Paper ID | Title | Authors | Type | Final | Registration | Payment |
1571058748 | Enhancing Adversarial Robustness through Self-Supervised Confidence-Based Denoising | Yongkang Chen; Tong Wang; Wei Kong; Taotao Gu; Guiling Cao; Xiaohui Kuang | Research Full paper | |||
1571060420 | CTWF: Website Fingerprinting attack based on Compact Convolutional Transformer | Guangfa Lyu; Jian Kong; Yinglong Chen; Fengyu Wang | Research Full paper | |||
1571064073 | TransFront: Bi-path Feature Fusion for Detecting Front-running Attack in Decentralized Finance | Yuheng Zhang; Guojun Wang; Peiqiang Li; Xubin Li; Wanyi Gu; Mingfei Chen; Houji Chen | Research Full paper | |||
1571065620 | LSTM-Diff: A Data Generation Method for Imbalanced Insider Threat Detection | Tian Tian; Yan Zhu; Ning An; Bo Jiang; Huamin Feng; Zhigang Lu | Research Full paper | |||
1571065721 | Controllable Quantum Computing Privacy via Inherent Noises and Quantum Error Mitigation | Keyi Ju; Hui Zhong; Xinyue Zhang; Xiaoqi Qin; Miao Pan | Research Full paper | |||
1571065796 | A Knowledge Graph Completion Method Based on Gated Adaptive Fusion and Conditional Generative Adversarial Networks | Zhixuan Zhang; Yanhui Zhu; Yuezhong Wu; Fangteng Man; Hao Chen; Xujian Ying | Research Full paper | |||
1571066422 | Blind Signature Based Anonymous Authentication on Trust for Decentralized Mobile Crowdsourcing | Wei Feng; Dongyuan Wei; Qianqian Wang | Research Full paper | |||
1571066489 | MARS: Robustness Certification for Deep Network Intrusion Detectors via Multi-Order Adaptive Randomized Smoothing | Mengdie Huang; Yingjun Lin; Xiaofeng Chen; Elisa Bertino | Research Full paper | |||
1571066698 | Analyzing Relationship Consistency in Digital Forensic Knowledge Graphs with Graph Learning | Ruoyao Xiao; Yu Luo; Frank Xu; Harshmeet Lamba; Dianxiang Xu | Research Full paper | |||
1571066740 | SeChannel: A Secure and Lightweight Channel Protection Approach for TEE Systems | Nan Jiang; Yuanbo Zhao; Qihang Zhou; Xiaoqi Jia; Jing Tang | Research Full paper | |||
1571066757 | Scalable Client-side Encrypted Deduplication beyond Secret Sharing of the Master Key | Yuchen Chen; Guanxiong Ha; Xuan Shan; Chunfu Jia | Research Full paper | |||
1571066883 | Hardware assisted security gateway system: combined with FPGA shielding protection | JiHong Liu; Chenyang Tu; Yifei Zhang | Research Full paper | |||
1571066912 | GTree: GPU-Friendly Privacy-preserving Decision Tree Training and Inference | Qifan Wang; Shujie Cui; Lei Zhou; Ye Dong; Jianli Bai; Yun Sing Koh; Giovanni Russello | Research Full paper | |||
1571067096 | xIDS-EnsembleGuard: An Explainable Ensemble Learning-based Intrusion Detection System | Muhammad Adil; Mian Ahmad Jan; Safayat Bin Hakim; Houbing H Song; Zhanpeng Jin | Research Full paper | |||
1571067278 | DMA: A persistent threat to embedded systems isolation | Jean de Bonfils Lavernelle; Pierre-Francois Bonnefoi; Benoît Gonzalvo; Damien Sauveron | Research Full paper | |||
1571067348 | StegaFDS: Generative Steganography Based on First-Order DPM-Solver | Chengyu Li; Weihai Li; Zikai Xu; Nenghai Yu | Research Full paper | |||
1571067575 | RTS: A Training-time Backdoor Defense Strategy Based on Weight Residual Tendency | Fan Xiang; Xueyang Li; Guozhu Meng | Research Full paper | |||
1571067679 | Red Team Redemption: A Structured Comparison of Open-Source Tools for Adversary Emulation | Max Landauer; Klaus Mayer; Florian Skopik; Markus Wurzenberger; Manuel Kern | Research Full paper | |||
1571067780 | MAXPoWR: Memory Attestation and Export in Process-based Trusted Execution Environments | Hendrik Meyer zum Felde; Andrei Cosmin Aprodu | Research Full paper | |||
1571068008 | Machine Learning-based Optimal Data Trading Mechanism with Randomized Privacy Protection Scheme | Xiaohong Wu; Yujun Lin; Jie Tao; Yonggen Gu | Research Full paper | |||
1571068085 | Trustworthiness and path regularity based contrastive learning for noisy knowledge graph error assertion detection | Zhuohan Ao; Yi Wang; Ying Wang; Yu Zhan | Research Full paper | |||
1571068127 | You Are as You Type: Investigating the Influence of Timestamp Accuracy on the Robustness of Keystroke Biometrics | Florian Dehling; Luigi Lo Iacono; Sebastian Koch; Hannes Federrath | Research Full paper | |||
1571068301 | VisualAuth: Secure Transaction Authentication and Trusted UI on COTS Android Devices | Mykolai Protsenko; Albert Stark; Andreas Papon; Sandra Kostic | Research Full paper | |||
1571068369 | RAG-based Cyber Threat Tracing Graph Modeling Method | JongHee Jeon; Jahoon Koo; Young-Gab Kim | Research Full paper | |||
1571068515 | Enhanced Privacy Policy Comprehension via Pre-trained and Retrieval-Augmented Models | Xin Zhang; Bingbing Zhang; Chi Zhang; Lingbo Wei | Research Full paper | |||
1571068524 | Face anti-spoofing based on multi-modal dual-stream anomaly detection | Jiuyao Jing; Yu Zheng; Qi He; Chunlei Peng | Research Full paper | |||
1571068538 | From Data to Action: CTI Analysis and ATT&CK Technique Correlation | Duy Khanh Nguyen; HsiChing Chu; Viet Quoc Nguyen; Min-Te Sun; Kazuya Sakai; Wei-Shinn Ku | Research Full paper | |||
1571068577 | Towards Privacy-aware IoT Communications: Delegable, Revocable, and Efficient | Pengfei Wu; Jianfei Sun; Guoming Yang; Robert Deng | Research Full paper | |||
1571068598 | RPG-Diff: Precise Adversarial Defense Based on Regional Positioning Guidance | Haotian Wang; Jing Liu | Research Full paper | |||
1571068641 | TrustNotify: A Lightweight Framework for Complete and Trustworthy Data Deletion Notification Distribution | Qipeng Song; Ruiyun Wang; Yue Li; Yiheng Yan; Xingyue Zhu; Hui Li | Research Full paper | |||
1571068642 | A Revocable Pairing-Free Certificateless Signature Scheme Based on RSA Accumulator | Zhuowei Shen; Xiao Kou; Taiyao Yang; Haoqin Xu; Dongbin Wang; Shaobo Niu | Research Full paper | |||
1571068655 | AdaptFL: Adaptive Client Task Allocation-Based Synchronous Federated Learning | Xiaoshuang Li; Mingjun Wang; Yilong Guo; Wenxiu Ding | Research Full paper | |||
1571068661 | SP2-RD2D: Secure and Privacy-Preserving Authentication and Key Agreement Protocol for D2D Relay Communication | Mingjun Wang; Yixuan Liu; Wenxiu Ding | Research Full paper | |||
1571068861 | Behavior Speaks Louder: Rethinking Malware Analysis Beyond Family Classification | Zhang Fei; Xiaohong Li; Sen Chen; Ruitao Feng | Research Full paper | |||
1571068925 | Toward Privacy-Preserving and Verifiable XGBoost Training for Horizontal Federated Learning | Wei Xu; Hui Zhu; Chang Xiao; Fengwei Wang; Dengguo Feng; Hui Li | Research Full paper | |||
1571068975 | Budget-Feasible Double Auction Mechanisms for Model Training Services in Federated Learning Market | Ting Zhou; Hongtao Lv; Ning Liu; Lei Liu | Research Full paper | |||
1571068977 | SBOM Generation Tools in the Python Ecosystem: an In-Detail Analysis | Serena Cofano; Giacomo Benedetti; Matteo Dell'Amico | Research Full paper | |||
1571069013 | Local Drift Correction and Attention Aggregation for Self-Organized Federated Learning | Haiying Liu; Ruichun Gu; Jingyu Wang; Xiaolin Zhang; Bolin Zhang; Xuebao Li | Research Full paper | |||
1571069190 | Boosting Transferability of Adversarial Examples by Joint Training and Dual Feature Mixup | Mengmeng Tang; Shuhong Chen; Guojun Wang; Hanjun Li; Zhuyi Yao; Sheng Wen | Research Full paper | |||
1571069215 | Vulnerabilities are collaborating to compromise your system: A network risk assessment method based on cooperative game and attack graph | Xin Deng; Rui Wang; Weihong Han; Zhihong Tian | Research Full paper | |||
1571069237 | Federated Unlearning for Samples Based on Adaptive Gradient Ascent of Angles | Ying Hua; Hui Xia; Shuo Xu | Research Full paper | |||
1571069246 | TierFlow: A Pipelined Layered BFT Consensus Protocol for Large-Scale Blockchain | Yongkang Yu; Jinchun He; Xinwei Xu; Qinnan Zhang; Wangjie Qiu; Hongwei Zheng; Binghui Guo; Jin Dong | Research Full paper | |||
1571069349 | Membership Inference Attacks via Dynamic Adversarial Perturbations Reduction | Zehua Ding; Youliang Tian; Guorong Wang; Jinbo Xiong; Jianfeng Ma | Research Full paper | |||
1571069399 | StegoFL: Using Steganography and Federated Learning to Transmit Malware | Rong Wang; Liang Junchuan; Haiting Jiang; Feng Chaosheng; Chin-Chen Chang | Research Full paper | |||
1571069549 | Correcting the Bound Estimation of Mohawk | Mingjie Yu; Wei Jin; Fenghua Li; Yunchuan Guo; Zheng Yan; Xiao Wang; Nenghai Yu | Research Full paper | |||
1571069578 | ClusterX: Adaptive Collaborative Scheduling of Layered User-Proxy Mapping to Enhance DDoS Defense in Distributed Clusters | Jianbo Lin; Lin Yan; Zhi Lin; Zan Zhou; Shujie Yang | Research Full paper | |||
1571069599 | OFLGI: An Optimization-based Feature-Level Gradient Inversion Attack | Yongwei Lu; Xiaoyan Liang; Ruizhong Du; Junfeng Tian | Research Full paper | |||
1571069614 | Front-running Attacks in Hash-Based Transaction Sharding Blockchains | Yusen Wang; Jiong Lou; Zihan Wang; Jie Li | Research Full paper | |||
1571069664 | VCaDID: Verifiable Credentials with Anonymous Decentralized Identities | Yalan Wang; Liqun Chen; Long Meng; Christopher J.P. Newton | Research Full paper | |||
1571069672 | Defending Against Backdoor Attacks through Causality-Augmented Diffusion Models for Dataset Purification | Yuefeng Lai; Lizhao Wu; Lin Hui | Research Full paper | |||
1571069681 | LLM4MDG: Leveraging Large Language Model to Construct Microservices Dependency Graph | Jiekang Hu; Yakai Li; Zhaoxi Xiang; Luping Ma; Xiaoqi Jia; Qingjia Huang | Research Full paper | |||
1571069699 | Paa-Tee: A Practical Adversarial Attack on Thermal Infrared Detectors with Temperature and Pose Adaptability | Zhangchi Zhao; Jianyi Zhang; Liqun Shan; Ziyin Zhou; Kaiying Han; Xiali Hei | Research Full paper | |||
1571069890 | Shapley-value-based Explanations for Cryptocurrency Blacklist Detection | Feixue Yan | Research Full paper | |||
1571069948 | Multi-Authority Ciphertext-Policy Attribute-based Encryption with Hidden Policy for Securing Internet-of-Vehicles | Jie Cui; Jing Zhang; Lu Wei; Minghui Zhu; Hong Zhong; Geyong Min | Research Full paper | |||
1571069950 | WASHADOW: Effectively Protecting WebAssembly Memory Through Virtual Machine-Aware Shadow Memory | Zhuochen Jiang; Baojian Hua | Research Full paper | |||
1571069954 | New Compact Construction of FHE from Cyclic Algebra LWE | Yuan Liu; Licheng Wang; Yongbin Zhou | Research Full paper | |||
1571069961 | Rethinking Mutation Strategies in Fuzzing Smart Contracts | Jingzhang Cao; Meng Wang; Shenao Lin | Research Full paper | |||
1571069969 | StrucTrans: Zero-Query Structural Adversarial Attack Transferred from Masked Autoencoders to Image Classifiers | Yi Ji; Isao Echizen | Research Full paper | |||
1571069976 | A Framework for Detecting Hidden Partners in App Collusion | Qinchen Guan; Shaoyong Du; Kerong Wang; Yang Chunfang; Xiangyang Luo | Research Full paper | |||
1571069990 | A GPU-Based Privacy-Preserving Machine Learning Acceleration Scheme | Jie Hou; Zengrui Huang; Zhiyong Zhang; Wei Zhang; Lei Ju | Research Full paper | |||
1571070009 | Trusted Networking for Drones: Reputation-Based Security Mechanisms for Node Access and Information Synchronization | Ruizhong Du; JiaJia Kang; Jin Tian | Research Full paper | |||
1571070083 | Quantifying Completeness of Reconstructed Scenarios: A Case Study on Echo Show | Sarfraz Shaikh; Frank Xu | Research Full paper | |||
1571070112 | Attacking High-Performance SBCs: A Generic Preprocessing Framework for EMA | Debao Wang; Yiwen Gao; Jingdian Ming; Yongbin Zhou; Xian Huang | Research Full paper | |||
1571070126 | A Low-cost Black-box Jailbreak Based on Custom Mapping Dictionary with Multi-round Induction | Feng Wu; Weiqi Wang; Youyang Qu; Shui Yu | Research Full paper | |||
1571070172 | Enhancing Consistency in Container Migration via TEE: A Secure Architecture | Qingyu Gao; Liantao Song; Yan Ding | Research Full paper | |||
1571070178 | CPCED: a container escape detection system based on CNI plugin | Yu Hao; Xu Zhang; Dongbin Wang | Research Full paper | |||
1571070215 | MIND: A Privacy-Preserving Model Inference Framework via End-Cloud Collaboration | Siyuan Guan; Ziheng Hu; Guotao Xu; Yao Zhu; Bowen Zhao | Research Full paper | |||
1571070222 | TTFL: Towards Trustworthy Federated Learning with Arm Confidential Computing | Lizhi Sun; Jingzhou Zhu; Boyu Chang; Yixin Xu; Bo Yang; Hao Wu; Fengyuan Xu; Sheng Zhong | Research Full paper | |||
1571070280 | Path Generation Method of Anti-Tracking Network based on Dynamic Asymmetric Hierarchical Architecture | Zhefeng Nan; Qi Wang; Changbo Tian; Wang Yijing; Zang Tianning; Dongwei Zhu | Research Full paper | |||
1571070336 | User Authentication Based on the Integration of Musical Signals and Ear Canal Acoustics | Tongxi Chen; Weizhi Meng; Wenjuan Li | Research Full paper | |||
1571070542 | TOScorr: Transformer-based Flow Correlation Attack on Tor Onion Service | Yilin Zhu; Guang Cheng; Shunyu Zheng; Hantao Mei | Research Full paper | |||
1571070565 | Enhancing Privacy-Preserving Multi-Authority Attribute-Based Encryption: Addressing Rogue-Key Attacks Under Adaptive Corruption of Authorities | Jingchi Zhang; Anwitaman Datta | Research Full paper | |||
1571076492 | VDPSRQ: Achieving Verifiable and Dynamic Private Spatial Range Queries over Outsourced Database | Haoyang Wang; Kai Fan; Yue Quan; Fenghua Li; Hui Li | Research Full paper | |||
1571077286 | CVchain: A Cross-Voting-based Low Latency Parallel Chain System | Jianrong Wang; Yacong Ren; Dengcheng Hu; Qi Li; Sen Li; Xuewei Li; Xiulong Liu | Research Full paper | |||
1571077514 | DPFCIL: Differentially Private Federated Class-Incremental Learning on non-IID Data | Fuyao Zhang; Dan Wang; Chuyang Liang | Research Full paper | |||
1571077683 | A Semi-Fragile Reversible Watermarking for 3D Models Based on IQIM with Dual-Strategy Partition Modulation | Fei Peng; Yousheng Liang; Min Long | Research Full paper | |||
1571077735 | A Novel Time Series Approach to Anomaly Detection and Correction for Complex Blockchain Transaction Networks | Qi Xia; Ansu Badjie; Jianbin Gao; Grace Mupoyi; Hu Xia; Isaac Obiri | Research Full paper | |||
1571077744 | M-ETC: Improving Multi-task Encrypted Traffic Classification by Reducing Inter-task Interference | Yuwei Xu; Xiaotian Fang; Zhengxin Xu; Kehui Song; Yali Yuan; Guang Cheng | Research Full paper | |||
1571077755 | Secure Federated Learning Schemes Based on Multi-Key Homomorphic Encryption | Wenxiu Ding; Hongjiang Guo; Zheng Yan; Mingjun Wang | Research Full paper | |||
1571078100 | MSMP: A Centralized Shared-memory Management for Building Efficient and Reliable File Systems on Microkernels | Feng He; Shijun Zhao; Dan Meng; Rui Hou | Research Full paper | |||
1571078158 | Lattice-based Multi-Stage Secret Sharing 3D Secure Encryption Scheme | Xu Li; Yinghao Wu; Yang Liu; Baosheng Wang; Bei Wang; Yijun Cui | Research Full paper | |||
1571078287 | Efficiently Detecting DDoS in Heterogeneous Networks: A Parameter-Compressed Vertical Federated Learning approach | Cao Chen; Fenghua Li; Yunchuan Guo; Zifu Li; Wenlong Kou | Research Full paper | |||
1571078296 | Attack-Defense Graph Generation: Instantiating Incident Response Actions on Attack Graphs | Kéren A Saint-Hilaire; Christopher Neal; Frédéric Cuppens; Nora Cuppens-Boulahia; Francesca Bassi | Research Full paper | |||
1571078454 | SCENE: Shape-based Clustering for Enhanced Noise-resilient Encrypted Traffic Classification | Meijie Du; Mingqi Hu; Shu Li; Zhao Li; Qingyun Liu | Research Full paper | |||
1571078652 | GraySniffer: A Cliques Discovering Method for Illegal SIM Card Vendor Based on Multi-Source Data | Tao Leng; Chang You; ShuangChun Luo; Junyi Liu; Yutong Zeng; Cheng Huang | Research Full paper | |||
1571078701 | JASFREE: Grammar-free Program Analysis for JavaScript Bytecode | Hao Jiang; Baojian Hua; Haiwei Lai; Si Wu | Research Full paper | |||
1571078778 | Topic-Aware Sensitive Information Detection in Chinese Large Language Model | Yalin Sun; Ruiying Lu; Kang Li; Yu Zheng | Research Full paper | |||
1571078791 | SyntaxBridge: Protocol Description Transformer for Enhanced Formal Analysis of Security Protocols | Liujia Cai; Tong Yu; Yumeng Li; Siqi Lu; Hanjie Dong; Guangying Cai; Guangsong Li; Yongjuan Wang | Research Full paper | |||
1571078810 | UNIRE: Secure Trajectory-User Linking Model Aggregation with Knowledge Transfer | Jiezhen Tang; Hui Zhu; Yandong Zheng; Junpeng Zhang; Fengwei Wang; Jiaqi Zhao; Hui Li | Research Full paper | |||
1571079088 | Zephyr: A High-Performance Framework for Graph Attention Networks on Heterogeneous Data | Wenxiu Ding; Muzhi Liu; Yuxuan Cai; Mingxing Chen; Zheng Yan; Mingjun Wang | Research Full paper | |||
1571079096 | STGCN-Based Link Flooding Attack Detection and Mitigation in Software-Defined Network | Yue Li; Runcheng Fang; Qipeng Song; Xilei Yang | Research Full paper | |||
1571079176 | A Sustainable Storage Compensation Method for Consortium Blockchain-based Computing Power Trading | Guangzhuo Zhu; Qian Wang; Bei Gong | Research Full paper | |||
1571079232 | LayyerX: Unveiling the Hidden Layers of DoH Server via Differential Fingerprinting | Yunyang Qin; Yujia Zhu; Linkang Zhang; Baiyang Li; Yong Ding; Qingyun Liu | Research Full paper | |||
1571079337 | WCDGA: BERT-Based And Character-Transforming Adversarial DGA With High Anti-Detection Ability | Zhujie Guan; Mengmeng Tian; Yuwei Xu; Kehui Song; Guang Cheng | Research Full paper | |||
1571079534 | A high-accuracy multi-view unknown traffic identification method based on contrastive learning | Yuwei Xu; Zizhi Zhu; Chufan Zhang; Kehui Song; Guang Cheng | Research Full paper | |||
1571079541 | TriViewNet: Achieve Accurate Tor Hidden Service Classification by Multi-view Feature Extraction and Fusion | Yuwei Xu; Jianfeng Li; Yujie Hou; Xinxu Huang; Yali Yuan; Guang Cheng | Research Full paper | |||
1571079591 | Attacking High-order Masked Cryptosystem via Deep Learning-based Side-Channel Analysis | Zelong Zhang; Wei Cheng; Yongbin Zhou; Zehua Qiao; Yuhan Zhao; Jian Weng | Research Full paper | |||
1571079691 | Efficient and Accurate Min-entropy Estimation Based on Decision Tree for Random Number Generators | Yuan Ma; Maosen Sun; Wei Wang; Tianyu Chen; Na Lv; Dongchi Han | Research Full paper | |||
1571079702 | AS-FIBA: Adaptive Selective Frequency-Injection for Backdoor Attack on Deep Face Restoration | Zhenbo Song; Wenhao Gao; Zhenyuan Zhang; Jianfeng Lu | Research Full paper | |||
1571079713 | Towards High-Quality Electromagnetic Leakage Acquisition in Side-Channel Analysis | Xiaoran Huang; Yiwen Gao; Wei Cheng; Yuejun Liu; Jingdian Ming; Yongbin Zhou; Jian Weng | Research Full paper | |||
1571079722 | Multiplicative Masked M&M: An Attempt at Combined Countermeasures with Reduced Randomness | Kaiyuan Li; Haruka Hirata; Daiki Miyahara; Kazuo Sakiyama; Yuko Hara-Azumi; Yang Li | Research Full paper | |||
1571079726 | CertRob: Detecting PDF Malware with Certified Adversarial Robustness via Randomization Smoothing | Lijun Gao; Zheng Yan | Research Full paper | |||
1571079759 | EUREKHA: Enhancing User Representation for Key Hackers Identification in Underground Forums | Abdoul Nasser Hassan Amadou; Anas Motii; Saida Elouardi; EL Houcine Bergou | Research Full paper | |||
1571079769 | Cyber Risk Analysis on Electric Vehicle Systems via NIST CSF | Spyridon Sourmelis; Weizhi Meng | Research Full paper | |||
1571079838 | Few-shot Encrypted Malicious Traffic Classification via Hierarchical Semantics and Adaptive Prototype Learning | Yuan Zhao; Chunhe Xia; Tianbo Wang; Mengyao Liu; Yang Li | Research Full paper | |||
1571079846 | AIDE: Attack Inference Based on Heterogeneous Dependency Graphs with MITRE ATT&CK | Weidong Zhou; Chunhe Xia; Feng Nan; Xinyi Pan; Tianbo Wang; Xiaojian Li | Research Full paper | |||
1571080153 | From Scarcity to Clarity: Few-Shot Learning for DoH Tunnel Detection Through Prototypical Network | Beibei Feng; Qi Wang; Wang Yijing; Xiaolin Xu; Zang Tianning; Jingrun Ma | Research Full paper | |||
1571087377 | Towards a Robust Medical Record System: Integrating Logical Reasoning for Trustworthy Data Management | Hanning Zhang; Guansheng Wang; Junwei Feng; Lei Feng; Quan Gan; Long Ji | Research Full paper | |||
1571088033 | Multi-Channel Leakage Detection Based on Chi-square Test of Independence | Xiaoyong Kou; Gongxuan Zhang | Research Full paper | |||
1571090338 | MVSS: Blockchain Cross-shard Account Migration Based on Multi-version State Synchronization | Weihan Wang; Xiulong Liu; Liyuan Ma; Hao Xu; Gaowei Shi; Juncheng Ma; Keqiu Li | Research Full paper | |||
1571039617 | Designing Secret Embedding Scheme Based on Bitcoin Transactions Pattern Controlling | Zheng Feng; Chunyu Xing; Chen Liang | Research Paper | |||
1571049281 | Sparse Silhouette Jump: Adversarial Attack Targeted at Binary Image for Gait Privacy Protection | Jiayi Li; Ke Xu; Xinghao Jiang; Tanfeng Sun | Research Paper | |||
1571058394 | Perturbing Vulnerable Bytes in Packets to Generate Adversarial Samples Resisting DNN-Based Traffic Monitoring | Jie Cao; Zhengxin Xu; Yunpeng Bai; Yuwei Xu; Qiao Xiang; Guang Cheng | Research Paper | |||
1571060066 | Analyzing the Effectiveness of Image Preprocessing Defenses Under Runtime Constraints | Niklas Bunzel; Gerrit Klause | Research Paper | |||
1571062315 | Enabling Robust Android Malicious Packet Capturing and Detection via Android Kernel | Mingyang Li; Weina Niu; Xinglong Chen; Jiacheng Gong; Kegang Hao; Xiaosong Zhang | Research Paper | |||
1571062440 | FedSGProx: Mitigating Data Heterogeneity and Isolated Nodes in Graph Federated Learning | Xutao Meng; Qingming Li; Yong Li; Li Zhou; Xiaoran Yan | Research Paper | |||
1571062795 | Signcryption based on Elliptic Curve CL-PKC for Low Earth Orbit Satellite Security Networking | Meiling Chen; Yuanyuan Yang; Sixu Guo; Jin Cao; Haitao Du; Li Su | Research Paper | |||
1571063457 | Real-time Private Data Aggregation over Distributed Spatial-temporal Infinite Streams with Local Differential Privacy | Xingxing Xiong; Shubo Liu; Xiping Liu; Xiaoguang Niu; Wenyu You | Research Paper | |||
1571064118 | A Multi-hop Reasoning Framework for Cyber Threat Intelligence Knowledge Graph | kai zhou; yong xie; xin liu | Research Paper | |||
1571064340 | LSD Attack: Exploiting Inconsistencies between Design and Implementation of Ethereum Protocols | Chenyu Li; Xiu Zhang; Xueping Liang; Xiaorui Gong | Research Paper | |||
1571064746 | Detecting and Exploiting XSLT Vulnerabilities in Real-World Open Source Projects | Luo Xuejia; Ximeng Liu; Hongtao Li | Research Paper | |||
1571065041 | Attack Data is Not Solely Paramount: A Universal Model Extraction Enhancement Method | Chuang Liang; Jie Huang | Research Paper | |||
1571065413 | Lightweight Leakage-Resilient Authenticated Key Exchange for Industrial Internet of Things | Wenxin Jia; Zheng Yang; Zhiqiang Ma | Research Paper | |||
1571065498 | Enhancing IoT Privacy: Why DNS-over-HTTPS Alone Falls Short? | Samuel Pélissier; Gianluca Anselmi; Abhishek Kumar Mishra; Anna Maria Mandalari; Mathieu Cunche | Research Paper | |||
1571065539 | Enhancing Information Gathering: An Extensible Framework for Automated Metadata Extraction | Arcangelo Castiglione; Raffaele Pizzolante; Francesco Palmieri | Research Paper | |||
1571065570 | Active Source Inference Attack Based on Label-Flipping in Federated Learning | Lening Zhang; Hui Xia | Research Paper | |||
1571065695 | Research on mutual inspection of wireless IoT devices based on encrypted traffic analysis | Yilin Li; Liang Wang; Lina Zuo; Shaokang Zhang; Meng Wang; Haibo Liu | Research Paper | |||
1571066077 | Broader but More Efficient: Broad Learning in Power Side-channel Attacks | Yilin Yang; Changhai Ou; Yongzhuang Wei; Wei Li; Yifan Fan; Xuan Shen | Research Paper | |||
1571066198 | FedChain: Privacy-Preserving Blockchain-Based Federated Learning for IoT-based Healthcare | Ben Othman Soufiene; Chinmay Chakraborty | Research Paper | |||
1571066225 | A Universally Composable Key Management System Using Trusted Hardware | Zhenghao Lu; Ding Ma; Lei Fan; Xiuzhen Chen; Yongshuai Duan; Jia Zhang | Research Paper | |||
1571066540 | T-ABE: A practical ABE scheme to provide trustworthy key hosting on untrustworthy cloud | Shuaishuai Chang; Yuzhe Li; Bo Li; Jinchao Zhang | Research Paper | |||
1571066620 | D^2FL: Dimensional Disaster-oriented Backdoor Attack Defense Of Federated Learning | Yilong Li; Jianyi Zhang; Ziyin Zhou; Zezheng Sun; Xu Ji; Zeping Li; Jiameng Han; Zhangchi Zhao | Research Paper | |||
1571066696 | ConfigKG: Identify Routing Security Issues from Configurations Based on Knowledge Graph | Pengfei Li; Yujing Liu; Jinshu Su; Bo Yu | Research Paper | |||
1571066708 | Achieving Trusted GPU Allocation: An Empirical Study on Efficiency Changes of Deep Learning Training Tasks | Ziheng Zhang; Lei Liu; Zhongmin Yan | Research Paper | |||
1571067254 | BedIDS: An Effective Network Anomaly Detection Method by Fusing Behavior Evolution characteristics | Zhen Liu; Changzhen Hu; Chun Shan; Junkai Yi | Research Paper | |||
1571067288 | Leveraging Large Language Models for Challenge Solving in Capture-the-Flag | Yuwen Zou; Yang Hong; Jingyi Xu; Lekun Liu; Wenjun Fan | Research Paper | |||
1571067298 | Efficient and Verifiable Dynamic Skyline Queries in Blockchain Networks | Bo Yin; Hang Chen; Binyao Xu; Mariam Suleiman Silima; Ke Gu | Research Paper | |||
1571067332 | THEF: A Privacy-Preserving Framework for Transformer Inference leveraging HE and TEE | Zehao Li; Jiachun Liao; Jinhao Yu; Lei Zhang | Research Paper | |||
1571067493 | From Liberty to 1984: A Methodology for Systematically Deteriorating LLM Outputs through Habituation Tendencies | Dong Zhang | Research Paper | |||
1571067494 | Efficient FSS-based Private Statistics for Traffic Monitoring | Zhichao Wang; Qi Feng; Min Luo; Xiaolin Yang; Zizhong Wei | Research Paper | |||
1571067553 | Enhancing Security and Privacy in Connected and Autonomous Vehicles: A Post-Quantum Revocable Ring Signature Approach | Pincan Zhao; Xinrui Zhang; Changle Li; Yuchuan Fu; F. Richard Yu | Research Paper | |||
1571067704 | DMPA: A Compact and Effective Pipeline for Detecting Multiple Phishing Attacks | Xiaodong Huang; GangLiang Li; ChengFeng Chen; ShouQiang Liu | Research Paper | |||
1571067962 | CaptchaSAM: Segment Anything in Text-based Captchas | Yijun Wang; Ziyi Zhou; Weiqi Bai; Ruijie Zhao; Xianwen Deng | Research Paper | |||
1571068143 | Tibetan microblogging user data analysis and topic identification | Guixian Xu; Wenhui Gao | Research Paper | |||
1571068156 | Security Enhancement of UAV Swarm Empowered Downlink Transmission with Integrated Sensing and Communication | Runze Dong; Buhong Wang; Jiang Weng; Kunrui Cao; Jiwei Tian; Tianhao Cheng | Research Paper | |||
1571068215 | Efficient and Practical Multi-party Private Set Intersection Cardinality Protocol | Shengzhe Meng; Xiaodong Wang; Zijie Lu; Bei Liang | Research Paper | |||
1571068539 | Learning Robust and Repeatable Physical Camouflage for Aerial Object Detectors | Zilong He; Hua Zhang | Research Paper | |||
1571068614 | SimLog: System Log Anomaly Detection Method Based on Simhash | Weiping Wang; Huijuan Wang; Yulu Hong; Chenyu Wang; Hong Song; Shigeng Zhang | Research Paper | |||
1571068921 | Privacy Leak Detection in LLM Interactions with a User-Centric Approach | Tan Su; Bingbing Zhang; Chi Zhang; Lingbo Wei | Research Paper | |||
1571069062 | FREDet: Fine-Grained Malicious Traffic Detection Based on Frequency Domain Features | Zekai Song; Yunpeng Li; Jian Qin; Changzhi Zhao; Dongxu Han; Yuling Liu | Research Paper | |||
1571069158 | Leveraging Semi-supervised Learning for Enhancing Anomaly-based IDS in Automotive Ethernet | Jia Liu; Wenjun Fan; Yifan Dai; Eng Gee Lim; Zhoujin Pan; Alexei Lisitsa | Research Paper | |||
1571069200 | FedNIFW: Non-Interfering Fragmented Watermarking for Federated Deep Neural Network | Haiyu Deng; Xiaocui Dang; Yanna Jiang; Xu Wang; Guangsheng Yu; Wei Ni; Ren Ping Liu | Research Paper | |||
1571069229 | An Efficient and Privacy-Preserving Participant Selection Scheme based on Location in Mobile Crowdsensing | Yudan Cheng; Tao Feng; Zhiquan Liu; Guo Xian; Lulu Han; Jianfeng Ma | Research Paper | |||
1571069289 | Android Malware Detection Technology Based on SC-ViT and Multi-Feature Fusion | Qiulong Yu; Zhiqiang Wang; Lei Ju; Sicheng Yuan; Ying Zhang | Research Paper | |||
1571069365 | Secure Join and Compute in Encrypted Database | Tanusree Parbat; Ayantika Chatterjee | Research Paper | |||
1571069375 | NAGG: Noised graph node feature aggregations for preserving privacy | Yinghao Song; Long Yan; Shengzhong Tan; Yang Li; Dazhong Li; Yulun Song | Research Paper | |||
1571069414 | SBCM: Semantic-Driven Reverse Engineering Framework for Binary Code Modularization | Shuang Duan; Hui Shu; Zihan Sha; Yuyao Huang | Research Paper | |||
1571069443 | A Multi-Blockchain Based Anonymous Cross-Domain Authentication Scheme for Industrial Internet of Things | Chengqi Hou; Wei Yang; Yu Wang; Zhiming Zhang; Shaolong Chen; Beibei Li | Research Paper | |||
1571069449 | Robust Hardware Trojan Detection: Conventional Machine Learning vs. Graph Learning Approaches | Liang Hong; Xingguo Guo; Zeyar Aung; Wei Hu | Research Paper | |||
1571069468 | An Effective Adversarial Text Attack through a Block-Sparse Approach with Hamiltonian Insights | Xiang Sun; Zhang Yaling; Yichuan Wang; Chen Zhao; DongTai Tang | Research Paper | |||
1571069523 | UniTTP: A Unified Framework for Tactics, Techniques, and Procedures Mapping in Cyber Threats | Jie Zhang; Hui Wen; Lun Li; Hongsong Zhu | Research Paper | |||
1571069539 | Dycom: A Dynamic Community Partitioning Technique for System Audit Logs | Zhaoyang Wang; Yu Wen; Yanfei Hu; Boyang Zhang; Shuailou Li; Wenbo Wang; Lisong Zhang; Dan Meng | Research Paper | |||
1571069587 | Research on Optimization Enabled Deep Learning Based DDoS Attack Detection | Dahai Yu; Jianming Cui; Ming Liu | Research Paper | |||
1571069606 | End-to-End Speaker Anonymization Based on Location-Variable Convolution and Multi-Head Self-Attention | Feiyu Zhao; Jianguo Wei; Lu Wenhuan; Yongwei Li | Research Paper | |||
1571069619 | DUDPA-TATD: A Lightweight Privacy-Preserving Anomaly Traffic Detection Method for Edge Computing Scenarios | Guanghan Li; Yang Wenzhong; Xiaodan Tian; Jiaren Peng | Research Paper | |||
1571069663 | HFI: High-Frequency Component Injection based Invisible Image Backdoor Attack | Huanlai Xing; Xuxu Li; Jing Song; Lexi Xu; Jincheng Peng; Bowen Zhao; Li Feng | Research Paper | |||
1571069679 | Three-Body Problem: An Empirical Study on Smartphone-based TEEs, TEE-based Apps, and their Interactions | Xianghui Dong; Yin Liu; Xuejun Yu | Research Paper | |||
1571069705 | A Trust Model with Fitness-Based Clustering Scheme in FANETs | Junqiao Gao; Chaklam Cheong; Mansi Zhang; Yue Cao; Tao Peng; Shahbaz Pervez | Research Paper | |||
1571069722 | Security Assessment of Customizations in Android Smartwatch Firmware | Yifan Yu; Ruoyan Lin; Shuang Li; Qinsheng Hou; Wenrui Diao | Research Paper | |||
1571069727 | Defending Against Model Poisoning Attacks in Federated Learning via Client-guided Trust | Xiangxiang Wang; Hui Xia; Yingqi Zhang | Research Paper | |||
1571069751 | Who Owns the Cloud Data? Exploring a non-interactive way for secure proof of ownership | Zhihuan Yang; Wenlong Tian; Ruixuan Li; Xuming Ye; Zhiyong Xu | Research Paper | |||
1571069766 | Sec-Reduce: Secure Reduction of Redundant and Similar Data for Cloud Storage based on Zero-Knowledge Proof | Zhihuan Yang; Wenlong Tian; Emma Zhang; Zhiyong Xu | Research Paper | |||
1571069771 | Poisoning Attacks Detection of Recommender Systems Based on Cross Distillation | Tian Ze Wang, None | Research Paper | |||
1571070075 | Private Data Aggregation Enabling Verifiable Multisubset Dynamic Billing in Smart Grids | Qian Yang; Chen Wang; Jian Shen; Yi Li; Dengzhi Liu | Research Paper | |||
1571070110 | HTV: Measuring Circuit Vulnerability to Hardware Trojan Insertion Based on Node Co-activation Analysis | Shuiliang Chai; Zhanhui Shi; Yanjiao Gao; Yuhao Huang; Aizhu Liu; Jie Xiao | Research Paper | |||
1571070130 | BGAS: Blockchain and Group Decentralized Identifiers Assisted Authentication Scheme for UAV Networks | TingYu Wang; Qiang Cao; Shihong Zou; Yueming Lu | Research Paper | |||
1571070171 | EffiTaint: Boosting Sensitive Data Tracking with Accurate Taint Behavior Modeling and Efficient Access Path Optimization | Haocheng Li | Research Paper | |||
1571070202 | An Intelligent Affinity Strategy for Dynamic Task Scheduling in Cloud-Edge-End Collaboration | Jingsen Zhang; Shoulu Hou; Yi Gong; Tao Wang; Changyuan Lan; Xiulei Liu | Research Paper | |||
1571070285 | CFE: Secure Filtered Words in End-to-End Encrypted Messaging System | Tran Viet Xuan Phuong; Albert Baker; Jan P Springer; Philip Huff; Tho Thi Ngoc Le | Research Paper | |||
1571070309 | Custom Permission Misconfigurations in Android: A Large-Scale Security Analysis | Rui Li; Wenrui Diao; Debin Gao | Research Paper | |||
1571070320 | A Quiet Place: An In-Depth Study of Mobile Public-to-Private Attacks | Yin Liu | Research Paper | |||
1571074020 | Orchestrating Security Protection Resource for Space-Ground Integrated Networks | Dongbin Chen; Yunchuan Guo; Xiao Wang; Fenghua Li; Zifu Li | Research Paper | |||
1571074030 | Phase Shift Matrix Optimization and Channel Quantization Alternating in RIS-Assisted Physical Layer Key Generation | Liquan Chen; Yufan Song; Wanting Ma; Tianyu Lu; Peng Zhang | Research Paper | |||
1571075925 | BWG: An IOC Identification Method for Imbalanced Threat Intelligence Datasets | Juncheng Lu, Sr; Yiyang Zhao; Wang Yan; Jiyuan Cui; Sanfeng Zhang | Research Paper | |||
1571076987 | Network traffic anomaly detection method based on CTA-BiLSTM | Wenlong Liu; Bin Wen; Mengshuai Ma; Wanrong Du | Research Paper | |||
1571077055 | Decentralized and Lightweight Cross-Chain Transaction Scheme Based on Proxy Re-signature | Huiying Zou; Jia Duan; Xi Liu; Wei Ren; Tao Li; Kim-Kwang Raymond Raymond Choo | Research Paper | |||
1571077342 | Abstraction-Based Training for Robust Classification Models via Image Pixelation | Yang Chen; Min Zhang; Min Wu | Research Paper | |||
1571077498 | LLMUZZ: LLM-based seed optimization for black-box device fuzzing | Guangming Gao; Shuitao Gan; Xiaofeng Wang; Shengkai Zhu | Research Paper | |||
1571077867 | FCSec: An Open-source Testbed for Security Evaluation on UAV Communications | Indu Chandran; Mukesh Narayana Gadde; Vipin Kizheppatt | Research Paper | |||
1571078044 | SecureNet-AWMI: Safeguarding Network with Optimal Feature Selection Algorithm | Ming Zhou; Zhijian Zheng; Peng Zhang; Sixue Lu; Yamin Xie; Zhongfeng Jin | Research Paper | |||
1571078187 | Privacy-Preserving Multi-Soft Biometrics through Generative Adversarial Networks with Chaotic Encryption | Hongying Zheng; Hongdie Li; Di Xiao; Maolan Zhang | Research Paper | |||
1571078250 | FusTP-FL: Enhancing Differential Federated Learning through Personalized Layers and Data Transformation | Xiong Yan; Kedong Yan; Chanying Huang; Dan Yin; Shan Xiao | Research Paper | |||
1571078274 | Active Defense Research: A New Perspective Integrating Traps and Vulnerabilities | Quan Hong; Yang Yu; Lvyang Zhang; Lidong Zhai | Research Paper | |||
1571078398 | Hierarchical Graph-Based Feature Extraction for Enhanced Smart Contract Vulnerability Detection in Multi-Information Contract Graph | Tao Fang; H Zhihao; Jiahao He; Junjie Zhou; Zhao Gansen | Research Paper | |||
1571078432 | Single-sign-on Authentication with Anonymous Token and Restricted Covert Channel | Zhao Zhang; ChunXiang Xu; Man Ho Au | Research Paper | |||
1571078469 | DMASP: Dynamic Multi-keyword Searchable Encryption for Protected Access and Search Patterns with Differencial Privacy | Yue Quan; Kai Fan; Haoyang Wang; Hui Li; Yintang Yang | Research Paper | |||
1571078729 | Enhancing Graph-Based Vulnerability Detection through Standardized Deep Learning Pipelines | Jiashun Hao; Young-Woo Kwon | Research Paper | |||
1571078799 | Large Language Model and Behaviour Tree Based Real-world Test Scenario Generation for Autonomous Vehicles | Yuliang Li; Zhonglin Hou; Hong Liu | Research Paper | |||
1571078979 | OSN Bots Traffic Transformer: MAE-Based Multimodal Social Bots Behavior Pattern Mining | Haonan Zhai; Ruiqi Liang; Zhenzhen Li; Zhen Li; Wei Xia; Bingxu Wang; Qingya Yang | Research Paper | |||
1571079182 | Data Privacy-Preserving and Communication Efficient Federated Multilinear Compressed Learning | Di Xiao; Zhuyan Yang; Maolan Zhang; Lvjun Chen | Research Paper | |||
1571079188 | Enhancing Higher-Order Masking: A Faster and Secure Implementation to Mitigate Bit Interaction Leakage | Jiahao Zhang; Yuejun Liu; Jingdian Ming; Yiwen Gao; Yongbin Zhou; Debao Wang | Research Paper | |||
1571079248 | Towards Securing ASCON Implementation by Inner Product Masking | Yuming Liu; Wei Cheng; Jihao Fan; Yongbin Zhou | Research Paper | |||
1571079249 | Robust purification defense for transfer attacks based on probabilistic scheduling algorithm of pre-trained models: A model difference perspective | Xinlei Liu; Jichao Xie; Tao Hu; Baolin Li; Yi Peng; Zhen Zhang | Research Paper | |||
1571079262 | A Novel zk-SNARKs Method for Cross-chain Transactions in Multi-chain System | Pengcheng Xia; Jingyu Wu; Yiyang Ni; Jun Li | Research Paper | |||
1571079465 | LightRL-AD: A Lightweight Online Reinforcement Learning Approach for Autonomous Defense against Network Attacks | Fengyuan Shi; Zhou Zhou; Jiang Guo; Renjie Li; Zhongyi Zhang; Shu Li; Qingyun Liu; Xiuguo Bao | Research Paper | |||
1571079473 | Peering Through the Veil: A Segment-Based Approach for VPN Encapsulated Video Title Identification | Zhenyu Xu; Xurui Ren; Yi Zhang; Guang Cheng; Hua Wu | Research Paper | |||
1571079484 | TWCF: Trust Weighted Collaborative Filtering | Wenting Song; Kathleen Barber | Research Paper | |||
1571079547 | SPDID: A Secure and Privacy-Preserving Decentralized Identity utilizing Blockchain and PUF | Yueyue He; Wenxuan Fan; Koji Inoue | Research Paper | |||
1571079614 | LAPAID: A Lightweight, Adaptive and Perspicacious Active Intrusion Detection Method on Network Traffic Streams | Bin Li; Li Cheng; Zhongshan Zhang; Yu Pan; Feng Yao; Renjie He | Research Paper | |||
1571079684 | Individual Fair Density-peaks Clustering Based on Local Similar Center Graph and Similar Decision Matrix | Yiding Tang; Zhijing Yang; YuFan Peng; Hui Zhang | Research Paper | |||
1571079728 | WhisperMQTT: Lightweight Secure Communication Scheme for Subscription-Heavy MQTT Network | Youbin Kim; Man-Ki Yoon | Research Paper | |||
1571079736 | Research on Intelligent Joint Detection Technology for Application Privacy Behavior Compliance | Ruoding Zhang; Tao Liu; Qifeng Shi; Yan Zhang; Xinrui Geng; Xiaoyi Song | Research Paper | |||
1571079739 | A Reliable Encrypted Traffic Classification Method Based on Attention Mechanisms | Zhijun Wu; Niu; Meng Yue | Research Paper | |||
1571079760 | USB Catcher: Detection of Controlled Emissions via Conducted Compromising Emanations | Yixin Zhang; Fuqiang Du; Xinge Chi; Zhiqiang Lv | Research Paper | |||
1571079771 | Improving Security in Internet of Medical Things through Hierarchical Cyberattacks Classification | Hong-Hanh Nguyen-Le; Nhien-An Le-Khac; Vince Noort | Research Paper | |||
1571079783 | Privacy-Preserving Secure Neighbor Discovery for Wireless Networks | Ahmed Mohamed Hussain; Panagiotis Papadimitratos | Research Paper | |||
1571079837 | D3IR: Securing Multi-Domain Networks via Extending Depth-in-Defense Strategies Across Nested Management Domains | Yaobing Xu; Yunchuan Guo; Wenlong Kou; Junhai Yang; Ziyan Zhou; Fenghua Li | Research Paper | |||
1571079985 | Towards Understanding and Detecting File Types in Encrypted Files for Law Enforcement Applications | Adam Hooker; Wenjian Huang; Shalini Kurumathu; Nishant Vishwamitra; Kim-Kwang Raymond Raymond Choo | Research Paper | |||
1571080007 | Multi-Dimensional Data Collection Under Personalized Local Differential Privacy | Kunpeng Song; Mingzhang Sun; Kui Zhou; Peng Tang; Ning Wang; Shanqing Guo | Research Paper | |||
1571080008 | Interactive Verifiable Local Differential Privacy Protocols for Mean Estimation | Liang Wang; Li Liu; Pei Zhan; Peng Tang; Puwen Wei; Shanqing Guo | Research Paper | |||
1571080108 | Enhancing Security and Efficiency in Vehicle-to-Sensor Authentication: A Multi-Factor Approach with Cloud Assistance | Xinrui Zhang; Pincan Zhao; Jason Jaskolka | Research Paper | |||
1571080150 | AdvPurRec: Strengthening Network Intrusion Detection with Diffusion Model Reconstruction Against Adversarial Attacks | Nour Alhussien; Ahmed AlEroud | Research Paper | |||
1571048217 | A Debiasing Algorithm for Federated Learning Systems | Haibin Zheng; Zhang Tianxin; Jinyin Chen | Workshop Paper (AI-Driven TSP) |
|||
1571051778 | Differentially Private Graph Convolutional Networks with Privacy Amplification | Yifan Sun; Meng Song | Workshop Paper (AI-Driven TSP) |
|||
1571054393 | DyGCN: Dynamic Graph Convolution Network-based Anomaly Network Traffic Detection | Yonghao Gu; Xiaoqing Zhang; Hao Xu | Workshop Paper (AI-Driven TSP) |
|||
1571060460 | ROSE^+: A Robustness-Optimized Security Scheme Against Cascading Failures in Multipath TCP under LDDoS Attack Streams | Jinquan Nie; Lejun Ji; Yirui Jiang; Yong Ma; Yuanlong Cao | Workshop Paper (AI-Driven TSP) |
|||
1571062515 | A Novel Approach to Network Traffic Analysis: the HERA tool | Daniela Pinto; Ivone Amorim; Eva Maia; Isabel Praça | Workshop Paper (AI-Driven TSP) |
|||
1571064693 | Federated Knowledge-enhanced Graph Attention Network for Privacy-preserving Social Recommendation | Xiaofei Hao; Liyuan Liu; Yimeng Wang; Fengyu Li; Wanqing Wu | Workshop Paper (AI-Driven TSP) |
|||
1571065376 | Federated Learning Greedy Aggregation Optimization for Non-Independently Identically Distributed Data | Bosong Zhang; Qian Sun; Hai Wang; linna zhang; danyang li | Workshop Paper (AI-Driven TSP) |
|||
1571065554 | Machine Learning-Based Power Allocation Optimization Algorithm for Enhanced CR-NOMA Network | Yu Fu; Bingcai Chen; Qian Ning; Kai Lin | Workshop Paper (AI-Driven TSP) |
|||
1571065694 | Destruction and Reconstruction Chain: An Adaptive Adversarial Purification Framework | Zeshan Pang; Shasha Guo; Xuehu Yan; Yuliang Lu | Workshop Paper (AI-Driven TSP) |
|||
1571066238 | Leverage Staking with Liquid Staking Derivatives (LSDs): Opportunities and Risks | Xihan Xiong; Zhipeng Wang; Xi Chen; William J Knottenbelt; Michael Huth | Workshop Paper (AI-Driven TSP) |
|||
1571066267 | Chinese Adversarial Samples Generation Approach Based on Multiple Perturbation Strategies | Ding Yangyang; Gaopeng Gou | Workshop Paper (AI-Driven TSP) |
|||
1571066389 | Research on Adaptive Attention Dense Network Structure in Camera Source Recognition Method | Haoxuan Wu; ZhiQiang Wen | Workshop Paper (AI-Driven TSP) |
|||
1571066458 | Privacy Leakage Analysis Framework for Multi-Source and multimodal Data in Social Software Based on Generalized Scene Graphs | Peng Wu; Jian Wang; Jincan Pan; Yang Liu | Workshop Paper (AI-Driven TSP) |
|||
1571066716 | CNN-KOA-BiGRU: A high-accuracy APT detection model based on deep learning networks | Chaoqin Zhang; Maoqi Sun; Guangwu Hu | Workshop Paper (AI-Driven TSP) |
|||
1571066793 | VulMDS: Clone Vulnerability Detection Based On Multi-Dimensional Code Slicing | Shirun Liu; Aimin Yu; Zhengkai Qin | Workshop Paper (AI-Driven TSP) |
|||
(AI-Driven TSP) |
Withdrawn | |||||
1571067112 | Discriminating Malware Families using Partitional Clustering | Pooja Mishra; Paul T Black; Adil Bagirov; Shaning Pang | Workshop Paper (AI-Driven TSP) |
|||
1571067113 | F2D: Detection of Resolver DNS Hijacking based on Filtration Funnel Strateg | Cong Dong | Workshop Paper (AI-Driven TSP) |
|||
(AI-Driven TSP) |
Withdrawn | |||||
1571067285 | GNN for LORA Device Fingerprint Identification | Bojun Zhang | Workshop Paper (AI-Driven TSP) |
|||
1571067591 | Efficient and Secure Federated Learning via Enhanced Quantization and Encryption | Chengming Zhang; Bo Tang; Yifan Bian; Bingtao Han; Yongcheng Wang; Tao Liu | Workshop Paper (AI-Driven TSP) |
|||
1571067592 | A Self-Adaptive Framework for Responding to Uncertainty in Access Control Process with Deep Neural Networks | Jihoon Park; Giluk Kang; Young-Gab Kim | Workshop Paper (AI-Driven TSP) |
|||
1571067642 | Efficient Multi-subset Fine-grained Authorization PSI over Outsourced Encrypted Datasets | Jinlong Zheng; Jia-Nan Liu; Minhua Su; Dingcheng Li; Kai He; Xueqiao Liu | Workshop Paper (AI-Driven TSP) |
|||
1571067643 | Efficient DDoS Detection and Mitigation in Cloud Data Centers Using eBPF and XDP | Ziyue Chen; He Kong; Ding Shuai; Quanfeng Lv; Wei Guo | Workshop Paper (AI-Driven TSP) |
|||
1571067657 | A Bitcoin-Compatible Protocol for Conditional Multi-Party Payment Channels | Leiyang Wei; Zhicheng Xu; Yiqiao Song; Zhekang Hu; Hongbing Cheng | Workshop Paper (AI-Driven TSP) |
|||
1571067930 | Secure Microwave QR Code Communication Using Pseudo-Random Constellation Rotation | Chunpeng Guo; Beiyuan Liu; Zeyang Sun; Chen Chen; Sai Xu | Workshop Paper (AI-Driven TSP) |
|||
1571067939 | Research of Malware Detection Based on Persistent Homology | Lu Xi; Tianchong Gao | Workshop Paper (AI-Driven TSP) |
|||
1571067945 | Real-Time Localization of Zigbee Signals Using Graph Neural Network | Bojun Zhang | Workshop Paper (AI-Driven TSP) |
|||
1571067995 | A LLM-based agent for the automatic generation and generalization of IDS rules | Hu Xiaowei; Chen Haoning; Huaifeng Bao; Wen Wang; Feng Liu | Workshop Paper (AI-Driven TSP) |
|||
1571068048 | Human Action Recognition by Invisible Sensing with the Constraint of Privacy Preservation | Jun Guo, Sr.; Minjuan Sun; Weiwei Zhang; Baoying Liu; Anwen Wang; Li Liu | Workshop Paper (AI-Driven TSP) |
|||
1571068093 | Investigating Patterns of Adversarial Techniques for Cyberattack Forensics | Liming Lu; Zhenlin Yu | Workshop Paper (AI-Driven TSP) |
|||
1571068157 | Verifiable Cloud-Assisted Multi-Party Private Set Intersection Cardinality | Gongli Li; Weichen Liu; Lu Li; Hongzhi Lei | Workshop Paper (AI-Driven TSP) |
|||
1571068189 | A Federated Learning Scheme with Adaptive Hierarchical Protection and Multiple Aggregation | Zhiqiang Wang; Ziqing Tian; Xinyue Yu | Workshop Paper (AI-Driven TSP) |
|||
1571068201 | Dynamic Ensemble with Boundary Augmentation for Enhancing Network Intrusion Detection | Huajuan Ren; Yonghe Tang; Shuai Ren; Ruimin Wang; Weiyu Dong; Liehui Jiang | Workshop Paper (AI-Driven TSP) |
|||
1571068349 | Contextual Transformer-based Node Embedding for Vulnerability Detection using Graph Learning | Joseph Gear; Yue Xu; Ernest Foo; Praveen Gauravaram; Zahra Jadidi; Leonie R Simpson | Workshop Paper (AI-Driven TSP) |
|||
1571068394 | Traceable AI-driven Avatars Using Multi-factors of Physical World and Metaverse | Kedi Yang; Zhenyong Zhang; Youliang Tian | Workshop Paper (AI-Driven TSP) |
|||
1571068418 | Improved Rectangle and Linear Attacks on Lightweight Block Cipher WARP | Yaxin Cui; Hong Xu; Zhichao Xu | Workshop Paper (AI-Driven TSP) |
|||
1571068431 | Lightweight Privacy-Preserving Anomaly Detection for Time Series Based on Federated Learning | Bin Jiang; Guangfeng Wang | Workshop Paper (AI-Driven TSP) |
|||
1571068509 | A Self-Supervised Targeted Process Anomaly Detection Method Based on the Minimum Set of Observed Events | Haojun Xia; Limin Sun; Wenliang Liu; Jingyi Xie; Zhanwei Song; Bibo Tu | Workshop Paper (AI-Driven TSP) |
|||
1571068510 | Ru-PCFG: Password Guessing Model combining PCFG and Word Transformation | Li Yang; Yong Li; Chi Chen | Workshop Paper (AI-Driven TSP) |
|||
1571068546 | GeMuFuzz: Integrating Generative and Mutational Fuzzing with Deep Learning | Yuqi Zhai; Rui Ma; Zheng Zhang; Yuche Yang; Siqi Zhao; Hongming Chen | Workshop Paper (AI-Driven TSP) |
|||
1571068589 | A Dual Defense Design Against Data Poisoning Attacks in Deep Learning-Based Recommendation Systems | Xiaocui Dang; Priyadarsi Nanda; Manoranjan Mohanty; Haiyu Deng | Workshop Paper (AI-Driven TSP) |
|||
1571068590 | A Cross-Site Scripting Attack Protection Framework Based on Managed Proxy | Cheng Tang; Guozhen Cheng; Hao Liang; Wenyan Liu; Ming Liu; Qingfeng Wang | Workshop Paper (AI-Driven TSP) |
|||
1571068603 | IoT Device Fingerprinting From Periodic Traffic Using Locality-Sensitive Hashing | Jianhui Ming; Weiping Wang; Linlin Zhang; Yingjie Hu; Shigeng Zhang | Workshop Paper (AI-Driven TSP) |
|||
1571068650 | TerrARA: Automated Security Threat Modeling for Infrastructure as Code | Anh-Duy Tran; Laurens Sion; Koen Yskout; Wouter Joosen | Workshop Paper (AI-Driven TSP) |
|||
1571068751 | DDF-Net: A Cloud Computing Load Forecasting Method Integrating Spatiotemporal and Time-Frequency Domain Information | YingJian Li; Yongsheng Wang; Gang Wang | Workshop Paper (AI-Driven TSP) |
|||
1571068979 | Model Calibration for Improving Membership Inference Attacks in Graph Neural Networks | Lixia Xie; Jingchen Shi; Hongyu Yang; Ze Hu; Xiang Cheng | Workshop Paper (AI-Driven TSP) |
|||
1571069010 | scE(match): Privacy-Preserving Cluster Matching of Single-Cell Data | Johannes Lohmöller; Jannis Scheiber; Rafael Kramann; Klaus Wehrle; Sikander Hayat; Jan Pennekamp | Workshop Paper (AI-Driven TSP) |
|||
1571069054 | Block-Feature Fusion for Privacy-Protected Iris Recognition | Wiraj Udara Wickramaarachchi; Dongdong Zhao; Junwei Zhou; Jianwen Xiang | Workshop Paper (AI-Driven TSP) |
|||
1571069251 | CFB-DSSE: Efficient Secure Dynamic Searchable Encryption Scheme with Conjunctive Search for Smart Healthcare | Hou Ruiwei; Fu-cai Zhou; Zongye Zhang; Jiacheng Li; Chongyang Wang | Workshop Paper (AI-Driven TSP) |
|||
1571069267 | CVALLM: A Cloud Platform Security Assessment Framework Based on Large Language Models | Wangyuan Jing; Chi Zhang; Bingbing Zhang; Lingbo Wei | Workshop Paper (AI-Driven TSP) |
|||
1571069335 | A Cross-domain Data Sharing Scheme Based on Federated Blockchain | Honglin Mao; Jie Zhang; Yao Zhang; Xiaohong Li | Workshop Paper (AI-Driven TSP) |
|||
1571069364 | BTTCondor: Blockchain-Based Traceable Self-Tallying Condorcet Voting Protocol | Zixuan Liu; Zijian Bao; Yong Zhou; Lan Hezheng; Hong Lei | Workshop Paper (AI-Driven TSP) |
|||
1571069371 | Compressed Video Action Recognition Based on Neural Video Compression | Yuting Mou; Ke Xu; Xinghao Jiang; Tanfeng Sun | Workshop Paper (AI-Driven TSP) |
|||
1571069444 | Construction of Cyber-attack Aattribution Framework Based on LLMs | Jinye Zhang; Ken Cheng; Xinli Xiong; Rongcheng Dong; She Jie | Workshop Paper (AI-Driven TSP) |
|||
1571069564 | Malware Detection Based on Multi-Modal Features | Lexin Jia; Xiangyi Wang; Jian Zhang; Wenyuen Zhao | Workshop Paper (AI-Driven TSP) |
|||
1571069568 | Stabilizing Node Selection in Committee-Based Permissionless Blockchain | Yuehua Wu; Feihu Yan; Yunxiao Wang; Wenzhi Chen | Workshop Paper (AI-Driven TSP) |
|||
(AI-Driven TSP) |
Withdrawn | |||||
1571069593 | SGCML: Detecting Hacker Community Hidden in Chat Group | Tao Leng; Junyi Liu; Yang Zhen; Chang You; Yutong Zeng; Cheng Huang | Workshop Paper (AI-Driven TSP) |
|||
1571069622 | HFL-AD: A Hierarchical Federated Learning Framework for Solving Data Contamination in DDoS Detection | Haishi Huang; Jiaping Gui; Jianan Hong; Cunqing Hua | Workshop Paper (AI-Driven TSP) |
|||
1571069633 | DA-CPVD: Vulnerability Detection Method Based on Dual Attention Composite Pooling | Jinfu Chen; Mengxuan Shi; Saihua Cai; Ziyan Liu; Jiapeng Zhou | Workshop Paper (AI-Driven TSP) |
|||
1571069686 | Cyber Resilience Framework for Web Server | Wanqiu Zhou | Workshop Paper (AI-Driven TSP) |
|||
1571069725 | DI-GAE: A Dynamic and Resource-Efficient Attack Detection Framework with Incremental Learning and Graph Autoencoders | Mengmi Tan; Jianyi Liu; Ru Zhang | Workshop Paper (AI-Driven TSP) |
|||
1571069733 | A High-Capacity Reversible Data Hiding for Encrypted JPEG Images Based on Multi-Domain Embedding | Jiafu Qu; Xiaoyi Zhou; JinJiang Hu; Jixin Ma | Workshop Paper (AI-Driven TSP) |
|||
1571069740 | Robust and Privacy-preserving Federated Learning | Yingqi Zhang; Hui Xia; Shuo Xu | Workshop Paper (AI-Driven TSP) |
|||
1571069897 | Improved Packet-Level Synthetic Network Traffic Generation | Jacob Soper; Yue Xu; Ernest Foo; Zahra Jadidi; Kien N Thanh | Workshop Paper (AI-Driven TSP) |
|||
1571069925 | Detectable Mislabeling - Can Faulty AI Models be Recognized from Incomplete Memory Traces? | Łukasz Krzywiecki; Tadeusz Kulczycki; Christian Emmanuel Nteranya; Andrzej Stos | Workshop Paper (AI-Driven TSP) |
|||
1571069951 | SAMOC: Enabling Atomic Invocations for Cross-chain Crowdsourcing Testing DApps in Industrial Control Through Trusted Smart Community and Lock Mechanism | Weiguo Huang; Yong Ding; Jun Li; Yujue Wang; Hai Liang; Changsong Yang | Workshop Paper (AI-Driven TSP) |
|||
1571069962 | ZKPB-Lite: An Optimized ZKMB for Efficient and Privacy-Preserving Encrypted Malicious Traffic Detection | Yi Xu; Yijun Mo; Hang Su; HuiYu Liu | Workshop Paper (AI-Driven TSP) |
|||
1571069965 | Trustworthy Analysis of Drain3-based Cold Storage Behavior in Judicial Depository Scenarios | Xiangyu Meng; Xuejun Yu | Workshop Paper (AI-Driven TSP) |
|||
1571069973 | FCADD: Robust Watermarking Resisting JPEG Compression with Frequency Channel Attention and Distortion De-gradient | Dong Yang; Weihai Li; Zikai Xu; Zhiling Zhang; Yiling Chen | Workshop Paper (AI-Driven TSP) |
|||
1571070022 | A Large Language Model for Adversarial Suffix Jailbreak Based on Adjustable-Position Attack | Xuehai Tang; Xikang Yang; Zhongjiang Yao; Jie Wen; Xi Zhou; Jizhong Han; Songlin Hu | Workshop Paper (AI-Driven TSP) |
|||
1571070027 | Transfer Learning-Based Robust Insider Threat Detection | Yujun Kim; Deok-Han Kim; Young-Gab Kim | Workshop Paper (AI-Driven TSP) |
|||
1571070039 | Privacy-Preserving Real-Time Gesture Recognition using Cloud-Trained Neural Networks | Kewin Ignasiak; Wojciech Kowalczyk; Łukasz Krzywiecki; Mateusz Nasewicz; Hannes Salin; Marcin Zawada | Workshop Paper (AI-Driven TSP) |
|||
1571070058 | An Efficient and Secure Anonymous Query Protocol | H; Yin Li | Workshop Paper (AI-Driven TSP) |
|||
1571070066 | Exploring Permission Control Flaws in Mini-apps | Jun Li; Yuting Zhang; Wu Zhou; Shenzhi Zhang | Workshop Paper (AI-Driven TSP) |
|||
1571070073 | Tighter Bounds for Guessing Entropy in Side-channel Template Attacks | Jinyuan Zhang; Changhai Ou; Jiawei Zhang; Jiangshan Long; Renjun Zhang | Workshop Paper (AI-Driven TSP) |
|||
1571070093 | Maldet: An Automated Malicious npm Package Detector Based on Behavior Characteristics and Attack Vectors | Yu Zhang; Haipeng Qu; Lingyun Ying | Workshop Paper (AI-Driven TSP) |
|||
1571070108 | An Adaptive Reputation Update Mechanism for Primary Nodes in PBFT | Limin Yu; Yongdong Wu; Tong LI; Jiao Lu | Workshop Paper (AI-Driven TSP) |
|||
1571070118 | Transistor-Level A2 Trojan Detection Based on Anomaly Detection Methods | Jialong Song; Jianming Zhang; Xing Hu; Yang Zhang; Xiaowen Chen; Zhenghao Li; Jinhui Tan | Workshop Paper (AI-Driven TSP) |
|||
1571070132 | DTGAN: Diverse-Task Generative Adversarial Networks for Intrusion Detection Systems Against Adversarial Examples | Yiyang Wang; Wuxia Bai; Kai Chen | Workshop Paper (AI-Driven TSP) |
|||
1571070150 | High Concealment Attack and Network Intrusion: An Overview | Shituo Ma; Wei Xia; Zhen Li; Zhenzhen Li; Gang Xiong; Gaopeng Gou | Workshop Paper (AI-Driven TSP) |
|||
1571070158 | Privacy-aware data aggregation using Functional Encryption | Sehrish Shafeeq; Mathias Fischer | Workshop Paper (AI-Driven TSP) |
|||
1571070162 | Multi-Leader Multi-Follower Stackelberg Game Based Defense Strategies Optimization for Interdependent Systems | Ao Wang; Jiaqi Li; Yang Zhao; Bin Sun; Lidong Zhai | Workshop Paper (AI-Driven TSP) |
|||
1571070203 | Evaluating Web-Based Privacy Controls: A User Study on Expectations and Preferences | Yuemeng Yin; Rahat Masood; Suranga Seneviratne; Aruna Seneviratne | Workshop Paper (AI-Driven TSP) |
|||
1571070212 | FMCAformer: Frequency domain multi-channel fusion representation for gunshot recognition | XingKun Shao | Workshop Paper (AI-Driven TSP) |
|||
1571070282 | ContraEHGT: An Evolving Heterogeneous Graph Transformer for Insider Threat Detection based on Contrastive Learning | Yinhao Qi; Zehui Wang; Xinghu Han; Yuan Yao; Chen Zhang; Bo Jiang; Zhigang Lu | Workshop Paper (AI-Driven TSP) |
|||
1571070291 | High-Capacity and High-Security Data Hiding in Encrypted Image Using Image Filtering and Image Blocking | Peng Yan Xiang; Tao Zhang; Hao Ja Liu; Bo Xin Zhang; Yu Zhang | Workshop Paper (AI-Driven TSP) |
|||
1571070295 | Rabbit: Secure Encrypted Property Graph Search Scheme Supporting Data and Key Updates | Yingying Wu; Jiabei Wang; Dandan Xu; Yongbin Zhou; Yang Wang | Workshop Paper (AI-Driven TSP) |
|||
1571070297 | Malware Traffic Classification Based on Multidimensional Features Learning | Yijie Huang; Wei Ding; Mian Huang | Workshop Paper (AI-Driven TSP) |
|||
1571070847 | Cross-platform Network User Alignment Interference Methods Based on Obfuscation Strategy | Luyao Wang; Yan Liu; Xiaoyu Guo; Ziqi Long | Workshop Paper (AI-Driven TSP) |
|||
1571071874 | Model-based Data Markets: A Multi-Broker Game Theoretic Approach | Yizhou Ma; Xikun Jiang; Wenbo Wu; Luis-Daniel Ibáñez; Jian Shi | Workshop Paper (AI-Driven TSP) |
|||
1571072409 | Human Behavior Recognition in Retail Environments with Graph-Driven RFID Signal Embedding | Bojun Zhang | Workshop Paper (AI-Driven TSP) |
|||
1571075461 | ADIoT: An Anomaly Detection Model for IoT Devices Based on Behavioral Feature Analysis | Liang Wang; Zhipeng Wang; Lina Zuo | Workshop Paper (AI-Driven TSP) |
|||
1571077193 | Enhancing Model Robustness and Accuracy under Composite Adversarial Perturbations via LBGAT | Chunlong Fan; Wanyan Guo; Li Xu; Wenhao Wang | Workshop Paper (AI-Driven TSP) |
|||
1571077444 | Research on Toxic Speech Detection Based on Large Language Models | Weihao W Li; Gao Yongbing; Zhang Yu; Yang Lidong; Gao Ruiping | Workshop Paper (AI-Driven TSP) |
|||
1571077506 | Detection of Sensitive Information Based on Transient Data in Store Buffer and Cache | Yan Chang; Yaqin Wu; Jianwu Rui; Ming Cao; Yawei Yue; Yu Feng; Tingting He; Haihui Gao; Zhen Lv | Workshop Paper (AI-Driven TSP) |
|||
1571077724 | ZKFDT: A Fair Exchange Scheme for Data Trading Based on Efficient Zero-Knowledge Proofs | Jian Wei Liu; Wei Wan; Chun Long; Jing Li; Fan Yang; Yuhao Fu | Workshop Paper (AI-Driven TSP) |
|||
1571078045 | MTD-Net: Boosting Robustness of Edge Intelligent Networks with Moving Target Defense | Zeshan Pang; Shasha Guo; Yuyuan Sun; Xuehu Yan; Yuliang Lu | Workshop Paper (AI-Driven TSP) |
|||
1571078074 | A Subtly Designed Method with Rényi Divergence for Sequence and Label Protection in Large Language Models, Balancing Privacy and Utility | Siyi Zhang; Xiaoyan Liang; Ruizhong Du; Jian Geng | Workshop Paper (AI-Driven TSP) |
|||
1571078135 | Dynamic Differential Privacy in Hierarchical Federated Learning: A Layerwise Adaptive Framework | Zhongyuan Qin; Wang Dinglian; Minghua Wang | Workshop Paper (AI-Driven TSP) |
|||
1571078170 | Smart Contract-Based Auditing of Edge Data for Vehicular Networks | Yu Zhao; Yangguang Tian; Chunbo Wang; Xiaoqiang Di; Hui Qi | Workshop Paper (AI-Driven TSP) |
|||
1571078182 | TIEBN: Trust Improvement Eigenvalue Blockchain Network for Anomaly Detection | Qi Xia; Grace Mupoyi; Jianbin Gao; Ansu Badjie; Edson Eliezer da Silva Tavares; Patrick Mukala | Workshop Paper (AI-Driven TSP) |
|||
1571078196 | Detecting V2Ray Traffic with Multimodal Deep Learning | Can Chen; Dongbin Wang; Dongchao Zhou; Yongfeng Tan; Dongzhe Wu | Workshop Paper (AI-Driven TSP) |
|||
1571078322 | OHSS: Optimizing Homomorphic Secret Sharing to Support Fast Matrix Multiplication | Shuguang Zhang; Jianli Bai | Workshop Paper (AI-Driven TSP) |
|||
1571078327 | Two-Stage Federated Learning Strategy for Fairness and Security in Vehicular Networks | Xin Zhang; Chao Guo; Buxin Guo | Workshop Paper (AI-Driven TSP) |
|||
1571078384 | DcChain: A Novel Blockchain Sharding Method Based on Dual-constraint Label Propagating | Pengcheng Xia; Hao Zhou; Yiyang Ni; Jun Li | Workshop Paper (AI-Driven TSP) |
|||
1571078557 | Intelligent charging service selection scheme under the cross-area consensus of the blockchain for the Internet of vehicles | Shuming Xiong; Zhu Jun Feng; QiQi Xu | Workshop Paper (AI-Driven TSP) |
|||
1571078673 | Unsupervised Evaluation Method of Relative Coordination Degree from Group Perspective | ChengHan Zhang | Workshop Paper (AI-Driven TSP) |
|||
1571078730 | A Method for Quantitative Object De-Identification Analysis of Anonymized Video | Deok-Han Kim; Yujun Kim; Young-Gab Kim | Workshop Paper (AI-Driven TSP) |
|||
1571078753 | Fair Post-Pruning Causal Decision Trees | Wenkai Chen; Hui Zhang; Chunming Yang; Bo Li; Xujian Zhao; Yin Long | Workshop Paper (AI-Driven TSP) |
|||
1571078756 | DTAME: A Interpretable and Efficient Approach for ABAC Policy Mining and Evaluation Using Decision Trees | Zejun Lan; Jianfeng Guan; Xianming Gao; Tao Feng; Kexian Liu; Jianbang Chen | Workshop Paper (AI-Driven TSP) |
|||
1571078817 | Active protection scheme of DNN intellectual property rights based on feature layer selection and hyperchaotic mapping | Xintao Duan; Yinhang Wu; Zhao Wang; Mengru Bao; Chuan Qin | Workshop Paper (AI-Driven TSP) |
|||
1571078874 | A Lightweight Privacy-Preserving and Verifiable Federated Learning-Based Protocol | Jiaqi Lei; Ke Gu; Long Cai | Workshop Paper (AI-Driven TSP) |
|||
1571079043 | BIG: A Practical Framework for Balancing the Conflict Between Group and Individual Fairness in Graph Neural Networks | Kuan Yan; Dmytro Matsypura; Junbin Gao | Workshop Paper (AI-Driven TSP) |
|||
1571079055 | ASK-LTL Checker: A Tailored Model Checker for Linear Temporal Logic of CPN State Space | Jing Li; T. Sun; Wenjie Zhong | Workshop Paper (AI-Driven TSP) |
|||
1571079078 | A Vulnerability Detection Method for Intermediate Code Based on a Relational Dependency Graph | Chongjun Tang; Bing Xia; Shihao Chu; Yu Dong; Wenbo Liu | Workshop Paper (AI-Driven TSP) |
|||
1571079144 | Dynamic Behavior-Based Detection Techniques For Encrypted Variant Webshells | Zelin Cui; Ning Li; Pu Dong; Shang Mengchuan; Bo Jiang; Zhigang Lu; Huamin Feng | Workshop Paper (AI-Driven TSP) |
|||
1571079167 | TrustMF: Integrating Blockchain with Matrix Factorization for Transparent and Secure Recommender Systems | Haiqian Niu; Xing Zhang; Wei Shi | Workshop Paper (AI-Driven TSP) |
|||
1571079173 | FD-WF: A Multi-tab Website Fingerprinting Attack Based on Fixed Dimensions for Tor Network | Shangnan Yin; Ruizhe Zhang; Jinfu Chen | Workshop Paper (AI-Driven TSP) |
|||
1571079185 | A Reliable Edge Server Deployment Algorithm Based on Spectral Clustering and a Deep Q-network Strategy using Multi-objective Optimization | Zhou Zhou; Taotao Yu; Mohammad Shojafar; Xia Ou; Hongbing Cheng | Workshop Paper (AI-Driven TSP) |
|||
1571079206 | A Personalized Fuzzy Method Based on Local Differential Privacy for Location Data Publication | Dan Lu; Zexiu Qin; Jing Li; Yan Wang; Degang Sun | Workshop Paper (AI-Driven TSP) |
|||
1571079222 | SSC-IDS: A Robust In-vehicle Intrusion Detection System Based on Self-Supervised Contrastive Learning | Zhuoqun Xia; Yongbin Yu; Jingjing Tan; Kejun Long | Workshop Paper (AI-Driven TSP) |
|||
1571079225 | Splitting Strategy based Secure Deduplication Scheme to resist Random Chunks Generation Attack in Cloud Storage | Xin Tang; Haixin Chen; Yiteng Zhou; Luchao Jin | Workshop Paper (AI-Driven TSP) |
|||
1571079246 | EasyDector: Using Linear Probe to Detect the Provenance of Large Language Models | Jie Zhang; Jiayuan Li; Haiqiang Fei; Lun Li; Hongsong Zhu | Workshop Paper (AI-Driven TSP) |
|||
1571079253 | NLP and Neural Networks for Insider Threat Detection | Neda Baghalizadeh Moghadam; Christopher Neal; Frédéric Cuppens; Nora Cuppens-Boulahia | Workshop Paper (AI-Driven TSP) |
|||
1571079296 | FMTD: Federated Learning-Based Multi-Angle Feature Fusion Framework for Abnormal Transaction Detection in Digital Currency | Yaru Lv; Lijun Sun; Xiao Chen | Workshop Paper (AI-Driven TSP) |
|||
1571079344 | Augmented Adversarial Evasion Attacks with Constraint Satisfaction Guarantees | Nour Alhussien; Neea Rusch; Ahmed AlEroud; Gagan Agrawal | Workshop Paper (AI-Driven TSP) |
|||
1571079498 | A Data Encryption Device in Fiber Channel Networks | Hongke Zhang; Zheng Yan | Workshop Paper (AI-Driven TSP) |
|||
1571079505 | SwordEcho: A LLM Jailbreaking Optimization Strategy Driven by Reinforcement Learning | Xuehai Tang; Wenjie Xiao; Zhongjiang Yao; Songlin Hu; Jizhong Han | Workshop Paper (AI-Driven TSP) |
|||
1571079540 | Witness Encryption based on the SAT Problem | Xingbo Wang; Yuzhu Wang; Mingwu Zhang | Workshop Paper (AI-Driven TSP) |
|||
1571079592 | 5G-PPDE: A Novel Adaptive Scaling Framework for Enhancing the Resilience of the 5G Cloud Core Network | Xinyu Huang; Xingxing Liao, Sr; Jie Yang; Wei You; Xinsheng Ji; Wenhao Wu; Shiru Min | Workshop Paper (AI-Driven TSP) |
|||
1571079654 | Optimization Method for GPU Secure Memory Integrity Trees Based on Gradient Thresholds | Shaofeng Lin; Mingshu Li; Yeping He; Qiming Zhou; Hengtai Ma; Xiaohui Wu | Workshop Paper (AI-Driven TSP) |
|||
1571079692 | Modelling GDPR-compliance based on Defeasible Logic Reasoning: Insights from Time Complexity Perspective | Naila Azam; Alex Chak; Lito Michala; Shuja Ansari; Nguyen B. Truong | Workshop Paper (AI-Driven TSP) |
|||
1571079693 | A Blockchain-based PHR Sharing Scheme with Attribute Privacy Protection | Chaohe Lu; Zhongyuan Zhongyuan Yu; Guijuan Wang; Anming Dong; Xiang Tian | Workshop Paper (AI-Driven TSP) |
|||
1571079708 | Privacy Preservation in Cloud-Based Distributed Learning through Data Encoding and Partitioning | Łukasz Krzywiecki; Krzysztof Szymaniak; Marcin Zawada | Workshop Paper (AI-Driven TSP) |
|||
1571079731 | Combining Evolutionary Learning and Window Method for Finding Short Addition Chains for Large Integers | Xiaopeng Zhao; Zhusen Liu; Jiawei Qian | Workshop Paper (AI-Driven TSP) |
|||
1571079733 | SEABA: Sample-Edge-Adaptive Backdoor Attack with Robustness and Invisibility | Benben Li; Fan Xing; Xuefeng Fan; Jixin Ma; Xiaoyi Zhou | Workshop Paper (AI-Driven TSP) |
|||
1571079738 | Honeybee-RS: Enhancing Trust through Lightweight Result Validation in Mobile Crowd Computing | Sanjay Segu Nagesh; Niroshinie Fernando; Seng W Loke; Azadeh Ghari Neiat; Pubudu Pathirana | Workshop Paper (AI-Driven TSP) |
|||
1571079749 | Backdoor Attacks Optimized through Genetic Algorithm-Driven Data Augmentation Combinations in Deep Neural Networks | Yilun Lyu; Peng Wang | Workshop Paper (AI-Driven TSP) |
|||
1571079822 | A Defensive Framework Against Adversarial Attacks on Machine Learning-Based Network Intrusion Detection Systems | Benyamin Tafreshian; Shenzhi Zhang | Workshop Paper (AI-Driven TSP) |
|||
1571079856 | ECRV: An Efficient Committee-based Consensus Protocol Leveraging the Reputation Voting Right | Yaze Li; Yaze Li | Workshop Paper (AI-Driven TSP) |
|||
1571080005 | FlexiContracts: A Novel and Efficient Scheme for Upgrading Smart Contracts in Ethereum Blockchain | Tahrim Hossain; Sakib Hassan; Faisal Haque Bappy; Muhammad Nur Yanhaona; Sarker Tanveer Ahmed Rumee; Moinul Zaber; Tariqul Islam | Workshop Paper (AI-Driven TSP) |
|||
1571080094 | An image generation approach based on differential privacy | Zhihui Wang; Zijian Li | Workshop Paper (AI-Driven TSP) |
|||
1571080135 | WAPITI - A Weighted Bayesian Method for Private Information Inference on Social Ego Networks | Hervais Simo; Michael Kreutzer | Workshop Paper (AI-Driven TSP) |
|||
1571080155 | BERT-Powered Malware Detection with Potential Regional and Contextual Features | Rama Krishna Koppanati; Mansi Yadav; Sateesh Kumar Peddoju | Workshop Paper (AI-Driven TSP) |