| 2022 | "Comments Matter and The More The Better!": Improving Rumor Detection with User Comments. Yang Xu, Jie Guo, Weidong Qiu, Zheng Huang, Enes Altuncu, Shujun Li |
| 2022 | "The Need for Speed": Extracting Session Keys From the Main Memory Using Brute-force and Machine Learning. Stewart Sentanoe, Christofer Fellicious, Hans P. Reiser, Michael Granitzer |
| 2022 | 5G-A Capability Exposure Scheme based on Harmonized Communication and Sensing. Lin Lin, Bin Zhu, Zelin Wang, Guangquan Wang, Jianzhi Wang, Lexi Xu, Sai Han, Yuwei Jia |
| 2022 | A Blockchain-assisted Collaborative Ensemble Learning for Network Intrusion Detection. Lijian Liu, Jinguo Li |
| 2022 | A Blockchain-based Privacy-Preserving Scheme for Cross-domain Authentication. Junfeng Jiang, Yujian Zhang, Junhao Li |
| 2022 | A Comparative Study on the Security of Cryptocurrency Wallets in Android System. Minfeng Qi, Zhiyu Xu, Tengyun Jiao, Sheng Wen, Yang Xiang, Gary Nan |
| 2022 | A Compatible and Identity Privacy-preserving Security Protocol for ACARS. Xinwei Li, Qianyun Zhang, Lexi Xu, Tao Shang |
| 2022 | A Dynamic Transaction Pattern Aggregation Neural Network for Money Laundering Detection. Xuejiao Luo, Xiaohui Han, Wenbo Zuo, Zhengyuan Xu, Zhiwen Wang, Xiaoming Wu |
| 2022 | A Faster Blockchain Sharding Protocol for Decentralized Ledger. Dongdong Liu, Mingsheng Wang, Taotao Li, Ya Han |
| 2022 | A Flow Attack Strategy based on Critical Links for Cyber-attack. Jiming Qi, Jiazheng Zhang, Qingxia Liu, Bang Wang |
| 2022 | A General Backdoor Attack to Graph Neural Networks Based on Explanation Method. Luyao Chen, Na Yan, Boyang Zhang, Zhaoyang Wang, Yu Wen, Yanfei Hu |
| 2022 | A Green Neural Network with Privacy Preservation and Interpretability. De Li, Hongyan Zheng, Zeming Gan, Xianxian Li, Jinyan Wang |
| 2022 | A Hardware Security Isolation Architecture for Intelligent Accelerator. Rui Gong, Lei Wang, Wei Shi, Wei Liu, Jianfeng Zhang |
| 2022 | A Heart Sound Classification Method Based on Residual Block and Attention Mechanism. Yujie Chen, Wenliang Zhu, Jinke Xu, Junwei Zhang, Zhanpeng Zhu, Lirong Wang |
| 2022 | A K-Induction Method Extended with Value Analysis for C Program Safety Verification. Hui Guo, Chunyan Hou, Jinsong Wang, Chen Chen |
| 2022 | A Lightweight Graph-based Method to Detect Pornographic and Gambling Websites with Imperfect Datasets. Xiaoqing Ma, Chao Zheng, Zhao Li, Jiangyi Yin, Qingyun Liu, Xunxun Chen |
| 2022 | A Lightweight Honeynet Design In the Internet of Things. Xiaoyu Du, Guanying Zhou, Yujing Wang, Song Tao |
| 2022 | A Multidimensional Blockchain Framework For Mobile Internet of Things. Hussein Zangoti, Alex Pissinou Makki, Niki Pissinou, Abdur Rahman Bin Shahid, Omar J. Guerra, Joel Rodriguez |
| 2022 | A Novel Asynchronous Evolution Opinion Dynamics Model. Xiao Xiao, Minghua Xu, Han Xu |
| 2022 | A Novel User Mobility Prediction Scheme based on the Weighted Markov Chain Model. Yuwei Jia, Kun Chao, Xinzhou Cheng, Lin Lin, Lijuan Cao, Yi Li, Yuchao Jin, Zixiang Di, Chen Cheng |
| 2022 | A Secure Remote Password Protocol From The Learning With Errors Problem. Huapeng Li, Baocheng Wang |
| 2022 | A Study on the Exoskeleton Motion Intent Recognition Algorithm for Embedded Calculation. Lei Shi, Peng Yin, Yang Ming, Shengguan Qu, Zhen Liu |
| 2022 | A Terminal Security Authentication Protocol for Zero-Trust Satellite IoT. Minqiu Tian, Zifu Li, Fenghua Li, Jin Cao, Chao Guo |
| 2022 | A Thermal-Aware Digital Twin Model of Permanent Magnet Synchronous Motors (PMSM) Based on BP Neural Networks. Heng Li, Zeyu Zhu, Peinan He, Yingze Yang, Bin Chen, Jun Peng, Zhiwu Huang |
| 2022 | A Trusted, Verifiable and Differential Cyber Threat Intelligence Sharing Framework using Blockchain. Kealan Dunnett, Shantanu Pal, Guntur Dharma Putra, Zahra Jadidi, Raja Jurdak |
| 2022 | A formalization-based vulnerability detection method for cross-subject network components. Jinfu Chen, Haodi Xie, Saihua Cai, Ye Geng, Yemin Yin, Zikang Zhang |
| 2022 | A hybrid BCI system combining motor imagery and conceptual imagery in a smart home environment. Ruixuan Liu, Muyang Lyu, Jiangrong Yang |
| 2022 | A longitudinal Measurement and Analysis Study of Mozi, an Evolving P2P IoT Botnet. Binglai Wang, Yafei Sang, Yongzheng Zhang, Shuhao Li, Xiaolin Xu |
| 2022 | A quantum inspired differential evolution algorithm with multiple mutation strategies. Jie Liu, Xingsheng Qin, Frank Jiang |
| 2022 | AI based Collaborative Optimization Scheme for Multi-Frequency Heterogeneous 4G/5G Networks. Tian Xiao, Guoping Xu, Bei Li, Lexi Xu, Xinzhou Cheng, Feibi Lyu, Guanghai Liu, Yi Zhang, Qingqing Zhang |
| 2022 | APT Attribution for Malware Based on Time Series Shapelets. Qinqin Wang, Hanbing Yan, Chang Zhao, Rui Mei, Zhihui Han, Yu Zhou |
| 2022 | AVMiner: Expansible and Semantic-Preserving Anti-Virus Labels Mining Method. Ligeng Chen, Zhongling He, Hao Wu, Yuhang Gong, Bing Mao |
| 2022 | Action-Manipulation Attack and Defense to X-Armed Bandits. Zhi Luo, Youqi Li, Lixing Chen, Zichuan Xu, Pan Zhou |
| 2022 | Adap DP-FL: Differentially Private Federated Learning with Adaptive Noise. Jie Fu, Zhili Chen, Xiao Han |
| 2022 | Adversarial Attacks on Deep Learning-Based Methods for Network Traffic Classification. Meimei Li, Yiyan Xu, Nan Li, Zhongfeng Jin |
| 2022 | An Attribute-attack-proof Watermarking Technique for Relational Database. Shuguang Yuan, Chi Chen, Ke Yang, Tengfei Yang, Jing Yu |
| 2022 | An Efficient Certificateless Authentication Scheme for Satellite Internet. Tongwei Liu, Baokang Zhao, Wei Peng |
| 2022 | An Efficient Epsilon Selection Method for DP-ERM with Expected Accuracy Constraints. Yuzhe Li, Bo Li, Weiping Wang, Nan Liu |
| 2022 | An Efficient and Secure Scheme of Verifiable Computation for Intel SGX. Wenxiu Ding, Wei Sun, Zheng Yan, Robert H. Deng, Zhiguo Wan |
| 2022 | An Empirical Study Towards SAR Adversarial Examples. Zhiwei Zhang, Xunzhang Gao, Shuowei Liu, Yujia Diao |
| 2022 | An End-to-End Multi-label classification model for Arrhythmia based on varied-length ECG signals. Yanfang Dong, Wenqiang Cai, Wenliang Zhu, Lirong Wang |
| 2022 | An Energy-Efficient scheme for industrial wireless sensor network based on hierarchical network structure. Huamei Qi, Li Jie, Wangping Xiong |
| 2022 | An Improved Actor-Critic Method for Auto-Combating In Infantry Vehicles. Ruizhu Chen, Rong Fei, Lili Wu, Lu Yang |
| 2022 | An Optimized Isomorphic Design for the SM4 Block Cipher Over the Tower Field. Chuang Wang, Yan Ding, Chenlin Huang, Liantao Song |
| 2022 | An enhanced MinHash encryption scheme for encrypted deduplication. Qiaowen Jia, Guanxiong Ha, Hanwei Wang, Haoyu Ma, Hang Chen |
| 2022 | Arteriovenous fistula stenosis classification method based on Auxiliary Wave and Transformer. Jinke Xu, Junwei Zhang, Yujie Chen, Gang Ma, Zhanpeng Zhu, Lirong Wang |
| 2022 | AutoSlicer: Automatic Program Partitioning for Securing Sensitive Data Based-on Data Dependency Analysis and Code Refactoring. Weizhong Qiang, Hao Luo |
| 2022 | Automatic Association of Cross-Domain Network Topology. Sai Han, Zelin Wang, Guangquan Wang, Qiukeng Fang, Hongbing Ma, Lin Lin, Lexi Xu, Heng Zhang |
| 2022 | Battery Aging-Robust Driving Range Prediction of Electric Bus. Heng Li, Zhijun Liu, Yongting Liu, Hui Peng, Rui Zhang, Jun Peng, Zhiwu Huang |
| 2022 | Benchmark Tool for Detecting Anomalous Program Behaviour on Embedded Devices. Michal Borowski, Sangeet Saha, Xiaojun Zhai, Klaus D. McDonald-Maier |
| 2022 | Bidirectional LSTM-based attention mechanism for CNN power theft detection. Zhuoqun Xia, Kaixin Zhou, Jingjing Tan, Hongmei Zhou |
| 2022 | Big Data based Potential Fixed-Mobile Convergence User Mining. Qingqing Zhang, Tao Zhang, Shikun Jiang, Qiang Zhang, Yuhui Han, Xinzhou Cheng, Yunyun Wang, Xin He, Tian Xiao |
| 2022 | Booting IoT Terminal Device Securely with eMMC. Siyuan Ma, Yuewu Wang, Lingguang Lei, Yingjiao Niu, Haotian Shi, Jie Wang |
| 2022 | CAHOOT: a Context-Aware veHicular intrusiOn detectiOn sysTem. Davide Micale, Gianpiero Costantino, Ilaria Matteucci, Florian Fenzl, Roland Rieke, Giuseppe Patanè |
| 2022 | CCTV-FullyAware: toward end-to-end feasible privacy-enhancing and CCTV forensics applications. Hannu Turtiainen, Andrei Costin, Timo Hämäläinen, Tuomo Lahtinen, Lauri Sintonen |
| 2022 | CCTVCV: Computer Vision model/dataset supporting CCTV forensics and privacy applications. Hannu Turtiainen, Andrei Costin, Timo Hämäläinen, Tuomo Lahtinen, Lauri Sintonen |
| 2022 | CDEdit: Redactable Blockchain with Cross-audit and Diversity Editing. Xiaofeng Chen, Ying Gao |
| 2022 | CECAS: A cloud-edge collaboration authentication scheme based on V2G short randomizable signature. Zhuoqun Xia, Hongrui Li, Ke Gu |
| 2022 | CGDF-GNN: Cascaded GNN fraud detector with dual features facing imbalanced graphs with camouflaged fraudsters. Qichang Wan, Peisen Wang, Xiaobing Pei |
| 2022 | CNN-Based Autonomous Traffic Detection on Unknown Home Security Cameras. Shuhe Liu, Xiaolin Xu, Zhefeng Nan |
| 2022 | CPDT: A copyright-preserving data trading scheme based on smart contracts and perceptual hashing. Baowei Wang, Bin Li, Yi Yuan, Changyu Dai, Yufeng Wu, Weiqian Zheng |
| 2022 | CPGBERT: An Effective Model for Defect Detection by Learning Program Semantics via Code Property Graph. Jingqiang Liu, Xiaoxi Zhu, Chaoge Liu, Xiang Cui, Qixu Liu |
| 2022 | Cache Design Effect on Microarchitecture Security: A Contrast between Xuantie-910 and BOOM. Zhe Zhou, Xiaoyu Cheng, Yang Sun, Fang Jiang, Fei Tong, Yuxing Mao, Ruilin Wang |
| 2022 | Cache Top-level domain locally: make DNS respond quickly in mobile network. Haisheng Yu, Yan Liu, Lihong Duan, Sanwei Liu, Wenyong Wang, Dong Liu, Zirui Peng, Daobiao Gong |
| 2022 | Cdga: A GAN-based Controllable Domain Generation Algorithm. You Zhai, Jian Yang, Zixiang Wang, Longtao He, Liqun Yang, Zhoujun Li |
| 2022 | Challenges and Approaches for Mitigating Byzantine Attacks in Federated Learning. Junyu Shi, Wei Wan, Shengshan Hu, Jianrong Lu, Leo Yu Zhang |
| 2022 | Clean-label Backdoor Attack on Machine Learning-based Malware Detection Models and Countermeasures. Wanjia Zheng, Kazumasa Omote |
| 2022 | Code-based encryption algorithms for generating and verifying digital signature. Aneta Poniszewska-Maranda, Kacper Pradzynski |
| 2022 | Collaborative Improvement of User Experience and Network Quality Based on Big Data. Chuntao Song, Jie Gao, Fan Zhang, Tao Zhang, Yi Zhang, Lixia Liu, Bei Li, Yong Wang, Lexi Xu |
| 2022 | Confusing Traffic against Intra-domain Webpage Fingerprinting Attacks. Weilin Yang, Zhonghui Du, Yonghui Wu, Yi Tang |
| 2022 | Coverage Estimation of Wireless Network Using Attention U-Net. Feibi Lyu, Xinzhou Cheng, Lexi Xu, Liang Liu, Jinjian Qiao, Lu Zhi, Zixiang Di, Tian Xiao, Chen Cheng |
| 2022 | Coverage Reliability of IoT Intrusion Detection System based on Attack-Defense Game Design. Siyu Sun, Xiaoxuan Fan, Yunzhi Xia, Chenlu Zhu, Shenghao Liu, Lingzhi Yi |
| 2022 | Create Persona of Elderly Users by Clustering Analysis of Needs. Xiaoying Li, Guangxiang Zhang, Yuzhou Wu, Yang Yang, Yuelei Wang, Zhen Liu |
| 2022 | DCC-Find: DNS Covert Channel Detection by Features Concatenation-Based LSTM. Dongxu Han, Pu Dong, Ning Li, Xiang Cui, Jiawen Diao, Qing Wang, Dan Du, Yuling Liu |
| 2022 | DIV-SC: A Data Integrity Verification Scheme for Centralized Database Using Smart Contract. Siqi He, Xiaofei Xing, Guojun Wang |
| 2022 | DRICP: Defect Risk Identification Using Sample Category Perception. Lixia Xie, Siyu Liu, Hongyu Yang, Liang Zhang |
| 2022 | DRSN with Simple Parameter-Free Attention Module for Specific Emitter Identification. Xiuhua Wen, Chunjie Cao, Yifan Li, Yang Sun |
| 2022 | Data Driven based Malicious URL Detection using Explainable AI. Saranda Poddar, Deepraj Chowdhury, Ashutosh Dhar Dwivedi, Raghava Rao Mukkamala |
| 2022 | Data Integrity Verification Scheme Based on Blockchain Smart Contract. Kai Zhang, He Xiao, Qiuming Liu |
| 2022 | Data Poisoning Attack to X-armed Bandits. Zhi Luo, Youqi Li, Lixing Chen, Zichuan Xu, Pan Zhou |
| 2022 | Deceiving Learning-based Sketches to Cause Inaccurate Frequency Estimation. Xuyang Jing, Xiaojun Cheng, Zheng Yan, Xian Li |
| 2022 | Deepro: Provenance-based APT Campaigns Detection via GNN. Na Yan, Yu Wen, Luyao Chen, Yanna Wu, Boyang Zhang, Zhaoyang Wang, Dan Meng |
| 2022 | Denoising method of ECG signal based on Channel Attention Mechanism. Junwei Zhang, Rui Bao, Lirong Wang, Jinke Xu, Yujie Chen, Xueqin Chen |
| 2022 | Design and Development of Operation Status Monitoring System for Large Glass Substrate Handling Robot. Xinhe Pu, Xiaofang Yuan, Liangsen Li, Weiming Ji |
| 2022 | Detecting Unknown Network Attacks with Attention Encoding and Deep Metric Learning. Chunlan Fu, Shirong Han, Gang Shen |
| 2022 | Detection of impurity content in wheat based on cone-beam CT. Gangyang Wang, Chunhua Zhu, Jianhou Wang |
| 2022 | Development of Blockchain-based e-Voting System: Requirements, Design and Security Perspective. Md. Jobair Hossain Faruk, Bilash Saha, Mazharul Islam, Fazlul Alam, Hossain Shahriar, Maria Valero, Akond Rahman, Fan Wu, Md. Zakirul Alam Bhuiyan |
| 2022 | Diabetes Mellitus Type 2 Data Sharing System Based on Blockchain and Attribute-Encryption. Weiqi Dai, Zhenhui Lu, Xia Xie, Duoqiang Wang, Hai Jin |
| 2022 | Differential Game Approach for Modelling and Defense of False Data Injection Attacks Targeting Energy Metering Systems. Jichao Bi, Shibo He, Fengji Luo, Jiming Chen, Da-Wen Huang, Mingyang Sun |
| 2022 | Dynamic Resource Allocation for Beam Hopping Satellites Communication System: An Exploration. Xinqing Du, Xin Hu, Yin Wang, Weidong Wang |
| 2022 | Dynamic and Diverse Transformations for Defending Against Adversarial Examples. Yongkang Chen, Ming Zhang, Jin Li, Xiaohui Kuang, Xuhong Zhang, Han Zhang |
| 2022 | Dynamically Selected Mixup Machine Unlearning. Zhiwen Zhou, Ximeng Liu, Jiayin Li, Junxi Ruan, Mingyuan Fan |
| 2022 | EEG classification algorithm of motor imagery based on CNN-Transformer fusion network. Haofeng Liu, Yuefeng Liu, Yue Wang, Bo Liu, Xiang Bao |
| 2022 | Efficient SM2 Hardware Design for Digital Signature of Internet of Vehicles. Mei Yang, Chong Liu, Huiyun Li, Cuiping Shao |
| 2022 | Efficient and Highly Accurate Differentially Private Statistical Genomic Analysis using Discrete Fourier Transform. Akito Yamamoto, Tetsuo Shibuya |
| 2022 | Efficiently Constructing Topology of Dynamic Networks. Fenghua Li, Cao Chen, Yunchuan Guo, Liang Fang, Chao Guo, Zifu Li |
| 2022 | EnShare: Sharing Files Securely and Efficiently in the Cloud using Enclave. Yun He, Xiaoqi Jia, Shengzhi Zhang, Lou Chitkushev |
| 2022 | Enabling Anonymous Authenticated Encryption with a Novel Anonymous Authenticated Credential Key Agreement (AACKA). Raphael Schermann, Rainer Urian, Ronald Toegl, Holger Bock, Christian Steger |
| 2022 | End-to-End Speech Recognition Technology Based on Multi-Stream CNN. Hao Xiao, Yuan Qiu, Rong Fei, Xiongbo Chen, Zuo Liu, Zongling Wu |
| 2022 | Energy-Efficient Privacy-Preserving Time-Series Forecasting on User Health Data Streams. Muhammad Arsalan, Davide Di Matteo, Sana Imtiaz, Zainab Abbas, Vladimir Vlassov, Vadim Issakov |
| 2022 | Energy-efficient and Traffic-aware VNF Placement for Vertical Services in 5G Networks. Yi Yue, Wencong Yang, Xiao Liang, Xihuizi Meng, Rong Huang, Xiongyang Tang |
| 2022 | Extending Expressive Access Policies with Privacy Features. Stefan More, Sebastian Ramacher, Lukas Alber, Marco Herzl |
| 2022 | Eye-based keystroke prediction for natural texts - a feasibility analysis. José Reverte Cazorla, José María de Fuentes, Lorena González-Manzano |
| 2022 | FLightNER: A Federated Learning Approach to Lightweight Named-Entity Recognition. Macarious Abadeer, Wei Shi, Jean-Pierre Corriveau |
| 2022 | False Data Injection Attack Detection in a Platoon of CACC in RSU. Kai Gao, Xiangyu Cheng, Hao Huang, Xunhao Li, Tingyu Yuan, Ronghua Du |
| 2022 | Federated Learning Scheme with Dual Security of Identity Authentication and Verification. Yuting Xu, Mang Su, Jinpeng Hou, Chong Nie |
| 2022 | Ferrite microstrip limiter based on the equivalent nonlinear loss simulation model for the narrow microwave pulse environment. Mingyu Yang, Tao Yang, Haiyang Wang, Hao Li, Tianming Li, Biao Hu |
| 2022 | Forgery Detection Scheme of Deep Video Frame-rate Up-conversion Based on Dual-stream Multi-scale Spatial-temporal Representation. Qing Gu, Xiangling Ding, Dengyong Zhang, Ce Yang |
| 2022 | Forgery Trajectory Injection Attack Detection for Traffic Lights under Connected Vehicle Environment. Yanghui Zhang, Kai Gao, Shuo Huang, Xunhao Li, Ronghua Du |
| 2022 | From Passive to Active: Near-optimal DNS-based Data Exfiltration Defense Method Based on Sticky Mechanism. Jiawen Diao, Binxing Fang, Xiang Cui, Zhongru Wang, Tian Wang, Shouyou Song |
| 2022 | Fuzzy Keyword Search over Encrypted Cloud Data with Dynamic Fine-grained Access Control. Boshen Shan, Yuanzhi Yao, Weihai Li, Xiaodong Zuo, Nenghai Yu |
| 2022 | GTMS: A Gated Linear Unit Based Trust Management System for Internet of Vehicles Using Blockchain Technology. Yong Kuang, Hongyun Xu, Rui Jiang, Zhikang Liu |
| 2022 | Graph Encryption for Shortest Path Queries with k Unsorted Nodes. Meng Li, Jianbo Gao, Zijian Zhang, Chaoping Fu, Chhagan Lal, Mauro Conti |
| 2022 | Guide Tracking Method Based On Particle Filter Fusion. Zilong Wang, Junhuai Li |
| 2022 | Hash Proof System with Auxiliary Inputs and Its Application. Cailing Cai, Tsz Hon Yuen, Siu-Ming Yiu |
| 2022 | HashDroid:Extraction of malicious features of Android applications based on function call graph pruning. Pengfei Liu, Weiping Wang, Hong Song, Shigeng Zhang, Yulu Hong |
| 2022 | Haxss: Hierarchical Reinforcement Learning for XSS Payload Generation. Myles Foley, Sergio Maffeis |
| 2022 | Hierarchical Classification of Android Malware Traffic. Giampaolo Bovenzi, Valerio Persico, Antonio Pescapè, Anna Piscitelli, Vincenzo Spadari |
| 2022 | Holmes: An Efficient and Lightweight Semantic Based Anomalous Email Detector. Peilun Wu, Hui Guo |
| 2022 | HyperMean: Effective Multidimensional Mean Estimation with Local Differential Privacy. Tao Zhang, Bowen Deng, Lele Zheng, Ze Tong, Qi Li |
| 2022 | IDROP: Intelligently detecting Return-Oriented Programming using real-time execution flow and LSTM. Jie Li, Weina Niu, Ran Yan, Zhiqin Duan, Beibei Li, Xiaosong Zhang |
| 2022 | IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022 |
| 2022 | Image Encryption Algorithm based on Convolutional Neural Network and Four Square Matrix Encoding. Bin Ge, Ting Wang, Chenxing Xia, Gaole Dai |
| 2022 | Implementation of one-time editable blockchain chameleon hash function construction scheme. Yixuan Qiao, Minghui Zheng, Jingyi Yang |
| 2022 | Improved Zero-Knowledge Proofs for Commitments from Learning Parity with Noise. Mengfan Wang, Guifang Huang, Hongmin Gao, Lei Hu |
| 2022 | Intelligent Recognition Method of Web Application Categories Based on Multi-layer Simhash Algorithm. Fuji Han, Dongjun Zhu |
| 2022 | Kgastor: a Privacy By Design Knowledge Graph anonymized Store. Maxime Thouvenot, Philippe Calvez, Olivier Curé |
| 2022 | LLDP: A Layer-wise Local Differential Privacy in Federated Learning. Qian Chen, Hongbo Wang, Zilong Wang, Jiawei Chen, Haonan Yan, Xiaodong Lin |
| 2022 | Leveraging Model Poisoning Attacks on License Plate Recognition Systems. Jian Chen, Yuan Gao, Yang Liu, Chen Wang, Kai Peng |
| 2022 | Listing the ingredients for IFTTT recipes. Shirin Kalantari, Danny Hughes, Bart De Decker |
| 2022 | MATTER: A Multi-Level Attention-Enhanced Representation Learning Model for Network Intrusion Detection. Jinghong Lan, Yanan Li, Bo Li, Xudong Liu |
| 2022 | MCFM: Discover Sensitive Behavior from Encrypted Traffic in Industrial Control System. Zhishen Zhu, Junzheng Shi, Chonghua Wang, Gang Xiong, Zhiqiang Hao, Gaopeng Gou |
| 2022 | MFFAN: Multiple Features Fusion with Attention Networks for Malicious Traffic Detection. Weiqing Huang, Xinbo Han, Meng Zhang, Min Li, Wen Liu, Zheng Yang, Haitian Yang |
| 2022 | MGF-GAN: Multi Granularity Text Feature Fusion for Text-guided-Image Synthesis. Xingfu Wang, Xiangyu Li, Ammar Hawbani, Liang Zhao, Saeed Hamood Alsamhi |
| 2022 | MLIA: modulated LED illumination-based adversarial attack on traffic sign recognition system for autonomous vehicle. Yixuan Shen, Yu Cheng, Yini Lin, Sicheng Long, Canjian Jiang, Danjie Li, Siyuan Dai, You Jiang, Junbin Fang, Zoe Lin Jiang, Siu-Ming Yiu |
| 2022 | Mahalanobis Distance and Pauta Criterion based Log Anomaly Detection Algorithm for 5G Mobile Network. Yuting Zheng, Yi Li, Yuchao Jin, Xiaomeng Zhu, Lexi Xu, Tian Xiao, Bei Li, Xinzhou Cheng |
| 2022 | Mal-Bert-GCN: Malware Detection by Combining Bert and GCN. Zhenquan Ding, Hui Xu, Yonghe Guo, Longchuan Yan, Lei Cui, Zhiyu Hao |
| 2022 | Malicious Family Identify Combining Multi-channel Mapping Feature Image and Fine-Tuned CNN. Chenghua Tang, Chen Zhou, Min Hu, Mengmeng Yang, Baohua Qiang |
| 2022 | Marking based Obfuscation Strategy to resist Side Channel Attack in Cross-User Deduplication for Cloud Storage. Xin Tang, Xiong Chen, Ran Zhou, Linchi Sui, Tian'e Zhou |
| 2022 | Measurement of Malware Family Classification on a Large-Scale Real-World Dataset. Qinqin Wang, Hanbing Yan, Chang Zhao, Rui Mei, Zhihui Han, Yu Zhou |
| 2022 | Multi-channel Live Video Processing Method Based on Cloud-edge Collaboration. Zhen Guo, Pengzhou Zhang, Junjie Xia, Zhe Zhou, Juan Cao |
| 2022 | Multi-pipeline HotStuff: A High Performance Consensus for Permissioned Blockchain. Taining Cheng, Wei Zhou, Shaowen Yao, Libo Feng, Jing He |
| 2022 | Multimodal Graph Reasoning and Fusion for Video Question Answering. Shuai Zhang, Xingfu Wang, Ammar Hawbani, Liang Zhao, Saeed Hamood Alsamhi |
| 2022 | Near Field Air-Gap Covert Channel Attack. Mordechai Guri |
| 2022 | Neural-FacTOR: Neural Representation Learning for Website Fingerprinting Attack over TOR Anonymity. Haili Sun, Yan Huang, Lansheng Han, Xiang Long, Hongle Liu, Chunjie Zhou |
| 2022 | On the Performance of Deep Learning Methods for Identifying Abnormal Encrypted Proxy Traffic. Hongce Zhao, Shunliang Zhang, Zhuang Qiao, Xianjin Huang, Xiaohui Zhang |
| 2022 | One-Time Rewritable Blockchain with Traitor Tracing and Bilateral Access Control. Lifeng Guo, Huide Lei, Wei-Chuen Yau |
| 2022 | Optimal Block Propagation and Incentive Mechanism for Blockchain Networks in 6G. Jinbo Wen, Xiaojun Liu, Zehui Xiong, Meng Shen, Siming Wang, Yutao Jiao, Jiawen Kang, He Li |
| 2022 | PAPR Suppression in Radar Communication Integration System Based on Subcarrier Reservation. Biao Yang, Shanshan Zhao, Hongfei Du, Minju Yi, Ziwei Liu |
| 2022 | Performance Analysis for Bearings-only Geolocation Based on Constellation of Satellites. Jinzhou Li, Shouye Lv, Liu Yang, Sheng Wu, Yang Liu, Qijun Luan |
| 2022 | Performance Analysis of IEEE 802.11p for the Internet of Vehicles with Bursty Packet Errors. Ning Wang, Jia Hu |
| 2022 | Personalized User Profiles-based Insider Threat Detection for Distributed File System. Wu Xin, Qingni Shen, Ke Feng, Yutang Xia, Zhonghai Wu, Zhenghao Lin |
| 2022 | Practical Side-Channel Attack on Message Encoding in Masked Kyber. Jian Wang, Weiqiong Cao, Hua Chen, Haoyuan Li |
| 2022 | Pre-training Fine-tuning data Enhancement method based on active learning. Deqi Cao, Zhaoyun Ding, Fei Wang, Haoyang Ma |
| 2022 | Privacy-Preserving Data Analysis without Trusted Third Party. Atsuko Miyaji, Tomoka Takahashi, Ping-Lun Wang, Tatsuhiro Yamatsuki, Tomoaki Mimoto |
| 2022 | Privacy-Preserving Recommendation with Debiased Obfuscaiton. Chennan Lin, Baisong Liu, Xueyuan Zhang, Zhiye Wang, Ce Hu, Linze Luo |
| 2022 | Privacy-Preserving Robust Federated Learning with Distributed Differential Privacy. Fayao Wang, Yuanyuan He, Yunchuan Guo, Peizhi Li, Xinyu Wei |
| 2022 | Privacy-Preserving Smart Lock System for IoT-enabled Rental House Markets. Bo Wang, Lingling Wang, Hongliang Guo, Peng Zhou |
| 2022 | Privacy-Preserving Top-k Spatio-Textual Similarity Join. Yiping Teng, Dongyue Jiang, Mengmeng Sun, Liang Zhao, Li Xu, Chunlong Fan |
| 2022 | Privacy-Preserving and Verifiable Outsourcing Message Transmission and Authentication Protocol in IoT. Hongjun Li, Fanyu Kong, Jia Yu, Hanlin Zhang, Luhong Diao, Yunting Tao |
| 2022 | Privacy-preserving Decision Making Based on Q-Learning in Cloud Computing. Zhipeng Zhou, Chenyu Dong, Donger Mo, Peijia Zheng |
| 2022 | ProcGuard: Process Injection Behaviours Detection Using Fine-grained Analysis of API Call Chain with Deep Learning. Juan Wang, Chenjun Ma, Ziang Li, Huanyu Yuan, Jie Wang |
| 2022 | Pyramid Copy-move Forgery Detection Using Adversarial Optimized Self Deep Matching Network. Yaqi Liu, Chao Xia, Qiang Cai, Xin Jin |
| 2022 | Redactable Blockchain with K-Time Controllable Editing. Yong Li, Zhenghao Zhang, Xi Chen, Ruxian Li, Liang Zhang |
| 2022 | Reducing Gas Consumption of Tornado Cash and Other Smart Contracts in Ethereum. Jingyan Yang, Shang Gao, Guyue Li, Rui Song, Bin Xiao |
| 2022 | Research and Application of 5G Edge AI in Medical Industry. Shangyu Tang, Mingde Huo, Yi Du, Yuwen Huo, Yan Zhang, Lexi Xu, Ying Ji, Guoyu Zhou |
| 2022 | Research and Implementation of Fault Diagnosis of Switch Machine Based on Data Enhancement and CNN. Mingyue Li, Rong Fei |
| 2022 | Research on 5G Network Capacity and Expansion. Xiaomeng Zhu, Yi Li, Yuting Zheng, Rui Xia, Lexi Xu, Bei Li, Zixiang Di, Lu Zhi, Xinzhou Cheng |
| 2022 | Research on Capability Building of Mobile Network Data Analysis and Visualization. Jian Guan, Xinzhou Cheng, Kun Chao, Xin He, Yuwei Jia, Lexi Xu, Yunyun Wang, Tian Xiao, Bei Li |
| 2022 | Research on Enterprises Loss in Regional Economic Risk Management. Heng Zhang, Wenyu Li, Lianbo Song, Lexi Xu, Xinzhou Cheng, Lijuan Cao, Kun Chao, Wei Xia, Qinqin Yu, Sai Han |
| 2022 | Research on Intelligent 5G Remote Interference Avoidance and Clustering Scheme. Tian Xiao, Bei Li, Zixiang Di, Guanghai Liu, Lexi Xu, Jian Guan, Zhaoning Wang, Chen Cheng, Yi Li |
| 2022 | Research on OTFS Systems for 6G. Bei Li, Tian Xiao, Kai Zhou, Lexi Xu, Guanghai Liu, Bo Wang, Jie Gao, Jian Guan, Zixiang Di |
| 2022 | Research on User Complaint Problem Location and Complaint Early Warning Stragegy Based on Big Data Analysis. Jie Gao, Lixia Liu, Tao Zhang, Shenghao Jia, Chuntao Song, Lexi Xu, Yang Wu, Bei Li, Yunyun Wang, Xinjie Hou |
| 2022 | Research on Voice Quality Evaluation Method Based on Artificial Neural Network. Zixiang Di, Tian Xiao, Yi Li, Xinzhou Cheng, Bei Li, Lexi Xu, Xiaomeng Zhu, Lu Zhi, Rui Xia |
| 2022 | Robust Document Image Forgery Localization Against Image Blending. Weipeng Liang, Li Dong, Rangding Wang, Diqun Yan, Yuanman Li |
| 2022 | Robust Perception for Autonomous Vehicles using Dimensionality Reduction. Shivam Garg, Nandish Chattopadhyay, Anupam Chattopadhyay |
| 2022 | Robust Secure Aggregation with Lightweight Verification for Federated Learning. Chao Huang, Yanqing Yao, Xiaojun Zhang, Da Teng, Yingdong Wang, Lei Zhou |
| 2022 | SCEVD: Semantic-enhanced Code Embedding for Vulnerability Discovery. Joseph Gear, Yue Xu, Ernest Foo, Praveen Gauravaram, Zahra Jadidi, Leonie Simpson |
| 2022 | SEEKER: A Root Cause Analysis Method Based on Deterministic Replay for Multi-Type Network Protocol Vulnerabilities. Runhao Liu, Bo Yu, Baosheng Wang, Jianbin Ye, Jianxin Huang, Xiangdong Kong |
| 2022 | SecretHunter: A Large-scale Secret Scanner for Public Git Repositories. Elliott Wen, Jia Wang, Jens Dietrich |
| 2022 | Secure Access Control for eHealth Data in Emergency Rescue Case based on Traceable Attribute-Based Encryption. Yuan Shen, Wei Song, Changsheng Zhao, Zhiyong Peng |
| 2022 | Secure and efficient publicly verifiable ridge regression outsourcing scheme. Ou Ruan, Shanshan Qin |
| 2022 | Security Support on Memory Controller for Heap Memory Safety. Chaochao Zhang, Rui Hou |
| 2022 | Self-Supervised Adversarial Example Detection by Disentangled Representation. Zhaoxi Zhang, Leo Yu Zhang, Xufei Zheng, Jinyu Tian, Jiantao Zhou |
| 2022 | Shared Incentive System for Clinical Pathway Experience. Weiqi Dai, Wenhao Zhao, Xia Xie, Song Wu, Hai Jin |
| 2022 | Short Signatures via Multiple Hardware Security Modules with Key Splitting in Circuit Breaking Environments. Lukasz Krzywiecki, Hannes Salin |
| 2022 | Smarkchain: An Amendable and Correctable Blockchain Based on Smart Markers. Chin-Tser Huang, Laurent Njilla, Tieming Geng |
| 2022 | Smart Grid Data Aggregation Scheme Based on Local Differential Privacy. Lei Zhang, Dong Mao, Zuge Chen, Yubo Song, Liquan Chen, Zhongyuan Qin |
| 2022 | Software Side Channel Vulnerability Detection Based on Similarity Calculation and Deep Learning. Wei Sun, Zheng Yan, Xi Xu, Wenxiu Ding, Lijun Gao |
| 2022 | Source Code Vulnerability Detection Using Vulnerability Dependency Representation Graph. Hongyu Yang, Haiyun Yang, Liang Zhang, Xiang Cheng |
| 2022 | SpecRNet: Towards Faster and More Accessible Audio DeepFake Detection. Piotr Kawa, Marcin Plata, Piotr Syga |
| 2022 | Squeezing Network Performance for Secure and Efficient PoW with Better Difficulty Adjustment. Yuhang Ding, Zihan Yang, Bo Qin, Qin Wang, Yanran Zhang, Qianhong Wu |
| 2022 | Steganalysis for Small-Scale Training Image Pairs with Cover-Stego Feature Difference Model. Chao Xia, Yaqi Liu, Qingxiao Guan, Sai Ma, Yu Nan, Jiahui Fu |
| 2022 | Study on Gateway Station Deployment for Large Scale LEO Satellite Constellation Networks. Lei Cheng, Shuaijun Liu, Lixaing Liu, Hailong Hu, Jingyi Chen, Xiandong Meng, Pengcheng Ding |
| 2022 | Sybil-resistant Truth Discovery in Crowdsourcing by Exploiting the Long-tail Effect. Dejia Lin, Yongdong Wu, Wensheng Gan |
| 2022 | TECS: A Trust Model for VANETs Using Eigenvector Centrality and Social Metrics. Yu'ang Zhang, Yujie Song, Yu Wang, Yue Cao, Xuefeng Ren, Fei Yan |
| 2022 | TFCFI:Transparent Forward Fine-grained Control-Flow Integrity Protection. Cairui She, Liwei Chen, Gang Shi |
| 2022 | TINKER: A framework for Open source Cyberthreat Intelligence. Nidhi Rastogi, Sharmishtha Dutta, Alex Gittens, Mohammed J. Zaki, Charu C. Aggarwal |
| 2022 | TPIPD: A Robust Model for Online VPN Traffic Classification. Yongwei Meng, Tao Qin, Haonian Wang, Zhouguo Chen |
| 2022 | Technical architecture of integrated big data platform. Yuan Liu, Yanmei Liu, Minjing Zhong |
| 2022 | Telecom Big Data assisted Algorithm and System of Campus Safety Management. Chen Cheng, Xinzhou Cheng, Shikun Jiang, Xin Zhao, Yuhui Han, Tao Zhang, Lijuan Cao, Yuwei Jia, Tian Xiao, Bei Li |
| 2022 | Telecom Customer Chum Prediction based on Half Termination Dynamic Label and XGBoost. Yi Zhang, Fan Zhang, Chuntao Song, Xinzhou Cheng, Chen Cheng, Lexi Xu, Tian Xiao, Bei Li |
| 2022 | The Power Allocation for SWIPT-based Cognitive Two-Way Relay Networks with Rate Fairness Consideration. Guozhong Wang, Chunling Peng, Yi Huang |
| 2022 | To Fix or Not to Fix: A Critical Study of Crypto-misuses in the Wild. Anna-Katharina Wickert, Lars Baumgärtner, Michael Schlichtig, Krishna Narasimhan, Mira Mezini |
| 2022 | Towards Adversarial Robustness with Multidimensional Perturbations via Contrastive Learning. Chuanxi Chen, Dengpan Ye, Hao Wang, Long Tang, Yue Xu |
| 2022 | Towards Automated Detection and Prevention of Regrettable (Self-) Disclosures on Social Media. Hervais Simo, Michael Kreutzer |
| 2022 | Towards logical specification of adversarial examples in machine learning. Marwa Zeroual, Brahim Hamid, Morayo Adedjouma, Jason Jaskolka |
| 2022 | Towards the Concept of Trust Assurance Case. Emilia Cioroaica, Barbora Buhnova, Daniel Schneider, Ioannis Sorokos, Thomas Kuhn, Emrah Tomur |
| 2022 | Trusted Hart for Mobile RISC-V Security. Vladimir Ushakov, Sampo Sovio, Qingchao Qi, Vijayanand Nayani, Valentin Manea, Philip Ginzboorg, Jan-Erik Ekberg |
| 2022 | Truthfully Negotiating Usage Policy for Data Sovereignty. Chunlei Yang, Yunchuan Guo, Mingjie Yu, Lingcui Zhang |
| 2022 | Understanding the Penetration Test Workflow: a security test with Tramonto in an e-Government application. Daniel Dalalana Bertoglio, Luis G. B. Schüler, Avelino F. Zorzo, Roben Castagna Lunardi |
| 2022 | User Analysis and Traffic Prediction Method based on Behavior Slicing. Xin He, Lijuan Cao, Yuwei Jia, Kun Chao, Miaoqiong Wang, Chao Wang, Yunyun Wang, Runsha Dong, Zhenqiao Zhao |
| 2022 | Utility-Aware Privacy-Preserving Federated Learning through Information Bottleneck. Shaolong Guo, Zhou Su, Zhiyi Tian, Shui Yu |
| 2022 | VecSeeds: Generate fuzzing testcases from latent vectors based on VAE-GAN. Xin Sun, Wen Wang, Xujian Liu, Jiarong Fan, Zeru Li, Yubo Song, Zhongyuan Qin |
| 2022 | Vehicle Classification System with Mobile Edge Computing Based on Broad Learning. Xiting Peng, Naixian Zhao, Lexi Xu, Shi Bai |
| 2022 | VoiceSketch: a Privacy-Preserving Voiceprint Authentication System. Baochen Yan, Rui Zhang, Zheng Yan |
| 2022 | WBA: A Warping-based Approach to Generating Imperceptible Adversarial Examples. Chengyao Hua, Shigeng Zhang, Weiping Wang, Zhankai Li, Jian Zhang |
| 2022 | You Cannot Fully Trust Your Device: An Empirical Study of Client-Side Certificate Validation in WPA2-Enterprise Networks. Li Song, Qiongxiao Wang, Shijie Jia, Jingqiang Lin, Linli Lu, Yanduo Fu |
| 2022 | Zero Trust-NIDS: Extended Multi-View Approach for Network Trace Anonymization and Auto-Encoder CNN for Network Intrusion Detection. Abeer Z. Alalmaie, Priyadarsi Nanda, Xiangjian He |
| 2022 | tTree+: A Threat Tree Model for Representing Complex Semantics. Zhitao Wu, Jingjing Hu, Xiaowei Zhang, Wei Ren |