Accepted Papers

Titles:

Authors:
Ireson, Neil (The University of Sheffield); Lanfranchi, Vita (The University of Sheffield)

Authors:
Theodosiou, Alexandros (3AE Health LTD)

Authors:
Ivezić, Dijana (University of Freiburg); Keppel, Jonas (University of Duisburg-Essen); Becker, Christine (Bodymed AG); Walle, Hardy (Bodymed AG); Schneegass, Stefan (University of Duisburg-Essen); Amft, Oliver (University of Freiburg)

Authors:
Mohanraj, Sangeetha (University of Alabama at Birmingham); Thirumalai, Mohanraj (University of Alabama at Birmingham); Mendonca, Christen John (University of Alabama at Birmingham)

Authors:
Mahapasuthanon, Pattiya (George Mason University); Genaro Motti, Vivian (George Mason University)

Authors:
Thirumalai, Mohanraj (The University of Alabama at Birmingham); John, Tejossy (The University of Alabama at Birmingham); Mehta, Tapan (The University of Alabama at Birmingham)

Authors:
Toulkeridou, Evropi (CYENS Centre of Excellence); Kosmidou, Panagiota (German Oncology Center, Limassol, Cyprus); Vevis, Kristis (German Oncology Center, Limassol, Cyprus); Antoniou, Zinonas (3aHealth); Kallinos, Loizos (3aHealth); Valiandi, Ioanna (CYENS CoE); Panayides, Andreas (CYENS CoE)

Authors:
Rettinger, Lena (University of Applied Sciences, FH Campus Wien); Hauser, Carina (University of Applied Sciences, FH Campus Wien); Gstöttner, Lisa-Sophie (University of Applied Sciences, FH Campus Wien); Goldschmid, René (University of Applied Sciences, FH Campus Wien); Schönthaler, Erna (University of Applied Sciences, FH Campus Wien); Putz, Peter (University of Applied Sciences, FH Campus Wien)

Authors:
Giggins, Oonagh (Dundalk Institute of Technology); Cullen-Smith, Suzanne (Dundalk Institute of Technology); Broeckx, Leen (Thomas More University of Applied Sciences); Sels, Romy (Thomas More University of Applied Sciences); Helsen, Kim (Thomas More University of Applied Sciences); Cuppens, Kris (Thomas More University of Applied Sciences)

Authors:
Lecaj, Rron (SMK, College of Applied Sciences)

Main track

CLATM: A Contrastive Learning-Based FDIA Detection Method with Attention Timestamp Masking for REIoT

 Xia, ZhuoQun (Changsha University of Science & Technology); Haidong, Tang Haidong (Tang); Lin, Xi (Changsha University of Science & Technology)

 

BFT-MS: Asynchronous BFT Protocol Using Bounded Memory 

Cheng, Hao (Institute of Software Chinese Academy of Sciences, China); Kong, Fanyu (School of Software, Shandong University, China); Lu, Yuan (Institute of Software, Chinese Academy of Sciences, China); Zhang, Zhenfeng (Institute of Software, Chinese Academy of Sciences, China)

 

Unbalanced Secret Labeled Private Set Intersection via Scalable Dual-Load Bloom Filter

Yang, Kaijie (Beihang University); Guo, Hua (Beihang University); Guan, Yewei (Beihang University); Li, Weiwei (North China University of Water Resources and Electric Power)

 

From Dark Network to Honeypot: Analysis and Traceability of Multi-prefix IPv6 Network Attacks

Huang, Youjun (Tsinghua University); Li, Xiang (Nankai University); Miao, Fasheng (Tsinghua University); Duan, Haixin (Tsinghua University); Zhang, Jia (Tsinghua University)

 

On Analyzing SSO Permissions Across Web and Android Platforms

Rezaei, Fahimeh (Concordia); Lupinacci, Matteo (University of Calabria); Mannan, Mohammad (Concordia University); Youssef, Amr (Concordia University)

 

Hardware-assisted Secure Decentralized Cloud Storage via Self-audit and Self-repair 

Dafoe, Josh (Michigan Technological University); Chen, Niusen (University of Wisconsin-La Crosse); Chen, Bo (Michigan Technological University)

 

FlipStress: Noise Injection Defenses Against CPU-cache-based Web Attacks

Basak, Tapan (New Jersey Institute of Technology); Curtmola, Reza (New Jersey Institute of Technology); Oren, Yossi (Ben Gurion University); Phan, Hai (New Jersey Institute of Technology)

 

PEARL: A Reinforcement Learning-Based Attack Analysis Approach for Security and Robustness Assessment of Smart Home Systems

Haque, Nur Imtiazul (University of Cincinnati); Rahman, Mohammad Ashiqur (Florida International University); Uluagac, A. Selcuk (Florida International University); Njilla, Laurent (Air Force Research Laboratory)

 

DASPN: A Multi-level Security Protection Model for Northbound Interface Based on Dynamic Access Control

Huang, Yining (Beijing University of Posts and Telecommunications); Guan, Jianfeng (Beijing University of Posts and Telecommunications); Gu, Yilan (Beijing University of Posts and Telecommunications); Liu, Kexian (Beijing University of Posts and Telecommunications)

 

BFDet: A Method for Detecting Malicious Traffic with Ultra-Low False Positive Rate Based on TLS Behavior Flow

Guo, Zhongyu (Key Laboratory of Cyberspace Security, Ministry of Education); Lu, Bin (Key Laboratory of Cyberspace Security, Ministry of Education); Sun, Rongbo (Key Laboratory of Cyberspace Security, Ministry of Education, Zhengzhou 450001, China); Wu, Wei (Key Laboratory of Cyberspace Security, Ministry of Education); Li, Ding (Key Laboratory of Cyberspace Security, Ministry of Education); Lin, Xiangnan (Key Laboratory of Cyberspace Security, Ministry of Education); Wang, Chengyu (Key Laboratory of Cyberspace Security, Ministry of Education)

 

When VR is Not Just for Gaming: Unmasking GPU Resource Misuse on VR Headset

Yang, Dianshi (University of Delaware); Gao, Xing (University of Delaware)

 

A Few-Shot-Based Model-Agnostic Meta-Learning for Intrusion Detection in Secure of In-vehicle Network

Xu, Yingjie (Shanghai University); Li, Yufeng (Shanghai University); Zhang, Guiqi (Shanghai University); Shen, Jun (Shanghai University)

 

ESKNN:Efficient Secure KNN Query Based On 3-Party Secure Computation

Zhao, Peijun (National University of Defense Technology); Zhao, Xianan (National University of Defense Technology); Liu, Lin (National University of Defense Technology); Fu, Shaojing (National University of Defense Technology); Luo, Yuchuan (National University of Defense Technology)

 

An Enhanced Credit-Based Shaper for Audio-Video Bridging Streams in TSN

Huang, WeiHong (Hunan University of Science and Technology); Xu, Zhen (Hunan University of Science and Technology); Shi, Min (Hunan University); Huang, Jing (Hunan University of Science and Technology)

 

A Self-adaptive Moving Target Defense Decision-making Method Based on Bounded-rationality Supermodular Games

Sun, Rongbo (Key Laboratory of Cyberspace Security, Ministry of Education, Zhengzhou 450001, China); Fei, Jinlong (Key Laboratory of Cyberspace Security, Ministry of Education, Zhengzhou 450001, China); Zhu, Yuefei (Key Laboratory of Cyberspace Security, Ministry of Education, Zhengzhou 450001, China)

 

MDC-Net: Multi-Dimensional Cross-Domain Collaborative Network for Image Manipulation Localization

Chen, Jiaxin (Changsha University of Science and Technology); Wei, Yawen (Changsha University of Science and Technology); Cai, Shengxin (Changsha University of Science and Technology); Zhang, Dengyong (Changsha University of Science and Technology)

 

Two Birds with One Stone: Multi-Task Detection and Attribution of LLM-Generated Text

Liu, Zeyan (University of Louisville); Rao, Zixin (University of Louisville); Mohamed, Youssef (University of Louisville); Liu, Shang (University of Chinese Academy of Sciences)

 

Now Let’s Make It Physical! Enabling Trusted Certificate Issuance in PKI via Physical Bindings for CAs

Zhang, Xiaolin (Shanghai Jiao Tong University); Chen, Chenghao (Shanghai Jiao Tong University); Qin, Kailun (Shanghai Jiao Tong University); Wang, Yuxuan (Shanghai Jiao Tong University); QU, Shipei (Shanghai Jiao Tong University); Wang, Tengfei (Shanghai Jiao Tong University); Zhang, Chi (Shanghai Jiao Tong University); Gu, Dawu (Shanghai Jiao Tong University)

 

DCAPSCR: A Decentralized Conditional Anonymous Payment System With Collaborative Regulation

Zhang, Jing (Nanjing University of Aeronautics and Astronautics); Tao, Yu (Nanjing University of Aeronautics and Astronautics); Zhou, Lu (Nanjing University of Aeronautics and Astronautics)

 

One Trace is Possible: A Method for Small-Sample Profiling Side-Channel Analysis in Communication Environments

Wang, Chen (Zhejiang Sci-Tech University); Sun, Tianlong (Zhejiang Sci-Tech University); Shen, Jian (Zhejiang Sci-Tech University)
DARD: Dice Adversarial Robustness Distillation Against Adversarial Attacks Zou, Jing (AUGUSTA university); Zhang, Shungeng (Augusta University); Qiu, Meikang (Augusta University)

 

Leveraging Semantic Features and Graph Structures for Intelligent Vulnerability Detection in Smart Contracts

ruxin, Chen (hunan normal university)

 

Multi-Dimensional Cost-Driven LDSP Instruction Scheduling Optimization

Peng, Ting (Hunan University Of Science And Technology); Shi, Min (Hunan University); Zhou, lian Xin (Hunan University of Science and Technology)

 

Meta-Distillation: A Novel Adversarial Distillation Network for Adversarial Robustness

Okumali, Richard (Donghua University)

 

RdBFT: Faster Asynchronous BFT Protocol through Random Binary Agreement 

Zhuang, Chaofeng (East China Normal University); Qian, Haifeng (East China Normal University)

 

MFRWF: Enhance Website Fingerprinting Robustness Against website content updates and background noise traffic 

Chen, Siyang (University of Science and Technology of China); Jin, Dong (Institute of Artificial Intelligence); Ma, Yuanyi (University of Science and Technology of China); Chen, Shuangwu (University of Science and Technology of China); Hou, Yunpeng (Institute of Artificial Intelligence); Yang, Jian (University of Science and Technology)

 

Att-SFI: Attestable software sandboxing with control flow integrity

Li, Wei (University of Chinese Academy of Sciences; Institute of Software, Chinese Academy of Sciences); Feng, Wei (Institute of Software, Chinese Academy of Sciences); Qin, Yu (Institute of Software, Chinese Academy of Sciences); Gu, Zeyu (Xiaomi Corperation)

 

Privacy-preserving Preselection for Face Identification Based on Packing

Xin, Rundong (shenzhen university); Wang, Taotao (Shenzhen University); Wang, Jin (Sanya Institute of Hunan University of Science and Technology); Zhao, Chonghe (Guangzhou University); Wang, Jing (Changsha University of Science and Technology)

 

FL(DP)2 : Federated Learning with Dynamic Personalized Differential Privacy 

Shi, Cuiyun (Inner Mongolia University of Science and Technology); Wang, Jingyu (Inner Mongolia University of Science and Technology); Liu, Lixin (Renmin University of China); Chang, Xin (Inner Mongolia University of Science and Technology); Pu, Yini (Inner Mongolia University of Science and Technology)

 

Hamk-CFI: A Hardware-assisted Kernel Control Flow Protection Framework For Cloud Environments 

Sun, Rui (Nanjing University); Su, Chao (Changshu Institute of Technology); Zeng, Qingkai (Nanjing University)

 

A Verifiable Federated Learning Aggregation Scheme Based on Homomorphic Hashing

Huang, Jialun (Changsha University of Science and Technology); Xu, Zisang (Changsha University of Science and Technology); Gu, Ke (Changsha University of Science and Technology); Zhu, Zhi (Changsha University of Science and Technology)

 

MOT-Fuzz: A Novel Directed Greybox Fuzzing with Multiple Ordered Target Basic Blocks for Multistep Vulnerabilities

Li, Kangrui (Beijing University of Posts and Telecommunications); Zhou, Zan (Beijing University of Posts and Telecommunications); Yang, Shujie (Beijing University of Posts and Telecommunications); Xu, Changqiao (Beijing University of Posts and Telecommunications)

 

A Lightweight Image Steganography Scheme Based on Invertible Neural Network Architecture with Progressive Channel Attention 

Li, Qingru (Hebei Normal University); Yang, Ruoyao (Hebei Normal University); Wang, Fangwei (Hebei Normal University); Wang, Changguang (Hebei Normal University); Zhang, Xi (Hebei Normal University); Babaagba, Kehinde O. (Edinburgh Napier University); Tan, Zhiyuan (Edinburgh Napier University)

 

Consortium Blockchain-Based Anti-Plagiarism Scheme for Multi-NFT Marketplaces

Gao, Jie (Zhejiang University of Technology); Liu, Gang (Shenzhen Institute for Advanced Study, University of Electronic Science and Technology of China); Zhou, Kun (Zhejiang University of Technology); Cheng, HongBing (Zhejiang University of Technology)

 

Flow Dissector: A Flow Slicing Representation with a Pre-trained Model for Varied Malicious Traffic Classification 

Jiang, Jun (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China); Dong, Fangming (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China); Guo, Lingjia (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China); Jiang, Zhengwei (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China); Liu, Baoxu (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China); Zhang, Kai (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China)

 

OptiGame: Game-Theoretic Enhancements for Optimistic Rollups through Bayesian Strategies

Khalil, Alvi Ataur (Florida International University); Hasan, Md Golam Moula Mehedi (Iona University); Rahman, Mohammad Ashiqur (Florida International University)

 

A_Double_Layer_Blockchain_Assisted_Anonymous_Cross_Domain_Authentication_and_Transaction_Scheme_for_Metaverse 

Chen, Yubo (Changsha University of Science and Technology); Xu, Zisang (Changsha University of Science and Technology); Meng, Xiangwei (Hunan University of Science and Technology); Huan, Zhenhao (Changsha University of Science and Technology)

 

PIRchain: Blockchain-Enhanced Privacy-Preserving Inter-domain Routing

Lei, Xiaohan (Beijing University of Posts and Telecommunications); Tian, Ye (Beijing University of Posts and Telecommunications); Yang, Yuan (Tsinghua University); Zhang, Runhao (Beijing University of Posts and Telecommunications); Que, Xirong (Beijing University of Posts and Telecommunications); Gong, Xiangyang (Beijing University of Posts and Telecommunications)

 

LLM-Augmented Fuzzing for Unveiling PLC Web Application Vulnerabilities Impacting Physical Control

Cheng, Jiaxing (Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS); Fang, Dongliang (Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS); Gu, Zhongwei (Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS); Lv, Shichao (Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS); Si, Shuaizong (Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS); Sun, Limin (Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS)

 

Decentralized Role Rotation Privacy Protection in Federated Learning 

wan, changxu (Hunan University of Science and Technology); Shi, Min (Hunan Univeristy); Wang, Ying (Hunan University of Science and Technology); Gong, Bo (Hunan University of Science and Technology); Xu, Jianbo (Hunan University of Science and Technology)

 

XRwatcher: A Detection Scheme for XR Privacy Speculation Attacks Base on Traffic Analysis 

Zhang, Hao (Xidian University); Li, Guohao (Xidian University); Yang, Li (Xidian University); Wang, Jiangyu (Xidian University); Yang, Ruiyuan (Xidian University); Yang, Huipeng (Xidian University)

 

Fair Exchange of Trained Machine Learning Models Based on Permissioned Blockchain and Zero-Knowledge Contingent Payment

Xu, Shiwei (Huazhong Agricultural University); Wu, Hang (Huazhong Agricultural University); Yin, Jiangjin (Huazhong Agricultural University); Peng, Zhe (Hong Kong Polytechnic University); Tong, Yan (Huazhong Agricultural University); Ren, Zhengwei (Wuhan University of Science and Technology); Du, Le (Wuhan East Lake Big Data Technology Co. Ltd)

Scroll to Top