Accepted Papers
Cycle 1
Revocable Issuer-Hiding Anonymous Credential
Authors:
Feifei Liu (Beihang University); Yangguang Tian (University of Surrey); Long Meng (University of Surrey); Liqun Chen (University of Surrey); Yanlan Wang (University of Surrey); Jianwei Liu (Beihang University)
Strengthening Practical Non-Profiling Side-Channel Attacks via Kalman Filter-Based Power--EM Fusion on AES-128 Devices
Authors:
Xiaoyong Kou (Nanjing University of Science and Technology); Wei Yang (Nanjing University of Science and Technology); Gongxuan Zhang (Nanjing University of Science and Technology)
ConfigWiz: Automating Privilege Configuration for Containerized Applications
Authors:
Mohammad Kavousi (Northwestern University); Hui Xue (Zhejiang Lab); Yan Chen (Northwestern University); Xin Chen (Zhejiang Lab); Yunlong Xing (George Mason University); Kun Sun (George Mason University); Therese Schachner (Northwestern University); Zhiheng Tao (Northwestern University)
Adaptive Image Steganography Based on CNN and GAN Architecture and Lightweight Frequency-Domain Encryption
Authors:
Mimoun Hamdi (Military Academy)
BinGraph: Deep Structural-Semantic Learning for Vulnerability Detection in Cross-Architecture Obfuscated Binaries and IoT Firmware
Authors:
Amir Naderi (University of Ottawa); Paria Shirani (University of Ottawa)
Fingerprinting and Biasing Bandwidth Measurements
Authors:
Vahab Pournaghshband
Near-Ultrasonic Environmental Presence as a Third Factor for Usable Authentication
Authors:
Hasan Al-Qudah (Texas Tech University); Abdul Serwadda (Texas Tech University)
Ontology-Driven Authorization Semantics for Cross-Chain Bridges
Authors:
Ylvie Khoo (University of Southampton); Leonardo Aniello (University of Southampton); Vladimiro Sassone (University of Southampton)
SAFE: Secret Algebraic Fusion of Embeddings for Private Multi-Modal Biometric Authentication
Authors:
Yatish Dubasi (University of Arkansas); Qinghua Li (University of Arkansas)
Full-Stack Model Extraction: Evaluating System-Wide Stealing Attacks
Authors:
William Hackett (Lancaster University); Stefan Trawicki (Lancaster University); Zhengxin Yu (Lancaster University); Neeraj Suri (Lancaster University); Peter Garraghan (Lancaster University)
A Trustworthy Incentive Scheme Based on Goal Gradient Effect to Improve Data Accuracy and Coverage in Vehicular Crowdsensing
Authors:
Xiaoyu Zhu (Changsha University); Yang Xiao (Changsha University); Pan Wang (Changsha University); Kang Hui Chen (Changsha University); Qinglong Tian (Changsha University); Yueyi Luo (Central South University)
TEE-Aided Asynchronous Trust Verification for Federated Learning via Functional Encryption
Authors:
Nengjie Hua (Shanghai university); Yufeng Li (Shanghai university); Jiangtao Li (Shanghai university); Yongqiu Wang (Yutong Bus Co., Ltd); Dandan Xiao (Yutong Bus Co., Ltd)
Decompressing LWE: Unlocking Field-Like Operations via Polynomial Matrices
Authors:
Stefanos Vasileiadis (University of Trento, Italy); Dimitris Katsinis (QUBITECH, Athens, Greece); Nada El Kassem (University of Surrey); Liqun Chen (University of Surrey); Symeon Tsintzos (QUBITECH, Athens, Greece); Bruno Crispo (University of Trento, Italy); Thanassis Giannetsos (Ubitech Ltd, Digital Security & Trusted Computing Group, Athens)
On the Effectiveness of Insightful Mining against Stubborn Mining
Authors:
Yiyang Li (East China Normal University); Tian-Ming Bu (East China Normal University)
Matchmaking Inner Product Functional Encryption
Authors:
Zongfeng Peng (Guizhou Minzu University); Changgen Peng (Guizhou University); Hongfa Ding (Guizhou University of Finance and Economics); Qihong Chen (Guizhou University)
Beyond Local Views: Static-Guided Exploration for Deep-State Android Security Auditing
Authors:
Jinghang Wen (City University of Hong Kong); Yuliang Zhang (City University of Hong Kong); Yongliang Chen (City University of Hong Kong); Ruoqin Tang (City University of Hong Kong); Xichen Yu (Shandong University); Guowen Xu (University of Electronic Science and Technology of China); Qingchuan Zhao (City University of Hong Kong)
ParaShard: A Fast Path Parallel Execution Approach for Accelerating Cross-Shard Transactions
Authors:
Zihan Zhang (Tianjin University); Sheng Chen (Tianjin University); Xiulong Liu (Tianjin University); Keqiu Li (Tianjin University)
SatRFID-Net: A Robust RF Fingerprinting Framework for Anomaly Detection in Satellite Communications
Authors:
Yubo Wang (Xidian University); Qiao Liu (Xidian University); Ziyi Gao (Xidian University); Jin Cao (Xidian University); Hui Li (Xidian University); Yong Wang (Xidian University); Huanhuan Wu (Tarim University); Zehua Fan (Tarim University)
DiVeR: Differential and Verifiable Data Dissemination for Multi-path Payment Routing
Authors:
Huan Wang (Tianjin University); Gaowei Shi (Tianjin University); Sheng Chen (Tianjin University); Xiulong Liu (Tianjin University); Wenyu Qu (Tianjin University)
GPU Accelerated Fully Homomorphic Encryption Framework for End-to-End Logistic Regression
Authors:
Dillon Davidson (University of Nevada Las Vegas); Minjae Kang (Hanyang University); Yeonjoon Lee (Hanyang University); Zuobin Xiong (University of Nevada, Las Vegas); Junggab Son (University of Nevada, Las Vegas)
Hide Your Malicious Goal Into Benign Narratives: Jailbreak Large Language Models through Carrier Articles
Authors:
Zhilong Wang (The Pennsylvania State University); Haizhou Wang (The Pennsylvania State University); Nanqing Luo (The Pennsylvania State University); Lan Zhang (Northern Arizona University); Peng Liu (Pennsylvania State University); Yebo Cao (Independent Researcher); Xiaoyan Sun (Worcester Polytechnic Institute)
Hostmon: MoE-Orchestrated Multi-Agent Reinforcement Learning for DDoS Defense
Authors:
Yu Mi (Case Western Reserve University); An Wang (Case Western Reserve University); Yang Guo (NIST)
Vulnerability Analysis of Mersenne Number-Based Post-Quantum Cryptosystems in Secure Communication Networks
Authors:
Mengce Zheng (Zhejiang Wanli University); Abderrahmane Nitaj (Normandie Univ, UNICAEN, CNRS, LMNO)
Delegate: Coalition, Sybil, and Copy Proof Incentivized Outsourced Computation with Smart Contracts
Authors:
Osman Biçer (University of Basel); Alptekin Küpçü (Koç University)
SF-EET: Online BGP Anomaly Detection via Structural Frequency Tracking and Emerging Edge Identification
Authors:
Zekun Tao (Information Engineering University); Di Chen (Key Laboratory of Cyberspace Security, Ministry of Education, China); Yi Xia (Information Engineering University); Kaijie Zhu (Zhongguancun Laboratory); Yichen Zhang (Key Laboratory of Cyberspace Security, Ministry of Education, China); Zishuo Jia (Information Engineering University)
Imperceptible Key Generation with Delay Side-Channel and Multi-Path Routing over Wide-Area Networks
Authors:
Yao Hui (Southeast University); Aiqun Hu (Southeast University); Dongbin He (Southeast University); Jiangtao Wang (Southeast University); Wenjie Ma (Southeast University)
C2Detect: A Deep Learning based Real-Time Detection of Stealthy Command and Control (C2) Activities from HTTPS Traffic
Authors:
Ramanuja Phani Vishnu Teja (George Mason University); Xinyuan Wang (George Mason University)
DOOR: Dynamic Orthogonal Obfuscation for Secure and Collusion-Resistant Federated Learning Aggregation
Authors:
Cangming Liang (Hunan University of Science and Technology); Yuxiang Chen (Hunan University of Science and Technology); Sisi Zhaou (Hunan University of Science and Technology); Tiangxiong Liu (The Affiliated Aerospace Hospital of Hunan Normal University); Zulong Diao (Hunan University of Science and Technology); Wei Liang (Hunan University of Science and Technology); Kuanching Li (Hunan University of Science and Technology); Francesco Palmieri (Universita’ degli Studi di Salerno)
GroHFL: A Group Aggregation Method for Hierarchical Federated Learning Based on Data Distribution and Training Efficiency
Authors:
Sisi Zhou (Hunan University of Science and Technology); Yuxiang Chen (Hunan University of Science and Technology); Ciangming Liang (Hunan University of Science and Technology); Tianxiong Liu (Hunan Aerospace Hospital Fenglin road); Sheng Huo (Zhuzhou CRRC Times Electric Co., Ltd.); Wei Liang (Hunan University of Science and Technology); Kuanching Li (Hunan University of Science and Technology); Joanna Kolodziej (NASK Warsaw and Cracow University of Technology)
Registration-Optimized Dynamic Group Time-based One-time Passwords for Mobile Access
Authors:
Jiaqing Guo (Southwest University); Xuelian Cao (Tsinghua University); Zengpeng Li (Shandong University); Yong Zhou (Southwest University); Zheng Yang (Southwest University); Jianying Zhou (Singapore University of Technology and Design)
Cycle 2
Empirical Evaluation and Benchmarking of Hybrid ML/XAI Models for HTTP-layer DDoS Detection
Authors:
Giwa, Tawakalitu (UTSA); korkmaz, Turgay (University of Texas at San Antonio); Zhang, Zijie (University of Texas at San Antonio)Â
LADE: LLM-Assisted Advanced Persistent Threat Detection and Explanation
Authors:
Gwak, Joon-Young (State University of New York at Binghamton); Strier, Aubrey (State University of New York at Binghamton); Xi, Zhaohan (State University of New York at Binghamton); Yan, Guanhua (State University of New York at Binghamton); Shu, Xiaokui (IBM Research); Stoller, Scott D. (Stony Brook University); Yang, Ping (State University of New York at Binghamton)
How Enforcement Shapes 2FA Usability and Perceived Workload: A Comparative Study Across Populations
Authors:
He, Zhiyu (University of Nottingham Ningbo China); Vega, Francisco (River Islands High School); Cheng, Yuan (University of Nottingham Ningbo China)
Fine-Grained Residual Interval Screening Enhanced Least Square for the Secret Key Recovery of Dilithium
Authors:
zhang, hailong (North China Electric Power University); Shi, Kailong (Institute of Information Engineering, CAS); Lin, Dongdai (Institute of Information Engineering, CAS); Wang, Zichen (George Washington University)
Janus: Coordinating Vulnerability Prevention and Exploit-Chain Mitigation for Containerized CI/CD Pipelines
Authors:
Majumder, Shafayat Hossain (Concordia University); Majumdar, Suryadipta (Concordia University); Jajodia, Sourov (Concordia University); Jean-Baptiste, Patrick (Sunphinx)
Adaptive and Uncertainty-Aware Intrusion Detection with Hybrid Meta-Learning under Proxy-Adversarial Exposure
Authors:
Gnanaratna, Kulanika (Kingston University); Nebel, Jean-Christophe (Kingston University); Rahman, Farzana (Kingston University); Omego, Obinna (Kingston University)
The Bridge to the Quantum Fortress: How Do Hybrid Cloud Attacks Exploit the Quantum Core?
Authors:
Lamichhane, Prabin (University of Georgia); Lee, Kyu Hyung (University of Georgia)
Z-RegStore: A Physical-Constraint-Aware and Regulatory-Compliant Privacy-Preserving Energy Settlement Scheme for Microgrids
Authors:
Tianyi, Li (China University of Mining and Technology); Haotian, Chi (School of Automation and Software Engineering, Shanxi University); Fei, Zuo (Department of Computer Science, University of Central Oklahoma); Zhihui, Liu (China University of Mining and Technology); Jinpeng, Li (China University of Mining and Technology); Shunrong, Jiang (China University of Mining and Technology)
Federated Graph Analytics with Privacy: The Case of Parallel Chain Detection
Authors:
Liu, Yazhou (Harbin Institute of Technology, Shenzhen); Wang, Songlei (Shenzhen University); Zheng, Yifeng (The Hong Kong Polytechnic University); Xu, Lei (Nanjing University of Science and Technology); Hua, Zhongyun (Harbin Institute of Technology, Shenzhen)
Sinba: Low-Latency Vectorized Batch PIR via 2D Baby-Step/Giant-Step
Authors:
Ma, Zijun (State Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, Chinese Academy of Sciences); Song, Peizhe (State Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, Chinese Academy of Sciences); Wang, Mingsheng (Institute of Information Engineering, Chinese Academy of Sciences)
Understanding Phishing Scams in the Steam Ecosystem
Authors:
Kimber, Jadyn (University of Saskatchewan); Branca, Enrico (Department of Computer Science, University of Saskatchewan); Stakhanova, Natalia (University of Saskatchewan); Gutwin, Carl (University of Saskatchewan)
P$^2$NC-DET: A Privacy-Preserving and Network-Constrained Decentralized Energy Trading Scheme based on Blockchain
Authors:
Jinpeng, Li (China University of Mining and Technology); Bingyu, Li (China University of Mining and Technology); Haotian, Chi (School of Automation and Software Engineering); Fei, Zuo (Department of Computer Science, University of Central Oklahoma); Tianyi, Li (China University of Mining and Technology); Shunrong, Jiang (China University of Mining and Technology)
SNIFFER: Early Threat Detection via Chain-of-Thought of Sequence Generation and Context Alignment
Authors:
Ye, Meng (Institute of Information Engineering, Chinese Academy of Sciences, China); Xu, Zhiqiang (Jiangxi University of Science and Technology, Ganzhou, Jiangxi, China); Zheng, Yang (Institute of Information Engineering, Chinese Academy of Sciences, China); Wen, Yu (Institute of Information Engineering, Chinese Academy of Sciences, China)
Lightweight Privacy-First Federated Learning for Medical AI
Authors:
AMIN, AL (Huston-Tillotson University); Hasan, Kamrul (Tennessee State University); Hong, Liang (Tennessee State University); Chuprov, Sergei (The University of Texas Rio Grande Valley); Thompson, Rohan (Huston-Tillotson University); Okpalaeze, Azubike (Huston-Tillotson University); Abens, Primo (Huston-Tillotson University); Islam, Tariqul (Syracuse University); Ahmed, Imtiaz (Howard University)Â
Conditionally accepted
6ixmap: A Study on Active-Passive Measurement and Asset Exposure in the IPv6 Address Space
Authors:
Huang, Youjun (Tsinghua University); sun, lu (Nankai University); Li, Xiang (Nankai University); Zhang, Jia (Tsinghua University); Duan, Haixin (Tsinghua University)Â
Deep-kNN Fusion: A High-Fidelity Resilient Ensemble Framework for Heterogeneous IoT Anomaly Detection
Authors:
Ahmad, Hafiz Bilal (School of Computer Science and Technology, Xidian University, Xi’an, China); Gao, HaiChang (School of Computer Science and Technology, Xidian University, Xi’an, China); Latif, Naila (School of Telecommunications, Xidian University, Xi’an, China)
Posters & Demos
Towards a Trustworthy AI Framework for Next-Generation SOCs
Authors:
EL GHAZI, Loubna (Faculty of Sciences and Technologies, Abdelmalek Essaadi University, Tangier, Morocco); BOUHORMA, Mohammed (Faculty of Sciences and Technologies, Abdelmalek Essaadi University, Tangier, Morocco)
SHAP-RM : An XAI Framework for Evaluating Machine Learning Reliability
Authors:
Wang, Xueyi (Cardiff University); Li, Shancang (Cardiff University); Liu, Yifan (Cardiff University)
