| 2020 | Information and Communications Security - 21st International Conference, ICICS 2019, Beijing, China, December 15-17, 2019, Revised Selected Papers Jianying Zhou, Xiapu Luo, Qingni Shen, Zhen Xu |
| 2019 | A Character-Level BiGRU-Attention for Phishing Classification. Lijuan Yuan, Zhiyong Zeng, Yikang Lu, Xiaofeng Ou, Tao Feng |
| 2019 | A Multi-Group Signature Scheme from Lattices. Tian Qiu, Lin Hou, Dongdai Lin |
| 2019 | AADS: A Noise-Robust Anomaly Detection Framework for Industrial Control Systems. Maged AbdelAty, Roberto Doriguzzi Corin, Domenico Siracusa |
| 2019 | AGE: Authentication Graph Embedding for Detecting Anomalous Login Activities. Renzheng Wei, Lijun Cai, Aimin Yu, Dan Meng |
| 2019 | Accelerating SM2 Digital Signature Algorithm Using Modern Processor Features. Long Mai, Yuan Yan, Songlin Jia, Shuran Wang, Jianqiang Wang, Juanru Li, Siqi Ma, Dawu Gu |
| 2019 | Adaptively Secure Puncturable Pseudorandom Functions via Puncturable Identity-Based KEMs. Xin Wang, Shimin Li, Rui Xue |
| 2019 | An Adversarial Attack Based on Multi-objective Optimization in the Black-Box Scenario: MOEA-APGA II. Chunkai Zhang, Yepeng Deng, Xin Guo, Xuan Wang, Chuanyi Liu |
| 2019 | Automated Cyber Threat Intelligence Reports Classification for Early Warning of Cyber Attacks in Next Generation SOC. Wenzhuo Yang, Kwok-Yan Lam |
| 2019 | Automatic Demirci-Selçuk Meet-in-the-Middle Attack on SKINNY with Key-Bridging. Qiu Chen, Danping Shi, Siwei Sun, Lei Hu |
| 2019 | CDAE: Towards Empowering Denoising in Side-Channel Analysis. Guang Yang, Huizhong Li, Jingdian Ming, Yongbin Zhou |
| 2019 | CTLMD: Continuous-Temporal Lateral Movement Detection Using Graph Embedding. Suya Zhao, Renzheng Wei, Lijun Cai, Aimin Yu, Dan Meng |
| 2019 | Capturing the Persistence of Facial Expression Features for Deepfake Video Detection. Yiru Zhao, Wanfeng Ge, Wenxin Li, Run Wang, Lei Zhao, Jiang Ming |
| 2019 | Characterizing Internet-Scale ICS Automated Attacks Through Long-Term Honeypot Data. Jianzhou You, Shichao Lv, Yichen Hao, Xuan Feng, Ming Zhou, Limin Sun |
| 2019 | Ciphertext Policy Attribute-Based Encryption for Circuits from LWE Assumption. Geng Wang, Zhen Liu, Dawu Gu |
| 2019 | Cloning Vulnerability Detection in Driver Layer of IoT Devices. Weipeng Jiang, Bin Wu, Zhou Jiang, Shaobo Yang |
| 2019 | CloudCoT: A Blockchain-Based Cloud Service Dependency Attestation Framework. Zhenyu Zhao, Qingni Shen, Wu Luo, Anbang Ruan |
| 2019 | Context-Aware IPv6 Address Hopping. Matthias Marx, Monina Schwarz, Maximilian Blochberger, Frederik Wille, Hannes Federrath |
| 2019 | Convolutional Neural Network Based Side-Channel Attacks with Customized Filters. Man Wei, Danping Shi, Siwei Sun, Peng Wang, Lei Hu |
| 2019 | DLchain: A Covert Channel over Blockchain Based on Dynamic Labels. Jing Tian, Gaopeng Gou, Chang Liu, Yige Chen, Gang Xiong, Zhen Li |
| 2019 | DTGuard: A Lightweight Defence Mechanism Against a New DoS Attack on SDN. Jianwei Hou, Ziqi Zhang, Wenchang Shi, Bo Qin, Bin Liang |
| 2019 | Deep Learning-Based Vulnerable Function Detection: A Benchmark. Guanjun Lin, Wei Xiao, Jun Zhang, Yang Xiang |
| 2019 | Differentially Private Frequent Itemset Mining Against Incremental Updates. Wenjuan Liang, Hong Chen, Yuncheng Wu, Cuiping Li |
| 2019 | Differentially Private Reinforcement Learning. Pingchuan Ma, Zhiqiang Wang, Le Zhang, Ruming Wang, Xiaoxiang Zou, Tao Yang |
| 2019 | Evading API Call Sequence Based Malware Classifiers. Fenil Fadadu, Anand Handa, Nitesh Kumar, Sandeep Kumar Shukla |
| 2019 | FraudJudger: Fraud Detection on Digital Payment Platforms with Fewer Labels. Ruoyu Deng, Na Ruan, Guangsheng Zhang, Xiaohu Zhang |
| 2019 | HeteroUI: A Framework Based on Heterogeneous Information Network Embedding for User Identification in Enterprise Networks. Meng Li, Lijun Cai, Aimin Yu, Haibo Yu, Dan Meng |
| 2019 | Hierarchical Representation Network for Steganalysis of QIM Steganography in Low-Bit-Rate Speech Signals. Hao Yang, Zhongliang Yang, YongJian Bao, Yongfeng Huang |
| 2019 | Impact of Multiple Reflections on Secrecy Capacity of Indoor VLC System. Jian Chen, Tao Shu |
| 2019 | Improved Differential Attacks on GIFT-64. Huaifeng Chen, Rui Zong, Xiaoyang Dong |
| 2019 | Neuron Selecting: Defending Against Adversarial Examples in Deep Neural Networks. Ming Zhang, Hu Li, Xiaohui Kuang, Ling Pang, Zhendong Wu |
| 2019 | Parallel Steepest Ascent Hill-Climbing for High Nonlinear Boolean and Vectorial Boolean Functions (S-Boxes). Athmane Seghier, Jianxin Li |
| 2019 | Practical Evaluation Methodology of Higher-Order Maskings at Different Operating Frequencies. Yuguang Li, Ming Tang, Pengbo Wang, Yanbin Li, Shan Fu |
| 2019 | Privacy-Preserving Decentralised Singular Value Decomposition. Bowen Liu, Qiang Tang |
| 2019 | Privacy-Preserving Distributed Machine Learning Based on Secret Sharing. Ye Dong, Xiaojun Chen, Liyan Shen, Dakui Wang |
| 2019 | Privacy-Preserving eID Derivation for Self-Sovereign Identity Systems. Andreas Abraham, Felix Hörandner, Olamide Omolola, Sebastian Ramacher |
| 2019 | Prototype-Based Malware Traffic Classification with Novelty Detection. Lixin Zhao, Lijun Cai, Aimin Yu, Zhen Xu, Dan Meng |
| 2019 | Provably Secure Group Authentication in the Asynchronous Communication Model. Zhe Xia, Lein Harn, Bo Yang, Mingwu Zhang, Yi Mu, Willy Susilo, Weizhi Meng |
| 2019 | Road Context-Aware Intrusion Detection System for Autonomous Cars. Jingxuan Jiang, Chundong Wang, Sudipta Chattopadhyay, Wei Zhang |
| 2019 | SecFlush: A Hardware/Software Collaborative Design for Real-Time Detection and Defense Against Flush-Based Cache Attacks. Churan Tang, Zongbin Liu, Cunqing Ma, Jingquan Ge, Chenyang Tu |
| 2019 | Tear Off Your Disguise: Phishing Website Detection Using Visual and Network Identities. Zhaoyu Zhou, Lingjing Yu, Qingyun Liu, Yang Liu, Bo Luo |
| 2019 | Towards Blockchain-Enabled Searchable Encryption. Qiang Tang |
| 2019 | Towards Comprehensive Security Analysis of Hidden Services Using Binding Guard Relays. Muqian Chen, Xuebin Wang, Jinqiao Shi, Yue Gao, Can Zhao, Wei Sun |
| 2019 | Towards Homograph-Confusable Domain Name Detection Using Dual-Channel CNN. Guangxi Yu, Xinghua Yang, Yan Zhang, Huajun Cui, Huiran Yang, Yang Li |
| 2019 | UBER: Combating Sandbox Evasion via User Behavior Emulators. Pengbin Feng, Jianhua Sun, Songsong Liu, Kun Sun |
| 2019 | Using Equivalent Class to Solve Interval Discrete Logarithm Problem. Bin Qi, Jie Ma, Kewei Lv |
| 2019 | VulHunter: An Automated Vulnerability Detection System Based on Deep Learning and Bytecode. Ning Guo, Xiaoyong Li, Hui Yin, Yali Gao |
| 2019 | WSLD: Detecting Unknown Webshell Using Fuzzy Matching and Deep Learning. Zihao Zhao, Qixu Liu, Tiantian Song, Zhi Wang, Xianda Wu |