Search dblp for Publications

export results for "stream:streams/conf/scisec:"

 download as .bib file

@inproceedings{DBLP:conf/scisec/AnWLLL23,
  author       = {Zhuo An and
                  Mingsheng Wang and
                  Dongdong Liu and
                  Taotao Li and
                  Qiang Lai},
  editor       = {Moti Yung and
                  Chao Chen and
                  Weizhi Meng},
  title        = {Hydra: An Efficient Asynchronous DAG-Based {BFT} Protocol},
  booktitle    = {Science of Cyber Security - 5th International Conference, SciSec 2023,
                  Melbourne, VIC, Australia, July 11-14, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14299},
  pages        = {439--459},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-45933-7\_26},
  doi          = {10.1007/978-3-031-45933-7\_26},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/AnWLLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/CaiCL23,
  author       = {Weixia Cai and
                  Huashan Chen and
                  Feng Liu},
  editor       = {Moti Yung and
                  Chao Chen and
                  Weizhi Meng},
  title        = {Keeping Your Enemies Closer: Shedding Light on the Attacker's Optimal
                  Strategy},
  booktitle    = {Science of Cyber Security - 5th International Conference, SciSec 2023,
                  Melbourne, VIC, Australia, July 11-14, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14299},
  pages        = {42--59},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-45933-7\_3},
  doi          = {10.1007/978-3-031-45933-7\_3},
  timestamp    = {Wed, 06 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/CaiCL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/ChenMW23,
  author       = {Kaiming Chen and
                  Atsuko Miyaji and
                  Yuntao Wang},
  editor       = {Moti Yung and
                  Chao Chen and
                  Weizhi Meng},
  title        = {Privacy-Enhanced Anonymous and Deniable Post-quantum {X3DH}},
  booktitle    = {Science of Cyber Security - 5th International Conference, SciSec 2023,
                  Melbourne, VIC, Australia, July 11-14, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14299},
  pages        = {157--177},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-45933-7\_10},
  doi          = {10.1007/978-3-031-45933-7\_10},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/ChenMW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/GaoZ23,
  author       = {Zongning Gao and
                  Shunliang Zhang},
  editor       = {Moti Yung and
                  Chao Chen and
                  Weizhi Meng},
  title        = {Research on Encrypted Malicious 5G Access Network Traffic Identification
                  Based on Deep Learning},
  booktitle    = {Science of Cyber Security - 5th International Conference, SciSec 2023,
                  Melbourne, VIC, Australia, July 11-14, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14299},
  pages        = {496--512},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-45933-7\_29},
  doi          = {10.1007/978-3-031-45933-7\_29},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/GaoZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/GuoWP23,
  author       = {Fusen Guo and
                  Jianzhang Wu and
                  Lei Pan},
  editor       = {Moti Yung and
                  Chao Chen and
                  Weizhi Meng},
  title        = {An Empirical Study of {AI} Model's Performance for Electricity Load
                  Forecasting with Extreme Weather Conditions},
  booktitle    = {Science of Cyber Security - 5th International Conference, SciSec 2023,
                  Melbourne, VIC, Australia, July 11-14, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14299},
  pages        = {193--204},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-45933-7\_12},
  doi          = {10.1007/978-3-031-45933-7\_12},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/GuoWP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/HeZFS23,
  author       = {Pengju He and
                  Haibo Zhang and
                  Yaokai Feng and
                  Kouichi Sakurai},
  editor       = {Moti Yung and
                  Chao Chen and
                  Weizhi Meng},
  title        = {A Design of Network Attack Detection Using Causal and Non-causal Temporal
                  Convolutional Network},
  booktitle    = {Science of Cyber Security - 5th International Conference, SciSec 2023,
                  Melbourne, VIC, Australia, July 11-14, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14299},
  pages        = {513--523},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-45933-7\_30},
  doi          = {10.1007/978-3-031-45933-7\_30},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/HeZFS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/LeGrowKA23,
  author       = {Jason T. LeGrow and
                  Brian Koziel and
                  Reza Azarderakhsh},
  editor       = {Moti Yung and
                  Chao Chen and
                  Weizhi Meng},
  title        = {Multiprime Strategies for Serial Evaluation of eSIDH-Like Isogenies},
  booktitle    = {Science of Cyber Security - 5th International Conference, SciSec 2023,
                  Melbourne, VIC, Australia, July 11-14, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14299},
  pages        = {347--366},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-45933-7\_21},
  doi          = {10.1007/978-3-031-45933-7\_21},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/LeGrowKA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/LiCSD23,
  author       = {Jinyang Li and
                  Zhenfu Cao and
                  Jiachen Shen and
                  Xiaolei Dong},
  editor       = {Moti Yung and
                  Chao Chen and
                  Weizhi Meng},
  title        = {{MCVDSSE:} Secure Multi-client Verifiable Dynamic Symmetric Searchable
                  Encryption},
  booktitle    = {Science of Cyber Security - 5th International Conference, SciSec 2023,
                  Melbourne, VIC, Australia, July 11-14, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14299},
  pages        = {85--96},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-45933-7\_5},
  doi          = {10.1007/978-3-031-45933-7\_5},
  timestamp    = {Wed, 06 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/LiCSD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/LiYW23,
  author       = {Xiuxiu Li and
                  Wei Yu and
                  Kunpeng Wang},
  editor       = {Moti Yung and
                  Chao Chen and
                  Weizhi Meng},
  title        = {Implementation of the Elliptic Curve Method},
  booktitle    = {Science of Cyber Security - 5th International Conference, SciSec 2023,
                  Melbourne, VIC, Australia, July 11-14, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14299},
  pages        = {115--126},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-45933-7\_7},
  doi          = {10.1007/978-3-031-45933-7\_7},
  timestamp    = {Wed, 06 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/LiYW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/LiYWL23,
  author       = {Xiuxiu Li and
                  Wei Yu and
                  Kunpeng Wang and
                  Luying Li},
  editor       = {Moti Yung and
                  Chao Chen and
                  Weizhi Meng},
  title        = {Almost Injective and Invertible Encodings for Jacobi Quartic Curves},
  booktitle    = {Science of Cyber Security - 5th International Conference, SciSec 2023,
                  Melbourne, VIC, Australia, July 11-14, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14299},
  pages        = {127--138},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-45933-7\_8},
  doi          = {10.1007/978-3-031-45933-7\_8},
  timestamp    = {Wed, 06 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/LiYWL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/LuoCSD23,
  author       = {Kaifeng Luo and
                  Zhenfu Cao and
                  Jiachen Shen and
                  Xiaolei Dong},
  editor       = {Moti Yung and
                  Chao Chen and
                  Weizhi Meng},
  title        = {{SVFL:} Secure Vertical Federated Learning on Linear Models},
  booktitle    = {Science of Cyber Security - 5th International Conference, SciSec 2023,
                  Melbourne, VIC, Australia, July 11-14, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14299},
  pages        = {332--344},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-45933-7\_20},
  doi          = {10.1007/978-3-031-45933-7\_20},
  timestamp    = {Wed, 06 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/LuoCSD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/MaLXWLZ23,
  author       = {Bin Ma and
                  Kun Li and
                  Jian Xu and
                  Chunpeng Wang and
                  Jian Li and
                  Liwei Zhang},
  editor       = {Moti Yung and
                  Chao Chen and
                  Weizhi Meng},
  title        = {Enhancing the Anti-steganalysis Ability of Image Steganography via
                  Multiple Adversarial Networks},
  booktitle    = {Science of Cyber Security - 5th International Conference, SciSec 2023,
                  Melbourne, VIC, Australia, July 11-14, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14299},
  pages        = {181--192},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-45933-7\_11},
  doi          = {10.1007/978-3-031-45933-7\_11},
  timestamp    = {Wed, 06 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/MaLXWLZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/MaTXWLZ23,
  author       = {Bin Ma and
                  Zhongquan Tao and
                  Jian Xu and
                  Chunpeng Wang and
                  Jian Li and
                  Liwei Zhang},
  editor       = {Moti Yung and
                  Chao Chen and
                  Weizhi Meng},
  title        = {A Robust Reversible Data Hiding Algorithm Based on Polar Harmonic
                  Fourier Moments},
  booktitle    = {Science of Cyber Security - 5th International Conference, SciSec 2023,
                  Melbourne, VIC, Australia, July 11-14, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14299},
  pages        = {386--397},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-45933-7\_23},
  doi          = {10.1007/978-3-031-45933-7\_23},
  timestamp    = {Wed, 06 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/MaTXWLZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/MaWXWLL23,
  author       = {Bin Ma and
                  Songkun Wang and
                  Jian Xu and
                  Chunpeng Wang and
                  Jian Li and
                  Xiaolong Li},
  editor       = {Moti Yung and
                  Chao Chen and
                  Weizhi Meng},
  title        = {A Multi-level Sorting Prediction Enhancement-Based Two-Dimensional
                  Reversible Data Hiding Algorithm for {JPEG} Images},
  booktitle    = {Science of Cyber Security - 5th International Conference, SciSec 2023,
                  Melbourne, VIC, Australia, July 11-14, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14299},
  pages        = {481--495},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-45933-7\_28},
  doi          = {10.1007/978-3-031-45933-7\_28},
  timestamp    = {Wed, 06 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/MaWXWLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/MiaoBTLWCLS23,
  author       = {Han Miao and
                  Huaifeng Bao and
                  Zixian Tang and
                  Wenhao Li and
                  Wen Wang and
                  Huashan Chen and
                  Feng Liu and
                  Yanhui Sun},
  editor       = {Moti Yung and
                  Chao Chen and
                  Weizhi Meng},
  title        = {AST2Vec: {A} Robust Neural Code Representation for Malicious PowerShell
                  Detection},
  booktitle    = {Science of Cyber Security - 5th International Conference, SciSec 2023,
                  Melbourne, VIC, Australia, July 11-14, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14299},
  pages        = {207--224},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-45933-7\_13},
  doi          = {10.1007/978-3-031-45933-7\_13},
  timestamp    = {Wed, 06 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/MiaoBTLWCLS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/PengXLTT23,
  author       = {Chunying Peng and
                  Haixia Xu and
                  Huimei Liao and
                  Jinling Tang and
                  Tao Tang},
  editor       = {Moti Yung and
                  Chao Chen and
                  Weizhi Meng},
  title        = {Redactable Blockchain in the Permissioned Setting},
  booktitle    = {Science of Cyber Security - 5th International Conference, SciSec 2023,
                  Melbourne, VIC, Australia, July 11-14, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14299},
  pages        = {460--477},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-45933-7\_27},
  doi          = {10.1007/978-3-031-45933-7\_27},
  timestamp    = {Thu, 16 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/PengXLTT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/QinL23,
  author       = {Xinyuan Qin and
                  Wenjuan Li},
  editor       = {Moti Yung and
                  Chao Chen and
                  Weizhi Meng},
  title        = {A Graphical Password Scheme Based on Rounded Image Selection},
  booktitle    = {Science of Cyber Security - 5th International Conference, SciSec 2023,
                  Melbourne, VIC, Australia, July 11-14, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14299},
  pages        = {97--114},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-45933-7\_6},
  doi          = {10.1007/978-3-031-45933-7\_6},
  timestamp    = {Wed, 06 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/QinL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/RenJY23,
  author       = {Mengxia Ren and
                  Joshua Josey and
                  Chuan Yue},
  editor       = {Moti Yung and
                  Chao Chen and
                  Weizhi Meng},
  title        = {WebMea: {A} Google Chrome Extension for Web Security and Privacy Measurement
                  Studies},
  booktitle    = {Science of Cyber Security - 5th International Conference, SciSec 2023,
                  Melbourne, VIC, Australia, July 11-14, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14299},
  pages        = {305--318},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-45933-7\_18},
  doi          = {10.1007/978-3-031-45933-7\_18},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/RenJY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/RodriguezLGEAKX23,
  author       = {Rosana Monta{\~{n}}ez Rodriguez and
                  Theodore Tangie Longtchi and
                  Kora Gwartney and
                  Ekzhin Ear and
                  David P. Azari and
                  Christopher P. Kelley and
                  Shouhuai Xu},
  editor       = {Moti Yung and
                  Chao Chen and
                  Weizhi Meng},
  title        = {Quantifying Psychological Sophistication of Malicious Emails},
  booktitle    = {Science of Cyber Security - 5th International Conference, SciSec 2023,
                  Melbourne, VIC, Australia, July 11-14, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14299},
  pages        = {319--331},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-45933-7\_19},
  doi          = {10.1007/978-3-031-45933-7\_19},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/RodriguezLGEAKX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/RuanWLDY23,
  author       = {Wenwen Ruan and
                  Wenhao Wang and
                  Shuang Liu and
                  Ran Duan and
                  Shoumeng Yan},
  editor       = {Moti Yung and
                  Chao Chen and
                  Weizhi Meng},
  title        = {DomainIsolation: Lightweight Intra-enclave Isolation for Confidential
                  Virtual Machines},
  booktitle    = {Science of Cyber Security - 5th International Conference, SciSec 2023,
                  Melbourne, VIC, Australia, July 11-14, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14299},
  pages        = {23--41},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-45933-7\_2},
  doi          = {10.1007/978-3-031-45933-7\_2},
  timestamp    = {Thu, 07 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/RuanWLDY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/SunXSBKX23,
  author       = {Zheyuan Sun and
                  Maochao Xu and
                  Kristin M. Schweitzer and
                  Raymond M. Bateman and
                  Alexander Kott and
                  Shouhuai Xu},
  editor       = {Moti Yung and
                  Chao Chen and
                  Weizhi Meng},
  title        = {Cyber Attacks Against Enterprise Networks: Characterization, Modeling
                  and Forecasting},
  booktitle    = {Science of Cyber Security - 5th International Conference, SciSec 2023,
                  Melbourne, VIC, Australia, July 11-14, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14299},
  pages        = {60--81},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-45933-7\_4},
  doi          = {10.1007/978-3-031-45933-7\_4},
  timestamp    = {Wed, 06 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/SunXSBKX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/TrivediT23,
  author       = {Devharsh Trivedi and
                  Nikos Triandopoulos},
  editor       = {Moti Yung and
                  Chao Chen and
                  Weizhi Meng},
  title        = {VaultBox: Enhancing the Security and Effectiveness of Security Analytics},
  booktitle    = {Science of Cyber Security - 5th International Conference, SciSec 2023,
                  Melbourne, VIC, Australia, July 11-14, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14299},
  pages        = {401--422},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-45933-7\_24},
  doi          = {10.1007/978-3-031-45933-7\_24},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/TrivediT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/WangCALLMW23,
  author       = {Yipeng Wang and
                  Peixian Chen and
                  Shan Ai and
                  Weipeng Liang and
                  Binjie Liao and
                  Weichuan Mo and
                  Heng Wang},
  editor       = {Moti Yung and
                  Chao Chen and
                  Weizhi Meng},
  title        = {Two-Stage Anomaly Detection in {LEO} Satellite Network},
  booktitle    = {Science of Cyber Security - 5th International Conference, SciSec 2023,
                  Melbourne, VIC, Australia, July 11-14, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14299},
  pages        = {423--438},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-45933-7\_25},
  doi          = {10.1007/978-3-031-45933-7\_25},
  timestamp    = {Thu, 14 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/WangCALLMW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/WangDZ23,
  author       = {Peng Wang and
                  Guangxiang Dai and
                  Lidong Zhai},
  editor       = {Moti Yung and
                  Chao Chen and
                  Weizhi Meng},
  title        = {Event-Based Threat Intelligence Ontology Model},
  booktitle    = {Science of Cyber Security - 5th International Conference, SciSec 2023,
                  Melbourne, VIC, Australia, July 11-14, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14299},
  pages        = {261--282},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-45933-7\_16},
  doi          = {10.1007/978-3-031-45933-7\_16},
  timestamp    = {Wed, 06 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/WangDZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/WangLZYQJD23,
  author       = {Haiping Wang and
                  Binbin Li and
                  Tianning Zang and
                  Yifei Yang and
                  Zisen Qi and
                  Siyu Jia and
                  Yu Ding},
  editor       = {Moti Yung and
                  Chao Chen and
                  Weizhi Meng},
  title        = {Real-Time Aggregation for Massive Alerts Based on Dynamic Attack Granularity
                  Graph},
  booktitle    = {Science of Cyber Security - 5th International Conference, SciSec 2023,
                  Melbourne, VIC, Australia, July 11-14, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14299},
  pages        = {225--243},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-45933-7\_14},
  doi          = {10.1007/978-3-031-45933-7\_14},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/WangLZYQJD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/WangYXWYCH23,
  author       = {Xiaowei Wang and
                  Zimu Yuan and
                  Yang Xiao and
                  Liyan Wang and
                  Yican Yao and
                  Haiming Chen and
                  Wei Huo},
  editor       = {Moti Yung and
                  Chao Chen and
                  Weizhi Meng},
  title        = {Decompilation Based Deep Binary-Source Function Matching},
  booktitle    = {Science of Cyber Security - 5th International Conference, SciSec 2023,
                  Melbourne, VIC, Australia, July 11-14, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14299},
  pages        = {244--260},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-45933-7\_15},
  doi          = {10.1007/978-3-031-45933-7\_15},
  timestamp    = {Thu, 25 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/WangYXWYCH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/XiHZWF23,
  author       = {Ning Xi and
                  Yihuan He and
                  Yuchen Zhang and
                  Zhi Wang and
                  Pengbin Feng},
  editor       = {Moti Yung and
                  Chao Chen and
                  Weizhi Meng},
  title        = {ACDroid: Detecting Collusion Applications on Smart Devices},
  booktitle    = {Science of Cyber Security - 5th International Conference, SciSec 2023,
                  Melbourne, VIC, Australia, July 11-14, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14299},
  pages        = {3--22},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-45933-7\_1},
  doi          = {10.1007/978-3-031-45933-7\_1},
  timestamp    = {Wed, 06 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/XiHZWF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/ZamanTMLSXC23,
  author       = {Md Mahabub Uz Zaman and
                  Liangde Tao and
                  Mark Maldonado and
                  Chang Liu and
                  Ahmed Sunny and
                  Shouhuai Xu and
                  Lin Chen},
  editor       = {Moti Yung and
                  Chao Chen and
                  Weizhi Meng},
  title        = {Optimally Blending Honeypots into Production Networks: Hardness and
                  Algorithms},
  booktitle    = {Science of Cyber Security - 5th International Conference, SciSec 2023,
                  Melbourne, VIC, Australia, July 11-14, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14299},
  pages        = {285--304},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-45933-7\_17},
  doi          = {10.1007/978-3-031-45933-7\_17},
  timestamp    = {Wed, 06 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/ZamanTMLSXC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/ZanLX23,
  author       = {Yao Zan and
                  Hongda Li and
                  Haixia Xu},
  editor       = {Moti Yung and
                  Chao Chen and
                  Weizhi Meng},
  title        = {Adaptively Secure Constrained Verifiable Random Function},
  booktitle    = {Science of Cyber Security - 5th International Conference, SciSec 2023,
                  Melbourne, VIC, Australia, July 11-14, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14299},
  pages        = {367--385},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-45933-7\_22},
  doi          = {10.1007/978-3-031-45933-7\_22},
  timestamp    = {Wed, 06 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/ZanLX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/ZhangQZCJL23,
  author       = {Linkang Zhang and
                  Yunyang Qin and
                  Yujia Zhu and
                  Yifei Cheng and
                  Zhen Jie and
                  Qingyun Liu},
  editor       = {Moti Yung and
                  Chao Chen and
                  Weizhi Meng},
  title        = {SeeStar: An Efficient Starlink Asset Detection Framework},
  booktitle    = {Science of Cyber Security - 5th International Conference, SciSec 2023,
                  Melbourne, VIC, Australia, July 11-14, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14299},
  pages        = {139--156},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-45933-7\_9},
  doi          = {10.1007/978-3-031-45933-7\_9},
  timestamp    = {Wed, 06 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/ZhangQZCJL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/scisec/2023,
  editor       = {Moti Yung and
                  Chao Chen and
                  Weizhi Meng},
  title        = {Science of Cyber Security - 5th International Conference, SciSec 2023,
                  Melbourne, VIC, Australia, July 11-14, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14299},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-45933-7},
  doi          = {10.1007/978-3-031-45933-7},
  isbn         = {978-3-031-45932-0},
  timestamp    = {Wed, 06 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/AlkhattabiBMY22,
  author       = {Khalid Alkhattabi and
                  Davita Bird and
                  Kai Miller and
                  Chuan Yue},
  editor       = {Chunhua Su and
                  Kouichi Sakurai and
                  Feng Liu},
  title        = {Question Answering Models for Privacy Policies of Mobile Apps: Are
                  We There Yet?},
  booktitle    = {Science of Cyber Security - 4th International Conference, SciSec 2022,
                  Matsue, Japan, August 10-12, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13580},
  pages        = {333--352},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17551-0\_22},
  doi          = {10.1007/978-3-031-17551-0\_22},
  timestamp    = {Fri, 07 Oct 2022 16:33:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/AlkhattabiBMY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/BelarbiKCS22,
  author       = {Othmane Belarbi and
                  Aftab Khan and
                  Pietro Edoardo Carnelli and
                  Theodoros Spyridopoulos},
  editor       = {Chunhua Su and
                  Kouichi Sakurai and
                  Feng Liu},
  title        = {An Intrusion Detection System Based on Deep Belief Networks},
  booktitle    = {Science of Cyber Security - 4th International Conference, SciSec 2022,
                  Matsue, Japan, August 10-12, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13580},
  pages        = {377--392},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17551-0\_25},
  doi          = {10.1007/978-3-031-17551-0\_25},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/BelarbiKCS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/CastilloBC22,
  author       = {Jorge Castillo and
                  Kevin Barba and
                  Qian Chen},
  editor       = {Chunhua Su and
                  Kouichi Sakurai and
                  Feng Liu},
  title        = {ChainSCAN: {A} Blockchain-Based Supply Chain Alerting Framework for
                  Food Safety},
  booktitle    = {Science of Cyber Security - 4th International Conference, SciSec 2022,
                  Matsue, Japan, August 10-12, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13580},
  pages        = {3--20},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17551-0\_1},
  doi          = {10.1007/978-3-031-17551-0\_1},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/CastilloBC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/ChenJWJLW22,
  author       = {Xiao Chen and
                  Zhengwei Jiang and
                  Shuwei Wang and
                  Rongqi Jing and
                  Chen Ling and
                  Qiuyun Wang},
  editor       = {Chunhua Su and
                  Kouichi Sakurai and
                  Feng Liu},
  title        = {Malware Detected and Tell Me Why: An Verifiable Malware Detection
                  Model with Graph Metric Learning},
  booktitle    = {Science of Cyber Security - 4th International Conference, SciSec 2022,
                  Matsue, Japan, August 10-12, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13580},
  pages        = {302--314},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17551-0\_20},
  doi          = {10.1007/978-3-031-17551-0\_20},
  timestamp    = {Fri, 07 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/ChenJWJLW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/ChenW22,
  author       = {Tao Chen and
                  Kun Wen},
  editor       = {Chunhua Su and
                  Kouichi Sakurai and
                  Feng Liu},
  title        = {Feature Transfer Based Network Anomaly Detection},
  booktitle    = {Science of Cyber Security - 4th International Conference, SciSec 2022,
                  Matsue, Japan, August 10-12, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13580},
  pages        = {155--169},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17551-0\_10},
  doi          = {10.1007/978-3-031-17551-0\_10},
  timestamp    = {Fri, 07 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/ChenW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/Chien22,
  author       = {Hung{-}Yu Chien},
  editor       = {Chunhua Su and
                  Kouichi Sakurai and
                  Feng Liu},
  title        = {Design of End-To-End Security for {MQTT} 5.0},
  booktitle    = {Science of Cyber Security - 4th International Conference, SciSec 2022,
                  Matsue, Japan, August 10-12, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13580},
  pages        = {353--363},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17551-0\_23},
  doi          = {10.1007/978-3-031-17551-0\_23},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/Chien22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/CuiMZWZSZL22,
  author       = {Huajun Cui and
                  Guozhu Meng and
                  Yan Zhang and
                  Weiping Wang and
                  Dali Zhu and
                  Ting Su and
                  Xiaodong Zhang and
                  Yuejun Li},
  editor       = {Chunhua Su and
                  Kouichi Sakurai and
                  Feng Liu},
  title        = {TraceDroid: {A} Robust Network Traffic Analysis Framework for Privacy
                  Leakage in Android Apps},
  booktitle    = {Science of Cyber Security - 4th International Conference, SciSec 2022,
                  Matsue, Japan, August 10-12, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13580},
  pages        = {541--556},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17551-0\_35},
  doi          = {10.1007/978-3-031-17551-0\_35},
  timestamp    = {Thu, 13 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/CuiMZWZSZL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/DingZLXQQGJW22,
  author       = {Yu Ding and
                  Xiaoyu Zhang and
                  Binbin Li and
                  Jian Xing and
                  Qian Qiang and
                  Zisen Qi and
                  Menghan Guo and
                  Siyu Jia and
                  Haiping Wang},
  editor       = {Chunhua Su and
                  Kouichi Sakurai and
                  Feng Liu},
  title        = {Malware Classification Based on Semi-Supervised Learning},
  booktitle    = {Science of Cyber Security - 4th International Conference, SciSec 2022,
                  Matsue, Japan, August 10-12, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13580},
  pages        = {287--301},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17551-0\_19},
  doi          = {10.1007/978-3-031-17551-0\_19},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/DingZLXQQGJW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/DuJJZFDLL22,
  author       = {Xiangyu Du and
                  Zhengwei Jiang and
                  Jun Jiang and
                  Kai Zhang and
                  Zijing Fan and
                  Fangming Dong and
                  Ning Li and
                  Baoxu Liu},
  editor       = {Chunhua Su and
                  Kouichi Sakurai and
                  Feng Liu},
  title        = {{BASNEA:} Threat Hunting for Ethereum Smart Contract Based on Backtrackless
                  Aligned-Spatial Network Entity Alignment},
  booktitle    = {Science of Cyber Security - 4th International Conference, SciSec 2022,
                  Matsue, Japan, August 10-12, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13580},
  pages        = {421--436},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17551-0\_28},
  doi          = {10.1007/978-3-031-17551-0\_28},
  timestamp    = {Fri, 07 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/DuJJZFDLL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/GleerupLTW22,
  author       = {Thomas Gleerup and
                  Wenjuan Li and
                  Jiao Tan and
                  Yu Wang},
  editor       = {Chunhua Su and
                  Kouichi Sakurai and
                  Feng Liu},
  title        = {ZoomPass: {A} Zoom-Based Android Unlock Scheme on Smart Devices},
  booktitle    = {Science of Cyber Security - 4th International Conference, SciSec 2022,
                  Matsue, Japan, August 10-12, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13580},
  pages        = {245--259},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17551-0\_16},
  doi          = {10.1007/978-3-031-17551-0\_16},
  timestamp    = {Fri, 07 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/GleerupLTW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/HamidiG22,
  author       = {Amirreza Hamidi and
                  Hossein Ghodosi},
  editor       = {Chunhua Su and
                  Kouichi Sakurai and
                  Feng Liu},
  title        = {Verifiable {DOPE} from Somewhat Homomorphic Encryption, and the Extension
                  to {DOT}},
  booktitle    = {Science of Cyber Security - 4th International Conference, SciSec 2022,
                  Matsue, Japan, August 10-12, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13580},
  pages        = {105--120},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17551-0\_7},
  doi          = {10.1007/978-3-031-17551-0\_7},
  timestamp    = {Fri, 07 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/HamidiG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/HongC22,
  author       = {Zhexuan Hong and
                  Jiageng Chen},
  editor       = {Chunhua Su and
                  Kouichi Sakurai and
                  Feng Liu},
  title        = {A Solution for the Offline Double-Spending Issue of Digital Currencies},
  booktitle    = {Science of Cyber Security - 4th International Conference, SciSec 2022,
                  Matsue, Japan, August 10-12, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13580},
  pages        = {455--471},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17551-0\_30},
  doi          = {10.1007/978-3-031-17551-0\_30},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/HongC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/HsuM22,
  author       = {Po{-}Chu Hsu and
                  Atsuko Miyaji},
  editor       = {Chunhua Su and
                  Kouichi Sakurai and
                  Feng Liu},
  title        = {Scalable M+1st-Price Auction with Infinite Bidding Price},
  booktitle    = {Science of Cyber Security - 4th International Conference, SciSec 2022,
                  Matsue, Japan, August 10-12, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13580},
  pages        = {121--136},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17551-0\_8},
  doi          = {10.1007/978-3-031-17551-0\_8},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/HsuM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/JensenJCM22,
  author       = {Wictor Lang Jensen and
                  Sille Jessing and
                  Wei{-}Yang Chiu and
                  Weizhi Meng},
  editor       = {Chunhua Su and
                  Kouichi Sakurai and
                  Feng Liu},
  title        = {A Practical Blockchain-Based Maintenance Record System for Better
                  Aircraft Security},
  booktitle    = {Science of Cyber Security - 4th International Conference, SciSec 2022,
                  Matsue, Japan, August 10-12, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13580},
  pages        = {51--67},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17551-0\_4},
  doi          = {10.1007/978-3-031-17551-0\_4},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/JensenJCM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/JiaLWL22,
  author       = {Kun Jia and
                  Jiazhi Liu and
                  Wen Wang and
                  Feng Liu},
  editor       = {Chunhua Su and
                  Kouichi Sakurai and
                  Feng Liu},
  title        = {Hybrid Routing for Efficient Fine-Grained Management of Specific Services
                  in {SDN}},
  booktitle    = {Science of Cyber Security - 4th International Conference, SciSec 2022,
                  Matsue, Japan, August 10-12, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13580},
  pages        = {170--185},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17551-0\_11},
  doi          = {10.1007/978-3-031-17551-0\_11},
  timestamp    = {Wed, 03 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/JiaLWL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/KangYML22,
  author       = {Yanze Kang and
                  Xiaobo Yu and
                  Weizhi Meng and
                  Yining Liu},
  editor       = {Chunhua Su and
                  Kouichi Sakurai and
                  Feng Liu},
  title        = {BlockRAT: An Enhanced Remote Access Trojan Framework via Blockchain},
  booktitle    = {Science of Cyber Security - 4th International Conference, SciSec 2022,
                  Matsue, Japan, August 10-12, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13580},
  pages        = {21--35},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17551-0\_2},
  doi          = {10.1007/978-3-031-17551-0\_2},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/KangYML22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/KasperG22,
  author       = {Daniel Kasper and
                  Jens Grossklags},
  editor       = {Chunhua Su and
                  Kouichi Sakurai and
                  Feng Liu},
  title        = {A Hierarchical Macroeconomic Copula Model for Cyber Damages Based
                  on Current Cyber Insurance Prices},
  booktitle    = {Science of Cyber Security - 4th International Conference, SciSec 2022,
                  Matsue, Japan, August 10-12, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13580},
  pages        = {472--483},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17551-0\_31},
  doi          = {10.1007/978-3-031-17551-0\_31},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/KasperG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/LiTF22,
  author       = {Chen Li and
                  Bibo Tu and
                  Yanchang Feng},
  editor       = {Chunhua Su and
                  Kouichi Sakurai and
                  Feng Liu},
  title        = {The Shared Memory Based Cryptographic Card Virtualization},
  booktitle    = {Science of Cyber Security - 4th International Conference, SciSec 2022,
                  Matsue, Japan, August 10-12, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13580},
  pages        = {137--151},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17551-0\_9},
  doi          = {10.1007/978-3-031-17551-0\_9},
  timestamp    = {Fri, 07 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/LiTF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/LingFDWGY22,
  author       = {Zhiting Ling and
                  Huamin Feng and
                  Xiong Ding and
                  Xuren Wang and
                  Chang Gao and
                  Peian Yang},
  editor       = {Chunhua Su and
                  Kouichi Sakurai and
                  Feng Liu},
  title        = {Spear Phishing Email Detection with Multiple Reputation Features and
                  Sample Enhancement},
  booktitle    = {Science of Cyber Security - 4th International Conference, SciSec 2022,
                  Matsue, Japan, August 10-12, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13580},
  pages        = {522--538},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17551-0\_34},
  doi          = {10.1007/978-3-031-17551-0\_34},
  timestamp    = {Fri, 07 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/LingFDWGY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/LiuHA22,
  author       = {Yi Liu and
                  Yanni Han and
                  Wei An},
  editor       = {Chunhua Su and
                  Kouichi Sakurai and
                  Feng Liu},
  title        = {AttVAE: {A} Novel Anomaly Detection Framework for Multivariate Time
                  Series},
  booktitle    = {Science of Cyber Security - 4th International Conference, SciSec 2022,
                  Matsue, Japan, August 10-12, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13580},
  pages        = {407--420},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17551-0\_27},
  doi          = {10.1007/978-3-031-17551-0\_27},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/LiuHA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/LiuZCL22,
  author       = {Xinyu Liu and
                  Wu Zhao and
                  Langping Chen and
                  Qixu Liu},
  editor       = {Chunhua Su and
                  Kouichi Sakurai and
                  Feng Liu},
  title        = {DroidFP: {A} Zero-Permission Detection Framework for Android Devices
                  Based on Gated Recurrent Unit},
  booktitle    = {Science of Cyber Security - 4th International Conference, SciSec 2022,
                  Matsue, Japan, August 10-12, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13580},
  pages        = {364--374},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17551-0\_24},
  doi          = {10.1007/978-3-031-17551-0\_24},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/LiuZCL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/NounRZRL22,
  author       = {Hassan Noun and
                  Florian Rehm and
                  Guillaume Zeller and
                  G. Rajesh and
                  Roland Lachmayer},
  editor       = {Chunhua Su and
                  Kouichi Sakurai and
                  Feng Liu},
  title        = {Integration of Cybersecurity Related Development Processes by Using
                  a Quantification Method},
  booktitle    = {Science of Cyber Security - 4th International Conference, SciSec 2022,
                  Matsue, Japan, August 10-12, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13580},
  pages        = {233--242},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17551-0\_15},
  doi          = {10.1007/978-3-031-17551-0\_15},
  timestamp    = {Fri, 07 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/NounRZRL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/PengX22,
  author       = {Chunying Peng and
                  Haixia Xu},
  editor       = {Chunhua Su and
                  Kouichi Sakurai and
                  Feng Liu},
  title        = {Redactable Blockchain with Fine-Grained Autonomy and Transaction Rollback},
  booktitle    = {Science of Cyber Security - 4th International Conference, SciSec 2022,
                  Matsue, Japan, August 10-12, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13580},
  pages        = {68--84},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17551-0\_5},
  doi          = {10.1007/978-3-031-17551-0\_5},
  timestamp    = {Thu, 16 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/PengX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/QinPYTZ22,
  author       = {Wenjie Qin and
                  Chengwei Peng and
                  Tao Yin and
                  Changbo Tian and
                  Guangze Zhao},
  editor       = {Chunhua Su and
                  Kouichi Sakurai and
                  Feng Liu},
  title        = {AtNet: {A} Novel Anti-tracking Network with Multi-Party Judgement
                  Capability Based on Cross-Domain Small-World Topology},
  booktitle    = {Science of Cyber Security - 4th International Conference, SciSec 2022,
                  Matsue, Japan, August 10-12, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13580},
  pages        = {186--200},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17551-0\_12},
  doi          = {10.1007/978-3-031-17551-0\_12},
  timestamp    = {Fri, 07 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/QinPYTZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/QuXS22,
  author       = {Leilei Qu and
                  Ruojin Xiao and
                  Wenchang Shi},
  editor       = {Chunhua Su and
                  Kouichi Sakurai and
                  Feng Liu},
  title        = {Towards Practical Personalized Security Nudge Schemes: Investigating
                  the Moderation Effects of Behavioral Features on Nudge Effects},
  booktitle    = {Science of Cyber Security - 4th International Conference, SciSec 2022,
                  Matsue, Japan, August 10-12, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13580},
  pages        = {505--521},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17551-0\_33},
  doi          = {10.1007/978-3-031-17551-0\_33},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/QuXS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/RodriguezX22,
  author       = {Rosana Montanez Rodriguez and
                  Shouhuai Xu},
  editor       = {Chunhua Su and
                  Kouichi Sakurai and
                  Feng Liu},
  title        = {Cyber Social Engineering Kill Chain},
  booktitle    = {Science of Cyber Security - 4th International Conference, SciSec 2022,
                  Matsue, Japan, August 10-12, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13580},
  pages        = {487--504},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17551-0\_32},
  doi          = {10.1007/978-3-031-17551-0\_32},
  timestamp    = {Fri, 07 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/RodriguezX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/ShresthaLF22,
  author       = {Sulav Lal Shrestha and
                  Taylor Lee and
                  Sebastian Fischmeister},
  editor       = {Chunhua Su and
                  Kouichi Sakurai and
                  Feng Liu},
  title        = {Metasploit for Cyber-Physical Security Testing with Real-Time Constraints},
  booktitle    = {Science of Cyber Security - 4th International Conference, SciSec 2022,
                  Matsue, Japan, August 10-12, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13580},
  pages        = {260--275},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17551-0\_17},
  doi          = {10.1007/978-3-031-17551-0\_17},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/ShresthaLF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/SiXTZLCH22,
  author       = {Qin Si and
                  Hui Xu and
                  Ying Tong and
                  Yu Zhou and
                  Jian Liang and
                  Lei Cui and
                  Zhiyu Hao},
  editor       = {Chunhua Su and
                  Kouichi Sakurai and
                  Feng Liu},
  title        = {Malware Detection Using Automated Generation of Yara Rules on Dynamic
                  Features},
  booktitle    = {Science of Cyber Security - 4th International Conference, SciSec 2022,
                  Matsue, Japan, August 10-12, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13580},
  pages        = {315--330},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17551-0\_21},
  doi          = {10.1007/978-3-031-17551-0\_21},
  timestamp    = {Fri, 07 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/SiXTZLCH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/SunWYQLLW22,
  author       = {Jiawei Sun and
                  Guangjun Wu and
                  Junnan Yin and
                  Qiang Qian and
                  Junjiao Liu and
                  Jun Li and
                  Yong Wang},
  editor       = {Chunhua Su and
                  Kouichi Sakurai and
                  Feng Liu},
  title        = {{HINCDG:} Multi-Meta-Path Graph Auto-Encoders for Mining of Weak Association
                  Malicious Domains},
  booktitle    = {Science of Cyber Security - 4th International Conference, SciSec 2022,
                  Matsue, Japan, August 10-12, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13580},
  pages        = {393--406},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17551-0\_26},
  doi          = {10.1007/978-3-031-17551-0\_26},
  timestamp    = {Thu, 13 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/SunWYQLLW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/WangXFGQL22,
  author       = {Bingxu Wang and
                  Gang Xiong and
                  Peipei Fu and
                  Gaopeng Gou and
                  Yingchao Qin and
                  Zhen Li},
  editor       = {Chunhua Su and
                  Kouichi Sakurai and
                  Feng Liu},
  title        = {A Two-Stage Method for Fine-Grained {DNS} Covert Tunnel Behavior Detection},
  booktitle    = {Science of Cyber Security - 4th International Conference, SciSec 2022,
                  Matsue, Japan, August 10-12, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13580},
  pages        = {201--216},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17551-0\_13},
  doi          = {10.1007/978-3-031-17551-0\_13},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/WangXFGQL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/XieLS22,
  author       = {Jiang Xie and
                  Shuhao Li and
                  Peishuai Sun},
  editor       = {Chunhua Su and
                  Kouichi Sakurai and
                  Feng Liu},
  title        = {Analysis and Detection Against Overlapping Phenomenon of Behavioral
                  Attribute in Network Attacks},
  booktitle    = {Science of Cyber Security - 4th International Conference, SciSec 2022,
                  Matsue, Japan, August 10-12, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13580},
  pages        = {217--232},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17551-0\_14},
  doi          = {10.1007/978-3-031-17551-0\_14},
  timestamp    = {Fri, 07 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/XieLS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/YanXMD22,
  author       = {Chuyi Yan and
                  Haixia Xu and
                  Yongheng Mu and
                  Jiong Ding},
  editor       = {Chunhua Su and
                  Kouichi Sakurai and
                  Feng Liu},
  title        = {Pitch in: {A} Secure Extension Signature Based on {SM9}},
  booktitle    = {Science of Cyber Security - 4th International Conference, SciSec 2022,
                  Matsue, Japan, August 10-12, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13580},
  pages        = {87--104},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17551-0\_6},
  doi          = {10.1007/978-3-031-17551-0\_6},
  timestamp    = {Fri, 07 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/YanXMD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/YangH22,
  author       = {Ling Yang and
                  Huawei Huang},
  editor       = {Chunhua Su and
                  Kouichi Sakurai and
                  Feng Liu},
  title        = {Adapted {PBFT} Consensus Protocol for Sharded Blockchain},
  booktitle    = {Science of Cyber Security - 4th International Conference, SciSec 2022,
                  Matsue, Japan, August 10-12, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13580},
  pages        = {36--50},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17551-0\_3},
  doi          = {10.1007/978-3-031-17551-0\_3},
  timestamp    = {Fri, 07 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/YangH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/YuYYLC22,
  author       = {Jing Yu and
                  Shuguang Yuan and
                  Yulin Yuan and
                  Yafan Li and
                  Chi Chen},
  editor       = {Chunhua Su and
                  Kouichi Sakurai and
                  Feng Liu},
  title        = {A k-Anonymity-Based Robust Watermarking Scheme for Relational Database},
  booktitle    = {Science of Cyber Security - 4th International Conference, SciSec 2022,
                  Matsue, Japan, August 10-12, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13580},
  pages        = {557--573},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17551-0\_36},
  doi          = {10.1007/978-3-031-17551-0\_36},
  timestamp    = {Fri, 07 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/YuYYLC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/ZhaoZSJ22,
  author       = {Guozhu Zhao and
                  Pinchang Zhang and
                  Yulong Shen and
                  Xiaohong Jiang},
  editor       = {Chunhua Su and
                  Kouichi Sakurai and
                  Feng Liu},
  title        = {Passive User Authentication Utilizing Consecutive Touch Action Features
                  for IIoT Systems},
  booktitle    = {Science of Cyber Security - 4th International Conference, SciSec 2022,
                  Matsue, Japan, August 10-12, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13580},
  pages        = {276--284},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17551-0\_18},
  doi          = {10.1007/978-3-031-17551-0\_18},
  timestamp    = {Fri, 07 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/ZhaoZSJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/ZouZGKL22,
  author       = {Qian Zou and
                  Ning Zhang and
                  Feng Guo and
                  Qingshan Kong and
                  Zhiqiang Lv},
  editor       = {Chunhua Su and
                  Kouichi Sakurai and
                  Feng Liu},
  title        = {Multi-region SRAM-Based {TCAM} for Longest Prefix},
  booktitle    = {Science of Cyber Security - 4th International Conference, SciSec 2022,
                  Matsue, Japan, August 10-12, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13580},
  pages        = {437--452},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17551-0\_29},
  doi          = {10.1007/978-3-031-17551-0\_29},
  timestamp    = {Fri, 07 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/ZouZGKL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/scisec/2022,
  editor       = {Chunhua Su and
                  Kouichi Sakurai and
                  Feng Liu},
  title        = {Science of Cyber Security - 4th International Conference, SciSec 2022,
                  Matsue, Japan, August 10-12, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13580},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17551-0},
  doi          = {10.1007/978-3-031-17551-0},
  isbn         = {978-3-031-17550-3},
  timestamp    = {Fri, 07 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/CharltonDX21,
  author       = {John Charlton and
                  Pang Du and
                  Shouhuai Xu},
  editor       = {Wenlian Lu and
                  Kun Sun and
                  Moti Yung and
                  Feng Liu},
  title        = {A New Method for Inferring Ground-Truth Labels and Malware Detector
                  Effectiveness Metrics},
  booktitle    = {Science of Cyber Security - Third International Conference, SciSec
                  2021, Virtual Event, August 13-15, 2021, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13005},
  pages        = {77--92},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-89137-4\_6},
  doi          = {10.1007/978-3-030-89137-4\_6},
  timestamp    = {Mon, 15 Aug 2022 09:54:01 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/CharltonDX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/ChengSCFL21,
  author       = {Hua Cheng and
                  Yinda Shen and
                  Tao Cheng and
                  Yiquan Fang and
                  Jianfan Ling},
  editor       = {Wenlian Lu and
                  Kun Sun and
                  Moti Yung and
                  Feng Liu},
  title        = {Botnet Detection Based on Multilateral Attribute Graph},
  booktitle    = {Science of Cyber Security - Third International Conference, SciSec
                  2021, Virtual Event, August 13-15, 2021, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13005},
  pages        = {66--76},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-89137-4\_5},
  doi          = {10.1007/978-3-030-89137-4\_5},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/ChengSCFL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/FanLCYZW21,
  author       = {Yulin Fan and
                  Yang Li and
                  Huajun Cui and
                  Huiran Yang and
                  Yan Zhang and
                  Weiping Wang},
  editor       = {Wenlian Lu and
                  Kun Sun and
                  Moti Yung and
                  Feng Liu},
  title        = {An Intrusion Detection Framework for IoT Using Partial Domain Adaptation},
  booktitle    = {Science of Cyber Security - Third International Conference, SciSec
                  2021, Virtual Event, August 13-15, 2021, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13005},
  pages        = {36--50},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-89137-4\_3},
  doi          = {10.1007/978-3-030-89137-4\_3},
  timestamp    = {Thu, 13 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/FanLCYZW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/LinZLC21,
  author       = {Wei Lin and
                  Shuming Zhou and
                  Min Li and
                  Gaolin Chen},
  editor       = {Wenlian Lu and
                  Kun Sun and
                  Moti Yung and
                  Feng Liu},
  title        = {Dismantling Interdependent Networks Based on Supra-Laplacian Energy},
  booktitle    = {Science of Cyber Security - Third International Conference, SciSec
                  2021, Virtual Event, August 13-15, 2021, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13005},
  pages        = {205--213},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-89137-4\_14},
  doi          = {10.1007/978-3-030-89137-4\_14},
  timestamp    = {Tue, 12 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/LinZLC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/LiuLL21,
  author       = {Zhaofeng Liu and
                  Wenlian Lu and
                  Yingying Lang},
  editor       = {Wenlian Lu and
                  Kun Sun and
                  Moti Yung and
                  Feng Liu},
  title        = {An Event-Based Parameter Switching Method for Controlling Cybersecurity
                  Dynamics},
  booktitle    = {Science of Cyber Security - Third International Conference, SciSec
                  2021, Virtual Event, August 13-15, 2021, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13005},
  pages        = {236--251},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-89137-4\_17},
  doi          = {10.1007/978-3-030-89137-4\_17},
  timestamp    = {Tue, 12 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/LiuLL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/LiuWCL21,
  author       = {Zhaofeng Liu and
                  Yinchong Wang and
                  Huashan Chen and
                  Wenlian Lu},
  editor       = {Wenlian Lu and
                  Kun Sun and
                  Moti Yung and
                  Feng Liu},
  title        = {Simulations of Event-Based Cyber Dynamics via Adversarial Machine
                  Learning},
  booktitle    = {Science of Cyber Security - Third International Conference, SciSec
                  2021, Virtual Event, August 13-15, 2021, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13005},
  pages        = {187--201},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-89137-4\_13},
  doi          = {10.1007/978-3-030-89137-4\_13},
  timestamp    = {Tue, 12 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/LiuWCL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/MatthewsSM21,
  author       = {Isaac Matthews and
                  Sadegh Soudjani and
                  Aad van Moorsel},
  editor       = {Wenlian Lu and
                  Kun Sun and
                  Moti Yung and
                  Feng Liu},
  title        = {Stochastic Simulation Techniques for Inference and Sensitivity Analysis
                  of Bayesian Attack Graphs},
  booktitle    = {Science of Cyber Security - Third International Conference, SciSec
                  2021, Virtual Event, August 13-15, 2021, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13005},
  pages        = {171--186},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-89137-4\_12},
  doi          = {10.1007/978-3-030-89137-4\_12},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/MatthewsSM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/MeiYH21,
  author       = {Rui Mei and
                  Han{-}Bing Yan and
                  Zhihui Han},
  editor       = {Wenlian Lu and
                  Kun Sun and
                  Moti Yung and
                  Feng Liu},
  title        = {RansomLens: Understanding Ransomware via Causality Analysis on System
                  Provenance Graph},
  booktitle    = {Science of Cyber Security - Third International Conference, SciSec
                  2021, Virtual Event, August 13-15, 2021, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13005},
  pages        = {252--267},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-89137-4\_18},
  doi          = {10.1007/978-3-030-89137-4\_18},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/MeiYH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/QinMF21,
  author       = {Liangcheng Qin and
                  Ling Ma and
                  Xiongjun Fu},
  editor       = {Wenlian Lu and
                  Kun Sun and
                  Moti Yung and
                  Feng Liu},
  title        = {DWT-DQFT-Based Color Image Blind Watermark with {QR} Decomposition},
  booktitle    = {Science of Cyber Security - Third International Conference, SciSec
                  2021, Virtual Event, August 13-15, 2021, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13005},
  pages        = {214--224},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-89137-4\_15},
  doi          = {10.1007/978-3-030-89137-4\_15},
  timestamp    = {Tue, 12 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/QinMF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/ShenGLLW21,
  author       = {Zhuoxiang Shen and
                  Neng Gao and
                  Zeyi Liu and
                  Min Li and
                  Chuanyin Wang},
  editor       = {Wenlian Lu and
                  Kun Sun and
                  Moti Yung and
                  Feng Liu},
  title        = {Using Chinese Natural Language to Configure Authorization Policies
                  in Attribute-Based Access Control System},
  booktitle    = {Science of Cyber Security - Third International Conference, SciSec
                  2021, Virtual Event, August 13-15, 2021, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13005},
  pages        = {110--125},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-89137-4\_8},
  doi          = {10.1007/978-3-030-89137-4\_8},
  timestamp    = {Tue, 12 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/ShenGLLW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/TangWLBLW21,
  author       = {Zixian Tang and
                  Qiang Wang and
                  Wenhao Li and
                  Huaifeng Bao and
                  Feng Liu and
                  Wen Wang},
  editor       = {Wenlian Lu and
                  Kun Sun and
                  Moti Yung and
                  Feng Liu},
  title        = {Mining Trojan Detection Based on Multi-dimensional Static Features},
  booktitle    = {Science of Cyber Security - Third International Conference, SciSec
                  2021, Virtual Event, August 13-15, 2021, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13005},
  pages        = {51--65},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-89137-4\_4},
  doi          = {10.1007/978-3-030-89137-4\_4},
  timestamp    = {Fri, 23 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/TangWLBLW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/TangYLLWWJL21,
  author       = {Jiyue Tang and
                  Le Yang and
                  Song Liu and
                  Wenmao Liu and
                  Meng Wang and
                  Chonghua Wang and
                  Bo Jiang and
                  Zhigang Lu},
  editor       = {Wenlian Lu and
                  Kun Sun and
                  Moti Yung and
                  Feng Liu},
  title        = {Caps-LSTM: {A} Novel Hierarchical Encrypted {VPN} Network Traffic
                  Identification Using CapsNet and {LSTM}},
  booktitle    = {Science of Cyber Security - Third International Conference, SciSec
                  2021, Virtual Event, August 13-15, 2021, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13005},
  pages        = {139--153},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-89137-4\_10},
  doi          = {10.1007/978-3-030-89137-4\_10},
  timestamp    = {Tue, 27 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/TangYLLWWJL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/WangBZ21,
  author       = {Xiaoyu Wang and
                  Tao Bai and
                  Jun Zhao},
  editor       = {Wenlian Lu and
                  Kun Sun and
                  Moti Yung and
                  Feng Liu},
  title        = {A Data-Free Approach for Targeted Universal Adversarial Perturbation},
  booktitle    = {Science of Cyber Security - Third International Conference, SciSec
                  2021, Virtual Event, August 13-15, 2021, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13005},
  pages        = {126--138},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-89137-4\_9},
  doi          = {10.1007/978-3-030-89137-4\_9},
  timestamp    = {Fri, 11 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/WangBZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/WangMLGZS21,
  author       = {Chuanyin Wang and
                  Cunqing Ma and
                  Min Li and
                  Neng Gao and
                  Yifei Zhang and
                  Zhuoxiang Shen},
  editor       = {Wenlian Lu and
                  Kun Sun and
                  Moti Yung and
                  Feng Liu},
  title        = {Protecting Data Privacy in Federated Learning Combining Differential
                  Privacy and Weak Encryption},
  booktitle    = {Science of Cyber Security - Third International Conference, SciSec
                  2021, Virtual Event, August 13-15, 2021, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13005},
  pages        = {95--109},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-89137-4\_7},
  doi          = {10.1007/978-3-030-89137-4\_7},
  timestamp    = {Tue, 12 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/WangMLGZS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/WangZLLH21,
  author       = {Caimei Wang and
                  Zijian Zhou and
                  Hong Li and
                  Zhengmao Li and
                  Bowen Huang},
  editor       = {Wenlian Lu and
                  Kun Sun and
                  Moti Yung and
                  Feng Liu},
  title        = {A Multi-level Elastic Encryption Protection Model},
  booktitle    = {Science of Cyber Security - Third International Conference, SciSec
                  2021, Virtual Event, August 13-15, 2021, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13005},
  pages        = {225--235},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-89137-4\_16},
  doi          = {10.1007/978-3-030-89137-4\_16},
  timestamp    = {Tue, 12 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/WangZLLH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/Xu21,
  author       = {Shouhuai Xu},
  editor       = {Wenlian Lu and
                  Kun Sun and
                  Moti Yung and
                  Feng Liu},
  title        = {{SARR:} {A} Cybersecurity Metrics and Quantification Framework (Keynote)},
  booktitle    = {Science of Cyber Security - Third International Conference, SciSec
                  2021, Virtual Event, August 13-15, 2021, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13005},
  pages        = {3--17},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-89137-4\_1},
  doi          = {10.1007/978-3-030-89137-4\_1},
  timestamp    = {Tue, 12 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/Xu21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/YanLBYZS21,
  author       = {Zhaoteng Yan and
                  Zhi Li and
                  Wenping Bai and
                  Nan Yu and
                  Hongsong Zhu and
                  Limin Sun},
  editor       = {Wenlian Lu and
                  Kun Sun and
                  Moti Yung and
                  Feng Liu},
  title        = {Detecting Internet-Scale Surveillance Devices Using {RTSP} Recessive
                  Features},
  booktitle    = {Science of Cyber Security - Third International Conference, SciSec
                  2021, Virtual Event, August 13-15, 2021, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13005},
  pages        = {21--35},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-89137-4\_2},
  doi          = {10.1007/978-3-030-89137-4\_2},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/YanLBYZS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/ZhangGXLTY21,
  author       = {Hui Zhang and
                  Gaopeng Gou and
                  Gang Xiong and
                  Chang Liu and
                  Yuewen Tan and
                  Ke Ye},
  editor       = {Wenlian Lu and
                  Kun Sun and
                  Moti Yung and
                  Feng Liu},
  title        = {Multi-granularity Mobile Encrypted Traffic Classification Based on
                  Fusion Features},
  booktitle    = {Science of Cyber Security - Third International Conference, SciSec
                  2021, Virtual Event, August 13-15, 2021, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13005},
  pages        = {154--170},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-89137-4\_11},
  doi          = {10.1007/978-3-030-89137-4\_11},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/ZhangGXLTY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/scisec/2021,
  editor       = {Wenlian Lu and
                  Kun Sun and
                  Moti Yung and
                  Feng Liu},
  title        = {Science of Cyber Security - Third International Conference, SciSec
                  2021, Virtual Event, August 13-15, 2021, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13005},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-89137-4},
  doi          = {10.1007/978-3-030-89137-4},
  isbn         = {978-3-030-89136-7},
  timestamp    = {Mon, 15 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/0003Y0019,
  author       = {Bin Xia and
                  Junjie Yin and
                  Jian Xu and
                  Yun Li},
  editor       = {Feng Liu and
                  Jia Xu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {LogGAN: {A} Sequence-Based Generative Adversarial Network for Anomaly
                  Detection Based on System Logs},
  booktitle    = {Science of Cyber Security - Second International Conference, SciSec
                  2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11933},
  pages        = {61--76},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34637-9\_5},
  doi          = {10.1007/978-3-030-34637-9\_5},
  timestamp    = {Thu, 12 Dec 2019 16:11:31 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/0003Y0019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/ChenDC19,
  author       = {Yun Chen and
                  Yunlan Du and
                  Xiaomei Cao},
  editor       = {Feng Liu and
                  Jia Xu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Density Peak Clustering Algorithm Based on Differential Privacy Preserving},
  booktitle    = {Science of Cyber Security - Second International Conference, SciSec
                  2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11933},
  pages        = {20--32},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34637-9\_2},
  doi          = {10.1007/978-3-030-34637-9\_2},
  timestamp    = {Thu, 12 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/ChenDC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/ChenIHB19,
  author       = {Qian (Guenevere) Chen and
                  Sheikh Rabiul Islam and
                  Henry Haswell and
                  Robert A. Bridges},
  editor       = {Feng Liu and
                  Jia Xu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Automated Ransomware Behavior Analysis: Pattern Extraction and Early
                  Detection},
  booktitle    = {Science of Cyber Security - Second International Conference, SciSec
                  2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11933},
  pages        = {199--214},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34637-9\_15},
  doi          = {10.1007/978-3-030-34637-9\_15},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/ChenIHB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/ChenQC19,
  author       = {Tianfu Chen and
                  Zhenghua Qi and
                  Jiagen Cheng},
  editor       = {Feng Liu and
                  Jia Xu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Fully Anonymous Blockchain Constructed Based on Aggregate Signature
                  and Ring Signature},
  booktitle    = {Science of Cyber Security - Second International Conference, SciSec
                  2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11933},
  pages        = {250--261},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34637-9\_19},
  doi          = {10.1007/978-3-030-34637-9\_19},
  timestamp    = {Thu, 12 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/ChenQC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/ChenZCW19,
  author       = {Kangyang Chen and
                  Xinyi Zou and
                  Xingguo Chen and
                  Huihui Wang},
  editor       = {Feng Liu and
                  Jia Xu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {An Automated Online Spam Detector Based on Deep Cascade Forest},
  booktitle    = {Science of Cyber Security - Second International Conference, SciSec
                  2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11933},
  pages        = {33--46},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34637-9\_3},
  doi          = {10.1007/978-3-030-34637-9\_3},
  timestamp    = {Thu, 12 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/ChenZCW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/HongjiW19,
  author       = {Yin Hongji and
                  Chen Wei},
  editor       = {Feng Liu and
                  Jia Xu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Knowledge Graph Based Semi-automatic Code Auditing System},
  booktitle    = {Science of Cyber Security - Second International Conference, SciSec
                  2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11933},
  pages        = {224--231},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34637-9\_17},
  doi          = {10.1007/978-3-030-34637-9\_17},
  timestamp    = {Thu, 12 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/HongjiW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/HuangYZW19,
  author       = {Xin Huang and
                  Fei Yan and
                  Liqiang Zhang and
                  Kai Wang},
  editor       = {Feng Liu and
                  Jia Xu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {HoneyGadget: {A} Deception Based {ROP} Detection Scheme},
  booktitle    = {Science of Cyber Security - Second International Conference, SciSec
                  2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11933},
  pages        = {121--135},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34637-9\_9},
  doi          = {10.1007/978-3-030-34637-9\_9},
  timestamp    = {Thu, 12 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/HuangYZW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/JiangX19,
  author       = {Shuai Jiang and
                  Xiaolong Xu},
  editor       = {Feng Liu and
                  Jia Xu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Application and Performance Analysis of Data Preprocessing for Intrusion
                  Detection System},
  booktitle    = {Science of Cyber Security - Second International Conference, SciSec
                  2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11933},
  pages        = {163--177},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34637-9\_12},
  doi          = {10.1007/978-3-030-34637-9\_12},
  timestamp    = {Fri, 19 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/JiangX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/LiSZJS19,
  author       = {Yinwei Li and
                  Bo Song and
                  Xu Zhang and
                  Guo{-}Ping Jiang and
                  Yurong Song},
  editor       = {Feng Liu and
                  Jia Xu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {New Robustness Measures of Communication Networks Against Virus Attacks},
  booktitle    = {Science of Cyber Security - Second International Conference, SciSec
                  2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11933},
  pages        = {151--162},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34637-9\_11},
  doi          = {10.1007/978-3-030-34637-9\_11},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/LiSZJS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/LiZX19,
  author       = {Yuxi Li and
                  Fucai Zhou and
                  Zifeng Xu},
  editor       = {Feng Liu and
                  Jia Xu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {{PAFR:} Privacy-Aware Friends Retrieval over Online Social Networks},
  booktitle    = {Science of Cyber Security - Second International Conference, SciSec
                  2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11933},
  pages        = {323--338},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34637-9\_24},
  doi          = {10.1007/978-3-030-34637-9\_24},
  timestamp    = {Thu, 12 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/LiZX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/LingHPLXL19,
  author       = {Hang Ling and
                  Jing Han and
                  Jiayi Pang and
                  Jianwei Liu and
                  Jia Xu and
                  Zheng Liu},
  editor       = {Feng Liu and
                  Jia Xu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Behavior Flow Graph Construction from System Logs for Anomaly Analysis},
  booktitle    = {Science of Cyber Security - Second International Conference, SciSec
                  2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11933},
  pages        = {215--223},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34637-9\_16},
  doi          = {10.1007/978-3-030-34637-9\_16},
  timestamp    = {Thu, 12 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/LingHPLXL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/LiuHH019,
  author       = {Binghui Liu and
                  Keji Han and
                  Jie Hang and
                  Yun Li},
  editor       = {Feng Liu and
                  Jia Xu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Adversarial Training Based Feature Selection},
  booktitle    = {Science of Cyber Security - Second International Conference, SciSec
                  2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11933},
  pages        = {92--105},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34637-9\_7},
  doi          = {10.1007/978-3-030-34637-9\_7},
  timestamp    = {Wed, 08 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/LiuHH019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/LiuJL19,
  author       = {Zhaofeng Liu and
                  Zhen Jia and
                  Wenlian Lu},
  editor       = {Feng Liu and
                  Jia Xu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Security Comparison of Machine Learning Models Facing Different Attack
                  Targets},
  booktitle    = {Science of Cyber Security - Second International Conference, SciSec
                  2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11933},
  pages        = {77--91},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34637-9\_6},
  doi          = {10.1007/978-3-030-34637-9\_6},
  timestamp    = {Thu, 12 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/LiuJL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/MeiXXLYY19,
  author       = {Lin Mei and
                  Chungen Xu and
                  Lei Xu and
                  Zhongyi Liu and
                  Xiaoling Yu and
                  Zhigang Yao},
  editor       = {Feng Liu and
                  Jia Xu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Towards Realizing Authorized Encrypted Search with Designed Access
                  Policy},
  booktitle    = {Science of Cyber Security - Second International Conference, SciSec
                  2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11933},
  pages        = {293--307},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34637-9\_22},
  doi          = {10.1007/978-3-030-34637-9\_22},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/MeiXXLYY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/PengDPZM19,
  author       = {Datian Peng and
                  Jianmin Dong and
                  Qinke Peng and
                  Bo Zeng and
                  Zhi{-}Hong Mao},
  editor       = {Feng Liu and
                  Jia Xu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {FDIA-Identified Overloaded Power Lines},
  booktitle    = {Science of Cyber Security - Second International Conference, SciSec
                  2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11933},
  pages        = {262--277},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34637-9\_20},
  doi          = {10.1007/978-3-030-34637-9\_20},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/PengDPZM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/QiaoZWY19,
  author       = {Zhi Qiao and
                  Congcong Zhu and
                  Zhiwei Wang and
                  Nianhua Yang},
  editor       = {Feng Liu and
                  Jia Xu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Anonymous IoT Data Storage and Transaction Protocol Based on Blockchain
                  and Edge Computing},
  booktitle    = {Science of Cyber Security - Second International Conference, SciSec
                  2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11933},
  pages        = {181--189},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34637-9\_13},
  doi          = {10.1007/978-3-030-34637-9\_13},
  timestamp    = {Thu, 12 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/QiaoZWY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/TuJS19,
  author       = {Xiao Tu and
                  Guo{-}Ping Jiang and
                  Yurong Song},
  editor       = {Feng Liu and
                  Jia Xu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Multiplex PageRank in Multilayer Networks Considering Shunt},
  booktitle    = {Science of Cyber Security - Second International Conference, SciSec
                  2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11933},
  pages        = {47--58},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34637-9\_4},
  doi          = {10.1007/978-3-030-34637-9\_4},
  timestamp    = {Thu, 12 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/TuJS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/WangCY19,
  author       = {Zhiwei Wang and
                  Zhiyuan Cheng and
                  Nianhua Yang},
  editor       = {Feng Liu and
                  Jia Xu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {An ID-Based Linear Homomorphic Cryptosystem and Its Applications for
                  the Isolated Smart Grid Devices},
  booktitle    = {Science of Cyber Security - Second International Conference, SciSec
                  2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11933},
  pages        = {339--353},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34637-9\_25},
  doi          = {10.1007/978-3-030-34637-9\_25},
  timestamp    = {Mon, 16 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/WangCY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/WangWGHSW19,
  author       = {Yuan Wang and
                  Jinzhi Wang and
                  Jianhong Gao and
                  Shengsheng Hu and
                  Huacheng Sun and
                  Yongli Wang},
  editor       = {Feng Liu and
                  Jia Xu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Cross-Domain Recommendation System Based on Tensor Decomposition for
                  Cybersecurity Data Analytics},
  booktitle    = {Science of Cyber Security - Second International Conference, SciSec
                  2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11933},
  pages        = {3--19},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34637-9\_1},
  doi          = {10.1007/978-3-030-34637-9\_1},
  timestamp    = {Thu, 12 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/WangWGHSW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/WangZKXW19,
  author       = {Shaohui Wang and
                  Yanxuan Zhang and
                  Changbo Ke and
                  Fu Xiao and
                  Ruchuan Wang},
  editor       = {Feng Liu and
                  Jia Xu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Optimal Key-Tree for {RFID} Authentication Protocols with Storage
                  Constraints},
  booktitle    = {Science of Cyber Security - Second International Conference, SciSec
                  2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11933},
  pages        = {278--292},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34637-9\_21},
  doi          = {10.1007/978-3-030-34637-9\_21},
  timestamp    = {Mon, 08 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/WangZKXW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/WuYSJT19,
  author       = {Yang Wu and
                  Shikang Yu and
                  Yurong Song and
                  Guoping Jiang and
                  Xiao Tu},
  editor       = {Feng Liu and
                  Jia Xu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {High-Efficiency Triangle Counting on the {GPU}},
  booktitle    = {Science of Cyber Security - Second International Conference, SciSec
                  2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11933},
  pages        = {363--370},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34637-9\_27},
  doi          = {10.1007/978-3-030-34637-9\_27},
  timestamp    = {Thu, 12 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/WuYSJT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/XueXWLX19,
  author       = {Gang Xue and
                  Jia Xu and
                  Hanwen Wu and
                  Weifeng Lu and
                  Lijie Xu},
  editor       = {Feng Liu and
                  Jia Xu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Incentive Mechanism for Bitcoin Mining Pool Based on Stackelberg Game},
  booktitle    = {Science of Cyber Security - Second International Conference, SciSec
                  2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11933},
  pages        = {190--198},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34637-9\_14},
  doi          = {10.1007/978-3-030-34637-9\_14},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/XueXWLX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/YaoXXM19,
  author       = {Zhigang Yao and
                  Chungen Xu and
                  Lei Xu and
                  Lin Mei},
  editor       = {Feng Liu and
                  Jia Xu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Forward Private Searchable Encryption with Conjunctive Keywords Query},
  booktitle    = {Science of Cyber Security - Second International Conference, SciSec
                  2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11933},
  pages        = {308--322},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34637-9\_23},
  doi          = {10.1007/978-3-030-34637-9\_23},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/YaoXXM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/YuWSJS19,
  author       = {Shikang Yu and
                  Yang Wu and
                  Yurong Song and
                  Guoping Jiang and
                  Xiaoping Su},
  editor       = {Feng Liu and
                  Jia Xu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Application of DeepWalk Based on Hyperbolic Coordinates on Unsupervised
                  Clustering},
  booktitle    = {Science of Cyber Security - Second International Conference, SciSec
                  2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11933},
  pages        = {106--118},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34637-9\_8},
  doi          = {10.1007/978-3-030-34637-9\_8},
  timestamp    = {Thu, 12 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/YuWSJS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/ZhangLYL19,
  author       = {Zhenchao Zhang and
                  Yali Liu and
                  Xinchun Yin and
                  Xincheng Li},
  editor       = {Feng Liu and
                  Jia Xu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {A New Pairing-Free Certificateless Signature Scheme for Internet of
                  Things},
  booktitle    = {Science of Cyber Security - Second International Conference, SciSec
                  2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11933},
  pages        = {371--379},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34637-9\_28},
  doi          = {10.1007/978-3-030-34637-9\_28},
  timestamp    = {Thu, 12 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/ZhangLYL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/ZhangZ19,
  author       = {Jie Zhang and
                  Zhihao Zhang},
  editor       = {Feng Liu and
                  Jia Xu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {LET-Attack: Latent Encodings of Normal-Data Manifold Transferring
                  to Adversarial Examples},
  booktitle    = {Science of Cyber Security - Second International Conference, SciSec
                  2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11933},
  pages        = {136--150},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34637-9\_10},
  doi          = {10.1007/978-3-030-34637-9\_10},
  timestamp    = {Thu, 12 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/ZhangZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/ZhengH19,
  author       = {Mengce Zheng and
                  Honggang Hu},
  editor       = {Feng Liu and
                  Jia Xu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Implicit-Key Attack on the {RSA} Cryptosystem},
  booktitle    = {Science of Cyber Security - Second International Conference, SciSec
                  2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11933},
  pages        = {354--362},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34637-9\_26},
  doi          = {10.1007/978-3-030-34637-9\_26},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/ZhengH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/ZhouYXW19,
  author       = {Hao Zhou and
                  Geng Yang and
                  Yahong Xu and
                  Weiya Wang},
  editor       = {Feng Liu and
                  Jia Xu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Effective Matrix Factorization for Recommendation with Local Differential
                  Privacy},
  booktitle    = {Science of Cyber Security - Second International Conference, SciSec
                  2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11933},
  pages        = {235--249},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34637-9\_18},
  doi          = {10.1007/978-3-030-34637-9\_18},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/ZhouYXW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/scisec/2019,
  editor       = {Feng Liu and
                  Jia Xu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Science of Cyber Security - Second International Conference, SciSec
                  2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11933},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34637-9},
  doi          = {10.1007/978-3-030-34637-9},
  isbn         = {978-3-030-34636-2},
  timestamp    = {Thu, 12 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/CaoLH18,
  author       = {Ningyuan Cao and
                  Kun Lv and
                  Changzhen Hu},
  editor       = {Feng Liu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {An Attack Graph Generation Method Based on Parallel Computing},
  booktitle    = {Science of Cyber Security - First International Conference, SciSec
                  2018, Beijing, China, August 12-14, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11287},
  pages        = {34--48},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03026-1\_3},
  doi          = {10.1007/978-3-030-03026-1\_3},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/CaoLH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/ChengDPHFL18,
  author       = {Yexia Cheng and
                  Yuejin Du and
                  Jin Peng and
                  Shen He and
                  Jun Fu and
                  Baoxu Liu},
  editor       = {Feng Liu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {New Security Attack and Defense Mechanisms Based on Negative Logic
                  System and Its Applications},
  booktitle    = {Science of Cyber Security - First International Conference, SciSec
                  2018, Beijing, China, August 12-14, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11287},
  pages        = {172--180},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03026-1\_12},
  doi          = {10.1007/978-3-030-03026-1\_12},
  timestamp    = {Tue, 20 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/ChengDPHFL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/HeY18,
  author       = {Kuan He and
                  Bin Yu},
  editor       = {Feng Liu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {An Inducing Localization Scheme for Reactive Jammer in ZigBee Networks},
  booktitle    = {Science of Cyber Security - First International Conference, SciSec
                  2018, Beijing, China, August 12-14, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11287},
  pages        = {156--171},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03026-1\_11},
  doi          = {10.1007/978-3-030-03026-1\_11},
  timestamp    = {Tue, 20 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/HeY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/KongL18,
  author       = {Qingshan Kong and
                  Bo Liu},
  editor       = {Feng Liu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Security and Protection in Optical Networks},
  booktitle    = {Science of Cyber Security - First International Conference, SciSec
                  2018, Beijing, China, August 12-14, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11287},
  pages        = {115--125},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03026-1\_8},
  doi          = {10.1007/978-3-030-03026-1\_8},
  timestamp    = {Tue, 20 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/KongL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/LiZFSJ18,
  author       = {Yinwei Li and
                  Zhen{-}Hao Zhang and
                  Dongmei Fan and
                  Yurong Song and
                  Guo{-}Ping Jiang},
  editor       = {Feng Liu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Influence of Clustering on Network Robustness Against Epidemic Propagation},
  booktitle    = {Science of Cyber Security - First International Conference, SciSec
                  2018, Beijing, China, August 12-14, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11287},
  pages        = {19--33},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03026-1\_2},
  doi          = {10.1007/978-3-030-03026-1\_2},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/LiZFSJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/LiangWZX18,
  author       = {Xiang{-}Qian Liang and
                  Sha{-}sha Wang and
                  Yong{-}hua Zhang and
                  Guang{-}Bao Xu},
  editor       = {Feng Liu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Multi-party Quantum Key Agreement Against Collective Noise},
  booktitle    = {Science of Cyber Security - First International Conference, SciSec
                  2018, Beijing, China, August 12-14, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11287},
  pages        = {141--155},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03026-1\_10},
  doi          = {10.1007/978-3-030-03026-1\_10},
  timestamp    = {Tue, 20 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/LiangWZX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/LiuQ18,
  author       = {Anyi Liu and
                  Guangzhi Qu},
  editor       = {Feng Liu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {H-Verifier: Verifying Confidential System State with Delegated Sandboxes},
  booktitle    = {Science of Cyber Security - First International Conference, SciSec
                  2018, Beijing, China, August 12-14, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11287},
  pages        = {126--140},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03026-1\_9},
  doi          = {10.1007/978-3-030-03026-1\_9},
  timestamp    = {Tue, 20 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/LiuQ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/PengDJPZM18,
  author       = {Datian Peng and
                  Jianmin Dong and
                  Jianan Jian and
                  Qinke Peng and
                  Bo Zeng and
                  Zhi{-}Hong Mao},
  editor       = {Feng Liu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Economic-Driven {FDI} Attack in Electricity Market},
  booktitle    = {Science of Cyber Security - First International Conference, SciSec
                  2018, Beijing, China, August 12-14, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11287},
  pages        = {216--224},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03026-1\_17},
  doi          = {10.1007/978-3-030-03026-1\_17},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/PengDJPZM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/QiangL18,
  author       = {Hao Qiang and
                  Wenlian Lu},
  editor       = {Feng Liu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {A Note on Dependence of Epidemic Threshold on State Transition Diagram
                  in the {SEIC} Cybersecurity Dynamical System Model},
  booktitle    = {Science of Cyber Security - First International Conference, SciSec
                  2018, Beijing, China, August 12-14, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11287},
  pages        = {51--64},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03026-1\_4},
  doi          = {10.1007/978-3-030-03026-1\_4},
  timestamp    = {Tue, 20 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/QiangL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/SahaySMJB18,
  author       = {Rishikesh Sahay and
                  D. A. Sepulveda and
                  Weizhi Meng and
                  Christian Damsgaard Jensen and
                  Michael Bruhn Barfod},
  editor       = {Feng Liu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {CyberShip: An SDN-Based Autonomic Attack Mitigation Framework for
                  Ship Systems},
  booktitle    = {Science of Cyber Security - First International Conference, SciSec
                  2018, Beijing, China, August 12-14, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11287},
  pages        = {191--198},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03026-1\_14},
  doi          = {10.1007/978-3-030-03026-1\_14},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/SahaySMJB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/WangZLCS18,
  author       = {Zhi Wang and
                  Jinli Zhang and
                  Qixu Liu and
                  Xiang Cui and
                  Junwei Su},
  editor       = {Feng Liu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Practical Metrics for Evaluating Anonymous Networks},
  booktitle    = {Science of Cyber Security - First International Conference, SciSec
                  2018, Beijing, China, August 12-14, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11287},
  pages        = {3--18},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03026-1\_1},
  doi          = {10.1007/978-3-030-03026-1\_1},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/WangZLCS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/WuLLT18,
  author       = {Jiaxi Wu and
                  Xiaotong Lin and
                  Zhiqiang Lin and
                  Yi Tang},
  editor       = {Feng Liu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {A Security Concern About Deep Learning Models},
  booktitle    = {Science of Cyber Security - First International Conference, SciSec
                  2018, Beijing, China, August 12-14, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11287},
  pages        = {199--206},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03026-1\_15},
  doi          = {10.1007/978-3-030-03026-1\_15},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/WuLLT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/YanLZJZ18,
  author       = {Dingyu Yan and
                  Feng Liu and
                  Yaqin Zhang and
                  Kun Jia and
                  Yuantian Zhang},
  editor       = {Feng Liu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Characterizing the Optimal Attack Strategy Decision in Cyber Epidemic
                  Attacks with Limited Resources},
  booktitle    = {Science of Cyber Security - First International Conference, SciSec
                  2018, Beijing, China, August 12-14, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11287},
  pages        = {65--80},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03026-1\_5},
  doi          = {10.1007/978-3-030-03026-1\_5},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/YanLZJZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/Zhang18,
  author       = {Chunming Zhang},
  editor       = {Feng Liu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Computer Viruses Propagation Model on Dynamic Switching Networks},
  booktitle    = {Science of Cyber Security - First International Conference, SciSec
                  2018, Beijing, China, August 12-14, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11287},
  pages        = {81--95},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03026-1\_6},
  doi          = {10.1007/978-3-030-03026-1\_6},
  timestamp    = {Tue, 20 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/Zhang18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/ZhangLH18,
  author       = {Zhengyuan Zhang and
                  Kun Lv and
                  Changzhen Hu},
  editor       = {Feng Liu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Establishing an Optimal Network Defense System: {A} Monte Carlo Graph
                  Search Method},
  booktitle    = {Science of Cyber Security - First International Conference, SciSec
                  2018, Beijing, China, August 12-14, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11287},
  pages        = {181--190},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03026-1\_13},
  doi          = {10.1007/978-3-030-03026-1\_13},
  timestamp    = {Tue, 20 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/ZhangLH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/ZhangPX18,
  author       = {Chunming Zhang and
                  Junbiao Peng and
                  Jingwei Xiao},
  editor       = {Feng Liu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Advanced Persistent Distributed Denial of Service Attack Model on
                  Scale-Free Networks},
  booktitle    = {Science of Cyber Security - First International Conference, SciSec
                  2018, Beijing, China, August 12-14, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11287},
  pages        = {96--112},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03026-1\_7},
  doi          = {10.1007/978-3-030-03026-1\_7},
  timestamp    = {Tue, 20 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/ZhangPX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/ZhongYYXWT18,
  author       = {Xiang Zhong and
                  Luxing Yang and
                  Xiaofan Yang and
                  Qingyu Xiong and
                  Junhao Wen and
                  Yuan Yan Tang},
  editor       = {Feng Liu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Defending Against Advanced Persistent Threat: {A} Risk Management
                  Perspective},
  booktitle    = {Science of Cyber Security - First International Conference, SciSec
                  2018, Beijing, China, August 12-14, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11287},
  pages        = {207--215},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03026-1\_16},
  doi          = {10.1007/978-3-030-03026-1\_16},
  timestamp    = {Tue, 20 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/ZhongYYXWT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/scisec/2018,
  editor       = {Feng Liu and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Science of Cyber Security - First International Conference, SciSec
                  2018, Beijing, China, August 12-14, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11287},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03026-1},
  doi          = {10.1007/978-3-030-03026-1},
  isbn         = {978-3-030-03025-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scisec/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics