2864 | -- | 2872 | Chunpeng Ge, Willy Susilo, Joonsang Baek, Zhe Liu 0001, Jinyue Xia, Liming Fang 0001. Revocable Attribute-Based Encryption With Data Integrity in Clouds |
2873 | -- | 2889 | Jun Qiu, Xuewu Yang, Huamao Wu, Yajin Zhou, Jinku Li, Jianfeng Ma 0001. LibCapsule: Complete Confinement of Third-Party Libraries in Android Applications |
2890 | -- | 2906 | Ankur Chowdhary, Abdulhakim Sabur, Dijiang Huang, Myong H. Kang, James Kirby. Object Oriented Policy Conflict Checking Framework in Cloud Networks (OOPC) |
2907 | -- | 2919 | Chunpeng Ge, Willy Susilo, Joonsang Baek, Zhe Liu 0001, Jinyue Xia, Liming Fang 0001. A Verifiable and Fair Attribute-Based Proxy Re-Encryption Scheme for Data Sharing in Clouds |
2920 | -- | 2933 | Seema Kumar, Patrick Eugster, Silvia Santini. Software-Based Remote Network Attestation |
2934 | -- | 2951 | Zhen Liu 0008, Guomin Yang, Duncan S. Wong, Khoa Nguyen, Huaxiong Wang, Xiaorong Ke, Yining Liu. Secure Deterministic Wallet and Stealth Address: Key-Insulated and Privacy-Preserving Signature Scheme With Publicly Derived Public Key |
2952 | -- | 2964 | Cláudio Correia, Miguel Correia 0001, Luís Rodrigues 0001. Omega: A Secure Event Ordering Service for the Edge |
2965 | -- | 2981 | Zhuotao Liu, Yangxi Xiang, Jian Shi, Peng Gao 0008, Haoyu Wang 0001, Xusheng Xiao, Bihan Wen, Qi Li 0002, Yih-Chun Hu. Make Web3.0 Connected |
2982 | -- | 2997 | Xuejing Zhou, Wanli Peng, Boya Yang, Juan Wen, Yiming Xue, Ping Zhong. Linguistic Steganography Based on Adaptive Probability Distribution |
2998 | -- | 3010 | Bowen Wang, Kangjie Lu, Qiushi Wu, Aditya Pakki. Unleashing Coveraged-Based Fuzzing Through Comprehensive, Efficient, and Faithful Exploitable-Bug Exposing |
3011 | -- | 3023 | Chen Chen 0008, Roman Vitenberg, Hans-Arno Jacobsen. Building Fault-Tolerant Overlays With Low Node Degrees for Topic-Based Publish/Subscribe |
3024 | -- | 3037 | Hua Deng, Jixin Zhang, Zheng Qin 0001, Qianhong Wu, Hui Yin, Aniello Castiglione. Policy-Based Broadcast Access Authorization for Flexible Data Sharing in Clouds |
3038 | -- | 3054 | Yuefeng Du 0001, Huayi Duan, Anxin Zhou, Cong Wang 0001, Man Ho Au, Qian Wang 0002. Enabling Secure and Efficient Decentralized Storage Auditing With Blockchain |
3055 | -- | 3070 | Xinyu Wang 0007, Yuefeng Du 0001, Cong Wang 0001, Qian Wang 0002, Liming Fang 0001. WebEnclave: Protect Web Secrets From Browser Extensions With Software Enclave |
3071 | -- | 3086 | Mario Di Mauro, Giovanni Galatro, Fabio Postiglione, Marco Tambasco. Performability of Network Service Chains: Stochastic Modeling and Assessment of Softwarized IP Multimedia Subsystem |
3087 | -- | 3100 | Meng Ma, Weilan Lin, Disheng Pan, Ping Wang 0003. ServiceRank: Root Cause Identification of Anomaly in Large-Scale Microservice Architectures |
3101 | -- | 3112 | Jing Lei, Qingqi Pei, Yao Wang, Wenhai Sun, Xuefeng Liu 0002. PrivFace: Fast Privacy-Preserving Face Authentication With Revocable and Reusable Biometric Credentials |
3113 | -- | 3124 | Hwimin Kim, Dae-Kyoo Kim, Alaa S. Alaerjan. ABAC-Based Security Model for DDS |
3125 | -- | 3135 | Zhangjie Fu, Yueyan Zhi, Shouling Ji, Xingming Sun. Remote Attacks on Drones Vision Sensors: An Empirical Study |
3136 | -- | 3148 | Yinjin Fu, Nong Xiao, Tao Chen, Jian Wang. Fog-to-MultiCloud Cooperative Ehealth Data Management With Application-Aware Secure Deduplication |
3149 | -- | 3167 | Jiasi Weng, Jian Weng 0001, Chengjun Cai, Hongwei Huang, Cong Wang 0001. Golden Grain: Building a Secure and Decentralized Model Marketplace for MLaaS |
3168 | -- | 3182 | Jinrong Chen, Lin Liu, Rongmao Chen, Wei Peng 0005, Xinyi Huang 0001. SecRec: A Privacy-Preserving Method for the Context-Aware Recommendation System |
3183 | -- | 3199 | Hongwei Huang, Weiqi Luo, Guoqiang Zeng, Jian Weng 0001, Yue Zhang 0025, Anjia Yang. DAMIA: Leveraging Domain Adaptation as a Defense Against Membership Inference Attacks |
3200 | -- | 3217 | Lei Bu, Zhe Zhao, Yuchao Duan, Fu Song. Taking Care of the Discretization Problem: A Comprehensive Study of the Discretization Problem and a Black-Box Adversarial Attack in Discrete Integer Domain |
3218 | -- | 3230 | Qinchen Gu, David Formby, Shouling Ji, Brendan Saltaformaggio, Anu G. Bourgeois, Raheem Beyah. This Hacker Knows Physics: Device Physics Aware Mimicry Attacks in Cyber-Physical Systems |
3231 | -- | 3243 | Beilei Zheng, Jianan Gu, Jialun Wang, Chuliang Weng. CBA-Detector: A Self-Feedback Detector Against Cache-Based Attacks |
3244 | -- | 3256 | Himani Sikarwar, Debasis Das 0001. Towards Lightweight Authentication and Batch Verification Scheme in IoV |
3257 | -- | 3270 | Haoyu Ma, Jianwen Tian, Debin Gao, Chunfu Jia. On the Effectiveness of Using Graphics Interrupt as a Side Channel for User Behavior Snooping |
3271 | -- | 3285 | Haoyu Ma, Shijia Li, Debin Gao, Chunfu Jia. Secure Repackage-Proofing Framework for Android Apps Using Collatz Conjecture |
3286 | -- | 3300 | Jing Chen 0003, Xin Chen, Kun He 0008, RuiYing Du, Weihang Chen, Yang Xiang 0001. DELIA: Distributed Efficient Log Integrity Audit Based on Hierarchal Multi-Party State Channel |
3301 | -- | 3311 | Jing Chen 0003, Zeyi Zhan, Kun He 0008, RuiYing Du, Donghui Wang, Fei Liu. XAuth: Efficient Privacy-Preserving Cross-Domain Authentication |
3312 | -- | 3328 | Shaharyar Khan, Stuart E. Madnick. Cybersafety: A System-Theoretic Approach to Identify Cyber-Vulnerabilities & Mitigation Requirements in Industrial Control Systems |
3329 | -- | 3342 | Lingchen Zhao, Jianlin Jiang, Bo Feng, Qian Wang 0002, Chao Shen 0001, Qi Li 0002. SEAR: Secure and Efficient Aggregation for Byzantine-Robust Federated Learning |
3343 | -- | 3356 | Kejiang Chen, Hang Zhou 0007, Hanqing Zhao, Dongdong Chen 0001, Weiming Zhang, Nenghai Yu. Distribution-Preserving Steganography Based on Text-to-Speech Generative Models |
3357 | -- | 3370 | Chaoran Li, Xiao Chen 0002, Derui Wang, Sheng Wen, Muhammad Ejaz Ahmed, Seyit Camtepe, Yang Xiang 0001. Backdoor Attack on Machine Learning Based Android Malware Detectors |
3371 | -- | 3386 | Mohammadhossein Amouei, Mohsen Rezvani, Mansoor Fateh. RAT: Reinforcement-Learning-Driven and Adaptive Testing for Vulnerability Discovery in Web Application Firewalls |
3387 | -- | 3400 | Jingjing Zhang, Yingyao Rong, Jiannong Cao 0001, Chunming Rong, Jing Bian, Weigang Wu. DBFT: A Byzantine Fault Tolerance Protocol With Graceful Performance Degradation |
3401 | -- | 3416 | Yu Guo 0003, Hongcheng Xie, Cong Wang 0001, Xiaohua Jia. Enabling Privacy-Preserving Geographic Range Query in Fog-Enhanced IoT Services |
3417 | -- | 3431 | Sara Mohammadi, Frank Eliassen, Yan Zhang 0002, Hans-Arno Jacobsen. Detecting False Data Injection Attacks in Peer to Peer Energy Trading Using Machine Learning |
3432 | -- | 3447 | Ahmed Abusnaina, Mohammed Abuhamad, Hisham Alasmary, Afsah Anwar, RhongHo Jang, Saeed Salem, DaeHun Nyang, David Mohaisen. DL-FHMC: Deep Learning-Based Fine-Grained Hierarchical Learning Approach for Robust Malware Classification |
3448 | -- | 3463 | Huiying Hou, Jianting Ning, Yunlei Zhao, Robert H. Deng. Fine-Grained and Controllably Editable Data Sharing With Accountability in Cloud Storage |
3464 | -- | 3477 | Yen-Lin Lee, Deron Liang, Wei-Jen Wang. Optimal Online Liveness Fault Detection for Multilayer Cloud Computing Systems |
3478 | -- | 3493 | Yandong Zheng, Rongxing Lu, Yunguo Guan, Jun Shao, Hui Zhu 0001. Towards Practical and Privacy-Preserving Multi-Dimensional Range Query Over Cloud |
3494 | -- | 3507 | Shijie Jia 0001, Qionglu Zhang, Luning Xia, Jiwu Jing, Peng Liu 0005. MDEFTL: Incorporating Multi-Snapshot Plausible Deniability into Flash Translation Layer |
3508 | -- | 3520 | Haoyu Ma, Shijia Li, Debin Gao, Daoyuan Wu, Qiaowen Jia, Chunfu Jia. Active Warden Attack: On the (In)Effectiveness of Android App Repackage-Proofing |
3521 | -- | 3538 | Xi Xiao, Wentao Xiao, Rui Li 0042, Xiapu Luo, Haitao Zheng 0002, Shutao Xia. EBSNN: Extended Byte Segment Neural Network for Network Traffic Classification |
3539 | -- | 3545 | Pedro Reviriego, Alfonso Sánchez-Macián, Shanshan Liu, Fabrizio Lombardi. On the Security of the K Minimum Values (KMV) Sketch |
3546 | -- | 3563 | Jian Yang 0014, Qi Zhang, Xiaofeng Jiang, Shuangwu Chen, Feng Yang. Poirot: Causal Correlation Aided Semantic Analysis for Advanced Persistent Threat Detection |
3564 | -- | 3578 | Liming Fang 0001, Minghui Li, Zhe Liu 0001, Changting Lin, Shouling Ji, Anni Zhou, Willy Susilo, Chunpeng Ge. A Secure and Authenticated Mobile Payment Protocol Against Off-Site Attack Strategy |