| 2020 | A Framework of Blockchain-Based Collaborative Intrusion Detection in Software Defined Networking. Wenjuan Li, Jiao Tan, Yu Wang |
| 2020 | A Model Specification Implementation for Trust Negotiation. Martin Kolár, M. Carmen Fernández Gago, Javier López |
| 2020 | A Privacy Preserving Aggregation Scheme for Fog-Based Recommender System. Xiaodong Wang, Bruce Gu, Youyang Qu, Yongli Ren, Yong Xiang, Longxiang Gao |
| 2020 | A Weighted Voting Framework for Android App's Vetting Based on Multiple Machine Learning Models. Honglei Hui, Yongbo Zhi, Ning Xi, Yuanqing Liu |
| 2020 | AC Shion Samadder Chaudhury, Sabyasachi Dutta, Kouichi Sakurai |
| 2020 | Compactly Committing Authenticated Encryption Using Tweakable Block Cipher. Shoichi Hirose |
| 2020 | Data Analytics of Crowdsourced Resources for Cybersecurity Intelligence. Nan Sun, Jun Zhang, Shang Gao, Leo Yu Zhang, Seyit Camtepe, Yang Xiang |
| 2020 | Defending Against Package Typosquatting. Matthew Taylor, Ruturaj K. Vaidya, Drew Davidson, Lorenzo De Carli, Vaibhav Rastogi |
| 2020 | ESCAPADE: Encryption-Type-Ransomware: System Call Based Pattern Detection. Christopher Jun-Wen Chew, Vimal Kumar, Panos Patros, Robi Malik |
| 2020 | EnCoD: Distinguishing Compressed and Encrypted File Fragments. Fabio De Gaspari, Dorjan Hitaj, Giulio Pagnotta, Lorenzo De Carli, Luigi V. Mancini |
| 2020 | Evading Stepping-Stone Detection with Enough Chaff. Henry Clausen, Michael Scott Gibson, David Aspinall |
| 2020 | Evaluation of Anomaly-Based Intrusion Detection with Combined Imbalance Correction and Feature Selection. Andreas Heidelbach Engly, Anton Ruby Larsen, Weizhi Meng |
| 2020 | Fixing Vulnerabilities Automatically with Linters. Willard Rafnsson, Rosario Giustolisi, Mark Kragerup, Mathias Høyrup |
| 2020 | Game Theoretic Analysis of Reputation Approach on Block Withholding Attack. Lianyang Yu, Jiangshan Yu, Yevhen Zolotavkin |
| 2020 | Graph Deep Learning Based Anomaly Detection in Ethereum Blockchain Network. Vatsal Patel, Lei Pan, Sutharshan Rajasegarar |
| 2020 | HyperWall: A Hypervisor for Detection and Prevention of Malicious Communication. Michael Kiperberg, Raz Ben Yehuda, Nezer J. Zaidenberg |
| 2020 | Identity-Based Outsider Anonymous Broadcast Encryption with Simultaneous Individual Messaging. Mriganka Mandal, Koji Nuida |
| 2020 | Model Poisoning Defense on Federated Learning: A Validation Based Approach. Yuao Wang, Tianqing Zhu, Wenhan Chang, Sheng Shen, Wei Ren |
| 2020 | Multiply, Divide, and Conquer - Making Fully Decentralised Access Control a Reality. Bernd Prünster, Dominik Ziegler, Gerald Palfinger |
| 2020 | Network and System Security - 14th International Conference, NSS 2020, Melbourne, VIC, Australia, November 25-27, 2020, Proceedings Miroslaw Kutylowski, Jun Zhang, Chao Chen |
| 2020 | On the Vulnerability of Hyperdimensional Computing-Based Classifiers to Adversarial Attacks. Fangfang Yang, Shaolei Ren |
| 2020 | PowerKey: Generating Secret Keys from Power Line Electromagnetic Interferences. Fangfang Yang, Mohammad A. Islam, Shaolei Ren |
| 2020 | Privacy and Utility Trade-Off for Textual Analysis via Calibrated Multivariate Perturbations. Jingye Tang, Tianqing Zhu, Ping Xiong, Yu Wang, Wei Ren |
| 2020 | Safety Analysis of High-Dimensional Anonymized Data from Multiple Perspectives. Takaya Yamazoe, Kazumasa Omote |
| 2020 | Security Evaluation of Smart Contract-Based On-chain Ethereum Wallets. Purathani Praitheeshan, Lei Pan, Robin Doss |
| 2020 | Sequential Anomaly Detection Using Feedback and Prioritized Experience Replay. Anish Reddy Ellore, Sanket Mishra, Chittaranjan Hota |
| 2020 | The Impact of Differential Privacy on Model Fairness in Federated Learning. Xiuting Gu, Tianqing Zhu, Jie Li, Tao Zhang, Wei Ren |