


default search action
23rd TrustCom 2024: Sanya, China
- 23rd IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024. IEEE 2024, ISBN 979-8-3315-0620-9

- Hendrik Meyer zum Felde, Andrei-Cosmin Aprodu:

MAXPOWR: Memory Attestation and Export in Process-based Trusted Execution Environments. 1-12 - Ruizhong Du, Jiajia Kang, Jin Tian:

Trusted Networking for Drones: Reputation-Based Security Mechanisms for Node Access and Information Synchronization. 13-20 - Qingyu Gao, Liantao Song, Yan Lei, Feng Wang, Lei Wang, Shize Zong, Yan Ding:

Enhancing Consistency in Container Migration via TEE: A Secure Architecture. 21-28 - Fei Peng, Yousheng Liang, Min Long:

A Semi-Fragile Reversible Watermarking for 3D Models Based on IQIM with Dual-Strategy Partition Modulation. 29-36 - Feng He, Shijun Zhao, Dan Meng, Rui Hou:

MSMP: A Centralized Shared-memory Management for Building Efficient and Reliable File Systems on Microkernels. 37-48 - Wei Feng, Dongyuan Wei, Qianqian Wang:

Blind Signature Based Anonymous Authentication on Trust for Decentralized Mobile Crowdsourcing. 49-56 - Guangfa Lyu, Jian Kong, Yinglong Chen, Fengyu Wang:

CTWF: Website Fingerprinting Attack based on Compact Convolutional Transformer. 57-67 - Tian Tian, Yan Zhu, Ning An, Bo Jiang, Huamin Feng, Zhigang Lu:

LSTM-Diff: A Data Generation Method for Imbalanced Insider Threat Detection. 68-76 - Nan Jiang, Yuanbo Zhao, Qihang Zhou, Xiaoqi Jia, Jing Tang:

SeChannel: A Secure and Lightweight Channel Protection Approach for TEE Systems. 77-84 - Jihong Liu, Chenyang Tu, Yifei Zhang:

Hardware assisted security gateway system: combined with FPGA shielding protection. 85-92 - Muhammad Adil, Mian Ahmad Jan, Safayat Bin Hakim, Houbing Herbert Song, Zhanpeng Jin:

xIDS-EnsembleGuard: An Explainable Ensemble Learning-based Intrusion Detection System. 93-100 - Jean de Bonfils Lavernelle

, Pierre-François Bonnefoi, Benoît Gonzalvo, Damien Sauveron:
DMA: A Persistent Threat to Embedded Systems Isolation. 101-108 - Chengyu Li, Weihai Li, Zikai Xu, Nenghai Yu:

StegaFDS: Generative Steganography Based on First-Order DPM-Solver. 109-116 - Max Landauer

, Klaus Mayer, Florian Skopik
, Markus Wurzenberger
, Manuel Kern:
Red Team Redemption: A Structured Comparison of Open-Source Tools for Adversary Emulation. 117-128 - Mykolai Protsenko, Albert Stark, Andreas Papon, Sandra Kostic:

VisualAuth: Secure Transaction Authentication and Trusted UI on COTS Android Devices. 129-140 - Khanh-Duy Nguyen

, Hsi-Ching Chu, Quoc-Viet Nguyen, Min-Te Sun, Kazuya Sakai, Wei-Shinn Ku:
From Data to Action: CTI Analysis and ATT&CK Technique Correlation. 141-148 - Zhuowei Shen, Xiao Kou

, Taiyao Yang, Haoqin Xu, Dongbin Wang, Shaobo Niu
:
A Revocable Pairing-Free Certificateless Signature Scheme Based on RSA Accumulator. 149-156 - Jiuyao Jing, Yu Zheng, Qi He, Chunlei Peng:

Face Anti-spoofing based on Multi-modal Dual-stream Anomaly Detection. 157-164 - Fei Zhang, Xiaohong Li, Sen Chen, Ruitao Feng

:
Behavior Speaks Louder: Rethinking Malware Analysis Beyond Family Classification. 166-175 - Xin Deng, Rui Wang, Weihong Han, Zhihong Tian:

Vulnerabilities are collaborating to compromise your system: A network risk assessment method based on cooperative game and attack graph. 176-183 - Rong Wang

, Junchuan Liang, Haiting Jiang, Chaosheng Feng, Chin-Chen Chang:
StegoFL: Using Steganography and Federated Learning to Transmit Malware. 184-190 - Mingjie Yu, Wei Jin, Fenghua Li, Yunchuan Guo, Zheng Yan, Xiao Wang, Nenghai Yu:

Correcting the Bound Estimation of Mohawk. 191-196 - Yongwei Lu, Xiaoyan Liang, Ruizhong Du, Junfeng Tian:

OFLGI: An Optimization-based Feature-Level Gradient Inversion Attack. 197-204 - Yusen Wang, Jiong Lou, Zihan Wang, Jie Li:

Front-running Attacks in Hash-Based Transaction Sharding Blockchains. 205-212 - Jie Cui, Jing Zhang, Lu Wei, Minghui Zhu, Hong Zhong, Geyong Min:

Multi-Authority Ciphertext-Policy Attribute-based Encryption with Hidden Policy for Securing Internet-of-Vehicles. 213-221 - Zhuochen Jiang, Baojian Hua:

WaShadow: Effectively Protecting WebAssembly Memory Through Virtual Machine-Aware Shadow Memory. 222-233 - Debao Wang, Yiwen Gao, Jingdian Ming, Yongbin Zhou, Xian Huang:

Attacking High-Performance SBCs: A Generic Preprocessing Framework for EMA. 234-241 - Yu Hao, Xu Zhang, Dongbin Wang:

CPCED: a container escape detection system based on CNI plugin. 242-253 - Zhefeng Nan, Qi Wang, Changbo Tian, Yijing Wang, Tianning Zang, Dongwei Zhu:

Path Generation Method of Anti-Tracking Network based on Dynamic Asymmetric Hierarchical Architecture. 254-261 - Yilin Zhu, Guang Cheng, Shunyu Zheng, Hantao Mei:

TOScorr: Transformer-based Flow Correlation Attack on Tor Onion Service. 262-270 - Yuwei Xu, Xiaotian Fang, Zhengxin Xu, Kehui Song, Yali Yuan, Guang Cheng:

M-ETC: Improving Multi-Task Encrypted Traffic Classification by Reducing Inter-Task Interference. 271-278 - Xu Li, Yinghao Wu, Yang Liu, Baosheng Wang, Bei Wang, Yijun Cui:

Lattice-based Multi-Stage Secret Sharing 3D Secure Encryption Scheme. 279-286 - Cao Chen, Fenghua Li, Yunchuan Guo, Zifu Li, Wenlong Kou:

Efficiently Detecting DDoS in Heterogeneous Networks: A Parameter-Compressed Vertical Federated Learning approach. 287-294 - Kéren Saint-Hilaire, Christopher Neal, Frédéric Cuppens, Nora Boulahia-Cuppens, Francesca Bassi

:
Attack-Defense Graph Generation: Instantiating Incident Response Actions on Attack Graphs. 295-305 - Meijie Du, Mingqi Hu, Shu Li, Zhao Li, Qingyun Liu:

SCENE: Shape-based Clustering for Enhanced Noise-resilient Encrypted Traffic Classification. 306-315 - Tao Leng, Chang You, Shuangchun Luo, Junyi Liu, Yutong Zeng, Cheng Huang:

GraySniffer: A Cliques Discovering Method for Illegal SIM Card Vendor Based on Multi-Source Data. 316-325 - Hao Jiang, Haiwei Lai, Si Wu, Baojian Hua:

JasFree: Grammar-free Program Analysis for JavaScript Bytecode. 326-337 - Liujia Cai, Tong Yu, Yumeng Li, Siqi Lu

, Hanjie Dong, Guangying Cai, Guangsong Li, Yongjuan Wang:
SyntaxBridge: Protocol Description Transformer for Enhanced Formal Analysis of Security Protocols. 338-345 - Yue Li, Runcheng Fang, Qipeng Song, Xilei Yang:

STGCN-Based Link Flooding Attack Detection and Mitigation in Software-Defined Network. 346-353 - Yunyang Qin, Yujia Zhu, Linkang Zhang, Baiyang Li, Yong Ding, Qingyun Liu:

LayyerX: Unveiling the Hidden Layers of DoH Server via Differential Fingerprinting. 354-361 - Zhujie Guan, Mengmeng Tian, Yuwei Xu, Kehui Song, Guang Cheng:

WCDGA: BERT-Based and Character-Transforming Adversarial DGA with High Anti-Detection Ability. 362-369 - Xiaoran Huang, Yiwen Gao, Wei Cheng, Yuejun Liu, Jingdian Ming, Yongbin Zhou, Jian Weng:

Towards High-Quality Electromagnetic Leakage Acquisition in Side-Channel Analysis. 370-377 - Spyridon Sourmelis, Weizhi Meng:

Cyber Risk Analysis on Electric Vehicle Systems via NIST CSF. 378-386 - Abdoul Nasser Hassane Amadou, Anas Motii

, Saida Elouardi, El Houcine Bergou:
EUREKHA: Enhancing User Representation for Key Hackers Identification in Underground Forums. 387-398 - Yuan Zhao, Chunhe Xia, Tianbo Wang, Mengyao Liu, Yang Li:

Few-shot Encrypted Malicious Traffic Classification via Hierarchical Semantics and Adaptive Prototype Learning. 399-409 - Weidong Zhou, Chunhe Xia, Nan Feng, Xinyi Pan, Tianbo Wang, Xiaojian Li:

AIDE: Attack Inference Based on Heterogeneous Dependency Graphs with MITRE ATT&CK. 410-417 - Beibei Feng, Qi Wang, Xiaolin Xu, Yijing Wang, Tianning Zang, Jingrun Ma:

From Scarcity to Clarity: Few-Shot Learning for DoH Tunnel Detection Through Prototypical Network. 418-426 - Serena Cofano

, Giacomo Benedetti, Matteo Dell'Amico:
SBOM Generation Tools in the Python Ecosystem: an In-Detail Analysis. 427-434 - Feixue Yan, Sheng Wen, Yang Xiang

, Shiping Chen:
Shapley-value-based Explanations for Cryptocurrency Blacklist Detection. 435-442 - Keyi Ju, Hui Zhong, Xinyue Zhang, Xiaoqi Qin, Miao Pan:

Controllable Quantum Computing Privacy via Inherent Noises and Quantum Error Mitigation. 443-452 - Yuchen Chen, Guanxiong Ha, Xuan Shan, Chunfu Jia, Qiaowen Jia:

Scalable Client-side Encrypted Deduplication beyond Secret Sharing of the Master Key. 453-460 - Xiaohong Wu, Yujun Lin, Jie Tao, Yonggen Gu:

Machine Learning-based Optimal Data Trading Mechanism with Randomized Privacy Protection Scheme. 461-468 - Florian Dehling, Sebastian Koch, Luigi Lo Iacono, Hannes Federrath:

You Are as You Type: Investigating the Influence of Timestamp Accuracy on the Robustness of Keystroke Biometrics. 469-480 - Pengfei Wu, Jianfei Sun, Guomin Yang, Robert H. Deng

:
Towards Privacy-aware IoT Communications: Delegable, Revocable, and Efficient. 481-491 - Qipeng Song, Ruiyun Wang, Yue Li, Yiheng Yan, Xingyue Zhu, Hui Li:

TrustNotify: A Lightweight Framework for Complete and Trustworthy Data Deletion Notification Distribution. 492-500 - Ting Zhou, Hongtao Lv, Ning Liu, Lei Liu:

Budget-Feasible Double Auction Mechanisms for Model Training Services in Federated Learning Market. 501-507 - Yalan Wang, Liqun Chen, Long Meng, Christopher J. P. Newton:

VCaDID: Verifiable Credentials with Anonymous Decentralized Identities. 508-515 - Qinchen Guan, Shaoyong Du, Kerong Wang, Chunfang Yang, Xiangyang Luo:

A Framework for Detecting Hidden Partners in App Collusion. 516-523 - Jingchi Zhang, Anwitaman Datta:

Enhancing Privacy-Preserving Multi-Authority Attribute-Based Encryption: Addressing Rogue-Key Attacks Under Adaptive Corruption of Authorities. 524-531 - Haoyang Wang, Kai Fan, Yue Quan, Fenghua Li, Hui Li:

VDPSRQ: Achieving Verifiable and Dynamic Private Spatial Range Queries over Outsourced Database. 532-541 - Fuyao Zhang

, Dan Wang, Chuyang Liang:
DPFCIL: Differentially Private Federated Class-Incremental Learning on non-IID Data. 542-550 - Wenxiu Ding, Hongjiang Guo, Zheng Yan, Mingjun Wang:

Secure Federated Learning Schemes Based on Multi-Key Homomorphic Encryption. 551-558 - Yuwei Xu, Jiangfeng Li, Yujie Hou, Xinxu Huang, Yali Yuan, Guang Cheng:

TriViewNet: Achieve Accurate Tor Hidden Service Classification by Multi-View Feature Extraction and Fusion. 559-566 - Mingjun Wang, Yixuan Liu, Wenxiu Ding:

SP2-RD2D: Secure and Privacy-Preserving Authentication and Key Agreement Protocol for D2D Relay Communication. 567-573 - Xin Zhang, Bingbing Zhang, Chi Zhang, Lingbo Wei:

Enhanced Privacy Policy Comprehension via Pre-trained and Retrieval-Augmented Models. 574-581 - Siyuan Guan, Ziheng Hu, Guotao Xu, Yao Zhu, Bowen Zhao:

MIND: A Privacy-Preserving Model Inference Framework via End-Cloud Collaboration. 582-589 - Ruoyao Xiao, Yu Luo, Weifeng Xu, Harshmeet Lamba, Dianxiang Xu:

Analyzing Relationship Consistency in Digital Forensic Knowledge Graphs with Graph Learning. 590-599 - Yuheng Zhang

, Guojun Wang, Peiqiang Li, Xubin Li, Wanyi Gu, Mingfei Chen, Houji Chen:
TransFront: Bi-path Feature Fusion for Detecting Front-running Attack in Decentralized Finance. 600-607 - Jong-Hee Jeon, Jahoon Koo, Young-Gab Kim:

RAG-based Cyber Threat Tracing Graph Modeling Method. 608-615 - Xiaoshuang Li, Mingjun Wang, Yilong Guo, Wenxiu Ding:

AdaptFL: Adaptive Client Task Allocation-Based Synchronous Federated Learning. 616-623 - Yongkang Yu, Jinchun He, Xinwei Xu, Qinnan Zhang, Wangjie Qiu, Hongwei Zheng, Binghui Guo, Jin Dong:

TierFlow: A Pipelined Layered BFT Consensus Protocol for Large-Scale Blockchain. 624-635 - Jianbo Lin, Lin Yan, Zhi Lin, Zan Zhou, Shujie Yang:

ClusterX: Adaptive Collaborative Scheduling of Layered User-Proxy Mapping to Enhance DDoS Defense in Distributed Clusters. 636-642 - Yuan Liu

, Licheng Wang, Yongbin Zhou:
New Compact Construction of FHE from Cyclic Algebra LWE. 643-649 - Jingzhang Cao, Meng Wang, Shenao Lin:

Rethinking Mutation Strategies in Fuzzing Smart Contracts. 650-657 - Hanning Zhang, Guansheng Wang, Junwei Feng, Lei Feng, Quan Gan, Long Ji:

Towards a Robust Medical Record System: Integrating Logical Reasoning for Trustworthy Data Management. 658-665 - Jianrong Wang, Yacong Ren, Dengcheng Hu, Qi Li, Sen Li, Xuewei Li, Xiulong Liu:

CVchain: A Cross-Voting-Based Low Latency Parallel Chain System. 666-673 - Qi Xia, Ansu Badjie

, Jianbin Gao, Grace Mupoyi Ntuala
, Hu Xia, Isaac Amankona Obiri:
A Novel Time Series Approach to Anomaly Detection and Correction for Complex Blockchain Transaction Networks. 674-682 - Guangzhuo Zhu, Qian Wang, Bei Gong:

A Sustainable Storage Compensation Method for Consortium Blockchain-based Computing Power Trading. 683-690 - Yuwei Xu, Zizhi Zhu, Chufan Zhang, Kehui Song, Guang Cheng:

A High-Accuracy Unknown Traffic Identification Method Based on Multi-View Contrastive Learning. 691-698 - Zelong Zhang, Wei Cheng, Yongbin Zhou, Zehua Qiao, Yuhan Zhao, Jian Weng:

Attacking High-order Masked Cryptosystem via Deep Learning-based Side-Channel Analysis. 699-706 - Yuan Ma, Maosen Sun, Wei Wang, Tianyu Chen, Na Lv, Dongchi Han:

Efficient and Accurate Min-entropy Estimation Based on Decision Tree for Random Number Generators. 707-716 - Tongxi Chen, Weizhi Meng

, Wenjuan Li:
User Authentication Based on the Integration of Musical Signals and Ear Canal Acoustics. 717-728 - Kaiyuan Li, Haruka Hirata

, Daiki Miyahara, Kazuo Sakiyama, Yuko Hara, Yang Li:
Multiplicative Masked M&M: An Attempt at Combined Countermeasures with Reduced Randomness. 726-733 - Xiaoyong Kou, Wei Yang, Peijin Cong, Gongxuan Zhang:

Multi-Channel Leakage Detection Based on χ2 Test of Independence. 734-741 - Weihan Wang, Xiulong Liu, Liyuan Ma, Hao Xu

, Gaowei Shi, Juncheng Ma, Keqiu Li:
MVSS: Blockchain Cross-shard Account Migration Based on Multi-version State Synchronization. 742-749 - Yongkang Chen

, Tong Wang
, Wei Kong, Taotao Gu, Guiling Cao, Xiaohui Kuang:
Enhancing Adversarial Robustness through Self-Supervised Confidence-Based Denoising. 750-758 - Zhixuan Zhang, Yanhui Zhu, Yuezhong Wu, Fangteng Man, Hao Chen, Xujian Ying:

A Knowledge Graph Completion Method Based on Gated Adaptive Fusion and Conditional Generative Adversarial Networks. 759-766 - Mengdie Huang

, Yingjun Lin, Xiaofeng Chen, Elisa Bertino:
MARS: Robustness Certification for Deep Network Intrusion Detectors via Multi-Order Adaptive Randomized Smoothing. 767-774 - Qifan Wang, Shujie Cui, Lei Zhou, Ye Dong, Jianli Bai, Yun Sing Koh

, Giovanni Russello:
GTree: GPU-friendly Privacy-preserving Decision Tree Training and Inference. 775-785 - Fan Xiang, Xueyang Li, Guozhu Meng:

RTS: A Training-time Backdoor Defense Strategy Based on Weight Residual Tendency. 786-793 - Zhuohan Ao, Yi Wang, Ying Wang, Yu Zhan:

Trustworthiness and path regularity based contrastive learning for noisy knowledge graph error assertion detection. 794-801 - Haotian Wang, Jing Liu:

RPG-Diff: Precise Adversarial Defense Based on Regional Positioning Guidance. 802-809 - Wei Xu, Hui Zhu, Chang Xiao, Fengwei Wang, Dengguo Feng, Hui Li:

Toward Privacy-Preserving and Verifiable XGBoost Training for Horizontal Federated Learning. 810-817 - Haiying Liu, Ruichun Gu, Jingyu Wang, Xiaolin Zhang, Bolin Zhang, Xuebao Li:

Local Drift Correction and Attention Aggregation for Self-Organized Federated Learning. 818-825 - Mengmeng Tang, Shuhong Chen, Guojun Wang, Hanjun Li, Zhuyi Yao, Sheng Wen:

Boosting Transferability of Adversarial Examples by Joint Training and Dual Feature Mixup. 826-833 - Ying Hua, Hui Xia, Shuo Xu:

Federated Unlearning for Samples Based on Adaptive Gradient Ascent of Angles. 834-841 - Zehua Ding, Youliang Tian, Guorong Wang, Jinbo Xiong, Jianfeng Ma:

Membership Inference Attacks via Dynamic Adversarial Perturbations Reduction. 842-849 - Yuefeng Lai, Lizhao Wu, Hui Lin, Xiaokang Zhou:

Defending Against Backdoor Attacks through Causality-Augmented Diffusion Models for Dataset Purification. 850-858 - Jiekang Hu, Yakai Li, Zhaoxi Xiang, Luping Ma, Xiaoqi Jia, Qingjia Huang:

LLM4MDG: Leveraging Large Language Model to Construct Microservices Dependency Graph. 859-869 - Yi Ji, Isao Echizen:

StrucTrans: Zero-Query Structural Adversarial Attack Transferred from Masked Autoencoders to Image Classifiers. 870-879 - Jie Hou, Zengrui Huang, Zhiyong Zhang, Wei Zhang, Lei Ju:

A GPU-Based Privacy-Preserving Machine Learning Acceleration Scheme. 880-887 - Feng Wu, Weiqi Wang, Youyang Qu, Shui Yu:

A Low-cost Black-box Jailbreak Based on Custom Mapping Dictionary with Multi-round Induction. 888-895 - Lizhi Sun, Jingzhou Zhu, Boyu Chang, Yixin Xu, Bo Yang, Hao Wu, Fengyuan Xu, Sheng Zhong:

TTFL: Towards Trustworthy Federated Learning with Arm Confidential Computing. 896-907 - Yalin Sun, Ruiying Lu, Kang Li, Yu Zheng:

Topic-Aware Sensitive Information Detection in Chinese Large Language Model. 908-915 - Jiezhen Tang, Hui Zhu, Yandong Zheng, Junpeng Zhang

, Fengwei Wang, Jiaqi Zhao, Hui Li:
UNIRE: Secure Trajectory-User Linking Model Aggregation with Knowledge Transfer. 916-925 - Wenxiu Ding, Muzhi Liu, Yuxuan Cai, Mingxin Chen, Zheng Yan, Mingjun Wang:

Zephyr: A High-Performance Framework for Graph Attention Networks on Heterogeneous Data. 926-933 - Zhenbo Song, Wenhao Gao, Zhenyuan Zhang, Jianfeng Lu:

AS-FIBA: Adaptive Selective Frequency-Injection for Backdoor Attack on Deep Face Restoration. 934-943 - Lijun Gao, Zheng Yan:

CertRob: Detecting PDF Malware with Certified Adversarial Robustness via Randomization Smoothing. 944-951 - Zhangchi Zhao, Jianyi Zhang, Liqun Shan, Ziyin Zhou, Kaiying Han

, Xiali Hei:
Paa-Tee: A Practical Adversarial Attack on Thermal Infrared Detectors with Temperature and Pose Adaptability. 952-959 - Shuaishuai Chang, Yuzhe Li, Jinchao Zhang, Bo Li:

T-ABE: A practical ABE scheme to provide trustworthy key hosting on untrustworthy cloud. 960-967 - Xianghui Dong, Yin Liu, Xuejun Yu:

Three-Body Problem: An Empirical Study on Smartphone-based TEEs, TEE-based Apps, and their Interactions. 968-977 - Junqiao Gao, Chaklam Cheong, Mansi Zhang, Yue Cao, Tao Peng, Shahbaz Pervez:

A Trust Model with Fitness-Based Clustering Scheme in FANETs. 978-985 - Wenting Song, K. Suzanne Barber:

TWCF: Trust Weighted Collaborative Filtering based on Quantitative Modeling of Trust. 986-993 - Niklas Bunzel, Gerrit Klause:

Analyzing the Effectiveness of Image Preprocessing Defenses Under Runtime Constraints. 994-999 - Xutao Meng, Qingming Li, Yong Li, Li Zhou, Xiaoran Yan:

FedSGProx: Mitigating Data Heterogeneity and Isolated Nodes in Graph Federated Learning. 1000-1006 - Zheng Feng, Chunyu Xing, Chen Liang:

Designing Secret Embedding Scheme Based on Bitcoin Transactions Pattern Controlling. 1007-1014 - Jie Cao, Zhengxin Xu, Yunpeng Bai, Yuwei Xu, Qiao Xiang, Guang Cheng:

Perturbing Vulnerable Bytes in Packets to Generate Adversarial Samples Resisting DNN-Based Traffic Monitoring. 1015-1021 - Mingyang Li, Weina Niu, Xinglong Chen, Jiacheng Gong, Kegang Hao, Xiaosong Zhang:

Enabling Robust Android Malicious Packet Capturing and Detection via Android Kernel. 1022-1028 - Meiling Chen, Yuanyuan Yang, Sixu Guo, Jin Cao, Haitao Du, Li Su:

Signcryption based on Elliptic Curve CL-PKC for Low Earth Orbit Satellite Security Networking. 1029-1036 - Kai Zhou, Yong Xie, Xin Liu:

A Multi-hop Reasoning Framework for Cyber Threat Intelligence Knowledge Graph. 1037-1044 - Chenyu Li, Xiu Zhang, Xueping Liang, Xiaorui Gong:

LSD Attack: Exploiting Inconsistencies between Design and Implementation of Ethereum Protocols. 1045-1050 - Wenxin Jia, Zheng Yang, Zhiqiang Ma:

Lightweight Leakage-Resilient Authenticated Key Exchange for Industrial Internet of Things. 1051-1059 - Pengfei Li, Yujing Liu, Jinshu Su, Bo Yu:

ConfigKG: Identify Routing Security Issues from Configurations Based on Knowledge Graph. 1060-1069 - Yijun Wang, Ziyi Zhou, Weiqi Bai, Ruijie Zhao, Xianwen Deng:

CaptchaSAM: Segment Anything in Text-based Captchas. 1070-1076 - Guixian Xu, Wenhui Gao:

Tibetan microblogging user data analysis and topic identification. 1077-1082 - Runze Dong, Buhong Wang, Jiang Weng, Kunrui Cao, Jiwei Tian

, Tianhao Cheng:
Security Enhancement of UAV Swarm Empowered Downlink Transmission with Integrated Sensing and Communication. 1083-1089 - Weiping Wang, Huijuan Wang, Yulu Hong, Chenyu Wang, Hong Song, Shigeng Zhang:

SimLog: System Log Anomaly Detection Method Based on Simhash. 1090-1096 - Zekai Song, Yunpeng Li, Jian Qin, Changzhi Zhao, Dongxu Han, Yuling Liu:

FREDet: Fine-Grained Malicious Traffic Detection Based on Frequency Domain Features. 1097-1104 - Qiulong Yu, Zhiqiang Wang, Lei Ju, Sicheng Yuan, Ying Zhang:

Android Malware Detection Technology Based on SC-ViT and Multi-Feature Fusion. 1105-1114 - Shuang Duan, Hui Shu, Zihan Sha, Yuyao Huang

:
SBCM: Semantic-Driven Reverse Engineering Framework for Binary Code Modularization. 1115-1124 - Chengqi Hou

, Wei Yang, Yu Wang, Zhiming Zhang, Shaolong Chen, Beibei Li:
A Multi-Blockchain Based Anonymous Cross-Domain Authentication Scheme for Industrial Internet of Things. 1125-1134 - Dahai Yu, Jianming Cui, Yungang Jia, Peiguo Fu, Ming Liu:

Deep Learning-Based DDoS Attack Detection Using Adversarial Optimization. 1135-1140 - Yifan Yu, Ruoyan Lin, Shuang Li, Qinsheng Hou, Peng Tang, Wenrui Diao:

Security Assessment of Customizations in Android Smartwatch Firmware. 1141-1148 - Zhihuan Yang, Wenlong Tian, Emma Zhang, Zhiyong Xu:

Sec-Reduce: Secure Reduction of Redundant and Similar Data for Cloud Storage based on Zero-Knowledge Proof. 1149-1154 - Qian Yang, Chen Wang, Jian Shen, Yi Li, Dengzhi Liu:

Private Data Aggregation Enabling Verifiable Multisubset Dynamic Billing in Smart Grids. 1155-1160 - Rui Li, Wenrui Diao, Debin Gao

:
Custom Permission Misconfigurations in Android: A Large-Scale Security Analysis. 1161-1170 - Dongbin Chen, Yunchuan Guo, Xiao Wang, Fenghua Li, Zifu Li:

Orchestrating Security Protection Resource for Space-Ground Integrated Networks. 1171-1178 - Liquan Chen, Yufan Song, Wanting Ma, Tianyu Lu, Peng Zhang:

Phase Shift Matrix Optimization and Channel Quantization Alternating in RIS-Assisted Physical Layer Key Generation. 1179-1186 - Juncheng Lu, Yiyang Zhao, Yan Wang, Jiyuan Cui, Sanfeng Zhang:

BWG: An IOC Identification Method for Imbalanced Threat Intelligence Datasets. 1187-1194 - Wenlong Liu, Bin Wen, Mengshuai Ma, Wanrong Du:

Network Traffic Anomaly Detection Method Based on CTA-BiLSTM. 1195-1200 - Huiying Zou, Jia Duan, Xi Liu, Wei Ren, Tao Li, Xianghan Zheng, Kim-Kwang Raymond Choo:

Decentralized and Lightweight Cross-Chain Transaction Scheme Based on Proxy Re-signature. 1201-1208 - Guangming Gao, Shuitao Gan, Xiaofeng Wang, Shengkai Zhu:

LLMUZZ: LLM-based seed optimization for black-box device fuzzing. 1209-1216 - Indu Chandran, Mukesh Narayana Gadde, Kizheppatt Vipin:

FCSec: An Open-source Testbed for Security Evaluation on UAV Communications. 1217-1224 - Quan Hong, Yang Yu, Lvyang Zhang, Lidong Zhai:

Active Defense Research: A New Perspective Integrating Traps and Vulnerabilities. 1225-1230 - Jiashun Hao, Young-Woo Kwon:

Enhancing Graph-Based Vulnerability Detection through Standardized Deep Learning Pipelines. 1231-1238 - Haonan Zhai, Ruiqi Liang, Zhenzhen Li, Zhen Li, Wei Xia, Bingxu Wang, Qingya Yang:

OSN Bots Traffic Transformer : MAE-Based Multimodal Social Bots Behavior Pattern Mining. 1239-1246 - Jiahao Zhang, Yuejun Liu, Jingdian Ming, Yiwen Gao, Yongbin Zhou, Debao Wang:

Enhancing Higher-Order Masking: A Faster and Secure Implementation to Mitigate Bit Interaction Leakage. 1247-1254 - Yuming Liu, Wei Cheng, Jihao Fan, Yongbin Zhou:

Towards Securing ASCON Implementation by Inner Product Masking. 1255-1260 - Pengcheng Xia, Jingyu Wu, Yiyang Ni, Jun Li

:
A Novel zk-SNARKs Method for Cross-chain Transactions in Multi-chain System. 1261-1267 - Bin Li, Li Cheng, Zhongshan Zhang, Yu Pan, Feng Yao, Renjie He:

LAPAID: A Lightweight, Adaptive and Perspicacious Active Intrusion Detection Method on Network Traffic Streams. 1268-1275 - Youbin Kim, Man-Ki Yoon:

WhisperMQTT: Lightweight Secure Communication Scheme for Subscription-Heavy MQTT Network. 1276-1285 - Zhijun Wu, Shanhe Niu, Meng Yue:

A Reliable Encrypted Traffic Classification Method Based on Attention Mechanisms. 1286-1295 - Yixin Zhang

, Fuqiang Du, Xinge Chi, Zhiqiang Lv:
USB Catcher: Detection of Controlled Emissions via Conducted Compromising Emanations. 1296-1303 - Vince Noort, Nhien-An Le-Khac

, Hong-Hanh Nguyen-Le:
Improving Security in Internet of Medical Things through Hierarchical Cyberattacks Classification. 1304-1309 - Ahmed Mohamed Hussain

, Panos Papadimitratos:
Privacy-Preserving Secure Neighbor Discovery for Wireless Networks. 1310-1319 - Yaobing Xu, Yunchuan Guo, Wenlong Kou, Junhai Yang, Ziyan Zhou, Fenghua Li:

D3IR: Securing Multi-Domain Networks via Extending Depth-in-Defense Strategies Across Nested Management Domains. 1320-1325 - Tingyu Wang, Qiang Cao, Shihong Zou, Yueming Lu:

BGAS: Blockchain and Group Decentralized Identifiers Assisted Authentication Scheme for UAV Networks. 1326-1335 - Jiayi Li, Ke Xu, Xinghao Jiang, Tanfeng Sun:

Sparse Silhouette Jump: Adversarial Attack Targeted at Binary Image for Gait Privacy Protection. 1336-1342 - Xingxing Xiong, Shubo Liu, Xiping Liu, Xiaoguang Niu, Wenyu You:

Real-time Private Data Aggregation over Distributed Spatial-temporal Infinite Streams with Local Differential Privacy. 1343-1352 - Samuel Pélissier, Gianluca Anselmi, Abhishek Kumar Mishra, Anna Maria Mandalari, Mathieu Cunche:

Enhancing IoT Privacy: Why DNS-over-HTTPS Alone Falls Short? 1353-1360 - Zhichao Wang, Qi Feng, Min Luo, Xiaolin Yang, Zizhong Wei:

Efficient FSS-based Private Statistics for Traffic Monitoring. 1361-1370 - Shengzhe Meng, Xiaodong Wang, Zijie Lu, Bei Liang:

Efficient and Practical Multi-party Private Set Intersection Cardinality Protocol. 1371-1380 - Yudan Cheng, Tao Feng, Zhiquan Liu, Xian Guo, Lulu Han, Jianfeng Ma:

An Efficient and Privacy-Preserving Participant Selection Scheme based on Location in Mobile Crowdsensing. 1381-1388 - Yinghao Song

, Long Yan, Yang Li, Mingjian Ni, Shengzhong Tan, Dazhong Li, Huiting Zhao, Yulun Song:
NAGG: Noised graph node feature aggregations for preserving privacy. 1389-1396 - Haocheng Li, Haipeng Qu, Gaozhou Wang, Xiangjian Ge:

EffiTaint: Boosting Sensitive Data Tracking with Accurate Taint Behavior Modeling and Efficient Access Path Optimization. 1397-1404 - Yin Liu:

A Quiet Place: An In-Depth Study of Mobile Public-to-Private Attacks. 1405-1412 - Zhao Zhang, Chunxiang Xu, Man Ho Allen Au:

Single-sign-on Authentication with Anonymous Token and Restricted Covert Channel. 1413-1422 - Yue Quan, Kai Fan, Haoyang Wang, Hui Li, Yintang Yang:

DMASP: Dynamic Multi-keyword Searchable Encryption for Protected Access and Search Patterns with Differential Privacy. 1423-1429 - Ruoding Zhang, Tao Liu, Qifeng Shi, Yan Zhang, Xiaoyi Song, Xinrui Geng:

Research on Intelligent Joint Detection Technology for Application Privacy Behavior Compliance. 1430-1437 - Kunpeng Song, Mingzhang Sun, Kui Zhou, Peng Tang, Ning Wang, Shanqing Guo:

Multi-Dimensional Data Collection Under Personalized Local Differential Privacy. 1438-1447 - Liang Wang, Li Liu, Pei Zhan, Peng Tang, Puwen Wei, Shanqing Guo:

Interactive Verifiable Local Differential Privacy Protocols for Mean Estimation. 1448-1457 - Tran Viet Xuan Phuong, Albert Baker, Philip D. Huff, Jan P. Springer

, Tho Thi Ngoc Le:
CFE: Secure Filtered Words in End-to-End Encrypted Messaging System. 1458-1465 - Hongying Zheng, Hongdie Li, Di Xiao, Maolan Zhang:

Privacy-Preserving Multi-Soft Biometrics through Generative Adversarial Networks with Chaotic Encryption. 1466-1471 - Di Xiao, Zhuyan Yang, Maolan Zhang, Lvjun Chen:

Data Privacy-Preserving and Communication Efficient Federated Multilinear Compressed Learning. 1472-1479 - Tanusree Parbat, Ayantika Chatterjee:

Secure Join and Compute in Encrypted Database. 1480-1485 - Zhaoyang Wang, Yanfei Hu, Shuailou Li, Wenbo Wang, Lisong Zhang, Boyang Zhang, Yu Wen, Dan Meng:

DyCom: A Dynamic Community Partitioning Technique for System Audit Logs. 1486-1493 - Zhihuan Yang, Wenlong Tian, Ruixuan Li, Xuming Ye, Zhiyong Xu:

Who Owns the Cloud Data? Exploring a non-interactive way for secure proof of ownership. 1494-1499 - Zhenyu Xu

, Xurui Ren, Yi Zhang, Guang Cheng, Hua Wu:
Peering Through the Veil: A Segment-Based Approach for VPN Encapsulated Video Title Identification. 1500-1505 - Ming Zhou, Zhijian Zheng, Peng Zhang, Sixue Lu, Yamin Xie, Zhongfeng Jin:

SecureNet-AWMI: Safeguarding Network with Optimal Feature Selection Algorithm. 1506-1511 - Raffaele Pizzolante, Arcangelo Castiglione, Francesco Palmieri:

Unlocking Insights: An Extensible Framework for Automated Metadata Extraction from Online Documents. 1512-1521 - Adam L. Hooker, Wenjian Huang, Shalini Kapali Kurumathur, Nishant Vishwamitra, Kim-Kwang Raymond Choo:

Towards Understanding and Detecting File Types in Encrypted Files for Law Enforcement Applications. 1522-1527 - Yilin Yang, Changhai Ou, Yongzhuang Wei, Wei Li, Yifan Fan, Xuan Shen:

Broader but More Efficient: Broad Learning in Power Side-channel Attacks. 1528-1533 - Zhen Liu, Changzhen Hu, Chun Shan, Junkai Yi:

BedIDS: An Effective Network Anomaly Detection Method by Fusing Behavior Evolution characteristics. 1534-1540 - Yuwen Zou, Yang Hong, Jingyi Xu, Lekun Liu, Wenjun Fan:

Leveraging Large Language Models for Challenge Solving in Capture-the-Flag. 1541-1550 - Bo Yin, Hang Chen, Binyao Xu, Mariam Suleiman Silima, Ke Gu:

Efficient and Verifiable Dynamic Skyline Queries in Blockchain Networks. 1551-1556 - Qingmei Yang, Pincan Zhao, Yuchuan Fu, F. Richard Yu:

Enhancing Security and Privacy in Connected and Autonomous Vehicles: A Post-Quantum Revocable Ring Signature Approach. 1557-1562 - Jia Liu, Wenjun Fan, Yifan Dai, Enggee Lim, Zhoujin Pan, Alexei Lisitsa:

Leveraging Semi-supervised Learning for Enhancing Anomaly-based IDS in Automotive Ethernet. 1563-1571 - Liang Hong, Xingguo Guo, Zeyar Aung, Wei Hu:

Robust Hardware Trojan Detection: Conventional Machine Learning vs. Graph Learning Approaches. 1572-1579 - Jie Zhang, Hui Wen, Lun Li, Hongsong Zhu:

UniTTP: A Unified Framework for Tactics, Techniques, and Procedures Mapping in Cyber Threats. 1580-1588 - Shuiliang Chai, Zhanhui Shi, Yanjiao Gao, Yuhao Huang, Aizhu Liu, Jie Xiao:

HTV: Measuring Circuit Vulnerability to Hardware Trojan Insertion Based on Node Co-activation Analysis. 1589-1594 - Jingsen Zhang, Shoulu Hou, Yi Gong, Tao Wang, Changyuan Lan, Xiulei Liu:

An Intelligent Affinity Strategy for Dynamic Task Scheduling in Cloud-Edge-End Collaboration. 1595-1603 - Tao Fang, Zhihao Hou, Jiahao He, Junjie Zhou, Gansen Zhao:

Hierarchical Graph Feature Extraction Based on Multi-Information Contract Graph for Enhanced Smart Contract Vulnerability Detection. 1604-1613 - Fengyuan Shi, Zhou Zhou, Jiang Guo, Renjie Li, Zhongyi Zhang, Shu Li, Qingyun Liu, Xiuguo Bao:

LightRL-AD: A Lightweight Online Reinforcement Learning Approach for Autonomous Defense against Network Attacks. 1614-1621 - Yueyue He, Wenxuan Fan, Koji Inoue:

SPDID: A Secure and Privacy-Preserving Decentralized Identity utilizing Blockchain and PUF. 1622-1631 - Xinrui Zhang

, Pincan Zhao, Jason Jaskolka:
Enhancing Security and Efficiency in Vehicle-to-Sensor Authentication: A Multi-Factor Approach with Cloud Assistance. 1632-1637 - Nour Alhussien

, Ahmed Aleroud:
AdvPurRec: Strengthening Network Intrusion Detection with Diffusion Model Reconstruction Against Adversarial Attacks. 1638-1646 - Tan Su, Bingbing Zhang, Chi Zhang, Lingbo Wei:

Privacy Leak Detection in LLM Interactions with a User-Centric Approach. 1647-1652 - Huanlai Xing, Xuxu Li, Jing Song, Lexi Xu, Jincheng Peng, Bowen Zhao, Li Feng:

HFI: High-Frequency Component Injection based Invisible Image Backdoor Attack. 1653-1658 - Dong Zhang, Zhiyuan Hu, Huijun Chen, Guangming Liu, YinFeng Zheng, Jinghui Lu:

From Liberty to 1984: A Methodology for Systematically Deteriorating LLM Outputs through Habituation Tendencies. 1659-1665 - Chuang Liang, Jie Huang:

Attack Data is Not Solely Paramount: A Universal Model Extraction Enhancement Method. 1666-1674 - Lening Zhang, Hui Xia:

Active Source Inference Attack Based on Label-Flipping in Federated Learning. 1675-1680 - Zhenghao Lu, Ding Ma, Lei Fan, Xiuzhen Chen, Yongshuai Duan, Jia Zhang:

A Universally Composable Key Management System Using Trusted Hardware. 1681-1686 - Ziheng Zhang, Lei Liu, Zhongmin Yan:

Achieving Trusted GPU Allocation: An Empirical Study on Efficiency Changes of Deep Learning Training Tasks. 1687-1692 - Zehao Li, Jiachun Liao, Jinhao Yu, Lei Zhang:

THEF: A Privacy-Preserving Framework for Transformer Inference leveraging HE and TEE. 1693-1700 - Xiaodong Huang, Gangliang Li, Chengfeng Chen, Shouqiang Liu:

DMPA: A Compact and Effective Pipeline for Detecting Multiple Phishing Attacks. 1701-1708 - Zilong He, Hua Zhang:

Learning Robust and Repeatable Physical Camouflage for Aerial Object Detectors. 1709-1718 - Haiyu Deng, Xiaocui Dang, Yanna Jiang, Xu Wang, Guangsheng Yu, Wei Ni, Ren Ping Liu:

FedNIFW: Non-Interfering Fragmented Watermarking for Federated Deep Neural Network. 1719-1726 - Yaling Zhang, Xiang Sun, Yichuan Wang, Dongtai Tang, Chen Zhao:

An Effective Adversarial Text Attack through a Block-Sparse Approach with Hamiltonian Insights. 1727-1732 - Feiyu Zhao, Jianguo Wei, Wenhuan Lu, Yongwei Li:

End-To-End Speaker Anonymization Based on Location-Variable Convolution and Multi-Head Self-Attention. 1733-1740 - Guanghan Li, Wenzhong Yang, Xiaodan Tian, Jiaren Peng:

DUDPA-TATD: A Lightweight Privacy-Preserving Anomaly Traffic Detection Method for Edge Computing Scenarios. 1741-1748 - Xiangxiang Wang, Hui Xia, Yingqi Zhang:

Defending Against Model Poisoning Attacks in Federated Learning via Client-guided Trust. 1749-1755 - Yang Chen, Min Wu, Min Zhang:

Abstraction-Based Training for Robust Classification Models via Image Pixelation. 1756-1761 - Xiong Yan, Kedong Yan, Chanying Huang, Dan Yin, Shan Xiao:

FusTP-FL: Enhancing Differential Federated Learning through Personalized Layers and Data Transformation. 1762-1769 - Yuliang Li, Zhonglin Hou, Hong Liu:

Large Language Model and Behaviour Tree Based Real-World Test Scenario Generation for Autonomous Vehicles. 1770-1775 - Xinlei Liu

, Jichao Xie, Tao Hu, Hailong Ma, Baolin Li, Peng Yi, Zhen Zhang:
Robust purification defense for transfer attacks based on probabilistic scheduling algorithm of pre-trained models: A model difference perspective. 1776-1783 - Yiding Tang, Zhijing Yang, Yufan Peng, Hui Zhang:

Individual Fair Density-Peaks Clustering Based on Local Similar Center Graph and Similar Decision Matrix. 1784-1789 - Yilong Li, Jianyi Zhang, Ziyin Zhou, Zezheng Sun, Xu Ji, Zeping Li, Jiameng Han, Zhangchi Zhao:

D2FL: Dimensional Disaster-oriented Backdoor Attack Defense Of Federated Learning. 1790-1796 - Yaxin Cui, Hong Xu, Zhichao Xu:

Improved Rectangle and Linear Attacks on Lightweight Block Cipher WARP. 1797-1802 - Weiguo Huang, Yong Ding, Jun Li, Yujue Wang, Hai Liang, Changsong Yang

:
SAMOC: Enabling Atomic Invocations for Cross-chain Crowdsourcing Testing DApps in Industrial Control Through Trusted Smart Community and Lock Mechanism. 1803-1808 - Xiangyu Meng, Xuejun Yu:

Trustworthy Analysis of Drain3-based Cold Storage Behavior in Judicial Depository Scenarios. 1809-1816 - Dong Yang, Weihai Li, Zikai Xu, Zhiling Zhang, Yiling Chen:

FCADD: Robust Watermarking Resisting JPEG Compression with Frequency Channel Attention and Distortion De-gradient. 1817-1824 - Jing Li, Tao Sun, Wenjie Zhong:

ASK-LTL Checker: A Tailored Model Checker for Linear Temporal Logic of CPN State Space. 1825-1831 - Qingmei Yang, Lijun Sun, Xiao Chen, Lingling Wang:

Sustainable and Trusted Vehicular Energy Trading Enabled by Scalable Blockchains. 1832-1837 - Yonghao Gu, Xiaoqing Zhang, Hao Xu, Tiejun Wu:

DyGCN: Dynamic Graph Convolution Network-based Anomaly Network Traffic Detection. 1838-1843 - Jinquan Nie, Lejun Ji, Yirui Jiang, Young Ma, Yuanlong Cao:

ROSE+ : A Robustness-Optimized Security Scheme Against Cascading Failures in Multipath TCP under LDDoS Attack Streams. 1844-1849 - Daniela Pinto, Ivone Amorim, Eva Maia, Isabel Praça:

A Novel Approach to Network Traffic Analysis: the HERA tool. 1850-1856 - Yu Fu, Bingcai Chen, Qian Ning, Kai Lin:

Machine Learning-Based Power Allocation Optimization Algorithm for Enhanced CR-NOMA Network. 1857-1862 - Jihoon Park, Giluk Kang, Young-Gab Kim:

A Self-Adaptive Framework for Responding to Uncertainty in Access Control Process with Deep Neural Networks. 1863-1868 - Ziyue Chen, He Kong, Shuai Ding, Quanfeng Lv, Guo Wei:

Efficient DDoS Detection and Mitigation in Cloud Data Centers Using eBPF and XDP. 1869-1874 - Xiaowei Hu, Haoning Chen, Huaifeng Bao, Wen Wang, Feng Liu, Guoqiao Zhou, Peng Yin:

A LLM-based agent for the automatic generation and generalization of IDS rules. 1875-1880 - Haojun Xia, Limin Sun, Wenliang Liu, Jingyi Xie, Zhanwei Song, Bibo Tu:

A Self-Supervised Targeted Process Anomaly Detection Method Based on the Minimum Set of Observed Events. 1881-1888 - Zheng Zhang

, Rui Ma, Yuqi Zhai, Yuche Yang, Siqi Zhao, Hongming Chen:
GeMuFuzz: Integrating Generative and Mutational Fuzzing with Deep Learning. 1889-1895 - Cheng Tang, Qingfeng Wang, Guozhen Cheng, Hao Liang, Jianhua Peng, Meiyue Yang, Wenyan Liu, Ming Liu, Lei Sha:

A Cross-Site Scripting Attack Protection Framework Based on Managed Proxy. 1896-1903 - Jianhui Ming, Weiping Wang, Linlin Zhang, Yingjie Hu, Shigeng Zhang:

IoT Device Fingerprinting From Periodic Traffic Using Locality-Sensitive Hashing. 1904-1909 - Tao Leng, Junyi Liu, Zhen Yang, Chang You, Yutong Zeng, Cheng Huang:

SGCML: Detecting Hacker Community Hidden in Chat Group. 1910-1915 - Mengxuan Shi, Jinfu Chen, Saihua Cai, Ziyan Liu, Jiapeng Zhou:

DA-CPVD: Vulnerability Detection Method based on Dual Attention Composite Pooling. 1916-1921 - Wanqiu Zhou, Zheng Zhang, Yuan Yao, Jiang Wang, Jiaxin Ma, Hui Liu:

Cyber Resilience Framework for Web Server. 1922-1927 - Jacob Soper

, Yue Xu, Ernest Foo, Zahra Jadidi, Kien Nguyen Thanh
:
Improved Packet-Level Synthetic Network Traffic Generation. 1928-1934 - Jun Li, Yuting Zhang, Wu Zhou, Shengzhi Zhang:

Exploring Permission Control Flaws in Mini-apps. 1935-1941 - Yu Zhang, Haipeng Qu, Lingyun Ying, Linghui Wang:

Maldet: An Automated Malicious npm Package Detector Based on Behavior Characteristics and Attack Vectors. 1942-1947 - Limin Yu, Yongdong Wu, Jiao Lu, Tong Li:

An Adaptive Reputation Update Mechanism for Primary Nodes in PBFT. 1948-1953 - Yingying Wu, Jiabei Wang, Dandan Xu, Yongbin Zhou, Yang Wang:

Rabbit: Secure Encrypted Property Graph Search Scheme Supporting Data and Key Updates. 1954-1962 - Yijie Huang, Wei Ding, Mian Huang:

Malware Traffic Classification Based on Multidimensional Features Learning. 1963-1971 - Liang Wang

, Zhipeng Wang, Meng Wang:
ADIoT: An Anomaly Detection Model for IoT Devices Based on Behavioral Feature Analysis. 1972-1977 - Yan Chang, Yaqin Wu, Jianwu Rui, Ming Cao, Yawei Yue, Yu Feng, Tingting He, Haihui Gao, Zhen Lv:

Detection of Sensitive Information Based on Transient Data in Store Buffer and Cache. 1978-1982 - Chenghan Zhang, Yan Liu, Daofu Gong, Ling Wang:

Unsupervised Evaluation Method of Relative Coordination Degree from Group Perspective. 1983-1988 - Zejun Lan, Jianfeng Guan, Xianming Gao, Tao Feng, Kexian Liu, Jianbang Chen:

DTAME: A Interpretable and Efficient Approach for ABAC Policy Mining and Evaluation Using Decision Trees. 1989-1997 - Bing Xia, Chongjun Tang, Wenbo Liu, Shihao Chu, Yu Dong:

A Vulnerability Detection Method for Intermediate Code Based on a Relational Dependency Graph. 1998-2003 - Zhuoqun Xia, Yongbin Yu, Jingjing Tan, Kejun Long:

SSC-IDS: A Robust In-vehicle Intrusion Detection System Based on Self-Supervised Contrastive Learning. 2004-2009 - Neda Baghalizadeh-Moghadam, Christopher Neal, Frédéric Cuppens, Nora Boulahia-Cuppens:

NLP and Neural Networks for Insider Threat Detection. 2010-2018 - Xin Zhang, Chao Guo, Buxin Guo:

Two-Stage Federated Learning Strategy for Fairness and Security in Vehicular Networks. 2019-2024 - Xinyu Huang, Xingxing Liao, Jie Yang, Wei You, Wenhao Wu, Shiru Min, Xinsheng Ji:

5G-PPDE: A Novel Adaptive Scaling Framework for Enhancing the Resilience of the 5G Cloud Core Network. 2025-2030 - Joseph Gear, Yue Xu, Ernest Foo, Praveen Gauravaram, Zahra Jadidi, Leonie Simpson:

Contextual Transformer-based Node Embedding for Vulnerability Detection using Graph Learning. 2031-2038 - Wangyuan Jing, Chi Zhang, Bingbing Zhang, Lingbo Wei:

CVALLM: A Cloud Platform Security Assessment Framework Based on Large Language Models. 2039-2044 - Yu Zhao, Yangguang Tian, Chunbo Wang, Xiaoqiang Di, Hui Qi:

Smart Contract-Based Auditing of Edge Data for Vehicular Networks. 2045-2050 - Ruizhe Zhang, Shangnan Yin, Jinfu Chen:

FD-WF: A Multi-tab Website Fingerprinting Attack Based on Fixed Dimensions for Tor Network. 2051-2059 - Naila Azam, Alex Chak, Anna Lito Michala, Shuja Ansari, Nguyen Binh Truong:

Modelling GDPR-compliance based on Defeasible Logic Reasoning: Insights from Time Complexity Perspective*. 2060-2067 - Chaohe Lu, Zhongyuan Yu, Guijuan Wang, Anming Dong, Xiang Tian:

A Blockchain-based PHR Sharing Scheme with Attribute Privacy Protection. 2068-2077 - Chunpeng Guo, Beiyuan Liu, Zeyang Sun, Chen Chen, Sai Xu:

Secure Microwave QR Code Communication Using Pseudo-Random Constellation Rotation. 2078-2083 - Xiaofei Hao, Liyuan Liu, Yimeng Wang, Fengyu Li, Wanqing Wu:

Federated Knowledge-enhanced Graph Attention Network for Privacy-preserving Social Recommendation. 2084-2089 - Bosong Zhang, Qian Sun, Hai Wang, Linna Zhang, Danyang Li:

Federated Learning Greedy Aggregation Optimization for Non-Independently Identically Distributed Data. 2090-2097 - Jinlong Zheng, Jia-Nan Liu, Minhua Su, Dingcheng Li, Kai He, Xueqiao Liu:

Efficient Multi-subset Fine-grained Authorization PSI over Outsourced Encrypted Datasets. 2098-2105 - Zhiqiang Wang, Xinyue Yu, Ziqing Tian:

A Federated Learning Scheme with Adaptive Hierarchical Protection and Multiple Aggregation. 2106-2114 - Xiaocui Dang, Priyadarsi Nanda, Manoranjan Mohanty, Haiyu Deng:

A Dual Defense Design Against Data Poisoning Attacks in Deep Learning-Based Recommendation Systems. 2115-2122 - Johannes Lohmöller, Jannis Scheiber, Rafael Kramann, Klaus Wehrle, Sikander Hayat

, Jan Pennekamp
:
scE(match): Privacy-Preserving Cluster Matching of Single-Cell Data. 2123-2132 - Wiraj Udara Wickramaarachchi

, Junwei Zhou, Dongdong Zhao, Jianwen Xiang:
Block-Feature Fusion for Privacy-Protected Iris Recognition. 2133-2141 - Ruiwei Hou, Fucai Zhou, Zongye Zhang, Jiacheng Li, Chongyang Wang:

CFB-DSSE: Efficient Secure Dynamic Searchable Encryption Scheme with Conjunctive Search for Smart Healthcare. 2142-2150 - Wenjv Hu, Yin Li:

An Efficient and Secure Anonymous Query Protocol. 2151-2158 - Sehrish Shafeeq, Mathias Fischer:

Privacy-aware data aggregation using Functional Encryption. 2159-2168 - Yuemeng Yin, Rahat Masood, Suranga Seneviratne, Aruna Seneviratne:

Evaluating Web-Based Privacy Controls: A User Study on Expectations and Preferences. 2169-2174 - Yanpeng Xiang, Tao Zhang, Jiahao Liu, Xinbo Zhang, Yu Zhang:

High-Capacity and High-Security Data Hiding in Encrypted Image Using Image Filtering and Image Blocking. 2175-2184 - Luyao Wang, Yan Liu, Xiaoyu Guo, Ziqi Long, Chunfang Yang:

Cross-platform Network User Alignment Interference Methods Based on Obfuscation Strategy. 2185-2190 - Weihao Li, Yongbing Gao, Yu Zhang, Lidong Yang, Ruiping Gao:

Research on Toxic Speech Detection Based on Large Language Models. 2191-2196 - Jianwei Liu, Wei Wan, Chun Long, Jing Li, Fan Yang, Yuhao Fu:

ZKFDT: A Fair Exchange Scheme for Data Trading Based on Efficient Zero-Knowledge Proofs. 2197-2206 - Zhongyuan Qin, Dinglian Wang, Minghua Wang:

Dynamic Differential Privacy in Hierarchical Federated Learning: A Layerwise Adaptive Framework. 2207-2212 - Shuguang Zhang, Jianli Bai, Kun Tu, Ziyue Yin, Chan Liu:

OHSS: Optimizing Homomorphic Secret Sharing to Support Fast Matrix Multiplication. 2213-2220 - Deok-Han Kim, Yujun Kim, Young-Gab Kim:

A Method for Quantitative Object De-Identification Analysis of Anonymized Video. 2221-2226 - Xingbo Wang, Yuzhu Wang, Mingwu Zhang:

Witness Encryption based on the SAT Problem*. 2227-2237 - Haoxuan Wu, Zhiqiang Wen:

Research on Adaptive Attention Dense Network Structure in Camera Source Recognition Method. 2238-2243 - Yuting Mou, Ke Xu, Xinghao Jiang, Tanfeng Sun:

Compressed Video Action Recognition Based on Neural Video Compression. 2244-2249 - Jingye Zhang, Ken Cheng, Xinli Xiong, Rongcheng Dong, Jun Huang, She Jie:

Construction of Cyber-attack Attribution Framework Based on LLM. 2250-2255 - Pooja Mishra, Paul Black, Adil Bagirov, Shaoning Pang:

Discriminating Malware Families using Partitional Clustering. 2256-2261 - Liming Lu, Zhenlin Yu, Peter Kok Keong Loh, Tuhin Isfaque Al Kaderi:

Investigating Patterns of Adversarial Techniques for Cyberattack Forensics. 2262-2268 - Hervais Simo, Michael Kreutzer:

WAPITI - A Weighted Bayesian Method for Private Information Inference on Social Ego Networks. 2269-2280 - Mengmi Tan, Jianyi Liu, Ru Zhang:

DI-GAE: A Dynamic and Resource-Efficient Attack Detection Framework with Incremental Learning and Graph Autoencoders. 2281-2286 - Yujun Kim, Deok-Han Kim, Young-Gab Kim:

Transfer Learning-Based Robust Insider Threat Detection. 2287-2292 - Yizhou Ma, Xikun Jiang, Evan W. Wu, Luis-Daniel Ibáñez, Jian Shi:

Model-based Data Markets: A Multi-Broker Game Theoretic Approach. 2293-2301 - Hao Zhou, Pengcheng Xia, Yiyang Ni, Jun Li

:
DcChain: A Novel Blockchain Sharding Method Based on Dual-constraint Label Propagating. 2302-2309 - Shuming Xiong, Junfeng Zhu, Qiqi Xu:

An Intelligent Charging Service Selection Scheme Under the Cross-Area Consensus of Blockchain for the IoV. 2310-2315 - Tahrim Hossain, Sakib Hassan, Faisal Haque Bappy, Muhammad Nur Yanhaona, Sarker T. Ahmed Rumee, Moinul Islam Zaber, Tariqul Islam:

FlexiContracts: A Novel and Efficient Scheme for Upgrading Smart Contracts in Ethereum Blockchain. 2316-2321 - Haibin Zheng, Tianxin Zhang, Jinyin Chen:

Fedfair: A Debiasing Algorithm for Federated Learning Systems. 2322-2326 - Yifan Sun, Meng Song:

Differentially Private Graph Convolutional Networks with Privacy Amplification. 2327-2335 - Zeshan Pang, Shasha Guo, Xuehu Yan, Yuliang Lu:

Destruction and Reconstruction Chain: An Adaptive Adversarial Purification Framework. 2336-2341 - Chaoqin Zhang, Maoqi Sun, Guangwu Hu:

CNN-KOA-BiGRU: A high-accuracy APT detection model based on deep learning networks. 2342-2347 - Chengming Zhang, Bo Tang, Yifan Bian, Bingtao Han, Yongcheng Wang, Tao Liu:

Efficient and Secure Federated Learning via Enhanced Quantization and Encryption. 2348-2353 - Jun Guo, Minjuan Sun, Weiwei Zhang, Baoying Liu, Anwen Wang, Li Liu:

Human Action Recognition by Invisible Sensing with the Constraint of Privacy Preservation. 2354-2359 - Kedi Yang, Zhenyong Zhang, Youliang Tian:

Traceable AI-driven Avatars Using Multi-factors of Physical World and Metaverse. 2360-2367 - Yingjian Li, Yongsheng Wang, Gang Wang:

DDF-Net: A Cloud Computing Load Forecasting Method Integrating Spatiotemporal and Time-Frequency Domain Information. 2368-2375 - Haishi Huang, Jiaping Gui, Jianan Hong, Cunqing Hua:

HFL-AD: A Hierarchical Federated Learning Framework for Solving Data Contamination in DDoS Detection. 2376-2381 - Lukasz Krzywiecki, Tadeusz Kulczycki, Christian Emmanuel Nteranya, Andrzej Stos:

Detectable Mislabeling - Can Faulty AI Models be Recognized from Incomplete Memory Traces? 2382-2387 - Kewin Ignasiak, Wojciech Kowalczyk, Lukasz Krzywiecki, Mateusz Nasewicz, Hannes Salin, Marcin Zawada:

Privacy-Preserving Real-Time Gesture Recognition using Cloud-Trained Neural Networks. 2388-2393 - Jiaqi Lei

, Ke Gu, Long Cai:
A Lightweight Privacy-Preserving and Verifiable Federated Learning-Based Protocol. 2394-2399 - Kuan Yan, Dmytro Matsypura, Junbin Gao

:
BIG: A Practical Framework for Balancing the Conflict Between Group and Individual Fairness in Graph Neural Networks. 2400-2409 - Jie Zhang, Jiayuan Li, Haiqiang Fei, Lun Li, Hongsong Zhu:

EasyDetector: Using Linear Probe to Detect the Provenance of Large Language Models. 2410-2417 - Yaru Lv, Lijun Sun, Xiao Chen:

FMTD: Federated Learning-Based Multi-Angle Feature Fusion Framework for Abnormal Transaction Detection in Digital Currency. 2418-2423 - Lukasz Krzywiecki, Krzysztof Szymaniak, Marcin Zawada:

Privacy Preservation in Cloud-Based Distributed Learning through Data Encoding and Partitioning. 2424-2429 - Yilun Lyu, Xu Ma, Yuan Ma:

Backdoor Attacks Optimized through Genetic Algorithm-Driven Data Augmentation Combinations in Deep Neural Networks. 2430-2435 - Benyamin Tafreshian, Shengzhi Zhang:

A Defensive Framework Against Adversarial Attacks on Machine Learning-Based Network Intrusion Detection Systems. 2436-2441 - Hongke Zhang, Zheng Yan:

Design and Implementation of Data Encryption Mechanism in Fiber Channel Network. 2442-2446 - Zhou Zhou, Taotao Yu, Mohammad Shojafar, Xia Ou, Hongbing Cheng:

A Reliable Edge Server Deployment Algorithm Based on Spectral Clustering and a Deep Q-network Strategy using Multi-objective Optimization. 2447-2452 - Shengmin Xu, Jianfei Sun, Hangcheng Cao, Yulan Gao, Ziyang He, Cong Wu:

Shield-U: Safeguarding Traffic Sign Recognition Against Perturbation Attacks. 2453-2461 - Raphael Antonius Frick, Lukas Graner:

Deepfakes: A New Kind of Adversarial Attacks Against Face Recognition Systems? 2462-2467 - Luyao Wang, Xiaomin Wei, Hongtao Zhang, Lingtao Jia:

AttDet: Attitude Angles-Based UAV GNSS Spoofing Detection. 2468-2473 - Sarah Binhulayyil

, Shancang Li, Neetesh Saxena
:
IoT Vulnerability Detection using Featureless LLM CyBert Model. 2474-2480 - Zheng Gao, Hongping Li:

AI empowered senstive information detection and anonymisation in PDF files. 2481-2485 - Yongqiang Chen, Meiqi Liu, Jingfeng Rong, Xujie Liu, Anmin Fu, AnShun Zhou, Yuqing Zhang:

Analysis of Data Export Business Processes Based on Petri Nets. 2486-2491 - Siyu Chen, Jingfeng Rong, Zhiyuan Fu, Qiuling Yue, Anmin Fu, Xujie Liu, Anshun Zhou, Yuqing Zhang:

Research on Lifecycle-Driven Government Data Security Model and Data Grouping Technology. 2492-2497 - Meiqi Liu, Yongqiang Chen, Chaoyang Zhu, Shuang Yao, Jingfeng Rong, Xiaolong Zhao, Xijuan Si, Guang Yang, Yuqing Zhang:

A review of data security research in energy storage systems. 2498-2503 - Zhou Fang, Kai Zhang, Yigang Diao, Yixuan Song, Yanwei Sun, Jinqiao Shi:

Risk Assessment Based on Dataflow Dynamic Hypergraph for Cross-Border Data Transfer. 2504-2509 - Wei Yuan, Hongyu Sun, Mo Pang, He Wang, Gaofei Wu, Yuqing Zhang:

LogContrast: Log-based Anomaly Detection Using BERT and Contrastive Learning. 2510-2516 - Sixian Sun, Hongyu Sun, Haoxing Zhang, Yuqing Zhang:

A Study of Backdoor Attacks on Data Distillation for Text Classification Tasks. 2517-2522 - Bartlomiej Dzikowski, Lukasz Krzywiecki, Ksawery Mozdzynski, Karol Niczyj, Hannes Salin:

Distributed Data Possession - Blockchain Based Scalability. 2523-2528 - Pengfeng Zhang, Lei Li, Xin Liu, Rui Wang, Donglan Liu, Bing Su, Yuntao Wang, Yiliang Liu, Zhou Su:

Trusted and Spectrum-Efficient Crowd Computing in Massive MIMO Cellular Networks. 2529-2534 - Mahdi Mahdavi, Navid Abapour

, Zahra Ahmadian:
Trustworthy Approaches to RSA: Efficient Exploitation Strategies Based on Common Modulus. 2535-2540 - Xiayue Wang, Mingyang Li, Yuting Tao, Xuanzhe Wang, Hao Wu:

Trust Evaluation in Mobile Crowd Sensing Networks Based on Age of Trust (AoT). 2541-2546 - Qianyue Fan, Shiqian Wang, Zhe Feng, Li Di:

MT-Index: A Trustworthy Index For Multimodal Data Sharing. 2547-2552 - Sanjay Segu Nagesh, Niroshinie Fernando, Seng W. Loke, Azadeh Ghari Neiat, Pubudu N. Pathirana:

Honeybee-RS: Enhancing Trust through Lightweight Result Validation in Mobile Crowd Computing. 2553-2558 - Xinglin Lian

, Yang Liu, Shanfeng Wang
, Yu Zheng:
Payload Level Anomaly Network Traffic Detection via Semi-Supervised Contrastive Learning. 2559-2566 - Haipeng Du, Muyan Jiao, Jiageng Zhang, Xin Lv, Jie Zhang:

DualConvNet: Enhancing CNN Inference Efficiency Through Compressed Convolutions and Reparameterization. 2567-2574 - Gianlucca L. Zuin, Adriano Veloso:

Navigating Time's Possibilities: Plausible Counterfactual Explanations for Multivariate Time-Series Forecast through Genetic Algorithms. 2575-2582 - Zhuang Yuan, Rui Li, Fa Zhang, Kejing Xu, Liang Xu, Weizhan Zhang:

An Experimental Study on Half-Closed TCP Connections in Public Cloud Gateways. 2583-2589 - Shuaipeng Wu, Changhao Yuan, Kejiang Ye:

A Multi-Stage Spike Stream Processing and Image Reconstruction Method for Industrial Applications. 2590-2597 - Haowei Huo, Ting Lv, Ningbo Zhao, Gefan Ai, Qi He, Ying Kong, Yu Zhang, Yiwei Li, Jiangyao Wei, Chen Liu, Yuan Liu, Lichuan Ma:

Fraud Detection in Supply Chain Order Management via Kolmogorov-Arnold Networks. 2598-2605 - Mingxin Jin, Cong Wang, Shanglin Yang, Heng Wang, Ju Huang, Jun Zhao:

Multi-Scale Fuzzy Graph Convolutional Network for Hyperspectral Image Classification. 2606-2611 - Longlong Gao, Tao Xue, Long Xi:

RTM-CMD: Exploring Advanced Underground Target Detection in Coal Mines through Modified RTMDET Methodology. 2612-2618 - Steven Krudsen, Wenjuan Li:

Your Data is Leaking! An Empirical Study of User Habits during Smartphone Charging. 2619-2626 - Toru Sakon:

Anticipated Failure Determination-based Weakness Analysis with Common Weakness Enumeration. 2627-2634 - Jiaqi Han, Dan Wang, Hong Luo, Ye Zhou, Bin Song:

Hardware Latency-Aware Differential Architecture Search: Search for Latency-Friendly Architectures on Different Hardware. 2635-2643 - Min Song, Chao Li, Xiaowei Guo, Jie Liu, Huajian Zhang, Rui Xia:

Large-Scale Thermo-Hydraulic Analysis of Fuel Rod Bundles Based on YH-ACT. 2644-2652 - Yanhong Xu, Zhao Li, Ziru Zhao, Blaise Herroine Aguenoukoun, Jia Liu, Zhixian Chang, Yicheng Liu:

Machine Learning Enhanced Indoor Positioning with RIS-aided Channel Configuration and Analysis. 2653-2660 - Le Anh Duc Vu, Minh Hai Vu, Bao Ngoc Tran, Minh Tung Hoang, Duc Anh Nguyen, Minh Quan Hoang, Phi Le Nguyen:

An Automated PM2.5 Analysis and Prediction System with Encoder-Decoder Architecture and Continual Learning Mechanism. 2661-2668 - Zhenyu Lai, Yijia Xu, Jialei Zhang, Bowen Jia, Liangyan Wang, Qinglei Bu, Jie Sun, Quan Zhang:

Multi-sensor Fusion-based Cow Health Monitoring IoT System. 2669-2674 - Siyuan Wang, Shuchen Liu, Zheng Jin, Zheng Yan, Tao Chen, Qinglei Bu, Zhiqiang Wang, Jintao Liu, Jie Sun:

A Digital Traditional Chinese Medicine Splint for Treatment of Distal Radius Fracture. 2675-2679 - Bingxin Zhang

, Kang Zheng, Chao Tong, Kun Yang, Kang Yan:
Deep Reinforcement Learning for Active RIS-Assisted Full-Duplex Integrated Sensing and Communication Systems. 2680-2685 - Yan Liang, Xin Dong, Song Chen, Zhengda Li, Zhimin Chang:

A corrected method for parameters in the signal propagation model. 2686-2693 - Le Tian, ChangShen Ou, WeiLin Huang:

Research on Energy Management Strategy of Microgrid Based on Improved Deep Q network Algorithm. 2694-2700 - Tianang Chen, Haojie Qin, Jin Qian, Jun Luo, Yinghua Jiang, Liquan Chen:

A cross-domain authentication scheme based on quantized trust relationship for smart grid. 2701-2708 - Xin Liu, Rui Wang, Pengfeng Zhang, Liang Xie, Yiliang Liu, Zhou Su, Donglan Liu, Yingxian Chang:

Long-Term Privacy-Preserving Incentive Scheme Design for Federated Learning. 2709-2714 - Chen Jin, Xi Chen, Junyu Pu, Boyu Fan:

Research on distributed machine learning defence strategies under Byzantine attacks. 2715-2721

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














