886 | -- | 901 | Bang Wu, Shuo Wang, Xingliang Yuan, Cong Wang 0001, Carsten Rudolph, Xiangwen Yang. Defeating Misclassification Attacks Against Transfer Learning |
902 | -- | 916 | Xiaohan Zhang 0001, Mi Zhang, Yuan Zhang 0009, Ming Zhong, Xin Zhang, Yinzhi Cao, Min Yang 0002. Slowing Down the Aging of Learning-Based Malware Detectors With API Knowledge |
917 | -- | 930 | Lei Zhao, Keyang Jiang, Yuncong Zhu, Lina Wang, Jiang Ming 0002. Capturing Invalid Input Manipulations for Memory Corruption Diagnosis |
931 | -- | 943 | Liang Xue, Dongxiao Liu, Jianbing Ni, Xiaodong Lin 0001, Xuemin Sherman Shen. Enabling Regulatory Compliance and Enforcement in Decentralized Anonymous Payment |
944 | -- | 959 | Barnana Baruah, Subhasish Dhal. A Security and Privacy Preserved Intelligent Vehicle Navigation System |
960 | -- | 974 | Xiaoguang Li, Haonan Yan, Zelei Cheng, Wenhai Sun, Hui Li 0006. Protecting Regression Models With Personalized Local Differential Privacy |
975 | -- | 987 | Davide Caputo, Francesco Pagano, Giovanni Bottino, Luca Verderame, Alessio Merlo. You Can't Always Get What You Want: Towards User-Controlled Privacy on Android |
988 | -- | 1001 | Yifeng Zheng, Shangqi Lai, Yi Liu 0057, Xingliang Yuan, Xun Yi, Cong Wang 0001. Aggregation Service for Federated Learning: An Efficient, Secure, and More Resilient Realization |
1002 | -- | 1016 | Rui Zhang, Zheng Yan 0002, Xuerui Wang, Robert H. Deng. VOLERE: Leakage Resilient User Authentication Based on Personal Voice Challenges |
1017 | -- | 1030 | Yinhao Xiao, Yizhen Jia, Xiuzhen Cheng 0001, Shengling Wang 0001, Jian Mao, Zhenkai Liang. I Know Your Social Network Accounts: A Novel Attack Architecture for Device-Identity Association |
1031 | -- | 1047 | Anum Khurshid, Sileshi Demesie Yalew, Mudassar Aslam, Shahid Raza. ShieLD: Shielding Cross-Zone Communication Within Limited-Resourced IoT Devices Running Vulnerable Software Stack |
1048 | -- | 1059 | Diana Laura Aguilar, Miguel Angel Medina-Pérez, Octavio Loyola-González, Kim-Kwang Raymond Choo, Edoardo Bucheli-Susarrey. Towards an Interpretable Autoencoder: A Decision-Tree-Based Autoencoder and its Application in Anomaly Detection |
1060 | -- | 1073 | Subhra Mazumdar 0001, Sushmita Ruj. CryptoMaze: Privacy-Preserving Splitting of Off-Chain Payments |
1074 | -- | 1087 | Hicham Hammouchi, Narjisse Nejjari, Ghita Mezzour, Mounir Ghogho, Houda Benbrahim. STRisk: A Socio-Technical Approach to Assess Hacking Breaches Risk |
1088 | -- | 1103 | Xuru Li, Daojing He, Yun Gao, Ximeng Liu, Sammy Chan, Manghan Pan, Kim-Kwang Raymond Choo. LIGHT: Lightweight Authentication for Intra Embedded Integrated Electronic Systems |
1104 | -- | 1123 | Tao Xue, Yu Wen, Bo Luo, Gang Li 0009, Yingjiu Li, Boyang Zhang, Yang Zheng, Yanfei Hu, Dan Meng. SparkAC: Fine-Grained Access Control in Spark for Secure Data Sharing and Analytics |
1124 | -- | 1138 | Majid Salehi, Luca Degani, Marco Roveri, Danny Hughes 0001, Bruno Crispo. Discovery and Identification of Memory Corruption Vulnerabilities on Bare-Metal Embedded Devices |
1139 | -- | 1153 | Ning Wang 0022, Yimin Chen, Yang Xiao 0010, Yang Hu, Wenjing Lou, Y. Thomas Hou. MANDA: On Adversarial Example Detection for Network Intrusion Detection System |
1154 | -- | 1168 | Jukka Soikkeli, Giuliano Casale, Luis Muñoz-González, Emil C. Lupu. Redundancy Planning for Cost Efficient Resilience to Cyber Attacks |
1169 | -- | 1185 | Yiming Wu, Zhiyuan Xie, Shouling Ji, Zhenguang Liu, Xuhong Zhang 0002, Changting Lin, ShuiGuang Deng, Jun Zhou 0011, Ting Wang 0006, Raheem Beyah. Fraud-Agents Detection in Online Microfinance: A Large-Scale Empirical Study |
1186 | -- | 1199 | Nan Sun, Jun Zhang 0010, Shang Gao 0003, Leo Yu Zhang, Seyit Camtepe, Yang Xiang 0001. Cyber Information Retrieval Through Pragmatics Understanding and Visualization |
1200 | -- | 1212 | Shahryar Baki, Rakesh M. Verma. Sixteen Years of Phishing User Studies: What Have We Learned? |
1213 | -- | 1227 | Xiaoying Zhang, Hong Xie 0004, Pei Yi, John C. S. Lui. Enhancing Sybil Detection via Social-Activity Networks: A Random Walk Approach |
1228 | -- | 1242 | Man Zhou, Qian Wang 0002, Xiu Lin, Yi Zhao, Peipei Jiang 0002, Qi Li 0002, Chao Shen 0001, Cong Wang 0001. PressPIN: Enabling Secure PIN Authentication on Mobile Devices via Structure-Borne Sounds |
1243 | -- | 1257 | Caiqin Dong, Jian Weng 0001, Jia-Nan Liu, Anjia Yang, Zhiquan Liu, Yaxi Yang, Jianfeng Ma 0001. Maliciously Secure and Efficient Large-Scale Genome-Wide Association Study With Multi-Party Computation |
1258 | -- | 1269 | Omar Basem, Abrar Ullah, Hani Ragab Hassen. Stick: An End-to-End Encryption Protocol Tailored for Social Network Platforms |
1270 | -- | 1285 | Soumyadeep Hore, Fariha Moomtaheen, Ankit Shah 0002, Xinming Ou. Towards Optimal Triage and Mitigation of Context-Sensitive Cyber Vulnerabilities |
1286 | -- | 1301 | Zhiguo Wan, Wei Liu, Hui Cui 0001. HIBEChain: A Hierarchical Identity-Based Blockchain System for Large-Scale IoT |
1302 | -- | 1318 | Wenjun Fan, Hsiang-Jen Hong, Jinoh Kim, Simeon Wuthier, Makiya Nakashima, Xiaobo Zhou 0002, Ching-Hua Chow, Sang-Yoon Chang. Lightweight and Identifier-Oblivious Engine for Cryptocurrency Networking Anomaly Detection |
1319 | -- | 1334 | Songnian Zhang, Suprio Ray, Rongxing Lu, Yandong Zheng, Yunguo Guan, Jun Shao. Towards Efficient and Privacy-Preserving User-Defined Skyline Query Over Single Cloud |
1335 | -- | 1347 | Zhiguo Wan, Yan Zhou, Kui Ren 0001. zk-AuthFeed: Protecting Data Feed to Smart Contracts With Authenticated Zero Knowledge Proof |
1348 | -- | 1363 | Songnian Zhang, Suprio Ray, Rongxing Lu, Yandong Zheng, Yunguo Guan, Jun Shao. Towards Efficient and Privacy-Preserving Interval Skyline Queries Over Time Series Data |
1364 | -- | 1377 | Hua Deng, Zheng Qin 0001, Qianhong Wu, Robert H. Deng, Zhenyu Guan, Yupeng Hu, Fangmin Li. Achieving Fine-Grained Data Sharing for Hierarchical Organizations in Clouds |
1378 | -- | 1389 | Radu Ciucanu, Anatole Delabrouille, Pascal Lafourcade 0001, Marta Soare. Secure Protocols for Best Arm Identification in Federated Stochastic Multi-Armed Bandits |
1390 | -- | 1402 | Lan Zhang, Peng Liu 0005, Yoon Ho Choi, Ping Chen. Semantics-Preserving Reinforcement Learning Attack Against Graph Neural Networks for Malware Detection |
1403 | -- | 1421 | David Megías, Daniel Lerch-Hostalot. Subsequent Embedding in Targeted Image Steganalysis: Theoretical Framework and Practical Applications |
1422 | -- | 1434 | Jin Cao, Tong Zhu, Ruhui Ma, Zhenyang Guo, Yinghui Zhang 0002, Hui Li 0006. A Software-Based Remote Attestation Scheme for Internet of Things Devices |
1435 | -- | 1449 | Guangsheng Zhang, Bo Liu 0001, Tianqing Zhu, Ming Ding 0001, Wanlei Zhou 0001. Label-Only Membership Inference Attacks and Defenses in Semantic Segmentation Models |
1450 | -- | 1460 | Chunyan Mu, David Clark 0001. Verifying Opacity Properties in Security Systems |
1461 | -- | 1475 | Cong Sun 0001, Yuwan Ma, Dongrui Zeng, Gang Tan, Siqi Ma, Yafei Wu. μDep: Mutation-Based Dependency Generation for Precise Taint Analysis on Android Native Code |
1476 | -- | 1487 | Songbin Li, Jingang Wang, Peng Liu 0046. Detection of Generative Linguistic Steganography Based on Explicit and Latent Text Word Relation Mining Using Deep Learning |
1488 | -- | 1499 | Pedro Reviriego, Alfonso Sánchez-Macián, Stefan Walzer, Elena Merino Gómez, Shanshan Liu, Fabrizio Lombardi. On the Privacy of Counting Bloom Filters |
1500 | -- | 1515 | Madhukrishna Priyadarsini, Padmalochan Bera, Sajal K. Das 0001, Mohammad Ashiqur Rahman. A Security Enforcement Framework for SDN Controller Using Game Theoretic Approach |
1516 | -- | 1528 | Samaneh Hosseini Moghaddam, Maghsoud Abbaspour. Friendship Preference: Scalable and Robust Category of Features for Social Bot Detection |
1529 | -- | 1540 | Patrik Rusnak, Elena Zaitseva, Frank P. A. Coolen, Miroslav Kvassay, Vitaly G. Levashenko. Logic Differential Calculus for Reliability Analysis Based on Survival Signature |
1541 | -- | 1558 | Pietro Tedeschi, Savio Sciancalepore, Roberto Di Pietro. PPCA - Privacy-Preserving Collision Avoidance for Autonomous Unmanned Aerial Vehicles |
1559 | -- | 1576 | Daniele Bringhenti, Guido Marchetto, Riccardo Sisto, Fulvio Valenza, Jalolliddin Yusupov. Automated Firewall Configuration in Virtual Networks |
1577 | -- | 1595 | Tuba Yavuz, Farhaan Fowze, Grant Hernandez, Ken Yihang Bai, Kevin R. B. Butler, Dave Jing Tian. ENCIDER: Detecting Timing and Cache Side Channels in SGX Enclaves and Cryptographic APIs |
1596 | -- | 1608 | Hannes Holm. Lore a Red Team Emulation Tool |
1609 | -- | 1623 | Yi He, Yacong Gu, Purui Su, Kun Sun 0001, Yajin Zhou, Zhi Wang 0004, Qi Li 0002. A Systematic Study of Android Non-SDK (Hidden) Service API Security |
1624 | -- | 1640 | Yafeng Wu, Yulai Xie, Xuelong Liao, Pan Zhou, Dan Feng 0001, Lin Wu, Xuan Li, Avani Wildani, Darrell D. E. Long. Paradise: Real-Time, Generalized, and Distributed Provenance-Based Intrusion Detection |
1641 | -- | 1655 | Menghao Zhang, Guanyu Li, Xiao Kong, Chang Liu, Mingwei Xu, Guofei Gu, Jianping Wu. NetHCF: Filtering Spoofed IP Traffic With Programmable Switches |
1656 | -- | 1674 | Bin Yuan, Yuhan Wu, Maogen Yang, Luyi Xing, Xuchang Wang, Deqing Zou, Hai Jin 0001. SmartPatch: Verifying the Authenticity of the Trigger-Event in the IoT Platform |
1675 | -- | 1686 | Pengfei Xia, Hongjing Niu, Ziqiang Li 0001, Bin Li 0025. Enhancing Backdoor Attacks With Multi-Level MMD Regularization |
1687 | -- | 1701 | Dan Liu, Qian Wang 0002, Man Zhou, Peipei Jiang 0002, Qi Li 0002, Chao Shen 0001, Cong Wang 0001. SoundID: Securing Mobile Two-Factor Authentication via Acoustic Signals |
1702 | -- | 1718 | Peipei Jiang 0002, Qian Wang 0002, Xiu Lin, Man Zhou, Wenbing Ding, Cong Wang 0001, Chao Shen 0001, Qi Li 0002. Securing Liveness Detection for Voice Authentication via Pop Noises |
1719 | -- | 1729 | Kisung Park 0002, JoonYoung Lee, Ashok Kumar Das, Youngho Park 0005. BPPS:Blockchain-Enabled Privacy-Preserving Scheme for Demand-Response Management in Smart Grid Environments |
1730 | -- | 1743 | Shangyu Xie, Yan Yan, Yuan Hong. Stealthy 3D Poisoning Attack on Video Recognition Models |
1744 | -- | 1755 | Yongdong Wu, Jian Weng 0001, Zhengxia Wang, Kaimin Wei, Jinming Wen, Junzuo Lai, Xin Li. Attacks and Countermeasures on Privacy-Preserving Biometric Authentication Schemes |
1756 | -- | 1770 | Mingxuan Liu, Zihan Zhang, Yiming Zhang 0009, Chao Zhang 0008, Zhou Li 0001, Qi Li 0002, Haixin Duan, Donghong Sun. Automatic Generation of Adversarial Readable Chinese Texts |