researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
OR
AND
NOT
1
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
Filter by Tag
[+]
OR
AND
NOT
1
C++
Markov
Meta-Environment
access control
analysis
architecture
caching
classification
context-aware
contracts
e-science
maintenance
meta-model
mobile
open-source
peer-to-peer
protocol
rule-based
security
source-to-source
Filter by Author
[+]
OR
AND
NOT
1
Abdun Naser Mahmood
Dinghao Wu
Ehab Al-Shaer
Haining Wang
Hao Chen
Jingqiang Lin
Kang G. Shin
Kim-Kwang Raymond Choo
Mozammel Chowdhury
Patrick D. McDaniel
Qi Li
Qiben Yan
Qinghua Li
Qiongxiao Wang
Quazi Mamun
Rafiqul Islam
Roberto Di Pietro
Ryan Karl
Saurabh Bagchi
Sencun Zhu
Filter by Top terms
[+]
OR
AND
NOT
1
analysis
android
attack
attacks
communication
control
data
detection
efficient
framework
mobile
network
networks
privacy
scheme
secure
security
sensor
system
using
SecureComm (securecomm)
Editions
Publications
Viewing Publication 1 - 100 from 889
2023
Security and Privacy in Communication Networks - 18th EAI International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings
FengJun Li
,
Kaitai Liang
,
Zhiqiang Lin
,
Sokratis K. Katsikas
, editors,
Volume 462 of
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
, Springer,
2023.
[doi]
2022
Language and Platform Independent Attribution of Heterogeneous Code
Farzaneh Abazari
,
Enrico Branca
,
Evgeniya Novikova
,
Natalia Stakhanova
.
securecomm 2023
:
173-191
[doi]
SecureBERT: A Domain-Specific Language Model for Cybersecurity
Ehsan Aghaei
,
Xi Niu
,
Waseem G. Shadid
,
Ehab Al-Shaer
.
securecomm 2023
:
39-56
[doi]
Assessing the Quality of Differentially Private Synthetic Data for Intrusion Detection
Md Ali Reza Al Amin
,
Sachin Shetty
,
Valerio Formicola
,
Martin Otto
.
securecomm 2023
:
473-490
[doi]
Symmetrical Disguise: Realizing Homomorphic Encryption Services from Symmetric Primitives
Alexandros Bakas
,
Eugene Frimpong
,
Antonis Michalas
.
securecomm 2023
:
353-370
[doi]
An Evolutionary Learning Approach Towards the Open Challenge of IoT Device Identification
Jingfei Bian
,
Nan Yu
,
Hong Li
,
Hongsong Zhu
,
Qiang Wang
,
Limin Sun
.
securecomm 2023
:
20-38
[doi]
MetaPriv: Acting in Favor of Privacy on Social Media Platforms
Robert Cantaragiu
,
Antonis Michalas
,
Eugene Frimpong
,
Alexandros Bakas
.
securecomm 2023
:
692-709
[doi]
A Cross-layer Plausibly Deniable Encryption System for Mobile Devices
Niusen Chen
,
Bo Chen
,
Weisong Shi
.
securecomm 2023
:
150-169
[doi]
Classification-Based Anomaly Prediction in XACML Policies
Maryam Davari
,
Mohammad Zulkernine
.
securecomm 2023
:
3-19
[doi]
PII-PSM: A New Targeted Password Strength Meter Using Personally Identifiable Information
Qiying Dong
,
Ding Wang
,
Yaosheng Shen
,
Chunfu Jia
.
securecomm 2023
:
648-669
[doi]
Blockchain-Based Ciphertext Policy-Hiding Access Control Scheme
Ruizhong Du
,
Tianhe Zhang
.
securecomm 2023
:
272-289
[doi]
Research on the Grouping Method of Side-Channel Leakage Detection
Xiaoyi Duan
,
Ye Huang
,
Yonghua Su
,
Yujin Li
,
Xiaohong Fan
.
securecomm 2023
:
807-818
[doi]
Replicated Additive Secret Sharing with the Optimized Number of Shares
Juanjuan Guo
,
Mengjie Shuai
,
Qiongxiao Wang
,
Wenyuan Li
,
Jingqiang Lin
.
securecomm 2023
:
371-389
[doi]
DQR: A Double Q Learning Multi Agent Routing Protocol for Wireless Medical Sensor Network
Muhammad Shadi Hajar
,
Harsha K. Kalutarage
,
M. Omar Al-Kadri
.
securecomm 2023
:
611-629
[doi]
Detection and Privacy Leakage Analysis of Third-Party Libraries in Android Apps
Xiantong Hao
,
Dandan Ma
,
Hongliang Liang
.
securecomm 2023
:
569-587
[doi]
MAG-PUF: Magnetic Physical Unclonable Functions for Device Authentication in the IoT
Omar Adel Ibrahim
,
Savio Sciancalepore
,
Roberto Di Pietro
.
securecomm 2023
:
130-149
[doi]
Generic 2-Party PFE with Constant Rounds and Linear Active Security, and Efficient Instantiation
Hanyu Jia
,
Xiangxue Li
,
Qiang Li
,
Yue Bao
,
Xintian Hou
.
securecomm 2023
:
390-410
[doi]
Granting Access Privileges Using OpenID Connect in Permissioned Distributed Ledgers
Shohei Kakei
,
Yoshiaki Shiraishi
,
Shoichi Saito
.
securecomm 2023
:
290-308
[doi]
Silver Surfers on the Tech Wave: Privacy Analysis of Android Apps for the Elderly
Pranay Kapoor
,
Rohan Pagey
,
Mohammad Mannan
,
Amr M. Youssef
.
securecomm 2023
:
673-691
[doi]
What Data Do the Google Dialer and Messages Apps on Android Send to Google?
Douglas J. Leith
.
securecomm 2023
:
549-568
[doi]
Adversary for Social Good: Leveraging Attribute-Obfuscating Attack to Protect User Privacy on Social Networks
Xiaoting Li
,
Lingwei Chen
,
Dinghao Wu
.
securecomm 2023
:
710-728
[doi]
A Random Reversible Watermarking Scheme for Relational Data
Qiang Liu
,
Hequ Xian
,
Jiancheng Zhang
,
Kunpeng Liu
.
securecomm 2023
:
413-430
[doi]
Coreference Resolution for Cybersecurity Entity: Towards Explicit, Comprehensive Cybersecurity Knowledge Graph with Low Redundancy
Zhengyu Liu
,
Haochen Su
,
Nannan Wang
,
Cheng Huang 0003
.
securecomm 2023
:
89-108
[doi]
Another Lattice Attack Against ECDSA with the wNAF to Recover More Bits per Signature
ZiQiang Ma
,
Shuaigang Li
,
Jingqiang Lin
,
Quanwei Cai 0001
,
Shuqin Fan
,
Fan Zhang
,
Bo Luo
.
securecomm 2023
:
111-129
[doi]
Secure CV2X Using COTS Smartphones over LTE Infrastructure
Spandan Mahadevegowda
,
Ryan M. Gerdes
,
Thidapat Chantem
,
Rose Qingyang Hu
.
securecomm 2023
:
588-607
[doi]
FairBlock: Preventing Blockchain Front-Running with Minimal Overheads
Peyman Momeni
,
Sergey Gorbunov 0001
,
Bohan Zhang
.
securecomm 2023
:
250-271
[doi]
Hiatus: Unsupervised Generative Approach for Detection of DoS and DDoS Attacks
Sivaanandh Muneeswaran
,
Vinay Sachidananda
,
Rajendra Patil
,
Hongyi Peng
,
Mingchang Liu
,
Mohan Gurusamy
.
securecomm 2023
:
529-546
[doi]
AttackMiner: A Graph Neural Network Based Approach for Attack Detection from Audit Logs
Yuedong Pan
,
Lijun Cai
,
Tao Leng
,
Lixin Zhao
,
Jiangang Ma
,
Aimin Yu
,
Dan Meng
.
securecomm 2023
:
510-528
[doi]
Cost-Effective Malware Classification Based on Deep Active Learning
Qian Qiang
,
Yige Chen
,
Yang Hu
,
Tianning Zang
,
Mian Cheng
,
Quanbo Pan
,
Yu Ding
,
Zisen Qi
.
securecomm 2023
:
212-227
[doi]
A Generalized Unknown Malware Classification
Nanda Rani
,
Ayushi Mishra
,
Rahul Kumar
,
Sarbajit Ghosh
,
Sandeep K. Shukla
,
Priyanka Bagade
.
securecomm 2023
:
793-806
[doi]
Breaking Embedded Software Homogeneity with Protocol Mutations
Tongwei Ren
,
Ryan Williams
,
Sirshendu Ganguly
,
Lorenzo De Carli
,
Long Lu
.
securecomm 2023
:
770-790
[doi]
Message Recovery Attack of Kyber Based on Information Leakage in Decoding Operation
Mengyao Shi
,
Zhu Wang
,
Tingting Peng
,
FengHua Li
.
securecomm 2023
:
630-647
[doi]
Forensic Analysis and Detection of Spoofing Based Email Attack Using Memory Forensics and Machine Learning
Sanjeev Shukla
,
Manoj Misra
,
Gaurav Varshney
.
securecomm 2023
:
491-509
[doi]
Multi-relational Instruction Association Graph for Cross-Architecture Binary Similarity Comparison
Qige Song
,
Yongzheng Zhang
,
Shuhao Li
.
securecomm 2023
:
192-211
[doi]
TERSE: Tiny Encryptions and Really Speedy Execution for Post-Quantum Private Stream Aggregation
Jonathan Takeshita
,
Zachariah Carmichael
,
Ryan Karl
,
Taeho Jung
.
securecomm 2023
:
331-352
[doi]
Bootstrapping Trust in Community Repository Projects
Sangat Vaidya
,
Santiago Torres-Arias
,
Justin Cappos
,
Reza Curtmola
.
securecomm 2023
:
450-469
[doi]
CTDRB: Controllable Timed Data Release Using Blockchains
Jingzhe Wang
,
Balaji Palanisamy
.
securecomm 2023
:
231-249
[doi]
CapsITD: Malicious Insider Threat Detection Based on Capsule Neural Network
Haitao Xiao
,
Chen Zhang
,
Song Liu
,
Bo Jiang
,
Zhigang Lu
,
Fei Wang
,
Yuling Liu
.
securecomm 2023
:
57-71
[doi]
Enabling Accurate Data Recovery for Mobile Devices Against Malware Attacks
Wen Xie
,
Niusen Chen
,
Bo Chen
.
securecomm 2023
:
431-449
[doi]
PREFHE, PREFHE-AES and PREFHE-SGX: Secure Multiparty Computation Protocols from Fully Homomorphic Encryption and Proxy ReEncryption with AES and Intel SGX
Cavidan Yakupoglu
,
Kurt Rohloff
.
securecomm 2023
:
819-837
[doi]
Towards High Transferability on Neural Network for Black-Box Adversarial Attacks
Haochen Zhai
,
Futai Zou
,
Junhua Tang
,
Yue Wu 0010
.
securecomm 2023
:
72-88
[doi]
Decentralized and Efficient Blockchain Rewriting with Bi-level Validity Verification
Kemin Zhang
,
Li Yang
,
Lu Zhou
,
Jianfeng Ma
.
securecomm 2023
:
309-328
[doi]
eSROP Attack: Leveraging Signal Handler to Implement Turing-Complete Attack Under CFI Defense
Tianning Zhang
,
Miao Cai
,
Diming Zhang
,
Hao Huang
.
securecomm 2023
:
752-769
[doi]
No-Fuzz: Efficient Anti-fuzzing Techniques
Zhengxiang Zhou
,
Cong Wang 0001
,
Qingchuan Zhao
.
securecomm 2023
:
731-751
[doi]
2021
GuardedGossip: Secure and Anonymous Node Discovery in Untrustworthy Networks
Andriy Panchenko 0001
,
Asya Mitseva
,
Torsten Ziemann
,
Till Hering
.
securecomm 2021
:
123-143
[doi]
An Efficient Post-Quantum PKE from RLWR with Simple Security Proof
Parhat Abla
,
Mingsheng Wang
.
securecomm 2021
:
407-423
[doi]
Repeatable Experimentation for Cybersecurity Moving Target Defense
Jaime C. Acosta
,
Luisana Clarke
,
Stephanie Medina
,
Monika Akbar
,
Mahmud Shahriar Hossain
,
Frederica Free-Nelson
.
securecomm 2021
:
82-99
[doi]
Explanation-Guided Diagnosis of Machine Learning Evasion Attacks
Abderrahmen Amich
,
Birhanu Eshete
.
securecomm 2021
:
207-228
[doi]
Compressed SIKE Round 3 on ARM Cortex-M4
Mila Anastasova
,
Mojtaba Bisheh Niasar
,
Reza Azarderakhsh
,
Mehran Mozaffari Kermani
.
securecomm 2021
:
441-457
[doi]
Understanding ε for Differential Privacy in Differencing Attack Scenarios
Narges Ashena
,
Daniele Dell'Aglio
,
Abraham Bernstein
.
securecomm 2021
:
187-206
[doi]
An Extensive Security Analysis on Ethereum Smart Contracts
Mohammadreza Ashouri
.
securecomm 2021
:
144-163
[doi]
Compromised Through Compression - Privacy Implications of Smart Meter Traffic Analysis
Pol Van Aubel
,
Erik Poll
.
securecomm 2021
:
317-337
[doi]
Hardware Deployment of Hybrid PQC: SIKE+ECDH
Reza Azarderakhsh
,
Rami Elkhatib
,
Brian Koziel
,
Brandon Langenberg
.
securecomm 2021
:
475-491
[doi]
A Forensic Tool to Acquire Radio Signals Using Software Defined Radio
M. A. Hannan Bin Azhar
,
German Abadia
.
securecomm 2021
:
499-512
[doi]
JABBIC Lookups: A Backend Telemetry-Based System for Malware Triage
Octavian Ciprian Bordeanu
,
Gianluca Stringhini
,
Yun Shen
,
Toby Davies
.
securecomm 2021
:
164-184
[doi]
Origin Attribution of RSA Public Keys
Enrico Branca
,
Farzaneh Abazari
,
Ronald Rivera Carranza
,
Natalia Stakhanova
.
securecomm 2021
:
374-396
[doi]
Anonymous Short Communications over Social Networks
Francesco Buccafurri
,
Vincenzo De Angelis
,
Maria Francesca Idone
,
Cecilia Labrini
.
securecomm 2021
:
43-63
[doi]
Poisoning Attack for Inter-agent Transfer Learning
Zelei Cheng
,
Zuotian Li
.
securecomm 2021
:
394-404
[doi]
Controlling Network Traffic Microstructures for Machine-Learning Model Probing
Henry Clausen
,
Robert Flood
,
David Aspinall 0001
.
securecomm 2021
:
456-475
[doi]
Towards Stealing Deep Neural Networks on Mobile Devices
Shashank Reddy Danda
,
Xiaoyong Yuan
,
Bo Chen
.
securecomm 2021
:
495-508
[doi]
Research of CPA Attack Methods Based on Ant Colony Algorithm
Xiaoyi Duan
,
You Li
,
Jianmin Tong
,
Xiuying Li
,
Siman He
,
Peishu Zhang
.
securecomm 2021
:
270-286
[doi]
Using NetFlow to Measure the Impact of Deploying DNS-based Blacklists
Martin Fejrskov
,
Jens Myrup Pedersen
,
Emmanouil Vasilomanolakis
.
securecomm 2021
:
476-496
[doi]
Analyzing Security Risks of Ad-Based URL Shortening Services Caused by Users' Behaviors
Naoki Fukushi
,
Takashi Koide
,
Daiki Chiba 0001
,
Hiroki Nakano
,
Mitsuaki Akiyama
.
securecomm 2021
:
3-22
[doi]
Security and Privacy in Communication Networks - 17th EAI International Conference, SecureComm 2021, Virtual Event, September 6-9, 2021, Proceedings, Part II
Joaquín García-Alfaro
,
Shujun Li
,
Radha Poovendran
,
Hervé Debar
,
Moti Yung
, editors,
Volume 399 of
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
, Springer,
2021.
[doi]
Security and Privacy in Communication Networks - 17th EAI International Conference, SecureComm 2021, Virtual Event, September 6-9, 2021, Proceedings, Part I
Joaquín García-Alfaro
,
Shujun Li
,
Radha Poovendran
,
Hervé Debar
,
Moti Yung
, editors,
Volume 398 of
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
, Springer,
2021.
[doi]
Encouraging the Adoption of Post-Quantum Hybrid Key Exchange in Network Security
Alexandre Augusto Giron
.
securecomm 2021
:
363-371
[doi]
Smartphone Location Spoofing Attack in Wireless Networks
Chengbin Hu
,
Yao Liu
,
Zhuo Lu
,
Shangqing Zhao
,
Xiao Han
,
Junjie Xiong
.
securecomm 2021
:
295-313
[doi]
A Distributed Ledger for Non-attributable Cyber Threat Intelligence Exchange
Philip Dale Huff
,
Qinghua Li
.
securecomm 2021
:
164-184
[doi]
Towards Automated Assessment of Vulnerability Exposures in Security Operations
Philip Dale Huff
,
Qinghua Li
.
securecomm 2021
:
62-81
[doi]
System-Wide Security for Offline Payment Terminals
Nikolay Ivanov
,
Qiben Yan
.
securecomm 2021
:
99-119
[doi]
Cryptonite: A Framework for Flexible Time-Series Secure Aggregation with Non-interactive Fault Recovery
Ryan Karl
,
Jonathan Takeshita
,
Taeho Jung
.
securecomm 2021
:
311-331
[doi]
Quantitative and Qualitative Investigations into Trusted Execution Environments
Ryan Karl
.
securecomm 2021
:
372-383
[doi]
Cryptonomial: A Framework for Private Time-Series Polynomial Calculations
Ryan Karl
,
Jonathan Takeshita
,
Alamin Mohammed
,
Aaron Striegel
,
Taeho Jung
.
securecomm 2021
:
332-351
[doi]
SemFlow: Accurate Semantic Identification from Low-Level System Data
Mohammad Kavousi
,
Runqing Yang
,
ShiQing Ma
,
Yan Chen
.
securecomm 2021
:
513-535
[doi]
Mobile Handset Privacy: Measuring the Data iOS and Android Send to Apple and Google
Douglas J. Leith
.
securecomm 2021
:
231-251
[doi]
HTPD: Secure and Flexible Message-Based Communication for Mobile Apps
Yin Liu
,
Breno Dantas Cruz
,
Eli Tilevich
.
securecomm 2021
:
273-294
[doi]
MPD: Moving Target Defense Through Communication Protocol Dialects
Yongsheng Mei
,
Kailash Gogineni
,
Tian Lan
,
Guru Venkataramani
.
securecomm 2021
:
100-119
[doi]
SIEMA: Bringing Advanced Analytics to Legacy Security Information and Event Management
Pejman Najafi
,
Feng Cheng 0002
,
Christoph Meinel
.
securecomm 2021
:
25-43
[doi]
Phishing Web Page Detection with Semi-Supervised Deep Anomaly Detection
Linshu Ouyang
,
Yongzheng Zhang 0002
.
securecomm 2021
:
384-393
[doi]
Flowrider: Fast On-Demand Key Provisioning for Cloud Networks
Nicolae Paladi
,
Marco Tiloca
,
Pegah Nikbakht Bideh
,
Martin Hell
.
securecomm 2021
:
207-228
[doi]
Local Model Privacy-Preserving Study for Federated Learning
Kaiyun Pan
,
Daojing He
,
Chuan Xu
.
securecomm 2021
:
287-307
[doi]
A Quantum Circuit to Speed-Up the Cryptanalysis of Code-Based Cryptosystems
Simone Perriello
,
Alessandro Barenghi
,
Gerardo Pelosi
.
securecomm 2021
:
458-474
[doi]
Phishing Website Detection from URLs Using Classical Machine Learning ANN Model
Said A. Salloum
,
Tarek Gaber
,
Sunil Vadera
,
Khaled Shaalan
.
securecomm 2021
:
509-523
[doi]
Kyber on ARM64: Compact Implementations of Kyber on 64-Bit ARM Cortex-A Processors
Pakize Sanal
,
Emrah Karagoz
,
Hwajeong Seo
,
Reza Azarderakhsh
,
Mehran Mozaffari Kermani
.
securecomm 2021
:
424-440
[doi]
iDDAF: An Intelligent Deceptive Data Acquisition Framework for Secure Cyber-Physical Systems
Md Hasan Shahriar
,
Mohammad Ashiqur Rahman
,
Nur Imtiazul Haque
,
Badrul Chowdhury
,
Steven G. Whisenant
.
securecomm 2021
:
338-359
[doi]
An Empirical Study on Mobile Payment Credential Leaks and Their Exploits
Shangcheng Shi
,
Xianbo Wang
,
Kyle Zeng
,
Ronghai Yang
,
Wing Cheong Lau
.
securecomm 2021
:
79-98
[doi]
CROCUS: An Objective Approach for SDN Controllers Security Assessment
Carlos Silva
,
Bruno Sousa
,
João P. Vilela
.
securecomm 2021
:
438-455
[doi]
Who's Accessing My Data? Application-Level Access Control for Bluetooth Low Energy
Pallavi Sivakumaran
,
Jorge Blasco
.
securecomm 2021
:
252-272
[doi]
Provably Secure Contact Tracing with Conditional Private Set Intersection
Jonathan Takeshita
,
Ryan Karl
,
Alamin Mohammed
,
Aaron Striegel
,
Taeho Jung
.
securecomm 2021
:
352-373
[doi]
Horus: A Security Assessment Framework for Android Crypto Wallets
Md Shahab Uddin
,
Mohammad Mannan
,
Amr M. Youssef
.
securecomm 2021
:
120-139
[doi]
TESLAC: Accelerating Lattice-Based Cryptography with AI Accelerator
Lipeng Wan
,
Fangyu Zheng
,
Jingqiang Lin
.
securecomm 2021
:
249-269
[doi]
Facilitating Parallel Fuzzing with Mutually-Exclusive Task Distribution
Yifan Wang
,
Yuchen Zhang
,
Chengbin Pang
,
Peng Li
,
Nikolaos Triandopoulos
,
Jun Xu
.
securecomm 2021
:
185-206
[doi]
XHunter: Understanding XXE Vulnerability via Automatic Analysis
Zhenhua Wang
,
Wei Xie
,
Jing Tao
,
Yong Tang
,
Enze Wang
.
securecomm 2021
:
23-42
[doi]
Automatic Generation of Malware Threat Intelligence from Unstructured Malware Traces
Yuheng Wei
,
Futai Zou
.
securecomm 2021
:
44-61
[doi]
DeepHunter: A Graph Neural Network Based Approach for Robust Cyber Threat Hunting
Renzheng Wei
,
Lijun Cai
,
Lixin Zhao
,
Aimin Yu
,
Dan Meng
.
securecomm 2021
:
3-24
[doi]
ToFi: An Algorithm to Defend Against Byzantine Attacks in Federated Learning
Qi Xia
,
Zeyi Tao
,
Qun Li
.
securecomm 2021
:
229-248
[doi]
Fine-Grained Intra-domain Bandwidth Allocation Against DDoS Attack
Lijia Xie
,
Shuang Zhao
,
Xiao Zhang
,
Yiming Shi
,
Xin Xiao
,
Zhiming Zheng 0001
.
securecomm 2021
:
399-417
[doi]
A Sybil Detection Method in OSN Based on DistilBERT and Double-SN-LSTM for Text Analysis
Xiaojie Xu
,
Jian Dong
,
Zhengyu Liu
,
Jin Yang
,
Bin Wang
,
Zhaoyuan Wang
.
securecomm 2021
:
64-76
[doi]
Leakuidator: Leaky Resource Attacks and Countermeasures
Mojtaba Zaheri
,
Reza Curtmola
.
securecomm 2021
:
143-163
[doi]
TMT-RF: Tunnel Mixed Traffic Classification Based on Random Forest
Panpan Zhao
,
Gaopeng Gou
,
Chang Liu
,
Yangyang Guan
,
Mingxin Cui
,
Gang Xiong
.
securecomm 2021
:
418-437
[doi]
Sign in
or
sign up
to see more results.