Abstract is missing.
- BS: Blockwise Sieve Algorithm for Finding Short Vectors from SublatticesJinzheng Cao, Qingfeng Cheng, Xinghua Li, Yanbin Pan. 3-18 [doi]
- Calibrating Learning Parity with Noise Authentication for Low-Resource DevicesTeik Guan Tan, De Wen Soh, Jianying Zhou 0001. 19-36 [doi]
- New Results of Breaking the CLS Scheme from ACM-CCS 2014Jing Gao, Jun Xu, Tianyu Wang, Lei Hu. 37-54 [doi]
- A Note on the Security Framework of Two-key DbHtS MACsTingting Guo, Peng Wang 0009. 55-68 [doi]
- Maliciously Secure Multi-party PSI with Lower Bandwidth and Faster ComputationZhi Qiu, Kang Yang 0002, Yu Yu 0001, Lijing Zhou. 69-88 [doi]
- Conditional Cube Attacks on Full Members of KNOT-AEAD FamilySiwei Chen, Zejun Xiang 0001, Xiangyong Zeng, Shasha Zhang. 89-108 [doi]
- Fast Fourier Orthogonalization over NTRU LatticesShuo Sun, Yongbin Zhou, Rui Zhang 0002, Yang Tao 0001, Zehua Qiao, Jingdian Ming. 109-127 [doi]
- Secure Sketch and Fuzzy Extractor with Imperfect Randomness: An Information-Theoretic StudyKaini Chen, Peisong Shen, Kewei Lv, Chi Chen. 128-147 [doi]
- Tight Analysis of Decryption Failure Probability of Kyber in RealityBoyue Fang, Weize Wang, Yunlei Zhao. 148-160 [doi]
- Improving Deep Learning Based Password Guessing Models Using Pre-processingYuxuan Wu, Ding Wang, Yunkai Zou, Ziyi Huang. 163-183 [doi]
- Exploring Phone-Based Authentication Vulnerabilities in Single Sign-On SystemsMatthew M. Tolbert, Elie M. Hess, Mattheus C. Nascimento, Yunsen Lei, Craig A. Shue. 184-200 [doi]
- FRACTAL: Single-Channel Multi-factor Transaction Authentication Through a Compromised TerminalSavio Sciancalepore, Simone Raponi, Daniele Caldarola, Roberto Di Pietro. 201-217 [doi]
- Lightweight and Practical Privacy-Preserving Image Masking in Smart CommunityZhen Liu, Yining Liu, Weizhi Meng. 221-239 [doi]
- Using Blockchains for Censorship-Resistant Bootstrapping in Anonymity NetworksYang Han, Dawei Xu, Jiaqi Gao, Liehuang Zhu. 240-260 [doi]
- Repetitive, Oblivious, and Unlinkable SkNN Over Encrypted-and-Updated Data on CloudMeng Li 0006, Mingwei Zhang, Jianbo Gao, Chhagan Lal, Mauro Conti, Mamoun Alazab. 261-280 [doi]
- Privacy-Aware Split Learning Based Energy Theft Detection for Smart GridsArwa Alromih, John A. Clark, Prosanta Gope. 281-300 [doi]
- Query-Efficient Black-Box Adversarial Attack with Random Pattern NoisesMakoto Yuito, Kenta Suzuki, Kazuki Yoneyama. 303-323 [doi]
- Autoencoder Assist: An Efficient Profiling Attack on High-Dimensional DatasetsQi Lei, Zijia Yang, Qin Wang, Yaoling Ding, Zhe Ma, An Wang 0001. 324-341 [doi]
- TZ-IMA: Supporting Integrity Measurement for Applications with ARM TrustZoneLiantao Song, Yan Ding, Pan Dong, Yong Guo, Chuang Wang. 342-358 [doi]
- FuzzBoost: Reinforcement Compiler FuzzingXiaoting Li, Xiao Liu, Lingwei Chen, Rupesh Prajapati, Dinghao Wu. 359-375 [doi]
- Secure Boolean Masking of Gimli - Optimization and Evaluation on the Cortex-M4Tzu-Hsien Chang, Yen-Ting Kuo, Jiun-Peng Chen, Bo-Yin Yang. 376-393 [doi]
- DeepC2: AI-Powered Covert Command and Control on OSNsZhi Wang, Chaoge Liu, Xiang Cui, Jie Yin, Jiaxi Liu, Di Wu, Qixu Liu. 394-414 [doi]
- ODDITY: An Ensemble Framework Leverages Contrastive Representation Learning for Superior Anomaly DetectionHongyi Peng, Vinay Sachidananda, Teng Joon Lim, Rajendra Patil, Mingchang Liu, Sivaanandh Muneeswaran, Mohan Gurusamy. 417-437 [doi]
- Deep Learning Based Webshell Detection Coping with Long Text and Lexical AmbiguityTongjian An, Xuefei Shui, Hongkui Gao. 438-457 [doi]
- SimCGE: Simple Contrastive Learning of Graph Embeddings for Cross-Version Binary Code Similarity DetectionFengliang Xia, Guixing Wu, Guochao Zhao, Xiangyu Li. 458-471 [doi]
- FN2: Fake News DetectioN Based on Textual and Contextual FeaturesMouna Rabhi, Spiridon Bakiras, Roberto Di Pietro. 472-491 [doi]
- Malware Detection with Limited Supervised Information via Contrastive Learning on API Call SequencesMohan Gao, Peng Wu, Li Pan. 492-507 [doi]
- Semi-supervised Context Discovery for Peer-Based Anomaly Detection in Multi-layer NetworksBo Dong, Yuhang Wu, Micheal Yeh, Yusan Lin, Yuzhong Chen, Hao Yang, Fei Wang, Wanxin Bai, Krupa Brahmkstri, Yimin Zhang 0002, Chinna Kummitha, Verma Abhisar. 508-524 [doi]
- Peekaboo: Hide and Seek with Malware Through Lightweight Multi-feature Based Lenient Hybrid ApproachMingchang Liu, Vinay Sachidananda, Hongyi Peng, Rajendra Patil, Sivaanandh Muneeswaran, Mohan Gurusamy. 525-545 [doi]
- TapTree: Process-Tree Based Host Behavior Modeling and Threat Detection Framework via Sequential Pattern MiningMohammad Mamun 0001, Scott Buffett. 546-565 [doi]
- Dependency-Based Link Prediction for Learning Microsegmentation PolicySteven Noel, Vipin Swarup. 569-588 [doi]
- Chuchotage: In-line Software Network Protocol Translation for (D)TLSPegah Nikbakht Bideh, Nicolae Paladi. 589-607 [doi]
- Study on the Effect of Face Masks on Forensic Speaker RecognitionGeorgiana Bogdanel, Nadia Belghazi-Mohamed, Hilario Gómez-Moreno, Sergio Lafuente-Arroyo. 608-621 [doi]
- Video Forensics for Object Removal Based on Darknet3DKejun Zhang, Yuhao Wang, Xinying Yu. 622-637 [doi]