


default search action
5th SciSec 2023: Melbourne, VIC, Australia
- Moti Yung

, Chao Chen
, Weizhi Meng
:
Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings. Lecture Notes in Computer Science 14299, Springer 2023, ISBN 978-3-031-45932-0
Network and System Security
- Ning Xi, Yihuan He, Yuchen Zhang, Zhi Wang, Pengbin Feng:

ACDroid: Detecting Collusion Applications on Smart Devices. 3-22 - Wenwen Ruan, Wenhao Wang, Shuang Liu, Ran Duan, Shoumeng Yan:

DomainIsolation: Lightweight Intra-enclave Isolation for Confidential Virtual Machines. 23-41 - Weixia Cai, Huashan Chen, Feng Liu:

Keeping Your Enemies Closer: Shedding Light on the Attacker's Optimal Strategy. 42-59 - Zheyuan Sun, Maochao Xu, Kristin M. Schweitzer, Raymond M. Bateman, Alexander Kott, Shouhuai Xu:

Cyber Attacks Against Enterprise Networks: Characterization, Modeling and Forecasting. 60-81
Cryptography and Authentication
- Jinyang Li, Zhenfu Cao, Jiachen Shen, Xiaolei Dong:

MCVDSSE: Secure Multi-client Verifiable Dynamic Symmetric Searchable Encryption. 85-96 - Xinyuan Qin, Wenjuan Li:

A Graphical Password Scheme Based on Rounded Image Selection. 97-114 - Xiuxiu Li, Wei Yu, Kunpeng Wang:

Implementation of the Elliptic Curve Method. 115-126 - Xiuxiu Li, Wei Yu, Kunpeng Wang, Luying Li:

Almost Injective and Invertible Encodings for Jacobi Quartic Curves. 127-138 - Linkang Zhang, Yunyang Qin, Yujia Zhu, Yifei Cheng, Zhen Jie, Qingyun Liu:

SeeStar: An Efficient Starlink Asset Detection Framework. 139-156 - Kaiming Chen

, Atsuko Miyaji
, Yuntao Wang:
Privacy-Enhanced Anonymous and Deniable Post-quantum X3DH. 157-177
AI for Security
- Bin Ma, Kun Li, Jian Xu, Chunpeng Wang, Jian Li, Liwei Zhang:

Enhancing the Anti-steganalysis Ability of Image Steganography via Multiple Adversarial Networks. 181-192 - Fusen Guo

, Jianzhang Wu
, Lei Pan:
An Empirical Study of AI Model's Performance for Electricity Load Forecasting with Extreme Weather Conditions. 193-204
Threat Detection and Analysis
- Han Miao, Huaifeng Bao, Zixian Tang, Wenhao Li, Wen Wang, Huashan Chen, Feng Liu, Yanhui Sun:

AST2Vec: A Robust Neural Code Representation for Malicious PowerShell Detection. 207-224 - Haiping Wang

, Binbin Li, Tianning Zang, Yifei Yang, Zisen Qi, Siyu Jia, Yu Ding:
Real-Time Aggregation for Massive Alerts Based on Dynamic Attack Granularity Graph. 225-243 - Xiaowei Wang

, Zimu Yuan
, Yang Xiao
, Liyan Wang, Yican Yao
, Haiming Chen
, Wei Huo
:
Decompilation Based Deep Binary-Source Function Matching. 244-260 - Peng Wang, Guangxiang Dai, Lidong Zhai:

Event-Based Threat Intelligence Ontology Model. 261-282
Web and Privacy Security
- Md Mahabub Uz Zaman, Liangde Tao, Mark Maldonado, Chang Liu, Ahmed Sunny, Shouhuai Xu, Lin Chen:

Optimally Blending Honeypots into Production Networks: Hardness and Algorithms. 285-304 - Mengxia Ren, Joshua Josey, Chuan Yue

:
WebMea: A Google Chrome Extension for Web Security and Privacy Measurement Studies. 305-318 - Rosana Montañez Rodriguez, Theodore Tangie Longtchi, Kora Gwartney, Ekzhin Ear, David P. Azari, Christopher P. Kelley, Shouhuai Xu:

Quantifying Psychological Sophistication of Malicious Emails. 319-331 - Kaifeng Luo, Zhenfu Cao, Jiachen Shen, Xiaolei Dong:

SVFL: Secure Vertical Federated Learning on Linear Models. 332-344
Cryptography and Authentication II
- Jason T. LeGrow

, Brian Koziel, Reza Azarderakhsh:
Multiprime Strategies for Serial Evaluation of eSIDH-Like Isogenies. 347-366 - Yao Zan, Hongda Li, Haixia Xu:

Adaptively Secure Constrained Verifiable Random Function. 367-385 - Bin Ma, Zhongquan Tao, Jian Xu, Chunpeng Wang, Jian Li, Liwei Zhang:

A Robust Reversible Data Hiding Algorithm Based on Polar Harmonic Fourier Moments. 386-397
Advanced Threat Detection Techniques and Blockchain
- Devharsh Trivedi

, Nikos Triandopoulos:
VaultBox: Enhancing the Security and Effectiveness of Security Analytics. 401-422 - Yipeng Wang, Peixian Chen, Shan Ai, Weipeng Liang, Binjie Liao, Weichuan Mo, Heng Wang:

Two-Stage Anomaly Detection in LEO Satellite Network. 423-438 - Zhuo An

, Mingsheng Wang, Dongdong Liu, Taotao Li, Qiang Lai:
Hydra: An Efficient Asynchronous DAG-Based BFT Protocol. 439-459 - Chunying Peng, Haixia Xu, Huimei Liao, Jinling Tang, Tao Tang:

Redactable Blockchain in the Permissioned Setting. 460-477
Workshop Session
- Bin Ma, Songkun Wang, Jian Xu, Chunpeng Wang, Jian Li, Xiaolong Li:

A Multi-level Sorting Prediction Enhancement-Based Two-Dimensional Reversible Data Hiding Algorithm for JPEG Images. 481-495 - Zongning Gao

, Shunliang Zhang
:
Research on Encrypted Malicious 5G Access Network Traffic Identification Based on Deep Learning. 496-512 - Pengju He, Haibo Zhang

, Yaokai Feng, Kouichi Sakurai:
A Design of Network Attack Detection Using Causal and Non-causal Temporal Convolutional Network. 513-523

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














