


default search action
23rd TrustCom 2024: Sanya, China
- 23rd IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024. IEEE 2024, ISBN 979-8-3315-0620-9
- Hendrik Meyer zum Felde, Andrei-Cosmin Aprodu:
MAXPOWR: Memory Attestation and Export in Process-based Trusted Execution Environments. 1-12 - Ruizhong Du, Jiajia Kang, Jin Tian:
Trusted Networking for Drones: Reputation-Based Security Mechanisms for Node Access and Information Synchronization. 13-20 - Qingyu Gao, Liantao Song, Yan Lei, Feng Wang, Lei Wang, Shize Zong, Yan Ding:
Enhancing Consistency in Container Migration via TEE: A Secure Architecture. 21-28 - Fei Peng, Yousheng Liang, Min Long:
A Semi-Fragile Reversible Watermarking for 3D Models Based on IQIM with Dual-Strategy Partition Modulation. 29-36 - Feng He, Shijun Zhao, Dan Meng, Rui Hou:
MSMP: A Centralized Shared-memory Management for Building Efficient and Reliable File Systems on Microkernels. 37-48 - Wei Feng, Dongyuan Wei, Qianqian Wang:
Blind Signature Based Anonymous Authentication on Trust for Decentralized Mobile Crowdsourcing. 49-56 - Guangfa Lyu, Jian Kong, Yinglong Chen, Fengyu Wang:
CTWF: Website Fingerprinting Attack based on Compact Convolutional Transformer. 57-67 - Tian Tian, Yan Zhu, Ning An, Bo Jiang, Huamin Feng, Zhigang Lu:
LSTM-Diff: A Data Generation Method for Imbalanced Insider Threat Detection. 68-76 - Nan Jiang, Yuanbo Zhao, Qihang Zhou, Xiaoqi Jia, Jing Tang:
SeChannel: A Secure and Lightweight Channel Protection Approach for TEE Systems. 77-84 - Jihong Liu, Chenyang Tu, Yifei Zhang:
Hardware assisted security gateway system: combined with FPGA shielding protection. 85-92 - Muhammad Adil, Mian Ahmad Jan, Safayat Bin Hakim, Houbing Herbert Song, Zhanpeng Jin:
xIDS-EnsembleGuard: An Explainable Ensemble Learning-based Intrusion Detection System. 93-100 - Jean de Bonfils Lavernelle, Pierre-François Bonnefoi, Benoît Gonzalvo, Damien Sauveron:
DMA: A Persistent Threat to Embedded Systems Isolation. 101-108 - Chengyu Li, Weihai Li, Zikai Xu, Nenghai Yu:
StegaFDS: Generative Steganography Based on First-Order DPM-Solver. 109-116 - Max Landauer, Klaus Mayer, Florian Skopik, Markus Wurzenberger, Manuel Kern:
Red Team Redemption: A Structured Comparison of Open-Source Tools for Adversary Emulation. 117-128 - Mykolai Protsenko, Albert Stark, Andreas Papon, Sandra Kostic:
VisualAuth: Secure Transaction Authentication and Trusted UI on COTS Android Devices. 129-140 - Khanh-Duy Nguyen, Hsi-Ching Chu, Quoc-Viet Nguyen, Min-Te Sun, Kazuya Sakai, Wei-Shinn Ku:
From Data to Action: CTI Analysis and ATT&CK Technique Correlation. 141-148 - Zhuowei Shen, Xiao Kou, Taiyao Yang, Haoqin Xu, Dongbin Wang, Shaobo Niu:
A Revocable Pairing-Free Certificateless Signature Scheme Based on RSA Accumulator. 149-156 - Jiuyao Jing, Yu Zheng, Qi He, Chunlei Peng:
Face Anti-spoofing based on Multi-modal Dual-stream Anomaly Detection. 157-164 - Fei Zhang, Xiaohong Li, Sen Chen, Ruitao Feng:
Behavior Speaks Louder: Rethinking Malware Analysis Beyond Family Classification. 166-175 - Xin Deng, Rui Wang, Weihong Han, Zhihong Tian:
Vulnerabilities are collaborating to compromise your system: A network risk assessment method based on cooperative game and attack graph. 176-183 - Rong Wang, Junchuan Liang, Haiting Jiang, Chaosheng Feng, Chin-Chen Chang:
StegoFL: Using Steganography and Federated Learning to Transmit Malware. 184-190 - Mingjie Yu, Wei Jin, Fenghua Li, Yunchuan Guo, Zheng Yan, Xiao Wang, Nenghai Yu:
Correcting the Bound Estimation of Mohawk. 191-196 - Yongwei Lu, Xiaoyan Liang, Ruizhong Du, Junfeng Tian:
OFLGI: An Optimization-based Feature-Level Gradient Inversion Attack. 197-204 - Yusen Wang, Jiong Lou, Zihan Wang, Jie Li:
Front-running Attacks in Hash-Based Transaction Sharding Blockchains. 205-212 - Jie Cui, Jing Zhang, Lu Wei, Minghui Zhu, Hong Zhong, Geyong Min:
Multi-Authority Ciphertext-Policy Attribute-based Encryption with Hidden Policy for Securing Internet-of-Vehicles. 213-221 - Zhuochen Jiang, Baojian Hua:
WaShadow: Effectively Protecting WebAssembly Memory Through Virtual Machine-Aware Shadow Memory. 222-233 - Debao Wang, Yiwen Gao, Jingdian Ming, Yongbin Zhou, Xian Huang:
Attacking High-Performance SBCs: A Generic Preprocessing Framework for EMA. 234-241 - Yu Hao, Xu Zhang, Dongbin Wang:
CPCED: a container escape detection system based on CNI plugin. 242-253 - Zhefeng Nan, Qi Wang, Changbo Tian, Yijing Wang, Tianning Zang, Dongwei Zhu:
Path Generation Method of Anti-Tracking Network based on Dynamic Asymmetric Hierarchical Architecture. 254-261 - Yilin Zhu, Guang Cheng, Shunyu Zheng, Hantao Mei:
TOScorr: Transformer-based Flow Correlation Attack on Tor Onion Service. 262-270 - Yuwei Xu, Xiaotian Fang, Zhengxin Xu, Kehui Song, Yali Yuan, Guang Cheng:
M-ETC: Improving Multi-Task Encrypted Traffic Classification by Reducing Inter-Task Interference. 271-278 - Xu Li, Yinghao Wu, Yang Liu, Baosheng Wang, Bei Wang, Yijun Cui:
Lattice-based Multi-Stage Secret Sharing 3D Secure Encryption Scheme. 279-286 - Cao Chen, Fenghua Li, Yunchuan Guo, Zifu Li, Wenlong Kou:
Efficiently Detecting DDoS in Heterogeneous Networks: A Parameter-Compressed Vertical Federated Learning approach. 287-294 - Kéren Saint-Hilaire, Christopher Neal, Frédéric Cuppens, Nora Boulahia-Cuppens, Francesca Bassi:
Attack-Defense Graph Generation: Instantiating Incident Response Actions on Attack Graphs. 295-305 - Meijie Du, Mingqi Hu, Shu Li, Zhao Li, Qingyun Liu:
SCENE: Shape-based Clustering for Enhanced Noise-resilient Encrypted Traffic Classification. 306-315 - Tao Leng, Chang You, Shuangchun Luo, Junyi Liu, Yutong Zeng, Cheng Huang:
GraySniffer: A Cliques Discovering Method for Illegal SIM Card Vendor Based on Multi-Source Data. 316-325 - Hao Jiang, Haiwei Lai, Si Wu, Baojian Hua:
JasFree: Grammar-free Program Analysis for JavaScript Bytecode. 326-337 - Liujia Cai, Tong Yu, Yumeng Li, Siqi Lu, Hanjie Dong, Guangying Cai, Guangsong Li, Yongjuan Wang:
SyntaxBridge: Protocol Description Transformer for Enhanced Formal Analysis of Security Protocols. 338-345 - Yue Li, Runcheng Fang, Qipeng Song, Xilei Yang:
STGCN-Based Link Flooding Attack Detection and Mitigation in Software-Defined Network. 346-353 - Yunyang Qin, Yujia Zhu, Linkang Zhang, Baiyang Li, Yong Ding, Qingyun Liu:
LayyerX: Unveiling the Hidden Layers of DoH Server via Differential Fingerprinting. 354-361 - Zhujie Guan, Mengmeng Tian, Yuwei Xu, Kehui Song, Guang Cheng:
WCDGA: BERT-Based and Character-Transforming Adversarial DGA with High Anti-Detection Ability. 362-369 - Xiaoran Huang, Yiwen Gao, Wei Cheng, Yuejun Liu, Jingdian Ming, Yongbin Zhou, Jian Weng:
Towards High-Quality Electromagnetic Leakage Acquisition in Side-Channel Analysis. 370-377 - Spyridon Sourmelis, Weizhi Meng:
Cyber Risk Analysis on Electric Vehicle Systems via NIST CSF. 378-386 - Abdoul Nasser Hassane Amadou, Anas Motii, Saida Elouardi, El Houcine Bergou:
EUREKHA: Enhancing User Representation for Key Hackers Identification in Underground Forums. 387-398 - Yuan Zhao, Chunhe Xia, Tianbo Wang, Mengyao Liu, Yang Li:
Few-shot Encrypted Malicious Traffic Classification via Hierarchical Semantics and Adaptive Prototype Learning. 399-409 - Weidong Zhou, Chunhe Xia, Nan Feng, Xinyi Pan, Tianbo Wang, Xiaojian Li:
AIDE: Attack Inference Based on Heterogeneous Dependency Graphs with MITRE ATT&CK. 410-417 - Beibei Feng, Qi Wang, Xiaolin Xu, Yijing Wang, Tianning Zang, Jingrun Ma:
From Scarcity to Clarity: Few-Shot Learning for DoH Tunnel Detection Through Prototypical Network. 418-426 - Serena Cofano, Giacomo Benedetti, Matteo Dell'Amico:
SBOM Generation Tools in the Python Ecosystem: an In-Detail Analysis. 427-434 - Feixue Yan, Sheng Wen, Yang Xiang, Shiping Chen:
Shapley-value-based Explanations for Cryptocurrency Blacklist Detection. 435-442 - Keyi Ju, Hui Zhong, Xinyue Zhang, Xiaoqi Qin, Miao Pan:
Controllable Quantum Computing Privacy via Inherent Noises and Quantum Error Mitigation. 443-452 - Yuchen Chen, Guanxiong Ha, Xuan Shan, Chunfu Jia, Qiaowen Jia:
Scalable Client-side Encrypted Deduplication beyond Secret Sharing of the Master Key. 453-460 - Xiaohong Wu, Yujun Lin, Jie Tao, Yonggen Gu:
Machine Learning-based Optimal Data Trading Mechanism with Randomized Privacy Protection Scheme. 461-468 - Florian Dehling, Sebastian Koch, Luigi Lo Iacono, Hannes Federrath:
You Are as You Type: Investigating the Influence of Timestamp Accuracy on the Robustness of Keystroke Biometrics. 469-480 - Pengfei Wu, Jianfei Sun, Guomin Yang, Robert H. Deng:
Towards Privacy-aware IoT Communications: Delegable, Revocable, and Efficient. 481-491 - Qipeng Song, Ruiyun Wang, Yue Li, Yiheng Yan, Xingyue Zhu, Hui Li:
TrustNotify: A Lightweight Framework for Complete and Trustworthy Data Deletion Notification Distribution. 492-500 - Ting Zhou, Hongtao Lv, Ning Liu, Lei Liu:
Budget-Feasible Double Auction Mechanisms for Model Training Services in Federated Learning Market. 501-507 - Yalan Wang, Liqun Chen, Long Meng, Christopher J. P. Newton:
VCaDID: Verifiable Credentials with Anonymous Decentralized Identities. 508-515 - Qinchen Guan, Shaoyong Du, Kerong Wang, Chunfang Yang, Xiangyang Luo:
A Framework for Detecting Hidden Partners in App Collusion. 516-523 - Jingchi Zhang, Anwitaman Datta:
Enhancing Privacy-Preserving Multi-Authority Attribute-Based Encryption: Addressing Rogue-Key Attacks Under Adaptive Corruption of Authorities. 524-531 - Haoyang Wang, Kai Fan, Yue Quan, Fenghua Li, Hui Li:
VDPSRQ: Achieving Verifiable and Dynamic Private Spatial Range Queries over Outsourced Database. 532-541 - Fuyao Zhang, Dan Wang, Chuyang Liang:
DPFCIL: Differentially Private Federated Class-Incremental Learning on non-IID Data. 542-550 - Wenxiu Ding, Hongjiang Guo, Zheng Yan, Mingjun Wang:
Secure Federated Learning Schemes Based on Multi-Key Homomorphic Encryption. 551-558 - Yuwei Xu, Jiangfeng Li, Yujie Hou, Xinxu Huang, Yali Yuan, Guang Cheng:
TriViewNet: Achieve Accurate Tor Hidden Service Classification by Multi-View Feature Extraction and Fusion. 559-566 - Mingjun Wang, Yixuan Liu, Wenxiu Ding:
SP2-RD2D: Secure and Privacy-Preserving Authentication and Key Agreement Protocol for D2D Relay Communication. 567-573 - Xin Zhang, Bingbing Zhang, Chi Zhang, Lingbo Wei:
Enhanced Privacy Policy Comprehension via Pre-trained and Retrieval-Augmented Models. 574-581 - Siyuan Guan, Ziheng Hu, Guotao Xu, Yao Zhu, Bowen Zhao:
MIND: A Privacy-Preserving Model Inference Framework via End-Cloud Collaboration. 582-589 - Ruoyao Xiao, Yu Luo, Weifeng Xu, Harshmeet Lamba, Dianxiang Xu:
Analyzing Relationship Consistency in Digital Forensic Knowledge Graphs with Graph Learning. 590-599 - Yuheng Zhang, Guojun Wang, Peiqiang Li, Xubin Li, Wanyi Gu, Mingfei Chen, Houji Chen:
TransFront: Bi-path Feature Fusion for Detecting Front-running Attack in Decentralized Finance. 600-607 - Jong-Hee Jeon, Jahoon Koo, Young-Gab Kim:
RAG-based Cyber Threat Tracing Graph Modeling Method. 608-615 - Xiaoshuang Li, Mingjun Wang, Yilong Guo, Wenxiu Ding:
AdaptFL: Adaptive Client Task Allocation-Based Synchronous Federated Learning. 616-623 - Yongkang Yu, Jinchun He, Xinwei Xu, Qinnan Zhang, Wangjie Qiu, Hongwei Zheng, Binghui Guo, Jin Dong:
TierFlow: A Pipelined Layered BFT Consensus Protocol for Large-Scale Blockchain. 624-635 - Jianbo Lin, Lin Yan, Zhi Lin, Zan Zhou, Shujie Yang:
ClusterX: Adaptive Collaborative Scheduling of Layered User-Proxy Mapping to Enhance DDoS Defense in Distributed Clusters. 636-642 - Yuan Liu, Licheng Wang, Yongbin Zhou:
New Compact Construction of FHE from Cyclic Algebra LWE. 643-649 - Jingzhang Cao, Meng Wang, Shenao Lin:
Rethinking Mutation Strategies in Fuzzing Smart Contracts. 650-657 - Hanning Zhang, Guansheng Wang, Junwei Feng, Lei Feng, Quan Gan, Long Ji:
Towards a Robust Medical Record System: Integrating Logical Reasoning for Trustworthy Data Management. 658-665 - Jianrong Wang, Yacong Ren, Dengcheng Hu, Qi Li, Sen Li, Xuewei Li, Xiulong Liu:
CVchain: A Cross-Voting-Based Low Latency Parallel Chain System. 666-673 - Qi Xia, Badjie Ansu, Jianbin Gao, Mupoyi Ntuala Grace, Hu Xia, Isaac Amankona Obiri:
A Novel Time Series Approach to Anomaly Detection and Correction for Complex Blockchain Transaction Networks. 674-682 - Guangzhuo Zhu, Qian Wang, Bei Gong:
A Sustainable Storage Compensation Method for Consortium Blockchain-based Computing Power Trading. 683-690 - Yuwei Xu, Zizhi Zhu, Chufan Zhang, Kehui Song, Guang Cheng:
A High-Accuracy Unknown Traffic Identification Method Based on Multi-View Contrastive Learning. 691-698 - Zelong Zhang, Wei Cheng, Yongbin Zhou, Zehua Qiao, Yuhan Zhao, Jian Weng:
Attacking High-order Masked Cryptosystem via Deep Learning-based Side-Channel Analysis. 699-706 - Yuan Ma, Maosen Sun, Wei Wang, Tianyu Chen, Na Lv, Dongchi Han:
Efficient and Accurate Min-entropy Estimation Based on Decision Tree for Random Number Generators. 707-716 - Tongxi Chen, Weizhi Meng, Wenjuan Li:
User Authentication Based on the Integration of Musical Signals and Ear Canal Acoustics. 717-728 - Kaiyuan Li, Haruka Hirata, Daiki Miyahara, Kazuo Sakiyama, Yuko Hara, Yang Li:
Multiplicative Masked M&M: An Attempt at Combined Countermeasures with Reduced Randomness. 726-733 - Xiaoyong Kou, Wei Yang, Peijin Cong, Gongxuan Zhang:
Multi-Channel Leakage Detection Based on χ2 Test of Independence. 734-741 - Weihan Wang, Xiulong Liu, Liyuan Ma, Hao Xu, Gaowei Shi, Juncheng Ma, Keqiu Li:
MVSS: Blockchain Cross-shard Account Migration Based on Multi-version State Synchronization. 742-749 - Yongkang Chen, Tong Wang, Wei Kong, Taotao Gu, Guiling Cao, Xiaohui Kuang:
Enhancing Adversarial Robustness through Self-Supervised Confidence-Based Denoising. 750-758 - Zhixuan Zhang, Yanhui Zhu, Yuezhong Wu, Fangteng Man, Hao Chen, Xujian Ying:
A Knowledge Graph Completion Method Based on Gated Adaptive Fusion and Conditional Generative Adversarial Networks. 759-766 - Mengdie Huang, Yingjun Lin, Xiaofeng Chen, Elisa Bertino:
MARS: Robustness Certification for Deep Network Intrusion Detectors via Multi-Order Adaptive Randomized Smoothing. 767-774 - Qifan Wang, Shujie Cui, Lei Zhou, Ye Dong, Jianli Bai, Yun Sing Koh, Giovanni Russello:
GTree: GPU-friendly Privacy-preserving Decision Tree Training and Inference. 775-785 - Fan Xiang, Xueyang Li, Guozhu Meng:
RTS: A Training-time Backdoor Defense Strategy Based on Weight Residual Tendency. 786-793 - Zhuohan Ao, Yi Wang, Ying Wang, Yu Zhan:
Trustworthiness and path regularity based contrastive learning for noisy knowledge graph error assertion detection. 794-801 - Haotian Wang, Jing Liu:
RPG-Diff: Precise Adversarial Defense Based on Regional Positioning Guidance. 802-809 - Wei Xu, Hui Zhu, Chang Xiao, Fengwei Wang, Dengguo Feng, Hui Li:
Toward Privacy-Preserving and Verifiable XGBoost Training for Horizontal Federated Learning. 810-817 - Haiying Liu, Ruichun Gu, Jingyu Wang, Xiaolin Zhang, Bolin Zhang, Xuebao Li:
Local Drift Correction and Attention Aggregation for Self-Organized Federated Learning. 818-825 - Mengmeng Tang, Shuhong Chen, Guojun Wang, Hanjun Li, Zhuyi Yao, Sheng Wen:
Boosting Transferability of Adversarial Examples by Joint Training and Dual Feature Mixup. 826-833 - Ying Hua, Hui Xia, Shuo Xu:
Federated Unlearning for Samples Based on Adaptive Gradient Ascent of Angles. 834-841 - Zehua Ding, Youliang Tian, Guorong Wang, Jinbo Xiong, Jianfeng Ma:
Membership Inference Attacks via Dynamic Adversarial Perturbations Reduction. 842-849 - Yuefeng Lai, Lizhao Wu, Hui Lin, Xiaokang Zhou:
Defending Against Backdoor Attacks through Causality-Augmented Diffusion Models for Dataset Purification. 850-858 - Jiekang Hu, Yakai Li, Zhaoxi Xiang, Luping Ma, Xiaoqi Jia, Qingjia Huang:
LLM4MDG: Leveraging Large Language Model to Construct Microservices Dependency Graph. 859-869 - Yi Ji, Isao Echizen:
StrucTrans: Zero-Query Structural Adversarial Attack Transferred from Masked Autoencoders to Image Classifiers. 870-879 - Jie Hou, Zengrui Huang, Zhiyong Zhang, Wei Zhang, Lei Ju:
A GPU-Based Privacy-Preserving Machine Learning Acceleration Scheme. 880-887 - Feng Wu, Weiqi Wang, Youyang Qu, Shui Yu:
A Low-cost Black-box Jailbreak Based on Custom Mapping Dictionary with Multi-round Induction. 888-895 - Lizhi Sun, Jingzhou Zhu, Boyu Chang, Yixin Xu, Bo Yang, Hao Wu, Fengyuan Xu, Sheng Zhong:
TTFL: Towards Trustworthy Federated Learning with Arm Confidential Computing. 896-907 - Yalin Sun, Ruiying Lu, Kang Li, Yu Zheng:
Topic-Aware Sensitive Information Detection in Chinese Large Language Model. 908-915 - Jiezhen Tang, Hui Zhu, Yandong Zheng, Junpeng Zhang, Fengwei Wang, Jiaqi Zhao, Hui Li:
UNIRE: Secure Trajectory-User Linking Model Aggregation with Knowledge Transfer. 916-925 - Wenxiu Ding, Muzhi Liu, Yuxuan Cai, Mingxin Chen, Zheng Yan, Mingjun Wang:
Zephyr: A High-Performance Framework for Graph Attention Networks on Heterogeneous Data. 926-933 - Zhenbo Song, Wenhao Gao, Zhenyuan Zhang, Jianfeng Lu:
AS-FIBA: Adaptive Selective Frequency-Injection for Backdoor Attack on Deep Face Restoration. 934-943 - Lijun Gao, Zheng Yan:
CertRob: Detecting PDF Malware with Certified Adversarial Robustness via Randomization Smoothing. 944-951 - Zhangchi Zhao, Jianyi Zhang, Liqun Shan, Ziyin Zhou, Kaiying Han, Xiali Hei:
Paa-Tee: A Practical Adversarial Attack on Thermal Infrared Detectors with Temperature and Pose Adaptability. 952-959 - Shuaishuai Chang, Yuzhe Li, Jinchao Zhang, Bo Li:
T-ABE: A practical ABE scheme to provide trustworthy key hosting on untrustworthy cloud. 960-967 - Xianghui Dong, Yin Liu, Xuejun Yu:
Three-Body Problem: An Empirical Study on Smartphone-based TEEs, TEE-based Apps, and their Interactions. 968-977 - Junqiao Gao, Chaklam Cheong, Mansi Zhang, Yue Cao, Tao Peng, Shahbaz Pervez:
A Trust Model with Fitness-Based Clustering Scheme in FANETs. 978-985 - Wenting Song, K. Suzanne Barber:
TWCF: Trust Weighted Collaborative Filtering based on Quantitative Modeling of Trust. 986-993 - Niklas Bunzel, Gerrit Klause:
Analyzing the Effectiveness of Image Preprocessing Defenses Under Runtime Constraints. 994-999 - Xutao Meng, Qingming Li, Yong Li, Li Zhou, Xiaoran Yan:
FedSGProx: Mitigating Data Heterogeneity and Isolated Nodes in Graph Federated Learning. 1000-1006 - Zheng Feng, Chunyu Xing, Chen Liang:
Designing Secret Embedding Scheme Based on Bitcoin Transactions Pattern Controlling. 1007-1014 - Jie Cao, Zhengxin Xu, Yunpeng Bai, Yuwei Xu, Qiao Xiang, Guang Cheng:
Perturbing Vulnerable Bytes in Packets to Generate Adversarial Samples Resisting DNN-Based Traffic Monitoring. 1015-1021 - Mingyang Li, Weina Niu, Xinglong Chen, Jiacheng Gong, Kegang Hao, Xiaosong Zhang:
Enabling Robust Android Malicious Packet Capturing and Detection via Android Kernel. 1022-1028 - Meiling Chen, Yuanyuan Yang, Sixu Guo, Jin Cao, Haitao Du, Li Su:
Signcryption based on Elliptic Curve CL-PKC for Low Earth Orbit Satellite Security Networking. 1029-1036 - Kai Zhou, Yong Xie, Xin Liu:
A Multi-hop Reasoning Framework for Cyber Threat Intelligence Knowledge Graph. 1037-1044 - Chenyu Li, Xiu Zhang, Xueping Liang, Xiaorui Gong:
LSD Attack: Exploiting Inconsistencies between Design and Implementation of Ethereum Protocols. 1045-1050 - Wenxin Jia, Zheng Yang, Zhiqiang Ma:
Lightweight Leakage-Resilient Authenticated Key Exchange for Industrial Internet of Things. 1051-1059 - Pengfei Li, Yujing Liu, Jinshu Su, Bo Yu:
ConfigKG: Identify Routing Security Issues from Configurations Based on Knowledge Graph. 1060-1069 - Yijun Wang, Ziyi Zhou, Weiqi Bai, Ruijie Zhao, Xianwen Deng:
CaptchaSAM: Segment Anything in Text-based Captchas. 1070-1076 - Guixian Xu, Wenhui Gao:
Tibetan microblogging user data analysis and topic identification. 1077-1082 - Runze Dong, Buhong Wang, Jiang Weng, Kunrui Cao, Jiwei Tian, Tianhao Cheng:
Security Enhancement of UAV Swarm Empowered Downlink Transmission with Integrated Sensing and Communication. 1083-1089 - Weiping Wang, Huijuan Wang, Yulu Hong, Chenyu Wang, Hong Song, Shigeng Zhang:
SimLog: System Log Anomaly Detection Method Based on Simhash. 1090-1096 - Zekai Song, Yunpeng Li, Jian Qin, Changzhi Zhao, Dongxu Han, Yuling Liu:
FREDet: Fine-Grained Malicious Traffic Detection Based on Frequency Domain Features. 1097-1104 - Qiulong Yu, Zhiqiang Wang, Lei Ju, Sicheng Yuan, Ying Zhang:
Android Malware Detection Technology Based on SC-ViT and Multi-Feature Fusion. 1105-1114 - Shuang Duan, Hui Shu, Zihan Sha, Yuyao Huang:
SBCM: Semantic-Driven Reverse Engineering Framework for Binary Code Modularization. 1115-1124 - Chengqi Hou, Wei Yang, Yu Wang, Zhiming Zhang, Shaolong Chen, Beibei Li:
A Multi-Blockchain Based Anonymous Cross-Domain Authentication Scheme for Industrial Internet of Things. 1125-1134 - Dahai Yu, Jianming Cui, Yungang Jia, Peiguo Fu, Ming Liu:
Deep Learning-Based DDoS Attack Detection Using Adversarial Optimization. 1135-1140 - Yifan Yu, Ruoyan Lin, Shuang Li, Qinsheng Hou, Peng Tang, Wenrui Diao:
Security Assessment of Customizations in Android Smartwatch Firmware. 1141-1148 - Zhihuan Yang, Wenlong Tian, Emma Zhang, Zhiyong Xu:
Sec-Reduce: Secure Reduction of Redundant and Similar Data for Cloud Storage based on Zero-Knowledge Proof. 1149-1154 - Qian Yang, Chen Wang, Jian Shen, Yi Li, Dengzhi Liu:
Private Data Aggregation Enabling Verifiable Multisubset Dynamic Billing in Smart Grids. 1155-1160 - Rui Li, Wenrui Diao, Debin Gao:
Custom Permission Misconfigurations in Android: A Large-Scale Security Analysis. 1161-1170 - Dongbin Chen, Yunchuan Guo, Xiao Wang, Fenghua Li, Zifu Li:
Orchestrating Security Protection Resource for Space-Ground Integrated Networks. 1171-1178 - Liquan Chen, Yufan Song, Wanting Ma, Tianyu Lu, Peng Zhang:
Phase Shift Matrix Optimization and Channel Quantization Alternating in RIS-Assisted Physical Layer Key Generation. 1179-1186 - Juncheng Lu, Yiyang Zhao, Yan Wang, Jiyuan Cui, Sanfeng Zhang:
BWG: An IOC Identification Method for Imbalanced Threat Intelligence Datasets. 1187-1194 - Wenlong Liu, Bin Wen, Mengshuai Ma, Wanrong Du:
Network Traffic Anomaly Detection Method Based on CTA-BiLSTM. 1195-1200 - Huiying Zou, Jia Duan, Xi Liu, Wei Ren, Tao Li, Xianghan Zheng, Kim-Kwang Raymond Choo:
Decentralized and Lightweight Cross-Chain Transaction Scheme Based on Proxy Re-signature. 1201-1208 - Guangming Gao, Shuitao Gan, Xiaofeng Wang, Shengkai Zhu:
LLMUZZ: LLM-based seed optimization for black-box device fuzzing. 1209-1216 - Indu Chandran, Mukesh Narayana Gadde, Kizheppatt Vipin:
FCSec: An Open-source Testbed for Security Evaluation on UAV Communications. 1217-1224 - Quan Hong, Yang Yu, Lvyang Zhang, Lidong Zhai:
Active Defense Research: A New Perspective Integrating Traps and Vulnerabilities. 1225-1230 - Jiashun Hao, Young-Woo Kwon:
Enhancing Graph-Based Vulnerability Detection through Standardized Deep Learning Pipelines. 1231-1238 - Haonan Zhai, Ruiqi Liang, Zhenzhen Li, Zhen Li, Wei Xia, Bingxu Wang, Qingya Yang:
OSN Bots Traffic Transformer : MAE-Based Multimodal Social Bots Behavior Pattern Mining. 1239-1246 - Jiahao Zhang, Yuejun Liu, Jingdian Ming, Yiwen Gao, Yongbin Zhou, Debao Wang:
Enhancing Higher-Order Masking: A Faster and Secure Implementation to Mitigate Bit Interaction Leakage. 1247-1254 - Yuming Liu, Wei Cheng, Jihao Fan, Yongbin Zhou:
Towards Securing ASCON Implementation by Inner Product Masking. 1255-1260 - Pengcheng Xia, Jingyu Wu, Yiyang Ni, Jun Li:
A Novel zk-SNARKs Method for Cross-chain Transactions in Multi-chain System. 1261-1267 - Bin Li, Li Cheng, Zhongshan Zhang, Yu Pan, Feng Yao, Renjie He:
LAPAID: A Lightweight, Adaptive and Perspicacious Active Intrusion Detection Method on Network Traffic Streams. 1268-1275 - Youbin Kim, Man-Ki Yoon:
WhisperMQTT: Lightweight Secure Communication Scheme for Subscription-Heavy MQTT Network. 1276-1285 - Zhijun Wu, Shanhe Niu, Meng Yue:
A Reliable Encrypted Traffic Classification Method Based on Attention Mechanisms. 1286-1295 - Yixin Zhang, Fuqiang Du, Xinge Chi, Zhiqiang Lv:
USB Catcher: Detection of Controlled Emissions via Conducted Compromising Emanations. 1296-1303 - Vince Noort, Nhien-An Le-Khac, Hong-Hanh Nguyen-Le:
Improving Security in Internet of Medical Things through Hierarchical Cyberattacks Classification. 1304-1309 - Ahmed Mohamed Hussain, Panos Papadimitratos:
Privacy-Preserving Secure Neighbor Discovery for Wireless Networks. 1310-1319 - Yaobing Xu, Yunchuan Guo, Wenlong Kou, Junhai Yang, Ziyan Zhou, Fenghua Li:
D3IR: Securing Multi-Domain Networks via Extending Depth-in-Defense Strategies Across Nested Management Domains. 1320-1325 - Tingyu Wang, Qiang Cao, Shihong Zou, Yueming Lu:
BGAS: Blockchain and Group Decentralized Identifiers Assisted Authentication Scheme for UAV Networks. 1326-1335 - Jiayi Li, Ke Xu, Xinghao Jiang, Tanfeng Sun:
Sparse Silhouette Jump: Adversarial Attack Targeted at Binary Image for Gait Privacy Protection. 1336-1342 - Xingxing Xiong, Shubo Liu, Xiping Liu, Xiaoguang Niu, Wenyu You:
Real-time Private Data Aggregation over Distributed Spatial-temporal Infinite Streams with Local Differential Privacy. 1343-1352 - Samuel Pélissier, Gianluca Anselmi, Abhishek Kumar Mishra, Anna Maria Mandalari, Mathieu Cunche:
Enhancing IoT Privacy: Why DNS-over-HTTPS Alone Falls Short? 1353-1360 - Zhichao Wang, Qi Feng, Min Luo, Xiaolin Yang, Zizhong Wei:
Efficient FSS-based Private Statistics for Traffic Monitoring. 1361-1370 - Shengzhe Meng, Xiaodong Wang, Zijie Lu, Bei Liang:
Efficient and Practical Multi-party Private Set Intersection Cardinality Protocol. 1371-1380 - Yudan Cheng, Tao Feng, Zhiquan Liu, Xian Guo, Lulu Han, Jianfeng Ma:
An Efficient and Privacy-Preserving Participant Selection Scheme based on Location in Mobile Crowdsensing. 1381-1388 - Yinghao Song, Long Yan, Yang Li, Mingjian Ni, Shengzhong Tan, Dazhong Li, Huiting Zhao, Yulun Song:
NAGG: Noised graph node feature aggregations for preserving privacy. 1389-1396 - Haocheng Li, Haipeng Qu, Gaozhou Wang, Xiangjian Ge:
EffiTaint: Boosting Sensitive Data Tracking with Accurate Taint Behavior Modeling and Efficient Access Path Optimization. 1397-1404 - Yin Liu:
A Quiet Place: An In-Depth Study of Mobile Public-to-Private Attacks. 1405-1412 - Zhao Zhang, Chunxiang Xu, Man Ho Allen Au:
Single-sign-on Authentication with Anonymous Token and Restricted Covert Channel. 1413-1422 - Yue Quan, Kai Fan, Haoyang Wang, Hui Li, Yintang Yang:
DMASP: Dynamic Multi-keyword Searchable Encryption for Protected Access and Search Patterns with Differential Privacy. 1423-1429 - Ruoding Zhang, Tao Liu, Qifeng Shi, Yan Zhang, Xiaoyi Song, Xinrui Geng:
Research on Intelligent Joint Detection Technology for Application Privacy Behavior Compliance. 1430-1437 - Kunpeng Song, Mingzhang Sun, Kui Zhou, Peng Tang, Ning Wang, Shanqing Guo:
Multi-Dimensional Data Collection Under Personalized Local Differential Privacy. 1438-1447 - Liang Wang, Li Liu, Pei Zhan, Peng Tang, Puwen Wei, Shanqing Guo:
Interactive Verifiable Local Differential Privacy Protocols for Mean Estimation. 1448-1457 - Tran Viet Xuan Phuong, Albert Baker, Philip D. Huff, Jan P. Springer, Tho Thi Ngoc Le:
CFE: Secure Filtered Words in End-to-End Encrypted Messaging System. 1458-1465 - Hongying Zheng, Hongdie Li, Di Xiao, Maolan Zhang:
Privacy-Preserving Multi-Soft Biometrics through Generative Adversarial Networks with Chaotic Encryption. 1466-1471 - Di Xiao, Zhuyan Yang, Maolan Zhang, Lvjun Chen:
Data Privacy-Preserving and Communication Efficient Federated Multilinear Compressed Learning. 1472-1479 - Tanusree Parbat, Ayantika Chatterjee:
Secure Join and Compute in Encrypted Database. 1480-1485 - Zhaoyang Wang, Yanfei Hu, Shuailou Li, Wenbo Wang, Lisong Zhang, Boyang Zhang, Yu Wen, Dan Meng:
DyCom: A Dynamic Community Partitioning Technique for System Audit Logs. 1486-1493 - Zhihuan Yang, Wenlong Tian, Ruixuan Li, Xuming Ye, Zhiyong Xu:
Who Owns the Cloud Data? Exploring a non-interactive way for secure proof of ownership. 1494-1499 - Zhenyu Xu, Xurui Ren, Yi Zhang, Guang Cheng, Hua Wu:
Peering Through the Veil: A Segment-Based Approach for VPN Encapsulated Video Title Identification. 1500-1505 - Ming Zhou, Zhijian Zheng, Peng Zhang, Sixue Lu, Yamin Xie, Zhongfeng Jin:
SecureNet-AWMI: Safeguarding Network with Optimal Feature Selection Algorithm. 1506-1511 - Raffaele Pizzolante, Arcangelo Castiglione, Francesco Palmieri:
Unlocking Insights: An Extensible Framework for Automated Metadata Extraction from Online Documents. 1512-1521 - Adam L. Hooker, Wenjian Huang, Shalini Kapali Kurumathur, Nishant Vishwamitra, Kim-Kwang Raymond Choo:
Towards Understanding and Detecting File Types in Encrypted Files for Law Enforcement Applications. 1522-1527 - Yilin Yang, Changhai Ou, Yongzhuang Wei, Wei Li, Yifan Fan, Xuan Shen:
Broader but More Efficient: Broad Learning in Power Side-channel Attacks. 1528-1533 - Zhen Liu, Changzhen Hu, Chun Shan, Junkai Yi:
BedIDS: An Effective Network Anomaly Detection Method by Fusing Behavior Evolution characteristics. 1534-1540 - Yuwen Zou, Yang Hong, Jingyi Xu, Lekun Liu, Wenjun Fan:
Leveraging Large Language Models for Challenge Solving in Capture-the-Flag. 1541-1550 - Bo Yin, Hang Chen, Binyao Xu, Mariam Suleiman Silima, Ke Gu:
Efficient and Verifiable Dynamic Skyline Queries in Blockchain Networks. 1551-1556 - Qingmei Yang, Pincan Zhao, Yuchuan Fu, F. Richard Yu:
Enhancing Security and Privacy in Connected and Autonomous Vehicles: A Post-Quantum Revocable Ring Signature Approach. 1557-1562 - Jia Liu, Wenjun Fan, Yifan Dai, Enggee Lim, Zhoujin Pan, Alexei Lisitsa:
Leveraging Semi-supervised Learning for Enhancing Anomaly-based IDS in Automotive Ethernet. 1563-1571 - Liang Hong, Xingguo Guo, Zeyar Aung, Wei Hu:
Robust Hardware Trojan Detection: Conventional Machine Learning vs. Graph Learning Approaches. 1572-1579 - Jie Zhang, Hui Wen, Lun Li, Hongsong Zhu:
UniTTP: A Unified Framework for Tactics, Techniques, and Procedures Mapping in Cyber Threats. 1580-1588 - Shuiliang Chai, Zhanhui Shi, Yanjiao Gao, Yuhao Huang, Aizhu Liu, Jie Xiao:
HTV: Measuring Circuit Vulnerability to Hardware Trojan Insertion Based on Node Co-activation Analysis. 1589-1594 - Jingsen Zhang, Shoulu Hou, Yi Gong, Tao Wang, Changyuan Lan, Xiulei Liu:
An Intelligent Affinity Strategy for Dynamic Task Scheduling in Cloud-Edge-End Collaboration. 1595-1603 - Tao Fang, Zhihao Hou, Jiahao He, Junjie Zhou, Gansen Zhao:
Hierarchical Graph Feature Extraction Based on Multi-Information Contract Graph for Enhanced Smart Contract Vulnerability Detection. 1604-1613 - Fengyuan Shi, Zhou Zhou, Jiang Guo, Renjie Li, Zhongyi Zhang, Shu Li, Qingyun Liu, Xiuguo Bao:
LightRL-AD: A Lightweight Online Reinforcement Learning Approach for Autonomous Defense against Network Attacks. 1614-1621 - Yueyue He, Wenxuan Fan, Koji Inoue:
SPDID: A Secure and Privacy-Preserving Decentralized Identity utilizing Blockchain and PUF. 1622-1631 - Xinrui Zhang, Pincan Zhao, Jason Jaskolka:
Enhancing Security and Efficiency in Vehicle-to-Sensor Authentication: A Multi-Factor Approach with Cloud Assistance. 1632-1637 - Nour Alhussien, Ahmed Aleroud:
AdvPurRec: Strengthening Network Intrusion Detection with Diffusion Model Reconstruction Against Adversarial Attacks. 1638-1646 - Tan Su, Bingbing Zhang, Chi Zhang, Lingbo Wei:
Privacy Leak Detection in LLM Interactions with a User-Centric Approach. 1647-1652 - Huanlai Xing, Xuxu Li, Jing Song, Lexi Xu, Jincheng Peng, Bowen Zhao, Li Feng:
HFI: High-Frequency Component Injection based Invisible Image Backdoor Attack. 1653-1658 - Dong Zhang, Zhiyuan Hu, Huijun Chen, Guangming Liu, YinFeng Zheng, Jinghui Lu:
From Liberty to 1984: A Methodology for Systematically Deteriorating LLM Outputs through Habituation Tendencies. 1659-1665 - Chuang Liang, Jie Huang:
Attack Data is Not Solely Paramount: A Universal Model Extraction Enhancement Method. 1666-1674 - Lening Zhang, Hui Xia:
Active Source Inference Attack Based on Label-Flipping in Federated Learning. 1675-1680 - Zhenghao Lu, Ding Ma, Lei Fan, Xiuzhen Chen, Yongshuai Duan, Jia Zhang:
A Universally Composable Key Management System Using Trusted Hardware. 1681-1686 - Ziheng Zhang, Lei Liu, Zhongmin Yan:
Achieving Trusted GPU Allocation: An Empirical Study on Efficiency Changes of Deep Learning Training Tasks. 1687-1692 - Zehao Li, Jiachun Liao, Jinhao Yu, Lei Zhang:
THEF: A Privacy-Preserving Framework for Transformer Inference leveraging HE and TEE. 1693-1700 - Xiaodong Huang, Gangliang Li, Chengfeng Chen, Shouqiang Liu:
DMPA: A Compact and Effective Pipeline for Detecting Multiple Phishing Attacks. 1701-1708 - Zilong He, Hua Zhang:
Learning Robust and Repeatable Physical Camouflage for Aerial Object Detectors. 1709-1718 - Haiyu Deng, Xiaocui Dang, Yanna Jiang, Xu Wang, Guangsheng Yu, Wei Ni, Ren Ping Liu:
FedNIFW: Non-Interfering Fragmented Watermarking for Federated Deep Neural Network. 1719-1726 - Yaling Zhang, Xiang Sun, Yichuan Wang, Dongtai Tang, Chen Zhao:
An Effective Adversarial Text Attack through a Block-Sparse Approach with Hamiltonian Insights. 1727-1732 - Feiyu Zhao, Jianguo Wei, Wenhuan Lu, Yongwei Li:
End-To-End Speaker Anonymization Based on Location-Variable Convolution and Multi-Head Self-Attention. 1733-1740 - Guanghan Li, Wenzhong Yang, Xiaodan Tian, Jiaren Peng:
DUDPA-TATD: A Lightweight Privacy-Preserving Anomaly Traffic Detection Method for Edge Computing Scenarios. 1741-1748 - Xiangxiang Wang, Hui Xia, Yingqi Zhang:
Defending Against Model Poisoning Attacks in Federated Learning via Client-guided Trust. 1749-1755 - Yang Chen, Min Wu, Min Zhang:
Abstraction-Based Training for Robust Classification Models via Image Pixelation. 1756-1761 - Xiong Yan, Kedong Yan, Chanying Huang, Dan Yin, Shan Xiao:
FusTP-FL: Enhancing Differential Federated Learning through Personalized Layers and Data Transformation. 1762-1769 - Yuliang Li, Zhonglin Hou, Hong Liu:
Large Language Model and Behaviour Tree Based Real-World Test Scenario Generation for Autonomous Vehicles. 1770-1775 - Xinlei Liu, Jichao Xie, Tao Hu, Hailong Ma, Baolin Li, Peng Yi, Zhen Zhang:
Robust purification defense for transfer attacks based on probabilistic scheduling algorithm of pre-trained models: A model difference perspective. 1776-1783 - Yiding Tang, Zhijing Yang, Yufan Peng, Hui Zhang:
Individual Fair Density-Peaks Clustering Based on Local Similar Center Graph and Similar Decision Matrix. 1784-1789 - Yilong Li, Jianyi Zhang, Ziyin Zhou, Zezheng Sun, Xu Ji, Zeping Li, Jiameng Han, Zhangchi Zhao:
D2FL: Dimensional Disaster-oriented Backdoor Attack Defense Of Federated Learning. 1790-1796 - Yaxin Cui, Hong Xu, Zhichao Xu:
Improved Rectangle and Linear Attacks on Lightweight Block Cipher WARP. 1797-1802 - Weiguo Huang, Yong Ding, Jun Li, Yujue Wang, Hai Liang, Changsong Yang:
SAMOC: Enabling Atomic Invocations for Cross-chain Crowdsourcing Testing DApps in Industrial Control Through Trusted Smart Community and Lock Mechanism. 1803-1808 - Xiangyu Meng, Xuejun Yu:
Trustworthy Analysis of Drain3-based Cold Storage Behavior in Judicial Depository Scenarios. 1809-1816 - Dong Yang, Weihai Li, Zikai Xu, Zhiling Zhang, Yiling Chen:
FCADD: Robust Watermarking Resisting JPEG Compression with Frequency Channel Attention and Distortion De-gradient. 1817-1824 - Jing Li, Tao Sun, Wenjie Zhong:
ASK-LTL Checker: A Tailored Model Checker for Linear Temporal Logic of CPN State Space. 1825-1831 - Qingmei Yang, Lijun Sun, Xiao Chen, Lingling Wang:
Sustainable and Trusted Vehicular Energy Trading Enabled by Scalable Blockchains. 1832-1837 - Yonghao Gu, Xiaoqing Zhang, Hao Xu, Tiejun Wu:
DyGCN: Dynamic Graph Convolution Network-based Anomaly Network Traffic Detection. 1838-1843 - Jinquan Nie, Lejun Ji, Yirui Jiang, Young Ma, Yuanlong Cao:
ROSE+ : A Robustness-Optimized Security Scheme Against Cascading Failures in Multipath TCP under LDDoS Attack Streams. 1844-1849 - Daniela Pinto, Ivone Amorim, Eva Maia, Isabel Praça:
A Novel Approach to Network Traffic Analysis: the HERA tool. 1850-1856 - Yu Fu, Bingcai Chen, Qian Ning, Kai Lin:
Machine Learning-Based Power Allocation Optimization Algorithm for Enhanced CR-NOMA Network. 1857-1862 - Jihoon Park, Giluk Kang, Young-Gab Kim:
A Self-Adaptive Framework for Responding to Uncertainty in Access Control Process with Deep Neural Networks. 1863-1868 - Ziyue Chen, He Kong, Shuai Ding, Quanfeng Lv, Guo Wei:
Efficient DDoS Detection and Mitigation in Cloud Data Centers Using eBPF and XDP. 1869-1874 - Xiaowei Hu, Haoning Chen, Huaifeng Bao, Wen Wang, Feng Liu, Guoqiao Zhou, Peng Yin:
A LLM-based agent for the automatic generation and generalization of IDS rules. 1875-1880 - Haojun Xia, Limin Sun, Wenliang Liu, Jingyi Xie, Zhanwei Song, Bibo Tu:
A Self-Supervised Targeted Process Anomaly Detection Method Based on the Minimum Set of Observed Events. 1881-1888 - Zheng Zhang, Rui Ma, Yuqi Zhai, Yuche Yang, Siqi Zhao, Hongming Chen:
GeMuFuzz: Integrating Generative and Mutational Fuzzing with Deep Learning. 1889-1895 - Cheng Tang, Qingfeng Wang, Guozhen Cheng, Hao Liang, Jianhua Peng, Meiyue Yang, Wenyan Liu, Ming Liu, Lei Sha:
A Cross-Site Scripting Attack Protection Framework Based on Managed Proxy. 1896-1903 - Jianhui Ming, Weiping Wang, Linlin Zhang, Yingjie Hu, Shigeng Zhang:
IoT Device Fingerprinting From Periodic Traffic Using Locality-Sensitive Hashing. 1904-1909 - Tao Leng, Junyi Liu, Zhen Yang, Chang You, Yutong Zeng, Cheng Huang:
SGCML: Detecting Hacker Community Hidden in Chat Group. 1910-1915 - Mengxuan Shi, Jinfu Chen, Saihua Cai, Ziyan Liu, Jiapeng Zhou:
DA-CPVD: Vulnerability Detection Method based on Dual Attention Composite Pooling. 1916-1921 - Wanqiu Zhou, Zheng Zhang, Yuan Yao, Jiang Wang, Jiaxin Ma, Hui Liu:
Cyber Resilience Framework for Web Server. 1922-1927 - Jacob Soper, Yue Xu, Ernest Foo, Zahra Jadidi, Kien Nguyen Thanh:
Improved Packet-Level Synthetic Network Traffic Generation. 1928-1934 - Jun Li, Yuting Zhang, Wu Zhou, Shengzhi Zhang:
Exploring Permission Control Flaws in Mini-apps. 1935-1941 - Yu Zhang, Haipeng Qu, Lingyun Ying, Linghui Wang:
Maldet: An Automated Malicious npm Package Detector Based on Behavior Characteristics and Attack Vectors. 1942-1947 - Limin Yu, Yongdong Wu, Jiao Lu, Tong Li:
An Adaptive Reputation Update Mechanism for Primary Nodes in PBFT. 1948-1953 - Yingying Wu, Jiabei Wang, Dandan Xu, Yongbin Zhou, Yang Wang:
Rabbit: Secure Encrypted Property Graph Search Scheme Supporting Data and Key Updates. 1954-1962 - Yijie Huang, Wei Ding, Mian Huang:
Malware Traffic Classification Based on Multidimensional Features Learning. 1963-1971 - Liang Wang, Zhipeng Wang, Meng Wang:
ADIoT: An Anomaly Detection Model for IoT Devices Based on Behavioral Feature Analysis. 1972-1977 - Yan Chang, Yaqin Wu, Jianwu Rui, Ming Cao, Yawei Yue, Yu Feng, Tingting He, Haihui Gao, Zhen Lv:
Detection of Sensitive Information Based on Transient Data in Store Buffer and Cache. 1978-1982 - Chenghan Zhang, Yan Liu, Daofu Gong, Ling Wang:
Unsupervised Evaluation Method of Relative Coordination Degree from Group Perspective. 1983-1988 - Zejun Lan, Jianfeng Guan, Xianming Gao, Tao Feng, Kexian Liu, Jianbang Chen:
DTAME: A Interpretable and Efficient Approach for ABAC Policy Mining and Evaluation Using Decision Trees. 1989-1997 - Bing Xia, Chongjun Tang, Wenbo Liu, Shihao Chu, Yu Dong:
A Vulnerability Detection Method for Intermediate Code Based on a Relational Dependency Graph. 1998-2003 - Zhuoqun Xia, Yongbin Yu, Jingjing Tan, Kejun Long:
SSC-IDS: A Robust In-vehicle Intrusion Detection System Based on Self-Supervised Contrastive Learning. 2004-2009 - Neda Baghalizadeh-Moghadam, Christopher Neal, Frédéric Cuppens, Nora Boulahia-Cuppens:
NLP and Neural Networks for Insider Threat Detection. 2010-2018 - Xin Zhang, Chao Guo, Buxin Guo:
Two-Stage Federated Learning Strategy for Fairness and Security in Vehicular Networks. 2019-2024 - Xinyu Huang, Xingxing Liao, Jie Yang, Wei You, Wenhao Wu, Shiru Min, Xinsheng Ji:
5G-PPDE: A Novel Adaptive Scaling Framework for Enhancing the Resilience of the 5G Cloud Core Network. 2025-2030 - Joseph Gear, Yue Xu, Ernest Foo, Praveen Gauravaram, Zahra Jadidi, Leonie Simpson:
Contextual Transformer-based Node Embedding for Vulnerability Detection using Graph Learning. 2031-2038 - Wangyuan Jing, Chi Zhang, Bingbing Zhang, Lingbo Wei:
CVALLM: A Cloud Platform Security Assessment Framework Based on Large Language Models. 2039-2044 - Yu Zhao, Yangguang Tian, Chunbo Wang, Xiaoqiang Di, Hui Qi:
Smart Contract-Based Auditing of Edge Data for Vehicular Networks. 2045-2050 - Ruizhe Zhang, Shangnan Yin, Jinfu Chen:
FD-WF: A Multi-tab Website Fingerprinting Attack Based on Fixed Dimensions for Tor Network. 2051-2059 - Naila Azam, Alex Chak, Anna Lito Michala, Shuja Ansari, Nguyen Binh Truong:
Modelling GDPR-compliance based on Defeasible Logic Reasoning: Insights from Time Complexity Perspective*. 2060-2067 - Chaohe Lu, Zhongyuan Yu, Guijuan Wang, Anming Dong, Xiang Tian:
A Blockchain-based PHR Sharing Scheme with Attribute Privacy Protection. 2068-2077 - Chunpeng Guo, Beiyuan Liu, Zeyang Sun, Chen Chen, Sai Xu:
Secure Microwave QR Code Communication Using Pseudo-Random Constellation Rotation. 2078-2083 - Xiaofei Hao, Liyuan Liu, Yimeng Wang, Fengyu Li, Wanqing Wu:
Federated Knowledge-enhanced Graph Attention Network for Privacy-preserving Social Recommendation. 2084-2089 - Bosong Zhang, Qian Sun, Hai Wang, Linna Zhang, Danyang Li:
Federated Learning Greedy Aggregation Optimization for Non-Independently Identically Distributed Data. 2090-2097 - Jinlong Zheng, Jia-Nan Liu, Minhua Su, Dingcheng Li, Kai He, Xueqiao Liu:
Efficient Multi-subset Fine-grained Authorization PSI over Outsourced Encrypted Datasets. 2098-2105 - Zhiqiang Wang, Xinyue Yu, Ziqing Tian:
A Federated Learning Scheme with Adaptive Hierarchical Protection and Multiple Aggregation. 2106-2114 - Xiaocui Dang, Priyadarsi Nanda, Manoranjan Mohanty, Haiyu Deng:
A Dual Defense Design Against Data Poisoning Attacks in Deep Learning-Based Recommendation Systems. 2115-2122 - Johannes Lohmöller, Jannis Scheiber, Rafael Kramann, Klaus Wehrle, Sikander Hayat, Jan Pennekamp:
scE(match): Privacy-Preserving Cluster Matching of Single-Cell Data. 2123-2132 - Wiraj Udara Wickramaarachchi, Junwei Zhou, Dongdong Zhao, Jianwen Xiang:
Block-Feature Fusion for Privacy-Protected Iris Recognition. 2133-2141 - Ruiwei Hou, Fucai Zhou, Zongye Zhang, Jiacheng Li, Chongyang Wang:
CFB-DSSE: Efficient Secure Dynamic Searchable Encryption Scheme with Conjunctive Search for Smart Healthcare. 2142-2150 - Wenjv Hu, Yin Li:
An Efficient and Secure Anonymous Query Protocol. 2151-2158 - Sehrish Shafeeq, Mathias Fischer:
Privacy-aware data aggregation using Functional Encryption. 2159-2168 - Yuemeng Yin, Rahat Masood, Suranga Seneviratne, Aruna Seneviratne:
Evaluating Web-Based Privacy Controls: A User Study on Expectations and Preferences. 2169-2174 - Yanpeng Xiang, Tao Zhang, Jiahao Liu, Xinbo Zhang, Yu Zhang:
High-Capacity and High-Security Data Hiding in Encrypted Image Using Image Filtering and Image Blocking. 2175-2184 - Luyao Wang, Yan Liu, Xiaoyu Guo, Ziqi Long, Chunfang Yang:
Cross-platform Network User Alignment Interference Methods Based on Obfuscation Strategy. 2185-2190 - Weihao Li, Yongbing Gao, Yu Zhang, Lidong Yang, Ruiping Gao:
Research on Toxic Speech Detection Based on Large Language Models. 2191-2196 - Jianwei Liu, Wei Wan, Chun Long, Jing Li, Fan Yang, Yuhao Fu:
ZKFDT: A Fair Exchange Scheme for Data Trading Based on Efficient Zero-Knowledge Proofs. 2197-2206 - Zhongyuan Qin, Dinglian Wang, Minghua Wang:
Dynamic Differential Privacy in Hierarchical Federated Learning: A Layerwise Adaptive Framework. 2207-2212 - Shuguang Zhang, Jianli Bai, Kun Tu, Ziyue Yin, Chan Liu:
OHSS: Optimizing Homomorphic Secret Sharing to Support Fast Matrix Multiplication. 2213-2220 - Deok-Han Kim, Yujun Kim, Young-Gab Kim:
A Method for Quantitative Object De-Identification Analysis of Anonymized Video. 2221-2226 - Xingbo Wang, Yuzhu Wang, Mingwu Zhang:
Witness Encryption based on the SAT Problem*. 2227-2237 - Haoxuan Wu, Zhiqiang Wen:
Research on Adaptive Attention Dense Network Structure in Camera Source Recognition Method. 2238-2243 - Yuting Mou, Ke Xu, Xinghao Jiang, Tanfeng Sun:
Compressed Video Action Recognition Based on Neural Video Compression. 2244-2249 - Jingye Zhang, Ken Cheng, Xinli Xiong, Rongcheng Dong, Jun Huang, She Jie:
Construction of Cyber-attack Attribution Framework Based on LLM. 2250-2255 - Pooja Mishra, Paul Black, Adil Bagirov, Shaoning Pang:
Discriminating Malware Families using Partitional Clustering. 2256-2261 - Liming Lu, Zhenlin Yu, Peter Kok Keong Loh, Tuhin Isfaque Al Kaderi:
Investigating Patterns of Adversarial Techniques for Cyberattack Forensics. 2262-2268 - Hervais Simo, Michael Kreutzer:
WAPITI - A Weighted Bayesian Method for Private Information Inference on Social Ego Networks. 2269-2280 - Mengmi Tan, Jianyi Liu, Ru Zhang:
DI-GAE: A Dynamic and Resource-Efficient Attack Detection Framework with Incremental Learning and Graph Autoencoders. 2281-2286 - Yujun Kim, Deok-Han Kim, Young-Gab Kim:
Transfer Learning-Based Robust Insider Threat Detection. 2287-2292 - Yizhou Ma, Xikun Jiang, Evan W. Wu, Luis-Daniel Ibáñez, Jian Shi:
Model-based Data Markets: A Multi-Broker Game Theoretic Approach. 2293-2301 - Hao Zhou, Pengcheng Xia, Yiyang Ni, Jun Li:
DcChain: A Novel Blockchain Sharding Method Based on Dual-constraint Label Propagating. 2302-2309 - Shuming Xiong, Junfeng Zhu, Qiqi Xu:
An Intelligent Charging Service Selection Scheme Under the Cross-Area Consensus of Blockchain for the IoV. 2310-2315 - Tahrim Hossain, Sakib Hassan, Faisal Haque Bappy, Muhammad Nur Yanhaona, Sarker T. Ahmed Rumee, Moinul Islam Zaber, Tariqul Islam:
FlexiContracts: A Novel and Efficient Scheme for Upgrading Smart Contracts in Ethereum Blockchain. 2316-2321 - Haibin Zheng, Tianxin Zhang, Jinyin Chen:
Fedfair: A Debiasing Algorithm for Federated Learning Systems. 2322-2326 - Yifan Sun, Meng Song:
Differentially Private Graph Convolutional Networks with Privacy Amplification. 2327-2335 - Zeshan Pang, Shasha Guo, Xuehu Yan, Yuliang Lu:
Destruction and Reconstruction Chain: An Adaptive Adversarial Purification Framework. 2336-2341 - Chaoqin Zhang, Maoqi Sun, Guangwu Hu:
CNN-KOA-BiGRU: A high-accuracy APT detection model based on deep learning networks. 2342-2347 - Chengming Zhang, Bo Tang, Yifan Bian, Bingtao Han, Yongcheng Wang, Tao Liu:
Efficient and Secure Federated Learning via Enhanced Quantization and Encryption. 2348-2353 - Jun Guo, Minjuan Sun, Weiwei Zhang, Baoying Liu, Anwen Wang, Li Liu:
Human Action Recognition by Invisible Sensing with the Constraint of Privacy Preservation. 2354-2359 - Kedi Yang, Zhenyong Zhang, Youliang Tian:
Traceable AI-driven Avatars Using Multi-factors of Physical World and Metaverse. 2360-2367 - Yingjian Li, Yongsheng Wang, Gang Wang:
DDF-Net: A Cloud Computing Load Forecasting Method Integrating Spatiotemporal and Time-Frequency Domain Information. 2368-2375 - Haishi Huang, Jiaping Gui, Jianan Hong, Cunqing Hua:
HFL-AD: A Hierarchical Federated Learning Framework for Solving Data Contamination in DDoS Detection. 2376-2381 - Lukasz Krzywiecki, Tadeusz Kulczycki, Christian Emmanuel Nteranya, Andrzej Stos:
Detectable Mislabeling - Can Faulty AI Models be Recognized from Incomplete Memory Traces? 2382-2387 - Kewin Ignasiak, Wojciech Kowalczyk, Lukasz Krzywiecki, Mateusz Nasewicz, Hannes Salin, Marcin Zawada:
Privacy-Preserving Real-Time Gesture Recognition using Cloud-Trained Neural Networks. 2388-2393 - Jiaqi Lei, Ke Gu, Long Cai:
A Lightweight Privacy-Preserving and Verifiable Federated Learning-Based Protocol. 2394-2399 - Kuan Yan, Dmytro Matsypura, Junbin Gao:
BIG: A Practical Framework for Balancing the Conflict Between Group and Individual Fairness in Graph Neural Networks. 2400-2409 - Jie Zhang, Jiayuan Li, Haiqiang Fei, Lun Li, Hongsong Zhu:
EasyDetector: Using Linear Probe to Detect the Provenance of Large Language Models. 2410-2417 - Yaru Lv, Lijun Sun, Xiao Chen:
FMTD: Federated Learning-Based Multi-Angle Feature Fusion Framework for Abnormal Transaction Detection in Digital Currency. 2418-2423 - Lukasz Krzywiecki, Krzysztof Szymaniak, Marcin Zawada:
Privacy Preservation in Cloud-Based Distributed Learning through Data Encoding and Partitioning. 2424-2429 - Yilun Lyu, Xu Ma, Yuan Ma:
Backdoor Attacks Optimized through Genetic Algorithm-Driven Data Augmentation Combinations in Deep Neural Networks. 2430-2435 - Benyamin Tafreshian, Shengzhi Zhang:
A Defensive Framework Against Adversarial Attacks on Machine Learning-Based Network Intrusion Detection Systems. 2436-2441 - Hongke Zhang, Zheng Yan:
Design and Implementation of Data Encryption Mechanism in Fiber Channel Network. 2442-2446 - Zhou Zhou, Taotao Yu, Mohammad Shojafar, Xia Ou, Hongbing Cheng:
A Reliable Edge Server Deployment Algorithm Based on Spectral Clustering and a Deep Q-network Strategy using Multi-objective Optimization. 2447-2452 - Shengmin Xu, Jianfei Sun, Hangcheng Cao, Yulan Gao, Ziyang He, Cong Wu:
Shield-U: Safeguarding Traffic Sign Recognition Against Perturbation Attacks. 2453-2461 - Raphael Antonius Frick, Lukas Graner:
Deepfakes: A New Kind of Adversarial Attacks Against Face Recognition Systems? 2462-2467 - Luyao Wang, Xiaomin Wei, Hongtao Zhang, Lingtao Jia:
AttDet: Attitude Angles-Based UAV GNSS Spoofing Detection. 2468-2473 - Sarah Binhulayyil, Shancang Li, Neetesh Saxena:
IoT Vulnerability Detection using Featureless LLM CyBert Model. 2474-2480 - Zheng Gao, Hongping Li:
AI empowered senstive information detection and anonymisation in PDF files. 2481-2485 - Yongqiang Chen, Meiqi Liu, Jingfeng Rong, Xujie Liu, Anmin Fu, AnShun Zhou, Yuqing Zhang:
Analysis of Data Export Business Processes Based on Petri Nets. 2486-2491 - Siyu Chen, Jingfeng Rong, Zhiyuan Fu, Qiuling Yue, Anmin Fu, Xujie Liu, Anshun Zhou, Yuqing Zhang:
Research on Lifecycle-Driven Government Data Security Model and Data Grouping Technology. 2492-2497 - Meiqi Liu, Yongqiang Chen, Chaoyang Zhu, Shuang Yao, Jingfeng Rong, Xiaolong Zhao, Xijuan Si, Guang Yang, Yuqing Zhang:
A review of data security research in energy storage systems. 2498-2503 - Zhou Fang, Kai Zhang, Yigang Diao, Yixuan Song, Yanwei Sun, Jinqiao Shi:
Risk Assessment Based on Dataflow Dynamic Hypergraph for Cross-Border Data Transfer. 2504-2509 - Wei Yuan, Hongyu Sun, Mo Pang, He Wang, Gaofei Wu, Yuqing Zhang:
LogContrast: Log-based Anomaly Detection Using BERT and Contrastive Learning. 2510-2516 - Sixian Sun, Hongyu Sun, Haoxing Zhang, Yuqing Zhang:
A Study of Backdoor Attacks on Data Distillation for Text Classification Tasks. 2517-2522 - Bartlomiej Dzikowski, Lukasz Krzywiecki, Ksawery Mozdzynski, Karol Niczyj, Hannes Salin:
Distributed Data Possession - Blockchain Based Scalability. 2523-2528 - Pengfeng Zhang, Lei Li, Xin Liu, Rui Wang, Donglan Liu, Bing Su, Yuntao Wang, Yiliang Liu, Zhou Su:
Trusted and Spectrum-Efficient Crowd Computing in Massive MIMO Cellular Networks. 2529-2534 - Mahdi Mahdavi, Navid Abapour, Zahra Ahmadian:
Trustworthy Approaches to RSA: Efficient Exploitation Strategies Based on Common Modulus. 2535-2540 - Xiayue Wang, Mingyang Li, Yuting Tao, Xuanzhe Wang, Hao Wu:
Trust Evaluation in Mobile Crowd Sensing Networks Based on Age of Trust (AoT). 2541-2546 - Qianyue Fan, Shiqian Wang, Zhe Feng, Li Di:
MT-Index: A Trustworthy Index For Multimodal Data Sharing. 2547-2552 - Sanjay Segu Nagesh, Niroshinie Fernando, Seng W. Loke, Azadeh Ghari Neiat, Pubudu N. Pathirana:
Honeybee-RS: Enhancing Trust through Lightweight Result Validation in Mobile Crowd Computing. 2553-2558 - Xinglin Lian, Yang Liu, Shanfeng Wang, Yu Zheng:
Payload Level Anomaly Network Traffic Detection via Semi-Supervised Contrastive Learning. 2559-2566 - Haipeng Du, Muyan Jiao, Jiageng Zhang, Xin Lv, Jie Zhang:
DualConvNet: Enhancing CNN Inference Efficiency Through Compressed Convolutions and Reparameterization. 2567-2574 - Gianlucca L. Zuin, Adriano Veloso:
Navigating Time's Possibilities: Plausible Counterfactual Explanations for Multivariate Time-Series Forecast through Genetic Algorithms. 2575-2582 - Zhuang Yuan, Rui Li, Fa Zhang, Kejing Xu, Liang Xu, Weizhan Zhang:
An Experimental Study on Half-Closed TCP Connections in Public Cloud Gateways. 2583-2589 - Shuaipeng Wu, Changhao Yuan, Kejiang Ye:
A Multi-Stage Spike Stream Processing and Image Reconstruction Method for Industrial Applications. 2590-2597 - Haowei Huo, Ting Lv, Ningbo Zhao, Gefan Ai, Qi He, Ying Kong, Yu Zhang, Yiwei Li, Jiangyao Wei, Chen Liu, Yuan Liu, Lichuan Ma:
Fraud Detection in Supply Chain Order Management via Kolmogorov-Arnold Networks. 2598-2605 - Mingxin Jin, Cong Wang, Shanglin Yang, Heng Wang, Ju Huang, Jun Zhao:
Multi-Scale Fuzzy Graph Convolutional Network for Hyperspectral Image Classification. 2606-2611 - Longlong Gao, Tao Xue, Long Xi:
RTM-CMD: Exploring Advanced Underground Target Detection in Coal Mines through Modified RTMDET Methodology. 2612-2618 - Steven Krudsen, Wenjuan Li:
Your Data is Leaking! An Empirical Study of User Habits during Smartphone Charging. 2619-2626 - Toru Sakon:
Anticipated Failure Determination-based Weakness Analysis with Common Weakness Enumeration. 2627-2634 - Jiaqi Han, Dan Wang, Hong Luo, Ye Zhou, Bin Song:
Hardware Latency-Aware Differential Architecture Search: Search for Latency-Friendly Architectures on Different Hardware. 2635-2643 - Min Song, Chao Li, Xiaowei Guo, Jie Liu, Huajian Zhang, Rui Xia:
Large-Scale Thermo-Hydraulic Analysis of Fuel Rod Bundles Based on YH-ACT. 2644-2652 - Yanhong Xu, Zhao Li, Ziru Zhao, Blaise Herroine Aguenoukoun, Jia Liu, Zhixian Chang, Yicheng Liu:
Machine Learning Enhanced Indoor Positioning with RIS-aided Channel Configuration and Analysis. 2653-2660 - Le Anh Duc Vu, Minh Hai Vu, Bao Ngoc Tran, Minh Tung Hoang, Duc Anh Nguyen, Minh Quan Hoang, Phi Le Nguyen:
An Automated PM2.5 Analysis and Prediction System with Encoder-Decoder Architecture and Continual Learning Mechanism. 2661-2668 - Zhenyu Lai, Yijia Xu, Jialei Zhang, Bowen Jia, Liangyan Wang, Qinglei Bu, Jie Sun, Quan Zhang:
Multi-sensor Fusion-based Cow Health Monitoring IoT System. 2669-2674 - Siyuan Wang, Shuchen Liu, Zheng Jin, Zheng Yan, Tao Chen, Qinglei Bu, Zhiqiang Wang, Jintao Liu, Jie Sun:
A Digital Traditional Chinese Medicine Splint for Treatment of Distal Radius Fracture. 2675-2679 - Bingxin Zhang, Kang Zheng, Chao Tong, Kun Yang, Kang Yan:
Deep Reinforcement Learning for Active RIS-Assisted Full-Duplex Integrated Sensing and Communication Systems. 2680-2685 - Yan Liang, Xin Dong, Song Chen, Zhengda Li, Zhimin Chang:
A corrected method for parameters in the signal propagation model. 2686-2693 - Le Tian, ChangShen Ou, WeiLin Huang:
Research on Energy Management Strategy of Microgrid Based on Improved Deep Q network Algorithm. 2694-2700 - Tianang Chen, Haojie Qin, Jin Qian, Jun Luo, Yinghua Jiang, Liquan Chen:
A cross-domain authentication scheme based on quantized trust relationship for smart grid. 2701-2708 - Xin Liu, Rui Wang, Pengfeng Zhang, Liang Xie, Yiliang Liu, Zhou Su, Donglan Liu, Yingxian Chang:
Long-Term Privacy-Preserving Incentive Scheme Design for Federated Learning. 2709-2714 - Chen Jin, Xi Chen, Junyu Pu, Boyu Fan:
Research on distributed machine learning defence strategies under Byzantine attacks. 2715-2721

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.