| 2017 | Security and Privacy in Communication Networks - 12th International Conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016, Proceedings Robert H. Deng, Jian Weng, Kui Ren, Vinod Yegneswaran |
| 2016 | A Behavioral Biometrics Based Approach to Online Gender Classification. Nicolas Van Balen, Christopher T. Ball, Haining Wang |
| 2016 | A Multi-layer Model to Detect Spam Email at Client Side. Simi Kamini Bajaj |
| 2016 | A Multi-protocol Security Framework to Support Internet of Things. Biplob R. Ray, Morshed U. Chowdhury, Jemal H. Abawajy |
| 2016 | A Secure and Fast Dispersal Storage Scheme Based on the Learning with Errors Problem. Ling Yang, Fuyang Fang, Xianhui Lu, Wen Tao Zhu, Qiongxiao Wang, Shen Yan, Shiran Pan |
| 2016 | A Very Compact Masked S-Box for High-Performance Implementation of SM4 Based on Composite Field. Hailiang Fu, Guoqiang Bai, Xingjun Wu |
| 2016 | Access Control Management for Secure Cloud Storage. Enrico Bacis, Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Marco Rosa, Pierangela Samarati |
| 2016 | Alde: Privacy Risk Analysis of Analytics Libraries in the Android Ecosystem. Xing Liu, Sencun Zhu, Wei Wang, Jiqiang Liu |
| 2016 | AppShield: Enabling Multi-entity Access Control Cross Platforms for Mobile App Management. Zhengyang Qu, Guanyu Guo, Zhengyue Shao, Vaibhav Rastogi, Yan Chen, Hao Chen, Wangjun Hong |
| 2016 | Architecture Support for Controllable VMI on Untrusted Cloud. Jiangyong Shi, Yuexiang Yang |
| 2016 | Attribute-Based Encryption with Granular Revocation. Hui Cui, Robert H. Deng, Xuhua Ding, Yingjiu Li |
| 2016 | Attribution of Economic Denial of Sustainability Attacks in Public Clouds. Mohammad Karami, Songqing Chen |
| 2016 | BinDNN: Resilient Function Matching Using Deep Learning. Nathaniel Lageman, Eric D. Kilmer, Robert J. Walls, Patrick D. McDaniel |
| 2016 | Biometric Authentication Using Facial Recognition. Mozammel Chowdhury, Junbin Gao, Rafiqul Islam |
| 2016 | Cloud-Based Privacy-Preserving Parking Navigation Through Vehicular Communications. Jianbing Ni, Kuan Zhang, Xiaodong Lin, Yong Yu, Xuemin (Sherman) Shen |
| 2016 | Data Flow Analysis on Android Platform with Fragment Lifecycle Modeling. Yongfeng Li, Jinbin Ouyang, Shanqing Guo, Bing Mao |
| 2016 | DroidClassifier: Efficient Adaptive Mining of Application-Layer Header for Classifying Android Malware. Zhiqiang Li, Lichao Sun, Qiben Yan, Witawas Srisa-an, Zhenxiang Chen |
| 2016 | Exploitation of NetEm Utility for Non-payload-based Obfuscation Techniques Improving Network Anomaly Detection. Ivan Homoliak, Martin Teknos, Maros Barabas, Petr Hanácek |
| 2016 | Exploiting Android System Services Through Bypassing Service Helpers. Yacong Gu, Yao Cheng, Lingyun Ying, Yemian Lu, Qi Li, Purui Su |
| 2016 | Extracting More Entropy for TRNGs Based on Coherent Sampling. Jing Yang, Yuan Ma, Tianyu Chen, Jingqiang Lin, Jiwu Jing |
| 2016 | FROPUF: How to Extract More Entropy from Two Ring Oscillators in FPGA-Based PUFs. Qinglong Zhang, Zongbin Liu, Cunqing Ma, Changting Li, Lingchen Zhang |
| 2016 | Faulty Node Repair and Dynamically Spawned Black Hole Search. Wei Shi, Mengfei Peng, Jean-Pierre Corriveau, William Lee Croft |
| 2016 | GreatEatlon: Fast, Static Detection of Mobile Ransomware. Chengyu Zheng, Nicola Dellarocca, Niccolò Andronio, Stefano Zanero, Federico Maggi |
| 2016 | H-Binder: A Hardened Binder Framework on Android Systems. Dong Shen, Zhangkai Zhang, Xuhua Ding, Zhoujun Li, Robert H. Deng |
| 2016 | IacCE: Extended Taint Path Guided Dynamic Analysis of Android Inter-App Data Leakage. Tianjun Wu, Yuexiang Yang |
| 2016 | Impact of Environment on Branch Transfer of Software. Jianming Fu, Yan Lin, Xu Zhang |
| 2016 | Key Update at Train Stations: Two-Layer Dynamic Key Update Scheme for Secure Train Communications. Sang-Yoon Chang, Shaoying Cai, Hwajeong Seo, Yih-Chun Hu |
| 2016 | Modeling User Browsing Activity for Application Layer DDoS Attack Detection. TungNgai Miu, Chenxu Wang, Daniel Xiapu Luo, Jinhe Wang |
| 2016 | POSTER: A Framework for IoT Reprogramming. Nian Xue, Lulu Liang, Jie Zhang, Xin Huang |
| 2016 | POSTER: A Novel Wavelet Denoising Method Based on Robust Principal Component Analysis in Side Channel Attacks. Juan Ai, Zhu Wang, Xinping Zhou, Changhai Ou |
| 2016 | POSTER: Location Privacy Using Homomorphic Encryption. Peizhao Hu, Siyu Zhu |
| 2016 | POSTER: Non-intrusive Face Spoofing Detection Based on Guided Filtering and Image Quality Analysis. Fei Peng, Le Qin, Min Long |
| 2016 | POSTER: Security Analysis of Personal Unmanned Aerial Vehicles. Peng Chen, Hao Chen |
| 2016 | Parallel and Dynamic Structured Encryption. Russell W. F. Lai, Sherman S. M. Chow |
| 2016 | Platform as a Service (PaaS) in Public Cloud: Challenges and Mitigating Strategy. Fidel Ikundi, Rafiqul Islam, Peter White |
| 2016 | Privacy Preserving Data Classification Using Inner Product Encryption. Damien Ligier, Sergiu Carpov, Caroline Fontaine, Renaud Sirdey |
| 2016 | Privacy-Preserving Multi-pattern Matching. Tao Zhang, Xiuhua Wang, Sherman S. M. Chow |
| 2016 | SDNGuardian: Secure Your REST NBIs with API-Grained Permission Checking System. Kailei Ren, Qiang Wei, Zehui Wu, Qingxian Wang |
| 2016 | SQLite Forensic Analysis Based on WAL. Yao Liu, Ming Xu, Jian Xu, Ning Zheng, Xiaodong Lin |
| 2016 | SecWeb: Privacy-Preserving Web Browsing Monitoring with w-Event Differential Privacy. Qian Wang, Xiao Lu, Yan Zhang, Zhibo Wang, Zhan Qin, Kui Ren |
| 2016 | Secure IoT Using Weighted Signed Graphs. Pinaki Sarkar, Morshed Uddin Chowdhury |
| 2016 | Secure Keyboards Against Motion Based Keystroke Inference Attack. Shaoyong Du, Yue Gao, Jingyu Hua, Sheng Zhong |
| 2016 | Security Analysis of Vendor Customized Code in Firmware of Embedded Device. Muqing Liu, Yuanyuan Zhang, Juanru Li, Junliang Shu, Dawu Gu |
| 2016 | TZ-SSAP: Security-Sensitive Application Protection on Hardware-Assisted Isolated Environment. Yanhong He, Xianyi Zheng, Ziyuan Zhu, Gang Shi |
| 2016 | Tinder Me Softly - How Safe Are You Really on Tinder? Mark J. Carman, Kim-Kwang Raymond Choo |
| 2016 | Tokenisation Blacklisting Using Linkable Group Signatures. Assad Umar, Iakovos Gurulian, Keith Mayes, Konstantinos Markantonakis |
| 2016 | TruSDN: Bootstrapping Trust in Cloud Network Infrastructure. Nicolae Paladi, Christian Gehrmann |
| 2016 | Unique on the Road: Re-identification of Vehicular Location-Based Metadata. Zheng Xiao, Cheng Wang, Weili Han, Changjun Jiang |
| 2016 | Website Forensic Investigation to Identify Evidence and Impact of Compromise. Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Takeshi Yada, Shigeki Goto |
| 2016 | ase-PoW: A Proof of Ownership Mechanism for Cloud Deduplication in Hierarchical Environments. Lorena González-Manzano, José María de Fuentes, Kim-Kwang Raymond Choo |