default search action
IEEE Transactions on Dependable and Secure Computing, Volume 20
Volume 20, Number 1, January - February 2023
- Abdulrahman Abu Elkhail, Nada Lachtar, Duha Ibdah, Rustam Aslam, Hamza Khan, Anys Bacha, Hafiz Malik:
Seamlessly Safeguarding Data Against Ransomware Attacks. 1-16 - Qingqing Ye, Haibo Hu, Xiaofeng Meng, Huadi Zheng, Kai Huang, Chengfang Fang, Jie Shi:
PrivKVM*: Revisiting Key-Value Statistics Estimation With Local Differential Privacy. 17-35 - Changhee Hahn, Hodong Kim, Minjae Kim, Junbeom Hur:
VerSA: Verifiable Secure Aggregation for Cross-Device Federated Learning. 36-52 - Shengmin Xu, Jianting Ning, Yingjiu Li, Yinghui Zhang, Guowen Xu, Xinyi Huang, Robert H. Deng:
A Secure EMR Sharing System With Tamper Resistance and Expressive Access Control. 53-67 - Weibei Fan, Fu Xiao, Jianxi Fan, Zhijie Han, Lijuan Sun, Ruchuan Wang:
Fault-Tolerant Routing With Load Balancing in LeTQ Networks. 68-82 - Yan Zhou, Murat Kantarcioglu, Bowei Xi:
Exploring the Effect of Randomness on Transferability of Adversarial Samples Against Deep Neural Networks. 83-99 - Yanhua Du, Zijian Sun, Hesuan Hu:
Security-Aware Collaboration Plan Recommendation for Dynamic Multiple Workflow Processes. 100-113 - Javad Ghareh Chamani, Yun Wang, Dimitrios Papadopoulos, Mingyang Zhang, Rasool Jalili:
Multi-User Dynamic Searchable Symmetric Encryption With Corrupted Participants. 114-130 - Md. Mamunur Rashid Akand, Reihaneh Safavi-Naini, Marc Kneppers, Matthieu Giraud, Pascal Lafourcade:
Privacy-Preserving Proof-of-Location With Security Against Geo-Tampering. 131-146 - Jiqiang Gao, Boyu Hou, Xiaojie Guo, Zheli Liu, Ying Zhang, Kai Chen, Jin Li:
Secure Aggregation is Insecure: Category Inference Attack on Federated Learning. 147-160 - Jide S. Edu, Xavier Ferrer Aran, Jose M. Such, Guillermo Suarez-Tangil:
SkillVet: Automated Traceability Analysis of Amazon Alexa Skills. 161-175 - Saiyu Qi, Jianfeng Wang, Meixia Miao, Meng Zhang, Xiaofeng Chen:
TinyEnc: Enabling Compressed and Encrypted Big Data Stores With Rich Query Support. 176-192 - Qingxuan Wang, Ding Wang, Chi Cheng, Debiao He:
Quantum2FA: Efficient Quantum-Resistant Two-Factor Authentication Scheme for Mobile Devices. 193-208 - Haining Yu, Hongli Zhang, Xiaohua Jia, Xiao Chen, Xiangzhan Yu:
pSafety: Privacy-Preserving Safety Monitoring in Online Ride Hailing Services. 209-224 - Meng Li, Yifei Chen, Chhagan Lal, Mauro Conti, Mamoun Alazab, Donghui Hu:
Eunomia: Anonymous and Secure Vehicular Digital Forensics Based on Blockchain. 225-241 - Mohammad Reza Nosouhi, Shui Yu, Keshav Sood, Marthie Grobler, Raja Jurdak, Ali Dorri, Shigen Shen:
UCoin: An Efficient Privacy Preserving Scheme for Cryptocurrencies. 242-255 - Riccardo Pinciroli, Lishan Yang, Jacob Alter, Evgenia Smirni:
Lifespan and Failures of SSDs and HDDs: Similarities, Differences, and Prediction Models. 256-272 - Dan Tang, Xiyin Wang, Xiong Li, Pandi Vijayakumar, Neeraj Kumar:
AKN-FGD: Adaptive Kohonen Network Based Fine-Grained Detection of LDoS Attacks. 273-287 - Keshav Sood, Mohammad Reza Nosouhi, Neeraj Kumar, Anuroop Gaddam, Bohao Feng, Shui Yu:
Accurate Detection of IoT Sensor Behaviors in Legitimate, Faulty and Compromised Scenarios. 288-300 - Joshua Morris, Sara Newman, Kannappan Palaniappan, Jianping Fan, Dan Lin:
"Do You Know You Are Tracked by Photos That You Didn't Take": Large-Scale Location-Aware Multi-Party Image Privacy Protection. 301-312 - Mordechai Guri:
POWER-SUPPLaY: Leaking Sensitive Data From Air-Gapped, Audio-Gapped Systems by Turning the Power Supplies into Speakers. 313-330 - Dahuin Jung, Ho Bae, Hyun-Soo Choi, Sungroh Yoon:
PixelSteganalysis: Pixel-Wise Hidden Information Removal With Low Visual Degradation. 331-342 - Jian Lin, Dingding Wang, Rui Chang, Lei Wu, Yajin Zhou, Kui Ren:
EnBinDiff: Identifying Data-Only Patches for Binaries. 343-359 - Wei Liu, Zhiguo Wan, Jun Shao, Yong Yu:
HyperMaze: Towards Privacy-Preserving and Scalable Permissioned Blockchain. 360-376 - Xinliang Miao, Rui Chang, Jianhong Zhao, Yongwang Zhao, Shuang Cao, Tao Wei, Liehui Jiang, Kui Ren:
CVTEE: A Compatible Verified TEE Architecture With Enhanced Security. 377-391 - Daniele Cono D'Elia, Simone Nicchi, Matteo Mariani, Matteo Marini, Federico Palmaro:
Designing Robust API Monitoring Solutions. 392-406 - Jingjing Zhang, Yongjie Ye, Weigang Wu, Xiapu Luo:
Boros: Secure and Efficient Off-Blockchain Transactions via Payment Channel Hub. 407-421 - Lu Wei, Jie Cui, Hong Zhong, Irina Bolodurina, Lu Liu:
A Lightweight and Conditional Privacy-Preserving Authenticated Key Agreement Scheme With Multi-TA Model for Fog-Based VANETs. 422-436 - Xingyu Li, Zhe Qu, Shangqing Zhao, Bo Tang, Zhuo Lu, Yao Liu:
LoMar: A Local Defense Against Poisoning Attack on Federated Learning. 437-450 - Miguel Villarreal-Vasquez, Gaspar Modelo-Howard, Simant Dube, Bharat K. Bhargava:
Hunting for Insider Threats Using LSTM-Based Anomaly Detection. 451-462 - Ziqing Huang, Zhenjun Tang, Xianquan Zhang, Linlin Ruan, Xinpeng Zhang:
Perceptual Image Hashing With Locality Preserving Projection for Copy Detection. 463-477 - Zongpu Zhang, Hubin Zhang, Junyuan Wang, Xiaokang Hu, Jian Li, Wenqian Yu, Ping Yu, Weigang Li, Bo Cui, Guodong Zhu, Kapil Sood, Brian Will, Haibing Guan:
QKPT: Securing Your Private Keys in Cloud With Performance, Scalability and Transparency. 478-491 - Rui Zhang, Lei Zhang, Kim-Kwang Raymond Choo, Tong Chen:
Dynamic Authenticated Asymmetric Group Key Agreement With Sender Non-Repudiation and Privacy for Group-Oriented Applications. 492-505 - Farzaneh Abazari, Enrico Branca, Norah Ridley, Natalia Stakhanova, Mila Dalla Preda:
Dataset Characteristics for Reliable Code Authorship Attribution. 506-521 - Wenhao Wang, Weijie Liu, Hongbo Chen, XiaoFeng Wang, Hongliang Tian, Dongdai Lin:
Trust Beyond Border: Lightweight, Verifiable User Isolation for Protecting In-Enclave Services. 522-538 - Josep Domingo-Ferrer, Jesús A. Manjón:
Circuit-Free General-Purpose Multi-Party Computation via Co-Utile Unlinkable Outsourcing. 539-550 - Zhicong Huang, Cheng Hong, Chenkai Weng, Wen-jie Lu, Hunter Qu:
More Efficient Secure Matrix Multiplication for Unbalanced Recommender Systems. 551-562 - Ermeson C. Andrade, Roberto Pietrantuono, Fumio Machida, Domenico Cotroneo:
A Comparative Analysis of Software Aging in Image Classifiers on Cloud and Edge. 563-573 - Zhenyu Ning, Chenxu Wang, Yinhua Chen, Fengwei Zhang, Jiannong Cao:
Revisiting ARM Debugging Features: Nailgun and its Defense. 574-589 - David R. Matos, Miguel L. Pardal, Miguel Correia:
Sanare: Pluggable Intrusion Recovery for Web Applications. 590-605 - Zhonghao Li, Xinghao Jiang, Yi Dong, Laijin Meng, Tanfeng Sun:
An Anti-Steganalysis HEVC Video Steganography With High Performance Based on CNN and PU Partition Modes. 606-619 - Xiaoning Liu, Yifeng Zheng, Xingliang Yuan, Xun Yi:
Securely Outsourcing Neural Network Inference to the Cloud With Lightweight Techniques. 620-636 - Qiuye He, Song Fang, Tao Wang, Yao Liu, Shangqing Zhao, Zhuo Lu:
Proactive Anti-Eavesdropping With Trap Deployment in Wireless Networks. 637-649 - Ling Jin, Yinzhi Cao, Yan Chen, Di Zhang, Simone Campanoni:
ExGen: Cross-platform, Automated Exploit Generation for Smart Contract Vulnerabilities. 650-664 - Yanzhen Ren, Dengkai Liu, Chenyu Liu, Qiaochu Xiong, Jianming Fu, Lina Wang:
A Universal Audio Steganalysis Scheme Based on Multiscale Spectrograms and DeepResNet. 665-679 - Xixun Yu, Hui Bai, Zheng Yan, Rui Zhang:
VeriDedup: A Verifiable Cloud Data Deduplication Scheme With Integrity and Duplication Proof. 680-694 - Alexei Iliasov, Dominic Taylor, Linas Laibinis, Alexander B. Romanovsky:
Practical Verification of Railway Signalling Programs. 695-707 - Huayi Duan, Yuefeng Du, Leqian Zheng, Cong Wang, Man Ho Au, Qian Wang:
Towards Practical Auditing of Dynamic Data in Decentralized Storage. 708-723 - Abdullah Alsaedi, Zahir Tari, Md. Redowan Mahmud, Nour Moustafa, Abdun Mahmood, Adnan Anwar:
USMD: UnSupervised Misbehaviour Detection for Multi-Sensor Data. 724-739 - Teng Li, Ya Jiang, Chi Lin, Mohammad S. Obaidat, Yulong Shen, Jianfeng Ma:
DeepAG: Attack Graph Construction and Threats Prediction With Bi-Directional Deep Learning. 740-757 - Kanghua Mo, Weixuan Tang, Jin Li, Xu Yuan:
Attacking Deep Reinforcement Learning With Decoupled Adversarial Policy. 758-768 - Yi Dong, Xinghao Jiang, Zhaohong Li, Tanfeng Sun, Peisong He:
Adaptive HEVC Steganography Based on Steganographic Compression Efficiency Degradation Model. 769-783 - Jianwei Liu, Chaowei Xiao, Kaiyan Cui, Jinsong Han, Xian Xu, Kui Ren:
Behavior Privacy Preserving in RF Sensing. 784-796 - Kaustabha Ray, Ansuman Banerjee:
Prioritized Fault Recovery Strategies for Multi-Access Edge Computing Using Probabilistic Model Checking. 797-812 - Wenxin Chen, Yingfei Dong, Zhenhai Duan:
DPM: Towards Accurate Drone Position Manipulation. 813-826 - Bowen Tang, Chenggang Wu, Zhe Wang, Lichen Jia, Pen-Chung Yew, Yueqiang Cheng, Yinqian Zhang, Chenxi Wang, Guoqing Harry Xu:
SpecBox: A Label-Based Transparent Speculation Scheme Against Transient Execution Attacks. 827-840 - Maanak Gupta, Ravi S. Sandhu, Tanjila Mawla, James O. Benson:
Reachability Analysis for Attributes in ABAC With Group Hierarchy. 841-858 - Ashima Anand, Amit Kumar Singh:
Dual Watermarking for Security of COVID-19 Patient Record. 859-866 - Chuntao Dong, Qingni Shen, Xuhua Ding, Daoqing Yu, Wu Luo, Pengfei Wu, Zhonghai Wu:
T-Counter: Trustworthy and Efficient CPU Resource Measurement Using SGX in the Cloud. 867-885
Volume 20, Number 2, March - April 2023
- Bang Wu, Shuo Wang, Xingliang Yuan, Cong Wang, Carsten Rudolph, Xiangwen Yang:
Defeating Misclassification Attacks Against Transfer Learning. 886-901 - Xiaohan Zhang, Mi Zhang, Yuan Zhang, Ming Zhong, Xin Zhang, Yinzhi Cao, Min Yang:
Slowing Down the Aging of Learning-Based Malware Detectors With API Knowledge. 902-916 - Lei Zhao, Keyang Jiang, Yuncong Zhu, Lina Wang, Jiang Ming:
Capturing Invalid Input Manipulations for Memory Corruption Diagnosis. 917-930 - Liang Xue, Dongxiao Liu, Jianbing Ni, Xiaodong Lin, Xuemin Sherman Shen:
Enabling Regulatory Compliance and Enforcement in Decentralized Anonymous Payment. 931-943 - Barnana Baruah, Subhasish Dhal:
A Security and Privacy Preserved Intelligent Vehicle Navigation System. 944-959 - Xiaoguang Li, Haonan Yan, Zelei Cheng, Wenhai Sun, Hui Li:
Protecting Regression Models With Personalized Local Differential Privacy. 960-974 - Davide Caputo, Francesco Pagano, Giovanni Bottino, Luca Verderame, Alessio Merlo:
You Can't Always Get What You Want: Towards User-Controlled Privacy on Android. 975-987 - Yifeng Zheng, Shangqi Lai, Yi Liu, Xingliang Yuan, Xun Yi, Cong Wang:
Aggregation Service for Federated Learning: An Efficient, Secure, and More Resilient Realization. 988-1001 - Rui Zhang, Zheng Yan, Xuerui Wang, Robert H. Deng:
VOLERE: Leakage Resilient User Authentication Based on Personal Voice Challenges. 1002-1016 - Yinhao Xiao, Yizhen Jia, Xiuzhen Cheng, Shengling Wang, Jian Mao, Zhenkai Liang:
I Know Your Social Network Accounts: A Novel Attack Architecture for Device-Identity Association. 1017-1030 - Anum Khurshid, Sileshi Demesie Yalew, Mudassar Aslam, Shahid Raza:
ShieLD: Shielding Cross-Zone Communication Within Limited-Resourced IoT Devices Running Vulnerable Software Stack. 1031-1047 - Diana Laura Aguilar, Miguel Angel Medina-Pérez, Octavio Loyola-González, Kim-Kwang Raymond Choo, Edoardo Bucheli-Susarrey:
Towards an Interpretable Autoencoder: A Decision-Tree-Based Autoencoder and its Application in Anomaly Detection. 1048-1059 - Subhra Mazumdar, Sushmita Ruj:
CryptoMaze: Privacy-Preserving Splitting of Off-Chain Payments. 1060-1073 - Hicham Hammouchi, Narjisse Nejjari, Ghita Mezzour, Mounir Ghogho, Houda Benbrahim:
STRisk: A Socio-Technical Approach to Assess Hacking Breaches Risk. 1074-1087 - Xuru Li, Daojing He, Yun Gao, Ximeng Liu, Sammy Chan, Manghan Pan, Kim-Kwang Raymond Choo:
LIGHT: Lightweight Authentication for Intra Embedded Integrated Electronic Systems. 1088-1103 - Tao Xue, Yu Wen, Bo Luo, Gang Li, Yingjiu Li, Boyang Zhang, Yang Zheng, Yanfei Hu, Dan Meng:
SparkAC: Fine-Grained Access Control in Spark for Secure Data Sharing and Analytics. 1104-1123 - Majid Salehi, Luca Degani, Marco Roveri, Danny Hughes, Bruno Crispo:
Discovery and Identification of Memory Corruption Vulnerabilities on Bare-Metal Embedded Devices. 1124-1138 - Ning Wang, Yimin Chen, Yang Xiao, Yang Hu, Wenjing Lou, Y. Thomas Hou:
MANDA: On Adversarial Example Detection for Network Intrusion Detection System. 1139-1153 - Jukka Soikkeli, Giuliano Casale, Luis Muñoz-González, Emil C. Lupu:
Redundancy Planning for Cost Efficient Resilience to Cyber Attacks. 1154-1168 - Yiming Wu, Zhiyuan Xie, Shouling Ji, Zhenguang Liu, Xuhong Zhang, Changting Lin, Shuiguang Deng, Jun Zhou, Ting Wang, Raheem Beyah:
Fraud-Agents Detection in Online Microfinance: A Large-Scale Empirical Study. 1169-1185 - Nan Sun, Jun Zhang, Shang Gao, Leo Yu Zhang, Seyit Camtepe, Yang Xiang:
Cyber Information Retrieval Through Pragmatics Understanding and Visualization. 1186-1199 - Shahryar Baki, Rakesh M. Verma:
Sixteen Years of Phishing User Studies: What Have We Learned? 1200-1212 - Xiaoying Zhang, Hong Xie, Pei Yi, John C. S. Lui:
Enhancing Sybil Detection via Social-Activity Networks: A Random Walk Approach. 1213-1227 - Man Zhou, Qian Wang, Xiu Lin, Yi Zhao, Peipei Jiang, Qi Li, Chao Shen, Cong Wang:
PressPIN: Enabling Secure PIN Authentication on Mobile Devices via Structure-Borne Sounds. 1228-1242 - Caiqin Dong, Jian Weng, Jia-Nan Liu, Anjia Yang, Zhiquan Liu, Yaxi Yang, Jianfeng Ma:
Maliciously Secure and Efficient Large-Scale Genome-Wide Association Study With Multi-Party Computation. 1243-1257 - Omar Basem, Abrar Ullah, Hani Ragab Hassen:
Stick: An End-to-End Encryption Protocol Tailored for Social Network Platforms. 1258-1269 - Soumyadeep Hore, Fariha Moomtaheen, Ankit Shah, Xinming Ou:
Towards Optimal Triage and Mitigation of Context-Sensitive Cyber Vulnerabilities. 1270-1285 - Zhiguo Wan, Wei Liu, Hui Cui:
HIBEChain: A Hierarchical Identity-Based Blockchain System for Large-Scale IoT. 1286-1301 - Wenjun Fan, Hsiang-Jen Hong, Jinoh Kim, Simeon Wuthier, Makiya Nakashima, Xiaobo Zhou, Ching-Hua Chow, Sang-Yoon Chang:
Lightweight and Identifier-Oblivious Engine for Cryptocurrency Networking Anomaly Detection. 1302-1318 - Songnian Zhang, Suprio Ray, Rongxing Lu, Yandong Zheng, Yunguo Guan, Jun Shao:
Towards Efficient and Privacy-Preserving User-Defined Skyline Query Over Single Cloud. 1319-1334 - Zhiguo Wan, Yan Zhou, Kui Ren:
zk-AuthFeed: Protecting Data Feed to Smart Contracts With Authenticated Zero Knowledge Proof. 1335-1347 - Songnian Zhang, Suprio Ray, Rongxing Lu, Yandong Zheng, Yunguo Guan, Jun Shao:
Towards Efficient and Privacy-Preserving Interval Skyline Queries Over Time Series Data. 1348-1363 - Hua Deng, Zheng Qin, Qianhong Wu, Robert H. Deng, Zhenyu Guan, Yupeng Hu, Fangmin Li:
Achieving Fine-Grained Data Sharing for Hierarchical Organizations in Clouds. 1364-1377 - Radu Ciucanu, Anatole Delabrouille, Pascal Lafourcade, Marta Soare:
Secure Protocols for Best Arm Identification in Federated Stochastic Multi-Armed Bandits. 1378-1389 - Lan Zhang, Peng Liu, Yoon-Ho Choi, Ping Chen:
Semantics-Preserving Reinforcement Learning Attack Against Graph Neural Networks for Malware Detection. 1390-1402 - David Megías, Daniel Lerch-Hostalot:
Subsequent Embedding in Targeted Image Steganalysis: Theoretical Framework and Practical Applications. 1403-1421 - Jin Cao, Tong Zhu, Ruhui Ma, Zhenyang Guo, Yinghui Zhang, Hui Li:
A Software-Based Remote Attestation Scheme for Internet of Things Devices. 1422-1434 - Guangsheng Zhang, Bo Liu, Tianqing Zhu, Ming Ding, Wanlei Zhou:
Label-Only Membership Inference Attacks and Defenses in Semantic Segmentation Models. 1435-1449 - Chunyan Mu, David Clark:
Verifying Opacity Properties in Security Systems. 1450-1460 - Cong Sun, Yuwan Ma, Dongrui Zeng, Gang Tan, Siqi Ma, Yafei Wu:
μDep: Mutation-Based Dependency Generation for Precise Taint Analysis on Android Native Code. 1461-1475 - Songbin Li, Jingang Wang, Peng Liu:
Detection of Generative Linguistic Steganography Based on Explicit and Latent Text Word Relation Mining Using Deep Learning. 1476-1487 - Pedro Reviriego, Alfonso Sánchez-Macián, Stefan Walzer, Elena Merino Gómez, Shanshan Liu, Fabrizio Lombardi:
On the Privacy of Counting Bloom Filters. 1488-1499 - Madhukrishna Priyadarsini, Padmalochan Bera, Sajal K. Das, Mohammad Ashiqur Rahman:
A Security Enforcement Framework for SDN Controller Using Game Theoretic Approach. 1500-1515 - Samaneh Hosseini Moghaddam, Maghsoud Abbaspour:
Friendship Preference: Scalable and Robust Category of Features for Social Bot Detection. 1516-1528 - Patrik Rusnak, Elena Zaitseva, Frank P. A. Coolen, Miroslav Kvassay, Vitaly G. Levashenko:
Logic Differential Calculus for Reliability Analysis Based on Survival Signature. 1529-1540 - Pietro Tedeschi, Savio Sciancalepore, Roberto Di Pietro:
PPCA - Privacy-Preserving Collision Avoidance for Autonomous Unmanned Aerial Vehicles. 1541-1558 - Daniele Bringhenti, Guido Marchetto, Riccardo Sisto, Fulvio Valenza, Jalolliddin Yusupov:
Automated Firewall Configuration in Virtual Networks. 1559-1576 - Tuba Yavuz, Farhaan Fowze, Grant Hernandez, Ken Yihang Bai, Kevin R. B. Butler, Dave Jing Tian:
ENCIDER: Detecting Timing and Cache Side Channels in SGX Enclaves and Cryptographic APIs. 1577-1595 - Hannes Holm:
Lore a Red Team Emulation Tool. 1596-1608 - Yi He, Yacong Gu, Purui Su, Kun Sun, Yajin Zhou, Zhi Wang, Qi Li:
A Systematic Study of Android Non-SDK (Hidden) Service API Security. 1609-1623 - Yafeng Wu, Yulai Xie, Xuelong Liao, Pan Zhou, Dan Feng, Lin Wu, Xuan Li, Avani Wildani, Darrell D. E. Long:
Paradise: Real-Time, Generalized, and Distributed Provenance-Based Intrusion Detection. 1624-1640 - Menghao Zhang, Guanyu Li, Xiao Kong, Chang Liu, Mingwei Xu, Guofei Gu, Jianping Wu:
NetHCF: Filtering Spoofed IP Traffic With Programmable Switches. 1641-1655 - Bin Yuan, Yuhan Wu, Maogen Yang, Luyi Xing, Xuchang Wang, Deqing Zou, Hai Jin:
SmartPatch: Verifying the Authenticity of the Trigger-Event in the IoT Platform. 1656-1674 - Pengfei Xia, Hongjing Niu, Ziqiang Li, Bin Li:
Enhancing Backdoor Attacks With Multi-Level MMD Regularization. 1675-1686 - Dan Liu, Qian Wang, Man Zhou, Peipei Jiang, Qi Li, Chao Shen, Cong Wang:
SoundID: Securing Mobile Two-Factor Authentication via Acoustic Signals. 1687-1701 - Peipei Jiang, Qian Wang, Xiu Lin, Man Zhou, Wenbing Ding, Cong Wang, Chao Shen, Qi Li:
Securing Liveness Detection for Voice Authentication via Pop Noises. 1702-1718 - Kisung Park, JoonYoung Lee, Ashok Kumar Das, Youngho Park:
BPPS:Blockchain-Enabled Privacy-Preserving Scheme for Demand-Response Management in Smart Grid Environments. 1719-1729 - Shangyu Xie, Yan Yan, Yuan Hong:
Stealthy 3D Poisoning Attack on Video Recognition Models. 1730-1743 - Yongdong Wu, Jian Weng, Zhengxia Wang, Kaimin Wei, Jinming Wen, Junzuo Lai, Xin Li:
Attacks and Countermeasures on Privacy-Preserving Biometric Authentication Schemes. 1744-1755 - Mingxuan Liu, Zihan Zhang, Yiming Zhang, Chao Zhang, Zhou Li, Qi Li, Haixin Duan, Donghong Sun:
Automatic Generation of Adversarial Readable Chinese Texts. 1756-1770
Volume 20, Number 3, May - June 2023
- Yudan Cheng, Jianfeng Ma, Zhiquan Liu, Yongdong Wu, Kaimin Wei, Caiqin Dong:
A Lightweight Privacy Preservation Scheme With Efficient Reputation Management for Mobile Crowdsensing in Vehicular Networks. 1771-1788 - Yajie Wang, Kongyang Chen, Yu-an Tan, Shuxin Huang, Wencong Ma, Yuanzhang Li:
Stealthy and Flexible Trojan in Deep Learning Framework. 1789-1798 - Mir Ali Rezazadeh Baee, Leonie Simpson, Xavier Boyen, Ernest Foo, Josef Pieprzyk:
ALI: Anonymous Lightweight Inter-Vehicle Broadcast Authentication With Encryption. 1799-1817 - Chao Lin, Xinyi Huang, Debiao He:
EBCPA: Efficient Blockchain-Based Conditional Privacy-Preserving Authentication for VANETs. 1818-1832 - Junchang Jing, Zhiyong Zhang, Kim-Kwang Raymond Choo, Kefeng Fan, Bin Song, Lili Zhang:
Inference of User Desires to Spread Disinformation Based on Social Situation Analytics and Group Effect. 1833-1848 - Jinmeng Zhou, Tong Zhang, Wenbo Shen, Dongyoon Lee, Changhee Jung, Ahmed M. Azab, Ruowen Wang, Peng Ning, Kui Ren:
Automatic Permission Check Analysis for Linux Kernel. 1849-1866 - Fei Peng, Wenyan Jiang, Min Long, Keqin Li:
A Reversible Watermarking for 2D Engineering Graphics Based on Difference Expansion With Adaptive Interval Partitioning. 1867-1881 - Chen Chen, Jingfeng Zhang, Xilie Xu, Lingjuan Lyu, Chaochao Chen, Tianlei Hu, Gang Chen:
Decision Boundary-Aware Data Augmentation for Adversarial Training. 1882-1894 - Jakub Breier, Xiaolu Hou, Martín Ochoa, Jesus Solano:
FooBaR: Fault Fooling Backdoor Attack on Neural Network Training. 1895-1908 - Alexander V. Outkin, Patricia V. Schulz, Timothy Schulz, Thomas D. Tarman, Ali Pinar:
Defender Policy Evaluation and Resource Allocation With MITRE ATT&CK Evaluations Data. 1909-1926 - Lokendra Birla, Puneet Gupta, Shravan Kumar:
SUNRISE: Improving 3D Mask Face Anti-Spoofing for Short Videos Using Pre-Emptive Split and Merge. 1927-1940 - Jun Zhou, Nan Wu, Yisong Wang, Shouzhen Gu, Zhenfu Cao, Xiaolei Dong, Kim-Kwang Raymond Choo:
A Differentially Private Federated Learning Model Against Poisoning Attacks in Edge Computing. 1941-1958 - Chenggang Wu, Mengyao Xie, Zhe Wang, Yinqian Zhang, Kangjie Lu, Xiaofeng Zhang, Yuanming Lai, Yan Kang, Min Yang, Tao Li:
Dancing With Wolves: An Intra-Process Isolation Technique With Privileged Hardware. 1959-1978 - Yunguo Guan, Rongxing Lu, Yandong Zheng, Songnian Zhang, Jun Shao, Guiyi Wei:
Achieving Efficient and Privacy-Preserving ($\alpha,\beta$α,β)-Core Query Over Bipartite Graphs in Cloud. 1979-1993 - Waleed A. Yousef, Issa Traoré, William Briguglio:
Classifier Calibration: With Application to Threat Scores in Cybersecurity. 1994-2010 - Girraj Kumar Verma, Prosanta Gope, Neetesh Saxena, Neeraj Kumar:
CB-DA: Lightweight and Escrow-Free Certificate-Based Data Aggregation for Smart Grid. 2011-2024 - Yiling He, Yiping Li, Lei Wu, Ziqi Yang, Kui Ren, Zhan Qin:
MsDroid: Identifying Malicious Snippets for Android Malware Detection. 2025-2039 - Xiaonan Zhang, Sihan Yu, Hansong Zhou, Pei Huang, Linke Guo, Ming Li:
Signal Emulation Attack and Defense for Smart Home IoT. 2040-2057 - Yanli Ren, Zhuhuan Song, Shifeng Sun, Joseph K. Liu, Guorui Feng:
Outsourcing LDA-Based Face Recognition to an Untrusted Cloud. 2058-2070 - Yidan Hu, Xin Yao, Rui Zhang, Yanchao Zhang:
Freshness Authentication for Outsourced Multi-Version Key-Value Stores. 2071-2084 - Puneet Gill, Werner Dietl, Mahesh Tripunitara:
Least-Privilege Calls to Amazon Web Services. 2085-2096 - Yunguo Guan, Rongxing Lu, Yandong Zheng, Songnian Zhang, Jun Shao, Guiyi Wei:
Achieving Privacy-Preserving Discrete Fréchet Distance Range Queries. 2097-2110 - Yu Guo, Chen Zhang, Cong Wang, Xiaohua Jia:
Towards Public Verifiable and Forward-Privacy Encrypted Search by Using Blockchain. 2111-2126 - Xinjun Pei, Xiaoheng Deng, Shengwei Tian, Lan Zhang, Kaiping Xue:
A Knowledge Transfer-Based Semi-Supervised Federated Learning for IoT Malware Detection. 2127-2143 - Li Hu, Jin Li, Guanbiao Lin, Shiyu Peng, Zhenxin Zhang, Yingying Zhang, Changyu Dong:
Defending Against Membership Inference Attacks With High Utility by GAN. 2144-2157 - Yuichi Sei, J. Andrew Onesimu, Hiroshi Okumura, Akihiko Ohsuga:
Privacy-Preserving Collaborative Data Collection and Analysis With Many Missing Values. 2158-2173 - Zahraa Jawad Al Jady, Mehmet Hakan Karaata:
Possibility and Impossibility of Propagation Safety and Reliability: A 1-Safe and Reliable Snap-Stabilizing Broadcast Algorithm. 2174-2187 - Yang Su, Michael Chesser, Yansong Gao, Alanson P. Sample, Damith C. Ranasinghe:
Wisecr: Secure Simultaneous Code Dissemination to Many Batteryless Computational RFID Devices. 2188-2207 - Ta-Ching Yu, Chin-Hsien Wu, Yan-Qi Liao:
CRRC: Coordinating Retention Errors, Read Disturb Errors and Huffman Coding on TLC NAND Flash Memory. 2208-2220 - Fei Chen, Zixing Xiao, Tao Xiang, Junfeng Fan, Hong Linh Truong:
A Full Lifecycle Authentication Scheme for Large-Scale Smart IoT Applications. 2221-2237 - Lihong Tang, Tingmin Wu, Xiao Chen, Sheng Wen, Li Li, Xin Xia, Marthie Grobler, Yang Xiang:
How Does Visualisation Help App Practitioners Analyse Android Apps? 2238-2255 - Elvira Albert, Shelly Grossman, Noam Rinetzky, Clara Rodríguez-Núñez, Albert Rubio, Mooly Sagiv:
Relaxed Effective Callback Freedom: A Parametric Correctness Condition for Sequential Modules With Callbacks. 2256-2273 - Simone Soderi, Riccardo Colelli, Federico Turrin, Federica Pascucci, Mauro Conti:
SENECAN: Secure KEy DistributioN OvEr CAN Through Watermarking and Jamming. 2274-2288 - Shang Gao, Zhe Peng, Feng Tan, Yuanqing Zheng, Bin Xiao:
SymmeProof: Compact Zero-Knowledge Argument for Blockchain Confidential Transactions. 2289-2301 - Runhua Xu, Chao Li, James Joshi:
Blockchain-Based Transparency Framework for Privacy Preserving Third-Party Services. 2302-2313 - Chenhao Lin, Jingyi He, Chao Shen, Qi Li, Qian Wang:
CrossBehaAuth: Cross-Scenario Behavioral Biometrics Authentication Using Keystroke Dynamics. 2314-2327 - Zichi Wang, Guorui Feng, Liquan Shen, Xinpeng Zhang:
Cover Selection for Steganography Using Image Similarity. 2328-2340 - Lan Liu, Yi Wang, Gaoyang Liu, Kai Peng, Chen Wang:
Membership Inference Attacks Against Machine Learning Models via Prediction Sensitivity. 2341-2347 - Peng Zhang, Teng Huang, Xiaoqiang Sun, Wei Zhao, Hongwei Liu, Shangqi Lai, Joseph K. Liu:
Privacy-Preserving and Outsourced Multi-Party K-Means Clustering Based on Multi-Key Fully Homomorphic Encryption. 2348-2359 - Yi Chen, Zoran Salcic, Hongxia Wang, Kim-Kwang Raymond Choo, Xuyun Zhang:
NACA: A Joint Distortion-Based Non-Additive Cost Assignment Method for Video Steganography. 2360-2374 - Minglin Liu, Tingting Song, Weiqi Luo, Peijia Zheng, Jiwu Huang:
Adversarial Steganography Embedding via Stego Generation and Selection. 2375-2389 - Xiaojie Zhu, Erman Ayday, Roman Vitenberg:
A Privacy-Preserving Framework for Conducting Genome-Wide Association Studies Over Outsourced Patient Data. 2390-2405 - Matthew Rogers, Phillip Weigand, Jassim Happa, Kasper Rasmussen:
Detecting CAN Attacks on J1939 and NMEA 2000 Networks. 2406-2420 - Xiaoyi Pang, Zhibo Wang, Zeqing He, Peng Sun, Meng Luo, Ju Ren, Kui Ren:
Towards Class-Balanced Privacy Preserving Heterogeneous Model Aggregation. 2421-2432 - Wei Tong, Yinggang Tong, Chang Xia, Jingyu Hua, Qun Li, Sheng Zhong:
Understanding Location Privacy of the Point-of-Interest Aggregate Data via Practical Attacks and Defenses. 2433-2449 - Yinhao Xiao, Yizhen Jia, Qin Hu, Xiuzhen Cheng, Bei Gong, Jiguo Yu:
CommandFence: A Novel Digital-Twin-Based Preventive Framework for Securing Smart Home Systems. 2450-2465 - Tao Jiang, Xu Yuan, Yuan Chen, Ke Cheng, Liangmin Wang, Xiaofeng Chen, Jianfeng Ma:
FuzzyDedup: Secure Fuzzy Deduplication for Cloud Storage. 2466-2483 - Heng Pan, Zhenyu Li, Penghao Zhang, Penglai Cui, Kavé Salamatian, Gaogang Xie:
Misconfiguration-Free Compositional SDN for Cloud Networks. 2484-2499 - Pietro Tedeschi, Spiridon Bakiras, Roberto Di Pietro:
SpreadMeNot: A Provably Secure and Privacy-Preserving Contact Tracing Protocol. 2500-2515 - Ala Altaweel, Radu Stoleru, Guofei Gu, Arnab Kumar Maity, Suman Bhunia:
On Detecting Route Hijacking Attack in Opportunistic Mobile Networks. 2516-2532 - Hengzhi Wang, Yongjian Yang, En Wang, Xiulong Liu, Jingxiao Wei, Jie Wu:
Bilateral Privacy-Preserving Worker Selection in Spatial Crowdsourcing. 2533-2546 - Mordechai Guri:
AIR-FI: Leaking Data From Air-Gapped Computers Using Wi-Fi Frequencies. 2547-2564 - Cheng Wang, Songyao Chai, Hangyu Zhu, Changjun Jiang:
CAeSaR: An Online Payment Anti-Fraud Integration System With Decision Explainability. 2565-2577 - Haoyang Wang, Kai Fan, Hongyan Chen, Qi Chen, Kuan Zhang, Fenghua Li, Hui Li, Yintang Yang:
Joint Biological ID : A Secure and Efficient Lightweight Biometric Authentication Scheme. 2578-2592 - Shenghong He, Ruxin Wang, Tongliang Liu, Chao Yi, Xin Jin, Renyang Liu, Wei Zhou:
Type-I Generative Adversarial Attack. 2593-2606 - Yu Liang, Yi Xie, Shensheng Tang, Shunzheng Yu, Xingcheng Liu, Jiankun Hu:
Network Traffic Content Identification Based on Time-Scale Signal Modeling. 2607-2624 - Qian Mei, Minghao Yang, Jinhao Chen, Lili Wang, Hu Xiong:
Expressive Data Sharing and Self-Controlled Fine-Grained Data Deletion in Cloud-Assisted IoT. 2625-2640 - Xindi Ma, Qi Jiang, Ximeng Liu, Qingqi Pei, Jianfeng Ma, Wenjing Lou:
Learning in Your "Pocket": Secure Collaborative Deep Learning With Membership Privacy. 2641-2656 - Shunquan Tan, Qiushi Li, Laiyuan Li, Bin Li, Jiwu Huang:
STD-NET: Search of Image Steganalytic Deep-Learning Architecture via Hierarchical Tensor Decomposition. 2657-2673
Volume 20, Number 4, July - August 2023
- Zheng Zheng, Lorenzo Strigini, Nuno Antunes, Kishor S. Trivedi:
Editorial: Software Reliability and Dependability Engineering. 2674-2676 - Niranjhana Narayanan, Zitao Chen, Bo Fang, Guanpeng Li, Karthik Pattabiraman, Nathan DeBardeleben:
Fault Injection for TensorFlow Applications. 2677-2695 - Xiaoting Du, Yulei Sui, Zhihao Liu, Jun Ai:
An Empirical Study of Fault Triggers in Deep Learning Frameworks. 2696-2712 - Xiao-Yi Zhang, Paolo Arcaini, Fuyuki Ishikawa:
An Incremental Approach for Understanding Collision Avoidance of an Industrial Path Planner. 2713-2730 - Andrea Ceccarelli, Francesco Secci:
RGB Cameras Failures and Their Effects in Autonomous Driving Applications. 2731-2745 - Guoping Rong, Hao Wang, Shenghui Gu, Yangchen Xu, Jialin Sun, Dong Shao, He Zhang:
Locating Anomaly Clues for Atypical Anomalous Services: An Industrial Exploration. 2746-2761 - Xiaoyun Li, Pengfei Chen, Linxiao Jing, Zilong He, Guangba Yu:
SwissLog: Robust Anomaly Detection and Localization for Interleaved Unstructured Logs. 2762-2780 - Jian Shi, Deqing Zou, Shouhuai Xu, Xianjun Deng, Hai Jin:
Does OpenBSD and Firefox's Security Improve With Time? 2781-2793 - Khashayar Etemadi, Nicolas Harrand, Simon Larsén, Haris Adzemovic, Henry Luong Phu, Ashutosh Verma, Fernanda Madeiral, Douglas Wikström, Martin Monperrus:
Sorald: Automatic Patch Suggestions for SonarQube Static Analysis Violations. 2794-2810 - Jing Bai, Xiaolin Chang, Fumio Machida, Lili Jiang, Zhen Han, Kishor S. Trivedi:
Impact of Service Function Aging on the Dependability for MEC Service Function Chain. 2811-2824 - Hongfang Shi, Wenying Zhang, Zimin Zhang, Dewen Ding:
Vulnerability Analysis of Chinese Digital Passwords Related to ATM PIN Using Deep Learning. 2825-2835 - Keyu Ji, Bingsheng Zhang, Tianpei Lu, Lichun Li, Kui Ren:
UC Secure Private Branching Program and Decision Tree Evaluation. 2836-2848 - Meng Li, Yifei Chen, Chhagan Lal, Mauro Conti, Fabio Martinelli, Mamoun Alazab:
Nereus: Anonymous and Secure Ride-Hailing Service Based on Private Smart Contracts. 2849-2866 - Kaidi Jin, Tianwei Zhang, Chao Shen, Yufei Chen, Ming Fan, Chenhao Lin, Ting Liu:
Can We Mitigate Backdoor Attack Using Adversarial Detection Methods? 2867-2881 - Xin Chen, Liang Feng Zhang, Jing Liu:
Verifiable Homomorphic Secret Sharing for Low Degree Polynomials. 2882-2895 - Jie Wang, Xuemei Yin, Yifang Chen, Jiwu Huang, Xiangui Kang:
An Adaptive IPM-Based HEVC Video Steganography via Minimizing Non-Additive Distortion. 2896-2912 - Weiwei Li, Mi Wen, Zhou Su, Kuan Zhang:
Collusion Detection and Trust Management for Indoor Navigation System With Crowdsourcing. 2913-2924 - Kunli Lin, Wenqing Liu, Kun Zhang, Bibo Tu:
HyperPS: A Virtual-Machine Memory Protection Approach Through Hypervisor's Privilege Separation. 2925-2938 - Tianxi Ji, Erman Ayday, Emre Yilmaz, Pan Li:
Towards Robust Fingerprinting of Relational Databases by Mitigating Correlation Attacks. 2939-2953 - Boyu Kuang, Anmin Fu, Yansong Gao, Yuqing Zhang, Jianying Zhou, Robert H. Deng:
FeSA: Automatic Federated Swarm Attestation on Dynamic Large-Scale IoT Devices. 2954-2969 - Chengzhe Lai, Yixiao Ma, Rongxing Lu, Yinghui Zhang, Dong Zheng:
A Novel Authentication Scheme Supporting Multiple User Access for 5G and Beyond. 2970-2987 - Jie Cui, Bei Li, Hong Zhong, Yan Xu, Lu Liu:
Achieving Revocable Attribute Group-Based Encryption for Mobile Cloud Data: A Multi-Proxy Assisted Approach. 2988-3001 - Meng Li, Yifei Chen, Liehuang Zhu, Zijian Zhang, Jianbing Ni, Chhagan Lal, Mauro Conti:
Astraea: Anonymous and Secure Auditing Based on Private Smart Contracts for Donation Systems. 3002-3018 - Mengfei Xie, Yan Lin, Chenke Luo, Guojun Peng, Jianming Fu:
PointerScope: Understanding Pointer Patching for Code Randomization. 3019-3036 - Yunji Liang, Yuchen Qin, Qi Li, Xiaokai Yan, Luwen Huangfu, Sagar Samtani, Bin Guo, Zhiwen Yu:
An Escalated Eavesdropping Attack on Mobile Devices via Low-Resolution Vibration Signals. 3037-3050 - Jun Li, Devkishen Sisodia, Shad Stafford:
On the Detection of Smart, Self-Propagating Internet Worms. 3051-3063 - Yong Xie, Gang Zeng, Ryo Kurachi, Fu Xiao, Hiroaki Takada, Shiyan Hu:
Timing Analysis of CAN FD for Security-Aware Automotive Cyber-Physical Systems. 3064-3078 - Yifeng Zheng, Cong Wang, Ruochen Wang, Huayi Duan, Surya Nepal:
Optimizing Secure Decision Tree Inference Outsourcing. 3079-3092 - Devon Callahan, Timothy Curry, Hazel Davidson, Heytem Zitoun, Benjamin Fuller, Laurent Michel:
FASHION: Functional and Attack Graph Secured HybrId Optimization of Virtualized Networks. 3093-3109 - Keerthi Nelaturu, Anastasia Mavridou, Emmanouela Stachtiari, Andreas G. Veneris, Aron Laszka:
Correct-by-Design Interacting Smart Contracts and a Systematic Approach for Verifying ERC20 and ERC721 Contracts With VeriSolid. 3110-3127 - Federico Concone, Giuseppe Lo Re, Marco Morana, Sajal K. Das:
SpADe: Multi-Stage Spam Account Detection for Online Social Networks. 3128-3143 - Ming Gao, Yajie Liu, Yike Chen, Yimin Li, Zhongjie Ba, Xian Xu, Jinsong Han, Kui Ren:
Device-Independent Smartphone Eavesdropping Jointly Using Accelerometer and Gyroscope. 3144-3157 - Florian Skopik, Markus Wurzenberger, Georg Höld, Max Landauer, Walter Kuhn:
Behavior-Based Anomaly Detection in Log Data of Physical Access Control Systems. 3158-3175 - Victor Youdom Kemmoe, Yongseok Kwon, Rasheed Hussain, Sunghyun Cho, Junggab Son:
Leveraging Smart Contracts for Secure and Asynchronous Group Key Exchange Without Trusted Third Party. 3176-3193 - Zhuo Ma, Yang Liu, Ximeng Liu, Jian Liu, Jianfeng Ma, Kui Ren:
Learn to Forget: Machine Unlearning via Neuron Masking. 3194-3207 - Zeyu Mi, Zhi Guo, Fuqian Huang, Haibo Chen:
Hawkeye: Eliminating Kernel Address Leakage in Normal Data Flows. 3208-3221 - Guoxing Chen, Yinqian Zhang:
Securing TEEs With Verifiable Execution Contracts. 3222-3237 - Zuobin Xiong, Zhipeng Cai, Chunqiang Hu, Daniel Takabi, Wei Li:
Towards Neural Network-Based Communication System: Attack and Defense. 3238-3250 - Hojoon Lee, Chihyun Song, Brent ByungHoon Kang:
Harnessing the x86 Intermediate Rings for Intra-Process Isolation. 3251-3268 - Servio Palacios, Aaron Ault, James V. Krogmeier, Bharat K. Bhargava, Christopher G. Brinton:
AGAPECert: An Auditable, Generalized, Automated, Privacy-Enabling Certification Framework With Oblivious Smart Contracts. 3269-3286 - Lin Yao, Zhaolong Zheng, Xin Wang, Yujie Zeng, Guowei Wu:
Detection of Cache Pollution Attack Based on Ensemble Learning in ICN-Based VANET. 3287-3298 - Yue Zheng, Wenye Liu, Chongyan Gu, Chip-Hong Chang:
PUF-Based Mutual Authentication and Key Exchange Protocol for Peer-to-Peer IoT Applications. 3299-3316 - Lisandro Arturo Jimenez-Roa, Tom Heskes, Tiedo Tinga, Mariëlle Stoelinga:
Automatic Inference of Fault Tree Models Via Multi-Objective Evolutionary Algorithms. 3317-3327 - Zhibo Wang, Yuting Huang, Mengkai Song, Libing Wu, Feng Xue, Kui Ren:
Poisoning-Assisted Property Inference Attack Against Federated Learning. 3328-3340 - Yanjun Zhang, Guangdong Bai, Xue Li, Surya Nepal, Marthie Grobler, Chen Chen, Ryan K. L. Ko:
Preserving Privacy for Distributed Genome-Wide Analysis Against Identity Tracing Attacks. 3341-3357 - Xiangyu Wang, Jianfeng Ma, Ximeng Liu, Yinbin Miao, Yang Liu, Robert H. Deng:
Forward/Backward and Content Private DSSE for Spatial Keyword Queries. 3358-3370 - Zhiyuan Lin, Mahesh Tripunitara:
A Comparison of Four Notions of Isomorphism-Based Security for Graphs. 3371-3377 - Rajib Ranjan Maiti, Cheah Huei Yoong, Venkata Reddy Palleti, Arlindo Silva, Christopher M. Poskitt:
Mitigating Adversarial Attacks on Data-Driven Invariant Checkers for Cyber-Physical Systems. 3378-3391 - Yi Ding, Fuyuan Tan, Ji Geng, Zhen Qin, Mingsheng Cao, Kim-Kwang Raymond Choo, Zhiguang Qin:
Interpreting Universal Adversarial Example Attacks on Image Classification Models. 3392-3407 - Jie Chen, Xiaonan Hu, Dongyi Yi, Mamoun Alazab, Jianqiang Li:
A Variational AutoEncoder-Based Relational Model for Cost-Effective Automatic Medical Fraud Detection. 3408-3420 - Sean W. Caldwell, Ye Zhu, Yong Guan, Riccardo Bettati:
On Account Association With Assistance From Mobile Networks. 3421-3433 - Suyoung Lee, Wonho Song, Suman Jana, Meeyoung Cha, Sooel Son:
Evaluating the Robustness of Trigger Set-Based Watermarks Embedded in Deep Neural Networks. 3434-3448 - Zhiwei Xu, Xin Wang, Yujun Zhang:
Towards Persistent Detection of DDoS Attacks in NDN: A Sketch-Based Approach. 3449-3465 - Max Landauer, Florian Skopik, Maximilian Frank, Wolfgang Hotwagner, Markus Wurzenberger, Andreas Rauber:
Maintainable Log Datasets for Evaluation of Intrusion Detection Systems. 3466-3482 - Heng Ye, Qiang Zeng, Jiqiang Liu, Xiaojiang Du, Wei Wang:
Easy Peasy: A New Handy Method for Pairing Multiple COTS IoT Devices. 3483-3494 - Maribel Fernández, Jenjira Jaimunk, Bhavani Thuraisingham:
A Privacy-Preserving Architecture and Data-Sharing Model for Cloud-IoT Applications. 3495-3507 - Yuan-Yu Tsai, Hong-Lin Liu:
Integrating Coordinate Transformation and Random Sampling Into High-Capacity Reversible Data Hiding in Encrypted Polygonal Models. 3508-3519 - João R. Campos, Ernesto Costa, Marco Vieira:
Online Failure Prediction for Complex Systems: Methodology and Case Studies. 3520-3534 - Linyan Bai, Ching-Fang Hsu, Lein Harn, Jianqun Cui, Zhuo Zhao:
A Practical Lightweight Anonymous Authentication and Key Establishment Scheme for Resource-Asymmetric Smart Environments. 3535-3545 - Wenbing Zhao:
On Nxt Proof of Stake Algorithm: A Simulation Study. 3546-3557
Volume 20, Number 5, September - October 2023
- Roberto De Prisco, Alfredo De Santis, Francesco Palmieri:
Improved Protocols for Distributed Secret Sharing. 3558-3571 - Ming Zhang, Zhe Sun, Hui Li, Ben Niu, Fenghua Li, Zixu Zhang, Yuhang Xie, Chunhao Zheng:
Go-Sharing: A Blockchain-Based Privacy-Preserving Framework for Cross-Social Network Photo Sharing. 3572-3587 - Shunbin Li, Zhiyu Wang, Ruyun Zhang, Chunming Wu, Hanguang Luo:
Mangling Rules Generation With Density-Based Clustering for Password Guessing. 3588-3600 - Yong Wang, Aiqing Zhang, Shu Wu, Shui Yu:
VOSA: Verifiable and Oblivious Secure Aggregation for Privacy-Preserving Federated Learning. 3601-3616 - Di Lu, Minqiang Shi, Xindi Ma, Ximeng Liu, Rui Guo, Tianfang Zheng, Yulong Shen, Xuewen Dong, Jianfeng Ma:
Smaug: A TEE-Assisted Secured SQLite for Embedded Systems. 3617-3635 - Shahnewaz Karim Sakib, George T. Amariucai, Yong Guan:
ZeroProKeS: A Secure Zeroconf Key Establishment Protocol for Large-Scale Low-Cost Applications. 3636-3652 - Pengyu Qiu, Xuhong Zhang, Shouling Ji, Tianyu Du, Yuwen Pu, Jun Zhou, Ting Wang:
Your Labels are Selling You Out: Relation Leaks in Vertical Federated Learning. 3653-3668 - Zhongyun Hua, Yanxiang Wang, Shuang Yi, Yifeng Zheng, Xingyu Liu, Yongyong Chen, Xinpeng Zhang:
Matrix-Based Secret Sharing for Reversible Data Hiding in Encrypted Images. 3669-3686 - Mahendra Rathor, Anirban Sengupta, Rahul Chaurasia, Aditya Anshul:
Exploring Handwritten Signature Image Features for Hardware Security. 3687-3698 - Xinyu Li, Jing Xu, Lingyuan Yin, Yuan Lu, Qiang Tang, Zhenfeng Zhang:
Escaping From Consensus: Instantly Redactable Blockchain Protocols in Permissionless Setting. 3699-3715 - Zhi Zhang, Wei He, Yueqiang Cheng, Wenhao Wang, Yansong Gao, Dongxi Liu, Kang Li, Surya Nepal, Anmin Fu, Yi Zou:
Implicit Hammer: Cross-Privilege-Boundary Rowhammer Through Implicit Accesses. 3716-3733 - Gargi Mitra, Prasanna Karthik Vairam, Sandip Saha, Nitin Chandrachoodan, V. Kamakoti:
Snoopy: A Webpage Fingerprinting Framework With Finite Query Model for Mass-Surveillance. 3734-3752 - Giovanni Apruzzese, V. S. Subrahmanian:
Mitigating Adversarial Gray-Box Attacks Against Phishing Detectors. 3753-3769 - Songnian Zhang, Suprio Ray, Rongxing Lu, Yunguo Guan, Yandong Zheng, Jun Shao:
Efficient and Privacy-Preserving Spatial Keyword Similarity Query Over Encrypted Data. 3770-3786 - Kejiang Chen, Hang Zhou, Yaofei Wang, Menghan Li, Weiming Zhang, Nenghai Yu:
Cover Reproducible Steganography via Deep Generative Models. 3787-3798 - Hongyang Yan, Shuhao Li, Yajie Wang, Yaoyuan Zhang, Kashif Sharif, Haibo Hu, Yuanzhang Li:
Membership Inference Attacks Against Deep Learning Models via Logits Distribution. 3799-3808 - Yibing Liu, Lijun Huo, Jun Wu, Mohsen Guizani:
MRSA: Mask Random Array Protocol for Efficient Secure Handover Authentication in 5G HetNets. 3809-3827 - Sani M. Abdullahi, Ke Lv, Shuifa Sun, Hongxia Wang:
Cancelable Fingerprint Template Construction Using Vector Permutation and Shift-Ordering. 3828-3844 - Alán Rodrigo Díaz Rizo, Hassan Aboushady, Haralampos-G. Stratigopoulos:
Leaking Wireless ICs via Hardware Trojan-Infected Synchronization. 3845-3859 - Hyunsoo Kwon, Sangtae Lee, Minjae Kim, Changhee Hahn, Junbeom Hur:
Certificate Transparency With Enhanced Privacy. 3860-3872 - Haining Yang, Dengguo Feng, Jing Qin:
Efficient Verifiable Unbounded-Size Database From Authenticated Matrix Commitment. 3873-3889 - Zhaoteng Yan, Zhi Li, Hong Li, Shouguo Yang, Hongsong Zhu, Limin Sun:
Internet-Scale Fingerprinting the Reusing and Rebranding IoT Devices in the Cyberspace. 3890-3909 - Mengmeng Yang, Ivan Tjuawinata, Kwok-Yan Lam, Tianqing Zhu, Jun Zhao:
Differentially Private Distributed Frequency Estimation. 3910-3926 - Fang Liu, Xingyuan Zhao:
Disclosure Risk From Homogeneity Attack in Differentially Privately Sanitized Frequency Distribution. 3927-3939 - Hong-Yen Tran, Jiankun Hu, Hemanshu R. Pota:
A Privacy-Preserving State Estimation Scheme for Smart Grids. 3940-3956 - Khandakar Ashrafi Akbar, Yigong Wang, Gbadebo Ayoade, Yang Gao, Anoop Singhal, Latifur Khan, Bhavani Thuraisingham, Kangkook Jee:
Advanced Persistent Threat Detection Using Data Provenance and Metric Learning. 3957-3969 - Guangke Chen, Zhe Zhao, Fu Song, Sen Chen, Lingling Fan, Feng Wang, Jiashui Wang:
Towards Understanding and Mitigating Audio Adversarial Examples for Speaker Recognition. 3970-3987 - Mingwu Zhang, Yu Chen, Willy Susilo:
Decision Tree Evaluation on Sensitive Datasets for Secure e-Healthcare Systems. 3988-4001 - Vahid Pourahmadi, Hyame Assem Alameddine, Mohammad Ali Salahuddin, Raouf Boutaba:
Spotting Anomalies at the Edge: Outlier Exposure-Based Cross-Silo Federated Learning for DDoS Detection. 4002-4015 - Zhaopin Su, Mengke Li, Guofu Zhang, Qinfang Wu, Miqing Li, Weiming Zhang, Xin Yao:
Robust Audio Copy-Move Forgery Detection Using Constant Q Spectral Sketches and GA-SVM. 4016-4031 - Safwa Ameer, James O. Benson, Ravi S. Sandhu:
Hybrid Approaches (ABAC and RBAC) Toward Secure Access Control in Smart Home IoT. 4032-4051 - Dan Liu, Zheng Yan, Wenxiu Ding, Yuxuan Cai, Yaxing Chen, Zhiguo Wan:
ESMAC: Efficient and Secure Multi-Owner Access Control With TEE in Multi-Level Data Processing. 4052-4069 - Zhen Liu, Changzhen Hu, Chun Shan, Zheng Yan:
ADCaDeM: A Novel Method of Calculating Attack Damage Based on Differential Manifolds. 4070-4084 - Haozhi Li, Tian Song, Yating Yang:
Generic and Sensitive Anomaly Detection of Network Covert Timing Channels. 4085-4100 - Pengfei Wu, Jianting Ning, Xinyi Huang, Joseph K. Liu:
Differentially Oblivious Two-Party Pattern Matching With Sublinear Round Complexity. 4101-4117 - Zhili Zhou, Yuecheng Su, Jin Li, Keping Yu, Q. M. Jonathan Wu, Zhangjie Fu, Yunqing Shi:
Secret-to-Image Reversible Transformation for Generative Steganography. 4118-4134 - Ardavan Bozorgi, Alireza Bahramali, Fatemeh Rezaei, Amirhossein Ghafari, Amir Houmansadr, Ramin Soltani, Dennis Goeckel, Don Towsley:
I Still Know What You Did Last Summer: Inferring Sensitive User Activities on Messaging Applications Through Traffic Analysis. 4135-4153 - Jianyu Niu, Fangyu Gai, Runchao Han, Ren Zhang, Yinqian Zhang, Chen Feng:
Crystal: Enhancing Blockchain Mining Transparency With Quorum Certificate. 4154-4168 - Milan Lopuhaä-Zwakenberg, Carlos E. Budde, Mariëlle Stoelinga:
Efficient and Generic Algorithms for Quantitative Attack Tree Analysis. 4169-4187 - Yanjiao Chen, Zhicong Zheng, Xueluan Gong:
MARNet: Backdoor Attacks Against Cooperative Multi-Agent Reinforcement Learning. 4188-4198 - Shuying Xu, Ji-Hwei Horng, Ching-Chun Chang, Chin-Chen Chang:
Reversible Data Hiding With Hierarchical Block Variable Length Coding for Cloud Security. 4199-4213 - Yang Xiao, Zhuolin Xing, Alex X. Liu, Lei Bai, Qingqi Pei, Lina Yao:
Cure-GNN: A Robust Curvature-Enhanced Graph Neural Network Against Adversarial Attacks. 4214-4229 - Zan Zhou, Changqiao Xu, Ming-Ze Wang, Xiaohui Kuang, Yirong Zhuang, Shui Yu:
A Multi-Shuffler Framework to Establish Mutual Confidence for Secure Federated Learning. 4230-4244 - Chuan Zhang, Chenfei Hu, Tong Wu, Liehuang Zhu, Ximeng Liu:
Achieving Efficient and Privacy-Preserving Neural Network Training and Prediction in Cloud Environments. 4245-4257 - Min Wang, Song Wang, Jiankun Hu:
PolyCosGraph: A Privacy-Preserving Cancelable EEG Biometric System. 4258-4272 - Soumya Purohit, Roshan Neupane, Naga Ramya Bhamidipati, Varsha Vakkavanthula, Songjie Wang, Matthew Rockey, Prasad Calyam:
Cyber Threat Intelligence Sharing for Co-Operative Defense in Multi-Domain Entities. 4273-4290 - Haonan Feng, Jingjing Guan, Hui Li, Xuesong Pan, Ziming Zhao:
FIDO Gets Verified: A Formal Analysis of the Universal Authentication Framework Protocol. 4291-4310 - Haomeng Xie, Shufan Fei, Zheng Yan, Yang Xiao:
SofitMix: A Secure Offchain-Supported Bitcoin-Compatible Mixing Protocol. 4311-4324 - Lei Zhou, Anmin Fu, Guomin Yang, Yansong Gao, Shui Yu, Robert H. Deng:
Fair Cloud Auditing Based on Blockchain for Resource-Constrained IoT Devices. 4325-4342 - Yuefeng Du, Huayi Duan, Lei Xu, Helei Cui, Cong Wang, Qian Wang:
${{\sf PEBA}}$: Enhancing User Privacy and Coverage of Safe Browsing Services. 4343-4358 - Qin Liu, Yu Peng, Hongbo Jiang, Jie Wu, Tian Wang, Tao Peng, Guojun Wang:
SlimBox: Lightweight Packet Inspection over Encrypted Traffic. 4359-4371 - Xiaoyu Qiu, Wuhui Chen, Bingxin Tang, Junyuan Liang, Hong-Ning Dai, Zibin Zheng:
A Distributed and Privacy-Aware High-Throughput Transaction Scheduling Approach for Scaling Blockchain. 4372-4386 - Yandong Zheng, Rongxing Lu, Songnian Zhang, Yunguo Guan, Fengwei Wang, Jun Shao, Hui Zhu:
PRkNN: Efficient and Privacy-Preserving Reverse kNN Query Over Encrypted Data. 4387-4402 - Fulvio Valenza, Erisa Karafili, Rodrigo Vieira Steiner, Emil C. Lupu:
A Hybrid Threat Model for Smart Systems. 4403-4417 - Guowen Xu, Xingshuo Han, Shengmin Xu, Tianwei Zhang, Hongwei Li, Xinyi Huang, Robert H. Deng:
Hercules: Boosting the Performance of Privacy-Preserving Federated Learning. 4418-4433 - Sergio Galán, Pedro Reviriego, Stefan Walzer, Alfonso Sánchez-Macián, Shanshan Liu, Fabrizio Lombardi:
On the Privacy of Counting Bloom Filters Under a Black-Box Attacker. 4434-4440 - Zhichao Yang, Debiao He, Longjiang Qu, Jianqiao Xu:
On the Security of a Lattice-Based Multi-Stage Secret Sharing Scheme. 4441-4442
Volume 20, Number 6, November - December 2023
- Hongwei Shi, Shengling Wang, Qin Hu, Xiuzhen Cheng:
Black Swan in Blockchain: Micro Analysis of Natural Forking. 4443-4454 - Yansong Gao, Yang Su, Surya Nepal, Damith C. Ranasinghe:
NoisFre: Noise-Tolerant Memory Fingerprints from Commodity Devices for Security Functions. 4455-4473 - Daniel Karapetyan, Gregory Z. Gutin:
Solving the Workflow Satisfiability Problem Using General Purpose Solvers. 4474-4485 - Reo Eriguchi, Atsunori Ichikawa, Noboru Kunihiro, Koji Nuida:
Efficient Noise Generation Protocols for Differentially Private Multiparty Computation. 4486-4501 - Yue Sun, Zhi Li, Shichao Lv, Limin Sun:
Spenny: Extensive ICS Protocol Reverse Analysis via Field Guided Symbolic Execution. 4502-4518 - Kaimeng Chen, Qingxiao Guan, Weiming Zhang, Nenghai Yu:
Reversible Data Hiding in Encrypted Images Based on Binary Symmetric Channel Model and Polar Code. 4519-4535 - Chao Lin, Xinyi Huang, Jianting Ning, Debiao He:
ACA: Anonymous, Confidential and Auditable Transaction Systems for Blockchain. 4536-4550 - Xiangrui Xu, Pengrui Liu, Wei Wang, Hongliang Ma, Bin Wang, Zhen Han, Yufei Han:
CGIR: Conditional Generative Instance Reconstruction Attacks Against Federated Learning. 4551-4563 - Guojun Chu, Jingyu Wang, Qi Qi, Haifeng Sun, Shimin Tao, Hao Yang, Jianxin Liao, Zhu Han:
Exploiting Spatial-Temporal Behavior Patterns for Fraud Detection in Telecom Networks. 4564-4577 - Lingling Lu, Zhenyu Wen, Ye Yuan, Binru Dai, Peng Qian, Changting Lin, Qinming He, Zhenguang Liu, Jianhai Chen, Rajiv Ranjan:
iQuery: A Trustworthy and Scalable Blockchain Analytics Platform. 4578-4592 - Wenting Shen, Jia Yu, Ming Yang, Jiankun Hu:
Efficient Identity-Based Data Integrity Auditing With Key-Exposure Resistance for Cloud Storage. 4593-4606 - Yehua Wei, Can Cheng, Guoqi Xie:
OFIDS : Online Learning-Enabled and Fingerprint-Based Intrusion Detection System in Controller Area Networks. 4607-4620 - Kai Zhang, Xiwen Wang, Jianting Ning, Mi Wen, Rongxing Lu:
Multi-Client Boolean File Retrieval With Adaptable Authorization Switching for Secure Cloud Search Services. 4621-4636 - Kai Lehniger, Peter Langendörfer:
Window Canaries: Re-Thinking Stack Canaries for Architectures With Register Windows. 4637-4647 - Jiajie Zhang, Bingsheng Zhang, Andrii Nastenko, Hamed Balogun, Roman Oliynykov:
Privacy-Preserving Decision-Making Over Blockchain. 4648-4663 - Prashanth Krishnamurthy, Virinchi Roy Surabhi, Hammond Pearce, Ramesh Karri, Farshad Khorrami:
Multi-Modal Side Channel Data Driven Golden-Free Detection of Software and Firmware Trojans. 4664-4677 - Anli Yan, Hongyang Yan, Li Hu, Xiaozhang Liu, Teng Huang:
Holistic Implicit Factor Evaluation of Model Extraction Attacks. 4678-4689 - Yaru Liu, Hongcheng Li, Gang Huang, Wei Hua:
OPUPO: Defending Against Membership Inference Attacks With Order-Preserving and Utility-Preserving Obfuscation. 4690-4701 - Mingze He, Hongxia Wang, Fei Zhang, Sani M. Abdullahi, Ling Yang:
Robust Blind Video Watermarking Against Geometric Deformations and Online Video Sharing Platform Processing. 4702-4718 - Jinglei Tan, Hui Jin, Hao Hu, Ruiqin Hu, Hongqi Zhang, Hengwei Zhang:
WF-MTD: Evolutionary Decision Method for Moving Target Defense Based on Wright-Fisher Process. 4719-4732 - Marta Bellés-Muñoz, Miguel Isabel, Jose Luis Muñoz-Tapia, Albert Rubio, Jordi Baylina Melé:
Circom: A Circuit Description Language for Building Zero-Knowledge Applications. 4733-4751 - Wei Guo, Benedetta Tondi, Mauro Barni:
A Temporal Chrominance Trigger for Clean-Label Backdoor Attack Against Anti-Spoof Rebroadcast Detection. 4752-4762 - Yicheng Pan, Meng Ma, Xinrui Jiang, Ping Wang:
DyCause: Crowdsourcing to Diagnose Microservice Kernel Failure. 4763-4777 - Pinchang Zhang, Yulin Teng, Yulong Shen, Xiaohong Jiang, Fu Xiao:
Tag-Based PHY-Layer Authentication for RIS-Assisted Communication Systems. 4778-4792 - Florian Klaus Kaiser, Uriel Dardik, Aviad Elitzur, Polina Zilberman, Nir Daniel, Marcus Wiens, Frank Schultmann, Yuval Elovici, Rami Puzis:
Attack Hypotheses Generation Based on Threat Intelligence Knowledge Graph. 4793-4809 - Zhuo Ma, Xinjing Liu, Yang Liu, Ximeng Liu, Zhan Qin, Kui Ren:
DivTheft: An Ensemble Model Stealing Attack by Divide-and-Conquer. 4810-4822 - Yipeng Zhou, Xuezheng Liu, Yao Fu, Di Wu, Jessie Hui Wang, Shui Yu:
Optimizing the Numbers of Queries and Replies in Convex Federated Learning With Differential Privacy. 4823-4837 - Chuan Ma, Jun Li, Ming Ding, Bo Liu, Kang Wei, Jian Weng, H. Vincent Poor:
RDP-GAN: A Rényi-Differential Privacy Based Generative Adversarial Network. 4838-4852 - Ganapathy Mani, Marina Haliem, Bharat K. Bhargava, Indu Manickam, Kevin Kochpatcharin, Myeongsu Kim, Eric D. Vugrin, Weichao Wang, Chris Jenkins, Pelin Angin, Meng Yu:
Machine Learning Based Resilience Testing of an Address Randomization Cyber Defense. 4853-4867 - Anand Agrawal, Urbi Chatterjee, Rajib Ranjan Maiti:
CheckShake: Passively Detecting Anomaly in Wi-Fi Security Handshake Using Gradient Boosting Based Ensemble Learning. 4868-4880 - Siwon Huh, Myungkyu Shim, Jihwan Lee, Simon S. Woo, Hyoungshick Kim, Hojoon Lee:
DID We Miss Anything?: Towards Privacy-Preserving Decentralized ID Architecture. 4881-4898 - Enrico Russo, Gabriele Costa, Giacomo Longo, Alessandro Armando, Alessio Merlo:
LiDiTE: A Full-Fledged and Featherweight Digital Twin Framework. 4899-4912 - Tao Zhang, Changqiao Xu, Bingchi Zhang, Xinran Li, Xiaohui Kuang, Luigi Alfredo Grieco:
Towards Attack-Resistant Service Function Chain Migration: A Model-Based Adaptive Proximal Policy Optimization Approach. 4913-4927 - Mingyang Song, Zhongyun Hua, Yifeng Zheng, Hejiao Huang, Xiaohua Jia:
Blockchain-Based Deduplication and Integrity Auditing Over Encrypted Cloud Storage. 4928-4945 - Sanoop Mallissery, Kun-Yi Chiang, Chun-An Bau, Yu-Sung Wu:
Pervasive Micro Information Flow Tracking. 4957-4975 - Ping Wang, Haichang Gao, Chenxuan Xiao, Xiaoyan Guo, Yipeng Gao, Yang Zi:
Extended Research on the Security of Visual Reasoning CAPTCHA. 4976-4992 - Xueluan Gong, Ziyao Wang, Yanjiao Chen, Meng Xue, Qian Wang, Chao Shen:
Kaleidoscope: Physical Backdoor Attacks Against Deep Neural Networks With RGB Filters. 4993-5004 - Xiangyun Tang, Meng Shen, Qi Li, Liehuang Zhu, Tengfei Xue, Qiang Qu:
PILE: Robust Privacy-Preserving Federated Learning Via Verifiable Perturbations. 5005-5023 - Zhonghui Ge, Yi Zhang, Yu Long, Dawu Gu:
Magma: Robust and Flexible Multi-Party Payment Channel. 5024-5042 - Mingyan Xiao, Ming Li, Jie Jennifer Zhang:
Locally Differentially Private Personal Data Markets Using Contextual Dynamic Pricing Mechanism. 5043-5055 - Hui Zhang, Xuejun Li, Syh-Yuan Tan, Ming Jie Lee, Zhe Jin:
Privacy-Preserving Biometric Authentication: Cryptanalysis and Countermeasures. 5056-5069 - Yahya Javed, Mosab A. Khayat, Ali A. Elghariani, Arif Ghafoor:
PRISM: A Hierarchical Intrusion Detection Architecture for Large-Scale Cyber Networks. 5070-5086 - Zhuoran Ma, Jianfeng Ma, Yinbin Miao, Ximeng Liu, Wei Zheng, Kim-Kwang Raymond Choo, Robert H. Deng:
VerifyTL: Secure and Verifiable Collaborative Transfer Learning. 5087-5101 - Minxin Du, Peipei Jiang, Qian Wang, Sherman S. M. Chow, Lingchen Zhao:
Shielding Graph for eXact Analytics With SGX. 5102-5112 - Xi Lin, Jun Wu, Jianhua Li, Chao Sang, Shiyan Hu, M. Jamal Deen:
Heterogeneous Differential-Private Federated Learning: Trading Privacy for Utility Truthfully. 5113-5129 - Lili Wang, Ye Lin, Ting Yao, Hu Xiong, Kaitai Liang:
FABRIC: Fast and Secure Unbounded Cross-System Encrypted Data Sharing in Cloud Computing. 5130-5142 - Wen Cheng, Dazou Sang, Lingfang Zeng, Yang Wang, André Brinkmann:
Tianji: Securing a Practical Asynchronous Multi-User ORAM. 5143-5155 - Sebastian Zillien, Steffen Wendzel:
Weaknesses of Popular and Recent Covert Channel Detection Methods and a Remedy. 5156-5167 - Song Gao, Ruxin Wang, Xiaoxuan Wang, Shui Yu, Yunyun Dong, Shaowen Yao, Wei Zhou:
Detecting Adversarial Examples on Deep Neural Networks With Mutual Information Neural Estimation. 5168-5181 - Chi Liu, Huajie Chen, Tianqing Zhu, Jun Zhang, Wanlei Zhou:
Making DeepFakes More Spurious: Evading Deep Face Forgery Detection via Trace Removal Attack. 5182-5196 - Huanran Wang, Wu Yang, Dapeng Man, Wei Wang, Jiguang Lv:
Anchor Link Prediction for Privacy Leakage via De-Anonymization in Multiple Social Networks. 5197-5213 - Peizhuo Lv, Pan Li, Shengzhi Zhang, Kai Chen, Ruigang Liang, Hualong Ma, Yue Zhao, Yingjiu Li:
A Robustness-Assured White-Box Watermark in Neural Networks. 5214-5229 - Jun Zhou, Guobin Gao, Zhenfu Cao, Kim-Kwang Raymond Choo, Xiaolei Dong:
Lightweight Privacy-Preserving Distributed Recommender System Using Tag-Based Multikey Fully Homomorphic Data Encapsulation. 5230-5246 - Tiantian Zhu, Jinkai Yu, Chunlin Xiong, Wenrui Cheng, Qixuan Yuan, Jie Ying, Tieming Chen, Jiabo Zhang, Mingqi Lv, Yan Chen, Ting Wang, Yuan Fan:
APTSHIELD: A Stable, Efficient and Real-Time APT Detection System for Linux Hosts. 5247-5264 - Hansong Du, Jiu-fen Liu, Xiangyang Luo, Yi Zhang:
Extraction Method of Secret Message Based on Optimal Hypothesis Test. 5265-5277 - Zhongyu Pei, Xingman Chen, Songtao Yang, Haixin Duan, Chao Zhang:
TAICHI: Transform Your Secret Exploits Into Mine From a Victim's Perspective. 5278-5292 - Yudan Cheng, Jianfeng Ma, Zhiquan Liu, Zhetao Li, Yongdong Wu, Caiqin Dong, Runchuan Li:
A Privacy-Preserving and Reputation-Based Truth Discovery Framework in Mobile Crowdsensing. 5293-5311 - Anton Wahrstätter, Jorão Gomes Jr., Sajjad Khan, Davor Svetinovic:
Improving Cryptocurrency Crime Detection: CoinJoin Community Detection Approach. 4946-4956
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.