Blockchain meets covert communication: A survey

Z Chen, L Zhu, P Jiang, C Zhang, F Gao… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Covert communication enables covert information transmission in an undetectable way to
prevent the exposure of communication behaviors. Blockchain-based covert communication …

The security of machine learning in an adversarial setting: A survey

X Wang, J Li, X Kuang, Y Tan, J Li - Journal of Parallel and Distributed …, 2019 - Elsevier
Abstract Machine learning (ML) methods have demonstrated impressive performance in
many application fields such as autopilot, facial recognition, and spam detection …

A survey of key technologies for constructing network covert channel

J Tian, G **ong, Z Li, G Gou - Security and Communication …, 2020 - Wiley Online Library
In order to protect user privacy or guarantee free access to the Internet, the network covert
channel has become a hot research topic. It refers to an information channel in which the …

Covert channel detection: machine learning approaches

MA Elsadig, A Gafar - IEEE Access, 2022 - ieeexplore.ieee.org
The advanced development of computer networks and communication technologies has
made covert communications easier to construct, faster, undetectable and more secure than …

Model architecture level privacy leakage in neural networks

Y Li, H Yan, T Huang, Z Pan, J Lai, X Zhang… - Science China …, 2024 - Springer
Privacy leakage is one of the most critical issues in machine learning and has attracted
growing interest for tasks such as demonstrating potential threats in model attacks and …

Network security situation prediction based on MR-SVM

J Hu, D Ma, C Liu, Z Shi, H Yan, C Hu - IEEE Access, 2019 - ieeexplore.ieee.org
The support vector machine (SVM) is verified to be effective for predicting cyber security
situations, however, the long training time of the prediction model is a drawback to its use …

Practical covert wireless unidirectional communication in IEEE 802.11 environment

H Seong, I Kim, Y Jeon, MK Oh, S Lee… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
Covert communications, or covert channels, are commonly exploited to establish a data
exfiltration channel from an insider on a trusted network to a malicious receiver outside the …

An optimizing and differentially private clustering algorithm for mixed data in SDN-based smart grid

Z Lv, L Wang, Z Guan, J Wu, X Du, H Zhao… - IEEE …, 2019 - ieeexplore.ieee.org
Software-defined network (SDN) is widely used in smart grid for monitoring and managing
the communication network. Big data analytics for SDN-based smart grid has got increasing …

DLchain: A covert channel over blockchain based on dynamic labels

J Tian, G Gou, C Liu, Y Chen, G **ong, Z Li - … Security: 21st International …, 2020 - Springer
With the continuous improvement of the traffic analysis techniques, traditional network covert
channels based on the TCP/IP architecture are facing many risks. Blockchain is a new kind …

EBDL: Effective blockchain-based covert storage channel with dynamic labels

C Zhang, L Zhu, C Xu, Z Zhang, R Lu - Journal of Network and Computer …, 2023 - Elsevier
Blockchain-based covert communication has opened up a new research direction for the
covert communication field. In blockchain-based storage covert communication, reliability …