Abstract is missing.
- Enhancing Permissioned Blockchains with Controlled Data AuthorizationQichang Liu, Xufeng Zhang 0002, Sisi Duan, Haibin Zhang. 3-23 [doi]
- FXChain: A Multi-consortium Permissioned Blockchain with Flexible Privacy-Preserving StrategiesZenan Lou, Na Ruan, Yuxiang Cai. 24-43 [doi]
- Efficient Vulnerability Detection for Smart Contracts Using Gated Graph Neural NetworkYiwen Zhai, Jia Yang, Mingwu Zhang. 44-63 [doi]
- Lightweight Instance Batch Schemes Towards Prover-Efficient Decentralized Private ComputationZiyu Meng, Zibo Zhou, Zongyang Zhang, Yu Jin. 64-83 [doi]
- CrossAAD: Cross-Chain Abnormal Account DetectionYong Lin, Peng Jiang, Fuchun Guo, Liehuang Zhu. 84-104 [doi]
- AegisDB: Scalable Blockchain Database with Secure Decentralised Load BalancingJun Zhao, Jiangshan Yu, Xingliang Yuan, Joseph K. Liu. 105-119 [doi]
- Towards Scalable and Secure IoTs Transactions: A New Bi-directional Payment Channel Without Third-Party MonitoringZuobin Ying, Qingao Ding, Wenqi Li, Shengmin Xu, Jinbo Xiong. 120-139 [doi]
- Understanding Privacy in Smart Speakers: A Narrative ReviewAbdulrhman Alorini, Abdullah Bin Sawad, Sultan Alharbi, Kiran Ijaz, Mukesh Prasad, Ahmet Baki Kocaballi. 143-157 [doi]
- R-PPDFL: A Robust and Privacy-Preserving Decentralized Federated Learning SystemTao Chen, Xiaofen Wang, Hong-Ning Dai. 158-173 [doi]
- FedSCD: Federated Learning with Semi-centralization, Discrepancy-Awareness and Dual-Model CollaborationChangji Wang, Canjie Pan, Qingqing Gan, Zhen Liu, Ning Liu, Jingjing Zhang. 174-192 [doi]
- Pirates: Anonymous Group Calls over Fully Untrusted InfrastructureChristoph Coijanovic, Akim Stark, Daniel Schadt, Thorsten Strufe. 193-212 [doi]
- SecuPath: A Secure and Privacy-Preserving Multiparty Path Planning Framework in UAV ApplicationsYanjun Shen, Joseph K. Liu, Xingliang Yuan, Shifeng Sun 0001, Hui Cui 0001. 213-232 [doi]
- TS-HMD: Explainable Deep Learning for Time Series HPCs Based IoT Malware DetectionXiangyi Wang, Jian Zhang, Zheng Meng. 235-255 [doi]
- Security Research for Android Remote Assistance AppsLiwei Wang, Xiaofeng Liu 0013, Ting Lei, Wenna Song, Shanqing Guo, Pengcheng Ren. 256-276 [doi]
- SynBoost: Robust Text Generation Model via Beam Search and Synonym-Driven BoostingDepeng Chen, Mengdie Xia, Jie Cui. 277-287 [doi]
- CCE&D: A Configuration Failure Prevention Method for Autonomous Driving SystemsYanqiu Zhang, Xiao Yu, Jinzhao Liu, Li Zhang, Yuanzhang Li, yuan Tan. 288-302 [doi]
- Action-Driven UAV Fingerprint Verification with Perception DataYuxin Liu, Ning Xi, Ruidong Han, Yuanzhao Li, Jian-Feng Ma 0001, Yulong Shen. 303-322 [doi]
- AggNoteBot: A Robust Botnet Building Using Aggressive Cloud NotesSiyu Li, Yi-Ning Liu 0002, Fei Zhou, Yanze Kang, Weizhi Meng 0001. 323-336 [doi]
- FSAM Framework for Online CDN-Based Website ClassificationYulong Zhan, Yang Cai, Gang Xiong, Gaopeng Gou, Xiaoqian Li. 339-358 [doi]
- Towards Private Multi-operator Network SlicingBlake Haydon, Shangqi Lai, Xingliang Yuan, Sharif Abuadbba, Carsten Rudolph. 359-379 [doi]
- An Encrypted Traffic Classification Framework Based on Higher-Interaction-Graph Neural NetworkZitong Hu, Bo Qu, Xiang Li, Cong Li. 383-403 [doi]
- PassTSL: Modeling Human-Created Passwords Through Two-Stage LearningHaozhang Li, Yangde Wang, Weidong Qiu, Shujun Li, Peng Tang. 404-423 [doi]
- Detect Llama - Finding Vulnerabilities in Smart Contracts Using Large Language ModelsPeter Ince, Xiapu Luo, Jiangshan Yu, Joseph K. Liu, Xiaoning Du 0001. 424-443 [doi]
- MMOOC: A Multimodal Misinformation Dataset for Out-of-Context News AnalysisQingzheng Xu, Heming Du, Huiqiang Chen, Bo Liu 0001, Xin Yu 0002. 444-459 [doi]