Abstract is missing.
- Trustless Framework for Iterative Double Auction Based on BlockchainTruc D. T. Nguyen, My T. Thai. 3-22 [doi]
- Towards a Multi-chain Future of Proof-of-SpaceShuyang Tang, Jilai Zheng, Yao Deng, Ziyu Wang, Zhiqiang Liu, Dawu Gu, Zhen Liu 0008, Yu Long. 23-38 [doi]
- Secure Consistency Verification for Untrusted Cloud Storage by Public BlockchainsKai Li, Yuzhe Tang, Beom Heyn Ben Kim, Jianliang Xu. 39-62 [doi]
- An Enhanced Verifiable Inter-domain Routing Protocol Based on BlockchainYaping Liu, Shuo Zhang, Haojin Zhu, Peng-Jun Wan, Lixin Gao, Yaoxue Zhang. 63-82 [doi]
- Edge-Assisted CNN Inference over Encrypted Data for Internet of ThingsYifan Tian, Jiawei Yuan, Shucheng Yu, Yantian Hou, Houbing Song. 85-104 [doi]
- POKs Based Secure and Energy-Efficient Access Control for Implantable Medical DevicesChenglong Fu, Xiaojiang Du, Longfei Wu, Qiang Zeng 0001, Amr Mohamed, Mohsen Guizani. 105-125 [doi]
- USB-Watch: A Dynamic Hardware-Assisted USB Threat Detection FrameworkKyle Denney, Enes Erdin, Leonardo Babun, Michael Vai, A. Selcuk Uluagac. 126-146 [doi]
- Automated IoT Device Fingerprinting Through Encrypted Stream ClassificationJianhua Sun, Kun Sun 0001, Chris Shenefiel. 147-167 [doi]
- DeepCG: Classifying Metamorphic Malware Through Deep Learning of Call GraphsShuang Zhao, Xiaobo Ma, Wei Zou, Bo Bai. 171-190 [doi]
- ChaffyScript: Vulnerability-Agnostic Defense of JavaScript Exploits via Memory PerturbationXunchao Hu, Brian Testa, Heng Yin. 191-213 [doi]
- Obfusifier: Obfuscation-Resistant Android Malware Detection SystemZhiqiang Li, Jun Sun, Qiben Yan, Witawas Srisa-an, Yutaka Tsutano. 214-234 [doi]
- Closing the Gap with APTs Through Semantic Clusters and Automated CybergamesSteven Gianvecchio, Christopher Burkhalter, Hongying Lan, Andrew Sillers, Kenneth P. Smith. 235-254 [doi]
- Stochastic ADMM Based Distributed Machine Learning with Differential PrivacyJiahao Ding, Sai Mounika Errapotu, Haijun Zhang, Yanmin Gong, Miao Pan, Zhu Han. 257-277 [doi]
- Topology-Aware Hashing for Effective Control Flow Graph Similarity AnalysisYuping Li, Jiyong Jang, Xinming Ou. 278-298 [doi]
- Trojan Attack on Deep Generative Models in Autonomous DrivingShaohua Ding, Yulong Tian, Fengyuan Xu, Qun Li, Sheng Zhong. 299-318 [doi]
- FuncNet: A Euclidean Embedding Approach for Lightweight Cross-platform Binary RecognitionMengxia Luo, Can Yang, Xiaorui Gong, Lei Yu. 319-337 [doi]
- Towards Forward Secure Internet TrafficEman Salem Alashwali, Pawel Szalachowski, Andrew Martin. 341-364 [doi]
- Traffic-Based Automatic Detection of Browser FingerprintingRui Zhao, Edward Chow, Chunchun Li. 365-385 [doi]
- Measuring Tor Relay PopularityTao Chen, Weiqi Cui, Eric Chan-Tin. 386-405 [doi]
- SoK: ATT&CK Techniques and Trends in Windows MalwareKris Oosthoek, Christian Doerr. 406-425 [doi]
- Covert Channels in SDN: Leaking Out Information from Controllers to End HostsJiahao Cao, Kun Sun, Qi Li, Mingwei Xu, Zijie Yang, Kyung Joon Kwak, Jason H. Li. 429-449 [doi]
- Victim-Aware Adaptive Covert ChannelsRiccardo Bortolameotti, Thijs van Ede, Andrea Continella, Maarten H. Everts, Willem Jonker, Pieter H. Hartel, Andreas Peter. 450-471 [doi]
- Random Allocation Seed-DSSS Broadcast Communication Against Jamming AttacksAhmad Alagil, Yao Liu. 472-489 [doi]
- A Loss-Tolerant Mechanism of Message Segmentation and Reconstruction in Multi-path Communication of Anti-tracking NetworkChangbo Tian, Yongzheng Zhang 0002, Tao Yin, Yupeng Tuo, Ruihai Ge. 490-508 [doi]
- Ticket Transparency: Accountable Single Sign-On with Privacy-Preserving Public LogsDawei Chu, Jingqiang Lin, FengJun Li, Xiaokun Zhang, Qiongxiao Wang, Guangqi Liu. 511-531 [doi]
- Decentralized Privacy-Preserving Reputation Management for Mobile CrowdsensingLichuan Ma, Qingqi Pei, Youyang Qu, Kefeng Fan, Xin Lai. 532-548 [doi]
- Location Privacy Issues in the OpenSky Network Crowdsourcing PlatformSavio Sciancalepore, Saeif Alhazbi, Roberto Di Pietro. 549-568 [doi]
- Privacy-Preserving Genomic Data Publishing via Differentially-Private Suffix TreeTanya Khatri, Gaby G. Dagher, Yantian Hou. 569-584 [doi]