Accepted Papers

Main Track

Substitution Attacks on Asymmetric (Group) Message Franking             
Chen, Yumin (National University of Defense Technology); Wang, Yi (National University of Defense Technology); Chen, Rongmao (National University of Defense Technology)

Improving Interpretability: Visual Analysis of Deep Learning-Based Multi-Channel Attacks              
Shen, Ziyue (Nanjing University of Science and Technology); Gao, Yiwen (Nanjing University of Science and Technology); Cheng, Wei (Secure-IC S.A.S., France); Wang, Jiabei (Nanjing University of Science and Technology); Zhou, Yongbin (Nanjing University of Science and Technology,Institute of Information Engineering,University of Chinese Academy of Sciences)

A Comprehensive Evaluation of the Impact on Tor Network Anonymity Caused by ShadowBridge
Duan, Baiwei (Institute of Information Engineering Chinese Academy of Sciences, Beijing, China); Ding, Yong (Institute of Information Engineering Chinese Academy of Sciences, Beijing, China); Wang, Xuebin (Institute of Information Engineering Chinese Academy of Sciences, Beijing, China); Zhu, Yujia (Institute of Information Engineering Chinese Academy of Sciences, Beijing, China); Zhang, Qingfeng (Institute of Information Engineering Chinese Academy of Sciences, Beijing, China); Zhao, Can (Institute of Information Engineering Chinese Academy of Sciences, Beijing, China); Shi, Jinqiao (School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China)

PPSA: Polynomial Private Stream Aggregation for Time-Series Data Analysis    
Januszewicz, Antonia (University of Notre Dame); Gutierrez, Daniela (Universidad Panamericana); KOIRALA, NIRAJAN (University of Notre Dame); Zhao, Jiachen (University of Notre Dame); Takeshita, Jonathan (Tokyo Institute of Technology); Lee, Jaewoo (University of Georgia); Jung, Taeho (University of Notre Dame)

Assessing and Prioritizing Ransomware Risk Based on Historical Victim Data    
Massengale, Spencer (University of Arkansas At Little Rock); Huff, Philip (University of Arkansas at Little Rock)

DPU-LARK:DPU-Levaraged Remote Attestation of Remote Kernels for Security of OT Networks
               Kozlowski, William (University of Illinois Urbana-Champaign); Chen, Deming (University of Illinois Urbana-Champaign); Nicol, David (University of Illinois Urbana-Champaign)

Ensuring Integrity in Online Content Usage and Download Counting with Smart Contracts              
Joshi, Shubham (University of Nevada Las Vegas); Davidson, Dillon (University of Nevada, Las Vegas); Lee, Yeonjoon (Hanyang University); Cho, Homook (KAIST Cybersecurity Research Center); Son, Junggab (University of Nevada, Las Vegas)

Embedding-optimized Steganography Based on Post-quantum Encryption and BPNN  
Yin, Zhang (East China University Of Science and Technology); Xu, Xian (East China University of Science and Technology)

Byzantine-Robust Federated Learning for Unreliable Environments by Random-Matching Verification and Credibility Table
               Li, Yanjun (Jilin University); Li, Xiaomeng (Tsinghua University); Wan, Hui (Jilin University); Wang, Cong (Jilin University)

An Effective Multiple Private Set Intersection   
Liu, Qiang (School of Cyber Security, University of Chinese Academy of Sciences; Institute of Information Engineering, Chinese Academy of Sciences); Chen, Xiaojun (School of Cyber Security, University of Chinese Academy of Sciences; Institute of Information Engineering, Chinese Academy of Sciences); Jing, Weizhan (School of Cyber Security, University of Chinese Academy of Sciences; Institute of Information Engineering, Chinese Academy of Sciences); Dong, Ye (Singapore University of Technology and Design)

VLDoS Variable Low-rate DoS Attack Model for BBR algorithm in TCP   
Yue, Meng (Civil Aviation University of China); Lai, Zihan (Civil Aviation University of China); Wang, Tong (Civil Aviation University of China); Wu, Zhijun (Civil Aviation University of China)

MEMO: Detecting Unknown Malicious Encrypted Traffic via Metric Learning and Order-aware Pre-training
Xiao, Fengrui (University of Science and Technology of China); Chen, Shuangwu (Department of Automation, University of Science and Technology of China); Yang, Jian (USTC); Mei, Jiahao (University of Science and Technology of China); Zheng, Quan (University of Science and Technology of China); Wang, Jian (New H3C Technologies Co Ltd)

Deep Reinforcement Learning from Drifting Network Environments in Anomaly Detection
               Cheng, Hongbing (Zhejiang University of Technology); Zheng, Junli (Zhejiang University of Technology); Wang, Shaobing (Zhejiang University of Technology); Xu, Zhicheng (Zhejiang University of Technology); Zhang, Xiaoli (Zhejiang University of Technology)

Bag-of-Characters: A Multiple Instance Learning Framework for URL Embedding in Web Security
               Zhang, Jiachen (Beijing University of Posts and Telecommunications); Yang, He (other); Lu, Yueming (Beijing University of Posts and Telecommunications); Han, Daoqi (Beijing University of Posts and Telecommunications)

Threshold Key Management and Signature in Dynamic Distributed System       
Chen, Kang (Harbin Institute of Technology, Shenzhen); He, Daojing (Harbin Institute of Technology, Shenzhen); Chen, Lei (Ding Xuan Cryptography Testing Co., Ltd); Li, Dawei (Harbin Institute of Technology, Shenzhen)

HyperBC: Hypergraph-based Approach for Behavior Cluster of Suspicious APT Attacks 
Du, Wenhui (Shanghai Jiao Tong university); Li, Gaolei (Shanghai Jiao Tong university); Li, Jianhua (Shanghai Jiao Tong university)

A Hardware-Oriented Lightweight Block Cipher and Its Application in Surveillance Video
               Zhang, Xing (Jiangsu University); Wu, Hao (Jiangsu University); Li, Tianning (Jiangsu University); Li, Xiaowei (Jiangsu University); Wang, Changda (Jiangsu University)

Reusablity Evaluation of Reports in Security Operation Centers for IoT with Sentence ALBERT and Jaccard Similarity
               Matsubayashi, Masaru (NTT Security Holdings Corporation); Shibahara, Toshiki (NTT); Koyama, Takuma (NTT Security Holdings Corporation); Tanaka, Masashi (NTT Security Holdings Corporation)

Enhancing Reliability in Open Rating Systems: A Trust-Aware Filtering Approach           
Zhang, Jun (Huawei Technologies France); Lamouchi, Amine (Huawei Technologies France); Labiod, Houda (Huawei Technologies France); Korkotashvili, Dimitri (École Polytechnique)

SMDT: A Blockchain-based Secure Multi-version Data Trading Scheme with Fair Profit Sharing
Li, Yuhang (Nanjing University of Aeronautics and Astronautics ); Tao, Yu (Nanjing University of Aeronautics and Astronautics); Fang, Min (East China Normal University); Wang, Hao (Nanjing University of Aeronautics and Astronautics); Zhou, Lu (Nanjing University of Aeronautics and Astronautics); Ge, Chunpeng (Shandong University)

An Incentive Mechanism for Enhancing Transaction Privacy Based on Reputation Perception and Double Auction             
Liu, Hai (Guizhou University of Finance and Economics); Li, Fangqiong (Guizhou University of Finance and Economics); Peng, Hongye (Guizhou University of Finance and Economics); Wang, Tianxi (Guizhou University of Finance and Economics)

Noya: An Efficient, Flexible and Secure CNN Inference Model based on Homomorphic Encryption
               Qiu, Fengyuan (Nanjing University of Aeronautics and Astronautics); Yang, Hao (Nanjing University of Aeronautics and Astronautics); Zhou, Lu (Nanjing University of Aeronautics and Astronautics); Liu, Zhe (Zhejiang Lab)

TGSA: Trajectory Group Semantic Anonymization          
Dong, Minhong (School of Computer Science and Technology, Tiangong University); Wang, Ze (School of Software, Tiangong University); Han, Zhuo (School of Computer Science and Technology, Tiangong University); Bai, Yude (School of Software, Tiangong University); Yuan, Chao (School of Software, Tiangong University); Qiu, Guoying (College of Electronic and Information Engineering, Southwest University)

WtLDP:Generating Synthetic Decentralized Weighted Graphs with Local Differential Privacy              
Hu, Zhiming (HaiNan Normal University); Yang, Xi (HaiNan Normal University); Fan, Yang (HaiNan Normal University); Zhang, Guoqiang (HaiNan Normal University)

FISFuzzer: A Grey-Box Protocol Fuzzer Based on Field Inference and Scheduling             
Pan, Hao (ShanDong University); Song, Xiangpu (ShanDong University); Wu, Honglin (ShanDong University); Wang, Kai (National Innovation Institute of High-end Smart Appliances); Yang, Xing (National University of Defense Technology); Guo, Shanqing (ShanDong University)

ASOZ: Anonymous and Auditable Cryptocurrency with Enhanced Confidential Transaction              
Liu, Tianjian (beijing jiaotong university); Wang, Wei (beijing jiaotong university); Chen, Chang (beijing jiaotong university); Zhang, DaWei (beijing jiaotong university)

OCE-PTree: An Online Communication Efficient Privacy–preserving Decision Tree Evaluation
               Zhang, Qinghui (School of Cyber Security, University of Chinese Academy of Sciences;Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, Chinese Academy of Sciences); Chen, Xiaojun (School of Cyber Security, University of Chinese Academy of Sciences;Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, Chinese Academy of Sciences); Chen, Xudong (School of Cyber Security, University of Chinese Academy of Sciences;Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, Chinese Academy of Sciences); Zhao, Xin (School of Cyber Security, University of Chinese Academy of Sciences;Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, Chinese Academy of Sciences); Jing, Weizhan (School of Cyber Security, University of Chinese Academy of Sciences;Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, Chinese Academy of Sciences); Fan, Tingyu (School of Cyber Security, University of Chinese Academy of Sciences;Key Laboratory of Cyberspace Security Defense,Institute of Information Engineering, Chinese Academy of Sciences)

K-BOOST: A Cyber Security NER Model with Knowledge Augmentation via BERT            
Nie, Rong (Institute of Software, Chinese Acadamy of Sciences); Zhang, Haixia (Institute of Software, Chinese Academy of Science); Lian, Yifeng (Institute of Software, Chinese Academy of Science); Peng, Yuanyuan (Institute of Software, Chinese Acadamy of Sciences)

A Border Management Protocol for Multi-Identifier Network within the Network Layer and Its Attack Detection Extension  
Lyu, Jiaqing (Peking University); Li, Hui (Peking University Shenzhen Graduate School); Li, Kedan (University of Illinois Urbana-Champaign); Liang, Yuanshao (Peking University); Wu, Zhengqi (Peking University)

FLKT: Improving the Fidelity and Robustness of Federated Learning Aggregation Rules via the Key-data and Trap-model   
Tang, Peng (Shanghai Jiao Tong University); Xu, Xiaojie (Shanghai Jiao Tong University); Li, Xinpeng (Shanghai Jiao Tong University); Qiu, Weidong (Shanghai Jiao Tong University); Huang, Zheng (Shanghai Jiao Tong University)

Identity Inference in Ethereum: Towards Financial Security for Blockchain Ecosystem  
Li, Kai (Nanjing University of Information Science and Technology); Chen, Yanyu (Nanjing University of Information Science and Technology); Fu, Zhangjie (Nanjing University of Information Science and Technology)

OnionPeeler: A Novel Input-Enriched Website Fingerprinting Attack on Tor Onion Services              
Xu, Zhengxin (Southeast University); Cao, Jie (Southeast University); Hou, Yujie (Southeast University); Xu, Yuwei (Southeast University); Cheng, Guang (Southeast University)

Multi-Server Publicly Verifiable Computation of polynomials   
Wang, Haofei (Institute of information engineering, University of Chinese Academy of Sciences); Wang, Li-Ping (Institute of information engineering, University of Chinese Academy); Zhang, Liang Feng (ShanghaiTech University); Wang, Huaxiong (Nanyang Technological University)

Can’t say cant? Measuring and Reasoning of Dark Jargons in Large Language Models   
Ji, Xu (Beijing Electronics Science and Technology Institute); Zhang, Jianyi ; Zhou, Ziyin (Beijing Electronics Science and Technology Institute); Zhao, Zhangchi (Beijing Electronics Science and Technology Institute); Qiao, Qianqian (Beijing Electronics Science and Technology Institute); Han, Kaiying (Xinan Jiaotong University); Hossen, Md Imran (University of Louisiana at Lafayette); Hei, Xiali (University of Louisiana at Lafayette)

Enhancing Runtime Application Self-Protection with Unsupervised Deep Learning        
Wu, Bolun (Shanghai Jiao Tong University); Zou, Futai (Shanghai Jiao Tong University); Huang, Mingyi (Shanghai Jiao Tong University); Sun, Xin (State Grid Zhejiang Electric Power Co.,Ltd Research Institute); Han, Jiajia (State Grid Zhejiang Electric Power Co.,Ltd Research Institute)

ADG-Dedup: Adaptive Dynamic Grained Deduplication Scheme for IoT Data in Cloud Storage
Guo, Xinyue (Qingdao University); Xian, Hequn (Qingdao University)

Stuck in the SAND: When Your Neighbor Becomes Your Enemy
Jeter, Tre’ (University of Florida); Vu, Minh (University of Florida); Alharbi, Raed (Saudi Electronic University); Thai, My (University of Florida)

ChatSpamDetector: Leveraging Large Language Models for Effective Phishing Email Detection          
Koide, Takashi (NTT Security Holdings); Fukushi, Naoki (NTT Security Holdings); Nakano, Hiroki (NTT Security Holdings); Chiba, Daiki (NTT Security Holdings)

Mal-POBM: Malware Adversarial Sample Generation Method Based on Population Optimisation and Bidirectional Mutation          
Lei, Hong (Qingdao University); Xian, Hequn (Qingdao University); Peng, Xiaowei (Cryptography and Cyberspace Security (Whampoa) Academy)

Late Track

Siamese Neural Network for Robust IoT Device-Type Identification: A Few-Shot Learning Approach
Ferdjouni, Meriem (Concordia University); Qasem, Abdullah (Concordia University); Debbabi, Mourad (Concordia University)

Interoperable Security Information and Event Management Framework for Multi Cloud Environment     
Ryu, JungHwa (Sungshin Women’s University); Kim, Seo-Yi (Sungshin Women’s University); Kim, Ri-Yeong (Sungshin Women’s University); Kim, Seongmin (Sungshin Women’s University); Lee, Il-Gu (Sungshin Women’s University); Kim, Yeeun (Sungshin Women’s University)

SPADE: Digging into Selective and PArtial DEcryption using Functional Encryption         
Nuoskala, Camille (Tampere University); Abdinasibfar, Hossein (Tampere University); Michalas, Antonis (Tampere University)

SPC-GAN-Attack: Attacking Slide Puzzle CAPTCHAs by Human-Like Sliding Trajectories Based on Generative Adversarial Network      
Guo, Rui (Sichuan University); Yu, Ke (Sichuan University); Yu, Enbo (Sichuan University); Qiao, Qianqian (Sichuan University); Mao, Zhenyu (Sichuan University); Wang, Haizhou (Sichuan University)

A Secure Blockchain Network with Quantum Key Encryption and Authentication          
Dwivedi, Ashutosh Dhar (Aalborg University); Anagnostopoulos, Marios (Democritus University of Thrace and Aalborg University); Pedersen, Jens Myrup (Aalborg University)

ChipFuzzer: Towards Fuzzing Matter-based IoT Devices for Vulnerability Detection       
Joshi, Saurabh (University of Ottawa); Shirani, Paria (University of Ottawa)

Pulse-to-Pair: Heartbeat-based Authentication of IoT Devices for Elderly Care 
Yeasar, Tashaffi Samin (Queen’s University); Iqbal, Shahrear (National Research Council Canada); Zulkernine, Mohammad (Queen’s University)

BCPIR: More Efficient Keyword PIR via Block Building Codewords          
Wang, Shuquan (Nanjing University of Aeronautics and Astronautics); ZHOU, LU (Nanjing University of Aeronautics and Astronautics); Yang, Hao (Nanjing University of Aeronautics and Astronautics)

Symerge: Replacing Calls in Under-Constrained Symbolic Execution and Find Vulnerabilities              
Zeng, Yicheng (Institute of Information Engineering, Chinese Academy of Sciences, China and School of Cyber Security, University of Chinese Academy of Sciences, China); Peng, Jiaqian (Institute of Information Engineering, Chinese Academy of Sciences, China and School of Cyber Security, University of Chinese Academy of Sciences, China); Lin, Jiami (Institute of Information Engineering, Chinese Academy of Sciences, China and School of Cyber Security, University of Chinese Academy of Sciences, China); Xi, Rongrong (Institute of Information Engineering, Chinese Academy of Sciences, China); Zhu, Hongsong (Institute of Information Engineering, Chinese Academy of Sciences, China and School of Cyber Security, University of Chinese Academy of Sciences, China)

Faster Three-Party Constant-round Comparison with Application in Neural Network Inference
               Liu, Yujun (Shanghai Jiao Tong University); Ding, Ning (Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China)

Enhancing Pre-Trained Language Models for Vulnerability Detection via Semantic-Preserving Data Augmentation
Qi, Weiliang (University of Texas at Dallas); Cao, Jiahao (Tsinghua University); Poddar, Darsh (Lebanon Trail High School); Li, Sophia (Lovejoy High School); Wang, Xinda (University of Texas at Dallas)

Anti-EMP: Encrypted Malware Packets Filtering Algorithm Leveraging Ciphertext Patterns under Zero Knowledge Setting 
Son, Junggab (University of Nevada, Las Vegas); Kim, Jeehyung (Korea Electronics Technology Institute); Ahn, Jemin (hanyang university); Kim, Doowon (University of Tennessee, Knoxville); Cho, Homook (KAIST Cybersecurity Research Center); Kim, Daeyoung (Montclair State University)

Boosting GAN Performance: Feature Transformation for Heavy-Tailed Malware Data Generation
Gebrehans, Ghebrebrhan (Khalifa University of Science and Technology); Lunardi, Willian Tessaro (Technology Innovation Institute, Abu Dhabi, U.A.E); Damiani, Ernesto (Khalifa University of Science and Technology)

Beyond the Public Mempool: Catching DeFi Attacks Before They Happen with Real-Time Smart Contract Analysis             
Parhizkari, Bahareh (University of Luxembourg); Iannillo, Antonio Ken (University of Luxembourg); Ferreira Torres, Christof (ETH Zurich); Xu, Joseph (Quantstamp); Banescu, Sebastian (Quantstamp); State, Radu (University of Luxembourg)

RFI: Enhancing Network Intrusion Detection through Robust Feature Selection Techniques              
Li, Cunxin (Zhejiang University of Technology); Cheng, Hongbing (Zhejiang University of Technology); Gao, Jie (Zhejiang University of Technology); Li, Wei (Zhejiang University of Technology)

Robust Network Intrusion Detection via Semi-Supervised Deep Reinforcement Learning
Spolaor, Riccardo (Shandong University); Chen, Tianhao (Shandong University); Hu, Pengfei (Shandong University); Cheng, Xiuzhen (Shandong University)

EasyCSPeasy: A Server-side and Language-agnostic XSS Mitigation by Devising and Ensuring Compliance with CSP   
Kaleli, Beliz (Boston university); Egele, Manuel (Boston University); Stringhini, Gianluca (Boston University)

Cybersecurity with LLMs and RAGs: Challenges and Innovations            
Simoni, Marco (Istituto di Informatica e Telematica, Consiglio Nazionale Delle Ricerche, Pisa, Italy); Saracino, Andrea (TeCIP, Scuola Universitaria Superiore Sant’Anna, Pisa, Italy)

Gait4Auth: Enhancing Identification and Security in Gait-Based Authentication             
Yamout, Youssef (Queen’s University); Iqbal, Shahrear (National Research Council Canada); Chakraborty, Nilesh (Queen’s University); Zulkernine, Mohammad (Queen’s University)

Graph Injection Attack based on Node Similarity and Non-linear Feature Injection Strategy              
Li, Qingru (Hebei Normal University); Gao, Yanan (Hebei Normal University); Wang, Fangwei (Hebei Normal University); Wang, Changguang (Hebei Normal University); Babaagba, Kehinde (Edinburgh Napier University); Tan, Zhiyuan (Edinburgh Napier University)

BinSimDB: Benchmark Dataset Construction for Fine-Grained Binary Code Similarity Analysis              
Zuo, Fei (University of Central Oklahoma); Tompkins, Cody (University of Central Oklahoma); Zeng, Qiang (George Mason University); Luo, Lannan (George Mason University); Choe, Yung Ryn (Sandia National Laboratories); Rhee, Junghwan (University of Central Oklahoma)

TEE-Receipt: A TEE-based Non-repudiation Framework for Web Applications   
Hofny, Mahmoud (Concordia University); Zhao, Lianying (Carleton University); Mannan, Mohammad (Concordia University); Youssef, Amr (Concordia Univeristy)

Solving ILWE Problem More Efficiently and Application to BLISS Side-Channel Attack   
Zhang, Hongzhou (Nanjing University of Science and Technology); Liu, Yuejun (Nanjing University of Science and Technology); Gao, Yiwen (Nanjing University of Science and Technology); Zhou, Yongbin (Nanjing University of Science and Technology)

Fast Firmware Fuzz with Input/Output Reposition         
Xin, Mingfeng (Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS; School of Cyber Security, University of the Chinese Academy of Sciences); Deng, Liting (Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS; School of Cyber Security, University of the Chinese Academy of Sciences); Wen, Hui (Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS); Fang, Dongliang (Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS); Lv, Shichao (Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS); Sun, Limin (Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS)

Optical Lens Attack on Deep Learning Based Monocular Depth Estimation        
Zhou, Ce (Michigan State University); Yan, Qiben (Michigan State University); Kent, Daniel (Michigan State University); Wang, Guangjing (Michigan State University); Zhang, Ziqi (Peking University); Radha, Hayder (Michigan State University)

Dynamically Expanding Factor Base of Index Calculus Algorithm to Solve Massive Discrete Logarithm Problems Faster        
Hao, Yichen (Sichuan University); Huang, Wen (Sichuan University); Zhang, Zhishuo (University of Electronic Science and Technology of China); Zhao, Weixin (Sichuan University); Peng, Jian (Sichuan University); Liao, Yongjian (University of Electronic Science and Technology of China)

Poisoning Attack on Federated Learning with Non-IID Data: A Historical-Global-Model-Based Approach            
Sun, Yaqi (Qilu University of Technology); Wang, Xin (Qilu University of Technology); Zhang, Zhenyong (Guizhou University); Yang, Ming (Qilu University of Technology); He, Yunpeng (Qilu University of Technology); Wu, Xiaoming (Qilu University of Technology)

Is This the Same Code? A Comprehensive Study of Decompilation Techniques for WebAssembly Binaries 
Wu, Wei-Cheng (Dartmouth College); Yan, Yutian (University of Southern California); Egilsson, Hallgrimur David (University of Southern California); Park, David (University of Southern California); Chan, Steven (University of Southern California); Hauser, Christophe (Dartmouth College); Wang, Weihang (University of Southern California)

Pitfalls of data masking techniques: Re-identification attacks   
Hodžić, Samir (NXP Semiconductors Austria GmbH); Kidmose, Andreas Brasen (Technical University of Denmark); Kidmose, Brooke Elizabeth (Technical University of Denmark); Knudsen, Lars Ramkilde (University of South Denmark); Meng, Weizhi (Technical University of Denmark)

RootES: A Method for Generating Text Adversarial Examples Using Root Embedding Space              
Wang, Changguang (Hebei Normal University); Wang, Cong (Hebei Normal University); Li, Qingru (Hebei Normal University); Wang, Fangwei (Hebei Normal University)

Comprehensive Classification and Analysis of Cyber Attack Surface on Quantum Key Distribution Networks  
Peraković, Dragan (University of Zagreb, Faculty of Traffic and Transport Sciences, Croatia); Vladava, Josip (Faculty of Transport and Traffic Sciences); Cvitic, Ivan (Faculty of Transport and Traffic Sciences, University of Zagreb)

Optimized Privacy-Preserving Clustering with Fully Homomorphic Encryption 
Yang, Chen (Chongqing Institute of Green and Intelligent Technology, Chinese Academy of Sciences); Chen, Jingwei (Chongqing Institute of Green and Intelligent Technology, Chinese Academy of Sciences); Wu, Wenyuan (Chongqing Institute of Green and Intelligent Technology, Chinese Academy of Sciences); Feng, Yong (Chongqing Institute of Green and Intelligent Technology, Chinese Academy of Sciences)

Last Minute Track

A Comparative Study on Source Code Attribution Using AI: Datasets, Features, and Techniques
Alalawi, Shamma (UAE University); Alrabaee, Saed (United Arab Emirates University); Khan, Wasif (UAE University); Al-Azzoni, Issam (Al Ain University); Mohan Ambali Parambil, Medha (UAE University)

Encoder-based Multimodal Ensemble Learning for High Compatibility and Accuracy in Phishing Website Detection      
Ahn, Jemin (hanyang university); Akhavan, Dorian (University of Nevada, Las Vegas); Jung, Woohwan (Hanyang University); Kang, Kyungtae (Hanyang University); Son, Junggab (University of Nevada, Las Vegas)

A Lightweight Group Authentication Framework for Cross-Domain Internet of Things  
Carvajal Roca, Ivan (Zhejiang Lab); Guan, Zhangshuang (Zhejiang University); Wang, Haitao (Zhejiang Lab); Wan, Zhiguo (Zhejiang Lab)

Distributed Intrusion Detection in Dynamic Networks of UAVs using Few-Shot Federated Learning
Ceviz, Ozlem (Hacettepe University); Sen, Sevil (Hacettepe University); Sadioglu, Pinar (Hacettepe University)

Harnessing the Power of Quantum Computing for URL Classification: A Comprehensive Study
Qayyum, Tariq (UAE University); Tariq, Asadullah (United Arab Emirates University); Alrabaee, Saed (United Arab Emirates University); Trabelsi, Zouheir (College of IT, UAE University); Farag, Farag (UAEU); Serhani, Mohamed Adel (University of Sharjah)

AutoS2ploit: From Automotive Safety-Critical Functionalities to Security Exploit            
Zhuang, Nan (ECNU); Miao, Haonan (ECNU); li, xiangxue (ecnu)

FullView: Using Bidirectional Group Sequences to Achieve Accurate Encrypted Traffic Classification
Xu, Yuwei (Southeast University); Liang, Zhiyuan (Southeast University); Xu, Zhengxin (Southeast University); Song, Kehui (Tiangong University); Xiang, Qiao (Xiamen University); Cheng, Guang (Southeast University)

Tarnhelm: Using Adversarial Samples to Protect User Privacy Against Traffic Identification              
Xu, Yuwei (Southeast University); Bai, Yunpeng (Southeast University); Cao, Jie (Queen’s University); Xu, Yuanyuan (Southeast University); He, Liang (University of Nebraska-Lincoln); Cheng, Guang (Southeast University)

Interference Avoidance and Mitigation Technique Utilizing Cooperative Characterization of Interferers in Dense Wireless Networks              
Shim, Hye-Yeon (Sungshin Women’s UniversityUniversity); Lee, Jin-Min (Sungshin Women’s University); Lee, Il-Gu (Sungshin Women’s University)

Graphite: Real-Time Graph-Based Detection of Windows Fileless Malware Attacks       
Wakodikar, Priti (State University of New York at Binghamton); Gwak, Joon-Young (State University of New York at Binghamton); Wang, Meng (State University of New York at Binghamton); Yan, Guanhua (State University of New York at Binghamton); Shu, Xiaokui (IBM Research); Stoller, Scott (Stony Brook University); Yang, Ping (State University of New York at Binghamton)