


default search action
15th SecureComm 2019: Orlando, FL, USA
- Songqing Chen

, Kim-Kwang Raymond Choo
, Xinwen Fu
, Wenjing Lou, Aziz Mohaisen
:
Security and Privacy in Communication Networks - 15th EAI International Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019, Proceedings, Part I. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 304, Springer 2019, ISBN 978-3-030-37227-9
Blockchains
- Truc D. T. Nguyen

, My T. Thai:
Trustless Framework for Iterative Double Auction Based on Blockchain. 3-22 - Shuyang Tang, Jilai Zheng, Yao Deng, Ziyu Wang, Zhiqiang Liu, Dawu Gu, Zhen Liu, Yu Long:

Towards a Multi-chain Future of Proof-of-Space. 23-38 - Kai Li, Yuzhe Richard Tang, Beom Heyn Ben Kim

, Jianliang Xu
:
Secure Consistency Verification for Untrusted Cloud Storage by Public Blockchains. 39-62 - Yaping Liu, Shuo Zhang, Haojin Zhu

, Peng-Jun Wan, Lixin Gao, Yaoxue Zhang:
An Enhanced Verifiable Inter-domain Routing Protocol Based on Blockchain. 63-82
Internet of Things
- Yifan Tian, Jiawei Yuan, Shucheng Yu

, Yantian Hou, Houbing Song
:
Edge-Assisted CNN Inference over Encrypted Data for Internet of Things. 85-104 - Chenglong Fu, Xiaojiang Du, Longfei Wu, Qiang Zeng, Amr Mohamed

, Mohsen Guizani:
POKs Based Secure and Energy-Efficient Access Control for Implantable Medical Devices. 105-125 - Kyle Denney, Enes Erdin, Leonardo Babun, Michael Vai, A. Selcuk Uluagac:

USB-Watch: A Dynamic Hardware-Assisted USB Threat Detection Framework. 126-146 - Jianhua Sun, Kun Sun, Chris Shenefiel:

Automated IoT Device Fingerprinting Through Encrypted Stream Classification. 147-167
Catching Malware
- Shuang Zhao, Xiaobo Ma, Wei Zou, Bo Bai:

DeepCG: Classifying Metamorphic Malware Through Deep Learning of Call Graphs. 171-190 - Xunchao Hu, Brian Testa, Heng Yin

:
ChaffyScript: Vulnerability-Agnostic Defense of JavaScript Exploits via Memory Perturbation. 191-213 - Zhiqiang Li, Jun Sun, Qiben Yan

, Witawas Srisa-an
, Yutaka Tsutano:
Obfusifier: Obfuscation-Resistant Android Malware Detection System. 214-234 - Steven Gianvecchio, Christopher Burkhalter, Hongying Lan, Andrew Sillers, Kenneth P. Smith:

Closing the Gap with APTs Through Semantic Clusters and Automated Cybergames. 235-254
Machine Learning
- Jiahao Ding, Sai Mounika Errapotu, Haijun Zhang, Yanmin Gong

, Miao Pan, Zhu Han:
Stochastic ADMM Based Distributed Machine Learning with Differential Privacy. 257-277 - Yuping Li, Jiyong Jang, Xinming Ou:

Topology-Aware Hashing for Effective Control Flow Graph Similarity Analysis. 278-298 - Shaohua Ding, Yulong Tian, Fengyuan Xu, Qun Li

, Sheng Zhong:
Trojan Attack on Deep Generative Models in Autonomous Driving. 299-318 - Mengxia Luo

, Can Yang
, Xiaorui Gong, Lei Yu:
FuncNet: A Euclidean Embedding Approach for Lightweight Cross-platform Binary Recognition. 319-337
Everything Traffic Security
- Eman Salem Alashwali, Pawel Szalachowski, Andrew Martin:

Towards Forward Secure Internet Traffic. 341-364 - Rui Zhao, Edward Chow, Chunchun Li:

Traffic-Based Automatic Detection of Browser Fingerprinting. 365-385 - Tao Chen, Weiqi Cui, Eric Chan-Tin:

Measuring Tor Relay Popularity. 386-405 - Kris Oosthoek, Christian Doerr:

SoK: ATT&CK Techniques and Trends in Windows Malware. 406-425
Communicating Covertly
- Jiahao Cao, Kun Sun, Qi Li, Mingwei Xu, Zijie Yang, Kyung Joon Kwak, Jason H. Li:

Covert Channels in SDN: Leaking Out Information from Controllers to End Hosts. 429-449 - Riccardo Bortolameotti, Thijs van Ede, Andrea Continella

, Maarten H. Everts, Willem Jonker, Pieter H. Hartel, Andreas Peter:
Victim-Aware Adaptive Covert Channels. 450-471 - Ahmad Alagil, Yao Liu:

Random Allocation Seed-DSSS Broadcast Communication Against Jamming Attacks. 472-489 - Changbo Tian, Yongzheng Zhang, Tao Yin, Yupeng Tuo, Ruihai Ge:

A Loss-Tolerant Mechanism of Message Segmentation and Reconstruction in Multi-path Communication of Anti-tracking Network. 490-508
Let's Talk Privacy
- Dawei Chu, Jingqiang Lin, Fengjun Li

, Xiaokun Zhang, Qiongxiao Wang, Guangqi Liu:
Ticket Transparency: Accountable Single Sign-On with Privacy-Preserving Public Logs. 511-531 - Lichuan Ma, Qingqi Pei, Youyang Qu

, Kefeng Fan, Xin Lai:
Decentralized Privacy-Preserving Reputation Management for Mobile Crowdsensing. 532-548 - Savio Sciancalepore

, Saeif Alhazbi
, Roberto Di Pietro
:
Location Privacy Issues in the OpenSky Network Crowdsourcing Platform. 549-568 - Tanya Khatri, Gaby G. Dagher

, Yantian Hou:
Privacy-Preserving Genomic Data Publishing via Differentially-Private Suffix Tree. 569-584

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














