| 2022 | A Blockchain-Based Mutual Authentication Protocol for Smart Home. Biwen Chen, Bo Tang, Shangwei Guo, Jiyun Yang, Tao Xiang |
| 2022 | ATLAS: A Practical Attack Detection and Live Malware Analysis System for IoT Threat Intelligence. Yan Lin Aung, Martín Ochoa, Jianying Zhou |
| 2022 | Anatomist: Enhanced Firmware Vulnerability Discovery Based on Program State Abnormality Determination with Whole-System Replay. Runhao Liu, Bo Yu, Baosheng Wang, Jianbin Ye |
| 2022 | AspIOC: Aspect-Enhanced Deep Neural Network for Actionable Indicator of Compromise Recognition. Shaofeng Wang, Bo Lang, Nan Xiao, Yikai Chen |
| 2022 | Batched Fully Homomorphic Encryption from TFHE. Yuting Jiang, Jianghong Wei |
| 2022 | Bilateral Privacy-Preserving Task Assignment with Personalized Participant Selection for Mobile Crowdsensing. Shijin Chen, Mingwu Zhang, Bo Yang |
| 2022 | CFL: Cluster Federated Learning in Large-Scale Peer-to-Peer Networks. Qian Chen, Zilong Wang, Yilin Zhou, Jiawei Chen, Dan Xiao, Xiaodong Lin |
| 2022 | Communication-Efficient and Secure Federated Learning Based on Adaptive One-Bit Compressed Sensing. Di Xiao, Xue Tan, Min Li |
| 2022 | Crypto-Steganographic Validity for Additive Manufacturing (3D Printing) Design Files. Mark Yampolskiy, Lynne Graves, Jacob Gatlin, Jeffrey Todd McDonald, Moti Yung |
| 2022 | Daric: A Storage Efficient Payment Channel with Punishment Mechanism. Arash Mirzaei, Amin Sakzad, Jiangshan Yu, Ron Steinfeld |
| 2022 | Deep Learning Assisted Key Recovery Attack for Round-Reduced Simeck32/64. Lijun Lyu, Yi Tu, Yingjie Zhang |
| 2022 | Dissecting Applications Uninstallers and Removers: Are They Effective? Marcus Botacin, André Grégio |
| 2022 | EarlyCrow: Detecting APT Malware Command and Control over HTTP(S) Using Contextual Summaries. Almuthanna Alageel, Sergio Maffeis |
| 2022 | Efficient ECDSA-Based Adaptor Signature for Batched Atomic Swaps. Binbin Tu, Min Zhang, Chen Yu |
| 2022 | Efficient Private Set Intersection Cardinality Protocol in the Reverse Unbalanced Setting. Hanyu Li, Ying Gao |
| 2022 | Efficient Scalar Multiplication on Koblitz Curves with Pre-computation. Xiuxiu Li, Wei Yu, Kunpeng Wang |
| 2022 | Further Cryptanalysis of a Type of RSA Variants. Gongyu Shi, Geng Wang, Dawu Gu |
| 2022 | GRUZ: Practical Resource Fair Exchange Without Blockchain. Yongqing Xu, Kaiyi Zhang, Yu Yu |
| 2022 | HeHe: Balancing the Privacy and Efficiency in Training CNNs over the Semi-honest Cloud. Longlong Sun, Hui Li, Shiwen Yu, Xindi Ma, Yanguo Peng, Jiangtao Cui |
| 2022 | Implicit Rejection in Fujisaki-Okamoto: Framework and a Novel Realization. Zhao Chen, Xianhui Lu, Dingding Jia, Bao Li |
| 2022 | Information Security - 25th International Conference, ISC 2022, Bali, Indonesia, December 18-22, 2022, Proceedings Willy Susilo, Xiaofeng Chen, Fuchun Guo, Yudi Zhang, Rolly Intan |
| 2022 | More Efficient Adaptively Secure Lattice-Based IBE with Equality Test in the Standard Model. Kyoichi Asano, Keita Emura, Atsushi Takayasu |
| 2022 | OblivSend: Secure and Ephemeral File Sharing Services with Oblivious Expiration Control. Yanjun Shen, Bin Yu, Shangqi Lai, Xingliang Yuan, Shifeng Sun, Joseph K. Liu, Surya Nepal |
| 2022 | Privacy Preserving Computation in Cloud Using Reusable Garbled Oblivious RAMs. Yongge Wang, Qutaibah M. Malluhi |
| 2022 | QUIC Protocol with Post-quantum Authentication. Manohar Raavi, Simeon Wuthier, Pranav Chandramouli, Xiaobo Zhou, Sang-Yoon Chang |
| 2022 | Representing LLVM-IR in a Code Property Graph. Alexander Küchler, Christian Banse |
| 2022 | Searching for Encrypted Data on Blockchain: An Efficient, Secure and Fair Realization. Jianzhang Chen, Haibo Tian, Fangguo Zhang |
| 2022 | The SAT-Based Automatic Searching and Experimental Verification for Differential Characteristics with Application to Midori64. Yingying Li, Qichun Wang |
| 2022 | Why We Need a Theory of Maliciousness: Hardware Performance Counters in Security. Marcus Botacin, André Grégio |
| 2022 | Witness Encryption from Smooth Projective Hashing System. Yuzhu Wang, Mingwu Zhang |