![](https://dblp.org/img/logo.ua.320x120.png)
![](https://dblp.org/img/dropdown.dark.16x16.png)
![](https://dblp.org/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.org/img/search.dark.16x16.png)
![search dblp](https://dblp.org/img/search.dark.16x16.png)
default search action
IEEE Transactions on Dependable and Secure Computing, Volume 21
Volume 21, Number 1, January - February 2024
- Yi-Fan Li
, Yang Gao
, Gbadebo Ayoade, Latifur Khan
, Anoop Singhal
, Bhavani Thuraisingham:
Heterogeneous Domain Adaptation for Multistream Classification on Cyber Threat Data. 1-11 - Xugui Zhou
, Bulbul Ahmed, James H. Aylor, Philip Asare, Homa Alemzadeh
:
Hybrid Knowledge and Data Driven Synthesis of Runtime Monitors for Cyber-Physical Systems. 12-30 - Peng Cheng
, Yuexin Wu, Yuan Hong
, Zhongjie Ba
, Feng Lin
, Li Lu
, Kui Ren
:
UniAP: Protecting Speech Privacy With Non-Targeted Universal Adversarial Perturbations. 31-46 - Shlomi Dolev
, Bingyong Guo, Jianyu Niu
, Ziyu Wang
:
SodsBC: A Post-Quantum by Design Asynchronous Blockchain Framework. 47-62 - Lin Mei
, Chungen Xu
, Lei Xu
, Xingliang Yuan
, Joseph K. Liu
:
Practical Multi-Source Multi-Client Searchable Encryption With Forward Privacy: Refined Security Notion and New Constructions. 63-77 - Moslem Didehban
, Hwisoo So
, Prudhvi Gali, Aviral Shrivastava
, Kyoungwoo Lee:
Generic Soft Error Data and Control Flow Error Detection by Instruction Duplication. 78-92 - Ziqin Liu, Zhenpeng Lin, Yueqi Chen, Yuhang Wu, Yalong Zou, Dongliang Mu
, Xinyu Xing:
Towards Unveiling Exploitation Potential With Multiple Error Behaviors for Kernel Bugs. 93-109 - Gao Liu, Zheng Yan
, Dongliang Wang, Haiguang Wang, Tieyan Li
:
DePTVM: Decentralized Pseudonym and Trust Value Management for Integrated Networks. 110-124 - Ruixuan Li
, Zhenyong Zhang, Jun Shao
, Rongxing Lu
, Xiaoqi Jia, Guiyi Wei
:
The Potential Harm of Email Delivery: Investigating the HTTPS Configurations of Webmail Services. 125-138 - Tianyu Yang
, Hanzhou Wu
, Biao Yi
, Guorui Feng
, Xinpeng Zhang
:
Semantic-Preserving Linguistic Steganography by Pivot Translation and Semantic-Aware Bins Coding. 139-152 - Haonan Yan
, Xiaoguang Li
, Wenjing Zhang
, Rui Wang, Hui Li, Xingwen Zhao, Fenghua Li, Xiaodong Lin
:
Automatic Evasion of Machine Learning-Based Network Intrusion Detection Systems. 153-167 - Yuwei Li
, Yuan Chen
, Shouling Ji, Xuhong Zhang
, Guanglu Yan, Alex X. Liu, Chunming Wu, Zulie Pan
, Peng Lin:
G-Fuzz: A Directed Fuzzing Framework for gVisor. 168-185 - Xabier Sáez de Cámara
, Jose Luis Flores
, Cristóbal Arellano
, Aitor Urbieta
, Urko Zurutuza
:
Gotham Testbed: A Reproducible IoT Testbed for Security Experiments and Dataset Generation. 186-203 - Hongyang Yan, Anli Yan
, Li Hu, Jiaming Liang, Haibo Hu
:
MTL-Leak: Privacy Risk Assessment in Multi-Task Learning. 204-215 - Kaushik Madala
, Hyunsook Do, Bastian Tenbergen
:
ADSA - Association-Driven Safety Analysis to Expose Unknown Safety Issues. 216-228 - Benyuan Yang
, Hesuan Hu
:
Delegation Security Analysis in Workflow Systems. 229-240 - Ke Huang
, Yi Mu
, Fatemeh Rezaeibagha
, Xiaosong Zhang
, Xiong Li
, Sheng Cao
:
Monero With Multi-Grained Redaction. 241-253 - Jie Wang
, Kun Sun
, Lingguang Lei
, Yuewu Wang
, Jiwu Jing
, Shengye Wan
, Qi Li
:
CacheIEE: Cache-Assisted Isolated Execution Environment on ARM Multi-Core Platforms. 254-269 - Liqiang Wu
, Shaojing Fu
, Yuchuan Luo
, Hongyang Yan
, Heyuan Shi
, Ming Xu:
A Robust and Lightweight Privacy-Preserving Data Aggregation Scheme for Smart Grid. 270-283 - Alberto Huertas Celdrán
, Pedro Miguel Sánchez Sánchez
, Gérôme Bovet
, Gregorio Martínez Pérez
, Burkhard Stiller
:
CyberSpec: Behavioral Fingerprinting for Intelligent Attacks Detection on Crowdsensing Spectrum Sensors. 284-297 - Urvashi Bansal
, Geeta Sikka
, Lalit Kumar Awasthi
, Bharat K. Bhargava
:
Quantitative Evaluation of Extensive Vulnerability Set Using Cost Benefit Analysis. 298-308 - Hongliang Liang
, Xiangyu Li, Da Xiao
, Jie Liu, Yanjie Zhou, Aibo Wang, Jin Li:
Generative Pre-Trained Transformer-Based Reinforcement Learning for Testing Web Application Firewalls. 309-324 - Hongliang Liang
, Xinglin Yu
, Xianglin Cheng, Jie Liu, Jin Li:
Multiple Targets Directed Greybox Fuzzing. 325-339 - Sheng Li
, Zichi Wang, Xiudong Zhang, Xinpeng Zhang:
Robust Image Steganography Against General Downsampling Operations With Lossless Secret Recovery. 340-352 - Cheng Huang
, Dongxiao Liu
, Anjia Yang
, Rongxing Lu
, Xuemin Shen
:
Multi-Client Secure and Efficient DPF-Based Keyword Search for Cloud Storage. 353-371 - Yijie Shen
, Feng Lin
, Chao Wang
, Tiantian Liu
, Zhongjie Ba
, Li Lu
, Wenyao Xu
, Kui Ren
:
MotoPrint: Reconfigurable Vibration Motor Fingerprint via Homologous Signals Learning. 372-387 - Jianping Cai
, Ximeng Liu
, Jiayin Li
, Kim-Kwang Raymond Choo
:
Differentially Private Non-Negative Consistent Release for Large-Scale Hierarchical Trees. 388-402 - Ziyue Pan
, Wenbo Shen
, Xingkai Wang, Yutian Yang
, Rui Chang
, Yao Liu
, Chengwei Liu
, Yang Liu
, Kui Ren
:
Ambush From All Sides: Understanding Security Threats in Open-Source Software CI/CD Pipelines. 403-418 - Meng Luo
, Bo Feng
, Long Lu, Engin Kirda, Kui Ren
:
On the Complexity of the Web's PKI: Evaluating Certificate Validation of Mobile Browsers. 419-433 - Roberto De Prisco
, Alfredo De Santis
, Francesco Palmieri
:
Bounds and Protocols for Graph-Based Distributed Secret Sharing. 434-448 - Jianwei Liu
, Yinghui He
, Chaowei Xiao
, Jinsong Han
, Kui Ren
:
Time to Think the Security of WiFi-Based Behavior Recognition Systems. 449-462 - Runnan Zhang
, Gang Liu
, Hongzhaoning Kang
, Quan Wang
, Bo Wan
, Nan Luo
:
Anonymity in Attribute-Based Access Control: Framework and Metric. 463-475 - Yi Zhang
, Xiaofeng Jia
, Bianjing Pan
, Jun Shao
, Liming Fang
, Rongxing Lu
, Guiyi Wei
:
Anonymous Multi-Hop Payment for Payment Channel Networks. 476-485 - Alireza Sarmadi
, Hao Fu
, Prashanth Krishnamurthy
, Siddharth Garg
, Farshad Khorrami
:
Privacy-Preserving Collaborative Learning Through Feature Extraction. 486-498 - Fucai Luo
, Haiyan Wang
, Xingfu Yan
:
Comments on "VERSA: Verifiable Secure Aggregation for Cross-Device Federated Learning". 499-500
Volume 21, Number 2, March - April 2024
- Jianwei Liu
, Xiang Zou
, Leqi Zhao
, Yusheng Tao, Sideng Hu
, Jinsong Han
, Kui Ren:
Privacy Leakage in Wireless Charging. 501-514 - Yinxing Xue
, Jiaming Ye
, Wei Zhang, Jun Sun
, Lei Ma, Haijun Wang, Jianjun Zhao
:
xFuzz: Machine Learning Guided Cross-Contract Fuzzing. 515-529 - Qian Li
, Chao Shen
, Qingyuan Hu, Chenhao Lin
, Xiang Ji, Saiyu Qi
:
Towards Gradient-Based Saliency Consensus Training for Adversarial Robustness. 530-541 - Xiao Cheng
, Xu Nie
, Ningke Li
, Haoyu Wang, Zheng Zheng
, Yulei Sui:
How About Bug-Triggering Paths? - Understanding and Characterizing Learning-Based Vulnerability Detectors. 542-558 - Wenbo Jiang
, Tianwei Zhang
, Han Qiu
, Hongwei Li
, Guowen Xu
:
Incremental Learning, Incremental Backdoor Threats. 559-572 - Pedro Miguel Sánchez Sánchez
, Alberto Huertas Celdrán
, Timo Schenk, Adrian Lars Benjamin Iten, Gérôme Bovet
, Gregorio Martínez Pérez
, Burkhard Stiller
:
Studying the Robustness of Anti-Adversarial Federated Learning Models Detecting Cyberattacks in IoT Spectrum Sensors. 573-584 - Qun Song
, Rui Tan
, Chao Ren
, Yan Xu
, Yang Lou
, Jianping Wang
, Hoay Beng Gooi
:
On Credibility of Adversarial Examples Against Learning-Based Grid Voltage Stability Assessment. 585-599 - Ge Ren
, Jun Wu, Gaolei Li, Shenghong Li
, Mohsen Guizani
:
Protecting Intellectual Property With Reliable Availability of Learning Models in AI-Based Cybersecurity Services. 600-617 - Prithwiraj Roy, Shameek Bhattacharjee
, Sahar Abedzadeh
, Sajal K. Das
:
Noise Resilient Learning for Attack Detection in Smart Grid PMU Infrastructure. 618-635 - Han Fang
, Yupeng Qiu
, Guorui Qin, Jiyi Zhang, Kejiang Chen
, Weiming Zhang
, Ee-Chien Chang:
DP2Dataset Protection by Data Poisoning. 636-649 - Ping Wang
, Haichang Gao
, Xiaoyan Guo
, Zhongni Yuan
, Jiawei Nian
:
Improving the Security of Audio CAPTCHAs With Adversarial Examples. 650-667 - Wenhan Xu
, Hui Ma
, Zishuai Song
, Jianhao Li
, Rui Zhang
:
Gringotts: An Encrypted Version Control System With Less Trust on Servers. 668-684 - Wenbo Jiang
, Hongwei Li
, Guowen Xu
, Tianwei Zhang
, Rongxing Lu
:
A Comprehensive Defense Framework Against Model Extraction Attacks. 685-700 - Shahid Khan
, Joost-Pieter Katoen
, Marc Bouissou
:
A Compositional Semantics of Boolean-Logic Driven Markov Processes. 701-716 - Di Zhang
, Junqing Le
, Xinyu Lei
, Tao Xiang
, Xiaofeng Liao:
Secure Redactable Blockchain With Dynamic Support. 717-731 - Insup Lee
, Wonjun Lee
:
UniQGAN: Towards Improved Modulation Classification With Adversarial Robustness Using Scalable Generator Design. 732-745 - Cheng Guo
, Wenfeng Li
, Xinyu Tang
, Kim-Kwang Raymond Choo
, Yining Liu
:
Forward Private Verifiable Dynamic Searchable Symmetric Encryption With Efficient Conjunctive Query. 746-763 - Linqing Gui
, Weihao Zhou
, Pinchang Zhang
, Fu Xiao
:
Cooperative Jamming-Aided Secure Communication in Wireless Powered Sensor Networks. 764-774 - Zijian Zhang
, Xuyang Liu
, Meng Li, Hao Yin
, Liehuang Zhu, Bakh Khoussainov
, Keke Gai
:
HCA: Hashchain-Based Consensus Acceleration Via Re-Voting. 775-788 - Yifeng Zheng
, Menglun Zhou
, Songlei Wang
, Hejiao Huang
, Xiaohua Jia
, Xun Yi
, Cong Wang
:
SecDR: Enabling Secure, Efficient, and Accurate Data Recovery for Mobile Crowdsensing. 789-803 - Roberto Pietrantuono
, Massimo Ficco
, Francesco Palmieri
:
Testing the Resilience of MEC-Based IoT Applications Against Resource Exhaustion Attacks. 804-818 - Jayson Sia
, Edmond A. Jonckheere
, Laith Shalalfeh
, Paul Bogdan
:
Phasor Measurement Unit Change-Point Detection of Frequency Hurst Exponent Anomaly With Time-to-Event. 819-827 - Cavit Özbay
, Albert Levi
:
Blacklisting Based Anonymous Authentication Scheme for Sharing Economy. 828-846 - Xiao Han
, Yuncong Yang
, Leye Wang, Junjie Wu:
Privacy-Preserving Network Embedding Against Private Link Inference Attacks. 847-859 - Dan Zhu
, Hui Zhu
, Cheng Huang
, Rongxing Lu
, Dengguo Feng, Xuemin Shen
:
Efficient and Accurate Cloud-Assisted Medical Pre-Diagnosis With Privacy Preservation. 860-875 - Jungang Yang
, Liyao Xiang
, Pengzhi Chu
, Xinbing Wang
, Chenghu Zhou
:
Certified Distributional Robustness on Smoothed Classifiers. 876-888 - Caiqin Dong
, Jian Weng
, Ming Li
, Jia-Nan Liu
, Zhiquan Liu
, Yudan Cheng
, Shui Yu
:
Privacy-Preserving and Byzantine-Robust Federated Learning. 889-904 - Yongzhong He
, Yiming Wang
, Sencun Zhu
, Wei Wang
, Yunjia Zhang, Qiang Li
, Aimin Yu
:
Automatically Identifying CVE Affected Versions With Patches and Developer Logs. 905-919 - Deqiang Li
, Shicheng Cui
, Yun Li
, Jia Xu
, Fu Xiao
, Shouhuai Xu
:
PAD: Towards Principled Adversarial Malware Detection Against Evasion Attacks. 920-936 - Chunpeng Ge
, Zhe Liu
, Willy Susilo
, Liming Fang
, Hao Wang
:
Attribute-Based Encryption With Reliable Outsourced Decryption in Cloud Computing Using Smart Contract. 937-948 - Chunpeng Ge
, Willy Susilo
, Zhe Liu
, Joonsang Baek
, Xiapu Luo
, Liming Fang
:
Attribute-Based Proxy Re-Encryption With Direct Revocation Mechanism for Data Sharing in Clouds. 949-960 - Yaxi Yang
, Jian Weng
, Yao Tong
, Jia-Nan Liu
, Zhenghao Wu
, Leo Yu Zhang
, Anjia Yang
:
PriGenX: Privacy-Preserving Query With Anonymous Access Control for Genomic Data. 961-974 - Renato Ferrero
, Bartolomeo Montrucchio
:
Banknote Identification Through Unique Fluorescent Properties. 975-986 - Emanuele Maiorana
, Chiara Romano
, Emiliano Schena
, Carlo Massaroni
:
BIOWISH: Biometric Recognition Using Wearable Inertial Sensors Detecting Heart Activity. 987-1000
Volume 21, Number 3, May - June 2024
- Xiaochen Li
, Weiran Liu
, Hanwen Feng
, Kunzhe Huang
, Yuke Hu
, Jinfei Liu
, Kui Ren
, Zhan Qin
:
Privacy Enhancement Via Dummy Points in the Shuffle Model. 1001-1016 - Ritam Ganguly
, Shokufeh Kazemloo
, Borzoo Bonakdarpour
:
Crash-Resilient Decentralized Synchronous Runtime Verification. 1017-1031 - Xiaokuan Zhang
, Yang Zhang, Yinqian Zhang
:
VeriTrain: Validating MLaaS Training Efforts via Anomaly Detection. 1032-1049 - Zikang Ding
, Daojing He
, Qi Qiao
, Xuru Li
, Yun Gao
, Sammy Chan
, Kim-Kwang Raymond Choo
:
A Lightweight and Secure Communication Protocol for the IoT Environment. 1050-1067 - Yunlong Xing
, Xinda Wang
, Sadegh Torabi
, Zeyu Zhang, Lingguang Lei
, Kun Sun
:
A Hybrid System Call Profiling Approach for Container Protection. 1068-1083 - Eric D. Vugrin
, Seth Hanson
, Jerry Cruz
, Casey Glatter
, Thomas D. Tarman
, Ali Pinar
:
Experimental Validation of a Command and Control Traffic Detection Model. 1084-1097 - Jian Zheng
, Huawei Huang
, Zibin Zheng
, Song Guo
:
Adaptive Double-Spending Attacks on PoW-Based Blockchains. 1098-1110 - Chunyang Lv
, Jianfeng Wang
, Shifeng Sun
, Yunling Wang
, Saiyu Qi
, Xiaofeng Chen
:
Towards Practical Multi-Client Order-Revealing Encryption: Improvement and Application. 1111-1126 - Sudip Vhaduri
, William Cheung, Sayanton V. Dibbo
:
Bag of On-Phone ANNs to Secure IoT Objects Using Wearable and Smartphone Biometrics. 1127-1138 - Yuchen Wang
, Xiaoguang Li
, Li Yang
, Jianfeng Ma
, Hui Li
:
ADDITION: Detecting Adversarial Examples With Image-Dependent Noise Reduction. 1139-1154 - Hua Ma
, Huming Qiu
, Yansong Gao
, Zhi Zhang
, Alsharif Abuadbba
, Minhui Xue
, Anmin Fu
, Jiliang Zhang
, Said F. Al-Sarawi
, Derek Abbott
:
Quantization Backdoors to Deep Learning Commercial Frameworks. 1155-1172 - Omais Shafi Pandith
:
SGXFault: An Efficient Page Fault Handling Mechanism for SGX Enclaves. 1173-1178 - Teng Li
, Ximeng Liu
, Wei Qiao
, Xiongjie Zhu
, Yulong Shen
, Jianfeng Ma
:
T-Trace: Constructing the APTs Provenance Graphs Through Multiple Syslogs Correlation. 1179-1195 - Kang Wei
, Jun Li, Ming Ding
, Chuan Ma
, Yo-Seb Jeon
, H. Vincent Poor
:
Covert Model Poisoning Against Federated Learning: Algorithm Design and Optimization. 1196-1209 - Shuaishuai Tan
, Shui Yu
, Wenyin Liu
, Daojing He
, Sammy Chan
:
You Can Glimpse but You Cannot Identify: Protect IoT Devices From Being Fingerprinted. 1210-1223 - Younho Lee
, Jinyeong Seo
, Yujin Nam
, Jiseok Chae
, Jung Hee Cheon
:
HEaaN-STAT: A Privacy-Preserving Statistical Analysis Toolkit for Large-Scale Numerical, Ordinal, and Categorical Data. 1224-1241 - Jianhong Zhang
, Chenghe Dong
:
On the Security of Lightweight and Escrow-Free Certificate-Based Data Aggregation for Smart Grid. 1242-1243 - Nikhil Tripathi
:
Delays Have Dangerous Ends: Slow HTTP/2 DoS Attacks Into the Wild and Their Real-Time Detection Using Event Sequence Analysis. 1244-1256 - Uwe Zdun
, Pierre-Jean Queval
, Georg Simhandl
, Riccardo Scandariato
, Somik Chakravarty
, Marjan Jelic
, Aleksandar S. Jovanovic
:
Detection Strategies for Microservice Security Tactics. 1257-1273 - Zhihua Tian
, Rui Zhang
, Xiaoyang Hou
, Lingjuan Lyu
, Tianyi Zhang
, Jian Liu
, Kui Ren
:
${\sf FederBoost}$: Private Federated Learning for GBDT. 1274-1285 - Xinrui Ge
, Jia Yu
, Rong Hao
:
Privacy-Preserving Graph Matching Query Supporting Quick Subgraph Extraction. 1286-1300 - Xingfu Yan
, Wing W. Y. Ng, Bowen Zhao
, Yuxian Liu
, Ying Gao
, Xiumin Wang
:
Fog-Enabled Privacy-Preserving Multi-Task Data Aggregation for Mobile Crowdsensing. 1301-1316 - Conor Black
, Sandra Scott-Hayward
:
Defeating Data Plane Attacks With Program Obfuscation. 1317-1330 - Lichao Wu
, Yoo-Seung Won
, Dirmanto Jap
, Guilherme Perin
, Shivam Bhasin
, Stjepan Picek
:
Ablation Analysis for Multi-Device Deep Learning-Based Physical Side-Channel Analysis. 1331-1341 - Sevtap Duman
, Matthias Büchler
, Manuel Egele
, Engin Kirda
:
PellucidAttachment: Protecting Users From Attacks via E-Mail Attachments. 1342-1354 - Shantanu Sharma
, Yin Li
, Sharad Mehrotra
, Nisha Panwar
, Peeyush Gupta
, Dhrubajyoti Ghosh
:
Prism: Privacy-Preserving and Verifiable Set Computation Over Multi-Owner Secret Shared Outsourced Databases. 1355-1371 - Binbin Zhao
, Shouling Ji
, Jiacheng Xu
, Yuan Tian
, Qiuyang Wei
, Qinying Wang
, Chenyang Lyu
, Xuhong Zhang
, Changting Lin
, Jingzheng Wu
, Raheem Beyah
:
One Bad Apple Spoils the Barrel: Understanding the Security Risks Introduced by Third-Party Components in IoT Firmware. 1372-1389 - Enrico Bacis
, Sabrina De Capitani di Vimercati
, Sara Foresti
, Stefano Paraboschi
, Marco Rosa
, Pierangela Samarati
:
Mix&Slice for Efficient Access Revocation on Outsourced Data. 1390-1405 - Peng Jiang
, Jifan Xiao, Ding Li
, Hongyi Yu, Yu Bai
, Yao Guo
, Xiangqun Chen:
Detecting Malicious Websites From the Perspective of System Provenance Analysis. 1406-1423 - Tianpei Lu
, Bingsheng Zhang
, Kui Ren
:
PrivData Network: A Privacy-Preserving On-Chain Data Factory and Trading Market. 1424-1436 - Zipeng Ye
, Wenjian Luo
, Muhammad Luqman Naseem
, Xiangkai Yang, Yuhui Shi
, Yan Jia:
C2FMI: Corse-to-Fine Black-Box Model Inversion Attack. 1437-1450 - Shuai Zhou
, Tianqing Zhu
, Dayong Ye
, Xin Yu
, Wanlei Zhou
:
Boosting Model Inversion Attacks With Adversarial Examples. 1451-1468 - Heqing Huang
, Hung-Chun Chiu
, Qingkai Shi
, Peisen Yao
, Charles Zhang
:
Balance Seed Scheduling via Monte Carlo Planning. 1469-1483 - Guanxiong Ha
, Chunfu Jia
, Yixuan Huang
, Hang Chen
, Ruiqi Li
, Qiaowen Jia
:
Scalable and Popularity-Based Secure Deduplication Schemes With Fully Random Tags. 1484-1500
Volume 21, Number 4, July - August 2024
- Hui Cui
, Zhiguo Wan
, Rui Gao, Huaqun Wang
:
Outsourced Privately Verifiable Proofs of Retrievability via Blockchain. 1501-1514 - Zhao Zhang
, Chunxiang Xu
, Changsong Jiang
, Kefei Chen
:
TSAPP: Threshold Single-Sign-On Authentication Preserving Privacy. 1515-1527 - Hao Zhou
, Zhiheng Niu, Gang Wang
, Xiaoguang Liu
, Dongshi Liu
, Bingnan Kang, Zheng Hu, Yong Zhang:
Proactive Drive Failure Prediction for Cloud Storage System Through Semi-Supervised Learning. 1528-1543 - Yiwei Zhang
, Siqi Ma
, Tiancheng Chen, Juanru Li
, Robert H. Deng
, Elisa Bertino
:
EvilScreen Attack: Smart TV Hijacking via Multi-Channel Remote Control Mimicry. 1544-1556 - Fengyong Li
, Zongliang Yu
, Kui Wu
, Chuan Qin
, Xinpeng Zhang
:
Multi-Modality Ensemble Distortion for Spatial Steganography With Dynamic Cost Correction. 1557-1571 - Zhibo Wang
, Wenxin Liu
, Jiahui Hu
, Hengchang Guo
, Zhan Qin
, Jian Liu
, Kui Ren
:
Label-Free Poisoning Attack Against Deep Unsupervised Domain Adaptation. 1572-1586 - Fengqun Wang
, Jie Cui
, Qingyang Zhang
, Debiao He
, Chengjie Gu
, Hong Zhong
:
Blockchain-Based Lightweight Message Authentication for Edge-Assisted Cross-Domain Industrial Internet of Things. 1587-1604 - Xueluan Gong
, Yanjiao Chen, Huayang Huang
, Weihan Kong
, Ziyao Wang, Chao Shen
, Qian Wang:
KerbNet: A QoE-Aware Kernel-Based Backdoor Attack Framework. 1605-1620 - Yang Yang
, Wenyi Xue
, Yonghua Zhan
, Minming Huang
, Yingjiu Li
, Robert H. Deng
:
AnoPay: Anonymous Payment for Vehicle Parking With Updatable Credential. 1621-1638 - Mingfeng Huang
, Zhetao Li
, Fu Xiao
, Saiqin Long
, Anfeng Liu
:
Trust Mechanism-Based Multi-Tier Computing System for Service-Oriented Edge-Cloud Networks. 1639-1651 - Kun-Chang Li
, Run-Hua Shi
, Wan-Peng Guo
, Pengbo Wang
, Bo-Shen Shao
:
Dynamic Range Query Privacy-Preserving Scheme for Blockchain-Enhanced Smart Grid Based on Lattice. 1652-1664 - Alfredo De Santis
, Anna Lisa Ferrara
, Manuela Flores
, Barbara Masucci
:
Provably-Secure One-Message Unilateral Entity Authentication Schemes. 1665-1679 - Jinguang Han, Liqun Chen, Aiqun Hu, Liquan Chen, Jiguo Li:
Privacy-Preserving Decentralized Functional Encryption for Inner Product. 1680-1694 - Dorjan Hitaj
, Giulio Pagnotta
, Briland Hitaj
, Fernando Pérez-Cruz
, Luigi V. Mancini
:
FedComm: Federated Learning as a Medium for Covert Communication. 1695-1707 - Guowen Xu
, Xingshuo Han
, Tianwei Zhang
, Shengmin Xu
, Jianting Ning
, Xinyi Huang
, Hongwei Li
, Robert H. Deng
:
SIMC 2.0: Improved Secure ML Inference Against Malicious Clients. 1708-1723 - Jia-Ju Bai
, Zi-Xuan Fu
, Kai-Tao Xie
, Zu-Ming Jiang
:
Testing Error Handling Code With Software Fault Injection and Error-Coverage-Guided Fuzzing. 1724-1739 - Meng Shen
, Changyue Li
, Hao Yu
, Qi Li
, Liehuang Zhu
, Ke Xu
:
Decision-Based Query Efficient Adversarial Attack via Adaptive Boundary Learning. 1740-1753 - Ke Li
, Cameron Baird
, Dan Lin
:
Defend Data Poisoning Attacks on Voice Authentication. 1754-1769 - Kuo-Chun Lin
, Yen-Ming Chen
:
A High-security-level Iris Cryptosystem Based on Fuzzy Commitment and Soft Reliability Extraction. 1770-1784 - Guowen Xu
, Xingshuo Han
, Gelei Deng
, Tianwei Zhang
, Shengmin Xu
, Jianting Ning
, Anjia Yang
, Hongwei Li
:
VerifyML: Obliviously Checking Model Fairness Resilient to Malicious Model Holder. 1785-1800 - Julien Gamba
, Álvaro Feal
, Eduardo Blázquez
, Vinuri Bandara
, Abbas Razaghpanah
, Juan Tapiador
, Narseo Vallina-Rodriguez
:
Mules and Permission Laundering in Android: Dissecting Custom Permissions in the Wild. 1801-1816 - Kazi Abu Zubair
, Rahaf Abdullah
, David Mohaisen
, Amro Awad
:
RC-NVM: Recovery-Aware Reliability-Security Co-Design for Non-Volatile Memories. 1817-1830 - Yandong Zheng
, Hui Zhu
, Rongxing Lu
, Yunguo Guan
, Songnian Zhang
, Fengwei Wang
, Jun Shao
, Hui Li
:
PHRkNN: Efficient and Privacy-Preserving Reverse kNN Query Over High-Dimensional Data in Cloud. 1831-1844 - Yinbin Miao
, Feng Li
, Xinghua Li
, Jianting Ning
, Hongwei Li
, Kim-Kwang Raymond Choo
, Robert H. Deng
:
Verifiable Outsourced Attribute-Based Encryption Scheme for Cloud-Assisted Mobile E-Health System. 1845-1862 - José María Jorquera Valero, Vasileios Theodorou
, Manuel Gil Pérez
, Gregorio Martínez Pérez:
SLA-Driven Trust and Reputation Management Framework for 5G Distributed Service Marketplaces. 1863-1875 - Jiangming Li
, Huasen He
, Shuangwu Chen
, Dong Jin
, Jian Yang
:
LogGraph: Log Event Graph Learning Aided Robust Fine-Grained Anomaly Diagnosis. 1876-1889 - Zhen Zeng
, Dijiang Huang
, Guoliang Xue
, Yuli Deng
, Neha Vadnere
, Liguang Xie
:
ILLATION: Improving Vulnerability Risk Prioritization by Learning From Network. 1890-1901 - Shimin Li
, Xin Wang
, Rui Xue
:
$\mathsf {moKHS}$moKHS: A More Lightweight Model for Multi-Client Delegatable Computation. 1902-1917 - Lei Xu
, Anxin Zhou
, Huayi Duan
, Cong Wang
, Qian Wang
, Xiaohua Jia
:
Toward Full Accounting for Leakage Exploitation and Mitigation in Dynamic Encrypted Databases. 1918-1934 - Marco Pernpruner
, Roberto Carbone
, Giada Sciarretta
, Silvio Ranise
:
An Automated Multi-Layered Methodology to Assist the Secure and Risk-Aware Design of Multi-Factor Authentication Protocols. 1935-1950 - Chen Liu
, Bo Li
, Jun Zhao
, Xudong Liu
, Chunpei Li
:
MalAF : Malware Attack Foretelling From Run-Time Behavior Graph Sequence. 1951-1966 - Youzhi Zhang
, Dongkai Chen
, Sushil Jajodia
, Andrea Pugliese
, V. S. Subrahmanian
, Yanhai Xiong
:
GAIT: A Game-Theoretic Defense Against Intellectual Property Theft. 1967-1980 - Pedro Reviriego
, Alfonso Sánchez-Macián, Peter C. Dillinger
, Stefan Walzer
:
On the Privacy of Multi-Versioned Approximate Membership Check Filters. 1981-1993 - Qin Liu
, Yu Peng
, Qian Xu
, Hongbo Jiang
, Jie Wu
, Tian Wang
, Tao Peng
, Guojun Wang
, Shaobo Zhang
:
$\mathsf{MARS}$MARS: Enabling Verifiable Range-Aggregate Queries in Multi-Source Environments. 1994-2011 - H. O. Sai Varshith
, Shamik Sural
, Jaideep Vaidya
, Vijayalakshmi Atluri
:
Efficiently Supporting Attribute-Based Access Control in Linux. 2012-2026 - Ahmed Shafee, Mohamed Mahmoud, Jerry W. Bruce
, Gautam Srivastava
, Abdullah Balamsh, Abdulah Jeza Aljohani
:
False Data Detector for Electrical Vehicles Temporal-Spatial Charging Coordination Secure Against Evasion and Privacy Adversarial Attacks. 2027-2044 - Lin Yao
, Xue Wang
, Haibo Hu
, Guowei Wu
:
A Utility-Aware Anonymization Model for Multiple Sensitive Attributes Based on Association Concealment. 2045-2056 - Jun Shen
, Xiaofeng Chen
, Xinyi Huang
, Yang Xiang
:
Public Proofs of Data Replication and Retrievability With User-Friendly Replication. 2057-2067 - Wenyuan Xu
, Yushi Cheng
, Xiaoyu Ji
, Yi-Chao Chen
:
On Tracing Screen Photos - A Moiré Pattern-Based Approach. 2068-2084 - Lei Zhou
, Fengwei Zhang
, Kevin Leach
, Xuhua Ding
, Zhenyu Ning
, Guojun Wang
, Jidong Xiao
:
Hardware-Assisted Live Kernel Function Updating on Intel Platforms. 2085-2098 - Wei Li
, Borui Yang
, Hangyu Ye
, Liyao Xiang
, Qingxiao Tao
, Xinbing Wang
, Chenghu Zhou
:
MiniTracker: Large-Scale Sensitive Information Tracking in Mini Apps. 2099-2114 - Hora Saadaat Pishbin
, Amir Jalaly Bidgoly
:
Exploiting Deep Neural Networks as Covert Channels. 2115-2126 - Mordechai Guri
:
Air-Gap Electromagnetic Covert Channel. 2127-2144 - Chunqiang Hu
, Zewei Liu
, Ruinian Li
, Pengfei Hu
, Tao Xiang
, Meng Han
:
Smart Contract Assisted Privacy-Preserving Data Aggregation and Management Scheme for Smart Grid. 2145-2161 - Ahmet Kurt
, Enes Erdin
, Kemal Akkaya
, A. Selcuk Uluagac
, Mumin Cebe
:
D-LNBot: A Scalable, Cost-Free and Covert Hybrid Botnet on Bitcoin's Lightning Network. 2162-2180 - Anh-Tu Hoang
, Barbara Carminati
, Elena Ferrari
:
Protecting Privacy in Knowledge Graphs With Personalized Anonymization. 2181-2193 - Peter Kietzmann
, Thomas C. Schmidt
, Matthias Wählisch
:
PUF for the Commons: Enhancing Embedded Security on the OS Level. 2194-2210 - Yebo Feng
, Jun Li
, Devkishen Sisodia
, Peter L. Reiher
:
On Explainable and Adaptable Detection of Distributed Denial-of-Service Traffic. 2211-2226 - Shashank Arora
, Pradeep K. Atrey
:
SecureC2Edit: A Framework for Secure Collaborative and Concurrent Document Editing. 2227-2241 - Yuan Gao
, Liquan Chen
, Jinguang Han
, Shui Yu
, Huiyu Fang
:
Similarity-Based Secure Deduplication for IIoT Cloud Management System. 2242-2256 - Chenhao Lin
, Tianle Song
, Yingmao Miao
, Jingyi He
, Minghui Yang
, Huan Wang
, Chao Shen
:
ChildShield: An Implicit and Continuous Child Identification System on Smartphones. 2257-2272 - Fendy Santoso
, Anthony Finn
:
Trusted Operations of a Military Ground Robot in the Face of Man-in-the-Middle Cyberattacks Using Deep Learning Convolutional Neural Networks: Real-Time Experimental Outcomes. 2273-2284 - Jiating Ma
, Yipeng Zhou
, Laizhong Cui
, Song Guo
:
An Optimized Sparse Response Mechanism for Differentially Private Federated Learning. 2285-2295 - Yong-Feng Ge
, Hua Wang
, Elisa Bertino
, Zhi-Hui Zhan
, Jinli Cao
, Yanchun Zhang
, Jun Zhang
:
Evolutionary Dynamic Database Partitioning Optimization for Privacy and Utility. 2296-2311 - Omid Mir
, Daniel Slamanig
, René Mayrhofer:
Threshold Delegatable Anonymous Credentials With Controlled and Fine-Grained Delegation. 2312-2326 - Ming Gao
, Fu Xiao
, Wentao Guo
, Zixin Lin
, Weiran Liu
, Jinsong Han
:
Practical EMI Attacks on Smartphones With Users' Commands Cancelled. 2327-2343 - Yongquan Fu
, Weihong Han
, Dong Yuan
:
Disentangled Orchestration on Cyber Ranges. 2344-2360 - Yinbin Miao, Ziteng Liu
, Xinghua Li
, Meng Li
, Hongwei Li
, Kim-Kwang Raymond Choo
, Robert H. Deng
:
Robust Asynchronous Federated Learning With Time-Weighted and Stale Model Aggregation. 2361-2375 - Hui Sun
, Tianqing Zhu
, Jie Li
, Shouling Ji
, Wanlei Zhou
:
Attribute-Based Membership Inference Attacks and Defenses on GANs. 2376-2393 - Jan Butora
, Pauline Puteaux
, Patrick Bas
:
Errorless Robust JPEG Steganography Using Outputs of JPEG Coders. 2394-2406 - Zhiyi Tian
, Lei Cui
, Chenhan Zhang
, Shuaishuai Tan
, Shui Yu
, Yonghong Tian
:
The Role of Class Information in Model Inversion Attacks Against Image Deep Learning Classifiers. 2407-2420 - Libo Chen
, Yanhao Wang
, Jiaqi Linghu
, Qinsheng Hou
, Quanpu Cai
, Shanqing Guo
, Zhi Xue
:
SaTC: Shared-Keyword Aware Taint Checking for Detecting Bugs in Embedded Systems. 2421-2433 - Shengyu Li
, Songfan Li
, Qingqing Liu, Yihang Song, Chong Zhang
, Li Lu
:
Watch Out Your Thumb Drive: Covert Data Theft From Portable Data Storage via Backscatter. 2434-2447 - Xiaoping Liang
, Zhenjun Tang
, Xianquan Zhang
, Mengzhu Yu
, Xinpeng Zhang
:
Robust Hashing With Local Tangent Space Alignment for Image Copy Detection. 2448-2460 - Ganapathy Mani
, Myeongsu Kim
, Bharat K. Bhargava
, Pelin Angin
, Ayça Deniz, Vikram Pasumarti
:
Malware Speaks! Deep Learning Based Assembly Code Processing for Detecting Evasive Cryptojacking. 2461-2477 - Mohammad M. Jalalzai
, Jianyu Niu
, Chen Feng
, Fangyu Gai
:
Fast-HotStuff: A Fast and Robust BFT Protocol for Blockchains. 2478-2493 - Wei Tong
, Jiacheng Niu
, Jingyu Hua
, Qun Li
, Sheng Zhong
:
Scalable Differentially Private Model Publishing Via Private Iterative Sample Selection. 2494-2506 - Quanjun Zhang
, Chunrong Fang
, Bowen Yu
, Weisong Sun
, Tongke Zhang
, Zhenyu Chen
:
Pre-Trained Model-Based Automated Software Vulnerability Repair: How Far are We? 2507-2525 - Luca Maria Castiglione
, Emil C. Lupu
:
Which Attacks Lead to Hazards? Combining Safety and Security Analysis for Cyber-Physical Systems. 2526-2540 - Shuhua Deng
, Wenjie Dai
, Xian Qing
, Xieping Gao
:
Vulnerabilities in SDN Topology Discovery Mechanism: Novel Attacks and Countermeasures. 2541-2551 - Yuanfei Li
, Xiong Li
, Xiangyang Luo
, Zhetao Li
, Hongwei Li
, Xiaosong Zhang
:
AnotherMe: A Location Privacy Protection System Based on Online Virtual Trajectory Generation. 2552-2567 - Aoting Hu
, Zhigang Lu
, Renjie Xie
, Minhui Xue
:
${\sf VeriDIP}$VeriDIP: Verifying Ownership of Deep Neural Networks Through Privacy Leakage Fingerprints. 2568-2584 - Rui Shi
, Yang Yang
, Yingjiu Li
, Huamin Feng
, Guozhen Shi
, HweeHwa Pang
, Robert H. Deng
:
Double Issuer-Hiding Attribute-Based Credentials From Tag-Based Aggregatable Mercurial Signatures. 2585-2602 - Yizhong Liu
, Xinxin Xing
, Ziheng Tong
, Xun Lin
, Jing Chen
, Zhenyu Guan
, Qianhong Wu
, Willy Susilo
:
Secure and Scalable Cross-Domain Data Sharing in Zero-Trust Cloud-Edge-End Environment Based on Sharding Blockchain. 2603-2618 - Junren Qin
, Shanxiang Lyu
, Jiarui Deng
, Xingyuan Liang
, Shijun Xiang
, Hao Chen
:
A Lattice-Based Embedding Method for Reversible Audio Watermarking. 2619-2630 - Daniel Oliveira
, Edoardo Giusto
, Betis Baheri
, Qiang Guan
, Bartolomeo Montrucchio
, Paolo Rech
:
A Systematic Methodology to Compute the Quantum Vulnerability Factors for Quantum Circuits. 2631-2644 - Hongwei Yao
, Zheng Li, Kunzhe Huang
, Jian Lou, Zhan Qin
, Kui Ren
:
RemovalNet: DNN Fingerprint Removal Attacks. 2645-2658 - Ruben de Smet
, Kris Steenhaut
, An Braeken
:
Private Electronic Road Pricing Using Bulletproofs With Vector Commitments. 2659-2671 - Xueluan Gong
, Zheng Fang
, Bowen Li
, Tao Wang
, Yanjiao Chen
, Qian Wang
:
Palette: Physically-Realizable Backdoor Attacks Against Video Recognition Models. 2672-2685 - Dohyun Ryu
, Yerim Kim
, Junbeom Hur
:
$\gamma$γ-Knife: Extracting Neural Network Architecture Through Software-Based Power Side-Channel. 2686-2703 - Ruiqi Lu
, Guoqi Xie
, Renfa Li
, Wei Xu
, Jianmei Lei
:
TrinitySec: Trinity-Enabled and Lightweight Security Framework for CAN-FD Communication. 2704-2719 - Anxiao He
, Kai Bu
, Jiongrui Huang
, Yifei Pang
, Qianping Gu
, Kui Ren
:
SwiftParade: Anti-Burst Multipath Validation. 2720-2734 - Mahendra Rathor
, Aditya Anshul
, Anirban Sengupta
:
Securing Reusable IP Cores Using Voice Biometric Based Watermark. 2735-2749 - Yunguo Guan
, Rongxing Lu
, Songnian Zhang
, Yandong Zheng
, Jun Shao
, Guiyi Wei
:
$k$kTCQ: Achieving Privacy-Preserving $k$k-Truss Community Queries Over Outsourced Data. 2750-2765 - Chun-I Fan
, Arijit Karati
, Shou-Li Wu:
A Privacy-Aware Provably Secure Smart Card Authentication Protocol Based on Physically Unclonable Functions. 2766-2778 - Junsong Fu
, Shuai Xiong
, Na Wang
, Ruiping Ren
, Ang Zhou
, Bharat K. Bhargava
:
A Framework of High-Speed Network Protocol Fuzzing Based on Shared Memory. 2779-2798 - Momen Oqaily
, Mohammad Ekramul Kabir
, Suryadipta Majumdar
, Yosr Jarraya
, Mengyuan Zhang
, Makan Pourzandi, Lingyu Wang
, Mourad Debbabi
:
iCAT+: An Interactive Customizable Anonymization Tool Using Automated Translation Through Deep Learning. 2799-2817 - Chafika Benzaïd
, Tarik Taleb
, Ashkan Sami
, Othmane Hireche
:
FortisEDoS: A Deep Transfer Learning-Empowered Economical Denial of Sustainability Detection Framework for Cloud-Native Network Slicing. 2818-2835 - Xianhao Tian
, Peijia Zheng
, Jiwu Huang
:
Secure Deep Learning Framework for Moving Object Detection in Compressed Video. 2836-2851 - Yuan Yao
, Junjiang He
, Tao Li, Yunpeng Wang, Xiaolong Lan, Yuan Li:
An Automatic XSS Attack Vector Generation Method Based on the Improved Dueling DDQN Algorithm. 2852-2868 - Peter Rot
, Klemen Grm
, Peter Peer
, Vitomir Struc
:
PrivacyProber: Assessment and Detection of Soft-Biometric Privacy-Enhancing Techniques. 2869-2887 - Liang Xi
, Dehua Miao
, Menghan Li
, Ruidong Wang
, Han Liu
, Xunhua Huang
:
Adaptive-Correlation-Aware Unsupervised Deep Learning for Anomaly Detection in Cyber-Physical Systems. 2888-2899 - Yan Meng
, Jiachun Li
, Haojin Zhu
, Yuan Tian
, Jiming Chen
:
Privacy-Preserving Liveness Detection for Securing Smart Voice Interfaces. 2900-2916 - Haider Abbas
, Muhammad Shahzad
, Maliha Safdar
, Ahmed Hemani
:
DUDE: Decryption, Unpacking, Deobfuscation, and Endian Conversion Framework for Embedded Devices Firmware. 2917-2929 - Pasika Ranaweera
, Awaneesh Kumar Yadav
, Madhusanka Liyanage
, Anca Delia Jurcut
:
A Novel Authentication Protocol for 5G gNodeBs in Service Migration Scenarios of MEC. 2930-2948 - Kane Walter
, Meisam Mohammady
, Surya Nepal
, Salil S. Kanhere
:
Optimally Mitigating Backdoor Attacks in Federated Learning. 2949-2963 - Yang Shi
, Tianyuan Luo
, Jingwen Liang
, Man Ho Au, Xiapu Luo:
Obfuscating Verifiable Random Functions for Proof-of-Stake Blockchains. 2982-2996 - Hao Huang
, Patrick Wlazlo, Abhijeet Sahu
, Adele Walker, Ana E. Goulart
, Katherine R. Davis
, Laura P. Swiler
, Thomas D. Tarman
, Eric D. Vugrin
:
Validating an Emulation-Based Cybersecurity Model With a Physical Testbed. 2997-3011 - Hongsheng Hu
, Xuyun Zhang
, Zoran Salcic
, Lichao Sun
, Kim-Kwang Raymond Choo
, Gillian Dobbie
:
Source Inference Attacks: Beyond Membership Inference Attacks in Federated Learning. 3012-3029 - Tara Salman
, Ali Ghubaish
, Roberto Di Pietro
, Mohamed Baza
, Hani Alshahrani
, Raj Jain
, Kim-Kwang Raymond Choo
:
CrowdFAB: Intelligent Crowd-Forecasting Using Blockchains and its Use in Security. 3030-3047 - Chuan Yu
, Shuhui Chen
, Ziling Wei
, Fei Wang
:
Toward a Truly Secure Telecom Network: Analyzing and Exploiting Vulnerable Security Configurations/ Implementations in Commercial LTE/IMS Networks. 3048-3064 - Feng Lin
, Chao Wang
, Tiantian Liu
, Ziwei Liu
, Yijie Shen
, Zhongjie Ba
, Li Lu
, Wenyao Xu
, Kui Ren
:
High-Quality Speech Recovery Through Soundproof Protections via mmWave Sensing. 3065-3081 - Giorgos Vasiliadis
, Apostolos Karampelas, Alexandros Shevtsov
, Panagiotis Papadopoulos
, Sotiris Ioannidis, Alexandros Kapravelos
:
WRIT: Web Request Integrity and Attestation Against Malicious Browser Extensions. 3082-3095 - Pranav Jangir
, Nishat Koti
, Varsha Bhat Kukkala
, Arpita Patra
, Bhavish Raj Gopal
, Somya Sangal
:
Vogue: Faster Computation of Private Heavy Hitters. 3096-3108 - Yibiao Lu
, Bingsheng Zhang
, Kui Ren
:
Maliciously Secure MPC From Semi-Honest 2PC in the Server-Aided Model. 3109-3125 - Man Zhang
, Xinghua Li
, Yanbing Ren
, Bin Luo
, Yinbin Miao, Ximeng Liu
, Robert H. Deng
:
Privacy-Preserved Data Trading Via Verifiable Data Disturbance. 3126-3140 - Carlton Shepherd
, Jan Kalbantner
, Benjamin Semal
, Konstantinos Markantonakis
:
A Side-Channel Analysis of Sensor Multiplexing for Covert Channels and Application Profiling on Mobile Devices. 3141-3152 - Mayana Pereira
, Rahul Dodhia
, Hyrum Anderson
, Richard Brown
:
Metadata-Based Detection of Child Sexual Abuse Material. 3153-3164 - Zhan Shu
, Guanhua Yan
:
EAGLE: Evasion Attacks Guided by Local Explanations Against Android Malware Classification. 3165-3182 - Dola Das
, Kazi Md. Rokibul Alam
, Yasuhiko Morimoto
:
An Anonymity Retaining Framework for Multi-party Skyline Queries Based on Unique Tags. 3183-3195 - Bin Yuan
, Maogen Yang
, Zheng Xu
, Qunjinming Chen
, Zhanxiang Song
, Zhen Li
, Deqing Zou
, Hai Jin
:
Leakage of Authorization-Data in IoT Device Sharing: New Attacks and Countermeasure. 3196-3210 - Jiacheng Gao
, Yuan Zhang
, Sheng Zhong
:
Revisiting Privacy-Preserving Min and k-th Min Protocols for Mobile Sensing. 3211-3226 - Ning Lu
, Ruxiao Huang
, Mingliang Yao
, Wenbo Shi, Kim-Kwang Raymond Choo:
V-Digger: An Efficient and Secure Vulnerability Assessment for Large-Scale ISP Network. 3227-3246 - Yinbin Miao
, Feng Li
, Xiaohua Jia
, Huaxiong Wang
, Ximeng Liu
, Kim-Kwang Raymond Choo
, Robert H. Deng
:
REKS: Role-Based Encrypted Keyword Search With Enhanced Access Control for Outsourced Cloud Data. 3247-3261 - Rakin Muhammad Shadab
, Yu Zou
, Sanjay Gandham
, Amro Awad
, Mingjie Lin
:
A Secure Computing System With Hardware-Efficient Lazy Bonsai Merkle Tree for FPGA-Attached Embedded Memory. 3262-3279 - Yipeng Zhou
, Runze Wang
, Jiahao Liu
, Di Wu
, Shui Yu
, Yonggang Wen
:
Exploring the Practicality of Differentially Private Federated Learning: A Local Iteration Tuning Approach. 3280-3294 - Yan Jiang
, Xiaoyu Ji
, Juchuan Zhang
, Yancheng Jiang
, Shui Jiang
, Wenyuan Xu
:
CapSpeaker: Injecting Commands to Voice Assistants Via Capacitors. 3295-3308 - Yan Jiang
, Xiaoyu Ji
, Kai Wang
, Chen Yan
, Richard Mitev
, Ahmad-Reza Sadeghi
, Wenyuan Xu:
Marionette: Manipulate Your Touchscreen via a Charging Cable. 3309-3323 - Lihong Tang
, Xiao Chen
, Sheng Wen
, Li Li
, Marthie Grobler
, Yang Xiang
:
Demystifying the Evolution of Android Malware Variants. 3324-3341 - Lo-Yao Yeh
, Wan-Hsin Hsu
, Chih-Ya Shen
:
GDPR-Compliant Personal Health Record Sharing Mechanism With Redactable Blockchain and Revocable IPFS. 3342-3356 - Mohammed Alsadi
, Matthew Casey
, Constantin Catalin Dragan
, François Dupressoir, Luke Riley
, Muntadher Sallal
, Steve Schneider
, Helen Treharne
, Joe Wadsworth, Phil Wright:
Towards End-to-End Verifiable Online Voting: Adding Verifiability to Established Voting Systems. 3357-3374 - Lingyuan Yin
, Jing Xu
, Kaitai Liang
, Zhenfeng Zhang:
Sidechains With Optimally Succinct Proof. 3375-3389 - Guodong Cao
, Zhibo Wang
, Yunhe Feng
, Xiaowei Dong
, Zhifei Zhang
, Zhan Qin
, Kui Ren
:
Task-Free Fairness-Aware Bias Mitigation for Black-Box Deployed Models. 3390-3405 - Zhuo Chen
, Lei Wu
, Yubo Hu
, Jing Cheng
, Yufeng Hu
, Yajin Zhou
, Zhushou Tang
, Yexuan Chen
, Jinku Li
, Kui Ren
:
Lifting the Grey Curtain: Analyzing the Ecosystem of Android Scam Apps. 3406-3421 - Jiahui Hou
, Dongxiao Liu
, Cheng Huang
, Weihua Zhuang
, Xuemin Shen
, Rob Sun, Bidi Ying:
Data Protection: Privacy-Preserving Data Collection With Validation. 3422-3438 - Chuan Zhang
, Mingyang Zhao
, Jinwen Liang
, Qing Fan
, Liehuang Zhu
, Song Guo
:
NANO: Cryptographic Enforcement of Readability and Editability Governance in Blockchain Databases. 3439-3452 - Tingting Yin
, Zicong Gao
, Zhenghang Xiao
, Zheyu Ma
, Min Zheng
, Chao Zhang
:
KextFuzz: A Practical Fuzzer for macOS Kernel EXTensions on Apple Silicon. 3453-3468 - Chun Liu
, Xuexian Hu
, Xiaofeng Chen
, Jianghong Wei
, Wenfen Liu
:
SDIM: A Subtly Designed Invertible Matrix for Enhanced Privacy-Preserving Outsourcing Matrix Multiplication and Related Tasks. 3469-3486 - Dawei Li
, Di Liu
, Yangkun Ren
, Yu Sun
, Zhenyu Guan
, Qianhong Wu
, Jiankun Hu
, Jianwei Liu
:
CPAKA: Mutual Authentication and Key Agreement Scheme Based on Conditional PUF in Space-Air-Ground Integrated Network. 3487-3500 - Dingding Wang
, Muhui Jiang
, Rui Chang
, Yajin Zhou
, Hexiang Wang
, Baolei Hou
, Lei Wu
, Xiapu Luo
:
An Empirical Study on the Insecurity of End-of-Life (EoL) IoT Devices. 3501-3514 - Jiansong Zhang
, Kejiang Chen
, Chuan Qin
, Weiming Zhang
, Nenghai Yu
:
AAS: Automatic Virtual Data Augmentation for Deep Image Steganalysis. 3515-3527 - Tao Jiang
, Xu Yuan
, Qiong Cheng
, Yulong Shen
, Liangmin Wang
, Jianfeng Ma
:
FairECom: Towards Proof of E-Commerce Fairness Against Price Discrimination. 3528-3544 - Mingyang Song
, Zhongyun Hua
, Yifeng Zheng
, Tao Xiang
, Xiaohua Jia
:
Enabling Transparent Deduplication and Auditing for Encrypted Data in Cloud. 3545-3561 - Jämes Ménétrey, Marcelo Pasin
, Pascal Felber
, Valerio Schiavoni
, Giovanni Mazzeo
, Arne Hollum
, Darshan Vaydia
:
A Comprehensive Trusted Runtime for WebAssembly With Intel SGX. 3562-3579 - Cheng Wang
, Hao Tang
, Hangyu Zhu
, Changjun Jiang
:
Collaborative Prediction in Anti-Fraud System Over Multiple Credit Loan Platforms. 3580-3596 - Feng Liu
, Kaiping Xue
, Jinjiang Yang
, Jing Zhang
, Zixuan Huang
, Jian Li
, David S. L. Wei
:
Volume-Hiding Range Searchable Symmetric Encryption for Large-Scale Datasets. 3597-3609 - Zheng Yang
, Chenglu Jin
, Xuelian Cao
, Marten van Dijk
, Jianying Zhou
:
Optimizing Proof of Aliveness in Cyber-Physical Systems. 3610-3628 - Minghui Min
, Haopeng Zhu
, Jiahao Ding
, Shiyin Li
, Liang Xiao
, Miao Pan
, Zhu Han
:
Personalized 3D Location Privacy Protection With Differential and Distortion Geo-Perturbation. 3629-3643 - Lunzhi Deng
, Shuai Feng
, Tao Wang
, Zhenyu Hu
, Siwei Li
:
Identity-Based Data Auditing Scheme With Provable Security in the Standard Model Suitable for Cloud Storage. 3644-3655 - Zongyang Zhang
, Weihan Li
, Ximeng Liu
, Xin Chen
, Qihang Peng
:
Ligerolight: Optimized IOP-Based Zero-Knowledge Argument for Blockchain Scalability. 3656-3670 - Ying Miao
, Keke Gai
, Liehuang Zhu
, Kim-Kwang Raymond Choo
, Jaideep Vaidya
:
Blockchain-Based Shared Data Integrity Auditing and Deduplication. 3688-3703 - Yadong Xie
, Fan Li
, Yue Wu
, Yu Wang
:
User Authentication on Earable Devices via Bone-Conducted Occlusion Sounds. 3704-3718 - Sajid Hussain
, Hui Guo
, Tuo Li
, Sri Parameswaran
:
MP-ORAM: A Novel ORAM Design for Multicore Processor Systems. 3719-3733 - Yushi Cheng
, Xiaoyu Ji
, Wenjun Zhu
, Shibo Zhang
, Kevin Fu
, Wenyuan Xu
:
Adversarial Computer Vision via Acoustic Manipulation of Camera Sensors. 3734-3750 - Jinke Song, Qiang Li, Haining Wang, Jiqiang Liu:
PKVIC: Supplement Missing Software Package Information in Security Vulnerability Reports. 3785-3800
![](https://dblp.org/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.