Accepted Papers
Cycle 1
Revocable Issuer-Hiding Anonymous Credential
Authors:
Feifei Liu (Beihang University); Yangguang Tian (University of Surrey); Long Meng (University of Surrey); Liqun Chen (University of Surrey); Yanlan Wang (University of Surrey); Jianwei Liu (Beihang University)
Strengthening Practical Non-Profiling Side-Channel Attacks via Kalman Filter-Based Power--EM Fusion on AES-128 Devices
Authors:
Xiaoyong Kou (Nanjing University of Science and Technology); Wei Yang (Nanjing University of Science and Technology); Gongxuan Zhang (Nanjing University of Science and Technology)
ConfigWiz: Automating Privilege Configuration for Containerized Applications
Authors:
Mohammad Kavousi (Northwestern University); Hui Xue (Zhejiang Lab); Yan Chen (Northwestern University); Xin Chen (Zhejiang Lab); Yunlong Xing (George Mason University); Kun Sun (George Mason University); Therese Schachner (Northwestern University); Zhiheng Tao (Northwestern University)
Adaptive Image Steganography Based on CNN and GAN Architecture and Lightweight Frequency-Domain Encryption
Authors:
Mimoun Hamdi (Military Academy)
BinGraph: Deep Structural-Semantic Learning for Vulnerability Detection in Cross-Architecture Obfuscated Binaries and IoT Firmware
Authors:
Amir Naderi (University of Ottawa); Paria Shirani (University of Ottawa)
Fingerprinting and Biasing Bandwidth Measurements
Authors:
Vahab Pournaghshband
Near-Ultrasonic Environmental Presence as a Third Factor for Usable Authentication
Authors:
Hasan Al-Qudah (Texas Tech University); Abdul Serwadda (Texas Tech University)
Ontology-Driven Authorization Semantics for Cross-Chain Bridges
Authors:
Ylvie Khoo (University of Southampton); Leonardo Aniello (University of Southampton); Vladimiro Sassone (University of Southampton)
SAFE: Secret Algebraic Fusion of Embeddings for Private Multi-Modal Biometric Authentication
Authors:
Yatish Dubasi (University of Arkansas); Qinghua Li (University of Arkansas)
Full-Stack Model Extraction: Evaluating System-Wide Stealing Attacks
Authors:
William Hackett (Lancaster University); Stefan Trawicki (Lancaster University); Zhengxin Yu (Lancaster University); Neeraj Suri (Lancaster University); Peter Garraghan (Lancaster University)
A Trustworthy Incentive Scheme Based on Goal Gradient Effect to Improve Data Accuracy and Coverage in Vehicular Crowdsensing
Authors:
Xiaoyu Zhu (Changsha University); Yang Xiao (Changsha University); Pan Wang (Changsha University); Kang Hui Chen (Changsha University); Qinglong Tian (Changsha University); Yueyi Luo (Central South University)
TEE-Aided Asynchronous Trust Verification for Federated Learning via Functional Encryption
Authors:
Nengjie Hua (Shanghai university); Yufeng Li (Shanghai university); Jiangtao Li (Shanghai university); Yongqiu Wang (Yutong Bus Co., Ltd); Dandan Xiao (Yutong Bus Co., Ltd)
Decompressing LWE: Unlocking Field-Like Operations via Polynomial Matrices
Authors:
Stefanos Vasileiadis (University of Trento, Italy); Dimitris Katsinis (QUBITECH, Athens, Greece); Nada El Kassem (University of Surrey); Liqun Chen (University of Surrey); Symeon Tsintzos (QUBITECH, Athens, Greece); Bruno Crispo (University of Trento, Italy); Thanassis Giannetsos (Ubitech Ltd, Digital Security & Trusted Computing Group, Athens)
On the Effectiveness of Insightful Mining against Stubborn Mining
Authors:
Yiyang Li (East China Normal University); Tian-Ming Bu (East China Normal University)
Matchmaking Inner Product Functional Encryption
Authors:
Zongfeng Peng (Guizhou Minzu University); Changgen Peng (Guizhou University); Hongfa Ding (Guizhou University of Finance and Economics); Qihong Chen (Guizhou University)
Beyond Local Views: Static-Guided Exploration for Deep-State Android Security Auditing
Authors:
Jinghang Wen (City University of Hong Kong); Yuliang Zhang (City University of Hong Kong); Yongliang Chen (City University of Hong Kong); Ruoqin Tang (City University of Hong Kong); Xichen Yu (Shandong University); Guowen Xu (University of Electronic Science and Technology of China); Qingchuan Zhao (City University of Hong Kong)
ParaShard: A Fast Path Parallel Execution Approach for Accelerating Cross-Shard Transactions
Authors:
Zihan Zhang (Tianjin University); Sheng Chen (Tianjin University); Xiulong Liu (Tianjin University); Keqiu Li (Tianjin University)
SatRFID-Net: A Robust RF Fingerprinting Framework for Anomaly Detection in Satellite Communications
Authors:
Yubo Wang (Xidian University); Qiao Liu (Xidian University); Ziyi Gao (Xidian University); Jin Cao (Xidian University); Hui Li (Xidian University); Yong Wang (Xidian University); Huanhuan Wu (Tarim University); Zehua Fan (Tarim University)
DiVeR: Differential and Verifiable Data Dissemination for Multi-path Payment Routing
Authors:
Huan Wang (Tianjin University); Gaowei Shi (Tianjin University); Sheng Chen (Tianjin University); Xiulong Liu (Tianjin University); Wenyu Qu (Tianjin University)
GPU Accelerated Fully Homomorphic Encryption Framework for End-to-End Logistic Regression
Authors:
Dillon Davidson (University of Nevada Las Vegas); Minjae Kang (Hanyang University); Yeonjoon Lee (Hanyang University); Zuobin Xiong (University of Nevada, Las Vegas); Junggab Son (University of Nevada, Las Vegas)
Hide Your Malicious Goal Into Benign Narratives: Jailbreak Large Language Models through Carrier Articles
Authors:
Zhilong Wang (The Pennsylvania State University); Haizhou Wang (The Pennsylvania State University); Nanqing Luo (The Pennsylvania State University); Lan Zhang (Northern Arizona University); Peng Liu (Pennsylvania State University); Yebo Cao (Independent Researcher); Xiaoyan Sun (Worcester Polytechnic Institute)
Hostmon: MoE-Orchestrated Multi-Agent Reinforcement Learning for DDoS Defense
Authors:
Yu Mi (Case Western Reserve University); An Wang (Case Western Reserve University); Yang Guo (NIST)
Vulnerability Analysis of Mersenne Number-Based Post-Quantum Cryptosystems in Secure Communication Networks
Authors:
Mengce Zheng (Zhejiang Wanli University); Abderrahmane Nitaj (Normandie Univ, UNICAEN, CNRS, LMNO)
Delegate: Coalition, Sybil, and Copy Proof Incentivized Outsourced Computation with Smart Contracts
Authors:
Osman Biçer (University of Basel); Alptekin Küpçü (Koç University)
SF-EET: Online BGP Anomaly Detection via Structural Frequency Tracking and Emerging Edge Identification
Authors:
Zekun Tao (Information Engineering University); Di Chen (Key Laboratory of Cyberspace Security, Ministry of Education, China); Yi Xia (Information Engineering University); Kaijie Zhu (Zhongguancun Laboratory); Yichen Zhang (Key Laboratory of Cyberspace Security, Ministry of Education, China); Zishuo Jia (Information Engineering University)
Imperceptible Key Generation with Delay Side-Channel and Multi-Path Routing over Wide-Area Networks
Authors:
Yao Hui (Southeast University); Aiqun Hu (Southeast University); Dongbin He (Southeast University); Jiangtao Wang (Southeast University); Wenjie Ma (Southeast University)
C2Detect: A Deep Learning based Real-Time Detection of Stealthy Command and Control (C2) Activities from HTTPS Traffic
Authors:
Ramanuja Phani Vishnu Teja (George Mason University); Xinyuan Wang (George Mason University)
DOOR: Dynamic Orthogonal Obfuscation for Secure and Collusion-Resistant Federated Learning Aggregation
Authors:
Cangming Liang (Hunan University of Science and Technology); Yuxiang Chen (Hunan University of Science and Technology); Sisi Zhaou (Hunan University of Science and Technology); Tiangxiong Liu (The Affiliated Aerospace Hospital of Hunan Normal University); Zulong Diao (Hunan University of Science and Technology); Wei Liang (Hunan University of Science and Technology); Kuanching Li (Hunan University of Science and Technology); Francesco Palmieri (Universita’ degli Studi di Salerno)
GroHFL: A Group Aggregation Method for Hierarchical Federated Learning Based on Data Distribution and Training Efficiency
Authors:
Sisi Zhou (Hunan University of Science and Technology); Yuxiang Chen (Hunan University of Science and Technology); Ciangming Liang (Hunan University of Science and Technology); Tianxiong Liu (Hunan Aerospace Hospital Fenglin road); Sheng Huo (Zhuzhou CRRC Times Electric Co., Ltd.); Wei Liang (Hunan University of Science and Technology); Kuanching Li (Hunan University of Science and Technology); Joanna Kolodziej (NASK Warsaw and Cracow University of Technology)
Registration-Optimized Dynamic Group Time-based One-time Passwords for Mobile Access
Authors:
Jiaqing Guo (Southwest University); Xuelian Cao (Tsinghua University); Zengpeng Li (Shandong University); Yong Zhou (Shandong University); Zheng Yang (Shandong University); Jianying Zhou (Singapore University of Technology and Design)
