met
...
JSCSP
A Novel Policy-Based XSS Defense Mechanism for Browsers
To mitigate cross-site scripting attacks (XSS), the W3C group recommends web service providers to employ a computer security standard called Content Security Policy (CSP). However, less than 3.7 percent of real-world websites are equipped with CSP according to Google's survey. Th
...
Existing approaches to defending Use-After-Free (UAF) exploits are usually done using static or dynamic analysis. However, both static and dynamic analysis suffer from intrinsic deficiencies. The existing static analysis is limited in handling loops, optimization of memory repres
...
Trust2Privacy
A novel fuzzy trust-to-privacy mechanism for mobile social networks
Mobile social applications have been widely used by Internet users. Users can efficiently acquire many kinds of information and share their statuses by various social platforms. However, when a user intends to share information through the user's social applications, the user can
...