| 2024 | 23rd IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Sanya, China, December 17-21, 2024 |
| 2024 | 5G-PPDE: A Novel Adaptive Scaling Framework for Enhancing the Resilience of the 5G Cloud Core Network. Xinyu Huang, Xingxing Liao, Jie Yang, Wei You, Wenhao Wu, Shiru Min, Xinsheng Ji |
| 2024 | A Blockchain-based PHR Sharing Scheme with Attribute Privacy Protection. Chaohe Lu, Zhongyuan Yu, Guijuan Wang, Anming Dong, Xiang Tian |
| 2024 | A Cross-Site Scripting Attack Protection Framework Based on Managed Proxy. Cheng Tang, Qingfeng Wang, Guozhen Cheng, Hao Liang, Jianhua Peng, Meiyue Yang, Wenyan Liu, Ming Liu, Lei Sha |
| 2024 | A Defensive Framework Against Adversarial Attacks on Machine Learning-Based Network Intrusion Detection Systems. Benyamin Tafreshian, Shengzhi Zhang |
| 2024 | A Digital Traditional Chinese Medicine Splint for Treatment of Distal Radius Fracture. Siyuan Wang, Shuchen Liu, Zheng Jin, Zheng Yan, Tao Chen, Qinglei Bu, Zhiqiang Wang, Jintao Liu, Jie Sun |
| 2024 | A Dual Defense Design Against Data Poisoning Attacks in Deep Learning-Based Recommendation Systems. Xiaocui Dang, Priyadarsi Nanda, Manoranjan Mohanty, Haiyu Deng |
| 2024 | A Federated Learning Scheme with Adaptive Hierarchical Protection and Multiple Aggregation. Zhiqiang Wang, Xinyue Yu, Ziqing Tian |
| 2024 | A Framework for Detecting Hidden Partners in App Collusion. Qinchen Guan, Shaoyong Du, Kerong Wang, Chunfang Yang, Xiangyang Luo |
| 2024 | A GPU-Based Privacy-Preserving Machine Learning Acceleration Scheme. Jie Hou, Zengrui Huang, Zhiyong Zhang, Wei Zhang, Lei Ju |
| 2024 | A High-Accuracy Unknown Traffic Identification Method Based on Multi-View Contrastive Learning. Yuwei Xu, Zizhi Zhu, Chufan Zhang, Kehui Song, Guang Cheng |
| 2024 | A Knowledge Graph Completion Method Based on Gated Adaptive Fusion and Conditional Generative Adversarial Networks. Zhixuan Zhang, Yanhui Zhu, Yuezhong Wu, Fangteng Man, Hao Chen, Xujian Ying |
| 2024 | A LLM-based agent for the automatic generation and generalization of IDS rules. Xiaowei Hu, Haoning Chen, Huaifeng Bao, Wen Wang, Feng Liu, Guoqiao Zhou, Peng Yin |
| 2024 | A Lightweight Privacy-Preserving and Verifiable Federated Learning-Based Protocol. Jiaqi Lei, Ke Gu, Long Cai |
| 2024 | A Low-cost Black-box Jailbreak Based on Custom Mapping Dictionary with Multi-round Induction. Feng Wu, Weiqi Wang, Youyang Qu, Shui Yu |
| 2024 | A Method for Quantitative Object De-Identification Analysis of Anonymized Video. Deok-Han Kim, Yujun Kim, Young-Gab Kim |
| 2024 | A Multi-Blockchain Based Anonymous Cross-Domain Authentication Scheme for Industrial Internet of Things. Chengqi Hou, Wei Yang, Yu Wang, Zhiming Zhang, Shaolong Chen, Beibei Li |
| 2024 | A Multi-Stage Spike Stream Processing and Image Reconstruction Method for Industrial Applications. Shuaipeng Wu, Changhao Yuan, Kejiang Ye |
| 2024 | A Multi-hop Reasoning Framework for Cyber Threat Intelligence Knowledge Graph. Kai Zhou, Yong Xie, Xin Liu |
| 2024 | A Novel Approach to Network Traffic Analysis: the HERA tool. Daniela Pinto, Ivone Amorim, Eva Maia, Isabel Praça |
| 2024 | A Novel Time Series Approach to Anomaly Detection and Correction for Complex Blockchain Transaction Networks. Qi Xia, Ansu Badjie, Jianbin Gao, Grace Mupoyi Ntuala, Hu Xia, Isaac Amankona Obiri |
| 2024 | A Novel zk-SNARKs Method for Cross-chain Transactions in Multi-chain System. Pengcheng Xia, Jingyu Wu, Yiyang Ni, Jun Li |
| 2024 | A Quiet Place: An In-Depth Study of Mobile Public-to-Private Attacks. Yin Liu |
| 2024 | A Reliable Edge Server Deployment Algorithm Based on Spectral Clustering and a Deep Q-network Strategy using Multi-objective Optimization. Zhou Zhou, Taotao Yu, Mohammad Shojafar, Xia Ou, Hongbing Cheng |
| 2024 | A Reliable Encrypted Traffic Classification Method Based on Attention Mechanisms. Zhijun Wu, Shanhe Niu, Meng Yue |
| 2024 | A Revocable Pairing-Free Certificateless Signature Scheme Based on RSA Accumulator. Zhuowei Shen, Xiao Kou, Taiyao Yang, Haoqin Xu, Dongbin Wang, Shaobo Niu |
| 2024 | A Self-Adaptive Framework for Responding to Uncertainty in Access Control Process with Deep Neural Networks. Jihoon Park, Giluk Kang, Young-Gab Kim |
| 2024 | A Self-Supervised Targeted Process Anomaly Detection Method Based on the Minimum Set of Observed Events. Haojun Xia, Limin Sun, Wenliang Liu, Jingyi Xie, Zhanwei Song, Bibo Tu |
| 2024 | A Semi-Fragile Reversible Watermarking for 3D Models Based on IQIM with Dual-Strategy Partition Modulation. Fei Peng, Yousheng Liang, Min Long |
| 2024 | A Study of Backdoor Attacks on Data Distillation for Text Classification Tasks. Sixian Sun, Hongyu Sun, Haoxing Zhang, Yuqing Zhang |
| 2024 | A Sustainable Storage Compensation Method for Consortium Blockchain-based Computing Power Trading. Guangzhuo Zhu, Qian Wang, Bei Gong |
| 2024 | A Trust Model with Fitness-Based Clustering Scheme in FANETs. Junqiao Gao, Chaklam Cheong, Mansi Zhang, Yue Cao, Tao Peng, Shahbaz Pervez |
| 2024 | A Universally Composable Key Management System Using Trusted Hardware. Zhenghao Lu, Ding Ma, Lei Fan, Xiuzhen Chen, Yongshuai Duan, Jia Zhang |
| 2024 | A Vulnerability Detection Method for Intermediate Code Based on a Relational Dependency Graph. Bing Xia, Chongjun Tang, Wenbo Liu, Shihao Chu, Yu Dong |
| 2024 | A corrected method for parameters in the signal propagation model. Yan Liang, Xin Dong, Song Chen, Zhengda Li, Zhimin Chang |
| 2024 | A cross-domain authentication scheme based on quantized trust relationship for smart grid. Tianang Chen, Haojie Qin, Jin Qian, Jun Luo, Yinghua Jiang, Liquan Chen |
| 2024 | A review of data security research in energy storage systems. Meiqi Liu, Yongqiang Chen, Chaoyang Zhu, Shuang Yao, Jingfeng Rong, Xiaolong Zhao, Xijuan Si, Guang Yang, Yuqing Zhang |
| 2024 | ADIoT: An Anomaly Detection Model for IoT Devices Based on Behavioral Feature Analysis. Liang Wang, Zhipeng Wang, Meng Wang |
| 2024 | AI empowered senstive information detection and anonymisation in PDF files. Zheng Gao, Hongping Li |
| 2024 | AIDE: Attack Inference Based on Heterogeneous Dependency Graphs with MITRE ATT&CK. Weidong Zhou, Chunhe Xia, Nan Feng, Xinyi Pan, Tianbo Wang, Xiaojian Li |
| 2024 | AS-FIBA: Adaptive Selective Frequency-Injection for Backdoor Attack on Deep Face Restoration. Zhenbo Song, Wenhao Gao, Zhenyuan Zhang, Jianfeng Lu |
| 2024 | ASK-LTL Checker: A Tailored Model Checker for Linear Temporal Logic of CPN State Space. Jing Li, Tao Sun, Wenjie Zhong |
| 2024 | Abstraction-Based Training for Robust Classification Models via Image Pixelation. Yang Chen, Min Wu, Min Zhang |
| 2024 | Achieving Trusted GPU Allocation: An Empirical Study on Efficiency Changes of Deep Learning Training Tasks. Ziheng Zhang, Lei Liu, Zhongmin Yan |
| 2024 | Active Defense Research: A New Perspective Integrating Traps and Vulnerabilities. Quan Hong, Yang Yu, Lvyang Zhang, Lidong Zhai |
| 2024 | Active Source Inference Attack Based on Label-Flipping in Federated Learning. Lening Zhang, Hui Xia |
| 2024 | AdaptFL: Adaptive Client Task Allocation-Based Synchronous Federated Learning. Xiaoshuang Li, Mingjun Wang, Yilong Guo, Wenxiu Ding |
| 2024 | AdvPurRec: Strengthening Network Intrusion Detection with Diffusion Model Reconstruction Against Adversarial Attacks. Nour Alhussien, Ahmed Aleroud |
| 2024 | An Adaptive Reputation Update Mechanism for Primary Nodes in PBFT. Limin Yu, Yongdong Wu, Jiao Lu, Tong Li |
| 2024 | An Automated PM2.5 Analysis and Prediction System with Encoder-Decoder Architecture and Continual Learning Mechanism. Le Anh Duc Vu, Minh Hai Vu, Bao Ngoc Tran, Minh Tung Hoang, Duc Anh Nguyen, Minh Quan Hoang, Phi Le Nguyen |
| 2024 | An Effective Adversarial Text Attack through a Block-Sparse Approach with Hamiltonian Insights. Yaling Zhang, Xiang Sun, Yichuan Wang, Dongtai Tang, Chen Zhao |
| 2024 | An Efficient and Privacy-Preserving Participant Selection Scheme based on Location in Mobile Crowdsensing. Yudan Cheng, Tao Feng, Zhiquan Liu, Xian Guo, Lulu Han, Jianfeng Ma |
| 2024 | An Efficient and Secure Anonymous Query Protocol. Wenjv Hu, Yin Li |
| 2024 | An Experimental Study on Half-Closed TCP Connections in Public Cloud Gateways. Zhuang Yuan, Rui Li, Fa Zhang, Kejing Xu, Liang Xu, Weizhan Zhang |
| 2024 | An Intelligent Affinity Strategy for Dynamic Task Scheduling in Cloud-Edge-End Collaboration. Jingsen Zhang, Shoulu Hou, Yi Gong, Tao Wang, Changyuan Lan, Xiulei Liu |
| 2024 | An Intelligent Charging Service Selection Scheme Under the Cross-Area Consensus of Blockchain for the IoV. Shuming Xiong, Junfeng Zhu, Qiqi Xu |
| 2024 | Analysis of Data Export Business Processes Based on Petri Nets. Yongqiang Chen, Meiqi Liu, Jingfeng Rong, Xujie Liu, Anmin Fu, Anshun Zhou, Yuqing Zhang |
| 2024 | Analyzing Relationship Consistency in Digital Forensic Knowledge Graphs with Graph Learning. Ruoyao Xiao, Yu Luo, Weifeng Xu, Harshmeet Lamba, Dianxiang Xu |
| 2024 | Analyzing the Effectiveness of Image Preprocessing Defenses Under Runtime Constraints. Niklas Bunzel, Gerrit Klause |
| 2024 | Android Malware Detection Technology Based on SC-ViT and Multi-Feature Fusion. Qiulong Yu, Zhiqiang Wang, Lei Ju, Sicheng Yuan, Ying Zhang |
| 2024 | Anticipated Failure Determination-based Weakness Analysis with Common Weakness Enumeration. Toru Sakon |
| 2024 | AttDet: Attitude Angles-Based UAV GNSS Spoofing Detection. Luyao Wang, Xiaomin Wei, Hongtao Zhang, Lingtao Jia |
| 2024 | Attack Data is Not Solely Paramount: A Universal Model Extraction Enhancement Method. Chuang Liang, Jie Huang |
| 2024 | Attack-Defense Graph Generation: Instantiating Incident Response Actions on Attack Graphs. Kéren Saint-Hilaire, Christopher Neal, Frédéric Cuppens, Nora Boulahia-Cuppens, Francesca Bassi |
| 2024 | Attacking High-Performance SBCs: A Generic Preprocessing Framework for EMA. Debao Wang, Yiwen Gao, Jingdian Ming, Yongbin Zhou, Xian Huang |
| 2024 | Attacking High-order Masked Cryptosystem via Deep Learning-based Side-Channel Analysis. Zelong Zhang, Wei Cheng, Yongbin Zhou, Zehua Qiao, Yuhan Zhao, Jian Weng |
| 2024 | BGAS: Blockchain and Group Decentralized Identifiers Assisted Authentication Scheme for UAV Networks. Tingyu Wang, Qiang Cao, Shihong Zou, Yueming Lu |
| 2024 | BIG: A Practical Framework for Balancing the Conflict Between Group and Individual Fairness in Graph Neural Networks. Kuan Yan, Dmytro Matsypura, Junbin Gao |
| 2024 | BWG: An IOC Identification Method for Imbalanced Threat Intelligence Datasets. Juncheng Lu, Yiyang Zhao, Yan Wang, Jiyuan Cui, Sanfeng Zhang |
| 2024 | Backdoor Attacks Optimized through Genetic Algorithm-Driven Data Augmentation Combinations in Deep Neural Networks. Yilun Lyu, Xu Ma, Yuan Ma |
| 2024 | BedIDS: An Effective Network Anomaly Detection Method by Fusing Behavior Evolution characteristics. Zhen Liu, Changzhen Hu, Chun Shan, Junkai Yi |
| 2024 | Behavior Speaks Louder: Rethinking Malware Analysis Beyond Family Classification. Fei Zhang, Xiaohong Li, Sen Chen, Ruitao Feng |
| 2024 | Blind Signature Based Anonymous Authentication on Trust for Decentralized Mobile Crowdsourcing. Wei Feng, Dongyuan Wei, Qianqian Wang |
| 2024 | Block-Feature Fusion for Privacy-Protected Iris Recognition. Wiraj Udara Wickramaarachchi, Junwei Zhou, Dongdong Zhao, Jianwen Xiang |
| 2024 | Boosting Transferability of Adversarial Examples by Joint Training and Dual Feature Mixup. Mengmeng Tang, Shuhong Chen, Guojun Wang, Hanjun Li, Zhuyi Yao, Sheng Wen |
| 2024 | Broader but More Efficient: Broad Learning in Power Side-channel Attacks. Yilin Yang, Changhai Ou, Yongzhuang Wei, Wei Li, Yifan Fan, Xuan Shen |
| 2024 | Budget-Feasible Double Auction Mechanisms for Model Training Services in Federated Learning Market. Ting Zhou, Hongtao Lv, Ning Liu, Lei Liu |
| 2024 | CFB-DSSE: Efficient Secure Dynamic Searchable Encryption Scheme with Conjunctive Search for Smart Healthcare. Ruiwei Hou, Fucai Zhou, Zongye Zhang, Jiacheng Li, Chongyang Wang |
| 2024 | CFE: Secure Filtered Words in End-to-End Encrypted Messaging System. Tran Viet Xuan Phuong, Albert Baker, Philip D. Huff, Jan P. Springer, Tho Thi Ngoc Le |
| 2024 | CNN-KOA-BiGRU: A high-accuracy APT detection model based on deep learning networks. Chaoqin Zhang, Maoqi Sun, Guangwu Hu |
| 2024 | CPCED: a container escape detection system based on CNI plugin. Yu Hao, Xu Zhang, Dongbin Wang |
| 2024 | CTWF: Website Fingerprinting Attack based on Compact Convolutional Transformer. Guangfa Lyu, Jian Kong, Yinglong Chen, Fengyu Wang |
| 2024 | CVALLM: A Cloud Platform Security Assessment Framework Based on Large Language Models. Wangyuan Jing, Chi Zhang, Bingbing Zhang, Lingbo Wei |
| 2024 | CVchain: A Cross-Voting-Based Low Latency Parallel Chain System. Jianrong Wang, Yacong Ren, Dengcheng Hu, Qi Li, Sen Li, Xuewei Li, Xiulong Liu |
| 2024 | CaptchaSAM: Segment Anything in Text-based Captchas. Yijun Wang, Ziyi Zhou, Weiqi Bai, Ruijie Zhao, Xianwen Deng |
| 2024 | CertRob: Detecting PDF Malware with Certified Adversarial Robustness via Randomization Smoothing. Lijun Gao, Zheng Yan |
| 2024 | ClusterX: Adaptive Collaborative Scheduling of Layered User-Proxy Mapping to Enhance DDoS Defense in Distributed Clusters. Jianbo Lin, Lin Yan, Zhi Lin, Zan Zhou, Shujie Yang |
| 2024 | Compressed Video Action Recognition Based on Neural Video Compression. Yuting Mou, Ke Xu, Xinghao Jiang, Tanfeng Sun |
| 2024 | ConfigKG: Identify Routing Security Issues from Configurations Based on Knowledge Graph. Pengfei Li, Yujing Liu, Jinshu Su, Bo Yu |
| 2024 | Construction of Cyber-attack Attribution Framework Based on LLM. Jingye Zhang, Ken Cheng, Xinli Xiong, Rongcheng Dong, Jun Huang, She Jie |
| 2024 | Contextual Transformer-based Node Embedding for Vulnerability Detection using Graph Learning. Joseph Gear, Yue Xu, Ernest Foo, Praveen Gauravaram, Zahra Jadidi, Leonie Simpson |
| 2024 | Controllable Quantum Computing Privacy via Inherent Noises and Quantum Error Mitigation. Keyi Ju, Hui Zhong, Xinyue Zhang, Xiaoqi Qin, Miao Pan |
| 2024 | Correcting the Bound Estimation of Mohawk. Mingjie Yu, Wei Jin, Fenghua Li, Yunchuan Guo, Zheng Yan, Xiao Wang, Nenghai Yu |
| 2024 | Cross-platform Network User Alignment Interference Methods Based on Obfuscation Strategy. Luyao Wang, Yan Liu, Xiaoyu Guo, Ziqi Long, Chunfang Yang |
| 2024 | Custom Permission Misconfigurations in Android: A Large-Scale Security Analysis. Rui Li, Wenrui Diao, Debin Gao |
| 2024 | Cyber Resilience Framework for Web Server. Wanqiu Zhou, Zheng Zhang, Yuan Yao, Jiang Wang, Jiaxin Ma, Hui Liu |
| 2024 | Cyber Risk Analysis on Electric Vehicle Systems via NIST CSF. Spyridon Sourmelis, Weizhi Meng |
| 2024 | D Yilong Li, Jianyi Zhang, Ziyin Zhou, Zezheng Sun, Xu Ji, Zeping Li, Jiameng Han, Zhangchi Zhao |
| 2024 | D Yaobing Xu, Yunchuan Guo, Wenlong Kou, Junhai Yang, Ziyan Zhou, Fenghua Li |
| 2024 | DA-CPVD: Vulnerability Detection Method based on Dual Attention Composite Pooling. Mengxuan Shi, Jinfu Chen, Saihua Cai, Ziyan Liu, Jiapeng Zhou |
| 2024 | DDF-Net: A Cloud Computing Load Forecasting Method Integrating Spatiotemporal and Time-Frequency Domain Information. Yingjian Li, Yongsheng Wang, Gang Wang |
| 2024 | DI-GAE: A Dynamic and Resource-Efficient Attack Detection Framework with Incremental Learning and Graph Autoencoders. Mengmi Tan, Jianyi Liu, Ru Zhang |
| 2024 | DMA: A Persistent Threat to Embedded Systems Isolation. Jean de Bonfils Lavernelle, Pierre-François Bonnefoi, Benoît Gonzalvo, Damien Sauveron |
| 2024 | DMASP: Dynamic Multi-keyword Searchable Encryption for Protected Access and Search Patterns with Differential Privacy. Yue Quan, Kai Fan, Haoyang Wang, Hui Li, Yintang Yang |
| 2024 | DMPA: A Compact and Effective Pipeline for Detecting Multiple Phishing Attacks. Xiaodong Huang, Gangliang Li, Chengfeng Chen, Shouqiang Liu |
| 2024 | DPFCIL: Differentially Private Federated Class-Incremental Learning on non-IID Data. Fuyao Zhang, Dan Wang, Chuyang Liang |
| 2024 | DTAME: A Interpretable and Efficient Approach for ABAC Policy Mining and Evaluation Using Decision Trees. Zejun Lan, Jianfeng Guan, Xianming Gao, Tao Feng, Kexian Liu, Jianbang Chen |
| 2024 | DUDPA-TATD: A Lightweight Privacy-Preserving Anomaly Traffic Detection Method for Edge Computing Scenarios. Guanghan Li, Wenzhong Yang, Xiaodan Tian, Jiaren Peng |
| 2024 | Data Privacy-Preserving and Communication Efficient Federated Multilinear Compressed Learning. Di Xiao, Zhuyan Yang, Maolan Zhang, Lvjun Chen |
| 2024 | DcChain: A Novel Blockchain Sharding Method Based on Dual-constraint Label Propagating. Hao Zhou, Pengcheng Xia, Yiyang Ni, Jun Li |
| 2024 | Decentralized and Lightweight Cross-Chain Transaction Scheme Based on Proxy Re-signature. Huiying Zou, Jia Duan, Xi Liu, Wei Ren, Tao Li, Xianghan Zheng, Kim-Kwang Raymond Choo |
| 2024 | Deep Learning-Based DDoS Attack Detection Using Adversarial Optimization. Dahai Yu, Jianming Cui, Yungang Jia, Peiguo Fu, Ming Liu |
| 2024 | Deep Reinforcement Learning for Active RIS-Assisted Full-Duplex Integrated Sensing and Communication Systems. Bingxin Zhang, Kang Zheng, Chao Tong, Kun Yang, Kang Yan |
| 2024 | Deepfakes: A New Kind of Adversarial Attacks Against Face Recognition Systems? Raphael Antonius Frick, Lukas Graner |
| 2024 | Defending Against Backdoor Attacks through Causality-Augmented Diffusion Models for Dataset Purification. Yuefeng Lai, Lizhao Wu, Hui Lin, Xiaokang Zhou |
| 2024 | Defending Against Model Poisoning Attacks in Federated Learning via Client-guided Trust. Xiangxiang Wang, Hui Xia, Yingqi Zhang |
| 2024 | Design and Implementation of Data Encryption Mechanism in Fiber Channel Network. Hongke Zhang, Zheng Yan |
| 2024 | Designing Secret Embedding Scheme Based on Bitcoin Transactions Pattern Controlling. Zheng Feng, Chunyu Xing, Chen Liang |
| 2024 | Destruction and Reconstruction Chain: An Adaptive Adversarial Purification Framework. Zeshan Pang, Shasha Guo, Xuehu Yan, Yuliang Lu |
| 2024 | Detectable Mislabeling - Can Faulty AI Models be Recognized from Incomplete Memory Traces? Lukasz Krzywiecki, Tadeusz Kulczycki, Christian Emmanuel Nteranya, Andrzej Stos |
| 2024 | Detection of Sensitive Information Based on Transient Data in Store Buffer and Cache. Yan Chang, Yaqin Wu, Jianwu Rui, Ming Cao, Yawei Yue, Yu Feng, Tingting He, Haihui Gao, Zhen Lv |
| 2024 | Differentially Private Graph Convolutional Networks with Privacy Amplification. Yifan Sun, Meng Song |
| 2024 | Discriminating Malware Families using Partitional Clustering. Pooja Mishra, Paul Black, Adil M. Bagirov, Shaoning Pang |
| 2024 | Distributed Data Possession - Blockchain Based Scalability. Bartlomiej Dzikowski, Lukasz Krzywiecki, Ksawery Mozdzynski, Karol Niczyj, Hannes Salin |
| 2024 | DualConvNet: Enhancing CNN Inference Efficiency Through Compressed Convolutions and Reparameterization. Haipeng Du, Muyan Jiao, Jiageng Zhang, Xin Lv, Jie Zhang |
| 2024 | DyCom: A Dynamic Community Partitioning Technique for System Audit Logs. Zhaoyang Wang, Yanfei Hu, Shuailou Li, Wenbo Wang, Lisong Zhang, Boyang Zhang, Yu Wen, Dan Meng |
| 2024 | DyGCN: Dynamic Graph Convolution Network-based Anomaly Network Traffic Detection. Yonghao Gu, Xiaoqing Zhang, Hao Xu, Tiejun Wu |
| 2024 | Dynamic Differential Privacy in Hierarchical Federated Learning: A Layerwise Adaptive Framework. Zhongyuan Qin, Dinglian Wang, Minghua Wang |
| 2024 | EUREKHA: Enhancing User Representation for Key Hackers Identification in Underground Forums. Abdoul Nasser Hassane Amadou, Anas Motii, Saida Elouardi, El Houcine Bergou |
| 2024 | EasyDetector: Using Linear Probe to Detect the Provenance of Large Language Models. Jie Zhang, Jiayuan Li, Haiqiang Fei, Lun Li, Hongsong Zhu |
| 2024 | EffiTaint: Boosting Sensitive Data Tracking with Accurate Taint Behavior Modeling and Efficient Access Path Optimization. Haocheng Li, Haipeng Qu, Gaozhou Wang, Xiangjian Ge |
| 2024 | Efficient DDoS Detection and Mitigation in Cloud Data Centers Using eBPF and XDP. Ziyue Chen, He Kong, Shuai Ding, Quanfeng Lv, Guo Wei |
| 2024 | Efficient FSS-based Private Statistics for Traffic Monitoring. Zhichao Wang, Qi Feng, Min Luo, Xiaolin Yang, Zizhong Wei |
| 2024 | Efficient Multi-subset Fine-grained Authorization PSI over Outsourced Encrypted Datasets. Jinlong Zheng, Jia-Nan Liu, Minhua Su, Dingcheng Li, Kai He, Xueqiao Liu |
| 2024 | Efficient and Accurate Min-entropy Estimation Based on Decision Tree for Random Number Generators. Yuan Ma, Maosen Sun, Wei Wang, Tianyu Chen, Na Lv, Dongchi Han |
| 2024 | Efficient and Practical Multi-party Private Set Intersection Cardinality Protocol. Shengzhe Meng, Xiaodong Wang, Zijie Lu, Bei Liang |
| 2024 | Efficient and Secure Federated Learning via Enhanced Quantization and Encryption. Chengming Zhang, Bo Tang, Yifan Bian, Bingtao Han, Yongcheng Wang, Tao Liu |
| 2024 | Efficient and Verifiable Dynamic Skyline Queries in Blockchain Networks. Bo Yin, Hang Chen, Binyao Xu, Mariam Suleiman Silima, Ke Gu |
| 2024 | Efficiently Detecting DDoS in Heterogeneous Networks: A Parameter-Compressed Vertical Federated Learning approach. Cao Chen, Fenghua Li, Yunchuan Guo, Zifu Li, Wenlong Kou |
| 2024 | Enabling Robust Android Malicious Packet Capturing and Detection via Android Kernel. Mingyang Li, Weina Niu, Xinglong Chen, Jiacheng Gong, Kegang Hao, Xiaosong Zhang |
| 2024 | End-To-End Speaker Anonymization Based on Location-Variable Convolution and Multi-Head Self-Attention. Feiyu Zhao, Jianguo Wei, Wenhuan Lu, Yongwei Li |
| 2024 | Enhanced Privacy Policy Comprehension via Pre-trained and Retrieval-Augmented Models. Xin Zhang, Bingbing Zhang, Chi Zhang, Lingbo Wei |
| 2024 | Enhancing Adversarial Robustness through Self-Supervised Confidence-Based Denoising. Yongkang Chen, Tong Wang, Wei Kong, Taotao Gu, Guiling Cao, Xiaohui Kuang |
| 2024 | Enhancing Consistency in Container Migration via TEE: A Secure Architecture. Qingyu Gao, Liantao Song, Yan Lei, Feng Wang, Lei Wang, Shize Zong, Yan Ding |
| 2024 | Enhancing Graph-Based Vulnerability Detection through Standardized Deep Learning Pipelines. Jiashun Hao, Young-Woo Kwon |
| 2024 | Enhancing Higher-Order Masking: A Faster and Secure Implementation to Mitigate Bit Interaction Leakage. Jiahao Zhang, Yuejun Liu, Jingdian Ming, Yiwen Gao, Yongbin Zhou, Debao Wang |
| 2024 | Enhancing IoT Privacy: Why DNS-over-HTTPS Alone Falls Short? Samuel Pélissier, Gianluca Anselmi, Abhishek Kumar Mishra, Anna Maria Mandalari, Mathieu Cunche |
| 2024 | Enhancing Privacy-Preserving Multi-Authority Attribute-Based Encryption: Addressing Rogue-Key Attacks Under Adaptive Corruption of Authorities. Jingchi Zhang, Anwitaman Datta |
| 2024 | Enhancing Security and Efficiency in Vehicle-to-Sensor Authentication: A Multi-Factor Approach with Cloud Assistance. Xinrui Zhang, Pincan Zhao, Jason Jaskolka |
| 2024 | Enhancing Security and Privacy in Connected and Autonomous Vehicles: A Post-Quantum Revocable Ring Signature Approach. Qingmei Yang, Pincan Zhao, Yuchuan Fu, F. Richard Yu |
| 2024 | Evaluating Web-Based Privacy Controls: A User Study on Expectations and Preferences. Yuemeng Yin, Rahat Masood, Suranga Seneviratne, Aruna Seneviratne |
| 2024 | Exploring Permission Control Flaws in Mini-apps. Jun Li, Yuting Zhang, Wu Zhou, Shengzhi Zhang |
| 2024 | FCADD: Robust Watermarking Resisting JPEG Compression with Frequency Channel Attention and Distortion De-gradient. Dong Yang, Weihai Li, Zikai Xu, Zhiling Zhang, Yiling Chen |
| 2024 | FCSec: An Open-source Testbed for Security Evaluation on UAV Communications. Indu Chandran, Mukesh Narayana Gadde, Kizheppatt Vipin |
| 2024 | FD-WF: A Multi-tab Website Fingerprinting Attack Based on Fixed Dimensions for Tor Network. Ruizhe Zhang, Shangnan Yin, Jinfu Chen |
| 2024 | FMTD: Federated Learning-Based Multi-Angle Feature Fusion Framework for Abnormal Transaction Detection in Digital Currency. Yaru Lv, Lijun Sun, Xiao Chen |
| 2024 | FREDet: Fine-Grained Malicious Traffic Detection Based on Frequency Domain Features. Zekai Song, Yunpeng Li, Jian Qin, Changzhi Zhao, Dongxu Han, Yuling Liu |
| 2024 | Face Anti-spoofing based on Multi-modal Dual-stream Anomaly Detection. Jiuyao Jing, Yu Zheng, Qi He, Chunlei Peng |
| 2024 | FedNIFW: Non-Interfering Fragmented Watermarking for Federated Deep Neural Network. Haiyu Deng, Xiaocui Dang, Yanna Jiang, Xu Wang, Guangsheng Yu, Wei Ni, Ren Ping Liu |
| 2024 | FedSGProx: Mitigating Data Heterogeneity and Isolated Nodes in Graph Federated Learning. Xutao Meng, Qingming Li, Yong Li, Li Zhou, Xiaoran Yan |
| 2024 | Federated Knowledge-enhanced Graph Attention Network for Privacy-preserving Social Recommendation. Xiaofei Hao, Liyuan Liu, Yimeng Wang, Fengyu Li, Wanqing Wu |
| 2024 | Federated Learning Greedy Aggregation Optimization for Non-Independently Identically Distributed Data. Bosong Zhang, Qian Sun, Hai Wang, Linna Zhang, Danyang Li |
| 2024 | Federated Unlearning for Samples Based on Adaptive Gradient Ascent of Angles. Ying Hua, Hui Xia, Shuo Xu |
| 2024 | Fedfair: A Debiasing Algorithm for Federated Learning Systems. Haibin Zheng, TianXin Zhang, Jinyin Chen |
| 2024 | Few-shot Encrypted Malicious Traffic Classification via Hierarchical Semantics and Adaptive Prototype Learning. Yuan Zhao, Chunhe Xia, Tianbo Wang, Mengyao Liu, Yang Li |
| 2024 | FlexiContracts: A Novel and Efficient Scheme for Upgrading Smart Contracts in Ethereum Blockchain. Tahrim Hossain, Sakib Hassan, Faisal Haque Bappy, Muhammad Nur Yanhaona, Sarker T. Ahmed Rumee, Moinul Islam Zaber, Tariqul Islam |
| 2024 | Fraud Detection in Supply Chain Order Management via Kolmogorov-Arnold Networks. Haowei Huo, Ting Lv, Ningbo Zhao, Gefan Ai, Qi He, Ying Kong, Yu Zhang, Yiwei Li, Jiangyao Wei, Chen Liu, Yuan Liu, Lichuan Ma |
| 2024 | From Data to Action: CTI Analysis and ATT&CK Technique Correlation. Khanh-Duy Nguyen, Hsi-Ching Chu, Quoc-Viet Nguyen, Min-Te Sun, Kazuya Sakai, Wei-Shinn Ku |
| 2024 | From Liberty to 1984: A Methodology for Systematically Deteriorating LLM Outputs through Habituation Tendencies. Dong Zhang, Zhiyuan Hu, Huijun Chen, Guangming Liu, YinFeng Zheng, Jinghui Lu |
| 2024 | From Scarcity to Clarity: Few-Shot Learning for DoH Tunnel Detection Through Prototypical Network. Beibei Feng, Qi Wang, Xiaolin Xu, Yijing Wang, Tianning Zang, Jingrun Ma |
| 2024 | Front-running Attacks in Hash-Based Transaction Sharding Blockchains. Yusen Wang, Jiong Lou, Zihan Wang, Jie Li |
| 2024 | FusTP-FL: Enhancing Differential Federated Learning through Personalized Layers and Data Transformation. Xiong Yan, Kedong Yan, Chanying Huang, Dan Yin, Shan Xiao |
| 2024 | GTree: GPU-friendly Privacy-preserving Decision Tree Training and Inference. Qifan Wang, Shujie Cui, Lei Zhou, Ye Dong, Jianli Bai, Yun Sing Koh, Giovanni Russello |
| 2024 | GeMuFuzz: Integrating Generative and Mutational Fuzzing with Deep Learning. Zheng Zhang, Rui Ma, Yuqi Zhai, Yuche Yang, Siqi Zhao, Hongming Chen |
| 2024 | GraySniffer: A Cliques Discovering Method for Illegal SIM Card Vendor Based on Multi-Source Data. Tao Leng, Chang You, Shuangchun Luo, Junyi Liu, Yutong Zeng, Cheng Huang |
| 2024 | HFI: High-Frequency Component Injection based Invisible Image Backdoor Attack. Huanlai Xing, Xuxu Li, Jing Song, Lexi Xu, Jincheng Peng, Bowen Zhao, Li Feng |
| 2024 | HFL-AD: A Hierarchical Federated Learning Framework for Solving Data Contamination in DDoS Detection. Haishi Huang, Jiaping Gui, Jianan Hong, Cunqing Hua |
| 2024 | HTV: Measuring Circuit Vulnerability to Hardware Trojan Insertion Based on Node Co-activation Analysis. Shuiliang Chai, Zhanhui Shi, Yanjiao Gao, Yuhao Huang, Aizhu Liu, Jie Xiao |
| 2024 | Hardware Latency-Aware Differential Architecture Search: Search for Latency-Friendly Architectures on Different Hardware. Jiaqi Han, Dan Wang, Hong Luo, Ye Zhou, Bin Song |
| 2024 | Hardware assisted security gateway system: combined with FPGA shielding protection. Jihong Liu, Chenyang Tu, Yifei Zhang |
| 2024 | Hierarchical Graph Feature Extraction Based on Multi-Information Contract Graph for Enhanced Smart Contract Vulnerability Detection. Tao Fang, Zhihao Hou, Jiahao He, Junjie Zhou, Gansen Zhao |
| 2024 | High-Capacity and High-Security Data Hiding in Encrypted Image Using Image Filtering and Image Blocking. Yanpeng Xiang, Tao Zhang, Jiahao Liu, Xinbo Zhang, Yu Zhang |
| 2024 | Honeybee-RS: Enhancing Trust through Lightweight Result Validation in Mobile Crowd Computing. Sanjay Segu Nagesh, Niroshinie Fernando, Seng W. Loke, Azadeh Ghari Neiat, Pubudu N. Pathirana |
| 2024 | Human Action Recognition by Invisible Sensing with the Constraint of Privacy Preservation. Jun Guo, Minjuan Sun, Weiwei Zhang, Baoying Liu, Anwen Wang, Li Liu |
| 2024 | Improved Packet-Level Synthetic Network Traffic Generation. Jacob Soper, Yue Xu, Ernest Foo, Zahra Jadidi, Kien Nguyen Thanh |
| 2024 | Improved Rectangle and Linear Attacks on Lightweight Block Cipher WARP. Yaxin Cui, Hong Xu, Zhichao Xu |
| 2024 | Improving Security in Internet of Medical Things through Hierarchical Cyberattacks Classification. Vince Noort, Nhien-An Le-Khac, Hong-Hanh Nguyen-Le |
| 2024 | Individual Fair Density-Peaks Clustering Based on Local Similar Center Graph and Similar Decision Matrix. Yiding Tang, Zhijing Yang, Yufan Peng, Hui Zhang |
| 2024 | Interactive Verifiable Local Differential Privacy Protocols for Mean Estimation. Liang Wang, Li Liu, Pei Zhan, Peng Tang, Puwen Wei, Shanqing Guo |
| 2024 | Investigating Patterns of Adversarial Techniques for Cyberattack Forensics. Liming Lu, Zhenlin Yu, Peter Kok Keong Loh, Tuhin Isfaque Al Kaderi |
| 2024 | IoT Device Fingerprinting From Periodic Traffic Using Locality-Sensitive Hashing. Jianhui Ming, Weiping Wang, Linlin Zhang, Yingjie Hu, Shigeng Zhang |
| 2024 | IoT Vulnerability Detection using Featureless LLM CyBert Model. Sarah Binhulayyil, Shancang Li, Neetesh Saxena |
| 2024 | JasFree: Grammar-free Program Analysis for JavaScript Bytecode. Hao Jiang, Haiwei Lai, Si Wu, Baojian Hua |
| 2024 | LAPAID: A Lightweight, Adaptive and Perspicacious Active Intrusion Detection Method on Network Traffic Streams. Bin Li, Li Cheng, Zhongshan Zhang, Yu Pan, Feng Yao, Renjie He |
| 2024 | LLM4MDG: Leveraging Large Language Model to Construct Microservices Dependency Graph. Jiekang Hu, Yakai Li, Zhaoxi Xiang, Luping Ma, Xiaoqi Jia, Qingjia Huang |
| 2024 | LLMUZZ: LLM-based seed optimization for black-box device fuzzing. Guangming Gao, Shuitao Gan, Xiaofeng Wang, Shengkai Zhu |
| 2024 | LSD Attack: Exploiting Inconsistencies between Design and Implementation of Ethereum Protocols. Chenyu Li, Xiu Zhang, Xueping Liang, Xiaorui Gong |
| 2024 | LSTM-Diff: A Data Generation Method for Imbalanced Insider Threat Detection. Tian Tian, Yan Zhu, Ning An, Bo Jiang, Huamin Feng, Zhigang Lu |
| 2024 | Large Language Model and Behaviour Tree Based Real-World Test Scenario Generation for Autonomous Vehicles. Yuliang Li, Zhonglin Hou, Hong Liu |
| 2024 | Large-Scale Thermo-Hydraulic Analysis of Fuel Rod Bundles Based on YH-ACT. Min Song, Chao Li, Xiaowei Guo, Jie Liu, Huajian Zhang, Rui Xia |
| 2024 | Lattice-based Multi-Stage Secret Sharing 3D Secure Encryption Scheme. Xu Li, Yinghao Wu, Yang Liu, Baosheng Wang, Bei Wang, Yijun Cui |
| 2024 | LayyerX: Unveiling the Hidden Layers of DoH Server via Differential Fingerprinting. Yunyang Qin, Yujia Zhu, Linkang Zhang, Baiyang Li, Yong Ding, Qingyun Liu |
| 2024 | Learning Robust and Repeatable Physical Camouflage for Aerial Object Detectors. Zilong He, Hua Zhang |
| 2024 | Leveraging Large Language Models for Challenge Solving in Capture-the-Flag. Yuwen Zou, Yang Hong, Jingyi Xu, Lekun Liu, Wenjun Fan |
| 2024 | Leveraging Semi-supervised Learning for Enhancing Anomaly-based IDS in Automotive Ethernet. Jia Liu, Wenjun Fan, Yifan Dai, Enggee Lim, Zhoujin Pan, Alexei Lisitsa |
| 2024 | LightRL-AD: A Lightweight Online Reinforcement Learning Approach for Autonomous Defense against Network Attacks. Fengyuan Shi, Zhou Zhou, Jiang Guo, Renjie Li, Zhongyi Zhang, Shu Li, Qingyun Liu, Xiuguo Bao |
| 2024 | Lightweight Leakage-Resilient Authenticated Key Exchange for Industrial Internet of Things. Wenxin Jia, Zheng Yang, Zhiqiang Ma |
| 2024 | Local Drift Correction and Attention Aggregation for Self-Organized Federated Learning. Haiying Liu, Ruichun Gu, Jingyu Wang, Xiaolin Zhang, Bolin Zhang, Xuebao Li |
| 2024 | LogContrast: Log-based Anomaly Detection Using BERT and Contrastive Learning. Wei Yuan, Hongyu Sun, Mo Pang, He Wang, Gaofei Wu, Yuqing Zhang |
| 2024 | Long-Term Privacy-Preserving Incentive Scheme Design for Federated Learning. Xin Liu, Rui Wang, Pengfeng Zhang, Liang Xie, Yiliang Liu, Zhou Su, Donglan Liu, Yingxian Chang |
| 2024 | M-ETC: Improving Multi-Task Encrypted Traffic Classification by Reducing Inter-Task Interference. Yuwei Xu, Xiaotian Fang, Zhengxin Xu, Kehui Song, Yali Yuan, Guang Cheng |
| 2024 | MARS: Robustness Certification for Deep Network Intrusion Detectors via Multi-Order Adaptive Randomized Smoothing. Mengdie Huang, Yingjun Lin, Xiaofeng Chen, Elisa Bertino |
| 2024 | MAXPOWR: Memory Attestation and Export in Process-based Trusted Execution Environments. Hendrik Meyer zum Felde, Andrei-Cosmin Aprodu |
| 2024 | MIND: A Privacy-Preserving Model Inference Framework via End-Cloud Collaboration. Siyuan Guan, Ziheng Hu, Guotao Xu, Yao Zhu, Bowen Zhao |
| 2024 | MSMP: A Centralized Shared-memory Management for Building Efficient and Reliable File Systems on Microkernels. Feng He, Shijun Zhao, Dan Meng, Rui Hou |
| 2024 | MT-Index: A Trustworthy Index For Multimodal Data Sharing. Qianyue Fan, Shiqian Wang, Zhe Feng, Li Di |
| 2024 | MVSS: Blockchain Cross-shard Account Migration Based on Multi-version State Synchronization. Weihan Wang, Xiulong Liu, Liyuan Ma, Hao Xu, Gaowei Shi, Juncheng Ma, Keqiu Li |
| 2024 | Machine Learning Enhanced Indoor Positioning with RIS-aided Channel Configuration and Analysis. Yanhong Xu, Zhao Li, Ziru Zhao, Blaise Herroine Aguenoukoun, Jia Liu, Zhixian Chang, Yicheng Liu |
| 2024 | Machine Learning-Based Power Allocation Optimization Algorithm for Enhanced CR-NOMA Network. Yu Fu, Bingcai Chen, Qian Ning, Kai Lin |
| 2024 | Machine Learning-based Optimal Data Trading Mechanism with Randomized Privacy Protection Scheme. Xiaohong Wu, Yujun Lin, Jie Tao, Yonggen Gu |
| 2024 | Maldet: An Automated Malicious npm Package Detector Based on Behavior Characteristics and Attack Vectors. Yu Zhang, Haipeng Qu, Lingyun Ying, Linghui Wang |
| 2024 | Malware Traffic Classification Based on Multidimensional Features Learning. Yijie Huang, Wei Ding, Mian Huang |
| 2024 | Membership Inference Attacks via Dynamic Adversarial Perturbations Reduction. Zehua Ding, Youliang Tian, Guorong Wang, Jinbo Xiong, Jianfeng Ma |
| 2024 | Model-based Data Markets: A Multi-Broker Game Theoretic Approach. Yizhou Ma, Xikun Jiang, Evan W. Wu, Luis-Daniel Ibáñez, Jian Shi |
| 2024 | Modelling GDPR-compliance based on Defeasible Logic Reasoning: Insights from Time Complexity Perspective Naila Azam, Alex Chak, Anna Lito Michala, Shuja Ansari, Nguyen Binh Truong |
| 2024 | Multi-Authority Ciphertext-Policy Attribute-based Encryption with Hidden Policy for Securing Internet-of-Vehicles. Jie Cui, Jing Zhang, Lu Wei, Minghui Zhu, Hong Zhong, Geyong Min |
| 2024 | Multi-Channel Leakage Detection Based on χ Xiaoyong Kou, Wei Yang, Peijin Cong, Gongxuan Zhang |
| 2024 | Multi-Dimensional Data Collection Under Personalized Local Differential Privacy. Kunpeng Song, Mingzhang Sun, Kui Zhou, Peng Tang, Ning Wang, Shanqing Guo |
| 2024 | Multi-Scale Fuzzy Graph Convolutional Network for Hyperspectral Image Classification. Mingxin Jin, Cong Wang, Shanglin Yang, Heng Wang, Ju Huang, Jun Zhao |
| 2024 | Multi-sensor Fusion-based Cow Health Monitoring IoT System. Zhenyu Lai, Yijia Xu, Jialei Zhang, Bowen Jia, Liangyan Wang, Qinglei Bu, Jie Sun, Quan Zhang |
| 2024 | Multiplicative Masked M&M: An Attempt at Combined Countermeasures with Reduced Randomness. Kaiyuan Li, Haruka Hirata, Daiki Miyahara, Kazuo Sakiyama, Yuko Hara, Yang Li |
| 2024 | NAGG: Noised graph node feature aggregations for preserving privacy. Yinghao Song, Long Yan, Yang Li, Mingjian Ni, Shengzhong Tan, Dazhong Li, Huiting Zhao, Yulun Song |
| 2024 | NLP and Neural Networks for Insider Threat Detection. Neda Baghalizadeh-Moghadam, Christopher Neal, Frédéric Cuppens, Nora Boulahia-Cuppens |
| 2024 | Navigating Time's Possibilities: Plausible Counterfactual Explanations for Multivariate Time-Series Forecast through Genetic Algorithms. Gianlucca L. Zuin, Adriano Veloso |
| 2024 | Network Traffic Anomaly Detection Method Based on CTA-BiLSTM. Wenlong Liu, Bin Wen, Mengshuai Ma, Wanrong Du |
| 2024 | New Compact Construction of FHE from Cyclic Algebra LWE. Yuan Liu, Licheng Wang, Yongbin Zhou |
| 2024 | OFLGI: An Optimization-based Feature-Level Gradient Inversion Attack. Yongwei Lu, Xiaoyan Liang, Ruizhong Du, Junfeng Tian |
| 2024 | OHSS: Optimizing Homomorphic Secret Sharing to Support Fast Matrix Multiplication. Shuguang Zhang, Jianli Bai, Kun Tu, Ziyue Yin, Chan Liu |
| 2024 | OSN Bots Traffic Transformer : MAE-Based Multimodal Social Bots Behavior Pattern Mining. Haonan Zhai, Ruiqi Liang, Zhenzhen Li, Zhen Li, Wei Xia, Bingxu Wang, Qingya Yang |
| 2024 | Orchestrating Security Protection Resource for Space-Ground Integrated Networks. Dongbin Chen, Yunchuan Guo, Xiao Wang, Fenghua Li, Zifu Li |
| 2024 | Paa-Tee: A Practical Adversarial Attack on Thermal Infrared Detectors with Temperature and Pose Adaptability. Zhangchi Zhao, Jianyi Zhang, Liqun Shan, Ziyin Zhou, Kaiying Han, Xiali Hei |
| 2024 | Path Generation Method of Anti-Tracking Network based on Dynamic Asymmetric Hierarchical Architecture. Zhefeng Nan, Qi Wang, Changbo Tian, Yijing Wang, Tianning Zang, Dongwei Zhu |
| 2024 | Payload Level Anomaly Network Traffic Detection via Semi-Supervised Contrastive Learning. Xinglin Lian, Yang Liu, Shanfeng Wang, Yu Zheng |
| 2024 | Peering Through the Veil: A Segment-Based Approach for VPN Encapsulated Video Title Identification. Zhenyu Xu, Xurui Ren, Yi Zhang, Guang Cheng, Hua Wu |
| 2024 | Perturbing Vulnerable Bytes in Packets to Generate Adversarial Samples Resisting DNN-Based Traffic Monitoring. Jie Cao, Zhengxin Xu, Yunpeng Bai, Yuwei Xu, Qiao Xiang, Guang Cheng |
| 2024 | Phase Shift Matrix Optimization and Channel Quantization Alternating in RIS-Assisted Physical Layer Key Generation. Liquan Chen, Yufan Song, Wanting Ma, Tianyu Lu, Peng Zhang |
| 2024 | Privacy Leak Detection in LLM Interactions with a User-Centric Approach. Tan Su, Bingbing Zhang, Chi Zhang, Lingbo Wei |
| 2024 | Privacy Preservation in Cloud-Based Distributed Learning through Data Encoding and Partitioning. Lukasz Krzywiecki, Krzysztof Szymaniak, Marcin Zawada |
| 2024 | Privacy-Preserving Multi-Soft Biometrics through Generative Adversarial Networks with Chaotic Encryption. Hongying Zheng, Hongdie Li, Di Xiao, Maolan Zhang |
| 2024 | Privacy-Preserving Real-Time Gesture Recognition using Cloud-Trained Neural Networks. Kewin Ignasiak, Wojciech Kowalczyk, Lukasz Krzywiecki, Mateusz Nasewicz, Hannes Salin, Marcin Zawada |
| 2024 | Privacy-Preserving Secure Neighbor Discovery for Wireless Networks. Ahmed Mohamed Hussain, Panos Papadimitratos |
| 2024 | Privacy-aware data aggregation using Functional Encryption. Sehrish Shafeeq, Mathias Fischer |
| 2024 | Private Data Aggregation Enabling Verifiable Multisubset Dynamic Billing in Smart Grids. Qian Yang, Chen Wang, Jian Shen, Yi Li, Dengzhi Liu |
| 2024 | RAG-based Cyber Threat Tracing Graph Modeling Method. Jong-Hee Jeon, Jahoon Koo, Young-Gab Kim |
| 2024 | ROSE Jinquan Nie, Lejun Ji, Yirui Jiang, Young Ma, Yuanlong Cao |
| 2024 | RPG-Diff: Precise Adversarial Defense Based on Regional Positioning Guidance. Haotian Wang, Jing Liu |
| 2024 | RTM-CMD: Exploring Advanced Underground Target Detection in Coal Mines through Modified RTMDET Methodology. Longlong Gao, Tao Xue, Long Xi |
| 2024 | RTS: A Training-time Backdoor Defense Strategy Based on Weight Residual Tendency. Fan Xiang, Xueyang Li, Guozhu Meng |
| 2024 | Rabbit: Secure Encrypted Property Graph Search Scheme Supporting Data and Key Updates. Yingying Wu, Jiabei Wang, Dandan Xu, Yongbin Zhou, Yang Wang |
| 2024 | Real-time Private Data Aggregation over Distributed Spatial-temporal Infinite Streams with Local Differential Privacy. Xingxing Xiong, Shubo Liu, Xiping Liu, Xiaoguang Niu, Wenyu You |
| 2024 | Red Team Redemption: A Structured Comparison of Open-Source Tools for Adversary Emulation. Max Landauer, Klaus Mayer, Florian Skopik, Markus Wurzenberger, Manuel Kern |
| 2024 | Research on Adaptive Attention Dense Network Structure in Camera Source Recognition Method. Haoxuan Wu, Zhiqiang Wen |
| 2024 | Research on Energy Management Strategy of Microgrid Based on Improved Deep Q network Algorithm. Le Tian, ChangShen Ou, Weilin Huang |
| 2024 | Research on Intelligent Joint Detection Technology for Application Privacy Behavior Compliance. Ruoding Zhang, Tao Liu, Qifeng Shi, Yan Zhang, Xiaoyi Song, Xinrui Geng |
| 2024 | Research on Lifecycle-Driven Government Data Security Model and Data Grouping Technology. Siyu Chen, Jingfeng Rong, Zhiyuan Fu, Qiuling Yue, Anmin Fu, Xujie Liu, Anshun Zhou, Yuqing Zhang |
| 2024 | Research on Toxic Speech Detection Based on Large Language Models. Weihao Li, Yongbing Gao, Yu Zhang, Lidong Yang, Ruiping Gao |
| 2024 | Research on distributed machine learning defence strategies under Byzantine attacks. Chen Jin, Xi Chen, Junyu Pu, Boyu Fan |
| 2024 | Rethinking Mutation Strategies in Fuzzing Smart Contracts. Jingzhang Cao, Meng Wang, Shenao Lin |
| 2024 | Risk Assessment Based on Dataflow Dynamic Hypergraph for Cross-Border Data Transfer. Zhou Fang, Kai Zhang, Yigang Diao, Yixuan Song, Yanwei Sun, Jinqiao Shi |
| 2024 | Robust Hardware Trojan Detection: Conventional Machine Learning vs. Graph Learning Approaches. Liang Hong, Xingguo Guo, Zeyar Aung, Wei Hu |
| 2024 | Robust purification defense for transfer attacks based on probabilistic scheduling algorithm of pre-trained models: A model difference perspective. Xinlei Liu, Jichao Xie, Tao Hu, Hailong Ma, Baolin Li, Peng Yi, Zhen Zhang |
| 2024 | SAMOC: Enabling Atomic Invocations for Cross-chain Crowdsourcing Testing DApps in Industrial Control Through Trusted Smart Community and Lock Mechanism. Weiguo Huang, Yong Ding, Jun Li, Yujue Wang, Hai Liang, Changsong Yang |
| 2024 | SBCM: Semantic-Driven Reverse Engineering Framework for Binary Code Modularization. Shuang Duan, Hui Shu, Zihan Sha, Yuyao Huang |
| 2024 | SBOM Generation Tools in the Python Ecosystem: an In-Detail Analysis. Serena Cofano, Giacomo Benedetti, Matteo Dell'Amico |
| 2024 | SCENE: Shape-based Clustering for Enhanced Noise-resilient Encrypted Traffic Classification. Meijie Du, Mingqi Hu, Shu Li, Zhao Li, Qingyun Liu |
| 2024 | SGCML: Detecting Hacker Community Hidden in Chat Group. Tao Leng, Junyi Liu, Zhen Yang, Chang You, Yutong Zeng, Cheng Huang |
| 2024 | SP Mingjun Wang, Yixuan Liu, Wenxiu Ding |
| 2024 | SPDID: A Secure and Privacy-Preserving Decentralized Identity utilizing Blockchain and PUF. Yueyue He, Wenxuan Fan, Koji Inoue |
| 2024 | SSC-IDS: A Robust In-vehicle Intrusion Detection System Based on Self-Supervised Contrastive Learning. Zhuoqun Xia, Yongbin Yu, Jingjing Tan, Kejun Long |
| 2024 | STGCN-Based Link Flooding Attack Detection and Mitigation in Software-Defined Network. Yue Li, Runcheng Fang, Qipeng Song, Xilei Yang |
| 2024 | Scalable Client-side Encrypted Deduplication beyond Secret Sharing of the Master Key. Yuchen Chen, Guanxiong Ha, Xuan Shan, Chunfu Jia, Qiaowen Jia |
| 2024 | SeChannel: A Secure and Lightweight Channel Protection Approach for TEE Systems. Nan Jiang, Yuanbo Zhao, Qihang Zhou, Xiaoqi Jia, Jing Tang |
| 2024 | Sec-Reduce: Secure Reduction of Redundant and Similar Data for Cloud Storage based on Zero-Knowledge Proof. Zhihuan Yang, Wenlong Tian, Emma Zhang, Zhiyong Xu |
| 2024 | Secure Federated Learning Schemes Based on Multi-Key Homomorphic Encryption. Wenxiu Ding, Hongjiang Guo, Zheng Yan, Mingjun Wang |
| 2024 | Secure Join and Compute in Encrypted Database. Tanusree Parbat, Ayantika Chatterjee |
| 2024 | Secure Microwave QR Code Communication Using Pseudo-Random Constellation Rotation. Chunpeng Guo, Beiyuan Liu, Zeyang Sun, Chen Chen, Sai Xu |
| 2024 | SecureNet-AWMI: Safeguarding Network with Optimal Feature Selection Algorithm. Ming Zhou, Zhijian Zheng, Peng Zhang, Sixue Lu, Yamin Xie, Zhongfeng Jin |
| 2024 | Security Assessment of Customizations in Android Smartwatch Firmware. Yifan Yu, Ruoyan Lin, Shuang Li, Qinsheng Hou, Peng Tang, Wenrui Diao |
| 2024 | Security Enhancement of UAV Swarm Empowered Downlink Transmission with Integrated Sensing and Communication. Runze Dong, Buhong Wang, Jiang Weng, Kunrui Cao, Jiwei Tian, Tianhao Cheng |
| 2024 | Shapley-value-based Explanations for Cryptocurrency Blacklist Detection. Feixue Yan, Sheng Wen, Yang Xiang, Shiping Chen |
| 2024 | Shield-U: Safeguarding Traffic Sign Recognition Against Perturbation Attacks. Shengmin Xu, Jianfei Sun, Hangcheng Cao, Yulan Gao, Ziyang He, Cong Wu |
| 2024 | Signcryption based on Elliptic Curve CL-PKC for Low Earth Orbit Satellite Security Networking. Meiling Chen, Yuanyuan Yang, Sixu Guo, Jin Cao, Haitao Du, Li Su |
| 2024 | SimLog: System Log Anomaly Detection Method Based on Simhash. Weiping Wang, Huijuan Wang, Yulu Hong, Chenyu Wang, Hong Song, Shigeng Zhang |
| 2024 | Single-sign-on Authentication with Anonymous Token and Restricted Covert Channel. Zhao Zhang, Chunxiang Xu, Man Ho Allen Au |
| 2024 | Smart Contract-Based Auditing of Edge Data for Vehicular Networks. Yu Zhao, Yangguang Tian, Chunbo Wang, Xiaoqiang Di, Hui Qi |
| 2024 | Sparse Silhouette Jump: Adversarial Attack Targeted at Binary Image for Gait Privacy Protection. Jiayi Li, Ke Xu, Xinghao Jiang, Tanfeng Sun |
| 2024 | StegaFDS: Generative Steganography Based on First-Order DPM-Solver. Chengyu Li, Weihai Li, Zikai Xu, Nenghai Yu |
| 2024 | StegoFL: Using Steganography and Federated Learning to Transmit Malware. Rong Wang, Junchuan Liang, Haiting Jiang, Chaosheng Feng, Chin-Chen Chang |
| 2024 | StrucTrans: Zero-Query Structural Adversarial Attack Transferred from Masked Autoencoders to Image Classifiers. Yi Ji, Isao Echizen |
| 2024 | Sustainable and Trusted Vehicular Energy Trading Enabled by Scalable Blockchains. Qingmei Yang, Lijun Sun, Xiao Chen, Lingling Wang |
| 2024 | SyntaxBridge: Protocol Description Transformer for Enhanced Formal Analysis of Security Protocols. Liujia Cai, Tong Yu, Yumeng Li, Siqi Lu, Hanjie Dong, Guangying Cai, Guangsong Li, Yongjuan Wang |
| 2024 | T-ABE: A practical ABE scheme to provide trustworthy key hosting on untrustworthy cloud. Shuaishuai Chang, Yuzhe Li, Jinchao Zhang, Bo Li |
| 2024 | THEF: A Privacy-Preserving Framework for Transformer Inference leveraging HE and TEE. Zehao Li, Jiachun Liao, Jinhao Yu, Lei Zhang |
| 2024 | TOScorr: Transformer-based Flow Correlation Attack on Tor Onion Service. Yilin Zhu, Guang Cheng, Shunyu Zheng, Hantao Mei |
| 2024 | TTFL: Towards Trustworthy Federated Learning with Arm Confidential Computing. Lizhi Sun, Jingzhou Zhu, Boyu Chang, Yixin Xu, Bo Yang, Hao Wu, Fengyuan Xu, Sheng Zhong |
| 2024 | TWCF: Trust Weighted Collaborative Filtering based on Quantitative Modeling of Trust. Wenting Song, K. Suzanne Barber |
| 2024 | Three-Body Problem: An Empirical Study on Smartphone-based TEEs, TEE-based Apps, and their Interactions. Xianghui Dong, Yin Liu, Xuejun Yu |
| 2024 | Tibetan microblogging user data analysis and topic identification. Guixian Xu, Wenhui Gao |
| 2024 | TierFlow: A Pipelined Layered BFT Consensus Protocol for Large-Scale Blockchain. Yongkang Yu, Jinchun He, Xinwei Xu, Qinnan Zhang, Wangjie Qiu, Hongwei Zheng, Binghui Guo, Jin Dong |
| 2024 | Topic-Aware Sensitive Information Detection in Chinese Large Language Model. Yalin Sun, Ruiying Lu, Kang Li, Yu Zheng |
| 2024 | Toward Privacy-Preserving and Verifiable XGBoost Training for Horizontal Federated Learning. Wei Xu, Hui Zhu, Chang Xiao, Fengwei Wang, Dengguo Feng, Hui Li |
| 2024 | Towards High-Quality Electromagnetic Leakage Acquisition in Side-Channel Analysis. Xiaoran Huang, Yiwen Gao, Wei Cheng, Yuejun Liu, Jingdian Ming, Yongbin Zhou, Jian Weng |
| 2024 | Towards Privacy-aware IoT Communications: Delegable, Revocable, and Efficient. Pengfei Wu, Jianfei Sun, Guomin Yang, Robert H. Deng |
| 2024 | Towards Securing ASCON Implementation by Inner Product Masking. Yuming Liu, Wei Cheng, Jihao Fan, Yongbin Zhou |
| 2024 | Towards Understanding and Detecting File Types in Encrypted Files for Law Enforcement Applications. Adam L. Hooker, Wenjian Huang, Shalini Kapali Kurumathur, Nishant Vishwamitra, Kim-Kwang Raymond Choo |
| 2024 | Towards a Robust Medical Record System: Integrating Logical Reasoning for Trustworthy Data Management. Hanning Zhang, Guansheng Wang, Junwei Feng, Lei Feng, Quan Gan, Long Ji |
| 2024 | Traceable AI-driven Avatars Using Multi-factors of Physical World and Metaverse. Kedi Yang, Zhenyong Zhang, Youliang Tian |
| 2024 | TransFront: Bi-path Feature Fusion for Detecting Front-running Attack in Decentralized Finance. Yuheng Zhang, Guojun Wang, Peiqiang Li, Xubin Li, Wanyi Gu, Mingfei Chen, Houji Chen |
| 2024 | Transfer Learning-Based Robust Insider Threat Detection. Yujun Kim, Deok-Han Kim, Young-Gab Kim |
| 2024 | TriViewNet: Achieve Accurate Tor Hidden Service Classification by Multi-View Feature Extraction and Fusion. Yuwei Xu, Jiangfeng Li, Yujie Hou, Xinxu Huang, Yali Yuan, Guang Cheng |
| 2024 | Trust Evaluation in Mobile Crowd Sensing Networks Based on Age of Trust (AoT). Xiayue Wang, Mingyang Li, Yuting Tao, Xuanzhe Wang, Hao Wu |
| 2024 | TrustNotify: A Lightweight Framework for Complete and Trustworthy Data Deletion Notification Distribution. Qipeng Song, Ruiyun Wang, Yue Li, Yiheng Yan, Xingyue Zhu, Hui Li |
| 2024 | Trusted Networking for Drones: Reputation-Based Security Mechanisms for Node Access and Information Synchronization. Ruizhong Du, Jiajia Kang, Jin Tian |
| 2024 | Trusted and Spectrum-Efficient Crowd Computing in Massive MIMO Cellular Networks. Pengfeng Zhang, Lei Li, Xin Liu, Rui Wang, Donglan Liu, Bing Su, Yuntao Wang, Yiliang Liu, Zhou Su |
| 2024 | Trustworthiness and path regularity based contrastive learning for noisy knowledge graph error assertion detection. Zhuohan Ao, Yi Wang, Ying Wang, Yu Zhan |
| 2024 | Trustworthy Analysis of Drain3-based Cold Storage Behavior in Judicial Depository Scenarios. Xiangyu Meng, Xuejun Yu |
| 2024 | Trustworthy Approaches to RSA: Efficient Exploitation Strategies Based on Common Modulus. Mahdi Mahdavi, Navid Abapour, Zahra Ahmadian |
| 2024 | Two-Stage Federated Learning Strategy for Fairness and Security in Vehicular Networks. Xin Zhang, Chao Guo, Buxin Guo |
| 2024 | UNIRE: Secure Trajectory-User Linking Model Aggregation with Knowledge Transfer. Jiezhen Tang, Hui Zhu, Yandong Zheng, Junpeng Zhang, Fengwei Wang, Jiaqi Zhao, Hui Li |
| 2024 | USB Catcher: Detection of Controlled Emissions via Conducted Compromising Emanations. Yixin Zhang, Fuqiang Du, Xinge Chi, Zhiqiang Lv |
| 2024 | UniTTP: A Unified Framework for Tactics, Techniques, and Procedures Mapping in Cyber Threats. Jie Zhang, Hui Wen, Lun Li, Hongsong Zhu |
| 2024 | Unlocking Insights: An Extensible Framework for Automated Metadata Extraction from Online Documents. Raffaele Pizzolante, Arcangelo Castiglione, Francesco Palmieri |
| 2024 | Unsupervised Evaluation Method of Relative Coordination Degree from Group Perspective. Chenghan Zhang, Yan Liu, Daofu Gong, Ling Wang |
| 2024 | User Authentication Based on the Integration of Musical Signals and Ear Canal Acoustics. Tongxi Chen, Weizhi Meng, Wenjuan Li |
| 2024 | VCaDID: Verifiable Credentials with Anonymous Decentralized Identities. Yalan Wang, Liqun Chen, Long Meng, Christopher J. P. Newton |
| 2024 | VDPSRQ: Achieving Verifiable and Dynamic Private Spatial Range Queries over Outsourced Database. Haoyang Wang, Kai Fan, Yue Quan, Fenghua Li, Hui Li |
| 2024 | VisualAuth: Secure Transaction Authentication and Trusted UI on COTS Android Devices. Mykolai Protsenko, Albert Stark, Andreas Papon, Sandra Kostic |
| 2024 | Vulnerabilities are collaborating to compromise your system: A network risk assessment method based on cooperative game and attack graph. Xin Deng, Rui Wang, Weihong Han, Zhihong Tian |
| 2024 | WAPITI - A Weighted Bayesian Method for Private Information Inference on Social Ego Networks. Hervais Simo, Michael Kreutzer |
| 2024 | WCDGA: BERT-Based and Character-Transforming Adversarial DGA with High Anti-Detection Ability. Zhujie Guan, Mengmeng Tian, Yuwei Xu, Kehui Song, Guang Cheng |
| 2024 | WaShadow: Effectively Protecting WebAssembly Memory Through Virtual Machine-Aware Shadow Memory. Zhuochen Jiang, Baojian Hua |
| 2024 | WhisperMQTT: Lightweight Secure Communication Scheme for Subscription-Heavy MQTT Network. Youbin Kim, Man-Ki Yoon |
| 2024 | Who Owns the Cloud Data? Exploring a non-interactive way for secure proof of ownership. Zhihuan Yang, Wenlong Tian, Ruixuan Li, Xuming Ye, Zhiyong Xu |
| 2024 | Witness Encryption based on the SAT Problem Xingbo Wang, Yuzhu Wang, Mingwu Zhang |
| 2024 | You Are as You Type: Investigating the Influence of Timestamp Accuracy on the Robustness of Keystroke Biometrics. Florian Dehling, Sebastian Koch, Luigi Lo Iacono, Hannes Federrath |
| 2024 | Your Data is Leaking! An Empirical Study of User Habits during Smartphone Charging. Steven Krudsen, Wenjuan Li |
| 2024 | ZKFDT: A Fair Exchange Scheme for Data Trading Based on Efficient Zero-Knowledge Proofs. Jianwei Liu, Wei Wan, Chun Long, Jing Li, Fan Yang, Yuhao Fu |
| 2024 | Zephyr: A High-Performance Framework for Graph Attention Networks on Heterogeneous Data. Wenxiu Ding, Muzhi Liu, Yuxuan Cai, Mingxin Chen, Zheng Yan, Mingjun Wang |
| 2024 | scE(match): Privacy-Preserving Cluster Matching of Single-Cell Data. Johannes Lohmöller, Jannis Scheiber, Rafael Kramann, Klaus Wehrle, Sikander Hayat, Jan Pennekamp |
| 2024 | xIDS-EnsembleGuard: An Explainable Ensemble Learning-based Intrusion Detection System. Muhammad Adil, Mian Ahmad Jan, Safayat Bin Hakim, Houbing Herbert Song, Zhanpeng Jin |