ICICS C

45 papers

YearTitle / Authors
2023A Certificateless Conditional Anonymous Authentication Scheme for Satellite Internet of Things.
Minqiu Tian, Fenghua Li, Kui Geng, Wenlong Kou, Chao Guo
2023A Fake News Detection Method Based on a Multimodal Cooperative Attention Network.
Hongyu Yang, Jinjiao Zhang, Ze Hu, Liang Zhang, Xiang Cheng
2023A Novel Deep Ensemble Framework for Online Signature Verification Using Temporal and Spatial Representation.
Hewei Yu, Pengfei Shi
2023A Polynomial-Time Attack on G2SIDH.
Guoqing Zhou, Maozhi Xu
2023AFLOW: Developing Adversarial Examples Under Extremely Noise-Limited Settings.
Renyang Liu, Jinhong Zhang, Haoran Li, Jin Zhang, Yuanyu Wang, Wei Zhou
2023An Enhanced Privacy-Preserving Hierarchical Federated Learning Framework for IoV.
Jiacheng Luo, Xuhao Li, Hao Wang, Dongwan Lan, Xiaofei Wu, Lu Zhou, Liming Fang
2023BDTS: Blockchain-Based Data Trading System.
Erya Jiang, Bo Qin, Qin Wang, Qianhong Wu, Sanxi Li, Wenchang Shi, Yingxin Bi, Wenyi Tang
2023BLAC: A Blockchain-Based Lightweight Access Control Scheme in Vehicular Social Networks.
Yuting Zuo, Li Xu, Yuexin Zhang, Zhaozhe Kang, Chenbin Zhao
2023Black-Box Fairness Testing with Shadow Models.
Weipeng Jiang, Chao Shen, Chenhao Lin, Jingyi Wang, Jun Sun, Xuanqi Gao
2023Block Ciphers Classification Based on Randomness Test Statistic Value via LightGBM.
Sijia Liu, Min Luo, Cong Peng, Debiao He
2023Blockchain Based Publicly Auditable Multi-party Computation with Cheater Detection.
Shan Jin, Yong Li, Xi Chen, Ruxian Li
2023Cryptanalysis of Two White-Box Implementations of the CLEFIA Block Cipher.
Jiqiang Lu, Can Wang
2023CryptoMask: Privacy-Preserving Face Recognition.
Jianli Bai, Xiaowu Zhang, Xiangfu Song, Hang Shao, Qifan Wang, Shujie Cui, Giovanni Russello
2023DRoT: A Decentralised Root of Trust for Trusted Networks.
Loganathan Parthipan, Liqun Chen, Christopher J. P. Newton, Yunpeng Li, Fei Liu, Donghui Wang
2023Efficient Private Multiset ID Protocols.
Cong Zhang, Weiran Liu, Bolin Ding, Dongdai Lin
2023Efficient and Appropriate Key Generation Scheme in Different IoT Scenarios.
Hong Zhao, Enting Guo, Chunhua Su, Xinyi Huang
2023Finding Missing Security Operation Bugs via Program Slicing and Differential Check.
Yeqi Fu, Yongzhi Liu, Qian Zhang, Zhou Yang, Xiarun Chen, Chenglin Xie, Weiping Wen
2023Forward Secure Lattice-Based Ring Signature Scheme in the Standard Model.
Xiaoling Yu, Yuntao Wang
2023Graph Unlearning Using Knowledge Distillation.
Wenyue Zheng, Ximeng Liu, Yuyang Wang, Xuanwei Lin
2023Illegal Accounts Detection on Ethereum Using Heterogeneous Graph Transformer Networks.
Chang Xu, Shiyao Zhang, Liehuang Zhu, Xiaodong Shen, Xiaoming Zhang
2023Improved Related-Key Rectangle Attack Against the Full AES-192.
Xuanyu Liang, Yincen Chen, Ling Song, Qianqian Yang, Zhuohui Feng, Tianrong Huang
2023Improvements of Homomorphic Secure Evaluation of Inverse Square Root.
Hongyuan Qu, Guangwu Xu
2023Information and Communications Security - 25th International Conference, ICICS 2023, Tianjin, China, November 18-20, 2023, Proceedings
Ding Wang, Moti Yung, Zheli Liu, Xiaofeng Chen
2023Learning to Detect Deepfakes via Adaptive Attention and Constrained Difference.
Lichao Su, Bin Wu, Chenwei Dai, Huan Luo, Jian Chen
2023Link Prediction-Based Multi-Identity Recognition of Darknet Vendors.
Futai Zou, Yuelin Hu, Wenliang Xu, Yue Wu
2023Multi-scale Features Destructive Universal Adversarial Perturbations.
Huangxinyue Wu, Haoran Li, Jinhong Zhang, Wei Zhou, Lei Guo, Yunyun Dong
2023Neural Network Backdoor Attacks Fully Controlled by Composite Natural Utterance Fragments.
Xubo Yang, Linsen Li, Yenan Chen
2023Oblivious Transfer from Rerandomizable PKE.
Shuaishuai Li, Cong Zhang, Dongdai Lin
2023On-Demand Allocation of Cryptographic Computing Resource with Load Prediction.
Xiaogang Cao, Fenghua Li, Kui Geng, Yingke Xie, Wenlong Kou
2023Outsourcing Verifiable Distributed Oblivious Polynomial Evaluation from Threshold Cryptography.
Amirreza Hamidi, Hossein Ghodosi
2023PAE: Towards More Efficient and BBB-Secure AE from a Single Public Permutation.
Arghya Bhattacharjee, Ritam Bhaumik, Avijit Dutta, Eik List
2023PiXi: Password Inspiration by Exploring Information.
Shengqian Wang, Amirali Salehi-Abari, Julie Thorpe
2023Pixel-Wise Reconstruction of Private Data in Split Federated Learning.
Hong Huang, Xingyang Li, Wenjian He
2023Private Message Franking with After Opening Privacy.
Iraklis Leontiadis, Serge Vaudenay
2023Revisiting the Deep Learning-Based Eavesdropping Attacks via Facial Dynamics from VR Motion Sensors.
Soohyeon Choi, Manar Mohaisen, DaeHun Nyang, David Mohaisen
2023SAT-Aided Differential Cryptanalysis of Lightweight Block Ciphers Midori, MANTIS and QARMA.
Yaxin Cui, Hong Xu, Lin Tan, Wenfeng Qi
2023SCOPE: A Cross-Chain Supervision Scheme for Consortium Blockchains.
Yuwei Xu, Haoyu Wang, Junyu Zeng
2023Secure Multi-party Computation with Legally-Enforceable Fairness.
Takeshi Nakai, Kazumasa Shinagawa
2023Security Analysis of Alignment-Robust Cancelable Biometric Scheme for Iris Verification.
Ningjing Fan, Dongdong Zhao, Hucheng Liao
2023Semi-Honest 2-Party Faithful Truncation from Two-Bit Extraction.
Huan Zou, Yuting Xiao, Rui Zhang
2023Subsidy Bridge: Rewarding Cross-Blockchain Relayers with Subsidy.
Yifu Geng, Bo Qin, Qin Wang, Wenchang Shi, Qianhong Wu
2023TimeClave: Oblivious In-Enclave Time Series Processing System.
Kassem Bagher, Shujie Cui, Xingliang Yuan, Carsten Rudolph, Xun Yi
2023Towards Efficient and Privacy-Preserving Anomaly Detection of Blockchain-Based Cryptocurrency Transactions.
Yuhan Song, Yuefei Zhu, Fushan Wei
2023Towards Quantifying Cross-Domain Maximal Extractable Value for Blockchain Decentralisation.
Johan Hagelskjar Sjursen, Weizhi Meng, Wei-Yang Chiu
2023Zoomer: A Website Fingerprinting Attack Against Tor Hidden Services.
Yuwei Xu, Lei Wang, Jiangfeng Li, Kehui Song, Yali Yuan