


default search action
17th SecureComm 2024: Dubai, UAE - Part IV
- Saed Alrabaee

, Kim-Kwang Raymond Choo
, Ernesto Damiani
, Robert H. Deng
:
Security and Privacy in Communication Networks - 20th EAI International Conference, SecureComm 2024, Dubai, United Arab Emirates, October 28-30, 2024, Proceedings, Part IV. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 630, Springer 2026, ISBN 978-3-031-94457-4
Authentication
- Tashaffi Samin Yeasar, Shahrear Iqbal, Mohammad Zulkernine:

Pulse-to-Pair: Heartbeat-Based Authentication of IoT Devices for Elderly Care. 3-24 - Ivan Edmar Carvajal Roca, Zhangshuang Guan, Haitao Wang, Zhiguo Wan:

A Lightweight Group Authentication Framework for Cross-Domain Internet of Things. 25-46 - William Kozlowski, Deming Chen, David M. Nicol:

DPU-LARD: DPU-Leveraged Attestation of Remote Devices for Security of OT Networks. 47-72 - Youssef Yamout, Shahrear Iqbal, Nilesh Chakraborty, Mohammad Zulkernine:

Gait4Auth: Enhancing Identification and Security in Gait-Based Authentication. 73-93 - Xing Zhang, Hao Wu, Tianning Li, Xiaowei Li, Changda Wang:

A Hardware-Oriented Lightweight Block Cipher and Its Application in Surveillance Video. 94-114 - Minhong Dong, Ze Wang, Zhuo Han, Yude Bai, Chao Yuan, Guoying Qiu:

TGSA: Trajectory Group Semantic Anonymization. 115-136
Large Language Model for Cybersecurity
- Xu Ji, Jianyi Zhang, Ziyin Zhou, Zhangchi Zhao, Qianqian Qiao, Kaiying Han, Md. Imran Hossen, Xiali Hei:

Can't Say Cant? Measuring and Reasoning of Dark Jargons in Large Language Models. 139-168 - Marco Simoni, Andrea Saracino:

Cybersecurity with LLMs and RAGs: Challenges and Innovations. 169-183 - Weiliang Qi, Jiahao Cao, Darsh Poddar, Sophia Li, Xinda Wang:

Enhancing Pre-trained Language Models for Vulnerability Detection via Semantic-Preserving Data Augmentation. 184-203 - Rong Nie, Haixia Zhang, Yanbo Ni, Yifeng Lian, Shufeng Liu, Yuanyuan Peng:

K-BOOST: A Cyber Security NER Model with Knowledge Augmentation via BERT. 204-225 - Peng Tang, Xiaojie Xu, Xinpeng Li, Weidong Qiu, Zheng Huang:

FLKT: Improving the Fidelity and Robustness of Federated Learning Aggregation Rules via the Key-Data and Trap-Model. 226-248 - Yaqi Sun, Xin Wang, Zhenyong Zhang, Ming Yang, Yunpeng He, Xiaoming Wu:

Poisoning Attack on Federated Learning with Non-IID Data: A Historical-Global-Model-Based Approach. 249-262
Security Assessments
- Baiwei Duan, Yong Ding, Xuebin Wang, Yujia Zhu, Qingfeng Zhang, Can Zhao, Jinqiao Shi:

A Comprehensive Evaluation of the Impact on Tor Network Anonymity Caused by ShadowBridge. 265-283 - Xinyue Guo, Hequn Xian:

ADG-Dedup: Adaptive Dynamic Grained Deduplication Scheme for IoT Data in Cloud Storage. 284-304 - Jun Zhang, Amine Lamouchi, Houda Labiod, Dimitri Korkotashvili:

Enhancing Reliability in Open Rating Systems: A Trust-Aware Filtering Approach. 305-330 - Qingru Li, Yanan Gao, Fangwei Wang, Changguang Wang, Kehinde O. Babaagba, Zhiyuan Tan:

Graph Injection Attack Based on Node Similarity and Non-Linear Feature Injection Strategy. 331-350 - Spencer Massengale, Philip D. Huff:

Assessing and Prioritizing Ransomware Risk Based on Historical Victim Data. 351-369 - Hongzhou Zhang, Yuejun Liu, Yiwen Gao, Yongbin Zhou:

Solving ILWE Problem More Efficiently and Application to BLISS Side-Channel Attack. 370-389

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














