Abstract is missing.
- The Golden Snitch: A Byzantine Fault Tolerant Protocol with ActivityHuimei Liao, Haixia Xu, Peili Li. 3-21 [doi]
- Rectifying Administrated ERC20 TokensNikolay Ivanov, Hanqing Guo, Qiben Yan. 22-37 [doi]
- Moat: Model Agnostic Defense against Targeted Poisoning Attacks in Federated LearningArpan Manna, Harsh Kasyap, Somanath Tripathy. 38-55 [doi]
- Certified Malware in South Korea: A Localized Study of Breaches of Trust in Code-Signing PKI EcosystemBum Jun Kwon, Sanghyun Hong, Yuseok Jeon, Doowon Kim. 59-77 [doi]
- GAN-Based Adversarial Patch for Malware C2 Traffic to Bypass DL DetectorJunnan Wang, Qixu Liu, Chaoge Liu, Jie Yin. 78-96 [doi]
- Analyzing the Security of OTP 2FA in the Face of Malicious TerminalsAhmed Tanvir Mahdad, Mohammed Jubur, Nitesh Saxena. 97-115 [doi]
- Disappeared Face: A Physical Adversarial Attack Method on Black-Box Face Detection ModelsChuan Zhou, Huiyun Jing, Xin He, Liming Wang, Kai Chen, Duohe Ma. 119-135 [doi]
- HIAWare: Speculate Handwriting on Mobile Devices with Built-In SensorsJing Chen 0003, Peidong Jiang, Kun He 0008, Cheng Zeng, RuiYing Du. 136-152 [doi]
- Studies of Keyboard Patterns in Passwords: Recognition, Characteristics and Strength EvolutionKunyu Yang, Xuexian Hu, Qihui Zhang, Jianghong Wei, Wenfen Liu. 153-168 [doi]
- CNN-Based Continuous Authentication on Smartphones with Auto Augmentation SearchShaojiang Deng, JiaXing Luo, Yantao Li. 169-186 [doi]
- Generating Adversarial Point Clouds on Multi-modal Fusion Based 3D Object Detection ModelHuiying Wang, Huixin Shen, Boyang Zhang, Yu Wen, Dan Meng. 187-203 [doi]
- Source Identification from In-Vehicle CAN-FD Signaling: What Can We Expect?Yucheng Liu, Xiangxue Li. 204-223 [doi]
- EmuIoTNet: An Emulated IoT Network for Dynamic AnalysisQin Si, Lei Cui 0003, Lun Li, Zhenquan Ding, Yongji Liu, Zhiyu Hao. 224-240 [doi]
- ACGVD: Vulnerability Detection Based on Comprehensive Graph via Graph Neural Network with AttentionMin Li, Chunfang Li, Shuailou Li, Yanna Wu, Boyang Zhang, Yu Wen. 243-259 [doi]
- TranFuzz: An Ensemble Black-Box Attack Framework Based on Domain Adaptation and FuzzingHao Li, Shanqing Guo, Peng Tang, Chengyu Hu, Zhenxiang Chen. 260-275 [doi]
- Software Obfuscation with Non-Linear Mixed Boolean-Arithmetic ExpressionsBinbin Liu, Weijie Feng, Qilong Zheng, Jing Li, Dongpeng Xu 0001. 276-292 [doi]
- VIRSA: Vectorized In-Register RSA Computation with Memory Disclosure ResistanceYu Fu, Wei Wang, Lingjia Meng, Qiongxiao Wang, Yuan Zhao, Jingqiang Lin. 293-309 [doi]
- Informer: Protecting Intel SGX from Cross-Core Side Channel ThreatsFan Lang, Wei Wang, Lingjia Meng, Qiongxiao Wang, Jingqiang Lin, Li Song. 310-328 [doi]
- Towards Open World Traffic ClassificationZhu Liu, Lijun Cai, Lixin Zhao, Aimin Yu, Dan Meng. 331-347 [doi]
- Comprehensive Degree Based Key Node Recognition Method in Complex NetworksLixia Xie, Honghong Sun, Hongyu Yang, Liang Zhang. 348-367 [doi]
- Improving Convolutional Neural Network-Based Webshell Detection Through Reinforcement LearningYalun Wu, Minglu Song, Yike Li, Yunzhe Tian, Endong Tong, Wenjia Niu, Bowei Jia, HaiXiang Huang, Qiong Li, Jiqiang Liu. 368-383 [doi]
- Exploring the Security Issues of Trusted CA Certificate ManagementYanduo Fu, Qiongxiao Wang, Jingqiang Lin, Aozhuo Sun, Linli Lu. 384-401 [doi]
- Effective Anomaly Detection Model Training with only Unlabeled Data by Weakly Supervised Learning TechniquesWenzhuo Yang, Kwok-Yan Lam. 402-425 [doi]
- CySecAlert: An Alert Generation System for Cyber Security Events Using Open Source Intelligence DataThea Riebe, Tristan Wirth, Markus Bayer, Philipp Kuehn, Marc-André Kaufhold, Volker Knauthe, Stefan Guthe, Christian Reuter 0001. 429-446 [doi]
- CyberRel: Joint Entity and Relation Extraction for Cybersecurity ConceptsYongyan Guo, Zhengyu Liu, Cheng Huang, Jiayong Liu, Wangyuan Jing, Ziwang Wang, Yanghao Wang. 447-463 [doi]
- Microblog User Location Inference Based on POI and Query Likelihood ModelYimin Liu, Xiangyang Luo, Han Li. 464-480 [doi]