Accepted Papers
Titles:
Measuring Contextual Factors that Influence Real-World Walking Speed
Authors:
Ireson, Neil (The University of Sheffield); Lanfranchi, Vita (The University of Sheffield)
Diagnostic Hysteroscopy Electronic Health Record System
Authors:
Theodosiou, Alexandros (3AE Health LTD)
EghiFit: Smartphone based Behaviour Monitoring and Health Recommendation in a Weight Loss Intervention Study
Authors:
Ivezić, Dijana (University of Freiburg); Keppel, Jonas (University of Duisburg-Essen); Becker, Christine (Bodymed AG); Walle, Hardy (Bodymed AG); Schneegass, Stefan (University of Duisburg-Essen); Amft, Oliver (University of Freiburg)
Using Predictive Analysis and Wearables to Increase Physical Activity among Individuals with Disabilities- SMART Design
Authors:
Mohanraj, Sangeetha (University of Alabama at Birmingham); Thirumalai, Mohanraj (University of Alabama at Birmingham); Mendonca, Christen John (University of Alabama at Birmingham)
BeClean: Designing Personalized Eco-Feedback Application for Pro-Environmental Behavior
Authors:
Mahapasuthanon, Pattiya (George Mason University); Genaro Motti, Vivian (George Mason University)
Use of Gamified Monetary Rewards as a Means of Motivation towards Daily Self-Monitoring of Diabetes Management Behaviors
Authors:
Thirumalai, Mohanraj (The University of Alabama at Birmingham); John, Tejossy (The University of Alabama at Birmingham); Mehta, Tapan (The University of Alabama at Birmingham)
Improving Personalized Medicine via AI-based Precision Tracheostomy
Authors:
Toulkeridou, Evropi (CYENS Centre of Excellence); Kosmidou, Panagiota (German Oncology Center, Limassol, Cyprus); Vevis, Kristis (German Oncology Center, Limassol, Cyprus); Antoniou, Zinonas (3aHealth); Kallinos, Loizos (3aHealth); Valiandi, Ioanna (CYENS CoE); Panayides, Andreas (CYENS CoE)
Serious Games for Children with Motor Dysgraphia: Context and Requirements Analysis and Participatory Design Thinking Ideation
Authors:
Rettinger, Lena (University of Applied Sciences, FH Campus Wien); Hauser, Carina (University of Applied Sciences, FH Campus Wien); Gstöttner, Lisa-Sophie (University of Applied Sciences, FH Campus Wien); Goldschmid, René (University of Applied Sciences, FH Campus Wien); Schönthaler, Erna (University of Applied Sciences, FH Campus Wien); Putz, Peter (University of Applied Sciences, FH Campus Wien)
Physical Activity, Physical Function and Quality of Life in Midlife Women.
Authors:
Giggins, Oonagh (Dundalk Institute of Technology); Cullen-Smith, Suzanne (Dundalk Institute of Technology); Broeckx, Leen (Thomas More University of Applied Sciences); Sels, Romy (Thomas More University of Applied Sciences); Helsen, Kim (Thomas More University of Applied Sciences); Cuppens, Kris (Thomas More University of Applied Sciences)
Social Media and Its Impact on Orthorexia Nervosa. A Systematic Literature Review.
Authors:
Lecaj, Rron (SMK, College of Applied Sciences)
Main track
CLATM: A Contrastive Learning-Based FDIA Detection Method with Attention Timestamp Masking for REIoT
Xia, ZhuoQun (Changsha University of Science & Technology); Haidong, Tang Haidong (Tang); Lin, Xi (Changsha University of Science & Technology)
BFT-MS: Asynchronous BFT Protocol Using Bounded Memory
Cheng, Hao (Institute of Software Chinese Academy of Sciences, China); Kong, Fanyu (School of Software, Shandong University, China); Lu, Yuan (Institute of Software, Chinese Academy of Sciences, China); Zhang, Zhenfeng (Institute of Software, Chinese Academy of Sciences, China)
Unbalanced Secret Labeled Private Set Intersection via Scalable Dual-Load Bloom Filter
Yang, Kaijie (Beihang University); Guo, Hua (Beihang University); Guan, Yewei (Beihang University); Li, Weiwei (North China University of Water Resources and Electric Power)
From Dark Network to Honeypot: Analysis and Traceability of Multi-prefix IPv6 Network Attacks
Huang, Youjun (Tsinghua University); Li, Xiang (Nankai University); Miao, Fasheng (Tsinghua University); Duan, Haixin (Tsinghua University); Zhang, Jia (Tsinghua University)
On Analyzing SSO Permissions Across Web and Android Platforms
Rezaei, Fahimeh (Concordia); Lupinacci, Matteo (University of Calabria); Mannan, Mohammad (Concordia University); Youssef, Amr (Concordia University)
Hardware-assisted Secure Decentralized Cloud Storage via Self-audit and Self-repair
Dafoe, Josh (Michigan Technological University); Chen, Niusen (University of Wisconsin-La Crosse); Chen, Bo (Michigan Technological University)
FlipStress: Noise Injection Defenses Against CPU-cache-based Web Attacks
Basak, Tapan (New Jersey Institute of Technology); Curtmola, Reza (New Jersey Institute of Technology); Oren, Yossi (Ben Gurion University); Phan, Hai (New Jersey Institute of Technology)
PEARL: A Reinforcement Learning-Based Attack Analysis Approach for Security and Robustness Assessment of Smart Home Systems
Haque, Nur Imtiazul (University of Cincinnati); Rahman, Mohammad Ashiqur (Florida International University); Uluagac, A. Selcuk (Florida International University); Njilla, Laurent (Air Force Research Laboratory)
DASPN: A Multi-level Security Protection Model for Northbound Interface Based on Dynamic Access Control
Huang, Yining (Beijing University of Posts and Telecommunications); Guan, Jianfeng (Beijing University of Posts and Telecommunications); Gu, Yilan (Beijing University of Posts and Telecommunications); Liu, Kexian (Beijing University of Posts and Telecommunications)
BFDet: A Method for Detecting Malicious Traffic with Ultra-Low False Positive Rate Based on TLS Behavior Flow
Guo, Zhongyu (Key Laboratory of Cyberspace Security, Ministry of Education); Lu, Bin (Key Laboratory of Cyberspace Security, Ministry of Education); Sun, Rongbo (Key Laboratory of Cyberspace Security, Ministry of Education, Zhengzhou 450001, China); Wu, Wei (Key Laboratory of Cyberspace Security, Ministry of Education); Li, Ding (Key Laboratory of Cyberspace Security, Ministry of Education); Lin, Xiangnan (Key Laboratory of Cyberspace Security, Ministry of Education); Wang, Chengyu (Key Laboratory of Cyberspace Security, Ministry of Education)
When VR is Not Just for Gaming: Unmasking GPU Resource Misuse on VR Headset
Yang, Dianshi (University of Delaware); Gao, Xing (University of Delaware)
A Few-Shot-Based Model-Agnostic Meta-Learning for Intrusion Detection in Secure of In-vehicle Network
Xu, Yingjie (Shanghai University); Li, Yufeng (Shanghai University); Zhang, Guiqi (Shanghai University); Shen, Jun (Shanghai University)
ESKNN:Efficient Secure KNN Query Based On 3-Party Secure Computation
Zhao, Peijun (National University of Defense Technology); Zhao, Xianan (National University of Defense Technology); Liu, Lin (National University of Defense Technology); Fu, Shaojing (National University of Defense Technology); Luo, Yuchuan (National University of Defense Technology)
An Enhanced Credit-Based Shaper for Audio-Video Bridging Streams in TSN
Huang, WeiHong (Hunan University of Science and Technology); Xu, Zhen (Hunan University of Science and Technology); Shi, Min (Hunan University); Huang, Jing (Hunan University of Science and Technology)
A Self-adaptive Moving Target Defense Decision-making Method Based on Bounded-rationality Supermodular Games
Sun, Rongbo (Key Laboratory of Cyberspace Security, Ministry of Education, Zhengzhou 450001, China); Fei, Jinlong (Key Laboratory of Cyberspace Security, Ministry of Education, Zhengzhou 450001, China); Zhu, Yuefei (Key Laboratory of Cyberspace Security, Ministry of Education, Zhengzhou 450001, China)
MDC-Net: Multi-Dimensional Cross-Domain Collaborative Network for Image Manipulation Localization
Chen, Jiaxin (Changsha University of Science and Technology); Wei, Yawen (Changsha University of Science and Technology); Cai, Shengxin (Changsha University of Science and Technology); Zhang, Dengyong (Changsha University of Science and Technology)
Two Birds with One Stone: Multi-Task Detection and Attribution of LLM-Generated Text
Liu, Zeyan (University of Louisville); Rao, Zixin (University of Louisville); Mohamed, Youssef (University of Louisville); Liu, Shang (University of Chinese Academy of Sciences)
Now Let’s Make It Physical! Enabling Trusted Certificate Issuance in PKI via Physical Bindings for CAs
Zhang, Xiaolin (Shanghai Jiao Tong University); Chen, Chenghao (Shanghai Jiao Tong University); Qin, Kailun (Shanghai Jiao Tong University); Wang, Yuxuan (Shanghai Jiao Tong University); QU, Shipei (Shanghai Jiao Tong University); Wang, Tengfei (Shanghai Jiao Tong University); Zhang, Chi (Shanghai Jiao Tong University); Gu, Dawu (Shanghai Jiao Tong University)
DCAPSCR: A Decentralized Conditional Anonymous Payment System With Collaborative Regulation
Zhang, Jing (Nanjing University of Aeronautics and Astronautics); Tao, Yu (Nanjing University of Aeronautics and Astronautics); Zhou, Lu (Nanjing University of Aeronautics and Astronautics)
One Trace is Possible: A Method for Small-Sample Profiling Side-Channel Analysis in Communication Environments
Wang, Chen (Zhejiang Sci-Tech University); Sun, Tianlong (Zhejiang Sci-Tech University); Shen, Jian (Zhejiang Sci-Tech University)
DARD: Dice Adversarial Robustness Distillation Against Adversarial Attacks Zou, Jing (AUGUSTA university); Zhang, Shungeng (Augusta University); Qiu, Meikang (Augusta University)
Leveraging Semantic Features and Graph Structures for Intelligent Vulnerability Detection in Smart Contracts
ruxin, Chen (hunan normal university)
Multi-Dimensional Cost-Driven LDSP Instruction Scheduling Optimization
Peng, Ting (Hunan University Of Science And Technology); Shi, Min (Hunan University); Zhou, lian Xin (Hunan University of Science and Technology)
Meta-Distillation: A Novel Adversarial Distillation Network for Adversarial Robustness
Okumali, Richard (Donghua University)
RdBFT: Faster Asynchronous BFT Protocol through Random Binary Agreement
Zhuang, Chaofeng (East China Normal University); Qian, Haifeng (East China Normal University)
MFRWF: Enhance Website Fingerprinting Robustness Against website content updates and background noise traffic
Chen, Siyang (University of Science and Technology of China); Jin, Dong (Institute of Artificial Intelligence); Ma, Yuanyi (University of Science and Technology of China); Chen, Shuangwu (University of Science and Technology of China); Hou, Yunpeng (Institute of Artificial Intelligence); Yang, Jian (University of Science and Technology)
Att-SFI: Attestable software sandboxing with control flow integrity
Li, Wei (University of Chinese Academy of Sciences; Institute of Software, Chinese Academy of Sciences); Feng, Wei (Institute of Software, Chinese Academy of Sciences); Qin, Yu (Institute of Software, Chinese Academy of Sciences); Gu, Zeyu (Xiaomi Corperation)
Privacy-preserving Preselection for Face Identification Based on Packing
Xin, Rundong (shenzhen university); Wang, Taotao (Shenzhen University); Wang, Jin (Sanya Institute of Hunan University of Science and Technology); Zhao, Chonghe (Guangzhou University); Wang, Jing (Changsha University of Science and Technology)
FL(DP)2 : Federated Learning with Dynamic Personalized Differential Privacy
Shi, Cuiyun (Inner Mongolia University of Science and Technology); Wang, Jingyu (Inner Mongolia University of Science and Technology); Liu, Lixin (Renmin University of China); Chang, Xin (Inner Mongolia University of Science and Technology); Pu, Yini (Inner Mongolia University of Science and Technology)
Hamk-CFI: A Hardware-assisted Kernel Control Flow Protection Framework For Cloud Environments
Sun, Rui (Nanjing University); Su, Chao (Changshu Institute of Technology); Zeng, Qingkai (Nanjing University)
A Verifiable Federated Learning Aggregation Scheme Based on Homomorphic Hashing
Huang, Jialun (Changsha University of Science and Technology); Xu, Zisang (Changsha University of Science and Technology); Gu, Ke (Changsha University of Science and Technology); Zhu, Zhi (Changsha University of Science and Technology)
MOT-Fuzz: A Novel Directed Greybox Fuzzing with Multiple Ordered Target Basic Blocks for Multistep Vulnerabilities
Li, Kangrui (Beijing University of Posts and Telecommunications); Zhou, Zan (Beijing University of Posts and Telecommunications); Yang, Shujie (Beijing University of Posts and Telecommunications); Xu, Changqiao (Beijing University of Posts and Telecommunications)
A Lightweight Image Steganography Scheme Based on Invertible Neural Network Architecture with Progressive Channel Attention
Li, Qingru (Hebei Normal University); Yang, Ruoyao (Hebei Normal University); Wang, Fangwei (Hebei Normal University); Wang, Changguang (Hebei Normal University); Zhang, Xi (Hebei Normal University); Babaagba, Kehinde O. (Edinburgh Napier University); Tan, Zhiyuan (Edinburgh Napier University)
Consortium Blockchain-Based Anti-Plagiarism Scheme for Multi-NFT Marketplaces
Gao, Jie (Zhejiang University of Technology); Liu, Gang (Shenzhen Institute for Advanced Study, University of Electronic Science and Technology of China); Zhou, Kun (Zhejiang University of Technology); Cheng, HongBing (Zhejiang University of Technology)
Flow Dissector: A Flow Slicing Representation with a Pre-trained Model for Varied Malicious Traffic Classification
Jiang, Jun (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China); Dong, Fangming (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China); Guo, Lingjia (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China); Jiang, Zhengwei (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China); Liu, Baoxu (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China); Zhang, Kai (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China)
OptiGame: Game-Theoretic Enhancements for Optimistic Rollups through Bayesian Strategies
Khalil, Alvi Ataur (Florida International University); Hasan, Md Golam Moula Mehedi (Iona University); Rahman, Mohammad Ashiqur (Florida International University)
A_Double_Layer_Blockchain_Assisted_Anonymous_Cross_Domain_Authentication_and_Transaction_Scheme_for_Metaverse
Chen, Yubo (Changsha University of Science and Technology); Xu, Zisang (Changsha University of Science and Technology); Meng, Xiangwei (Hunan University of Science and Technology); Huan, Zhenhao (Changsha University of Science and Technology)
PIRchain: Blockchain-Enhanced Privacy-Preserving Inter-domain Routing
Lei, Xiaohan (Beijing University of Posts and Telecommunications); Tian, Ye (Beijing University of Posts and Telecommunications); Yang, Yuan (Tsinghua University); Zhang, Runhao (Beijing University of Posts and Telecommunications); Que, Xirong (Beijing University of Posts and Telecommunications); Gong, Xiangyang (Beijing University of Posts and Telecommunications)
LLM-Augmented Fuzzing for Unveiling PLC Web Application Vulnerabilities Impacting Physical Control
Cheng, Jiaxing (Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS); Fang, Dongliang (Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS); Gu, Zhongwei (Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS); Lv, Shichao (Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS); Si, Shuaizong (Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS); Sun, Limin (Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS)
Decentralized Role Rotation Privacy Protection in Federated Learning
wan, changxu (Hunan University of Science and Technology); Shi, Min (Hunan Univeristy); Wang, Ying (Hunan University of Science and Technology); Gong, Bo (Hunan University of Science and Technology); Xu, Jianbo (Hunan University of Science and Technology)
XRwatcher: A Detection Scheme for XR Privacy Speculation Attacks Based on Traffic Analysis
Zhang, Hao (Xidian University); Li, Guohao (Xidian University); Yang, Li (Xidian University); Wang, Jiangyu (Xidian University); Yang, Ruiyuan (Xidian University); Yang, Huipeng (Xidian University)
Fair Exchange of Trained Machine Learning Models Based on Permissioned Blockchain and Zero-Knowledge Contingent Payment
Xu, Shiwei (Huazhong Agricultural University); Wu, Hang (Huazhong Agricultural University); Yin, Jiangjin (Huazhong Agricultural University); Peng, Zhe (Hong Kong Polytechnic University); Tong, Yan (Huazhong Agricultural University); Ren, Zhengwei (Wuhan University of Science and Technology); Du, Le (Wuhan East Lake Big Data Technology Co. Ltd)
Late track
SaFeBridge: Consensus-Agnostic Asset Transfer with Slow-Approval Fast-Exit Principles
Deng, Fuyang (Beihang Univeristy); Wu, Qianhong (Beihang University, China); Dai, Xiaopeng (Beihang University, China); Geng, Yifu (Beihang University, China); Qin, Bo (Renmin University of China)
Insights into Ransomware Detection based on Semantic Understanding
Zhao, Lingbo (Institute of Information Engineering, Chinese Academy of Sciences); Wang, Shuquan (School of Control Science and Engineering, Shandong University); Wang, Zhilu (Institute of Information Engineering, Chinese Academy of Sciences); Zhang, Yuhui (Institute of Information Engineering, Chinese Academy of Sciences); Hou, Rui (Institute of Information Engineering, Chinese Academy of Sciences,)
Adaptive On-Chain and Off-Chain Communication Management Based on SDN and Blockchain
 Huang, Daming (Nanjing University); Xiang, JinCheng (Nanjing University); Jin, Yu (Nanjing University); Tian, Chen (Nanjing University)
Joint Beamforming and Reflection Design for Physical Layer Security in RIS-Assisted Integrated Sensing and Communication Systems
Guo, Sitong (Inner Mongolia University,); Hao, Zheng (Inner Mongolia University); Zhang, Yinghui (Inner Mongolia University); Yan, Junkun (Xidian University)
Real-World Image Dehazing via Degradation Modeling, Spectral-Spatial Fusion, and Prior Guidance
 Rong, Jiali (School of Computer Science and Engineering, Hunan University of Science and Technology); Liao, miao (School of Computer Science and Engineering, Hunan University of Science and Technology); Di, Shuanhu (College of Intelligence Science and Technology, National University of Defense Technology)
Dependency Tree-based Multi-Task Learning for Extracting Process Models in Safety Management
 Su, Xiaoyang (School of Computer Science and Engineering, Hunan University of Science and Technology, China); Wen, Yiping (School of Computer Science and Engineering, Hunan University of Science and Technology, China)
Â
The Framework Of Variational Mode Decomposition Based For DDoS Detection
yizhun, tian (civil aviation flight university of china); Lu, Jing (Civil Aviation Flight University of China); jia, ruchun (sichuan university)
Antitoxin: A Framework for Controlling Persistent Backdoors in Federated Learning
 Karamchandani, Neeraj (The Pennsylvania State University); Wu, Chen (The Pennsylvania State University); Nagasubramaniam, Piyush (The Pennsylvania State University); Wu, Dinghao (Pennsylvania State University); Zhu, Sencun (Pennsylvania State University)
A Loop Elimination Method Based on Vector DSP Processor with Immediate Addressing Incorporation
 Zhihao, Li (Hunan University of Science and Technology)
Complementary Ensemble Empirical Mode Decomposition and Permutation Entropy-Empowered Network Traffic Anomaly Detection for Secure QUIC Communications liang, shan (Jiangxi Normal University); Ming, Jiang (Jiangxi Normal University); Cao, Yuanlong (Jiangxi Normal University)
FLARE: Feature-based Lightweight Aggregation for Robust Evaluation of IoT Intrusion Detection
 Boswell, Bradley (Augusta University); Barrett, Seth (Augusta University); Rajaganapathy, Swarnamugi (Digital Forensics & Artificial Intelligence Research Lab); Dorai, Gokila (Augusta University); Qiu, Meikang (Augusta University)
The RPKI and Its Hidden Guardians: An Empirical Analysis of Their Relationship and Security Implications
 zou, hui (Computer Network Information Center); He, Yizhuo (Computer Network Information Center, Chinese Academy of Sciences); Jin, Yuxiang (Computer Network Information Center, Chinese Academy of Sciences)
SCFA: Stacked Classifier with Feature Augmentation for Imbalanced Node Classification in Intelligent Internet-of-ThingsÂ
Luo, Cuiting (Changsha Medical University); Duan, Yuanjie (Changsha Medical University); Liu, Cuicui (Changsha Medical University); Li, Hongyan (Changsha Medical University); Long, Jing (Hunan Normal University)
Clark: a Transferable APT Detection Framework via Self-Supervised Contrastive LearningÂ
Zhang, Shuyi (Institute of Information Engineering, Chinese Academy of Sciences); Wen, Yu (Institute of Information Engineering, Chinese Academy of Sciences); Feng, Jingjing (Institute of Information Engineering, Chinese Academy of Sciences); Cui, Wenzhuo (Institute of Information Engineering, Chinese Academy of Sciences)
Investigating How Trading Patterns and Twitter Impact the CryptoPunks NFT MarketÂ
Tang, Mingdong (Hunan University of Science and Technology); Liu, Yuxiang (Macau University of Science and Technology)
A Novel Multi-Graph Spatial-Temporal Graph Neural Network Model for Traffic PredictionÂ
Diao, Chunyan (Information Engineering University); Zhang, Yanrong (Harbin University of Commerce\Computer and Information Engineering); Ma, jinquan (Information Engineering University); Ouyang, Xi (Information Engineering University); Guo, Lixiang (Information Engineering University); Huo, Sheng (Zhuzhou CRRC Times Electric Co., Ltd); Shen, Tong (Huawei); Li, Kuanching (Hunan University of Sciences and Technology/Computer Science and Engineering)
IncreTTP: An Incremental TTPs Classification ModelÂ
Liu, Yixiang (Sichuan university); Wang, Junfeng (Sichuan university); Ge, Wenhan (Sichuan University)
A Maximizing Duty-Cycle network Lifetime Cooperative Routing algorithm in a Smart Community Scenario
 Ji, Zhang (Changsha Social Work College); He, Shiming (Changsha University of Science and Technology); Yan, Zhi (Changsha Social Work College); Chen, Dan (Changsha Social Work College)
A Robustness Optimization Mechanism for Intrusion Detection Models Based on Dynamic Ensemble Learning
 Ji, Jianshou (College of Computer and Data Science, Fuzhou University); Lin, Weiwei (College of Computer and Data Science, Fuzhou University); Liu, Hongyan (College of Computer Science and Technology, Zhejiang University); Zhang, Dong (Fuzhou University); Lin, Shengrui (College of Computer and Data Science, Fuzhou University); Zhu, Longlong (College of Computer and Data Science, Fuzhou University); Wu, Chunming (Zhejiang University); Xu, Shaowei (College of Computer and Data Science, Fuzhou University)
Knowledge Distillation for Federated Learning with Many Noisy Clients
 Peng, Liang (Hunan University of Science and Technology); Jiang, Zoufeng (Hunan University of Science and Technology); Chen, Yuxiang (Hunan University of Science and Technology)
Security Detection Method for Wireless Sensor Networks Based on Self-Supervised Learning and Deep LearningÂ
yu, jintao (Harbin University of Commerce); wang, xiaowen (Harbin University of Commerce); liu, he (Harbin University of Commerce); meng, ke (Harbin University of Commerce)
Â
RADBench: A Comprehensive Benchmark for Internet Routing Anomaly DetectionÂ
Wang, Xiaolan (Computer Network Information Center, Chinese Academy of Sciences); Nie, Xiaohui (Computer Network Information Center, Chinese Academy of Sciences); Wang, Yuye (Hangzhou Institute for Advanced Study, University of Chinese Academy of Sciences); Chen, Luyao (Computer Network Information Center, Chinese Academy of Sciences); Wu, Zheng (Nanjing University of Posts and Telecommunications); Fu, Yu (China Unicom Research Institute); Shang, Jiang (Computer Network Information Center, Chinese Academy of Sciences); Du, Congshu (Computer Network Information Center, Chinese Academy of Sciences); Pei, Dan (Tsinghua University)
Security-Aware and Energy-Efficient Federated Learning in LEO Satellite Edge Micro-clouds: A Noise-Adaptive Allocation FrameworkÂ
Teng, ShuYang (Hunan University); Qiao, Ying (Hunan University); Luo, Juan (Hunan University); Zeng, GuoGen (Hunan University)
HIDE: Anonymous Hop-by-Hop Identity Authentication Based on Dynamic Address Label Embedding
 Hu, Xiaolong (Beijing University of Posts and Telecommunications); Guan, JianFeng (Beijing University of Posts and Telecommunications); Liu, Kexian (Beijing University of Posts and Telecommunications); Liu, Jianli (Beijing University of Posts and Telecommunications); Qin, Ye (Beijing University of Posts and Telecommunications); Yao, Su (Tsinghua University)
Login, Logout, Reset: Measuring Security and Privacy Issues in Real-World Web LoginsÂ
Lamisa, Kazi Farhat (Concordia University); Mannan, Mohammad (Concordia University); Youssef, Amr (Concordia University)
A Geographical Entity Relation Extraction Method Based on Improved OneRel Model
 Jing, Luo (Hunan University of Science and Technology); Jiang, Zhao Yi (Hunan University of Science and Technology); Wu, Li Qiu (Hunan University of Science and Technology)
BMI: A Bidirectional Spatio-Temporal Selective State Space Model for Data ImputationÂ
Wen, Jigang (Hunan University of Science and Technology); Nie, Wenqian (Hunan University); Li, Xiaocan (Hunan University); xie, kun (hunan university); Xie, Yong (Nanjing University of Posts and Telecommunications); Chen, Yuxiang (Hunan University of Science and Technology); Fu, Zigeng (Hunan University); Feng, Quan (Hunan Vanguard Group Corporation Limited)
SG-SCA: An Interpretable Side-Channel Analysis Model Based on Shapelet and Graph Attention NetworkÂ
Guo, Yaxing (Institute of Information Engineering, Chinese Academy of Sciences, China; School of Cyber Security, University of Chinese Academy of Sciences, China); You, Shilong (Institute of Information Engineering, Chinese Academy of Sciences, China; School of Cyber Security, University of Chinese Academy of Sciences, China); Peng, Tingting (Institute of Information Engineering, Chinese Academy of Sciences, China; School of Cyber Security, University of Chinese Academy of Sciences, China); Du, Jianfeng (Institute of Information Engineering, Chinese Academy of Sciences, China; School of Cyber Security, University of Chinese Academy of Sciences, China); Wang, Zhu (Institute of Information Engineering, Chinese Academy of Sciences, China; School of Cyber Security, University of Chinese Academy of Sciences, China); Yu, Aimin (Institute of Information Engineering, Chinese Academy of Sciences, China; School of Cyber Security, University of Chinese Academy of Sciences, China)
Log Anomaly Detection based on Time-Delta Sequential Feature
 Wen, Jigang (Hunan University of Science and Technology); Ma, Chenying (Hunan University); He, Shiming (Changsha University of Science and Technology); xie, kun (hunan university); Xie, Yong (Nanjing University of Posts and Telecommunications); Chen, Yuxiang (Hunan University of Science and Technology)
The Decision of Monotonic AutomataÂ
Long, Qingxia (Hunan University of Science and Technology); He, Yong (Hunan University of Science and Technology); Cui, Zhenhe (Hunan University of Science and Technology)
CCGCRN: Cluster and Completion Graph Convolution Recurrent Network for Incomplete Traffic Flow Forecasting
 Xie, Ruotian (Hunan university); Wen, Jigang (Hunan University of Science and Technology); liu, Caiping (Hunan University); jin, Yani (Hunan University); xie, kun (hunan university); He, Shiming (Changsha University of Science and Technology); Li, Kuanching (Hunan University of Science and Technology)
Document Image Tampering Detection based on Multi-domain Feature ConsistencyÂ
Chen, Jiaxin (Changsha University of Science and Technology); Sun, Long (Changsha University of Science and Technology); Zhang, Dengyong (Changsha University of Science and Technology)
Securing Snapshot Pruning in IOTA Tangle 2.0: A Cooperative Deep Reinforcement Learning Approach for Edge-Cloud Smart Meter NetworksÂ
Palaniswamy, Basker (University College Cork)
Â
A Re-authentication Scheme based on Blockchain and Reinforcement Learning
 Chen, Zixuan (Hunan University of Science and Technology); Li, Chuncao (Hunan University of Science and Technology); Zeng, Pengjie (Central South University); Zhou, Lian (Hunan University of Science and Technology); Ai, Yuanyuan (Hunan University of Science and Technology); Wang, Xiaoliang (Hunan University of Science and Technology)
More Bang for Your Buck: Gaining Collateral Benefit from Partial ROV DeploymentÂ
Chen, Yuxuan (Computer Network Information Center, Chinese Academy of Sciences); zou, hui (Computer Network Information Center, Chinese Academy of Sciences); Li, Yanbiao (Computer Network Information Center, Chinese Academy of Sciences); Wang, Xin (Stony Brook University); XIE, Gaogang (Computer Network Information Center, Chinese Academy of Sciences)
FedCLF: Contrastive Learning-driven Framework for Mitigating Data Heterogeneity in Federated LearningÂ
Bai, Chunming (Xiangtan university); Zhang, Heng (Economic Development Zone Branch of Zhuzhou Public Security Bureau); Xie, Yong (Xiangtan University); Su, Xin (Hunan Police Academy); Zhu, Xiangyuan (Hunan Police Academy); Kang, Wenjie (Hunan Police Academy); Liu, Xuchong (Hunan Police Academy)
Heterogeneity-aware semi-asynchronous federated learning
 He, Junying (Hunan University of Science and Technology); Chen, Yuxiang (Hunan University of Science and Technology); Xie, Kun (Hunan University); Wen, Jigang (Hunan University of Science and Technology); Cong, Yincuan (Hunan University); Chen, Xiaoyan (Xiamen University of Technology); Liu, Tianxiong (Hunan Aerospace Hospital)
SAFE: A Fast Privacy-Preserving Scheme for Multi-Client Face Verification
 Xu, Guotao (Xidian University); Zhao, Bowen (Xidian University); Zhong, Yantao (China Resources Intelligent Computing Technology Co., Ltd.); Ma, Zhaoting (Chinese Academy of Surveying and Mapping); Qiao, Cheng (Guangzhou University); Pei, Qingqi (Xidian Univeristy)
FedSND:Federated Learning with Symmetric Noise Decentralized Orthogonal EncryptionÂ
Yang, Chaoyi (Hunan University of Science and Technology); Tan, Wentao (Hunan University of Science and Technology); Chen, Yuxiang (Hunan University of Science and Technology); Wen, Jigang (Hunan University of Science and Technology); Cong, Yinchuan (Hunan University); Xie, Kun (Hunan University); Chen, Xiaoyan (Xiamen University of Technology); Liu, Tianxiong (Hunan Aerospace Hospital)
Task-Driven GAN for Class-Imbalanced Intrusion DetectionÂ
Ma, Yangle (KTH); Hao, Rijie (Aalto university); Huo, Sheng (ZHUZHOU CRRC TIMES ELECTRIC CO., LTD); Jiang, Ping (ZHUZHOU CRRC TIMES ELECTRIC CO., LTD)
Protecting Medical Image Privacy by Using Chaos Encryption and BlockchainÂ
Liu, Yu (Hunan University); Wan, Wanglong (Hunan University); Yan, Zhenxiong (Hunan University); Song, Fuyuan (Nanjing University of Information Science and Technology); Jin, Wenqiang (Hunan University); Qin, Zheng (Hunan University); Deng, Minggao (Hunan Xiangneng Intelligent Electric Appliance Co., Ltd)
Â
Location Privacy Protection for VANETs based on Dynamically Adjustable Security Coefficient
 Yin, Luxiu (Hunan University of Science and Technology); Chen, QiHong (Hunan University of Science and Technology); Liu, Jianyu (Hunan University); Wang, Chun (Hunan Normal University); Luo, Juan (Hunan University); Li, Kuanching (Hunan University of Science and Technology)
An Intrusion Detection-Based Location Privacy Protection Algorithm for VANETs
 Yin, Luxiu (Hunan University of Science and Technology); Zhu, Kaifeng (Hunan University of Science and Technology); Luo, Juan (Hunan University); Liu, Jianyu (Hunan University); Huang, Jing (Hunan University of Science and Technology); Li, Kuanching (Hunan University of Science and Technology)
BDSV: A Blockchain-based Reliable and Efficient Batch Digital Signature Verification Scheme for IoV
 Cai, Jiahong (Hunan University of Science and Technology); Meng, Xiangwei (Hunan University of Science and Technology); Huo, Yingzi (Hunan University of Science and Technology); Wu, Yanbing (Hunan University of Science and Technology); Liang, Jiale (Harbin University of Commerce)
pFedDDS: Personalized Federated Learning via Dual defense StrategiesÂ
Xie, Rui (Hunan University of Science and Technology); Song, Qiang (Hunan University of Science and Technology); Chen, Linshu (Hunan University of Science and Technology); Hu, Na (Hunan University of Science and Technology); Wen, Jigang (Hunan University of Science and Technology)
Revocable and Verifiable Key Aggregate Searchable Encryption for Flexible Data Sharing
 Zhang, Shiwen (Hunan University of Science and Technology); Huang, Jiahao (Hunan University of Science and Technology); Zhou, Xinlian (Hunan University of Science and Technology); Liang, Wei (School of Computer Science and Engineering, Hunan University of Science and Technology); Li, Kuanching (Hunan University of Science and Technology)
An Energy-Aware Scheduling Algorithm for Multi-period Parallel Applications on Heterogeneous Systems
 Huang, Jing (Hunan university of science and technology); Chen, Yuhong (Hunan University of Science and Technology)
Optimized Entanglement Routing for Enhanced Quantum Key Distribution Performance in Quantum Networks Zhang, Hongding (Hunan University of Science and Technology); Huo, Sheng (ZHUZHOU CRRC TIMES ELECTRIC CO., LTD); Jiang, Ping (ZHUZHOU CRRC TIMES ELECTRIC CO., LTD)
SVD-Based Efficient Communication Scheme for Heterogeneous Federated LearningÂ
Tang, Zhenyu (Hunan University of Science and Technology); Xiao, JiaHong (Hunan University of Science and Technology); Chen, Yuxiang (Hunan University of Science and Technology); Tang, Yuanqiang (Xinyu University); Liu, Tianxiong (Hunan Aerospace Hospital)
Causal-Driven Multi-Objective Grey Wolf Optimization Framework for Multidimensional Redundant IoT Traffic Intrusion Detection
 Zeng, ZengRi (Hunan University of Humanities, Science and Technology); Zhao, Baokang (National University of Defense Technology); Huang, Keke (Central South University); Zhang, Shiwen (Hunan University of Science and Technology); Kang, Aimei (Hunan University of Humanities, Science and Technology)
Spatiotemporal Cross-Domain Integrated Insights: Mitigating Fraudulent Activities on Ethereum
 Shi, Yuduo (Zhejiang University); Li, Zhao (Hangzhou Yugu Technology); Xu, Haitao (Zhejiang University); Wang, Yanbin (Shenzhen MSU-BIT University); Ma, Wenrui (Zhejiang Gongshang University); Zhang, Ji (University of Southern Queensland)
Low Energy Consumption Hierarchical Federated Learning
 Zhang, Shenaocheng (Hunan university of science and technology); Chen, Yuxiang (Hunan University of Science and Technology); Zhou, Xiaofan (Hunan University of Science and Technology); Wen, Jigang (Hunan University of Science and Technology); Xie, Kun (Hunan University); Cong, Yinchuan (Hunan University); Chen, Xiaoyan (Xiamen University of Technology); Liu, Tianxiong (Hunan Aerospace Hospital Fenglin road)
Cryptocurrency Transaction Anomaly Detection Based on Semi-Supervised Learning and Graph Neural NetworkÂ
Chen, Renguang (Fujian Normal University); Zeng, Lei (Fujian Normal University); Wang, Huiqing (Fujian Normal University); Chen, Zhide (Fujian Normal University); Yang, Xu (Minjiang University); Ruan, Zhiqiang (Minjiang University); Feng, Chen (Fuzhou Polytechnic); Zhu, Kexin (National Sun Yat-sen University); Yang, Xuechao (RMIT University)
Group-Based Parallel Split Federated Learning
 Zhou, Xiaofan (Hunan University of Science and Technology); Xiao, Xiangqi (Hunan University of Science and Technology); Chen, Yuxiang (Hunan University of Science and Technology); Wen, Jigang (Hunan University of Science and Technology); Zhang, Shenaocheng (Hunan University of Science and Technology); Xie, Kun (Hunan University); Cong, Yinchuan (Hunan University); Chen, Xiaoyan (Xiamen University of Technology); Liu, Tianxiong (Hunan Aerospace Hospital)
DRLPO: A Deep Reinforcement Learning Distributed Partial Offloading Scheme for Fog Computing NetworksÂ
Xiao, JiaHong (Hunan university of science and technology); Chen, Yuxiang (Hunan University of Science and Technology); Yang, Chaoyi (Hunan University of Science and Technology); Wen, Jigang (Hunan University of Science and Technology); Tang, Yuanqiang (Xinyu University); Liu, Tianxiong (Hunan Aerospace Hospital Fenglin road)
A Fault-Tolerant Block Allocation Scheme for Collaborative-Storage Blockchain SystemsÂ
Dou, Yuanhang (Changsha University of Science and Technology); Yin, Bo (Changsha University of Science and Technology); He, Fajin (Changsha University of Science and Technology)
A Blockchain-based Four-factor Authentication and Key Agreement Protocol for Wireless Medical Sensor Networks
 Gong, Bo (Hunan University of Science and Technology); Wu, Zhongqing (Hunan University of Science and Technology); Wang, Ying (Hunan University of Science and Technology); Xu, Jianbo (Hunan University of Science and Technology)
Research on Mixed-precision Optimization Compilation Methods for Loop Programs
 Luo, Fan (School of Computer Science and Engineering, Hunan University of Science and Technology); Hu, Yonghua (School of Computer Science and Engineering, Hunan University of Science and Technology); Zhang, Huifu (School of Computer Science and Engineering, Hunan University of Science and Technology); Gao, Yvxiang (School of Computer Science and Engineering, Hunan University of Science and Technology); Xie, Anxing (School of Computer Science and Engineering, Hunan University of Science and Technology)
AquaCrossNet: An Underwater Cross-Granularity Complementary Segmentation NetworkÂ
Chen, Linshu (Hunan University of Science and Technology)
A lightweight authentication protocol for resource-constrained WBAN
 Yang, Huaiyao (Hunan University of Science and Technology); Huang, Xueting (Hunan University of Science and Technology); Chen, Xiaoyan (Xiamen University of Technology); He, Dacheng (Hunan University of Science and Technology); Xiao, Yufeng (Hunan Universityof Science and Technology)
Efficient Privacy-Preserving and Verifiable Arbitrary Polygon Range Query in Cloud ComputingÂ
Song, Fuyuan (Nanjing University of Information Science and Technology); Zhang, Fan (Nanjing University of Information Science and Technology); Fu, Zhangjie (Nanjing University of Information Science and Technology); Liu, Yu (Hunan University); Yin, Hui (Changsha University); Qin, Zheng (Hunan University)
ReForGe: A Fusion Model with Recursive Feature Engineering for PdM of Aircraft Engines
 Huo, Yingzi (Hunan University of Science and Technology); Xiao, Yufeng (Hunan University of Science and Technology); Cai, Jiahong (Hunan University of Science and Technology); Wu, Yanbing (Hunan University of Science and Technology); Yang, Chengjun (Hechi University)
ECC-Based Certificate-less Aggregate Signatures Scheme for VANETsÂ
Zeng, Peng (Hunan University of Science and Technology); Liu, Yue (Hunan University of Science and Technology); Liu, Guikai (Hunan University of Science and Technology); Liu, Yuzhen (Hunan University of Science and Technology); Wang, Xiaoliang (School of Computer Science and Engineering, Hunan University of Science and Technology)
EvasionEval: A Benchmark for LLMs in Evaluating Advanced Defense Evasion TechniquesÂ
Wang, Baojin (University of Electronic Science and Technology of China); Huang, Yichen (University of Electronic Science and Technology of China); Li, Xiong (University of Electronic Science and Technology of China); Yu, Jiguo (University of Electronic Science and Technology of China); Zhang, Xiaosong (University of Electronic Science and Technology of China)
FedCC: Robust Federated Learning against Model Poisoning AttacksÂ
Jeong, Hyejun (UMass Amherst); Son, Hamin (UC Davis); Lee, Seohu (Johns Hopkins University); Hyun, Jayun (Hiippo T&C Inc.); Chung, Tai-Myoung (Hippo T&C Inc.)
TACA: Blockchain-Based Traceable and Anonymous Cross-Domain Authentication Scheme for IIoTÂ
Liang, Yufeng (Nanjing University of Aeronautics and Astronautics); Meng, Xiangwei (Hunan University of Science and Technology); Deng , Hai (Florida International University)
A Hybrid Adaptive Large Neighborhood Search for Secure and Efficient Single School Routing Problem
 Cui, Zhangwei (Hunan University of Science and Technology); Chen, Yitao (Hunan University of Science and Technology); Zhang, Qiongbing (Hunan University of Science and Technology); Pang, Rui (Hunan University of Science and Technology)
Privacy-Preserving Probability Fingerprinting Scheme with Collusion Resistance for Relational Databases
 Pan, Jie (Nanjing University of Aeronautics and Astronautics); Ye, Xinxin (Nanjing University of Aeronautics and Astronautics); Liu, Bingbing (Nanjing University of Aeronautics and Astronautics); Deng, Hai (Florida International University)
Prompting Large Language Models for Data-Flow Analysis: Addressing Common Errors for Better ReasoningÂ
Yu, Qingchen (Zhejiang University); Zhang, Jianshan (Minjiang University); Wu, Chunming (Zhejiang University)
BPGT: A Novel Privacy-Preserving K-Means Clustering Framework to Guarantee Local $d_{\chi}$-privacyÂ
Chen, Fan (Hunan University of Science and Technology); Lei, Bizhi (Hunan University of Science and Technology); Zhu, Jielu (Hunan University of Science and Technology); Zhu, Xiaoyu (Changsha University); Zhang, Shaobo (Hunan University of Science and Technology)
Privacy-Enhanced Multi-Modal Feature Fusion for E Commerce: A Novel Approach to Image and Text RetrievalÂ
Zhang, Yanrong (School of Computer and Information Engineering, Harbin University of Commerce); Chen, Bin (School of Computer and Information Engineering, Harbin University of Commerce); Xu, Chi (School of Computer and Information Engineering, Harbin University of Commerce); Liang, Jiale (Harbin University of Commerce)
LPFL-RL: A Lightweight Privacy-Preserving Federated Learning Scheme with Robustness Against Low-Quality Users in Cloud-Edge Collaborative EnvironmentsÂ
Ren, Feixiang (School of Computer Science and Engineering, Hunan University of Science and Technology); Zhang, Shiwen (Hunan University of Science and Technology); Liang, Wei (School of Computer Science and Engineering, Hunan University of Science and Technology); Chen, Shuang (School of Computer Science and Engineering, Hunan University of Science and Technology); Li, Kuanching (Hunan University of Science and Technology)
Defending Against Malicious Clients in Robust Heterogeneous Federated LearningÂ
Wang, Zijun (Beijing Institute of Technology); Gai, Keke (Beijing Institute of Technology); Yu, Jing (Minzu University of China); Zhu, Liehuang (Beijing Institute of Technology, China)
A Safety-Optimized Two-Stage Algorithm for Rural School Bus Route Planning with Heterogeneous Fleets and Mixed Loads
 zhang, cezhe (Hunan University of Science and Technology); zhang, qiongbing (Hunan University of Science and Technology)
Log Semantic Parsing with Prompt-based Few-shot LearningÂ
He, Shiming (Changsha University of Science and Technology); Long, Siru (Changsha University of Science and Technology); Wu, Gan (Changsha University of Science and Technology); Liang, Diqing (Changsha University of Science and Technology); Xie, Kun (Hunan University)
PPCM-Fed: Privacy-Preserving Cross-Modal Federated Learning in IoTÂ
Wang, Dongjue (Beijing Institute of Technology); Gai, Keke (Beijing Institute of Technology); Yu, Jing (Minzu University of China); Wang, An (Beijing Institute of Technology); Cao, Zhijing (Beijing Institute of Technology); Zhu, Liehuang (Beijing Institute of Technology)
Comprehensive Commits Security Testing with Enhanced Multi-Target Directed FuzzingÂ
Wang, Xiaolei (National University of Defense Technology); Feng, Chao (National University of Defense Technology); Ruilin, Li National (University of Defense Technology)
Dynamic Dual-Anonymous Lightweight Authentication Protocol Based on Hierarchical Certificateless Key for Cross-Domain V2GÂ
Xia, Zhuoqun (Changsha University of Science & Technology); wang, xin (Changsha University of Science & Technology)
A Social-Relationship and Geospatial-Aware Incentive Mechanism for Privacy-Preserving Mobile CrowdsensingÂ
Zhang, Minghe (Guilin University of Electronic Technalogy)
Replication-Based Fault-Tolerant Scheduling Algorithm for Heterogeneous Real-Time Systems
Yanghao, Yu (School of Computer Science and Technology, Wuhan University of Science and Technology, Wuhan, Hubei, China); Jiayin, Zhou (School of Computer Science and Technology, Wuhan University of Science and Technology, Wuhan, Hubei, China & Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System, Wuhan, China); Jing Wu (School of Computer Science and Technology, Wuhan University of Science and Technology, Wuhan, Hubei, China & Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System, Wuhan, China)
DF TransNet: Dual-channel Fusion Transformer for Image Deraining
Zhuo, He (School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan, China); Miao Liao (School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan, China); Shuanhu, Di (College of Intelligence Science and Technology, National University of Defense Technology, Changsha, China)
Routing Technology in Secure Quantum Networks
Jie, Xia (Hunan Software Vocational and Technical University, China)