Abstract is missing.
- Message from the General Chair: ICDIS 2022Xuan Wang. [doi]
- Passwordless VPN using FIDO2 Security Keys: Modern authentication security for legacy VPN systemsEmin Huseynov. 1-3 [doi]
- Efficient Mixed-Protocol Secure Four-Party Computation with Private RobustnessZoe Lin Jiang, Songjiang Shi, Hongxiao Wang, Peng Yang, Xuan Wang 0002, Yulin Wu, Yantao Zhong, Yan Jia. 1-8 [doi]
- Efficient Private Set Intersection Based on Functional EncryptionLiyao Xiong, Zoe Lin Jiang, Yi Huang, Jianzong Wang, Jing Xiao, Weizhe Zhang, Xuan Wang. 9-15 [doi]
- Token Open Security Model for Updatable EncryptionYang Song, Haiying Gao. 16-21 [doi]
- Feature Selection of Intrusion Detection Method Based on Improved GWOZechao Liu, Jing He, Ran Shi. 22-26 [doi]
- Intrusion Detection Method Based on Improved Sparrow Algorithm and Optimized SVMZechao Liu, Ran Shi, Mingyu Lei, Yulin Wu. 27-30 [doi]
- Improving Network Intrusion Detection Using Autoencoder Feature ResidualsBrian Lewandowski, Randy C. Paffenroth, Kayleigh Campbell. 31-39 [doi]
- Attacking Malware Detection using Adversarial Machine LearningUtkarsh Verma, Yonghong Huang, Carl Woodward, Craig Schmugar, Prashanth Palasamudram Ramagopal, Celeste Fralick. 40-49 [doi]
- HLT: A Hierarchical Vulnerability Detection Model Based on TransformerYupan Chen, Zhihong Liu. 50-54 [doi]
- Detecting Vulnerabilities in Ethereum Smart Contracts with Deep LearningZhendong Wu, Shan Li, Bin Wang, Tianjian Liu, Yongsheng Zhu, Chenming Zhu, Mingqing Hu. 55-60 [doi]
- Data Leakage Attack via Backdoor Misclassification Triggers of Deep Learning ModelsXiangkai Yang, Wenjian Luo, Licai Zhang, Zhijian Chen, Jiahai Wang. 61-66 [doi]
- FBIPT: A New Robust Reversible Database Watermarking Technique Based on Position TuplesWenchao Wang, Chuanyi Liu, Zhaoguo Wang, Tiancai Liang. 67-74 [doi]
- A Robust Watermarking Method For Image Processing ModelsMinghua Hou, Linlin Tang, Shuhan Qi, Yang Liu 0039. 75-81 [doi]
- Performance Comparison of Cryptosystems in Context to Internet of ThingsKriti Rai Saini, Vinayak Jigajinni, Jaya Dofe. 82-87 [doi]
- Black-Box Adversarial Attacks on Deep Neural Networks: A SurveyChenxu Wang, Ming Zhang, Jinjing Zhao, Xiaohui Kuang. 88-93 [doi]
- A BSO-based Feature Selection Algorithm Under Privacy ProtectionYing Hu, Wanqiu Zhang, Yong Zhang 0016. 94-98 [doi]
- A Negative Survey based Method for Preserving Topology Privacy in Social NetworksHao Jiang, Yuerong Liao, Qianwei Yu. 99-104 [doi]
- Reconstructing Negative Survey with Least Squares CriterionRan Liu, Tian Gao, Mingqiang Guo. 105-110 [doi]
- Accuracy Prediction of Negative SurveysRan Liu, Fengzhen Yu, Mingqiang Guo. 111-117 [doi]
- NegDL: Privacy-preserving Deep Learning Based on Negative DatabaseDongdong Zhao 0001, Pingchuan Zhang, Jianwen Xiang, Jing Tian. 118-126 [doi]
- PyHENet: A Generic Framework for Privacy-Preserving DL Inference Based on Fully Homomorphic EncryptionQian Chen 0028, Lin Yao, Yulin Wu, Xuan Wang 0002, Weizhe Zhang, Zoe Lin Jiang, Yang Liu 0039, Mamoun Alazab. 127-133 [doi]
- Local Energy Trading Platform Based on Privacy-Preserving Blockchain with Linkable Ring SignatureZoe Lin Jiang, Yijian Pan, Maoshun Fan, Lin Yao, Yang Liu 0039, Yulin Wu, Siu-Ming Yiu, Xuan Wang 0002, Junbin Fang. 134-141 [doi]
- Achieving Efficient and Privacy-Preserving Arbitrary Geographic Range Query for CloudChuan Zhang, Chenfei Hu, Mingyang Zhao, Yulin Wu, Tong Wu. 142-147 [doi]
- Towards Privacy-Preserving Computation on Gene: Construct Covid-19 Phylogenetic Tree using Homomorphic EncryptionPeiyi Han, Yunzhe Guo, Shaoming Duan, Chuanyi Liu, Yuxing Zhou. 148-154 [doi]
- Empirical Study on Frequency Adversarial Perturbation for Medical Image Privacy ProtectionYili Fang, Tao Yang. 155-159 [doi]
- PPSL: Privacy-Preserving Text Classification for Split LearningWalaa Alnasser, Ghazaleh Beigi, Ahmadreza Mosallanezhad, Huan Liu 0001. 160-167 [doi]
- Data Security Search Based on Semi-Supervised Sensitive ClassifierShuting Jiao, Shu Zhang, Feng Gao, Ting Wang. 168-173 [doi]
- Reconfigurable Intelligent Surfaces: A Physical Layer Security PerspectiveChristoph Lipps, Jan Herbst, Rekha Reddy, Lars Franke, Sven Becker, Marco Rahm, Hans Dieter Schotten. 174-181 [doi]
- Wireless Smart Electric Meter Operation under Data Security AttacksPatrick Nnaji, Harsh Kumar, Sanjeev Kumar. 182-187 [doi]
- Epsilon-Differentially Private and Fully Secure Logistic Regression on Vertically Split DataAngelo Saadeh, Vaibhavi Kumari, Stéphane Bressan. 188-193 [doi]
- Decoupling Consensus and Storage in Consortium Blockchains by Erasure CodesDejun Xiang, Rui Zhou, Lingfei Ma, Qingming Zeng, Ximing Fu, Qiang Wang, Bin Chen, Yan Jia. 194-199 [doi]
- A Secure and Large-Scale Multiparty Conditional Payment Scheme based on BlockchainJinhui Liu, Bowen Zhang, Di Wu, Mingjie Li, Bo Tang. 200-207 [doi]
- IMPROVED XCEPTION WITH DUAL ATTENTION MECHANISM AND FEATURE FUSION FOR FACE FORGERY DETECTIONHao Lin, Weiqi Luo 0001, Kangkang Wei, Minglin Liu. 208-212 [doi]
- Evaluation of Different ML and Text Processing Techniques for Hate Speech DetectionNabil Shawkat, Jesse Simpson, Jamil Saquer. 213-219 [doi]
- Moving Target Defense Strategy Selection Method Based on Long-term Traffic PredictionHuan Zhang 0002, Rongliang Chen, Kangfeng Zheng, Liang Gu, Xiujuan Wang. 220-227 [doi]
- Watermarking Pre-trained Encoders in Contrastive LearningYutong Wu 0009, Han Qiu 0001, Tianwei Zhang 0004, Jiwei Li, Meikang Qiu. 228-233 [doi]
- MCTrack: Multi-Head Contrastive Network for Visual TrackingDaohui Ge, Yunan Li, Bingwen Jia, Ruyi Liu, Qiguang Miao. 234-241 [doi]
- MultiShadow: Shadow Synthesis for Multiple Virtual ObjectsYe Ding, Qi Wan, Ziyuan Liu, Jie Wang. 242-247 [doi]
- IReF: Improved Residual Feature For Video Frame Deletion ForensicsHuang Yi Gong, Feng Chun Hui, Bai Dan Dan. 248-253 [doi]
- Vision and Knowledge Bimodal Fine-grained Recognition Based on Hierarchical Structured Knowledge ExtractionRongPing Zou, Bin Zhu, Yi Chen, Bo Xie. 254-260 [doi]
- Context Feature Guided Network for Image Super-resolutionMengxi Ya, Tao Dai, Ling Liu, Jieyin Lv, Shu-Tao Xia. 261-266 [doi]
- Calibrated Relighting Network for Image Light TransferCong Li, Yuan Rao, Jian Yang, Kai Yang, Hao Fan, Junyu Dong. 267-274 [doi]
- Visual Semantic SLAM Based on Examination of Moving Consistency in Dynamic ScenesKai Yang, Yumeng Jiang, Lin Qi 0004, Hao Fan, Shu Zhang 0002, Junyu Dong. 275-282 [doi]
- Open-set Pets Facial Recognition Using Deep Learning and Statistical LearningZhizhi Zhang, Zihan Ji. 283-287 [doi]
- Recurrence Quantification Analysis for PPG/ECG-Based Subject AuthenticationTurky N. Alotaiby, Saleh A. Alshebeili, Gaseb Alotibi, Ghaith N. Alotaibi. 288-291 [doi]
- RGCFace: Regularized Global Center loss for Deep Facial Expression RecognitionQiong Liu, Yangcheng Zhou, Wei Liu, Guangrui Li, Chenxu Li, Wenbai Chen. 292-297 [doi]
- A Light Model for Corrosion Segmentation with Multi-Scale Information and CRFJingxu Huang, Lang Xiang, Guangrui Li, Qiong Liu. 298-305 [doi]
- Dynamic Graph Pattern Matching in Medical Knowledge GraphsXun Du, Zhenchao Tao, Lei Li 0002. 306-313 [doi]
- Temporal Knowledge Graph Reasoning based on Graph Convolution NetworkChong Mo, Ye Wang, Yan Jia 0001, Cui Luo, Ye Ding. 314-320 [doi]
- Cultural Resource Recommender System with Knowledge Graph Convolutional NetworkDafeng Zhang, Xingwei Wang 0001, Qiang He 0002, Fei Gao, Bo Yi, Min Huang 0001. 321-328 [doi]
- Cluster Affiliation Model for Local Community DetectionLi Ni, Qi Zhou, Wei Li, Yiwen Zhang. 329-335 [doi]
- Generative Data Augmentation for Non-IID Problem in Decentralized Clinical Machine LearningZirui Wang, Shaoming Duan, Chengyue Wu, Wenhao Lin, Xinyu Zha, Peiyi Han, Chuanyi Liu. 336-343 [doi]
- Fast classification of indoor functional areas based on a pre-trained lightweight networkWenbai Chen, Guohong Yi, Huixiang Liu, Qili Chen, Weizhao Chen, Peiliang Wu. 344-349 [doi]
- Behavioral Sequence Classification with ConstraintsJiayang Wu, Wensheng Gan, Zhenlian Qi. 350-357 [doi]
- Weighted Contiguous Sequential Pattern MiningTingfu Zhou, Wensheng Gan, Zhenlian Qi. 358-365 [doi]
- Fuzzy Utility Mining on Temporal DataZhenqiang Ye, Shicheng Wan, Wensheng Gan, Jiahui Chen 0002, Linlin Tang. 366-373 [doi]
- Membership Inference Countermeasure With A Partially Synthetic Data ApproachWakana Maeda, Yuji Higuchi, Kazuhiro Minami, Ikuya Morikawa. 374-381 [doi]
- EFDO: Solving Extensive-Form Games Based On Double OracleSong Qin, Lei Zhang, Shuhan Qi, Jiajia Zhang 0001, Huale Li, Xuan Wang 0002, Jing Xiao. 382-387 [doi]
- NFSP-PER: An efficient sampling NFSP-based method with prioritized experience replayHuale Li, Shuhan Qi, Jiajia Zhang 0001, Dandan Zhang, Lin Yao, Xuan Wang 0002, Qi Li, Jing Xiao. 388-393 [doi]
- CFDMA: A Novel Click Fraud Detection Method in Mobile AdvertisingYanglin Liu, Yang Liu 0039, Mehdi Gheisari. 394-401 [doi]
- Robust Initialization for Stereo Visual-Inertial SLAM with Polar-Based Gravity EstimationYifan Liu, Yuan Rao, Guanqi Qi, Hao Fan, Junyu Dong. 402-407 [doi]
- A Review on Serious Games for Disaster ReliefHuansheng Ning, Zhangfeng Pi, Wenxi Wang, Fadi Farha, Shunkun Yang. 408-414 [doi]
- DE with A new population initialization method for the dynamic multidimensional knapsack problemsQi Qiu, Junyi He, Tao Zhu. 415-421 [doi]
- Underwater Object Detection with Swin TransformerYuqi Sun, Xuan Wang 0002, Yi Zheng, Lin Yao, Shuhan Qi, Linlin Tang, Hong Yi, Kunlei Dong. 422-427 [doi]
- Information Entropy of Uncertainty Control: An Uncertainty Management Method in Imperfect Information GamesJiajia Zhang 0001, Mingxin Zhan, Shuhan Qi, Nanwei Yu, Dongrun Zheng, Xuan Wang 0002, Jing Xiao. 428-434 [doi]
- LwDeepStack: A lightweight DeepStack based on knowledge distillationJiajia Zhang 0001, Zengyue Guo, Huale Li, Xuan Wang 0002, Dongming Liu, Shuhan Qi. 435-441 [doi]
- Dual Feature Fusion Trade Execution Framework with DDQNDongrun Zheng, Jiajia Zhang 0001, Xuan Wang, Xiao Guo, Jing Xiao. 442-446 [doi]
- A Multiscale Windows Deep Learning Aproach For Sensor-Based Human Activity RecognitonFurong Duan, Tao Zhu, Jinqiang Wang, Zhenyu Liu. 447-452 [doi]
- Intelligent Residential Demand Response Optimization under Real-time Pricing: A Comparison of HeuristicsMalik Ali Judge, Awais Manzoor, Saif ul Islam, Ishfaq Ahmad. 456-462 [doi]
- Stylistic Pattern Guided Tip Extraction from Music ReviewsJingya Zang, Anguo Dong. 463-468 [doi]
- Extended Grey Model Based on Particle Swarm Optimization and Its Application in Cotton Yield PredictionHoujun Liang, Rui Xie, Wanhuai Zhou, Bo Li, Dianjie Bi, Hao Chang. 469-473 [doi]
- Primary Study on the Face-recognition Framework with anti-spoofing functionXiao Wu, Dekang Zhang, Xiaorui Liu. 474-477 [doi]