| 2018 | A Comprehensive Study of Permission Usage on Android. Yemian Lu, Qi Li, Purui Su, Juan Pan, Jia Yan, Pengyi Zhan, Wei Guo |
| 2018 | A Provably-Secure Two-Factor Authenticated Key Exchange Protocol with Stronger Anonymity. Xiaoyan Yang, Han Jiang, Mengbo Hou, Zhihua Zheng, Qiuliang Xu, Kim-Kwang Raymond Choo |
| 2018 | ATPG Binning and SAT-Based Approach to Hardware Trojan Detection for Safety-Critical Systems. Animesh Basak Chowdhury, Ansuman Banerjee, Bhargab B. Bhattacharya |
| 2018 | Adding Confidential Transactions to Cryptocurrency IOTA with Bulletproofs. Peter Ince, Joseph K. Liu, Peng Zhang |
| 2018 | An Efficient Privacy Preserving Batch Authentication Scheme with Deterable Function for VANETs. Jinhui Liu, Yong Yu, Yanqi Zhao, Jianwei Jia, Shijia Wang |
| 2018 | An OpenvSwitch Extension for SDN Traceback. Danni Ren, Wenti Jiang, Huakang Li, Guozi Sun |
| 2018 | Analysis on the Block Reward of Fork After Withholding (FAW). Junming Ke, Han Jiang, Xiangfu Song, Shengnan Zhao, Hao Wang, Qiuliang Xu |
| 2018 | Analyzing the Communication Security Between Smartphones and IoT Based on CORAS. Motalib Hossain Bhuyan, Nur A. Azad, Weizhi Meng, Christian Damsgaard Jensen |
| 2018 | Android Malware Detection Methods Based on the Combination of Clustering and Classification. Zhi Xiong, Ting Guo, Qinkun Zhang, Yu Cheng, Kai Xu |
| 2018 | Anonymous Attribute-Based Conditional Proxy Re-encryption. Xianping Mao, Xuefeng Li, Xiaochuan Wu, Chuansheng Wang, Junzuo Lai |
| 2018 | Burn After Reading: Expunging Execution Footprints of Android Apps. Junliang Shu, Juanru Li, Yuanyuan Zhang, Dawu Gu |
| 2018 | Context-Aware Failure-Oblivious Computing as a Means of Preventing Buffer Overflows. Manuel Rigger, Daniel Pekarek, Hanspeter Mössenböck |
| 2018 | Continuous Authentication on Smartphone by Means of Periocular and Virtual Keystroke. Silvio Barra, Mirko Marras, Gianni Fenu |
| 2018 | Creating and Managing Realism in the Next-Generation Cyber Range. Dragos-George Ionica, Florin Pop, Aniello Castiglione |
| 2018 | DBAF: Dynamic Binary Analysis Framework and Its Applications. Ting Chen, Youzheng Feng, Xingwei Lin, Zihao Li, Xiaosong Zhang |
| 2018 | EMA-LAB: Efficient Multi Authorisation Level Attribute Based Access Control. Nesrine Kaaniche, Sana Belguith, Giovanni Russello |
| 2018 | Enhanced Keystroke Recognition Based on Moving Distance of Keystrokes Through WiFi. Yunfang Chen, Yihong Zhu, Hao Zhou, Wei Chen, Wei Zhang |
| 2018 | Fast QuadTree-Based Pose Estimation for Security Applications Using Face Biometrics. Paola Barra, Carmen Bisogni, Michele Nappi, Stefano Ricciardi |
| 2018 | LA ^3 : A Lightweight Accountable and Anonymous Authentication Scheme for Resource-Constrained Devices. Wensheng Zhang, Chuang Wang |
| 2018 | Multi-user Forward Secure Dynamic Searchable Symmetric Encryption. Qiao Wang, Yu Guo, Hejiao Huang, Xiaohua Jia |
| 2018 | Network and System Security - 12th International Conference, NSS 2018, Hong Kong, China, August 27-29, 2018, Proceedings Man Ho Au, Siu-Ming Yiu, Jin Li, Xiapu Luo, Cong Wang, Aniello Castiglione, Kamil Kluczniak |
| 2018 | Performance Analysis of Searchable Symmetric Encryption Schemes on Mobile Devices. Dennis Y. W. Liu, Chi Tsiu Tong, Winnie W. M. Lam |
| 2018 | Position Paper on Blockchain Technology: Smart Contract and Applications. Weizhi Meng, Jianfeng Wang, Xianmin Wang, Joseph K. Liu, Zuoxia Yu, Jin Li, Yongjun Zhao, Sherman S. M. Chow |
| 2018 | Position Paper on Recent Cybersecurity Trends: Legal Issues, AI and IoT. Junbin Fang, Yun-Ju Huang, Frankie Li, Jing Li, Xuan Wang, Yang Xiang |
| 2018 | PrivacySearch: An End-User and Query Generalization Tool for Privacy Enhancement in Web Search. Francisco-Javier Rodrigo-Ginés, Javier Parra-Arnau, Weizhi Meng, Yu Wang |
| 2018 | Real-Time IoT Device Activity Detection in Edge Networks. Ibbad Hafeez, Aaron Yi Ding, Markku Antikainen, Sasu Tarkoma |
| 2018 | Revisiting Website Fingerprinting Attacks in Real-World Scenarios: A Case Study of Shadowsocks. Yankang Zhao, Xiaobo Ma, Jianfeng Li, Shui Yu, Wei Li |
| 2018 | SCARA: A Framework for Secure Cloud-Assisted RFID Authentication for Smart Building Access Control. Ahmed Raad Al-Sudani, Wanlei Zhou, Sheng Wen, Ahmed Al-Mansoori |
| 2018 | Secure Scheme Against Compromised Hash in Proof-of-Work Blockchain. Fengjun Chen, Zhiqiang Liu, Yu Long, Zhen Liu, Ning Ding |
| 2018 | Secure Semantic Search Based on Two-Level Index Over Encrypted Cloud. Lili Xia, Zhangjie Fu |
| 2018 | Shoot at a Pigeon and Kill a Crow: On Strike Precision of Link Flooding Attacks. Jiahao Peng, Xiaobo Ma, Jianfeng Li, Lei Xue, Wenjun Hu |
| 2018 | Towards Security Authentication for IoT Devices with Lattice-Based ZK. Jie Cai, Han Jiang, Qiuliang Xu, Guangshi Lv, Minghao Zhao, Hao Wang |
| 2018 | Understanding the Behaviors of BGP-based DDoS Protection Services. Tony Miu Tung, Chenxu Wang, Jinhe Wang |
| 2018 | User Relationship Classification of Facebook Messenger Mobile Data using WEKA. Amber Umair, Priyadarsi Nanda, Xiangjian He, Kim-Kwang Raymond Choo |
| 2018 | Using Software Visualization for Supporting the Teaching of MapReduce. Umberto Ferraro Petrillo |
| 2018 | Vulnerability Assessment for Unmanned Systems Autonomy Services Architecture. Yu Li, Ivan Frasure, Ademola Ayodeji Ikusan, Junjie Zhang, Rui Dai |
| 2018 | Walking on the Cloud: Gait Recognition, a Wearable Solution. Aniello Castiglione, Kim-Kwang Raymond Choo, Maria De Marsico, Alessio Mecca |