


default search action
12th ICCNS 2022: Beijing, China
- Proceedings of the 12th International Conference on Communication and Network Security, ICCNS 2022, Beijing, China, December 1-3, 2022. ACM 2022, ISBN 978-1-4503-9752-0

Chapter 1 Network Intrusion Detection and Attack Model
- Yueqi Zhang

, Ruiping Yin
, Zhen Yang
:
Data Poisoning Attacks to Session-Based Recommender Systems. 1-6 - Ashley Barkworth

, Rehnuma Tabassum
, Arash Habibi Lashkari
:
Detecting IMAP Credential Stuffing Bots Using Behavioural Biometrics. 7-15 - Aiming Wu

, Shanshan Tu
, Junwei Liu
, Yihe Zhang
, Yongjie Yang
, Xuetao Bai
:
Detection Scheme of Impersonation Attack Based on Sarsa(Lambda) Algorithm in Fog Computing. 16-22 - Ruihai Ge

, Yongzheng Zhang
, Shuhao Li
, Guoqiao Zhou
, Guangze Zhao
:
Leveraging Zero-Payload Packets to Detect Mobile Malware based on Network Traffic. 23-29 - Tiaokang Gao

, Xiaoning Jin
, Yingxu Lai
:
Model Heterogeneous Federated Learning for Intrusion Detection based on knowledge distillation. 30-35 - Yongjie Yang

, Shanshan Tu
, Haishuang Yan
, Yihe Zhang
, Aiming Wu
, Xuetao Bai
:
Deep Reinforcement Learning-Based Computation Offloading for Anti-jamming in Fog Computing Networks. 36-42
Chapter 2 Information Certification and Security Protection
- Abhishek Chopra

, Nikhill Vombatkere
, Arash Habibi Lashkari
:
AuthAttLyzer: A Robust defensive distillation-based Authorship Attribution framework. 43-50 - Xue Liao

, Yihua Zhou
, Jiawei Xu
, Shuaikun Xing
, Wei Zou
, Jin Zhou
, Qi Wang
, Zhenhu Ning
:
Identity-based Linkable Blind Ring Signature Scheme on Lattice. 51-57 - Xiaoyan Wu

, Xiaofeng Wang
, Qianqian Xing
:
Identity-Based Authentication Protocol for Trustworthy IP Address. 58-63 - Jin Zhou

, Zhenhu Ning
, Qi Wang
, Yuchen Wang
:
Embedded Real-time System Trusted Protection Technology for Supply Chain Scenarios. 64-68 - Luthfi Azhari

, Ari Moesriami Barmawi
:
Activity Attribute-Based User Behavior Model for Continuous User Authentication. 69-76 - Yang Yang

, Zengtao Wei
, Minming Huang
:
Accountable Policy-Based Sanitizable Signature for Medical Data Sharing. 77-84 - Aiguo Li

, Wenhao Yan
:
Research on vulnerability assessment of physical protection system based on combined weighting-two-dimensional cloud model. 85-89 - Yu Hong

, Zhenhu Ning
:
A trusted construction mechanism for sever based on trusted hard disk. 90-97
Chapter 3 Password Information and Smart Navigation System
- Yanshuang Gui

, Miaomiao Yang
, Haishuang Yan
, Yayun Guo
, Qixu Wang
, Xingshu Chen
:
MURAS: An Efficient Multi-Value-Proof-Based Remote Attestation Scheme for Cloud Platform. 98-104 - Heera G. Wali

, Nalini C. Iyer
, Shraddha B. Hiremath
:
Hardware Implementation of SPONGENT Lightweight Hash Algorithm. 105-109 - Aiguo Li

, Jie Yang
:
Multi-objective optimization algorithm for indoor positioning sensor deployment based on wireless network. 110-116 - Shisong Yang

, Yuwen Chen
, Shanshan Tu
, Zhen Yang
:
A Post-quantum Secure Aggregation for Federated Learning. 117-124 - Yidong Yuan

, Tianmeng Zhang
, Chaoyi Wang
, Lu Tian
, Jinchun Gao
:
Impact of Common Mode Current Induced by Transformer on Electromagnetic Radiation in Digital Isolation Chip. 125-130 - Siyuan Yang

, Yuhao Sun
:
Status and Key Technologies of UAV-boat Cross-domain Collaborative Development. 131-139 - Yuwen Chen

, Zheng Li
, Weiru Wang
:
A mutual authentication and key establishment scheme for peer to peer network scenario. 140-145
Chapter 4 Data Transmission and Security Mechanisms in IoT System
- Wei Zheng

, Naixin Kang
, Tao Ye
, Haining Tan
:
Trusted authentication mechanism oriented to network computing offloading at the perception layer. 146-151 - Xiaoliang Wang

, Feng Zhang
, Yanbo Ma
, Wenjuan Dai
, Yingying Jin
:
Trust evaluation model based on improved Bayesian theory for the Internet of Things. 152-158 - Mansoor Khan

, Shanshan Tu
, Ghulam Abbas
, Ziaul Haq Abbas
, Hisham Alasmary
, Muhammad Waqas
:
A Reliable and Stable V2V Routing Scheme for Warning Message Dissemination in VANETs using Bi-Directional Clustering. 159-167 - Ming Wan

, Minglei Hao, Yang Li, Jianming Zhao
, Ying Li:
Insights on Cooperative Defense for Multiple Industrial Security Technologies. 168-173 - Wei Zheng

, Naixin Kang
, Tao Ye
, Qi Wang
:
Trusted Authentication Mechanism for Perceptual layer-oriented Network Routing. 174-179 - Shaojie Luo

, Minhao Jin
, Rongjie Han
, Kexin Sun
:
Anti-jamming based on Reinforcement Learning in Power System Sensing Network. 180-184 - Chong Tan

, Han Chen
, Songlei Zhang
, Di Zhai
, Yang Lu
, Hong Liu
:
Traffic offloading based on content sharing in D2D for Smart Grid. 185-190 - Madumitha Venkatasubramanian

, Arash Habibi Lashkari
, Saqib Hakak
:
Federated Learning Assisted IoT Malware Detection Using Static Analysis. 191-198 - Haoyu Yu

, Shanshan Tu
, Yihe Zhang
:
Decentralized Consensus Blockchain-Based Authentication Algorithm Using in Secure Internet of Vehicles. 199-204
Chapter 5 Blockchain Theory and Data Security
- Xuetao Bai

, Shanshan Tu
, Haishuang Yan
, Yongjie Yang
, Aiming Wu
, Yihe Zhang
:
SPoW: A solution to the problem of centralization of computing power. 205-210 - Yihe Zhang

, Shanshan Tu
, Muhammad Waqas
, Yongjie Yang
, Aiming Wu
, Xuetao Bai
:
Resource Allocation for Blockchain-Enabled Fog Computing with Deep Reinforcement Learning. 211-218 - Su-Juan Qin

, Zhao Liu
, Feixiang Ren
, Chong Tan
:
Smart Contract Vulnerability Detection Based on Critical Combination Path and Deep Learning. 219-226 - Yihe Zhang

, Shanshan Tu
, Shengju Zhang
, Yongjie Yang
, Aiming Wu
, Xuetao Bai
:
Performance Optimization Blockchain-Enabled Fog Computing with Deep Reinforcement Learning. 227-233

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














