Abstract is missing.
- Classify Me Correctly if You Can: Evaluating Adversarial Machine Learning Threats in NIDSNeea Rusch, Asma Jodeiri Akbarfam, Hoda Maleki, Gagan Agrawal, Gokila Dorai. 3-22 [doi]
- CUFT: Cuflow-Based Approach with Multi-headed Attention Mechanism for Encrypted Traffic ClassificationXin Zong, Min Luo 0002, Cong Peng 0005, Debiao He. 23-40 [doi]
- CyberEA: An Efficient Entity Alignment Framework for Cybersecurity Knowledge GraphYue Huang, Yongyan Guo, Cheng Huang 0003. 41-62 [doi]
- DNN Architecture Attacks via Network and Power Side ChannelsYuanjun Dai, Qingzhe Guo, An Wang 0002. 63-87 [doi]
- Invisibility Spell: Adversarial Patch Attack Against Object DetectorsJianyi Zhang, Ronglin Guan, Zhangchi Zhao, Xiuying Li, Zezheng Sun. 88-109 [doi]
- Meta Perturbation Generation Network for Text-Based CAPTCHAZhuoting Wu, Zhiwei Guo, Jiuxiang You, Zhenguo Yang, Qing Li 0001, Wenyin Liu. 110-124 [doi]
- Model Inversion Attacks on Homogeneous and Heterogeneous Graph Neural NetworksRenyang Liu 0001, Wei Zhou 0011, Jinhong Zhang, Xiaoyuan Liu, Peiyuan Si, Haoran Li. 125-144 [doi]
- Unsupervised Multi-criteria Adversarial Detection in Deep Image RetrievalYanru Xiao, Cong Wang, Xing Gao. 145-164 [doi]
- VRC-GraphNet: A Graph Neural Network-Based Reasoning Framework for Attacking Visual Reasoning CaptchasBotao Xu, Haizhou Wang. 165-184 [doi]
- An Adaptive Authentication Protocol for Internet of Vehicles Based on Vehicle DensityHao Peng, Zisang Xu, Ruirui Zhang, Jianbo Xu. 187-204 [doi]
- Discovering and Understanding the Security Flaws of Authentication and Authorization in IoT Cloud APIs for Smart HomeMinglei Guo, Zhenghang Xiao, Xin Liu, Jianwei Zhuge. 205-224 [doi]
- Optimizing Lightweight Intermittent Message Authentication for Programmable Logic ControllerJiaqi Yang, Jun Xian Chia, Xijie Ba, Jianying Zhou, Zheng Yang. 225-243 [doi]
- Byzantine Protocols with Asymptotically Optimal Communication ComplexityHanzheng Lyu, Shaokang Xie, Jianyu Niu, Chen Feng 0001. 247-264 [doi]
- Demystifying Blockchain Scalability: Sibling Chains with Minimal InterleavingJiangFeng Ma, Xuetao Zhang, Xiangxue Li. 265-286 [doi]
- VDABSys: A Novel Security-Testing Framework for Blockchain Systems Based on Vulnerability detectionJinfu Chen 0001, Qiaowei Feng, Saihua Cai, Dengzhou Shi, Dave Towey, Yuhao Chen, Dongjie Wang. 287-305 [doi]
- Anonymous Key Issuing Protocol with Certified Identities in Identity-Based EncryptionYanqing Yang, Jian Wang. 309-328 [doi]
- Batch Lattice-Based Designated-Verifier ZK-SNARKs for R1CSXi Lin, Han-xia, Yongqiang Li, Mingsheng Wang. 329-349 [doi]
- Certificateless Aggregate Signature Without Trapdoor for Cloud StorageYingjie Dong, Yongjian Liao, Zhishuo Zhang, Wen Huang 0002. 350-368 [doi]
- Efficient Zero Knowledge for Regular LanguageMichael Raymond, Gillian Evers, Jan Ponti, Diya Krishnan, Xiang Fu 0001. 369-394 [doi]
- Enabling Fast Settlement in Atomic Cross-Chain SwapsFeng Zhuo, Zhaoxiong Song, Linpeng Jia, Hanwen Zhang 0001, Zhongcheng Li, Yi Sun 0004. 395-412 [doi]
- HeSUN: Homomorphic Encryption for Secure Unbounded Neural Network InferenceDuy Tung Khanh Nguyen, Dung Hoang Duong, Willy Susilo, Yang-Wai Chow. 413-438 [doi]
- Optimization of Functional Bootstraps with Large LUT and Packing Key SwitchingKeyi Liu, Chungen Xu, Bennian Dou, Lei Xu 0019. 439-458 [doi]
- An Authentication Algorithm for Sets of Spatial Data ObjectsWenhao Li, Chengliang Wang, Xiaobing Hu, Hongwen Zhou, Hang Zeng, Yanai Wang. 461-475 [doi]
- An Efficient Private Information Retrieval Protocol Based on TFHEHaibo Tian, Yini Lin. 476-495 [doi]
- mShield: Protecting In-process Sensitive Data Against Vulnerable Third-Party LibrariesYunming Zhang, Quanwei Cai 0001, Houqiang Li, Jingqiang Lin 0001, Wei Wang 0335. 496-513 [doi]
- Password Cracking by Exploiting User Group InformationBeibei Zhou, Daojing He, Sencun Zhu, Shanshan Zhu, Sammy Chan, Xiao Yang. 514-532 [doi]