Abstract is missing.
- RLTree: Website Fingerprinting Through Resource Loading TreeChangzhi Li, Lihai Nie, Laiping Zhao. 3-16 [doi]
- Re-Check Your Certificates! Experiences and Lessons Learnt from Real-World HTTPS Certificate DeploymentsWenya Wang, Yakang Li, Chao Wang, Yuan Yan, Juanru Li, Dawu Gu. 17-37 [doi]
- ZERMIA - A Fault Injector Framework for Testing Byzantine Fault Tolerant ProtocolsJoão Soares, Ricardo Fernandez, Miguel Silva, Tadeu Freitas, Rolando Martins. 38-60 [doi]
- Revocable Data Sharing Methodology Based on SGX and BlockchainLiang Zhang, Haibin Kan, Yang Xu 0013, Jinhao Ran. 61-78 [doi]
- On the Analysis of the Outsourced Revocable Identity-Based Encryption from LatticesYanhua Zhang, Ximeng Liu, Yupu Hu, Huiwen Jia. 79-99 [doi]
- Preventing Fake News Propagation in Social Networks Using a Context Trust-Based Security ModelNadav Voloch, Ehud Gudes, Nurit Gal-Oz. 100-115 [doi]
- A Lightweight Android Malware Detection Framework Based on Knowledge DistillationYongbo Zhi, Ning Xi, Yuanqing Liu, Honglei Hui. 116-130 [doi]
- Federated Learning-Based Intrusion Detection in the Context of IIoT Networks: Poisoning Attack and DefenseNguyen Chi Vy, Nguyen Huu Quyen, Phan The Duy, Van-Hau Pham. 131-147 [doi]
- A Simplified and Effective Solution for Hybrid SDN Network DeploymentHaisheng Yu 0001, Wenyong Wang, Yan Liu, Lihong Cheng, Sai Zou. 148-161 [doi]
- Group Key Exchange Compilers from Generic Key ExchangesHector B. Hougaard, Atsuko Miyaji. 162-184 [doi]
- An Architecture for Processing a Dynamic Heterogeneous Information Network of Security IntelligenceMarios Anagnostopoulos, Egon Kidmose, Amine Laghaout, Rasmus L. Olsen, Sajad Homayoun, Christian Damsgaard Jensen, Jens Myrup Pedersen. 185-201 [doi]
- The Complexity of Testing Cryptographic Devices on Input FaultsAlisher Ikramov, Gayrat Juraev. 202-209 [doi]
- A Malware Family Classification Method Based on the Point Cloud Model DGCNNYuxin Ding, Zihan Zhou 0014, Wen Qian. 210-221 [doi]
- Collection of the Main Anti-Virus Detection and Bypass TechniquesJérémy Donadio, Guillaume Guérard, Soufian Ben Amor. 222-237 [doi]
- Profiled Attacks Against the Elliptic Curve Scalar Point Multiplication Using Neural NetworksAlessandro Barenghi, Diego Carrera, Silvia Mella, Andrea Pace, Gerardo Pelosi, Ruggero Susella. 238-257 [doi]
- Deep Cross-Modal Supervised Hashing Based on Joint Semantic MatrixNa Chen, Yuan Cao 0005, Chao Liu 0008. 258-274 [doi]
- Accurate Polar Harmonic Transform-Based Watermarking Using Blind Statistical DetectorYu Sang, Yilin Bei, Zhiyang Yang, Chen Zhao. 277-288 [doi]
- Cloud Key Management Based on Verifiable Secret SharingMustapha Hedabou. 289-303 [doi]
- A Scheme for Sensor Data Reconstruction in Smart HomeYegang Du. 304-313 [doi]
- Privacy-Preserving and Auditable Federated Deep Reinforcement Learning for Robotic ManipulationXudong Zhu, Hui Li 0006. 314-325 [doi]
- HALNet: A Hybrid Deep Learning Model for Encrypted C&C Malware Traffic DetectionRuiyuan Li, Zehui Song, Wei Xie, Chengwei Zhang 0002, Guohui Zhong, Xiaobing Pei. 326-339 [doi]
- Tracing Software ExploitationAyman Youssef, Mohamed Abdelrazek 0001, Chandan Karmakar, Zubair Baig. 340-352 [doi]
- A Secure and Privacy Preserving Federated Learning Approach for IoT Intrusion Detection SystemPhan The Duy, Huynh Nhat Hao, Huynh Minh Chu, Van-Hau Pham. 353-368 [doi]
- Cryptanalysis of a Fully Anonymous Group Signature with Verifier-Local Revocation from ICICS 2018Yanhua Zhang, Ximeng Liu, Yupu Hu, Huiwen Jia. 369-382 [doi]