researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
[+]
OR
AND
NOT
1
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2025
Filter by Tag
[+]
OR
AND
NOT
1
C++
Markov
Meta-Environment
access control
analysis
architecture
caching
classification
context-aware
contracts
e-science
maintenance
meta-model
mobile
open-source
peer-to-peer
protocol
rule-based
security
source-to-source
Filter by Author
[+]
OR
AND
NOT
1
Abdun Naser Mahmood
Dinghao Wu
Ehab Al-Shaer
Haining Wang
Hao Chen
Jingqiang Lin
Kang G. Shin
Kim-Kwang Raymond Choo
Mozammel Chowdhury
Patrick D. McDaniel
Qi Li
Qiben Yan
Qinghua Li
Qiongxiao Wang
Quazi Mamun
Rafiqul Islam
Roberto Di Pietro
Ryan Karl
Saurabh Bagchi
Sencun Zhu
Filter by Top terms
[+]
OR
AND
NOT
1
analysis
android
attack
attacks
communication
control
data
detection
efficient
framework
mobile
network
networks
privacy
protocol
secure
security
sensor
system
using
SecureComm (securecomm)
Editions
Publications
Viewing Publication 1 - 100 from 942
2025
Security and Privacy in Communication Networks - 19th EAI International Conference, SecureComm 2023, Hong Kong, China, October 19-21, 2023, Proceedings, Part I
Haixin Duan
,
Mourad Debbabi
,
Xavier de Carné de Carnavalet
,
Xiapu Luo
,
Xiaojiang Du
,
Man Ho Allen Au
, editors,
Volume 567 of
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
, Springer,
2025.
[doi]
Security and Privacy in Communication Networks - 19th EAI International Conference, SecureComm 2023, Hong Kong, China, October 19-21, 2023, Proceedings, Part II
Haixin Duan
,
Mourad Debbabi
,
Xavier de Carné de Carnavalet
,
Xiapu Luo
,
Xiaojiang Du
,
Man Ho Allen Au
, editors,
Volume 568 of
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
, Springer,
2025.
[doi]
2023
VDABSys: A Novel Security-Testing Framework for Blockchain Systems Based on Vulnerability detection
Jinfu Chen 0001
,
Qiaowei Feng
,
Saihua Cai
,
Dengzhou Shi
,
Dave Towey
,
Yuhao Chen
,
Dongjie Wang
.
securecomm 2025
:
287-305
[doi]
Model Inversion Attacks on Homogeneous and Heterogeneous Graph Neural Networks
Renyang Liu 0001
,
Wei Zhou 0011
,
Jinhong Zhang
,
Xiaoyuan Liu
,
Peiyuan Si
,
Haoran Li
.
securecomm 2025
:
125-144
[doi]
A Game Theoretical Analysis of Distributed Denial-of-Service Defense Incentive
Mingwei Zhang 0004
,
Jun Li 0001
,
Jiabin Wu
,
Peter L. Reiher
.
securecomm 2025
:
3-24
[doi]
Split Without a Leak: Reducing Privacy Leakage in Split Learning
Khoa Nguyen 0005
,
Tanveer Khan
,
Antonis Michalas
.
securecomm 2025
:
321-344
[doi]
Learning AI Coding Style for Software Plagiarism Detection
Sri Haritha Ambati
,
Natalia Stakhanova
,
Enrico Branca
.
securecomm 2025
:
467-489
[doi]
DNN Architecture Attacks via Network and Power Side Channels
Yuanjun Dai
,
Qingzhe Guo
,
An Wang 0002
.
securecomm 2025
:
63-87
[doi]
Certificateless Aggregate Signature Without Trapdoor for Cloud Storage
Yingjie Dong
,
Yongjian Liao
,
Zhishuo Zhang
,
Wen Huang 0002
.
securecomm 2025
:
350-368
[doi]
POP-HIT: Partially Order-Preserving Hash-Induced Transformation for Privacy Protection in Face Recognition Access Control
Yatish Dubasi
,
Qinghua Li
,
Khoa Luu
.
securecomm 2025
:
80-98
[doi]
MVTBA: A Novel Hybrid Deep Learning Model for Encrypted Malicious Traffic Identification
Zuwei Fan
,
Shunliang Zhang
.
securecomm 2025
:
60-79
[doi]
Do Backdoors Assist Membership Inference Attacks?
Yumeki Goto
,
Nami Ashizawa
,
Toshiki Shibahara
,
Naoto Yanai
.
securecomm 2025
:
251-265
[doi]
Discovering and Understanding the Security Flaws of Authentication and Authorization in IoT Cloud APIs for Smart Home
Minglei Guo
,
Zhenghang Xiao
,
Xin Liu
,
Jianwei Zhuge
.
securecomm 2025
:
205-224
[doi]
Practical Privacy-Preserving Community Detection in Decentralized Weighted Networks
Tingxuan Han
,
Wei Tong
,
Jiacheng Niu
,
Sheng Zhong 0002
.
securecomm 2025
:
302-320
[doi]
Street Rep: A Privacy-Preserving Reputation Aggregation System
Christophe Hauser
,
Shirin Nilizadeh
,
Yan Shoshitaishvili
,
Ni Trieu
,
Srivatsan Ravi
,
Christopher Kruegel
,
Giovanni Vigna
.
securecomm 2025
:
345-368
[doi]
Enhancing Cross-Device Security with Fine-Grained Permission Control
Han Hu
,
Daibin Wang
,
Tailiang Hong
,
Sheng Zhang
.
securecomm 2025
:
101-121
[doi]
CyberEA: An Efficient Entity Alignment Framework for Cybersecurity Knowledge Graph
Yue Huang
,
Yongyan Guo
,
Cheng Huang 0003
.
securecomm 2025
:
41-62
[doi]
Efficient and Scalable Multi-party Privacy-Preserving k-NN Classification
Xinglei Li
,
Haifeng Qian
.
securecomm 2025
:
266-286
[doi]
An Authentication Algorithm for Sets of Spatial Data Objects
Wenhao Li
,
Chengliang Wang
,
Xiaobing Hu
,
Hongwen Zhou
,
Hang Zeng
,
Yanai Wang
.
securecomm 2025
:
461-475
[doi]
Security and Privacy in Communication Networks - 18th EAI International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings
FengJun Li
,
Kaitai Liang
,
Zhiqiang Lin
,
Sokratis K. Katsikas
, editors,
Volume 462 of
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
, Springer,
2023.
[doi]
Batch Lattice-Based Designated-Verifier ZK-SNARKs for R1CS
Xi Lin
,
Han-xia
,
Yongqiang Li
,
Mingsheng Wang
.
securecomm 2025
:
329-349
[doi]
Optimization of Functional Bootstraps with Large LUT and Packing Key Switching
Keyi Liu
,
Chungen Xu
,
Bennian Dou
,
Lei Xu 0019
.
securecomm 2025
:
439-458
[doi]
Identifying Library Functions in Stripped Binary: Combining Function Similarity and Call Graph Features
Zhanpeng Liu
,
Xinhui Han
.
securecomm 2025
:
395-408
[doi]
A Stable Fine-Grained Webpage Fingerprinting: Aiming at the Unstable Realistic Network
Songtao Liu
,
Hua Wu 0004
,
Hao Luo
,
Guang Cheng 0001
,
Xiaoyan Hu
.
securecomm 2025
:
167-188
[doi]
Byzantine Protocols with Asymptotically Optimal Communication Complexity
Hanzheng Lyu
,
Shaokang Xie
,
Jianyu Niu
,
Chen Feng 0001
.
securecomm 2025
:
247-264
[doi]
Demystifying Blockchain Scalability: Sibling Chains with Minimal Interleaving
JiangFeng Ma
,
Xuetao Zhang
,
Xiangxue Li
.
securecomm 2025
:
265-286
[doi]
Visibility of Scan Traffic Trends in Sparsely Populated Darknets
Kodai Mizutani
,
Daisuke Kotani
,
Yasuo Okabe
.
securecomm 2025
:
230-248
[doi]
HeSUN: Homomorphic Encryption for Secure Unbounded Neural Network Inference
Duy Tung Khanh Nguyen
,
Dung Hoang Duong
,
Willy Susilo
,
Yang-Wai Chow
.
securecomm 2025
:
413-438
[doi]
VET: Autonomous Vehicular Credential Verification Using Trajectory and Motion Vectors
Ebuka Oguchi
,
Nirnimesh Ghose
.
securecomm 2025
:
140-164
[doi]
An Adaptive Authentication Protocol for Internet of Vehicles Based on Vehicle Density
Hao Peng
,
Zisang Xu
,
Ruirui Zhang
,
Jianbo Xu
.
securecomm 2025
:
187-204
[doi]
Efficient Zero Knowledge for Regular Language
Michael Raymond
,
Gillian Evers
,
Jan Ponti
,
Diya Krishnan
,
Xiang Fu 0001
.
securecomm 2025
:
369-394
[doi]
Efficient Unbalanced Private Set Intersection Protocol over Large-Scale Datasets Based on Bloom Filter
Ou Ruan
,
Chaohao Ai
,
Changwang Yan
.
securecomm 2025
:
287-301
[doi]
Classify Me Correctly if You Can: Evaluating Adversarial Machine Learning Threats in NIDS
Neea Rusch
,
Asma Jodeiri Akbarfam
,
Hoda Maleki
,
Gagan Agrawal
,
Gokila Dorai
.
securecomm 2025
:
3-22
[doi]
Lightweight Intrusion Detection for IoT Systems Using Artificial Neural Networks
Radhwan A. A. Saleh
,
Louai Al-Awami
,
Mustafa Ghaleb
,
Anas Ahmad Abudaqa
.
securecomm 2025
:
45-59
[doi]
DDoS Mitigation Dilemma Exposed: A Two-Wave Attack with Collateral Damage of Millions
Lumin Shi
,
Jun Li 0001
,
Devkishen Sisodia
,
Mingwei Zhang 0004
,
Alberto Dainotti
,
Peter L. Reiher
.
securecomm 2025
:
25-44
[doi]
PDFIET: PDF Malicious Indicators Extraction Technique Through Optimized Symbolic Execution
Enzhou Song
,
Tao Hu
,
Peng Yi
,
Wenbo Wang
.
securecomm 2025
:
409-425
[doi]
Understanding and Measuring Inter-process Code Injection in Windows Malware
Jerre Starink
,
Marieke Huisman
,
Andreas Peter
,
Andrea Continella
.
securecomm 2025
:
490-514
[doi]
An Efficient Private Information Retrieval Protocol Based on TFHE
Haibo Tian
,
Yini Lin
.
securecomm 2025
:
476-495
[doi]
Ransomware as a Service: Demystifying Android Ransomware Generators
Can Tu
,
Liu Wang
,
Yang Xu
,
Yiping Zhao
,
Haitao Xu
,
Haoyu Wang
.
securecomm 2025
:
426-447
[doi]
CV2XFuzzer: C-V2X Parsing Vulnerability Discovery System Based on Fuzzing
Yuxuan Wang
,
Yishen Li
,
Jihu Zheng
,
Jianwei Zhuge
.
securecomm 2025
:
451-466
[doi]
Analyzing Implementation-Based SSL/TLS Vulnerabilities with Binary Semantics Analysis
Li Wang
,
Yi Yang
,
Goutham Reddy Alavalapati
.
securecomm 2025
:
371-394
[doi]
Meta Perturbation Generation Network for Text-Based CAPTCHA
Zhuoting Wu
,
Zhiwei Guo
,
Jiuxiang You
,
Zhenguo Yang
,
Qing Li 0001
,
Wenyin Liu
.
securecomm 2025
:
110-124
[doi]
Unsupervised Multi-criteria Adversarial Detection in Deep Image Retrieval
Yanru Xiao
,
Cong Wang
,
Xing Gao
.
securecomm 2025
:
145-164
[doi]
VRC-GraphNet: A Graph Neural Network-Based Reasoning Framework for Attacking Visual Reasoning Captchas
Botao Xu
,
Haizhou Wang
.
securecomm 2025
:
165-184
[doi]
Optimizing Lightweight Intermittent Message Authentication for Programmable Logic Controller
Jiaqi Yang
,
Jun Xian Chia
,
Xijie Ba
,
Jianying Zhou
,
Zheng Yang
.
securecomm 2025
:
225-243
[doi]
Securing Web Inputs Using Parallel Session Attachments
Ziqi Yang
,
Ruite Xu
,
Qixiao Lin
,
Shikun Wu
,
Jian Mao
,
Zhenkai Liang
.
securecomm 2025
:
189-208
[doi]
Anonymous Key Issuing Protocol with Certified Identities in Identity-Based Encryption
Yanqing Yang
,
Jian Wang
.
securecomm 2025
:
309-328
[doi]
The Security Analysis of ROS2 Communication
Shuo Yang
,
Hongru Li
,
Jian Guo
.
securecomm 2025
:
122-139
[doi]
Unsupervised and Adaptive Tor Website Fingerprinting
Guoqiang Zhang
,
Jiahao Cao
,
Mingwei Xu
,
Xinhao Deng
.
securecomm 2025
:
209-229
[doi]
Invisibility Spell: Adversarial Patch Attack Against Object Detectors
Jianyi Zhang
,
Ronglin Guan
,
Zhangchi Zhao
,
Xiuying Li
,
Zezheng Sun
.
securecomm 2025
:
88-109
[doi]
mShield: Protecting In-process Sensitive Data Against Vulnerable Third-Party Libraries
Yunming Zhang
,
Quanwei Cai 0001
,
Houqiang Li
,
Jingqiang Lin 0001
,
Wei Wang 0335
.
securecomm 2025
:
496-513
[doi]
Password Cracking by Exploiting User Group Information
Beibei Zhou
,
Daojing He
,
Sencun Zhu
,
Shanshan Zhu
,
Sammy Chan
,
Xiao Yang
.
securecomm 2025
:
514-532
[doi]
Enabling Fast Settlement in Atomic Cross-Chain Swaps
Feng Zhuo
,
Zhaoxiong Song
,
Linpeng Jia
,
Hanwen Zhang 0001
,
Zhongcheng Li
,
Yi Sun 0004
.
securecomm 2025
:
395-412
[doi]
CUFT: Cuflow-Based Approach with Multi-headed Attention Mechanism for Encrypted Traffic Classification
Xin Zong
,
Min Luo 0002
,
Cong Peng 0005
,
Debiao He
.
securecomm 2025
:
23-40
[doi]
2022
Language and Platform Independent Attribution of Heterogeneous Code
Farzaneh Abazari
,
Enrico Branca
,
Evgeniya Novikova
,
Natalia Stakhanova
.
securecomm 2023
:
173-191
[doi]
SecureBERT: A Domain-Specific Language Model for Cybersecurity
Ehsan Aghaei
,
Xi Niu
,
Waseem G. Shadid
,
Ehab Al-Shaer
.
securecomm 2023
:
39-56
[doi]
Assessing the Quality of Differentially Private Synthetic Data for Intrusion Detection
Md Ali Reza Al Amin
,
Sachin Shetty
,
Valerio Formicola
,
Martin Otto
.
securecomm 2023
:
473-490
[doi]
Symmetrical Disguise: Realizing Homomorphic Encryption Services from Symmetric Primitives
Alexandros Bakas
,
Eugene Frimpong
,
Antonis Michalas
.
securecomm 2023
:
353-370
[doi]
An Evolutionary Learning Approach Towards the Open Challenge of IoT Device Identification
Jingfei Bian
,
Nan Yu
,
Hong Li
,
Hongsong Zhu
,
Qiang Wang
,
Limin Sun
.
securecomm 2023
:
20-38
[doi]
MetaPriv: Acting in Favor of Privacy on Social Media Platforms
Robert Cantaragiu
,
Antonis Michalas
,
Eugene Frimpong
,
Alexandros Bakas
.
securecomm 2023
:
692-709
[doi]
A Cross-layer Plausibly Deniable Encryption System for Mobile Devices
Niusen Chen
,
Bo Chen
,
Weisong Shi
.
securecomm 2023
:
150-169
[doi]
Classification-Based Anomaly Prediction in XACML Policies
Maryam Davari
,
Mohammad Zulkernine
.
securecomm 2023
:
3-19
[doi]
PII-PSM: A New Targeted Password Strength Meter Using Personally Identifiable Information
Qiying Dong
,
Ding Wang
,
Yaosheng Shen
,
Chunfu Jia
.
securecomm 2023
:
648-669
[doi]
Blockchain-Based Ciphertext Policy-Hiding Access Control Scheme
Ruizhong Du
,
Tianhe Zhang
.
securecomm 2023
:
272-289
[doi]
Research on the Grouping Method of Side-Channel Leakage Detection
Xiaoyi Duan
,
Ye Huang
,
Yonghua Su
,
Yujin Li
,
Xiaohong Fan
.
securecomm 2023
:
807-818
[doi]
Replicated Additive Secret Sharing with the Optimized Number of Shares
Juanjuan Guo
,
Mengjie Shuai
,
Qiongxiao Wang
,
Wenyuan Li
,
Jingqiang Lin
.
securecomm 2023
:
371-389
[doi]
DQR: A Double Q Learning Multi Agent Routing Protocol for Wireless Medical Sensor Network
Muhammad Shadi Hajar
,
Harsha K. Kalutarage
,
M. Omar Al-Kadri
.
securecomm 2023
:
611-629
[doi]
Detection and Privacy Leakage Analysis of Third-Party Libraries in Android Apps
Xiantong Hao
,
Dandan Ma
,
Hongliang Liang
.
securecomm 2023
:
569-587
[doi]
MAG-PUF: Magnetic Physical Unclonable Functions for Device Authentication in the IoT
Omar Adel Ibrahim
,
Savio Sciancalepore
,
Roberto Di Pietro
.
securecomm 2023
:
130-149
[doi]
Generic 2-Party PFE with Constant Rounds and Linear Active Security, and Efficient Instantiation
Hanyu Jia
,
Xiangxue Li
,
Qiang Li
,
Yue Bao
,
Xintian Hou
.
securecomm 2023
:
390-410
[doi]
Granting Access Privileges Using OpenID Connect in Permissioned Distributed Ledgers
Shohei Kakei
,
Yoshiaki Shiraishi
,
Shoichi Saito
.
securecomm 2023
:
290-308
[doi]
Silver Surfers on the Tech Wave: Privacy Analysis of Android Apps for the Elderly
Pranay Kapoor
,
Rohan Pagey
,
Mohammad Mannan
,
Amr M. Youssef
.
securecomm 2023
:
673-691
[doi]
What Data Do the Google Dialer and Messages Apps on Android Send to Google?
Douglas J. Leith
.
securecomm 2023
:
549-568
[doi]
Adversary for Social Good: Leveraging Attribute-Obfuscating Attack to Protect User Privacy on Social Networks
Xiaoting Li
,
Lingwei Chen
,
Dinghao Wu
.
securecomm 2023
:
710-728
[doi]
Coreference Resolution for Cybersecurity Entity: Towards Explicit, Comprehensive Cybersecurity Knowledge Graph with Low Redundancy
Zhengyu Liu
,
Haochen Su
,
Nannan Wang
,
Cheng Huang 0003
.
securecomm 2023
:
89-108
[doi]
A Random Reversible Watermarking Scheme for Relational Data
Qiang Liu
,
Hequ Xian
,
Jiancheng Zhang
,
Kunpeng Liu
.
securecomm 2023
:
413-430
[doi]
Another Lattice Attack Against ECDSA with the wNAF to Recover More Bits per Signature
ZiQiang Ma
,
Shuaigang Li
,
Jingqiang Lin
,
Quanwei Cai 0001
,
Shuqin Fan
,
Fan Zhang
,
Bo Luo
.
securecomm 2023
:
111-129
[doi]
Secure CV2X Using COTS Smartphones over LTE Infrastructure
Spandan Mahadevegowda
,
Ryan M. Gerdes
,
Thidapat Chantem
,
Rose Qingyang Hu
.
securecomm 2023
:
588-607
[doi]
FairBlock: Preventing Blockchain Front-Running with Minimal Overheads
Peyman Momeni
,
Sergey Gorbunov 0001
,
Bohan Zhang
.
securecomm 2023
:
250-271
[doi]
Hiatus: Unsupervised Generative Approach for Detection of DoS and DDoS Attacks
Sivaanandh Muneeswaran
,
Vinay Sachidananda
,
Rajendra Patil
,
Hongyi Peng
,
Mingchang Liu
,
Mohan Gurusamy
.
securecomm 2023
:
529-546
[doi]
AttackMiner: A Graph Neural Network Based Approach for Attack Detection from Audit Logs
Yuedong Pan
,
Lijun Cai
,
Tao Leng
,
Lixin Zhao
,
Jiangang Ma
,
Aimin Yu
,
Dan Meng
.
securecomm 2023
:
510-528
[doi]
Cost-Effective Malware Classification Based on Deep Active Learning
Qian Qiang
,
Yige Chen
,
Yang Hu
,
Tianning Zang
,
Mian Cheng
,
Quanbo Pan
,
Yu Ding
,
Zisen Qi
.
securecomm 2023
:
212-227
[doi]
A Generalized Unknown Malware Classification
Nanda Rani
,
Ayushi Mishra
,
Rahul Kumar
,
Sarbajit Ghosh
,
Sandeep K. Shukla
,
Priyanka Bagade
.
securecomm 2023
:
793-806
[doi]
Breaking Embedded Software Homogeneity with Protocol Mutations
Tongwei Ren
,
Ryan Williams
,
Sirshendu Ganguly
,
Lorenzo De Carli
,
Long Lu
.
securecomm 2023
:
770-790
[doi]
Message Recovery Attack of Kyber Based on Information Leakage in Decoding Operation
Mengyao Shi
,
Zhu Wang
,
Tingting Peng
,
FengHua Li
.
securecomm 2023
:
630-647
[doi]
Forensic Analysis and Detection of Spoofing Based Email Attack Using Memory Forensics and Machine Learning
Sanjeev Shukla
,
Manoj Misra
,
Gaurav Varshney
.
securecomm 2023
:
491-509
[doi]
Multi-relational Instruction Association Graph for Cross-Architecture Binary Similarity Comparison
Qige Song
,
Yongzheng Zhang
,
Shuhao Li
.
securecomm 2023
:
192-211
[doi]
TERSE: Tiny Encryptions and Really Speedy Execution for Post-Quantum Private Stream Aggregation
Jonathan Takeshita
,
Zachariah Carmichael
,
Ryan Karl
,
Taeho Jung
.
securecomm 2023
:
331-352
[doi]
Bootstrapping Trust in Community Repository Projects
Sangat Vaidya
,
Santiago Torres-Arias
,
Justin Cappos
,
Reza Curtmola
.
securecomm 2023
:
450-469
[doi]
CTDRB: Controllable Timed Data Release Using Blockchains
Jingzhe Wang
,
Balaji Palanisamy
.
securecomm 2023
:
231-249
[doi]
CapsITD: Malicious Insider Threat Detection Based on Capsule Neural Network
Haitao Xiao
,
Chen Zhang
,
Song Liu
,
Bo Jiang
,
Zhigang Lu
,
Fei Wang
,
Yuling Liu
.
securecomm 2023
:
57-71
[doi]
Enabling Accurate Data Recovery for Mobile Devices Against Malware Attacks
Wen Xie
,
Niusen Chen
,
Bo Chen
.
securecomm 2023
:
431-449
[doi]
PREFHE, PREFHE-AES and PREFHE-SGX: Secure Multiparty Computation Protocols from Fully Homomorphic Encryption and Proxy ReEncryption with AES and Intel SGX
Cavidan Yakupoglu
,
Kurt Rohloff
.
securecomm 2023
:
819-837
[doi]
Towards High Transferability on Neural Network for Black-Box Adversarial Attacks
Haochen Zhai
,
Futai Zou
,
Junhua Tang
,
Yue Wu 0010
.
securecomm 2023
:
72-88
[doi]
eSROP Attack: Leveraging Signal Handler to Implement Turing-Complete Attack Under CFI Defense
Tianning Zhang
,
Miao Cai
,
Diming Zhang
,
Hao Huang
.
securecomm 2023
:
752-769
[doi]
Decentralized and Efficient Blockchain Rewriting with Bi-level Validity Verification
Kemin Zhang
,
Li Yang
,
Lu Zhou
,
Jianfeng Ma
.
securecomm 2023
:
309-328
[doi]
No-Fuzz: Efficient Anti-fuzzing Techniques
Zhengxiang Zhou
,
Cong Wang 0001
,
Qingchuan Zhao
.
securecomm 2023
:
731-751
[doi]
2021
An Extensive Security Analysis on Ethereum Smart Contracts
Mohammadreza Ashouri
.
securecomm 2021
:
144-163
[doi]
Encouraging the Adoption of Post-Quantum Hybrid Key Exchange in Network Security
Alexandre Augusto Giron
.
securecomm 2021
:
363-371
[doi]
Phishing Web Page Detection with Semi-Supervised Deep Anomaly Detection
Linshu Ouyang
,
Yongzheng Zhang 0002
.
securecomm 2021
:
384-393
[doi]
Sign in
or
sign up
to see more results.