| 2022 | A Note on the Security Framework of Two-key DbHtS MACs. Tingting Guo, Peng Wang |
| 2022 | Autoencoder Assist: An Efficient Profiling Attack on High-Dimensional Datasets. Qi Lei, Zijia Yang, Qin Wang, Yaoling Ding, Zhe Ma, An Wang |
| 2022 | BS: Blockwise Sieve Algorithm for Finding Short Vectors from Sublattices. Jinzheng Cao, Qingfeng Cheng, Xinghua Li, Yanbin Pan |
| 2022 | Calibrating Learning Parity with Noise Authentication for Low-Resource Devices. Teik Guan Tan, De Wen Soh, Jianying Zhou |
| 2022 | Chuchotage: In-line Software Network Protocol Translation for (D)TLS. Pegah Nikbakht Bideh, Nicolae Paladi |
| 2022 | Conditional Cube Attacks on Full Members of KNOT-AEAD Family. Siwei Chen, Zejun Xiang, Xiangyong Zeng, Shasha Zhang |
| 2022 | Deep Learning Based Webshell Detection Coping with Long Text and Lexical Ambiguity. Tongjian An, Xuefei Shui, Hongkui Gao |
| 2022 | DeepC2: AI-Powered Covert Command and Control on OSNs. Zhi Wang, Chaoge Liu, Xiang Cui, Jie Yin, Jiaxi Liu, Di Wu, Qixu Liu |
| 2022 | Dependency-Based Link Prediction for Learning Microsegmentation Policy. Steven Noel, Vipin Swarup |
| 2022 | Exploring Phone-Based Authentication Vulnerabilities in Single Sign-On Systems. Matthew M. Tolbert, Elie M. Hess, Mattheus C. Nascimento, Yunsen Lei, Craig A. Shue |
| 2022 | FN2: Fake News DetectioN Based on Textual and Contextual Features. Mouna Rabhi, Spiridon Bakiras, Roberto Di Pietro |
| 2022 | FRACTAL: Single-Channel Multi-factor Transaction Authentication Through a Compromised Terminal. Savio Sciancalepore, Simone Raponi, Daniele Caldarola, Roberto Di Pietro |
| 2022 | Fast Fourier Orthogonalization over NTRU Lattices. Shuo Sun, Yongbin Zhou, Rui Zhang, Yang Tao, Zehua Qiao, Jingdian Ming |
| 2022 | FuzzBoost: Reinforcement Compiler Fuzzing. Xiaoting Li, Xiao Liu, Lingwei Chen, Rupesh Prajapati, Dinghao Wu |
| 2022 | Improving Deep Learning Based Password Guessing Models Using Pre-processing. Yuxuan Wu, Ding Wang, Yunkai Zou, Ziyi Huang |
| 2022 | Information and Communications Security - 24th International Conference, ICICS 2022, Canterbury, UK, September 5-8, 2022, Proceedings Cristina Alcaraz, Liqun Chen, Shujun Li, Pierangela Samarati |
| 2022 | Lightweight and Practical Privacy-Preserving Image Masking in Smart Community. Zhen Liu, Yining Liu, Weizhi Meng |
| 2022 | Maliciously Secure Multi-party PSI with Lower Bandwidth and Faster Computation. Zhi Qiu, Kang Yang, Yu Yu, Lijing Zhou |
| 2022 | Malware Detection with Limited Supervised Information via Contrastive Learning on API Call Sequences. Mohan Gao, Peng Wu, Li Pan |
| 2022 | New Results of Breaking the CLS Scheme from ACM-CCS 2014. Jing Gao, Jun Xu, Tianyu Wang, Lei Hu |
| 2022 | ODDITY: An Ensemble Framework Leverages Contrastive Representation Learning for Superior Anomaly Detection. Hongyi Peng, Vinay Sachidananda, Teng Joon Lim, Rajendra Patil, Mingchang Liu, Sivaanandh Muneeswaran, Mohan Gurusamy |
| 2022 | Peekaboo: Hide and Seek with Malware Through Lightweight Multi-feature Based Lenient Hybrid Approach. Mingchang Liu, Vinay Sachidananda, Hongyi Peng, Rajendra Patil, Sivaanandh Muneeswaran, Mohan Gurusamy |
| 2022 | Privacy-Aware Split Learning Based Energy Theft Detection for Smart Grids. Arwa Alromih, John A. Clark, Prosanta Gope |
| 2022 | Query-Efficient Black-Box Adversarial Attack with Random Pattern Noises. Makoto Yuito, Kenta Suzuki, Kazuki Yoneyama |
| 2022 | Repetitive, Oblivious, and Unlinkable SkNN Over Encrypted-and-Updated Data on Cloud. Meng Li, Mingwei Zhang, Jianbo Gao, Chhagan Lal, Mauro Conti, Mamoun Alazab |
| 2022 | Secure Boolean Masking of Gimli - Optimization and Evaluation on the Cortex-M4. Tzu-Hsien Chang, Yen-Ting Kuo, Jiun-Peng Chen, Bo-Yin Yang |
| 2022 | Secure Sketch and Fuzzy Extractor with Imperfect Randomness: An Information-Theoretic Study. Kaini Chen, Peisong Shen, Kewei Lv, Chi Chen |
| 2022 | Semi-supervised Context Discovery for Peer-Based Anomaly Detection in Multi-layer Networks. Bo Dong, Yuhang Wu, Micheal Yeh, Yusan Lin, Yuzhong Chen, Hao Yang, Fei Wang, Wanxin Bai, Krupa Brahmkstri, Yimin Zhang, Chinna Kummitha, Verma Abhisar |
| 2022 | SimCGE: Simple Contrastive Learning of Graph Embeddings for Cross-Version Binary Code Similarity Detection. Fengliang Xia, Guixing Wu, Guochao Zhao, Xiangyu Li |
| 2022 | Study on the Effect of Face Masks on Forensic Speaker Recognition. Georgiana Bogdanel, Nadia Belghazi-Mohamed, Hilario Gómez-Moreno, Sergio Lafuente-Arroyo |
| 2022 | TZ-IMA: Supporting Integrity Measurement for Applications with ARM TrustZone. Liantao Song, Yan Ding, Pan Dong, Yong Guo, Chuang Wang |
| 2022 | TapTree: Process-Tree Based Host Behavior Modeling and Threat Detection Framework via Sequential Pattern Mining. Mohammad Mamun, Scott Buffett |
| 2022 | Tight Analysis of Decryption Failure Probability of Kyber in Reality. Boyue Fang, Weize Wang, Yunlei Zhao |
| 2022 | Using Blockchains for Censorship-Resistant Bootstrapping in Anonymity Networks. Yang Han, Dawei Xu, Jiaqi Gao, Liehuang Zhu |
| 2022 | Video Forensics for Object Removal Based on Darknet3D. Kejun Zhang, Yuhao Wang, Xinying Yu |