


default search action
17th SecureComm 2023: Hong Kong, SAR, China
- Haixin Duan

, Mourad Debbabi
, Xavier de Carné de Carnavalet
, Xiapu Luo, Xiaojiang Du
, Man Ho Allen Au:
Security and Privacy in Communication Networks - 19th EAI International Conference, SecureComm 2023, Hong Kong, China, October 19-21, 2023, Proceedings, Part II. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 568, Springer 2025, ISBN 978-3-031-64953-0
Intrusion and Anomaly Detection
- Mingwei Zhang, Jun Li

, Jiabin Wu, Peter L. Reiher:
A Game Theoretical Analysis of Distributed Denial-of-Service Defense Incentive. 3-24 - Lumin Shi, Jun Li, Devkishen Sisodia, Mingwei Zhang, Alberto Dainotti, Peter L. Reiher:

DDoS Mitigation Dilemma Exposed: A Two-Wave Attack with Collateral Damage of Millions. 25-44 - Radhwan A. A. Saleh, Louai Al-Awami, Mustafa Ghaleb, Anas Ahmad Abudaqa:

Lightweight Intrusion Detection for IoT Systems Using Artificial Neural Networks. 45-59 - Zuwei Fan, Shunliang Zhang:

MVTBA: A Novel Hybrid Deep Learning Model for Encrypted Malicious Traffic Identification. 60-79 - Yatish Dubasi, Qinghua Li, Khoa Luu:

POP-HIT: Partially Order-Preserving Hash-Induced Transformation for Privacy Protection in Face Recognition Access Control. 80-98
IoT Security
- Han Hu, Daibin Wang, Tailiang Hong, Sheng Zhang:

Enhancing Cross-Device Security with Fine-Grained Permission Control. 101-121 - Shuo Yang, Hongru Li, Jian Guo:

The Security Analysis of ROS2 Communication. 122-139 - Ebuka Oguchi, Nirnimesh Ghose:

VET: Autonomous Vehicular Credential Verification Using Trajectory and Motion Vectors. 140-164
Network Security
- Songtao Liu, Hua Wu, Hao Luo, Guang Cheng, Xiaoyan Hu:

A Stable Fine-Grained Webpage Fingerprinting: Aiming at the Unstable Realistic Network. 167-188 - Ziqi Yang, Ruite Xu, Qixiao Lin, Shikun Wu, Jian Mao, Zhenkai Liang:

Securing Web Inputs Using Parallel Session Attachments. 189-208 - Guoqiang Zhang, Jiahao Cao, Mingwei Xu, Xinhao Deng:

Unsupervised and Adaptive Tor Website Fingerprinting. 209-229 - Kodai Mizutani, Daisuke Kotani

, Yasuo Okabe
:
Visibility of Scan Traffic Trends in Sparsely Populated Darknets. 230-248
Privacy
- Yumeki Goto, Nami Ashizawa

, Toshiki Shibahara
, Naoto Yanai
:
Do Backdoors Assist Membership Inference Attacks? 251-265 - Xinglei Li, Haifeng Qian:

Efficient and Scalable Multi-party Privacy-Preserving k-NN Classification. 266-286 - Ou Ruan, Chaohao Ai, Changwang Yan:

Efficient Unbalanced Private Set Intersection Protocol over Large-Scale Datasets Based on Bloom Filter. 287-301 - Tingxuan Han, Wei Tong, Jiacheng Niu, Sheng Zhong:

Practical Privacy-Preserving Community Detection in Decentralized Weighted Networks. 302-320 - Khoa Nguyen

, Tanveer Khan
, Antonis Michalas
:
Split Without a Leak: Reducing Privacy Leakage in Split Learning. 321-344 - Christophe Hauser, Shirin Nilizadeh, Yan Shoshitaishvili, Ni Trieu, Srivatsan Ravi, Christopher Kruegel, Giovanni Vigna:

Street Rep: A Privacy-Preserving Reputation Aggregation System. 345-368
Program Analysis
- Li Wang, Yi Yang, Goutham Reddy Alavalapati:

Analyzing Implementation-Based SSL/TLS Vulnerabilities with Binary Semantics Analysis. 371-394 - Zhanpeng Liu, Xinhui Han:

Identifying Library Functions in Stripped Binary: Combining Function Similarity and Call Graph Features. 395-408 - Enzhou Song

, Tao Hu, Peng Yi, Wenbo Wang:
PDFIET: PDF Malicious Indicators Extraction Technique Through Optimized Symbolic Execution. 409-425 - Can Tu, Liu Wang, Yang Xu, Yiping Zhao, Haitao Xu, Haoyu Wang:

Ransomware as a Service: Demystifying Android Ransomware Generators. 426-447
Software Security
- Yuxuan Wang, Yishen Li, Jihu Zheng, Jianwei Zhuge:

CV2XFuzzer: C-V2X Parsing Vulnerability Discovery System Based on Fuzzing. 451-466 - Sri Haritha Ambati, Natalia Stakhanova, Enrico Branca:

Learning AI Coding Style for Software Plagiarism Detection. 467-489 - Jerre Starink, Marieke Huisman, Andreas Peter, Andrea Continella:

Understanding and Measuring Inter-process Code Injection in Windows Malware. 490-514

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














