501 | -- | 514 | Jianwei Liu 0008, Xiang Zou, Leqi Zhao, Yusheng Tao, Sideng Hu, Jinsong Han, Kui Ren 0001. Privacy Leakage in Wireless Charging |
515 | -- | 529 | Yinxing Xue, Jiaming Ye, Wei Zhang, Jun Sun 0001, Lei Ma 0003, Haijun Wang, Jianjun Zhao 0001. xFuzz: Machine Learning Guided Cross-Contract Fuzzing |
530 | -- | 541 | Qian Li 0024, Chao Shen 0001, Qingyuan Hu, Chenhao Lin, Xiang Ji, Saiyu Qi. Towards Gradient-Based Saliency Consensus Training for Adversarial Robustness |
542 | -- | 558 | Xiao Cheng 0002, Xu Nie, Ningke Li, Haoyu Wang 0001, Zheng Zheng 0001, Yulei Sui. How About Bug-Triggering Paths? - Understanding and Characterizing Learning-Based Vulnerability Detectors |
559 | -- | 572 | Wenbo Jiang, Tianwei Zhang 0004, Han Qiu 0001, Hongwei Li 0001, Guowen Xu. Incremental Learning, Incremental Backdoor Threats |
573 | -- | 584 | Pedro Miguel Sánchez Sánchez, Alberto Huertas Celdrán, Timo Schenk, Adrian Lars Benjamin Iten, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller. Studying the Robustness of Anti-Adversarial Federated Learning Models Detecting Cyberattacks in IoT Spectrum Sensors |
585 | -- | 599 | Qun Song 0001, Rui Tan 0001, Chao Ren 0006, Yan Xu 0005, Yang Lou, Jianping Wang 0001, Hoay Beng Gooi. On Credibility of Adversarial Examples Against Learning-Based Grid Voltage Stability Assessment |
600 | -- | 617 | Ge Ren, Jun Wu 0001, Gaolei Li, Shenghong Li 0001, Mohsen Guizani. Protecting Intellectual Property With Reliable Availability of Learning Models in AI-Based Cybersecurity Services |
618 | -- | 635 | Prithwiraj Roy, Shameek Bhattacharjee, Sahar Abedzadeh, Sajal K. Das 0001. Noise Resilient Learning for Attack Detection in Smart Grid PMU Infrastructure |
636 | -- | 649 | Han Fang, Yupeng Qiu, Guorui Qin, Jiyi Zhang, Kejiang Chen, Weiming Zhang 0001, Ee-Chien Chang. 2Dataset Protection by Data Poisoning |
650 | -- | 667 | Ping Wang, Haichang Gao, Xiaoyan Guo, Zhongni Yuan, Jiawei Nian. Improving the Security of Audio CAPTCHAs With Adversarial Examples |
668 | -- | 684 | Wenhan Xu, Hui Ma 0002, Zishuai Song, Jianhao Li, Rui Zhang 0002. Gringotts: An Encrypted Version Control System With Less Trust on Servers |
685 | -- | 700 | Wenbo Jiang, Hongwei Li 0001, Guowen Xu, Tianwei Zhang 0004, Rongxing Lu. A Comprehensive Defense Framework Against Model Extraction Attacks |
701 | -- | 716 | Shahid Khan 0002, Joost-Pieter Katoen, Marc Bouissou. A Compositional Semantics of Boolean-Logic Driven Markov Processes |
717 | -- | 731 | Di Zhang, Junqing Le, Xinyu Lei, Tao Xiang 0001, Xiaofeng Liao. Secure Redactable Blockchain With Dynamic Support |
732 | -- | 745 | Insup Lee 0002, Wonjun Lee 0001. UniQGAN: Towards Improved Modulation Classification With Adversarial Robustness Using Scalable Generator Design |
746 | -- | 763 | Cheng Guo 0001, Wenfeng Li, Xinyu Tang, Kim-Kwang Raymond Choo, Yining Liu 0002. Forward Private Verifiable Dynamic Searchable Symmetric Encryption With Efficient Conjunctive Query |
764 | -- | 774 | Linqing Gui, Weihao Zhou, Pinchang Zhang, Fu Xiao 0001. Cooperative Jamming-Aided Secure Communication in Wireless Powered Sensor Networks |
775 | -- | 788 | Zijian Zhang 0001, Xuyang Liu, Meng Li 0006, Hao Yin, Liehuang Zhu, Bakh Khoussainov, Keke Gai. HCA: Hashchain-Based Consensus Acceleration Via Re-Voting |
789 | -- | 803 | Yifeng Zheng, Menglun Zhou, Songlei Wang, Hejiao Huang, Xiaohua Jia, Xun Yi, Cong Wang 0001. SecDR: Enabling Secure, Efficient, and Accurate Data Recovery for Mobile Crowdsensing |
804 | -- | 818 | Roberto Pietrantuono, Massimo Ficco, Francesco Palmieri 0002. Testing the Resilience of MEC-Based IoT Applications Against Resource Exhaustion Attacks |
819 | -- | 827 | Jayson Sia, Edmond A. Jonckheere, Laith Shalalfeh, Paul Bogdan. Phasor Measurement Unit Change-Point Detection of Frequency Hurst Exponent Anomaly With Time-to-Event |
828 | -- | 846 | Cavit Özbay, Albert Levi. Blacklisting Based Anonymous Authentication Scheme for Sharing Economy |
847 | -- | 859 | Xiao Han 0001, Yuncong Yang, Leye Wang, Junjie Wu. Privacy-Preserving Network Embedding Against Private Link Inference Attacks |
860 | -- | 875 | Dan Zhu, Hui Zhu 0001, Cheng Huang 0001, Rongxing Lu, Dengguo Feng, Xuemin Shen. Efficient and Accurate Cloud-Assisted Medical Pre-Diagnosis With Privacy Preservation |
876 | -- | 888 | Jungang Yang 0002, Liyao Xiang, Pengzhi Chu, Xinbing Wang, Chenghu Zhou. Certified Distributional Robustness on Smoothed Classifiers |
889 | -- | 904 | Caiqin Dong, Jian Weng 0001, Ming Li 0049, Jia-Nan Liu, Zhiquan Liu, Yudan Cheng, Shui Yu 0001. Privacy-Preserving and Byzantine-Robust Federated Learning |
905 | -- | 919 | Yongzhong He, Yiming Wang, Sencun Zhu, Wei Wang, Yunjia Zhang, Qiang Li, Aimin Yu. Automatically Identifying CVE Affected Versions With Patches and Developer Logs |
920 | -- | 936 | Deqiang Li, Shicheng Cui, Yun Li 0009, Jia Xu 0003, Fu Xiao 0001, Shouhuai Xu. PAD: Towards Principled Adversarial Malware Detection Against Evasion Attacks |
937 | -- | 948 | Chunpeng Ge, Zhe Liu 0001, Willy Susilo, Liming Fang 0001, Hao Wang. Attribute-Based Encryption With Reliable Outsourced Decryption in Cloud Computing Using Smart Contract |
949 | -- | 960 | Chunpeng Ge, Willy Susilo, Zhe Liu 0001, Joonsang Baek, Xiapu Luo, Liming Fang 0001. Attribute-Based Proxy Re-Encryption With Direct Revocation Mechanism for Data Sharing in Clouds |
961 | -- | 974 | Yaxi Yang, Jian Weng 0001, Yao Tong, Jia-Nan Liu, Zhenghao Wu, Leo Yu Zhang, Anjia Yang. PriGenX: Privacy-Preserving Query With Anonymous Access Control for Genomic Data |
975 | -- | 986 | Renato Ferrero, Bartolomeo Montrucchio. Banknote Identification Through Unique Fluorescent Properties |
987 | -- | 1000 | Emanuele Maiorana, Chiara Romano, Emiliano Schena, Carlo Massaroni. BIOWISH: Biometric Recognition Using Wearable Inertial Sensors Detecting Heart Activity |