Accepted Papers
Titles:
Measuring Contextual Factors that Influence Real-World Walking Speed
Authors:
Ireson, Neil (The University of Sheffield); Lanfranchi, Vita (The University of Sheffield)
Diagnostic Hysteroscopy Electronic Health Record System
Authors:
Theodosiou, Alexandros (3AE Health LTD)
EghiFit: Smartphone based Behaviour Monitoring and Health Recommendation in a Weight Loss Intervention Study
Authors:
Ivezić, Dijana (University of Freiburg); Keppel, Jonas (University of Duisburg-Essen); Becker, Christine (Bodymed AG); Walle, Hardy (Bodymed AG); Schneegass, Stefan (University of Duisburg-Essen); Amft, Oliver (University of Freiburg)
Using Predictive Analysis and Wearables to Increase Physical Activity among Individuals with Disabilities- SMART Design
Authors:
Mohanraj, Sangeetha (University of Alabama at Birmingham); Thirumalai, Mohanraj (University of Alabama at Birmingham); Mendonca, Christen John (University of Alabama at Birmingham)
BeClean: Designing Personalized Eco-Feedback Application for Pro-Environmental Behavior
Authors:
Mahapasuthanon, Pattiya (George Mason University); Genaro Motti, Vivian (George Mason University)
Use of Gamified Monetary Rewards as a Means of Motivation towards Daily Self-Monitoring of Diabetes Management Behaviors
Authors:
Thirumalai, Mohanraj (The University of Alabama at Birmingham); John, Tejossy (The University of Alabama at Birmingham); Mehta, Tapan (The University of Alabama at Birmingham)
Improving Personalized Medicine via AI-based Precision Tracheostomy
Authors:
Toulkeridou, Evropi (CYENS Centre of Excellence); Kosmidou, Panagiota (German Oncology Center, Limassol, Cyprus); Vevis, Kristis (German Oncology Center, Limassol, Cyprus); Antoniou, Zinonas (3aHealth); Kallinos, Loizos (3aHealth); Valiandi, Ioanna (CYENS CoE); Panayides, Andreas (CYENS CoE)
Serious Games for Children with Motor Dysgraphia: Context and Requirements Analysis and Participatory Design Thinking Ideation
Authors:
Rettinger, Lena (University of Applied Sciences, FH Campus Wien); Hauser, Carina (University of Applied Sciences, FH Campus Wien); Gstöttner, Lisa-Sophie (University of Applied Sciences, FH Campus Wien); Goldschmid, René (University of Applied Sciences, FH Campus Wien); Schönthaler, Erna (University of Applied Sciences, FH Campus Wien); Putz, Peter (University of Applied Sciences, FH Campus Wien)
Physical Activity, Physical Function and Quality of Life in Midlife Women.
Authors:
Giggins, Oonagh (Dundalk Institute of Technology); Cullen-Smith, Suzanne (Dundalk Institute of Technology); Broeckx, Leen (Thomas More University of Applied Sciences); Sels, Romy (Thomas More University of Applied Sciences); Helsen, Kim (Thomas More University of Applied Sciences); Cuppens, Kris (Thomas More University of Applied Sciences)
Social Media and Its Impact on Orthorexia Nervosa. A Systematic Literature Review.
Authors:
Lecaj, Rron (SMK, College of Applied Sciences)
Main track
CLATM: A Contrastive Learning-Based FDIA Detection Method with Attention Timestamp Masking for REIoT
Xia, ZhuoQun (Changsha University of Science & Technology); Haidong, Tang Haidong (Tang); Lin, Xi (Changsha University of Science & Technology)
BFT-MS: Asynchronous BFT Protocol Using Bounded Memory
Cheng, Hao (Institute of Software Chinese Academy of Sciences, China); Kong, Fanyu (School of Software, Shandong University, China); Lu, Yuan (Institute of Software, Chinese Academy of Sciences, China); Zhang, Zhenfeng (Institute of Software, Chinese Academy of Sciences, China)
Unbalanced Secret Labeled Private Set Intersection via Scalable Dual-Load Bloom Filter
Yang, Kaijie (Beihang University); Guo, Hua (Beihang University); Guan, Yewei (Beihang University); Li, Weiwei (North China University of Water Resources and Electric Power)
From Dark Network to Honeypot: Analysis and Traceability of Multi-prefix IPv6 Network Attacks
Huang, Youjun (Tsinghua University); Li, Xiang (Nankai University); Miao, Fasheng (Tsinghua University); Duan, Haixin (Tsinghua University); Zhang, Jia (Tsinghua University)
On Analyzing SSO Permissions Across Web and Android Platforms
Rezaei, Fahimeh (Concordia); Lupinacci, Matteo (University of Calabria); Mannan, Mohammad (Concordia University); Youssef, Amr (Concordia University)
Hardware-assisted Secure Decentralized Cloud Storage via Self-audit and Self-repair
Dafoe, Josh (Michigan Technological University); Chen, Niusen (University of Wisconsin-La Crosse); Chen, Bo (Michigan Technological University)
FlipStress: Noise Injection Defenses Against CPU-cache-based Web Attacks
Basak, Tapan (New Jersey Institute of Technology); Curtmola, Reza (New Jersey Institute of Technology); Oren, Yossi (Ben Gurion University); Phan, Hai (New Jersey Institute of Technology)
PEARL: A Reinforcement Learning-Based Attack Analysis Approach for Security and Robustness Assessment of Smart Home Systems
Haque, Nur Imtiazul (University of Cincinnati); Rahman, Mohammad Ashiqur (Florida International University); Uluagac, A. Selcuk (Florida International University); Njilla, Laurent (Air Force Research Laboratory)
DASPN: A Multi-level Security Protection Model for Northbound Interface Based on Dynamic Access Control
Huang, Yining (Beijing University of Posts and Telecommunications); Guan, Jianfeng (Beijing University of Posts and Telecommunications); Gu, Yilan (Beijing University of Posts and Telecommunications); Liu, Kexian (Beijing University of Posts and Telecommunications)
BFDet: A Method for Detecting Malicious Traffic with Ultra-Low False Positive Rate Based on TLS Behavior Flow
Guo, Zhongyu (Key Laboratory of Cyberspace Security, Ministry of Education); Lu, Bin (Key Laboratory of Cyberspace Security, Ministry of Education); Sun, Rongbo (Key Laboratory of Cyberspace Security, Ministry of Education, Zhengzhou 450001, China); Wu, Wei (Key Laboratory of Cyberspace Security, Ministry of Education); Li, Ding (Key Laboratory of Cyberspace Security, Ministry of Education); Lin, Xiangnan (Key Laboratory of Cyberspace Security, Ministry of Education); Wang, Chengyu (Key Laboratory of Cyberspace Security, Ministry of Education)
When VR is Not Just for Gaming: Unmasking GPU Resource Misuse on VR Headset
Yang, Dianshi (University of Delaware); Gao, Xing (University of Delaware)
A Few-Shot-Based Model-Agnostic Meta-Learning for Intrusion Detection in Secure of In-vehicle Network
Xu, Yingjie (Shanghai University); Li, Yufeng (Shanghai University); Zhang, Guiqi (Shanghai University); Shen, Jun (Shanghai University)
ESKNN:Efficient Secure KNN Query Based On 3-Party Secure Computation
Zhao, Peijun (National University of Defense Technology); Zhao, Xianan (National University of Defense Technology); Liu, Lin (National University of Defense Technology); Fu, Shaojing (National University of Defense Technology); Luo, Yuchuan (National University of Defense Technology)
An Enhanced Credit-Based Shaper for Audio-Video Bridging Streams in TSN
Huang, WeiHong (Hunan University of Science and Technology); Xu, Zhen (Hunan University of Science and Technology); Shi, Min (Hunan University); Huang, Jing (Hunan University of Science and Technology)
A Self-adaptive Moving Target Defense Decision-making Method Based on Bounded-rationality Supermodular Games
Sun, Rongbo (Key Laboratory of Cyberspace Security, Ministry of Education, Zhengzhou 450001, China); Fei, Jinlong (Key Laboratory of Cyberspace Security, Ministry of Education, Zhengzhou 450001, China); Zhu, Yuefei (Key Laboratory of Cyberspace Security, Ministry of Education, Zhengzhou 450001, China)
MDC-Net: Multi-Dimensional Cross-Domain Collaborative Network for Image Manipulation Localization
Chen, Jiaxin (Changsha University of Science and Technology); Wei, Yawen (Changsha University of Science and Technology); Cai, Shengxin (Changsha University of Science and Technology); Zhang, Dengyong (Changsha University of Science and Technology)
Two Birds with One Stone: Multi-Task Detection and Attribution of LLM-Generated Text
Liu, Zeyan (University of Louisville); Rao, Zixin (University of Louisville); Mohamed, Youssef (University of Louisville); Liu, Shang (University of Chinese Academy of Sciences)
Now Let’s Make It Physical! Enabling Trusted Certificate Issuance in PKI via Physical Bindings for CAs
Zhang, Xiaolin (Shanghai Jiao Tong University); Chen, Chenghao (Shanghai Jiao Tong University); Qin, Kailun (Shanghai Jiao Tong University); Wang, Yuxuan (Shanghai Jiao Tong University); QU, Shipei (Shanghai Jiao Tong University); Wang, Tengfei (Shanghai Jiao Tong University); Zhang, Chi (Shanghai Jiao Tong University); Gu, Dawu (Shanghai Jiao Tong University)
DCAPSCR: A Decentralized Conditional Anonymous Payment System With Collaborative Regulation
Zhang, Jing (Nanjing University of Aeronautics and Astronautics); Tao, Yu (Nanjing University of Aeronautics and Astronautics); Zhou, Lu (Nanjing University of Aeronautics and Astronautics)
One Trace is Possible: A Method for Small-Sample Profiling Side-Channel Analysis in Communication Environments
Wang, Chen (Zhejiang Sci-Tech University); Sun, Tianlong (Zhejiang Sci-Tech University); Shen, Jian (Zhejiang Sci-Tech University)
DARD: Dice Adversarial Robustness Distillation Against Adversarial Attacks Zou, Jing (AUGUSTA university); Zhang, Shungeng (Augusta University); Qiu, Meikang (Augusta University)
Leveraging Semantic Features and Graph Structures for Intelligent Vulnerability Detection in Smart Contracts
ruxin, Chen (hunan normal university)
Multi-Dimensional Cost-Driven LDSP Instruction Scheduling Optimization
Peng, Ting (Hunan University Of Science And Technology); Shi, Min (Hunan University); Zhou, lian Xin (Hunan University of Science and Technology)
Meta-Distillation: A Novel Adversarial Distillation Network for Adversarial Robustness
Okumali, Richard (Donghua University)
RdBFT: Faster Asynchronous BFT Protocol through Random Binary Agreement
Zhuang, Chaofeng (East China Normal University); Qian, Haifeng (East China Normal University)
MFRWF: Enhance Website Fingerprinting Robustness Against website content updates and background noise traffic
Chen, Siyang (University of Science and Technology of China); Jin, Dong (Institute of Artificial Intelligence); Ma, Yuanyi (University of Science and Technology of China); Chen, Shuangwu (University of Science and Technology of China); Hou, Yunpeng (Institute of Artificial Intelligence); Yang, Jian (University of Science and Technology)
Att-SFI: Attestable software sandboxing with control flow integrity
Li, Wei (University of Chinese Academy of Sciences; Institute of Software, Chinese Academy of Sciences); Feng, Wei (Institute of Software, Chinese Academy of Sciences); Qin, Yu (Institute of Software, Chinese Academy of Sciences); Gu, Zeyu (Xiaomi Corperation)
Privacy-preserving Preselection for Face Identification Based on Packing
Xin, Rundong (shenzhen university); Wang, Taotao (Shenzhen University); Wang, Jin (Sanya Institute of Hunan University of Science and Technology); Zhao, Chonghe (Guangzhou University); Wang, Jing (Changsha University of Science and Technology)
FL(DP)2 : Federated Learning with Dynamic Personalized Differential Privacy
Shi, Cuiyun (Inner Mongolia University of Science and Technology); Wang, Jingyu (Inner Mongolia University of Science and Technology); Liu, Lixin (Renmin University of China); Chang, Xin (Inner Mongolia University of Science and Technology); Pu, Yini (Inner Mongolia University of Science and Technology)
Hamk-CFI: A Hardware-assisted Kernel Control Flow Protection Framework For Cloud Environments
Sun, Rui (Nanjing University); Su, Chao (Changshu Institute of Technology); Zeng, Qingkai (Nanjing University)
A Verifiable Federated Learning Aggregation Scheme Based on Homomorphic Hashing
Huang, Jialun (Changsha University of Science and Technology); Xu, Zisang (Changsha University of Science and Technology); Gu, Ke (Changsha University of Science and Technology); Zhu, Zhi (Changsha University of Science and Technology)
MOT-Fuzz: A Novel Directed Greybox Fuzzing with Multiple Ordered Target Basic Blocks for Multistep Vulnerabilities
Li, Kangrui (Beijing University of Posts and Telecommunications); Zhou, Zan (Beijing University of Posts and Telecommunications); Yang, Shujie (Beijing University of Posts and Telecommunications); Xu, Changqiao (Beijing University of Posts and Telecommunications)
A Lightweight Image Steganography Scheme Based on Invertible Neural Network Architecture with Progressive Channel Attention
Li, Qingru (Hebei Normal University); Yang, Ruoyao (Hebei Normal University); Wang, Fangwei (Hebei Normal University); Wang, Changguang (Hebei Normal University); Zhang, Xi (Hebei Normal University); Babaagba, Kehinde O. (Edinburgh Napier University); Tan, Zhiyuan (Edinburgh Napier University)
Consortium Blockchain-Based Anti-Plagiarism Scheme for Multi-NFT Marketplaces
Gao, Jie (Zhejiang University of Technology); Liu, Gang (Shenzhen Institute for Advanced Study, University of Electronic Science and Technology of China); Zhou, Kun (Zhejiang University of Technology); Cheng, HongBing (Zhejiang University of Technology)
Flow Dissector: A Flow Slicing Representation with a Pre-trained Model for Varied Malicious Traffic Classification
Jiang, Jun (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China); Dong, Fangming (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China); Guo, Lingjia (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China); Jiang, Zhengwei (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China); Liu, Baoxu (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China); Zhang, Kai (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China)
OptiGame: Game-Theoretic Enhancements for Optimistic Rollups through Bayesian Strategies
Khalil, Alvi Ataur (Florida International University); Hasan, Md Golam Moula Mehedi (Iona University); Rahman, Mohammad Ashiqur (Florida International University)
A_Double_Layer_Blockchain_Assisted_Anonymous_Cross_Domain_Authentication_and_Transaction_Scheme_for_Metaverse
Chen, Yubo (Changsha University of Science and Technology); Xu, Zisang (Changsha University of Science and Technology); Meng, Xiangwei (Hunan University of Science and Technology); Huan, Zhenhao (Changsha University of Science and Technology)
PIRchain: Blockchain-Enhanced Privacy-Preserving Inter-domain Routing
Lei, Xiaohan (Beijing University of Posts and Telecommunications); Tian, Ye (Beijing University of Posts and Telecommunications); Yang, Yuan (Tsinghua University); Zhang, Runhao (Beijing University of Posts and Telecommunications); Que, Xirong (Beijing University of Posts and Telecommunications); Gong, Xiangyang (Beijing University of Posts and Telecommunications)
LLM-Augmented Fuzzing for Unveiling PLC Web Application Vulnerabilities Impacting Physical Control
Cheng, Jiaxing (Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS); Fang, Dongliang (Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS); Gu, Zhongwei (Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS); Lv, Shichao (Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS); Si, Shuaizong (Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS); Sun, Limin (Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS)
Decentralized Role Rotation Privacy Protection in Federated Learning
wan, changxu (Hunan University of Science and Technology); Shi, Min (Hunan Univeristy); Wang, Ying (Hunan University of Science and Technology); Gong, Bo (Hunan University of Science and Technology); Xu, Jianbo (Hunan University of Science and Technology)
XRwatcher: A Detection Scheme for XR Privacy Speculation Attacks Base on Traffic Analysis
Zhang, Hao (Xidian University); Li, Guohao (Xidian University); Yang, Li (Xidian University); Wang, Jiangyu (Xidian University); Yang, Ruiyuan (Xidian University); Yang, Huipeng (Xidian University)
Fair Exchange of Trained Machine Learning Models Based on Permissioned Blockchain and Zero-Knowledge Contingent Payment
Xu, Shiwei (Huazhong Agricultural University); Wu, Hang (Huazhong Agricultural University); Yin, Jiangjin (Huazhong Agricultural University); Peng, Zhe (Hong Kong Polytechnic University); Tong, Yan (Huazhong Agricultural University); Ren, Zhengwei (Wuhan University of Science and Technology); Du, Le (Wuhan East Lake Big Data Technology Co. Ltd)