default search action
20th TrustCom 2021: Shenyang, China
- 20th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2021, Shenyang, China, October 20-22, 2021. IEEE 2021, ISBN 978-1-6654-1658-0
- Sarah Ali Siddiqui, Adnan Mahmood, Quan Z. Sheng, Hajime Suzuki, Wei Ni:
A Time-aware Trust Management Heuristic for the Internet of Vehicles. 1-8 - LingHan Zhang, F. Jiang, Xiaohu Tang:
Verifiable Conjunctive Keyword Search with Certificateless Searchable. 9-16 - Sara Alhajaili, Arshad Jhumka:
Reliable Logging in Wireless IoT Networks in the Presence of Byzantine Faults. 17-25 - Qing Xia, Wensheng Dou, Fengjun Zhang, Geng Liang:
The Performance of Selfish Mining in GHOST. 26-33 - Po-Chu Hsu, Atsuko Miyaji:
Bidder Scalable M+1st-Price Auction with Public Verifiability. 34-42 - Qianyun Gong, Chengjin Zhou, Le Qi, Jianbin Li, Jianzhong Zhang, Jingdong Xu:
VEIN: High Scalability Routing Algorithm for Blockchain-based Payment Channel Networks. 43-50 - Muhammad Shadi Hajar, Harsha K. Kalutarage, M. Omar Al-Kadri:
TrustMod: A Trust Management Module For NS-3 Simulator. 51-60 - Xiaomin Zhu, Bowen Fei, Daqian Liu, Weidong Bao:
Adaptive Clustering Ensemble Method Based on Uncertain Entropy Decision-Making. 61-67 - Jiaqi Yin, Huibiao Zhu, Yuan Fei:
Formal Verification of HPS-based Master-Slave Scheme in MEC with Timed Automata. 68-75 - Wei Zhang, Wenxue Cui, Feng Jiang, Chifu Yang, Ran Li:
Protecting the Ownership of Deep Learning Models with An End-to-End Watermarking Framework. 76-82 - Wei Xia, Wei Wang, Xin He, Gang Xiong, Gaopeng Gou, Zhenzhen Li, Zhen Li:
Old Habits Die Hard: A Sober Look at TLS Client Certificates in the Real World. 83-90 - Ligeng Chen, Jian Guo, Zhongling He, Dongliang Mu, Bing Mao:
RoBin: Facilitating the Reproduction of Configuration-Related Vulnerability. 91-98 - Chengshang Hou, Junzheng Shi, Mingxin Cui, Mengyan Liu, Jing Yu:
Universal Website Fingerprinting Defense Based on Adversarial Examples. 99-106 - Ripon Patgiri:
Rando: A General-purpose True Random Number Generator for Conventional Computers. 107-113 - Prashanthi Mallojula, Javaria Ahmad, Fengjun Li, Bo Luo:
You Are (not) Who Your Peers Are: Identification of Potentially Excessive Permission Requests in Android Apps. 114-121 - Wenjuan Li, Weizhi Meng, Laurence T. Yang:
Enhancing Trust-based Medical Smartphone Networks via Blockchain-based Traffic Sampling. 122-129 - Chuanyun Wang, Zhongrui Shi, Keyi Si, Yang Su, Zhaokui Li, Ershen Wang:
Anti-occlusion and Scale Adaptive Target Tracking Algorithm Based on Kernel Correlation Filter. 130-138 - Xuechao Yang, Xun Yi, Andrei Kelarev:
Secure Ranked Choice Online Voting System via Intel SGX and Blockchain. 139-146 - Shuran Wang, Dahan Pan, Runhan Feng, Yuanyuan Zhang:
MagikCube: Securing Cross-Domain Publish/Subscribe Systems with Enclave. 147-154 - Handong Cui, Xianrui Qin, Cailing Cai, Tsz Hon Yuen:
Security on SM2 and GOST Signatures against Related Key Attacks. 155-163 - Gao Wang, Gaoli Wang, Yu He:
Improved Machine Learning Assisted (Related-key) Differential Distinguishers For Lightweight Ciphers. 164-171 - Bartosz Drzazga, Lukasz Krzywiecki, Hannes Salin:
Cryptanalysis of Deterministic and Probabilistic Multi-Copy PDP Schemes For Cloud Storage - Attacks and Countermeasures. 172-179 - Jie Cheng, Kun Zhang, Bibo Tu:
Remote Attestation of Large-scale Virtual Machines in the Cloud Data Center. 180-187 - Runhao Wang, Jiexiang Kang, Wei Yin, Hui Wang, Haiying Sun, Xiaohong Chen, Zhongjie Gao, Shuning Wang, Jing Liu:
DeepTrace: A Secure Fingerprinting Framework for Intellectual Property Protection of Deep Neural Networks. 188-195 - Yiping Teng, Zhan Shi, Fanyou Zhao, Guohui Ding, Li Xu, Chunlong Fan:
Signature-Based Secure Trajectory Similarity Search. 196-206 - Guanxiong Ha, Hang Chen, Chunfu Jia, Ruiqi Li, Qiaowen Jia:
A secure deduplication scheme based on data popularity with fully random tags. 207-214 - Bingnan Zhong, Qingkai Zeng:
SecPT: Providing Efficient Page Table Protection based on SMAP Feature in an Untrusted Commodity Kernel. 215-223 - Mingyue Cui, Jin Wang, Jingya Zhou, Kejie Lu, Jianping Wang:
The Design of Secure Coded Edge Computing for User-Edge Collaborative Computing. 224-231 - Xiaohan Yue, Shuaishuai Zeng, Xibo Wang, Lixin Yang, Jian Xu, Shi Bai, Yuan He:
A Revocable Zone Encryption Scheme with Anonymous Authentication for C-ITS. 232-239 - Zheyuan Gu, Gaopeng Gou, Chengshang Hou, Gang Xiong, Zhen Li:
LFETT2021: A Large-scale Fine-grained Encrypted Tunnel Traffic Dataset. 240-249 - Cong Cheng, Lingzhi Li, Jin Wang, Fei Gu:
The Design and Implementation of Secure Distributed Image Classification Reasoning System for Heterogeneous Edge Computing. 250-257 - Biwen Chen, Lei Yang, Tao Xiang, Xiaoguo Li:
Secure Data Transmission with Access Control for Smart Home Devices. 258-265 - Zhiwei Cai, Huicong Zeng, Peijia Zheng, Ziyan Cheng, Weiqi Luo, Hongmei Liu:
Secure Homomorphic Evaluation of Discrete Cosine Transform with High Precision. 266-272 - Vijay Varadharajan, Uday Kiran Tupakula, Kallol Krishna Karmakar:
Techniques for Securing 5G Network Services from attacks. 273-280 - Uday Kiran Tupakula, Vijay Varadharajan, Kallol Krishna Karmakar:
Techniques for Securing Control Systems from Attacks. 281-288 - Antonino Galletta, Javid Taheri, Maria Fazio, Antonio Celesti, Massimo Villari:
Overcoming security limitations of Secret Share techniques: the Nested Secret Share. 289-296 - Maksym Slavnenko, Yevhen Zolotavkin, Jongkil Jay Jeong, Veronika Kuchta, Robin Doss:
Enhancing Privacy Through DMMA: Decision-Making Method for Authentication. 297-308 - Aneta Poniszewska-Maranda, Lukasz Rogozinski, Witold Maranda:
Security Library for Safe Data Storage on Android Platform. 309-316 - Jiaxing Cui, Zhengmin Kong, Jing Song, Weijun Yin, Xianjun Deng:
Robust AN-aided Secure Beamforming for Full-Duplex Relay System with Multiple Eavesdroppers. 317-322 - Licai Zhu, Hao Yang, Shi Chen, Zhipeng Yu:
Effective RFID Localization Based on Fuzzy Logic For Security. 323-330 - Dominik Ziegler, Alexander Marsalek, Gerald Palfinger:
White-Box Traceable Attribute-Based Encryption with Hidden Policies and Outsourced Decryption. 331-338 - Jiqing Chang, Jin Wang, Fei Gu, Kejie Lu, Lingzhi Li, Jianping Wang:
PCHEC: A Private Coded Computation Scheme For Heterogeneous Edge Computing. 339-346 - Dayin Zhang, Xiaojun Chen, Jinqiao Shi, Dakui Wang, Shuai Zeng:
A Differential Privacy Collaborative Deep Learning Algorithm in Pervasive Edge Computing Environment. 347-354 - Yupeng Jiang, Yong Li, Yipeng Zhou, Xi Zheng:
Sybil Attacks and Defense on Differential Privacy based Federated Learning. 355-362 - Chang Xu, Lvhan Zhang, Liehuang Zhu, Chuan Zhang, Kashif Sharif:
Achieving Efficient and Privacy-preserving Biometric Identification in Cloud Computing. 363-370 - Yuzhe Li, Yong Liu, Bo Li, Weiping Wang, Nan Liu:
Just Keep Your Concerns Private: Guaranteeing Heterogeneous Privacy and Achieving High Availability for ERM Algorithms. 371-378 - Ruxue Wen, Rui Zhang, Kai Peng, Chen Wang:
Protecting Locations with Differential Privacy against Location-Dependent Attacks in Continuous LBS Queries. 379-386 - Mengyao Peng, Jia Hu, Hui Lin, Xiaoding Wang, Wenzhong Lin:
A Privacy-Enhanced Mobile Crowdsensing Strategy for Blockchain Empowered Internet of Medical Things. 387-396 - Jiangna Xing, Xuebin Ma:
DP-gSpan: A Pattern Growth-based Differentially Private Frequent Subgraph Mining Algorithm. 397-404 - Xiaohong Liu, Hanbo Cai, De Li, Xianxian Li, Jinyan Wang:
Differential Privacy Preservation in Adaptive K-Nets Clustering. 405-412 - Tao Peng, Wentao Zhong, Kejian Guan, Yipeng Zou, Jiawei Zhu, Guojun Wang:
A Fine-grained Privacy-Preserving Profile Matching Scheme in Mobile Social Networks. 413-419 - Yu Peng, Qin Liu, Yue Tian, Jie Wu, Tian Wang, Tao Peng, Guojun Wang:
Dynamic Searchable Symmetric Encryption with Forward and Backward Privacy. 420-427 - Yuhang Hu, De Li, Zhou Tan, Xianxian Li, Jinyan Wang:
Adaptive Clipping Bound of Deep Learning with Differential Privacy. 428-435 - Xuebin Ma, Haijiang Liu, Shengyi Guan:
Improving the Effect of Frequent Itemset Mining with Hadamard Response under Local Differential Privacy. 436-443 - Changli Zhou, Jing Peng, Ying Ma, Qingfeng Jiang:
A Privacy-preserving Location Recommendation Scheme without Trustworthy Entity. 444-451 - Xiaohan Yue, Lixin Yang, Xibo Wang, Shuaishuai Zeng, Jian Xu, Shi Bai, Yuan He:
An Aggregate Anonymous Credential Scheme in C-ITS for Multi-Service with Revocation. 452-459 - Tingting Bao, Yang Liu:
A privacy-preserving framework for smart contracts based on stochastic model checking. 460-467 - Sam Fletcher, Adam Roegiest, Alexander K. Hudek:
Towards Protecting Sensitive Text with Differential Privacy. 468-475 - Yiping Teng, Weiyu Zhao, Chuanyu Zong, Li Xu, Chunlong Fan, Huan Wang:
Answering Why-not Questions on Top k Queries with Privacy Protection. 476-485 - Delin Chen, Peijia Zheng, Ziyang Chen, Ruopan Lai, Weiqi Luo, Hongmei Liu:
Privacy-Preserving Hough Transform and Line Detection on Encrypted Cloud Images. 486-493 - Gaëtan Pradel, Chris J. Mitchell:
Privacy-Preserving Biometric Matching Using Homomorphic Encryption. 494-505 - Andreas Abraham, Karl Koch, Stefan More, Sebastian Ramacher, Miha Stopar:
Privacy-Preserving eID Derivation to Self-Sovereign Identity Systems with Offline Revocation. 506-513 - Junkai Liu, Shihui Zheng, Lize Gu:
Effective Deep Learning-based Side-Channel Analyses Against ASCAD. 514-523 - Jianhua Li, Ximeng Liu, Jiong Jin, Shui Yu:
Too Expensive to Attack: Enlarge the Attack Expense through Joint Defense at the Edge. 524-531 - Gaoyang Liu, Shijie Wang, Borui Wan, Zekun Wang, Chen Wang:
ML-Stealer: Stealing Prediction Functionality of Machine Learning Models with Mere Black-Box Access. 532-539 - Bolun Wu, Yuanhang Xu, Futai Zou:
Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs. 540-547 - Chansu Han, Jun'ichi Takeuchi, Takeshi Takahashi, Daisuke Inoue:
Automated Detection of Malware Activities Using Nonnegative Matrix Factorization. 548-556 - Yukun Cheng, Mengce Zheng, Fan Huang, Jiajia Zhang, Honggang Hu, Nenghai Yu:
A Fast-Detection and Fault-Correction Algorithm against Persistent Fault Attack. 557-568 - Yuntao Zhang, Zhongru Wang, Weiqiang Yu, Binxing Fang:
Multi-level Directed Fuzzing for Detecting Use-after-Free Vulnerabilities. 569-576 - Futai Zou, Dechao Meng, Wentao Gao, Linsen Li:
DePL: Detecting Privacy Leakage in DNS-over-HTTPS Traffic. 577-586 - Andreas Grüner, Alexander Mühle, Christoph Meinel:
Analyzing Interoperability and Portability Concepts for Self-Sovereign Identity. 587-597 - Susheng Wu, Bin Chen, Mingxu Sun, Renyu Duan, Qixiang Zhang, Cheng Huang:
DeepVuler: A Vulnerability Intelligence Mining System for Open-Source Communities. 598-605 - Genpei Liang, Xiangyu Zhou, Qingyu Wang, Yutong Du, Cheng Huang:
Malicious Packages Lurking in User-Friendly Python Package Index. 606-613 - Xianwen Deng, Ruijie Zhao, Zhi Xue, Ming Liu, Libo Chen, Yijun Wang:
A Semi-supervised Deep Learning-Based Solver for Breaking Text-Based CAPTCHAs. 614-619 - Mingfu Xue, Can He, Shichang Sun, Jian Wang, Weiqiang Liu:
Robust Backdoor Attacks against Deep Neural Networks in Real Physical World. 620-626 - Qian Qiang, Mian Cheng, Yuan Zhou, Yu Ding, Zisen Qi:
MALUP: A Malware Classification Framework using Convolutional Neural Network with Deep Unsupervised Pre-training. 627-634 - Jiachao Zhang, Peiran Yu, Le Qi, Song Liu, Haiyu Zhang, Jianzhong Zhang:
FLDDoS: DDoS Attack Detection Model based on Federated Learning. 635-642 - Lin Wang, Kun Zhang, Chen Li, Bibo Tu:
Log-based Anomaly Detection from Multi-view by Associating Anomaly Scores with User Trust. 643-650 - Gang Zhang, Hao Li, Zhenxiang Chen, Lizhi Peng, Yuhui Zhu, Chuan Zhao:
AndroCreme: Unseen Android Malware Detection Based on Inductive Conformal Learning. 651-658 - Shuaishuai Tan, Zhiyi Tian, Xiaoxiong Zhong, Shui Yu, Weizhe Zhang, Guozhong Dong:
A Novel Android Malware Detection Method Based on Visible User Interface. 659-666 - Chenglin Xie, Yujie Guo, Shaosen Shi, Yu Sheng, Xiarun Chen, Chengyang Li, Weiping Wen:
EnvFaker: A Method to Reinforce Linux Sandbox Based on Tracer, Filter and Emulator against Environmental-Sensitive Malware. 667-677 - Boru Liu, Dan Tang, Yudong Yan, Zhiqing Zheng, Shihan Zhang, Jiangmeng Zhou:
TS-SVM: Detect LDoS Attack in SDN Based on Two-step Self-adjusting SVM. 678-685 - Chi Li, Min Zhou, Xinrong Han, Ming Gu:
Sensing Error Handling Bugs in SSL Library Usages. 686-692 - Mohammad Mamun, Kevin Shi:
DeepTaskAPT: Insider APT detection using Task-tree based Deep Learning. 693-700 - Carlo Farinella, Ali Ahmed, Craig A. Watterson:
Git Leaks: Boosting Detection Effectiveness Through Endpoint Visibility. 701-709 - George Grispos, Frank Tursi, Kim-Kwang Raymond Choo, William Mahoney, William Bradley Glisson:
A Digital Forensics Investigation of a Smart Scale IoT Ecosystem. 710-717 - R. G. Gayathri, Atul Sajjanhar, Yong Xiang, Xingjun Ma:
Anomaly Detection for Scenario-based Insider Activities using CGAN Augmented Data. 718-725 - Xiaoyu Wang, Xiaorui Gong, Lei Yu, Jian Liu:
MAAC: Novel Alert Correlation Method To Detect Multi-step Attack. 726-733 - Zeyi Li, Yun Wang, Pan Wang, Haorui Su:
PGAN: A Generative Adversarial Network based Anomaly Detection Method for Network Intrusion Detection System. 734-741 - Huizi Wu, Shiyi Wang, Hui Fang:
LP-UIT: A Multimodal Framework for Link Prediction in Social Networks. 742-749 - Yuhua Ling, Ran Zhang, Mingcan Cen, Xunao Wang, M. Jiang:
Cost-sensitive Heterogeneous Integration for Credit Card Fraud Detection. 750-757 - Jinli Li, Ran Zhang, Mingcan Cen, Xunao Wang, M. Jiang:
Depression Detection Using Asynchronous Federated Optimization. 758-765 - Chengshang Hou, Junzheng Shi, Mingxin Cui, Qingya Yang:
Attack versus Attack: Toward Adversarial Example Defend Website Fingerprinting Attack. 766-773 - Xiarun Chen, Qien Li, Zhou Yang, Yongzhi Liu, Shaosen Shi, Chenglin Xie, Weiping Wen:
VulChecker: Achieving More Effective Taint Analysis by Identifying Sanitizers Automatically. 774-782 - Jiating Wu, Yujia Zhu, Baiyang Li, Qingyun Liu, Binxing Fang:
Peek Inside the Encrypted World: Autoencoder-Based Detection of DoH Resolvers. 783-790 - Zhimin Luo, Mengce Zheng, Ping Wang, Minhui Jin, Jiajia Zhang, Honggang Hu:
Towards Strengthening Deep Learning-based Side Channel Attacks with Mixup. 791-801 - Qige Song, Yongzheng Zhang, Junliang Yao:
DroidRadar: Android Malware Detection Based on Global Sensitive Graph Embedding. 802-809 - Dongrui Zeng, Ben Niu, Gang Tan:
MazeRunner: Evaluating the Attack Surface of Control-Flow Integrity Policies. 810-821 - Ruipeng Zhang, Mengjun Xie, Jiang Bian:
ReLF: Scalable Remote Live Forensics for Android. 822-831 - Chuanyun Wang, Guowei Yang, Dongdong Sun, Jiankai Zuo, Ershen Wang, Linlin Wang:
Frequency Domain Fusion Algorithm of Infrared and Visible Image Based on Compressed Sensing for Video Surveillance Forensics. 832-839 - Mihail Brinza, Miguel Correia, João Pereira:
Virtual Static Security Analyzer for Web Applications. 840-848 - Xulong Zhang, Frank Jiang, Ran Zhang, Shupeng Li, Yang Zhou:
Social Spammer Detection Based on Semi-Supervised Learning. 849-855 - Jingyi Li, Zikai Zhang, Yidong Li, Xinyue Guo, Huifang Li:
FIDS: Detecting DDoS Through Federated Learning Based Method. 856-862 - Chunlong Fan, Jici Zhang, Cailong Li, Zhenxin Zhang, Yiping Teng, Jianzhong Qiao:
Gray Adversarial Attack Algorithm based on Multi-Scale Grid Search. 863-870 - Ke Lv, Yuan Liu, Jienan Chen, Dongxia Wang, Zhihong Tian:
An Interactive System for Unfair Rating Detection Models in a Customized Perspective. 871-878 - Ling Wang, Cheng Zhang, Zejian Luo, Chenguang Liu, Jie Liu, Xi Zheng:
PDAAA: Progressive Defense Against Adversarial Attacks for Deep Learning-as-a-Service in Internet of Things. 879-886 - Nickolaos Koroniotis, Nour Moustafa, Benjamin P. Turnbull, Francesco Schiliro, Praveen Gauravaram, Helge Janicke:
A Deep Learning-based Penetration Testing Framework for Vulnerability Identification in Internet of Things Environments. 887-894 - Jiwei Guan, Xi Zheng, Chen Wang, Yipeng Zhou, Alireza Jolfaei:
Robust Sensor Fusion Algorithms Against Voice Command Attacks in Autonomous Vehicles. 895-902 - Changqing Gong, Zhaoyang Dong, Abdullah Gani, Han Qi:
Quantum Ciphertext Dimension Reduction Scheme for Homomorphic Encrypted Data. 903-910 - Xiaoqing Wang, Chunping Wang, Kun Zhou, Hongbing Cheng:
ESS: An Efficient Storage Scheme for Improving the Scalability of Bitcoin System. 911-918 - Wenqing Huang, Fei Hao, Guangyao Pang, Yifei Sun:
Complementary Context-Enhanced Concept Lattice Aware Personalized Recommendation. 919-926 - Salma Abdalla Hamad, Dai Hoang Tran, Quan Z. Sheng, Wei Emma Zhang:
BERTDeep-Ware: A Cross-architecture Malware Detection Solution for IoT Systems. 927-934 - Pengjie Zeng, Xiaoliang Wang, Liangzuo Dong, Xinhui She, Frank Jiang:
A Blockchain Scheme Based on DAG Structure Security Solution for IIoT. 935-943 - Bin Yuan, Shengyao Sun, Xianjun Deng, Deqing Zou, Haoyu Chen, Shenghui Li, Hai Jin:
Automatically derived stateful network functions including non-field attributes. 944-951 - Linshu Ouyang, Yongzheng Zhang:
Phishing Web Page Detection with HTML-Level Graph Neural Network. 952-958 - Changbo Tian, Yongzheng Zhang, Tao Yin:
A Feature-Flux Traffic Camouflage Method based on Twin Gaussian Process. 959-966 - Aijun Zhou, Xinghao Jiang, Zhaohong Li, Zhenzhen Zhang:
A HEVC Video Steganography Algorithm Based on DCT/DST Coefficients with Improved VRCNN. 967-975 - Huanyu Wu, Lunjie Li, Hye-Young Paik, Salil S. Kanhere:
MEChain: A Multi-layer Blockchain Structure with Hierarchical Consensus for Secure EHR System. 976-987