Abstract is missing.
- Enabling Secure and Privacy Preserving Identity Management via Smart ContractYaoqing Liu, Guchuan Sun, Stephanie Schuckers. 1-8 [doi]
- Polynomial-based Lightweight Key Management in a Permissioned BlockchainAshwag Albakri, Lein Harn, Mahesh Maddumala. 1-9 [doi]
- A Blockchain-Enabled Decentralized Time Banking for a New Social Value SystemXuheng Lin, Ronghua Xu, Yu Chen 0002, J. Koji Lum. 1-5 [doi]
- Fighting Fake News Propagation with BlockchainsMuhammad Saad, Ashar Ahmad, Aziz Mohaisen. 1-4 [doi]
- Security Risk-Aware Resource Provisioning Scheme for Cloud Computing InfrastructuresTalal Halabi, Martine Bellaïche. 1-9 [doi]
- GPU Algorithms for K-Anonymity in MicrodataRoberto Di Pietro, Leonardo Jero, Flavio Lombardi, Agusti Solanas. 1-9 [doi]
- Joint Data and Tag Precoder Optimization for MIMO Physical Layer Authentication with Embedded FingerprintingBatu K. Chalise, Brian M. Sadler. 1-5 [doi]
- Deep-Learning-Based Network Intrusion Detection for SCADA SystemsHuan Yang, Liang Cheng, Mooi Choo Chuah. 1-7 [doi]
- Robustness Analysis of CNN-based Malware Family Classification Methods Against Various Adversarial AttacksSeokhwan Choi, Jin-Myeong Shin, Peng Liu 0005, Yoon Ho Choi. 1-6 [doi]
- Safety Analysis of AMI Networks Through Smart Fraud DetectionA. H. M. Jakaria, Mohammad Ashiqur Rahman, Md. Golam Moula Mehedi Hasan. 1-7 [doi]
- Spoofing Attack Detection in Mm-Wave and Massive MIMO 5G CommunicationNing Wang, Jie Tang, Kai Zeng. 1-5 [doi]
- Distributed Ledger for Spammers' ResumeAnudeep Sai Muttavarapu, Ram Dantu, Mark A. Thompson. 1-9 [doi]
- Machine Learning-Based Delay-Aware UAV Detection Over Encrypted Wi-Fi TrafficAmir Alipour Fanid, Monireh Dabaghchian, Ning Wang, Pu Wang, Liang Zhao, Kai Zeng. 1-7 [doi]
- Secret Key and Private Key Capacities Over an Unauthenticated Public ChannelWenwen Tu, Lifeng Lai. 1-5 [doi]
- SER -Constrained Symbol-Level Precoding for Physical-Layer SecurityAbderrahmane Mayouche, Danilo Spano, Christos G. Tsinos, Symeon Chatzinotas, Björn E. Ottersten. 1-5 [doi]
- Linear Precoding with Friendly Jamming in Overloaded MU-MIMO Wiretap NetworksPeyman Siyari, Marwan Krunz. 1-5 [doi]
- Symmetric kullback-leibler divergence of softmaxed distributions for anomaly scoresBruno Andriamanalimanana, Ali Tekeoglu, Korkut Bekiroglu, Saumendra Sengupta, Chen-Fu Chiang, Michael Reale, Jorge E. Novillo. 1-6 [doi]
- Secure and Reliable Decentralized Truth Discovery Using BlockchainYifan Tian, Jiawei Yuan, Houbing Song. 1-8 [doi]
- JAM-ME: Exploiting Jamming to Accomplish Drone MissionRoberto Di Pietro, Gabriele Oligeri, Pietro Tedeschi. 1-9 [doi]
- A Usable Authentication System Using Wrist-Worn Photoplethysmography Sensors on SmartwatchesJiacheng Shang, Jie Wu 0001. 1-9 [doi]
- A Framework Architecture for Agentless Cloud Endpoint Security MonitoringAsem Ghaleb, Issa Traoré, Karim Ganame. 1-9 [doi]
- Privacy-Preserving Control of Video Transmissions for Drone-based Intelligent Transportation SystemsKemal Akkaya, Vashish Baboolal, Nico Saputro, A. Selcuk Uluagac, Hamid Menouar. 1-7 [doi]
- Secure and Privacy-Preserving Warning Message Dissemination in Cloud-Assisted Internet of VehiclesQinlong Huang, Nan Li, Zhicheng Zhang, Yixian Yang. 1-8 [doi]
- Fingerprint Embedding Authentication with Artificial Noise: MISO RegimeJake Bailey Perazzone, Paul L. Yu, Brian M. Sadler, Rick S. Blum. 1-5 [doi]
- Cloud computing in the quantum eraMustafa Kaiiali, Sakir Sezer, Ayesha Khalid. 1-4 [doi]
- Authentication Against a Myopic AdversaryAllison Beemer, Oliver Kosut, Jörg Kliewer, Eric Graves, Paul L. Yu. 1-5 [doi]
- Secure Delegation to a Single Malicious Server: Exponentiation in RSA-type GroupsGiovanni Di Crescenzo, Matluba Khodjaeva, Delaram Kahrobaei, Vladimir Shpilrain. 1-9 [doi]
- Deanonymizing Cryptocurrency With Graph Learning: The Promises and ChallengesAnil Gaihre, Santosh Pandey, Hang Liu. 1-3 [doi]
- Secure Wireless Communication Using Support Vector MachinesTiep M. Hoang, Trung Q. Duong, Sangarapillai Lambotharan. 1-5 [doi]
- Preserving Location Privacy in Cyber-Physical SystemsIsmail Butun, Patrik Österberg, Mikael Gidlund. 1-6 [doi]
- Using Structural Diversity to Enforce Strong Authentication of Mobiles to the CloudSamy Kambou, Ahmed Bouabdallah. 1-9 [doi]
- Manipulating Drone Position ControlWenxin Chen, Yingfei Dong, Zhenhai Duan. 10-18 [doi]
- Securing Task Allocation in Mobile Crowd Sensing: An Incentive Design ApproachMingyan Xiao, Ming Li 0006, Linke Guo, Miao Pan, Zhu Han, Pan Li. 19-27 [doi]
- WristUnlock: Secure and Usable Smartphone Unlocking with Wrist WearablesLili Zhang, Dianqi Han, Ang Li, Tao Li, Yan Zhang, Yanchao Zhang. 28-36 [doi]
- Efficient and Accountable Oblivious Cloud Storage with Three ServersQiumao Ma, Wensheng Zhang 0001. 37-45 [doi]
- FileCrypt: Transparent and Scalable Protection of Sensitive Data in Browser-based Cloud StoragePeiyi Han, Chuanyi Liu, Yingfei Dong, Hezhong Pan, QiYang Song, Binxing Fang. 46-54 [doi]
- Energy-Aware Digital Signatures for Embedded Medical DevicesMuslum Ozgur Ozmen, Attila A. Yavuz, Rouzbeh Behnia. 55-63 [doi]
- Sherlock Holmes of Cache Side-Channel Attacks in Intel's x86 ArchitectureMaria Mushtaq, Ayaz Akram, Muhammad Khurram Bhatti, Usman Ali, Vianney Lapotre, Guy Gogniat. 64-72 [doi]
- CollusiveHijack: A New Route Hijacking Attack and Countermeasures in Opportunistic NetworksAla Altaweel, Radu Stoleru, Guofei Gu, Arnab Kumar Maity. 73-81 [doi]
- Towards Secure Slicing: Using Slice Isolation to Mitigate DDoS Attacks on 5G Core Network SlicesDanish Sattar, Ashraf Matrawy. 82-90 [doi]
- GEE: A Gradient-based Explainable Variational Autoencoder for Network Anomaly DetectionQuoc Phong Nguyen, Kar Wai Lim, Dinil Mon Divakaran, Kian Hsiang Low, Mun Choon Chan. 91-99 [doi]
- DRAKE: Distributed Relay-Assisted Key EstablishmentSavio Sciancalepore, Roberto Di Pietro. 100-108 [doi]
- Vaccine: : Obfuscating Access Pattern Against File-Injection AttacksHao Liu, Boyang Wang, Nan Niu, Shomir Wilson, Xuetao Wei. 109-117 [doi]
- Privacy and Linkability of Mining in ZcashAlex Biryukov, Daniel Feher. 118-123 [doi]
- Supporting Both Range Queries and Frequency Estimation with Local Differential PrivacyXiaolan Gu, Ming Li, Yang Cao, Li Xiong 0001. 124-132 [doi]
- Randex: Mitigating Range Injection Attacks on Searchable EncryptionHanyu Quan, Hao Liu, Boyang Wang, Ming Li, Yuqing Zhang. 133-141 [doi]
- BotSifter: An SDN-based Online Bot Detection Framework in Data CentersZili Zha, An Wang 0002, Yang Guo, Doug Montgomery, Songqing Chen. 142-150 [doi]
- SQL-Identifier Injection AttacksCagri Cetin, Dmitry B. Goldgof, Jay Ligatti. 151-159 [doi]
- "What", "Where", and "Why" Cybersecurity Controls to Enforce for Optimal Risk MitigationAshutosh Dutta, Ehab Al-Shaer. 160-168 [doi]
- BotFlowMon: Learning-based, Content-Agnostic Identification of Social Bot Traffic FlowsYebo Feng, Jun Li 0001, Lei Jiao, Xintao Wu. 169-177 [doi]
- Recognizing Email Spam from Meta Data OnlyTim Krause, Rafael Uetz, Tim Kretschmann. 178-186 [doi]
- Detecting ADS-B Spoofing Attacks Using Deep Neural NetworksXuhang Ying, Joanna Mazer, Giuseppe Bernieri, Mauro Conti, Linda Bushnell, Radha Poovendran. 187-195 [doi]
- Design of a Robust RF Fingerprint Generation and Classification Scheme for Practical Device IdentificationXinyu Zhou, Aiqun Hu, Guyue Li, Linning Peng, Yuexiu Xing, Jiabao Yu. 196-204 [doi]
- CAPTURE: Cyberattack Forecasting Using Non-Stationary Features with Time LagsAhmet Okutan, Shanchieh Jay Yang, Katie McConky, Gordon Werner. 205-213 [doi]
- Location Leakage from Network Access PatternsTrishita Tiwari, Avraham Klausner, Mikhail Andreev, Ari Trachtenberg, Arkady Yerukhimovich. 214-222 [doi]
- Characterizing Location-based Mobile Tracking in Mobile Ad NetworksBoyang Hu, Qicheng Lin, Yao Zheng, Qiben Yan, Matthew Troglia, Qingyang Wang. 223-231 [doi]
- I Can Hear Your Alexa: Voice Command Fingerprinting on Smart Home SpeakersSean Kennedy, HaiPeng Li, Chenggang Wang, Hao Liu, Boyang Wang, Wenhai Sun. 232-240 [doi]
- I Know What You Enter on Gear VRZhen Ling, Zupei Li, Chen Chen, Junzhou Luo, Wei Yu 0002, Xinwen Fu. 241-249 [doi]
- CAPnet: A Defense Against Cache Accounting Attacks on Content Distribution NetworksGhada Almashaqbeh, Kevin Kelley, Allison Bishop, Justin Cappos. 250-258 [doi]
- It's Not what It Looks Like: Measuring Attacks and Defensive Registrations of Homograph DomainsFlorian Quinkert, Tobias Lauinger, William K. Robertson, Engin Kirda, Thorsten Holz. 259-267 [doi]
- Dynamic Traffic Feature Camouflaging via Generative Adversarial NetworksJie Li, Lu Zhou, Huaxin Li, Lu Yan, Haojin Zhu. 268-276 [doi]
- Topology-Agnostic Runtime Detection of OSPF Routing AttacksNurit Devir, Orna Grumberg, Shaul Markovitch, Gabi Nakibly. 277-285 [doi]