default search action
15th NSS 2021: Tianjin, China
- Min Yang, Chao Chen, Yang Liu:
Network and System Security - 15th International Conference, NSS 2021, Tianjin, China, October 23, 2021, Proceedings. Lecture Notes in Computer Science 13041, Springer 2021, ISBN 978-3-030-92707-3
Full Papers
- Changzhi Li, Lihai Nie, Laiping Zhao:
RLTree: Website Fingerprinting Through Resource Loading Tree. 3-16 - Wenya Wang, Yakang Li, Chao Wang, Yuan Yan, Juanru Li, Dawu Gu:
Re-Check Your Certificates! Experiences and Lessons Learnt from Real-World HTTPS Certificate Deployments. 17-37 - João Soares, Ricardo Fernandez, Miguel Silva, Tadeu Freitas, Rolando Martins:
ZERMIA - A Fault Injector Framework for Testing Byzantine Fault Tolerant Protocols. 38-60 - Liang Zhang, Haibin Kan, Yang Xu, Jinhao Ran:
Revocable Data Sharing Methodology Based on SGX and Blockchain. 61-78 - Yanhua Zhang, Ximeng Liu, Yupu Hu, Huiwen Jia:
On the Analysis of the Outsourced Revocable Identity-Based Encryption from Lattices. 79-99 - Nadav Voloch, Ehud Gudes, Nurit Gal-Oz:
Preventing Fake News Propagation in Social Networks Using a Context Trust-Based Security Model. 100-115 - Yongbo Zhi, Ning Xi, Yuanqing Liu, Honglei Hui:
A Lightweight Android Malware Detection Framework Based on Knowledge Distillation. 116-130 - Nguyen Chi Vy, Nguyen Huu Quyen, Phan The Duy, Van-Hau Pham:
Federated Learning-Based Intrusion Detection in the Context of IIoT Networks: Poisoning Attack and Defense. 131-147 - Haisheng Yu, Wenyong Wang, Yan Liu, Lihong Cheng, Sai Zou:
A Simplified and Effective Solution for Hybrid SDN Network Deployment. 148-161 - Hector B. Hougaard, Atsuko Miyaji:
Group Key Exchange Compilers from Generic Key Exchanges. 162-184 - Marios Anagnostopoulos, Egon Kidmose, Amine Laghaout, Rasmus L. Olsen, Sajad Homayoun, Christian Damsgaard Jensen, Jens Myrup Pedersen:
An Architecture for Processing a Dynamic Heterogeneous Information Network of Security Intelligence. 185-201 - Alisher Ikramov, Gayrat Juraev:
The Complexity of Testing Cryptographic Devices on Input Faults. 202-209 - Yuxin Ding, Zihan Zhou, Wen Qian:
A Malware Family Classification Method Based on the Point Cloud Model DGCNN. 210-221 - Jérémy Donadio, Guillaume Guérard, Soufian Ben Amor:
Collection of the Main Anti-Virus Detection and Bypass Techniques. 222-237 - Alessandro Barenghi, Diego Carrera, Silvia Mella, Andrea Pace, Gerardo Pelosi, Ruggero Susella:
Profiled Attacks Against the Elliptic Curve Scalar Point Multiplication Using Neural Networks. 238-257 - Na Chen, Yuan Cao, Chao Liu:
Deep Cross-Modal Supervised Hashing Based on Joint Semantic Matrix. 258-274
Short Papers
- Yu Sang, Yilin Bei, Zhiyang Yang, Chen Zhao:
Accurate Polar Harmonic Transform-Based Watermarking Using Blind Statistical Detector. 277-288 - Mustapha Hedabou:
Cloud Key Management Based on Verifiable Secret Sharing. 289-303 - Yegang Du:
A Scheme for Sensor Data Reconstruction in Smart Home. 304-313 - Xudong Zhu, Hui Li:
Privacy-Preserving and Auditable Federated Deep Reinforcement Learning for Robotic Manipulation. 314-325 - Ruiyuan Li, Zehui Song, Wei Xie, Chengwei Zhang, Guohui Zhong, Xiaobing Pei:
HALNet: A Hybrid Deep Learning Model for Encrypted C&C Malware Traffic Detection. 326-339 - Ayman Youssef, Mohamed Abdelrazek, Chandan K. Karmakar, Zubair A. Baig:
Tracing Software Exploitation. 340-352 - Phan The Duy, Huynh Nhat Hao, Huynh Minh Chu, Van-Hau Pham:
A Secure and Privacy Preserving Federated Learning Approach for IoT Intrusion Detection System. 353-368 - Yanhua Zhang, Ximeng Liu, Yupu Hu, Huiwen Jia:
Cryptanalysis of a Fully Anonymous Group Signature with Verifier-Local Revocation from ICICS 2018. 369-382
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.