Abstract is missing.
- Randomized Positioning DSSS with Message Shuffling for Anti-Jamming Wireless CommunicationsAhmad Alagil, Yao Liu. 1-8 [doi]
- Honor among Thieves: Towards Understanding the Dynamics and Interdependencies in IoT BotnetsJinChun Choi, Ahmed Abusnaina, Afsah Anwar, An Wang 0002, Songqing Chen, DaeHun Nyang, Aziz Mohaisen. 1-8 [doi]
- Random Delay Attack and Its Applications on Load Frequency Control of Power SystemsYongdong Wu, Jian Weng, Bo Qiu, Zhuo Wei, Fan Qian, Robert H. Deng. 1-8 [doi]
- Utilizing Public Blockchains for Censorship-Circumvention and IoT CommunicationNasser Alsalami, Bingsheng Zhang. 1-7 [doi]
- Securely Perturb Big Data by using Inner ProductMingli Wu, Tsz Hon Yuen. 1-8 [doi]
- Gaussian Process Learning for Distributed Sensor Networks under False Data Injection AttacksXiuming Liu, Edith Cheuk-Han Ngai. 1-6 [doi]
- Defeating Speculative-Execution Attacks on SGX with HyperRaceGuoxing Chen, Mengyuan Li, Fengwei Zhang, Yinqian Zhang. 1-8 [doi]
- E2E Verifiable Electronic Voting System for ShareholdersSamiran Bag, Feng Hao. 1-8 [doi]
- Correlation-Based Search against Friendly Jamming Data Exchange SchemesJingyi Zhang, Qiao Hu, Gerhard Petrus Hancke. 1-8 [doi]
- Towards a Ledger-Assisted Architecture for Secure Query Processing over Distributed IoT DataXingliang Yuan, Chengjun Cai, Qian Wang, Qi Li 0002. 1-8 [doi]
- Traceable Private Set Intersection in Cloud ComputingTao Jiang, Xu Yuan. 1-7 [doi]
- Fidelity: Towards Measuring the Trustworthiness of Neural Network ClassificationZiqi Yang. 1-8 [doi]
- Securing Relational Database Storage with Attribute Association Aware ShufflingTieming Geng, Hatim Alsuwat, Chin-Tser Huang, Csilla Farkas. 1-8 [doi]
- DT-Track: Using DNS-Timing Side Channel for Mobile User TrackingChun-Han Lin, Shan-Hsin Lee, Hsiu-Chuan Huang, Chi-Wei Wang, Chia-Wei Hsu, Shiuh-Pyng Shieh. 1-8 [doi]
- An Optimized Positive-Unlabeled Learning Method for Detecting a Large Scale of Malware VariantsJixin Zhang, Mohammad Faham Khan, Xiaodong Lin, Zheng Qin. 1-8 [doi]
- Neural Cryptanalysis: Metrics, Methodology, and Applications in CPS CiphersYa Xiao, Qingying Hao, Danfeng Daphne Yao. 1-8 [doi]
- Exploiting Mallows Distance to Quantify EEG Distribution for Personal IdentificationBaicheng Chen, Kun Woo Cho, Chenhan Xu, Feng Lin 0004, Zhanpeng Jin, Wenyao Xu. 1-8 [doi]
- BanFEL: A Blockchain Based Smart Contract for Fair and Efficient Lottery SchemeJiasheng Li, Zijian Zhang, Meng Li 0006. 1-8 [doi]
- Multi-Level Proactive Security Auditing for CloudsSuryadipta Majumdar, Azadeh Tabiban, Meisam Mohammady, Alaa Oqaily, Yosr Jarraya, Makan Pourzandi, Lingyu Wang 0001, Mourad Debbabi. 1-8 [doi]
- MicroGuard: Securing Bare-Metal Microcontrollers against Code-Reuse AttacksMajid Salehi, Danny Hughes 0001, Bruno Crispo. 1-8 [doi]
- Lightweight Attribute-Based Keyword Search with Policy Protection for Cloud-Assisted IoTJianfei Sun, Hu Xiong, Robert H. Deng, Yinghui Zhang 0002, Ximeng Liu, Mingsheng Cao. 1-8 [doi]
- Examining the Robustness of Learning-Based DDoS Detection in Software Defined NetworksAhmed Abusnaina, Aminollah Khormali, DaeHun Nyang, Murat Yuksel, Aziz Mohaisen. 1-8 [doi]
- Proof of Encryption: Enforcement of Security Service Level Agreement for Encryption OutsourcingSultan Alasmari, Weichao Wang, Tuanfa Qin, Yu Wang 0003. 1-8 [doi]
- Deep-BIF: Blind Image Forensics Based on Deep LearningBaole Wei, Min Yu, Kai Chen, Jianguo Jiang. 1-6 [doi]
- Secure Outsourcing Algorithm for Bilinear Pairings without Pre-ComputationLe Tong, Jia Yu 0005, Hanlin Zhang. 1-7 [doi]
- A Blind Signature from Module LaticesHuy Quoc Le, Willy Susilo, Thanh Xuan Khuc, Minh Kim Bui, Dung Hoang Duong. 1-8 [doi]
- Super Payment Channel for Decentralized CryptocurrenciesShengmin Xu, Jiaming Yuan, Yingjiu Li, Ximeng Liu, Yinghui Zhang 0002. 1-8 [doi]
- Federated-Cloud Based Deep Neural Networks with Privacy Preserving Image Filtering TechniquesIsabelle Choi, QiYang Song, Kun Sun. 1-8 [doi]
- Persistent Fault Injection in FPGA via BRAM ModificationYiran Zhang, Fan Zhang 0010, Bolin Yang, Guorui Xu, Bin Shao, XinJie Zhao, Kui Ren 0001. 1-6 [doi]
- Towards the Trust-Enhancements of Single Sign-On ServicesXuhua Bao, Xiaokun Zhang, Jingqiang Lin, Dawei Chu, Qiongxiao Wang, FengJun Li. 1-8 [doi]
- Broken Relationship of Mobile User Intentions and Permission Control of Shared System ResourcesHao Wu, Zheng Qin, Xuejin Tian, Edward Sun, Fengyuan Xu, Sheng Zhong. 1-8 [doi]
- SoK: A Systematic Study of Anonymity in CryptocurrenciesNasser Alsalami, Bingsheng Zhang. 1-9 [doi]
- Secure Boolean Queries over Encrypted Data from Indistinguishability ObfuscationJing Yao, Helei Cui, Xiaolin Gui. 1-8 [doi]