Title | Authors |
CyberEA: An Efficient Entity Alignment Framework for Cybersecurity Knowledge Graph | Huang, Yue (Sichuan University); Guo, Yongyan (Sichuan university); Huang, Cheng (Sichuan University) |
Identifying Library Functions in Stripped Binary: Combining Function Similarity and Call Graph Features | Liu, ZhanPeng (Peking University); Han, XinHui (Peking University) |
VRC-GraphNet: A Graph Neural Network-based Reasoning Framework for Attacking Visual Reasoning Captchas | Xu, Botao (Sichuan University); Wang, Haizhou (Sichuan University) |
Street Rep: A Privacy-Preserving Reputation Aggregation System | Hauser, Christophe (University of Southern California); Nilizadeh, Shirin (University of Texas, Arlington); Shoshitaishvili, Yan (Arizona State University); Trieu, Ni (Arizona State University); ravi, srivatsan (University of Southern California); Kruegel, Christopher (University of California, Santa Barbara, USA); Vigna, Giovanni (University of California, Santa Barbara, USA) |
CV2XFuzzer: C-V2X Parsing Vulnerability Discovery System Based on Fuzzing | Wang, Yuxuan (Tsinghua University); Li, Yishen (Tsinghua University); Zhuge, Jianwei (Tsinghua University) |
Analyzing Implementation based SSL/TLS Vulnerabilities with Binary Semantics Analysis | Wang, Li (Fontbonne University); Yang, Yi (Northeastern Illinois University); Alavalapati, Goutham Reddy (Fontbonne University) |
Byzantine Protocols with Asymptotically Optimal Communication Complexity | LYU, HANZHENG (UBC); Xie, Shaokang (Southern University of Science and Technology); Niu, Jianyu (Southern University of Science and Technology); Feng, Chen (UBC) |
VDABSys: A novel security-testing framework for blockchain systems based on vulnerability detection | Chen, Jinfu (School of Computer Science and Communication Engineering, Jiangsu University); Feng, Qiaowei (School of Computer Science and Communication Engineering, Jiangsu University); Cai, Saihua (School of Computer Science and Communication Engineering, Jiangsu University); Shi, Dengzhou (School of Computer Science and Communication Engineering, Jiangsu University); Towey, Dave (School of Computer Science, University of Nottingham Ningbo China); Chen, Yuhao (School of Computer Science and Communication Engineering, Jiangsu University); Wang, Dongjie (School of Computer Science and Communication Engineering, Jiangsu University) |
Visibility of Scan Traffic Trends in Sparsely Populated Darknets | Mizutani, Kodai (Kyoto University); Kotani, Daisuke (Kyoto University); Okabe, Yasuo (Kyoto University) |
An Efficient Private Information Retrieval Protocol Based on TFHE | Tian, Haibo (SUN YAT-SEN UNIVERSITY); Lin, Yini (SUN YAT-SEN UNIVERSITY) |
Optimizing Lightweight Intermittent Message Authentication for Programmable Logic Controller | Yang, Jiaqi (Southwest University); Chia, Jun Xian (Singapore University of Technology and Design); Ba, Xijie (Southwest University); Zhou, Jianying (Singapore University of Technology and Design); Yang, Zheng (Southwest University) |
Ransomware as a Service: Demystifying Android Ransomware Generators | Tu, Can (Huazhong University of Science and Technology); Wang, Liu (Beijing University of Posts and Telecommunications); Xu, Yang (China Mobile Information Security Center); Zhao, Yiping (Beijing University of Posts and Telecommunications); Xu, Haitao (Zhejiang University); Wang, Haoyu (Huazhong University of Science and Technology) |
Split Without a Leak: Reducing Privacy Leakage in Split Learning | Nguyen, Khoa (Tampere University); Khan, Tanveer (Tampere University); Michalas, Antonis (Tampere University) |
A Stable Fine-grained Webpage Fingerprinting: Aiming at the Unstable Realistic Network | Liu, Songtao (Southeast University); Wu, Hua (Southeast University); Luo, Hao (Southeast University); Cheng, Guang (Southeast University); Hu, Xiaoyan (Southeast University) |
Batch Lattice-Based Designated-Verifier ZK-SNARKs for R1CS | Lin, Xi (Institute of Information Engineering, University of Chinese Academy of Sciences); Xia, Han (Institute of Information Engineering, University of Chinese Academy of Sciences); Li, Yongqiang (Institute of Information Engineering); Wang, Mengsheng (Institute of Information Engineering) |
Practical Privacy-Preserving Community Detection in Decentralized Weighted Networks | Han, Tingxuan (Nanjing University, China); Tong, Wei (Nanjing University, China); Niu, Jiacheng (Nanjing University, China); Zhong, Sheng (Nanjing University, China) |
Efficient Unbalanced Private Set Intersection Protocol over Large-scale Datasets Based on Bloom Filter | Ruan, Ou (Hubei University of Technology); Ai, Chaohao (Hubei University of Technology); Yan, Changwang (Hubei University of Technology) |
HeSUN: Homomorphic Encryption for Secure Unbounded Neural Network Inference | Nguyen, Khanh (University of Wollongong); Hoang Duong, Dung (University of Wollongong); Chow, Yang-Wai (University of Wollongong); Susilo, Willy (University of Wollongong) |
An Adaptive Authentication Protocol for Internet of Vehicles Based on Vehicle Density | Peng, Hao (Changsha University of Science and Technology); Xu, Zisang (Changsha University of Science and Technology); Zhang, Ruirui (Changsha University of Science and Technology); Xu, Jianbo (Hunan University of Science and Technology) |
Password Cracking by Exploiting User Group Information | Zhou, Beibei (East China Normal University); He, Daojing (East China Normal University); Zhu, Sencun (Pennsylvania State University); Zhu, ShanShan (Harbin Institute of Technology, Shenzhen); Chan, Sammy (City University of Hong Kong); Yang, Xiao (East China Normal Unversity) |
mShield: Protect In-process Sensitive Data Against Vulnerable Third-Party Libraries | zhang, yunming (University of Science and Technology of China); cai, quanwei (Beijing Zitiao Network Technology Co., Ltd); li, houqiang (University of Science and Technology of China); lin, jingqiang (University of Science and Technology of China); wang, wei (State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences) |
Invisibility Spell:Adversarial Patch Attack Against Object Detectors | Zhang, Jianyi (Beijing Electronic Science and Technology Institute); Guan, Ronglin (Beijing Electronic Science and Technology Institute); Li, Xiuying (Beijing Electronic Science and Technology Institute); Zhao, Zhangchi (Beijing Electronic Science and Technology Institute); Sun, Zezheng (Beijing Electronic Science and Technology Institute) |
Unsupervised and Adaptive Tor Website Fingerprinting | Zhang, Guoqiang (Tsinghua University); Cao, Jiahao (Tsinghua University); Xu, Mingwei (Tsinghua University); Deng, Xinhao (Tsinghua University) |
PPEC: Privacy-Preserving and Cost-Effective Incremental Density Peak Clustering Scheme for Profit-Driven Clouds | Lu, RuiHeng (university of electronic science and technology of china); Huang, Dabin (university of electronic science and technology of china); Wang, Xiaofen (university of electronic science and technology of china); Yang, Haomiao (university of electronic science and technology of china) |
Enhancing Cross-Device Security with Fine-Grained Permission Control | Hu, Han (Tsinghua Shenzhen International Graduate School); Wang, Daibin (Huawei Technologies Co., Ltd); Hong, Tailiang (Huawei Technologies Co., Ltd); Zhang, Sheng (Tsinghua Shenzhen International Graduate School) |
Efficient and Scalable Multi-Party Privacy-Preserving k-NN Classification | Li, Xinglei (East China Normal University); Qian, Haifeng (East China Normal University) |
Classify Me Correctly if You Can: Evaluating Adversarial Machine Learning Threats in NIDS | Rusch, Neea (Augusta University); Jodeiri Akbarfam, Asma (Augusta University); Maleki, Hoda (Augusta University); Agrawal, Gagan (Augusta University); Dorai, Gokila (Augusta University) |
Unsupervised Multi-Criteria Adversarial Detection in Deep Image Retrieval | Xiao, Yanru (Old Dominion University); Wang, Cong (Zhejiang University); Gao, Xing (University of Delaware) |
Securing Web Inputs using Parallel Session Attachments | Yang, Ziqi (Zhejiang University); Xu, Ruite (Zhejiang University); Wu, Shikun (Zhejiang University); Mao, Jian (Beihang University); Liang, Zhenkai (National University of Singapore) |
Discovering and Understanding the Security Flaws of Authentication and Authorization in IoT Cloud APIs for Smart Home | Guo, Minglei (Tsinghua University); Xiao, Zhenghang (Hunan University); Liu, Xin (Lanzhou University); Zhuge, Jianwei (Tsinghua University) |
VET: Autonomous Vehicular Credential Verification using Trajectory and Motion Vectors | Oguchi, Ebuka (University of Nebraska-Lincoln); Ghose, Nirnimesh (University of Nebraska-Lincoln) |
CUFT: Cuflow-based Approach with Multi-headed Attention Mechanism for Encrypted Traffic Classification | Zong, Xin (School of Cyber Science and Engineering, Wuhan University); Luo, Min (School of Cyber Science and Engineering, Wuhan University); Peng, Cong (School of Cyber Science and Engineering, Wuhan University); He, Debiao (School of Cyber Science and Engineering, Wuhan University) |
PDFIET: PDF Malicious Indicators Extraction Technique through Optimized Symbolic Execution | Enzhou, Song (National Digital Switching System Engineering Technological R&D Center); Tao, Hu (National Digital Switching System Engineering Technological R&D Center); Peng, Yi (National Digital Switching System Engineering Technological R&D Center); Wenbo, Wang (National Digital Switching System Engineering Technological R&D Center) |
Optimization of Functional Bootstraps with Large LUT and Packing Key Switching | Liu, Keyi (Nanjing University of Science and Technology); Xu, Chungen (Nanjing university of science and technology); Dou, Bennian (Nanjing University of Science and Technology); Xu, Lei (Nanjing University of Science and Technology) |
Anonymous Key Issuing Protocol with Certified Identities in Identity-based Encryption | Yang, Yanqing (Nanjing University of Aeronautics and Astronautics); Wang, Jian (Nanjing University of Aeronautics and Astronautics) |
Meta Perturbation Generation Network for Text-based CAPTCHA | Wu, Zhuoting (Guangdong University of Technology, Guangzhou, China); Guo, Zhiwei (Guangdong University of Technology, Guangzhou, China); You, Jiuxiang (Guangdong University of Technology, Guangzhou, China); Yang, Zhenguo (Guangdong University of Technology, Guangzhou, China); Li, Qing (The Hong Kong Polytechnic University, Hong Kong, China); Liu, Wenyin (Guangdong University of Technology, Guangzhou, China) |
Demystifying Blockchain Scalability: Sibling Chains with Minimal Interleaving | Ma, Jiangfeng (ECNU); Zhang, Xuetao (ECNU); li, xiangxue (ecnu) |
DNN Architecture Attacks via Network and Power Side Channels | Dai, Yuanjun (Case Western Reserve University); Guo, Qingzhe (Case Western Reserve University); Wang, An (Case Western Reserve University) |
The Security Analysis of ROS2 Communication | Yang, Shuo (MoE Engineering Research Center for Software/Hardware Co-design Technology and Application, ECNU); Li, Hongru (Shanghai Trusted Industry Internet Software Collaborative Innovation Center, ECNU); Guo, Jian (National Trusted Embedded Software Engineering Technology Research Center, ECNU) |
Do Backdoors Assist Membership Inference Attacks? | Goto, Yumeki (Osaka University); Ashizawa, Nami (NTT); Shibahara, Toshiki (NTT); Yanai, Naoto (Osaka University) |
Model Inversion Attacks on Homogeneous and Heterogeneous Graph Neural Networks | Liu, Renyang (School of Information Science and Engineering, Yunnan University); Zhou, Wei (Engineering Research Center of Cyberspace, Yunnan University); Zhang, Jinhong (School of Software and Engineering and the Engineering Research Center of Cyberspace, Yunnan University); Liu, Xiaoyuan (University of Electronic Science and Technology of China); Si, Peiyuan (School of Computer Science and Engineering, Nanyang Technological University); Li, Haoran (School of Software and Engineering and the Engineering Research Center of Cyberspace, Yunnan University) |
An Authentication Algorithm for Sets of Spatial Data Objects | Li, Wenhao (Chongqing University); Wang, Chengliang (Chongqing University); Hu, Xiaobing (Chongqing University); Zhou, Hongwen (Chongqing Planning and Natural Resources Information Center); Zeng, Hang (Chongqing Planning and Natural Resources Information Center); Wang, Yanai (Chongqing BI Academy) |