[HTML][HTML] A systematic review of data fusion techniques for optimized structural health monitoring

S Hassani, U Dackermann, M Mousavi, J Li - Information Fusion, 2024 - Elsevier
Advancements in structural health monitoring (SHM) techniques have spiked in the past few
decades due to the rapid evolution of novel sensing and data transfer technologies. This …

Intel software guard extensions applications: A survey

NC Will, CA Maziero - ACM Computing Surveys, 2023 - dl.acm.org
Data confidentiality is a central concern in modern computer systems and services, as
sensitive data from users and companies are being increasingly delegated to such systems …

Sok: Content moderation for end-to-end encryption

S Scheffler, J Mayer - arxiv preprint arxiv:2303.03979, 2023 - arxiv.org
Popular messaging applications now enable end-to-end-encryption (E2EE) by default, and
E2EE data storage is becoming common. These important advances for security and privacy …

Concept drift and cross-device behavior: Challenges and implications for effective android malware detection

A Guerra-Manzanares, M Luckner, H Bahsi - Computers & Security, 2022 - Elsevier
The large body of Android malware research has demonstrated that machine learning
methods can provide high performance for detecting Android malware. However, the vast …

AMD‐CNN: Android malware detection via feature graph and convolutional neural networks

RS Arslan, M Tasyurek - Concurrency and Computation …, 2022 - Wiley Online Library
Android malware has become a serious threat to mobile device users, and effective
detection and defence architectures are needed to solve this problem. Recently, machine …

A survey on fuzz testing technologies for industrial control protocols

X Wei, Z Yan, X Liang - Journal of Network and Computer Applications, 2024 - Elsevier
The development of the industrial Internet of Things enables industrial control systems to
become inter-networked and inter-connected, making them intelligent with high productivity …

Privacy-preserving fair outsourcing polynomial computation without FHE and FPR

Q Wang, Y Wang, F Zhou, J Xu, C Zhang - Computer Standards & Interfaces, 2025 - Elsevier
With the development of cloud computing, verifiable outsourcing computation (VC) has
received much more attention. The polynomial is a fundamental mathematical function with …

PatchDiscovery: Patch Presence Test for Identifying Binary Vulnerabilities Based on Key Basic Blocks

X Xu, Q Zheng, Z Yan, M Fan, A Jia… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Software vulnerabilities are easily propagated through code reuses, which pose dire threats
to software system security. Automatic patch presence test offers an effective way to detect …

[HTML][HTML] Detecting malware by analyzing app permissions on android platform: A systematic literature review

A Ehsan, C Catal, A Mishra - Sensors, 2022 - mdpi.com
Smartphone adaptation in society has been progressing at a very high speed. Having the
ability to run on a vast variety of devices, much of the user base possesses an Android …