| 2020 | 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, Guangzhou, China, December 29, 2020 - January 1, 2021 Guojun Wang, Ryan K. L. Ko, Md. Zakirul Alam Bhuiyan, Yi Pan |
| 2020 | 3P3: Strong Flexible Privacy for Broadcasts. David Mödinger, Franz J. Hauck |
| 2020 | A Blockchain-based Key Management Protocol for Secure Device-to-Device Communication in the Internet of Things. Mohamed Ali Kandi, Djamel Eddine Kouicem, Hicham Lakhlef, Abdelmadjid Bouabdallah, Yacine Challal |
| 2020 | A Blockchain-based Vehicle-trust Management Framework Under a Crowdsourcing Environment. Dawei Wang, Xiao Chen, Haiqin Wu, Ruozhou Yu, Yishi Zhao |
| 2020 | A Computation Offloading Model over Collaborative Cloud-Edge Networks with Optimal Transport Theory. Zhuo Li, Xu Zhou, Yang Liu, Congshan Fan, Wei Wang |
| 2020 | A Feedback-Driven Lightweight Reputation Scheme for IoV. Rohan Dahiya, Frank Jiang, Robin Doss |
| 2020 | A Flexible Attentive Temporal Graph Networks for Anomaly Detection in Dynamic Networks. Dali Zhu, Yuchen Ma, Yinlong Liu |
| 2020 | A Four-Feature Keyword Extraction Algorithm Based on Word Length Priority ratio. Hui Kang, Lingfeng Lu, Hang Su |
| 2020 | A Framework for Measuring IoT Data Quality Based on Freshness Metrics. Fatma Mohammed, A. S. M. Kayes, Eric Pardede, Wenny Rahayu |
| 2020 | A Function-Centric Risk Assessment Approach for Android Applications. Min Li, Haroon Elahi, Tao Peng, Fang Qi, Guojun Wang |
| 2020 | A Measurement Study of IoT-Based Attacks Using IoT Kill Chain. Junaid Haseeb, Masood Mansoori, Ian Welch |
| 2020 | A Multi-Layer Industrial-IoT Attack Taxonomy: Layers, Dimensions, Techniques and Application. Syed Ghazanfar Abbas, Fabiha Hashmat, Ghalib A. Shah |
| 2020 | A Novel Violation Tracing Model for Cloud Service Accountability. Xiaojian Li, Bo Li, Hailan Wang, Jiajia Zhang, Haopeng Yang, Jingang Liu |
| 2020 | A PHP and JSP Web Shell Detection System With Text Processing Based On Machine Learning. Han Zhang, Ming Liu, Zihan Yue, Zhi Xue, Yong Shi, Xiangjian He |
| 2020 | A Password Strength Evaluation Algorithm based on Sensitive Personal Information. Xinchun Cui, Xueqing Li, Yiming Qin, Yong Ding |
| 2020 | A Practical Privacy-Preserving Algorithm for Document Data. Tomoaki Mimoto, Shinsaku Kiyomoto, Koji Kitamura, Atsuko Miyaji |
| 2020 | A Privacy-Preserving Crowdsensing System with Muti-Blockchain. Tao Peng, Jierong Liu, Jianer Chen, Guojun Wang |
| 2020 | A Privacy-Preserving Data Inference Framework for Internet of Health Things Networks. James Jin Kang, Mahdi Dibaei, Gang Luo, Wencheng Yang, James Xi Zheng |
| 2020 | A Privacy-preserving Data Collection and Processing Framework for Third-party UAV Services. Tianyuan Liu, Hongpeng Guo, Claudiu Danilov, Klara Nahrstedt |
| 2020 | A Scoring System to efficiently measure Security in Cyber-Physical Systems. Andreas Aigner, Abdelmajid Khelil |
| 2020 | A Secure Shard Reconfiguration Protocol for Sharding Blockchains Without a Randomness. Yizhong Liu, Jianwei Liu, Yiming Hei, Wei Tan, Qianhong Wu |
| 2020 | A Security Model and Implementation of Embedded Software Based on Code Obfuscation. Jiajia Yi, Lirong Chen, Haitao Zhang, Yun Li, Huanyu Zhao |
| 2020 | A Semantic Model-based Security Engineering Framework for Cyber-Physical Systems. Andreas Aigner, Abdelmajid Khelil |
| 2020 | A Semi-Supervised Learning Scheme to Detect Unknown DGA Domain Names based on Graph Analysis. Fan Yan, Jia Liu, Liang Gu, Zelong Chen |
| 2020 | A Simple Analysis of Multimodal Data Fusion. Jiangchang Cheng, Yinglong Dai, Yao Yuan, Hongli Zhu |
| 2020 | A Symmetric Uniform Formula and Sole Index Method for Sieving (Twin) Primes. Wei Ren |
| 2020 | A Trust Routing Scheme based on Identification of Non-complete Cooperative Nodes in Mobile Peer-to-Peer Networks. Dapeng Qu, Jiankun Zhang, Zhenhuan Hou, Ming Wan, Bo Dong |
| 2020 | A Unified Host-based Intrusion Detection Framework using Spark in Cloud. Ming Liu, Zhi Xue, Xiangjian He |
| 2020 | A blockchain-based pattern for confidential and pseudo-anonymous contract enforcement. Nicolas Six, Claudia Negri-Ribalta, Nicolas Herbaut, Camille Salinesi |
| 2020 | A low-cost method for accurate localization of traffic participants. Maozhu Liao, Shengdong Chen, Chuangjie Zheng, Feng Yuan |
| 2020 | A non-discriminatory approach to ethical deep learning. Enzo Tartaglione, Marco Grangetto |
| 2020 | A novel Q-Learning Algorithm Based on the Stochastic Environment Path Planning Problem. Li Jian, Fei Rong, Tang Yu |
| 2020 | A three-stage machine learning network security solution for public entities. Stanislaw Saganowski |
| 2020 | A11 Your PLCs Belong to Me: ICS Ransomware Is Realistic. Yipeng Zhang, Zhonghao Sun, Liqun Yang, Zhoujun Li, Qiang Zeng, Yueying He, Xiaoming Zhang |
| 2020 | ALBFL: A Novel Neural Ranking Model for Software Fault Localization via Combining Static and Dynamic Features. Yuqing Pan, Xi Xiao, Guangwu Hu, Bin Zhang, Qing Li, Haitao Zheng |
| 2020 | Active DNN IP Protection: A Novel User Fingerprint Management and DNN Authorization Control Technique. Mingfu Xue, Zhiyu Wu, Can He, Jian Wang, Weiqiang Liu |
| 2020 | Active Link Obfuscation to Thwart Link-flooding Attacks for Internet of Things. Xuyang Ding, Feng Xiao, Man Zhou, Zhibo Wang |
| 2020 | Adaptive Random Test Case Generation Based on Multi-Objective Evolutionary Search. Chengying Mao, Linlin Wen, Tsong Yueh Chen |
| 2020 | Address-based Signature. Handong Cui, Tsz Hon Yuen |
| 2020 | Adversarial Attacks on Time-Series Intrusion Detection for Industrial Control Systems. Giulio Zizzo, Chris Hankin, Sergio Maffeis, Kevin Jones |
| 2020 | An Analytics Framework for Heuristic Inference Attacks against Industrial Control Systems. Taejun Choi, Guangdong Bai, Ryan K. L. Ko, Naipeng Dong, Wenlu Zhang, Shunyao Wang |
| 2020 | An Approach for Poisoning Attacks against RNN-Based Cyber Anomaly Detection. Jinghui Xu, Yu Wen, Chun Yang, Dan Meng |
| 2020 | An Arithmetic Differential Privacy Budget Allocation Method for the Partitioning and Publishing of Location Information. Yan Yan, Xin Gao, Adnan Mahmood, Yang Zhang, Shuang Wang, Quan Z. Sheng |
| 2020 | An Automatic Vulnerability Classification System for IoT Softwares. Haibo Chen, Dalin Zhang, Jinfu Chen, Wei Lin, Dengzhou Shi, Zian Zhao |
| 2020 | An Automatic Vulnerability Scanner for Web Applications. Haibo Chen, Junzuo Chen, Jinfu Chen, Shang Yin, Yiming Wu, Jiaping Xu |
| 2020 | An Efficient Vulnerability Extrapolation Using Similarity of Graph Kernel of PDGs. Jingxiang Zeng, Xiaofan Nie, Liwei Chen, Jinfeng Li, Gewangzi Du, Gang Shi |
| 2020 | An Investigation of Assistive Products for the Elderly. Xiaoying Li, Huai-bin Wang, Yuqiong Liu, Yuefei Wang, Zhen Liu |
| 2020 | An impedance control method of lower limb exoskeleton rehabilitation robot based on predicted forward dynamics. Yuefei Wang, Zhen Liu, Liucun Zhu, Xiaoying Li, Huaibin Wang |
| 2020 | Analysis and modelling of multi-stage attacks. Saurabh Chamotra, Ferdous Ahmed Barbhuiya |
| 2020 | AndroTIME: Identifying Timing Side Channels in the Android API. Gerald Palfinger, Bernd Prünster, Dominik Julian Ziegler |
| 2020 | Android Malware Classification Using Machine Learning and Bio-Inspired Optimisation Algorithms. Jack Pye, Biju Issac, Nauman Aslam, Husnain Rafiq |
| 2020 | Anomaly Detection on MIL-STD-1553 Dataset using Machine Learning Algorithms. Francis Onodueze, Darsana Josyula |
| 2020 | Aquatic Drone Control Using Inertial Sensors - Comparative Filtering Methods. Mihaela Hnatiuc, Oana Geman, Dragos Vicoveanu, George Motru |
| 2020 | Are Smart Home Devices Abandoning IPV Victims? Ahmed Alshehri, Malek Ben Salem, Lei Ding |
| 2020 | Assessing the Similarity of Smart Contracts by Clustering their Interfaces. Monika Di Angelo, Gernot Salzer |
| 2020 | Asset-Oriented Threat Modeling. Nan Messe, Vanea Chiprianov, Nicolas Belloir, Jamal El Hachem, Régis Fleurquin, Salah Sadou |
| 2020 | Atrial Fibrillation Classification Using Convolutional Neural Networks and Time Domain Features of ECG Sequence. Mixue Deng, Lishen Qiu, Hongqing Wang, Wei Shi, Lirong Wang |
| 2020 | Attribute-Based Data Access Control for Multi-Authority System. Ahmad Salehi S., Carsten Rudolph, Marthie Grobler |
| 2020 | Automated Enforcement of the Principle of Least Privilege over Data Source Access. Haoqi Wu, Zhengxuan Yu, Dapeng Huang, Haodong Zhang, Weili Han |
| 2020 | Avoiding Geographic Regions in Tor. Matthew J. Ryan, Morshed U. Chowdhury, Frank Jiang, Robin Doss |
| 2020 | Awareness of Secure Coding Guidelines in the Industry - A first data analysis. Tiago Espinha Gasiba, Ulrike Lechner, Maria Pinto-Albuquerque, Daniel Méndez Fernández |
| 2020 | BHDA - A Blockchain-Based Hierarchical Data Access Model for Financial Services. Zhiyu Xu, Lin Yang, Ziyuan Wang, Sheng Wen, Rob Hanson, Shiping Chen, Yang Xiang |
| 2020 | BML: A Data Mapping Language for Blockchain Platforms. Ba-Lam Do, Quang-Thang Nguyen, Thang Nguyen, Tien-Thao Nguyen, Thanh-Chung Dao, Binh Minh Nguyen |
| 2020 | BONIK: A Blockchain Empowered Chatbot for Financial Transactions. Md. Saiful Islam Bhuiyan, Abdur Razzak, Md Sadek Ferdous, Mohammad Jabed Morshed Chowdhury, Mohammad Ashraful Hoque, Sasu Tarkoma |
| 2020 | Bearicade: secure access gateway to High Performance Computing systems. Taha Al-Jody, Violeta Holmes, Alexandros Antoniades, Yazan Kazkouzeh |
| 2020 | BlockSLAP: Blockchain-based Secure and Lightweight Authentication Protocol for Smart Grid. Weizheng Wang, Huakun Huang, Lejun Zhang, Zhaoyang Han, Chen Qiu, Chunhua Su |
| 2020 | Blockchain based End-to-end Tracking System for Distributed IoT Intelligence Application Security Enhancement. Lei Xu, Zhimin Gao, Xinxin Fan, Lin Chen, Han-Yee Kim, Taeweon Suh, Weidong Shi |
| 2020 | Blockchain based PKI and Certificates Management in Mobile Networks. Junzhi Yan, Xiaoyong Hang, Bo Yang, Li Su, Shen He |
| 2020 | Blockchain-based Verifiable Credential Sharing with Selective Disclosure. Rahma Mukta, James Martens, Hye-Young Paik, Qinghua Lu, Salil S. Kanhere |
| 2020 | Blockchain-enabled Collaborative Intrusion Detection in Software Defined Networks. Wenjun Fan, Younghee Park, Shubham Kumar, Priyatham Ganta, Xiaobo Zhou, Sang-Yoon Chang |
| 2020 | Boosting Homograph Attack Classification Using Ensemble Learning and N-gram Model. Tran Phuong Thao, Hoang-Quoc Nguyen-Son, Rie Shigetomi Yamaguchi, Toshiyuki Nakata |
| 2020 | C2BID: Cluster Change-Based Intrusion Detection. Tiago Fernandes, Luís Dias, Miguel Correia |
| 2020 | CMIRGen: Automatic Signature Generation Algorithm for Malicious Network Traffic. Runzi Zhang, Mingkai Tong, Lei Chen, Jianxin Xue, Wenmao Liu, Feng Xie |
| 2020 | CPN Model Checking Method of Concurrent Software Based on State Space Pruning. Tao Sun, Jing Yang, Wenjie Zhong |
| 2020 | Cache side-channel attacks detection based on machine learning. Zhongkai Tong, Ziyuan Zhu, Zhanpeng Wang, Limin Wang, Yusha Zhang, Yuxin Liu |
| 2020 | Ciphertext-Policy Attribute-Based Encryption with Multi-Keyword Search over Medical Cloud Data. Changchun Yin, Hao Wang, Lu Zhou, Liming Fang |
| 2020 | Cross Platform IoT- Malware Family Classification based on Printable Strings. Yen-Ting Lee, Tao Ban, Tzu-Ling Wan, Shin-Ming Cheng, Ryoichi Isawa, Takeshi Takahashi, Daisuke Inoue |
| 2020 | Cryptanalysis of a Chaos-based Block Cryptosystem Using Multiple Samples Correlation Power Analysis. Shunsheng Zhang, Yuling Luo, Lvchen Cao, Junxiu Liu |
| 2020 | Cyber Situation Awareness Monitoring and Proactive Response for Enterprises on the Cloud. Hootan Alavizadeh, Hooman Alavizadeh, Julian Jang-Jaccard |
| 2020 | Cyclic Bayesian Attack Graphs: A Systematic Computational Approach. Isaac Matthews, John C. Mace, Sadegh Soudjani, Aad van Moorsel |
| 2020 | DANTE: Predicting Insider Threat using LSTM on system logs. Qicheng Ma, Nidhi Rastogi |
| 2020 | DNRTI: A Large-scale Dataset for Named Entity Recognition in Threat Intelligence. Xuren Wang, Xinpei Liu, Shengqin Ao, Ning Li, Zhengwei Jiang, Zongyi Xu, Zihan Xiong, Mengbo Xiong, Xiaoqing Zhang |
| 2020 | DP-Eclat: A Vertical Frequent Itemset Mining Algorithm Based on Differential Privacy. Shengyi Guan, Xuebin Ma, Wuyungerile Li, Xiangyu Bai |
| 2020 | Data Analytics-enabled Intrusion Detection: Evaluations of ToN IoT Linux Datasets. Nour Moustafa, Mohiuddin Ahmed, Sherif Ahmed |
| 2020 | Dataset Construction and Analysis of Screenshot Malware. Hugo Sbaï, Jassim Happa, Michael Goldsmith, Samy Meftali |
| 2020 | De-randomizing the Code Segment with Timing Function Attack. Tianning Zhang, Miao Cai, Diming Zhang, Hao Huang |
| 2020 | DeM-CoD: Novel Access-Control-Based Cash on Delivery Mechanism for Decentralized Marketplace. Ha Xuan Son, Hai Trieu Le, Nadia Metoui, Nghia Duong-Trung |
| 2020 | Deep Learning for Password Guessing and Password Strength Evaluation, A Survey. Tao Zhang, Zelei Cheng, Yi Qin, Qiang Li, Lin Shi |
| 2020 | Densely Connected Residual Network for Attack Recognition. Peilun Wu, Nour Moustafa, Shiyi Yang, Hui Guo |
| 2020 | Design and implementation of a multifunctional ECG analysis software system. Dong Wang, Lishen Qiu, Wei Shi, Hongqing Wang, Xiangxiang Xu, Lirong Wang |
| 2020 | Detecting Online Game Malicious Chargeback by using k-NN. Yu-Chih Wei, You-Xin Lai, Hai-Po Su, Yu-Wen Yen |
| 2020 | Detection of Hate Tweets using Machine Learning and Deep Learning. Lida Ketsbaia, Biju Issac, Xiaomin Chen |
| 2020 | Differential Privacy Images Protection Based on Generative Adversarial Network. Ren Yang, Xuebin Ma, Xiangyu Bai, Xiangdong Su |
| 2020 | Differential Privacy Preservation in Interpretable Feedforward-Designed Convolutional Neural Networks. De Li, Jinyan Wang, Zhou Tan, Xianxian Li, Yuhang Hu |
| 2020 | Differential privacy preserving data publishing based on Bayesian network. Xuejian Qi, Xuebin Ma, Xiangyu Bai, Wuyungerile Li |
| 2020 | Do My Emotions Influence What I Share? Analysing the Effects of Emotions on Privacy Leakage in Twitter. Manasi Mittal, Muhammad Rizwan Asghar, Arvind K. Tripathi |
| 2020 | Doc2vec-based Insider Threat Detection through Behaviour Analysis of Multi-source Security Logs. Liu Liu, Chao Chen, Jun Zhang, Olivier Y. de Vel, Yang Xiang |
| 2020 | Dynamic flow redirecton scheme for enhancing control plane robustness in SDN. Dong Liang, Qinrang Liu, Yanbin Hu, Tao Hu, Binghao Yan, Haiming Zhao |
| 2020 | ELPPS: An Enhanced Location Privacy Preserving Scheme in Mobile Crowd-Sensing Network Based on Edge Computing. Minghui Li, Yang Li, Liming Fang |
| 2020 | Easy-to-implement Campus Electronic Anonymous Voting System. Ruxian Zhang, Zhaoju Zhang, Hong Di |
| 2020 | Efficient Off-Chain Transaction to Avoid Inaccessible Coins in Cryptocurrencies. Hossein Rezaeighaleh, Cliff C. Zou |
| 2020 | Efficient Revocable Attribute-Based Encryption with Hidden Policies. Dominik Ziegler, Alexander Marsalek |
| 2020 | Enabling Security Analysis of IoT Device-to-Cloud Traffic. Eda Zhou, Joseph Turcotte, Lorenzo De Carli |
| 2020 | Enhancing Cyber Security Using Audio Techniques: A Public Key Infrastructure for Sound. Anthony Phipps, Karim Ouazzane, Vassil T. Vassilev |
| 2020 | Enhancing Randomization Entropy of x86-64 Code while Preserving Semantic Consistency. Xuewei Feng, Dongxia Wang, Zhechao Lin, Xiaohui Kuang, Gang Zhao |
| 2020 | Enhancing the Security of Numeric Comparison Secure Simple Pairing in Bluetooth 5.0. Dongkun Hou, Jie Zhang, Ka Lok Man |
| 2020 | Estimating Loss Due to Cyber-attack in the Presence of Uncertainty. Hoang Hai Nguyen, David M. Nicol |
| 2020 | Evaluating the Soundness of Security Metrics from Vulnerability Scoring Frameworks. Joe Samuel, Khalil Aalab, Jason Jaskolka |
| 2020 | Explicitly Privacy-Aware Space Usage Analysis. Sanjiv S. Jha, Simon Mayer, Tanja Schneider |
| 2020 | Exploit Internal Structural Information for IoT Malware Detection Based on Hierarchical Transformer Model. Xiaohui Hu, Rui Sun, Kejia Xu, Yongzheng Zhang, Peng Chang |
| 2020 | Exploiting User Selection Algorithm for Securing Wireless Communication Networks. Xiaoying Qiu, Guangda Li, Xuan Sun, Zhiguo Du |
| 2020 | Extending Registration and Authentication Processes of FIDO2 External Authenticator with QR Codes. Chengqian Guo, Quanwei Cai, Qiongxiao Wang, Jingqiang Lin |
| 2020 | FIDOnuous: A FIDO2/WebAuthn Extension to Support Continuous Web Authentication. Eric Klieme, Jonathan Wilke, Niklas van Dornick, Christoph Meinel |
| 2020 | FPGA based Blockchain System for Industrial IoT. Lei Xu, Lin Chen, Zhimin Gao, Han-Yee Kim, Taeweon Suh, Weidong Shi |
| 2020 | FTCLNet: Convolutional LSTM with Fourier Transform for Vulnerability Detection. Defu Cao, Jing Huang, Xuanyu Zhang, Xianhua Liu |
| 2020 | FTPB: A Three-stage DNS Tunnel Detection Method Based on Character Feature Extraction. Kemeng Wu, Yongzheng Zhang, Tao Yin |
| 2020 | Face2Face Manipulation Detection Based on Histogram of Oriented Gradients. Amr Megahed, Qi Han |
| 2020 | Factors Affecting Users' Disclosure Decisions in Android Runtime Permissions Model. Rawan Baalous, Ronald Poet |
| 2020 | Factors affecting trust in the autonomous vehicle: A survey of primary school students and parent perceptions. Yingying Ma, Shuo Li, Shaotian Qin, Yue Qi |
| 2020 | Fairness Testing of Machine Learning Models Using Deep Reinforcement Learning. Wentao Xie, Peng Wu |
| 2020 | Family Identification of AGE-Generated Android Malware Using Tree-Based Feature. Guga Suri, Jianming Fu, Rui Zheng, Xinying Liu |
| 2020 | Far from classification algorithm: dive into the preprocessing stage in DGA detection. Mingkai Tong, Guo Li, Runzi Zhang, Jianxin Xue, Wenmao Liu, Jiahai Yang |
| 2020 | Feature importance in Android malware detection. Vasileios Kouliaridis, Georgios Kambourakis, Tao Peng |
| 2020 | Federated TON_IoT Windows Datasets for Evaluating AI-based Security Applications. Nour Moustafa, Marwa Keshk, Essam Soliman Debie, Helge Janicke |
| 2020 | Finding Geometric Medians with Location Privacy. Eyal Nussbaum, Michael Segal |
| 2020 | Fined-grained Aspect Extraction from Online Reviews for Decision Support. Zhaoli Liu, Qindong Sun, Zhihai Yang, Kun Jiang, Jinpei Yan |
| 2020 | Flowverine: Leveraging Dataflow Programming for Building Privacy-Sensitive Android Applications. Eduardo Gomes, Igor Zavalyshyn, Nuno Santos, João Silva, Axel Legay |
| 2020 | Forensic Analysis of Dating Applications on Android and iOS Devices. Shinelle Hutchinson, Neesha Shantaram, Umit Karabiyik |
| 2020 | Generation of malicious webpage samples based on GAN. Mengxiang Wan, Hanbing Yao, Xin Yan |
| 2020 | Golden-Chip-Free Hardware Trojan Detection Through Thermal Radiation Comparison in Vulnerable Areas. Ting Su, Jiahe Shi, Yongkang Tang, Shaoqing Li |
| 2020 | Group Communication Needs No Consistent Transcript Distribution. Klaus Herberth |
| 2020 | Heimdall: Illuminating the Hidden Depths of Third-party Tracking in Android Applications. Thomas Cory, Philip Raschke, Axel Küpper |
| 2020 | Hypergraph Attention Networks. Chaofan Chen, Zelei Cheng, Zuotian Li, Manyi Wang |
| 2020 | Identifying Cross-Version Function Similarity Using Contextual Features. Paul Black, Iqbal Gondal, Peter Vamplew, Arun Lakhotia |
| 2020 | Image Authentication using QR Code Watermarking Approach based on Image Segmentation. Xiaomei Liu, Xin Tang |
| 2020 | Image Self-Recovery Based on Authentication Feature Extraction. Tong Liu, Xiaochen Yuan |
| 2020 | Implementing Network Attack Detection with a Novel NSSA Model Based on Knowledge Graphs. Yixuan Wang, Yujun Li, Xiang Chen, Yeni Luo |
| 2020 | Improving Efficiency of Key Enumeration Based on Side-Channel Analysis. Wei Yang, Anmin Fu, Hailong Zhang, Chanying Huang |
| 2020 | Improving Laplace Mechanism of Differential Privacy by Personalized Sampling. Wen Huang, Shijie Zhou, Tianqing Zhu, Yongjian Liao, Chunjiang Wu, Shilin Qiu |
| 2020 | Improving the Effectiveness of Grey-box Fuzzing By Extracting Program Information. Yu Fu, Siming Tong, Xiangyu Guo, Liang Cheng, Yang Zhang, Dengguo Feng |
| 2020 | Independent Worker Selection In Crowdsourcing. Ang Li, Wenjun Jiang, Xueqi Li, Xinrong Chen, Guojun Wang |
| 2020 | Inference Attacks on Physical Layer Channel State Information. Paul Walther, Thorsten Strufe |
| 2020 | Integration of 5G, VANETs and Blockchain Technology. Muhammad Arif, Walter Balzano, Alessandro Fontanella, Silvia Stranieri, Guojun Wang, Xiaofei Xing |
| 2020 | IoT Attacks: Features Identification and Clustering. Junaid Haseeb, Masood Mansoori, Harith Al-Sahaf, Ian Welch |
| 2020 | IoT-Sphere: A Framework To Secure IoT Devices From Becoming Attack Target And Attack Source. Syed Ghazanfar Abbas, Muhammad Husnain, Ubaid Ullah Fayyaz, Farrukh Shahzad, Ghalib A. Shah, Kashif Zafar |
| 2020 | Joint Learning for Document-Level Threat Intelligence Relation Extraction and Coreference Resolution Based on GCN. Xuren Wang, Mengbo Xiong, Yali Luo, Ning Li, Zhengwei Jiang, Zihan Xiong |
| 2020 | LTMS: A Lightweight Trust Management System for Wireless Medical Sensor Networks. Muhammad Shadi Hajar, M. Omar Al-Kadri, Harsha K. Kalutarage |
| 2020 | LURK: Server-Controlled TLS Delegation. Ioana Boureanu, Daniel Migault, Stere Preda, Hyame Assem Alamedine, Sanjay Mishra, Frederic Fieau, Mohammad Mannan |
| 2020 | Library Implementation and Performance Analysis of GlobalPlatform TEE Internal API for Intel SGX and RISC-V Keystone. Kuniyasu Suzaki, Kenta Nakajima, Tsukasa Oi, Akira Tsukamoto |
| 2020 | MAUSPAD: Mouse-based Authentication Using Segmentation-based, Progress-Adjusted DTW. Dong Qin, Shen Fu, George T. Amariucai, Daji Qiao, Yong Guan |
| 2020 | MLTracer: Malicious Logins Detection System via Graph Neural Network. Fucheng Liu, Yu Wen, Yanna Wu, Shuangshuang Liang, Xihe Jiang, Dan Meng |
| 2020 | Malware Classification on Imbalanced Data through Self-Attention. Yu Ding, Shupeng Wang, Jian Xing, Xiaoyu Zhang, ZiSen Oi, Ge Fu, Qian Qiang, Haoliang Sun, Jianyu Zhang |
| 2020 | Malware Detection Based on Term Frequency Analysis of GPRs Features. Fang Li, Ziyuan Zhu, Chao Yan, Bowen Chen, Dan Meng |
| 2020 | Measurement Unit Placement Against Injection Attacks for the Secured Operation of an IIoT-based Smart Grid. Adnan Anwar, S. M. Abu Adnan Abir |
| 2020 | Membership Inference Attacks: Analysis and Mitigation. Md Shamimur Rahman Shuvo, Dima Alhadidi |
| 2020 | Metrics to Enhance the Resilience of Cyber-Physical Systems. Michel Barbeau, Frédéric Cuppens, Nora Cuppens, Romain Dagnas, Joaquín García-Alfaro |
| 2020 | Mind the GAP: Security & Privacy Risks of Contact Tracing Apps. Lars Baumgärtner, Alexandra Dmitrienko, Bernd Freisleben, Alexander Gruler, Jonas Höchst, Joshua Kühlberg, Mira Mezini, Richard Mitev, Markus Miettinen, Anel Muhamedagic, Thien Duc Nguyen, Alvar Penning, Dermot Frederik Pustelnik, Filipp Roos, Ahmad-Reza Sadeghi, Michael Schwarz, Christian Uhl |
| 2020 | Modeling and Analysis of RabbitMQ Using UPPAAL. Ran Li, Jiaqi Yin, Huibiao Zhu |
| 2020 | Modeling and Verification of Spatio-Temporal Intelligent Transportation Systems. Tengfei Li, Xiaohong Chen, Haiying Sun, Jing Liu, Jiajia Yang, Chenchen Yang, Junfeng Sun |
| 2020 | Modelling Attacks in Blockchain Systems using Petri Nets. Md. Atik Shahriar, Faisal Haque Bappy, A. K. M. Fakhrul Hossain, Dayamoy Datta Saikat, Md Sadek Ferdous, Mohammad Jabed Morshed Chowdhury, Md. Zakirul Alam Bhuiyan |
| 2020 | Monitoring Social Media for Vulnerability-Threat Prediction and Topic Analysis. Shin-Ying Huang, Tao Ban |
| 2020 | More efficient SM9 algorithm based on bilinear pair optimization processing. Xianze Liu, Jihong Liu, Bifei Jiang, Haozhen Jiang, Zhi Yang |
| 2020 | Multi-Input Functional Encryption: Efficient Applications from Symmetric Primitives. Alexandros Bakas, Antonis Michalas |
| 2020 | Multi-Party Private Set Intersection in Vertical Federated Learning. Linpeng Lu, Ning Ding |
| 2020 | NLabel: An Accurate Familial Clustering Framework for Large-scale Weakly-labeled Malware. Yannan Liu, Yabin Lai, Kaizhi Wei, Liang Gu, Zhengzheng Yan |
| 2020 | Name-Signature Lookup System: A Security Enhancement to Named Data Networking. Zhicheng Song, Pushpendu Kar |
| 2020 | Napping Guard: Deanonymizing Tor Hidden Service in a Stealthy Way. Muqian Chen, Xuebin Wang, Jinqiao Shi, Can Zhao, Meiqi Wang, Binxing Fang |
| 2020 | Netspot: a simple Intrusion Detection System with statistical learning. Alban Siffer, Pierre-Alain Fouque, Alexandre Termier, Christine Largouët |
| 2020 | Novel design of Hardware Trojan: A generic approach for defeating testability based detection. Ning Zhang, Zhiqiang Lv, Yanlin Zhang, Haiyang Li, Yixin Zhang, Weiqing Huang |
| 2020 | On the Comparison of Classifiers' Construction over Private Inputs. Mina Sheikhalishahi, Nicola Zannone |
| 2020 | On the Role of Data Anonymization in Machine Learning Privacy. Navoda Senavirathne, Vicenç Torra |
| 2020 | On the Usefulness of User Nudging and Strength Indication Concerning Unlock Pattern Security. Thomas Hupperich, Katharina Dassel |
| 2020 | One Covert Channel to Rule Them All: A Practical Approach to Data Exfiltration in the Cloud. Benjamin Semal, Konstantinos Markantonakis, Keith Mayes, Jan Kalbantner |
| 2020 | Opportunistic Tracking in Cyber-Physical Systems. Samaneh Rashidibajgan, Thomas Hupperich, Robin Doss, Lei Pan |
| 2020 | Optimized FPGA Implementation of Elliptic Curve Cryptosystem over Prime Fields. Guoqiang Yang, Fanyu Kong, Qiuliang Xu |
| 2020 | PPFQ: Privacy-Preserving Friends Query over Online Social Networks. Yuxi Li, Fucai Zhou, Zifeng Xu |
| 2020 | Partial-SMT: Core-scheduling Protection Against SMT Contention-based Attacks. Xiaohui Wu, Yeping He, Qiming Zhou, Hengtai Ma, Liang He, Wenhao Wang, Liheng Chen |
| 2020 | Password Policies vs. Usability: When Do Users Go "Bananas"? Roberto Dillon, Shailey Chawla, Dayana Hristova, Barbara Göbl, Suzana Jovicic |
| 2020 | Permission Token Segmentation Scheme based on Blockchain Access Control. Jinshan Shi, Ru Li |
| 2020 | Phishing Web Page Detection Using Optimised Machine Learning. Jordan Stobbs, Biju Issac, Seibu Mary Jacob |
| 2020 | Plant Taxonomy In Hainan Based On Deep Convolutional Neural Network And Transfer Learning. Wei Liu, Wenlong Feng, Mengxing Huang, Guilai Han, Jialun Lin |
| 2020 | Policy Evaluation and Dynamic Management Based on Matching Tree for XACML. Hongzhaoning Kang, Gang Liu, Quan Wang, Runnan Zhang, Zichao Zhong, Yumin Tian |
| 2020 | Practical Secure Two-Party EdDSA Signature Generation with Key Protection and Applications in Cryptocurrency. Qi Feng, Debiao He, Min Luo, Zengxiang Li, Kim-Kwang Raymond Choo |
| 2020 | Practical and Secure Circular Range Search on Private Spatial Data. Zhihao Zheng, Zhenfu Cao, Jiachen Shen |
| 2020 | Prediction of Radio Frequency Spectrum Occupancy. Hubert Kyeremateng-Boateng, Marvin A. Conn, Darsana Josyula, Manohar Mareboyana |
| 2020 | Prediction of high precision ignition process in the condition of multi flow area coupling of micro solid rocket motor. Gaofei Wei, Qiang Cai, Meng Li, Rui Dong, Yang Liu |
| 2020 | Preventing a Fork in a Blockchain - David Fighting Goliath. Przemyslaw Kubiak, Miroslaw Kutylowski |
| 2020 | Prihook: Differentiated context-aware hook placement for different owners' smartphones. Chen Tian, Yazhe Wang, Peng Liu, Yu Wang, Ruirui Dai, Anyuan Zhou, Zhen Xu |
| 2020 | Priority based Modeling and Comparative study of Google Cloud Resources between 2011 and 2019. Dimuth Lasantha, Biplob Ray |
| 2020 | Privacy Smells: Detecting Privacy Problems in Cloud Architectures. Immanuel Kunz, Angelika Schneider, Christian Banse |
| 2020 | Privacy-Encoding Models for Preserving Utility of Machine Learning Algorithms in Social Media. Sara Salim, Nour Moustafa, Benjamin P. Turnbull |
| 2020 | Privacy-Preserving Public Verification of Ethical Cobalt Sourcing. Kilian Becher, J. A. Gregor Lagodzinski, Thorsten Strufe |
| 2020 | Privacy-Preserving Ride-Hailing with Verifiable Order-Linking in Vehicular Networks. Meng Li, Jianbo Gao, Yifei Chen, Jingcheng Zhao, Mamoun Alazab |
| 2020 | Program Slice based Vulnerable Code Clone Detection. Xiaonan Song, Aimin Yu, Haibo Yu, Shirun Liu, Xin Bai, Lijun Cai, Dan Meng |
| 2020 | Protecting the Intellectual Property of Deep Neural Networks with Watermarking: The Frequency Domain Approach. Meng Li, Qi Zhong, Leo Yu Zhang, Yajuan Du, Jun Zhang, Yong Xiang |
| 2020 | Prov-IoT: A Security-Aware IoT Provenance Model. Fariha Tasmin Jaigirdar, Carsten Rudolph, Chris Bain |
| 2020 | Pyramid Pooling Channel Attention Network for esophageal tissue segmentation on OCT images. Deyin Li, Miao Zhang, Wei Shi, Huimin Zhang, Duoduo Wang, Lirong Wang |
| 2020 | QPBFT: Practical Byzantine Fault Tolerance Consensus Algorithm Based on Quantified-role. Zhujun Zhang, Dali Zhu, Wei Fan |
| 2020 | RPAD: An Unsupervised HTTP Request Parameter Anomaly Detection Method. Yizhen Sun, Yiman Xie, Weiping Wang, Shigeng Zhang, Yuxi Wu, Jingchuan Feng |
| 2020 | ReDex: Unpacking Android Packed Apps by Executing Every Method. Jiajin Cai, Tongxin Li, Can Huang, Xinhui Han |
| 2020 | Reducing the Price of Protection: Identifying and Migrating Non-Sensitive Code in TEE. Yin Liu, Eli Tilevich |
| 2020 | Research and Improvement of Community Discovery Algorithm Based on Spark for Large Scale Complicated Networks. Hui Kang, Shengquan Chen, Lingfeng Lu, Chenkun Meng |
| 2020 | Research on Stitching and Alignment of Mouse Carcass EM Images. Jing Zhu, Hongyu Ge, Ao Cheng, Ruobing Zhang, Lirong Wang |
| 2020 | RevBloc: A Blockchain-based Secure Customer Review System. Xiuli Fang, Muhammad Rizwan Asghar |
| 2020 | Reversible data hiding based on improved rhombus predictor and prediction error expansion. Xin Tang, Linna Zhou, Dan Liu, Boyu Liu, Xinyi Lü |
| 2020 | Revocable and Offline-Verifiable Self-Sovereign Identities. Andreas Abraham, Stefan More, Christof Rabensteiner, Felix Hörandner |
| 2020 | Robust Scheduling for Large-Scale Distributed Systems. Young Choon Lee, Jayden King, Young Ki Kim, Seok-Hee Hong |
| 2020 | Robust Spatial-spread Deep Neural Image Watermarking. Marcin Plata, Piotr Syga |
| 2020 | Robustness analysis and defence strategy of an interdependent networks model based on closeness centrality. Jinfang Sheng, Yan Hu, Kerong Guan, Bin Wang, Xiaoxia Pan, Wenjun Kang |
| 2020 | SCAFFISD: A Scalable Framework for Fine-grained Identification and Security Detection of Wireless Routers. Fangzhou Zhu, Liang Liu, Weizhi Meng, Ting Lv, Simin Hu, Renjun Ye |
| 2020 | SCPORAM: a hardware support scheme for protecting memory access patterns. Zhanpeng Wang, Ziyuan Zhu, Limin Wang, Zhongkai Tong, Chao Yan |
| 2020 | SCScan: A SVM-based Scanning System for Vulnerabilities in Blockchain Smart Contracts. Xiaohan Hao, Wei Ren, Wenwen Zheng, Tianqing Zhu |
| 2020 | SCUR: Smart Contracts with a Static Upper-bound on Resource Usage. Markus Knecht, Burkhard Stiller |
| 2020 | SSIBAC: Self-Sovereign Identity Based Access Control. Rafael Belchior, Benedikt Putz, Günther Pernul, Miguel Correia, André Vasconcelos, Sérgio Guerreiro |
| 2020 | STIDM: A Spatial and Temporal Aware Intrusion Detection Model. Xueying Han, Rongchao Yin, Zhigang Lu, Bo Jiang, Yuling Liu, Song Liu, Chonghua Wang, Ning Li |
| 2020 | Scalable and Accurate Binary Search Method based on Simhash and Partial Trace. Yunan Zhang, Aidong Xu, Yixin Jiang |
| 2020 | SeRoT: A Secure Runtime System on Trusted Execution Environments. Jingbin Liu, Yu Qin, Dengguo Feng |
| 2020 | SeWG: Security-enhanced WireGuard for Android Based on TEE. Yongkang Wu, Yiwei Shan, Zhichao Wang, Pengcheng Zhang, Min He, Jihong Liu |
| 2020 | Search & Catch: Detecting Promotion Infection in the Underground through Search Engines. Ronghai Yang, Jia Liu, Liang Gu, Yurong Chen |
| 2020 | Secure Coded Matrix Multiplication against Cooperative Attack in Edge Computing. Luqi Zhu, Jin Wang, Lianmin Shi, Jingya Zhou, Kejie Lu, Jianping Wang |
| 2020 | Secure Outsourcing Algorithms of Modular Exponentiations in Edge Computing. Tianyi Zhang, Jian Wang |
| 2020 | Secure Outsourcing of Multi-Armed Bandits. Radu Ciucanu, Pascal Lafourcade, Marius Lombard-Platet, Marta Soare |
| 2020 | Secure and Privacy Preserving Method for Biometric Template Protection using Fully Homomorphic Encryption. Arun Kumar Jindal, Imtiyazuddin Shaik, Vasudha, Srinivasa Rao Chalamala, Rajan MA, Sachin Lodha |
| 2020 | SecureESFS: Sharing Android External Storage Files in A Securer Way. Shan Liang, Yuewu Wang, Lingguang Lei, Jiwu Jing, Quan Zhou |
| 2020 | Securing Manufacturing Using Blockchain. Zahra Jadidi, Ali Dorri, Raja Jurdak, Colin J. Fidge |
| 2020 | Security Challenges and Solutions for 5G HetNet. Aakanksha Sharma, Venki Balasubramanian, Alireza Jolfaei |
| 2020 | Security and Privacy Analysis of mhealth Application: A Case Study. Wanrong Zhao, Hossain Shahriar, Victor Clincy, Md. Zakirul Alam Bhuiyan |
| 2020 | Security and Privacy Implementation in Smart Home: Attributes Based Access Control and Smart Contracts. Amjad Qashlan, Priyadarsi Nanda, Xiangjian He |
| 2020 | Semantic Location Privacy Protection Algorithm Based on Edge Cluster Graph. Tao Lu, Hongyun Xu, Kai Tian, Cenxi Tian, Rui Jiang |
| 2020 | Semantic redirection obfuscation: A control flow obfuscation based on Android Runtime. Zhichao Wang, Yiwei Shan, Zhi Yang, Ruoyi Wang, Shuang Song |
| 2020 | Sensitive Information Detection based on Convolution Neural Network and Bi-directional LSTM. Yan Lin, Guosheng Xu, Guoai Xu, Yudong Chen, Dawei Sun |
| 2020 | SmartLED: Smartphone-based covert channels leveraging the notification LED. Lorena González-Manzano, Sergio Bernardez, José María de Fuentes |
| 2020 | Special-purpose Model Extraction Attacks: Stealing Coarse Model with Fewer Queries. Rina Okada, Zen Ishikura, Toshiki Shibahara, Satoshi Hasegawa |
| 2020 | SpeedNeuzz: Speed Up Neural Program Approximation with Neighbor Edge Knowledge. Yi Li, Xi Xiao, Xiaogang Zhu, Xiao Chen, Sheng Wen, Bin Zhang |
| 2020 | Survey on Blockchain and Deep Learning. Yizhuo Zhang, Yiwei Liu, Chi-Hua Chen |
| 2020 | TA-HRT: A temperature-aware scheduler for heterogeneous real-time multicore systems. Yanshul Sharma, Zinea Das, Alok Das, Sanjay Moulik |
| 2020 | TEADS: A Defense-aware Framework for Synthesizing Transient Execution Attacks. Tianlin Huo, Wenhao Wang, Pei Zhao, Yufeng Li, Tingting Wang, Mingshu Li |
| 2020 | TORP: Load Balanced Reliable Opportunistic Routing for Asynchronous Wireless Sensor Networks. Muhammad Umar Farooq, Xingfu Wang, Ammar Hawbani, Asad Khan, Adeel Ahmed, Fisseha Teju Wedaj |
| 2020 | TRUVIN: Lightweight Detection of Data-Oriented Attacks Through Trusted Value Integrity. Munir Geden, Kasper Rasmussen |
| 2020 | Time is Money: Countering Griefing Attack in Lightning Network. Subhra Mazumdar, Prabal Banerjee, Sushmita Ruj |
| 2020 | Towards A New Approach to Identify WhatsApp Messages. Rick Cents, Nhien-An Le-Khac |
| 2020 | Towards A Transparent and Privacy-preserving Healthcare Platform with Blockchain for Smart Cities. Abdullah Al Omar, Abu Kaisar Jamil, Md. Shakhawath Hossain Nur, Md Mahamudul Hasan, Rabeya Bosri, Md. Zakirul Alam Bhuiyan, Mohammad Shahriar Rahman |
| 2020 | Towards Collaborative Intrusion Detection Enhancement against Insider Attacks with Multi-Level Trust. Wenjuan Li, Weizhi Meng, Hui Zhu |
| 2020 | Towards Network Traffic Monitoring Using Deep Transfer Learning. Harsh Dhillon, Anwar Haque |
| 2020 | Towards a Lightweight Continuous Authentication Protocol for Device-to-Device Communication. Syed W. Shah, Naeem Firdous Syed, Arash Shaghaghi, Adnan Anwar, Zubair A. Baig, Robin Doss |
| 2020 | Towards a Robust Classifier: An MDL-Based Method for Generating Adversarial Examples. Behzad Asadi, Vijay Varadharajan |
| 2020 | Towards a Theory of Special-Purpose Program Obfuscation. Muhammad Rizwan Asghar, Steven D. Galbraith, Andrea Lanzi, Giovanni Russello, Lukas Zobernig |
| 2020 | Towards a new deep learning based approach for the password prediction. Manaz Kaleel, Nhien-An Le-Khac |
| 2020 | Traffic Classification of User Behaviors in Tor, I2P, ZeroNet, Freenet. Yuzong Hu, Futai Zou, Linsen Li, Ping Yi |
| 2020 | Trust Aware Continuous Authorization for Zero Trust in Consumer Internet of Things. Theo Dimitrakos, Tezcan Dilshener, Alexander Kravtsov, Antonio La Marra, Fabio Martinelli, Athanasios Rizos, Alessandro Rosetti, Andrea Saracino |
| 2020 | Trust and Believe - Should We? Evaluating the Trustworthiness of Twitter Users. Tanveer Khan, Antonis Michalas |
| 2020 | Trusted Network Slicing among Multiple Mobile Network Operators. Muhammad Jehanzaib Yousuf, Mingjun Wang, Zheng Yan, Fawad Khan |
| 2020 | TrustyShare: A Sharing Scheme using ARM TrustZone. Yongkang Wu, Langyue He, Yiwei Shan, Pengcheng Zhang, Min He, Zhi Yang |
| 2020 | UIDroid: User-driven Based Hierarchical Access Control for Sensitive Information. Luping Ma, Dali Zhu, Shunliang Zhang, Xiaohui Zhang, Shumin Peng, Ya Li |
| 2020 | Unbounded Key-Policy Attribute-based Encryption with Black-Box Traceability. Yunxiu Ye, Zhenfu Cao, Jiachen Shen |
| 2020 | Uncovering the Hidden Dangers: Finding Unsafe Go Code in the Wild. Johannes Lauinger, Lars Baumgärtner, Anna-Katharina Wickert, Mira Mezini |
| 2020 | Unmasking Windows Advanced Persistent Threat Execution. Rory Coulter, Jun Zhang, Lei Pan, Yang Xiang |
| 2020 | Use of Bash History Novelty Detection for Identification of Similar Source Attack Generation. Jack Hance, Jeremy Straub |
| 2020 | User-Controlled, Auditable, Cross-Jurisdiction Sharing of Healthcare Data Mediated by a Public Blockchain. Xiaohu Zhou, Vitor Jesus, Yonghao Wang, Mark B. Josephs |
| 2020 | VALID: Voltage-Based Lightweight Intrusion Detection for the Controller Area Network. Oleg Schell, Marcel Kneib |
| 2020 | VCKSCF: Efficient Verifiable Conjunctive Keyword Search Based on Cuckoo Filter for Cloud Storage. Chan Fan, Xiaolei Dong, Zhenfu Cao, Jiachen Shen |
| 2020 | VGG-based side channel attack on RSA implementation. Qi Lei, Chao Li, Kexin Qiao, Zhe Ma, Bo Yang |
| 2020 | iTES: Integrated Testing and Evaluation System for Software Vulnerability Detection Methods. Chi Zhang, Jinfu Chen, Saihua Cai, Bo Liu, Yiming Wu, Ye Geng |
| 2020 | pcSVF: An Evaluation of Side-Channel Vulnerability of Port Contention. Xiaoyang Liu, Ziyuan Zhu |
| 2020 | zkrpChain: Privacy-preserving Data Auditing for Consortium Blockchains Based on Zero-knowledge Range Proofs. Shiwei Xu, Xiaowen Cai, Yizhi Zhao, Zhengwei Ren, Lingjuan Wu, Huanguo Zhang, Le Du, Yan Tong |