Search dblp for Publications

export results for "toc:db/conf/trustcom/trustcom2024.bht:"

 download as .bib file

@inproceedings{DBLP:conf/trustcom/0001FXSY024,
  author       = {Yuwei Xu and
                  Xiaotian Fang and
                  Zhengxin Xu and
                  Kehui Song and
                  Yali Yuan and
                  Guang Cheng},
  title        = {{M-ETC:} Improving Multi-Task Encrypted Traffic Classification by
                  Reducing Inter-Task Interference},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {271--278},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00060},
  doi          = {10.1109/TRUSTCOM63139.2024.00060},
  timestamp    = {Thu, 24 Apr 2025 15:48:16 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/0001FXSY024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/0001LHHY024,
  author       = {Yuwei Xu and
                  Jiangfeng Li and
                  Yujie Hou and
                  Xinxu Huang and
                  Yali Yuan and
                  Guang Cheng},
  title        = {TriViewNet: Achieve Accurate Tor Hidden Service Classification by
                  Multi-View Feature Extraction and Fusion},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {559--566},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00092},
  doi          = {10.1109/TRUSTCOM63139.2024.00092},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/0001LHHY024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/0001LL24,
  author       = {Fei Peng and
                  Yousheng Liang and
                  Min Long},
  title        = {A Semi-Fragile Reversible Watermarking for 3D Models Based on {IQIM}
                  with Dual-Strategy Partition Modulation},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {29--36},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00033},
  doi          = {10.1109/TRUSTCOM63139.2024.00033},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/0001LL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/0001NY24,
  author       = {Zhijun Wu and
                  Shanhe Niu and
                  Meng Yue},
  title        = {A Reliable Encrypted Traffic Classification Method Based on Attention
                  Mechanisms},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1286--1295},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00181},
  doi          = {10.1109/TRUSTCOM63139.2024.00181},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/0001NY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/0001YSOC24,
  author       = {Zhou Zhou and
                  Taotao Yu and
                  Mohammad Shojafar and
                  Xia Ou and
                  Hongbing Cheng},
  title        = {A Reliable Edge Server Deployment Algorithm Based on Spectral Clustering
                  and a Deep Q-network Strategy using Multi-objective Optimization},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2447--2452},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00339},
  doi          = {10.1109/TRUSTCOM63139.2024.00339},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/0001YSOC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/0001YZC24,
  author       = {Di Xiao and
                  Zhuyan Yang and
                  Maolan Zhang and
                  Lvjun Chen},
  title        = {Data Privacy-Preserving and Communication Efficient Federated Multilinear
                  Compressed Learning},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1472--1479},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00203},
  doi          = {10.1109/TRUSTCOM63139.2024.00203},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/0001YZC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/0001ZZS024,
  author       = {Yuwei Xu and
                  Zizhi Zhu and
                  Chufan Zhang and
                  Kehui Song and
                  Guang Cheng},
  title        = {A High-Accuracy Unknown Traffic Identification Method Based on Multi-View
                  Contrastive Learning},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {691--698},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00108},
  doi          = {10.1109/TRUSTCOM63139.2024.00108},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/0001ZZS024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/0002JHSJ24,
  author       = {Muhammad Adil and
                  Mian Ahmad Jan and
                  Safayat Bin Hakim and
                  Houbing Herbert Song and
                  Zhanpeng Jin},
  title        = {xIDS-EnsembleGuard: An Explainable Ensemble Learning-based Intrusion
                  Detection System},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {93--100},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00040},
  doi          = {10.1109/TRUSTCOM63139.2024.00040},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/0002JHSJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/0003SYD24,
  author       = {Pengfei Wu and
                  Jianfei Sun and
                  Guomin Yang and
                  Robert H. Deng},
  title        = {Towards Privacy-aware IoT Communications: Delegable, Revocable, and
                  Efficient},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {481--491},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00083},
  doi          = {10.1109/TRUSTCOM63139.2024.00083},
  timestamp    = {Fri, 04 Jul 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/0003SYD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/0003WHWSZ24,
  author       = {Weiping Wang and
                  Huijuan Wang and
                  Yulu Hong and
                  Chenyu Wang and
                  Hong Song and
                  Shigeng Zhang},
  title        = {SimLog: System Log Anomaly Detection Method Based on Simhash},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1090--1096},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00156},
  doi          = {10.1109/TRUSTCOM63139.2024.00156},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/0003WHWSZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/0004CXSG24,
  author       = {Bo Yin and
                  Hang Chen and
                  Binyao Xu and
                  Mariam Suleiman Silima and
                  Ke Gu},
  title        = {Efficient and Verifiable Dynamic Skyline Queries in Blockchain Networks},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1551--1556},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00214},
  doi          = {10.1109/TRUSTCOM63139.2024.00214},
  timestamp    = {Fri, 25 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/0004CXSG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/00050GLZL0B24,
  author       = {Fengyuan Shi and
                  Zhou Zhou and
                  Jiang Guo and
                  Renjie Li and
                  Zhongyi Zhang and
                  Shu Li and
                  Qingyun Liu and
                  Xiuguo Bao},
  title        = {LightRL-AD: {A} Lightweight Online Reinforcement Learning Approach
                  for Autonomous Defense against Network Attacks},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1614--1621},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00222},
  doi          = {10.1109/TRUSTCOM63139.2024.00222},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/00050GLZL0B24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/00050QL024,
  author       = {Haoyang Wang and
                  Kai Fan and
                  Yue Quan and
                  Fenghua Li and
                  Hui Li},
  title        = {{VDPSRQ:} Achieving Verifiable and Dynamic Private Spatial Range Queries
                  over Outsourced Database},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {532--541},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00089},
  doi          = {10.1109/TRUSTCOM63139.2024.00089},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/00050QL024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/0006LJF024,
  author       = {Rong Wang and
                  Junchuan Liang and
                  Haiting Jiang and
                  Chaosheng Feng and
                  Chin{-}Chen Chang},
  title        = {StegoFL: Using Steganography and Federated Learning to Transmit Malware},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {184--190},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00050},
  doi          = {10.1109/TRUSTCOM63139.2024.00050},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/0006LJF024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/0009XB0X024,
  author       = {Jie Cao and
                  Zhengxin Xu and
                  Yunpeng Bai and
                  Yuwei Xu and
                  Qiao Xiang and
                  Guang Cheng},
  title        = {Perturbing Vulnerable Bytes in Packets to Generate Adversarial Samples
                  Resisting DNN-Based Traffic Monitoring},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1015--1021},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00146},
  doi          = {10.1109/TRUSTCOM63139.2024.00146},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/0009XB0X024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/0010W024,
  author       = {Wei Feng and
                  Dongyuan Wei and
                  Qianqian Wang},
  title        = {Blind Signature Based Anonymous Authentication on Trust for Decentralized
                  Mobile Crowdsourcing},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {49--56},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00035},
  doi          = {10.1109/TRUSTCOM63139.2024.00035},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/0010W024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AlhussienA24,
  author       = {Nour Alhussien and
                  Ahmed Aleroud},
  title        = {AdvPurRec: Strengthening Network Intrusion Detection with Diffusion
                  Model Reconstruction Against Adversarial Attacks},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1638--1646},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00225},
  doi          = {10.1109/TRUSTCOM63139.2024.00225},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/AlhussienA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AmadouMEB24,
  author       = {Abdoul Nasser Hassane Amadou and
                  Anas Motii and
                  Saida Elouardi and
                  El Houcine Bergou},
  title        = {{EUREKHA:} Enhancing User Representation for Key Hackers Identification
                  in Underground Forums},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {387--398},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00073},
  doi          = {10.1109/TRUSTCOM63139.2024.00073},
  timestamp    = {Tue, 05 Aug 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/AmadouMEB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AoWWZ24,
  author       = {Zhuohan Ao and
                  Yi Wang and
                  Ying Wang and
                  Yu Zhan},
  title        = {Trustworthiness and path regularity based contrastive learning for
                  noisy knowledge graph error assertion detection},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {794--801},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00120},
  doi          = {10.1109/TRUSTCOM63139.2024.00120},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/AoWWZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AzamCMAT24,
  author       = {Naila Azam and
                  Alex Chak and
                  Anna Lito Michala and
                  Shuja Ansari and
                  Nguyen Binh Truong},
  title        = {Modelling GDPR-compliance based on Defeasible Logic Reasoning: Insights
                  from Time Complexity Perspective\({}^{\mbox{*}}\)},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2060--2067},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00286},
  doi          = {10.1109/TRUSTCOM63139.2024.00286},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/AzamCMAT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Baghalizadeh-Moghadam24,
  author       = {Neda Baghalizadeh{-}Moghadam and
                  Christopher Neal and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Boulahia{-}Cuppens},
  title        = {{NLP} and Neural Networks for Insider Threat Detection},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2010--2018},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00279},
  doi          = {10.1109/TRUSTCOM63139.2024.00279},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Baghalizadeh-Moghadam24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BinhulayyilLS24,
  author       = {Sarah Binhulayyil and
                  Shancang Li and
                  Neetesh Saxena},
  title        = {IoT Vulnerability Detection using Featureless {LLM} CyBert Model},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2474--2480},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00343},
  doi          = {10.1109/TRUSTCOM63139.2024.00343},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/BinhulayyilLS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BunzelK24,
  author       = {Niklas Bunzel and
                  Gerrit Klause},
  title        = {Analyzing the Effectiveness of Image Preprocessing Defenses Under
                  Runtime Constraints},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {994--999},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00143},
  doi          = {10.1109/TRUSTCOM63139.2024.00143},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/BunzelK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/CaiYLLDCLW24,
  author       = {Liujia Cai and
                  Tong Yu and
                  Yumeng Li and
                  Siqi Lu and
                  Hanjie Dong and
                  Guangying Cai and
                  Guangsong Li and
                  Yongjuan Wang},
  title        = {SyntaxBridge: Protocol Description Transformer for Enhanced Formal
                  Analysis of Security Protocols},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {338--345},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00067},
  doi          = {10.1109/TRUSTCOM63139.2024.00067},
  timestamp    = {Tue, 05 Aug 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/CaiYLLDCLW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/CaoWL24,
  author       = {Jingzhang Cao and
                  Meng Wang and
                  Shenao Lin},
  title        = {Rethinking Mutation Strategies in Fuzzing Smart Contracts},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {650--657},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00103},
  doi          = {10.1109/TRUSTCOM63139.2024.00103},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/CaoWL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChaiSGHL024,
  author       = {Shuiliang Chai and
                  Zhanhui Shi and
                  Yanjiao Gao and
                  Yuhao Huang and
                  Aizhu Liu and
                  Jie Xiao},
  title        = {{HTV:} Measuring Circuit Vulnerability to Hardware Trojan Insertion
                  Based on Node Co-activation Analysis},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1589--1594},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00219},
  doi          = {10.1109/TRUSTCOM63139.2024.00219},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChaiSGHL024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChandranGV24,
  author       = {Indu Chandran and
                  Mukesh Narayana Gadde and
                  Kizheppatt Vipin},
  title        = {FCSec: An Open-source Testbed for Security Evaluation on {UAV} Communications},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1217--1224},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00172},
  doi          = {10.1109/TRUSTCOM63139.2024.00172},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChandranGV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChangLZ024,
  author       = {Shuaishuai Chang and
                  Yuzhe Li and
                  Jinchao Zhang and
                  Bo Li},
  title        = {{T-ABE:} {A} practical {ABE} scheme to provide trustworthy key hosting
                  on untrustworthy cloud},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {960--967},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00139},
  doi          = {10.1109/TRUSTCOM63139.2024.00139},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChangLZ024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChangWRCYFHGL24,
  author       = {Yan Chang and
                  Yaqin Wu and
                  Jianwu Rui and
                  Ming Cao and
                  Yawei Yue and
                  Yu Feng and
                  Tingting He and
                  Haihui Gao and
                  Zhen Lv},
  title        = {Detection of Sensitive Information Based on Transient Data in Store
                  Buffer and Cache},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1978--1982},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00274},
  doi          = {10.1109/TRUSTCOM63139.2024.00274},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChangWRCYFHGL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenGWLL24,
  author       = {Dongbin Chen and
                  Yunchuan Guo and
                  Xiao Wang and
                  Fenghua Li and
                  Zifu Li},
  title        = {Orchestrating Security Protection Resource for Space-Ground Integrated
                  Networks},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1171--1178},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00166},
  doi          = {10.1109/TRUSTCOM63139.2024.00166},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenGWLL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenHSJJ24,
  author       = {Yuchen Chen and
                  Guanxiong Ha and
                  Xuan Shan and
                  Chunfu Jia and
                  Qiaowen Jia},
  title        = {Scalable Client-side Encrypted Deduplication beyond Secret Sharing
                  of the Master Key},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {453--460},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00080},
  doi          = {10.1109/TRUSTCOM63139.2024.00080},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenHSJJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenKDLW24,
  author       = {Ziyue Chen and
                  He Kong and
                  Shuai Ding and
                  Quanfeng Lv and
                  Guo Wei},
  title        = {Efficient DDoS Detection and Mitigation in Cloud Data Centers Using
                  eBPF and {XDP}},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1869--1874},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00258},
  doi          = {10.1109/TRUSTCOM63139.2024.00258},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenKDLW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenLGLK24,
  author       = {Cao Chen and
                  Fenghua Li and
                  Yunchuan Guo and
                  Zifu Li and
                  Wenlong Kou},
  title        = {Efficiently Detecting DDoS in Heterogeneous Networks: {A} Parameter-Compressed
                  Vertical Federated Learning approach},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {287--294},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00062},
  doi          = {10.1109/TRUSTCOM63139.2024.00062},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenLGLK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenLRLFZ024,
  author       = {Yongqiang Chen and
                  Meiqi Liu and
                  Jingfeng Rong and
                  Xujie Liu and
                  Anmin Fu and
                  AnShun Zhou and
                  Yuqing Zhang},
  title        = {Analysis of Data Export Business Processes Based on Petri Nets},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2486--2491},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00345},
  doi          = {10.1109/TRUSTCOM63139.2024.00345},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenLRLFZ024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenML24,
  author       = {Tongxi Chen and
                  Weizhi Meng and
                  Wenjuan Li},
  title        = {User Authentication Based on the Integration of Musical Signals and
                  Ear Canal Acoustics},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {717--728},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00111},
  doi          = {10.1109/TRUSTCOM63139.2024.00111},
  timestamp    = {Tue, 03 Jun 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenML24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenQQLJC24,
  author       = {Tianang Chen and
                  Haojie Qin and
                  Jin Qian and
                  Jun Luo and
                  Yinghua Jiang and
                  Liquan Chen},
  title        = {A cross-domain authentication scheme based on quantized trust relationship
                  for smart grid},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2701--2708},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00376},
  doi          = {10.1109/TRUSTCOM63139.2024.00376},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenQQLJC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenRFYFLZZ24,
  author       = {Siyu Chen and
                  Jingfeng Rong and
                  Zhiyuan Fu and
                  Qiuling Yue and
                  Anmin Fu and
                  Xujie Liu and
                  Anshun Zhou and
                  Yuqing Zhang},
  title        = {Research on Lifecycle-Driven Government Data Security Model and Data
                  Grouping Technology},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2492--2497},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00346},
  doi          = {10.1109/TRUSTCOM63139.2024.00346},
  timestamp    = {Fri, 25 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenRFYFLZZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenSMLZ24,
  author       = {Liquan Chen and
                  Yufan Song and
                  Wanting Ma and
                  Tianyu Lu and
                  Peng Zhang},
  title        = {Phase Shift Matrix Optimization and Channel Quantization Alternating
                  in RIS-Assisted Physical Layer Key Generation},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1179--1186},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00167},
  doi          = {10.1109/TRUSTCOM63139.2024.00167},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenSMLZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenW024,
  author       = {Yang Chen and
                  Min Wu and
                  Min Zhang},
  title        = {Abstraction-Based Training for Robust Classification Models via Image
                  Pixelation},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1756--1761},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00241},
  doi          = {10.1109/TRUSTCOM63139.2024.00241},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenW024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenWKGCK24,
  author       = {Yongkang Chen and
                  Tong Wang and
                  Wei Kong and
                  Taotao Gu and
                  Guiling Cao and
                  Xiaohui Kuang},
  title        = {Enhancing Adversarial Robustness through Self-Supervised Confidence-Based
                  Denoising},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {750--758},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00115},
  doi          = {10.1109/TRUSTCOM63139.2024.00115},
  timestamp    = {Sat, 31 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenWKGCK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenYG0DS24,
  author       = {Meiling Chen and
                  Yuanyuan Yang and
                  Sixu Guo and
                  Jin Cao and
                  Haitao Du and
                  Li Su},
  title        = {Signcryption based on Elliptic Curve {CL-PKC} for Low Earth Orbit
                  Satellite Security Networking},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1029--1036},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00148},
  doi          = {10.1109/TRUSTCOM63139.2024.00148},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenYG0DS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChengFLGHM24,
  author       = {Yudan Cheng and
                  Tao Feng and
                  Zhiquan Liu and
                  Xian Guo and
                  Lulu Han and
                  Jianfeng Ma},
  title        = {An Efficient and Privacy-Preserving Participant Selection Scheme based
                  on Location in Mobile Crowdsensing},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1381--1388},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00192},
  doi          = {10.1109/TRUSTCOM63139.2024.00192},
  timestamp    = {Tue, 05 Aug 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChengFLGHM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/CofanoBD24,
  author       = {Serena Cofano and
                  Giacomo Benedetti and
                  Matteo Dell'Amico},
  title        = {{SBOM} Generation Tools in the Python Ecosystem: an In-Detail Analysis},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {427--434},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00077},
  doi          = {10.1109/TRUSTCOM63139.2024.00077},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/CofanoBD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Cui0X24,
  author       = {Yaxin Cui and
                  Hong Xu and
                  Zhichao Xu},
  title        = {Improved Rectangle and Linear Attacks on Lightweight Block Cipher
                  {WARP}},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1797--1802},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00247},
  doi          = {10.1109/TRUSTCOM63139.2024.00247},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Cui0X24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/CuiZWZ0M24,
  author       = {Jie Cui and
                  Jing Zhang and
                  Lu Wei and
                  Minghui Zhu and
                  Hong Zhong and
                  Geyong Min},
  title        = {Multi-Authority Ciphertext-Policy Attribute-based Encryption with
                  Hidden Policy for Securing Internet-of-Vehicles},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {213--221},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00054},
  doi          = {10.1109/TRUSTCOM63139.2024.00054},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/CuiZWZ0M24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DangNMD24,
  author       = {Xiaocui Dang and
                  Priyadarsi Nanda and
                  Manoranjan Mohanty and
                  Haiyu Deng},
  title        = {A Dual Defense Design Against Data Poisoning Attacks in Deep Learning-Based
                  Recommendation Systems},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2115--2122},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00293},
  doi          = {10.1109/TRUSTCOM63139.2024.00293},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/DangNMD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DehlingKIF24,
  author       = {Florian Dehling and
                  Sebastian Koch and
                  Luigi Lo Iacono and
                  Hannes Federrath},
  title        = {You Are as You Type: Investigating the Influence of Timestamp Accuracy
                  on the Robustness of Keystroke Biometrics},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {469--480},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00082},
  doi          = {10.1109/TRUSTCOM63139.2024.00082},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/DehlingKIF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DengDJWY0L24,
  author       = {Haiyu Deng and
                  Xiaocui Dang and
                  Yanna Jiang and
                  Xu Wang and
                  Guangsheng Yu and
                  Wei Ni and
                  Ren Ping Liu},
  title        = {FedNIFW: Non-Interfering Fragmented Watermarking for Federated Deep
                  Neural Network},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1719--1726},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00236},
  doi          = {10.1109/TRUSTCOM63139.2024.00236},
  timestamp    = {Fri, 25 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/DengDJWY0L24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DengWHT24,
  author       = {Xin Deng and
                  Rui Wang and
                  Weihong Han and
                  Zhihong Tian},
  title        = {Vulnerabilities are collaborating to compromise your system: {A} network
                  risk assessment method based on cooperative game and attack graph},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {176--183},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00049},
  doi          = {10.1109/TRUSTCOM63139.2024.00049},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/DengWHT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DingG0W24,
  author       = {Wenxiu Ding and
                  Hongjiang Guo and
                  Zheng Yan and
                  Mingjun Wang},
  title        = {Secure Federated Learning Schemes Based on Multi-Key Homomorphic Encryption},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {551--558},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00091},
  doi          = {10.1109/TRUSTCOM63139.2024.00091},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/DingG0W24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DingLCC0W24,
  author       = {Wenxiu Ding and
                  Muzhi Liu and
                  Yuxuan Cai and
                  Mingxin Chen and
                  Zheng Yan and
                  Mingjun Wang},
  title        = {Zephyr: {A} High-Performance Framework for Graph Attention Networks
                  on Heterogeneous Data},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {926--933},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00135},
  doi          = {10.1109/TRUSTCOM63139.2024.00135},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/DingLCC0W24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DingTWX024,
  author       = {Zehua Ding and
                  Youliang Tian and
                  Guorong Wang and
                  Jinbo Xiong and
                  Jianfeng Ma},
  title        = {Membership Inference Attacks via Dynamic Adversarial Perturbations
                  Reduction},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {842--849},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00126},
  doi          = {10.1109/TRUSTCOM63139.2024.00126},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/DingTWX024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DongLY24,
  author       = {Xianghui Dong and
                  Yin Liu and
                  Xuejun Yu},
  title        = {Three-Body Problem: An Empirical Study on Smartphone-based TEEs, TEE-based
                  Apps, and their Interactions},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {968--977},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00140},
  doi          = {10.1109/TRUSTCOM63139.2024.00140},
  timestamp    = {Mon, 19 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/DongLY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DongWWCTC24,
  author       = {Runze Dong and
                  Buhong Wang and
                  Jiang Weng and
                  Kunrui Cao and
                  Jiwei Tian and
                  Tianhao Cheng},
  title        = {Security Enhancement of {UAV} Swarm Empowered Downlink Transmission
                  with Integrated Sensing and Communication},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1083--1089},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00155},
  doi          = {10.1109/TRUSTCOM63139.2024.00155},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/DongWWCTC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DuHLL024,
  author       = {Meijie Du and
                  Mingqi Hu and
                  Shu Li and
                  Zhao Li and
                  Qingyun Liu},
  title        = {{SCENE:} Shape-based Clustering for Enhanced Noise-resilient Encrypted
                  Traffic Classification},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {306--315},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00064},
  doi          = {10.1109/TRUSTCOM63139.2024.00064},
  timestamp    = {Fri, 25 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/DuHLL024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DuJZLZ24,
  author       = {Haipeng Du and
                  Muyan Jiao and
                  Jiageng Zhang and
                  Xin Lv and
                  Jie Zhang},
  title        = {DualConvNet: Enhancing {CNN} Inference Efficiency Through Compressed
                  Convolutions and Reparameterization},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2567--2574},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00358},
  doi          = {10.1109/TRUSTCOM63139.2024.00358},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/DuJZLZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DuKT24,
  author       = {Ruizhong Du and
                  Jiajia Kang and
                  Jin Tian},
  title        = {Trusted Networking for Drones: Reputation-Based Security Mechanisms
                  for Node Access and Information Synchronization},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {13--20},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00031},
  doi          = {10.1109/TRUSTCOM63139.2024.00031},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/DuKT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DuanSSH24,
  author       = {Shuang Duan and
                  Hui Shu and
                  Zihan Sha and
                  Yuyao Huang},
  title        = {{SBCM:} Semantic-Driven Reverse Engineering Framework for Binary Code
                  Modularization},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1115--1124},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00159},
  doi          = {10.1109/TRUSTCOM63139.2024.00159},
  timestamp    = {Tue, 05 Aug 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/DuanSSH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DzikowskiKMNS24,
  author       = {Bartlomiej Dzikowski and
                  Lukasz Krzywiecki and
                  Ksawery Mozdzynski and
                  Karol Niczyj and
                  Hannes Salin},
  title        = {Distributed Data Possession - Blockchain Based Scalability},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2523--2528},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00351},
  doi          = {10.1109/TRUSTCOM63139.2024.00351},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/DzikowskiKMNS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FanWFD24,
  author       = {Qianyue Fan and
                  Shiqian Wang and
                  Zhe Feng and
                  Li Di},
  title        = {MT-Index: {A} Trustworthy Index For Multimodal Data Sharing},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2547--2552},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00355},
  doi          = {10.1109/TRUSTCOM63139.2024.00355},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/FanWFD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FangHHZZ24,
  author       = {Tao Fang and
                  Zhihao Hou and
                  Jiahao He and
                  Junjie Zhou and
                  Gansen Zhao},
  title        = {Hierarchical Graph Feature Extraction Based on Multi-Information Contract
                  Graph for Enhanced Smart Contract Vulnerability Detection},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1604--1613},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00221},
  doi          = {10.1109/TRUSTCOM63139.2024.00221},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/FangHHZZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FangZDSSS24,
  author       = {Zhou Fang and
                  Kai Zhang and
                  Yigang Diao and
                  Yixuan Song and
                  Yanwei Sun and
                  Jinqiao Shi},
  title        = {Risk Assessment Based on Dataflow Dynamic Hypergraph for Cross-Border
                  Data Transfer},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2504--2509},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00348},
  doi          = {10.1109/TRUSTCOM63139.2024.00348},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/FangZDSSS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FeldeA24,
  author       = {Hendrik Meyer zum Felde and
                  Andrei{-}Cosmin Aprodu},
  title        = {{MAXPOWR:} Memory Attestation and Export in Process-based Trusted
                  Execution Environments},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1--12},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00030},
  doi          = {10.1109/TRUSTCOM63139.2024.00030},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/FeldeA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FengWXWZM24,
  author       = {Beibei Feng and
                  Qi Wang and
                  Xiaolin Xu and
                  Yijing Wang and
                  Tianning Zang and
                  Jingrun Ma},
  title        = {From Scarcity to Clarity: Few-Shot Learning for DoH Tunnel Detection
                  Through Prototypical Network},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {418--426},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00076},
  doi          = {10.1109/TRUSTCOM63139.2024.00076},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/FengWXWZM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FengXL24,
  author       = {Zheng Feng and
                  Chunyu Xing and
                  Chen Liang},
  title        = {Designing Secret Embedding Scheme Based on Bitcoin Transactions Pattern
                  Controlling},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1007--1014},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00145},
  doi          = {10.1109/TRUSTCOM63139.2024.00145},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/FengXL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FrickG24,
  author       = {Raphael Antonius Frick and
                  Lukas Graner},
  title        = {Deepfakes: {A} New Kind of Adversarial Attacks Against Face Recognition
                  Systems?},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2462--2467},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00341},
  doi          = {10.1109/TRUSTCOM63139.2024.00341},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/FrickG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FuCNL24,
  author       = {Yu Fu and
                  Bingcai Chen and
                  Qian Ning and
                  Kai Lin},
  title        = {Machine Learning-Based Power Allocation Optimization Algorithm for
                  Enhanced {CR-NOMA} Network},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1857--1862},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00256},
  doi          = {10.1109/TRUSTCOM63139.2024.00256},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/FuCNL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Gao024,
  author       = {Lijun Gao and
                  Zheng Yan},
  title        = {CertRob: Detecting {PDF} Malware with Certified Adversarial Robustness
                  via Randomization Smoothing},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {944--951},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00137},
  doi          = {10.1109/TRUSTCOM63139.2024.00137},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Gao024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GaoCZ0PP24,
  author       = {Junqiao Gao and
                  Chaklam Cheong and
                  Mansi Zhang and
                  Yue Cao and
                  Tao Peng and
                  Shahbaz Pervez},
  title        = {A Trust Model with Fitness-Based Clustering Scheme in FANETs},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {978--985},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00141},
  doi          = {10.1109/TRUSTCOM63139.2024.00141},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GaoCZ0PP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GaoGWZ24,
  author       = {Guangming Gao and
                  Shuitao Gan and
                  Xiaofeng Wang and
                  Shengkai Zhu},
  title        = {{LLMUZZ:} LLM-based seed optimization for black-box device fuzzing},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1209--1216},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00171},
  doi          = {10.1109/TRUSTCOM63139.2024.00171},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GaoGWZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GaoL24,
  author       = {Zheng Gao and
                  Hongping Li},
  title        = {{AI} empowered senstive information detection and anonymisation in
                  {PDF} files},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2481--2485},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00344},
  doi          = {10.1109/TRUSTCOM63139.2024.00344},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GaoL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GaoSLWWZD24,
  author       = {Qingyu Gao and
                  Liantao Song and
                  Yan Lei and
                  Feng Wang and
                  Lei Wang and
                  Shize Zong and
                  Yan Ding},
  title        = {Enhancing Consistency in Container Migration via {TEE:} {A} Secure
                  Architecture},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {21--28},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00032},
  doi          = {10.1109/TRUSTCOM63139.2024.00032},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GaoSLWWZD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GaoXX24,
  author       = {Longlong Gao and
                  Tao Xue and
                  Long Xi},
  title        = {{RTM-CMD:} Exploring Advanced Underground Target Detection in Coal
                  Mines through Modified {RTMDET} Methodology},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2612--2618},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00364},
  doi          = {10.1109/TRUSTCOM63139.2024.00364},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GaoXX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GearXFGJS24,
  author       = {Joseph Gear and
                  Yue Xu and
                  Ernest Foo and
                  Praveen Gauravaram and
                  Zahra Jadidi and
                  Leonie Simpson},
  title        = {Contextual Transformer-based Node Embedding for Vulnerability Detection
                  using Graph Learning},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2031--2038},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00282},
  doi          = {10.1109/TRUSTCOM63139.2024.00282},
  timestamp    = {Fri, 25 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GearXFGJS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GuZXW24,
  author       = {Yonghao Gu and
                  Xiaoqing Zhang and
                  Hao Xu and
                  Tiejun Wu},
  title        = {DyGCN: Dynamic Graph Convolution Network-based Anomaly Network Traffic
                  Detection},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1838--1843},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00253},
  doi          = {10.1109/TRUSTCOM63139.2024.00253},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GuZXW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GuanDWYL24,
  author       = {Qinchen Guan and
                  Shaoyong Du and
                  Kerong Wang and
                  Chunfang Yang and
                  Xiangyang Luo},
  title        = {A Framework for Detecting Hidden Partners in App Collusion},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {516--523},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00087},
  doi          = {10.1109/TRUSTCOM63139.2024.00087},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GuanDWYL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GuanHXZZ24,
  author       = {Siyuan Guan and
                  Ziheng Hu and
                  Guotao Xu and
                  Yao Zhu and
                  Bowen Zhao},
  title        = {{MIND:} {A} Privacy-Preserving Model Inference Framework via End-Cloud
                  Collaboration},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {582--589},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00095},
  doi          = {10.1109/TRUSTCOM63139.2024.00095},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GuanHXZZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GuanT0S024,
  author       = {Zhujie Guan and
                  Mengmeng Tian and
                  Yuwei Xu and
                  Kehui Song and
                  Guang Cheng},
  title        = {{WCDGA:} BERT-Based and Character-Transforming Adversarial {DGA} with
                  High Anti-Detection Ability},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {362--369},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00070},
  doi          = {10.1109/TRUSTCOM63139.2024.00070},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GuanT0S024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GuoLS0X24,
  author       = {Chunpeng Guo and
                  Beiyuan Liu and
                  Zeyang Sun and
                  Chen Chen and
                  Sai Xu},
  title        = {Secure Microwave {QR} Code Communication Using Pseudo-Random Constellation
                  Rotation},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2078--2083},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00288},
  doi          = {10.1109/TRUSTCOM63139.2024.00288},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GuoLS0X24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GuoSZLWL24,
  author       = {Jun Guo and
                  Minjuan Sun and
                  Weiwei Zhang and
                  Baoying Liu and
                  Anwen Wang and
                  Li Liu},
  title        = {Human Action Recognition by Invisible Sensing with the Constraint
                  of Privacy Preservation},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2354--2359},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00325},
  doi          = {10.1109/TRUSTCOM63139.2024.00325},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GuoSZLWL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HanWLZS24,
  author       = {Jiaqi Han and
                  Dan Wang and
                  Hong Luo and
                  Ye Zhou and
                  Bin Song},
  title        = {Hardware Latency-Aware Differential Architecture Search: Search for
                  Latency-Friendly Architectures on Different Hardware},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2635--2643},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00367},
  doi          = {10.1109/TRUSTCOM63139.2024.00367},
  timestamp    = {Sun, 06 Jul 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HanWLZS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HaoK24,
  author       = {Jiashun Hao and
                  Young{-}Woo Kwon},
  title        = {Enhancing Graph-Based Vulnerability Detection through Standardized
                  Deep Learning Pipelines},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1231--1238},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00174},
  doi          = {10.1109/TRUSTCOM63139.2024.00174},
  timestamp    = {Fri, 02 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HaoK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HaoLWLW24,
  author       = {Xiaofei Hao and
                  Liyuan Liu and
                  Yimeng Wang and
                  Fengyu Li and
                  Wanqing Wu},
  title        = {Federated Knowledge-enhanced Graph Attention Network for Privacy-preserving
                  Social Recommendation},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2084--2089},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00289},
  doi          = {10.1109/TRUSTCOM63139.2024.00289},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HaoLWLW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HaoZW24,
  author       = {Yu Hao and
                  Xu Zhang and
                  Dongbin Wang},
  title        = {{CPCED:} a container escape detection system based on {CNI} plugin},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {242--253},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00057},
  doi          = {10.1109/TRUSTCOM63139.2024.00057},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HaoZW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HeFI24,
  author       = {Yueyue He and
                  Wenxuan Fan and
                  Koji Inoue},
  title        = {{SPDID:} {A} Secure and Privacy-Preserving Decentralized Identity
                  utilizing Blockchain and {PUF}},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1622--1631},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00223},
  doi          = {10.1109/TRUSTCOM63139.2024.00223},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HeFI24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HeZ24,
  author       = {Zilong He and
                  Hua Zhang},
  title        = {Learning Robust and Repeatable Physical Camouflage for Aerial Object
                  Detectors},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1709--1718},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00235},
  doi          = {10.1109/TRUSTCOM63139.2024.00235},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HeZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HeZM024,
  author       = {Feng He and
                  Shijun Zhao and
                  Dan Meng and
                  Rui Hou},
  title        = {{MSMP:} {A} Centralized Shared-memory Management for Building Efficient
                  and Reliable File Systems on Microkernels},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {37--48},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00034},
  doi          = {10.1109/TRUSTCOM63139.2024.00034},
  timestamp    = {Thu, 24 Jul 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HeZM024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HongGA024,
  author       = {Liang Hong and
                  Xingguo Guo and
                  Zeyar Aung and
                  Wei Hu},
  title        = {Robust Hardware Trojan Detection: Conventional Machine Learning vs.
                  Graph Learning Approaches},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1572--1579},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00217},
  doi          = {10.1109/TRUSTCOM63139.2024.00217},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HongGA024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HongYZZ24,
  author       = {Quan Hong and
                  Yang Yu and
                  Lvyang Zhang and
                  Lidong Zhai},
  title        = {Active Defense Research: {A} New Perspective Integrating Traps and
                  Vulnerabilities},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1225--1230},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00173},
  doi          = {10.1109/TRUSTCOM63139.2024.00173},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HongYZZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HookerHKVC24,
  author       = {Adam L. Hooker and
                  Wenjian Huang and
                  Shalini Kapali Kurumathur and
                  Nishant Vishwamitra and
                  Kim{-}Kwang Raymond Choo},
  title        = {Towards Understanding and Detecting File Types in Encrypted Files
                  for Law Enforcement Applications},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1522--1527},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00210},
  doi          = {10.1109/TRUSTCOM63139.2024.00210},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HookerHKVC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HossainHBYRZ024,
  author       = {Tahrim Hossain and
                  Sakib Hassan and
                  Faisal Haque Bappy and
                  Muhammad Nur Yanhaona and
                  Sarker T. Ahmed Rumee and
                  Moinul Islam Zaber and
                  Tariqul Islam},
  title        = {FlexiContracts: {A} Novel and Efficient Scheme for Upgrading Smart
                  Contracts in Ethereum Blockchain},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2316--2321},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00319},
  doi          = {10.1109/TRUSTCOM63139.2024.00319},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HossainHBYRZ024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Hou0WZCL24,
  author       = {Chengqi Hou and
                  Wei Yang and
                  Yu Wang and
                  Zhiming Zhang and
                  Shaolong Chen and
                  Beibei Li},
  title        = {A Multi-Blockchain Based Anonymous Cross-Domain Authentication Scheme
                  for Industrial Internet of Things},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1125--1134},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00160},
  doi          = {10.1109/TRUSTCOM63139.2024.00160},
  timestamp    = {Wed, 06 Aug 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Hou0WZCL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HouHZZJ24,
  author       = {Jie Hou and
                  Zengrui Huang and
                  Zhiyong Zhang and
                  Wei Zhang and
                  Lei Ju},
  title        = {A GPU-Based Privacy-Preserving Machine Learning Acceleration Scheme},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {880--887},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00130},
  doi          = {10.1109/TRUSTCOM63139.2024.00130},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HouHZZJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HouZ0LW24,
  author       = {Ruiwei Hou and
                  Fucai Zhou and
                  Zongye Zhang and
                  Jiacheng Li and
                  Chongyang Wang},
  title        = {{CFB-DSSE:} Efficient Secure Dynamic Searchable Encryption Scheme
                  with Conjunctive Search for Smart Healthcare},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2142--2150},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00296},
  doi          = {10.1109/TRUSTCOM63139.2024.00296},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HouZ0LW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HuCB00ZY24,
  author       = {Xiaowei Hu and
                  Haoning Chen and
                  Huaifeng Bao and
                  Wen Wang and
                  Feng Liu and
                  Guoqiao Zhou and
                  Peng Yin},
  title        = {A LLM-based agent for the automatic generation and generalization
                  of {IDS} rules},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1875--1880},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00259},
  doi          = {10.1109/TRUSTCOM63139.2024.00259},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HuCB00ZY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HuL24,
  author       = {Wenjv Hu and
                  Yin Li},
  title        = {An Efficient and Secure Anonymous Query Protocol},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2151--2158},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00297},
  doi          = {10.1109/TRUSTCOM63139.2024.00297},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HuL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HuLXMJH24,
  author       = {Jiekang Hu and
                  Yakai Li and
                  Zhaoxi Xiang and
                  Luping Ma and
                  Xiaoqi Jia and
                  Qingjia Huang},
  title        = {{LLM4MDG:} Leveraging Large Language Model to Construct Microservices
                  Dependency Graph},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {859--869},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00128},
  doi          = {10.1109/TRUSTCOM63139.2024.00128},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HuLXMJH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Hua0X24,
  author       = {Ying Hua and
                  Hui Xia and
                  Shuo Xu},
  title        = {Federated Unlearning for Samples Based on Adaptive Gradient Ascent
                  of Angles},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {834--841},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00125},
  doi          = {10.1109/TRUSTCOM63139.2024.00125},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Hua0X24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Huang00LMZ024,
  author       = {Xiaoran Huang and
                  Yiwen Gao and
                  Wei Cheng and
                  Yuejun Liu and
                  Jingdian Ming and
                  Yongbin Zhou and
                  Jian Weng},
  title        = {Towards High-Quality Electromagnetic Leakage Acquisition in Side-Channel
                  Analysis},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {370--377},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00071},
  doi          = {10.1109/TRUSTCOM63139.2024.00071},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Huang00LMZ024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Huang0LWLY24,
  author       = {Weiguo Huang and
                  Yong Ding and
                  Jun Li and
                  Yujue Wang and
                  Hai Liang and
                  Changsong Yang},
  title        = {{SAMOC:} Enabling Atomic Invocations for Cross-chain Crowdsourcing
                  Testing DApps in Industrial Control Through Trusted Smart Community
                  and Lock Mechanism},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1803--1808},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00248},
  doi          = {10.1109/TRUSTCOM63139.2024.00248},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Huang0LWLY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HuangDH24,
  author       = {Yijie Huang and
                  Wei Ding and
                  Mian Huang},
  title        = {Malware Traffic Classification Based on Multidimensional Features
                  Learning},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1963--1971},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00272},
  doi          = {10.1109/TRUSTCOM63139.2024.00272},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HuangDH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HuangGHH24,
  author       = {Haishi Huang and
                  Jiaping Gui and
                  Jianan Hong and
                  Cunqing Hua},
  title        = {{HFL-AD:} {A} Hierarchical Federated Learning Framework for Solving
                  Data Contamination in DDoS Detection},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2376--2381},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00328},
  doi          = {10.1109/TRUSTCOM63139.2024.00328},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HuangGHH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HuangL0B24,
  author       = {Mengdie Huang and
                  Yingjun Lin and
                  Xiaofeng Chen and
                  Elisa Bertino},
  title        = {{MARS:} Robustness Certification for Deep Network Intrusion Detectors
                  via Multi-Order Adaptive Randomized Smoothing},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {767--774},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00117},
  doi          = {10.1109/TRUSTCOM63139.2024.00117},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HuangL0B24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HuangLCL24,
  author       = {Xiaodong Huang and
                  Gangliang Li and
                  Chengfeng Chen and
                  Shouqiang Liu},
  title        = {{DMPA:} {A} Compact and Effective Pipeline for Detecting Multiple
                  Phishing Attacks},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1701--1708},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00234},
  doi          = {10.1109/TRUSTCOM63139.2024.00234},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HuangLCL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HuangLYYWMJ24,
  author       = {Xinyu Huang and
                  Xingxing Liao and
                  Jie Yang and
                  Wei You and
                  Wenhao Wu and
                  Shiru Min and
                  Xinsheng Ji},
  title        = {5G-PPDE: {A} Novel Adaptive Scaling Framework for Enhancing the Resilience
                  of the 5G Cloud Core Network},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2025--2030},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00281},
  doi          = {10.1109/TRUSTCOM63139.2024.00281},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HuangLYYWMJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HuoLZAHKZLWLLM24,
  author       = {Haowei Huo and
                  Ting Lv and
                  Ningbo Zhao and
                  Gefan Ai and
                  Qi He and
                  Ying Kong and
                  Yu Zhang and
                  Yiwei Li and
                  Jiangyao Wei and
                  Chen Liu and
                  Yuan Liu and
                  Lichuan Ma},
  title        = {Fraud Detection in Supply Chain Order Management via Kolmogorov-Arnold
                  Networks},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2598--2605},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00362},
  doi          = {10.1109/TRUSTCOM63139.2024.00362},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HuoLZAHKZLWLLM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HussainP24,
  author       = {Ahmed Mohamed Hussain and
                  Panos Papadimitratos},
  title        = {Privacy-Preserving Secure Neighbor Discovery for Wireless Networks},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1310--1319},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00184},
  doi          = {10.1109/TRUSTCOM63139.2024.00184},
  timestamp    = {Sat, 31 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HussainP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/IgnasiakKKNSZ24,
  author       = {Kewin Ignasiak and
                  Wojciech Kowalczyk and
                  Lukasz Krzywiecki and
                  Mateusz Nasewicz and
                  Hannes Salin and
                  Marcin Zawada},
  title        = {Privacy-Preserving Real-Time Gesture Recognition using Cloud-Trained
                  Neural Networks},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2388--2393},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00330},
  doi          = {10.1109/TRUSTCOM63139.2024.00330},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/IgnasiakKKNSZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JeonKK24,
  author       = {Jong{-}Hee Jeon and
                  Jahoon Koo and
                  Young{-}Gab Kim},
  title        = {RAG-based Cyber Threat Tracing Graph Modeling Method},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {608--615},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00098},
  doi          = {10.1109/TRUSTCOM63139.2024.00098},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/JeonKK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JiE24,
  author       = {Yi Ji and
                  Isao Echizen},
  title        = {StrucTrans: Zero-Query Structural Adversarial Attack Transferred from
                  Masked Autoencoders to Image Classifiers},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {870--879},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00129},
  doi          = {10.1109/TRUSTCOM63139.2024.00129},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/JiE24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JiaYM24,
  author       = {Wenxin Jia and
                  Zheng Yang and
                  Zhiqiang Ma},
  title        = {Lightweight Leakage-Resilient Authenticated Key Exchange for Industrial
                  Internet of Things},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1051--1059},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00151},
  doi          = {10.1109/TRUSTCOM63139.2024.00151},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/JiaYM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JiangH24,
  author       = {Zhuochen Jiang and
                  Baojian Hua},
  title        = {WaShadow: Effectively Protecting WebAssembly Memory Through Virtual
                  Machine-Aware Shadow Memory},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {222--233},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00055},
  doi          = {10.1109/TRUSTCOM63139.2024.00055},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/JiangH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JiangLWH24,
  author       = {Hao Jiang and
                  Haiwei Lai and
                  Si Wu and
                  Baojian Hua},
  title        = {JasFree: Grammar-free Program Analysis for JavaScript Bytecode},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {326--337},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00066},
  doi          = {10.1109/TRUSTCOM63139.2024.00066},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/JiangLWH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JiangZZJT24,
  author       = {Nan Jiang and
                  Yuanbo Zhao and
                  Qihang Zhou and
                  Xiaoqi Jia and
                  Jing Tang},
  title        = {SeChannel: {A} Secure and Lightweight Channel Protection Approach
                  for {TEE} Systems},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {77--84},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00038},
  doi          = {10.1109/TRUSTCOM63139.2024.00038},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/JiangZZJT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JinCPF24,
  author       = {Chen Jin and
                  Xi Chen and
                  Junyu Pu and
                  Boyu Fan},
  title        = {Research on distributed machine learning defence strategies under
                  Byzantine attacks},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2715--2721},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00378},
  doi          = {10.1109/TRUSTCOM63139.2024.00378},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/JinCPF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JinWYWHZ24,
  author       = {Mingxin Jin and
                  Cong Wang and
                  Shanglin Yang and
                  Heng Wang and
                  Ju Huang and
                  Jun Zhao},
  title        = {Multi-Scale Fuzzy Graph Convolutional Network for Hyperspectral Image
                  Classification},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2606--2611},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00363},
  doi          = {10.1109/TRUSTCOM63139.2024.00363},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/JinWYWHZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Jing0HP24,
  author       = {Jiuyao Jing and
                  Yu Zheng and
                  Qi He and
                  Chunlei Peng},
  title        = {Face Anti-spoofing based on Multi-modal Dual-stream Anomaly Detection},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {157--164},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00047},
  doi          = {10.1109/TRUSTCOM63139.2024.00047},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Jing0HP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JingZZW24,
  author       = {Wangyuan Jing and
                  Chi Zhang and
                  Bingbing Zhang and
                  Lingbo Wei},
  title        = {{CVALLM:} {A} Cloud Platform Security Assessment Framework Based on
                  Large Language Models},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2039--2044},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00283},
  doi          = {10.1109/TRUSTCOM63139.2024.00283},
  timestamp    = {Wed, 28 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/JingZZW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JuZ0QP24,
  author       = {Keyi Ju and
                  Hui Zhong and
                  Xinyue Zhang and
                  Xiaoqi Qin and
                  Miao Pan},
  title        = {Controllable Quantum Computing Privacy via Inherent Noises and Quantum
                  Error Mitigation},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {443--452},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00079},
  doi          = {10.1109/TRUSTCOM63139.2024.00079},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/JuZ0QP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KimKK24,
  author       = {Deok{-}Han Kim and
                  Yujun Kim and
                  Young{-}Gab Kim},
  title        = {A Method for Quantitative Object De-Identification Analysis of Anonymized
                  Video},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2221--2226},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00306},
  doi          = {10.1109/TRUSTCOM63139.2024.00306},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/KimKK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KimKK24a,
  author       = {Yujun Kim and
                  Deok{-}Han Kim and
                  Young{-}Gab Kim},
  title        = {Transfer Learning-Based Robust Insider Threat Detection},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2287--2292},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00315},
  doi          = {10.1109/TRUSTCOM63139.2024.00315},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/KimKK24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KimY24,
  author       = {Youbin Kim and
                  Man{-}Ki Yoon},
  title        = {WhisperMQTT: Lightweight Secure Communication Scheme for Subscription-Heavy
                  {MQTT} Network},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1276--1285},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00180},
  doi          = {10.1109/TRUSTCOM63139.2024.00180},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/KimY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KouYCZ24,
  author       = {Xiaoyong Kou and
                  Wei Yang and
                  Peijin Cong and
                  Gongxuan Zhang},
  title        = {Multi-Channel Leakage Detection Based on {\(\chi\)}\({}^{\mbox{2}}\)
                  Test of Independence},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {734--741},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00113},
  doi          = {10.1109/TRUSTCOM63139.2024.00113},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/KouYCZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KrudsenL24,
  author       = {Steven Krudsen and
                  Wenjuan Li},
  title        = {Your Data is Leaking! An Empirical Study of User Habits during Smartphone
                  Charging},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2619--2626},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00365},
  doi          = {10.1109/TRUSTCOM63139.2024.00365},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/KrudsenL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KrzywieckiKNS24,
  author       = {Lukasz Krzywiecki and
                  Tadeusz Kulczycki and
                  Christian Emmanuel Nteranya and
                  Andrzej Stos},
  title        = {Detectable Mislabeling - Can Faulty {AI} Models be Recognized from
                  Incomplete Memory Traces?},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2382--2387},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00329},
  doi          = {10.1109/TRUSTCOM63139.2024.00329},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/KrzywieckiKNS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KrzywieckiSZ24,
  author       = {Lukasz Krzywiecki and
                  Krzysztof Szymaniak and
                  Marcin Zawada},
  title        = {Privacy Preservation in Cloud-Based Distributed Learning through Data
                  Encoding and Partitioning},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2424--2429},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00335},
  doi          = {10.1109/TRUSTCOM63139.2024.00335},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/KrzywieckiSZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LaiW0Z24,
  author       = {Yuefeng Lai and
                  Lizhao Wu and
                  Hui Lin and
                  Xiaokang Zhou},
  title        = {Defending Against Backdoor Attacks through Causality-Augmented Diffusion
                  Models for Dataset Purification},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {850--858},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00127},
  doi          = {10.1109/TRUSTCOM63139.2024.00127},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LaiW0Z24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LaiXZJWBSZ24,
  author       = {Zhenyu Lai and
                  Yijia Xu and
                  Jialei Zhang and
                  Bowen Jia and
                  Liangyan Wang and
                  Qinglei Bu and
                  Jie Sun and
                  Quan Zhang},
  title        = {Multi-sensor Fusion-based Cow Health Monitoring IoT System},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2669--2674},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00371},
  doi          = {10.1109/TRUSTCOM63139.2024.00371},
  timestamp    = {Fri, 25 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LaiXZJWBSZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LanGGFLC24,
  author       = {Zejun Lan and
                  Jianfeng Guan and
                  Xianming Gao and
                  Tao Feng and
                  Kexian Liu and
                  Jianbang Chen},
  title        = {{DTAME:} {A} Interpretable and Efficient Approach for {ABAC} Policy
                  Mining and Evaluation Using Decision Trees},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1989--1997},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00276},
  doi          = {10.1109/TRUSTCOM63139.2024.00276},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LanGGFLC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LandauerMSWK24,
  author       = {Max Landauer and
                  Klaus Mayer and
                  Florian Skopik and
                  Markus Wurzenberger and
                  Manuel Kern},
  title        = {Red Team Redemption: {A} Structured Comparison of Open-Source Tools
                  for Adversary Emulation},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {117--128},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00043},
  doi          = {10.1109/TRUSTCOM63139.2024.00043},
  timestamp    = {Sat, 31 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LandauerMSWK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LavernelleBGS24,
  author       = {Jean de Bonfils Lavernelle and
                  Pierre{-}Fran{\c{c}}ois Bonnefoi and
                  Beno{\^{\i}}t Gonzalvo and
                  Damien Sauveron},
  title        = {{DMA:} {A} Persistent Threat to Embedded Systems Isolation},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {101--108},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00041},
  doi          = {10.1109/TRUSTCOM63139.2024.00041},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LavernelleBGS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LeiGC24,
  author       = {Jiaqi Lei and
                  Ke Gu and
                  Long Cai},
  title        = {A Lightweight Privacy-Preserving and Verifiable Federated Learning-Based
                  Protocol},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2394--2399},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00331},
  doi          = {10.1109/TRUSTCOM63139.2024.00331},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LeiGC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LengLYYZH24,
  author       = {Tao Leng and
                  Junyi Liu and
                  Zhen Yang and
                  Chang You and
                  Yutong Zeng and
                  Cheng Huang},
  title        = {{SGCML:} Detecting Hacker Community Hidden in Chat Group},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1910--1915},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00264},
  doi          = {10.1109/TRUSTCOM63139.2024.00264},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LengLYYZH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LengYLLZH24,
  author       = {Tao Leng and
                  Chang You and
                  Shuangchun Luo and
                  Junyi Liu and
                  Yutong Zeng and
                  Cheng Huang},
  title        = {GraySniffer: {A} Cliques Discovering Method for Illegal {SIM} Card
                  Vendor Based on Multi-Source Data},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {316--325},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00065},
  doi          = {10.1109/TRUSTCOM63139.2024.00065},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LengYLLZH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Li0JS24,
  author       = {Jiayi Li and
                  Ke Xu and
                  Xinghao Jiang and
                  Tanfeng Sun},
  title        = {Sparse Silhouette Jump: Adversarial Attack Targeted at Binary Image
                  for Gait Privacy Protection},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1336--1342},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00187},
  doi          = {10.1109/TRUSTCOM63139.2024.00187},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Li0JS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Li0Z24,
  author       = {Jing Li and
                  Tao Sun and
                  Wenjie Zhong},
  title        = {{ASK-LTL} Checker: {A} Tailored Model Checker for Linear Temporal
                  Logic of {CPN} State Space},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1825--1831},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00251},
  doi          = {10.1109/TRUSTCOM63139.2024.00251},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Li0Z24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiCZPYH24,
  author       = {Bin Li and
                  Li Cheng and
                  Zhongshan Zhang and
                  Yu Pan and
                  Feng Yao and
                  Renjie He},
  title        = {{LAPAID:} {A} Lightweight, Adaptive and Perspicacious Active Intrusion
                  Detection Method on Network Traffic Streams},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1268--1275},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00179},
  doi          = {10.1109/TRUSTCOM63139.2024.00179},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiCZPYH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiDG24,
  author       = {Rui Li and
                  Wenrui Diao and
                  Debin Gao},
  title        = {Custom Permission Misconfigurations in Android: {A} Large-Scale Security
                  Analysis},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1161--1170},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00165},
  doi          = {10.1109/TRUSTCOM63139.2024.00165},
  timestamp    = {Fri, 04 Jul 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiDG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiFSY24,
  author       = {Yue Li and
                  Runcheng Fang and
                  Qipeng Song and
                  Xilei Yang},
  title        = {STGCN-Based Link Flooding Attack Detection and Mitigation in Software-Defined
                  Network},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {346--353},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00068},
  doi          = {10.1109/TRUSTCOM63139.2024.00068},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiFSY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiGZYG24,
  author       = {Weihao Li and
                  Yongbing Gao and
                  Yu Zhang and
                  Lidong Yang and
                  Ruiping Gao},
  title        = {Research on Toxic Speech Detection Based on Large Language Models},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2191--2196},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00302},
  doi          = {10.1109/TRUSTCOM63139.2024.00302},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiGZYG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiHL24,
  author       = {Yuliang Li and
                  Zhonglin Hou and
                  Hong Liu},
  title        = {Large Language Model and Behaviour Tree Based Real-World Test Scenario
                  Generation for Autonomous Vehicles},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1770--1775},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00243},
  doi          = {10.1109/TRUSTCOM63139.2024.00243},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiHL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiHMSHL24,
  author       = {Kaiyuan Li and
                  Haruka Hirata and
                  Daiki Miyahara and
                  Kazuo Sakiyama and
                  Yuko Hara and
                  Yang Li},
  title        = {Multiplicative Masked M{\&}M: An Attempt at Combined Countermeasures
                  with Reduced Randomness},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {726--733},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00112},
  doi          = {10.1109/TRUSTCOM63139.2024.00112},
  timestamp    = {Sat, 31 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiHMSHL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiLS024,
  author       = {Pengfei Li and
                  Yujing Liu and
                  Jinshu Su and
                  Bo Yu},
  title        = {ConfigKG: Identify Routing Security Issues from Configurations Based
                  on Knowledge Graph},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1060--1069},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00152},
  doi          = {10.1109/TRUSTCOM63139.2024.00152},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiLS024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiLXY24,
  author       = {Chengyu Li and
                  Weihai Li and
                  Zikai Xu and
                  Nenghai Yu},
  title        = {StegaFDS: Generative Steganography Based on First-Order DPM-Solver},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {109--116},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00042},
  doi          = {10.1109/TRUSTCOM63139.2024.00042},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiLXY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiLYZ24,
  author       = {Zehao Li and
                  Jiachun Liao and
                  Jinhao Yu and
                  Lei Zhang},
  title        = {{THEF:} {A} Privacy-Preserving Framework for Transformer Inference
                  leveraging {HE} and {TEE}},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1693--1700},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00233},
  doi          = {10.1109/TRUSTCOM63139.2024.00233},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiLYZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiNCGHZ24,
  author       = {Mingyang Li and
                  Weina Niu and
                  Xinglong Chen and
                  Jiacheng Gong and
                  Kegang Hao and
                  Xiaosong Zhang},
  title        = {Enabling Robust Android Malicious Packet Capturing and Detection via
                  Android Kernel},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1022--1028},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00147},
  doi          = {10.1109/TRUSTCOM63139.2024.00147},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiNCGHZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiQWG24,
  author       = {Haocheng Li and
                  Haipeng Qu and
                  Gaozhou Wang and
                  Xiangjian Ge},
  title        = {EffiTaint: Boosting Sensitive Data Tracking with Accurate Taint Behavior
                  Modeling and Efficient Access Path Optimization},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1397--1404},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00194},
  doi          = {10.1109/TRUSTCOM63139.2024.00194},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiQWG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiWGD24,
  author       = {Xiaoshuang Li and
                  Mingjun Wang and
                  Yilong Guo and
                  Wenxiu Ding},
  title        = {AdaptFL: Adaptive Client Task Allocation-Based Synchronous Federated
                  Learning},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {616--623},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00099},
  doi          = {10.1109/TRUSTCOM63139.2024.00099},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiWGD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiWLWWC24,
  author       = {Xu Li and
                  Yinghao Wu and
                  Yang Liu and
                  Baosheng Wang and
                  Bei Wang and
                  Yijun Cui},
  title        = {Lattice-based Multi-Stage Secret Sharing 3D Secure Encryption Scheme},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {279--286},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00061},
  doi          = {10.1109/TRUSTCOM63139.2024.00061},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiWLWWC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiWW24,
  author       = {Yingjian Li and
                  Yongsheng Wang and
                  Gang Wang},
  title        = {DDF-Net: {A} Cloud Computing Load Forecasting Method Integrating Spatiotemporal
                  and Time-Frequency Domain Information},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2368--2375},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00327},
  doi          = {10.1109/TRUSTCOM63139.2024.00327},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiWW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiYTP24,
  author       = {Guanghan Li and
                  Wenzhong Yang and
                  Xiaodan Tian and
                  Jiaren Peng},
  title        = {{DUDPA-TATD:} {A} Lightweight Privacy-Preserving Anomaly Traffic Detection
                  Method for Edge Computing Scenarios},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1741--1748},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00239},
  doi          = {10.1109/TRUSTCOM63139.2024.00239},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiYTP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiZLG24,
  author       = {Chenyu Li and
                  Xiu Zhang and
                  Xueping Liang and
                  Xiaorui Gong},
  title        = {{LSD} Attack: Exploiting Inconsistencies between Design and Implementation
                  of Ethereum Protocols},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1045--1050},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00150},
  doi          = {10.1109/TRUSTCOM63139.2024.00150},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiZLG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiZZSJLHZ24,
  author       = {Yilong Li and
                  Jianyi Zhang and
                  Ziyin Zhou and
                  Zezheng Sun and
                  Xu Ji and
                  Zeping Li and
                  Jiameng Han and
                  Zhangchi Zhao},
  title        = {D\({}^{\mbox{2}}\)FL: Dimensional Disaster-oriented Backdoor Attack
                  Defense Of Federated Learning},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1790--1796},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00246},
  doi          = {10.1109/TRUSTCOM63139.2024.00246},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiZZSJLHZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiZZZ24,
  author       = {Jun Li and
                  Yuting Zhang and
                  Wu Zhou and
                  Shengzhi Zhang},
  title        = {Exploring Permission Control Flaws in Mini-apps},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1935--1941},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00268},
  doi          = {10.1109/TRUSTCOM63139.2024.00268},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiZZZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LianLWZ24,
  author       = {Xinglin Lian and
                  Yang Liu and
                  Shanfeng Wang and
                  Yu Zheng},
  title        = {Payload Level Anomaly Network Traffic Detection via Semi-Supervised
                  Contrastive Learning},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2559--2566},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00357},
  doi          = {10.1109/TRUSTCOM63139.2024.00357},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LianLWZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Liang024,
  author       = {Chuang Liang and
                  Jie Huang},
  title        = {Attack Data is Not Solely Paramount: {A} Universal Model Extraction
                  Enhancement Method},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1666--1674},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00229},
  doi          = {10.1109/TRUSTCOM63139.2024.00229},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Liang024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiangDCLC24,
  author       = {Yan Liang and
                  Xin Dong and
                  Song Chen and
                  Zhengda Li and
                  Zhimin Chang},
  title        = {A corrected method for parameters in the signal propagation model},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2686--2693},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00374},
  doi          = {10.1109/TRUSTCOM63139.2024.00374},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiangDCLC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LinYL0Y24,
  author       = {Jianbo Lin and
                  Lin Yan and
                  Zhi Lin and
                  Zan Zhou and
                  Shujie Yang},
  title        = {ClusterX: Adaptive Collaborative Scheduling of Layered User-Proxy
                  Mapping to Enhance DDoS Defense in Distributed Clusters},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {636--642},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00101},
  doi          = {10.1109/TRUSTCOM63139.2024.00101},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LinYL0Y24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Liu0FZ24,
  author       = {Yuming Liu and
                  Wei Cheng and
                  Jihao Fan and
                  Yongbin Zhou},
  title        = {Towards Securing {ASCON} Implementation by Inner Product Masking},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1255--1260},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00177},
  doi          = {10.1109/TRUSTCOM63139.2024.00177},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Liu0FZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Liu24,
  author       = {Yin Liu},
  title        = {A Quiet Place: An In-Depth Study of Mobile Public-to-Private Attacks},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1405--1412},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00195},
  doi          = {10.1109/TRUSTCOM63139.2024.00195},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Liu24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuCZYRZSYZ24,
  author       = {Meiqi Liu and
                  Yongqiang Chen and
                  Chaoyang Zhu and
                  Shuang Yao and
                  Jingfeng Rong and
                  Xiaolong Zhao and
                  Xijuan Si and
                  Guang Yang and
                  Yuqing Zhang},
  title        = {A review of data security research in energy storage systems},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2498--2503},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00347},
  doi          = {10.1109/TRUSTCOM63139.2024.00347},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuCZYRZSYZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuFDLP024,
  author       = {Jia Liu and
                  Wenjun Fan and
                  Yifan Dai and
                  Enggee Lim and
                  Zhoujin Pan and
                  Alexei Lisitsa},
  title        = {Leveraging Semi-supervised Learning for Enhancing Anomaly-based {IDS}
                  in Automotive Ethernet},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1563--1571},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00216},
  doi          = {10.1109/TRUSTCOM63139.2024.00216},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuFDLP024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuGWZZL24,
  author       = {Haiying Liu and
                  Ruichun Gu and
                  Jingyu Wang and
                  Xiaolin Zhang and
                  Bolin Zhang and
                  Xuebao Li},
  title        = {Local Drift Correction and Attention Aggregation for Self-Organized
                  Federated Learning},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {818--825},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00123},
  doi          = {10.1109/TRUSTCOM63139.2024.00123},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuGWZZL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuHSY24,
  author       = {Zhen Liu and
                  Changzhen Hu and
                  Chun Shan and
                  Junkai Yi},
  title        = {BedIDS: An Effective Network Anomaly Detection Method by Fusing Behavior
                  Evolution characteristics},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1534--1540},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00212},
  doi          = {10.1109/TRUSTCOM63139.2024.00212},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuHSY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuTZ24,
  author       = {Jihong Liu and
                  Chenyang Tu and
                  Yifei Zhang},
  title        = {Hardware assisted security gateway system: combined with {FPGA} shielding
                  protection},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {85--92},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00039},
  doi          = {10.1109/TRUSTCOM63139.2024.00039},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuTZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuWLLYF24,
  author       = {Jianwei Liu and
                  Wei Wan and
                  Chun Long and
                  Jing Li and
                  Fan Yang and
                  Yuhao Fu},
  title        = {{ZKFDT:} {A} Fair Exchange Scheme for Data Trading Based on Efficient
                  Zero-Knowledge Proofs},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2197--2206},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00303},
  doi          = {10.1109/TRUSTCOM63139.2024.00303},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuWLLYF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuWMD24,
  author       = {Wenlong Liu and
                  Bin Wen and
                  Mengshuai Ma and
                  Wanrong Du},
  title        = {Network Traffic Anomaly Detection Method Based on CTA-BiLSTM},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1195--1200},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00169},
  doi          = {10.1109/TRUSTCOM63139.2024.00169},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuWMD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuWZ24,
  author       = {Yuan Liu and
                  Licheng Wang and
                  Yongbin Zhou},
  title        = {New Compact Construction of {FHE} from Cyclic Algebra {LWE}},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {643--649},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00102},
  doi          = {10.1109/TRUSTCOM63139.2024.00102},
  timestamp    = {Sun, 06 Jul 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuWZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuWZXLSLC24,
  author       = {Xin Liu and
                  Rui Wang and
                  Pengfeng Zhang and
                  Liang Xie and
                  Yiliang Liu and
                  Zhou Su and
                  Donglan Liu and
                  Yingxian Chang},
  title        = {Long-Term Privacy-Preserving Incentive Scheme Design for Federated
                  Learning},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2709--2714},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00377},
  doi          = {10.1109/TRUSTCOM63139.2024.00377},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuWZXLSLC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuXHMLYZ24,
  author       = {Xinlei Liu and
                  Jichao Xie and
                  Tao Hu and
                  Hailong Ma and
                  Baolin Li and
                  Peng Yi and
                  Zhen Zhang},
  title        = {Robust purification defense for transfer attacks based on probabilistic
                  scheduling algorithm of pre-trained models: {A} model difference perspective},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1776--1783},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00244},
  doi          = {10.1109/TRUSTCOM63139.2024.00244},
  timestamp    = {Mon, 07 Jul 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuXHMLYZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LohmollerSKWHP24,
  author       = {Johannes Lohm{\"{o}}ller and
                  Jannis Scheiber and
                  Rafael Kramann and
                  Klaus Wehrle and
                  Sikander Hayat and
                  Jan Pennekamp},
  title        = {scE(match): Privacy-Preserving Cluster Matching of Single-Cell Data},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2123--2132},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00294},
  doi          = {10.1109/TRUSTCOM63139.2024.00294},
  timestamp    = {Sat, 31 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LohmollerSKWHP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LuLDT24,
  author       = {Yongwei Lu and
                  Xiaoyan Liang and
                  Ruizhong Du and
                  Junfeng Tian},
  title        = {{OFLGI:} An Optimization-based Feature-Level Gradient Inversion Attack},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {197--204},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00052},
  doi          = {10.1109/TRUSTCOM63139.2024.00052},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LuLDT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LuMFCDZ24,
  author       = {Zhenghao Lu and
                  Ding Ma and
                  Lei Fan and
                  Xiuzhen Chen and
                  Yongshuai Duan and
                  Jia Zhang},
  title        = {A Universally Composable Key Management System Using Trusted Hardware},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1681--1686},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00231},
  doi          = {10.1109/TRUSTCOM63139.2024.00231},
  timestamp    = {Thu, 15 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LuMFCDZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LuYLK24,
  author       = {Liming Lu and
                  Zhenlin Yu and
                  Peter Kok Keong Loh and
                  Tuhin Isfaque Al Kaderi},
  title        = {Investigating Patterns of Adversarial Techniques for Cyberattack Forensics},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2262--2268},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00312},
  doi          = {10.1109/TRUSTCOM63139.2024.00312},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LuYLK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LuYWD024,
  author       = {Chaohe Lu and
                  Zhongyuan Yu and
                  Guijuan Wang and
                  Anming Dong and
                  Xiang Tian},
  title        = {A Blockchain-based {PHR} Sharing Scheme with Attribute Privacy Protection},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2068--2077},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00287},
  doi          = {10.1109/TRUSTCOM63139.2024.00287},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LuYWD024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LuZWCZ24,
  author       = {Juncheng Lu and
                  Yiyang Zhao and
                  Yan Wang and
                  Jiyuan Cui and
                  Sanfeng Zhang},
  title        = {{BWG:} An {IOC} Identification Method for Imbalanced Threat Intelligence
                  Datasets},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1187--1194},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00168},
  doi          = {10.1109/TRUSTCOM63139.2024.00168},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LuZWCZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LvSC24,
  author       = {Yaru Lv and
                  Lijun Sun and
                  Xiao Chen},
  title        = {{FMTD:} Federated Learning-Based Multi-Angle Feature Fusion Framework
                  for Abnormal Transaction Detection in Digital Currency},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2418--2423},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00334},
  doi          = {10.1109/TRUSTCOM63139.2024.00334},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LvSC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LyuKCW24,
  author       = {Guangfa Lyu and
                  Jian Kong and
                  Yinglong Chen and
                  Fengyu Wang},
  title        = {{CTWF:} Website Fingerprinting Attack based on Compact Convolutional
                  Transformer},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {57--67},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00036},
  doi          = {10.1109/TRUSTCOM63139.2024.00036},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LyuKCW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LyuMM24,
  author       = {Yilun Lyu and
                  Xu Ma and
                  Yuan Ma},
  title        = {Backdoor Attacks Optimized through Genetic Algorithm-Driven Data Augmentation
                  Combinations in Deep Neural Networks},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2430--2435},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00336},
  doi          = {10.1109/TRUSTCOM63139.2024.00336},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LyuMM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MaJWIS24,
  author       = {Yizhou Ma and
                  Xikun Jiang and
                  Evan W. Wu and
                  Luis{-}Daniel Ib{\'{a}}{\~{n}}ez and
                  Jian Shi},
  title        = {Model-based Data Markets: {A} Multi-Broker Game Theoretic Approach},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2293--2301},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00316},
  doi          = {10.1109/TRUSTCOM63139.2024.00316},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/MaJWIS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MaS0CLH24,
  author       = {Yuan Ma and
                  Maosen Sun and
                  Wei Wang and
                  Tianyu Chen and
                  Na Lv and
                  Dongchi Han},
  title        = {Efficient and Accurate Min-entropy Estimation Based on Decision Tree
                  for Random Number Generators},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {707--716},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00110},
  doi          = {10.1109/TRUSTCOM63139.2024.00110},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/MaS0CLH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MahdaviAA24,
  author       = {Mahdi Mahdavi and
                  Navid Abapour and
                  Zahra Ahmadian},
  title        = {Trustworthy Approaches to {RSA:} Efficient Exploitation Strategies
                  Based on Common Modulus},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2535--2540},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00353},
  doi          = {10.1109/TRUSTCOM63139.2024.00353},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/MahdaviAA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MengLLZY24,
  author       = {Xutao Meng and
                  Qingming Li and
                  Yong Li and
                  Li Zhou and
                  Xiaoran Yan},
  title        = {FedSGProx: Mitigating Data Heterogeneity and Isolated Nodes in Graph
                  Federated Learning},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1000--1006},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00144},
  doi          = {10.1109/TRUSTCOM63139.2024.00144},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/MengLLZY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MengWLL24,
  author       = {Shengzhe Meng and
                  Xiaodong Wang and
                  Zijie Lu and
                  Bei Liang},
  title        = {Efficient and Practical Multi-party Private Set Intersection Cardinality
                  Protocol},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1371--1380},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00191},
  doi          = {10.1109/TRUSTCOM63139.2024.00191},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/MengWLL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MengY24,
  author       = {Xiangyu Meng and
                  Xuejun Yu},
  title        = {Trustworthy Analysis of Drain3-based Cold Storage Behavior in Judicial
                  Depository Scenarios},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1809--1816},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00249},
  doi          = {10.1109/TRUSTCOM63139.2024.00249},
  timestamp    = {Mon, 19 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/MengY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Ming0ZHZ24,
  author       = {Jianhui Ming and
                  Weiping Wang and
                  Linlin Zhang and
                  Yingjie Hu and
                  Shigeng Zhang},
  title        = {IoT Device Fingerprinting From Periodic Traffic Using Locality-Sensitive
                  Hashing},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1904--1909},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00263},
  doi          = {10.1109/TRUSTCOM63139.2024.00263},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Ming0ZHZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MishraBBP24,
  author       = {Pooja Mishra and
                  Paul Black and
                  Adil Bagirov and
                  Shaoning Pang},
  title        = {Discriminating Malware Families using Partitional Clustering},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2256--2261},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00311},
  doi          = {10.1109/TRUSTCOM63139.2024.00311},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/MishraBBP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Mou0JS24,
  author       = {Yuting Mou and
                  Ke Xu and
                  Xinghao Jiang and
                  Tanfeng Sun},
  title        = {Compressed Video Action Recognition Based on Neural Video Compression},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2244--2249},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00309},
  doi          = {10.1109/TRUSTCOM63139.2024.00309},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Mou0JS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/NageshFLNP24,
  author       = {Sanjay Segu Nagesh and
                  Niroshinie Fernando and
                  Seng W. Loke and
                  Azadeh Ghari Neiat and
                  Pubudu N. Pathirana},
  title        = {Honeybee-RS: Enhancing Trust through Lightweight Result Validation
                  in Mobile Crowd Computing},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2553--2558},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00356},
  doi          = {10.1109/TRUSTCOM63139.2024.00356},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/NageshFLNP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/NanWTWZZ24,
  author       = {Zhefeng Nan and
                  Qi Wang and
                  Changbo Tian and
                  Yijing Wang and
                  Tianning Zang and
                  Dongwei Zhu},
  title        = {Path Generation Method of Anti-Tracking Network based on Dynamic Asymmetric
                  Hierarchical Architecture},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {254--261},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00058},
  doi          = {10.1109/TRUSTCOM63139.2024.00058},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/NanWTWZZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/NguyenCNSSK24,
  author       = {Khanh{-}Duy Nguyen and
                  Hsi{-}Ching Chu and
                  Quoc{-}Viet Nguyen and
                  Min{-}Te Sun and
                  Kazuya Sakai and
                  Wei{-}Shinn Ku},
  title        = {From Data to Action: {CTI} Analysis and ATT{\&}CK Technique Correlation},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {141--148},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00045},
  doi          = {10.1109/TRUSTCOM63139.2024.00045},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/NguyenCNSSK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/NieJJMC24,
  author       = {Jinquan Nie and
                  Lejun Ji and
                  Yirui Jiang and
                  Young Ma and
                  Yuanlong Cao},
  title        = {ROSE\({}^{\mbox{+}}\) : {A} Robustness-Optimized Security Scheme Against
                  Cascading Failures in Multipath {TCP} under LDDoS Attack Streams},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1844--1849},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00254},
  doi          = {10.1109/TRUSTCOM63139.2024.00254},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/NieJJMC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/NoortLN24,
  author       = {Vince Noort and
                  Nhien{-}An Le{-}Khac and
                  Hong{-}Hanh Nguyen{-}Le},
  title        = {Improving Security in Internet of Medical Things through Hierarchical
                  Cyberattacks Classification},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1304--1309},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00183},
  doi          = {10.1109/TRUSTCOM63139.2024.00183},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/NoortLN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PangGYL24,
  author       = {Zeshan Pang and
                  Shasha Guo and
                  Xuehu Yan and
                  Yuliang Lu},
  title        = {Destruction and Reconstruction Chain: An Adaptive Adversarial Purification
                  Framework},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2336--2341},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00322},
  doi          = {10.1109/TRUSTCOM63139.2024.00322},
  timestamp    = {Wed, 25 Jun 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/PangGYL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ParbatC24,
  author       = {Tanusree Parbat and
                  Ayantika Chatterjee},
  title        = {Secure Join and Compute in Encrypted Database},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1480--1485},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00204},
  doi          = {10.1109/TRUSTCOM63139.2024.00204},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ParbatC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ParkKK24,
  author       = {Jihoon Park and
                  Giluk Kang and
                  Young{-}Gab Kim},
  title        = {A Self-Adaptive Framework for Responding to Uncertainty in Access
                  Control Process with Deep Neural Networks},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1863--1868},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00257},
  doi          = {10.1109/TRUSTCOM63139.2024.00257},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ParkKK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PelissierAMMC24,
  author       = {Samuel P{\'{e}}lissier and
                  Gianluca Anselmi and
                  Abhishek Kumar Mishra and
                  Anna Maria Mandalari and
                  Mathieu Cunche},
  title        = {Enhancing IoT Privacy: Why DNS-over-HTTPS Alone Falls Short?},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1353--1360},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00189},
  doi          = {10.1109/TRUSTCOM63139.2024.00189},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/PelissierAMMC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PhuongBHSL24,
  author       = {Tran Viet Xuan Phuong and
                  Albert Baker and
                  Philip D. Huff and
                  Jan P. Springer and
                  Tho Thi Ngoc Le},
  title        = {{CFE:} Secure Filtered Words in End-to-End Encrypted Messaging System},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1458--1465},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00201},
  doi          = {10.1109/TRUSTCOM63139.2024.00201},
  timestamp    = {Tue, 05 Aug 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/PhuongBHSL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PintoAMP24,
  author       = {Daniela Pinto and
                  Ivone Amorim and
                  Eva Maia and
                  Isabel Pra{\c{c}}a},
  title        = {A Novel Approach to Network Traffic Analysis: the {HERA} tool},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1850--1856},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00255},
  doi          = {10.1109/TRUSTCOM63139.2024.00255},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/PintoAMP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PizzolanteC024,
  author       = {Raffaele Pizzolante and
                  Arcangelo Castiglione and
                  Francesco Palmieri},
  title        = {Unlocking Insights: An Extensible Framework for Automated Metadata
                  Extraction from Online Documents},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1512--1521},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00209},
  doi          = {10.1109/TRUSTCOM63139.2024.00209},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/PizzolanteC024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ProtsenkoSPK24,
  author       = {Mykolai Protsenko and
                  Albert Stark and
                  Andreas Papon and
                  Sandra Kostic},
  title        = {VisualAuth: Secure Transaction Authentication and Trusted {UI} on
                  {COTS} Android Devices},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {129--140},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00044},
  doi          = {10.1109/TRUSTCOM63139.2024.00044},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ProtsenkoSPK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/QinWW24,
  author       = {Zhongyuan Qin and
                  Dinglian Wang and
                  Minghua Wang},
  title        = {Dynamic Differential Privacy in Hierarchical Federated Learning: {A}
                  Layerwise Adaptive Framework},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2207--2212},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00304},
  doi          = {10.1109/TRUSTCOM63139.2024.00304},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/QinWW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/QinZZLD024,
  author       = {Yunyang Qin and
                  Yujia Zhu and
                  Linkang Zhang and
                  Baiyang Li and
                  Yong Ding and
                  Qingyun Liu},
  title        = {LayyerX: Unveiling the Hidden Layers of DoH Server via Differential
                  Fingerprinting},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {354--361},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00069},
  doi          = {10.1109/TRUSTCOM63139.2024.00069},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/QinZZLD024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Quan00LY24,
  author       = {Yue Quan and
                  Kai Fan and
                  Haoyang Wang and
                  Hui Li and
                  Yintang Yang},
  title        = {{DMASP:} Dynamic Multi-keyword Searchable Encryption for Protected
                  Access and Search Patterns with Differential Privacy},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1423--1429},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00197},
  doi          = {10.1109/TRUSTCOM63139.2024.00197},
  timestamp    = {Fri, 25 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Quan00LY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Saint-HilaireNC24,
  author       = {K{\'{e}}ren Saint{-}Hilaire and
                  Christopher Neal and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Boulahia{-}Cuppens and
                  Francesca Bassi},
  title        = {Attack-Defense Graph Generation: Instantiating Incident Response Actions
                  on Attack Graphs},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {295--305},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00063},
  doi          = {10.1109/TRUSTCOM63139.2024.00063},
  timestamp    = {Tue, 05 Aug 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Saint-HilaireNC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Sakon24,
  author       = {Toru Sakon},
  title        = {Anticipated Failure Determination-based Weakness Analysis with Common
                  Weakness Enumeration},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2627--2634},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00366},
  doi          = {10.1109/TRUSTCOM63139.2024.00366},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Sakon24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Shafeeq024,
  author       = {Sehrish Shafeeq and
                  Mathias Fischer},
  title        = {Privacy-aware data aggregation using Functional Encryption},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2159--2168},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00298},
  doi          = {10.1109/TRUSTCOM63139.2024.00298},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Shafeeq024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ShenKYXWN24,
  author       = {Zhuowei Shen and
                  Xiao Kou and
                  Taiyao Yang and
                  Haoqin Xu and
                  Dongbin Wang and
                  Shaobo Niu},
  title        = {A Revocable Pairing-Free Certificateless Signature Scheme Based on
                  {RSA} Accumulator},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {149--156},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00046},
  doi          = {10.1109/TRUSTCOM63139.2024.00046},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ShenKYXWN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Shi0CLZ24,
  author       = {Mengxuan Shi and
                  Jinfu Chen and
                  Saihua Cai and
                  Ziyan Liu and
                  Jiapeng Zhou},
  title        = {{DA-CPVD:} Vulnerability Detection Method based on Dual Attention
                  Composite Pooling},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1916--1921},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00265},
  doi          = {10.1109/TRUSTCOM63139.2024.00265},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Shi0CLZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Simo024,
  author       = {Hervais Simo and
                  Michael Kreutzer},
  title        = {{WAPITI} - {A} Weighted Bayesian Method for Private Information Inference
                  on Social Ego Networks},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2269--2280},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00313},
  doi          = {10.1109/TRUSTCOM63139.2024.00313},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Simo024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SongB24,
  author       = {Wenting Song and
                  K. Suzanne Barber},
  title        = {{TWCF:} Trust Weighted Collaborative Filtering based on Quantitative
                  Modeling of Trust},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {986--993},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00142},
  doi          = {10.1109/TRUSTCOM63139.2024.00142},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SongB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SongGZ024,
  author       = {Zhenbo Song and
                  Wenhao Gao and
                  Zhenyuan Zhang and
                  Jianfeng Lu},
  title        = {{AS-FIBA:} Adaptive Selective Frequency-Injection for Backdoor Attack
                  on Deep Face Restoration},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {934--943},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00136},
  doi          = {10.1109/TRUSTCOM63139.2024.00136},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SongGZ024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SongLG0ZX24,
  author       = {Min Song and
                  Chao Li and
                  Xiaowei Guo and
                  Jie Liu and
                  Huajian Zhang and
                  Rui Xia},
  title        = {Large-Scale Thermo-Hydraulic Analysis of Fuel Rod Bundles Based on
                  {YH-ACT}},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2644--2652},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00368},
  doi          = {10.1109/TRUSTCOM63139.2024.00368},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SongLG0ZX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SongLQZHL24,
  author       = {Zekai Song and
                  Yunpeng Li and
                  Jian Qin and
                  Changzhi Zhao and
                  Dongxu Han and
                  Yuling Liu},
  title        = {FREDet: Fine-Grained Malicious Traffic Detection Based on Frequency
                  Domain Features},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1097--1104},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00157},
  doi          = {10.1109/TRUSTCOM63139.2024.00157},
  timestamp    = {Tue, 29 Jul 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SongLQZHL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SongSZTWG24,
  author       = {Kunpeng Song and
                  Mingzhang Sun and
                  Kui Zhou and
                  Peng Tang and
                  Ning Wang and
                  Shanqing Guo},
  title        = {Multi-Dimensional Data Collection Under Personalized Local Differential
                  Privacy},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1438--1447},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00199},
  doi          = {10.1109/TRUSTCOM63139.2024.00199},
  timestamp    = {Thu, 10 Jul 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SongSZTWG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SongWLYZL24,
  author       = {Qipeng Song and
                  Ruiyun Wang and
                  Yue Li and
                  Yiheng Yan and
                  Xingyue Zhu and
                  Hui Li},
  title        = {TrustNotify: {A} Lightweight Framework for Complete and Trustworthy
                  Data Deletion Notification Distribution},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {492--500},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00084},
  doi          = {10.1109/TRUSTCOM63139.2024.00084},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SongWLYZL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SongYLNTLZS24,
  author       = {Yinghao Song and
                  Long Yan and
                  Yang Li and
                  Mingjian Ni and
                  Shengzhong Tan and
                  Dazhong Li and
                  Huiting Zhao and
                  Yulun Song},
  title        = {{NAGG:} Noised graph node feature aggregations for preserving privacy},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1389--1396},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00193},
  doi          = {10.1109/TRUSTCOM63139.2024.00193},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SongYLNTLZS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Soper0FJT24,
  author       = {Jacob Soper and
                  Yue Xu and
                  Ernest Foo and
                  Zahra Jadidi and
                  Kien Nguyen Thanh},
  title        = {Improved Packet-Level Synthetic Network Traffic Generation},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1928--1934},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00267},
  doi          = {10.1109/TRUSTCOM63139.2024.00267},
  timestamp    = {Sat, 31 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Soper0FJT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SourmelisM24,
  author       = {Spyridon Sourmelis and
                  Weizhi Meng},
  title        = {Cyber Risk Analysis on Electric Vehicle Systems via {NIST} {CSF}},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {378--386},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00072},
  doi          = {10.1109/TRUSTCOM63139.2024.00072},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SourmelisM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SuZZW24,
  author       = {Tan Su and
                  Bingbing Zhang and
                  Chi Zhang and
                  Lingbo Wei},
  title        = {Privacy Leak Detection in {LLM} Interactions with a User-Centric Approach},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1647--1652},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00226},
  doi          = {10.1109/TRUSTCOM63139.2024.00226},
  timestamp    = {Wed, 28 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SuZZW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SunLLZ24,
  author       = {Yalin Sun and
                  Ruiying Lu and
                  Kang Li and
                  Yu Zheng},
  title        = {Topic-Aware Sensitive Information Detection in Chinese Large Language
                  Model},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {908--915},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00133},
  doi          = {10.1109/TRUSTCOM63139.2024.00133},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SunLLZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SunS24,
  author       = {Yifan Sun and
                  Meng Song},
  title        = {Differentially Private Graph Convolutional Networks with Privacy Amplification},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2327--2335},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00321},
  doi          = {10.1109/TRUSTCOM63139.2024.00321},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SunS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SunSZZ24,
  author       = {Sixian Sun and
                  Hongyu Sun and
                  Haoxing Zhang and
                  Yuqing Zhang},
  title        = {A Study of Backdoor Attacks on Data Distillation for Text Classification
                  Tasks},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2517--2522},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00350},
  doi          = {10.1109/TRUSTCOM63139.2024.00350},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SunSZZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SunZCXY0X024,
  author       = {Lizhi Sun and
                  Jingzhou Zhu and
                  Boyu Chang and
                  Yixin Xu and
                  Bo Yang and
                  Hao Wu and
                  Fengyuan Xu and
                  Sheng Zhong},
  title        = {{TTFL:} Towards Trustworthy Federated Learning with Arm Confidential
                  Computing},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {896--907},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00132},
  doi          = {10.1109/TRUSTCOM63139.2024.00132},
  timestamp    = {Fri, 25 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SunZCXY0X024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TafreshianZ24,
  author       = {Benyamin Tafreshian and
                  Shengzhi Zhang},
  title        = {A Defensive Framework Against Adversarial Attacks on Machine Learning-Based
                  Network Intrusion Detection Systems},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2436--2441},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00337},
  doi          = {10.1109/TRUSTCOM63139.2024.00337},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/TafreshianZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TanLZ24,
  author       = {Mengmi Tan and
                  Jianyi Liu and
                  Ru Zhang},
  title        = {{DI-GAE:} {A} Dynamic and Resource-Efficient Attack Detection Framework
                  with Incremental Learning and Graph Autoencoders},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2281--2286},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00314},
  doi          = {10.1109/TRUSTCOM63139.2024.00314},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/TanLZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TangCW0YW24,
  author       = {Mengmeng Tang and
                  Shuhong Chen and
                  Guojun Wang and
                  Hanjun Li and
                  Zhuyi Yao and
                  Sheng Wen},
  title        = {Boosting Transferability of Adversarial Examples by Joint Training
                  and Dual Feature Mixup},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {826--833},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00124},
  doi          = {10.1109/TRUSTCOM63139.2024.00124},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/TangCW0YW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TangWCLPYLLS24,
  author       = {Cheng Tang and
                  Qingfeng Wang and
                  Guozhen Cheng and
                  Hao Liang and
                  Jianhua Peng and
                  Meiyue Yang and
                  Wenyan Liu and
                  Ming Liu and
                  Lei Sha},
  title        = {A Cross-Site Scripting Attack Protection Framework Based on Managed
                  Proxy},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1896--1903},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00262},
  doi          = {10.1109/TRUSTCOM63139.2024.00262},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/TangWCLPYLLS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TangYPZ24,
  author       = {Yiding Tang and
                  Zhijing Yang and
                  Yufan Peng and
                  Hui Zhang},
  title        = {Individual Fair Density-Peaks Clustering Based on Local Similar Center
                  Graph and Similar Decision Matrix},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1784--1789},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00245},
  doi          = {10.1109/TRUSTCOM63139.2024.00245},
  timestamp    = {Fri, 25 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/TangYPZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TangZZZW0L24,
  author       = {Jiezhen Tang and
                  Hui Zhu and
                  Yandong Zheng and
                  Junpeng Zhang and
                  Fengwei Wang and
                  Jiaqi Zhao and
                  Hui Li},
  title        = {{UNIRE:} Secure Trajectory-User Linking Model Aggregation with Knowledge
                  Transfer},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {916--925},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00134},
  doi          = {10.1109/TRUSTCOM63139.2024.00134},
  timestamp    = {Fri, 04 Jul 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/TangZZZW0L24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TianOH24,
  author       = {Le Tian and
                  ChangShen Ou and
                  WeiLin Huang},
  title        = {Research on Energy Management Strategy of Microgrid Based on Improved
                  Deep {Q} network Algorithm},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2694--2700},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00375},
  doi          = {10.1109/TRUSTCOM63139.2024.00375},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/TianOH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TianZAJF024,
  author       = {Tian Tian and
                  Yan Zhu and
                  Ning An and
                  Bo Jiang and
                  Huamin Feng and
                  Zhigang Lu},
  title        = {LSTM-Diff: {A} Data Generation Method for Imbalanced Insider Threat
                  Detection},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {68--76},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00037},
  doi          = {10.1109/TRUSTCOM63139.2024.00037},
  timestamp    = {Fri, 25 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/TianZAJF024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/VuVTHNHN24,
  author       = {Le Anh Duc Vu and
                  Minh Hai Vu and
                  Bao Ngoc Tran and
                  Minh Tung Hoang and
                  Duc Anh Nguyen and
                  Minh Quan Hoang and
                  Phi Le Nguyen},
  title        = {An Automated {PM2.5} Analysis and Prediction System with Encoder-Decoder
                  Architecture and Continual Learning Mechanism},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2661--2668},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00370},
  doi          = {10.1109/TRUSTCOM63139.2024.00370},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/VuVTHNHN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Wang0MN24,
  author       = {Yalan Wang and
                  Liqun Chen and
                  Long Meng and
                  Christopher J. P. Newton},
  title        = {VCaDID: Verifiable Credentials with Anonymous Decentralized Identities},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {508--515},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00086},
  doi          = {10.1109/TRUSTCOM63139.2024.00086},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Wang0MN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Wang0MZH24,
  author       = {Debao Wang and
                  Yiwen Gao and
                  Jingdian Ming and
                  Yongbin Zhou and
                  Xian Huang},
  title        = {Attacking High-Performance SBCs: {A} Generic Preprocessing Framework
                  for {EMA}},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {234--241},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00056},
  doi          = {10.1109/TRUSTCOM63139.2024.00056},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Wang0MZH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Wang0Z24,
  author       = {Xiangxiang Wang and
                  Hui Xia and
                  Yingqi Zhang},
  title        = {Defending Against Model Poisoning Attacks in Federated Learning via
                  Client-guided Trust},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1749--1755},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00240},
  doi          = {10.1109/TRUSTCOM63139.2024.00240},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Wang0Z24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Wang0ZL24,
  author       = {Tingyu Wang and
                  Qiang Cao and
                  Shihong Zou and
                  Yueming Lu},
  title        = {{BGAS:} Blockchain and Group Decentralized Identifiers Assisted Authentication
                  Scheme for {UAV} Networks},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1326--1335},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00186},
  doi          = {10.1109/TRUSTCOM63139.2024.00186},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Wang0ZL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangCZDBKR24,
  author       = {Qifan Wang and
                  Shujie Cui and
                  Lei Zhou and
                  Ye Dong and
                  Jianli Bai and
                  Yun Sing Koh and
                  Giovanni Russello},
  title        = {GTree: GPU-friendly Privacy-preserving Decision Tree Training and
                  Inference},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {775--785},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00118},
  doi          = {10.1109/TRUSTCOM63139.2024.00118},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangCZDBKR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangF0YW24,
  author       = {Zhichao Wang and
                  Qi Feng and
                  Min Luo and
                  Xiaolin Yang and
                  Zizhong Wei},
  title        = {Efficient FSS-based Private Statistics for Traffic Monitoring},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1361--1370},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00190},
  doi          = {10.1109/TRUSTCOM63139.2024.00190},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangF0YW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangHLWZZ0M24,
  author       = {Zhaoyang Wang and
                  Yanfei Hu and
                  Shuailou Li and
                  Wenbo Wang and
                  Lisong Zhang and
                  Boyang Zhang and
                  Yu Wen and
                  Dan Meng},
  title        = {DyCom: {A} Dynamic Community Partitioning Technique for System Audit
                  Logs},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1486--1493},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00205},
  doi          = {10.1109/TRUSTCOM63139.2024.00205},
  timestamp    = {Mon, 28 Jul 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangHLWZZ0M24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangL24,
  author       = {Haotian Wang and
                  Jing Liu},
  title        = {RPG-Diff: Precise Adversarial Defense Based on Regional Positioning
                  Guidance},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {802--809},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00121},
  doi          = {10.1109/TRUSTCOM63139.2024.00121},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangLD24,
  author       = {Mingjun Wang and
                  Yixuan Liu and
                  Wenxiu Ding},
  title        = {SP\({}^{\mbox{2}}\)-RD2D: Secure and Privacy-Preserving Authentication
                  and Key Agreement Protocol for {D2D} Relay Communication},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {567--573},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00093},
  doi          = {10.1109/TRUSTCOM63139.2024.00093},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangLD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangLGLY24,
  author       = {Luyao Wang and
                  Yan Liu and
                  Xiaoyu Guo and
                  Ziqi Long and
                  Chunfang Yang},
  title        = {Cross-platform Network User Alignment Interference Methods Based on
                  Obfuscation Strategy},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2185--2190},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00301},
  doi          = {10.1109/TRUSTCOM63139.2024.00301},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangLGLY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangLJYCBWLS24,
  author       = {Siyuan Wang and
                  Shuchen Liu and
                  Zheng Jin and
                  Zheng Yan and
                  Tao Chen and
                  Qinglei Bu and
                  Zhiqiang Wang and
                  Jintao Liu and
                  Jie Sun},
  title        = {A Digital Traditional Chinese Medicine Splint for Treatment of Distal
                  Radius Fracture},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2675--2679},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00372},
  doi          = {10.1109/TRUSTCOM63139.2024.00372},
  timestamp    = {Fri, 25 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangLJYCBWLS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangLMXSML24,
  author       = {Weihan Wang and
                  Xiulong Liu and
                  Liyuan Ma and
                  Hao Xu and
                  Gaowei Shi and
                  Juncheng Ma and
                  Keqiu Li},
  title        = {{MVSS:} Blockchain Cross-shard Account Migration Based on Multi-version
                  State Synchronization},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {742--749},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00114},
  doi          = {10.1109/TRUSTCOM63139.2024.00114},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangLMXSML24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangLTWW24,
  author       = {Xiayue Wang and
                  Mingyang Li and
                  Yuting Tao and
                  Xuanzhe Wang and
                  Hao Wu},
  title        = {Trust Evaluation in Mobile Crowd Sensing Networks Based on Age of
                  Trust (AoT)},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2541--2546},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00354},
  doi          = {10.1109/TRUSTCOM63139.2024.00354},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangLTWW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangLW024,
  author       = {Yusen Wang and
                  Jiong Lou and
                  Zihan Wang and
                  Jie Li},
  title        = {Front-running Attacks in Hash-Based Transaction Sharding Blockchains},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {205--212},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00053},
  doi          = {10.1109/TRUSTCOM63139.2024.00053},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangLW024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangLZTWG24,
  author       = {Liang Wang and
                  Li Liu and
                  Pei Zhan and
                  Peng Tang and
                  Puwen Wei and
                  Shanqing Guo},
  title        = {Interactive Verifiable Local Differential Privacy Protocols for Mean
                  Estimation},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1448--1457},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00200},
  doi          = {10.1109/TRUSTCOM63139.2024.00200},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangLZTWG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangRHLLLL24,
  author       = {Jianrong Wang and
                  Yacong Ren and
                  Dengcheng Hu and
                  Qi Li and
                  Sen Li and
                  Xuewei Li and
                  Xiulong Liu},
  title        = {CVchain: {A} Cross-Voting-Based Low Latency Parallel Chain System},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {666--673},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00105},
  doi          = {10.1109/TRUSTCOM63139.2024.00105},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangRHLLLL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangWW24,
  author       = {Liang Wang and
                  Zhipeng Wang and
                  Meng Wang},
  title        = {ADIoT: An Anomaly Detection Model for IoT Devices Based on Behavioral
                  Feature Analysis},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1972--1977},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00273},
  doi          = {10.1109/TRUSTCOM63139.2024.00273},
  timestamp    = {Mon, 02 Jun 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangWW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangWZ24,
  author       = {Xingbo Wang and
                  Yuzhu Wang and
                  Mingwu Zhang},
  title        = {Witness Encryption based on the {SAT} Problem\({}^{\mbox{*}}\)},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2227--2237},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00307},
  doi          = {10.1109/TRUSTCOM63139.2024.00307},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangWZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangWZJ24,
  author       = {Luyao Wang and
                  Xiaomin Wei and
                  Hongtao Zhang and
                  Lingtao Jia},
  title        = {AttDet: Attitude Angles-Based {UAV} {GNSS} Spoofing Detection},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2468--2473},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00342},
  doi          = {10.1109/TRUSTCOM63139.2024.00342},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangWZJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangYT24,
  author       = {Zhiqiang Wang and
                  Xinyue Yu and
                  Ziqing Tian},
  title        = {A Federated Learning Scheme with Adaptive Hierarchical Protection
                  and Multiple Aggregation},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2106--2114},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00292},
  doi          = {10.1109/TRUSTCOM63139.2024.00292},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangYT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangZB0D24,
  author       = {Yijun Wang and
                  Ziyi Zhou and
                  Weiqi Bai and
                  Ruijie Zhao and
                  Xianwen Deng},
  title        = {CaptchaSAM: Segment Anything in Text-based Captchas},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1070--1076},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00153},
  doi          = {10.1109/TRUSTCOM63139.2024.00153},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangZB0D24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Wickramaarachchi24,
  author       = {Wiraj Udara Wickramaarachchi and
                  Junwei Zhou and
                  Dongdong Zhao and
                  Jianwen Xiang},
  title        = {Block-Feature Fusion for Privacy-Protected Iris Recognition},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2133--2141},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00295},
  doi          = {10.1109/TRUSTCOM63139.2024.00295},
  timestamp    = {Tue, 05 Aug 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Wickramaarachchi24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WuL0G24,
  author       = {Xiaohong Wu and
                  Yujun Lin and
                  Jie Tao and
                  Yonggen Gu},
  title        = {Machine Learning-based Optimal Data Trading Mechanism with Randomized
                  Privacy Protection Scheme},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {461--468},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00081},
  doi          = {10.1109/TRUSTCOM63139.2024.00081},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WuL0G24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WuW24,
  author       = {Haoxuan Wu and
                  Zhiqiang Wen},
  title        = {Research on Adaptive Attention Dense Network Structure in Camera Source
                  Recognition Method},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2238--2243},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00308},
  doi          = {10.1109/TRUSTCOM63139.2024.00308},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WuW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WuWQ024,
  author       = {Feng Wu and
                  Weiqi Wang and
                  Youyang Qu and
                  Shui Yu},
  title        = {A Low-cost Black-box Jailbreak Based on Custom Mapping Dictionary
                  with Multi-round Induction},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {888--895},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00131},
  doi          = {10.1109/TRUSTCOM63139.2024.00131},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WuWQ024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WuWXZW24,
  author       = {Yingying Wu and
                  Jiabei Wang and
                  Dandan Xu and
                  Yongbin Zhou and
                  Yang Wang},
  title        = {Rabbit: Secure Encrypted Property Graph Search Scheme Supporting Data
                  and Key Updates},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1954--1962},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00271},
  doi          = {10.1109/TRUSTCOM63139.2024.00271},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WuWXZW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WuYY24,
  author       = {Shuaipeng Wu and
                  Changhao Yuan and
                  Kejiang Ye},
  title        = {A Multi-Stage Spike Stream Processing and Image Reconstruction Method
                  for Industrial Applications},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2590--2597},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00361},
  doi          = {10.1109/TRUSTCOM63139.2024.00361},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WuYY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Xia0LXST24,
  author       = {Haojun Xia and
                  Limin Sun and
                  Wenliang Liu and
                  Jingyi Xie and
                  Zhanwei Song and
                  Bibo Tu},
  title        = {A Self-Supervised Targeted Process Anomaly Detection Method Based
                  on the Minimum Set of Observed Events},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1881--1888},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00260},
  doi          = {10.1109/TRUSTCOM63139.2024.00260},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Xia0LXST24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XiaAGGXO24,
  author       = {Qi Xia and
                  Badjie Ansu and
                  Jianbin Gao and
                  Grace Mupoyi Ntuala and
                  Hu Xia and
                  Isaac Amankona Obiri},
  title        = {A Novel Time Series Approach to Anomaly Detection and Correction for
                  Complex Blockchain Transaction Networks},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {674--682},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00106},
  doi          = {10.1109/TRUSTCOM63139.2024.00106},
  timestamp    = {Tue, 05 Aug 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/XiaAGGXO24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XiaTLCD24,
  author       = {Bing Xia and
                  Chongjun Tang and
                  Wenbo Liu and
                  Shihao Chu and
                  Yu Dong},
  title        = {A Vulnerability Detection Method for Intermediate Code Based on a
                  Relational Dependency Graph},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1998--2003},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00277},
  doi          = {10.1109/TRUSTCOM63139.2024.00277},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/XiaTLCD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XiaWN024,
  author       = {Pengcheng Xia and
                  Jingyu Wu and
                  Yiyang Ni and
                  Jun Li},
  title        = {A Novel zk-SNARKs Method for Cross-chain Transactions in Multi-chain
                  System},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1261--1267},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00178},
  doi          = {10.1109/TRUSTCOM63139.2024.00178},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/XiaWN024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XiaYTL24,
  author       = {Zhuoqun Xia and
                  Yongbin Yu and
                  Jingjing Tan and
                  Kejun Long},
  title        = {{SSC-IDS:} {A} Robust In-vehicle Intrusion Detection System Based
                  on Self-Supervised Contrastive Learning},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2004--2009},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00278},
  doi          = {10.1109/TRUSTCOM63139.2024.00278},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/XiaYTL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XiangLM24,
  author       = {Fan Xiang and
                  Xueyang Li and
                  Guozhu Meng},
  title        = {{RTS:} {A} Training-time Backdoor Defense Strategy Based on Weight
                  Residual Tendency},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {786--793},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00119},
  doi          = {10.1109/TRUSTCOM63139.2024.00119},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/XiangLM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XiangZLZZ24,
  author       = {Yanpeng Xiang and
                  Tao Zhang and
                  Jiahao Liu and
                  Xinbo Zhang and
                  Yu Zhang},
  title        = {High-Capacity and High-Security Data Hiding in Encrypted Image Using
                  Image Filtering and Image Blocking},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2175--2184},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00300},
  doi          = {10.1109/TRUSTCOM63139.2024.00300},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/XiangZLZZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XiaoLXLX24,
  author       = {Ruoyao Xiao and
                  Yu Luo and
                  Weifeng Xu and
                  Harshmeet Lamba and
                  Dianxiang Xu},
  title        = {Analyzing Relationship Consistency in Digital Forensic Knowledge Graphs
                  with Graph Learning},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {590--599},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00096},
  doi          = {10.1109/TRUSTCOM63139.2024.00096},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/XiaoLXLX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XingLSXP0F24,
  author       = {Huanlai Xing and
                  Xuxu Li and
                  Jing Song and
                  Lexi Xu and
                  Jincheng Peng and
                  Bowen Zhao and
                  Li Feng},
  title        = {{HFI:} High-Frequency Component Injection based Invisible Image Backdoor
                  Attack},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1653--1658},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00227},
  doi          = {10.1109/TRUSTCOM63139.2024.00227},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/XingLSXP0F24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XiongLLNY24,
  author       = {Xingxing Xiong and
                  Shubo Liu and
                  Xiping Liu and
                  Xiaoguang Niu and
                  Wenyu You},
  title        = {Real-time Private Data Aggregation over Distributed Spatial-temporal
                  Infinite Streams with Local Differential Privacy},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1343--1352},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00188},
  doi          = {10.1109/TRUSTCOM63139.2024.00188},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/XiongLLNY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XiongZX24,
  author       = {Shuming Xiong and
                  Junfeng Zhu and
                  Qiqi Xu},
  title        = {An Intelligent Charging Service Selection Scheme Under the Cross-Area
                  Consensus of Blockchain for the IoV},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2310--2315},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00318},
  doi          = {10.1109/TRUSTCOM63139.2024.00318},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/XiongZX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XuG24,
  author       = {Guixian Xu and
                  Wenhui Gao},
  title        = {Tibetan microblogging user data analysis and topic identification},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1077--1082},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00154},
  doi          = {10.1109/TRUSTCOM63139.2024.00154},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/XuG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XuGKYZL24,
  author       = {Yaobing Xu and
                  Yunchuan Guo and
                  Wenlong Kou and
                  Junhai Yang and
                  Ziyan Zhou and
                  Fenghua Li},
  title        = {D\({}^{\mbox{3}}\)IR: Securing Multi-Domain Networks via Extending
                  Depth-in-Defense Strategies Across Nested Management Domains},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1320--1325},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00185},
  doi          = {10.1109/TRUSTCOM63139.2024.00185},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/XuGKYZL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XuLZALCL24,
  author       = {Yanhong Xu and
                  Zhao Li and
                  Ziru Zhao and
                  Blaise Herroine Aguenoukoun and
                  Jia Liu and
                  Zhixian Chang and
                  Yicheng Liu},
  title        = {Machine Learning Enhanced Indoor Positioning with RIS-aided Channel
                  Configuration and Analysis},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2653--2660},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00369},
  doi          = {10.1109/TRUSTCOM63139.2024.00369},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/XuLZALCL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XuRZCW24,
  author       = {Zhenyu Xu and
                  Xurui Ren and
                  Yi Zhang and
                  Guang Cheng and
                  Hua Wu},
  title        = {Peering Through the Veil: {A} Segment-Based Approach for {VPN} Encapsulated
                  Video Title Identification},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1500--1505},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00207},
  doi          = {10.1109/TRUSTCOM63139.2024.00207},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/XuRZCW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XuSCGH024,
  author       = {Shengmin Xu and
                  Jianfei Sun and
                  Hangcheng Cao and
                  Yulan Gao and
                  Ziyang He and
                  Cong Wu},
  title        = {Shield-U: Safeguarding Traffic Sign Recognition Against Perturbation
                  Attacks},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2453--2461},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00340},
  doi          = {10.1109/TRUSTCOM63139.2024.00340},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/XuSCGH024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XuZXWFL24,
  author       = {Wei Xu and
                  Hui Zhu and
                  Chang Xiao and
                  Fengwei Wang and
                  Dengguo Feng and
                  Hui Li},
  title        = {Toward Privacy-Preserving and Verifiable XGBoost Training for Horizontal
                  Federated Learning},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {810--817},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00122},
  doi          = {10.1109/TRUSTCOM63139.2024.00122},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/XuZXWFL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YanMG24,
  author       = {Kuan Yan and
                  Dmytro Matsypura and
                  Junbin Gao},
  title        = {{BIG:} {A} Practical Framework for Balancing the Conflict Between
                  Group and Individual Fairness in Graph Neural Networks},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2400--2409},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00332},
  doi          = {10.1109/TRUSTCOM63139.2024.00332},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YanMG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YanW0024,
  author       = {Feixue Yan and
                  Sheng Wen and
                  Yang Xiang and
                  Shiping Chen},
  title        = {Shapley-value-based Explanations for Cryptocurrency Blacklist Detection},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {435--442},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00078},
  doi          = {10.1109/TRUSTCOM63139.2024.00078},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YanW0024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YanYHYX24,
  author       = {Xiong Yan and
                  Kedong Yan and
                  Chanying Huang and
                  Dan Yin and
                  Shan Xiao},
  title        = {FusTP-FL: Enhancing Differential Federated Learning through Personalized
                  Layers and Data Transformation},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1762--1769},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00242},
  doi          = {10.1109/TRUSTCOM63139.2024.00242},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YanYHYX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YangLXZC24,
  author       = {Dong Yang and
                  Weihai Li and
                  Zikai Xu and
                  Zhiling Zhang and
                  Yiling Chen},
  title        = {{FCADD:} Robust Watermarking Resisting {JPEG} Compression with Frequency
                  Channel Attention and Distortion De-gradient},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1817--1824},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00250},
  doi          = {10.1109/TRUSTCOM63139.2024.00250},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YangLXZC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YangOWLFS24,
  author       = {Yilin Yang and
                  Changhai Ou and
                  Yongzhuang Wei and
                  Wei Li and
                  Yifan Fan and
                  Xuan Shen},
  title        = {Broader but More Efficient: Broad Learning in Power Side-channel Attacks},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1528--1533},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00211},
  doi          = {10.1109/TRUSTCOM63139.2024.00211},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YangOWLFS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YangSCW24,
  author       = {Qingmei Yang and
                  Lijun Sun and
                  Xiao Chen and
                  Lingling Wang},
  title        = {Sustainable and Trusted Vehicular Energy Trading Enabled by Scalable
                  Blockchains},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1832--1837},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00252},
  doi          = {10.1109/TRUSTCOM63139.2024.00252},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YangSCW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YangT0Y024,
  author       = {Zhihuan Yang and
                  Wenlong Tian and
                  Ruixuan Li and
                  Xuming Ye and
                  Zhiyong Xu},
  title        = {Who Owns the Cloud Data? Exploring a non-interactive way for secure
                  proof of ownership},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1494--1499},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00206},
  doi          = {10.1109/TRUSTCOM63139.2024.00206},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YangT0Y024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YangTZ024,
  author       = {Zhihuan Yang and
                  Wenlong Tian and
                  Emma Zhang and
                  Zhiyong Xu},
  title        = {Sec-Reduce: Secure Reduction of Redundant and Similar Data for Cloud
                  Storage based on Zero-Knowledge Proof},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1149--1154},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00163},
  doi          = {10.1109/TRUSTCOM63139.2024.00163},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YangTZ024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YangWSLL24,
  author       = {Qian Yang and
                  Chen Wang and
                  Jian Shen and
                  Yi Li and
                  Dengzhi Liu},
  title        = {Private Data Aggregation Enabling Verifiable Multisubset Dynamic Billing
                  in Smart Grids},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1155--1160},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00164},
  doi          = {10.1109/TRUSTCOM63139.2024.00164},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YangWSLL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YangZFY24,
  author       = {Qingmei Yang and
                  Pincan Zhao and
                  Yuchuan Fu and
                  F. Richard Yu},
  title        = {Enhancing Security and Privacy in Connected and Autonomous Vehicles:
                  {A} Post-Quantum Revocable Ring Signature Approach},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1557--1562},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00215},
  doi          = {10.1109/TRUSTCOM63139.2024.00215},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YangZFY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YangZT24,
  author       = {Kedi Yang and
                  Zhenyong Zhang and
                  Youliang Tian},
  title        = {Traceable AI-driven Avatars Using Multi-factors of Physical World
                  and Metaverse},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2360--2367},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00326},
  doi          = {10.1109/TRUSTCOM63139.2024.00326},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YangZT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YinMSS24,
  author       = {Yuemeng Yin and
                  Rahat Masood and
                  Suranga Seneviratne and
                  Aruna Seneviratne},
  title        = {Evaluating Web-Based Privacy Controls: {A} User Study on Expectations
                  and Preferences},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2169--2174},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00299},
  doi          = {10.1109/TRUSTCOM63139.2024.00299},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YinMSS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YuCJFL24,
  author       = {Dahai Yu and
                  Jianming Cui and
                  Yungang Jia and
                  Peiguo Fu and
                  Ming Liu},
  title        = {Deep Learning-Based DDoS Attack Detection Using Adversarial Optimization},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1135--1140},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00161},
  doi          = {10.1109/TRUSTCOM63139.2024.00161},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YuCJFL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YuHXZQ0GD24,
  author       = {Yongkang Yu and
                  Jinchun He and
                  Xinwei Xu and
                  Qinnan Zhang and
                  Wangjie Qiu and
                  Hongwei Zheng and
                  Binghui Guo and
                  Jin Dong},
  title        = {TierFlow: {A} Pipelined Layered {BFT} Consensus Protocol for Large-Scale
                  Blockchain},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {624--635},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00100},
  doi          = {10.1109/TRUSTCOM63139.2024.00100},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YuHXZQ0GD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YuJLGYWY24,
  author       = {Mingjie Yu and
                  Wei Jin and
                  Fenghua Li and
                  Yunchuan Guo and
                  Zheng Yan and
                  Xiao Wang and
                  Nenghai Yu},
  title        = {Correcting the Bound Estimation of Mohawk},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {191--196},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00051},
  doi          = {10.1109/TRUSTCOM63139.2024.00051},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YuJLGYWY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YuLLHTD24,
  author       = {Yifan Yu and
                  Ruoyan Lin and
                  Shuang Li and
                  Qinsheng Hou and
                  Peng Tang and
                  Wenrui Diao},
  title        = {Security Assessment of Customizations in Android Smartwatch Firmware},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1141--1148},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00162},
  doi          = {10.1109/TRUSTCOM63139.2024.00162},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YuLLHTD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YuWJYZ24,
  author       = {Qiulong Yu and
                  Zhiqiang Wang and
                  Lei Ju and
                  Sicheng Yuan and
                  Ying Zhang},
  title        = {Android Malware Detection Technology Based on SC-ViT and Multi-Feature
                  Fusion},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1105--1114},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00158},
  doi          = {10.1109/TRUSTCOM63139.2024.00158},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YuWJYZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YuWLL24,
  author       = {Limin Yu and
                  Yongdong Wu and
                  Jiao Lu and
                  Tong Li},
  title        = {An Adaptive Reputation Update Mechanism for Primary Nodes in {PBFT}},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1948--1953},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00270},
  doi          = {10.1109/TRUSTCOM63139.2024.00270},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YuWLL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YuanLZXXZ24,
  author       = {Zhuang Yuan and
                  Rui Li and
                  Fa Zhang and
                  Kejing Xu and
                  Liang Xu and
                  Weizhan Zhang},
  title        = {An Experimental Study on Half-Closed {TCP} Connections in Public Cloud
                  Gateways},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2583--2589},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00360},
  doi          = {10.1109/TRUSTCOM63139.2024.00360},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YuanLZXXZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YuanSPWWZ24,
  author       = {Wei Yuan and
                  Hongyu Sun and
                  Mo Pang and
                  He Wang and
                  Gaofei Wu and
                  Yuqing Zhang},
  title        = {LogContrast: Log-based Anomaly Detection Using {BERT} and Contrastive
                  Learning},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2510--2516},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00349},
  doi          = {10.1109/TRUSTCOM63139.2024.00349},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YuanSPWWZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhaiLL0XWY24,
  author       = {Haonan Zhai and
                  Ruiqi Liang and
                  Zhenzhen Li and
                  Zhen Li and
                  Wei Xia and
                  Bingxu Wang and
                  Qingya Yang},
  title        = {{OSN} Bots Traffic Transformer : MAE-Based Multimodal Social Bots
                  Behavior Pattern Mining},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1239--1246},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00175},
  doi          = {10.1109/TRUSTCOM63139.2024.00175},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhaiLL0XWY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Zhang024,
  author       = {Hongke Zhang and
                  Zheng Yan},
  title        = {Design and Implementation of Data Encryption Mechanism in Fiber Channel
                  Network},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2442--2446},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00338},
  doi          = {10.1109/TRUSTCOM63139.2024.00338},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Zhang024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Zhang0G24,
  author       = {Xin Zhang and
                  Chao Guo and
                  Buxin Guo},
  title        = {Two-Stage Federated Learning Strategy for Fairness and Security in
                  Vehicular Networks},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2019--2024},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00280},
  doi          = {10.1109/TRUSTCOM63139.2024.00280},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Zhang0G24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Zhang0LLGCC24,
  author       = {Yuheng Zhang and
                  Guojun Wang and
                  Peiqiang Li and
                  Xubin Li and
                  Wanyi Gu and
                  Mingfei Chen and
                  Houji Chen},
  title        = {TransFront: Bi-path Feature Fusion for Detecting Front-running Attack
                  in Decentralized Finance},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {600--607},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00097},
  doi          = {10.1109/TRUSTCOM63139.2024.00097},
  timestamp    = {Fri, 04 Jul 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Zhang0LLGCC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Zhang0ZQZW24,
  author       = {Zelong Zhang and
                  Wei Cheng and
                  Yongbin Zhou and
                  Zehua Qiao and
                  Yuhan Zhao and
                  Jian Weng},
  title        = {Attacking High-order Masked Cryptosystem via Deep Learning-based Side-Channel
                  Analysis},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {699--706},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00109},
  doi          = {10.1109/TRUSTCOM63139.2024.00109},
  timestamp    = {Fri, 25 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Zhang0ZQZW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Zhang0ZYZC24,
  author       = {Zheng Zhang and
                  Rui Ma and
                  Yuqi Zhai and
                  Yuche Yang and
                  Siqi Zhao and
                  Hongming Chen},
  title        = {GeMuFuzz: Integrating Generative and Mutational Fuzzing with Deep
                  Learning},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1889--1895},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00261},
  doi          = {10.1109/TRUSTCOM63139.2024.00261},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Zhang0ZYZC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangBTYL24,
  author       = {Shuguang Zhang and
                  Jianli Bai and
                  Kun Tu and
                  Ziyue Yin and
                  Chan Liu},
  title        = {{OHSS:} Optimizing Homomorphic Secret Sharing to Support Fast Matrix
                  Multiplication},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2213--2220},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00305},
  doi          = {10.1109/TRUSTCOM63139.2024.00305},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangBTYL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangCXDHJ24,
  author       = {Jingye Zhang and
                  Ken Cheng and
                  Xinli Xiong and
                  Rongcheng Dong and
                  Jun Huang and
                  She Jie},
  title        = {Construction of Cyber-attack Attribution Framework Based on {LLM}},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2250--2255},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00310},
  doi          = {10.1109/TRUSTCOM63139.2024.00310},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangCXDHJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangD24,
  author       = {Jingchi Zhang and
                  Anwitaman Datta},
  title        = {Enhancing Privacy-Preserving Multi-Authority Attribute-Based Encryption:
                  Addressing Rogue-Key Attacks Under Adaptive Corruption of Authorities},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {524--531},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00088},
  doi          = {10.1109/TRUSTCOM63139.2024.00088},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangDCL24,
  author       = {Yixin Zhang and
                  Fuqiang Du and
                  Xinge Chi and
                  Zhiqiang Lv},
  title        = {{USB} Catcher: Detection of Controlled Emissions via Conducted Compromising
                  Emanations},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1296--1303},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00182},
  doi          = {10.1109/TRUSTCOM63139.2024.00182},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangDCL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangHCLZL24,
  author       = {Dong Zhang and
                  Zhiyuan Hu and
                  Huijun Chen and
                  Guangming Liu and
                  YinFeng Zheng and
                  Jinghui Lu},
  title        = {From Liberty to 1984: {A} Methodology for Systematically Deteriorating
                  {LLM} Outputs through Habituation Tendencies},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1659--1665},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00228},
  doi          = {10.1109/TRUSTCOM63139.2024.00228},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangHCLZL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangHGWLL24,
  author       = {Jingsen Zhang and
                  Shoulu Hou and
                  Yi Gong and
                  Tao Wang and
                  Changyuan Lan and
                  Xiulei Liu},
  title        = {An Intelligent Affinity Strategy for Dynamic Task Scheduling in Cloud-Edge-End
                  Collaboration},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1595--1603},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00220},
  doi          = {10.1109/TRUSTCOM63139.2024.00220},
  timestamp    = {Fri, 25 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangHGWLL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangL0F24,
  author       = {Fei Zhang and
                  Xiaohong Li and
                  Sen Chen and
                  Ruitao Feng},
  title        = {Behavior Speaks Louder: Rethinking Malware Analysis Beyond Family
                  Classification},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {166--175},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00048},
  doi          = {10.1109/TRUSTCOM63139.2024.00048},
  timestamp    = {Fri, 25 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangL0F24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangLFLZ24,
  author       = {Jie Zhang and
                  Jiayuan Li and
                  Haiqiang Fei and
                  Lun Li and
                  Hongsong Zhu},
  title        = {EasyDetector: Using Linear Probe to Detect the Provenance of Large
                  Language Models},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2410--2417},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00333},
  doi          = {10.1109/TRUSTCOM63139.2024.00333},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangLFLZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangLGW24,
  author       = {Chenghan Zhang and
                  Yan Liu and
                  Daofu Gong and
                  Ling Wang},
  title        = {Unsupervised Evaluation Method of Relative Coordination Degree from
                  Group Perspective},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1983--1988},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00275},
  doi          = {10.1109/TRUSTCOM63139.2024.00275},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangLGW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangLLWLSWLS24,
  author       = {Pengfeng Zhang and
                  Lei Li and
                  Xin Liu and
                  Rui Wang and
                  Donglan Liu and
                  Bing Su and
                  Yuntao Wang and
                  Yiliang Liu and
                  Zhou Su},
  title        = {Trusted and Spectrum-Efficient Crowd Computing in Massive {MIMO} Cellular
                  Networks},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2529--2534},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00352},
  doi          = {10.1109/TRUSTCOM63139.2024.00352},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangLLWLSWLS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangLM0ZW24,
  author       = {Jiahao Zhang and
                  Yuejun Liu and
                  Jingdian Ming and
                  Yiwen Gao and
                  Yongbin Zhou and
                  Debao Wang},
  title        = {Enhancing Higher-Order Masking: {A} Faster and Secure Implementation
                  to Mitigate Bit Interaction Leakage},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1247--1254},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00176},
  doi          = {10.1109/TRUSTCOM63139.2024.00176},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangLM0ZW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangLSZSG24,
  author       = {Ruoding Zhang and
                  Tao Liu and
                  Qifeng Shi and
                  Yan Zhang and
                  Xiaoyi Song and
                  Xinrui Geng},
  title        = {Research on Intelligent Joint Detection Technology for Application
                  Privacy Behavior Compliance},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1430--1437},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00198},
  doi          = {10.1109/TRUSTCOM63139.2024.00198},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangLSZSG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangLY24,
  author       = {Ziheng Zhang and
                  Lei Liu and
                  Zhongmin Yan},
  title        = {Achieving Trusted {GPU} Allocation: An Empirical Study on Efficiency
                  Changes of Deep Learning Training Tasks},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1687--1692},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00232},
  doi          = {10.1109/TRUSTCOM63139.2024.00232},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangLY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangQYW24,
  author       = {Yu Zhang and
                  Haipeng Qu and
                  Lingyun Ying and
                  Linghui Wang},
  title        = {Maldet: An Automated Malicious npm Package Detector Based on Behavior
                  Characteristics and Attack Vectors},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1942--1947},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00269},
  doi          = {10.1109/TRUSTCOM63139.2024.00269},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangQYW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangS0TZ24,
  author       = {Yaling Zhang and
                  Xiang Sun and
                  Yichuan Wang and
                  Dongtai Tang and
                  Chen Zhao},
  title        = {An Effective Adversarial Text Attack through a Block-Sparse Approach
                  with Hamiltonian Insights},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1727--1732},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00237},
  doi          = {10.1109/TRUSTCOM63139.2024.00237},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangS0TZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangSH24,
  author       = {Chaoqin Zhang and
                  Maoqi Sun and
                  Guangwu Hu},
  title        = {CNN-KOA-BiGRU: {A} high-accuracy {APT} detection model based on deep
                  learning networks},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2342--2347},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00323},
  doi          = {10.1109/TRUSTCOM63139.2024.00323},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangSH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangSWZL24,
  author       = {Bosong Zhang and
                  Qian Sun and
                  Hai Wang and
                  Linna Zhang and
                  Danyang Li},
  title        = {Federated Learning Greedy Aggregation Optimization for Non-Independently
                  Identically Distributed Data},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2090--2097},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00290},
  doi          = {10.1109/TRUSTCOM63139.2024.00290},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangSWZL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangTBH0L24,
  author       = {Chengming Zhang and
                  Bo Tang and
                  Yifan Bian and
                  Bingtao Han and
                  Yongcheng Wang and
                  Tao Liu},
  title        = {Efficient and Secure Federated Learning via Enhanced Quantization
                  and Encryption},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2348--2353},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00324},
  doi          = {10.1109/TRUSTCOM63139.2024.00324},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangTBH0L24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangWFFGJ24,
  author       = {Hanning Zhang and
                  Guansheng Wang and
                  Junwei Feng and
                  Lei Feng and
                  Quan Gan and
                  Long Ji},
  title        = {Towards a Robust Medical Record System: Integrating Logical Reasoning
                  for Trustworthy Data Management},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {658--665},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00104},
  doi          = {10.1109/TRUSTCOM63139.2024.00104},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangWFFGJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangWL24,
  author       = {Fuyao Zhang and
                  Dan Wang and
                  Chuyang Liang},
  title        = {{DPFCIL:} Differentially Private Federated Class-Incremental Learning
                  on non-IID Data},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {542--550},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00090},
  doi          = {10.1109/TRUSTCOM63139.2024.00090},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangWL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangWLZ24,
  author       = {Jie Zhang and
                  Hui Wen and
                  Lun Li and
                  Hongsong Zhu},
  title        = {UniTTP: {A} Unified Framework for Tactics, Techniques, and Procedures
                  Mapping in Cyber Threats},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1580--1588},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00218},
  doi          = {10.1109/TRUSTCOM63139.2024.00218},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangWLZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangX24,
  author       = {Lening Zhang and
                  Hui Xia},
  title        = {Active Source Inference Attack Based on Label-Flipping in Federated
                  Learning},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1675--1680},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00230},
  doi          = {10.1109/TRUSTCOM63139.2024.00230},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangXA24,
  author       = {Zhao Zhang and
                  Chunxiang Xu and
                  Man Ho Allen Au},
  title        = {Single-sign-on Authentication with Anonymous Token and Restricted
                  Covert Channel},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1413--1422},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00196},
  doi          = {10.1109/TRUSTCOM63139.2024.00196},
  timestamp    = {Fri, 25 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangXA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangYC24,
  author       = {Ruizhe Zhang and
                  Shangnan Yin and
                  Jinfu Chen},
  title        = {{FD-WF:} {A} Multi-tab Website Fingerprinting Attack Based on Fixed
                  Dimensions for Tor Network},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2051--2059},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00285},
  doi          = {10.1109/TRUSTCOM63139.2024.00285},
  timestamp    = {Mon, 28 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangYC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangZJ24,
  author       = {Xinrui Zhang and
                  Pincan Zhao and
                  Jason Jaskolka},
  title        = {Enhancing Security and Efficiency in Vehicle-to-Sensor Authentication:
                  {A} Multi-Factor Approach with Cloud Assistance},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1632--1637},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00224},
  doi          = {10.1109/TRUSTCOM63139.2024.00224},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangZJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangZTYY24,
  author       = {Bingxin Zhang and
                  Kang Zheng and
                  Chao Tong and
                  Kun Yang and
                  Kang Yan},
  title        = {Deep Reinforcement Learning for Active RIS-Assisted Full-Duplex Integrated
                  Sensing and Communication Systems},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2680--2685},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00373},
  doi          = {10.1109/TRUSTCOM63139.2024.00373},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangZTYY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangZWMCY24,
  author       = {Zhixuan Zhang and
                  Yanhui Zhu and
                  Yuezhong Wu and
                  Fangteng Man and
                  Hao Chen and
                  Xujian Ying},
  title        = {A Knowledge Graph Completion Method Based on Gated Adaptive Fusion
                  and Conditional Generative Adversarial Networks},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {759--766},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00116},
  doi          = {10.1109/TRUSTCOM63139.2024.00116},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangZWMCY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangZZW24,
  author       = {Xin Zhang and
                  Bingbing Zhang and
                  Chi Zhang and
                  Lingbo Wei},
  title        = {Enhanced Privacy Policy Comprehension via Pre-trained and Retrieval-Augmented
                  Models},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {574--581},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00094},
  doi          = {10.1109/TRUSTCOM63139.2024.00094},
  timestamp    = {Wed, 28 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangZZW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhaoTWDQ24,
  author       = {Yu Zhao and
                  Yangguang Tian and
                  Chunbo Wang and
                  Xiaoqiang Di and
                  Hui Qi},
  title        = {Smart Contract-Based Auditing of Edge Data for Vehicular Networks},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2045--2050},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00284},
  doi          = {10.1109/TRUSTCOM63139.2024.00284},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhaoTWDQ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhaoWLL24,
  author       = {Feiyu Zhao and
                  Jianguo Wei and
                  Wenhuan Lu and
                  Yongwei Li},
  title        = {End-To-End Speaker Anonymization Based on Location-Variable Convolution
                  and Multi-Head Self-Attention},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1733--1740},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00238},
  doi          = {10.1109/TRUSTCOM63139.2024.00238},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhaoWLL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhaoXWLL24,
  author       = {Yuan Zhao and
                  Chunhe Xia and
                  Tianbo Wang and
                  Mengyao Liu and
                  Yang Li},
  title        = {Few-shot Encrypted Malicious Traffic Classification via Hierarchical
                  Semantics and Adaptive Prototype Learning},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {399--409},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00074},
  doi          = {10.1109/TRUSTCOM63139.2024.00074},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhaoXWLL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhaoZSZH024,
  author       = {Zhangchi Zhao and
                  Jianyi Zhang and
                  Liqun Shan and
                  Ziyin Zhou and
                  Kaiying Han and
                  Xiali Hei},
  title        = {Paa-Tee: {A} Practical Adversarial Attack on Thermal Infrared Detectors
                  with Temperature and Pose Adaptability},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {952--959},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00138},
  doi          = {10.1109/TRUSTCOM63139.2024.00138},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhaoZSZH024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhengL0Z24,
  author       = {Hongying Zheng and
                  Hongdie Li and
                  Di Xiao and
                  Maolan Zhang},
  title        = {Privacy-Preserving Multi-Soft Biometrics through Generative Adversarial
                  Networks with Chaotic Encryption},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1466--1471},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00202},
  doi          = {10.1109/TRUSTCOM63139.2024.00202},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhengL0Z24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhengLSLHL24,
  author       = {Jinlong Zheng and
                  Jia{-}Nan Liu and
                  Minhua Su and
                  Dingcheng Li and
                  Kai He and
                  Xueqiao Liu},
  title        = {Efficient Multi-subset Fine-grained Authorization {PSI} over Outsourced
                  Encrypted Datasets},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2098--2105},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00291},
  doi          = {10.1109/TRUSTCOM63139.2024.00291},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhengLSLHL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhengZC24,
  author       = {Haibin Zheng and
                  Tianxin Zhang and
                  Jinyin Chen},
  title        = {Fedfair: {A} Debiasing Algorithm for Federated Learning Systems},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2322--2326},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00320},
  doi          = {10.1109/TRUSTCOM63139.2024.00320},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhengZC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhouL0L24,
  author       = {Ting Zhou and
                  Hongtao Lv and
                  Ning Liu and
                  Lei Liu},
  title        = {Budget-Feasible Double Auction Mechanisms for Model Training Services
                  in Federated Learning Market},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {501--507},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00085},
  doi          = {10.1109/TRUSTCOM63139.2024.00085},
  timestamp    = {Fri, 25 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhouL0L24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhouXFPWL24,
  author       = {Weidong Zhou and
                  Chunhe Xia and
                  Nan Feng and
                  Xinyi Pan and
                  Tianbo Wang and
                  Xiaojian Li},
  title        = {{AIDE:} Attack Inference Based on Heterogeneous Dependency Graphs
                  with {MITRE} ATT{\&}CK},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {410--417},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00075},
  doi          = {10.1109/TRUSTCOM63139.2024.00075},
  timestamp    = {Fri, 13 Jun 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhouXFPWL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhouXL24,
  author       = {Kai Zhou and
                  Yong Xie and
                  Xin Liu},
  title        = {A Multi-hop Reasoning Framework for Cyber Threat Intelligence Knowledge
                  Graph},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1037--1044},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00149},
  doi          = {10.1109/TRUSTCOM63139.2024.00149},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhouXL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhouXNL24,
  author       = {Hao Zhou and
                  Pengcheng Xia and
                  Yiyang Ni and
                  Jun Li},
  title        = {DcChain: {A} Novel Blockchain Sharding Method Based on Dual-constraint
                  Label Propagating},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2302--2309},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00317},
  doi          = {10.1109/TRUSTCOM63139.2024.00317},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhouXNL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhouZYWML24,
  author       = {Wanqiu Zhou and
                  Zheng Zhang and
                  Yuan Yao and
                  Jiang Wang and
                  Jiaxin Ma and
                  Hui Liu},
  title        = {Cyber Resilience Framework for Web Server},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1922--1927},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00266},
  doi          = {10.1109/TRUSTCOM63139.2024.00266},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhouZYWML24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhouZZLXJ24,
  author       = {Ming Zhou and
                  Zhijian Zheng and
                  Peng Zhang and
                  Sixue Lu and
                  Yamin Xie and
                  Zhongfeng Jin},
  title        = {SecureNet-AWMI: Safeguarding Network with Optimal Feature Selection
                  Algorithm},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1506--1511},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00208},
  doi          = {10.1109/TRUSTCOM63139.2024.00208},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhouZZLXJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Zhu0ZM24,
  author       = {Yilin Zhu and
                  Guang Cheng and
                  Shunyu Zheng and
                  Hantao Mei},
  title        = {TOScorr: Transformer-based Flow Correlation Attack on Tor Onion Service},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {262--270},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00059},
  doi          = {10.1109/TRUSTCOM63139.2024.00059},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Zhu0ZM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhuWG24,
  author       = {Guangzhuo Zhu and
                  Qian Wang and
                  Bei Gong},
  title        = {A Sustainable Storage Compensation Method for Consortium Blockchain-based
                  Computing Power Trading},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {683--690},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00107},
  doi          = {10.1109/TRUSTCOM63139.2024.00107},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhuWG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZouDLRLZC24,
  author       = {Huiying Zou and
                  Jia Duan and
                  Xi Liu and
                  Wei Ren and
                  Tao Li and
                  Xianghan Zheng and
                  Kim{-}Kwang Raymond Choo},
  title        = {Decentralized and Lightweight Cross-Chain Transaction Scheme Based
                  on Proxy Re-signature},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1201--1208},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00170},
  doi          = {10.1109/TRUSTCOM63139.2024.00170},
  timestamp    = {Fri, 25 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZouDLRLZC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZouHXLF24,
  author       = {Yuwen Zou and
                  Yang Hong and
                  Jingyi Xu and
                  Lekun Liu and
                  Wenjun Fan},
  title        = {Leveraging Large Language Models for Challenge Solving in Capture-the-Flag},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {1541--1550},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00213},
  doi          = {10.1109/TRUSTCOM63139.2024.00213},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZouHXLF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZuinV24,
  author       = {Gianlucca L. Zuin and
                  Adriano Veloso},
  title        = {Navigating Time's Possibilities: Plausible Counterfactual Explanations
                  for Multivariate Time-Series Forecast through Genetic Algorithms},
  booktitle    = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  pages        = {2575--2582},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024.00359},
  doi          = {10.1109/TRUSTCOM63139.2024.00359},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZuinV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trustcom/2024,
  title        = {23rd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Sanya, China, December
                  17-21, 2024},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/TrustCom63139.2024},
  doi          = {10.1109/TRUSTCOM63139.2024},
  isbn         = {979-8-3315-0620-9},
  timestamp    = {Thu, 24 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/2024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}