Longjuan Wang
YOU?
Author Swipe
View article: Feature Graph Construction With Static Features for Malware Detection
Feature Graph Construction With Static Features for Malware Detection Open
Malware can greatly compromise the integrity and trustworthiness of information and is in a constant state of evolution. Existing feature fusion‐based detection methods generally overlook the correlation between features. And mere concaten…
View article: Feature graph construction with static features for malware detection
Feature graph construction with static features for malware detection Open
Malware can greatly compromise the integrity and trustworthiness of information and is in a constant state of evolution. Existing feature fusion-based detection methods generally overlook the correlation between features. And mere concaten…
View article: Adversarial Attack for Deep Steganography Based on Surrogate Training and Knowledge Diffusion
Adversarial Attack for Deep Steganography Based on Surrogate Training and Knowledge Diffusion Open
Deep steganography (DS), using neural networks to hide one image in another, has performed well in terms of invisibility, embedding capacity, etc. Current steganalysis methods for DS can only detect or remove secret images hidden in natura…
View article: License Plate Recognition via Attention Mechanism
License Plate Recognition via Attention Mechanism Open
License plate recognition technology use widely in intelligent traffic management and control. Researchers have been committed to improving the speed and accuracy of license plate recognition for nearly 30 years. This paper is the first to…
View article: RW‐Fuzzer: A Fuzzing Method for Vulnerability Mining on Router Web Interface
RW‐Fuzzer: A Fuzzing Method for Vulnerability Mining on Router Web Interface Open
As the main routing device of the network, most routers can be set up and managed through their web enabled admin portal. This paper proposes a new method for router admin portal vulnerability mining fuzzing test (RW‐fuzzer: Router Web fuz…
View article: Vulnerability Mining Based on Hook Mechanism
Vulnerability Mining Based on Hook Mechanism Open
IOT devices are easy to be attacked by hackers because of their intelligence and openness. The vulnerability mining of IOT devices has become a key research field in the security field. This paper studies a method of vulnerability mining b…
View article: Tor Hidden Services Discovery and Analysis: A Literature Survey
Tor Hidden Services Discovery and Analysis: A Literature Survey Open
Hidden services are a feature of Tor(The Onion Router)[1]. It provides anonymity for the service requester while maintaining the anonymity of the service provider. Since it is quite difficult to trace back and locate both parties in the co…
View article: Research on the Security Technology of Federated Learning Privacy Preserving
Research on the Security Technology of Federated Learning Privacy Preserving Open
With the emergence of data islands and the popular awareness of privacy, federated learning, as an emerging data sharing and exchange model, can realize multi-party collaboration under the premise of protecting data privacy and security be…
View article: Encryption Algorithm for TCP Session Hijacking
Encryption Algorithm for TCP Session Hijacking Open
Distributed network of the computer and the design defects of the TCP protocol are given to the network attack to be multiplicative. Based on the simple and open assumptions of the TCP protocol in academic and collaborative communication e…
View article: A New Fuzzy Logic Classifier Based on Multiscale Permutation Entropy and Its Application in Bearing Fault Diagnosis
A New Fuzzy Logic Classifier Based on Multiscale Permutation Entropy and Its Application in Bearing Fault Diagnosis Open
The self-organizing fuzzy (SOF) logic classifier is an efficient and non-parametric classifier. Its classification process is divided into an offline training stage, an online training stage, and a testing stage. Representative samples of …