GX
Guangquan Xu
Authored
9 records found
ID-SR
Privacy-Preserving Social Recommendation Based on Infinite Divisibility for Trustworthy AI
Recommendation systems powered by artificial intelligence (AI) are widely used to improve user experience. However, AI inevitably raises privacy leakage and other security issues due to the utilization of extensive user data. Addressing these challenges can protect users' persona
...
Trust2Privacy
A novel fuzzy trust-to-privacy mechanism for mobile social networks
Mobile social applications have been widely used by Internet users. Users can efficiently acquire many kinds of information and share their statuses by various social platforms. However, when a user intends to share information through the user's social applications, the user can
...
Existing approaches to defending Use-After-Free (UAF) exploits are usually done using static or dynamic analysis. However, both static and dynamic analysis suffer from intrinsic deficiencies. The existing static analysis is limited in handling loops, optimization of memory repres
...
With the increasing rates of interconnected Internet of Things (IoT) devices within Software-Defined Networking (SDN) environments, distributed denial of service (DDoS) attacks have become increasingly common. As a result of this challenge, novel detection and classification meth
...
Contributed
1 records found
Frontiers in Cyber Security
Third International Conference, FCS 2020, Tianjin, China, November 15–17, 2020, Proceedings
This book constitutes the proceedings of the Third International Conference on Frontiers in Cyber Security, FCS 2020, held in Tianjin, China*, in November 2020.
The 39 full papers along with the 10 short papers presented were carefully reviewed and selected from 143 submissions.
...