| 2023 | Security and Privacy in Communication Networks - 18th EAI International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings Fengjun Li, Kaitai Liang, Zhiqiang Lin, Sokratis K. Katsikas |
| 2022 | A Cross-layer Plausibly Deniable Encryption System for Mobile Devices. Niusen Chen, Bo Chen, Weisong Shi |
| 2022 | A Generalized Unknown Malware Classification. Nanda Rani, Ayushi Mishra, Rahul Kumar, Sarbajit Ghosh, Sandeep K. Shukla, Priyanka Bagade |
| 2022 | A Random Reversible Watermarking Scheme for Relational Data. Qiang Liu, Hequ Xian, Jiancheng Zhang, Kunpeng Liu |
| 2022 | Adversary for Social Good: Leveraging Attribute-Obfuscating Attack to Protect User Privacy on Social Networks. Xiaoting Li, Lingwei Chen, Dinghao Wu |
| 2022 | An Evolutionary Learning Approach Towards the Open Challenge of IoT Device Identification. Jingfei Bian, Nan Yu, Hong Li, Hongsong Zhu, Qiang Wang, Limin Sun |
| 2022 | Another Lattice Attack Against ECDSA with the wNAF to Recover More Bits per Signature. Ziqiang Ma, Shuaigang Li, Jingqiang Lin, Quanwei Cai, Shuqin Fan, Fan Zhang, Bo Luo |
| 2022 | Assessing the Quality of Differentially Private Synthetic Data for Intrusion Detection. Md Ali Reza Al Amin, Sachin Shetty, Valerio Formicola, Martin Otto |
| 2022 | AttackMiner: A Graph Neural Network Based Approach for Attack Detection from Audit Logs. Yuedong Pan, Lijun Cai, Tao Leng, Lixin Zhao, Jiangang Ma, Aimin Yu, Dan Meng |
| 2022 | Blockchain-Based Ciphertext Policy-Hiding Access Control Scheme. Ruizhong Du, Tianhe Zhang |
| 2022 | Bootstrapping Trust in Community Repository Projects. Sangat Vaidya, Santiago Torres-Arias, Justin Cappos, Reza Curtmola |
| 2022 | Breaking Embedded Software Homogeneity with Protocol Mutations. Tongwei Ren, Ryan Williams, Sirshendu Ganguly, Lorenzo De Carli, Long Lu |
| 2022 | CTDRB: Controllable Timed Data Release Using Blockchains. Jingzhe Wang, Balaji Palanisamy |
| 2022 | CapsITD: Malicious Insider Threat Detection Based on Capsule Neural Network. Haitao Xiao, Chen Zhang, Song Liu, Bo Jiang, Zhigang Lu, Fei Wang, Yuling Liu |
| 2022 | Classification-Based Anomaly Prediction in XACML Policies. Maryam Davari, Mohammad Zulkernine |
| 2022 | Coreference Resolution for Cybersecurity Entity: Towards Explicit, Comprehensive Cybersecurity Knowledge Graph with Low Redundancy. Zhengyu Liu, Haochen Su, Nannan Wang, Cheng Huang |
| 2022 | Cost-Effective Malware Classification Based on Deep Active Learning. Qian Qiang, Yige Chen, Yang Hu, Tianning Zang, Mian Cheng, Quanbo Pan, Yu Ding, Zisen Qi |
| 2022 | DQR: A Double Q Learning Multi Agent Routing Protocol for Wireless Medical Sensor Network. Muhammad Shadi Hajar, Harsha K. Kalutarage, M. Omar Al-Kadri |
| 2022 | Decentralized and Efficient Blockchain Rewriting with Bi-level Validity Verification. Kemin Zhang, Li Yang, Lu Zhou, Jianfeng Ma |
| 2022 | Detection and Privacy Leakage Analysis of Third-Party Libraries in Android Apps. Xiantong Hao, Dandan Ma, Hongliang Liang |
| 2022 | Enabling Accurate Data Recovery for Mobile Devices Against Malware Attacks. Wen Xie, Niusen Chen, Bo Chen |
| 2022 | FairBlock: Preventing Blockchain Front-Running with Minimal Overheads. Peyman Momeni, Sergey Gorbunov, Bohan Zhang |
| 2022 | Forensic Analysis and Detection of Spoofing Based Email Attack Using Memory Forensics and Machine Learning. Sanjeev Shukla, Manoj Misra, Gaurav Varshney |
| 2022 | Generic 2-Party PFE with Constant Rounds and Linear Active Security, and Efficient Instantiation. Hanyu Jia, Xiangxue Li, Qiang Li, Yue Bao, Xintian Hou |
| 2022 | Granting Access Privileges Using OpenID Connect in Permissioned Distributed Ledgers. Shohei Kakei, Yoshiaki Shiraishi, Shoichi Saito |
| 2022 | Hiatus: Unsupervised Generative Approach for Detection of DoS and DDoS Attacks. Sivaanandh Muneeswaran, Vinay Sachidananda, Rajendra Patil, Hongyi Peng, Mingchang Liu, Mohan Gurusamy |
| 2022 | Language and Platform Independent Attribution of Heterogeneous Code. Farzaneh Abazari, Enrico Branca, Evgeniya Novikova, Natalia Stakhanova |
| 2022 | MAG-PUF: Magnetic Physical Unclonable Functions for Device Authentication in the IoT. Omar Adel Ibrahim, Savio Sciancalepore, Roberto Di Pietro |
| 2022 | Message Recovery Attack of Kyber Based on Information Leakage in Decoding Operation. Mengyao Shi, Zhu Wang, Tingting Peng, Fenghua Li |
| 2022 | MetaPriv: Acting in Favor of Privacy on Social Media Platforms. Robert Cantaragiu, Antonis Michalas, Eugene Frimpong, Alexandros Bakas |
| 2022 | Multi-relational Instruction Association Graph for Cross-Architecture Binary Similarity Comparison. Qige Song, Yongzheng Zhang, Shuhao Li |
| 2022 | No-Fuzz: Efficient Anti-fuzzing Techniques. Zhengxiang Zhou, Cong Wang, Qingchuan Zhao |
| 2022 | PII-PSM: A New Targeted Password Strength Meter Using Personally Identifiable Information. Qiying Dong, Ding Wang, Yaosheng Shen, Chunfu Jia |
| 2022 | PREFHE, PREFHE-AES and PREFHE-SGX: Secure Multiparty Computation Protocols from Fully Homomorphic Encryption and Proxy ReEncryption with AES and Intel SGX. Cavidan Yakupoglu, Kurt Rohloff |
| 2022 | Replicated Additive Secret Sharing with the Optimized Number of Shares. Juanjuan Guo, Mengjie Shuai, Qiongxiao Wang, Wenyuan Li, Jingqiang Lin |
| 2022 | Research on the Grouping Method of Side-Channel Leakage Detection. Xiaoyi Duan, Ye Huang, Yonghua Su, Yujin Li, Xiaohong Fan |
| 2022 | Secure CV2X Using COTS Smartphones over LTE Infrastructure. Spandan Mahadevegowda, Ryan M. Gerdes, Thidapat Chantem, Rose Qingyang Hu |
| 2022 | SecureBERT: A Domain-Specific Language Model for Cybersecurity. Ehsan Aghaei, Xi Niu, Waseem G. Shadid, Ehab Al-Shaer |
| 2022 | Silver Surfers on the Tech Wave: Privacy Analysis of Android Apps for the Elderly. Pranay Kapoor, Rohan Pagey, Mohammad Mannan, Amr M. Youssef |
| 2022 | Symmetrical Disguise: Realizing Homomorphic Encryption Services from Symmetric Primitives. Alexandros Bakas, Eugene Frimpong, Antonis Michalas |
| 2022 | TERSE: Tiny Encryptions and Really Speedy Execution for Post-Quantum Private Stream Aggregation. Jonathan Takeshita, Zachariah Carmichael, Ryan Karl, Taeho Jung |
| 2022 | Towards High Transferability on Neural Network for Black-Box Adversarial Attacks. Haochen Zhai, Futai Zou, Junhua Tang, Yue Wu |
| 2022 | What Data Do the Google Dialer and Messages Apps on Android Send to Google? Douglas J. Leith |
| 2022 | eSROP Attack: Leveraging Signal Handler to Implement Turing-Complete Attack Under CFI Defense. Tianning Zhang, Miao Cai, Diming Zhang, Hao Huang |