Journal: IEEE Trans. Dependable Sec. Comput.

Volume 20, Issue 6

4443 -- 4454Hongwei Shi, Shengling Wang 0001, Qin Hu 0001, Xiuzhen Cheng 0001. Black Swan in Blockchain: Micro Analysis of Natural Forking
4455 -- 4473Yansong Gao, Yang Su, Surya Nepal, Damith C. Ranasinghe. NoisFre: Noise-Tolerant Memory Fingerprints from Commodity Devices for Security Functions
4474 -- 4485Daniel Karapetyan, Gregory Z. Gutin. Solving the Workflow Satisfiability Problem Using General Purpose Solvers
4486 -- 4501Reo Eriguchi, Atsunori Ichikawa, Noboru Kunihiro, Koji Nuida. Efficient Noise Generation Protocols for Differentially Private Multiparty Computation
4502 -- 4518Yue Sun, Zhi Li 0018, Shichao Lv, Limin Sun. Spenny: Extensive ICS Protocol Reverse Analysis via Field Guided Symbolic Execution
4519 -- 4535Kaimeng Chen, Qingxiao Guan, Weiming Zhang 0001, Nenghai Yu. Reversible Data Hiding in Encrypted Images Based on Binary Symmetric Channel Model and Polar Code
4536 -- 4550Chao Lin, Xinyi Huang 0001, Jianting Ning, Debiao He. ACA: Anonymous, Confidential and Auditable Transaction Systems for Blockchain
4551 -- 4563Xiangrui Xu 0001, Pengrui Liu, Wei Wang 0012, Hongliang Ma, Bin Wang 0062, Zhen Han, Yufei Han. CGIR: Conditional Generative Instance Reconstruction Attacks Against Federated Learning
4564 -- 4577Guojun Chu, Jingyu Wang 0001, Qi Qi 0001, Haifeng Sun 0001, Shimin Tao, Hao Yang 0006, Jianxin Liao, Zhu Han 0001. Exploiting Spatial-Temporal Behavior Patterns for Fraud Detection in Telecom Networks
4578 -- 4592Lingling Lu, Zhenyu Wen, Ye Yuan 0001, Binru Dai, Peng Qian, Changting Lin, Qinming He, Zhenguang Liu, Jianhai Chen, Rajiv Ranjan 0001. iQuery: A Trustworthy and Scalable Blockchain Analytics Platform
4593 -- 4606Wenting Shen, Jia Yu 0005, Ming Yang 0023, Jiankun Hu. Efficient Identity-Based Data Integrity Auditing With Key-Exposure Resistance for Cloud Storage
4607 -- 4620Yehua Wei, Can Cheng, Guoqi Xie. OFIDS : Online Learning-Enabled and Fingerprint-Based Intrusion Detection System in Controller Area Networks
4621 -- 4636Kai Zhang 0016, Xiwen Wang, Jianting Ning, Mi Wen, Rongxing Lu. Multi-Client Boolean File Retrieval With Adaptable Authorization Switching for Secure Cloud Search Services
4637 -- 4647Kai Lehniger, Peter Langendörfer. Window Canaries: Re-Thinking Stack Canaries for Architectures With Register Windows
4648 -- 4663Jiajie Zhang, Bingsheng Zhang, Andrii Nastenko, Hamed Balogun, Roman Oliynykov. Privacy-Preserving Decision-Making Over Blockchain
4664 -- 4677Prashanth Krishnamurthy, Virinchi Roy Surabhi, Hammond Pearce, Ramesh Karri, Farshad Khorrami. Multi-Modal Side Channel Data Driven Golden-Free Detection of Software and Firmware Trojans
4678 -- 4689Anli Yan, Hongyang Yan, Li Hu, Xiaozhang Liu, Teng Huang. Holistic Implicit Factor Evaluation of Model Extraction Attacks
4690 -- 4701Yaru Liu, Hongcheng Li, Gang Huang, Wei Hua. OPUPO: Defending Against Membership Inference Attacks With Order-Preserving and Utility-Preserving Obfuscation
4702 -- 4718Mingze He, Hongxia Wang 0001, Fei Zhang, Sani M. Abdullahi, Ling Yang. Robust Blind Video Watermarking Against Geometric Deformations and Online Video Sharing Platform Processing
4719 -- 4732Jinglei Tan, Hui Jin, Hao Hu 0005, Ruiqin Hu, Hongqi Zhang, Hengwei Zhang. WF-MTD: Evolutionary Decision Method for Moving Target Defense Based on Wright-Fisher Process
4733 -- 4751Marta Bellés-Muñoz, Miguel Isabel, Jose Luis Muñoz-Tapia, Albert Rubio, Jordi Baylina Melé. Circom: A Circuit Description Language for Building Zero-Knowledge Applications
4752 -- 4762Wei Guo 0012, Benedetta Tondi, Mauro Barni. A Temporal Chrominance Trigger for Clean-Label Backdoor Attack Against Anti-Spoof Rebroadcast Detection
4763 -- 4777Yicheng Pan 0002, Meng Ma, Xinrui Jiang, Ping Wang 0003. DyCause: Crowdsourcing to Diagnose Microservice Kernel Failure
4778 -- 4792Pinchang Zhang, Yulin Teng, Yulong Shen, Xiaohong Jiang 0001, Fu Xiao 0001. Tag-Based PHY-Layer Authentication for RIS-Assisted Communication Systems
4793 -- 4809Florian Klaus Kaiser, Uriel Dardik, Aviad Elitzur, Polina Zilberman, Nir Daniel, Marcus Wiens, Frank Schultmann, Yuval Elovici, Rami Puzis. Attack Hypotheses Generation Based on Threat Intelligence Knowledge Graph
4810 -- 4822Zhuo Ma, Xinjing Liu, Yang Liu 0118, Ximeng Liu, Zhan Qin, Kui Ren 0001. DivTheft: An Ensemble Model Stealing Attack by Divide-and-Conquer
4823 -- 4837Yipeng Zhou, Xuezheng Liu, Yao Fu, Di Wu 0001, Jessie Hui Wang, Shui Yu 0001. Optimizing the Numbers of Queries and Replies in Convex Federated Learning With Differential Privacy
4838 -- 4852Chuan Ma, Jun Li 0004, Ming Ding 0001, Bo Liu 0001, Kang Wei, Jian Weng 0001, H. Vincent Poor. RDP-GAN: A Rényi-Differential Privacy Based Generative Adversarial Network
4853 -- 4867Ganapathy Mani, Marina Haliem, Bharat K. Bhargava, Indu Manickam, Kevin Kochpatcharin, Myeongsu Kim, Eric D. Vugrin, Weichao Wang, Chris Jenkins, Pelin Angin, Meng Yu. Machine Learning Based Resilience Testing of an Address Randomization Cyber Defense
4868 -- 4880Anand Agrawal, Urbi Chatterjee, Rajib Ranjan Maiti. CheckShake: Passively Detecting Anomaly in Wi-Fi Security Handshake Using Gradient Boosting Based Ensemble Learning
4881 -- 4898Siwon Huh, Myungkyu Shim, Jihwan Lee, Simon S. Woo, Hyoungshick Kim, Hojoon Lee 0001. DID We Miss Anything?: Towards Privacy-Preserving Decentralized ID Architecture
4899 -- 4912Enrico Russo, Gabriele Costa 0001, Giacomo Longo, Alessandro Armando, Alessio Merlo. LiDiTE: A Full-Fledged and Featherweight Digital Twin Framework
4913 -- 4927Tao Zhang 0063, Changqiao Xu, Bingchi Zhang, Xinran Li, Xiaohui Kuang, Luigi Alfredo Grieco. Towards Attack-Resistant Service Function Chain Migration: A Model-Based Adaptive Proximal Policy Optimization Approach
4928 -- 4945MingYang Song, Zhongyun Hua, Yifeng Zheng, Hejiao Huang, Xiaohua Jia. Blockchain-Based Deduplication and Integrity Auditing Over Encrypted Cloud Storage
4946 -- 4956Anton Wahrstätter, Jorão Gomes, Sajjad Khan, Davor Svetinovic. Improving Cryptocurrency Crime Detection: CoinJoin Community Detection Approach
4957 -- 4975Sanoop Mallissery, Kun-Yi Chiang, Chun-An Bau, Yu-Sung Wu. Pervasive Micro Information Flow Tracking
4976 -- 4992Ping Wang, Haichang Gao, Chenxuan Xiao, Xiaoyan Guo, Yipeng Gao, Yang Zi. Extended Research on the Security of Visual Reasoning CAPTCHA
4993 -- 5004Xueluan Gong, Ziyao Wang, Yanjiao Chen, Meng Xue, Qian Wang 0002, Chao Shen 0001. Kaleidoscope: Physical Backdoor Attacks Against Deep Neural Networks With RGB Filters
5005 -- 5023Xiangyun Tang, Meng Shen 0001, Qi Li 0002, Liehuang Zhu, Tengfei Xue, Qiang Qu. PILE: Robust Privacy-Preserving Federated Learning Via Verifiable Perturbations
5024 -- 5042Zhonghui Ge, Yi Zhang, Yu Long 0001, Dawu Gu. Magma: Robust and Flexible Multi-Party Payment Channel
5043 -- 5055Mingyan Xiao, Ming Li 0006, Jennifer Jie Zhang. Locally Differentially Private Personal Data Markets Using Contextual Dynamic Pricing Mechanism
5056 -- 5069Hui Zhang, Xuejun Li, Syh-Yuan Tan, Ming Jie Lee, Zhe Jin. Privacy-Preserving Biometric Authentication: Cryptanalysis and Countermeasures
5070 -- 5086Yahya Javed, Mosab A. Khayat, Ali A. Elghariani, Arif Ghafoor. PRISM: A Hierarchical Intrusion Detection Architecture for Large-Scale Cyber Networks
5087 -- 5101Zhuoran Ma, Jianfeng Ma 0001, Yinbin Miao, Ximeng Liu, Wei Zheng, Kim-Kwang Raymond Choo, Robert H. Deng. VerifyTL: Secure and Verifiable Collaborative Transfer Learning
5102 -- 5112Minxin Du, Peipei Jiang 0002, Qian Wang 0002, Sherman S. M. Chow, Lingchen Zhao. Shielding Graph for eXact Analytics With SGX
5113 -- 5129Xi Lin 0003, Jun Wu 0001, Jianhua Li 0001, Chao Sang, Shiyan Hu, M. Jamal Deen. Heterogeneous Differential-Private Federated Learning: Trading Privacy for Utility Truthfully
5130 -- 5142Lili Wang, Ye-Lin, Ting Yao, Hu Xiong, Kaitai Liang. FABRIC: Fast and Secure Unbounded Cross-System Encrypted Data Sharing in Cloud Computing
5143 -- 5155Wen Cheng, Dazou Sang, Lingfang Zeng, Yang Wang 0006, André Brinkmann. Tianji: Securing a Practical Asynchronous Multi-User ORAM
5156 -- 5167Sebastian Zillien, Steffen Wendzel. Weaknesses of Popular and Recent Covert Channel Detection Methods and a Remedy
5168 -- 5181Song Gao, Ruxin Wang 0002, Xiaoxuan Wang, Shui Yu 0001, Yunyun Dong, Shaowen Yao 0001, Wei Zhou 0011. Detecting Adversarial Examples on Deep Neural Networks With Mutual Information Neural Estimation
5182 -- 5196Chi Liu, Huajie Chen, Tianqing Zhu, Jun Zhang 0010, Wanlei Zhou 0001. Making DeepFakes More Spurious: Evading Deep Face Forgery Detection via Trace Removal Attack
5197 -- 5213Huanran Wang, Wu Yang 0001, Dapeng Man, Wei Wang 0076, Jiguang Lv. Anchor Link Prediction for Privacy Leakage via De-Anonymization in Multiple Social Networks
5214 -- 5229Peizhuo Lv, Pan Li, Shengzhi Zhang, Kai Chen 0012, Ruigang Liang, Hualong Ma, Yue Zhao 0018, Yingjiu Li. A Robustness-Assured White-Box Watermark in Neural Networks
5230 -- 5246Jun Zhou 0018, Guobin Gao, Zhenfu Cao, Kim-Kwang Raymond Choo, Xiaolei Dong. Lightweight Privacy-Preserving Distributed Recommender System Using Tag-Based Multikey Fully Homomorphic Data Encapsulation
5247 -- 5264Tiantian Zhu, Jinkai Yu, Chunlin Xiong, Wenrui Cheng, Qixuan Yuan, Jie Ying, Tieming Chen, Jiabo Zhang, Mingqi Lv, Yan Chen 0004, Ting Wang 0004, Yuan Fan. APTSHIELD: A Stable, Efficient and Real-Time APT Detection System for Linux Hosts
5265 -- 5277Hansong Du, Jiu-fen Liu, Xiangyang Luo, Yi Zhang 0026. Extraction Method of Secret Message Based on Optimal Hypothesis Test
5278 -- 5292Zhongyu Pei, Xingman Chen, Songtao Yang, Haixin Duan, Chao Zhang 0008. TAICHI: Transform Your Secret Exploits Into Mine From a Victim's Perspective
5293 -- 5311Yudan Cheng, Jianfeng Ma 0001, Zhiquan Liu, Zhetao Li, Yongdong Wu, Caiqin Dong, Runchuan Li. A Privacy-Preserving and Reputation-Based Truth Discovery Framework in Mobile Crowdsensing

Volume 20, Issue 5

3558 -- 3571Roberto De Prisco, Alfredo De Santis, Francesco Palmieri 0002. Improved Protocols for Distributed Secret Sharing
3572 -- 3587Ming Zhang, Zhe Sun, Hui Li 0006, Ben Niu 0001, FengHua Li, Zixu Zhang, Yuhang Xie, Chunhao Zheng. Go-Sharing: A Blockchain-Based Privacy-Preserving Framework for Cross-Social Network Photo Sharing
3588 -- 3600Shunbin Li, Zhiyu Wang, Ruyun Zhang, Chunming Wu 0001, Hanguang Luo. Mangling Rules Generation With Density-Based Clustering for Password Guessing
3601 -- 3616Yong Wang, Aiqing Zhang, Shu Wu, Shui Yu 0001. VOSA: Verifiable and Oblivious Secure Aggregation for Privacy-Preserving Federated Learning
3617 -- 3635Di Lu, Minqiang Shi, XinDi Ma, Ximeng Liu, Rui Guo, Tianfang Zheng, Yulong Shen, Xuewen Dong, Jianfeng Ma 0001. Smaug: A TEE-Assisted Secured SQLite for Embedded Systems
3636 -- 3652Shahnewaz Karim Sakib, George T. Amariucai, Yong Guan. ZeroProKeS: A Secure Zeroconf Key Establishment Protocol for Large-Scale Low-Cost Applications
3653 -- 3668PengYu Qiu, Xuhong Zhang 0002, Shouling Ji, Tianyu Du, Yuwen Pu, Jun Zhou 0011, Ting Wang 0006. Your Labels are Selling You Out: Relation Leaks in Vertical Federated Learning
3669 -- 3686Zhongyun Hua, Yanxiang Wang, Shuang Yi, Yifeng Zheng, Xingyu Liu, Yongyong Chen, Xinpeng Zhang 0001. Matrix-Based Secret Sharing for Reversible Data Hiding in Encrypted Images
3687 -- 3698Mahendra Rathor, Anirban Sengupta, Rahul Chaurasia, Aditya Anshul. Exploring Handwritten Signature Image Features for Hardware Security
3699 -- 3715Xinyu Li 0002, Jing Xu 0002, Lingyuan Yin, Yuan Lu 0001, Qiang Tang 0005, Zhenfeng Zhang. Escaping From Consensus: Instantly Redactable Blockchain Protocols in Permissionless Setting
3716 -- 3733Zhi Zhang 0001, Wei He, Yueqiang Cheng, Wenhao Wang 0001, Yansong Gao, Dongxi Liu, Kang Li, Surya Nepal, Anmin Fu, Yi Zou. Implicit Hammer: Cross-Privilege-Boundary Rowhammer Through Implicit Accesses
3734 -- 3752Gargi Mitra, Prasanna Karthik Vairam, Sandip Saha, Nitin Chandrachoodan, V. Kamakoti 0001. Snoopy: A Webpage Fingerprinting Framework With Finite Query Model for Mass-Surveillance
3753 -- 3769Giovanni Apruzzese, V. S. Subrahmanian. Mitigating Adversarial Gray-Box Attacks Against Phishing Detectors
3770 -- 3786Songnian Zhang, Suprio Ray, Rongxing Lu, Yunguo Guan, Yandong Zheng, Jun Shao 0001. Efficient and Privacy-Preserving Spatial Keyword Similarity Query Over Encrypted Data
3787 -- 3798Kejiang Chen, Hang Zhou 0007, Yaofei Wang, Menghan Li, Weiming Zhang 0001, Nenghai Yu. Cover Reproducible Steganography via Deep Generative Models
3799 -- 3808Hongyang Yan, Shuhao Li, Yajie Wang, Yaoyuan Zhang, Kashif Sharif, Haibo Hu 0001, Yuanzhang Li. Membership Inference Attacks Against Deep Learning Models via Logits Distribution
3809 -- 3827Yibing Liu, Lijun Huo, Jun Wu 0001, Mohsen Guizani. MRSA: Mask Random Array Protocol for Efficient Secure Handover Authentication in 5G HetNets
3828 -- 3844Sani M. Abdullahi, Ke Lv, Shuifa Sun, Hongxia Wang 0001. Cancelable Fingerprint Template Construction Using Vector Permutation and Shift-Ordering
3845 -- 3859Alán Rodrigo Díaz Rizo, Hassan Aboushady, Haralampos-G. Stratigopoulos. Leaking Wireless ICs via Hardware Trojan-Infected Synchronization
3860 -- 3872Hyunsoo Kwon, Sangtae Lee, Minjae Kim, Changhee Hahn, Junbeom Hur. Certificate Transparency With Enhanced Privacy
3873 -- 3889Haining Yang, Dengguo Feng, Jing Qin 0002. Efficient Verifiable Unbounded-Size Database From Authenticated Matrix Commitment
3890 -- 3909Zhaoteng Yan, Zhi Li 0018, Hong Li 0004, Shouguo Yang, Hongsong Zhu, Limin Sun. Internet-Scale Fingerprinting the Reusing and Rebranding IoT Devices in the Cyberspace
3910 -- 3926Mengmeng Yang, Ivan Tjuawinata, Kwok-Yan Lam, Tianqing Zhu, Jun Zhao 0007. Differentially Private Distributed Frequency Estimation
3927 -- 3939Fang Liu 0006, Xingyuan Zhao. Disclosure Risk From Homogeneity Attack in Differentially Privately Sanitized Frequency Distribution
3940 -- 3956Hong-Yen Tran, Jiankun Hu, Hemanshu R. Pota. A Privacy-Preserving State Estimation Scheme for Smart Grids
3957 -- 3969Khandakar Ashrafi Akbar, Yigong Wang, Gbadebo Ayoade, Yang Gao 0027, Anoop Singhal, Latifur Khan, Bhavani Thuraisingham, Kangkook Jee. Advanced Persistent Threat Detection Using Data Provenance and Metric Learning
3970 -- 3987Guangke Chen, Zhe Zhao, Fu Song, Sen Chen, Lingling Fan 0003, Feng Wang, Jiashui Wang. Towards Understanding and Mitigating Audio Adversarial Examples for Speaker Recognition
3988 -- 4001Mingwu Zhang, Yu Chen 0056, Willy Susilo. Decision Tree Evaluation on Sensitive Datasets for Secure e-Healthcare Systems
4002 -- 4015Vahid Pourahmadi, Hyame Assem Alameddine, Mohammad Ali Salahuddin 0001, Raouf Boutaba. Spotting Anomalies at the Edge: Outlier Exposure-Based Cross-Silo Federated Learning for DDoS Detection
4016 -- 4031Zhaopin Su, Mengke Li, Guofu Zhang, Qinfang Wu, Miqing Li, Weiming Zhang 0001, Xin Yao 0001. Robust Audio Copy-Move Forgery Detection Using Constant Q Spectral Sketches and GA-SVM
4032 -- 4051Safwa Ameer, James O. Benson, Ravi S. Sandhu. Hybrid Approaches (ABAC and RBAC) Toward Secure Access Control in Smart Home IoT
4052 -- 4069Dan Liu, Zheng Yan 0002, Wenxiu Ding, Yuxuan Cai, Yaxing Chen, Zhiguo Wan. ESMAC: Efficient and Secure Multi-Owner Access Control With TEE in Multi-Level Data Processing
4070 -- 4084Zhen Liu, Changzhen Hu, Chun Shan, Zheng Yan. ADCaDeM: A Novel Method of Calculating Attack Damage Based on Differential Manifolds
4085 -- 4100Haozhi Li, Tian Song, Yating Yang. Generic and Sensitive Anomaly Detection of Network Covert Timing Channels
4101 -- 4117Pengfei Wu, Jianting Ning, Xinyi Huang 0001, Joseph K. Liu. Differentially Oblivious Two-Party Pattern Matching With Sublinear Round Complexity
4118 -- 4134Zhili Zhou, Yuecheng Su, Jin Li 0002, Keping Yu, Q. M. Jonathan Wu, Zhangjie Fu, Yunqing Shi 0001. Secret-to-Image Reversible Transformation for Generative Steganography
4135 -- 4153Ardavan Bozorgi, Alireza Bahramali, Fatemeh Rezaei, Amirhossein Ghafari, Amir Houmansadr, Ramin Soltani, Dennis Goeckel, Don Towsley. I Still Know What You Did Last Summer: Inferring Sensitive User Activities on Messaging Applications Through Traffic Analysis
4154 -- 4168Jianyu Niu, Fangyu Gai, Runchao Han, Ren Zhang 0003, Yinqian Zhang, Chen Feng 0001. Crystal: Enhancing Blockchain Mining Transparency With Quorum Certificate
4169 -- 4187Milan Lopuhaä-Zwakenberg, Carlos E. Budde, Mariëlle Stoelinga. Efficient and Generic Algorithms for Quantitative Attack Tree Analysis
4188 -- 4198Yanjiao Chen, Zhicong Zheng, Xueluan Gong. MARNet: Backdoor Attacks Against Cooperative Multi-Agent Reinforcement Learning
4199 -- 4213Shuying Xu, Ji-Hwei Horng, Ching-Chun Chang, Chin-Chen Chang 0001. Reversible Data Hiding With Hierarchical Block Variable Length Coding for Cloud Security
4214 -- 4229Yang Xiao 0014, Zhuolin Xing, Alex X. Liu, Lei Bai 0001, Qingqi Pei, Lina Yao 0001. Cure-GNN: A Robust Curvature-Enhanced Graph Neural Network Against Adversarial Attacks
4230 -- 4244Zan Zhou 0001, Changqiao Xu, Ming-Ze Wang, Xiaohui Kuang, Yirong Zhuang, Shui Yu 0001. A Multi-Shuffler Framework to Establish Mutual Confidence for Secure Federated Learning
4245 -- 4257Chuan Zhang 0003, Chenfei Hu, Tong Wu 0011, Liehuang Zhu, Ximeng Liu. Achieving Efficient and Privacy-Preserving Neural Network Training and Prediction in Cloud Environments
4258 -- 4272Min Wang 0009, Song Wang 0003, Jiankun Hu. PolyCosGraph: A Privacy-Preserving Cancelable EEG Biometric System
4273 -- 4290Soumya Purohit, Roshan Neupane, Naga Ramya Bhamidipati, Varsha Vakkavanthula, Songjie Wang, Matthew Rockey, Prasad Calyam. Cyber Threat Intelligence Sharing for Co-Operative Defense in Multi-Domain Entities
4291 -- 4310Haonan Feng, Jingjing Guan, Hui Li 0070, Xuesong Pan, Ziming Zhao 0001. FIDO Gets Verified: A Formal Analysis of the Universal Authentication Framework Protocol
4311 -- 4324Haomeng Xie, Shufan Fei, Zheng Yan 0002, Yang Xiao 0010. SofitMix: A Secure Offchain-Supported Bitcoin-Compatible Mixing Protocol
4325 -- 4342Lei Zhou, Anmin Fu, Guomin Yang, Yansong Gao, Shui Yu 0001, Robert H. Deng. Fair Cloud Auditing Based on Blockchain for Resource-Constrained IoT Devices
4343 -- 4358Yuefeng Du 0001, Huayi Duan, Lei Xu 0019, Helei Cui, Cong Wang 0001, Qian Wang 0002. ${{\sf PEBA}}$: Enhancing User Privacy and Coverage of Safe Browsing Services
4359 -- 4371Qin Liu 0001, Yu Peng, Hongbo Jiang 0001, Jie Wu 0001, Tian Wang 0001, Tao Peng 0011, Guojun Wang 0001. SlimBox: Lightweight Packet Inspection over Encrypted Traffic
4372 -- 4386Xiaoyu Qiu, Wuhui Chen, Bingxin Tang, Junyuan Liang, Hong-Ning Dai, Zibin Zheng. A Distributed and Privacy-Aware High-Throughput Transaction Scheduling Approach for Scaling Blockchain
4387 -- 4402Yandong Zheng, Rongxing Lu, Songnian Zhang, Yunguo Guan, Fengwei Wang, Jun Shao 0001, Hui Zhu 0001. PRkNN: Efficient and Privacy-Preserving Reverse kNN Query Over Encrypted Data
4403 -- 4417Fulvio Valenza, Erisa Karafili, Rodrigo Vieira Steiner, Emil C. Lupu. A Hybrid Threat Model for Smart Systems
4418 -- 4433Guowen Xu, Xingshuo Han, Shengmin Xu, Tianwei Zhang 0004, Hongwei Li 0001, Xinyi Huang 0001, Robert H. Deng. Hercules: Boosting the Performance of Privacy-Preserving Federated Learning
4434 -- 4440Sergio Galán, Pedro Reviriego, Stefan Walzer, Alfonso Sánchez-Macián, Shanshan Liu 0001, Fabrizio Lombardi. On the Privacy of Counting Bloom Filters Under a Black-Box Attacker
4441 -- 4442Zhichao Yang 0002, Debiao He, Longjiang Qu, Jianqiao Xu. On the Security of a Lattice-Based Multi-Stage Secret Sharing Scheme

Volume 20, Issue 4

2674 -- 2676Zheng Zheng 0001, Lorenzo Strigini, Nuno Antunes, Kishor S. Trivedi. Editorial: Software Reliability and Dependability Engineering
2677 -- 2695Niranjhana Narayanan, Zitao Chen, Bo Fang, Guanpeng Li, Karthik Pattabiraman, Nathan DeBardeleben. Fault Injection for TensorFlow Applications
2696 -- 2712Xiaoting Du, Yulei Sui, Zhihao Liu, Jun Ai. An Empirical Study of Fault Triggers in Deep Learning Frameworks
2713 -- 2730Xiao-Yi Zhang 0005, Paolo Arcaini, Fuyuki Ishikawa. An Incremental Approach for Understanding Collision Avoidance of an Industrial Path Planner
2731 -- 2745Andrea Ceccarelli, Francesco Secci. RGB Cameras Failures and Their Effects in Autonomous Driving Applications
2746 -- 2761Guoping Rong, Hao Wang, Shenghui Gu, Yangchen Xu, Jialin Sun, Dong Shao, He Zhang 0001. Locating Anomaly Clues for Atypical Anomalous Services: An Industrial Exploration
2762 -- 2780Xiaoyun Li, Pengfei Chen 0002, Linxiao Jing, Zilong He, Guangba Yu. SwissLog: Robust Anomaly Detection and Localization for Interleaved Unstructured Logs
2781 -- 2793Jian Shi, Deqing Zou, Shouhuai Xu, Xianjun Deng, Hai Jin 0001. Does OpenBSD and Firefox's Security Improve With Time?
2794 -- 2810Khashayar Etemadi, Nicolas Harrand, Simon Larsén, Haris Adzemovic, Henry Luong Phu, Ashutosh Verma, Fernanda Madeiral, Douglas Wikström, Martin Monperrus. Sorald: Automatic Patch Suggestions for SonarQube Static Analysis Violations
2811 -- 2824Jing Bai 0009, Xiaolin Chang, Fumio Machida, Lili Jiang 0004, Zhen Han, Kishor S. Trivedi. Impact of Service Function Aging on the Dependability for MEC Service Function Chain
2825 -- 2835Hongfang Shi, Wenying Zhang, Zimin Zhang, Dewen Ding. Vulnerability Analysis of Chinese Digital Passwords Related to ATM PIN Using Deep Learning
2836 -- 2848Keyu Ji, Bingsheng Zhang, Tianpei Lu, Lichun Li, Kui Ren 0001. UC Secure Private Branching Program and Decision Tree Evaluation
2849 -- 2866Meng Li 0006, Yifei Chen, Chhagan Lal, Mauro Conti, Fabio Martinelli, Mamoun Alazab. Nereus: Anonymous and Secure Ride-Hailing Service Based on Private Smart Contracts
2867 -- 2881Kaidi Jin, Tianwei Zhang 0004, Chao Shen 0001, Yufei Chen 0001, Ming Fan 0002, Chenhao Lin, Ting Liu 0002. Can We Mitigate Backdoor Attack Using Adversarial Detection Methods?
2882 -- 2895Xin Chen, Liang Feng Zhang, Jing Liu. Verifiable Homomorphic Secret Sharing for Low Degree Polynomials
2896 -- 2912Jie Wang 0031, Xuemei Yin, Yifang Chen, Jiwu Huang, Xiangui Kang. An Adaptive IPM-Based HEVC Video Steganography via Minimizing Non-Additive Distortion
2913 -- 2924Weiwei Li, Mi Wen, Zhou Su, Kuan Zhang. Collusion Detection and Trust Management for Indoor Navigation System With Crowdsourcing
2925 -- 2938Kunli Lin, Wenqing Liu, Kun Zhang 0016, Bibo Tu. HyperPS: A Virtual-Machine Memory Protection Approach Through Hypervisor's Privilege Separation
2939 -- 2953Tianxi Ji, Erman Ayday, Emre Yilmaz, Pan Li 0001. Towards Robust Fingerprinting of Relational Databases by Mitigating Correlation Attacks
2954 -- 2969Boyu Kuang, Anmin Fu, Yansong Gao, Yuqing Zhang 0001, Jianying Zhou 0001, Robert H. Deng. FeSA: Automatic Federated Swarm Attestation on Dynamic Large-Scale IoT Devices
2970 -- 2987Chengzhe Lai, Yixiao Ma, Rongxing Lu, Yinghui Zhang 0002, Dong Zheng 0001. A Novel Authentication Scheme Supporting Multiple User Access for 5G and Beyond
2988 -- 3001Jie Cui 0004, Bei Li, Hong Zhong 0001, Yan Xu 0007, Lu Liu 0001. Achieving Revocable Attribute Group-Based Encryption for Mobile Cloud Data: A Multi-Proxy Assisted Approach
3002 -- 3018Meng Li 0006, Yifei Chen, Liehaung Zhu, Zijian Zhang 0001, Jianbing Ni, Chhagan Lal, Mauro Conti. Astraea: Anonymous and Secure Auditing Based on Private Smart Contracts for Donation Systems
3019 -- 3036Mengfei Xie, Yan Lin 0003, Chenke Luo, Guojun Peng, Jianming Fu. PointerScope: Understanding Pointer Patching for Code Randomization
3037 -- 3050Yunji Liang, Yuchen Qin, Qi Li, Xiaokai Yan, Luwen Huangfu, Sagar Samtani, Bin Guo 0001, Zhiwen Yu 0001. An Escalated Eavesdropping Attack on Mobile Devices via Low-Resolution Vibration Signals
3051 -- 3063Jun Li 0001, Devkishen Sisodia, Shad Stafford. On the Detection of Smart, Self-Propagating Internet Worms
3064 -- 3078Yong Xie, Gang Zeng, Ryo Kurachi, Fu Xiao 0001, Hiroaki Takada, Shiyan Hu. Timing Analysis of CAN FD for Security-Aware Automotive Cyber-Physical Systems
3079 -- 3092Yifeng Zheng, Cong Wang 0001, Ruochen Wang, Huayi Duan, Surya Nepal. Optimizing Secure Decision Tree Inference Outsourcing
3093 -- 3109Devon Callahan, Timothy Curry, Hazel Davidson, Heytem Zitoun, Benjamin Fuller 0001, Laurent Michel. FASHION: Functional and Attack Graph Secured HybrId Optimization of Virtualized Networks
3110 -- 3127Keerthi Nelaturu, Anastasia Mavridou, Emmanouela Stachtiari, Andreas G. Veneris, Aron Laszka. Correct-by-Design Interacting Smart Contracts and a Systematic Approach for Verifying ERC20 and ERC721 Contracts With VeriSolid
3128 -- 3143Federico Concone, Giuseppe Lo Re, Marco Morana, Sajal K. Das 0001. SpADe: Multi-Stage Spam Account Detection for Online Social Networks
3144 -- 3157Ming Gao, Yajie Liu, Yike Chen, Yimin Li, Zhongjie Ba, Xian Xu, Jinsong Han, Kui Ren 0001. Device-Independent Smartphone Eavesdropping Jointly Using Accelerometer and Gyroscope
3158 -- 3175Florian Skopik, Markus Wurzenberger, Georg Höld, Max Landauer, Walter Kuhn. Behavior-Based Anomaly Detection in Log Data of Physical Access Control Systems
3176 -- 3193Victor Youdom Kemmoe, Yongseok Kwon, Rasheed Hussain, Sunghyun Cho, Junggab Son. Leveraging Smart Contracts for Secure and Asynchronous Group Key Exchange Without Trusted Third Party
3194 -- 3207Zhuo Ma, Yang Liu 0118, Ximeng Liu, Jian Liu, Jianfeng Ma 0001, Kui Ren 0001. Learn to Forget: Machine Unlearning via Neuron Masking
3208 -- 3221Zeyu Mi, Zhi Guo, Fuqian Huang, Haibo Chen 0001. Hawkeye: Eliminating Kernel Address Leakage in Normal Data Flows
3222 -- 3237Guoxing Chen, Yinqian Zhang. Securing TEEs With Verifiable Execution Contracts
3238 -- 3250Zuobin Xiong, Zhipeng Cai 0001, Chunqiang Hu, Daniel Takabi, Wei Li 0059. Towards Neural Network-Based Communication System: Attack and Defense
3251 -- 3268HoJoon Lee, Chihyun Song, Brent ByungHoon Kang. Harnessing the x86 Intermediate Rings for Intra-Process Isolation
3269 -- 3286Servio Palacios, Aaron Ault, James V. Krogmeier, Bharat K. Bhargava, Christopher G. Brinton. AGAPECert: An Auditable, Generalized, Automated, Privacy-Enabling Certification Framework With Oblivious Smart Contracts
3287 -- 3298Lin Yao 0001, Zhaolong Zheng, Xin Wang 0001, Yujie Zeng, Guowei Wu. Detection of Cache Pollution Attack Based on Ensemble Learning in ICN-Based VANET
3299 -- 3316Yue Zheng, Wenye Liu, Chongyan Gu, Chip-Hong Chang. PUF-Based Mutual Authentication and Key Exchange Protocol for Peer-to-Peer IoT Applications
3317 -- 3327Lisandro Arturo Jimenez-Roa, Tom Heskes, Tiedo Tinga, Mariëlle Stoelinga. Automatic Inference of Fault Tree Models Via Multi-Objective Evolutionary Algorithms
3328 -- 3340Zhibo Wang 0001, Yuting Huang, Mengkai Song, Libing Wu, Feng Xue, Kui Ren 0001. Poisoning-Assisted Property Inference Attack Against Federated Learning
3341 -- 3357Yanjun Zhang, Guangdong Bai, Xue Li 0001, Surya Nepal, Marthie Grobler, Chen Chen 0056, Ryan K. L. Ko. Preserving Privacy for Distributed Genome-Wide Analysis Against Identity Tracing Attacks
3358 -- 3370Xiangyu Wang 0010, Jianfeng Ma 0001, Ximeng Liu, Yinbin Miao, Yang Liu 0118, Robert H. Deng. Forward/Backward and Content Private DSSE for Spatial Keyword Queries
3371 -- 3377Zhiyuan Lin, Mahesh Tripunitara. A Comparison of Four Notions of Isomorphism-Based Security for Graphs
3378 -- 3391Rajib Ranjan Maiti, Cheah Huei Yoong, Venkata Reddy Palleti, Arlindo Silva, Christopher M. Poskitt. Mitigating Adversarial Attacks on Data-Driven Invariant Checkers for Cyber-Physical Systems
3392 -- 3407Yi Ding 0003, Fuyuan Tan, Ji Geng 0001, Zhen Qin 0002, Mingsheng Cao, Kim-Kwang Raymond Choo, Zhiguang Qin. Interpreting Universal Adversarial Example Attacks on Image Classification Models
3408 -- 3420Jie Chen 0027, Xiaonan Hu, Dongyi Yi, Mamoun Alazab, Jianqiang Li 0001. A Variational AutoEncoder-Based Relational Model for Cost-Effective Automatic Medical Fraud Detection
3421 -- 3433Sean W. Caldwell, Ye Zhu 0001, Yong Guan, Riccardo Bettati. On Account Association With Assistance From Mobile Networks
3434 -- 3448Suyoung Lee, Wonho Song, Suman Jana, Meeyoung Cha, Sooel Son. Evaluating the Robustness of Trigger Set-Based Watermarks Embedded in Deep Neural Networks
3449 -- 3465Zhiwei Xu, Xin Wang 0001, Yujun Zhang. Towards Persistent Detection of DDoS Attacks in NDN: A Sketch-Based Approach
3466 -- 3482Max Landauer, Florian Skopik, Maximilian Frank, Wolfgang Hotwagner, Markus Wurzenberger, Andreas Rauber. Maintainable Log Datasets for Evaluation of Intrusion Detection Systems
3483 -- 3494Heng Ye, Qiang Zeng 0001, Jiqiang Liu, Xiaojiang Du, Wei Wang 0012. Easy Peasy: A New Handy Method for Pairing Multiple COTS IoT Devices
3495 -- 3507Maribel Fernández, Jenjira Jaimunk, Bhavani Thuraisingham. A Privacy-Preserving Architecture and Data-Sharing Model for Cloud-IoT Applications
3508 -- 3519Yuan-Yu Tsai, Hong-Lin Liu. Integrating Coordinate Transformation and Random Sampling Into High-Capacity Reversible Data Hiding in Encrypted Polygonal Models
3520 -- 3534João R. Campos, Ernesto Costa, Marco Vieira. Online Failure Prediction for Complex Systems: Methodology and Case Studies
3535 -- 3545Linyan Bai, Ching-Fang Hsu 0001, Lein Harn, Jianqun Cui, Zhuo Zhao. A Practical Lightweight Anonymous Authentication and Key Establishment Scheme for Resource-Asymmetric Smart Environments
3546 -- 3557Wenbing Zhao 0001. On Nxt Proof of Stake Algorithm: A Simulation Study

Volume 20, Issue 3

1771 -- 1788Yudan Cheng, Jianfeng Ma 0001, Zhiquan Liu, Yongdong Wu, Kaimin Wei, Caiqin Dong. A Lightweight Privacy Preservation Scheme With Efficient Reputation Management for Mobile Crowdsensing in Vehicular Networks
1789 -- 1798Yajie Wang, Kongyang Chen, Yu-an Tan 0001, Shuxin Huang, Wencong Ma, Yuanzhang Li. Stealthy and Flexible Trojan in Deep Learning Framework
1799 -- 1817Mir Ali Rezazadeh Baee, Leonie Simpson, Xavier Boyen, Ernest Foo, Josef Pieprzyk. ALI: Anonymous Lightweight Inter-Vehicle Broadcast Authentication With Encryption
1818 -- 1832Chao Lin, Xinyi Huang 0001, Debiao He. EBCPA: Efficient Blockchain-Based Conditional Privacy-Preserving Authentication for VANETs
1833 -- 1848Junchang Jing, Zhiyong Zhang 0002, Kim-Kwang Raymond Choo, Kefeng Fan, Bin Song 0007, Lili Zhang. Inference of User Desires to Spread Disinformation Based on Social Situation Analytics and Group Effect
1849 -- 1866Jinmeng Zhou, Tong Zhang, Wenbo Shen, Dongyoon Lee, Changhee Jung, Ahmed M. Azab, Ruowen Wang, Peng Ning, Kui Ren 0001. Automatic Permission Check Analysis for Linux Kernel
1867 -- 1881Fei Peng, Wen-Yan Jiang, Min Long, Keqin Li 0001. A Reversible Watermarking for 2D Engineering Graphics Based on Difference Expansion With Adaptive Interval Partitioning
1882 -- 1894Chen Chen 0043, Jingfeng Zhang, Xilie Xu, Lingjuan Lyu, Chaochao Chen 0001, Tianlei Hu, Gang Chen 0001. Decision Boundary-Aware Data Augmentation for Adversarial Training
1895 -- 1908Jakub Breier, Xiaolu Hou, Martín Ochoa, Jesus Solano. FooBaR: Fault Fooling Backdoor Attack on Neural Network Training
1909 -- 1926Alexander V. Outkin, Patricia V. Schulz, Timothy Schulz, Thomas D. Tarman, Ali Pinar. Defender Policy Evaluation and Resource Allocation With MITRE ATT&CK Evaluations Data
1927 -- 1940Lokendra Birla, Puneet Gupta 0002, Shravan Kumar. SUNRISE: Improving 3D Mask Face Anti-Spoofing for Short Videos Using Pre-Emptive Split and Merge
1941 -- 1958Jun Zhou 0018, Nan Wu, Yisong Wang, Shouzhen Gu, Zhenfu Cao, Xiaolei Dong, Kim-Kwang Raymond Choo. A Differentially Private Federated Learning Model Against Poisoning Attacks in Edge Computing
1959 -- 1978Chenggang Wu 0002, Mengyao Xie, Zhe Wang 0017, Yinqian Zhang, Kangjie Lu, Xiaofeng Zhang, Yuanming Lai, Yan Kang, Min Yang 0002, Tao Li 0022. Dancing With Wolves: An Intra-Process Isolation Technique With Privileged Hardware
1979 -- 1993Yunguo Guan, Rongxing Lu, Yandong Zheng, Songnian Zhang, Jun Shao 0001, Guiyi Wei. Achieving Efficient and Privacy-Preserving ($\alpha,\beta$α,β)-Core Query Over Bipartite Graphs in Cloud
1994 -- 2010Waleed A. Yousef, Issa Traoré, William Briguglio. Classifier Calibration: With Application to Threat Scores in Cybersecurity
2011 -- 2024Girraj Kumar Verma, Prosanta Gope, Neetesh Saxena, Neeraj Kumar 0001. CB-DA: Lightweight and Escrow-Free Certificate-Based Data Aggregation for Smart Grid
2025 -- 2039Yiling He, Yiping Li, Lei Wu 0012, Ziqi Yang, Kui Ren 0001, Zhan Qin. MsDroid: Identifying Malicious Snippets for Android Malware Detection
2040 -- 2057Xiaonan Zhang, Sihan Yu, Hansong Zhou, Pei Huang 0005, Linke Guo, Ming Li 0006. Signal Emulation Attack and Defense for Smart Home IoT
2058 -- 2070Yanli Ren, Zhuhuan Song, Shifeng Sun 0001, Joseph K. Liu, Guorui Feng. Outsourcing LDA-Based Face Recognition to an Untrusted Cloud
2071 -- 2084Yidan Hu, Xin Yao 0002, Rui Zhang 0007, Yanchao Zhang. Freshness Authentication for Outsourced Multi-Version Key-Value Stores
2085 -- 2096Puneet Gill, Werner Dietl, Mahesh Tripunitara. Least-Privilege Calls to Amazon Web Services
2097 -- 2110Yunguo Guan, Rongxing Lu, Yandong Zheng, Songnian Zhang, Jun Shao 0001, Guiyi Wei. Achieving Privacy-Preserving Discrete Fréchet Distance Range Queries
2111 -- 2126Yu Guo 0003, Chen Zhang, Cong Wang 0001, Xiaohua Jia. Towards Public Verifiable and Forward-Privacy Encrypted Search by Using Blockchain
2127 -- 2143Xinjun Pei, Xiaoheng Deng, Shengwei Tian, Lan Zhang 0005, Kaiping Xue. A Knowledge Transfer-Based Semi-Supervised Federated Learning for IoT Malware Detection
2144 -- 2157Li Hu, Jin Li 0002, Guanbiao Lin, Shiyu Peng, Zhenxin Zhang, Yingying Zhang, Changyu Dong. Defending Against Membership Inference Attacks With High Utility by GAN
2158 -- 2173Yuichi Sei, J. Andrew Onesimu, Hiroshi Okumura, Akihiko Ohsuga. Privacy-Preserving Collaborative Data Collection and Analysis With Many Missing Values
2174 -- 2187Zahraa Jawad Al Jady, Mehmet Hakan Karaata. Possibility and Impossibility of Propagation Safety and Reliability: A 1-Safe and Reliable Snap-Stabilizing Broadcast Algorithm
2188 -- 2207Yang Su, Michael Chesser, Yansong Gao, Alanson P. Sample, Damith C. Ranasinghe. Wisecr: Secure Simultaneous Code Dissemination to Many Batteryless Computational RFID Devices
2208 -- 2220Ta-Ching Yu, Chin-Hsien Wu, Yan-Qi Liao. CRRC: Coordinating Retention Errors, Read Disturb Errors and Huffman Coding on TLC NAND Flash Memory
2221 -- 2237Fei Chen 0003, Zixing Xiao, Tao Xiang, Junfeng Fan, Hong-Linh Truong 0001. A Full Lifecycle Authentication Scheme for Large-Scale Smart IoT Applications
2238 -- 2255Lihong Tang, Tingmin Wu, Xiao Chen 0002, Sheng Wen, Li Li 0029, Xin Xia 0001, Marthie Grobler, Yang Xiang 0001. How Does Visualisation Help App Practitioners Analyse Android Apps?
2256 -- 2273Elvira Albert, Shelly Grossman, Noam Rinetzky, Clara Rodríguez-Núñez, Albert Rubio, Mooly Sagiv. Relaxed Effective Callback Freedom: A Parametric Correctness Condition for Sequential Modules With Callbacks
2274 -- 2288Simone Soderi, Riccardo Colelli, Federico Turrin, Federica Pascucci, Mauro Conti. SENECAN: Secure KEy DistributioN OvEr CAN Through Watermarking and Jamming
2289 -- 2301Shang Gao 0006, Zhe Peng, Feng Tan, Yuanqing Zheng, Bin Xiao 0001. SymmeProof: Compact Zero-Knowledge Argument for Blockchain Confidential Transactions
2302 -- 2313Runhua Xu, Chao Li 0023, James Joshi. Blockchain-Based Transparency Framework for Privacy Preserving Third-Party Services
2314 -- 2327Chenhao Lin, Jingyi He, Chao Shen 0001, Qi Li 0002, Qian Wang 0002. CrossBehaAuth: Cross-Scenario Behavioral Biometrics Authentication Using Keystroke Dynamics
2328 -- 2340Zichi Wang, Guorui Feng, Liquan Shen, Xinpeng Zhang 0001. Cover Selection for Steganography Using Image Similarity
2341 -- 2347Lan Liu, Yi Wang, Gaoyang Liu, Kai Peng 0001, Chen Wang 0011. Membership Inference Attacks Against Machine Learning Models via Prediction Sensitivity
2348 -- 2359Peng Zhang 0029, Teng Huang, Xiaoqiang Sun, Wei Zhao, Hongwei Liu, Shangqi Lai, Joseph K. Liu. Privacy-Preserving and Outsourced Multi-Party K-Means Clustering Based on Multi-Key Fully Homomorphic Encryption
2360 -- 2374Yi Chen 0008, Zoran Salcic, Hongxia Wang 0001, Kim-Kwang Raymond Choo, Xuyun Zhang. NACA: A Joint Distortion-Based Non-Additive Cost Assignment Method for Video Steganography
2375 -- 2389Minglin Liu, Tingting Song, Weiqi Luo 0001, Peijia Zheng, Jiwu Huang. Adversarial Steganography Embedding via Stego Generation and Selection
2390 -- 2405Xiaojie Zhu, Erman Ayday, Roman Vitenberg. A Privacy-Preserving Framework for Conducting Genome-Wide Association Studies Over Outsourced Patient Data
2406 -- 2420Matthew Rogers, Phillip Weigand, Jassim Happa, Kasper Rasmussen. Detecting CAN Attacks on J1939 and NMEA 2000 Networks
2421 -- 2432Xiaoyi Pang, Zhibo Wang 0001, Zeqing He, Peng Sun 0003, Meng Luo, Ju Ren, Kui Ren 0001. Towards Class-Balanced Privacy Preserving Heterogeneous Model Aggregation
2433 -- 2449Wei Tong, Yinggang Tong, Chang Xia, Jingyu Hua, Qun Li, Sheng Zhong 0002. Understanding Location Privacy of the Point-of-Interest Aggregate Data via Practical Attacks and Defenses
2450 -- 2465Yinhao Xiao, Yizhen Jia, Qin Hu 0001, Xiuzhen Cheng 0001, Bei Gong, Jiguo Yu. CommandFence: A Novel Digital-Twin-Based Preventive Framework for Securing Smart Home Systems
2466 -- 2483Tao Jiang 0017, Xu Yuan, Yuan Chen, Ke Cheng, Liangmin Wang 0001, Xiaofeng Chen 0001, Jianfeng Ma 0001. FuzzyDedup: Secure Fuzzy Deduplication for Cloud Storage
2484 -- 2499Heng Pan, Zhenyu Li 0001, Penghao Zhang, Penglai Cui, Kavé Salamatian, Gaogang Xie. Misconfiguration-Free Compositional SDN for Cloud Networks
2500 -- 2515Pietro Tedeschi, Spiridon Bakiras, Roberto Di Pietro. SpreadMeNot: A Provably Secure and Privacy-Preserving Contact Tracing Protocol
2516 -- 2532Ala Altaweel, Radu Stoleru, Guofei Gu, Arnab Kumar Maity, Suman Bhunia. On Detecting Route Hijacking Attack in Opportunistic Mobile Networks
2533 -- 2546Hengzhi Wang, Yongjian Yang, En Wang, Xiulong Liu, Jingxiao Wei, Jie Wu 0001. Bilateral Privacy-Preserving Worker Selection in Spatial Crowdsourcing
2547 -- 2564Mordechai Guri. AIR-FI: Leaking Data From Air-Gapped Computers Using Wi-Fi Frequencies
2565 -- 2577Cheng Wang 0001, Songyao Chai, Hangyu Zhu, Changjun Jiang. CAeSaR: An Online Payment Anti-Fraud Integration System With Decision Explainability
2578 -- 2592Haoyang Wang 0005, Kai Fan 0001, Hongyan Chen, Qi Chen, Kuan Zhang, FengHua Li, Hui Li 0006, Yintang Yang. Joint Biological ID : A Secure and Efficient Lightweight Biometric Authentication Scheme
2593 -- 2606Shenghong He, Ruxin Wang 0002, Tongliang Liu, Chao Yi, Xin Jin 0005, RenYang Liu, Wei Zhou 0011. Type-I Generative Adversarial Attack
2607 -- 2624Yu Liang, Yi Xie 0002, Shensheng Tang, Shunzheng Yu, Xingcheng Liu, Jiankun Hu. Network Traffic Content Identification Based on Time-Scale Signal Modeling
2625 -- 2640Qian Mei, Minghao Yang, Jinhao Chen, Lili Wang, Hu Xiong. Expressive Data Sharing and Self-Controlled Fine-Grained Data Deletion in Cloud-Assisted IoT
2641 -- 2656XinDi Ma, Qi Jiang 0001, Ximeng Liu, Qingqi Pei, Jianfeng Ma 0001, Wenjing Lou. Learning in Your "Pocket": Secure Collaborative Deep Learning With Membership Privacy
2657 -- 2673Shunquan Tan, Qiushi Li, Laiyuan Li, Bin Li 0011, Jiwu Huang. STD-NET: Search of Image Steganalytic Deep-Learning Architecture via Hierarchical Tensor Decomposition

Volume 20, Issue 2

886 -- 901Bang Wu, Shuo Wang, Xingliang Yuan, Cong Wang 0001, Carsten Rudolph, Xiangwen Yang. Defeating Misclassification Attacks Against Transfer Learning
902 -- 916Xiaohan Zhang 0001, Mi Zhang, Yuan Zhang 0009, Ming Zhong, Xin Zhang, Yinzhi Cao, Min Yang 0002. Slowing Down the Aging of Learning-Based Malware Detectors With API Knowledge
917 -- 930Lei Zhao, Keyang Jiang, Yuncong Zhu, Lina Wang, Jiang Ming 0002. Capturing Invalid Input Manipulations for Memory Corruption Diagnosis
931 -- 943Liang Xue, Dongxiao Liu, Jianbing Ni, Xiaodong Lin 0001, Xuemin Sherman Shen. Enabling Regulatory Compliance and Enforcement in Decentralized Anonymous Payment
944 -- 959Barnana Baruah, Subhasish Dhal. A Security and Privacy Preserved Intelligent Vehicle Navigation System
960 -- 974Xiaoguang Li, Haonan Yan, Zelei Cheng, Wenhai Sun, Hui Li 0006. Protecting Regression Models With Personalized Local Differential Privacy
975 -- 987Davide Caputo, Francesco Pagano, Giovanni Bottino, Luca Verderame, Alessio Merlo. You Can't Always Get What You Want: Towards User-Controlled Privacy on Android
988 -- 1001Yifeng Zheng, Shangqi Lai, Yi Liu 0057, Xingliang Yuan, Xun Yi, Cong Wang 0001. Aggregation Service for Federated Learning: An Efficient, Secure, and More Resilient Realization
1002 -- 1016Rui Zhang, Zheng Yan 0002, Xuerui Wang, Robert H. Deng. VOLERE: Leakage Resilient User Authentication Based on Personal Voice Challenges
1017 -- 1030Yinhao Xiao, Yizhen Jia, Xiuzhen Cheng 0001, Shengling Wang 0001, Jian Mao, Zhenkai Liang. I Know Your Social Network Accounts: A Novel Attack Architecture for Device-Identity Association
1031 -- 1047Anum Khurshid, Sileshi Demesie Yalew, Mudassar Aslam, Shahid Raza. ShieLD: Shielding Cross-Zone Communication Within Limited-Resourced IoT Devices Running Vulnerable Software Stack
1048 -- 1059Diana Laura Aguilar, Miguel Angel Medina-Pérez, Octavio Loyola-González, Kim-Kwang Raymond Choo, Edoardo Bucheli-Susarrey. Towards an Interpretable Autoencoder: A Decision-Tree-Based Autoencoder and its Application in Anomaly Detection
1060 -- 1073Subhra Mazumdar 0001, Sushmita Ruj. CryptoMaze: Privacy-Preserving Splitting of Off-Chain Payments
1074 -- 1087Hicham Hammouchi, Narjisse Nejjari, Ghita Mezzour, Mounir Ghogho, Houda Benbrahim. STRisk: A Socio-Technical Approach to Assess Hacking Breaches Risk
1088 -- 1103Xuru Li, Daojing He, Yun Gao, Ximeng Liu, Sammy Chan, Manghan Pan, Kim-Kwang Raymond Choo. LIGHT: Lightweight Authentication for Intra Embedded Integrated Electronic Systems
1104 -- 1123Tao Xue, Yu Wen, Bo Luo, Gang Li 0009, Yingjiu Li, Boyang Zhang, Yang Zheng, Yanfei Hu, Dan Meng. SparkAC: Fine-Grained Access Control in Spark for Secure Data Sharing and Analytics
1124 -- 1138Majid Salehi, Luca Degani, Marco Roveri, Danny Hughes 0001, Bruno Crispo. Discovery and Identification of Memory Corruption Vulnerabilities on Bare-Metal Embedded Devices
1139 -- 1153Ning Wang 0022, Yimin Chen, Yang Xiao 0010, Yang Hu, Wenjing Lou, Y. Thomas Hou. MANDA: On Adversarial Example Detection for Network Intrusion Detection System
1154 -- 1168Jukka Soikkeli, Giuliano Casale, Luis Muñoz-González, Emil C. Lupu. Redundancy Planning for Cost Efficient Resilience to Cyber Attacks
1169 -- 1185Yiming Wu, Zhiyuan Xie, Shouling Ji, Zhenguang Liu, Xuhong Zhang 0002, Changting Lin, ShuiGuang Deng, Jun Zhou 0011, Ting Wang 0006, Raheem Beyah. Fraud-Agents Detection in Online Microfinance: A Large-Scale Empirical Study
1186 -- 1199Nan Sun, Jun Zhang 0010, Shang Gao 0003, Leo Yu Zhang, Seyit Camtepe, Yang Xiang 0001. Cyber Information Retrieval Through Pragmatics Understanding and Visualization
1200 -- 1212Shahryar Baki, Rakesh M. Verma. Sixteen Years of Phishing User Studies: What Have We Learned?
1213 -- 1227Xiaoying Zhang, Hong Xie 0004, Pei Yi, John C. S. Lui. Enhancing Sybil Detection via Social-Activity Networks: A Random Walk Approach
1228 -- 1242Man Zhou, Qian Wang 0002, Xiu Lin, Yi Zhao, Peipei Jiang 0002, Qi Li 0002, Chao Shen 0001, Cong Wang 0001. PressPIN: Enabling Secure PIN Authentication on Mobile Devices via Structure-Borne Sounds
1243 -- 1257Caiqin Dong, Jian Weng 0001, Jia-Nan Liu, Anjia Yang, Zhiquan Liu, Yaxi Yang, Jianfeng Ma 0001. Maliciously Secure and Efficient Large-Scale Genome-Wide Association Study With Multi-Party Computation
1258 -- 1269Omar Basem, Abrar Ullah, Hani Ragab Hassen. Stick: An End-to-End Encryption Protocol Tailored for Social Network Platforms
1270 -- 1285Soumyadeep Hore, Fariha Moomtaheen, Ankit Shah 0002, Xinming Ou. Towards Optimal Triage and Mitigation of Context-Sensitive Cyber Vulnerabilities
1286 -- 1301Zhiguo Wan, Wei Liu, Hui Cui 0001. HIBEChain: A Hierarchical Identity-Based Blockchain System for Large-Scale IoT
1302 -- 1318Wenjun Fan, Hsiang-Jen Hong, Jinoh Kim, Simeon Wuthier, Makiya Nakashima, Xiaobo Zhou 0002, Ching-Hua Chow, Sang-Yoon Chang. Lightweight and Identifier-Oblivious Engine for Cryptocurrency Networking Anomaly Detection
1319 -- 1334Songnian Zhang, Suprio Ray, Rongxing Lu, Yandong Zheng, Yunguo Guan, Jun Shao. Towards Efficient and Privacy-Preserving User-Defined Skyline Query Over Single Cloud
1335 -- 1347Zhiguo Wan, Yan Zhou, Kui Ren 0001. zk-AuthFeed: Protecting Data Feed to Smart Contracts With Authenticated Zero Knowledge Proof
1348 -- 1363Songnian Zhang, Suprio Ray, Rongxing Lu, Yandong Zheng, Yunguo Guan, Jun Shao. Towards Efficient and Privacy-Preserving Interval Skyline Queries Over Time Series Data
1364 -- 1377Hua Deng, Zheng Qin 0001, Qianhong Wu, Robert H. Deng, Zhenyu Guan, Yupeng Hu, Fangmin Li. Achieving Fine-Grained Data Sharing for Hierarchical Organizations in Clouds
1378 -- 1389Radu Ciucanu, Anatole Delabrouille, Pascal Lafourcade 0001, Marta Soare. Secure Protocols for Best Arm Identification in Federated Stochastic Multi-Armed Bandits
1390 -- 1402Lan Zhang, Peng Liu 0005, Yoon Ho Choi, Ping Chen. Semantics-Preserving Reinforcement Learning Attack Against Graph Neural Networks for Malware Detection
1403 -- 1421David Megías, Daniel Lerch-Hostalot. Subsequent Embedding in Targeted Image Steganalysis: Theoretical Framework and Practical Applications
1422 -- 1434Jin Cao, Tong Zhu, Ruhui Ma, Zhenyang Guo, Yinghui Zhang 0002, Hui Li 0006. A Software-Based Remote Attestation Scheme for Internet of Things Devices
1435 -- 1449Guangsheng Zhang, Bo Liu 0001, Tianqing Zhu, Ming Ding 0001, Wanlei Zhou 0001. Label-Only Membership Inference Attacks and Defenses in Semantic Segmentation Models
1450 -- 1460Chunyan Mu, David Clark 0001. Verifying Opacity Properties in Security Systems
1461 -- 1475Cong Sun 0001, Yuwan Ma, Dongrui Zeng, Gang Tan, Siqi Ma, Yafei Wu. μDep: Mutation-Based Dependency Generation for Precise Taint Analysis on Android Native Code
1476 -- 1487Songbin Li, Jingang Wang, Peng Liu 0046. Detection of Generative Linguistic Steganography Based on Explicit and Latent Text Word Relation Mining Using Deep Learning
1488 -- 1499Pedro Reviriego, Alfonso Sánchez-Macián, Stefan Walzer, Elena Merino Gómez, Shanshan Liu, Fabrizio Lombardi. On the Privacy of Counting Bloom Filters
1500 -- 1515Madhukrishna Priyadarsini, Padmalochan Bera, Sajal K. Das 0001, Mohammad Ashiqur Rahman. A Security Enforcement Framework for SDN Controller Using Game Theoretic Approach
1516 -- 1528Samaneh Hosseini Moghaddam, Maghsoud Abbaspour. Friendship Preference: Scalable and Robust Category of Features for Social Bot Detection
1529 -- 1540Patrik Rusnak, Elena Zaitseva, Frank P. A. Coolen, Miroslav Kvassay, Vitaly G. Levashenko. Logic Differential Calculus for Reliability Analysis Based on Survival Signature
1541 -- 1558Pietro Tedeschi, Savio Sciancalepore, Roberto Di Pietro. PPCA - Privacy-Preserving Collision Avoidance for Autonomous Unmanned Aerial Vehicles
1559 -- 1576Daniele Bringhenti, Guido Marchetto, Riccardo Sisto, Fulvio Valenza, Jalolliddin Yusupov. Automated Firewall Configuration in Virtual Networks
1577 -- 1595Tuba Yavuz, Farhaan Fowze, Grant Hernandez, Ken Yihang Bai, Kevin R. B. Butler, Dave Jing Tian. ENCIDER: Detecting Timing and Cache Side Channels in SGX Enclaves and Cryptographic APIs
1596 -- 1608Hannes Holm. Lore a Red Team Emulation Tool
1609 -- 1623Yi He, Yacong Gu, Purui Su, Kun Sun 0001, Yajin Zhou, Zhi Wang 0004, Qi Li 0002. A Systematic Study of Android Non-SDK (Hidden) Service API Security
1624 -- 1640Yafeng Wu, Yulai Xie, Xuelong Liao, Pan Zhou, Dan Feng 0001, Lin Wu, Xuan Li, Avani Wildani, Darrell D. E. Long. Paradise: Real-Time, Generalized, and Distributed Provenance-Based Intrusion Detection
1641 -- 1655Menghao Zhang, Guanyu Li, Xiao Kong, Chang Liu, Mingwei Xu, Guofei Gu, Jianping Wu. NetHCF: Filtering Spoofed IP Traffic With Programmable Switches
1656 -- 1674Bin Yuan, Yuhan Wu, Maogen Yang, Luyi Xing, Xuchang Wang, Deqing Zou, Hai Jin 0001. SmartPatch: Verifying the Authenticity of the Trigger-Event in the IoT Platform
1675 -- 1686Pengfei Xia, Hongjing Niu, Ziqiang Li 0001, Bin Li 0025. Enhancing Backdoor Attacks With Multi-Level MMD Regularization
1687 -- 1701Dan Liu, Qian Wang 0002, Man Zhou, Peipei Jiang 0002, Qi Li 0002, Chao Shen 0001, Cong Wang 0001. SoundID: Securing Mobile Two-Factor Authentication via Acoustic Signals
1702 -- 1718Peipei Jiang 0002, Qian Wang 0002, Xiu Lin, Man Zhou, Wenbing Ding, Cong Wang 0001, Chao Shen 0001, Qi Li 0002. Securing Liveness Detection for Voice Authentication via Pop Noises
1719 -- 1729Kisung Park 0002, JoonYoung Lee, Ashok Kumar Das, Youngho Park 0005. BPPS:Blockchain-Enabled Privacy-Preserving Scheme for Demand-Response Management in Smart Grid Environments
1730 -- 1743Shangyu Xie, Yan Yan, Yuan Hong. Stealthy 3D Poisoning Attack on Video Recognition Models
1744 -- 1755Yongdong Wu, Jian Weng 0001, Zhengxia Wang, Kaimin Wei, Jinming Wen, Junzuo Lai, Xin Li. Attacks and Countermeasures on Privacy-Preserving Biometric Authentication Schemes
1756 -- 1770Mingxuan Liu, Zihan Zhang, Yiming Zhang 0009, Chao Zhang 0008, Zhou Li 0001, Qi Li 0002, Haixin Duan, Donghong Sun. Automatic Generation of Adversarial Readable Chinese Texts

Volume 20, Issue 1

1 -- 16Abdulrahman Abu Elkhail, Nada Lachtar, Duha Ibdah, Rustam Aslam, Hamza Khan, Anys Bacha, Hafiz Malik. Seamlessly Safeguarding Data Against Ransomware Attacks
17 -- 35Qingqing Ye 0001, Haibo Hu 0001, Xiaofeng Meng 0001, Huadi Zheng, Kai Huang, Chengfang Fang, Jie Shi. PrivKVM*: Revisiting Key-Value Statistics Estimation With Local Differential Privacy
36 -- 52Changhee Hahn, Hodong Kim, Minjae Kim, Junbeom Hur. VerSA: Verifiable Secure Aggregation for Cross-Device Federated Learning
53 -- 67Shengmin Xu, Jianting Ning, Yingjiu Li, Yinghui Zhang 0002, Guowen Xu, Xinyi Huang 0001, Robert H. Deng. A Secure EMR Sharing System With Tamper Resistance and Expressive Access Control
68 -- 82Weibei Fan, Fu Xiao 0001, Jianxi Fan, Zhijie Han 0001, Lijuan Sun, Ruchuan Wang 0001. Fault-Tolerant Routing With Load Balancing in LeTQ Networks
83 -- 99Yan Zhou 0001, Murat Kantarcioglu, Bowei Xi. Exploring the Effect of Randomness on Transferability of Adversarial Samples Against Deep Neural Networks
100 -- 113Yanhua Du, Zijian Sun, HeSuan Hu. Security-Aware Collaboration Plan Recommendation for Dynamic Multiple Workflow Processes
114 -- 130Javad Ghareh Chamani, Yun Wang, Dimitrios Papadopoulos 0001, Mingyang Zhang, Rasool Jalili. Multi-User Dynamic Searchable Symmetric Encryption With Corrupted Participants
131 -- 146Mamunur Akand, Reihaneh Safavi-Naini, Marc Kneppers, Matthieu Giraud, Pascal Lafourcade 0001. Privacy-Preserving Proof-of-Location With Security Against Geo-Tampering
147 -- 160Jiqiang Gao, Boyu Hou, Xiaojie Guo 0004, Zheli Liu, Ying Zhang 0015, Kai Chen 0012, Jin Li 0002. Secure Aggregation is Insecure: Category Inference Attack on Federated Learning
161 -- 175Jide S. Edu, Xavier Ferrer Aran, Jose M. Such, Guillermo Suarez-Tangil. SkillVet: Automated Traceability Analysis of Amazon Alexa Skills
176 -- 192Saiyu Qi, Jianfeng Wang, Meixia Miao, Meng Zhang, Xiaofeng Chen 0001. TinyEnc: Enabling Compressed and Encrypted Big Data Stores With Rich Query Support
193 -- 208Qingxuan Wang, Ding Wang 0002, Chi Cheng, Debiao He. Quantum2FA: Efficient Quantum-Resistant Two-Factor Authentication Scheme for Mobile Devices
209 -- 224Haining Yu, Hongli Zhang 0001, Xiaohua Jia, Xiao Chen, Xiangzhan Yu. pSafety: Privacy-Preserving Safety Monitoring in Online Ride Hailing Services
225 -- 241Meng Li 0006, Yifei Chen, Chhagan Lal, Mauro Conti, Mamoun Alazab, Donghui Hu. Eunomia: Anonymous and Secure Vehicular Digital Forensics Based on Blockchain
242 -- 255Mohammad Reza Nosouhi, Shui Yu 0001, Keshav Sood, Marthie Grobler, Raja Jurdak, Ali Dorri, Shigen Shen. UCoin: An Efficient Privacy Preserving Scheme for Cryptocurrencies
256 -- 272Riccardo Pinciroli, Lishan Yang, Jacob Alter, Evgenia Smirni. Lifespan and Failures of SSDs and HDDs: Similarities, Differences, and Prediction Models
273 -- 287Dan Tang, Xiyin Wang, Xiong Li 0002, Pandi Vijayakumar, Neeraj Kumar 0001. AKN-FGD: Adaptive Kohonen Network Based Fine-Grained Detection of LDoS Attacks
288 -- 300Keshav Sood, Mohammad Reza Nosouhi, Neeraj Kumar 0001, Anuroop Gaddam, Bohao Feng, Shui Yu 0001. Accurate Detection of IoT Sensor Behaviors in Legitimate, Faulty and Compromised Scenarios
301 -- 312Joshua Morris, Sara Newman, Kannappan Palaniappan, Jianping Fan 0001, Dan Lin 0001. "Do You Know You Are Tracked by Photos That You Didn't Take": Large-Scale Location-Aware Multi-Party Image Privacy Protection
313 -- 330Mordechai Guri. POWER-SUPPLaY: Leaking Sensitive Data From Air-Gapped, Audio-Gapped Systems by Turning the Power Supplies into Speakers
331 -- 342Dahuin Jung, Ho Bae, Hyun Soo Choi, Sungroh Yoon. PixelSteganalysis: Pixel-Wise Hidden Information Removal With Low Visual Degradation
343 -- 359Jian Lin 0007, Dingding Wang 0003, Rui Chang, Lei Wu 0012, Yajin Zhou, Kui Ren 0001. EnBinDiff: Identifying Data-Only Patches for Binaries
360 -- 376Wei Liu, Zhiguo Wan, Jun Shao, Yong Yu 0002. HyperMaze: Towards Privacy-Preserving and Scalable Permissioned Blockchain
377 -- 391Xinliang Miao, Rui Chang, Jianhong Zhao, Yongwang Zhao, Shuang Cao, Tao Wei, Liehui Jiang, Kui Ren 0001. CVTEE: A Compatible Verified TEE Architecture With Enhanced Security
392 -- 406Daniele Cono D'Elia, Simone Nicchi, Matteo Mariani, Matteo Marini, Federico Palmaro. Designing Robust API Monitoring Solutions
407 -- 421Jingjing Zhang, Yongjie Ye, Weigang Wu, Xiapu Luo. Boros: Secure and Efficient Off-Blockchain Transactions via Payment Channel Hub
422 -- 436Lu Wei 0003, Jie Cui 0004, Hong Zhong 0001, Irina Bolodurina, Lu Liu 0001. A Lightweight and Conditional Privacy-Preserving Authenticated Key Agreement Scheme With Multi-TA Model for Fog-Based VANETs
437 -- 450Xingyu Li, Zhe Qu, Shangqing Zhao, Bo Tang, Zhuo Lu, Yao Liu 0007. LoMar: A Local Defense Against Poisoning Attack on Federated Learning
451 -- 462Miguel Villarreal-Vasquez, Gaspar Modelo-Howard, Simant Dube, Bharat K. Bhargava. Hunting for Insider Threats Using LSTM-Based Anomaly Detection
463 -- 477Ziqing Huang, Zhenjun Tang, Xianquan Zhang, Linlin Ruan, Xinpeng Zhang 0001. Perceptual Image Hashing With Locality Preserving Projection for Copy Detection
478 -- 491Zongpu Zhang, Hubin Zhang, Junyuan Wang, Xiaokang Hu, Jian Li 0021, Wenqian Yu, Ping Yu, Weigang Li 0002, Bo Cui, Guodong Zhu, Kapil Sood, Brian Will, Haibing Guan. QKPT: Securing Your Private Keys in Cloud With Performance, Scalability and Transparency
492 -- 505Rui Zhang, Lei Zhang 0009, Kim-Kwang Raymond Choo, Tong Chen. Dynamic Authenticated Asymmetric Group Key Agreement With Sender Non-Repudiation and Privacy for Group-Oriented Applications
506 -- 521Farzaneh Abazari, Enrico Branca, Norah Ridley, Natalia Stakhanova, Mila Dalla Preda. Dataset Characteristics for Reliable Code Authorship Attribution
522 -- 538Wenhao Wang 0001, Weijie Liu 0004, Hongbo Chen, Xiaofeng Wang 0001, Hongliang Tian, Dongdai Lin. Trust Beyond Border: Lightweight, Verifiable User Isolation for Protecting In-Enclave Services
539 -- 550Josep Domingo-Ferrer, Jesús A. Manjón. Circuit-Free General-Purpose Multi-Party Computation via Co-Utile Unlinkable Outsourcing
551 -- 562Zhicong Huang, Cheng Hong, Chenkai Weng, Wen-Jie Lu, Hunter Qu. More Efficient Secure Matrix Multiplication for Unbalanced Recommender Systems
563 -- 573Ermeson C. Andrade, Roberto Pietrantuono, Fumio Machida, Domenico Cotroneo. A Comparative Analysis of Software Aging in Image Classifiers on Cloud and Edge
574 -- 589Zhenyu Ning, Chenxu Wang, Yinhua Chen, Fengwei Zhang, Jiannong Cao 0001. Revisiting ARM Debugging Features: Nailgun and its Defense
590 -- 605David R. Matos, Miguel L. Pardal, Miguel Correia 0001. Sanare: Pluggable Intrusion Recovery for Web Applications
606 -- 619Zhonghao Li, Xinghao Jiang, Yi Dong, Laijin Meng, Tanfeng Sun. An Anti-Steganalysis HEVC Video Steganography With High Performance Based on CNN and PU Partition Modes
620 -- 636Xiaoning Liu, Yifeng Zheng, Xingliang Yuan, Xun Yi. Securely Outsourcing Neural Network Inference to the Cloud With Lightweight Techniques
637 -- 649Qiuye He, Song Fang, Tao Wang 0026, Yao Liu 0007, Shangqing Zhao, Zhuo Lu. Proactive Anti-Eavesdropping With Trap Deployment in Wireless Networks
650 -- 664Ling Jin, Yinzhi Cao, Yan Chen 0004, Di Zhang, Simone Campanoni. ExGen: Cross-platform, Automated Exploit Generation for Smart Contract Vulnerabilities
665 -- 679Yanzhen Ren, Dengkai Liu, Chenyu Liu, Qiaochu Xiong, Jianming Fu, Lina Wang. A Universal Audio Steganalysis Scheme Based on Multiscale Spectrograms and DeepResNet
680 -- 694Xixun Yu, Hui Bai, Zheng Yan 0002, Rui Zhang 0007. VeriDedup: A Verifiable Cloud Data Deduplication Scheme With Integrity and Duplication Proof
695 -- 707Alexei Iliasov, Dominic Taylor, Linas Laibinis, Alexander B. Romanovsky. Practical Verification of Railway Signalling Programs
708 -- 723Huayi Duan, Yuefeng Du 0001, Leqian Zheng, Cong Wang 0001, Man Ho Au, Qian Wang 0002. Towards Practical Auditing of Dynamic Data in Decentralized Storage
724 -- 739Abdullah Alsaedi, Zahir Tari, Md. Redowan Mahmud, Nour Moustafa, Abdun Mahmood, Adnan Anwar. USMD: UnSupervised Misbehaviour Detection for Multi-Sensor Data
740 -- 757Teng Li 0003, Ya Jiang, Chi Lin, Mohammad S. Obaidat, Yulong Shen, Jianfeng Ma 0001. DeepAG: Attack Graph Construction and Threats Prediction With Bi-Directional Deep Learning
758 -- 768Kanghua Mo, Weixuan Tang, Jin Li 0002, Xu Yuan. Attacking Deep Reinforcement Learning With Decoupled Adversarial Policy
769 -- 783Yi Dong, Xinghao Jiang, Zhaohong Li, Tanfeng Sun, Peisong He. Adaptive HEVC Steganography Based on Steganographic Compression Efficiency Degradation Model
784 -- 796Jianwei Liu, Chaowei Xiao, Kaiyan Cui, Jinsong Han, Xian Xu, Kui Ren 0001. Behavior Privacy Preserving in RF Sensing
797 -- 812Kaustabha Ray, Ansuman Banerjee. Prioritized Fault Recovery Strategies for Multi-Access Edge Computing Using Probabilistic Model Checking
813 -- 826Wenxin Chen, Yingfei Dong, Zhenhai Duan. DPM: Towards Accurate Drone Position Manipulation
827 -- 840Bowen Tang, Chenggang Wu 0002, Zhe Wang 0017, Lichen Jia, Pen-Chung Yew, Yueqiang Cheng, Yinqian Zhang, Chenxi Wang, Guoqing Harry Xu. SpecBox: A Label-Based Transparent Speculation Scheme Against Transient Execution Attacks
841 -- 858Maanak Gupta, Ravi S. Sandhu, Tanjila Mawla, James Benson. Reachability Analysis for Attributes in ABAC With Group Hierarchy
859 -- 866Ashima Anand, Amit Kumar Singh 0001. Dual Watermarking for Security of COVID-19 Patient Record
867 -- 885Chuntao Dong, Qingni Shen, Xuhua Ding, Daoqing Yu, Wu Luo, Pengfei Wu, Zhonghai Wu. T-Counter: Trustworthy and Efficient CPU Resource Measurement Using SGX in the Cloud