


default search action
17th SecureComm 2023: Hong Kong, SAR, China
- Haixin Duan

, Mourad Debbabi
, Xavier de Carné de Carnavalet
, Xiapu Luo, Xiaojiang Du
, Man Ho Allen Au:
Security and Privacy in Communication Networks - 19th EAI International Conference, SecureComm 2023, Hong Kong, China, October 19-21, 2023, Proceedings, Part I. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 567, Springer 2025, ISBN 978-3-031-64947-9
AI for Security
- Neea Rusch

, Asma Jodeiri Akbarfam, Hoda Maleki
, Gagan Agrawal, Gokila Dorai
:
Classify Me Correctly if You Can: Evaluating Adversarial Machine Learning Threats in NIDS. 3-22 - Xin Zong, Min Luo, Cong Peng, Debiao He:

CUFT: Cuflow-Based Approach with Multi-headed Attention Mechanism for Encrypted Traffic Classification. 23-40 - Yue Huang, Yongyan Guo, Cheng Huang:

CyberEA: An Efficient Entity Alignment Framework for Cybersecurity Knowledge Graph. 41-62 - Yuanjun Dai

, Qingzhe Guo, An Wang:
DNN Architecture Attacks via Network and Power Side Channels. 63-87 - Jianyi Zhang, Ronglin Guan, Zhangchi Zhao, Xiuying Li, Zezheng Sun:

Invisibility Spell: Adversarial Patch Attack Against Object Detectors. 88-109 - Zhuoting Wu, Zhiwei Guo, Jiuxiang You, Zhenguo Yang, Qing Li, Wenyin Liu:

Meta Perturbation Generation Network for Text-Based CAPTCHA. 110-124 - Renyang Liu

, Wei Zhou
, Jinhong Zhang
, Xiaoyuan Liu
, Peiyuan Si
, Haoran Li
:
Model Inversion Attacks on Homogeneous and Heterogeneous Graph Neural Networks. 125-144 - Yanru Xiao, Cong Wang, Xing Gao:

Unsupervised Multi-criteria Adversarial Detection in Deep Image Retrieval. 145-164 - Botao Xu

, Haizhou Wang
:
VRC-GraphNet: A Graph Neural Network-Based Reasoning Framework for Attacking Visual Reasoning Captchas. 165-184
Authentication
- Hao Peng, Zisang Xu, Ruirui Zhang, Jianbo Xu:

An Adaptive Authentication Protocol for Internet of Vehicles Based on Vehicle Density. 187-204 - Minglei Guo, Zhenghang Xiao, Xin Liu, Jianwei Zhuge:

Discovering and Understanding the Security Flaws of Authentication and Authorization in IoT Cloud APIs for Smart Home. 205-224 - Jiaqi Yang, Jun Xian Chia, Xijie Ba, Jianying Zhou, Zheng Yang

:
Optimizing Lightweight Intermittent Message Authentication for Programmable Logic Controller. 225-243
Blockchain and Distributed System Security
- Hanzheng Lyu, Shaokang Xie, Jianyu Niu, Chen Feng:

Byzantine Protocols with Asymptotically Optimal Communication Complexity. 247-264 - Jiangfeng Ma, Xuetao Zhang, Xiangxue Li:

Demystifying Blockchain Scalability: Sibling Chains with Minimal Interleaving. 265-286 - Jinfu Chen, Qiaowei Feng, Saihua Cai, Dengzhou Shi, Dave Towey

, Yuhao Chen, Dongjie Wang:
VDABSys: A Novel Security-Testing Framework for Blockchain Systems Based on Vulnerability detection. 287-305
Cryptography
- Yanqing Yang, Jian Wang:

Anonymous Key Issuing Protocol with Certified Identities in Identity-Based Encryption. 309-328 - Xi Lin, Han Xia, Yongqiang Li, Mingsheng Wang:

Batch Lattice-Based Designated-Verifier ZK-SNARKs for R1CS. 329-349 - Yingjie Dong, Yongjian Liao, Zhishuo Zhang, Wen Huang:

Certificateless Aggregate Signature Without Trapdoor for Cloud Storage. 350-368 - Michael Raymond

, Gillian Evers, Jan Ponti
, Diya Krishnan
, Xiang Fu
:
Efficient Zero Knowledge for Regular Language. 369-394 - Feng Zhuo, Zhaoxiong Song, Linpeng Jia, Hanwen Zhang, Zhongcheng Li, Yi Sun:

Enabling Fast Settlement in Atomic Cross-Chain Swaps. 395-412 - Duy Tung Khanh Nguyen, Dung Hoang Duong, Willy Susilo

, Yang-Wai Chow
:
HeSUN: Homomorphic Encryption for Secure Unbounded Neural Network Inference. 413-438 - Keyi Liu, Chungen Xu, Bennian Dou, Lei Xu:

Optimization of Functional Bootstraps with Large LUT and Packing Key Switching. 439-458
Data Security
- Wenhao Li

, Chengliang Wang
, Xiaobing Hu, Hongwen Zhou, Hang Zeng, Yanai Wang:
An Authentication Algorithm for Sets of Spatial Data Objects. 461-475 - Haibo Tian, Yini Lin

:
An Efficient Private Information Retrieval Protocol Based on TFHE. 476-495 - Yunming Zhang, Quanwei Cai, Houqiang Li, Jingqiang Lin, Wei Wang:

mShield: Protecting In-process Sensitive Data Against Vulnerable Third-Party Libraries. 496-513 - Beibei Zhou

, Daojing He
, Sencun Zhu
, Shanshan Zhu, Sammy Chan
, Xiao Yang:
Password Cracking by Exploiting User Group Information. 514-532

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














