Issue Date | Title | Author(s) | Type | М-cat. |
2023 | A Malware Detection Approach Based on Deep Learning and Memory Forensics (✓) | Zhang, Shuhui; Hu, Changdong; Wang, Lianhai; Mihaljević, Miodrag J. ; Xu, Shujiang; Lan, Tian | Article | |
2024 | A Sharding Scheme Based on Graph Partitioning Algorithm for Public Blockchain | Xu, Shujiang; Wang, Ziye; Wang, Lianhai; Mihaljević, Miodrag J. ; Zhang, Shuhui; Shao, Wei; Wang, Qizheng | Article | |
2022 | An Approach for Blockchain Pool Mining Employing the Consensus Protocol Robust against Block Withholding and Selfish Mining Attacks (✓) | Mihaljević, Miodrag J. ; Wang, Lianhai; Xu, Shujiang; Todorović, Milan | Article | |
2022 | An Approach for Security Enhancement of Certain Encryption Schemes Employing Error Correction Coding and Simulated Synchronization Errors (✓) | Mihaljević, Miodrag J. ; Wang, Lianhai; Xu, Shujiang | Article | |
2024 | Relay network-based cross-chain data interaction protocol with integrity audit | Xu, Shujiang; Zhang, Lulu; Wang, Lianhai; Mihaljević, Miodrag J. ; Zhang, Shuhui; Shao, Wei; Wang, Qizheng | Article | |
2022 | Security Enhanced Symmetric Key Encryption Employing an Integer Code for the Erasure Channel (✓) | Mihaljević, Miodrag J. ; Radonjić, Aleksandar ; Wang, Lianhai; Xu, Shuijang | Article | |