Abstract is missing.
- Privacy Protection and Efficient Incumbent Detection in Spectrum Sharing Based on Federated LearningNing Wang, Junqing Le, Weiwei Li, Long Jiao, Zhihao Li, Kai Zeng. 1-9 [doi]
- Secure Strong CoordinationGiulia Cervia, Germán Bassi, Mikael Skoglund. 1-6 [doi]
- Identifying P2P Communities in Network Traffic Using Measures of Community Connections : IEEE CNS 20 PosterHarshvardhan P. Joshi, Rudra Dutta. 1-2 [doi]
- Fast and Secure kNN Query Processing in Cloud ComputingXinyu Lei, Guan-Hua Tu, Alex X. Liu, Tian Xie. 1-9 [doi]
- Modeling Temperature Behavior in the Helper Data for Secret-Key Binding with SRAM PUFsLieneke Kusters, Alexandros Rikos, Frans M. J. Willems. 1-6 [doi]
- Adaptive Latency Reduction in LoRa for Mission Critical Communications in MinesAhasanun Nessa, Fatima Hussain, Xavier Fernando. 1-7 [doi]
- Learning the Associations of MITRE ATT & CK Adversarial TechniquesRawan Al-Shaer, Jonathan M. Spring, Eliana Christou. 1-9 [doi]
- Modelling Adversarial Flow in Software-Defined Industrial Control Networks Using a Queueing Network ModelLivinus Obiora Nweke, Stephen D. Wolthusen. 1-6 [doi]
- On the Feasibility of Exploiting Traffic Collision Avoidance System VulnerabilitiesPaul M. Berges, Basavesh Ammanaghatta Shivakumar, Timothy Graziano, Ryan M. Gerdes, Z. Berkay Celik. 1-6 [doi]
- Catching Falling Dominoes: Cloud Management-Level Provenance Analysis with Application to OpenStackAzadeh Tabiban, Yosr Jarraya, Mengyuan Zhang, Makan Pourzandi, Lingyu Wang 0001, Mourad Debbabi. 1-9 [doi]
- Evolving Advanced Persistent Threat Detection using Provenance Graph and Metric LearningGbadebo Ayoade, Khandakar Ashrafi Akbar, Pracheta Sahoo, Yang Gao 0027, Anmol Agarwal, Kangkook Jee, Latifur Khan, Anoop Singhal. 1-9 [doi]
- A Machine Learning Approach to Classify Security Patches into Vulnerability TypesXinda Wang, Shu Wang, Kun Sun 0001, Archer L. Batcheller, Sushil Jajodia. 1-9 [doi]
- Arbitrarily Varying Wiretap Channels with and without Non-Causal Side Information at the JammerCarsten Rudolf Janda, Eduard A. Jorswieck, Moritz Wiese, Holger Boche. 1-6 [doi]
- Exploring Abstraction Functions in FuzzingChristopher Salls, Aravind Machiry, Adam Doupé, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna. 1-9 [doi]
- Stealthy Privacy Attacks Against Mobile AR AppsSarah M. Lehman, Abrar S. Alrumayh, Haibin Ling, Chiu C. Tan. 1-5 [doi]
- A Quantitative Framework to Model Reconnaissance by Stealthy Attackers and Support Deception-Based DefensesLuan Huy Pham, Massimiliano Albanese, Ritu Chadha, Cho-Yu Jason Chiang, Sridhar Venkatesan, Charles A. Kamhoua, Nandi Leslie. 1-9 [doi]
- Maximal α-Leakage and its PropertiesJiachun Liao, Lalitha Sankar, Oliver Kosut, Flávio P. Calmon. 1-6 [doi]
- Website Cryptojacking Detection Using Machine Learning : IEEE CNS 20 PosterVenkata Sai Krishna Avinash Nukala. 1-2 [doi]
- Authentication and Partial Message Correction over Adversarial Multiple-Access ChannelsAllison Beemer, Eric Graves 0001, Jörg Kliewer, Oliver Kosut, Paul L. Yu. 1-6 [doi]
- Insider Attack Detection for Science DMZs Using System Performance DataRoss K. Gegan, Brian Perry, Dipak Ghosal, Matt Bishop. 1-9 [doi]
- Off is Not Off: On the Security of Parked VehiclesKyong-Tak Cho, Kang G. Shin, Yu Seung Kim, Byung-Ho Cha. 1-9 [doi]
- REdiREKT: Extracting Malicious Redirections from Exploit Kit TrafficJonah Burgess, Domhnall Carlin, Philip O'Kane, Sakir Sezer. 1-9 [doi]
- Security Vulnerabilities of Server-Centric Wireless DatacentersSayed Ashraf Mamun, Amlan Ganguly, Panos P. Markopoulos, Andres Kwasinski, Minseok Kwon. 1-9 [doi]
- TRUST.IO: Protecting Physical Interfaces on Cyber-physical SystemsChad Spensky, Aravind Machiry, Marcel Busch, Kevin Leach, Rick Housley, Christopher Kruegel, Giovanni Vigna. 1-9 [doi]
- When the Network of a Smart City Is Not So SmartAli Tabaja, Reuven Cohen. 1-9 [doi]
- Augmented Randomness for Secure Key Agreement using Physiological SignalsBeste Seymen, Duygu Karaoglan Altop, Albert Levi. 1-9 [doi]
- Encrypted-Input Program Obfuscation: Simultaneous Security Against White-Box and Black-Box AttacksGiovanni Di Crescenzo, Lisa Bahler, Allen McIntosh. 1-9 [doi]
- A Machine Learning-based Approach for Automated Vulnerability Remediation AnalysisFengli Zhang, Philip Huff, Kylie McClanahan, Qinghua Li. 1-9 [doi]
- Automated Post-Breach Penetration Testing through Reinforcement LearningSujita Chaudhary, Austin O'Brien, Shengjie Xu. 1-2 [doi]
- Efficient Physical Layer Group Key Generation in 5G Wireless NetworksLong Jiao, Pu Wang, Ning Wang, Songlin Chen, Amir Alipour Fanid, Junqing Le, Kai Zeng 0001. 1-9 [doi]
- Autonomous Space Resupply Vehicle Systems Security Design Principle Case StudyLogan O. Mailloux, Robert F. Mills. 1-8 [doi]
- SecureAIS - Securing Pairwise Vessels CommunicationsAhmed Aziz, Pietro Tedeschi, Savio Sciancalepore, Roberto Di Pietro. 1-9 [doi]
- Attacks on Dynamic Protocol Detection of Open Source Network Security Monitoring ToolsJan Grashöfer, Christian Titze, Hannes Hartenstein. 1-9 [doi]
- Sweet: Secure Wireless Energy Transfer with Electric Vehicles in Vehicular Energy NetworksYuntao Wang 0004, Zhou Su, Ning Zhang, Abderrahim Benslimane. 1-9 [doi]
- DodgeTron: Towards Autonomous Cyber Deception Using Dynamic Hybrid Analysis of MalwareMd Sajidul Islam Sajid, Jinpeng Wei, Md Rabbi Alam, Ehsan Aghaei, Ehab Al-Shaer. 1-9 [doi]
- Notes on Communication and Computation in Secure Distributed Matrix MultiplicationRafael G. L. D'Oliveira, Salim El Rouayheb, Daniel Heinlein, David A. Karpuk. 1-6 [doi]
- SparseIDS: Learning Packet Sampling with Reinforcement LearningMaximilian Bachl, Fares Meghdouri, Joachim Fabini, Tanja Zseby. 1-9 [doi]
- Compact and Resilient Cryptographic Tools for Digital ForensicsEfe U. A. Seyitoglu, Attila A. Yavuz, Muslum Ozgur Ozmen. 1-9 [doi]
- RUMBA-Mouse: Rapid User Mouse-Behavior Authentication Using a CNN-RNN ApproachShen Fu, Dong Qin, Daji Qiao, George T. Amariucai. 1-9 [doi]
- Perturbing Inputs to Prevent Model StealingJustin Grana. 1-9 [doi]
- PhishZip: A New Compression-based Algorithm for Detecting Phishing WebsitesRizka Purwanto, Arindam Pal 0001, Alan Blair, Sanjay Jha. 1-9 [doi]
- A Rule Reordering Method via Pairing Dependent RulesTakashi Harada, Ken Tanaka, Ryohei Ogasawara, Kenji Mikawa. 1-9 [doi]
- Quantitative Verification of Certificate Transparency Gossip ProtocolsMichael Oxford, David Parker, Mark Ryan. 1-9 [doi]
- NExtSteP: An Extensible Testbed for Network Covert ChannelsOlga Chen, Aaron D. Jaggard, Catherine A. Meadows, Michael C. Shlanta. 1-9 [doi]
- ETAREE: An Effective Trend-Aware Reputation Evaluation Engine for Wireless Medical Sensor NetworksMuhammad Shadi Hajar, M. Omar Al-Kadri, Harsha K. Kalutarage. 1-9 [doi]
- Exploring Adversarial Properties of Insider Threat DetectionDuc C. Le, A. Nur Zincir-Heywood. 1-9 [doi]
- A Large-scale Analysis of Cloud Service AbuseNaoki Fukushi, Daiki Chiba 0001, Mitsuaki Akiyama, Masato Uchida. 1-9 [doi]
- Eathentication: A Chewing-based Authentication MethodMattia Carlucci, Stefano Cecconello, Mauro Conti, Piero Romare. 1-9 [doi]
- DeepBLOC: A Framework for Securing CPS through Deep Reinforcement Learning on Stochastic GamesAlireza Tahsini, Noah Dunstatter, Mina Guirguis, Chuadhry Mujeeb Ahmed. 1-9 [doi]
- Query-Crafting DoS Threats Against Internet DNSSang-Yoon Chang, Younghee Park, Nikhil Vijayakumar Kengalahalli, Xiaobo Zhou 0002. 1-9 [doi]
- Machine Learning in Action: Securing IAM API by Risk Authentication Decision EngineNebojsa Djosic, Bojan Nokovic, Salah Sharieh. 1-4 [doi]
- Rapid: Robust and Adaptive Detection of Distributed Denial-of-Service Traffic from the Internet of ThingsSamuel Mergendahl, Jun Li. 1-9 [doi]
- Generation of realistic signal strength measurements for a 5G Rogue Base Station attack scenarioMohammad Saedi, Adrian Moore 0001, Philip Perry, Mohammad Shojafar, Hanif Ullah, Jonathan Synnott, Ruth Brown, Ian Herwono. 1-7 [doi]
- Order-Optimal Scaling of Covert Communication over MIMO AWGN ChannelsAhmed S. Bendary, C. Emre Koksal. 1-9 [doi]
- Towards Data-Driven Characterization of Brute-Force AttackersFlorian Wilkens, Mathias Fischer 0001. 1-9 [doi]
- A Security Reference Model for Autonomous Vehicles in Military OperationsFederico Mancini 0001, Solveig Bruvoll, John Melrose, Frederick A. Leve, Logan O. Mailloux, Raphael Ernst, Kellyn Rein, Stefano Fioravanti, Diego Merani, Robert Been. 1-8 [doi]
- SYMBION: Interleaving Symbolic with Concrete ExecutionFabio Gritti, Lorenzo Fontana, Eric Gustafson, Fabio Pagani, Andrea Continella, Christopher Kruegel, Giovanni Vigna. 1-10 [doi]
- EARS: Enabling Private Feedback Updates in Anonymous Reputation SystemsVishnu Teja Kilari, Ruozhou Yu, Satyajayant Misra, Guoliang Xue. 1-9 [doi]
- Towards a Believable Decoy System: Replaying Network Activities from Real SystemJianhua Sun, Kun Sun 0001, Qi Li 0002. 1-9 [doi]
- Optimal Mechanisms Under Maximal LeakageBenjamin Wu, Aaron B. Wagner, G. Edward Suh. 1-6 [doi]
- HEKA: A Novel Intrusion Detection System for Attacks to Personal Medical DevicesA. K. M. Iqtidar Newaz, Amit Kumar Sikder, Leonardo Babun, A. Selcuk Uluagac. 1-9 [doi]
- Cyber Security Decision Making Informed by Cyber Threat Intelligence (CYDETI) : IEEE CNS 20 PosterAliyu Aliyu, Ying He 0004, Iryna Yevseyeva, Cunjin Luo. 1-2 [doi]
- Mailto: Me Your Secrets. On Bugs and Features in Email End-to-End EncryptionJens Müller 0007, Marcus Brinkmann, Damian Poddebniak, Sebastian Schinzel, Jörg Schwenk. 1-9 [doi]
- OTDA: a Unsupervised Optimal Transport framework with Discriminant Analysis for Keystroke InferenceKun Jin, Chaoyue Liu, Cathy Xia. 1-9 [doi]
- Secure End-to-End Sensing in Supply ChainsJan Pennekamp, Fritz Alder, Roman Matzutt, Jan Tobias Mühlberg, Frank Piessens, Klaus Wehrle. 1-6 [doi]
- Dynamic Risk-Aware Patch SchedulingFengli Zhang, Qinghua Li. 1-9 [doi]
- Physical Layer Authentication Techniques based on Machine Learning with Data CompressionLinda Senigagliesi, Marco Baldi, Ennio Gambi. 1-6 [doi]
- Membership Inference Attacks against MemGuard : IEEE CNS 20 PosterBen Niu 0001, Yahong Chen, Likun Zhang, FengHua Li. 1-2 [doi]
- Hybrid Analysis of Android Apps for Security Vetting using Deep LearningDewan Chaulagain, Prabesh Poudel, Prabesh Pathak, Sankardas Roy, Doina Caragea, GuoJun Liu, Xinming Ou. 1-9 [doi]
- SCIBORG: Secure Configurations for the IoT Based on optimization and Reasoning on GraphsHamed Soroush, Massimiliano Albanese, Milad Asgari Mehrabadi, Ibifubara Iganibo, Marc Mosko, Jason H. Gao, David J. Fritz, Shantanu Rane, Eric Bier. 1-10 [doi]
- The Quest for Secure and Privacy-preserving Cloud-based Industrial CooperationMartin Henze. 1-5 [doi]
- Cumulative Message Authentication Codes for Resource-Constrained NetworksHe Li, Vireshwar Kumar, Jung-Min Jerry Park, Yaling Yang. 1-9 [doi]
- Forensic Investigation of Industrial Control Systems Using Deterministic ReplayGregory Walkup, Sriharsha Etigowni, Dongyan Xu, Vincent Urias, Han W. Lin. 1-9 [doi]
- Game Theoretic Approach for Secure and Efficient Heavy-Duty Smart ContractsPinglan Liu, Wensheng Zhang. 1-9 [doi]
- Platoon Handover Authentication in 5G-V2X : IEEE CNS 20 PosterGuanjie Li, Chengzhe Lai. 1-2 [doi]
- Cloud-Based Face and Speech Recognition for Access Control ApplicationsNathalie Tkauc, Thao Tran, Kevin Hernandez-Diaz, Fernando Alonso-Fernandez. 1-8 [doi]
- Adversarial multiple access channels and a new model of multimedia fingerprinting codingGrigory Kabatiansky, Elena Egorova. 1-5 [doi]
- Fingerprinting Voice Applications on Smart Speakers over Encrypted TrafficShriti Naraparaju. 1-2 [doi]