Abstract is missing.
- A Game Theoretical Analysis of Distributed Denial-of-Service Defense IncentiveMingwei Zhang 0004, Jun Li 0001, Jiabin Wu, Peter L. Reiher. 3-24 [doi]
- DDoS Mitigation Dilemma Exposed: A Two-Wave Attack with Collateral Damage of MillionsLumin Shi, Jun Li 0001, Devkishen Sisodia, Mingwei Zhang 0004, Alberto Dainotti, Peter L. Reiher. 25-44 [doi]
- Lightweight Intrusion Detection for IoT Systems Using Artificial Neural NetworksRadhwan A. A. Saleh, Louai Al-Awami, Mustafa Ghaleb, Anas Ahmad Abudaqa. 45-59 [doi]
- MVTBA: A Novel Hybrid Deep Learning Model for Encrypted Malicious Traffic IdentificationZuwei Fan, Shunliang Zhang. 60-79 [doi]
- POP-HIT: Partially Order-Preserving Hash-Induced Transformation for Privacy Protection in Face Recognition Access ControlYatish Dubasi, Qinghua Li, Khoa Luu. 80-98 [doi]
- Enhancing Cross-Device Security with Fine-Grained Permission ControlHan Hu, Daibin Wang, Tailiang Hong, Sheng Zhang. 101-121 [doi]
- The Security Analysis of ROS2 CommunicationShuo Yang, Hongru Li, Jian Guo. 122-139 [doi]
- VET: Autonomous Vehicular Credential Verification Using Trajectory and Motion VectorsEbuka Oguchi, Nirnimesh Ghose. 140-164 [doi]
- A Stable Fine-Grained Webpage Fingerprinting: Aiming at the Unstable Realistic NetworkSongtao Liu, Hua Wu 0004, Hao Luo, Guang Cheng 0001, Xiaoyan Hu. 167-188 [doi]
- Securing Web Inputs Using Parallel Session AttachmentsZiqi Yang, Ruite Xu, Qixiao Lin, Shikun Wu, Jian Mao, Zhenkai Liang. 189-208 [doi]
- Unsupervised and Adaptive Tor Website FingerprintingGuoqiang Zhang, Jiahao Cao, Mingwei Xu, Xinhao Deng. 209-229 [doi]
- Visibility of Scan Traffic Trends in Sparsely Populated DarknetsKodai Mizutani, Daisuke Kotani, Yasuo Okabe. 230-248 [doi]
- Do Backdoors Assist Membership Inference Attacks?Yumeki Goto, Nami Ashizawa, Toshiki Shibahara, Naoto Yanai. 251-265 [doi]
- Efficient and Scalable Multi-party Privacy-Preserving k-NN ClassificationXinglei Li, Haifeng Qian. 266-286 [doi]
- Efficient Unbalanced Private Set Intersection Protocol over Large-Scale Datasets Based on Bloom FilterOu Ruan, Chaohao Ai, Changwang Yan. 287-301 [doi]
- Practical Privacy-Preserving Community Detection in Decentralized Weighted NetworksTingxuan Han, Wei Tong, Jiacheng Niu, Sheng Zhong 0002. 302-320 [doi]
- Split Without a Leak: Reducing Privacy Leakage in Split LearningKhoa Nguyen 0005, Tanveer Khan, Antonis Michalas. 321-344 [doi]
- Street Rep: A Privacy-Preserving Reputation Aggregation SystemChristophe Hauser, Shirin Nilizadeh, Yan Shoshitaishvili, Ni Trieu, Srivatsan Ravi, Christopher Kruegel, Giovanni Vigna. 345-368 [doi]
- Analyzing Implementation-Based SSL/TLS Vulnerabilities with Binary Semantics AnalysisLi Wang, Yi Yang, Goutham Reddy Alavalapati. 371-394 [doi]
- Identifying Library Functions in Stripped Binary: Combining Function Similarity and Call Graph FeaturesZhanpeng Liu, Xinhui Han. 395-408 [doi]
- PDFIET: PDF Malicious Indicators Extraction Technique Through Optimized Symbolic ExecutionEnzhou Song, Tao Hu, Peng Yi, Wenbo Wang. 409-425 [doi]
- Ransomware as a Service: Demystifying Android Ransomware GeneratorsCan Tu, Liu Wang, Yang Xu, Yiping Zhao, Haitao Xu, Haoyu Wang. 426-447 [doi]
- CV2XFuzzer: C-V2X Parsing Vulnerability Discovery System Based on FuzzingYuxuan Wang, Yishen Li, Jihu Zheng, Jianwei Zhuge. 451-466 [doi]
- Learning AI Coding Style for Software Plagiarism DetectionSri Haritha Ambati, Natalia Stakhanova, Enrico Branca. 467-489 [doi]
- Understanding and Measuring Inter-process Code Injection in Windows MalwareJerre Starink, Marieke Huisman, Andreas Peter, Andrea Continella. 490-514 [doi]