


default search action
17th SecureComm 2024: Dubai, UAE - Part I
- Saed Alrabaee

, Kim-Kwang Raymond Choo
, Ernesto Damiani
, Robert H. Deng
:
Security and Privacy in Communication Networks - 20th EAI International Conference, SecureComm 2024, Dubai, United Arab Emirates, October 28-30, 2024, Proceedings, Part I. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 627, Springer 2026, ISBN 978-3-031-94444-4
Privacy and Cryptography
- Yanjun Li, Xiaomeng Li, Hui Wan, Cong Wang:

Byzantine-Robust Federated Learning for Unreliable Environments by Random-Matching Verification and Credibility Table. 3-13 - Antonia Januszewicz, Daniela Medrano Gutiérrez, Nirajan Koirala, Jiachen Zhao, Jonathan Takeshita, Jaewoo Lee, Taeho Jung:

PPSA: Polynomial Private Stream Aggregation for Time-Series Data Analysis. 14-33 - Camille Nuoskala, Hossein Abdinasibfar, Antonis Michalas:

SPADE: Digging into Selective and PArtial DEcryption Using Functional Encryption. 34-58 - Tre' R. Jeter, Minh N. Vu, Raed Alharbi, My T. Thai:

Stuck in the SAND: When Your Neighbor Becomes Your Enemy. 59-75 - Chen Yang, Jingwei Chen, Wenyuan Wu, Yong Feng:

Optimized Privacy-Preserving Clustering with Fully Homomorphic Encryption. 76-96 - Fengyuan Qiu, Hao Yang, Lu Zhou, Zhe Liu:

Noya: An Efficient, Flexible and Secure CNN Inference Model Based on Homomorphic Encryption. 97-119 - Qinghui Zhang, Xiaojun Chen, Xudong Chen, Xin Zhao, Weizhan Jing, Tingyu Fan:

OCE-PTree: An Online Communication Efficient Privacy-Preserving Decision Tree Evaluation. 120-140 - Qiang Liu, Xiaojun Chen, Weizhan Jing, Ye Dong:

An Effective Multiple Private Set Intersection. 141-157 - Shuquan Wang, Hao Yang, Lu Zhou:

BCPIR: More Efficient Keyword PIR via Block Building Codewords. 158-179 - Yin Zhang, Xian Xu:

Embedding-Optimized Steganography Based on Post-quantum Encryption and BPNN. 180-199
AI for Cybersecurity and Adversarial Models
- Bolun Wu, Futai Zou, Mingyi Huang, Xin Sun, Jiajia Han:

Enhancing Runtime Application Self-Protection with Unsupervised Deep Learning. 203-213 - Ce Zhou, Qiben Yan, Daniel Kent, Guangjing Wang, Ziqi Zhang, Hayder Radha:

Optical Lens Attack on Deep Learning Based Monocular Depth Estimation. 214-239 - Changguang Wang, Cong Wang, Qingru Li, Fangwei Wang:

RootES: A Method for Generating Text Adversarial Examples Using Root Embedding Space. 240-257 - Ghebrebrhan Gebrehans, Willian T. Lunardi, Ernesto Damiani:

Boosting GAN Performance: Feature Transformation for Heavy-Tailed Malware Data Generation. 258-271 - Rui Guo, Ke Yu, Enbo Yu, Qianqian Qiao, Zhenyu Mao, Haizhou Wang:

SPC-GAN-Attack: Attacking Slide Puzzle CAPTCHAs by Human-Like Sliding Trajectories Based on Generative Adversarial Network. 272-291 - Ziyue Shen, Yiwen Gao, Wei Cheng, Jiabei Wang, Yongbin Zhou:

Improving Interpretability: Visual Analysis of Deep Learning-Based Multi-channel Attacks. 292-312 - Junli Zheng, Shaobing Wang, Zhicheng Xu, Xiaoli Zhang, Hongbing Cheng:

Deep Reinforcement Learning from Drifting Network Environments in Anomaly Detection. 313-331 - Shamma Alalawi, Saed Alrabaee, Wasif Khan, Issam Al-Azzoni, Medha Mohan Ambali Parambil:

A Comparative Study on Source Code Attribution Using AI: Datasets, Features, and Techniques. 332-353
Quantum Computing in Cybersecurity
- Tariq Qayyum, Asadullah Tariq, M. Waqas Haseeb Khan, Saed Alrabaee, Zouheir Trabelsi, Farag M. Sallabi, Mohamed Adel Serhani:

Harnessing the Power of Quantum Computing for URL Classification: A Comprehensive Study. 357-375 - Ivan Cvitic, Dragan Perakovic, Josip Vladava:

Comprehensive Classification and Analysis of Cyber Attack Surface on Quantum Key Distribution Networks. 376-397 - Ashutosh Dhar Dwivedi, Marios Anagnostopoulos, Jens Myrup Pedersen:

A Secure Blockchain Network with Quantum Key Encryption and Authentication. 398-414

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














