


default search action
17th SecureComm 2023: Hong Kong, SAR, China
- Haixin Duan
, Mourad Debbabi
, Xavier de Carné de Carnavalet
, Xiapu Luo, Xiaojiang Du
, Man Ho Allen Au:
Security and Privacy in Communication Networks - 19th EAI International Conference, SecureComm 2023, Hong Kong, China, October 19-21, 2023, Proceedings, Part I. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 567, Springer 2025, ISBN 978-3-031-64947-9
AI for Security
- Neea Rusch, Asma Jodeiri Akbarfam, Hoda Maleki, Gagan Agrawal, Gokila Dorai:
Classify Me Correctly if You Can: Evaluating Adversarial Machine Learning Threats in NIDS. 3-22 - Xin Zong, Min Luo, Cong Peng, Debiao He:
CUFT: Cuflow-Based Approach with Multi-headed Attention Mechanism for Encrypted Traffic Classification. 23-40 - Yue Huang, Yongyan Guo, Cheng Huang:
CyberEA: An Efficient Entity Alignment Framework for Cybersecurity Knowledge Graph. 41-62 - Yuanjun Dai, Qingzhe Guo, An Wang:
DNN Architecture Attacks via Network and Power Side Channels. 63-87 - Jianyi Zhang, Ronglin Guan, Zhangchi Zhao, Xiuying Li, Zezheng Sun:
Invisibility Spell: Adversarial Patch Attack Against Object Detectors. 88-109 - Zhuoting Wu, Zhiwei Guo, Jiuxiang You, Zhenguo Yang, Qing Li, Wenyin Liu:
Meta Perturbation Generation Network for Text-Based CAPTCHA. 110-124 - Renyang Liu, Wei Zhou, Jinhong Zhang, Xiaoyuan Liu, Peiyuan Si, Haoran Li:
Model Inversion Attacks on Homogeneous and Heterogeneous Graph Neural Networks. 125-144 - Yanru Xiao, Cong Wang, Xing Gao:
Unsupervised Multi-criteria Adversarial Detection in Deep Image Retrieval. 145-164 - Botao Xu, Haizhou Wang:
VRC-GraphNet: A Graph Neural Network-Based Reasoning Framework for Attacking Visual Reasoning Captchas. 165-184
Authentication
- Hao Peng, Zisang Xu, Ruirui Zhang, Jianbo Xu:
An Adaptive Authentication Protocol for Internet of Vehicles Based on Vehicle Density. 187-204 - Minglei Guo, Zhenghang Xiao, Xin Liu, Jianwei Zhuge:
Discovering and Understanding the Security Flaws of Authentication and Authorization in IoT Cloud APIs for Smart Home. 205-224 - Jiaqi Yang, Jun Xian Chia, Xijie Ba, Jianying Zhou, Zheng Yang:
Optimizing Lightweight Intermittent Message Authentication for Programmable Logic Controller. 225-243
Blockchain and Distributed System Security
- Hanzheng Lyu, Shaokang Xie, Jianyu Niu, Chen Feng:
Byzantine Protocols with Asymptotically Optimal Communication Complexity. 247-264 - Jiangfeng Ma, Xuetao Zhang, Xiangxue Li:
Demystifying Blockchain Scalability: Sibling Chains with Minimal Interleaving. 265-286 - Jinfu Chen, Qiaowei Feng, Saihua Cai, Dengzhou Shi, Dave Towey, Yuhao Chen, Dongjie Wang:
VDABSys: A Novel Security-Testing Framework for Blockchain Systems Based on Vulnerability detection. 287-305
Cryptography
- Yanqing Yang, Jian Wang:
Anonymous Key Issuing Protocol with Certified Identities in Identity-Based Encryption. 309-328 - Xi Lin, Han Xia, Yongqiang Li, Mingsheng Wang:
Batch Lattice-Based Designated-Verifier ZK-SNARKs for R1CS. 329-349 - Yingjie Dong, Yongjian Liao, Zhishuo Zhang, Wen Huang:
Certificateless Aggregate Signature Without Trapdoor for Cloud Storage. 350-368 - Michael Raymond, Gillian Evers, Jan Ponti, Diya Krishnan, Xiang Fu:
Efficient Zero Knowledge for Regular Language. 369-394 - Feng Zhuo, Zhaoxiong Song, Linpeng Jia, Hanwen Zhang, Zhongcheng Li, Yi Sun:
Enabling Fast Settlement in Atomic Cross-Chain Swaps. 395-412 - Duy Tung Khanh Nguyen, Dung Hoang Duong, Willy Susilo, Yang-Wai Chow:
HeSUN: Homomorphic Encryption for Secure Unbounded Neural Network Inference. 413-438 - Keyi Liu, Chungen Xu, Bennian Dou, Lei Xu:
Optimization of Functional Bootstraps with Large LUT and Packing Key Switching. 439-458
Data Security
- Wenhao Li, Chengliang Wang, Xiaobing Hu, Hongwen Zhou, Hang Zeng, Yanai Wang:
An Authentication Algorithm for Sets of Spatial Data Objects. 461-475 - Haibo Tian, Yini Lin:
An Efficient Private Information Retrieval Protocol Based on TFHE. 476-495 - Yunming Zhang, Quanwei Cai, Houqiang Li, Jingqiang Lin, Wei Wang:
mShield: Protecting In-process Sensitive Data Against Vulnerable Third-Party Libraries. 496-513 - Beibei Zhou, Daojing He, Sencun Zhu, Shanshan Zhu, Sammy Chan, Xiao Yang:
Password Cracking by Exploiting User Group Information. 514-532

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.