SecureComm C

44 papers

YearTitle / Authors
2023Security and Privacy in Communication Networks - 18th EAI International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings
Fengjun Li, Kaitai Liang, Zhiqiang Lin, Sokratis K. Katsikas
2022A Cross-layer Plausibly Deniable Encryption System for Mobile Devices.
Niusen Chen, Bo Chen, Weisong Shi
2022A Generalized Unknown Malware Classification.
Nanda Rani, Ayushi Mishra, Rahul Kumar, Sarbajit Ghosh, Sandeep K. Shukla, Priyanka Bagade
2022A Random Reversible Watermarking Scheme for Relational Data.
Qiang Liu, Hequ Xian, Jiancheng Zhang, Kunpeng Liu
2022Adversary for Social Good: Leveraging Attribute-Obfuscating Attack to Protect User Privacy on Social Networks.
Xiaoting Li, Lingwei Chen, Dinghao Wu
2022An Evolutionary Learning Approach Towards the Open Challenge of IoT Device Identification.
Jingfei Bian, Nan Yu, Hong Li, Hongsong Zhu, Qiang Wang, Limin Sun
2022Another Lattice Attack Against ECDSA with the wNAF to Recover More Bits per Signature.
Ziqiang Ma, Shuaigang Li, Jingqiang Lin, Quanwei Cai, Shuqin Fan, Fan Zhang, Bo Luo
2022Assessing the Quality of Differentially Private Synthetic Data for Intrusion Detection.
Md Ali Reza Al Amin, Sachin Shetty, Valerio Formicola, Martin Otto
2022AttackMiner: A Graph Neural Network Based Approach for Attack Detection from Audit Logs.
Yuedong Pan, Lijun Cai, Tao Leng, Lixin Zhao, Jiangang Ma, Aimin Yu, Dan Meng
2022Blockchain-Based Ciphertext Policy-Hiding Access Control Scheme.
Ruizhong Du, Tianhe Zhang
2022Bootstrapping Trust in Community Repository Projects.
Sangat Vaidya, Santiago Torres-Arias, Justin Cappos, Reza Curtmola
2022Breaking Embedded Software Homogeneity with Protocol Mutations.
Tongwei Ren, Ryan Williams, Sirshendu Ganguly, Lorenzo De Carli, Long Lu
2022CTDRB: Controllable Timed Data Release Using Blockchains.
Jingzhe Wang, Balaji Palanisamy
2022CapsITD: Malicious Insider Threat Detection Based on Capsule Neural Network.
Haitao Xiao, Chen Zhang, Song Liu, Bo Jiang, Zhigang Lu, Fei Wang, Yuling Liu
2022Classification-Based Anomaly Prediction in XACML Policies.
Maryam Davari, Mohammad Zulkernine
2022Coreference Resolution for Cybersecurity Entity: Towards Explicit, Comprehensive Cybersecurity Knowledge Graph with Low Redundancy.
Zhengyu Liu, Haochen Su, Nannan Wang, Cheng Huang
2022Cost-Effective Malware Classification Based on Deep Active Learning.
Qian Qiang, Yige Chen, Yang Hu, Tianning Zang, Mian Cheng, Quanbo Pan, Yu Ding, Zisen Qi
2022DQR: A Double Q Learning Multi Agent Routing Protocol for Wireless Medical Sensor Network.
Muhammad Shadi Hajar, Harsha K. Kalutarage, M. Omar Al-Kadri
2022Decentralized and Efficient Blockchain Rewriting with Bi-level Validity Verification.
Kemin Zhang, Li Yang, Lu Zhou, Jianfeng Ma
2022Detection and Privacy Leakage Analysis of Third-Party Libraries in Android Apps.
Xiantong Hao, Dandan Ma, Hongliang Liang
2022Enabling Accurate Data Recovery for Mobile Devices Against Malware Attacks.
Wen Xie, Niusen Chen, Bo Chen
2022FairBlock: Preventing Blockchain Front-Running with Minimal Overheads.
Peyman Momeni, Sergey Gorbunov, Bohan Zhang
2022Forensic Analysis and Detection of Spoofing Based Email Attack Using Memory Forensics and Machine Learning.
Sanjeev Shukla, Manoj Misra, Gaurav Varshney
2022Generic 2-Party PFE with Constant Rounds and Linear Active Security, and Efficient Instantiation.
Hanyu Jia, Xiangxue Li, Qiang Li, Yue Bao, Xintian Hou
2022Granting Access Privileges Using OpenID Connect in Permissioned Distributed Ledgers.
Shohei Kakei, Yoshiaki Shiraishi, Shoichi Saito
2022Hiatus: Unsupervised Generative Approach for Detection of DoS and DDoS Attacks.
Sivaanandh Muneeswaran, Vinay Sachidananda, Rajendra Patil, Hongyi Peng, Mingchang Liu, Mohan Gurusamy
2022Language and Platform Independent Attribution of Heterogeneous Code.
Farzaneh Abazari, Enrico Branca, Evgeniya Novikova, Natalia Stakhanova
2022MAG-PUF: Magnetic Physical Unclonable Functions for Device Authentication in the IoT.
Omar Adel Ibrahim, Savio Sciancalepore, Roberto Di Pietro
2022Message Recovery Attack of Kyber Based on Information Leakage in Decoding Operation.
Mengyao Shi, Zhu Wang, Tingting Peng, Fenghua Li
2022MetaPriv: Acting in Favor of Privacy on Social Media Platforms.
Robert Cantaragiu, Antonis Michalas, Eugene Frimpong, Alexandros Bakas
2022Multi-relational Instruction Association Graph for Cross-Architecture Binary Similarity Comparison.
Qige Song, Yongzheng Zhang, Shuhao Li
2022No-Fuzz: Efficient Anti-fuzzing Techniques.
Zhengxiang Zhou, Cong Wang, Qingchuan Zhao
2022PII-PSM: A New Targeted Password Strength Meter Using Personally Identifiable Information.
Qiying Dong, Ding Wang, Yaosheng Shen, Chunfu Jia
2022PREFHE, PREFHE-AES and PREFHE-SGX: Secure Multiparty Computation Protocols from Fully Homomorphic Encryption and Proxy ReEncryption with AES and Intel SGX.
Cavidan Yakupoglu, Kurt Rohloff
2022Replicated Additive Secret Sharing with the Optimized Number of Shares.
Juanjuan Guo, Mengjie Shuai, Qiongxiao Wang, Wenyuan Li, Jingqiang Lin
2022Research on the Grouping Method of Side-Channel Leakage Detection.
Xiaoyi Duan, Ye Huang, Yonghua Su, Yujin Li, Xiaohong Fan
2022Secure CV2X Using COTS Smartphones over LTE Infrastructure.
Spandan Mahadevegowda, Ryan M. Gerdes, Thidapat Chantem, Rose Qingyang Hu
2022SecureBERT: A Domain-Specific Language Model for Cybersecurity.
Ehsan Aghaei, Xi Niu, Waseem G. Shadid, Ehab Al-Shaer
2022Silver Surfers on the Tech Wave: Privacy Analysis of Android Apps for the Elderly.
Pranay Kapoor, Rohan Pagey, Mohammad Mannan, Amr M. Youssef
2022Symmetrical Disguise: Realizing Homomorphic Encryption Services from Symmetric Primitives.
Alexandros Bakas, Eugene Frimpong, Antonis Michalas
2022TERSE: Tiny Encryptions and Really Speedy Execution for Post-Quantum Private Stream Aggregation.
Jonathan Takeshita, Zachariah Carmichael, Ryan Karl, Taeho Jung
2022Towards High Transferability on Neural Network for Black-Box Adversarial Attacks.
Haochen Zhai, Futai Zou, Junhua Tang, Yue Wu
2022What Data Do the Google Dialer and Messages Apps on Android Send to Google?
Douglas J. Leith
2022eSROP Attack: Leveraging Signal Handler to Implement Turing-Complete Attack Under CFI Defense.
Tianning Zhang, Miao Cai, Diming Zhang, Hao Huang