Abstract is missing.
- Prototype-Based Malware Traffic Classification with Novelty DetectionLixin Zhao, Lijun Cai, Aimin Yu, Zhen Xu, Dan Meng. 3-17 [doi]
- Evading API Call Sequence Based Malware ClassifiersFenil Fadadu, Anand Handa, Nitesh Kumar, Sandeep Kumar Shukla. 18-33 [doi]
- UBER: Combating Sandbox Evasion via User Behavior EmulatorsPengbin Feng, Jianhua Sun, Songsong Liu, Kun Sun 0001. 34-50 [doi]
- AADS: A Noise-Robust Anomaly Detection Framework for Industrial Control SystemsMaged AbdelAty, Roberto Doriguzzi Corin, Domenico Siracusa. 53-70 [doi]
- Characterizing Internet-Scale ICS Automated Attacks Through Long-Term Honeypot DataJianzhou You, Shichao Lv, Yichen Hao, Xuan Feng, Ming Zhou, Limin Sun. 71-88 [doi]
- Cloning Vulnerability Detection in Driver Layer of IoT DevicesWeipeng Jiang, Bin Wu, Zhou Jiang, Shaobo Yang. 89-104 [doi]
- Impact of Multiple Reflections on Secrecy Capacity of Indoor VLC SystemJian Chen, Tao Shu. 105-123 [doi]
- Road Context-Aware Intrusion Detection System for Autonomous CarsJingxuan Jiang, Chundong Wang 0001, Sudipta Chattopadhyay 0001, Wei Zhang. 124-142 [doi]
- Automated Cyber Threat Intelligence Reports Classification for Early Warning of Cyber Attacks in Next Generation SOCWenzhuo Yang, Kwok-Yan Lam. 145-164 [doi]
- HeteroUI: A Framework Based on Heterogeneous Information Network Embedding for User Identification in Enterprise NetworksMeng Li, Lijun Cai, Aimin Yu, Haibo Yu, Dan Meng. 165-180 [doi]
- CTLMD: Continuous-Temporal Lateral Movement Detection Using Graph EmbeddingSuya Zhao, Renzheng Wei, Lijun Cai, Aimin Yu, Dan Meng. 181-196 [doi]
- VulHunter: An Automated Vulnerability Detection System Based on Deep Learning and BytecodeNing Guo, Xiaoyong Li 0003, Hui Yin, Yali Gao. 199-218 [doi]
- Deep Learning-Based Vulnerable Function Detection: A BenchmarkGuanjun Lin, Wei Xiao, Jun Zhang 0010, Yang Xiang 0001. 219-232 [doi]
- Automatic Demirci-Selçuk Meet-in-the-Middle Attack on SKINNY with Key-BridgingQiu Chen, Danping Shi, Siwei Sun, Lei Hu. 233-247 [doi]
- SecFlush: A Hardware/Software Collaborative Design for Real-Time Detection and Defense Against Flush-Based Cache AttacksChuran Tang, Zongbin Liu, Cunqing Ma, Jingquan Ge, Chenyang Tu. 251-268 [doi]
- CDAE: Towards Empowering Denoising in Side-Channel AnalysisGuang Yang, Huizhong Li, Jingdian Ming, Yongbin Zhou. 269-286 [doi]
- Practical Evaluation Methodology of Higher-Order Maskings at Different Operating FrequenciesYuguang Li, Ming Tang, Pengbo Wang, Yanbin Li, Shan Fu. 287-304 [doi]
- Privacy-Preserving eID Derivation for Self-Sovereign Identity SystemsAndreas Abraham, Felix Hörandner, Olamide Omolola, Sebastian Ramacher. 307-323 [doi]
- Provably Secure Group Authentication in the Asynchronous Communication ModelZhe Xia, Lein Harn, Bo Yang 0003, Mingwu Zhang, Yi Mu 0001, Willy Susilo, Weizhi Meng. 324-340 [doi]
- AGE: Authentication Graph Embedding for Detecting Anomalous Login ActivitiesRenzheng Wei, Lijun Cai, Aimin Yu, Dan Meng. 341-356 [doi]
- A Multi-Group Signature Scheme from LatticesTian Qiu, Lin Hou, Dongdai Lin. 359-377 [doi]
- Ciphertext Policy Attribute-Based Encryption for Circuits from LWE AssumptionGeng Wang, Zhen Liu 0008, Dawu Gu. 378-396 [doi]
- Using Equivalent Class to Solve Interval Discrete Logarithm ProblemBin Qi, Jie Ma, Kewei Lv. 397-412 [doi]
- Parallel Steepest Ascent Hill-Climbing for High Nonlinear Boolean and Vectorial Boolean Functions (S-Boxes)Athmane Seghier, Jianxin Li. 413-429 [doi]
- Accelerating SM2 Digital Signature Algorithm Using Modern Processor FeaturesLong Mai, Yuan Yan, Songlin Jia, Shuran Wang, Jianqiang Wang, Juanru Li, Siqi Ma, Dawu Gu. 430-446 [doi]
- Improved Differential Attacks on GIFT-64Huaifeng Chen, Rui Zong, Xiaoyang Dong. 447-462 [doi]
- Adaptively Secure Puncturable Pseudorandom Functions via Puncturable Identity-Based KEMsXin Wang, Shimin Li, Rui Xue 0001. 463-481 [doi]
- Towards Blockchain-Enabled Searchable EncryptionQiang Tang 0001. 482-500 [doi]
- DTGuard: A Lightweight Defence Mechanism Against a New DoS Attack on SDNJianwei Hou, Ziqi Zhang, Wenchang Shi, Bo Qin, Bin Liang 0002. 503-520 [doi]
- Towards Comprehensive Security Analysis of Hidden Services Using Binding Guard RelaysMuqian Chen, Xuebin Wang, Jinqiao Shi, Yue Gao 0003, Can Zhao, Wei Sun. 521-538 [doi]
- Context-Aware IPv6 Address HoppingMatthias Marx, Monina Schwarz, Maximilian Blochberger, Frederik Wille, Hannes Federrath. 539-554 [doi]
- Towards Homograph-Confusable Domain Name Detection Using Dual-Channel CNNGuangxi Yu, Xinghua Yang, Yan Zhang, Huajun Cui, Huiran Yang, Yang Li. 555-568 [doi]
- FraudJudger: Fraud Detection on Digital Payment Platforms with Fewer LabelsRuoyu Deng, Na Ruan, Guangsheng Zhang, Xiaohu Zhang. 569-583 [doi]
- CloudCoT: A Blockchain-Based Cloud Service Dependency Attestation FrameworkZhenyu Zhao, Qingni Shen, Wu Luo, Anbang Ruan. 584-599 [doi]
- An Adversarial Attack Based on Multi-objective Optimization in the Black-Box Scenario: MOEA-APGA IIChunkai Zhang, Yepeng Deng, Xin Guo, Xuan Wang 0002, Chuanyi Liu. 603-612 [doi]
- Neuron Selecting: Defending Against Adversarial Examples in Deep Neural NetworksMing Zhang, Hu Li, Xiaohui Kuang, Ling Pang, Zhendong Wu. 613-629 [doi]
- Capturing the Persistence of Facial Expression Features for Deepfake Video DetectionYiru Zhao, Wanfeng Ge, Wenxin Li, Run Wang, Lei Zhao, Jiang Ming 0002. 630-645 [doi]
- Differentially Private Frequent Itemset Mining Against Incremental UpdatesWenJuan Liang, Hong Chen 0001, Yuncheng Wu, Cuiping Li. 649-667 [doi]
- Differentially Private Reinforcement LearningPingchuan Ma 0004, Zhiqiang Wang, Le Zhang, Ruming Wang, Xiaoxiang Zou, Tao Yang. 668-683 [doi]
- Privacy-Preserving Distributed Machine Learning Based on Secret SharingYe Dong, Xiaojun Chen 0004, Liyan Shen, Dakui Wang. 684-702 [doi]
- Privacy-Preserving Decentralised Singular Value DecompositionBowen Liu, Qiang Tang 0001. 703-721 [doi]
- WSLD: Detecting Unknown Webshell Using Fuzzy Matching and Deep LearningZihao Zhao, Qixu Liu, Tiantian Song, Zhi Wang, Xianda Wu. 725-745 [doi]
- A Character-Level BiGRU-Attention for Phishing ClassificationLijuan Yuan, Zhiyong Zeng, Yikang Lu, Xiaofeng Ou, Tao Feng. 746-762 [doi]
- Tear Off Your Disguise: Phishing Website Detection Using Visual and Network IdentitiesZhaoyu Zhou, Lingjing Yu, Qingyun Liu, Yang Liu, Bo Luo. 763-780 [doi]
- Hierarchical Representation Network for Steganalysis of QIM Steganography in Low-Bit-Rate Speech SignalsHao Yang, Zhongliang Yang, Yongjian Bao, Yongfeng Huang. 783-798 [doi]
- Convolutional Neural Network Based Side-Channel Attacks with Customized FiltersMan Wei, Danping Shi, Siwei Sun, Peng Wang, Lei Hu. 799-813 [doi]
- DLchain: A Covert Channel over Blockchain Based on Dynamic LabelsJing Tian, Gaopeng Gou, Chang Liu, Yige Chen, Gang Xiong, Zhen Li. 814-830 [doi]