Abstract is missing.
- A Secure Remote Monitoring Framework Supporting Efficient Fine-Grained Access Control and Data Processing in IoTYaxing Chen, Wenhai Sun, Ning Zhang 0017, Qinghua Zheng, Wenjing Lou, Y. Thomas Hou. 3-21 [doi]
- Securing the Smart Home via a Two-Mode Security FrameworkDevkishen Sisodia, Samuel Mergendahl, Jun Li, Hasan Cam. 22-42 [doi]
- Out of Kilter: Holistic Exploitation of Denial of Service in Internet of ThingsSuhas Setikere, Vinay Sachidananda, Yuval Elovici. 43-52 [doi]
- Augmented Chain of Ownership: Configuring IoT Devices with the Help of the BlockchainSophie Dramé-Maigné, Maryline Laurent, Laurent Castillo, Hervé Ganem. 53-68 [doi]
- Secure and Efficient Multi-Party Directory Publication for Privacy-Preserving Data SharingKatchaguy Areekijseree, Yuzhe Tang, Ju Chen, Shuang Wang 0002, Arun Iyengar, Balaji Palanisamy. 71-94 [doi]
- A Formal Logic Framework for the Automation of the Right to Be ForgottenAbhishek Tiwari, Fabian Bendun, Christian Hammer 0001. 95-111 [doi]
- Privacy-Preserving Biometric-Based Remote User Authentication with Leakage ResilienceYangguang Tian, Yingjiu Li, Rongmao Chen, Nan Li, Ximeng Liu, Bing Chang, Xingjie Yu. 112-132 [doi]
- Differentially Private High-Dimensional Data Publication via Markov NetworkFengqiong Wei, Wei Zhang, Yunfang Chen, Jingwen Zhao. 133-148 [doi]
- Automated Identification of Sensitive Data via Flexible User RequirementsZiqi Yang, Zhenkai Liang. 151-171 [doi]
- Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the WildShuaike Dong, Menghao Li, Wenrui Diao, Xiangyu Liu, Jian Liu, Zhou Li, Fenghao Xu, Kai Chen, Xiaofeng Wang, Kehuan Zhang. 172-192 [doi]
- Transparent Low-Latency Network Anonymisation for Mobile DevicesMartin Byrenheid, Stefan Köpsell, Alexander Naumenko, Thorsten Strufe. 193-209 [doi]
- Inferring UI States of Mobile Applications Through Power Side Channel ExploitationYao Guo 0001, Junming Ma, Wenjun Wu, Xiangqun Chen. 210-226 [doi]
- PoliteCamera: Respecting Strangers' Privacy in Mobile PhotographingAng Li, Wei Du, Qinghua Li. 227-247 [doi]
- Lexical Mining of Malicious URLs for Classifying Android MalwareShanshan Wang, Qiben Yan, Zhenxiang Chen, Lin Wang, Riccardo Spolaor, Bo Yang, Mauro Conti. 248-263 [doi]
- GranDroid: Graph-Based Detection of Malicious Network Behaviors in Android ApplicationsZhiqiang Li, Jun Sun, Qiben Yan, Witawas Srisa-an, Shakthi Bachala. 264-280 [doi]
- FGFDect: A Fine-Grained Features Classification Model for Android Malware DetectionChao Liu, Jianan Li, Min Yu, Bo Luo, Song Li, Kai Chen, Weiqing Huang, Bin Lv. 281-293 [doi]
- An Adaptive Primary User Emulation Attack Detection Mechanism for Cognitive Radio NetworksQi Dong, Yu Chen, Xiaohua Li, Kai Zeng 0001, Roger Zimmermann. 297-317 [doi]
- VeReMi: A Dataset for Comparable Evaluation of Misbehavior Detection in VANETsRens Wouter van der Heijden, Thomas Lukaseder, Frank Kargl. 318-337 [doi]
- Birds of a Feather Flock Together: Fuzzy Extractor and Gait-Based Robust Group Secret Key Generation for Smart WearablesChitra Javali, Girish Revadigar. 338-357 [doi]
- Unchained Identities: Putting a Price on Sybil Nodes in Mobile Ad Hoc NetworksArne Bochem, Benjamin Leiding, Dieter Hogrefe. 358-374 [doi]
- Understanding the Hidden Cost of Software Vulnerabilities: Measurements and PredictionsAfsah Anwar, Aminollah Khormali, DaeHun Nyang, Aziz Mohaisen. 377-395 [doi]
- Privacy-Enhanced Fraud Detection with Bloom FiltersDaniel Arp, Erwin Quiring, Tammo Krueger, Stanimir Dragiev, Konrad Rieck. 396-415 [doi]
- FriSM: Malicious Exploit Kit Detection via Feature-Based String-Similarity MatchingSungjin Kim, Brent ByungHoon Kang. 416-432 [doi]
- A Machine Learning Framework for Studying Domain Generation Algorithm (DGA)-Based MalwareTommy Chin, Kaiqi Xiong, Chengbin Hu, Yi Li. 433-448 [doi]
- Se-Lambda: Securing Privacy-Sensitive Serverless Applications Using SGX EnclaveWeizhong Qiang, Zezhao Dong, Hai Jin 0001. 451-470 [doi]
- CAVAS: Neutralizing Application and Container Security Vulnerabilities in the Cloud Native EraKennedy A. Torkura, Muhammad I. H. Sukmana, Feng Cheng 0002, Christoph Meinel. 471-490 [doi]
- Shuffler: Mitigate Cross-VM Side-Channel Attacks via Hypervisor SchedulingLi Liu, an Wang, Wanyu Zang, Meng Yu, Menbai Xiao, Songqing Chen. 491-511 [doi]
- Building Your Private Cloud Storage on Public Cloud Service Using Embedded GPUsWangzhao Cheng, Fangyu Zheng, Wuqiong Pan, Jingqiang Lin, Huorong Li, Bingyu Li. 512-528 [doi]
- Secure and Efficient Outsourcing of Large-Scale Overdetermined Systems of Linear EquationsShiran Pan, Wen Tao Zhu, Qiongxiao Wang, Bing Chang. 529-548 [doi]
- Privacy-Preserving Multiparty Learning for Logistic RegressionWei Du, Ang Li, Qinghua Li. 549-568 [doi]
- Privacy-Preserving Outsourcing of Large-Scale Nonlinear Programming to the CloudAng Li, Wei Du, Qinghua Li. 569-587 [doi]
- A Verifiable and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data with Accuracy ImprovementQi Zhang, Shaojing Fu, Nan Jia, Ming Xu. 588-604 [doi]