| 2022 | A CNN-Based Semi-supervised Learning Approach for the Detection of SS7 Attacks. Orhan Ermis, Christophe Feltus, Qiang Tang, Hoang Trang, Alexandre de Oliveira, Cu D. Nguyen, Alain Hirtzig |
| 2022 | A Low-Cost and Cloud Native Solution for Security Orchestration, Automation, and Response. Juan Christian, Luis Paulino, Alan Oliveira de Sá |
| 2022 | A New Scalable Mutual Authentication in Fog-Edge Drone Swarm Environment. Kyusuk Han, Eiman Al Nuaimi, Shamma Al Blooshi, Rafail Psiakis, Chan Yeob Yeun |
| 2022 | A Traceable and Revocable Attribute-based Encryption Scheme Based on Policy Hiding in Smart Healthcare Scenarios. Yang Zhao, Zhaozhong Liu, Jingmin An, Guobin Zhu, Saru Kumari |
| 2022 | Anonymous Authentication Protocols in Vehicular Ad Hoc Network-An Survey. Guiwen Fu, Yanan Chen, Zhen Wu, Qianlin Ye |
| 2022 | Attribute Based Tracing for Securing Group Signatures Against Centralized Authorities. Maharage Nisansala Sevwandi Perera, Toru Nakamura, Takashi Matsunaka, Hiroyuki Yokoyama, Kouichi Sakurai |
| 2022 | BADPASS: Bots Taking ADvantage of Proxy as a Service. Elisa Chiapponi, Marc Dacier, Olivier Thonnard, Mohamed Fangar, Vincent Rigal |
| 2022 | Blockchain-Based Confidential Payment System with Controllable Regulation. Yu-Chen Liao, Raylin Tso, Zi-Yuan Liu, Yi-Fan Tseng |
| 2022 | Blockchain-Based Multi-keyword Search on Encrypted COVID-19 Contact Tracing Data. Zheng Yao Ng, Iftekhar Salam |
| 2022 | Blockchain-Based Self-Sovereign Identity System with Attribute-Based Issuance. Yi-Hsiu Lee, Zi-Yuan Liu, Raylin Tso, Yi-Fan Tseng |
| 2022 | Continued Fractions Applied to a Family of RSA-like Cryptosystems. Paul Cotan, George Teseleanu |
| 2022 | Designing Enhanced Robust 6G Connection Strategy with Blockchain. August Lykke Thomsen, Bastian Preisel, Victor Rodrigues Andersen, Wei-Yang Chiu, Weizhi Meng |
| 2022 | Detect Compiler Inserted Run-time Security Checks in Binary Software. Koyel Pramanick, Prasad A. Kulkarni |
| 2022 | Detection of Adversarial Examples Based on the Neurons Distribution. Jiang-Yi Zeng, Chi-Yuan Chen, Hsin-Hung Cho |
| 2022 | Detection of MSOffice-Embedded Malware: Feature Mining and Short- vs. Long-Term Performance. Silviu Constantin Vitel, Marilena Lupascu, Dragos Teodor Gavrilut, Henri Luchian |
| 2022 | Differential Cryptanalysis of Salsa20 Based on Comprehensive Analysis of PNBs. Nasratullah Ghafoori, Atsuko Miyaji |
| 2022 | Evaluating the Possibility of Evasion Attacks to Machine Learning-Based Models for Malicious PowerShell Detection. Yuki Mezawa, Mamoru Mimura |
| 2022 | Federated Intrusion Detection on Non-IID Data for IIoT Networks Using Generative Adversarial Networks and Reinforcement Learning. Nguyen Huu Quyen, Phan The Duy, Nguyen Chi Vy, Do Thi Thu Hien, Van-Hau Pham |
| 2022 | Information Security Practice and Experience - 17th International Conference, ISPEC 2022, Taipei, Taiwan, November 23-25, 2022, Proceedings Chunhua Su, Dimitris Gritzalis, Vincenzo Piuri |
| 2022 | LMGROUP: A Lightweight Multicast Group Key Management for IoT Networks. Pegah Nikbakht Bideh |
| 2022 | M-EDESE: Multi-Domain, Easily Deployable, and Efficiently Searchable Encryption. Jiaming Yuan, Yingjiu Li, Jianting Ning, Robert H. Deng |
| 2022 | Optimal Generic Attack Against Basic Boneh-Boyen Signatures. Yen-Kang Fu, Jonathan Chang, David Jao |
| 2022 | Performance Evaluation of Post-Quantum TLS 1.3 on Resource-Constrained Embedded Systems. George Tasopoulos, Jinhui Li, Apostolos P. Fournaris, Raymond K. Zhao, Amin Sakzad, Ron Steinfeld |
| 2022 | Physical Zero-Knowledge Proof Protocol for Topswops. Yuichi Komano, Takaaki Mizuki |
| 2022 | Practical Backdoor Attack Against Speaker Recognition System. Yuxiao Luo, Jianwei Tai, Xiaoqi Jia, Shengzhi Zhang |
| 2022 | Preventing Adversarial Attacks Against Deep Learning-Based Intrusion Detection System. Xuan-Ha Nguyen, Xuan-Duong Nguyen, Kim-Hung Le |
| 2022 | PriApp-Install: Learning User Privacy Preferences on Mobile Apps' Installation. Ha Xuan Son, Barbara Carminati, Elena Ferrari |
| 2022 | Protecting Cyber-Physical System Testbeds from Red-Teaming/Blue-Teaming Experiments Gone Awry. Md. Rakibul Hasan Talukder, Md. Al Amin, Indrajit Ray |
| 2022 | Robust Anomaly Detection via Radio Fingerprinting in LoRa-Enabled IIoT. Subir Halder, Thomas Newe |
| 2022 | Secure Human Identification Protocol with Human-Computable Passwords. Slawomir Matelski |
| 2022 | Sherlock Holmes Zero-Knowledge Protocols. George Teseleanu |
| 2022 | Sparse Attack on Skeleton-Based Human Action Recognition for Internet of Video Things Systems. Yinqin Huang, Cheng Dai, Wei-Che Chien |
| 2022 | Techniques for Continuous Touch-Based Authentication. Martin Georgiev, Simon Eberz, Ivan Martinovic |
| 2022 | Towards Blockchain-Enabled Intrusion Detection for Vehicular Navigation Map System. Bodi Bodi, Wei-Yang Chiu, Weizhi Meng |
| 2022 | UCC: Universal and Committee-based Cross-chain Framework. Yi Zhang, Zhonghui Ge, Yu Long, Dawu Gu |
| 2022 | Using API Calls for Sequence-Pattern Feature Mining-Based Malware Detection. Gheorghe Balan, Dragos Teodor Gavrilut, Henri Luchian |