


default search action
Search dblp for Publications
export results for "toc:db/conf/trustcom/trustcom2024.bht:"
@inproceedings{DBLP:conf/trustcom/0001FXSY024, author = {Yuwei Xu and Xiaotian Fang and Zhengxin Xu and Kehui Song and Yali Yuan and Guang Cheng}, title = {{M-ETC:} Improving Multi-Task Encrypted Traffic Classification by Reducing Inter-Task Interference}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {271--278}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00060}, doi = {10.1109/TRUSTCOM63139.2024.00060}, timestamp = {Thu, 24 Apr 2025 15:48:16 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/0001FXSY024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/0001LHHY024, author = {Yuwei Xu and Jiangfeng Li and Yujie Hou and Xinxu Huang and Yali Yuan and Guang Cheng}, title = {TriViewNet: Achieve Accurate Tor Hidden Service Classification by Multi-View Feature Extraction and Fusion}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {559--566}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00092}, doi = {10.1109/TRUSTCOM63139.2024.00092}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/0001LHHY024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/0001LL24, author = {Fei Peng and Yousheng Liang and Min Long}, title = {A Semi-Fragile Reversible Watermarking for 3D Models Based on {IQIM} with Dual-Strategy Partition Modulation}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {29--36}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00033}, doi = {10.1109/TRUSTCOM63139.2024.00033}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/0001LL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/0001NY24, author = {Zhijun Wu and Shanhe Niu and Meng Yue}, title = {A Reliable Encrypted Traffic Classification Method Based on Attention Mechanisms}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1286--1295}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00181}, doi = {10.1109/TRUSTCOM63139.2024.00181}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/0001NY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/0001YSOC24, author = {Zhou Zhou and Taotao Yu and Mohammad Shojafar and Xia Ou and Hongbing Cheng}, title = {A Reliable Edge Server Deployment Algorithm Based on Spectral Clustering and a Deep Q-network Strategy using Multi-objective Optimization}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2447--2452}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00339}, doi = {10.1109/TRUSTCOM63139.2024.00339}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/0001YSOC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/0001YZC24, author = {Di Xiao and Zhuyan Yang and Maolan Zhang and Lvjun Chen}, title = {Data Privacy-Preserving and Communication Efficient Federated Multilinear Compressed Learning}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1472--1479}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00203}, doi = {10.1109/TRUSTCOM63139.2024.00203}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/0001YZC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/0001ZZS024, author = {Yuwei Xu and Zizhi Zhu and Chufan Zhang and Kehui Song and Guang Cheng}, title = {A High-Accuracy Unknown Traffic Identification Method Based on Multi-View Contrastive Learning}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {691--698}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00108}, doi = {10.1109/TRUSTCOM63139.2024.00108}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/0001ZZS024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/0002JHSJ24, author = {Muhammad Adil and Mian Ahmad Jan and Safayat Bin Hakim and Houbing Herbert Song and Zhanpeng Jin}, title = {xIDS-EnsembleGuard: An Explainable Ensemble Learning-based Intrusion Detection System}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {93--100}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00040}, doi = {10.1109/TRUSTCOM63139.2024.00040}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/0002JHSJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/0003SYD24, author = {Pengfei Wu and Jianfei Sun and Guomin Yang and Robert H. Deng}, title = {Towards Privacy-aware IoT Communications: Delegable, Revocable, and Efficient}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {481--491}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00083}, doi = {10.1109/TRUSTCOM63139.2024.00083}, timestamp = {Fri, 04 Jul 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/0003SYD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/0003WHWSZ24, author = {Weiping Wang and Huijuan Wang and Yulu Hong and Chenyu Wang and Hong Song and Shigeng Zhang}, title = {SimLog: System Log Anomaly Detection Method Based on Simhash}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1090--1096}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00156}, doi = {10.1109/TRUSTCOM63139.2024.00156}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/0003WHWSZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/0004CXSG24, author = {Bo Yin and Hang Chen and Binyao Xu and Mariam Suleiman Silima and Ke Gu}, title = {Efficient and Verifiable Dynamic Skyline Queries in Blockchain Networks}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1551--1556}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00214}, doi = {10.1109/TRUSTCOM63139.2024.00214}, timestamp = {Fri, 25 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/0004CXSG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/00050GLZL0B24, author = {Fengyuan Shi and Zhou Zhou and Jiang Guo and Renjie Li and Zhongyi Zhang and Shu Li and Qingyun Liu and Xiuguo Bao}, title = {LightRL-AD: {A} Lightweight Online Reinforcement Learning Approach for Autonomous Defense against Network Attacks}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1614--1621}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00222}, doi = {10.1109/TRUSTCOM63139.2024.00222}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/00050GLZL0B24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/00050QL024, author = {Haoyang Wang and Kai Fan and Yue Quan and Fenghua Li and Hui Li}, title = {{VDPSRQ:} Achieving Verifiable and Dynamic Private Spatial Range Queries over Outsourced Database}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {532--541}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00089}, doi = {10.1109/TRUSTCOM63139.2024.00089}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/00050QL024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/0006LJF024, author = {Rong Wang and Junchuan Liang and Haiting Jiang and Chaosheng Feng and Chin{-}Chen Chang}, title = {StegoFL: Using Steganography and Federated Learning to Transmit Malware}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {184--190}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00050}, doi = {10.1109/TRUSTCOM63139.2024.00050}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/0006LJF024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/0009XB0X024, author = {Jie Cao and Zhengxin Xu and Yunpeng Bai and Yuwei Xu and Qiao Xiang and Guang Cheng}, title = {Perturbing Vulnerable Bytes in Packets to Generate Adversarial Samples Resisting DNN-Based Traffic Monitoring}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1015--1021}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00146}, doi = {10.1109/TRUSTCOM63139.2024.00146}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/0009XB0X024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/0010W024, author = {Wei Feng and Dongyuan Wei and Qianqian Wang}, title = {Blind Signature Based Anonymous Authentication on Trust for Decentralized Mobile Crowdsourcing}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {49--56}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00035}, doi = {10.1109/TRUSTCOM63139.2024.00035}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/0010W024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AlhussienA24, author = {Nour Alhussien and Ahmed Aleroud}, title = {AdvPurRec: Strengthening Network Intrusion Detection with Diffusion Model Reconstruction Against Adversarial Attacks}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1638--1646}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00225}, doi = {10.1109/TRUSTCOM63139.2024.00225}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/AlhussienA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AmadouMEB24, author = {Abdoul Nasser Hassane Amadou and Anas Motii and Saida Elouardi and El Houcine Bergou}, title = {{EUREKHA:} Enhancing User Representation for Key Hackers Identification in Underground Forums}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {387--398}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00073}, doi = {10.1109/TRUSTCOM63139.2024.00073}, timestamp = {Tue, 05 Aug 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/AmadouMEB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AoWWZ24, author = {Zhuohan Ao and Yi Wang and Ying Wang and Yu Zhan}, title = {Trustworthiness and path regularity based contrastive learning for noisy knowledge graph error assertion detection}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {794--801}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00120}, doi = {10.1109/TRUSTCOM63139.2024.00120}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/AoWWZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AzamCMAT24, author = {Naila Azam and Alex Chak and Anna Lito Michala and Shuja Ansari and Nguyen Binh Truong}, title = {Modelling GDPR-compliance based on Defeasible Logic Reasoning: Insights from Time Complexity Perspective\({}^{\mbox{*}}\)}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2060--2067}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00286}, doi = {10.1109/TRUSTCOM63139.2024.00286}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/AzamCMAT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Baghalizadeh-Moghadam24, author = {Neda Baghalizadeh{-}Moghadam and Christopher Neal and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Boulahia{-}Cuppens}, title = {{NLP} and Neural Networks for Insider Threat Detection}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2010--2018}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00279}, doi = {10.1109/TRUSTCOM63139.2024.00279}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Baghalizadeh-Moghadam24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BinhulayyilLS24, author = {Sarah Binhulayyil and Shancang Li and Neetesh Saxena}, title = {IoT Vulnerability Detection using Featureless {LLM} CyBert Model}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2474--2480}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00343}, doi = {10.1109/TRUSTCOM63139.2024.00343}, timestamp = {Thu, 01 May 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/BinhulayyilLS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BunzelK24, author = {Niklas Bunzel and Gerrit Klause}, title = {Analyzing the Effectiveness of Image Preprocessing Defenses Under Runtime Constraints}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {994--999}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00143}, doi = {10.1109/TRUSTCOM63139.2024.00143}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/BunzelK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/CaiYLLDCLW24, author = {Liujia Cai and Tong Yu and Yumeng Li and Siqi Lu and Hanjie Dong and Guangying Cai and Guangsong Li and Yongjuan Wang}, title = {SyntaxBridge: Protocol Description Transformer for Enhanced Formal Analysis of Security Protocols}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {338--345}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00067}, doi = {10.1109/TRUSTCOM63139.2024.00067}, timestamp = {Tue, 05 Aug 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/CaiYLLDCLW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/CaoWL24, author = {Jingzhang Cao and Meng Wang and Shenao Lin}, title = {Rethinking Mutation Strategies in Fuzzing Smart Contracts}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {650--657}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00103}, doi = {10.1109/TRUSTCOM63139.2024.00103}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/CaoWL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChaiSGHL024, author = {Shuiliang Chai and Zhanhui Shi and Yanjiao Gao and Yuhao Huang and Aizhu Liu and Jie Xiao}, title = {{HTV:} Measuring Circuit Vulnerability to Hardware Trojan Insertion Based on Node Co-activation Analysis}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1589--1594}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00219}, doi = {10.1109/TRUSTCOM63139.2024.00219}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChaiSGHL024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChandranGV24, author = {Indu Chandran and Mukesh Narayana Gadde and Kizheppatt Vipin}, title = {FCSec: An Open-source Testbed for Security Evaluation on {UAV} Communications}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1217--1224}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00172}, doi = {10.1109/TRUSTCOM63139.2024.00172}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChandranGV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChangLZ024, author = {Shuaishuai Chang and Yuzhe Li and Jinchao Zhang and Bo Li}, title = {{T-ABE:} {A} practical {ABE} scheme to provide trustworthy key hosting on untrustworthy cloud}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {960--967}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00139}, doi = {10.1109/TRUSTCOM63139.2024.00139}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChangLZ024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChangWRCYFHGL24, author = {Yan Chang and Yaqin Wu and Jianwu Rui and Ming Cao and Yawei Yue and Yu Feng and Tingting He and Haihui Gao and Zhen Lv}, title = {Detection of Sensitive Information Based on Transient Data in Store Buffer and Cache}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1978--1982}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00274}, doi = {10.1109/TRUSTCOM63139.2024.00274}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChangWRCYFHGL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenGWLL24, author = {Dongbin Chen and Yunchuan Guo and Xiao Wang and Fenghua Li and Zifu Li}, title = {Orchestrating Security Protection Resource for Space-Ground Integrated Networks}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1171--1178}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00166}, doi = {10.1109/TRUSTCOM63139.2024.00166}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChenGWLL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenHSJJ24, author = {Yuchen Chen and Guanxiong Ha and Xuan Shan and Chunfu Jia and Qiaowen Jia}, title = {Scalable Client-side Encrypted Deduplication beyond Secret Sharing of the Master Key}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {453--460}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00080}, doi = {10.1109/TRUSTCOM63139.2024.00080}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChenHSJJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenKDLW24, author = {Ziyue Chen and He Kong and Shuai Ding and Quanfeng Lv and Guo Wei}, title = {Efficient DDoS Detection and Mitigation in Cloud Data Centers Using eBPF and {XDP}}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1869--1874}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00258}, doi = {10.1109/TRUSTCOM63139.2024.00258}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChenKDLW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenLGLK24, author = {Cao Chen and Fenghua Li and Yunchuan Guo and Zifu Li and Wenlong Kou}, title = {Efficiently Detecting DDoS in Heterogeneous Networks: {A} Parameter-Compressed Vertical Federated Learning approach}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {287--294}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00062}, doi = {10.1109/TRUSTCOM63139.2024.00062}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChenLGLK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenLRLFZ024, author = {Yongqiang Chen and Meiqi Liu and Jingfeng Rong and Xujie Liu and Anmin Fu and AnShun Zhou and Yuqing Zhang}, title = {Analysis of Data Export Business Processes Based on Petri Nets}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2486--2491}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00345}, doi = {10.1109/TRUSTCOM63139.2024.00345}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChenLRLFZ024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenML24, author = {Tongxi Chen and Weizhi Meng and Wenjuan Li}, title = {User Authentication Based on the Integration of Musical Signals and Ear Canal Acoustics}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {717--728}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00111}, doi = {10.1109/TRUSTCOM63139.2024.00111}, timestamp = {Tue, 03 Jun 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChenML24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenQQLJC24, author = {Tianang Chen and Haojie Qin and Jin Qian and Jun Luo and Yinghua Jiang and Liquan Chen}, title = {A cross-domain authentication scheme based on quantized trust relationship for smart grid}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2701--2708}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00376}, doi = {10.1109/TRUSTCOM63139.2024.00376}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChenQQLJC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenRFYFLZZ24, author = {Siyu Chen and Jingfeng Rong and Zhiyuan Fu and Qiuling Yue and Anmin Fu and Xujie Liu and Anshun Zhou and Yuqing Zhang}, title = {Research on Lifecycle-Driven Government Data Security Model and Data Grouping Technology}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2492--2497}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00346}, doi = {10.1109/TRUSTCOM63139.2024.00346}, timestamp = {Fri, 25 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChenRFYFLZZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenSMLZ24, author = {Liquan Chen and Yufan Song and Wanting Ma and Tianyu Lu and Peng Zhang}, title = {Phase Shift Matrix Optimization and Channel Quantization Alternating in RIS-Assisted Physical Layer Key Generation}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1179--1186}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00167}, doi = {10.1109/TRUSTCOM63139.2024.00167}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChenSMLZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenW024, author = {Yang Chen and Min Wu and Min Zhang}, title = {Abstraction-Based Training for Robust Classification Models via Image Pixelation}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1756--1761}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00241}, doi = {10.1109/TRUSTCOM63139.2024.00241}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChenW024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenWKGCK24, author = {Yongkang Chen and Tong Wang and Wei Kong and Taotao Gu and Guiling Cao and Xiaohui Kuang}, title = {Enhancing Adversarial Robustness through Self-Supervised Confidence-Based Denoising}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {750--758}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00115}, doi = {10.1109/TRUSTCOM63139.2024.00115}, timestamp = {Sat, 31 May 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChenWKGCK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenYG0DS24, author = {Meiling Chen and Yuanyuan Yang and Sixu Guo and Jin Cao and Haitao Du and Li Su}, title = {Signcryption based on Elliptic Curve {CL-PKC} for Low Earth Orbit Satellite Security Networking}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1029--1036}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00148}, doi = {10.1109/TRUSTCOM63139.2024.00148}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChenYG0DS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChengFLGHM24, author = {Yudan Cheng and Tao Feng and Zhiquan Liu and Xian Guo and Lulu Han and Jianfeng Ma}, title = {An Efficient and Privacy-Preserving Participant Selection Scheme based on Location in Mobile Crowdsensing}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1381--1388}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00192}, doi = {10.1109/TRUSTCOM63139.2024.00192}, timestamp = {Tue, 05 Aug 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChengFLGHM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/CofanoBD24, author = {Serena Cofano and Giacomo Benedetti and Matteo Dell'Amico}, title = {{SBOM} Generation Tools in the Python Ecosystem: an In-Detail Analysis}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {427--434}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00077}, doi = {10.1109/TRUSTCOM63139.2024.00077}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/CofanoBD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Cui0X24, author = {Yaxin Cui and Hong Xu and Zhichao Xu}, title = {Improved Rectangle and Linear Attacks on Lightweight Block Cipher {WARP}}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1797--1802}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00247}, doi = {10.1109/TRUSTCOM63139.2024.00247}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Cui0X24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/CuiZWZ0M24, author = {Jie Cui and Jing Zhang and Lu Wei and Minghui Zhu and Hong Zhong and Geyong Min}, title = {Multi-Authority Ciphertext-Policy Attribute-based Encryption with Hidden Policy for Securing Internet-of-Vehicles}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {213--221}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00054}, doi = {10.1109/TRUSTCOM63139.2024.00054}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/CuiZWZ0M24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DangNMD24, author = {Xiaocui Dang and Priyadarsi Nanda and Manoranjan Mohanty and Haiyu Deng}, title = {A Dual Defense Design Against Data Poisoning Attacks in Deep Learning-Based Recommendation Systems}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2115--2122}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00293}, doi = {10.1109/TRUSTCOM63139.2024.00293}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/DangNMD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DehlingKIF24, author = {Florian Dehling and Sebastian Koch and Luigi Lo Iacono and Hannes Federrath}, title = {You Are as You Type: Investigating the Influence of Timestamp Accuracy on the Robustness of Keystroke Biometrics}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {469--480}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00082}, doi = {10.1109/TRUSTCOM63139.2024.00082}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/DehlingKIF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DengDJWY0L24, author = {Haiyu Deng and Xiaocui Dang and Yanna Jiang and Xu Wang and Guangsheng Yu and Wei Ni and Ren Ping Liu}, title = {FedNIFW: Non-Interfering Fragmented Watermarking for Federated Deep Neural Network}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1719--1726}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00236}, doi = {10.1109/TRUSTCOM63139.2024.00236}, timestamp = {Fri, 25 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/DengDJWY0L24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DengWHT24, author = {Xin Deng and Rui Wang and Weihong Han and Zhihong Tian}, title = {Vulnerabilities are collaborating to compromise your system: {A} network risk assessment method based on cooperative game and attack graph}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {176--183}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00049}, doi = {10.1109/TRUSTCOM63139.2024.00049}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/DengWHT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DingG0W24, author = {Wenxiu Ding and Hongjiang Guo and Zheng Yan and Mingjun Wang}, title = {Secure Federated Learning Schemes Based on Multi-Key Homomorphic Encryption}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {551--558}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00091}, doi = {10.1109/TRUSTCOM63139.2024.00091}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/DingG0W24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DingLCC0W24, author = {Wenxiu Ding and Muzhi Liu and Yuxuan Cai and Mingxin Chen and Zheng Yan and Mingjun Wang}, title = {Zephyr: {A} High-Performance Framework for Graph Attention Networks on Heterogeneous Data}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {926--933}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00135}, doi = {10.1109/TRUSTCOM63139.2024.00135}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/DingLCC0W24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DingTWX024, author = {Zehua Ding and Youliang Tian and Guorong Wang and Jinbo Xiong and Jianfeng Ma}, title = {Membership Inference Attacks via Dynamic Adversarial Perturbations Reduction}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {842--849}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00126}, doi = {10.1109/TRUSTCOM63139.2024.00126}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/DingTWX024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DongLY24, author = {Xianghui Dong and Yin Liu and Xuejun Yu}, title = {Three-Body Problem: An Empirical Study on Smartphone-based TEEs, TEE-based Apps, and their Interactions}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {968--977}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00140}, doi = {10.1109/TRUSTCOM63139.2024.00140}, timestamp = {Mon, 19 May 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/DongLY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DongWWCTC24, author = {Runze Dong and Buhong Wang and Jiang Weng and Kunrui Cao and Jiwei Tian and Tianhao Cheng}, title = {Security Enhancement of {UAV} Swarm Empowered Downlink Transmission with Integrated Sensing and Communication}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1083--1089}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00155}, doi = {10.1109/TRUSTCOM63139.2024.00155}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/DongWWCTC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DuHLL024, author = {Meijie Du and Mingqi Hu and Shu Li and Zhao Li and Qingyun Liu}, title = {{SCENE:} Shape-based Clustering for Enhanced Noise-resilient Encrypted Traffic Classification}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {306--315}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00064}, doi = {10.1109/TRUSTCOM63139.2024.00064}, timestamp = {Fri, 25 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/DuHLL024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DuJZLZ24, author = {Haipeng Du and Muyan Jiao and Jiageng Zhang and Xin Lv and Jie Zhang}, title = {DualConvNet: Enhancing {CNN} Inference Efficiency Through Compressed Convolutions and Reparameterization}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2567--2574}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00358}, doi = {10.1109/TRUSTCOM63139.2024.00358}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/DuJZLZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DuKT24, author = {Ruizhong Du and Jiajia Kang and Jin Tian}, title = {Trusted Networking for Drones: Reputation-Based Security Mechanisms for Node Access and Information Synchronization}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {13--20}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00031}, doi = {10.1109/TRUSTCOM63139.2024.00031}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/DuKT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DuanSSH24, author = {Shuang Duan and Hui Shu and Zihan Sha and Yuyao Huang}, title = {{SBCM:} Semantic-Driven Reverse Engineering Framework for Binary Code Modularization}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1115--1124}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00159}, doi = {10.1109/TRUSTCOM63139.2024.00159}, timestamp = {Tue, 05 Aug 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/DuanSSH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DzikowskiKMNS24, author = {Bartlomiej Dzikowski and Lukasz Krzywiecki and Ksawery Mozdzynski and Karol Niczyj and Hannes Salin}, title = {Distributed Data Possession - Blockchain Based Scalability}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2523--2528}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00351}, doi = {10.1109/TRUSTCOM63139.2024.00351}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/DzikowskiKMNS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FanWFD24, author = {Qianyue Fan and Shiqian Wang and Zhe Feng and Li Di}, title = {MT-Index: {A} Trustworthy Index For Multimodal Data Sharing}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2547--2552}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00355}, doi = {10.1109/TRUSTCOM63139.2024.00355}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/FanWFD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FangHHZZ24, author = {Tao Fang and Zhihao Hou and Jiahao He and Junjie Zhou and Gansen Zhao}, title = {Hierarchical Graph Feature Extraction Based on Multi-Information Contract Graph for Enhanced Smart Contract Vulnerability Detection}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1604--1613}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00221}, doi = {10.1109/TRUSTCOM63139.2024.00221}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/FangHHZZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FangZDSSS24, author = {Zhou Fang and Kai Zhang and Yigang Diao and Yixuan Song and Yanwei Sun and Jinqiao Shi}, title = {Risk Assessment Based on Dataflow Dynamic Hypergraph for Cross-Border Data Transfer}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2504--2509}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00348}, doi = {10.1109/TRUSTCOM63139.2024.00348}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/FangZDSSS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FeldeA24, author = {Hendrik Meyer zum Felde and Andrei{-}Cosmin Aprodu}, title = {{MAXPOWR:} Memory Attestation and Export in Process-based Trusted Execution Environments}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1--12}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00030}, doi = {10.1109/TRUSTCOM63139.2024.00030}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/FeldeA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FengWXWZM24, author = {Beibei Feng and Qi Wang and Xiaolin Xu and Yijing Wang and Tianning Zang and Jingrun Ma}, title = {From Scarcity to Clarity: Few-Shot Learning for DoH Tunnel Detection Through Prototypical Network}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {418--426}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00076}, doi = {10.1109/TRUSTCOM63139.2024.00076}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/FengWXWZM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FengXL24, author = {Zheng Feng and Chunyu Xing and Chen Liang}, title = {Designing Secret Embedding Scheme Based on Bitcoin Transactions Pattern Controlling}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1007--1014}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00145}, doi = {10.1109/TRUSTCOM63139.2024.00145}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/FengXL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FrickG24, author = {Raphael Antonius Frick and Lukas Graner}, title = {Deepfakes: {A} New Kind of Adversarial Attacks Against Face Recognition Systems?}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2462--2467}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00341}, doi = {10.1109/TRUSTCOM63139.2024.00341}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/FrickG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FuCNL24, author = {Yu Fu and Bingcai Chen and Qian Ning and Kai Lin}, title = {Machine Learning-Based Power Allocation Optimization Algorithm for Enhanced {CR-NOMA} Network}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1857--1862}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00256}, doi = {10.1109/TRUSTCOM63139.2024.00256}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/FuCNL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Gao024, author = {Lijun Gao and Zheng Yan}, title = {CertRob: Detecting {PDF} Malware with Certified Adversarial Robustness via Randomization Smoothing}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {944--951}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00137}, doi = {10.1109/TRUSTCOM63139.2024.00137}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Gao024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GaoCZ0PP24, author = {Junqiao Gao and Chaklam Cheong and Mansi Zhang and Yue Cao and Tao Peng and Shahbaz Pervez}, title = {A Trust Model with Fitness-Based Clustering Scheme in FANETs}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {978--985}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00141}, doi = {10.1109/TRUSTCOM63139.2024.00141}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GaoCZ0PP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GaoGWZ24, author = {Guangming Gao and Shuitao Gan and Xiaofeng Wang and Shengkai Zhu}, title = {{LLMUZZ:} LLM-based seed optimization for black-box device fuzzing}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1209--1216}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00171}, doi = {10.1109/TRUSTCOM63139.2024.00171}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GaoGWZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GaoL24, author = {Zheng Gao and Hongping Li}, title = {{AI} empowered senstive information detection and anonymisation in {PDF} files}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2481--2485}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00344}, doi = {10.1109/TRUSTCOM63139.2024.00344}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GaoL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GaoSLWWZD24, author = {Qingyu Gao and Liantao Song and Yan Lei and Feng Wang and Lei Wang and Shize Zong and Yan Ding}, title = {Enhancing Consistency in Container Migration via {TEE:} {A} Secure Architecture}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {21--28}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00032}, doi = {10.1109/TRUSTCOM63139.2024.00032}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GaoSLWWZD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GaoXX24, author = {Longlong Gao and Tao Xue and Long Xi}, title = {{RTM-CMD:} Exploring Advanced Underground Target Detection in Coal Mines through Modified {RTMDET} Methodology}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2612--2618}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00364}, doi = {10.1109/TRUSTCOM63139.2024.00364}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GaoXX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GearXFGJS24, author = {Joseph Gear and Yue Xu and Ernest Foo and Praveen Gauravaram and Zahra Jadidi and Leonie Simpson}, title = {Contextual Transformer-based Node Embedding for Vulnerability Detection using Graph Learning}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2031--2038}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00282}, doi = {10.1109/TRUSTCOM63139.2024.00282}, timestamp = {Fri, 25 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GearXFGJS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GuZXW24, author = {Yonghao Gu and Xiaoqing Zhang and Hao Xu and Tiejun Wu}, title = {DyGCN: Dynamic Graph Convolution Network-based Anomaly Network Traffic Detection}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1838--1843}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00253}, doi = {10.1109/TRUSTCOM63139.2024.00253}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GuZXW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GuanDWYL24, author = {Qinchen Guan and Shaoyong Du and Kerong Wang and Chunfang Yang and Xiangyang Luo}, title = {A Framework for Detecting Hidden Partners in App Collusion}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {516--523}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00087}, doi = {10.1109/TRUSTCOM63139.2024.00087}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GuanDWYL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GuanHXZZ24, author = {Siyuan Guan and Ziheng Hu and Guotao Xu and Yao Zhu and Bowen Zhao}, title = {{MIND:} {A} Privacy-Preserving Model Inference Framework via End-Cloud Collaboration}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {582--589}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00095}, doi = {10.1109/TRUSTCOM63139.2024.00095}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GuanHXZZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GuanT0S024, author = {Zhujie Guan and Mengmeng Tian and Yuwei Xu and Kehui Song and Guang Cheng}, title = {{WCDGA:} BERT-Based and Character-Transforming Adversarial {DGA} with High Anti-Detection Ability}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {362--369}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00070}, doi = {10.1109/TRUSTCOM63139.2024.00070}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GuanT0S024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GuoLS0X24, author = {Chunpeng Guo and Beiyuan Liu and Zeyang Sun and Chen Chen and Sai Xu}, title = {Secure Microwave {QR} Code Communication Using Pseudo-Random Constellation Rotation}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2078--2083}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00288}, doi = {10.1109/TRUSTCOM63139.2024.00288}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GuoLS0X24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GuoSZLWL24, author = {Jun Guo and Minjuan Sun and Weiwei Zhang and Baoying Liu and Anwen Wang and Li Liu}, title = {Human Action Recognition by Invisible Sensing with the Constraint of Privacy Preservation}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2354--2359}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00325}, doi = {10.1109/TRUSTCOM63139.2024.00325}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GuoSZLWL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HanWLZS24, author = {Jiaqi Han and Dan Wang and Hong Luo and Ye Zhou and Bin Song}, title = {Hardware Latency-Aware Differential Architecture Search: Search for Latency-Friendly Architectures on Different Hardware}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2635--2643}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00367}, doi = {10.1109/TRUSTCOM63139.2024.00367}, timestamp = {Sun, 06 Jul 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HanWLZS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HaoK24, author = {Jiashun Hao and Young{-}Woo Kwon}, title = {Enhancing Graph-Based Vulnerability Detection through Standardized Deep Learning Pipelines}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1231--1238}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00174}, doi = {10.1109/TRUSTCOM63139.2024.00174}, timestamp = {Fri, 02 May 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HaoK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HaoLWLW24, author = {Xiaofei Hao and Liyuan Liu and Yimeng Wang and Fengyu Li and Wanqing Wu}, title = {Federated Knowledge-enhanced Graph Attention Network for Privacy-preserving Social Recommendation}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2084--2089}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00289}, doi = {10.1109/TRUSTCOM63139.2024.00289}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HaoLWLW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HaoZW24, author = {Yu Hao and Xu Zhang and Dongbin Wang}, title = {{CPCED:} a container escape detection system based on {CNI} plugin}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {242--253}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00057}, doi = {10.1109/TRUSTCOM63139.2024.00057}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HaoZW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HeFI24, author = {Yueyue He and Wenxuan Fan and Koji Inoue}, title = {{SPDID:} {A} Secure and Privacy-Preserving Decentralized Identity utilizing Blockchain and {PUF}}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1622--1631}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00223}, doi = {10.1109/TRUSTCOM63139.2024.00223}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HeFI24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HeZ24, author = {Zilong He and Hua Zhang}, title = {Learning Robust and Repeatable Physical Camouflage for Aerial Object Detectors}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1709--1718}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00235}, doi = {10.1109/TRUSTCOM63139.2024.00235}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HeZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HeZM024, author = {Feng He and Shijun Zhao and Dan Meng and Rui Hou}, title = {{MSMP:} {A} Centralized Shared-memory Management for Building Efficient and Reliable File Systems on Microkernels}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {37--48}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00034}, doi = {10.1109/TRUSTCOM63139.2024.00034}, timestamp = {Thu, 24 Jul 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HeZM024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HongGA024, author = {Liang Hong and Xingguo Guo and Zeyar Aung and Wei Hu}, title = {Robust Hardware Trojan Detection: Conventional Machine Learning vs. Graph Learning Approaches}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1572--1579}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00217}, doi = {10.1109/TRUSTCOM63139.2024.00217}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HongGA024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HongYZZ24, author = {Quan Hong and Yang Yu and Lvyang Zhang and Lidong Zhai}, title = {Active Defense Research: {A} New Perspective Integrating Traps and Vulnerabilities}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1225--1230}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00173}, doi = {10.1109/TRUSTCOM63139.2024.00173}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HongYZZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HookerHKVC24, author = {Adam L. Hooker and Wenjian Huang and Shalini Kapali Kurumathur and Nishant Vishwamitra and Kim{-}Kwang Raymond Choo}, title = {Towards Understanding and Detecting File Types in Encrypted Files for Law Enforcement Applications}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1522--1527}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00210}, doi = {10.1109/TRUSTCOM63139.2024.00210}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HookerHKVC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HossainHBYRZ024, author = {Tahrim Hossain and Sakib Hassan and Faisal Haque Bappy and Muhammad Nur Yanhaona and Sarker T. Ahmed Rumee and Moinul Islam Zaber and Tariqul Islam}, title = {FlexiContracts: {A} Novel and Efficient Scheme for Upgrading Smart Contracts in Ethereum Blockchain}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2316--2321}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00319}, doi = {10.1109/TRUSTCOM63139.2024.00319}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HossainHBYRZ024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Hou0WZCL24, author = {Chengqi Hou and Wei Yang and Yu Wang and Zhiming Zhang and Shaolong Chen and Beibei Li}, title = {A Multi-Blockchain Based Anonymous Cross-Domain Authentication Scheme for Industrial Internet of Things}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1125--1134}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00160}, doi = {10.1109/TRUSTCOM63139.2024.00160}, timestamp = {Wed, 06 Aug 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Hou0WZCL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HouHZZJ24, author = {Jie Hou and Zengrui Huang and Zhiyong Zhang and Wei Zhang and Lei Ju}, title = {A GPU-Based Privacy-Preserving Machine Learning Acceleration Scheme}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {880--887}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00130}, doi = {10.1109/TRUSTCOM63139.2024.00130}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HouHZZJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HouZ0LW24, author = {Ruiwei Hou and Fucai Zhou and Zongye Zhang and Jiacheng Li and Chongyang Wang}, title = {{CFB-DSSE:} Efficient Secure Dynamic Searchable Encryption Scheme with Conjunctive Search for Smart Healthcare}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2142--2150}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00296}, doi = {10.1109/TRUSTCOM63139.2024.00296}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HouZ0LW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HuCB00ZY24, author = {Xiaowei Hu and Haoning Chen and Huaifeng Bao and Wen Wang and Feng Liu and Guoqiao Zhou and Peng Yin}, title = {A LLM-based agent for the automatic generation and generalization of {IDS} rules}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1875--1880}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00259}, doi = {10.1109/TRUSTCOM63139.2024.00259}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HuCB00ZY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HuL24, author = {Wenjv Hu and Yin Li}, title = {An Efficient and Secure Anonymous Query Protocol}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2151--2158}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00297}, doi = {10.1109/TRUSTCOM63139.2024.00297}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HuL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HuLXMJH24, author = {Jiekang Hu and Yakai Li and Zhaoxi Xiang and Luping Ma and Xiaoqi Jia and Qingjia Huang}, title = {{LLM4MDG:} Leveraging Large Language Model to Construct Microservices Dependency Graph}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {859--869}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00128}, doi = {10.1109/TRUSTCOM63139.2024.00128}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HuLXMJH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Hua0X24, author = {Ying Hua and Hui Xia and Shuo Xu}, title = {Federated Unlearning for Samples Based on Adaptive Gradient Ascent of Angles}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {834--841}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00125}, doi = {10.1109/TRUSTCOM63139.2024.00125}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Hua0X24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Huang00LMZ024, author = {Xiaoran Huang and Yiwen Gao and Wei Cheng and Yuejun Liu and Jingdian Ming and Yongbin Zhou and Jian Weng}, title = {Towards High-Quality Electromagnetic Leakage Acquisition in Side-Channel Analysis}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {370--377}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00071}, doi = {10.1109/TRUSTCOM63139.2024.00071}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Huang00LMZ024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Huang0LWLY24, author = {Weiguo Huang and Yong Ding and Jun Li and Yujue Wang and Hai Liang and Changsong Yang}, title = {{SAMOC:} Enabling Atomic Invocations for Cross-chain Crowdsourcing Testing DApps in Industrial Control Through Trusted Smart Community and Lock Mechanism}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1803--1808}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00248}, doi = {10.1109/TRUSTCOM63139.2024.00248}, timestamp = {Thu, 01 May 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Huang0LWLY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HuangDH24, author = {Yijie Huang and Wei Ding and Mian Huang}, title = {Malware Traffic Classification Based on Multidimensional Features Learning}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1963--1971}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00272}, doi = {10.1109/TRUSTCOM63139.2024.00272}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HuangDH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HuangGHH24, author = {Haishi Huang and Jiaping Gui and Jianan Hong and Cunqing Hua}, title = {{HFL-AD:} {A} Hierarchical Federated Learning Framework for Solving Data Contamination in DDoS Detection}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2376--2381}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00328}, doi = {10.1109/TRUSTCOM63139.2024.00328}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HuangGHH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HuangL0B24, author = {Mengdie Huang and Yingjun Lin and Xiaofeng Chen and Elisa Bertino}, title = {{MARS:} Robustness Certification for Deep Network Intrusion Detectors via Multi-Order Adaptive Randomized Smoothing}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {767--774}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00117}, doi = {10.1109/TRUSTCOM63139.2024.00117}, timestamp = {Thu, 01 May 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HuangL0B24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HuangLCL24, author = {Xiaodong Huang and Gangliang Li and Chengfeng Chen and Shouqiang Liu}, title = {{DMPA:} {A} Compact and Effective Pipeline for Detecting Multiple Phishing Attacks}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1701--1708}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00234}, doi = {10.1109/TRUSTCOM63139.2024.00234}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HuangLCL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HuangLYYWMJ24, author = {Xinyu Huang and Xingxing Liao and Jie Yang and Wei You and Wenhao Wu and Shiru Min and Xinsheng Ji}, title = {5G-PPDE: {A} Novel Adaptive Scaling Framework for Enhancing the Resilience of the 5G Cloud Core Network}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2025--2030}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00281}, doi = {10.1109/TRUSTCOM63139.2024.00281}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HuangLYYWMJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HuoLZAHKZLWLLM24, author = {Haowei Huo and Ting Lv and Ningbo Zhao and Gefan Ai and Qi He and Ying Kong and Yu Zhang and Yiwei Li and Jiangyao Wei and Chen Liu and Yuan Liu and Lichuan Ma}, title = {Fraud Detection in Supply Chain Order Management via Kolmogorov-Arnold Networks}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2598--2605}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00362}, doi = {10.1109/TRUSTCOM63139.2024.00362}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HuoLZAHKZLWLLM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HussainP24, author = {Ahmed Mohamed Hussain and Panos Papadimitratos}, title = {Privacy-Preserving Secure Neighbor Discovery for Wireless Networks}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1310--1319}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00184}, doi = {10.1109/TRUSTCOM63139.2024.00184}, timestamp = {Sat, 31 May 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HussainP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/IgnasiakKKNSZ24, author = {Kewin Ignasiak and Wojciech Kowalczyk and Lukasz Krzywiecki and Mateusz Nasewicz and Hannes Salin and Marcin Zawada}, title = {Privacy-Preserving Real-Time Gesture Recognition using Cloud-Trained Neural Networks}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2388--2393}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00330}, doi = {10.1109/TRUSTCOM63139.2024.00330}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/IgnasiakKKNSZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JeonKK24, author = {Jong{-}Hee Jeon and Jahoon Koo and Young{-}Gab Kim}, title = {RAG-based Cyber Threat Tracing Graph Modeling Method}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {608--615}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00098}, doi = {10.1109/TRUSTCOM63139.2024.00098}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/JeonKK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JiE24, author = {Yi Ji and Isao Echizen}, title = {StrucTrans: Zero-Query Structural Adversarial Attack Transferred from Masked Autoencoders to Image Classifiers}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {870--879}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00129}, doi = {10.1109/TRUSTCOM63139.2024.00129}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/JiE24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JiaYM24, author = {Wenxin Jia and Zheng Yang and Zhiqiang Ma}, title = {Lightweight Leakage-Resilient Authenticated Key Exchange for Industrial Internet of Things}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1051--1059}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00151}, doi = {10.1109/TRUSTCOM63139.2024.00151}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/JiaYM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JiangH24, author = {Zhuochen Jiang and Baojian Hua}, title = {WaShadow: Effectively Protecting WebAssembly Memory Through Virtual Machine-Aware Shadow Memory}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {222--233}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00055}, doi = {10.1109/TRUSTCOM63139.2024.00055}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/JiangH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JiangLWH24, author = {Hao Jiang and Haiwei Lai and Si Wu and Baojian Hua}, title = {JasFree: Grammar-free Program Analysis for JavaScript Bytecode}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {326--337}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00066}, doi = {10.1109/TRUSTCOM63139.2024.00066}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/JiangLWH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JiangZZJT24, author = {Nan Jiang and Yuanbo Zhao and Qihang Zhou and Xiaoqi Jia and Jing Tang}, title = {SeChannel: {A} Secure and Lightweight Channel Protection Approach for {TEE} Systems}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {77--84}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00038}, doi = {10.1109/TRUSTCOM63139.2024.00038}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/JiangZZJT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JinCPF24, author = {Chen Jin and Xi Chen and Junyu Pu and Boyu Fan}, title = {Research on distributed machine learning defence strategies under Byzantine attacks}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2715--2721}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00378}, doi = {10.1109/TRUSTCOM63139.2024.00378}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/JinCPF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JinWYWHZ24, author = {Mingxin Jin and Cong Wang and Shanglin Yang and Heng Wang and Ju Huang and Jun Zhao}, title = {Multi-Scale Fuzzy Graph Convolutional Network for Hyperspectral Image Classification}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2606--2611}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00363}, doi = {10.1109/TRUSTCOM63139.2024.00363}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/JinWYWHZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Jing0HP24, author = {Jiuyao Jing and Yu Zheng and Qi He and Chunlei Peng}, title = {Face Anti-spoofing based on Multi-modal Dual-stream Anomaly Detection}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {157--164}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00047}, doi = {10.1109/TRUSTCOM63139.2024.00047}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Jing0HP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JingZZW24, author = {Wangyuan Jing and Chi Zhang and Bingbing Zhang and Lingbo Wei}, title = {{CVALLM:} {A} Cloud Platform Security Assessment Framework Based on Large Language Models}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2039--2044}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00283}, doi = {10.1109/TRUSTCOM63139.2024.00283}, timestamp = {Wed, 28 May 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/JingZZW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JuZ0QP24, author = {Keyi Ju and Hui Zhong and Xinyue Zhang and Xiaoqi Qin and Miao Pan}, title = {Controllable Quantum Computing Privacy via Inherent Noises and Quantum Error Mitigation}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {443--452}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00079}, doi = {10.1109/TRUSTCOM63139.2024.00079}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/JuZ0QP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KimKK24, author = {Deok{-}Han Kim and Yujun Kim and Young{-}Gab Kim}, title = {A Method for Quantitative Object De-Identification Analysis of Anonymized Video}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2221--2226}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00306}, doi = {10.1109/TRUSTCOM63139.2024.00306}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/KimKK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KimKK24a, author = {Yujun Kim and Deok{-}Han Kim and Young{-}Gab Kim}, title = {Transfer Learning-Based Robust Insider Threat Detection}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2287--2292}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00315}, doi = {10.1109/TRUSTCOM63139.2024.00315}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/KimKK24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KimY24, author = {Youbin Kim and Man{-}Ki Yoon}, title = {WhisperMQTT: Lightweight Secure Communication Scheme for Subscription-Heavy {MQTT} Network}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1276--1285}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00180}, doi = {10.1109/TRUSTCOM63139.2024.00180}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/KimY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KouYCZ24, author = {Xiaoyong Kou and Wei Yang and Peijin Cong and Gongxuan Zhang}, title = {Multi-Channel Leakage Detection Based on {\(\chi\)}\({}^{\mbox{2}}\) Test of Independence}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {734--741}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00113}, doi = {10.1109/TRUSTCOM63139.2024.00113}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/KouYCZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KrudsenL24, author = {Steven Krudsen and Wenjuan Li}, title = {Your Data is Leaking! An Empirical Study of User Habits during Smartphone Charging}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2619--2626}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00365}, doi = {10.1109/TRUSTCOM63139.2024.00365}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/KrudsenL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KrzywieckiKNS24, author = {Lukasz Krzywiecki and Tadeusz Kulczycki and Christian Emmanuel Nteranya and Andrzej Stos}, title = {Detectable Mislabeling - Can Faulty {AI} Models be Recognized from Incomplete Memory Traces?}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2382--2387}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00329}, doi = {10.1109/TRUSTCOM63139.2024.00329}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/KrzywieckiKNS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KrzywieckiSZ24, author = {Lukasz Krzywiecki and Krzysztof Szymaniak and Marcin Zawada}, title = {Privacy Preservation in Cloud-Based Distributed Learning through Data Encoding and Partitioning}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2424--2429}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00335}, doi = {10.1109/TRUSTCOM63139.2024.00335}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/KrzywieckiSZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LaiW0Z24, author = {Yuefeng Lai and Lizhao Wu and Hui Lin and Xiaokang Zhou}, title = {Defending Against Backdoor Attacks through Causality-Augmented Diffusion Models for Dataset Purification}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {850--858}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00127}, doi = {10.1109/TRUSTCOM63139.2024.00127}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LaiW0Z24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LaiXZJWBSZ24, author = {Zhenyu Lai and Yijia Xu and Jialei Zhang and Bowen Jia and Liangyan Wang and Qinglei Bu and Jie Sun and Quan Zhang}, title = {Multi-sensor Fusion-based Cow Health Monitoring IoT System}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2669--2674}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00371}, doi = {10.1109/TRUSTCOM63139.2024.00371}, timestamp = {Fri, 25 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LaiXZJWBSZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LanGGFLC24, author = {Zejun Lan and Jianfeng Guan and Xianming Gao and Tao Feng and Kexian Liu and Jianbang Chen}, title = {{DTAME:} {A} Interpretable and Efficient Approach for {ABAC} Policy Mining and Evaluation Using Decision Trees}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1989--1997}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00276}, doi = {10.1109/TRUSTCOM63139.2024.00276}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LanGGFLC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LandauerMSWK24, author = {Max Landauer and Klaus Mayer and Florian Skopik and Markus Wurzenberger and Manuel Kern}, title = {Red Team Redemption: {A} Structured Comparison of Open-Source Tools for Adversary Emulation}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {117--128}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00043}, doi = {10.1109/TRUSTCOM63139.2024.00043}, timestamp = {Sat, 31 May 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LandauerMSWK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LavernelleBGS24, author = {Jean de Bonfils Lavernelle and Pierre{-}Fran{\c{c}}ois Bonnefoi and Beno{\^{\i}}t Gonzalvo and Damien Sauveron}, title = {{DMA:} {A} Persistent Threat to Embedded Systems Isolation}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {101--108}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00041}, doi = {10.1109/TRUSTCOM63139.2024.00041}, timestamp = {Thu, 01 May 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LavernelleBGS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LeiGC24, author = {Jiaqi Lei and Ke Gu and Long Cai}, title = {A Lightweight Privacy-Preserving and Verifiable Federated Learning-Based Protocol}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2394--2399}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00331}, doi = {10.1109/TRUSTCOM63139.2024.00331}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LeiGC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LengLYYZH24, author = {Tao Leng and Junyi Liu and Zhen Yang and Chang You and Yutong Zeng and Cheng Huang}, title = {{SGCML:} Detecting Hacker Community Hidden in Chat Group}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1910--1915}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00264}, doi = {10.1109/TRUSTCOM63139.2024.00264}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LengLYYZH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LengYLLZH24, author = {Tao Leng and Chang You and Shuangchun Luo and Junyi Liu and Yutong Zeng and Cheng Huang}, title = {GraySniffer: {A} Cliques Discovering Method for Illegal {SIM} Card Vendor Based on Multi-Source Data}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {316--325}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00065}, doi = {10.1109/TRUSTCOM63139.2024.00065}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LengYLLZH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Li0JS24, author = {Jiayi Li and Ke Xu and Xinghao Jiang and Tanfeng Sun}, title = {Sparse Silhouette Jump: Adversarial Attack Targeted at Binary Image for Gait Privacy Protection}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1336--1342}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00187}, doi = {10.1109/TRUSTCOM63139.2024.00187}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Li0JS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Li0Z24, author = {Jing Li and Tao Sun and Wenjie Zhong}, title = {{ASK-LTL} Checker: {A} Tailored Model Checker for Linear Temporal Logic of {CPN} State Space}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1825--1831}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00251}, doi = {10.1109/TRUSTCOM63139.2024.00251}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Li0Z24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiCZPYH24, author = {Bin Li and Li Cheng and Zhongshan Zhang and Yu Pan and Feng Yao and Renjie He}, title = {{LAPAID:} {A} Lightweight, Adaptive and Perspicacious Active Intrusion Detection Method on Network Traffic Streams}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1268--1275}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00179}, doi = {10.1109/TRUSTCOM63139.2024.00179}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiCZPYH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiDG24, author = {Rui Li and Wenrui Diao and Debin Gao}, title = {Custom Permission Misconfigurations in Android: {A} Large-Scale Security Analysis}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1161--1170}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00165}, doi = {10.1109/TRUSTCOM63139.2024.00165}, timestamp = {Fri, 04 Jul 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiDG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiFSY24, author = {Yue Li and Runcheng Fang and Qipeng Song and Xilei Yang}, title = {STGCN-Based Link Flooding Attack Detection and Mitigation in Software-Defined Network}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {346--353}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00068}, doi = {10.1109/TRUSTCOM63139.2024.00068}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiFSY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiGZYG24, author = {Weihao Li and Yongbing Gao and Yu Zhang and Lidong Yang and Ruiping Gao}, title = {Research on Toxic Speech Detection Based on Large Language Models}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2191--2196}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00302}, doi = {10.1109/TRUSTCOM63139.2024.00302}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiGZYG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiHL24, author = {Yuliang Li and Zhonglin Hou and Hong Liu}, title = {Large Language Model and Behaviour Tree Based Real-World Test Scenario Generation for Autonomous Vehicles}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1770--1775}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00243}, doi = {10.1109/TRUSTCOM63139.2024.00243}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiHL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiHMSHL24, author = {Kaiyuan Li and Haruka Hirata and Daiki Miyahara and Kazuo Sakiyama and Yuko Hara and Yang Li}, title = {Multiplicative Masked M{\&}M: An Attempt at Combined Countermeasures with Reduced Randomness}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {726--733}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00112}, doi = {10.1109/TRUSTCOM63139.2024.00112}, timestamp = {Sat, 31 May 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiHMSHL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiLS024, author = {Pengfei Li and Yujing Liu and Jinshu Su and Bo Yu}, title = {ConfigKG: Identify Routing Security Issues from Configurations Based on Knowledge Graph}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1060--1069}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00152}, doi = {10.1109/TRUSTCOM63139.2024.00152}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiLS024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiLXY24, author = {Chengyu Li and Weihai Li and Zikai Xu and Nenghai Yu}, title = {StegaFDS: Generative Steganography Based on First-Order DPM-Solver}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {109--116}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00042}, doi = {10.1109/TRUSTCOM63139.2024.00042}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiLXY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiLYZ24, author = {Zehao Li and Jiachun Liao and Jinhao Yu and Lei Zhang}, title = {{THEF:} {A} Privacy-Preserving Framework for Transformer Inference leveraging {HE} and {TEE}}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1693--1700}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00233}, doi = {10.1109/TRUSTCOM63139.2024.00233}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiLYZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiNCGHZ24, author = {Mingyang Li and Weina Niu and Xinglong Chen and Jiacheng Gong and Kegang Hao and Xiaosong Zhang}, title = {Enabling Robust Android Malicious Packet Capturing and Detection via Android Kernel}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1022--1028}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00147}, doi = {10.1109/TRUSTCOM63139.2024.00147}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiNCGHZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiQWG24, author = {Haocheng Li and Haipeng Qu and Gaozhou Wang and Xiangjian Ge}, title = {EffiTaint: Boosting Sensitive Data Tracking with Accurate Taint Behavior Modeling and Efficient Access Path Optimization}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1397--1404}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00194}, doi = {10.1109/TRUSTCOM63139.2024.00194}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiQWG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiWGD24, author = {Xiaoshuang Li and Mingjun Wang and Yilong Guo and Wenxiu Ding}, title = {AdaptFL: Adaptive Client Task Allocation-Based Synchronous Federated Learning}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {616--623}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00099}, doi = {10.1109/TRUSTCOM63139.2024.00099}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiWGD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiWLWWC24, author = {Xu Li and Yinghao Wu and Yang Liu and Baosheng Wang and Bei Wang and Yijun Cui}, title = {Lattice-based Multi-Stage Secret Sharing 3D Secure Encryption Scheme}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {279--286}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00061}, doi = {10.1109/TRUSTCOM63139.2024.00061}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiWLWWC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiWW24, author = {Yingjian Li and Yongsheng Wang and Gang Wang}, title = {DDF-Net: {A} Cloud Computing Load Forecasting Method Integrating Spatiotemporal and Time-Frequency Domain Information}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2368--2375}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00327}, doi = {10.1109/TRUSTCOM63139.2024.00327}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiWW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiYTP24, author = {Guanghan Li and Wenzhong Yang and Xiaodan Tian and Jiaren Peng}, title = {{DUDPA-TATD:} {A} Lightweight Privacy-Preserving Anomaly Traffic Detection Method for Edge Computing Scenarios}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1741--1748}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00239}, doi = {10.1109/TRUSTCOM63139.2024.00239}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiYTP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiZLG24, author = {Chenyu Li and Xiu Zhang and Xueping Liang and Xiaorui Gong}, title = {{LSD} Attack: Exploiting Inconsistencies between Design and Implementation of Ethereum Protocols}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1045--1050}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00150}, doi = {10.1109/TRUSTCOM63139.2024.00150}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiZLG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiZZSJLHZ24, author = {Yilong Li and Jianyi Zhang and Ziyin Zhou and Zezheng Sun and Xu Ji and Zeping Li and Jiameng Han and Zhangchi Zhao}, title = {D\({}^{\mbox{2}}\)FL: Dimensional Disaster-oriented Backdoor Attack Defense Of Federated Learning}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1790--1796}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00246}, doi = {10.1109/TRUSTCOM63139.2024.00246}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiZZSJLHZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiZZZ24, author = {Jun Li and Yuting Zhang and Wu Zhou and Shengzhi Zhang}, title = {Exploring Permission Control Flaws in Mini-apps}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1935--1941}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00268}, doi = {10.1109/TRUSTCOM63139.2024.00268}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiZZZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LianLWZ24, author = {Xinglin Lian and Yang Liu and Shanfeng Wang and Yu Zheng}, title = {Payload Level Anomaly Network Traffic Detection via Semi-Supervised Contrastive Learning}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2559--2566}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00357}, doi = {10.1109/TRUSTCOM63139.2024.00357}, timestamp = {Thu, 01 May 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LianLWZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Liang024, author = {Chuang Liang and Jie Huang}, title = {Attack Data is Not Solely Paramount: {A} Universal Model Extraction Enhancement Method}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1666--1674}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00229}, doi = {10.1109/TRUSTCOM63139.2024.00229}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Liang024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiangDCLC24, author = {Yan Liang and Xin Dong and Song Chen and Zhengda Li and Zhimin Chang}, title = {A corrected method for parameters in the signal propagation model}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2686--2693}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00374}, doi = {10.1109/TRUSTCOM63139.2024.00374}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiangDCLC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LinYL0Y24, author = {Jianbo Lin and Lin Yan and Zhi Lin and Zan Zhou and Shujie Yang}, title = {ClusterX: Adaptive Collaborative Scheduling of Layered User-Proxy Mapping to Enhance DDoS Defense in Distributed Clusters}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {636--642}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00101}, doi = {10.1109/TRUSTCOM63139.2024.00101}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LinYL0Y24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Liu0FZ24, author = {Yuming Liu and Wei Cheng and Jihao Fan and Yongbin Zhou}, title = {Towards Securing {ASCON} Implementation by Inner Product Masking}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1255--1260}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00177}, doi = {10.1109/TRUSTCOM63139.2024.00177}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Liu0FZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Liu24, author = {Yin Liu}, title = {A Quiet Place: An In-Depth Study of Mobile Public-to-Private Attacks}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1405--1412}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00195}, doi = {10.1109/TRUSTCOM63139.2024.00195}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Liu24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuCZYRZSYZ24, author = {Meiqi Liu and Yongqiang Chen and Chaoyang Zhu and Shuang Yao and Jingfeng Rong and Xiaolong Zhao and Xijuan Si and Guang Yang and Yuqing Zhang}, title = {A review of data security research in energy storage systems}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2498--2503}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00347}, doi = {10.1109/TRUSTCOM63139.2024.00347}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiuCZYRZSYZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuFDLP024, author = {Jia Liu and Wenjun Fan and Yifan Dai and Enggee Lim and Zhoujin Pan and Alexei Lisitsa}, title = {Leveraging Semi-supervised Learning for Enhancing Anomaly-based {IDS} in Automotive Ethernet}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1563--1571}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00216}, doi = {10.1109/TRUSTCOM63139.2024.00216}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiuFDLP024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuGWZZL24, author = {Haiying Liu and Ruichun Gu and Jingyu Wang and Xiaolin Zhang and Bolin Zhang and Xuebao Li}, title = {Local Drift Correction and Attention Aggregation for Self-Organized Federated Learning}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {818--825}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00123}, doi = {10.1109/TRUSTCOM63139.2024.00123}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiuGWZZL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuHSY24, author = {Zhen Liu and Changzhen Hu and Chun Shan and Junkai Yi}, title = {BedIDS: An Effective Network Anomaly Detection Method by Fusing Behavior Evolution characteristics}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1534--1540}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00212}, doi = {10.1109/TRUSTCOM63139.2024.00212}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiuHSY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuTZ24, author = {Jihong Liu and Chenyang Tu and Yifei Zhang}, title = {Hardware assisted security gateway system: combined with {FPGA} shielding protection}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {85--92}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00039}, doi = {10.1109/TRUSTCOM63139.2024.00039}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiuTZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuWLLYF24, author = {Jianwei Liu and Wei Wan and Chun Long and Jing Li and Fan Yang and Yuhao Fu}, title = {{ZKFDT:} {A} Fair Exchange Scheme for Data Trading Based on Efficient Zero-Knowledge Proofs}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2197--2206}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00303}, doi = {10.1109/TRUSTCOM63139.2024.00303}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiuWLLYF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuWMD24, author = {Wenlong Liu and Bin Wen and Mengshuai Ma and Wanrong Du}, title = {Network Traffic Anomaly Detection Method Based on CTA-BiLSTM}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1195--1200}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00169}, doi = {10.1109/TRUSTCOM63139.2024.00169}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiuWMD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuWZ24, author = {Yuan Liu and Licheng Wang and Yongbin Zhou}, title = {New Compact Construction of {FHE} from Cyclic Algebra {LWE}}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {643--649}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00102}, doi = {10.1109/TRUSTCOM63139.2024.00102}, timestamp = {Sun, 06 Jul 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiuWZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuWZXLSLC24, author = {Xin Liu and Rui Wang and Pengfeng Zhang and Liang Xie and Yiliang Liu and Zhou Su and Donglan Liu and Yingxian Chang}, title = {Long-Term Privacy-Preserving Incentive Scheme Design for Federated Learning}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2709--2714}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00377}, doi = {10.1109/TRUSTCOM63139.2024.00377}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiuWZXLSLC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuXHMLYZ24, author = {Xinlei Liu and Jichao Xie and Tao Hu and Hailong Ma and Baolin Li and Peng Yi and Zhen Zhang}, title = {Robust purification defense for transfer attacks based on probabilistic scheduling algorithm of pre-trained models: {A} model difference perspective}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1776--1783}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00244}, doi = {10.1109/TRUSTCOM63139.2024.00244}, timestamp = {Mon, 07 Jul 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiuXHMLYZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LohmollerSKWHP24, author = {Johannes Lohm{\"{o}}ller and Jannis Scheiber and Rafael Kramann and Klaus Wehrle and Sikander Hayat and Jan Pennekamp}, title = {scE(match): Privacy-Preserving Cluster Matching of Single-Cell Data}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2123--2132}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00294}, doi = {10.1109/TRUSTCOM63139.2024.00294}, timestamp = {Sat, 31 May 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LohmollerSKWHP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LuLDT24, author = {Yongwei Lu and Xiaoyan Liang and Ruizhong Du and Junfeng Tian}, title = {{OFLGI:} An Optimization-based Feature-Level Gradient Inversion Attack}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {197--204}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00052}, doi = {10.1109/TRUSTCOM63139.2024.00052}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LuLDT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LuMFCDZ24, author = {Zhenghao Lu and Ding Ma and Lei Fan and Xiuzhen Chen and Yongshuai Duan and Jia Zhang}, title = {A Universally Composable Key Management System Using Trusted Hardware}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1681--1686}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00231}, doi = {10.1109/TRUSTCOM63139.2024.00231}, timestamp = {Thu, 15 May 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LuMFCDZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LuYLK24, author = {Liming Lu and Zhenlin Yu and Peter Kok Keong Loh and Tuhin Isfaque Al Kaderi}, title = {Investigating Patterns of Adversarial Techniques for Cyberattack Forensics}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2262--2268}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00312}, doi = {10.1109/TRUSTCOM63139.2024.00312}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LuYLK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LuYWD024, author = {Chaohe Lu and Zhongyuan Yu and Guijuan Wang and Anming Dong and Xiang Tian}, title = {A Blockchain-based {PHR} Sharing Scheme with Attribute Privacy Protection}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2068--2077}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00287}, doi = {10.1109/TRUSTCOM63139.2024.00287}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LuYWD024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LuZWCZ24, author = {Juncheng Lu and Yiyang Zhao and Yan Wang and Jiyuan Cui and Sanfeng Zhang}, title = {{BWG:} An {IOC} Identification Method for Imbalanced Threat Intelligence Datasets}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1187--1194}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00168}, doi = {10.1109/TRUSTCOM63139.2024.00168}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LuZWCZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LvSC24, author = {Yaru Lv and Lijun Sun and Xiao Chen}, title = {{FMTD:} Federated Learning-Based Multi-Angle Feature Fusion Framework for Abnormal Transaction Detection in Digital Currency}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2418--2423}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00334}, doi = {10.1109/TRUSTCOM63139.2024.00334}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LvSC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LyuKCW24, author = {Guangfa Lyu and Jian Kong and Yinglong Chen and Fengyu Wang}, title = {{CTWF:} Website Fingerprinting Attack based on Compact Convolutional Transformer}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {57--67}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00036}, doi = {10.1109/TRUSTCOM63139.2024.00036}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LyuKCW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LyuMM24, author = {Yilun Lyu and Xu Ma and Yuan Ma}, title = {Backdoor Attacks Optimized through Genetic Algorithm-Driven Data Augmentation Combinations in Deep Neural Networks}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2430--2435}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00336}, doi = {10.1109/TRUSTCOM63139.2024.00336}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LyuMM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MaJWIS24, author = {Yizhou Ma and Xikun Jiang and Evan W. Wu and Luis{-}Daniel Ib{\'{a}}{\~{n}}ez and Jian Shi}, title = {Model-based Data Markets: {A} Multi-Broker Game Theoretic Approach}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2293--2301}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00316}, doi = {10.1109/TRUSTCOM63139.2024.00316}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/MaJWIS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MaS0CLH24, author = {Yuan Ma and Maosen Sun and Wei Wang and Tianyu Chen and Na Lv and Dongchi Han}, title = {Efficient and Accurate Min-entropy Estimation Based on Decision Tree for Random Number Generators}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {707--716}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00110}, doi = {10.1109/TRUSTCOM63139.2024.00110}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/MaS0CLH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MahdaviAA24, author = {Mahdi Mahdavi and Navid Abapour and Zahra Ahmadian}, title = {Trustworthy Approaches to {RSA:} Efficient Exploitation Strategies Based on Common Modulus}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2535--2540}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00353}, doi = {10.1109/TRUSTCOM63139.2024.00353}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/MahdaviAA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MengLLZY24, author = {Xutao Meng and Qingming Li and Yong Li and Li Zhou and Xiaoran Yan}, title = {FedSGProx: Mitigating Data Heterogeneity and Isolated Nodes in Graph Federated Learning}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1000--1006}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00144}, doi = {10.1109/TRUSTCOM63139.2024.00144}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/MengLLZY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MengWLL24, author = {Shengzhe Meng and Xiaodong Wang and Zijie Lu and Bei Liang}, title = {Efficient and Practical Multi-party Private Set Intersection Cardinality Protocol}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1371--1380}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00191}, doi = {10.1109/TRUSTCOM63139.2024.00191}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/MengWLL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MengY24, author = {Xiangyu Meng and Xuejun Yu}, title = {Trustworthy Analysis of Drain3-based Cold Storage Behavior in Judicial Depository Scenarios}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1809--1816}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00249}, doi = {10.1109/TRUSTCOM63139.2024.00249}, timestamp = {Mon, 19 May 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/MengY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Ming0ZHZ24, author = {Jianhui Ming and Weiping Wang and Linlin Zhang and Yingjie Hu and Shigeng Zhang}, title = {IoT Device Fingerprinting From Periodic Traffic Using Locality-Sensitive Hashing}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1904--1909}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00263}, doi = {10.1109/TRUSTCOM63139.2024.00263}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Ming0ZHZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MishraBBP24, author = {Pooja Mishra and Paul Black and Adil Bagirov and Shaoning Pang}, title = {Discriminating Malware Families using Partitional Clustering}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2256--2261}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00311}, doi = {10.1109/TRUSTCOM63139.2024.00311}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/MishraBBP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Mou0JS24, author = {Yuting Mou and Ke Xu and Xinghao Jiang and Tanfeng Sun}, title = {Compressed Video Action Recognition Based on Neural Video Compression}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2244--2249}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00309}, doi = {10.1109/TRUSTCOM63139.2024.00309}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Mou0JS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/NageshFLNP24, author = {Sanjay Segu Nagesh and Niroshinie Fernando and Seng W. Loke and Azadeh Ghari Neiat and Pubudu N. Pathirana}, title = {Honeybee-RS: Enhancing Trust through Lightweight Result Validation in Mobile Crowd Computing}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2553--2558}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00356}, doi = {10.1109/TRUSTCOM63139.2024.00356}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/NageshFLNP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/NanWTWZZ24, author = {Zhefeng Nan and Qi Wang and Changbo Tian and Yijing Wang and Tianning Zang and Dongwei Zhu}, title = {Path Generation Method of Anti-Tracking Network based on Dynamic Asymmetric Hierarchical Architecture}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {254--261}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00058}, doi = {10.1109/TRUSTCOM63139.2024.00058}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/NanWTWZZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/NguyenCNSSK24, author = {Khanh{-}Duy Nguyen and Hsi{-}Ching Chu and Quoc{-}Viet Nguyen and Min{-}Te Sun and Kazuya Sakai and Wei{-}Shinn Ku}, title = {From Data to Action: {CTI} Analysis and ATT{\&}CK Technique Correlation}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {141--148}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00045}, doi = {10.1109/TRUSTCOM63139.2024.00045}, timestamp = {Thu, 01 May 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/NguyenCNSSK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/NieJJMC24, author = {Jinquan Nie and Lejun Ji and Yirui Jiang and Young Ma and Yuanlong Cao}, title = {ROSE\({}^{\mbox{+}}\) : {A} Robustness-Optimized Security Scheme Against Cascading Failures in Multipath {TCP} under LDDoS Attack Streams}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1844--1849}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00254}, doi = {10.1109/TRUSTCOM63139.2024.00254}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/NieJJMC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/NoortLN24, author = {Vince Noort and Nhien{-}An Le{-}Khac and Hong{-}Hanh Nguyen{-}Le}, title = {Improving Security in Internet of Medical Things through Hierarchical Cyberattacks Classification}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1304--1309}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00183}, doi = {10.1109/TRUSTCOM63139.2024.00183}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/NoortLN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/PangGYL24, author = {Zeshan Pang and Shasha Guo and Xuehu Yan and Yuliang Lu}, title = {Destruction and Reconstruction Chain: An Adaptive Adversarial Purification Framework}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2336--2341}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00322}, doi = {10.1109/TRUSTCOM63139.2024.00322}, timestamp = {Wed, 25 Jun 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/PangGYL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ParbatC24, author = {Tanusree Parbat and Ayantika Chatterjee}, title = {Secure Join and Compute in Encrypted Database}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1480--1485}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00204}, doi = {10.1109/TRUSTCOM63139.2024.00204}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ParbatC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ParkKK24, author = {Jihoon Park and Giluk Kang and Young{-}Gab Kim}, title = {A Self-Adaptive Framework for Responding to Uncertainty in Access Control Process with Deep Neural Networks}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1863--1868}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00257}, doi = {10.1109/TRUSTCOM63139.2024.00257}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ParkKK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/PelissierAMMC24, author = {Samuel P{\'{e}}lissier and Gianluca Anselmi and Abhishek Kumar Mishra and Anna Maria Mandalari and Mathieu Cunche}, title = {Enhancing IoT Privacy: Why DNS-over-HTTPS Alone Falls Short?}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1353--1360}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00189}, doi = {10.1109/TRUSTCOM63139.2024.00189}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/PelissierAMMC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/PhuongBHSL24, author = {Tran Viet Xuan Phuong and Albert Baker and Philip D. Huff and Jan P. Springer and Tho Thi Ngoc Le}, title = {{CFE:} Secure Filtered Words in End-to-End Encrypted Messaging System}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1458--1465}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00201}, doi = {10.1109/TRUSTCOM63139.2024.00201}, timestamp = {Tue, 05 Aug 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/PhuongBHSL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/PintoAMP24, author = {Daniela Pinto and Ivone Amorim and Eva Maia and Isabel Pra{\c{c}}a}, title = {A Novel Approach to Network Traffic Analysis: the {HERA} tool}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1850--1856}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00255}, doi = {10.1109/TRUSTCOM63139.2024.00255}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/PintoAMP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/PizzolanteC024, author = {Raffaele Pizzolante and Arcangelo Castiglione and Francesco Palmieri}, title = {Unlocking Insights: An Extensible Framework for Automated Metadata Extraction from Online Documents}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1512--1521}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00209}, doi = {10.1109/TRUSTCOM63139.2024.00209}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/PizzolanteC024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ProtsenkoSPK24, author = {Mykolai Protsenko and Albert Stark and Andreas Papon and Sandra Kostic}, title = {VisualAuth: Secure Transaction Authentication and Trusted {UI} on {COTS} Android Devices}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {129--140}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00044}, doi = {10.1109/TRUSTCOM63139.2024.00044}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ProtsenkoSPK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/QinWW24, author = {Zhongyuan Qin and Dinglian Wang and Minghua Wang}, title = {Dynamic Differential Privacy in Hierarchical Federated Learning: {A} Layerwise Adaptive Framework}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2207--2212}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00304}, doi = {10.1109/TRUSTCOM63139.2024.00304}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/QinWW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/QinZZLD024, author = {Yunyang Qin and Yujia Zhu and Linkang Zhang and Baiyang Li and Yong Ding and Qingyun Liu}, title = {LayyerX: Unveiling the Hidden Layers of DoH Server via Differential Fingerprinting}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {354--361}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00069}, doi = {10.1109/TRUSTCOM63139.2024.00069}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/QinZZLD024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Quan00LY24, author = {Yue Quan and Kai Fan and Haoyang Wang and Hui Li and Yintang Yang}, title = {{DMASP:} Dynamic Multi-keyword Searchable Encryption for Protected Access and Search Patterns with Differential Privacy}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1423--1429}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00197}, doi = {10.1109/TRUSTCOM63139.2024.00197}, timestamp = {Fri, 25 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Quan00LY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Saint-HilaireNC24, author = {K{\'{e}}ren Saint{-}Hilaire and Christopher Neal and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Boulahia{-}Cuppens and Francesca Bassi}, title = {Attack-Defense Graph Generation: Instantiating Incident Response Actions on Attack Graphs}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {295--305}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00063}, doi = {10.1109/TRUSTCOM63139.2024.00063}, timestamp = {Tue, 05 Aug 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Saint-HilaireNC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Sakon24, author = {Toru Sakon}, title = {Anticipated Failure Determination-based Weakness Analysis with Common Weakness Enumeration}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2627--2634}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00366}, doi = {10.1109/TRUSTCOM63139.2024.00366}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Sakon24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Shafeeq024, author = {Sehrish Shafeeq and Mathias Fischer}, title = {Privacy-aware data aggregation using Functional Encryption}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2159--2168}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00298}, doi = {10.1109/TRUSTCOM63139.2024.00298}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Shafeeq024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ShenKYXWN24, author = {Zhuowei Shen and Xiao Kou and Taiyao Yang and Haoqin Xu and Dongbin Wang and Shaobo Niu}, title = {A Revocable Pairing-Free Certificateless Signature Scheme Based on {RSA} Accumulator}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {149--156}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00046}, doi = {10.1109/TRUSTCOM63139.2024.00046}, timestamp = {Thu, 01 May 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ShenKYXWN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Shi0CLZ24, author = {Mengxuan Shi and Jinfu Chen and Saihua Cai and Ziyan Liu and Jiapeng Zhou}, title = {{DA-CPVD:} Vulnerability Detection Method based on Dual Attention Composite Pooling}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1916--1921}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00265}, doi = {10.1109/TRUSTCOM63139.2024.00265}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Shi0CLZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Simo024, author = {Hervais Simo and Michael Kreutzer}, title = {{WAPITI} - {A} Weighted Bayesian Method for Private Information Inference on Social Ego Networks}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2269--2280}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00313}, doi = {10.1109/TRUSTCOM63139.2024.00313}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Simo024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SongB24, author = {Wenting Song and K. Suzanne Barber}, title = {{TWCF:} Trust Weighted Collaborative Filtering based on Quantitative Modeling of Trust}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {986--993}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00142}, doi = {10.1109/TRUSTCOM63139.2024.00142}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SongB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SongGZ024, author = {Zhenbo Song and Wenhao Gao and Zhenyuan Zhang and Jianfeng Lu}, title = {{AS-FIBA:} Adaptive Selective Frequency-Injection for Backdoor Attack on Deep Face Restoration}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {934--943}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00136}, doi = {10.1109/TRUSTCOM63139.2024.00136}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SongGZ024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SongLG0ZX24, author = {Min Song and Chao Li and Xiaowei Guo and Jie Liu and Huajian Zhang and Rui Xia}, title = {Large-Scale Thermo-Hydraulic Analysis of Fuel Rod Bundles Based on {YH-ACT}}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2644--2652}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00368}, doi = {10.1109/TRUSTCOM63139.2024.00368}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SongLG0ZX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SongLQZHL24, author = {Zekai Song and Yunpeng Li and Jian Qin and Changzhi Zhao and Dongxu Han and Yuling Liu}, title = {FREDet: Fine-Grained Malicious Traffic Detection Based on Frequency Domain Features}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1097--1104}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00157}, doi = {10.1109/TRUSTCOM63139.2024.00157}, timestamp = {Tue, 29 Jul 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SongLQZHL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SongSZTWG24, author = {Kunpeng Song and Mingzhang Sun and Kui Zhou and Peng Tang and Ning Wang and Shanqing Guo}, title = {Multi-Dimensional Data Collection Under Personalized Local Differential Privacy}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1438--1447}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00199}, doi = {10.1109/TRUSTCOM63139.2024.00199}, timestamp = {Thu, 10 Jul 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SongSZTWG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SongWLYZL24, author = {Qipeng Song and Ruiyun Wang and Yue Li and Yiheng Yan and Xingyue Zhu and Hui Li}, title = {TrustNotify: {A} Lightweight Framework for Complete and Trustworthy Data Deletion Notification Distribution}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {492--500}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00084}, doi = {10.1109/TRUSTCOM63139.2024.00084}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SongWLYZL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SongYLNTLZS24, author = {Yinghao Song and Long Yan and Yang Li and Mingjian Ni and Shengzhong Tan and Dazhong Li and Huiting Zhao and Yulun Song}, title = {{NAGG:} Noised graph node feature aggregations for preserving privacy}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1389--1396}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00193}, doi = {10.1109/TRUSTCOM63139.2024.00193}, timestamp = {Thu, 01 May 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SongYLNTLZS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Soper0FJT24, author = {Jacob Soper and Yue Xu and Ernest Foo and Zahra Jadidi and Kien Nguyen Thanh}, title = {Improved Packet-Level Synthetic Network Traffic Generation}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1928--1934}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00267}, doi = {10.1109/TRUSTCOM63139.2024.00267}, timestamp = {Sat, 31 May 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Soper0FJT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SourmelisM24, author = {Spyridon Sourmelis and Weizhi Meng}, title = {Cyber Risk Analysis on Electric Vehicle Systems via {NIST} {CSF}}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {378--386}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00072}, doi = {10.1109/TRUSTCOM63139.2024.00072}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SourmelisM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SuZZW24, author = {Tan Su and Bingbing Zhang and Chi Zhang and Lingbo Wei}, title = {Privacy Leak Detection in {LLM} Interactions with a User-Centric Approach}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1647--1652}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00226}, doi = {10.1109/TRUSTCOM63139.2024.00226}, timestamp = {Wed, 28 May 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SuZZW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SunLLZ24, author = {Yalin Sun and Ruiying Lu and Kang Li and Yu Zheng}, title = {Topic-Aware Sensitive Information Detection in Chinese Large Language Model}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {908--915}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00133}, doi = {10.1109/TRUSTCOM63139.2024.00133}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SunLLZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SunS24, author = {Yifan Sun and Meng Song}, title = {Differentially Private Graph Convolutional Networks with Privacy Amplification}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2327--2335}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00321}, doi = {10.1109/TRUSTCOM63139.2024.00321}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SunS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SunSZZ24, author = {Sixian Sun and Hongyu Sun and Haoxing Zhang and Yuqing Zhang}, title = {A Study of Backdoor Attacks on Data Distillation for Text Classification Tasks}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2517--2522}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00350}, doi = {10.1109/TRUSTCOM63139.2024.00350}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SunSZZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SunZCXY0X024, author = {Lizhi Sun and Jingzhou Zhu and Boyu Chang and Yixin Xu and Bo Yang and Hao Wu and Fengyuan Xu and Sheng Zhong}, title = {{TTFL:} Towards Trustworthy Federated Learning with Arm Confidential Computing}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {896--907}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00132}, doi = {10.1109/TRUSTCOM63139.2024.00132}, timestamp = {Fri, 25 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SunZCXY0X024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TafreshianZ24, author = {Benyamin Tafreshian and Shengzhi Zhang}, title = {A Defensive Framework Against Adversarial Attacks on Machine Learning-Based Network Intrusion Detection Systems}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2436--2441}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00337}, doi = {10.1109/TRUSTCOM63139.2024.00337}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/TafreshianZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TanLZ24, author = {Mengmi Tan and Jianyi Liu and Ru Zhang}, title = {{DI-GAE:} {A} Dynamic and Resource-Efficient Attack Detection Framework with Incremental Learning and Graph Autoencoders}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2281--2286}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00314}, doi = {10.1109/TRUSTCOM63139.2024.00314}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/TanLZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TangCW0YW24, author = {Mengmeng Tang and Shuhong Chen and Guojun Wang and Hanjun Li and Zhuyi Yao and Sheng Wen}, title = {Boosting Transferability of Adversarial Examples by Joint Training and Dual Feature Mixup}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {826--833}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00124}, doi = {10.1109/TRUSTCOM63139.2024.00124}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/TangCW0YW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TangWCLPYLLS24, author = {Cheng Tang and Qingfeng Wang and Guozhen Cheng and Hao Liang and Jianhua Peng and Meiyue Yang and Wenyan Liu and Ming Liu and Lei Sha}, title = {A Cross-Site Scripting Attack Protection Framework Based on Managed Proxy}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1896--1903}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00262}, doi = {10.1109/TRUSTCOM63139.2024.00262}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/TangWCLPYLLS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TangYPZ24, author = {Yiding Tang and Zhijing Yang and Yufan Peng and Hui Zhang}, title = {Individual Fair Density-Peaks Clustering Based on Local Similar Center Graph and Similar Decision Matrix}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1784--1789}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00245}, doi = {10.1109/TRUSTCOM63139.2024.00245}, timestamp = {Fri, 25 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/TangYPZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TangZZZW0L24, author = {Jiezhen Tang and Hui Zhu and Yandong Zheng and Junpeng Zhang and Fengwei Wang and Jiaqi Zhao and Hui Li}, title = {{UNIRE:} Secure Trajectory-User Linking Model Aggregation with Knowledge Transfer}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {916--925}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00134}, doi = {10.1109/TRUSTCOM63139.2024.00134}, timestamp = {Fri, 04 Jul 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/TangZZZW0L24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TianOH24, author = {Le Tian and ChangShen Ou and WeiLin Huang}, title = {Research on Energy Management Strategy of Microgrid Based on Improved Deep {Q} network Algorithm}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2694--2700}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00375}, doi = {10.1109/TRUSTCOM63139.2024.00375}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/TianOH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TianZAJF024, author = {Tian Tian and Yan Zhu and Ning An and Bo Jiang and Huamin Feng and Zhigang Lu}, title = {LSTM-Diff: {A} Data Generation Method for Imbalanced Insider Threat Detection}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {68--76}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00037}, doi = {10.1109/TRUSTCOM63139.2024.00037}, timestamp = {Fri, 25 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/TianZAJF024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/VuVTHNHN24, author = {Le Anh Duc Vu and Minh Hai Vu and Bao Ngoc Tran and Minh Tung Hoang and Duc Anh Nguyen and Minh Quan Hoang and Phi Le Nguyen}, title = {An Automated {PM2.5} Analysis and Prediction System with Encoder-Decoder Architecture and Continual Learning Mechanism}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2661--2668}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00370}, doi = {10.1109/TRUSTCOM63139.2024.00370}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/VuVTHNHN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Wang0MN24, author = {Yalan Wang and Liqun Chen and Long Meng and Christopher J. P. Newton}, title = {VCaDID: Verifiable Credentials with Anonymous Decentralized Identities}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {508--515}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00086}, doi = {10.1109/TRUSTCOM63139.2024.00086}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Wang0MN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Wang0MZH24, author = {Debao Wang and Yiwen Gao and Jingdian Ming and Yongbin Zhou and Xian Huang}, title = {Attacking High-Performance SBCs: {A} Generic Preprocessing Framework for {EMA}}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {234--241}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00056}, doi = {10.1109/TRUSTCOM63139.2024.00056}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Wang0MZH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Wang0Z24, author = {Xiangxiang Wang and Hui Xia and Yingqi Zhang}, title = {Defending Against Model Poisoning Attacks in Federated Learning via Client-guided Trust}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1749--1755}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00240}, doi = {10.1109/TRUSTCOM63139.2024.00240}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Wang0Z24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Wang0ZL24, author = {Tingyu Wang and Qiang Cao and Shihong Zou and Yueming Lu}, title = {{BGAS:} Blockchain and Group Decentralized Identifiers Assisted Authentication Scheme for {UAV} Networks}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1326--1335}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00186}, doi = {10.1109/TRUSTCOM63139.2024.00186}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Wang0ZL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangCZDBKR24, author = {Qifan Wang and Shujie Cui and Lei Zhou and Ye Dong and Jianli Bai and Yun Sing Koh and Giovanni Russello}, title = {GTree: GPU-friendly Privacy-preserving Decision Tree Training and Inference}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {775--785}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00118}, doi = {10.1109/TRUSTCOM63139.2024.00118}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangCZDBKR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangF0YW24, author = {Zhichao Wang and Qi Feng and Min Luo and Xiaolin Yang and Zizhong Wei}, title = {Efficient FSS-based Private Statistics for Traffic Monitoring}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1361--1370}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00190}, doi = {10.1109/TRUSTCOM63139.2024.00190}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangF0YW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangHLWZZ0M24, author = {Zhaoyang Wang and Yanfei Hu and Shuailou Li and Wenbo Wang and Lisong Zhang and Boyang Zhang and Yu Wen and Dan Meng}, title = {DyCom: {A} Dynamic Community Partitioning Technique for System Audit Logs}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1486--1493}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00205}, doi = {10.1109/TRUSTCOM63139.2024.00205}, timestamp = {Mon, 28 Jul 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangHLWZZ0M24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangL24, author = {Haotian Wang and Jing Liu}, title = {RPG-Diff: Precise Adversarial Defense Based on Regional Positioning Guidance}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {802--809}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00121}, doi = {10.1109/TRUSTCOM63139.2024.00121}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangLD24, author = {Mingjun Wang and Yixuan Liu and Wenxiu Ding}, title = {SP\({}^{\mbox{2}}\)-RD2D: Secure and Privacy-Preserving Authentication and Key Agreement Protocol for {D2D} Relay Communication}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {567--573}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00093}, doi = {10.1109/TRUSTCOM63139.2024.00093}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangLD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangLGLY24, author = {Luyao Wang and Yan Liu and Xiaoyu Guo and Ziqi Long and Chunfang Yang}, title = {Cross-platform Network User Alignment Interference Methods Based on Obfuscation Strategy}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2185--2190}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00301}, doi = {10.1109/TRUSTCOM63139.2024.00301}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangLGLY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangLJYCBWLS24, author = {Siyuan Wang and Shuchen Liu and Zheng Jin and Zheng Yan and Tao Chen and Qinglei Bu and Zhiqiang Wang and Jintao Liu and Jie Sun}, title = {A Digital Traditional Chinese Medicine Splint for Treatment of Distal Radius Fracture}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2675--2679}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00372}, doi = {10.1109/TRUSTCOM63139.2024.00372}, timestamp = {Fri, 25 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangLJYCBWLS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangLMXSML24, author = {Weihan Wang and Xiulong Liu and Liyuan Ma and Hao Xu and Gaowei Shi and Juncheng Ma and Keqiu Li}, title = {{MVSS:} Blockchain Cross-shard Account Migration Based on Multi-version State Synchronization}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {742--749}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00114}, doi = {10.1109/TRUSTCOM63139.2024.00114}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangLMXSML24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangLTWW24, author = {Xiayue Wang and Mingyang Li and Yuting Tao and Xuanzhe Wang and Hao Wu}, title = {Trust Evaluation in Mobile Crowd Sensing Networks Based on Age of Trust (AoT)}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2541--2546}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00354}, doi = {10.1109/TRUSTCOM63139.2024.00354}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangLTWW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangLW024, author = {Yusen Wang and Jiong Lou and Zihan Wang and Jie Li}, title = {Front-running Attacks in Hash-Based Transaction Sharding Blockchains}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {205--212}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00053}, doi = {10.1109/TRUSTCOM63139.2024.00053}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangLW024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangLZTWG24, author = {Liang Wang and Li Liu and Pei Zhan and Peng Tang and Puwen Wei and Shanqing Guo}, title = {Interactive Verifiable Local Differential Privacy Protocols for Mean Estimation}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1448--1457}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00200}, doi = {10.1109/TRUSTCOM63139.2024.00200}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangLZTWG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangRHLLLL24, author = {Jianrong Wang and Yacong Ren and Dengcheng Hu and Qi Li and Sen Li and Xuewei Li and Xiulong Liu}, title = {CVchain: {A} Cross-Voting-Based Low Latency Parallel Chain System}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {666--673}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00105}, doi = {10.1109/TRUSTCOM63139.2024.00105}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangRHLLLL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangWW24, author = {Liang Wang and Zhipeng Wang and Meng Wang}, title = {ADIoT: An Anomaly Detection Model for IoT Devices Based on Behavioral Feature Analysis}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1972--1977}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00273}, doi = {10.1109/TRUSTCOM63139.2024.00273}, timestamp = {Mon, 02 Jun 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangWW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangWZ24, author = {Xingbo Wang and Yuzhu Wang and Mingwu Zhang}, title = {Witness Encryption based on the {SAT} Problem\({}^{\mbox{*}}\)}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2227--2237}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00307}, doi = {10.1109/TRUSTCOM63139.2024.00307}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangWZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangWZJ24, author = {Luyao Wang and Xiaomin Wei and Hongtao Zhang and Lingtao Jia}, title = {AttDet: Attitude Angles-Based {UAV} {GNSS} Spoofing Detection}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2468--2473}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00342}, doi = {10.1109/TRUSTCOM63139.2024.00342}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangWZJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangYT24, author = {Zhiqiang Wang and Xinyue Yu and Ziqing Tian}, title = {A Federated Learning Scheme with Adaptive Hierarchical Protection and Multiple Aggregation}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2106--2114}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00292}, doi = {10.1109/TRUSTCOM63139.2024.00292}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangYT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangZB0D24, author = {Yijun Wang and Ziyi Zhou and Weiqi Bai and Ruijie Zhao and Xianwen Deng}, title = {CaptchaSAM: Segment Anything in Text-based Captchas}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1070--1076}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00153}, doi = {10.1109/TRUSTCOM63139.2024.00153}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangZB0D24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Wickramaarachchi24, author = {Wiraj Udara Wickramaarachchi and Junwei Zhou and Dongdong Zhao and Jianwen Xiang}, title = {Block-Feature Fusion for Privacy-Protected Iris Recognition}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2133--2141}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00295}, doi = {10.1109/TRUSTCOM63139.2024.00295}, timestamp = {Tue, 05 Aug 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Wickramaarachchi24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WuL0G24, author = {Xiaohong Wu and Yujun Lin and Jie Tao and Yonggen Gu}, title = {Machine Learning-based Optimal Data Trading Mechanism with Randomized Privacy Protection Scheme}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {461--468}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00081}, doi = {10.1109/TRUSTCOM63139.2024.00081}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WuL0G24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WuW24, author = {Haoxuan Wu and Zhiqiang Wen}, title = {Research on Adaptive Attention Dense Network Structure in Camera Source Recognition Method}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2238--2243}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00308}, doi = {10.1109/TRUSTCOM63139.2024.00308}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WuW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WuWQ024, author = {Feng Wu and Weiqi Wang and Youyang Qu and Shui Yu}, title = {A Low-cost Black-box Jailbreak Based on Custom Mapping Dictionary with Multi-round Induction}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {888--895}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00131}, doi = {10.1109/TRUSTCOM63139.2024.00131}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WuWQ024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WuWXZW24, author = {Yingying Wu and Jiabei Wang and Dandan Xu and Yongbin Zhou and Yang Wang}, title = {Rabbit: Secure Encrypted Property Graph Search Scheme Supporting Data and Key Updates}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1954--1962}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00271}, doi = {10.1109/TRUSTCOM63139.2024.00271}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WuWXZW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WuYY24, author = {Shuaipeng Wu and Changhao Yuan and Kejiang Ye}, title = {A Multi-Stage Spike Stream Processing and Image Reconstruction Method for Industrial Applications}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2590--2597}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00361}, doi = {10.1109/TRUSTCOM63139.2024.00361}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WuYY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Xia0LXST24, author = {Haojun Xia and Limin Sun and Wenliang Liu and Jingyi Xie and Zhanwei Song and Bibo Tu}, title = {A Self-Supervised Targeted Process Anomaly Detection Method Based on the Minimum Set of Observed Events}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1881--1888}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00260}, doi = {10.1109/TRUSTCOM63139.2024.00260}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Xia0LXST24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XiaAGGXO24, author = {Qi Xia and Badjie Ansu and Jianbin Gao and Grace Mupoyi Ntuala and Hu Xia and Isaac Amankona Obiri}, title = {A Novel Time Series Approach to Anomaly Detection and Correction for Complex Blockchain Transaction Networks}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {674--682}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00106}, doi = {10.1109/TRUSTCOM63139.2024.00106}, timestamp = {Tue, 05 Aug 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/XiaAGGXO24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XiaTLCD24, author = {Bing Xia and Chongjun Tang and Wenbo Liu and Shihao Chu and Yu Dong}, title = {A Vulnerability Detection Method for Intermediate Code Based on a Relational Dependency Graph}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1998--2003}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00277}, doi = {10.1109/TRUSTCOM63139.2024.00277}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/XiaTLCD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XiaWN024, author = {Pengcheng Xia and Jingyu Wu and Yiyang Ni and Jun Li}, title = {A Novel zk-SNARKs Method for Cross-chain Transactions in Multi-chain System}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1261--1267}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00178}, doi = {10.1109/TRUSTCOM63139.2024.00178}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/XiaWN024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XiaYTL24, author = {Zhuoqun Xia and Yongbin Yu and Jingjing Tan and Kejun Long}, title = {{SSC-IDS:} {A} Robust In-vehicle Intrusion Detection System Based on Self-Supervised Contrastive Learning}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2004--2009}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00278}, doi = {10.1109/TRUSTCOM63139.2024.00278}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/XiaYTL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XiangLM24, author = {Fan Xiang and Xueyang Li and Guozhu Meng}, title = {{RTS:} {A} Training-time Backdoor Defense Strategy Based on Weight Residual Tendency}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {786--793}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00119}, doi = {10.1109/TRUSTCOM63139.2024.00119}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/XiangLM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XiangZLZZ24, author = {Yanpeng Xiang and Tao Zhang and Jiahao Liu and Xinbo Zhang and Yu Zhang}, title = {High-Capacity and High-Security Data Hiding in Encrypted Image Using Image Filtering and Image Blocking}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2175--2184}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00300}, doi = {10.1109/TRUSTCOM63139.2024.00300}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/XiangZLZZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XiaoLXLX24, author = {Ruoyao Xiao and Yu Luo and Weifeng Xu and Harshmeet Lamba and Dianxiang Xu}, title = {Analyzing Relationship Consistency in Digital Forensic Knowledge Graphs with Graph Learning}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {590--599}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00096}, doi = {10.1109/TRUSTCOM63139.2024.00096}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/XiaoLXLX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XingLSXP0F24, author = {Huanlai Xing and Xuxu Li and Jing Song and Lexi Xu and Jincheng Peng and Bowen Zhao and Li Feng}, title = {{HFI:} High-Frequency Component Injection based Invisible Image Backdoor Attack}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1653--1658}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00227}, doi = {10.1109/TRUSTCOM63139.2024.00227}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/XingLSXP0F24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XiongLLNY24, author = {Xingxing Xiong and Shubo Liu and Xiping Liu and Xiaoguang Niu and Wenyu You}, title = {Real-time Private Data Aggregation over Distributed Spatial-temporal Infinite Streams with Local Differential Privacy}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1343--1352}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00188}, doi = {10.1109/TRUSTCOM63139.2024.00188}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/XiongLLNY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XiongZX24, author = {Shuming Xiong and Junfeng Zhu and Qiqi Xu}, title = {An Intelligent Charging Service Selection Scheme Under the Cross-Area Consensus of Blockchain for the IoV}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2310--2315}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00318}, doi = {10.1109/TRUSTCOM63139.2024.00318}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/XiongZX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XuG24, author = {Guixian Xu and Wenhui Gao}, title = {Tibetan microblogging user data analysis and topic identification}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1077--1082}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00154}, doi = {10.1109/TRUSTCOM63139.2024.00154}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/XuG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XuGKYZL24, author = {Yaobing Xu and Yunchuan Guo and Wenlong Kou and Junhai Yang and Ziyan Zhou and Fenghua Li}, title = {D\({}^{\mbox{3}}\)IR: Securing Multi-Domain Networks via Extending Depth-in-Defense Strategies Across Nested Management Domains}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1320--1325}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00185}, doi = {10.1109/TRUSTCOM63139.2024.00185}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/XuGKYZL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XuLZALCL24, author = {Yanhong Xu and Zhao Li and Ziru Zhao and Blaise Herroine Aguenoukoun and Jia Liu and Zhixian Chang and Yicheng Liu}, title = {Machine Learning Enhanced Indoor Positioning with RIS-aided Channel Configuration and Analysis}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2653--2660}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00369}, doi = {10.1109/TRUSTCOM63139.2024.00369}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/XuLZALCL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XuRZCW24, author = {Zhenyu Xu and Xurui Ren and Yi Zhang and Guang Cheng and Hua Wu}, title = {Peering Through the Veil: {A} Segment-Based Approach for {VPN} Encapsulated Video Title Identification}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1500--1505}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00207}, doi = {10.1109/TRUSTCOM63139.2024.00207}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/XuRZCW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XuSCGH024, author = {Shengmin Xu and Jianfei Sun and Hangcheng Cao and Yulan Gao and Ziyang He and Cong Wu}, title = {Shield-U: Safeguarding Traffic Sign Recognition Against Perturbation Attacks}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2453--2461}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00340}, doi = {10.1109/TRUSTCOM63139.2024.00340}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/XuSCGH024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XuZXWFL24, author = {Wei Xu and Hui Zhu and Chang Xiao and Fengwei Wang and Dengguo Feng and Hui Li}, title = {Toward Privacy-Preserving and Verifiable XGBoost Training for Horizontal Federated Learning}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {810--817}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00122}, doi = {10.1109/TRUSTCOM63139.2024.00122}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/XuZXWFL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YanMG24, author = {Kuan Yan and Dmytro Matsypura and Junbin Gao}, title = {{BIG:} {A} Practical Framework for Balancing the Conflict Between Group and Individual Fairness in Graph Neural Networks}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2400--2409}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00332}, doi = {10.1109/TRUSTCOM63139.2024.00332}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YanMG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YanW0024, author = {Feixue Yan and Sheng Wen and Yang Xiang and Shiping Chen}, title = {Shapley-value-based Explanations for Cryptocurrency Blacklist Detection}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {435--442}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00078}, doi = {10.1109/TRUSTCOM63139.2024.00078}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YanW0024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YanYHYX24, author = {Xiong Yan and Kedong Yan and Chanying Huang and Dan Yin and Shan Xiao}, title = {FusTP-FL: Enhancing Differential Federated Learning through Personalized Layers and Data Transformation}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1762--1769}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00242}, doi = {10.1109/TRUSTCOM63139.2024.00242}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YanYHYX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YangLXZC24, author = {Dong Yang and Weihai Li and Zikai Xu and Zhiling Zhang and Yiling Chen}, title = {{FCADD:} Robust Watermarking Resisting {JPEG} Compression with Frequency Channel Attention and Distortion De-gradient}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1817--1824}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00250}, doi = {10.1109/TRUSTCOM63139.2024.00250}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YangLXZC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YangOWLFS24, author = {Yilin Yang and Changhai Ou and Yongzhuang Wei and Wei Li and Yifan Fan and Xuan Shen}, title = {Broader but More Efficient: Broad Learning in Power Side-channel Attacks}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1528--1533}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00211}, doi = {10.1109/TRUSTCOM63139.2024.00211}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YangOWLFS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YangSCW24, author = {Qingmei Yang and Lijun Sun and Xiao Chen and Lingling Wang}, title = {Sustainable and Trusted Vehicular Energy Trading Enabled by Scalable Blockchains}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1832--1837}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00252}, doi = {10.1109/TRUSTCOM63139.2024.00252}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YangSCW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YangT0Y024, author = {Zhihuan Yang and Wenlong Tian and Ruixuan Li and Xuming Ye and Zhiyong Xu}, title = {Who Owns the Cloud Data? Exploring a non-interactive way for secure proof of ownership}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1494--1499}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00206}, doi = {10.1109/TRUSTCOM63139.2024.00206}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YangT0Y024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YangTZ024, author = {Zhihuan Yang and Wenlong Tian and Emma Zhang and Zhiyong Xu}, title = {Sec-Reduce: Secure Reduction of Redundant and Similar Data for Cloud Storage based on Zero-Knowledge Proof}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1149--1154}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00163}, doi = {10.1109/TRUSTCOM63139.2024.00163}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YangTZ024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YangWSLL24, author = {Qian Yang and Chen Wang and Jian Shen and Yi Li and Dengzhi Liu}, title = {Private Data Aggregation Enabling Verifiable Multisubset Dynamic Billing in Smart Grids}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1155--1160}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00164}, doi = {10.1109/TRUSTCOM63139.2024.00164}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YangWSLL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YangZFY24, author = {Qingmei Yang and Pincan Zhao and Yuchuan Fu and F. Richard Yu}, title = {Enhancing Security and Privacy in Connected and Autonomous Vehicles: {A} Post-Quantum Revocable Ring Signature Approach}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1557--1562}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00215}, doi = {10.1109/TRUSTCOM63139.2024.00215}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YangZFY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YangZT24, author = {Kedi Yang and Zhenyong Zhang and Youliang Tian}, title = {Traceable AI-driven Avatars Using Multi-factors of Physical World and Metaverse}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2360--2367}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00326}, doi = {10.1109/TRUSTCOM63139.2024.00326}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YangZT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YinMSS24, author = {Yuemeng Yin and Rahat Masood and Suranga Seneviratne and Aruna Seneviratne}, title = {Evaluating Web-Based Privacy Controls: {A} User Study on Expectations and Preferences}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2169--2174}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00299}, doi = {10.1109/TRUSTCOM63139.2024.00299}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YinMSS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YuCJFL24, author = {Dahai Yu and Jianming Cui and Yungang Jia and Peiguo Fu and Ming Liu}, title = {Deep Learning-Based DDoS Attack Detection Using Adversarial Optimization}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1135--1140}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00161}, doi = {10.1109/TRUSTCOM63139.2024.00161}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YuCJFL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YuHXZQ0GD24, author = {Yongkang Yu and Jinchun He and Xinwei Xu and Qinnan Zhang and Wangjie Qiu and Hongwei Zheng and Binghui Guo and Jin Dong}, title = {TierFlow: {A} Pipelined Layered {BFT} Consensus Protocol for Large-Scale Blockchain}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {624--635}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00100}, doi = {10.1109/TRUSTCOM63139.2024.00100}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YuHXZQ0GD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YuJLGYWY24, author = {Mingjie Yu and Wei Jin and Fenghua Li and Yunchuan Guo and Zheng Yan and Xiao Wang and Nenghai Yu}, title = {Correcting the Bound Estimation of Mohawk}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {191--196}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00051}, doi = {10.1109/TRUSTCOM63139.2024.00051}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YuJLGYWY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YuLLHTD24, author = {Yifan Yu and Ruoyan Lin and Shuang Li and Qinsheng Hou and Peng Tang and Wenrui Diao}, title = {Security Assessment of Customizations in Android Smartwatch Firmware}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1141--1148}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00162}, doi = {10.1109/TRUSTCOM63139.2024.00162}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YuLLHTD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YuWJYZ24, author = {Qiulong Yu and Zhiqiang Wang and Lei Ju and Sicheng Yuan and Ying Zhang}, title = {Android Malware Detection Technology Based on SC-ViT and Multi-Feature Fusion}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1105--1114}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00158}, doi = {10.1109/TRUSTCOM63139.2024.00158}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YuWJYZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YuWLL24, author = {Limin Yu and Yongdong Wu and Jiao Lu and Tong Li}, title = {An Adaptive Reputation Update Mechanism for Primary Nodes in {PBFT}}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1948--1953}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00270}, doi = {10.1109/TRUSTCOM63139.2024.00270}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YuWLL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YuanLZXXZ24, author = {Zhuang Yuan and Rui Li and Fa Zhang and Kejing Xu and Liang Xu and Weizhan Zhang}, title = {An Experimental Study on Half-Closed {TCP} Connections in Public Cloud Gateways}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2583--2589}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00360}, doi = {10.1109/TRUSTCOM63139.2024.00360}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YuanLZXXZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YuanSPWWZ24, author = {Wei Yuan and Hongyu Sun and Mo Pang and He Wang and Gaofei Wu and Yuqing Zhang}, title = {LogContrast: Log-based Anomaly Detection Using {BERT} and Contrastive Learning}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2510--2516}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00349}, doi = {10.1109/TRUSTCOM63139.2024.00349}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YuanSPWWZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhaiLL0XWY24, author = {Haonan Zhai and Ruiqi Liang and Zhenzhen Li and Zhen Li and Wei Xia and Bingxu Wang and Qingya Yang}, title = {{OSN} Bots Traffic Transformer : MAE-Based Multimodal Social Bots Behavior Pattern Mining}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1239--1246}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00175}, doi = {10.1109/TRUSTCOM63139.2024.00175}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhaiLL0XWY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Zhang024, author = {Hongke Zhang and Zheng Yan}, title = {Design and Implementation of Data Encryption Mechanism in Fiber Channel Network}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2442--2446}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00338}, doi = {10.1109/TRUSTCOM63139.2024.00338}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Zhang024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Zhang0G24, author = {Xin Zhang and Chao Guo and Buxin Guo}, title = {Two-Stage Federated Learning Strategy for Fairness and Security in Vehicular Networks}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2019--2024}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00280}, doi = {10.1109/TRUSTCOM63139.2024.00280}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Zhang0G24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Zhang0LLGCC24, author = {Yuheng Zhang and Guojun Wang and Peiqiang Li and Xubin Li and Wanyi Gu and Mingfei Chen and Houji Chen}, title = {TransFront: Bi-path Feature Fusion for Detecting Front-running Attack in Decentralized Finance}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {600--607}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00097}, doi = {10.1109/TRUSTCOM63139.2024.00097}, timestamp = {Fri, 04 Jul 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Zhang0LLGCC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Zhang0ZQZW24, author = {Zelong Zhang and Wei Cheng and Yongbin Zhou and Zehua Qiao and Yuhan Zhao and Jian Weng}, title = {Attacking High-order Masked Cryptosystem via Deep Learning-based Side-Channel Analysis}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {699--706}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00109}, doi = {10.1109/TRUSTCOM63139.2024.00109}, timestamp = {Fri, 25 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Zhang0ZQZW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Zhang0ZYZC24, author = {Zheng Zhang and Rui Ma and Yuqi Zhai and Yuche Yang and Siqi Zhao and Hongming Chen}, title = {GeMuFuzz: Integrating Generative and Mutational Fuzzing with Deep Learning}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1889--1895}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00261}, doi = {10.1109/TRUSTCOM63139.2024.00261}, timestamp = {Thu, 01 May 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Zhang0ZYZC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangBTYL24, author = {Shuguang Zhang and Jianli Bai and Kun Tu and Ziyue Yin and Chan Liu}, title = {{OHSS:} Optimizing Homomorphic Secret Sharing to Support Fast Matrix Multiplication}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2213--2220}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00305}, doi = {10.1109/TRUSTCOM63139.2024.00305}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangBTYL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangCXDHJ24, author = {Jingye Zhang and Ken Cheng and Xinli Xiong and Rongcheng Dong and Jun Huang and She Jie}, title = {Construction of Cyber-attack Attribution Framework Based on {LLM}}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2250--2255}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00310}, doi = {10.1109/TRUSTCOM63139.2024.00310}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangCXDHJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangD24, author = {Jingchi Zhang and Anwitaman Datta}, title = {Enhancing Privacy-Preserving Multi-Authority Attribute-Based Encryption: Addressing Rogue-Key Attacks Under Adaptive Corruption of Authorities}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {524--531}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00088}, doi = {10.1109/TRUSTCOM63139.2024.00088}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangDCL24, author = {Yixin Zhang and Fuqiang Du and Xinge Chi and Zhiqiang Lv}, title = {{USB} Catcher: Detection of Controlled Emissions via Conducted Compromising Emanations}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1296--1303}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00182}, doi = {10.1109/TRUSTCOM63139.2024.00182}, timestamp = {Thu, 01 May 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangDCL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangHCLZL24, author = {Dong Zhang and Zhiyuan Hu and Huijun Chen and Guangming Liu and YinFeng Zheng and Jinghui Lu}, title = {From Liberty to 1984: {A} Methodology for Systematically Deteriorating {LLM} Outputs through Habituation Tendencies}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1659--1665}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00228}, doi = {10.1109/TRUSTCOM63139.2024.00228}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangHCLZL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangHGWLL24, author = {Jingsen Zhang and Shoulu Hou and Yi Gong and Tao Wang and Changyuan Lan and Xiulei Liu}, title = {An Intelligent Affinity Strategy for Dynamic Task Scheduling in Cloud-Edge-End Collaboration}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1595--1603}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00220}, doi = {10.1109/TRUSTCOM63139.2024.00220}, timestamp = {Fri, 25 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangHGWLL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangL0F24, author = {Fei Zhang and Xiaohong Li and Sen Chen and Ruitao Feng}, title = {Behavior Speaks Louder: Rethinking Malware Analysis Beyond Family Classification}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {166--175}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00048}, doi = {10.1109/TRUSTCOM63139.2024.00048}, timestamp = {Fri, 25 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangL0F24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangLFLZ24, author = {Jie Zhang and Jiayuan Li and Haiqiang Fei and Lun Li and Hongsong Zhu}, title = {EasyDetector: Using Linear Probe to Detect the Provenance of Large Language Models}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2410--2417}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00333}, doi = {10.1109/TRUSTCOM63139.2024.00333}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangLFLZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangLGW24, author = {Chenghan Zhang and Yan Liu and Daofu Gong and Ling Wang}, title = {Unsupervised Evaluation Method of Relative Coordination Degree from Group Perspective}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1983--1988}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00275}, doi = {10.1109/TRUSTCOM63139.2024.00275}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangLGW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangLLWLSWLS24, author = {Pengfeng Zhang and Lei Li and Xin Liu and Rui Wang and Donglan Liu and Bing Su and Yuntao Wang and Yiliang Liu and Zhou Su}, title = {Trusted and Spectrum-Efficient Crowd Computing in Massive {MIMO} Cellular Networks}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2529--2534}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00352}, doi = {10.1109/TRUSTCOM63139.2024.00352}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangLLWLSWLS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangLM0ZW24, author = {Jiahao Zhang and Yuejun Liu and Jingdian Ming and Yiwen Gao and Yongbin Zhou and Debao Wang}, title = {Enhancing Higher-Order Masking: {A} Faster and Secure Implementation to Mitigate Bit Interaction Leakage}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1247--1254}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00176}, doi = {10.1109/TRUSTCOM63139.2024.00176}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangLM0ZW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangLSZSG24, author = {Ruoding Zhang and Tao Liu and Qifeng Shi and Yan Zhang and Xiaoyi Song and Xinrui Geng}, title = {Research on Intelligent Joint Detection Technology for Application Privacy Behavior Compliance}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1430--1437}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00198}, doi = {10.1109/TRUSTCOM63139.2024.00198}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangLSZSG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangLY24, author = {Ziheng Zhang and Lei Liu and Zhongmin Yan}, title = {Achieving Trusted {GPU} Allocation: An Empirical Study on Efficiency Changes of Deep Learning Training Tasks}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1687--1692}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00232}, doi = {10.1109/TRUSTCOM63139.2024.00232}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangLY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangQYW24, author = {Yu Zhang and Haipeng Qu and Lingyun Ying and Linghui Wang}, title = {Maldet: An Automated Malicious npm Package Detector Based on Behavior Characteristics and Attack Vectors}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1942--1947}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00269}, doi = {10.1109/TRUSTCOM63139.2024.00269}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangQYW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangS0TZ24, author = {Yaling Zhang and Xiang Sun and Yichuan Wang and Dongtai Tang and Chen Zhao}, title = {An Effective Adversarial Text Attack through a Block-Sparse Approach with Hamiltonian Insights}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1727--1732}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00237}, doi = {10.1109/TRUSTCOM63139.2024.00237}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangS0TZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangSH24, author = {Chaoqin Zhang and Maoqi Sun and Guangwu Hu}, title = {CNN-KOA-BiGRU: {A} high-accuracy {APT} detection model based on deep learning networks}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2342--2347}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00323}, doi = {10.1109/TRUSTCOM63139.2024.00323}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangSH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangSWZL24, author = {Bosong Zhang and Qian Sun and Hai Wang and Linna Zhang and Danyang Li}, title = {Federated Learning Greedy Aggregation Optimization for Non-Independently Identically Distributed Data}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2090--2097}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00290}, doi = {10.1109/TRUSTCOM63139.2024.00290}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangSWZL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangTBH0L24, author = {Chengming Zhang and Bo Tang and Yifan Bian and Bingtao Han and Yongcheng Wang and Tao Liu}, title = {Efficient and Secure Federated Learning via Enhanced Quantization and Encryption}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2348--2353}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00324}, doi = {10.1109/TRUSTCOM63139.2024.00324}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangTBH0L24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangWFFGJ24, author = {Hanning Zhang and Guansheng Wang and Junwei Feng and Lei Feng and Quan Gan and Long Ji}, title = {Towards a Robust Medical Record System: Integrating Logical Reasoning for Trustworthy Data Management}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {658--665}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00104}, doi = {10.1109/TRUSTCOM63139.2024.00104}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangWFFGJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangWL24, author = {Fuyao Zhang and Dan Wang and Chuyang Liang}, title = {{DPFCIL:} Differentially Private Federated Class-Incremental Learning on non-IID Data}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {542--550}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00090}, doi = {10.1109/TRUSTCOM63139.2024.00090}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangWL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangWLZ24, author = {Jie Zhang and Hui Wen and Lun Li and Hongsong Zhu}, title = {UniTTP: {A} Unified Framework for Tactics, Techniques, and Procedures Mapping in Cyber Threats}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1580--1588}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00218}, doi = {10.1109/TRUSTCOM63139.2024.00218}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangWLZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangX24, author = {Lening Zhang and Hui Xia}, title = {Active Source Inference Attack Based on Label-Flipping in Federated Learning}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1675--1680}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00230}, doi = {10.1109/TRUSTCOM63139.2024.00230}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangXA24, author = {Zhao Zhang and Chunxiang Xu and Man Ho Allen Au}, title = {Single-sign-on Authentication with Anonymous Token and Restricted Covert Channel}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1413--1422}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00196}, doi = {10.1109/TRUSTCOM63139.2024.00196}, timestamp = {Fri, 25 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangXA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangYC24, author = {Ruizhe Zhang and Shangnan Yin and Jinfu Chen}, title = {{FD-WF:} {A} Multi-tab Website Fingerprinting Attack Based on Fixed Dimensions for Tor Network}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2051--2059}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00285}, doi = {10.1109/TRUSTCOM63139.2024.00285}, timestamp = {Mon, 28 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangYC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangZJ24, author = {Xinrui Zhang and Pincan Zhao and Jason Jaskolka}, title = {Enhancing Security and Efficiency in Vehicle-to-Sensor Authentication: {A} Multi-Factor Approach with Cloud Assistance}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1632--1637}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00224}, doi = {10.1109/TRUSTCOM63139.2024.00224}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangZJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangZTYY24, author = {Bingxin Zhang and Kang Zheng and Chao Tong and Kun Yang and Kang Yan}, title = {Deep Reinforcement Learning for Active RIS-Assisted Full-Duplex Integrated Sensing and Communication Systems}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2680--2685}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00373}, doi = {10.1109/TRUSTCOM63139.2024.00373}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangZTYY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangZWMCY24, author = {Zhixuan Zhang and Yanhui Zhu and Yuezhong Wu and Fangteng Man and Hao Chen and Xujian Ying}, title = {A Knowledge Graph Completion Method Based on Gated Adaptive Fusion and Conditional Generative Adversarial Networks}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {759--766}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00116}, doi = {10.1109/TRUSTCOM63139.2024.00116}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangZWMCY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangZZW24, author = {Xin Zhang and Bingbing Zhang and Chi Zhang and Lingbo Wei}, title = {Enhanced Privacy Policy Comprehension via Pre-trained and Retrieval-Augmented Models}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {574--581}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00094}, doi = {10.1109/TRUSTCOM63139.2024.00094}, timestamp = {Wed, 28 May 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangZZW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhaoTWDQ24, author = {Yu Zhao and Yangguang Tian and Chunbo Wang and Xiaoqiang Di and Hui Qi}, title = {Smart Contract-Based Auditing of Edge Data for Vehicular Networks}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2045--2050}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00284}, doi = {10.1109/TRUSTCOM63139.2024.00284}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhaoTWDQ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhaoWLL24, author = {Feiyu Zhao and Jianguo Wei and Wenhuan Lu and Yongwei Li}, title = {End-To-End Speaker Anonymization Based on Location-Variable Convolution and Multi-Head Self-Attention}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1733--1740}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00238}, doi = {10.1109/TRUSTCOM63139.2024.00238}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhaoWLL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhaoXWLL24, author = {Yuan Zhao and Chunhe Xia and Tianbo Wang and Mengyao Liu and Yang Li}, title = {Few-shot Encrypted Malicious Traffic Classification via Hierarchical Semantics and Adaptive Prototype Learning}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {399--409}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00074}, doi = {10.1109/TRUSTCOM63139.2024.00074}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhaoXWLL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhaoZSZH024, author = {Zhangchi Zhao and Jianyi Zhang and Liqun Shan and Ziyin Zhou and Kaiying Han and Xiali Hei}, title = {Paa-Tee: {A} Practical Adversarial Attack on Thermal Infrared Detectors with Temperature and Pose Adaptability}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {952--959}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00138}, doi = {10.1109/TRUSTCOM63139.2024.00138}, timestamp = {Thu, 01 May 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhaoZSZH024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhengL0Z24, author = {Hongying Zheng and Hongdie Li and Di Xiao and Maolan Zhang}, title = {Privacy-Preserving Multi-Soft Biometrics through Generative Adversarial Networks with Chaotic Encryption}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1466--1471}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00202}, doi = {10.1109/TRUSTCOM63139.2024.00202}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhengL0Z24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhengLSLHL24, author = {Jinlong Zheng and Jia{-}Nan Liu and Minhua Su and Dingcheng Li and Kai He and Xueqiao Liu}, title = {Efficient Multi-subset Fine-grained Authorization {PSI} over Outsourced Encrypted Datasets}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2098--2105}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00291}, doi = {10.1109/TRUSTCOM63139.2024.00291}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhengLSLHL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhengZC24, author = {Haibin Zheng and Tianxin Zhang and Jinyin Chen}, title = {Fedfair: {A} Debiasing Algorithm for Federated Learning Systems}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2322--2326}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00320}, doi = {10.1109/TRUSTCOM63139.2024.00320}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhengZC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhouL0L24, author = {Ting Zhou and Hongtao Lv and Ning Liu and Lei Liu}, title = {Budget-Feasible Double Auction Mechanisms for Model Training Services in Federated Learning Market}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {501--507}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00085}, doi = {10.1109/TRUSTCOM63139.2024.00085}, timestamp = {Fri, 25 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhouL0L24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhouXFPWL24, author = {Weidong Zhou and Chunhe Xia and Nan Feng and Xinyi Pan and Tianbo Wang and Xiaojian Li}, title = {{AIDE:} Attack Inference Based on Heterogeneous Dependency Graphs with {MITRE} ATT{\&}CK}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {410--417}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00075}, doi = {10.1109/TRUSTCOM63139.2024.00075}, timestamp = {Fri, 13 Jun 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhouXFPWL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhouXL24, author = {Kai Zhou and Yong Xie and Xin Liu}, title = {A Multi-hop Reasoning Framework for Cyber Threat Intelligence Knowledge Graph}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1037--1044}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00149}, doi = {10.1109/TRUSTCOM63139.2024.00149}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhouXL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhouXNL24, author = {Hao Zhou and Pengcheng Xia and Yiyang Ni and Jun Li}, title = {DcChain: {A} Novel Blockchain Sharding Method Based on Dual-constraint Label Propagating}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2302--2309}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00317}, doi = {10.1109/TRUSTCOM63139.2024.00317}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhouXNL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhouZYWML24, author = {Wanqiu Zhou and Zheng Zhang and Yuan Yao and Jiang Wang and Jiaxin Ma and Hui Liu}, title = {Cyber Resilience Framework for Web Server}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1922--1927}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00266}, doi = {10.1109/TRUSTCOM63139.2024.00266}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhouZYWML24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhouZZLXJ24, author = {Ming Zhou and Zhijian Zheng and Peng Zhang and Sixue Lu and Yamin Xie and Zhongfeng Jin}, title = {SecureNet-AWMI: Safeguarding Network with Optimal Feature Selection Algorithm}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1506--1511}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00208}, doi = {10.1109/TRUSTCOM63139.2024.00208}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhouZZLXJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Zhu0ZM24, author = {Yilin Zhu and Guang Cheng and Shunyu Zheng and Hantao Mei}, title = {TOScorr: Transformer-based Flow Correlation Attack on Tor Onion Service}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {262--270}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00059}, doi = {10.1109/TRUSTCOM63139.2024.00059}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Zhu0ZM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhuWG24, author = {Guangzhuo Zhu and Qian Wang and Bei Gong}, title = {A Sustainable Storage Compensation Method for Consortium Blockchain-based Computing Power Trading}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {683--690}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00107}, doi = {10.1109/TRUSTCOM63139.2024.00107}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhuWG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZouDLRLZC24, author = {Huiying Zou and Jia Duan and Xi Liu and Wei Ren and Tao Li and Xianghan Zheng and Kim{-}Kwang Raymond Choo}, title = {Decentralized and Lightweight Cross-Chain Transaction Scheme Based on Proxy Re-signature}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1201--1208}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00170}, doi = {10.1109/TRUSTCOM63139.2024.00170}, timestamp = {Fri, 25 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZouDLRLZC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZouHXLF24, author = {Yuwen Zou and Yang Hong and Jingyi Xu and Lekun Liu and Wenjun Fan}, title = {Leveraging Large Language Models for Challenge Solving in Capture-the-Flag}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {1541--1550}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00213}, doi = {10.1109/TRUSTCOM63139.2024.00213}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZouHXLF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZuinV24, author = {Gianlucca L. Zuin and Adriano Veloso}, title = {Navigating Time's Possibilities: Plausible Counterfactual Explanations for Multivariate Time-Series Forecast through Genetic Algorithms}, booktitle = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, pages = {2575--2582}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024.00359}, doi = {10.1109/TRUSTCOM63139.2024.00359}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZuinV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/trustcom/2024, title = {23rd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/TrustCom63139.2024}, doi = {10.1109/TRUSTCOM63139.2024}, isbn = {979-8-3315-0620-9}, timestamp = {Thu, 24 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/2024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.