


default search action
IEEE Transactions on Dependable and Secure Computing, Volume 21
Volume 21, Number 1, January - February 2024
- Yi-Fan Li
, Yang Gao
, Gbadebo Ayoade, Latifur Khan
, Anoop Singhal
, Bhavani Thuraisingham:
Heterogeneous Domain Adaptation for Multistream Classification on Cyber Threat Data. 1-11 - Xugui Zhou
, Bulbul Ahmed, James H. Aylor, Philip Asare, Homa Alemzadeh
:
Hybrid Knowledge and Data Driven Synthesis of Runtime Monitors for Cyber-Physical Systems. 12-30 - Peng Cheng
, Yuexin Wu, Yuan Hong
, Zhongjie Ba
, Feng Lin
, Li Lu
, Kui Ren
:
UniAP: Protecting Speech Privacy With Non-Targeted Universal Adversarial Perturbations. 31-46 - Shlomi Dolev
, Bingyong Guo, Jianyu Niu
, Ziyu Wang
:
SodsBC: A Post-Quantum by Design Asynchronous Blockchain Framework. 47-62 - Lin Mei
, Chungen Xu
, Lei Xu
, Xingliang Yuan
, Joseph K. Liu
:
Practical Multi-Source Multi-Client Searchable Encryption With Forward Privacy: Refined Security Notion and New Constructions. 63-77 - Moslem Didehban
, Hwisoo So
, Prudhvi Gali, Aviral Shrivastava
, Kyoungwoo Lee
:
Generic Soft Error Data and Control Flow Error Detection by Instruction Duplication. 78-92 - Ziqin Liu, Zhenpeng Lin, Yueqi Chen, Yuhang Wu, Yalong Zou, Dongliang Mu
, Xinyu Xing:
Towards Unveiling Exploitation Potential With Multiple Error Behaviors for Kernel Bugs. 93-109 - Gao Liu, Zheng Yan
, Dongliang Wang
, Haiguang Wang, Tieyan Li
:
DePTVM: Decentralized Pseudonym and Trust Value Management for Integrated Networks. 110-124 - Ruixuan Li
, Zhenyong Zhang, Jun Shao
, Rongxing Lu
, Xiaoqi Jia, Guiyi Wei
:
The Potential Harm of Email Delivery: Investigating the HTTPS Configurations of Webmail Services. 125-138 - Tianyu Yang
, Hanzhou Wu
, Biao Yi
, Guorui Feng
, Xinpeng Zhang
:
Semantic-Preserving Linguistic Steganography by Pivot Translation and Semantic-Aware Bins Coding. 139-152 - Haonan Yan
, Xiaoguang Li
, Wenjing Zhang
, Rui Wang, Hui Li, Xingwen Zhao, Fenghua Li, Xiaodong Lin
:
Automatic Evasion of Machine Learning-Based Network Intrusion Detection Systems. 153-167 - Yuwei Li
, Yuan Chen
, Shouling Ji
, Xuhong Zhang
, Guanglu Yan, Alex X. Liu, Chunming Wu
, Zulie Pan
, Peng Lin:
G-Fuzz: A Directed Fuzzing Framework for gVisor. 168-185 - Xabier Sáez de Cámara
, Jose Luis Flores
, Cristóbal Arellano
, Aitor Urbieta
, Urko Zurutuza
:
Gotham Testbed: A Reproducible IoT Testbed for Security Experiments and Dataset Generation. 186-203 - Hongyang Yan
, Anli Yan
, Li Hu
, Jiaming Liang, Haibo Hu
:
MTL-Leak: Privacy Risk Assessment in Multi-Task Learning. 204-215 - Kaushik Madala
, Hyunsook Do
, Bastian Tenbergen
:
ADSA - Association-Driven Safety Analysis to Expose Unknown Safety Issues. 216-228 - Benyuan Yang
, Hesuan Hu
:
Delegation Security Analysis in Workflow Systems. 229-240 - Ke Huang
, Yi Mu
, Fatemeh Rezaeibagha
, Xiaosong Zhang
, Xiong Li
, Sheng Cao
:
Monero With Multi-Grained Redaction. 241-253 - Jie Wang
, Kun Sun
, Lingguang Lei
, Yuewu Wang
, Jiwu Jing
, Shengye Wan
, Qi Li
:
CacheIEE: Cache-Assisted Isolated Execution Environment on ARM Multi-Core Platforms. 254-269 - Liqiang Wu
, Shaojing Fu
, Yuchuan Luo
, Hongyang Yan
, Heyuan Shi
, Ming Xu:
A Robust and Lightweight Privacy-Preserving Data Aggregation Scheme for Smart Grid. 270-283 - Alberto Huertas Celdrán
, Pedro Miguel Sánchez Sánchez
, Gérôme Bovet
, Gregorio Martínez Pérez
, Burkhard Stiller
:
CyberSpec: Behavioral Fingerprinting for Intelligent Attacks Detection on Crowdsensing Spectrum Sensors. 284-297 - Urvashi Bansal
, Geeta Sikka
, Lalit Kumar Awasthi
, Bharat K. Bhargava
:
Quantitative Evaluation of Extensive Vulnerability Set Using Cost Benefit Analysis. 298-308 - Hongliang Liang
, Xiangyu Li, Da Xiao
, Jie Liu, Yanjie Zhou, Aibo Wang, Jin Li:
Generative Pre-Trained Transformer-Based Reinforcement Learning for Testing Web Application Firewalls. 309-324 - Hongliang Liang
, Xinglin Yu
, Xianglin Cheng, Jie Liu, Jin Li:
Multiple Targets Directed Greybox Fuzzing. 325-339 - Sheng Li
, Zichi Wang
, Xiudong Zhang, Xinpeng Zhang
:
Robust Image Steganography Against General Downsampling Operations With Lossless Secret Recovery. 340-352 - Cheng Huang
, Dongxiao Liu
, Anjia Yang
, Rongxing Lu
, Xuemin Shen
:
Multi-Client Secure and Efficient DPF-Based Keyword Search for Cloud Storage. 353-371 - Yijie Shen
, Feng Lin
, Chao Wang
, Tiantian Liu
, Zhongjie Ba
, Li Lu
, Wenyao Xu
, Kui Ren
:
MotoPrint: Reconfigurable Vibration Motor Fingerprint via Homologous Signals Learning. 372-387 - Jianping Cai
, Ximeng Liu
, Jiayin Li
, Kim-Kwang Raymond Choo
:
Differentially Private Non-Negative Consistent Release for Large-Scale Hierarchical Trees. 388-402 - Ziyue Pan
, Wenbo Shen
, Xingkai Wang, Yutian Yang
, Rui Chang
, Yao Liu
, Chengwei Liu
, Yang Liu
, Kui Ren
:
Ambush From All Sides: Understanding Security Threats in Open-Source Software CI/CD Pipelines. 403-418 - Meng Luo
, Bo Feng
, Long Lu, Engin Kirda, Kui Ren
:
On the Complexity of the Web's PKI: Evaluating Certificate Validation of Mobile Browsers. 419-433 - Roberto De Prisco
, Alfredo De Santis
, Francesco Palmieri
:
Bounds and Protocols for Graph-Based Distributed Secret Sharing. 434-448 - Jianwei Liu
, Yinghui He
, Chaowei Xiao
, Jinsong Han
, Kui Ren
:
Time to Think the Security of WiFi-Based Behavior Recognition Systems. 449-462 - Runnan Zhang
, Gang Liu
, Hongzhaoning Kang
, Quan Wang
, Bo Wan
, Nan Luo
:
Anonymity in Attribute-Based Access Control: Framework and Metric. 463-475 - Yi Zhang
, Xiaofeng Jia
, Bianjing Pan
, Jun Shao
, Liming Fang
, Rongxing Lu
, Guiyi Wei
:
Anonymous Multi-Hop Payment for Payment Channel Networks. 476-485 - Alireza Sarmadi
, Hao Fu
, Prashanth Krishnamurthy
, Siddharth Garg
, Farshad Khorrami
:
Privacy-Preserving Collaborative Learning Through Feature Extraction. 486-498 - Fucai Luo
, Haiyan Wang
, Xingfu Yan
:
Comments on "VERSA: Verifiable Secure Aggregation for Cross-Device Federated Learning". 499-500
Volume 21, Number 2, March - April 2024
- Jianwei Liu
, Xiang Zou
, Leqi Zhao
, Yusheng Tao, Sideng Hu
, Jinsong Han
, Kui Ren:
Privacy Leakage in Wireless Charging. 501-514 - Yinxing Xue
, Jiaming Ye
, Wei Zhang, Jun Sun
, Lei Ma, Haijun Wang, Jianjun Zhao
:
xFuzz: Machine Learning Guided Cross-Contract Fuzzing. 515-529 - Qian Li
, Chao Shen
, Qingyuan Hu, Chenhao Lin
, Xiang Ji, Saiyu Qi
:
Towards Gradient-Based Saliency Consensus Training for Adversarial Robustness. 530-541 - Xiao Cheng
, Xu Nie
, Ningke Li
, Haoyu Wang, Zheng Zheng
, Yulei Sui:
How About Bug-Triggering Paths? - Understanding and Characterizing Learning-Based Vulnerability Detectors. 542-558 - Wenbo Jiang
, Tianwei Zhang
, Han Qiu
, Hongwei Li
, Guowen Xu
:
Incremental Learning, Incremental Backdoor Threats. 559-572 - Pedro Miguel Sánchez Sánchez
, Alberto Huertas Celdrán
, Timo Schenk, Adrian Lars Benjamin Iten, Gérôme Bovet
, Gregorio Martínez Pérez
, Burkhard Stiller
:
Studying the Robustness of Anti-Adversarial Federated Learning Models Detecting Cyberattacks in IoT Spectrum Sensors. 573-584 - Qun Song
, Rui Tan
, Chao Ren
, Yan Xu
, Yang Lou
, Jianping Wang
, Hoay Beng Gooi
:
On Credibility of Adversarial Examples Against Learning-Based Grid Voltage Stability Assessment. 585-599 - Ge Ren
, Jun Wu
, Gaolei Li
, Shenghong Li
, Mohsen Guizani
:
Protecting Intellectual Property With Reliable Availability of Learning Models in AI-Based Cybersecurity Services. 600-617 - Prithwiraj Roy, Shameek Bhattacharjee
, Sahar Abedzadeh
, Sajal K. Das
:
Noise Resilient Learning for Attack Detection in Smart Grid PMU Infrastructure. 618-635 - Han Fang
, Yupeng Qiu
, Guorui Qin, Jiyi Zhang, Kejiang Chen
, Weiming Zhang
, Ee-Chien Chang
:
DP2Dataset Protection by Data Poisoning. 636-649 - Ping Wang
, Haichang Gao
, Xiaoyan Guo
, Zhongni Yuan
, Jiawei Nian
:
Improving the Security of Audio CAPTCHAs With Adversarial Examples. 650-667 - Wenhan Xu
, Hui Ma
, Zishuai Song
, Jianhao Li
, Rui Zhang
:
Gringotts: An Encrypted Version Control System With Less Trust on Servers. 668-684 - Wenbo Jiang
, Hongwei Li
, Guowen Xu
, Tianwei Zhang
, Rongxing Lu
:
A Comprehensive Defense Framework Against Model Extraction Attacks. 685-700 - Shahid Khan
, Joost-Pieter Katoen
, Marc Bouissou
:
A Compositional Semantics of Boolean-Logic Driven Markov Processes. 701-716 - Di Zhang
, Junqing Le
, Xinyu Lei
, Tao Xiang
, Xiaofeng Liao
:
Secure Redactable Blockchain With Dynamic Support. 717-731 - Insup Lee
, Wonjun Lee
:
UniQGAN: Towards Improved Modulation Classification With Adversarial Robustness Using Scalable Generator Design. 732-745 - Cheng Guo
, Wenfeng Li
, Xinyu Tang
, Kim-Kwang Raymond Choo
, Yining Liu
:
Forward Private Verifiable Dynamic Searchable Symmetric Encryption With Efficient Conjunctive Query. 746-763 - Linqing Gui
, Weihao Zhou
, Pinchang Zhang
, Fu Xiao
:
Cooperative Jamming-Aided Secure Communication in Wireless Powered Sensor Networks. 764-774 - Zijian Zhang
, Xuyang Liu
, Meng Li
, Hao Yin
, Liehuang Zhu
, Bakh Khoussainov
, Keke Gai
:
HCA: Hashchain-Based Consensus Acceleration Via Re-Voting. 775-788 - Yifeng Zheng
, Menglun Zhou
, Songlei Wang
, Hejiao Huang
, Xiaohua Jia
, Xun Yi
, Cong Wang
:
SecDR: Enabling Secure, Efficient, and Accurate Data Recovery for Mobile Crowdsensing. 789-803 - Roberto Pietrantuono
, Massimo Ficco
, Francesco Palmieri
:
Testing the Resilience of MEC-Based IoT Applications Against Resource Exhaustion Attacks. 804-818 - Jayson Sia
, Edmond A. Jonckheere
, Laith Shalalfeh
, Paul Bogdan
:
Phasor Measurement Unit Change-Point Detection of Frequency Hurst Exponent Anomaly With Time-to-Event. 819-827 - Cavit Özbay
, Albert Levi
:
Blacklisting Based Anonymous Authentication Scheme for Sharing Economy. 828-846 - Xiao Han
, Yuncong Yang
, Leye Wang
, Junjie Wu
:
Privacy-Preserving Network Embedding Against Private Link Inference Attacks. 847-859 - Dan Zhu
, Hui Zhu
, Cheng Huang
, Rongxing Lu
, Dengguo Feng, Xuemin Shen
:
Efficient and Accurate Cloud-Assisted Medical Pre-Diagnosis With Privacy Preservation. 860-875 - Jungang Yang
, Liyao Xiang
, Pengzhi Chu
, Xinbing Wang
, Chenghu Zhou
:
Certified Distributional Robustness on Smoothed Classifiers. 876-888 - Caiqin Dong
, Jian Weng
, Ming Li
, Jia-Nan Liu
, Zhiquan Liu
, Yudan Cheng
, Shui Yu
:
Privacy-Preserving and Byzantine-Robust Federated Learning. 889-904 - Yongzhong He
, Yiming Wang
, Sencun Zhu
, Wei Wang
, Yunjia Zhang, Qiang Li
, Aimin Yu
:
Automatically Identifying CVE Affected Versions With Patches and Developer Logs. 905-919 - Deqiang Li
, Shicheng Cui
, Yun Li
, Jia Xu
, Fu Xiao
, Shouhuai Xu
:
PAD: Towards Principled Adversarial Malware Detection Against Evasion Attacks. 920-936 - Chunpeng Ge
, Zhe Liu
, Willy Susilo
, Liming Fang
, Hao Wang
:
Attribute-Based Encryption With Reliable Outsourced Decryption in Cloud Computing Using Smart Contract. 937-948 - Chunpeng Ge
, Willy Susilo
, Zhe Liu
, Joonsang Baek
, Xiapu Luo
, Liming Fang
:
Attribute-Based Proxy Re-Encryption With Direct Revocation Mechanism for Data Sharing in Clouds. 949-960 - Yaxi Yang
, Jian Weng
, Yao Tong
, Jia-Nan Liu
, Zhenghao Wu
, Leo Yu Zhang
, Anjia Yang
:
PriGenX: Privacy-Preserving Query With Anonymous Access Control for Genomic Data. 961-974 - Renato Ferrero
, Bartolomeo Montrucchio
:
Banknote Identification Through Unique Fluorescent Properties. 975-986 - Emanuele Maiorana
, Chiara Romano
, Emiliano Schena
, Carlo Massaroni
:
BIOWISH: Biometric Recognition Using Wearable Inertial Sensors Detecting Heart Activity. 987-1000
Volume 21, Number 3, May - June 2024
- Xiaochen Li
, Weiran Liu
, Hanwen Feng
, Kunzhe Huang
, Yuke Hu
, Jinfei Liu
, Kui Ren
, Zhan Qin
:
Privacy Enhancement Via Dummy Points in the Shuffle Model. 1001-1016 - Ritam Ganguly
, Shokufeh Kazemloo
, Borzoo Bonakdarpour
:
Crash-Resilient Decentralized Synchronous Runtime Verification. 1017-1031 - Xiaokuan Zhang
, Yang Zhang
, Yinqian Zhang
:
VeriTrain: Validating MLaaS Training Efforts via Anomaly Detection. 1032-1049 - Zikang Ding
, Daojing He
, Qi Qiao
, Xuru Li
, Yun Gao
, Sammy Chan
, Kim-Kwang Raymond Choo
:
A Lightweight and Secure Communication Protocol for the IoT Environment. 1050-1067 - Yunlong Xing
, Xinda Wang
, Sadegh Torabi
, Zeyu Zhang, Lingguang Lei
, Kun Sun
:
A Hybrid System Call Profiling Approach for Container Protection. 1068-1083 - Eric D. Vugrin
, Seth Hanson
, Jerry Cruz
, Casey Glatter
, Thomas D. Tarman
, Ali Pinar
:
Experimental Validation of a Command and Control Traffic Detection Model. 1084-1097 - Jian Zheng
, Huawei Huang
, Zibin Zheng
, Song Guo
:
Adaptive Double-Spending Attacks on PoW-Based Blockchains. 1098-1110 - Chunyang Lv
, Jianfeng Wang
, Shifeng Sun
, Yunling Wang
, Saiyu Qi
, Xiaofeng Chen
:
Towards Practical Multi-Client Order-Revealing Encryption: Improvement and Application. 1111-1126 - Sudip Vhaduri
, William Cheung, Sayanton V. Dibbo
:
Bag of On-Phone ANNs to Secure IoT Objects Using Wearable and Smartphone Biometrics. 1127-1138 - Yuchen Wang
, Xiaoguang Li
, Li Yang
, Jianfeng Ma
, Hui Li
:
ADDITION: Detecting Adversarial Examples With Image-Dependent Noise Reduction. 1139-1154 - Hua Ma
, Huming Qiu
, Yansong Gao
, Zhi Zhang
, Alsharif Abuadbba
, Minhui Xue
, Anmin Fu
, Jiliang Zhang
, Said F. Al-Sarawi
, Derek Abbott
:
Quantization Backdoors to Deep Learning Commercial Frameworks. 1155-1172 - Omais Shafi Pandith
:
SGXFault: An Efficient Page Fault Handling Mechanism for SGX Enclaves. 1173-1178 - Teng Li
, Ximeng Liu
, Wei Qiao
, Xiongjie Zhu
, Yulong Shen
, Jianfeng Ma
:
T-Trace: Constructing the APTs Provenance Graphs Through Multiple Syslogs Correlation. 1179-1195 - Kang Wei
, Jun Li, Ming Ding
, Chuan Ma
, Yo-Seb Jeon
, H. Vincent Poor
:
Covert Model Poisoning Against Federated Learning: Algorithm Design and Optimization. 1196-1209 - Shuaishuai Tan
, Shui Yu
, Wenyin Liu
, Daojing He
, Sammy Chan
:
You Can Glimpse but You Cannot Identify: Protect IoT Devices From Being Fingerprinted. 1210-1223 - Younho Lee
, Jinyeong Seo
, Yujin Nam
, Jiseok Chae
, Jung Hee Cheon
:
HEaaN-STAT: A Privacy-Preserving Statistical Analysis Toolkit for Large-Scale Numerical, Ordinal, and Categorical Data. 1224-1241 - Jianhong Zhang
, Chenghe Dong
:
On the Security of Lightweight and Escrow-Free Certificate-Based Data Aggregation for Smart Grid. 1242-1243 - Nikhil Tripathi
:
Delays Have Dangerous Ends: Slow HTTP/2 DoS Attacks Into the Wild and Their Real-Time Detection Using Event Sequence Analysis. 1244-1256 - Uwe Zdun
, Pierre-Jean Queval
, Georg Simhandl
, Riccardo Scandariato
, Somik Chakravarty
, Marjan Jelic
, Aleksandar S. Jovanovic
:
Detection Strategies for Microservice Security Tactics. 1257-1273 - Zhihua Tian
, Rui Zhang
, Xiaoyang Hou
, Lingjuan Lyu
, Tianyi Zhang
, Jian Liu
, Kui Ren
:
${\sf FederBoost}$: Private Federated Learning for GBDT. 1274-1285 - Xinrui Ge
, Jia Yu
, Rong Hao
:
Privacy-Preserving Graph Matching Query Supporting Quick Subgraph Extraction. 1286-1300 - Xingfu Yan
, Wing W. Y. Ng
, Bowen Zhao
, Yuxian Liu
, Ying Gao
, Xiumin Wang
:
Fog-Enabled Privacy-Preserving Multi-Task Data Aggregation for Mobile Crowdsensing. 1301-1316 - Conor Black
, Sandra Scott-Hayward
:
Defeating Data Plane Attacks With Program Obfuscation. 1317-1330 - Lichao Wu
, Yoo-Seung Won
, Dirmanto Jap
, Guilherme Perin
, Shivam Bhasin
, Stjepan Picek
:
Ablation Analysis for Multi-Device Deep Learning-Based Physical Side-Channel Analysis. 1331-1341 - Sevtap Duman
, Matthias Büchler
, Manuel Egele
, Engin Kirda
:
PellucidAttachment: Protecting Users From Attacks via E-Mail Attachments. 1342-1354 - Shantanu Sharma
, Yin Li
, Sharad Mehrotra
, Nisha Panwar
, Peeyush Gupta
, Dhrubajyoti Ghosh
:
Prism: Privacy-Preserving and Verifiable Set Computation Over Multi-Owner Secret Shared Outsourced Databases. 1355-1371 - Binbin Zhao
, Shouling Ji
, Jiacheng Xu
, Yuan Tian
, Qiuyang Wei
, Qinying Wang
, Chenyang Lyu
, Xuhong Zhang
, Changting Lin
, Jingzheng Wu
, Raheem Beyah
:
One Bad Apple Spoils the Barrel: Understanding the Security Risks Introduced by Third-Party Components in IoT Firmware. 1372-1389 - Enrico Bacis
, Sabrina De Capitani di Vimercati
, Sara Foresti
, Stefano Paraboschi
, Marco Rosa
, Pierangela Samarati
:
Mix&Slice for Efficient Access Revocation on Outsourced Data. 1390-1405 - Peng Jiang
, Jifan Xiao, Ding Li
, Hongyi Yu, Yu Bai
, Yao Guo
, Xiangqun Chen:
Detecting Malicious Websites From the Perspective of System Provenance Analysis. 1406-1423 - Tianpei Lu
, Bingsheng Zhang
, Kui Ren
:
PrivData Network: A Privacy-Preserving On-Chain Data Factory and Trading Market. 1424-1436 - Zipeng Ye
, Wenjian Luo
, Muhammad Luqman Naseem
, Xiangkai Yang, Yuhui Shi
, Yan Jia:
C2FMI: Corse-to-Fine Black-Box Model Inversion Attack. 1437-1450 - Shuai Zhou
, Tianqing Zhu
, Dayong Ye
, Xin Yu
, Wanlei Zhou
:
Boosting Model Inversion Attacks With Adversarial Examples. 1451-1468 - Heqing Huang
, Hung-Chun Chiu
, Qingkai Shi
, Peisen Yao
, Charles Zhang
:
Balance Seed Scheduling via Monte Carlo Planning. 1469-1483 - Guanxiong Ha
, Chunfu Jia
, Yixuan Huang
, Hang Chen
, Ruiqi Li
, Qiaowen Jia
:
Scalable and Popularity-Based Secure Deduplication Schemes With Fully Random Tags. 1484-1500
Volume 21, Number 4, July - August 2024
- Hui Cui
, Zhiguo Wan
, Rui Gao, Huaqun Wang
:
Outsourced Privately Verifiable Proofs of Retrievability via Blockchain. 1501-1514 - Zhao Zhang
, Chunxiang Xu
, Changsong Jiang
, Kefei Chen
:
TSAPP: Threshold Single-Sign-On Authentication Preserving Privacy. 1515-1527 - Hao Zhou
, Zhiheng Niu, Gang Wang
, Xiaoguang Liu
, Dongshi Liu
, Bingnan Kang, Zheng Hu, Yong Zhang:
Proactive Drive Failure Prediction for Cloud Storage System Through Semi-Supervised Learning. 1528-1543 - Yiwei Zhang
, Siqi Ma
, Tiancheng Chen, Juanru Li
, Robert H. Deng
, Elisa Bertino
:
EvilScreen Attack: Smart TV Hijacking via Multi-Channel Remote Control Mimicry. 1544-1556 - Fengyong Li
, Zongliang Yu
, Kui Wu
, Chuan Qin
, Xinpeng Zhang
:
Multi-Modality Ensemble Distortion for Spatial Steganography With Dynamic Cost Correction. 1557-1571 - Zhibo Wang
, Wenxin Liu
, Jiahui Hu
, Hengchang Guo
, Zhan Qin
, Jian Liu
, Kui Ren
:
Label-Free Poisoning Attack Against Deep Unsupervised Domain Adaptation. 1572-1586 - Fengqun Wang
, Jie Cui
, Qingyang Zhang
, Debiao He
, Chengjie Gu
, Hong Zhong
:
Blockchain-Based Lightweight Message Authentication for Edge-Assisted Cross-Domain Industrial Internet of Things. 1587-1604 - Xueluan Gong
, Yanjiao Chen
, Huayang Huang
, Weihan Kong
, Ziyao Wang, Chao Shen
, Qian Wang
:
KerbNet: A QoE-Aware Kernel-Based Backdoor Attack Framework. 1605-1620 - Yang Yang
, Wenyi Xue
, Yonghua Zhan
, Minming Huang
, Yingjiu Li
, Robert H. Deng
:
AnoPay: Anonymous Payment for Vehicle Parking With Updatable Credential. 1621-1638 - Mingfeng Huang
, Zhetao Li
, Fu Xiao
, Saiqin Long
, Anfeng Liu
:
Trust Mechanism-Based Multi-Tier Computing System for Service-Oriented Edge-Cloud Networks. 1639-1651 - Kun-Chang Li
, Run-Hua Shi
, Wan-Peng Guo
, Pengbo Wang
, Bo-Shen Shao
:
Dynamic Range Query Privacy-Preserving Scheme for Blockchain-Enhanced Smart Grid Based on Lattice. 1652-1664 - Alfredo De Santis
, Anna Lisa Ferrara
, Manuela Flores
, Barbara Masucci
:
Provably-Secure One-Message Unilateral Entity Authentication Schemes. 1665-1679 - Jinguang Han
, Liqun Chen, Aiqun Hu, Liquan Chen, Jiguo Li:
Privacy-Preserving Decentralized Functional Encryption for Inner Product. 1680-1694 - Dorjan Hitaj
, Giulio Pagnotta
, Briland Hitaj
, Fernando Pérez-Cruz
, Luigi V. Mancini
:
FedComm: Federated Learning as a Medium for Covert Communication. 1695-1707 - Guowen Xu
, Xingshuo Han
, Tianwei Zhang
, Shengmin Xu
, Jianting Ning
, Xinyi Huang
, Hongwei Li
, Robert H. Deng
:
SIMC 2.0: Improved Secure ML Inference Against Malicious Clients. 1708-1723 - Jia-Ju Bai
, Zi-Xuan Fu
, Kai-Tao Xie
, Zu-Ming Jiang
:
Testing Error Handling Code With Software Fault Injection and Error-Coverage-Guided Fuzzing. 1724-1739 - Meng Shen
, Changyue Li
, Hao Yu
, Qi Li
, Liehuang Zhu
, Ke Xu
:
Decision-Based Query Efficient Adversarial Attack via Adaptive Boundary Learning. 1740-1753 - Ke Li
, Cameron Baird
, Dan Lin
:
Defend Data Poisoning Attacks on Voice Authentication. 1754-1769 - Kuo-Chun Lin
, Yen-Ming Chen
:
A High-security-level Iris Cryptosystem Based on Fuzzy Commitment and Soft Reliability Extraction. 1770-1784 - Guowen Xu
, Xingshuo Han
, Gelei Deng
, Tianwei Zhang
, Shengmin Xu
, Jianting Ning
, Anjia Yang
, Hongwei Li
:
VerifyML: Obliviously Checking Model Fairness Resilient to Malicious Model Holder. 1785-1800 - Julien Gamba
, Álvaro Feal
, Eduardo Blázquez
, Vinuri Bandara
, Abbas Razaghpanah
, Juan Tapiador
, Narseo Vallina-Rodriguez
:
Mules and Permission Laundering in Android: Dissecting Custom Permissions in the Wild. 1801-1816 - Kazi Abu Zubair
, Rahaf Abdullah
, David Mohaisen
, Amro Awad
:
RC-NVM: Recovery-Aware Reliability-Security Co-Design for Non-Volatile Memories. 1817-1830 - Yandong Zheng
, Hui Zhu
, Rongxing Lu
, Yunguo Guan
, Songnian Zhang
, Fengwei Wang
, Jun Shao
, Hui Li
:
PHRkNN: Efficient and Privacy-Preserving Reverse kNN Query Over High-Dimensional Data in Cloud. 1831-1844 - Yinbin Miao
, Feng Li
, Xinghua Li
, Jianting Ning
, Hongwei Li
, Kim-Kwang Raymond Choo
, Robert H. Deng
:
Verifiable Outsourced Attribute-Based Encryption Scheme for Cloud-Assisted Mobile E-Health System. 1845-1862 - José María Jorquera Valero
, Vasileios Theodorou
, Manuel Gil Pérez
, Gregorio Martínez Pérez
:
SLA-Driven Trust and Reputation Management Framework for 5G Distributed Service Marketplaces. 1863-1875 - Jiangming Li
, Huasen He
, Shuangwu Chen
, Dong Jin
, Jian Yang
:
LogGraph: Log Event Graph Learning Aided Robust Fine-Grained Anomaly Diagnosis. 1876-1889 - Zhen Zeng
, Dijiang Huang
, Guoliang Xue
, Yuli Deng
, Neha Vadnere
, Liguang Xie
:
ILLATION: Improving Vulnerability Risk Prioritization by Learning From Network. 1890-1901 - Shimin Li
, Xin Wang
, Rui Xue
:
$\mathsf {moKHS}$moKHS: A More Lightweight Model for Multi-Client Delegatable Computation. 1902-1917 - Lei Xu
, Anxin Zhou
, Huayi Duan
, Cong Wang
, Qian Wang
, Xiaohua Jia
:
Toward Full Accounting for Leakage Exploitation and Mitigation in Dynamic Encrypted Databases. 1918-1934 - Marco Pernpruner
, Roberto Carbone
, Giada Sciarretta
, Silvio Ranise
:
An Automated Multi-Layered Methodology to Assist the Secure and Risk-Aware Design of Multi-Factor Authentication Protocols. 1935-1950 - Chen Liu
, Bo Li
, Jun Zhao
, Xudong Liu
, Chunpei Li
:
MalAF : Malware Attack Foretelling From Run-Time Behavior Graph Sequence. 1951-1966 - Youzhi Zhang
, Dongkai Chen
, Sushil Jajodia
, Andrea Pugliese
, V. S. Subrahmanian
, Yanhai Xiong
:
GAIT: A Game-Theoretic Defense Against Intellectual Property Theft. 1967-1980 - Pedro Reviriego
, Alfonso Sánchez-Macián
, Peter C. Dillinger
, Stefan Walzer
:
On the Privacy of Multi-Versioned Approximate Membership Check Filters. 1981-1993 - Qin Liu
, Yu Peng
, Qian Xu
, Hongbo Jiang
, Jie Wu
, Tian Wang
, Tao Peng
, Guojun Wang
, Shaobo Zhang
:
$\mathsf{MARS}$MARS: Enabling Verifiable Range-Aggregate Queries in Multi-Source Environments. 1994-2011 - H. O. Sai Varshith
, Shamik Sural
, Jaideep Vaidya
, Vijayalakshmi Atluri
:
Efficiently Supporting Attribute-Based Access Control in Linux. 2012-2026 - Ahmed Shafee
, Mohamed Mahmoud
, Jerry W. Bruce
, Gautam Srivastava
, Abdullah Balamsh, Abdulah Jeza Aljohani
:
False Data Detector for Electrical Vehicles Temporal-Spatial Charging Coordination Secure Against Evasion and Privacy Adversarial Attacks. 2027-2044 - Lin Yao
, Xue Wang
, Haibo Hu
, Guowei Wu
:
A Utility-Aware Anonymization Model for Multiple Sensitive Attributes Based on Association Concealment. 2045-2056 - Jun Shen
, Xiaofeng Chen
, Xinyi Huang
, Yang Xiang
:
Public Proofs of Data Replication and Retrievability With User-Friendly Replication. 2057-2067 - Wenyuan Xu
, Yushi Cheng
, Xiaoyu Ji
, Yi-Chao Chen
:
On Tracing Screen Photos - A Moiré Pattern-Based Approach. 2068-2084 - Lei Zhou
, Fengwei Zhang
, Kevin Leach
, Xuhua Ding
, Zhenyu Ning
, Guojun Wang
, Jidong Xiao
:
Hardware-Assisted Live Kernel Function Updating on Intel Platforms. 2085-2098 - Wei Li
, Borui Yang
, Hangyu Ye
, Liyao Xiang
, Qingxiao Tao
, Xinbing Wang
, Chenghu Zhou
:
MiniTracker: Large-Scale Sensitive Information Tracking in Mini Apps. 2099-2114 - Hora Saadaat Pishbin
, Amir Jalaly Bidgoly
:
Exploiting Deep Neural Networks as Covert Channels. 2115-2126 - Mordechai Guri
:
Air-Gap Electromagnetic Covert Channel. 2127-2144 - Chunqiang Hu
, Zewei Liu
, Ruinian Li
, Pengfei Hu
, Tao Xiang
, Meng Han
:
Smart Contract Assisted Privacy-Preserving Data Aggregation and Management Scheme for Smart Grid. 2145-2161 - Ahmet Kurt
, Enes Erdin
, Kemal Akkaya
, A. Selcuk Uluagac
, Mumin Cebe
:
D-LNBot: A Scalable, Cost-Free and Covert Hybrid Botnet on Bitcoin's Lightning Network. 2162-2180 - Anh-Tu Hoang
, Barbara Carminati
, Elena Ferrari
:
Protecting Privacy in Knowledge Graphs With Personalized Anonymization. 2181-2193 - Peter Kietzmann
, Thomas C. Schmidt
, Matthias Wählisch
:
PUF for the Commons: Enhancing Embedded Security on the OS Level. 2194-2210 - Yebo Feng
, Jun Li
, Devkishen Sisodia
, Peter L. Reiher
:
On Explainable and Adaptable Detection of Distributed Denial-of-Service Traffic. 2211-2226 - Shashank Arora
, Pradeep K. Atrey
:
SecureC2Edit: A Framework for Secure Collaborative and Concurrent Document Editing. 2227-2241 - Yuan Gao
, Liquan Chen
, Jinguang Han
, Shui Yu
, Huiyu Fang
:
Similarity-Based Secure Deduplication for IIoT Cloud Management System. 2242-2256 - Chenhao Lin
, Tianle Song
, Yingmao Miao
, Jingyi He
, Minghui Yang
, Huan Wang
, Chao Shen
:
ChildShield: An Implicit and Continuous Child Identification System on Smartphones. 2257-2272 - Fendy Santoso
, Anthony Finn
:
Trusted Operations of a Military Ground Robot in the Face of Man-in-the-Middle Cyberattacks Using Deep Learning Convolutional Neural Networks: Real-Time Experimental Outcomes. 2273-2284 - Jiating Ma
, Yipeng Zhou
, Laizhong Cui
, Song Guo
:
An Optimized Sparse Response Mechanism for Differentially Private Federated Learning. 2285-2295 - Yong-Feng Ge
, Hua Wang
, Elisa Bertino
, Zhi-Hui Zhan
, Jinli Cao
, Yanchun Zhang
, Jun Zhang
:
Evolutionary Dynamic Database Partitioning Optimization for Privacy and Utility. 2296-2311 - Omid Mir
, Daniel Slamanig
, René Mayrhofer
:
Threshold Delegatable Anonymous Credentials With Controlled and Fine-Grained Delegation. 2312-2326 - Ming Gao
, Fu Xiao
, Wentao Guo
, Zixin Lin
, Weiran Liu
, Jinsong Han
:
Practical EMI Attacks on Smartphones With Users' Commands Cancelled. 2327-2343 - Yongquan Fu
, Weihong Han
, Dong Yuan
:
Disentangled Orchestration on Cyber Ranges. 2344-2360 - Yinbin Miao, Ziteng Liu
, Xinghua Li
, Meng Li
, Hongwei Li
, Kim-Kwang Raymond Choo
, Robert H. Deng
:
Robust Asynchronous Federated Learning With Time-Weighted and Stale Model Aggregation. 2361-2375 - Hui Sun
, Tianqing Zhu
, Jie Li
, Shouling Ji
, Wanlei Zhou
:
Attribute-Based Membership Inference Attacks and Defenses on GANs. 2376-2393 - Jan Butora
, Pauline Puteaux
, Patrick Bas
:
Errorless Robust JPEG Steganography Using Outputs of JPEG Coders. 2394-2406 - Zhiyi Tian
, Lei Cui
, Chenhan Zhang
, Shuaishuai Tan
, Shui Yu
, Yonghong Tian
:
The Role of Class Information in Model Inversion Attacks Against Image Deep Learning Classifiers. 2407-2420 - Libo Chen
, Yanhao Wang
, Jiaqi Linghu
, Qinsheng Hou
, Quanpu Cai
, Shanqing Guo
, Zhi Xue
:
SaTC: Shared-Keyword Aware Taint Checking for Detecting Bugs in Embedded Systems. 2421-2433 - Shengyu Li
, Songfan Li
, Qingqing Liu, Yihang Song, Chong Zhang
, Li Lu
:
Watch Out Your Thumb Drive: Covert Data Theft From Portable Data Storage via Backscatter. 2434-2447 - Xiaoping Liang
, Zhenjun Tang
, Xianquan Zhang
, Mengzhu Yu
, Xinpeng Zhang
:
Robust Hashing With Local Tangent Space Alignment for Image Copy Detection. 2448-2460 - Ganapathy Mani
, Myeongsu Kim
, Bharat K. Bhargava
, Pelin Angin
, Ayça Deniz
, Vikram Pasumarti
:
Malware Speaks! Deep Learning Based Assembly Code Processing for Detecting Evasive Cryptojacking. 2461-2477 - Mohammad M. Jalalzai
, Jianyu Niu
, Chen Feng
, Fangyu Gai
:
Fast-HotStuff: A Fast and Robust BFT Protocol for Blockchains. 2478-2493 - Wei Tong
, Jiacheng Niu
, Jingyu Hua
, Qun Li
, Sheng Zhong
:
Scalable Differentially Private Model Publishing Via Private Iterative Sample Selection. 2494-2506 - Quanjun Zhang
, Chunrong Fang
, Bowen Yu
, Weisong Sun
, Tongke Zhang
, Zhenyu Chen
:
Pre-Trained Model-Based Automated Software Vulnerability Repair: How Far are We? 2507-2525 - Luca Maria Castiglione
, Emil C. Lupu
:
Which Attacks Lead to Hazards? Combining Safety and Security Analysis for Cyber-Physical Systems. 2526-2540 - Shuhua Deng
, Wenjie Dai
, Xian Qing
, Xieping Gao
:
Vulnerabilities in SDN Topology Discovery Mechanism: Novel Attacks and Countermeasures. 2541-2551 - Yuanfei Li
, Xiong Li
, Xiangyang Luo
, Zhetao Li
, Hongwei Li
, Xiaosong Zhang
:
AnotherMe: A Location Privacy Protection System Based on Online Virtual Trajectory Generation. 2552-2567 - Aoting Hu
, Zhigang Lu
, Renjie Xie
, Minhui Xue
:
${\sf VeriDIP}$VeriDIP: Verifying Ownership of Deep Neural Networks Through Privacy Leakage Fingerprints. 2568-2584 - Rui Shi
, Yang Yang
, Yingjiu Li
, Huamin Feng
, Guozhen Shi
, HweeHwa Pang
, Robert H. Deng
:
Double Issuer-Hiding Attribute-Based Credentials From Tag-Based Aggregatable Mercurial Signatures. 2585-2602 - Yizhong Liu
, Xinxin Xing
, Ziheng Tong
, Xun Lin
, Jing Chen
, Zhenyu Guan
, Qianhong Wu
, Willy Susilo
:
Secure and Scalable Cross-Domain Data Sharing in Zero-Trust Cloud-Edge-End Environment Based on Sharding Blockchain. 2603-2618 - Junren Qin
, Shanxiang Lyu
, Jiarui Deng
, Xingyuan Liang
, Shijun Xiang
, Hao Chen
:
A Lattice-Based Embedding Method for Reversible Audio Watermarking. 2619-2630 - Daniel Oliveira
, Edoardo Giusto
, Betis Baheri
, Qiang Guan
, Bartolomeo Montrucchio
, Paolo Rech
:
A Systematic Methodology to Compute the Quantum Vulnerability Factors for Quantum Circuits. 2631-2644 - Hongwei Yao
, Zheng Li, Kunzhe Huang
, Jian Lou, Zhan Qin
, Kui Ren
:
RemovalNet: DNN Fingerprint Removal Attacks. 2645-2658 - Ruben de Smet
, Kris Steenhaut
, An Braeken
:
Private Electronic Road Pricing Using Bulletproofs With Vector Commitments. 2659-2671 - Xueluan Gong
, Zheng Fang
, Bowen Li
, Tao Wang
, Yanjiao Chen
, Qian Wang
:
Palette: Physically-Realizable Backdoor Attacks Against Video Recognition Models. 2672-2685 - Dohyun Ryu
, Yerim Kim
, Junbeom Hur
:
$\gamma$γ-Knife: Extracting Neural Network Architecture Through Software-Based Power Side-Channel. 2686-2703 - Ruiqi Lu
, Guoqi Xie
, Renfa Li
, Wei Xu
, Jianmei Lei
:
TrinitySec: Trinity-Enabled and Lightweight Security Framework for CAN-FD Communication. 2704-2719 - Anxiao He
, Kai Bu
, Jiongrui Huang
, Yifei Pang
, Qianping Gu
, Kui Ren
:
SwiftParade: Anti-Burst Multipath Validation. 2720-2734 - Mahendra Rathor
, Aditya Anshul
, Anirban Sengupta
:
Securing Reusable IP Cores Using Voice Biometric Based Watermark. 2735-2749 - Yunguo Guan
, Rongxing Lu
, Songnian Zhang
, Yandong Zheng
, Jun Shao
, Guiyi Wei
:
$k$kTCQ: Achieving Privacy-Preserving $k$k-Truss Community Queries Over Outsourced Data. 2750-2765 - Chun-I Fan
, Arijit Karati
, Shou-Li Wu:
A Privacy-Aware Provably Secure Smart Card Authentication Protocol Based on Physically Unclonable Functions. 2766-2778 - Junsong Fu
, Shuai Xiong
, Na Wang
, Ruiping Ren
, Ang Zhou
, Bharat K. Bhargava
:
A Framework of High-Speed Network Protocol Fuzzing Based on Shared Memory. 2779-2798 - Momen Oqaily
, Mohammad Ekramul Kabir
, Suryadipta Majumdar
, Yosr Jarraya
, Mengyuan Zhang
, Makan Pourzandi, Lingyu Wang
, Mourad Debbabi
:
iCAT+: An Interactive Customizable Anonymization Tool Using Automated Translation Through Deep Learning. 2799-2817 - Chafika Benzaïd
, Tarik Taleb
, Ashkan Sami
, Othmane Hireche
:
FortisEDoS: A Deep Transfer Learning-Empowered Economical Denial of Sustainability Detection Framework for Cloud-Native Network Slicing. 2818-2835 - Xianhao Tian
, Peijia Zheng
, Jiwu Huang
:
Secure Deep Learning Framework for Moving Object Detection in Compressed Video. 2836-2851 - Yuan Yao
, Junjiang He
, Tao Li, Yunpeng Wang, Xiaolong Lan, Yuan Li:
An Automatic XSS Attack Vector Generation Method Based on the Improved Dueling DDQN Algorithm. 2852-2868 - Peter Rot
, Klemen Grm
, Peter Peer
, Vitomir Struc
:
PrivacyProber: Assessment and Detection of Soft-Biometric Privacy-Enhancing Techniques. 2869-2887 - Liang Xi
, Dehua Miao
, Menghan Li
, Ruidong Wang
, Han Liu
, Xunhua Huang
:
Adaptive-Correlation-Aware Unsupervised Deep Learning for Anomaly Detection in Cyber-Physical Systems. 2888-2899 - Yan Meng
, Jiachun Li
, Haojin Zhu
, Yuan Tian
, Jiming Chen
:
Privacy-Preserving Liveness Detection for Securing Smart Voice Interfaces. 2900-2916 - Haider Abbas
, Muhammad Shahzad
, Maliha Safdar
, Ahmed Hemani
:
DUDE: Decryption, Unpacking, Deobfuscation, and Endian Conversion Framework for Embedded Devices Firmware. 2917-2929 - Pasika Ranaweera
, Awaneesh Kumar Yadav
, Madhusanka Liyanage
, Anca Delia Jurcut
:
A Novel Authentication Protocol for 5G gNodeBs in Service Migration Scenarios of MEC. 2930-2948 - Kane Walter
, Meisam Mohammady
, Surya Nepal
, Salil S. Kanhere
:
Optimally Mitigating Backdoor Attacks in Federated Learning. 2949-2963 - Yang Shi
, Tianyuan Luo
, Jingwen Liang
, Man Ho Au
, Xiapu Luo
:
Obfuscating Verifiable Random Functions for Proof-of-Stake Blockchains. 2982-2996 - Hao Huang
, Patrick Wlazlo, Abhijeet Sahu
, Adele Walker, Ana E. Goulart
, Katherine R. Davis
, Laura P. Swiler
, Thomas D. Tarman
, Eric D. Vugrin
:
Validating an Emulation-Based Cybersecurity Model With a Physical Testbed. 2997-3011 - Hongsheng Hu
, Xuyun Zhang
, Zoran Salcic
, Lichao Sun
, Kim-Kwang Raymond Choo
, Gillian Dobbie
:
Source Inference Attacks: Beyond Membership Inference Attacks in Federated Learning. 3012-3029 - Tara Salman
, Ali Ghubaish
, Roberto Di Pietro
, Mohamed Baza
, Hani Alshahrani
, Raj Jain
, Kim-Kwang Raymond Choo
:
CrowdFAB: Intelligent Crowd-Forecasting Using Blockchains and its Use in Security. 3030-3047 - Chuan Yu
, Shuhui Chen
, Ziling Wei
, Fei Wang
:
Toward a Truly Secure Telecom Network: Analyzing and Exploiting Vulnerable Security Configurations/ Implementations in Commercial LTE/IMS Networks. 3048-3064 - Feng Lin
, Chao Wang
, Tiantian Liu
, Ziwei Liu
, Yijie Shen
, Zhongjie Ba
, Li Lu
, Wenyao Xu
, Kui Ren
:
High-Quality Speech Recovery Through Soundproof Protections via mmWave Sensing. 3065-3081 - Giorgos Vasiliadis
, Apostolos Karampelas, Alexandros Shevtsov
, Panagiotis Papadopoulos
, Sotiris Ioannidis, Alexandros Kapravelos
:
WRIT: Web Request Integrity and Attestation Against Malicious Browser Extensions. 3082-3095 - Pranav Jangir
, Nishat Koti
, Varsha Bhat Kukkala
, Arpita Patra
, Bhavish Raj Gopal
, Somya Sangal
:
Vogue: Faster Computation of Private Heavy Hitters. 3096-3108 - Yibiao Lu
, Bingsheng Zhang
, Kui Ren
:
Maliciously Secure MPC From Semi-Honest 2PC in the Server-Aided Model. 3109-3125 - Man Zhang
, Xinghua Li
, Yanbing Ren
, Bin Luo
, Yinbin Miao, Ximeng Liu
, Robert H. Deng
:
Privacy-Preserved Data Trading Via Verifiable Data Disturbance. 3126-3140 - Carlton Shepherd
, Jan Kalbantner
, Benjamin Semal
, Konstantinos Markantonakis
:
A Side-Channel Analysis of Sensor Multiplexing for Covert Channels and Application Profiling on Mobile Devices. 3141-3152 - Mayana Pereira
, Rahul Dodhia
, Hyrum S. Anderson
, Richard Brown
:
Metadata-Based Detection of Child Sexual Abuse Material. 3153-3164 - Zhan Shu
, Guanhua Yan
:
EAGLE: Evasion Attacks Guided by Local Explanations Against Android Malware Classification. 3165-3182 - Dola Das
, Kazi Md. Rokibul Alam
, Yasuhiko Morimoto
:
An Anonymity Retaining Framework for Multi-party Skyline Queries Based on Unique Tags. 3183-3195 - Bin Yuan
, Maogen Yang
, Zheng Xu
, Qunjinming Chen
, Zhanxiang Song
, Zhen Li
, Deqing Zou
, Hai Jin
:
Leakage of Authorization-Data in IoT Device Sharing: New Attacks and Countermeasure. 3196-3210 - Jiacheng Gao
, Yuan Zhang
, Sheng Zhong
:
Revisiting Privacy-Preserving Min and k-th Min Protocols for Mobile Sensing. 3211-3226 - Ning Lu
, Ruxiao Huang
, Mingliang Yao
, Wenbo Shi
, Kim-Kwang Raymond Choo
:
V-Digger: An Efficient and Secure Vulnerability Assessment for Large-Scale ISP Network. 3227-3246 - Yinbin Miao
, Feng Li
, Xiaohua Jia
, Huaxiong Wang
, Ximeng Liu
, Kim-Kwang Raymond Choo
, Robert H. Deng
:
REKS: Role-Based Encrypted Keyword Search With Enhanced Access Control for Outsourced Cloud Data. 3247-3261 - Rakin Muhammad Shadab
, Yu Zou
, Sanjay Gandham
, Amro Awad
, Mingjie Lin
:
A Secure Computing System With Hardware-Efficient Lazy Bonsai Merkle Tree for FPGA-Attached Embedded Memory. 3262-3279 - Yipeng Zhou
, Runze Wang
, Jiahao Liu
, Di Wu
, Shui Yu
, Yonggang Wen
:
Exploring the Practicality of Differentially Private Federated Learning: A Local Iteration Tuning Approach. 3280-3294 - Yan Jiang
, Xiaoyu Ji
, Juchuan Zhang
, Yancheng Jiang
, Shui Jiang
, Wenyuan Xu
:
CapSpeaker: Injecting Commands to Voice Assistants Via Capacitors. 3295-3308 - Yan Jiang
, Xiaoyu Ji
, Kai Wang
, Chen Yan
, Richard Mitev
, Ahmad-Reza Sadeghi
, Wenyuan Xu:
Marionette: Manipulate Your Touchscreen via a Charging Cable. 3309-3323 - Lihong Tang
, Xiao Chen
, Sheng Wen
, Li Li
, Marthie Grobler
, Yang Xiang
:
Demystifying the Evolution of Android Malware Variants. 3324-3341 - Lo-Yao Yeh
, Wan-Hsin Hsu
, Chih-Ya Shen
:
GDPR-Compliant Personal Health Record Sharing Mechanism With Redactable Blockchain and Revocable IPFS. 3342-3356 - Mohammed Alsadi
, Matthew Casey
, Constantin Catalin Dragan
, François Dupressoir
, Luke Riley
, Muntadher Sallal
, Steve Schneider
, Helen Treharne
, Joe Wadsworth, Phil Wright:
Towards End-to-End Verifiable Online Voting: Adding Verifiability to Established Voting Systems. 3357-3374 - Lingyuan Yin
, Jing Xu
, Kaitai Liang
, Zhenfeng Zhang:
Sidechains With Optimally Succinct Proof. 3375-3389 - Guodong Cao
, Zhibo Wang
, Yunhe Feng
, Xiaowei Dong
, Zhifei Zhang
, Zhan Qin
, Kui Ren
:
Task-Free Fairness-Aware Bias Mitigation for Black-Box Deployed Models. 3390-3405 - Zhuo Chen
, Lei Wu
, Yubo Hu
, Jing Cheng
, Yufeng Hu
, Yajin Zhou
, Zhushou Tang
, Yexuan Chen
, Jinku Li
, Kui Ren
:
Lifting the Grey Curtain: Analyzing the Ecosystem of Android Scam Apps. 3406-3421 - Jiahui Hou
, Dongxiao Liu
, Cheng Huang
, Weihua Zhuang
, Xuemin Shen
, Rob Sun, Bidi Ying:
Data Protection: Privacy-Preserving Data Collection With Validation. 3422-3438 - Chuan Zhang
, Mingyang Zhao
, Jinwen Liang
, Qing Fan
, Liehuang Zhu
, Song Guo
:
NANO: Cryptographic Enforcement of Readability and Editability Governance in Blockchain Databases. 3439-3452 - Tingting Yin
, Zicong Gao
, Zhenghang Xiao
, Zheyu Ma
, Min Zheng
, Chao Zhang
:
KextFuzz: A Practical Fuzzer for macOS Kernel EXTensions on Apple Silicon. 3453-3468 - Chun Liu
, Xuexian Hu
, Xiaofeng Chen
, Jianghong Wei
, Wenfen Liu
:
SDIM: A Subtly Designed Invertible Matrix for Enhanced Privacy-Preserving Outsourcing Matrix Multiplication and Related Tasks. 3469-3486 - Dawei Li
, Di Liu
, Yangkun Ren, Yu Sun
, Zhenyu Guan
, Qianhong Wu
, Jiankun Hu
, Jianwei Liu
:
CPAKA: Mutual Authentication and Key Agreement Scheme Based on Conditional PUF in Space-Air-Ground Integrated Network. 3487-3500 - Dingding Wang
, Muhui Jiang
, Rui Chang
, Yajin Zhou
, Hexiang Wang
, Baolei Hou
, Lei Wu
, Xiapu Luo
:
An Empirical Study on the Insecurity of End-of-Life (EoL) IoT Devices. 3501-3514 - Jiansong Zhang
, Kejiang Chen
, Chuan Qin
, Weiming Zhang
, Nenghai Yu
:
AAS: Automatic Virtual Data Augmentation for Deep Image Steganalysis. 3515-3527 - Tao Jiang
, Xu Yuan
, Qiong Cheng
, Yulong Shen
, Liangmin Wang
, Jianfeng Ma
:
FairECom: Towards Proof of E-Commerce Fairness Against Price Discrimination. 3528-3544 - Mingyang Song
, Zhongyun Hua
, Yifeng Zheng
, Tao Xiang
, Xiaohua Jia
:
Enabling Transparent Deduplication and Auditing for Encrypted Data in Cloud. 3545-3561 - Jämes Ménétrey
, Marcelo Pasin
, Pascal Felber
, Valerio Schiavoni
, Giovanni Mazzeo
, Arne Hollum
, Darshan Vaydia
:
A Comprehensive Trusted Runtime for WebAssembly With Intel SGX. 3562-3579 - Cheng Wang
, Hao Tang
, Hangyu Zhu
, Changjun Jiang
:
Collaborative Prediction in Anti-Fraud System Over Multiple Credit Loan Platforms. 3580-3596 - Feng Liu
, Kaiping Xue
, Jinjiang Yang
, Jing Zhang
, Zixuan Huang
, Jian Li
, David S. L. Wei
:
Volume-Hiding Range Searchable Symmetric Encryption for Large-Scale Datasets. 3597-3609 - Zheng Yang
, Chenglu Jin
, Xuelian Cao
, Marten van Dijk
, Jianying Zhou
:
Optimizing Proof of Aliveness in Cyber-Physical Systems. 3610-3628 - Minghui Min
, Haopeng Zhu
, Jiahao Ding
, Shiyin Li
, Liang Xiao
, Miao Pan
, Zhu Han
:
Personalized 3D Location Privacy Protection With Differential and Distortion Geo-Perturbation. 3629-3643 - Lunzhi Deng
, Shuai Feng
, Tao Wang
, Zhenyu Hu
, Siwei Li
:
Identity-Based Data Auditing Scheme With Provable Security in the Standard Model Suitable for Cloud Storage. 3644-3655 - Zongyang Zhang
, Weihan Li
, Ximeng Liu
, Xin Chen
, Qihang Peng
:
Ligerolight: Optimized IOP-Based Zero-Knowledge Argument for Blockchain Scalability. 3656-3670 - Liang Zhao
, Liqun Chen
:
Privacy-Preserving Transformation Used in Verifiable (Outsourced) Computation, Revisited. 3671-3687 - Ying Miao
, Keke Gai
, Liehuang Zhu
, Kim-Kwang Raymond Choo
, Jaideep Vaidya
:
Blockchain-Based Shared Data Integrity Auditing and Deduplication. 3688-3703 - Yadong Xie
, Fan Li
, Yue Wu
, Yu Wang
:
User Authentication on Earable Devices via Bone-Conducted Occlusion Sounds. 3704-3718 - Sajid Hussain
, Hui Guo
, Tuo Li
, Sri Parameswaran
:
MP-ORAM: A Novel ORAM Design for Multicore Processor Systems. 3719-3733 - Yushi Cheng
, Xiaoyu Ji
, Wenjun Zhu
, Shibo Zhang
, Kevin Fu
, Wenyuan Xu
:
Adversarial Computer Vision via Acoustic Manipulation of Camera Sensors. 3734-3750 - Guichuan Zhao
, Qi Jiang
, Ding Wang
, Xindi Ma
, Xinghua Li
:
Deep Hashing Based Cancelable Multi-Biometric Template Protection. 3751-3767 - Yutian Yang
, Jinjiang Tu, Wenbo Shen
, Songbo Zhu, Rui Chang
, Yajin Zhou
:
kCPA: Towards Sensitive Pointer Full Life Cycle Authentication for OS Kernels. 3768-3784 - Jinke Song, Qiang Li, Haining Wang, Jiqiang Liu:
PKVIC: Supplement Missing Software Package Information in Security Vulnerability Reports. 3785-3800 - Chenxu Wang
, Yunjie Deng, Zhenyu Ning
, Kevin Leach
, Jin Li
, Shoumeng Yan
, Zhengyu He
, Jiannong Cao
, Fengwei Zhang
:
Building a Lightweight Trusted Execution Environment for Arm GPUs. 3801-3816 - Yuxuan Cai, Wenxiu Ding
, Yuxuan Xiao, Zheng Yan
, Ximeng Liu
, Zhiguo Wan
:
SecFed: A Secure and Efficient Federated Learning Based on Multi-Key Homomorphic Encryption. 3817-3833 - Hazem M. Soliman
, Dusan Sovilj
, Geoff Salmon
, Mohan Rao
, Niranjan Mayya
:
RANK: AI-Assisted End-to-End Architecture for Detecting Persistent Attacks in Enterprise Networks. 3834-3850 - Silvio Ereno Quincozes
, Célio Albuquerque
, Diego G. Passos
, Daniel Mossé
:
ERENO: A Framework for Generating Realistic IEC-61850 Intrusion Detection Datasets for Smart Grids. 3851-3865 - Bo Feng
, Meng Luo
, Changming Liu
, Long Lu, Engin Kirda:
AIM: Automatic Interrupt Modeling for Dynamic Firmware Analysis. 3866-3882 - Shun Hu
, Ming Li
, Jiasi Weng
, Jia-Nan Liu
, Jian Weng
, Zhi Li
:
IvyRedaction: Enabling Atomic, Consistent and Accountable Cross-Chain Rewriting. 3883-3900 - Hao Peng
, Shixin Guo
, Dandan Zhao
, Xuhong Zhang
, Jianmin Han
, Shouling Ji
, Xing Yang
, Ming Zhong
:
TextCheater: A Query-Efficient Textual Adversarial Attack in the Hard-Label Setting. 3901-3916 - Guohua Tian
, Jianghong Wei
, Meixia Miao
, Fuchun Guo
, Willy Susilo
, Xiaofeng Chen
:
Blockchain-Based Compact Verifiable Data Streaming With Self-Auditing. 3917-3930 - Chenxin Duan
, Sainan Li
, Hai Lin
, Wenqi Chen
, Guanglei Song
, Chenglong Li
, Jiahai Yang
, Zhiliang Wang
:
IoTa: Fine-Grained Traffic Monitoring for IoT Devices via Fully Packet-Level Models. 3931-3947 - Thomas Hutzelmann
, Dominik Mauksch, Ana Petrovska
, Alexander Pretschner
:
Generation of Tailored and Confined Datasets for IDS Evaluation in Cyber-Physical Systems. 3948-3962 - Eldor Abdukhamidov
, Mohammed Abuhamad
, Simon S. Woo
, Eric Chan-Tin
, Tamer Abuhmed
:
Hardening Interpretable Deep Learning Systems: Investigating Adversarial Threats and Defenses. 3963-3976 - Jie Cui
, Yatao Li
, Qingyang Zhang
, Hong Zhong
, Chengjie Gu
, Debiao He
:
DSChain: A Blockchain System for Complete Lifecycle Security of Data in Internet of Things. 3977-3993 - Jiansong Zhang
, Kejiang Chen
, Weixiang Li
, Weiming Zhang
, Nenghai Yu
:
Steganography With Generated Images: Leveraging Volatility to Enhance Security. 3994-4005 - Fuyuan Song
, Jinwen Liang
, Chuan Zhang
, Zhangjie Fu
, Zheng Qin
, Song Guo
:
Achieving Efficient and Privacy-Preserving Location-Based Task Recommendation in Spatial Crowdsourcing. 4006-4023 - Mojtaba Rafiee
:
Multi-Adjustable Join Schemes With Adaptive Indistinguishably Security. 4024-4034 - Zhenxiao Zhang
, Yuanxiong Guo
, Yuguang Fang
, Yanmin Gong
:
Communication and Energy Efficient Wireless Federated Learning With Intrinsic Privacy. 4035-4047 - Marie Farrell
, Matthew Bradbury
, Rafael C. Cardoso
, Michael Fisher
, Louise A. Dennis
, Clare Dixon
, Al Tariq Sheik
, Hu Yuan
, Carsten Maple
:
Security-Minded Verification of Cooperative Awareness Messages. 4048-4065 - Mir Ali Rezazadeh Baee
, Leonie Simpson
, Xavier Boyen, Ernest Foo
, Josef Pieprzyk
:
A Provably Secure and Efficient Cryptographic-Key Update Protocol for Connected Vehicles. 4066-4083 - Javier Ron
, César Soto-Valero
, Long Zhang
, Benoit Baudry
, Martin Monperrus
:
Highly Available Blockchain Nodes With N-Version Design. 4084-4097 - Xiangping Kang
, Guoxian Yu
, Lanju Kong
, Carlotta Domeniconi
, Xiangliang Zhang
, Qingzhong Li
:
FedTA: Federated Worthy Task Assignment for Crowd Workers. 4098-4109 - Hong Joo Lee
, Yong Man Ro
:
Defending Video Recognition Model Against Adversarial Perturbations via Defense Patterns. 4110-4121 - Tianhang Zheng
, Baochun Li
:
CMI: Client-Targeted Membership Inference in Federated Learning. 4122-4132 - Michael Sandborn
, Zach Stoebner, Westley Weimer
, Stephanie Forrest
, Ryan E. Dougherty
, Jules White, Kevin Leach
:
Reducing Malware Analysis Overhead With Coverings. 4133-4146 - Siwei Wu
, Zhou Yu
, Dabao Wang
, Yajin Zhou
, Lei Wu
, Haoyu Wang
, Xingliang Yuan
:
DeFiRanger: Detecting DeFi Price Manipulation Attacks. 4147-4161 - Ning Lu
, Mingxi Liu
, Wenbo Shi
, Ximeng Liu
, Kim-Kwang Raymond Choo
:
SG-Audit: An Efficient and Robust Cloud Auditing Scheme for Smart Grid. 4162-4179 - Sona Alex
, Dhanaraj Kakkanattu Jagalchandran
, Deepthi P. Pattathil
:
Privacy-Preserving and Energy-Saving Random Forest-Based Disease Detection Framework for Green Internet of Things in Mobile Healthcare Networks. 4180-4192 - Zipeng Ye
, Wenjian Luo
, Ruizhuo Zhang, Hongwei Zhang, Yuhui Shi
, Yan Jia:
An Evolutionary Attack for Revealing Training Data of DNNs With Higher Feature Fidelity. 4193-4205 - Yang Wei, Zhuo Ma, Zhuoran Ma, Zhan Qin, Yang Liu, Bin Xiao, Xiuli Bi
, Jianfeng Ma:
Effectively Improving Data Diversity of Substitute Training for Data-Free Black-Box Attack. 4206-4219 - Xiaoyu Zhang
, Shen Lin
, Chao Chen
, Xiaofeng Chen
:
MODA: Model Ownership Deprivation Attack in Asynchronous Federated Learning. 4220-4235 - Yuan Xu
, Yungang Bao
, Sa Wang
, Tianwei Zhang
:
Function Interaction Risks in Robot Apps: Analysis and Policy-Based Solution. 4236-4253 - Seunghwa Lee
, Hankyung Ko
, Jihye Kim
, Hyunok Oh
:
vCNN: Verifiable Convolutional Neural Network Based on zk-SNARKs. 4254-4270 - Ziming Zhao
, Zhuotao Liu
, Huan Chen
, Fan Zhang
, Zhuoxue Song
, Zhaoxuan Li
:
Effective DDoS Mitigation via ML-Driven In-Network Traffic Shaping. 4271-4289 - Georg Pichler
, Marco Romanelli
, Leonardo Rey Vega
, Pablo Piantanida
:
Perfectly Accurate Membership Inference by a Dishonest Central Server in Federated Learning. 4290-4296 - Yanxin Xu
, Hua Zhang
, Shaohua Zhao
, Xin Zhang
, Wenmin Li
, Fei Gao
, Kaixuan Li
:
Comments on "VERSA: Verifiable Secure Aggregation for Cross-Device Federated Learning". 4297-4298 - Liang Zhao
, Jie Yu
, Yiheng Zhang
, Liqun Chen
:
On the Privacy of Elementary Matrices Masking-Based Verifiable (Outsourced) Computation. 4299-4301 - Chenghe Dong
, Jianhong Zhang
:
On the Security of Multi-Receiver Certificateless Generalized Signcryption Scheme for WBANs. 4302-4303 - Zhengjun Cao
:
Corrections to "Efficient Provably-Secure Dynamic ID-Based Authenticated Key Agreement Scheme With Enhanced Security Provision". 4304-4305 - Cong Li
, Xinyu Feng
, Qingni Shen
, Zhonghai Wu
:
On the Security of Secure Keyword Search and Data Sharing Mechanism for Cloud Computing. 4306-4308
Volume 21, Number 5, September - October 2024
- Runhua Xu
, Bo Li
, Chao Li
, James B. D. Joshi
, Shuai Ma
, Jianxin Li
:
TAPFed: Threshold Secure Aggregation for Privacy-Preserving Federated Learning. 4309-4323 - Jiahui Wu
, Weizhe Zhang
:
On the Security of Verifiable and Oblivious Secure Aggregation for Privacy-Preserving Federated Learning. 4324-4326 - Zitong Yu
, Rizhao Cai
, Zhi Li, Wenhan Yang
, Jingang Shi
, Alex C. Kot
:
Benchmarking Joint Face Spoofing and Forgery Detection With Visual and Physiological Cues. 4327-4342 - Xiao Han
, Junjie Xiong
, Wenbo Shen
, Mingkui Wei
, Shangqing Zhao
, Zhuo Lu
, Yao Liu
:
The Perils of Wi-Fi Spoofing Attack Via Geolocation API and Its Defense. 4343-4359 - Kai Wang
, Richard Mitev
, Chen Yan
, Xiaoyu Ji
, Ahmad-Reza Sadeghi
, Wenyuan Xu
:
Analyzing and Defending GhostTouch Attack Against Capacitive Touchscreens. 4360-4375 - Yuhao Xie
, Xiong Luo
, Jiankun Sun
:
Toward Enhancing Sequence-Optimized Malware Representation With Context-Separated Bi-Directional Long Short-Term Memory and Proximal Policy Optimization. 4376-4387 - Dongxia Wang
, Tim Muller
, Jun Sun
:
Provably Secure Decisions Based on Potentially Malicious Information. 4388-4403 - Haomeng Xie
, Zheng Yan
:
SPCEX: Secure and Privacy-Preserving Cryptocurrency Exchange. 4404-4417 - Jiwei Tian
, Chao Shen
, Buhong Wang
, Xiaofang Xia
, Meng Zhang
, Chenhao Lin
, Qian Li
:
LESSON: Multi-Label Adversarial False Data Injection Attack for Deep Learning Locational Detection. 4418-4432 - Jie Wang
, Zheng Yan
, Jiahe Lan
, Elisa Bertino
, Witold Pedrycz
:
TrustGuard: GNN-Based Robust and Explainable Trust Evaluation With Dynamicity Support. 4433-4450 - Kwok-Yan Lam
, Xianhui Lu
, Linru Zhang
, Xiangning Wang
, Huaxiong Wang
, Si Qi Goh
:
Efficient FHE-Based Privacy-Enhanced Neural Network for Trustworthy AI-as-a-Service. 4451-4468 - Pei Zhang, Qingfeng Cheng
, Mingliang Zhang
, Xiangyang Luo
:
A Blockchain-Based Secure Covert Communication Method via Shamir Threshold and STC Mapping. 4469-4480 - Harsh Kasyap
, Somanath Tripathy
:
Sine: Similarity is Not Enough for Mitigating Local Model Poisoning Attacks in Federated Learning. 4481-4494 - Krishna Chandra Roy
, Guenevere Chen
:
GraphCH: A Deep Framework for Assessing Cyber-Human Aspects in Insider Threat Detection. 4495-4509 - Dajiang Chen
, Zeyu Liao
, Ruidong Chen
, Hao Wang
, Chong Yu
, Kuan Zhang
, Ning Zhang
, Xuemin Shen
:
Privacy-Preserving Anomaly Detection of Encrypted Smart Contract for Blockchain-Based Data Trading. 4510-4525 - Cui Li
, Rongmao Chen
, Yi Wang
, Qianqian Xing
, Baosheng Wang
:
REEDS: An Efficient Revocable End-to-End Encrypted Message Distribution System for IoT. 4526-4542 - Anton Wahrstätter
, Alfred Taudes
, Davor Svetinovic
:
Reducing Privacy of CoinJoin Transactions: Quantitative Bitcoin Network Analysis. 4543-4558 - Jiale Zhang
, Chengcheng Zhu
, Chunpeng Ge
, Chuan Ma
, Yanchao Zhao
, Xiaobing Sun
, Bing Chen
:
BadCleaner: Defending Backdoor Attacks in Federated Learning via Attention-Based Multi-Teacher Distillation. 4559-4573 - Mengming Li
, Kai Bu
, Chenlu Miao
, Kui Ren
:
TreasureCache: Hiding Cache Evictions Against Side-Channel Attacks. 4574-4588 - Thar Baker
, Tong Li
, Jingyu Jia
, Baolei Zhang
, Chang Tan
, Albert Y. Zomaya
:
Poison-Tolerant Collaborative Filtering Against Poisoning Attacks on Recommender Systems. 4589-4599 - Zongjie Li
, Zhibo Liu
, Wai Kin Wong
, Pingchuan Ma
, Shuai Wang
:
Evaluating C/C++ Vulnerability Detectability of Query-Based Static Application Security Testing Tools. 4600-4618 - Yinbin Miao, Rongpeng Xie
, Xinghua Li
, Zhiquan Liu
, Kim-Kwang Raymond Choo
, Robert H. Deng
:
Efficient and Secure Federated Learning Against Backdoor Attacks. 4619-4636 - Dong Li
, Qingguo Lü
, Xiaofeng Liao
, Tao Xiang
, Jiahui Wu
, Junqing Le
:
AVPMIR: Adaptive Verifiable Privacy-Preserving Medical Image Retrieval. 4637-4651 - Ping Ping
, Pan Wei
, Deyin Fu
, Bobiao Guo
, Olano Teah Bloh
, Feng Xu
:
IMIH: Imperceptible Medical Image Hiding for Secure Healthcare. 4652-4667 - Zijian Zhang
, Xin Lu
, Meng Li
, Jincheng An
, Yang Yu
, Hao Yin
, Liehuang Zhu
, Yong Liu
, Jiamou Liu
, Bakh Khoussainov
:
A Blockchain-Based Privacy-Preserving Scheme for Sealed-Bid Auction. 4668-4683 - Yunlong Mao
, Ziqin Dang
, Heng Wang
, Yuan Zhang
, Sheng Zhong
:
Solution Probing Attack Against Coin Mixing Based Privacy-Preserving Crowdsourcing Platforms. 4684-4698 - Ahmed Akhtar
, Masoud Barati
, Basit Shafiq
, Omer F. Rana
, Ayesha Afzal
, Jaideep Vaidya
, Shafay Shamail
:
Blockchain Based Auditable Access Control for Business Processes With Event Driven Policies. 4699-4716 - Francesco Buccafurri
, Vincenzo De Angelis
, Sara Lazzaro
:
MQTT-I: Achieving End-to-End Data Flow Integrity in MQTT. 4717-4734 - Marco Alecci
, Jordan Samhi
, Li Li
, Tegawendé F. Bissyandé
, Jacques Klein
:
Improving Logic Bomb Identification in Android Apps via Context-Aware Anomaly Detection. 4735-4753 - Javad Rafiei Asl
, Mohammad Hossein Rafiei
, Manar Alohaly
, Daniel Takabi
:
A Semantic, Syntactic, and Context-Aware Natural Language Adversarial Example Generator. 4754-4769 - Jian Liu
, Peilun Li, Fan Zhang
, Kui Ren:
$\mathsf {monoCash}$monoCash: A Channel-Free Payment Network via Trusted Monotonic Counters. 4770-4783 - Gao Liu
, Hao Li
, Ning Wang
, Tao Xiang
, Yi-Ning Liu
:
DeGKM: Decentralized Group Key Management for Content Push in Integrated Networks. 4784-4800 - Yiru Zhao
, Long Gao
, Qiang Wei
, Lei Zhao
:
Towards Tightly-Coupled Hybrid Fuzzing via Excavating Input Specifications. 4801-4814 - Wenlong Tian
, Jian Guo
, Zhiyong Xu
, Ruixuan Li
, Weijun Xiao
:
PEO-Store: Delegation-Proof Based Oblivious Storage With Secure Redundancy Elimination. 4815-4826 - Changhao Chenli
, Wenyi Tang
, Hyeonbum Lee
, Taeho Jung
:
Fair$^{2}$2Trade: Digital Trading Platform Ensuring Exchange and Distribution Fairness. 4827-4842 - Hanxi Guo
, Hao Wang
, Tao Song
, Yang Hua
, Ruhui Ma
, Xiulang Jin
, Zhengui Xue, Haibing Guan
:
Siren$^+$+: Robust Federated Learning With Proactive Alarming and Differential Privacy. 4843-4860 - Zhirun Zheng
, Zhetao Li
, Cheng Huang
, Saiqin Long
, Mushu Li
, Xuemin Shen
:
Data Poisoning Attacks and Defenses to LDP-Based Privacy-Preserving Crowdsensing. 4861-4878 - Jianping Cai
, Ximeng Liu
, Qingqing Ye
, Yang Liu
, Yuyang Wang
:
A Federated Learning Framework Based on Differentially Private Continuous Data Release. 4879-4894 - Hao Yang
, Shiyu Shen
, Wangchen Dai
, Lu Zhou
, Zhe Liu
, Yunlei Zhao
:
Phantom: A CUDA-Accelerated Word-Wise Homomorphic Encryption Library. 4895-4906 - Qi Cui
, Weixuan Tang
, Zhili Zhou
, Ruohan Meng
, Guoshun Nan
, Yun-Qing Shi:
Meta Security Metric Learning for Secure Deep Image Hiding. 4907-4920 - Hongyang Chen
, Pengfei Chen
, Guangba Yu
, Xiaoyun Li
, Zilong He
:
MicroFI: Non-Intrusive and Prioritized Request-Level Fault Injection for Microservice Applications. 4921-4938 - Xia Feng
, Haiyang Liu
, Haowei Yang
, Qingqing Xie
, Liangmin Wang
:
Batch-Aggregate: Efficient Aggregation for Private Federated Learning in VANETs. 4939-4952 - Alian Yu
, Jian Kang
, Joshua Morris
, Elisa Bertino
, Dan Lin
:
Fight Malware Like Malware: A New Defense Method Against Crypto Ransomware. 4953-4966 - Jinyin Chen
, Haibin Zheng
, Tao Liu
, Jiawei Liu
, Yao Cheng
, Xuhong Zhang
, Shouling Ji
:
EdgePro: Edge Deep Learning Model Protection via Neuron Authorization. 4967-4981 - Qiang Yang
, Kaiyan Cui
, Yuanqing Zheng
:
Room-Scale Voice Liveness Detection for Smart Devices. 4982-4996 - Wanlun Ma
, Yiliao Song
, Minhui Xue
, Sheng Wen
, Yang Xiang
:
The "Code" of Ethics: A Holistic Audit of AI Code Generators. 4997-5013 - Junke Duan
, Shihui Zheng
, Wei Wang
, Licheng Wang
, Xiaoya Hu
, Lize Gu
:
Concise RingCT Protocol Based on Linkable Threshold Ring Signature. 5014-5028 - Chuer Yu
, Xuhong Zhang
, Yuxuan Duan
, Senbo Yan
, Zonghui Wang
, Yang Xiang
, Shouling Ji
, Wenzhi Chen
:
Diff-ID: An Explainable Identity Difference Quantification Framework for DeepFake Detection. 5029-5045 - Haohua Duan
, Zedong Peng
, Liyao Xiang
, Yuncong Hu
, Bo Li
:
A Verifiable and Privacy-Preserving Federated Learning Training Framework. 5046-5058
Volume 21, Number 6, November - December 2024
- Wansen Wang
, Wenchao Huang
, Zhaoyi Meng
, Yan Xiong
, Cheng Su
:
Advancing the Automation Capability of Verifying Security Protocols. 5059-5070 - Fei Tong
, Yuanhang Zhou
, Kaiming Wang
, Guang Cheng
, Jianyu Niu
, Shibo He
:
A Privacy-Preserving Incentive Mechanism for Mobile Crowdsensing Based on Blockchain. 5071-5085 - Liangrong Zhao
, Jérémie Decouchant
, Joseph K. Liu
, Qinghua Lu
, Jiangshan Yu
:
Trusted Hardware-Assisted Leaderless Byzantine Fault Tolerance Consensus. 5086-5097 - Zeming Yao
, Hangtao Zhang
, Yicheng Guo
, Xin Tian
, Wei Peng
, Yi Zou
, Leo Yu Zhang
, Chao Chen
:
Reverse Backdoor Distillation: Towards Online Backdoor Attack Detection for Deep Neural Network Models. 5098-5111 - Jingyi Deng
, Chenhao Lin
, Pengbin Hu
, Chao Shen
, Qian Wang
, Qi Li
, Qiming Li
:
Towards Benchmarking and Evaluating Deepfake Detection. 5112-5127 - Aurelien T. Mozipo
, John M. Acken
:
Analysis of Countermeasures Against Remote and Local Power Side Channel Attacks using Correlation Power Analysis. 5128-5142 - Siqi Lu
, Hanjie Dong
, Zhaoxuan Li
, Laurence T. Yang
:
Not Just Summing: The Identifier Leakage of Private-Join-and-Compute and its Improvement. 5143-5155 - Patrick Lingga
, Jaehoon Jeong
, Jinhyuk Yang
, Jeonghyeon Kim
:
SPT: Security Policy Translator for Network Security Functions in Cloud-Based Security Services. 5156-5169 - Man Zeng
, Xiaohong Huang
, Pei Zhang
, Dandan Li
, Kun Xie
:
Improving Prefix Hijacking Defense of RPKI From an Evolutionary Game Perspective. 5170-5184 - Yongkai Fan
, Kaile Ma, Linlin Zhang
, Xia Lei, Guangquan Xu
, Gang Tan
:
ValidCNN: A Large-Scale CNN Predictive Integrity Verification Scheme Based on zk-SNARK. 5185-5195 - Zhaopin Su
, Guofu Zhang
, Zhiyuan Shi
, Donghui Hu
, Weiming Zhang
:
Message-Driven Generative Music Steganography Using MIDI-GAN. 5196-5207 - Sepideh Avizheh
, Mahmudun Nabi
, Reihaneh Safavi-Naini
:
Refereed Delegation of Computation Using Smart Contracts. 5208-5227 - Zhixiang Zhang
, Hanlin Zhang
, Xiangfu Song
, Jie Lin
, Fanyu Kong
:
Secure Outsourcing Evaluation for Sparse Decision Trees. 5228-5241 - Xinyu Zhang
, Huiyu Xu
, Zhongjie Ba
, Zhibo Wang
, Yuan Hong
, Jian Liu
, Zhan Qin
, Kui Ren
:
PrivacyAsst: Safeguarding User Privacy in Tool-Using Large Language Model Agents. 5242-5258 - Xutong Mu
, Ke Cheng
, Yulong Shen
, Xiaoxiao Li
, Zhao Chang
, Tao Zhang
, Xindi Ma
:
FedDMC: Efficient and Robust Federated Learning via Detecting Malicious Clients. 5259-5274 - Fenglu Zhang
, Baojun Liu
, Chaoyi Lu
, Yunpeng Xing
, Haixin Duan
, Ying Liu
, Liyuan Chang
:
Investigating Deployment Issues of DNS Root Server Instances From a China-Wide View. 5275-5292 - Sifan Wu
, Zhenguang Liu
, Beibei Zhang
, Roger Zimmermann
, Zhongjie Ba
, Xiaosong Zhang
, Kui Ren
:
Do as I Do: Pose Guided Human Motion Copy. 5293-5307 - Hang Liu
, Yang Ming
, Chenhao Wang
, Yi Zhao
, Yabin Li
:
Comments on "Enabling Verifiable Privacy-Preserving Multi-Type Data Aggregation in Smart Grids". 5308-5310 - Dinh Duc Nha Nguyen
, Keshav Sood
, Yong Xiang
, Longxiang Gao
, Lianhua Chi
, Gurpreet Singh
, Shui Yu
:
Design and Robust Evaluation of Next Generation Node Authentication Approach. 5311-5323 - Jiaxuan Fu
, Ke Cheng
, Zhao Chang
, Yulong Shen
:
PPA-DBSCAN: Privacy-Preserving $\rho$ρ-Approximate Density-Based Clustering. 5324-5340 - Jilin Hu
, Fanlang Zeng
, Yongwang Zhao
, Zhuoruo Zhang
, Leping Zhang
, Jianhong Zhao
, Rui Chang
, Kui Ren
:
ProveriT: A Parameterized, Composable, and Verified Model of TEE Protection Profile. 5341-5358 - Wenchao Li
, Willy Susilo
, Chunhe Xia
, Luqi Huang
, Fuchun Guo
, Tianbo Wang
:
Secure Data Integrity Check Based on Verified Public Key Encryption With Equality Test for Multi-Cloud Storage. 5359-5373 - Vittorio Orbinato
, Marco Carlo Feliciano
, Domenico Cotroneo
, Roberto Natella
:
Laccolith: Hypervisor-Based Adversary Emulation With Anti-Detection. 5374-5387 - Chenhao Xu
, Jiaqi Ge
, Yao Deng
, Longxiang Gao
, Mengshi Zhang
, Yong Li
, Wanlei Zhou
, Xi Zheng
:
BASS: A Blockchain-Based Asynchronous SignSGD Architecture for Efficient and Secure Federated Learning. 5388-5402 - Yijing Chen
, Hongxia Wang
, Wanjie Li
:
Constructing Immune-Cover for Improving Holistic Security of Spatial Adaptive Steganography. 5403-5419 - Haonan Yan
, Xiaoguang Li
, Wenjing Zhang
, Qian Chen
, Bin Wang
, Hui Li
, Xiaodong Lin
:
CODER: Protecting Privacy in Image Retrieval With Differential Privacy. 5420-5430 - Chenghui Shi
, Shouling Ji
, Xudong Pan
, Xuhong Zhang
, Mi Zhang
, Min Yang
, Jun Zhou
, Jianwei Yin
, Ting Wang
:
Towards Practical Backdoor Attacks on Federated Learning Systems. 5431-5447 - Muhammad Saad
, David Mohaisen
:
Analyzing In-Browser Cryptojacking. 5448-5460 - Sagarika Ghosh
, Marzia Zaman
, Rohit Joshi
, Srinivas Sampalli
:
Multi-Phase Quantum Resistant Framework for Secure Communication in SCADA Systems. 5461-5478 - Yandong Zheng
, Rongxing Lu
, Songnian Zhang
, Jun Shao
, Hui Zhu
:
Achieving Practical and Privacy-Preserving kNN Query Over Encrypted Data. 5479-5492 - Xiao Chen
, Tiejun Ma
, Btissam Er-Rahmadi
, Jane Hillston
, Guanxu Yuan
:
Parallel Byzantine Consensus Based on Hierarchical Architecture and Trusted Hardware. 5493-5508 - Gaolei Fei
, Yang Liu, Guangmin Hu
, Sheng Wen
, Yang Xiang
:
Online Social Network User Home Location Inference Based on Heterogeneous Networks. 5509-5525 - Wanlun Ma
, Derui Wang
, Chao Chen
, Sheng Wen
, Gaolei Fei
, Yang Xiang
:
LocGuard: A Location Privacy Defender for Image Sharing. 5526-5537 - Mengxi Jiang
, Yulei Sui
, Yunqi Lei
, Xiaofei Xie
, Cuihua Li, Yang Liu
, Ivor W. Tsang
:
Adversarial Learning for Coordinate Regression Through $k$k-Layer Penetrating Representation. 5538-5552 - Chongyang Gao
, Sushil Jajodia
, Andrea Pugliese
, V. S. Subrahmanian
:
${\sf FakeDB}$FakeDB: Generating Fake Synthetic Databases. 5553-5564 - Kai-Fung Chu
, Weisi Guo
:
Multi-Agent Reinforcement Learning-Based Passenger Spoofing Attack on Mobility-as-a-Service. 5565-5581 - Ruiwen He
, Yushi Cheng
, Junning Ze
, Xinfeng Li
, Xiaoyu Ji
, Wenyuan Xu
:
Scoring Metrics of Assessing Voiceprint Distinctiveness Based on Speech Content and Rate. 5582-5599 - Yin Zhu
, Junqing Gong
, Kai Zhang
, Haifeng Qian
:
Malicious-Resistant Non-Interactive Verifiable Aggregation for Federated Learning. 5600-5616 - Yang Xu
, Jianbo Shao
, Jia Liu
, Yulong Shen
, Tarik Taleb
, Norio Shiratori
:
BWKA: A Blockchain-Based Wide-Area Knowledge Acquisition Ecosystem. 5617-5634 - Wei Peng
, Xiang Li
, Jianyu Niu
, Xiaokuan Zhang
, Yinqian Zhang
:
Ensuring State Continuity for Confidential Computing: A Blockchain-Based Approach. 5635-5649 - Chenqi Kong
, Kexin Zheng
, Yibing Liu
, Shiqi Wang
, Anderson Rocha
, Haoliang Li
:
M$^{3}$3FAS: An Accurate and Robust MultiModal Mobile Face Anti-Spoofing System. 5650-5666 - Lei Zhang
, Jiangtao Li
, Yafang Yang
:
Message Linkable Group Signature With Information Binding and Efficient Revocation for Privacy- Preserving Announcement in VANETs. 5667-5680 - Yunxia Han
, Chunxiang Xu
, Changsong Jiang
, Kefei Chen
:
A Secure Two-Factor Authentication Key Exchange Scheme. 5681-5693 - Rahul Saha
, Gulshan Kumar
, G. Geetha
, Mauro Conti
, William J. Buchanan
:
Application of Randomness for Security and Privacy in Multi-Party Computation. 5694-5705 - Jianqing Liu
, Na Gong
, Hritom Das
:
Two Birds With One Stone: Differential Privacy by Low-Power SRAM Memory. 5706-5719 - Xiangshan Gao
, Xingjun Ma
, Jingyi Wang
, Youcheng Sun
, Bo Li, Shouling Ji
, Peng Cheng
, Jiming Chen
:
VeriFi: Towards Verifiable Federated Unlearning. 5720-5736 - Yuming Feng
, Yu Zhang
, Hui He
, Weizhe Zhang
, Desheng Wang
:
An IoT Device Identification Method Using Extracted Fingerprint From Sequence of Traffic Grayscale Images. 5737-5754 - Mohammed Shujaa Aldeen
, Chuan Zhao
, Zhenxiang Chen
, Liming Fang
, Zhe Liu
:
Privacy-Preserving Collaborative Learning for Genome Analysis via Secure XGBoost. 5755-5765 - Yong Liu
, Hanzhou Wu
, Xinpeng Zhang
:
Robust and Imperceptible Black-Box DNN Watermarking Based on Fourier Perturbation Analysis and Frequency Sensitivity Clustering. 5766-5780 - Xinyuan Qian
, Hongwei Li
, Meng Hao
, Guowen Xu
, Haoyong Wang
, Yuguang Fang
:
Decentralized Multi-Client Functional Encryption for Inner Product With Applications to Federated Learning. 5781-5796 - Qingyang Zhang
, Yujie Fu
, Jie Cui
, Debiao He
, Hong Zhong
:
Efficient Fine-Grained Data Sharing Based on Proxy Re-Encryption in IIoT. 5797-5809

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.