Abstract is missing.
- SARR: A Cybersecurity Metrics and Quantification Framework (Keynote)Shouhuai Xu. 3-17 [doi]
- Detecting Internet-Scale Surveillance Devices Using RTSP Recessive FeaturesZhaoteng Yan, Zhi Li 0018, Wenping Bai, Nan Yu, Hongsong Zhu, Limin Sun. 21-35 [doi]
- An Intrusion Detection Framework for IoT Using Partial Domain AdaptationYulin Fan, Yang Li, Huajun Cui, Huiran Yang, Yan Zhang, Weiping Wang. 36-50 [doi]
- Mining Trojan Detection Based on Multi-dimensional Static FeaturesZixian Tang, Qiang Wang, Wenhao Li, Huaifeng Bao, Feng Liu, Wen Wang. 51-65 [doi]
- Botnet Detection Based on Multilateral Attribute GraphHua Cheng, Yinda Shen, Tao Cheng, Yiquan Fang, Jianfan Ling. 66-76 [doi]
- A New Method for Inferring Ground-Truth Labels and Malware Detector Effectiveness MetricsJohn Charlton, Pang Du, Shouhuai Xu. 77-92 [doi]
- Protecting Data Privacy in Federated Learning Combining Differential Privacy and Weak EncryptionChuanyin Wang, Cunqing Ma, Min Li, Neng Gao, Yifei Zhang, Zhuoxiang Shen. 95-109 [doi]
- Using Chinese Natural Language to Configure Authorization Policies in Attribute-Based Access Control SystemZhuoxiang Shen, Neng Gao, Zeyi Liu, Min Li, Chuanyin Wang. 110-125 [doi]
- A Data-Free Approach for Targeted Universal Adversarial PerturbationXiaoyu Wang, Tao Bai, Jun Zhao 0007. 126-138 [doi]
- Caps-LSTM: A Novel Hierarchical Encrypted VPN Network Traffic Identification Using CapsNet and LSTMJiyue Tang, Le Yang, Song Liu, Wenmao Liu, Meng Wang, Chonghua Wang, Bo Jiang, Zhigang Lu. 139-153 [doi]
- Multi-granularity Mobile Encrypted Traffic Classification Based on Fusion FeaturesHui Zhang, Gaopeng Gou, Gang Xiong 0001, Chang Liu 0049, Yuewen Tan, Ke Ye. 154-170 [doi]
- Stochastic Simulation Techniques for Inference and Sensitivity Analysis of Bayesian Attack GraphsIsaac Matthews, Sadegh Soudjani, Aad van Moorsel. 171-186 [doi]
- Simulations of Event-Based Cyber Dynamics via Adversarial Machine LearningZhaofeng Liu, Yinchong Wang, Huashan Chen, Wenlian Lu. 187-201 [doi]
- Dismantling Interdependent Networks Based on Supra-Laplacian EnergyWei Lin, Shuming Zhou, Min Li, Gaolin Chen. 205-213 [doi]
- DWT-DQFT-Based Color Image Blind Watermark with QR DecompositionLiangcheng Qin, Ling Ma, Xiongjun Fu. 214-224 [doi]
- A Multi-level Elastic Encryption Protection ModelCaimei Wang, Zijian Zhou, Hong Li, Zhengmao Li, Bowen Huang. 225-235 [doi]
- An Event-Based Parameter Switching Method for Controlling Cybersecurity DynamicsZhaofeng Liu, Wenlian Lu, Yingying Lang. 236-251 [doi]
- RansomLens: Understanding Ransomware via Causality Analysis on System Provenance GraphRui Mei, Han-Bing Yan, Zhihui Han. 252-267 [doi]