International Conference on Networking and Network Applications最新文献

筛选
英文 中文
A Topology Based Differential Privacy Scheme for Average Path Length Query 基于拓扑的平均路径长度查询差分保密方案
International Conference on Networking and Network Applications Pub Date : 1900-01-01 DOI: 10.1109/NaNA.2019.00067
Tong Dong, Yong Zeng, Mengli Liu, Zhihong Liu, Jianfeng Ma, Xiao-yan Zhu
{"title":"A Topology Based Differential Privacy Scheme for Average Path Length Query","authors":"Tong Dong, Yong Zeng, Mengli Liu, Zhihong Liu, Jianfeng Ma, Xiao-yan Zhu","doi":"10.1109/NaNA.2019.00067","DOIUrl":"https://doi.org/10.1109/NaNA.2019.00067","url":null,"abstract":"Differential privacy is heavily used in privacy protection due to it provides strong protection against private data. The existing differential privacy scheme mainly implements the privacy protection of nodes or edges in the network by perturbing the data query results. Most of them cannot meet the privacy protection requirements of multiple types of information. In order to overcome these issues, a differential privacy security mechanism with average path length (APL) query is proposed in this paper, which realize the privacy protection of both network vertices and edge weights. Firstly, by describing APL, the reasons for choosing this attribute as the query function are analyzed. Secondly, global sensitivity of APL query under the need of node privacy protection and edge-weighted privacy protection is proved. Finally, the relationship between data availability and privacy control parameters in differential privacy is analyzed through experiments.","PeriodicalId":185215,"journal":{"name":"International Conference on Networking and Network Applications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114898301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Distributed Computing Framework Research for Avionics Cloud 航空电子云分布式计算框架研究
International Conference on Networking and Network Applications Pub Date : 1900-01-01 DOI: 10.1109/NANA.2018.8648728
Jianchun Xie, Zhonghua Wang, Yahui Li
{"title":"The Distributed Computing Framework Research for Avionics Cloud","authors":"Jianchun Xie, Zhonghua Wang, Yahui Li","doi":"10.1109/NANA.2018.8648728","DOIUrl":"https://doi.org/10.1109/NANA.2018.8648728","url":null,"abstract":"In the avionics cloud computing environment, the resource distributed in different task area, whatever partitioned by physical of logical, need to be cooperate together to compute a task. For the avionic computing environment, a set of distributed framework are presented in this paper, which include computing model, hardware framework and software model. The framework almost contains the technical character of the classical open framework, and can directly used for avionics products manufacture.","PeriodicalId":185215,"journal":{"name":"International Conference on Networking and Network Applications","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125913388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research of the Enhanced Anti-Xprobe2 增强抗xprobe2的研究
International Conference on Networking and Network Applications Pub Date : 1900-01-01 DOI: 10.1109/NaNA.2016.70
Junliang Ma, Xili Wang, Bing Xiao
{"title":"Research of the Enhanced Anti-Xprobe2","authors":"Junliang Ma, Xili Wang, Bing Xiao","doi":"10.1109/NaNA.2016.70","DOIUrl":"https://doi.org/10.1109/NaNA.2016.70","url":null,"abstract":"","PeriodicalId":185215,"journal":{"name":"International Conference on Networking and Network Applications","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116269075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Interference Aware Routing Metric for Multi-radio Multi-channel Wireless Mesh Networks 一种新的多无线电多通道无线Mesh网络干扰感知路由度量
International Conference on Networking and Network Applications Pub Date : 1900-01-01 DOI: 10.1109/NaNA.2016.47
Wenxia Ji, Yichuan Wang, Yanxiao Liu, Lei Zhu, Weigang Ma, Li Yan
{"title":"A New Interference Aware Routing Metric for Multi-radio Multi-channel Wireless Mesh Networks","authors":"Wenxia Ji, Yichuan Wang, Yanxiao Liu, Lei Zhu, Weigang Ma, Li Yan","doi":"10.1109/NaNA.2016.47","DOIUrl":"https://doi.org/10.1109/NaNA.2016.47","url":null,"abstract":"","PeriodicalId":185215,"journal":{"name":"International Conference on Networking and Network Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126783467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Construction of MDS Matrices Based on the Primitive Elements of the Finite Field 基于有限域原元的MDS矩阵的构造
International Conference on Networking and Network Applications Pub Date : 1900-01-01 DOI: 10.1109/NaNA53684.2021.00090
You Wu, Xin Dong, Jin Bo Wang, Wen-zheng Zhang
{"title":"Construction of MDS Matrices Based on the Primitive Elements of the Finite Field","authors":"You Wu, Xin Dong, Jin Bo Wang, Wen-zheng Zhang","doi":"10.1109/NaNA53684.2021.00090","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00090","url":null,"abstract":"With the advent of the information age, the protected objects and application environments vary greatly. Using the same standard algorithm with fixed logic is difficult to meet the increasingly diversified cryptographic application requirements of cloud computing, Internet of things and 5g network environment. Dynamic variable cryptographic algorithm can improve the security and adaptability of cryptographic algorithm, which is the focus of cryptographic algorithm research and design at present. The key to the research and design of dynamic variable cryptographic algorithms is to find dynamic variable cryptographic components with good cryptographic performance. MDS (Maximum Distance Separable) is often used in the diffusion layer design of block ciphers because of its optimal diffusion characteristics. Traditional MDS transformation generally adopts MDS matrices in the finite field. While using them in dynamic variable cryptographic algorithms, it is difficult to realize parametric application because of their logical differences and implementation imbalance. Aiming at the lightweight MDS variable design requirements of dynamic variable cryptographic algorithm, this paper first proposes a MDS parametric construction method based on block cyclic shift and XOR operation. Compared with the traditional MDS construction in the finite field, we obtain a class of MDS component clusters with larger scale which is convenient for software and hardware implementation. The main design idea is to convert the multiplication operation in the finite field into cyclic shift operation, and introduce parameters to participate in the MDS operation in the way of direct XOR. Based on the MDS matrix in AES diffusion layer, two kinds of variable MDS diffusion layers are given by this method. We adopt the consistent structure based on cyclic shift and XOR operation, and each parameter corresponds to a different MDS transformation. The free transformation of operations in different finite fields of traditional MDS matrix can be realized by adjusting the parameters, which can be used for the parametric design of diffusion layer of dynamic variable cryptographic algorithm.","PeriodicalId":185215,"journal":{"name":"International Conference on Networking and Network Applications","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126674079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Protection method of continuous location uploading based on local differential privacy 基于本地差分隐私的连续位置上传保护方法
International Conference on Networking and Network Applications Pub Date : 1900-01-01 DOI: 10.1109/NaNA51271.2020.00035
Xiong Wang, Weidong Yang
{"title":"Protection method of continuous location uploading based on local differential privacy","authors":"Xiong Wang, Weidong Yang","doi":"10.1109/NaNA51271.2020.00035","DOIUrl":"https://doi.org/10.1109/NaNA51271.2020.00035","url":null,"abstract":"Research on the protection of location privacy of mobile users is now receiving widespread attention. Many scholars have proposed many methods to protect user's location. However, it is still difficult to ensure that the user's location information is not leaked when the user's location is continuously uploaded. In response to these problems, a location privacy protection method based on LDP is proposed. The two-dimensional map is projected into one-dimensional space through the Hilbert curve, and the sub-areas are dynamically divided according to the number of users in the area; the RAPPOR is used to make sure the user's location information is disturbed and then uploaded to the server. In the case of continuous upload, the server can obtain the distribution of users in real time, but cannot know the precise location data of each user. Through experiments on real data sets and simulation experiments, the results prove that the LDP-based location privacy protection method can effectively protect the continuously uploaded user location information from being leaked.","PeriodicalId":185215,"journal":{"name":"International Conference on Networking and Network Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121028179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Data-Driven Security Analysis of Machine Learning Systems
International Conference on Networking and Network Applications Pub Date : 1900-01-01 DOI: 10.1109/NaNA51271.2020.00008
C. Shen
{"title":"Data-Driven Security Analysis of Machine Learning Systems","authors":"C. Shen","doi":"10.1109/NaNA51271.2020.00008","DOIUrl":"https://doi.org/10.1109/NaNA51271.2020.00008","url":null,"abstract":"","PeriodicalId":185215,"journal":{"name":"International Conference on Networking and Network Applications","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128465512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Empirical Study of Unsolicited Content Injection into a Website 未经请求内容注入网站的实证研究
International Conference on Networking and Network Applications Pub Date : 1900-01-01 DOI: 10.1109/NaNA.2017.39
Jianming Fu, Mengfei Xie, Yingjun Wang, Xufen Mei
{"title":"An Empirical Study of Unsolicited Content Injection into a Website","authors":"Jianming Fu, Mengfei Xie, Yingjun Wang, Xufen Mei","doi":"10.1109/NaNA.2017.39","DOIUrl":"https://doi.org/10.1109/NaNA.2017.39","url":null,"abstract":"","PeriodicalId":185215,"journal":{"name":"International Conference on Networking and Network Applications","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114802268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Research on PDCCH Channel in 5G NR System 5G NR系统中PDCCH信道的研究
International Conference on Networking and Network Applications Pub Date : 1900-01-01 DOI: 10.1109/NaNA53684.2021.00027
Tianyi Liang, Huijie Zhu
{"title":"Research on PDCCH Channel in 5G NR System","authors":"Tianyi Liang, Huijie Zhu","doi":"10.1109/NaNA53684.2021.00027","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00027","url":null,"abstract":"In the 5th Generation Mobile Communication Technology (5G) system, physical downlink control channel (PDCCH) controls the transmission and reception of uplink and downlink data by transmitting Downlink Control Information (DCI), which is the core of the physical channel control of the 5G system. Obtain the DCI information to obtain the uplink and downlink scheduling information of the signal, thereby providing more possibilites for effectively interfering with the mobile signal. In this paper, by studying the signal transmitting end, the corresponding resource demapping, deinterleaving, decoding and other algorithms are used to realize the full link processing of the receiving end and obtain DCI information. The actual 5G signal collected is processed, which verifies the reliability and accuracy of the algorithm.","PeriodicalId":185215,"journal":{"name":"International Conference on Networking and Network Applications","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127121738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Network Traffic Oriented Malware Detection in IoT (Internet-of-Things) 物联网中面向网络流量的恶意软件检测
International Conference on Networking and Network Applications Pub Date : 1900-01-01 DOI: 10.1109/NaNA53684.2021.00059
Wangwang Wang, Yunchun Zhang, Chengjie Li, Xuchenming Sun, Yuting Zhong, Xin Zhang
{"title":"Network Traffic Oriented Malware Detection in IoT (Internet-of-Things)","authors":"Wangwang Wang, Yunchun Zhang, Chengjie Li, Xuchenming Sun, Yuting Zhong, Xin Zhang","doi":"10.1109/NaNA53684.2021.00059","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00059","url":null,"abstract":"With the wide popularity of Internet-of-Things (IoT), machine learning-based malware detection systems are incapable of being installed on IoT devices due to restricted computing power and resources. To bridging the above gap, this paper proposes an integrated deep learning system for malware detection based on features extracted from network packet, NetFlow and malware samples. By referring models popular in natural language processing domain, 7 neural networks with attention mechanism are designed based on both character-level and word-level features. The results demonstrated that all models achieve satisfactory performance on accuracy, recall, precision and F1-Score. Among them, Transformer outperforms other models on character-level features with 99.83% accuracy. By using word-level features, all models achieve better performance than models on character-level features with the best accuracy as 99.54%. By visualizing heat map, we measured and ordered features in descending order based on their contributions to final classification. It is important to find out that features that greatly contribute in IoT malware detection are almost the same with those in network anomaly detection.","PeriodicalId":185215,"journal":{"name":"International Conference on Networking and Network Applications","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126660149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信