ICICS C

48 papers

YearTitle / Authors
2020Information and Communications Security - 21st International Conference, ICICS 2019, Beijing, China, December 15-17, 2019, Revised Selected Papers
Jianying Zhou, Xiapu Luo, Qingni Shen, Zhen Xu
2019A Character-Level BiGRU-Attention for Phishing Classification.
Lijuan Yuan, Zhiyong Zeng, Yikang Lu, Xiaofeng Ou, Tao Feng
2019A Multi-Group Signature Scheme from Lattices.
Tian Qiu, Lin Hou, Dongdai Lin
2019AADS: A Noise-Robust Anomaly Detection Framework for Industrial Control Systems.
Maged AbdelAty, Roberto Doriguzzi Corin, Domenico Siracusa
2019AGE: Authentication Graph Embedding for Detecting Anomalous Login Activities.
Renzheng Wei, Lijun Cai, Aimin Yu, Dan Meng
2019Accelerating SM2 Digital Signature Algorithm Using Modern Processor Features.
Long Mai, Yuan Yan, Songlin Jia, Shuran Wang, Jianqiang Wang, Juanru Li, Siqi Ma, Dawu Gu
2019Adaptively Secure Puncturable Pseudorandom Functions via Puncturable Identity-Based KEMs.
Xin Wang, Shimin Li, Rui Xue
2019An Adversarial Attack Based on Multi-objective Optimization in the Black-Box Scenario: MOEA-APGA II.
Chunkai Zhang, Yepeng Deng, Xin Guo, Xuan Wang, Chuanyi Liu
2019Automated Cyber Threat Intelligence Reports Classification for Early Warning of Cyber Attacks in Next Generation SOC.
Wenzhuo Yang, Kwok-Yan Lam
2019Automatic Demirci-Selçuk Meet-in-the-Middle Attack on SKINNY with Key-Bridging.
Qiu Chen, Danping Shi, Siwei Sun, Lei Hu
2019CDAE: Towards Empowering Denoising in Side-Channel Analysis.
Guang Yang, Huizhong Li, Jingdian Ming, Yongbin Zhou
2019CTLMD: Continuous-Temporal Lateral Movement Detection Using Graph Embedding.
Suya Zhao, Renzheng Wei, Lijun Cai, Aimin Yu, Dan Meng
2019Capturing the Persistence of Facial Expression Features for Deepfake Video Detection.
Yiru Zhao, Wanfeng Ge, Wenxin Li, Run Wang, Lei Zhao, Jiang Ming
2019Characterizing Internet-Scale ICS Automated Attacks Through Long-Term Honeypot Data.
Jianzhou You, Shichao Lv, Yichen Hao, Xuan Feng, Ming Zhou, Limin Sun
2019Ciphertext Policy Attribute-Based Encryption for Circuits from LWE Assumption.
Geng Wang, Zhen Liu, Dawu Gu
2019Cloning Vulnerability Detection in Driver Layer of IoT Devices.
Weipeng Jiang, Bin Wu, Zhou Jiang, Shaobo Yang
2019CloudCoT: A Blockchain-Based Cloud Service Dependency Attestation Framework.
Zhenyu Zhao, Qingni Shen, Wu Luo, Anbang Ruan
2019Context-Aware IPv6 Address Hopping.
Matthias Marx, Monina Schwarz, Maximilian Blochberger, Frederik Wille, Hannes Federrath
2019Convolutional Neural Network Based Side-Channel Attacks with Customized Filters.
Man Wei, Danping Shi, Siwei Sun, Peng Wang, Lei Hu
2019DLchain: A Covert Channel over Blockchain Based on Dynamic Labels.
Jing Tian, Gaopeng Gou, Chang Liu, Yige Chen, Gang Xiong, Zhen Li
2019DTGuard: A Lightweight Defence Mechanism Against a New DoS Attack on SDN.
Jianwei Hou, Ziqi Zhang, Wenchang Shi, Bo Qin, Bin Liang
2019Deep Learning-Based Vulnerable Function Detection: A Benchmark.
Guanjun Lin, Wei Xiao, Jun Zhang, Yang Xiang
2019Differentially Private Frequent Itemset Mining Against Incremental Updates.
Wenjuan Liang, Hong Chen, Yuncheng Wu, Cuiping Li
2019Differentially Private Reinforcement Learning.
Pingchuan Ma, Zhiqiang Wang, Le Zhang, Ruming Wang, Xiaoxiang Zou, Tao Yang
2019Evading API Call Sequence Based Malware Classifiers.
Fenil Fadadu, Anand Handa, Nitesh Kumar, Sandeep Kumar Shukla
2019FraudJudger: Fraud Detection on Digital Payment Platforms with Fewer Labels.
Ruoyu Deng, Na Ruan, Guangsheng Zhang, Xiaohu Zhang
2019HeteroUI: A Framework Based on Heterogeneous Information Network Embedding for User Identification in Enterprise Networks.
Meng Li, Lijun Cai, Aimin Yu, Haibo Yu, Dan Meng
2019Hierarchical Representation Network for Steganalysis of QIM Steganography in Low-Bit-Rate Speech Signals.
Hao Yang, Zhongliang Yang, YongJian Bao, Yongfeng Huang
2019Impact of Multiple Reflections on Secrecy Capacity of Indoor VLC System.
Jian Chen, Tao Shu
2019Improved Differential Attacks on GIFT-64.
Huaifeng Chen, Rui Zong, Xiaoyang Dong
2019Neuron Selecting: Defending Against Adversarial Examples in Deep Neural Networks.
Ming Zhang, Hu Li, Xiaohui Kuang, Ling Pang, Zhendong Wu
2019Parallel Steepest Ascent Hill-Climbing for High Nonlinear Boolean and Vectorial Boolean Functions (S-Boxes).
Athmane Seghier, Jianxin Li
2019Practical Evaluation Methodology of Higher-Order Maskings at Different Operating Frequencies.
Yuguang Li, Ming Tang, Pengbo Wang, Yanbin Li, Shan Fu
2019Privacy-Preserving Decentralised Singular Value Decomposition.
Bowen Liu, Qiang Tang
2019Privacy-Preserving Distributed Machine Learning Based on Secret Sharing.
Ye Dong, Xiaojun Chen, Liyan Shen, Dakui Wang
2019Privacy-Preserving eID Derivation for Self-Sovereign Identity Systems.
Andreas Abraham, Felix Hörandner, Olamide Omolola, Sebastian Ramacher
2019Prototype-Based Malware Traffic Classification with Novelty Detection.
Lixin Zhao, Lijun Cai, Aimin Yu, Zhen Xu, Dan Meng
2019Provably Secure Group Authentication in the Asynchronous Communication Model.
Zhe Xia, Lein Harn, Bo Yang, Mingwu Zhang, Yi Mu, Willy Susilo, Weizhi Meng
2019Road Context-Aware Intrusion Detection System for Autonomous Cars.
Jingxuan Jiang, Chundong Wang, Sudipta Chattopadhyay, Wei Zhang
2019SecFlush: A Hardware/Software Collaborative Design for Real-Time Detection and Defense Against Flush-Based Cache Attacks.
Churan Tang, Zongbin Liu, Cunqing Ma, Jingquan Ge, Chenyang Tu
2019Tear Off Your Disguise: Phishing Website Detection Using Visual and Network Identities.
Zhaoyu Zhou, Lingjing Yu, Qingyun Liu, Yang Liu, Bo Luo
2019Towards Blockchain-Enabled Searchable Encryption.
Qiang Tang
2019Towards Comprehensive Security Analysis of Hidden Services Using Binding Guard Relays.
Muqian Chen, Xuebin Wang, Jinqiao Shi, Yue Gao, Can Zhao, Wei Sun
2019Towards Homograph-Confusable Domain Name Detection Using Dual-Channel CNN.
Guangxi Yu, Xinghua Yang, Yan Zhang, Huajun Cui, Huiran Yang, Yang Li
2019UBER: Combating Sandbox Evasion via User Behavior Emulators.
Pengbin Feng, Jianhua Sun, Songsong Liu, Kun Sun
2019Using Equivalent Class to Solve Interval Discrete Logarithm Problem.
Bin Qi, Jie Ma, Kewei Lv
2019VulHunter: An Automated Vulnerability Detection System Based on Deep Learning and Bytecode.
Ning Guo, Xiaoyong Li, Hui Yin, Yali Gao
2019WSLD: Detecting Unknown Webshell Using Fuzzy Matching and Deep Learning.
Zihao Zhao, Qixu Liu, Tiantian Song, Zhi Wang, Xianda Wu