- Internet Traffic Analysis and Secure E-voting
- Network Security and Intrusion Detection
- Advanced Steganography and Watermarking Techniques
- Advanced Malware Detection Techniques
- Wireless Communication Security Techniques
- Adversarial Robustness in Machine Learning
- Surface Modification and Superhydrophobicity
- Cryptography and Data Security
- Anomaly Detection Techniques and Applications
- Icing and De-icing Technologies
- Digital Media Forensic Detection
- Cryptographic Implementations and Security
- Building Energy and Comfort Optimization
- Organic Light-Emitting Diodes Research
- Space Satellite Systems and Control
- Privacy-Preserving Technologies in Data
- Security and Verification in Computing
- Quantum-Dot Cellular Automata
- Fluid Dynamics and Thin Films
- Physical Unclonable Functions (PUFs) and Hardware Security
- Security in Wireless Sensor Networks
- Geothermal Energy Systems and Applications
- Spacecraft Dynamics and Control
- Cybersecurity and Cyber Warfare Studies
- High voltage insulation and dielectric phenomena
Tangshan College
2020
University of Electronic Science and Technology of China
2019
Beijing Institute of Technology
2017-2018
Southeast University
2011-2016
Covert channels represent unforeseen communication methods that exploit authorized overt as the carrier medium for covert messages. can be a secure and effective means of transmitting confidential information hidden in traffic. For timing channel, message is usually modulated into inter-packet delays (IPDs) legitimate traffic, which not suitable voice over LTE (VoLTE) since IPDs VoLTE traffic are fixed to lose possibility being modulated. this reason, we propose channel via adjusting silence...
Various security threats have prompted covert timing channels to become an important alternative for the transmission of confidential information in untrusted Internet Things (IoT). This article aims demonstrate susceptibility IoT over mobile networks. It presents system model a channel and then analyzes whether traditional based on inter-packet delays apply 4G/5G Given that there are so many proposed computer networks, we investigate different kinds construction approaches illustrate...
Voice over Long-Term Evolution enables reliable transmission among enormous Internet of Things devices, by providing end-to-end quality service for protocol–based services such as audio, video, and multimedia messaging. The research covert timing channels aims at transmitting message stealthily to the receiver using variations behavior. Existing approaches mainly modulate into inter-packet delays overt traffic, which are not suitable Evolution, since most traffic regular distribution, any...
Wireless communication is the most important carrier for covert channels because increasing security threats have made an alternative to transmitting confidential information in untrusted wireless communications. As a solution next-generation mobile communication, voice over LTE (VoLTE) developed using high-speed packet-switched core network provide high-quality end-to-end services. Unlike traditional circuit-switched technologies, both inter-packet delays and packet orders VoLTE traffic are...
In the existing network covert channel research, transmission of secret messages is one-way, lacking confirmation feedback on whether message successfully accepted. However, voice over LTE (VoLTE) has real-time interactive features, and data packets between sender receiver are transmitted in both directions, which facilitates construction a two-way with feedback. Therefore, we propose VoLTE adaptive to mobile environment, includes sender-to-receiver timing that modulates through actively...
Covert communication in this regard has been widely used for protecting the secrecy of communication. Voice over Long Term Evolution (VoLTE) is a packet-switched core network solution high-speed and high-quality end-to-end services which usually applied to between intelligent systems. However, covert channels using inter-packet delays packet order VoLTE are limited by specific rules. Since minor modifications overt traffic can be detected, existing channel solutions cannot directly VoLTE....
Mobile device forensics is an interdisciplinary field consisting of techniques applied to a wide range computing devices. Android devices are among the most disruptive technologies last years, gaining even more diffusion and success in daily life people categories. became important forensic due rich amount personal information they store. However, tools often used acquire privacy by attackers. This papar presents anti-forensics approach for which protects AES keys from being acquired tools....
Recent studies have highlighted audio adversarial examples as a ubiquitous threat to state-of-the-art automatic speech recognition systems. Thorough on how effectively generate are essential prevent potential attacks. Despite many research this, the efficiency and robustness of existing works not yet satisfactory. In this paper, we propose~\textit{weighted-sampling examples}, focusing numbers weights distortion reinforce attack. Further, apply denoising method in loss function make attack...