ICICS C

35 papers

YearTitle / Authors
2022A Note on the Security Framework of Two-key DbHtS MACs.
Tingting Guo, Peng Wang
2022Autoencoder Assist: An Efficient Profiling Attack on High-Dimensional Datasets.
Qi Lei, Zijia Yang, Qin Wang, Yaoling Ding, Zhe Ma, An Wang
2022BS: Blockwise Sieve Algorithm for Finding Short Vectors from Sublattices.
Jinzheng Cao, Qingfeng Cheng, Xinghua Li, Yanbin Pan
2022Calibrating Learning Parity with Noise Authentication for Low-Resource Devices.
Teik Guan Tan, De Wen Soh, Jianying Zhou
2022Chuchotage: In-line Software Network Protocol Translation for (D)TLS.
Pegah Nikbakht Bideh, Nicolae Paladi
2022Conditional Cube Attacks on Full Members of KNOT-AEAD Family.
Siwei Chen, Zejun Xiang, Xiangyong Zeng, Shasha Zhang
2022Deep Learning Based Webshell Detection Coping with Long Text and Lexical Ambiguity.
Tongjian An, Xuefei Shui, Hongkui Gao
2022DeepC2: AI-Powered Covert Command and Control on OSNs.
Zhi Wang, Chaoge Liu, Xiang Cui, Jie Yin, Jiaxi Liu, Di Wu, Qixu Liu
2022Dependency-Based Link Prediction for Learning Microsegmentation Policy.
Steven Noel, Vipin Swarup
2022Exploring Phone-Based Authentication Vulnerabilities in Single Sign-On Systems.
Matthew M. Tolbert, Elie M. Hess, Mattheus C. Nascimento, Yunsen Lei, Craig A. Shue
2022FN2: Fake News DetectioN Based on Textual and Contextual Features.
Mouna Rabhi, Spiridon Bakiras, Roberto Di Pietro
2022FRACTAL: Single-Channel Multi-factor Transaction Authentication Through a Compromised Terminal.
Savio Sciancalepore, Simone Raponi, Daniele Caldarola, Roberto Di Pietro
2022Fast Fourier Orthogonalization over NTRU Lattices.
Shuo Sun, Yongbin Zhou, Rui Zhang, Yang Tao, Zehua Qiao, Jingdian Ming
2022FuzzBoost: Reinforcement Compiler Fuzzing.
Xiaoting Li, Xiao Liu, Lingwei Chen, Rupesh Prajapati, Dinghao Wu
2022Improving Deep Learning Based Password Guessing Models Using Pre-processing.
Yuxuan Wu, Ding Wang, Yunkai Zou, Ziyi Huang
2022Information and Communications Security - 24th International Conference, ICICS 2022, Canterbury, UK, September 5-8, 2022, Proceedings
Cristina Alcaraz, Liqun Chen, Shujun Li, Pierangela Samarati
2022Lightweight and Practical Privacy-Preserving Image Masking in Smart Community.
Zhen Liu, Yining Liu, Weizhi Meng
2022Maliciously Secure Multi-party PSI with Lower Bandwidth and Faster Computation.
Zhi Qiu, Kang Yang, Yu Yu, Lijing Zhou
2022Malware Detection with Limited Supervised Information via Contrastive Learning on API Call Sequences.
Mohan Gao, Peng Wu, Li Pan
2022New Results of Breaking the CLS Scheme from ACM-CCS 2014.
Jing Gao, Jun Xu, Tianyu Wang, Lei Hu
2022ODDITY: An Ensemble Framework Leverages Contrastive Representation Learning for Superior Anomaly Detection.
Hongyi Peng, Vinay Sachidananda, Teng Joon Lim, Rajendra Patil, Mingchang Liu, Sivaanandh Muneeswaran, Mohan Gurusamy
2022Peekaboo: Hide and Seek with Malware Through Lightweight Multi-feature Based Lenient Hybrid Approach.
Mingchang Liu, Vinay Sachidananda, Hongyi Peng, Rajendra Patil, Sivaanandh Muneeswaran, Mohan Gurusamy
2022Privacy-Aware Split Learning Based Energy Theft Detection for Smart Grids.
Arwa Alromih, John A. Clark, Prosanta Gope
2022Query-Efficient Black-Box Adversarial Attack with Random Pattern Noises.
Makoto Yuito, Kenta Suzuki, Kazuki Yoneyama
2022Repetitive, Oblivious, and Unlinkable SkNN Over Encrypted-and-Updated Data on Cloud.
Meng Li, Mingwei Zhang, Jianbo Gao, Chhagan Lal, Mauro Conti, Mamoun Alazab
2022Secure Boolean Masking of Gimli - Optimization and Evaluation on the Cortex-M4.
Tzu-Hsien Chang, Yen-Ting Kuo, Jiun-Peng Chen, Bo-Yin Yang
2022Secure Sketch and Fuzzy Extractor with Imperfect Randomness: An Information-Theoretic Study.
Kaini Chen, Peisong Shen, Kewei Lv, Chi Chen
2022Semi-supervised Context Discovery for Peer-Based Anomaly Detection in Multi-layer Networks.
Bo Dong, Yuhang Wu, Micheal Yeh, Yusan Lin, Yuzhong Chen, Hao Yang, Fei Wang, Wanxin Bai, Krupa Brahmkstri, Yimin Zhang, Chinna Kummitha, Verma Abhisar
2022SimCGE: Simple Contrastive Learning of Graph Embeddings for Cross-Version Binary Code Similarity Detection.
Fengliang Xia, Guixing Wu, Guochao Zhao, Xiangyu Li
2022Study on the Effect of Face Masks on Forensic Speaker Recognition.
Georgiana Bogdanel, Nadia Belghazi-Mohamed, Hilario Gómez-Moreno, Sergio Lafuente-Arroyo
2022TZ-IMA: Supporting Integrity Measurement for Applications with ARM TrustZone.
Liantao Song, Yan Ding, Pan Dong, Yong Guo, Chuang Wang
2022TapTree: Process-Tree Based Host Behavior Modeling and Threat Detection Framework via Sequential Pattern Mining.
Mohammad Mamun, Scott Buffett
2022Tight Analysis of Decryption Failure Probability of Kyber in Reality.
Boyue Fang, Weize Wang, Yunlei Zhao
2022Using Blockchains for Censorship-Resistant Bootstrapping in Anonymity Networks.
Yang Han, Dawei Xu, Jiaqi Gao, Liehuang Zhu
2022Video Forensics for Object Removal Based on Darknet3D.
Kejun Zhang, Yuhao Wang, Xinying Yu