TrustCom B

265 papers

YearTitle / Authors
202019th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, Guangzhou, China, December 29, 2020 - January 1, 2021
Guojun Wang, Ryan K. L. Ko, Md. Zakirul Alam Bhuiyan, Yi Pan
20203P3: Strong Flexible Privacy for Broadcasts.
David Mödinger, Franz J. Hauck
2020A Blockchain-based Key Management Protocol for Secure Device-to-Device Communication in the Internet of Things.
Mohamed Ali Kandi, Djamel Eddine Kouicem, Hicham Lakhlef, Abdelmadjid Bouabdallah, Yacine Challal
2020A Blockchain-based Vehicle-trust Management Framework Under a Crowdsourcing Environment.
Dawei Wang, Xiao Chen, Haiqin Wu, Ruozhou Yu, Yishi Zhao
2020A Computation Offloading Model over Collaborative Cloud-Edge Networks with Optimal Transport Theory.
Zhuo Li, Xu Zhou, Yang Liu, Congshan Fan, Wei Wang
2020A Feedback-Driven Lightweight Reputation Scheme for IoV.
Rohan Dahiya, Frank Jiang, Robin Doss
2020A Flexible Attentive Temporal Graph Networks for Anomaly Detection in Dynamic Networks.
Dali Zhu, Yuchen Ma, Yinlong Liu
2020A Four-Feature Keyword Extraction Algorithm Based on Word Length Priority ratio.
Hui Kang, Lingfeng Lu, Hang Su
2020A Framework for Measuring IoT Data Quality Based on Freshness Metrics.
Fatma Mohammed, A. S. M. Kayes, Eric Pardede, Wenny Rahayu
2020A Function-Centric Risk Assessment Approach for Android Applications.
Min Li, Haroon Elahi, Tao Peng, Fang Qi, Guojun Wang
2020A Measurement Study of IoT-Based Attacks Using IoT Kill Chain.
Junaid Haseeb, Masood Mansoori, Ian Welch
2020A Multi-Layer Industrial-IoT Attack Taxonomy: Layers, Dimensions, Techniques and Application.
Syed Ghazanfar Abbas, Fabiha Hashmat, Ghalib A. Shah
2020A Novel Violation Tracing Model for Cloud Service Accountability.
Xiaojian Li, Bo Li, Hailan Wang, Jiajia Zhang, Haopeng Yang, Jingang Liu
2020A PHP and JSP Web Shell Detection System With Text Processing Based On Machine Learning.
Han Zhang, Ming Liu, Zihan Yue, Zhi Xue, Yong Shi, Xiangjian He
2020A Password Strength Evaluation Algorithm based on Sensitive Personal Information.
Xinchun Cui, Xueqing Li, Yiming Qin, Yong Ding
2020A Practical Privacy-Preserving Algorithm for Document Data.
Tomoaki Mimoto, Shinsaku Kiyomoto, Koji Kitamura, Atsuko Miyaji
2020A Privacy-Preserving Crowdsensing System with Muti-Blockchain.
Tao Peng, Jierong Liu, Jianer Chen, Guojun Wang
2020A Privacy-Preserving Data Inference Framework for Internet of Health Things Networks.
James Jin Kang, Mahdi Dibaei, Gang Luo, Wencheng Yang, James Xi Zheng
2020A Privacy-preserving Data Collection and Processing Framework for Third-party UAV Services.
Tianyuan Liu, Hongpeng Guo, Claudiu Danilov, Klara Nahrstedt
2020A Scoring System to efficiently measure Security in Cyber-Physical Systems.
Andreas Aigner, Abdelmajid Khelil
2020A Secure Shard Reconfiguration Protocol for Sharding Blockchains Without a Randomness.
Yizhong Liu, Jianwei Liu, Yiming Hei, Wei Tan, Qianhong Wu
2020A Security Model and Implementation of Embedded Software Based on Code Obfuscation.
Jiajia Yi, Lirong Chen, Haitao Zhang, Yun Li, Huanyu Zhao
2020A Semantic Model-based Security Engineering Framework for Cyber-Physical Systems.
Andreas Aigner, Abdelmajid Khelil
2020A Semi-Supervised Learning Scheme to Detect Unknown DGA Domain Names based on Graph Analysis.
Fan Yan, Jia Liu, Liang Gu, Zelong Chen
2020A Simple Analysis of Multimodal Data Fusion.
Jiangchang Cheng, Yinglong Dai, Yao Yuan, Hongli Zhu
2020A Symmetric Uniform Formula and Sole Index Method for Sieving (Twin) Primes.
Wei Ren
2020A Trust Routing Scheme based on Identification of Non-complete Cooperative Nodes in Mobile Peer-to-Peer Networks.
Dapeng Qu, Jiankun Zhang, Zhenhuan Hou, Ming Wan, Bo Dong
2020A Unified Host-based Intrusion Detection Framework using Spark in Cloud.
Ming Liu, Zhi Xue, Xiangjian He
2020A blockchain-based pattern for confidential and pseudo-anonymous contract enforcement.
Nicolas Six, Claudia Negri-Ribalta, Nicolas Herbaut, Camille Salinesi
2020A low-cost method for accurate localization of traffic participants.
Maozhu Liao, Shengdong Chen, Chuangjie Zheng, Feng Yuan
2020A non-discriminatory approach to ethical deep learning.
Enzo Tartaglione, Marco Grangetto
2020A novel Q-Learning Algorithm Based on the Stochastic Environment Path Planning Problem.
Li Jian, Fei Rong, Tang Yu
2020A three-stage machine learning network security solution for public entities.
Stanislaw Saganowski
2020A11 Your PLCs Belong to Me: ICS Ransomware Is Realistic.
Yipeng Zhang, Zhonghao Sun, Liqun Yang, Zhoujun Li, Qiang Zeng, Yueying He, Xiaoming Zhang
2020ALBFL: A Novel Neural Ranking Model for Software Fault Localization via Combining Static and Dynamic Features.
Yuqing Pan, Xi Xiao, Guangwu Hu, Bin Zhang, Qing Li, Haitao Zheng
2020Active DNN IP Protection: A Novel User Fingerprint Management and DNN Authorization Control Technique.
Mingfu Xue, Zhiyu Wu, Can He, Jian Wang, Weiqiang Liu
2020Active Link Obfuscation to Thwart Link-flooding Attacks for Internet of Things.
Xuyang Ding, Feng Xiao, Man Zhou, Zhibo Wang
2020Adaptive Random Test Case Generation Based on Multi-Objective Evolutionary Search.
Chengying Mao, Linlin Wen, Tsong Yueh Chen
2020Address-based Signature.
Handong Cui, Tsz Hon Yuen
2020Adversarial Attacks on Time-Series Intrusion Detection for Industrial Control Systems.
Giulio Zizzo, Chris Hankin, Sergio Maffeis, Kevin Jones
2020An Analytics Framework for Heuristic Inference Attacks against Industrial Control Systems.
Taejun Choi, Guangdong Bai, Ryan K. L. Ko, Naipeng Dong, Wenlu Zhang, Shunyao Wang
2020An Approach for Poisoning Attacks against RNN-Based Cyber Anomaly Detection.
Jinghui Xu, Yu Wen, Chun Yang, Dan Meng
2020An Arithmetic Differential Privacy Budget Allocation Method for the Partitioning and Publishing of Location Information.
Yan Yan, Xin Gao, Adnan Mahmood, Yang Zhang, Shuang Wang, Quan Z. Sheng
2020An Automatic Vulnerability Classification System for IoT Softwares.
Haibo Chen, Dalin Zhang, Jinfu Chen, Wei Lin, Dengzhou Shi, Zian Zhao
2020An Automatic Vulnerability Scanner for Web Applications.
Haibo Chen, Junzuo Chen, Jinfu Chen, Shang Yin, Yiming Wu, Jiaping Xu
2020An Efficient Vulnerability Extrapolation Using Similarity of Graph Kernel of PDGs.
Jingxiang Zeng, Xiaofan Nie, Liwei Chen, Jinfeng Li, Gewangzi Du, Gang Shi
2020An Investigation of Assistive Products for the Elderly.
Xiaoying Li, Huai-bin Wang, Yuqiong Liu, Yuefei Wang, Zhen Liu
2020An impedance control method of lower limb exoskeleton rehabilitation robot based on predicted forward dynamics.
Yuefei Wang, Zhen Liu, Liucun Zhu, Xiaoying Li, Huaibin Wang
2020Analysis and modelling of multi-stage attacks.
Saurabh Chamotra, Ferdous Ahmed Barbhuiya
2020AndroTIME: Identifying Timing Side Channels in the Android API.
Gerald Palfinger, Bernd Prünster, Dominik Julian Ziegler
2020Android Malware Classification Using Machine Learning and Bio-Inspired Optimisation Algorithms.
Jack Pye, Biju Issac, Nauman Aslam, Husnain Rafiq
2020Anomaly Detection on MIL-STD-1553 Dataset using Machine Learning Algorithms.
Francis Onodueze, Darsana Josyula
2020Aquatic Drone Control Using Inertial Sensors - Comparative Filtering Methods.
Mihaela Hnatiuc, Oana Geman, Dragos Vicoveanu, George Motru
2020Are Smart Home Devices Abandoning IPV Victims?
Ahmed Alshehri, Malek Ben Salem, Lei Ding
2020Assessing the Similarity of Smart Contracts by Clustering their Interfaces.
Monika Di Angelo, Gernot Salzer
2020Asset-Oriented Threat Modeling.
Nan Messe, Vanea Chiprianov, Nicolas Belloir, Jamal El Hachem, Régis Fleurquin, Salah Sadou
2020Atrial Fibrillation Classification Using Convolutional Neural Networks and Time Domain Features of ECG Sequence.
Mixue Deng, Lishen Qiu, Hongqing Wang, Wei Shi, Lirong Wang
2020Attribute-Based Data Access Control for Multi-Authority System.
Ahmad Salehi S., Carsten Rudolph, Marthie Grobler
2020Automated Enforcement of the Principle of Least Privilege over Data Source Access.
Haoqi Wu, Zhengxuan Yu, Dapeng Huang, Haodong Zhang, Weili Han
2020Avoiding Geographic Regions in Tor.
Matthew J. Ryan, Morshed U. Chowdhury, Frank Jiang, Robin Doss
2020Awareness of Secure Coding Guidelines in the Industry - A first data analysis.
Tiago Espinha Gasiba, Ulrike Lechner, Maria Pinto-Albuquerque, Daniel Méndez Fernández
2020BHDA - A Blockchain-Based Hierarchical Data Access Model for Financial Services.
Zhiyu Xu, Lin Yang, Ziyuan Wang, Sheng Wen, Rob Hanson, Shiping Chen, Yang Xiang
2020BML: A Data Mapping Language for Blockchain Platforms.
Ba-Lam Do, Quang-Thang Nguyen, Thang Nguyen, Tien-Thao Nguyen, Thanh-Chung Dao, Binh Minh Nguyen
2020BONIK: A Blockchain Empowered Chatbot for Financial Transactions.
Md. Saiful Islam Bhuiyan, Abdur Razzak, Md Sadek Ferdous, Mohammad Jabed Morshed Chowdhury, Mohammad Ashraful Hoque, Sasu Tarkoma
2020Bearicade: secure access gateway to High Performance Computing systems.
Taha Al-Jody, Violeta Holmes, Alexandros Antoniades, Yazan Kazkouzeh
2020BlockSLAP: Blockchain-based Secure and Lightweight Authentication Protocol for Smart Grid.
Weizheng Wang, Huakun Huang, Lejun Zhang, Zhaoyang Han, Chen Qiu, Chunhua Su
2020Blockchain based End-to-end Tracking System for Distributed IoT Intelligence Application Security Enhancement.
Lei Xu, Zhimin Gao, Xinxin Fan, Lin Chen, Han-Yee Kim, Taeweon Suh, Weidong Shi
2020Blockchain based PKI and Certificates Management in Mobile Networks.
Junzhi Yan, Xiaoyong Hang, Bo Yang, Li Su, Shen He
2020Blockchain-based Verifiable Credential Sharing with Selective Disclosure.
Rahma Mukta, James Martens, Hye-Young Paik, Qinghua Lu, Salil S. Kanhere
2020Blockchain-enabled Collaborative Intrusion Detection in Software Defined Networks.
Wenjun Fan, Younghee Park, Shubham Kumar, Priyatham Ganta, Xiaobo Zhou, Sang-Yoon Chang
2020Boosting Homograph Attack Classification Using Ensemble Learning and N-gram Model.
Tran Phuong Thao, Hoang-Quoc Nguyen-Son, Rie Shigetomi Yamaguchi, Toshiyuki Nakata
2020C2BID: Cluster Change-Based Intrusion Detection.
Tiago Fernandes, Luís Dias, Miguel Correia
2020CMIRGen: Automatic Signature Generation Algorithm for Malicious Network Traffic.
Runzi Zhang, Mingkai Tong, Lei Chen, Jianxin Xue, Wenmao Liu, Feng Xie
2020CPN Model Checking Method of Concurrent Software Based on State Space Pruning.
Tao Sun, Jing Yang, Wenjie Zhong
2020Cache side-channel attacks detection based on machine learning.
Zhongkai Tong, Ziyuan Zhu, Zhanpeng Wang, Limin Wang, Yusha Zhang, Yuxin Liu
2020Ciphertext-Policy Attribute-Based Encryption with Multi-Keyword Search over Medical Cloud Data.
Changchun Yin, Hao Wang, Lu Zhou, Liming Fang
2020Cross Platform IoT- Malware Family Classification based on Printable Strings.
Yen-Ting Lee, Tao Ban, Tzu-Ling Wan, Shin-Ming Cheng, Ryoichi Isawa, Takeshi Takahashi, Daisuke Inoue
2020Cryptanalysis of a Chaos-based Block Cryptosystem Using Multiple Samples Correlation Power Analysis.
Shunsheng Zhang, Yuling Luo, Lvchen Cao, Junxiu Liu
2020Cyber Situation Awareness Monitoring and Proactive Response for Enterprises on the Cloud.
Hootan Alavizadeh, Hooman Alavizadeh, Julian Jang-Jaccard
2020Cyclic Bayesian Attack Graphs: A Systematic Computational Approach.
Isaac Matthews, John C. Mace, Sadegh Soudjani, Aad van Moorsel
2020DANTE: Predicting Insider Threat using LSTM on system logs.
Qicheng Ma, Nidhi Rastogi
2020DNRTI: A Large-scale Dataset for Named Entity Recognition in Threat Intelligence.
Xuren Wang, Xinpei Liu, Shengqin Ao, Ning Li, Zhengwei Jiang, Zongyi Xu, Zihan Xiong, Mengbo Xiong, Xiaoqing Zhang
2020DP-Eclat: A Vertical Frequent Itemset Mining Algorithm Based on Differential Privacy.
Shengyi Guan, Xuebin Ma, Wuyungerile Li, Xiangyu Bai
2020Data Analytics-enabled Intrusion Detection: Evaluations of ToN IoT Linux Datasets.
Nour Moustafa, Mohiuddin Ahmed, Sherif Ahmed
2020Dataset Construction and Analysis of Screenshot Malware.
Hugo Sbaï, Jassim Happa, Michael Goldsmith, Samy Meftali
2020De-randomizing the Code Segment with Timing Function Attack.
Tianning Zhang, Miao Cai, Diming Zhang, Hao Huang
2020DeM-CoD: Novel Access-Control-Based Cash on Delivery Mechanism for Decentralized Marketplace.
Ha Xuan Son, Hai Trieu Le, Nadia Metoui, Nghia Duong-Trung
2020Deep Learning for Password Guessing and Password Strength Evaluation, A Survey.
Tao Zhang, Zelei Cheng, Yi Qin, Qiang Li, Lin Shi
2020Densely Connected Residual Network for Attack Recognition.
Peilun Wu, Nour Moustafa, Shiyi Yang, Hui Guo
2020Design and implementation of a multifunctional ECG analysis software system.
Dong Wang, Lishen Qiu, Wei Shi, Hongqing Wang, Xiangxiang Xu, Lirong Wang
2020Detecting Online Game Malicious Chargeback by using k-NN.
Yu-Chih Wei, You-Xin Lai, Hai-Po Su, Yu-Wen Yen
2020Detection of Hate Tweets using Machine Learning and Deep Learning.
Lida Ketsbaia, Biju Issac, Xiaomin Chen
2020Differential Privacy Images Protection Based on Generative Adversarial Network.
Ren Yang, Xuebin Ma, Xiangyu Bai, Xiangdong Su
2020Differential Privacy Preservation in Interpretable Feedforward-Designed Convolutional Neural Networks.
De Li, Jinyan Wang, Zhou Tan, Xianxian Li, Yuhang Hu
2020Differential privacy preserving data publishing based on Bayesian network.
Xuejian Qi, Xuebin Ma, Xiangyu Bai, Wuyungerile Li
2020Do My Emotions Influence What I Share? Analysing the Effects of Emotions on Privacy Leakage in Twitter.
Manasi Mittal, Muhammad Rizwan Asghar, Arvind K. Tripathi
2020Doc2vec-based Insider Threat Detection through Behaviour Analysis of Multi-source Security Logs.
Liu Liu, Chao Chen, Jun Zhang, Olivier Y. de Vel, Yang Xiang
2020Dynamic flow redirecton scheme for enhancing control plane robustness in SDN.
Dong Liang, Qinrang Liu, Yanbin Hu, Tao Hu, Binghao Yan, Haiming Zhao
2020ELPPS: An Enhanced Location Privacy Preserving Scheme in Mobile Crowd-Sensing Network Based on Edge Computing.
Minghui Li, Yang Li, Liming Fang
2020Easy-to-implement Campus Electronic Anonymous Voting System.
Ruxian Zhang, Zhaoju Zhang, Hong Di
2020Efficient Off-Chain Transaction to Avoid Inaccessible Coins in Cryptocurrencies.
Hossein Rezaeighaleh, Cliff C. Zou
2020Efficient Revocable Attribute-Based Encryption with Hidden Policies.
Dominik Ziegler, Alexander Marsalek
2020Enabling Security Analysis of IoT Device-to-Cloud Traffic.
Eda Zhou, Joseph Turcotte, Lorenzo De Carli
2020Enhancing Cyber Security Using Audio Techniques: A Public Key Infrastructure for Sound.
Anthony Phipps, Karim Ouazzane, Vassil T. Vassilev
2020Enhancing Randomization Entropy of x86-64 Code while Preserving Semantic Consistency.
Xuewei Feng, Dongxia Wang, Zhechao Lin, Xiaohui Kuang, Gang Zhao
2020Enhancing the Security of Numeric Comparison Secure Simple Pairing in Bluetooth 5.0.
Dongkun Hou, Jie Zhang, Ka Lok Man
2020Estimating Loss Due to Cyber-attack in the Presence of Uncertainty.
Hoang Hai Nguyen, David M. Nicol
2020Evaluating the Soundness of Security Metrics from Vulnerability Scoring Frameworks.
Joe Samuel, Khalil Aalab, Jason Jaskolka
2020Explicitly Privacy-Aware Space Usage Analysis.
Sanjiv S. Jha, Simon Mayer, Tanja Schneider
2020Exploit Internal Structural Information for IoT Malware Detection Based on Hierarchical Transformer Model.
Xiaohui Hu, Rui Sun, Kejia Xu, Yongzheng Zhang, Peng Chang
2020Exploiting User Selection Algorithm for Securing Wireless Communication Networks.
Xiaoying Qiu, Guangda Li, Xuan Sun, Zhiguo Du
2020Extending Registration and Authentication Processes of FIDO2 External Authenticator with QR Codes.
Chengqian Guo, Quanwei Cai, Qiongxiao Wang, Jingqiang Lin
2020FIDOnuous: A FIDO2/WebAuthn Extension to Support Continuous Web Authentication.
Eric Klieme, Jonathan Wilke, Niklas van Dornick, Christoph Meinel
2020FPGA based Blockchain System for Industrial IoT.
Lei Xu, Lin Chen, Zhimin Gao, Han-Yee Kim, Taeweon Suh, Weidong Shi
2020FTCLNet: Convolutional LSTM with Fourier Transform for Vulnerability Detection.
Defu Cao, Jing Huang, Xuanyu Zhang, Xianhua Liu
2020FTPB: A Three-stage DNS Tunnel Detection Method Based on Character Feature Extraction.
Kemeng Wu, Yongzheng Zhang, Tao Yin
2020Face2Face Manipulation Detection Based on Histogram of Oriented Gradients.
Amr Megahed, Qi Han
2020Factors Affecting Users' Disclosure Decisions in Android Runtime Permissions Model.
Rawan Baalous, Ronald Poet
2020Factors affecting trust in the autonomous vehicle: A survey of primary school students and parent perceptions.
Yingying Ma, Shuo Li, Shaotian Qin, Yue Qi
2020Fairness Testing of Machine Learning Models Using Deep Reinforcement Learning.
Wentao Xie, Peng Wu
2020Family Identification of AGE-Generated Android Malware Using Tree-Based Feature.
Guga Suri, Jianming Fu, Rui Zheng, Xinying Liu
2020Far from classification algorithm: dive into the preprocessing stage in DGA detection.
Mingkai Tong, Guo Li, Runzi Zhang, Jianxin Xue, Wenmao Liu, Jiahai Yang
2020Feature importance in Android malware detection.
Vasileios Kouliaridis, Georgios Kambourakis, Tao Peng
2020Federated TON_IoT Windows Datasets for Evaluating AI-based Security Applications.
Nour Moustafa, Marwa Keshk, Essam Soliman Debie, Helge Janicke
2020Finding Geometric Medians with Location Privacy.
Eyal Nussbaum, Michael Segal
2020Fined-grained Aspect Extraction from Online Reviews for Decision Support.
Zhaoli Liu, Qindong Sun, Zhihai Yang, Kun Jiang, Jinpei Yan
2020Flowverine: Leveraging Dataflow Programming for Building Privacy-Sensitive Android Applications.
Eduardo Gomes, Igor Zavalyshyn, Nuno Santos, João Silva, Axel Legay
2020Forensic Analysis of Dating Applications on Android and iOS Devices.
Shinelle Hutchinson, Neesha Shantaram, Umit Karabiyik
2020Generation of malicious webpage samples based on GAN.
Mengxiang Wan, Hanbing Yao, Xin Yan
2020Golden-Chip-Free Hardware Trojan Detection Through Thermal Radiation Comparison in Vulnerable Areas.
Ting Su, Jiahe Shi, Yongkang Tang, Shaoqing Li
2020Group Communication Needs No Consistent Transcript Distribution.
Klaus Herberth
2020Heimdall: Illuminating the Hidden Depths of Third-party Tracking in Android Applications.
Thomas Cory, Philip Raschke, Axel Küpper
2020Hypergraph Attention Networks.
Chaofan Chen, Zelei Cheng, Zuotian Li, Manyi Wang
2020Identifying Cross-Version Function Similarity Using Contextual Features.
Paul Black, Iqbal Gondal, Peter Vamplew, Arun Lakhotia
2020Image Authentication using QR Code Watermarking Approach based on Image Segmentation.
Xiaomei Liu, Xin Tang
2020Image Self-Recovery Based on Authentication Feature Extraction.
Tong Liu, Xiaochen Yuan
2020Implementing Network Attack Detection with a Novel NSSA Model Based on Knowledge Graphs.
Yixuan Wang, Yujun Li, Xiang Chen, Yeni Luo
2020Improving Efficiency of Key Enumeration Based on Side-Channel Analysis.
Wei Yang, Anmin Fu, Hailong Zhang, Chanying Huang
2020Improving Laplace Mechanism of Differential Privacy by Personalized Sampling.
Wen Huang, Shijie Zhou, Tianqing Zhu, Yongjian Liao, Chunjiang Wu, Shilin Qiu
2020Improving the Effectiveness of Grey-box Fuzzing By Extracting Program Information.
Yu Fu, Siming Tong, Xiangyu Guo, Liang Cheng, Yang Zhang, Dengguo Feng
2020Independent Worker Selection In Crowdsourcing.
Ang Li, Wenjun Jiang, Xueqi Li, Xinrong Chen, Guojun Wang
2020Inference Attacks on Physical Layer Channel State Information.
Paul Walther, Thorsten Strufe
2020Integration of 5G, VANETs and Blockchain Technology.
Muhammad Arif, Walter Balzano, Alessandro Fontanella, Silvia Stranieri, Guojun Wang, Xiaofei Xing
2020IoT Attacks: Features Identification and Clustering.
Junaid Haseeb, Masood Mansoori, Harith Al-Sahaf, Ian Welch
2020IoT-Sphere: A Framework To Secure IoT Devices From Becoming Attack Target And Attack Source.
Syed Ghazanfar Abbas, Muhammad Husnain, Ubaid Ullah Fayyaz, Farrukh Shahzad, Ghalib A. Shah, Kashif Zafar
2020Joint Learning for Document-Level Threat Intelligence Relation Extraction and Coreference Resolution Based on GCN.
Xuren Wang, Mengbo Xiong, Yali Luo, Ning Li, Zhengwei Jiang, Zihan Xiong
2020LTMS: A Lightweight Trust Management System for Wireless Medical Sensor Networks.
Muhammad Shadi Hajar, M. Omar Al-Kadri, Harsha K. Kalutarage
2020LURK: Server-Controlled TLS Delegation.
Ioana Boureanu, Daniel Migault, Stere Preda, Hyame Assem Alamedine, Sanjay Mishra, Frederic Fieau, Mohammad Mannan
2020Library Implementation and Performance Analysis of GlobalPlatform TEE Internal API for Intel SGX and RISC-V Keystone.
Kuniyasu Suzaki, Kenta Nakajima, Tsukasa Oi, Akira Tsukamoto
2020MAUSPAD: Mouse-based Authentication Using Segmentation-based, Progress-Adjusted DTW.
Dong Qin, Shen Fu, George T. Amariucai, Daji Qiao, Yong Guan
2020MLTracer: Malicious Logins Detection System via Graph Neural Network.
Fucheng Liu, Yu Wen, Yanna Wu, Shuangshuang Liang, Xihe Jiang, Dan Meng
2020Malware Classification on Imbalanced Data through Self-Attention.
Yu Ding, Shupeng Wang, Jian Xing, Xiaoyu Zhang, ZiSen Oi, Ge Fu, Qian Qiang, Haoliang Sun, Jianyu Zhang
2020Malware Detection Based on Term Frequency Analysis of GPRs Features.
Fang Li, Ziyuan Zhu, Chao Yan, Bowen Chen, Dan Meng
2020Measurement Unit Placement Against Injection Attacks for the Secured Operation of an IIoT-based Smart Grid.
Adnan Anwar, S. M. Abu Adnan Abir
2020Membership Inference Attacks: Analysis and Mitigation.
Md Shamimur Rahman Shuvo, Dima Alhadidi
2020Metrics to Enhance the Resilience of Cyber-Physical Systems.
Michel Barbeau, Frédéric Cuppens, Nora Cuppens, Romain Dagnas, Joaquín García-Alfaro
2020Mind the GAP: Security & Privacy Risks of Contact Tracing Apps.
Lars Baumgärtner, Alexandra Dmitrienko, Bernd Freisleben, Alexander Gruler, Jonas Höchst, Joshua Kühlberg, Mira Mezini, Richard Mitev, Markus Miettinen, Anel Muhamedagic, Thien Duc Nguyen, Alvar Penning, Dermot Frederik Pustelnik, Filipp Roos, Ahmad-Reza Sadeghi, Michael Schwarz, Christian Uhl
2020Modeling and Analysis of RabbitMQ Using UPPAAL.
Ran Li, Jiaqi Yin, Huibiao Zhu
2020Modeling and Verification of Spatio-Temporal Intelligent Transportation Systems.
Tengfei Li, Xiaohong Chen, Haiying Sun, Jing Liu, Jiajia Yang, Chenchen Yang, Junfeng Sun
2020Modelling Attacks in Blockchain Systems using Petri Nets.
Md. Atik Shahriar, Faisal Haque Bappy, A. K. M. Fakhrul Hossain, Dayamoy Datta Saikat, Md Sadek Ferdous, Mohammad Jabed Morshed Chowdhury, Md. Zakirul Alam Bhuiyan
2020Monitoring Social Media for Vulnerability-Threat Prediction and Topic Analysis.
Shin-Ying Huang, Tao Ban
2020More efficient SM9 algorithm based on bilinear pair optimization processing.
Xianze Liu, Jihong Liu, Bifei Jiang, Haozhen Jiang, Zhi Yang
2020Multi-Input Functional Encryption: Efficient Applications from Symmetric Primitives.
Alexandros Bakas, Antonis Michalas
2020Multi-Party Private Set Intersection in Vertical Federated Learning.
Linpeng Lu, Ning Ding
2020NLabel: An Accurate Familial Clustering Framework for Large-scale Weakly-labeled Malware.
Yannan Liu, Yabin Lai, Kaizhi Wei, Liang Gu, Zhengzheng Yan
2020Name-Signature Lookup System: A Security Enhancement to Named Data Networking.
Zhicheng Song, Pushpendu Kar
2020Napping Guard: Deanonymizing Tor Hidden Service in a Stealthy Way.
Muqian Chen, Xuebin Wang, Jinqiao Shi, Can Zhao, Meiqi Wang, Binxing Fang
2020Netspot: a simple Intrusion Detection System with statistical learning.
Alban Siffer, Pierre-Alain Fouque, Alexandre Termier, Christine Largouët
2020Novel design of Hardware Trojan: A generic approach for defeating testability based detection.
Ning Zhang, Zhiqiang Lv, Yanlin Zhang, Haiyang Li, Yixin Zhang, Weiqing Huang
2020On the Comparison of Classifiers' Construction over Private Inputs.
Mina Sheikhalishahi, Nicola Zannone
2020On the Role of Data Anonymization in Machine Learning Privacy.
Navoda Senavirathne, Vicenç Torra
2020On the Usefulness of User Nudging and Strength Indication Concerning Unlock Pattern Security.
Thomas Hupperich, Katharina Dassel
2020One Covert Channel to Rule Them All: A Practical Approach to Data Exfiltration in the Cloud.
Benjamin Semal, Konstantinos Markantonakis, Keith Mayes, Jan Kalbantner
2020Opportunistic Tracking in Cyber-Physical Systems.
Samaneh Rashidibajgan, Thomas Hupperich, Robin Doss, Lei Pan
2020Optimized FPGA Implementation of Elliptic Curve Cryptosystem over Prime Fields.
Guoqiang Yang, Fanyu Kong, Qiuliang Xu
2020PPFQ: Privacy-Preserving Friends Query over Online Social Networks.
Yuxi Li, Fucai Zhou, Zifeng Xu
2020Partial-SMT: Core-scheduling Protection Against SMT Contention-based Attacks.
Xiaohui Wu, Yeping He, Qiming Zhou, Hengtai Ma, Liang He, Wenhao Wang, Liheng Chen
2020Password Policies vs. Usability: When Do Users Go "Bananas"?
Roberto Dillon, Shailey Chawla, Dayana Hristova, Barbara Göbl, Suzana Jovicic
2020Permission Token Segmentation Scheme based on Blockchain Access Control.
Jinshan Shi, Ru Li
2020Phishing Web Page Detection Using Optimised Machine Learning.
Jordan Stobbs, Biju Issac, Seibu Mary Jacob
2020Plant Taxonomy In Hainan Based On Deep Convolutional Neural Network And Transfer Learning.
Wei Liu, Wenlong Feng, Mengxing Huang, Guilai Han, Jialun Lin
2020Policy Evaluation and Dynamic Management Based on Matching Tree for XACML.
Hongzhaoning Kang, Gang Liu, Quan Wang, Runnan Zhang, Zichao Zhong, Yumin Tian
2020Practical Secure Two-Party EdDSA Signature Generation with Key Protection and Applications in Cryptocurrency.
Qi Feng, Debiao He, Min Luo, Zengxiang Li, Kim-Kwang Raymond Choo
2020Practical and Secure Circular Range Search on Private Spatial Data.
Zhihao Zheng, Zhenfu Cao, Jiachen Shen
2020Prediction of Radio Frequency Spectrum Occupancy.
Hubert Kyeremateng-Boateng, Marvin A. Conn, Darsana Josyula, Manohar Mareboyana
2020Prediction of high precision ignition process in the condition of multi flow area coupling of micro solid rocket motor.
Gaofei Wei, Qiang Cai, Meng Li, Rui Dong, Yang Liu
2020Preventing a Fork in a Blockchain - David Fighting Goliath.
Przemyslaw Kubiak, Miroslaw Kutylowski
2020Prihook: Differentiated context-aware hook placement for different owners' smartphones.
Chen Tian, Yazhe Wang, Peng Liu, Yu Wang, Ruirui Dai, Anyuan Zhou, Zhen Xu
2020Priority based Modeling and Comparative study of Google Cloud Resources between 2011 and 2019.
Dimuth Lasantha, Biplob Ray
2020Privacy Smells: Detecting Privacy Problems in Cloud Architectures.
Immanuel Kunz, Angelika Schneider, Christian Banse
2020Privacy-Encoding Models for Preserving Utility of Machine Learning Algorithms in Social Media.
Sara Salim, Nour Moustafa, Benjamin P. Turnbull
2020Privacy-Preserving Public Verification of Ethical Cobalt Sourcing.
Kilian Becher, J. A. Gregor Lagodzinski, Thorsten Strufe
2020Privacy-Preserving Ride-Hailing with Verifiable Order-Linking in Vehicular Networks.
Meng Li, Jianbo Gao, Yifei Chen, Jingcheng Zhao, Mamoun Alazab
2020Program Slice based Vulnerable Code Clone Detection.
Xiaonan Song, Aimin Yu, Haibo Yu, Shirun Liu, Xin Bai, Lijun Cai, Dan Meng
2020Protecting the Intellectual Property of Deep Neural Networks with Watermarking: The Frequency Domain Approach.
Meng Li, Qi Zhong, Leo Yu Zhang, Yajuan Du, Jun Zhang, Yong Xiang
2020Prov-IoT: A Security-Aware IoT Provenance Model.
Fariha Tasmin Jaigirdar, Carsten Rudolph, Chris Bain
2020Pyramid Pooling Channel Attention Network for esophageal tissue segmentation on OCT images.
Deyin Li, Miao Zhang, Wei Shi, Huimin Zhang, Duoduo Wang, Lirong Wang
2020QPBFT: Practical Byzantine Fault Tolerance Consensus Algorithm Based on Quantified-role.
Zhujun Zhang, Dali Zhu, Wei Fan
2020RPAD: An Unsupervised HTTP Request Parameter Anomaly Detection Method.
Yizhen Sun, Yiman Xie, Weiping Wang, Shigeng Zhang, Yuxi Wu, Jingchuan Feng
2020ReDex: Unpacking Android Packed Apps by Executing Every Method.
Jiajin Cai, Tongxin Li, Can Huang, Xinhui Han
2020Reducing the Price of Protection: Identifying and Migrating Non-Sensitive Code in TEE.
Yin Liu, Eli Tilevich
2020Research and Improvement of Community Discovery Algorithm Based on Spark for Large Scale Complicated Networks.
Hui Kang, Shengquan Chen, Lingfeng Lu, Chenkun Meng
2020Research on Stitching and Alignment of Mouse Carcass EM Images.
Jing Zhu, Hongyu Ge, Ao Cheng, Ruobing Zhang, Lirong Wang
2020RevBloc: A Blockchain-based Secure Customer Review System.
Xiuli Fang, Muhammad Rizwan Asghar
2020Reversible data hiding based on improved rhombus predictor and prediction error expansion.
Xin Tang, Linna Zhou, Dan Liu, Boyu Liu, Xinyi Lü
2020Revocable and Offline-Verifiable Self-Sovereign Identities.
Andreas Abraham, Stefan More, Christof Rabensteiner, Felix Hörandner
2020Robust Scheduling for Large-Scale Distributed Systems.
Young Choon Lee, Jayden King, Young Ki Kim, Seok-Hee Hong
2020Robust Spatial-spread Deep Neural Image Watermarking.
Marcin Plata, Piotr Syga
2020Robustness analysis and defence strategy of an interdependent networks model based on closeness centrality.
Jinfang Sheng, Yan Hu, Kerong Guan, Bin Wang, Xiaoxia Pan, Wenjun Kang
2020SCAFFISD: A Scalable Framework for Fine-grained Identification and Security Detection of Wireless Routers.
Fangzhou Zhu, Liang Liu, Weizhi Meng, Ting Lv, Simin Hu, Renjun Ye
2020SCPORAM: a hardware support scheme for protecting memory access patterns.
Zhanpeng Wang, Ziyuan Zhu, Limin Wang, Zhongkai Tong, Chao Yan
2020SCScan: A SVM-based Scanning System for Vulnerabilities in Blockchain Smart Contracts.
Xiaohan Hao, Wei Ren, Wenwen Zheng, Tianqing Zhu
2020SCUR: Smart Contracts with a Static Upper-bound on Resource Usage.
Markus Knecht, Burkhard Stiller
2020SSIBAC: Self-Sovereign Identity Based Access Control.
Rafael Belchior, Benedikt Putz, Günther Pernul, Miguel Correia, André Vasconcelos, Sérgio Guerreiro
2020STIDM: A Spatial and Temporal Aware Intrusion Detection Model.
Xueying Han, Rongchao Yin, Zhigang Lu, Bo Jiang, Yuling Liu, Song Liu, Chonghua Wang, Ning Li
2020Scalable and Accurate Binary Search Method based on Simhash and Partial Trace.
Yunan Zhang, Aidong Xu, Yixin Jiang
2020SeRoT: A Secure Runtime System on Trusted Execution Environments.
Jingbin Liu, Yu Qin, Dengguo Feng
2020SeWG: Security-enhanced WireGuard for Android Based on TEE.
Yongkang Wu, Yiwei Shan, Zhichao Wang, Pengcheng Zhang, Min He, Jihong Liu
2020Search & Catch: Detecting Promotion Infection in the Underground through Search Engines.
Ronghai Yang, Jia Liu, Liang Gu, Yurong Chen
2020Secure Coded Matrix Multiplication against Cooperative Attack in Edge Computing.
Luqi Zhu, Jin Wang, Lianmin Shi, Jingya Zhou, Kejie Lu, Jianping Wang
2020Secure Outsourcing Algorithms of Modular Exponentiations in Edge Computing.
Tianyi Zhang, Jian Wang
2020Secure Outsourcing of Multi-Armed Bandits.
Radu Ciucanu, Pascal Lafourcade, Marius Lombard-Platet, Marta Soare
2020Secure and Privacy Preserving Method for Biometric Template Protection using Fully Homomorphic Encryption.
Arun Kumar Jindal, Imtiyazuddin Shaik, Vasudha, Srinivasa Rao Chalamala, Rajan MA, Sachin Lodha
2020SecureESFS: Sharing Android External Storage Files in A Securer Way.
Shan Liang, Yuewu Wang, Lingguang Lei, Jiwu Jing, Quan Zhou
2020Securing Manufacturing Using Blockchain.
Zahra Jadidi, Ali Dorri, Raja Jurdak, Colin J. Fidge
2020Security Challenges and Solutions for 5G HetNet.
Aakanksha Sharma, Venki Balasubramanian, Alireza Jolfaei
2020Security and Privacy Analysis of mhealth Application: A Case Study.
Wanrong Zhao, Hossain Shahriar, Victor Clincy, Md. Zakirul Alam Bhuiyan
2020Security and Privacy Implementation in Smart Home: Attributes Based Access Control and Smart Contracts.
Amjad Qashlan, Priyadarsi Nanda, Xiangjian He
2020Semantic Location Privacy Protection Algorithm Based on Edge Cluster Graph.
Tao Lu, Hongyun Xu, Kai Tian, Cenxi Tian, Rui Jiang
2020Semantic redirection obfuscation: A control flow obfuscation based on Android Runtime.
Zhichao Wang, Yiwei Shan, Zhi Yang, Ruoyi Wang, Shuang Song
2020Sensitive Information Detection based on Convolution Neural Network and Bi-directional LSTM.
Yan Lin, Guosheng Xu, Guoai Xu, Yudong Chen, Dawei Sun
2020SmartLED: Smartphone-based covert channels leveraging the notification LED.
Lorena González-Manzano, Sergio Bernardez, José María de Fuentes
2020Special-purpose Model Extraction Attacks: Stealing Coarse Model with Fewer Queries.
Rina Okada, Zen Ishikura, Toshiki Shibahara, Satoshi Hasegawa
2020SpeedNeuzz: Speed Up Neural Program Approximation with Neighbor Edge Knowledge.
Yi Li, Xi Xiao, Xiaogang Zhu, Xiao Chen, Sheng Wen, Bin Zhang
2020Survey on Blockchain and Deep Learning.
Yizhuo Zhang, Yiwei Liu, Chi-Hua Chen
2020TA-HRT: A temperature-aware scheduler for heterogeneous real-time multicore systems.
Yanshul Sharma, Zinea Das, Alok Das, Sanjay Moulik
2020TEADS: A Defense-aware Framework for Synthesizing Transient Execution Attacks.
Tianlin Huo, Wenhao Wang, Pei Zhao, Yufeng Li, Tingting Wang, Mingshu Li
2020TORP: Load Balanced Reliable Opportunistic Routing for Asynchronous Wireless Sensor Networks.
Muhammad Umar Farooq, Xingfu Wang, Ammar Hawbani, Asad Khan, Adeel Ahmed, Fisseha Teju Wedaj
2020TRUVIN: Lightweight Detection of Data-Oriented Attacks Through Trusted Value Integrity.
Munir Geden, Kasper Rasmussen
2020Time is Money: Countering Griefing Attack in Lightning Network.
Subhra Mazumdar, Prabal Banerjee, Sushmita Ruj
2020Towards A New Approach to Identify WhatsApp Messages.
Rick Cents, Nhien-An Le-Khac
2020Towards A Transparent and Privacy-preserving Healthcare Platform with Blockchain for Smart Cities.
Abdullah Al Omar, Abu Kaisar Jamil, Md. Shakhawath Hossain Nur, Md Mahamudul Hasan, Rabeya Bosri, Md. Zakirul Alam Bhuiyan, Mohammad Shahriar Rahman
2020Towards Collaborative Intrusion Detection Enhancement against Insider Attacks with Multi-Level Trust.
Wenjuan Li, Weizhi Meng, Hui Zhu
2020Towards Network Traffic Monitoring Using Deep Transfer Learning.
Harsh Dhillon, Anwar Haque
2020Towards a Lightweight Continuous Authentication Protocol for Device-to-Device Communication.
Syed W. Shah, Naeem Firdous Syed, Arash Shaghaghi, Adnan Anwar, Zubair A. Baig, Robin Doss
2020Towards a Robust Classifier: An MDL-Based Method for Generating Adversarial Examples.
Behzad Asadi, Vijay Varadharajan
2020Towards a Theory of Special-Purpose Program Obfuscation.
Muhammad Rizwan Asghar, Steven D. Galbraith, Andrea Lanzi, Giovanni Russello, Lukas Zobernig
2020Towards a new deep learning based approach for the password prediction.
Manaz Kaleel, Nhien-An Le-Khac
2020Traffic Classification of User Behaviors in Tor, I2P, ZeroNet, Freenet.
Yuzong Hu, Futai Zou, Linsen Li, Ping Yi
2020Trust Aware Continuous Authorization for Zero Trust in Consumer Internet of Things.
Theo Dimitrakos, Tezcan Dilshener, Alexander Kravtsov, Antonio La Marra, Fabio Martinelli, Athanasios Rizos, Alessandro Rosetti, Andrea Saracino
2020Trust and Believe - Should We? Evaluating the Trustworthiness of Twitter Users.
Tanveer Khan, Antonis Michalas
2020Trusted Network Slicing among Multiple Mobile Network Operators.
Muhammad Jehanzaib Yousuf, Mingjun Wang, Zheng Yan, Fawad Khan
2020TrustyShare: A Sharing Scheme using ARM TrustZone.
Yongkang Wu, Langyue He, Yiwei Shan, Pengcheng Zhang, Min He, Zhi Yang
2020UIDroid: User-driven Based Hierarchical Access Control for Sensitive Information.
Luping Ma, Dali Zhu, Shunliang Zhang, Xiaohui Zhang, Shumin Peng, Ya Li
2020Unbounded Key-Policy Attribute-based Encryption with Black-Box Traceability.
Yunxiu Ye, Zhenfu Cao, Jiachen Shen
2020Uncovering the Hidden Dangers: Finding Unsafe Go Code in the Wild.
Johannes Lauinger, Lars Baumgärtner, Anna-Katharina Wickert, Mira Mezini
2020Unmasking Windows Advanced Persistent Threat Execution.
Rory Coulter, Jun Zhang, Lei Pan, Yang Xiang
2020Use of Bash History Novelty Detection for Identification of Similar Source Attack Generation.
Jack Hance, Jeremy Straub
2020User-Controlled, Auditable, Cross-Jurisdiction Sharing of Healthcare Data Mediated by a Public Blockchain.
Xiaohu Zhou, Vitor Jesus, Yonghao Wang, Mark B. Josephs
2020VALID: Voltage-Based Lightweight Intrusion Detection for the Controller Area Network.
Oleg Schell, Marcel Kneib
2020VCKSCF: Efficient Verifiable Conjunctive Keyword Search Based on Cuckoo Filter for Cloud Storage.
Chan Fan, Xiaolei Dong, Zhenfu Cao, Jiachen Shen
2020VGG-based side channel attack on RSA implementation.
Qi Lei, Chao Li, Kexin Qiao, Zhe Ma, Bo Yang
2020iTES: Integrated Testing and Evaluation System for Software Vulnerability Detection Methods.
Chi Zhang, Jinfu Chen, Saihua Cai, Bo Liu, Yiming Wu, Ye Geng
2020pcSVF: An Evaluation of Side-Channel Vulnerability of Port Contention.
Xiaoyang Liu, Ziyuan Zhu
2020zkrpChain: Privacy-preserving Data Auditing for Consortium Blockchains Based on Zero-knowledge Range Proofs.
Shiwei Xu, Xiaowen Cai, Yizhi Zhao, Zhengwei Ren, Lingjuan Wu, Huanguo Zhang, Le Du, Yan Tong