Paper ID Title Authors Type Final Registration Payment
1571058748 Enhancing Adversarial Robustness through Self-Supervised Confidence-Based Denoising Yongkang Chen; Tong Wang; Wei Kong; Taotao Gu; Guiling Cao; Xiaohui Kuang Research Full paper
1571060420 CTWF: Website Fingerprinting attack based on Compact Convolutional Transformer Guangfa Lyu; Jian Kong; Yinglong Chen; Fengyu Wang Research Full paper
1571064073 TransFront: Bi-path Feature Fusion for Detecting Front-running Attack in Decentralized Finance Yuheng Zhang; Guojun Wang; Peiqiang Li; Xubin Li; Wanyi Gu; Mingfei Chen; Houji Chen Research Full paper
1571065620 LSTM-Diff: A Data Generation Method for Imbalanced Insider Threat Detection Tian Tian; Yan Zhu; Ning An; Bo Jiang; Huamin Feng; Zhigang Lu Research Full paper
1571065721 Controllable Quantum Computing Privacy via Inherent Noises and Quantum Error Mitigation Keyi Ju; Hui Zhong; Xinyue Zhang; Xiaoqi Qin; Miao Pan Research Full paper
1571065796 A Knowledge Graph Completion Method Based on Gated Adaptive Fusion and Conditional Generative Adversarial Networks Zhixuan Zhang; Yanhui Zhu; Yuezhong Wu; Fangteng Man; Hao Chen; Xujian Ying Research Full paper
1571066422 Blind Signature Based Anonymous Authentication on Trust for Decentralized Mobile Crowdsourcing Wei Feng; Dongyuan Wei; Qianqian Wang Research Full paper
1571066489 MARS: Robustness Certification for Deep Network Intrusion Detectors via Multi-Order Adaptive Randomized Smoothing Mengdie Huang; Yingjun Lin; Xiaofeng Chen; Elisa Bertino Research Full paper
1571066698 Analyzing Relationship Consistency in Digital Forensic Knowledge Graphs with Graph Learning Ruoyao Xiao; Yu Luo; Frank Xu; Harshmeet Lamba; Dianxiang Xu Research Full paper
1571066740 SeChannel: A Secure and Lightweight Channel Protection Approach for TEE Systems Nan Jiang; Yuanbo Zhao; Qihang Zhou; Xiaoqi Jia; Jing Tang Research Full paper
1571066757 Scalable Client-side Encrypted Deduplication beyond Secret Sharing of the Master Key Yuchen Chen; Guanxiong Ha; Xuan Shan; Chunfu Jia Research Full paper
1571066883 Hardware assisted security gateway system: combined with FPGA shielding protection JiHong Liu; Chenyang Tu; Yifei Zhang Research Full paper
1571066912 GTree: GPU-Friendly Privacy-preserving Decision Tree Training and Inference Qifan Wang; Shujie Cui; Lei Zhou; Ye Dong; Jianli Bai; Yun Sing Koh; Giovanni Russello Research Full paper
1571067096 xIDS-EnsembleGuard: An Explainable Ensemble Learning-based Intrusion Detection System Muhammad Adil; Mian Ahmad Jan; Safayat Bin Hakim; Houbing H Song; Zhanpeng Jin Research Full paper
1571067278 DMA: A persistent threat to embedded systems isolation Jean de Bonfils Lavernelle; Pierre-Francois Bonnefoi; Benoît Gonzalvo; Damien Sauveron Research Full paper
1571067348 StegaFDS: Generative Steganography Based on First-Order DPM-Solver Chengyu Li; Weihai Li; Zikai Xu; Nenghai Yu Research Full paper
1571067575 RTS: A Training-time Backdoor Defense Strategy Based on Weight Residual Tendency Fan Xiang; Xueyang Li; Guozhu Meng Research Full paper
1571067679 Red Team Redemption: A Structured Comparison of Open-Source Tools for Adversary Emulation Max Landauer; Klaus Mayer; Florian Skopik; Markus Wurzenberger; Manuel Kern Research Full paper
1571067780 MAXPoWR: Memory Attestation and Export in Process-based Trusted Execution Environments Hendrik Meyer zum Felde; Andrei Cosmin Aprodu Research Full paper
1571068008 Machine Learning-based Optimal Data Trading Mechanism with Randomized Privacy Protection Scheme Xiaohong Wu; Yujun Lin; Jie Tao; Yonggen Gu Research Full paper
1571068085 Trustworthiness and path regularity based contrastive learning for noisy knowledge graph error assertion detection Zhuohan Ao; Yi Wang; Ying Wang; Yu Zhan Research Full paper
1571068127 You Are as You Type: Investigating the Influence of Timestamp Accuracy on the Robustness of Keystroke Biometrics Florian Dehling; Luigi Lo Iacono; Sebastian Koch; Hannes Federrath Research Full paper
1571068301 VisualAuth: Secure Transaction Authentication and Trusted UI on COTS Android Devices Mykolai Protsenko; Albert Stark; Andreas Papon; Sandra Kostic Research Full paper
1571068369 RAG-based Cyber Threat Tracing Graph Modeling Method JongHee Jeon; Jahoon Koo; Young-Gab Kim Research Full paper
1571068515 Enhanced Privacy Policy Comprehension via Pre-trained and Retrieval-Augmented Models Xin Zhang; Bingbing Zhang; Chi Zhang; Lingbo Wei Research Full paper
1571068524 Face anti-spoofing based on multi-modal dual-stream anomaly detection Jiuyao Jing; Yu Zheng; Qi He; Chunlei Peng Research Full paper
1571068538 From Data to Action: CTI Analysis and ATT&CK Technique Correlation Duy Khanh Nguyen; HsiChing Chu; Viet Quoc Nguyen; Min-Te Sun; Kazuya Sakai; Wei-Shinn Ku Research Full paper
1571068577 Towards Privacy-aware IoT Communications: Delegable, Revocable, and Efficient Pengfei Wu; Jianfei Sun; Guoming Yang; Robert Deng Research Full paper
1571068598 RPG-Diff: Precise Adversarial Defense Based on Regional Positioning Guidance Haotian Wang; Jing Liu Research Full paper
1571068641 TrustNotify: A Lightweight Framework for Complete and Trustworthy Data Deletion Notification Distribution Qipeng Song; Ruiyun Wang; Yue Li; Yiheng Yan; Xingyue Zhu; Hui Li Research Full paper
1571068642 A Revocable Pairing-Free Certificateless Signature Scheme Based on RSA Accumulator Zhuowei Shen; Xiao Kou; Taiyao Yang; Haoqin Xu; Dongbin Wang; Shaobo Niu Research Full paper
1571068655 AdaptFL: Adaptive Client Task Allocation-Based Synchronous Federated Learning Xiaoshuang Li; Mingjun Wang; Yilong Guo; Wenxiu Ding Research Full paper
1571068661 SP2-RD2D: Secure and Privacy-Preserving Authentication and Key Agreement Protocol for D2D Relay Communication Mingjun Wang; Yixuan Liu; Wenxiu Ding Research Full paper
1571068861 Behavior Speaks Louder: Rethinking Malware Analysis Beyond Family Classification Zhang Fei; Xiaohong Li; Sen Chen; Ruitao Feng Research Full paper
1571068925 Toward Privacy-Preserving and Verifiable XGBoost Training for Horizontal Federated Learning Wei Xu; Hui Zhu; Chang Xiao; Fengwei Wang; Dengguo Feng; Hui Li Research Full paper
1571068975 Budget-Feasible Double Auction Mechanisms for Model Training Services in Federated Learning Market Ting Zhou; Hongtao Lv; Ning Liu; Lei Liu Research Full paper
1571068977 SBOM Generation Tools in the Python Ecosystem: an In-Detail Analysis Serena Cofano; Giacomo Benedetti; Matteo Dell'Amico Research Full paper
1571069013 Local Drift Correction and Attention Aggregation for Self-Organized Federated Learning Haiying Liu; Ruichun Gu; Jingyu Wang; Xiaolin Zhang; Bolin Zhang; Xuebao Li Research Full paper
1571069190 Boosting Transferability of Adversarial Examples by Joint Training and Dual Feature Mixup Mengmeng Tang; Shuhong Chen; Guojun Wang; Hanjun Li; Zhuyi Yao; Sheng Wen Research Full paper
1571069215 Vulnerabilities are collaborating to compromise your system: A network risk assessment method based on cooperative game and attack graph Xin Deng; Rui Wang; Weihong Han; Zhihong Tian Research Full paper
1571069237 Federated Unlearning for Samples Based on Adaptive Gradient Ascent of Angles Ying Hua; Hui Xia; Shuo Xu Research Full paper
1571069246 TierFlow: A Pipelined Layered BFT Consensus Protocol for Large-Scale Blockchain Yongkang Yu; Jinchun He; Xinwei Xu; Qinnan Zhang; Wangjie Qiu; Hongwei Zheng; Binghui Guo; Jin Dong Research Full paper
1571069349 Membership Inference Attacks via Dynamic Adversarial Perturbations Reduction Zehua Ding; Youliang Tian; Guorong Wang; Jinbo Xiong; Jianfeng Ma Research Full paper
1571069399 StegoFL: Using Steganography and Federated Learning to Transmit Malware Rong Wang; Liang Junchuan; Haiting Jiang; Feng Chaosheng; Chin-Chen Chang Research Full paper
1571069549 Correcting the Bound Estimation of Mohawk Mingjie Yu; Wei Jin; Fenghua Li; Yunchuan Guo; Zheng Yan; Xiao Wang; Nenghai Yu Research Full paper
1571069578 ClusterX: Adaptive Collaborative Scheduling of Layered User-Proxy Mapping to Enhance DDoS Defense in Distributed Clusters Jianbo Lin; Lin Yan; Zhi Lin; Zan Zhou; Shujie Yang Research Full paper
1571069599 OFLGI: An Optimization-based Feature-Level Gradient Inversion Attack Yongwei Lu; Xiaoyan Liang; Ruizhong Du; Junfeng Tian Research Full paper
1571069614 Front-running Attacks in Hash-Based Transaction Sharding Blockchains Yusen Wang; Jiong Lou; Zihan Wang; Jie Li Research Full paper
1571069664 VCaDID: Verifiable Credentials with Anonymous Decentralized Identities Yalan Wang; Liqun Chen; Long Meng; Christopher J.P. Newton Research Full paper
1571069672 Defending Against Backdoor Attacks through Causality-Augmented Diffusion Models for Dataset Purification Yuefeng Lai; Lizhao Wu; Lin Hui Research Full paper
1571069681 LLM4MDG: Leveraging Large Language Model to Construct Microservices Dependency Graph Jiekang Hu; Yakai Li; Zhaoxi Xiang; Luping Ma; Xiaoqi Jia; Qingjia Huang Research Full paper
1571069699 Paa-Tee: A Practical Adversarial Attack on Thermal Infrared Detectors with Temperature and Pose Adaptability Zhangchi Zhao; Jianyi Zhang; Liqun Shan; Ziyin Zhou; Kaiying Han; Xiali Hei Research Full paper
1571069890 Shapley-value-based Explanations for Cryptocurrency Blacklist Detection Feixue Yan Research Full paper
1571069948 Multi-Authority Ciphertext-Policy Attribute-based Encryption with Hidden Policy for Securing Internet-of-Vehicles Jie Cui; Jing Zhang; Lu Wei; Minghui Zhu; Hong Zhong; Geyong Min Research Full paper
1571069950 WASHADOW: Effectively Protecting WebAssembly Memory Through Virtual Machine-Aware Shadow Memory Zhuochen Jiang; Baojian Hua Research Full paper
1571069954 New Compact Construction of FHE from Cyclic Algebra LWE Yuan Liu; Licheng Wang; Yongbin Zhou Research Full paper
1571069961 Rethinking Mutation Strategies in Fuzzing Smart Contracts Jingzhang Cao; Meng Wang; Shenao Lin Research Full paper
1571069969 StrucTrans: Zero-Query Structural Adversarial Attack Transferred from Masked Autoencoders to Image Classifiers Yi Ji; Isao Echizen Research Full paper
1571069976 A Framework for Detecting Hidden Partners in App Collusion Qinchen Guan; Shaoyong Du; Kerong Wang; Yang Chunfang; Xiangyang Luo Research Full paper
1571069990 A GPU-Based Privacy-Preserving Machine Learning Acceleration Scheme Jie Hou; Zengrui Huang; Zhiyong Zhang; Wei Zhang; Lei Ju Research Full paper
1571070009 Trusted Networking for Drones: Reputation-Based Security Mechanisms for Node Access and Information Synchronization Ruizhong Du; JiaJia Kang; Jin Tian Research Full paper
1571070083 Quantifying Completeness of Reconstructed Scenarios: A Case Study on Echo Show Sarfraz Shaikh; Frank Xu Research Full paper
1571070112 Attacking High-Performance SBCs: A Generic Preprocessing Framework for EMA Debao Wang; Yiwen Gao; Jingdian Ming; Yongbin Zhou; Xian Huang Research Full paper
1571070126 A Low-cost Black-box Jailbreak Based on Custom Mapping Dictionary with Multi-round Induction Feng Wu; Weiqi Wang; Youyang Qu; Shui Yu Research Full paper
1571070172 Enhancing Consistency in Container Migration via TEE: A Secure Architecture Qingyu Gao; Liantao Song; Yan Ding Research Full paper
1571070178 CPCED: a container escape detection system based on CNI plugin Yu Hao; Xu Zhang; Dongbin Wang Research Full paper
1571070215 MIND: A Privacy-Preserving Model Inference Framework via End-Cloud Collaboration Siyuan Guan; Ziheng Hu; Guotao Xu; Yao Zhu; Bowen Zhao Research Full paper
1571070222 TTFL: Towards Trustworthy Federated Learning with Arm Confidential Computing Lizhi Sun; Jingzhou Zhu; Boyu Chang; Yixin Xu; Bo Yang; Hao Wu; Fengyuan Xu; Sheng Zhong Research Full paper
1571070280 Path Generation Method of Anti-Tracking Network based on Dynamic Asymmetric Hierarchical Architecture Zhefeng Nan; Qi Wang; Changbo Tian; Wang Yijing; Zang Tianning; Dongwei Zhu Research Full paper
1571070336 User Authentication Based on the Integration of Musical Signals and Ear Canal Acoustics Tongxi Chen; Weizhi Meng; Wenjuan Li Research Full paper
1571070542 TOScorr: Transformer-based Flow Correlation Attack on Tor Onion Service Yilin Zhu; Guang Cheng; Shunyu Zheng; Hantao Mei Research Full paper
1571070565 Enhancing Privacy-Preserving Multi-Authority Attribute-Based Encryption: Addressing Rogue-Key Attacks Under Adaptive Corruption of Authorities Jingchi Zhang; Anwitaman Datta Research Full paper
1571076492 VDPSRQ: Achieving Verifiable and Dynamic Private Spatial Range Queries over Outsourced Database Haoyang Wang; Kai Fan; Yue Quan; Fenghua Li; Hui Li Research Full paper
1571077286 CVchain: A Cross-Voting-based Low Latency Parallel Chain System Jianrong Wang; Yacong Ren; Dengcheng Hu; Qi Li; Sen Li; Xuewei Li; Xiulong Liu Research Full paper
1571077514 DPFCIL: Differentially Private Federated Class-Incremental Learning on non-IID Data Fuyao Zhang; Dan Wang; Chuyang Liang Research Full paper
1571077683 A Semi-Fragile Reversible Watermarking for 3D Models Based on IQIM with Dual-Strategy Partition Modulation Fei Peng; Yousheng Liang; Min Long Research Full paper
1571077735 A Novel Time Series Approach to Anomaly Detection and Correction for Complex Blockchain Transaction Networks Qi Xia; Ansu Badjie; Jianbin Gao; Grace Mupoyi; Hu Xia; Isaac Obiri Research Full paper
1571077744 M-ETC: Improving Multi-task Encrypted Traffic Classification by Reducing Inter-task Interference Yuwei Xu; Xiaotian Fang; Zhengxin Xu; Kehui Song; Yali Yuan; Guang Cheng Research Full paper
1571077755 Secure Federated Learning Schemes Based on Multi-Key Homomorphic Encryption Wenxiu Ding; Hongjiang Guo; Zheng Yan; Mingjun Wang Research Full paper
1571078100 MSMP: A Centralized Shared-memory Management for Building Efficient and Reliable File Systems on Microkernels Feng He; Shijun Zhao; Dan Meng; Rui Hou Research Full paper
1571078158 Lattice-based Multi-Stage Secret Sharing 3D Secure Encryption Scheme Xu Li; Yinghao Wu; Yang Liu; Baosheng Wang; Bei Wang; Yijun Cui Research Full paper
1571078287 Efficiently Detecting DDoS in Heterogeneous Networks: A Parameter-Compressed Vertical Federated Learning approach Cao Chen; Fenghua Li; Yunchuan Guo; Zifu Li; Wenlong Kou Research Full paper
1571078296 Attack-Defense Graph Generation: Instantiating Incident Response Actions on Attack Graphs Kéren A Saint-Hilaire; Christopher Neal; Frédéric Cuppens; Nora Cuppens-Boulahia; Francesca Bassi Research Full paper
1571078454 SCENE: Shape-based Clustering for Enhanced Noise-resilient Encrypted Traffic Classification Meijie Du; Mingqi Hu; Shu Li; Zhao Li; Qingyun Liu Research Full paper
1571078652 GraySniffer: A Cliques Discovering Method for Illegal SIM Card Vendor Based on Multi-Source Data Tao Leng; Chang You; ShuangChun Luo; Junyi Liu; Yutong Zeng; Cheng Huang Research Full paper
1571078701 JASFREE: Grammar-free Program Analysis for JavaScript Bytecode Hao Jiang; Baojian Hua; Haiwei Lai; Si Wu Research Full paper
1571078778 Topic-Aware Sensitive Information Detection in Chinese Large Language Model Yalin Sun; Ruiying Lu; Kang Li; Yu Zheng Research Full paper
1571078791 SyntaxBridge: Protocol Description Transformer for Enhanced Formal Analysis of Security Protocols Liujia Cai; Tong Yu; Yumeng Li; Siqi Lu; Hanjie Dong; Guangying Cai; Guangsong Li; Yongjuan Wang Research Full paper
1571078810 UNIRE: Secure Trajectory-User Linking Model Aggregation with Knowledge Transfer Jiezhen Tang; Hui Zhu; Yandong Zheng; Junpeng Zhang; Fengwei Wang; Jiaqi Zhao; Hui Li Research Full paper
1571079088 Zephyr: A High-Performance Framework for Graph Attention Networks on Heterogeneous Data Wenxiu Ding; Muzhi Liu; Yuxuan Cai; Mingxing Chen; Zheng Yan; Mingjun Wang Research Full paper
1571079096 STGCN-Based Link Flooding Attack Detection and Mitigation in Software-Defined Network Yue Li; Runcheng Fang; Qipeng Song; Xilei Yang Research Full paper
1571079176 A Sustainable Storage Compensation Method for Consortium Blockchain-based Computing Power Trading Guangzhuo Zhu; Qian Wang; Bei Gong Research Full paper
1571079232 LayyerX: Unveiling the Hidden Layers of DoH Server via Differential Fingerprinting Yunyang Qin; Yujia Zhu; Linkang Zhang; Baiyang Li; Yong Ding; Qingyun Liu Research Full paper
1571079337 WCDGA: BERT-Based And Character-Transforming Adversarial DGA With High Anti-Detection Ability Zhujie Guan; Mengmeng Tian; Yuwei Xu; Kehui Song; Guang Cheng Research Full paper
1571079534 A high-accuracy multi-view unknown traffic identification method based on contrastive learning Yuwei Xu; Zizhi Zhu; Chufan Zhang; Kehui Song; Guang Cheng Research Full paper
1571079541 TriViewNet: Achieve Accurate Tor Hidden Service Classification by Multi-view Feature Extraction and Fusion Yuwei Xu; Jianfeng Li; Yujie Hou; Xinxu Huang; Yali Yuan; Guang Cheng Research Full paper
1571079591 Attacking High-order Masked Cryptosystem via Deep Learning-based Side-Channel Analysis Zelong Zhang; Wei Cheng; Yongbin Zhou; Zehua Qiao; Yuhan Zhao; Jian Weng Research Full paper
1571079691 Efficient and Accurate Min-entropy Estimation Based on Decision Tree for Random Number Generators Yuan Ma; Maosen Sun; Wei Wang; Tianyu Chen; Na Lv; Dongchi Han Research Full paper
1571079702 AS-FIBA: Adaptive Selective Frequency-Injection for Backdoor Attack on Deep Face Restoration Zhenbo Song; Wenhao Gao; Zhenyuan Zhang; Jianfeng Lu Research Full paper
1571079713 Towards High-Quality Electromagnetic Leakage Acquisition in Side-Channel Analysis Xiaoran Huang; Yiwen Gao; Wei Cheng; Yuejun Liu; Jingdian Ming; Yongbin Zhou; Jian Weng Research Full paper
1571079722 Multiplicative Masked M&M: An Attempt at Combined Countermeasures with Reduced Randomness Kaiyuan Li; Haruka Hirata; Daiki Miyahara; Kazuo Sakiyama; Yuko Hara-Azumi; Yang Li Research Full paper
1571079726 CertRob: Detecting PDF Malware with Certified Adversarial Robustness via Randomization Smoothing Lijun Gao; Zheng Yan Research Full paper
1571079759 EUREKHA: Enhancing User Representation for Key Hackers Identification in Underground Forums Abdoul Nasser Hassan Amadou; Anas Motii; Saida Elouardi; EL Houcine Bergou Research Full paper
1571079769 Cyber Risk Analysis on Electric Vehicle Systems via NIST CSF Spyridon Sourmelis; Weizhi Meng Research Full paper
1571079838 Few-shot Encrypted Malicious Traffic Classification via Hierarchical Semantics and Adaptive Prototype Learning Yuan Zhao; Chunhe Xia; Tianbo Wang; Mengyao Liu; Yang Li Research Full paper
1571079846 AIDE: Attack Inference Based on Heterogeneous Dependency Graphs with MITRE ATT&CK Weidong Zhou; Chunhe Xia; Feng Nan; Xinyi Pan; Tianbo Wang; Xiaojian Li Research Full paper
1571080153 From Scarcity to Clarity: Few-Shot Learning for DoH Tunnel Detection Through Prototypical Network Beibei Feng; Qi Wang; Wang Yijing; Xiaolin Xu; Zang Tianning; Jingrun Ma Research Full paper
1571087377 Towards a Robust Medical Record System: Integrating Logical Reasoning for Trustworthy Data Management Hanning Zhang; Guansheng Wang; Junwei Feng; Lei Feng; Quan Gan; Long Ji Research Full paper
1571088033 Multi-Channel Leakage Detection Based on Chi-square Test of Independence Xiaoyong Kou; Gongxuan Zhang Research Full paper
1571090338 MVSS: Blockchain Cross-shard Account Migration Based on Multi-version State Synchronization Weihan Wang; Xiulong Liu; Liyuan Ma; Hao Xu; Gaowei Shi; Juncheng Ma; Keqiu Li Research Full paper
1571039617 Designing Secret Embedding Scheme Based on Bitcoin Transactions Pattern Controlling Zheng Feng; Chunyu Xing; Chen Liang Research Paper
1571049281 Sparse Silhouette Jump: Adversarial Attack Targeted at Binary Image for Gait Privacy Protection Jiayi Li; Ke Xu; Xinghao Jiang; Tanfeng Sun Research Paper
1571058394 Perturbing Vulnerable Bytes in Packets to Generate Adversarial Samples Resisting DNN-Based Traffic Monitoring Jie Cao; Zhengxin Xu; Yunpeng Bai; Yuwei Xu; Qiao Xiang; Guang Cheng Research Paper
1571060066 Analyzing the Effectiveness of Image Preprocessing Defenses Under Runtime Constraints Niklas Bunzel; Gerrit Klause Research Paper
1571062315 Enabling Robust Android Malicious Packet Capturing and Detection via Android Kernel Mingyang Li; Weina Niu; Xinglong Chen; Jiacheng Gong; Kegang Hao; Xiaosong Zhang Research Paper
1571062440 FedSGProx: Mitigating Data Heterogeneity and Isolated Nodes in Graph Federated Learning Xutao Meng; Qingming Li; Yong Li; Li Zhou; Xiaoran Yan Research Paper
1571062795 Signcryption based on Elliptic Curve CL-PKC for Low Earth Orbit Satellite Security Networking Meiling Chen; Yuanyuan Yang; Sixu Guo; Jin Cao; Haitao Du; Li Su Research Paper
1571063457 Real-time Private Data Aggregation over Distributed Spatial-temporal Infinite Streams with Local Differential Privacy Xingxing Xiong; Shubo Liu; Xiping Liu; Xiaoguang Niu; Wenyu You Research Paper
1571064118 A Multi-hop Reasoning Framework for Cyber Threat Intelligence Knowledge Graph kai zhou; yong xie; xin liu Research Paper
1571064340 LSD Attack: Exploiting Inconsistencies between Design and Implementation of Ethereum Protocols Chenyu Li; Xiu Zhang; Xueping Liang; Xiaorui Gong Research Paper
1571064746 Detecting and Exploiting XSLT Vulnerabilities in Real-World Open Source Projects Luo Xuejia; Ximeng Liu; Hongtao Li Research Paper
1571065041 Attack Data is Not Solely Paramount: A Universal Model Extraction Enhancement Method Chuang Liang; Jie Huang Research Paper
1571065413 Lightweight Leakage-Resilient Authenticated Key Exchange for Industrial Internet of Things Wenxin Jia; Zheng Yang; Zhiqiang Ma Research Paper
1571065498 Enhancing IoT Privacy: Why DNS-over-HTTPS Alone Falls Short? Samuel Pélissier; Gianluca Anselmi; Abhishek Kumar Mishra; Anna Maria Mandalari; Mathieu Cunche Research Paper
1571065539 Enhancing Information Gathering: An Extensible Framework for Automated Metadata Extraction Arcangelo Castiglione; Raffaele Pizzolante; Francesco Palmieri Research Paper
1571065570 Active Source Inference Attack Based on Label-Flipping in Federated Learning Lening Zhang; Hui Xia Research Paper
1571065695 Research on mutual inspection of wireless IoT devices based on encrypted traffic analysis Yilin Li; Liang Wang; Lina Zuo; Shaokang Zhang; Meng Wang; Haibo Liu Research Paper
1571066077 Broader but More Efficient: Broad Learning in Power Side-channel Attacks Yilin Yang; Changhai Ou; Yongzhuang Wei; Wei Li; Yifan Fan; Xuan Shen Research Paper
1571066198 FedChain: Privacy-Preserving Blockchain-Based Federated Learning for IoT-based Healthcare Ben Othman Soufiene; Chinmay Chakraborty Research Paper
1571066225 A Universally Composable Key Management System Using Trusted Hardware Zhenghao Lu; Ding Ma; Lei Fan; Xiuzhen Chen; Yongshuai Duan; Jia Zhang Research Paper
1571066540 T-ABE: A practical ABE scheme to provide trustworthy key hosting on untrustworthy cloud Shuaishuai Chang; Yuzhe Li; Bo Li; Jinchao Zhang Research Paper
1571066620 D^2FL: Dimensional Disaster-oriented Backdoor Attack Defense Of Federated Learning Yilong Li; Jianyi Zhang; Ziyin Zhou; Zezheng Sun; Xu Ji; Zeping Li; Jiameng Han; Zhangchi Zhao Research Paper
1571066696 ConfigKG: Identify Routing Security Issues from Configurations Based on Knowledge Graph Pengfei Li; Yujing Liu; Jinshu Su; Bo Yu Research Paper
1571066708 Achieving Trusted GPU Allocation: An Empirical Study on Efficiency Changes of Deep Learning Training Tasks Ziheng Zhang; Lei Liu; Zhongmin Yan Research Paper
1571067254 BedIDS: An Effective Network Anomaly Detection Method by Fusing Behavior Evolution characteristics Zhen Liu; Changzhen Hu; Chun Shan; Junkai Yi Research Paper
1571067288 Leveraging Large Language Models for Challenge Solving in Capture-the-Flag Yuwen Zou; Yang Hong; Jingyi Xu; Lekun Liu; Wenjun Fan Research Paper
1571067298 Efficient and Verifiable Dynamic Skyline Queries in Blockchain Networks Bo Yin; Hang Chen; Binyao Xu; Mariam Suleiman Silima; Ke Gu Research Paper
1571067332 THEF: A Privacy-Preserving Framework for Transformer Inference leveraging HE and TEE Zehao Li; Jiachun Liao; Jinhao Yu; Lei Zhang Research Paper
1571067493 From Liberty to 1984: A Methodology for Systematically Deteriorating LLM Outputs through Habituation Tendencies Dong Zhang Research Paper
1571067494 Efficient FSS-based Private Statistics for Traffic Monitoring Zhichao Wang; Qi Feng; Min Luo; Xiaolin Yang; Zizhong Wei Research Paper
1571067553 Enhancing Security and Privacy in Connected and Autonomous Vehicles: A Post-Quantum Revocable Ring Signature Approach Pincan Zhao; Xinrui Zhang; Changle Li; Yuchuan Fu; F. Richard Yu Research Paper
1571067704 DMPA: A Compact and Effective Pipeline for Detecting Multiple Phishing Attacks Xiaodong Huang; GangLiang Li; ChengFeng Chen; ShouQiang Liu Research Paper
1571067962 CaptchaSAM: Segment Anything in Text-based Captchas Yijun Wang; Ziyi Zhou; Weiqi Bai; Ruijie Zhao; Xianwen Deng Research Paper
1571068143 Tibetan microblogging user data analysis and topic identification Guixian Xu; Wenhui Gao Research Paper
1571068156 Security Enhancement of UAV Swarm Empowered Downlink Transmission with Integrated Sensing and Communication Runze Dong; Buhong Wang; Jiang Weng; Kunrui Cao; Jiwei Tian; Tianhao Cheng Research Paper
1571068215 Efficient and Practical Multi-party Private Set Intersection Cardinality Protocol Shengzhe Meng; Xiaodong Wang; Zijie Lu; Bei Liang Research Paper
1571068539 Learning Robust and Repeatable Physical Camouflage for Aerial Object Detectors Zilong He; Hua Zhang Research Paper
1571068614 SimLog: System Log Anomaly Detection Method Based on Simhash Weiping Wang; Huijuan Wang; Yulu Hong; Chenyu Wang; Hong Song; Shigeng Zhang Research Paper
1571068921 Privacy Leak Detection in LLM Interactions with a User-Centric Approach Tan Su; Bingbing Zhang; Chi Zhang; Lingbo Wei Research Paper
1571069062 FREDet: Fine-Grained Malicious Traffic Detection Based on Frequency Domain Features Zekai Song; Yunpeng Li; Jian Qin; Changzhi Zhao; Dongxu Han; Yuling Liu Research Paper
1571069158 Leveraging Semi-supervised Learning for Enhancing Anomaly-based IDS in Automotive Ethernet Jia Liu; Wenjun Fan; Yifan Dai; Eng Gee Lim; Zhoujin Pan; Alexei Lisitsa Research Paper
1571069200 FedNIFW: Non-Interfering Fragmented Watermarking for Federated Deep Neural Network Haiyu Deng; Xiaocui Dang; Yanna Jiang; Xu Wang; Guangsheng Yu; Wei Ni; Ren Ping Liu Research Paper
1571069229 An Efficient and Privacy-Preserving Participant Selection Scheme based on Location in Mobile Crowdsensing Yudan Cheng; Tao Feng; Zhiquan Liu; Guo Xian; Lulu Han; Jianfeng Ma Research Paper
1571069289 Android Malware Detection Technology Based on SC-ViT and Multi-Feature Fusion Qiulong Yu; Zhiqiang Wang; Lei Ju; Sicheng Yuan; Ying Zhang Research Paper
1571069365 Secure Join and Compute in Encrypted Database Tanusree Parbat; Ayantika Chatterjee Research Paper
1571069375 NAGG: Noised graph node feature aggregations for preserving privacy Yinghao Song; Long Yan; Shengzhong Tan; Yang Li; Dazhong Li; Yulun Song Research Paper
1571069414 SBCM: Semantic-Driven Reverse Engineering Framework for Binary Code Modularization Shuang Duan; Hui Shu; Zihan Sha; Yuyao Huang Research Paper
1571069443 A Multi-Blockchain Based Anonymous Cross-Domain Authentication Scheme for Industrial Internet of Things Chengqi Hou; Wei Yang; Yu Wang; Zhiming Zhang; Shaolong Chen; Beibei Li Research Paper
1571069449 Robust Hardware Trojan Detection: Conventional Machine Learning vs. Graph Learning Approaches Liang Hong; Xingguo Guo; Zeyar Aung; Wei Hu Research Paper
1571069468 An Effective Adversarial Text Attack through a Block-Sparse Approach with Hamiltonian Insights Xiang Sun; Zhang Yaling; Yichuan Wang; Chen Zhao; DongTai Tang Research Paper
1571069523 UniTTP: A Unified Framework for Tactics, Techniques, and Procedures Mapping in Cyber Threats Jie Zhang; Hui Wen; Lun Li; Hongsong Zhu Research Paper
1571069539 Dycom: A Dynamic Community Partitioning Technique for System Audit Logs Zhaoyang Wang; Yu Wen; Yanfei Hu; Boyang Zhang; Shuailou Li; Wenbo Wang; Lisong Zhang; Dan Meng Research Paper
1571069587 Research on Optimization Enabled Deep Learning Based DDoS Attack Detection Dahai Yu; Jianming Cui; Ming Liu Research Paper
1571069606 End-to-End Speaker Anonymization Based on Location-Variable Convolution and Multi-Head Self-Attention Feiyu Zhao; Jianguo Wei; Lu Wenhuan; Yongwei Li Research Paper
1571069619 DUDPA-TATD: A Lightweight Privacy-Preserving Anomaly Traffic Detection Method for Edge Computing Scenarios Guanghan Li; Yang Wenzhong; Xiaodan Tian; Jiaren Peng Research Paper
1571069663 HFI: High-Frequency Component Injection based Invisible Image Backdoor Attack Huanlai Xing; Xuxu Li; Jing Song; Lexi Xu; Jincheng Peng; Bowen Zhao; Li Feng Research Paper
1571069679 Three-Body Problem: An Empirical Study on Smartphone-based TEEs, TEE-based Apps, and their Interactions Xianghui Dong; Yin Liu; Xuejun Yu Research Paper
1571069705 A Trust Model with Fitness-Based Clustering Scheme in FANETs Junqiao Gao; Chaklam Cheong; Mansi Zhang; Yue Cao; Tao Peng; Shahbaz Pervez Research Paper
1571069722 Security Assessment of Customizations in Android Smartwatch Firmware Yifan Yu; Ruoyan Lin; Shuang Li; Qinsheng Hou; Wenrui Diao Research Paper
1571069727 Defending Against Model Poisoning Attacks in Federated Learning via Client-guided Trust Xiangxiang Wang; Hui Xia; Yingqi Zhang Research Paper
1571069751 Who Owns the Cloud Data? Exploring a non-interactive way for secure proof of ownership Zhihuan Yang; Wenlong Tian; Ruixuan Li; Xuming Ye; Zhiyong Xu Research Paper
1571069766 Sec-Reduce: Secure Reduction of Redundant and Similar Data for Cloud Storage based on Zero-Knowledge Proof Zhihuan Yang; Wenlong Tian; Emma Zhang; Zhiyong Xu Research Paper
1571069771 Poisoning Attacks Detection of Recommender Systems Based on Cross Distillation Tian Ze Wang, None Research Paper
1571070075 Private Data Aggregation Enabling Verifiable Multisubset Dynamic Billing in Smart Grids Qian Yang; Chen Wang; Jian Shen; Yi Li; Dengzhi Liu Research Paper
1571070110 HTV: Measuring Circuit Vulnerability to Hardware Trojan Insertion Based on Node Co-activation Analysis Shuiliang Chai; Zhanhui Shi; Yanjiao Gao; Yuhao Huang; Aizhu Liu; Jie Xiao Research Paper
1571070130 BGAS: Blockchain and Group Decentralized Identifiers Assisted Authentication Scheme for UAV Networks TingYu Wang; Qiang Cao; Shihong Zou; Yueming Lu Research Paper
1571070171 EffiTaint: Boosting Sensitive Data Tracking with Accurate Taint Behavior Modeling and Efficient Access Path Optimization Haocheng Li Research Paper
1571070202 An Intelligent Affinity Strategy for Dynamic Task Scheduling in Cloud-Edge-End Collaboration Jingsen Zhang; Shoulu Hou; Yi Gong; Tao Wang; Changyuan Lan; Xiulei Liu Research Paper
1571070285 CFE: Secure Filtered Words in End-to-End Encrypted Messaging System Tran Viet Xuan Phuong; Albert Baker; Jan P Springer; Philip Huff; Tho Thi Ngoc Le Research Paper
1571070309 Custom Permission Misconfigurations in Android: A Large-Scale Security Analysis Rui Li; Wenrui Diao; Debin Gao Research Paper
1571070320 A Quiet Place: An In-Depth Study of Mobile Public-to-Private Attacks Yin Liu Research Paper
1571074020 Orchestrating Security Protection Resource for Space-Ground Integrated Networks Dongbin Chen; Yunchuan Guo; Xiao Wang; Fenghua Li; Zifu Li Research Paper
1571074030 Phase Shift Matrix Optimization and Channel Quantization Alternating in RIS-Assisted Physical Layer Key Generation Liquan Chen; Yufan Song; Wanting Ma; Tianyu Lu; Peng Zhang Research Paper
1571075925 BWG: An IOC Identification Method for Imbalanced Threat Intelligence Datasets Juncheng Lu, Sr; Yiyang Zhao; Wang Yan; Jiyuan Cui; Sanfeng Zhang Research Paper
1571076987 Network traffic anomaly detection method based on CTA-BiLSTM Wenlong Liu; Bin Wen; Mengshuai Ma; Wanrong Du Research Paper
1571077055 Decentralized and Lightweight Cross-Chain Transaction Scheme Based on Proxy Re-signature Huiying Zou; Jia Duan; Xi Liu; Wei Ren; Tao Li; Kim-Kwang Raymond Raymond Choo Research Paper
1571077342 Abstraction-Based Training for Robust Classification Models via Image Pixelation Yang Chen; Min Zhang; Min Wu Research Paper
1571077498 LLMUZZ: LLM-based seed optimization for black-box device fuzzing Guangming Gao; Shuitao Gan; Xiaofeng Wang; Shengkai Zhu Research Paper
1571077867 FCSec: An Open-source Testbed for Security Evaluation on UAV Communications Indu Chandran; Mukesh Narayana Gadde; Vipin Kizheppatt Research Paper
1571078044 SecureNet-AWMI: Safeguarding Network with Optimal Feature Selection Algorithm Ming Zhou; Zhijian Zheng; Peng Zhang; Sixue Lu; Yamin Xie; Zhongfeng Jin Research Paper
1571078187 Privacy-Preserving Multi-Soft Biometrics through Generative Adversarial Networks with Chaotic Encryption Hongying Zheng; Hongdie Li; Di Xiao; Maolan Zhang Research Paper
1571078250 FusTP-FL: Enhancing Differential Federated Learning through Personalized Layers and Data Transformation Xiong Yan; Kedong Yan; Chanying Huang; Dan Yin; Shan Xiao Research Paper
1571078274 Active Defense Research: A New Perspective Integrating Traps and Vulnerabilities Quan Hong; Yang Yu; Lvyang Zhang; Lidong Zhai Research Paper
1571078398 Hierarchical Graph-Based Feature Extraction for Enhanced Smart Contract Vulnerability Detection in Multi-Information Contract Graph Tao Fang; H Zhihao; Jiahao He; Junjie Zhou; Zhao Gansen Research Paper
1571078432 Single-sign-on Authentication with Anonymous Token and Restricted Covert Channel Zhao Zhang; ChunXiang Xu; Man Ho Au Research Paper
1571078469 DMASP: Dynamic Multi-keyword Searchable Encryption for Protected Access and Search Patterns with Differencial Privacy Yue Quan; Kai Fan; Haoyang Wang; Hui Li; Yintang Yang Research Paper
1571078729 Enhancing Graph-Based Vulnerability Detection through Standardized Deep Learning Pipelines Jiashun Hao; Young-Woo Kwon Research Paper
1571078799 Large Language Model and Behaviour Tree Based Real-world Test Scenario Generation for Autonomous Vehicles Yuliang Li; Zhonglin Hou; Hong Liu Research Paper
1571078979 OSN Bots Traffic Transformer: MAE-Based Multimodal Social Bots Behavior Pattern Mining Haonan Zhai; Ruiqi Liang; Zhenzhen Li; Zhen Li; Wei Xia; Bingxu Wang; Qingya Yang Research Paper
1571079182 Data Privacy-Preserving and Communication Efficient Federated Multilinear Compressed Learning Di Xiao; Zhuyan Yang; Maolan Zhang; Lvjun Chen Research Paper
1571079188 Enhancing Higher-Order Masking: A Faster and Secure Implementation to Mitigate Bit Interaction Leakage Jiahao Zhang; Yuejun Liu; Jingdian Ming; Yiwen Gao; Yongbin Zhou; Debao Wang Research Paper
1571079248 Towards Securing ASCON Implementation by Inner Product Masking Yuming Liu; Wei Cheng; Jihao Fan; Yongbin Zhou Research Paper
1571079249 Robust purification defense for transfer attacks based on probabilistic scheduling algorithm of pre-trained models: A model difference perspective Xinlei Liu; Jichao Xie; Tao Hu; Baolin Li; Yi Peng; Zhen Zhang Research Paper
1571079262 A Novel zk-SNARKs Method for Cross-chain Transactions in Multi-chain System Pengcheng Xia; Jingyu Wu; Yiyang Ni; Jun Li Research Paper
1571079465 LightRL-AD: A Lightweight Online Reinforcement Learning Approach for Autonomous Defense against Network Attacks Fengyuan Shi; Zhou Zhou; Jiang Guo; Renjie Li; Zhongyi Zhang; Shu Li; Qingyun Liu; Xiuguo Bao Research Paper
1571079473 Peering Through the Veil: A Segment-Based Approach for VPN Encapsulated Video Title Identification Zhenyu Xu; Xurui Ren; Yi Zhang; Guang Cheng; Hua Wu Research Paper
1571079484 TWCF: Trust Weighted Collaborative Filtering Wenting Song; Kathleen Barber Research Paper
1571079547 SPDID: A Secure and Privacy-Preserving Decentralized Identity utilizing Blockchain and PUF Yueyue He; Wenxuan Fan; Koji Inoue Research Paper
1571079614 LAPAID: A Lightweight, Adaptive and Perspicacious Active Intrusion Detection Method on Network Traffic Streams Bin Li; Li Cheng; Zhongshan Zhang; Yu Pan; Feng Yao; Renjie He Research Paper
1571079684 Individual Fair Density-peaks Clustering Based on Local Similar Center Graph and Similar Decision Matrix Yiding Tang; Zhijing Yang; YuFan Peng; Hui Zhang Research Paper
1571079728 WhisperMQTT: Lightweight Secure Communication Scheme for Subscription-Heavy MQTT Network Youbin Kim; Man-Ki Yoon Research Paper
1571079736 Research on Intelligent Joint Detection Technology for Application Privacy Behavior Compliance Ruoding Zhang; Tao Liu; Qifeng Shi; Yan Zhang; Xinrui Geng; Xiaoyi Song Research Paper
1571079739 A Reliable Encrypted Traffic Classification Method Based on Attention Mechanisms Zhijun Wu; Niu; Meng Yue Research Paper
1571079760 USB Catcher: Detection of Controlled Emissions via Conducted Compromising Emanations Yixin Zhang; Fuqiang Du; Xinge Chi; Zhiqiang Lv Research Paper
1571079771 Improving Security in Internet of Medical Things through Hierarchical Cyberattacks Classification Hong-Hanh Nguyen-Le; Nhien-An Le-Khac; Vince Noort Research Paper
1571079783 Privacy-Preserving Secure Neighbor Discovery for Wireless Networks Ahmed Mohamed Hussain; Panagiotis Papadimitratos Research Paper
1571079837 D3IR: Securing Multi-Domain Networks via Extending Depth-in-Defense Strategies Across Nested Management Domains Yaobing Xu; Yunchuan Guo; Wenlong Kou; Junhai Yang; Ziyan Zhou; Fenghua Li Research Paper
1571079985 Towards Understanding and Detecting File Types in Encrypted Files for Law Enforcement Applications Adam Hooker; Wenjian Huang; Shalini Kurumathu; Nishant Vishwamitra; Kim-Kwang Raymond Raymond Choo Research Paper
1571080007 Multi-Dimensional Data Collection Under Personalized Local Differential Privacy Kunpeng Song; Mingzhang Sun; Kui Zhou; Peng Tang; Ning Wang; Shanqing Guo Research Paper
1571080008 Interactive Verifiable Local Differential Privacy Protocols for Mean Estimation Liang Wang; Li Liu; Pei Zhan; Peng Tang; Puwen Wei; Shanqing Guo Research Paper
1571080108 Enhancing Security and Efficiency in Vehicle-to-Sensor Authentication: A Multi-Factor Approach with Cloud Assistance Xinrui Zhang; Pincan Zhao; Jason Jaskolka Research Paper
1571080150 AdvPurRec: Strengthening Network Intrusion Detection with Diffusion Model Reconstruction Against Adversarial Attacks Nour Alhussien; Ahmed AlEroud Research Paper
1571048217 A Debiasing Algorithm for Federated Learning Systems Haibin Zheng; Zhang Tianxin; Jinyin Chen Workshop Paper
(AI-Driven TSP)
1571051778 Differentially Private Graph Convolutional Networks with Privacy Amplification Yifan Sun; Meng Song Workshop Paper
(AI-Driven TSP)
1571054393 DyGCN: Dynamic Graph Convolution Network-based Anomaly Network Traffic Detection Yonghao Gu; Xiaoqing Zhang; Hao Xu Workshop Paper
(AI-Driven TSP)
1571060460 ROSE^+: A Robustness-Optimized Security Scheme Against Cascading Failures in Multipath TCP under LDDoS Attack Streams Jinquan Nie; Lejun Ji; Yirui Jiang; Yong Ma; Yuanlong Cao Workshop Paper
(AI-Driven TSP)
1571062515 A Novel Approach to Network Traffic Analysis: the HERA tool Daniela Pinto; Ivone Amorim; Eva Maia; Isabel Praça Workshop Paper
(AI-Driven TSP)
1571064693 Federated Knowledge-enhanced Graph Attention Network for Privacy-preserving Social Recommendation Xiaofei Hao; Liyuan Liu; Yimeng Wang; Fengyu Li; Wanqing Wu Workshop Paper
(AI-Driven TSP)
1571065376 Federated Learning Greedy Aggregation Optimization for Non-Independently Identically Distributed Data Bosong Zhang; Qian Sun; Hai Wang; linna zhang; danyang li Workshop Paper
(AI-Driven TSP)
1571065554 Machine Learning-Based Power Allocation Optimization Algorithm for Enhanced CR-NOMA Network Yu Fu; Bingcai Chen; Qian Ning; Kai Lin Workshop Paper
(AI-Driven TSP)
1571065694 Destruction and Reconstruction Chain: An Adaptive Adversarial Purification Framework Zeshan Pang; Shasha Guo; Xuehu Yan; Yuliang Lu Workshop Paper
(AI-Driven TSP)
1571066238 Leverage Staking with Liquid Staking Derivatives (LSDs): Opportunities and Risks Xihan Xiong; Zhipeng Wang; Xi Chen; William J Knottenbelt; Michael Huth Workshop Paper
(AI-Driven TSP)
1571066267 Chinese Adversarial Samples Generation Approach Based on Multiple Perturbation Strategies Ding Yangyang; Gaopeng Gou Workshop Paper
(AI-Driven TSP)
1571066389 Research on Adaptive Attention Dense Network Structure in Camera Source Recognition Method Haoxuan Wu; ZhiQiang Wen Workshop Paper
(AI-Driven TSP)
1571066458 Privacy Leakage Analysis Framework for Multi-Source and multimodal Data in Social Software Based on Generalized Scene Graphs Peng Wu; Jian Wang; Jincan Pan; Yang Liu Workshop Paper
(AI-Driven TSP)
1571066716 CNN-KOA-BiGRU: A high-accuracy APT detection model based on deep learning networks Chaoqin Zhang; Maoqi Sun; Guangwu Hu Workshop Paper
(AI-Driven TSP)
1571066793 VulMDS: Clone Vulnerability Detection Based On Multi-Dimensional Code Slicing Shirun Liu; Aimin Yu; Zhengkai Qin Workshop Paper
(AI-Driven TSP)
1571066992 Leveraging Large Language Models for Generating Training Datasets for Text Extraction from Thumbnails Chimezie Onwuegbuchulem; Alex S. Xu; Sarfraz Shaikh; Lin Deng Workshop Paper
(AI-Driven TSP)
Withdrawn
1571067112 Discriminating Malware Families using Partitional Clustering Pooja Mishra; Paul T Black; Adil Bagirov; Shaning Pang Workshop Paper
(AI-Driven TSP)
1571067113 F2D: Detection of Resolver DNS Hijacking based on Filtration Funnel Strateg Cong Dong Workshop Paper
(AI-Driven TSP)
1571067138 From External Similarity to Internal Consistency: An Enhanced Retrieval-Based Method for LLMs' Reliable Content Generation Wenbo Guan; Hangchen Liu; Xiaoqian Li; Jun Zhou; Yonghong Yan Workshop Paper
(AI-Driven TSP)
Withdrawn
1571067285 GNN for LORA Device Fingerprint Identification Bojun Zhang Workshop Paper
(AI-Driven TSP)
1571067591 Efficient and Secure Federated Learning via Enhanced Quantization and Encryption Chengming Zhang; Bo Tang; Yifan Bian; Bingtao Han; Yongcheng Wang; Tao Liu Workshop Paper
(AI-Driven TSP)
1571067592 A Self-Adaptive Framework for Responding to Uncertainty in Access Control Process with Deep Neural Networks Jihoon Park; Giluk Kang; Young-Gab Kim Workshop Paper
(AI-Driven TSP)
1571067642 Efficient Multi-subset Fine-grained Authorization PSI over Outsourced Encrypted Datasets Jinlong Zheng; Jia-Nan Liu; Minhua Su; Dingcheng Li; Kai He; Xueqiao Liu Workshop Paper
(AI-Driven TSP)
1571067643 Efficient DDoS Detection and Mitigation in Cloud Data Centers Using eBPF and XDP Ziyue Chen; He Kong; Ding Shuai; Quanfeng Lv; Wei Guo Workshop Paper
(AI-Driven TSP)
1571067657 A Bitcoin-Compatible Protocol for Conditional Multi-Party Payment Channels Leiyang Wei; Zhicheng Xu; Yiqiao Song; Zhekang Hu; Hongbing Cheng Workshop Paper
(AI-Driven TSP)
1571067930 Secure Microwave QR Code Communication Using Pseudo-Random Constellation Rotation Chunpeng Guo; Beiyuan Liu; Zeyang Sun; Chen Chen; Sai Xu Workshop Paper
(AI-Driven TSP)
1571067939 Research of Malware Detection Based on Persistent Homology Lu Xi; Tianchong Gao Workshop Paper
(AI-Driven TSP)
1571067945 Real-Time Localization of Zigbee Signals Using Graph Neural Network Bojun Zhang Workshop Paper
(AI-Driven TSP)
1571067995 A LLM-based agent for the automatic generation and generalization of IDS rules Hu Xiaowei; Chen Haoning; Huaifeng Bao; Wen Wang; Feng Liu Workshop Paper
(AI-Driven TSP)
1571068048 Human Action Recognition by Invisible Sensing with the Constraint of Privacy Preservation Jun Guo, Sr.; Minjuan Sun; Weiwei Zhang; Baoying Liu; Anwen Wang; Li Liu Workshop Paper
(AI-Driven TSP)
1571068093 Investigating Patterns of Adversarial Techniques for Cyberattack Forensics Liming Lu; Zhenlin Yu Workshop Paper
(AI-Driven TSP)
1571068157 Verifiable Cloud-Assisted Multi-Party Private Set Intersection Cardinality Gongli Li; Weichen Liu; Lu Li; Hongzhi Lei Workshop Paper
(AI-Driven TSP)
1571068189 A Federated Learning Scheme with Adaptive Hierarchical Protection and Multiple Aggregation Zhiqiang Wang; Ziqing Tian; Xinyue Yu Workshop Paper
(AI-Driven TSP)
1571068201 Dynamic Ensemble with Boundary Augmentation for Enhancing Network Intrusion Detection Huajuan Ren; Yonghe Tang; Shuai Ren; Ruimin Wang; Weiyu Dong; Liehui Jiang Workshop Paper
(AI-Driven TSP)
1571068349 Contextual Transformer-based Node Embedding for Vulnerability Detection using Graph Learning Joseph Gear; Yue Xu; Ernest Foo; Praveen Gauravaram; Zahra Jadidi; Leonie R Simpson Workshop Paper
(AI-Driven TSP)
1571068394 Traceable AI-driven Avatars Using Multi-factors of Physical World and Metaverse Kedi Yang; Zhenyong Zhang; Youliang Tian Workshop Paper
(AI-Driven TSP)
1571068418 Improved Rectangle and Linear Attacks on Lightweight Block Cipher WARP Yaxin Cui; Hong Xu; Zhichao Xu Workshop Paper
(AI-Driven TSP)
1571068431 Lightweight Privacy-Preserving Anomaly Detection for Time Series Based on Federated Learning Bin Jiang; Guangfeng Wang Workshop Paper
(AI-Driven TSP)
1571068509 A Self-Supervised Targeted Process Anomaly Detection Method Based on the Minimum Set of Observed Events Haojun Xia; Limin Sun; Wenliang Liu; Jingyi Xie; Zhanwei Song; Bibo Tu Workshop Paper
(AI-Driven TSP)
1571068510 Ru-PCFG: Password Guessing Model combining PCFG and Word Transformation Li Yang; Yong Li; Chi Chen Workshop Paper
(AI-Driven TSP)
1571068546 GeMuFuzz: Integrating Generative and Mutational Fuzzing with Deep Learning Yuqi Zhai; Rui Ma; Zheng Zhang; Yuche Yang; Siqi Zhao; Hongming Chen Workshop Paper
(AI-Driven TSP)
1571068589 A Dual Defense Design Against Data Poisoning Attacks in Deep Learning-Based Recommendation Systems Xiaocui Dang; Priyadarsi Nanda; Manoranjan Mohanty; Haiyu Deng Workshop Paper
(AI-Driven TSP)
1571068590 A Cross-Site Scripting Attack Protection Framework Based on Managed Proxy Cheng Tang; Guozhen Cheng; Hao Liang; Wenyan Liu; Ming Liu; Qingfeng Wang Workshop Paper
(AI-Driven TSP)
1571068603 IoT Device Fingerprinting From Periodic Traffic Using Locality-Sensitive Hashing Jianhui Ming; Weiping Wang; Linlin Zhang; Yingjie Hu; Shigeng Zhang Workshop Paper
(AI-Driven TSP)
1571068650 TerrARA: Automated Security Threat Modeling for Infrastructure as Code Anh-Duy Tran; Laurens Sion; Koen Yskout; Wouter Joosen Workshop Paper
(AI-Driven TSP)
1571068751 DDF-Net: A Cloud Computing Load Forecasting Method Integrating Spatiotemporal and Time-Frequency Domain Information YingJian Li; Yongsheng Wang; Gang Wang Workshop Paper
(AI-Driven TSP)
1571068979 Model Calibration for Improving Membership Inference Attacks in Graph Neural Networks Lixia Xie; Jingchen Shi; Hongyu Yang; Ze Hu; Xiang Cheng Workshop Paper
(AI-Driven TSP)
1571069010 scE(match): Privacy-Preserving Cluster Matching of Single-Cell Data Johannes Lohmöller; Jannis Scheiber; Rafael Kramann; Klaus Wehrle; Sikander Hayat; Jan Pennekamp Workshop Paper
(AI-Driven TSP)
1571069054 Block-Feature Fusion for Privacy-Protected Iris Recognition Wiraj Udara Wickramaarachchi; Dongdong Zhao; Junwei Zhou; Jianwen Xiang Workshop Paper
(AI-Driven TSP)
1571069251 CFB-DSSE: Efficient Secure Dynamic Searchable Encryption Scheme with Conjunctive Search for Smart Healthcare Hou Ruiwei; Fu-cai Zhou; Zongye Zhang; Jiacheng Li; Chongyang Wang Workshop Paper
(AI-Driven TSP)
1571069267 CVALLM: A Cloud Platform Security Assessment Framework Based on Large Language Models Wangyuan Jing; Chi Zhang; Bingbing Zhang; Lingbo Wei Workshop Paper
(AI-Driven TSP)
1571069335 A Cross-domain Data Sharing Scheme Based on Federated Blockchain Honglin Mao; Jie Zhang; Yao Zhang; Xiaohong Li Workshop Paper
(AI-Driven TSP)
1571069364 BTTCondor: Blockchain-Based Traceable Self-Tallying Condorcet Voting Protocol Zixuan Liu; Zijian Bao; Yong Zhou; Lan Hezheng; Hong Lei Workshop Paper
(AI-Driven TSP)
1571069371 Compressed Video Action Recognition Based on Neural Video Compression Yuting Mou; Ke Xu; Xinghao Jiang; Tanfeng Sun Workshop Paper
(AI-Driven TSP)
1571069444 Construction of Cyber-attack Aattribution Framework Based on LLMs Jinye Zhang; Ken Cheng; Xinli Xiong; Rongcheng Dong; She Jie Workshop Paper
(AI-Driven TSP)
1571069564 Malware Detection Based on Multi-Modal Features Lexin Jia; Xiangyi Wang; Jian Zhang; Wenyuen Zhao Workshop Paper
(AI-Driven TSP)
1571069568 Stabilizing Node Selection in Committee-Based Permissionless Blockchain Yuehua Wu; Feihu Yan; Yunxiao Wang; Wenzhi Chen Workshop Paper
(AI-Driven TSP)
1571069575 Logical Vulnerability Discovery Framework for Container Runtimes Beixi Fan; Weijie Liu; Ximeng Liu; Tian Zhang; Yingkang Huang; Hongtao Li Workshop Paper
(AI-Driven TSP)
Withdrawn
1571069593 SGCML: Detecting Hacker Community Hidden in Chat Group Tao Leng; Junyi Liu; Yang Zhen; Chang You; Yutong Zeng; Cheng Huang Workshop Paper
(AI-Driven TSP)
1571069622 HFL-AD: A Hierarchical Federated Learning Framework for Solving Data Contamination in DDoS Detection Haishi Huang; Jiaping Gui; Jianan Hong; Cunqing Hua Workshop Paper
(AI-Driven TSP)
1571069633 DA-CPVD: Vulnerability Detection Method Based on Dual Attention Composite Pooling Jinfu Chen; Mengxuan Shi; Saihua Cai; Ziyan Liu; Jiapeng Zhou Workshop Paper
(AI-Driven TSP)
1571069686 Cyber Resilience Framework for Web Server Wanqiu Zhou Workshop Paper
(AI-Driven TSP)
1571069725 DI-GAE: A Dynamic and Resource-Efficient Attack Detection Framework with Incremental Learning and Graph Autoencoders Mengmi Tan; Jianyi Liu; Ru Zhang Workshop Paper
(AI-Driven TSP)
1571069733 A High-Capacity Reversible Data Hiding for Encrypted JPEG Images Based on Multi-Domain Embedding Jiafu Qu; Xiaoyi Zhou; JinJiang Hu; Jixin Ma Workshop Paper
(AI-Driven TSP)
1571069740 Robust and Privacy-preserving Federated Learning Yingqi Zhang; Hui Xia; Shuo Xu Workshop Paper
(AI-Driven TSP)
1571069897 Improved Packet-Level Synthetic Network Traffic Generation Jacob Soper; Yue Xu; Ernest Foo; Zahra Jadidi; Kien N Thanh Workshop Paper
(AI-Driven TSP)
1571069925 Detectable Mislabeling - Can Faulty AI Models be Recognized from Incomplete Memory Traces? Łukasz Krzywiecki; Tadeusz Kulczycki; Christian Emmanuel Nteranya; Andrzej Stos Workshop Paper
(AI-Driven TSP)
1571069951 SAMOC: Enabling Atomic Invocations for Cross-chain Crowdsourcing Testing DApps in Industrial Control Through Trusted Smart Community and Lock Mechanism Weiguo Huang; Yong Ding; Jun Li; Yujue Wang; Hai Liang; Changsong Yang Workshop Paper
(AI-Driven TSP)
1571069962 ZKPB-Lite: An Optimized ZKMB for Efficient and Privacy-Preserving Encrypted Malicious Traffic Detection Yi Xu; Yijun Mo; Hang Su; HuiYu Liu Workshop Paper
(AI-Driven TSP)
1571069965 Trustworthy Analysis of Drain3-based Cold Storage Behavior in Judicial Depository Scenarios Xiangyu Meng; Xuejun Yu Workshop Paper
(AI-Driven TSP)
1571069973 FCADD: Robust Watermarking Resisting JPEG Compression with Frequency Channel Attention and Distortion De-gradient Dong Yang; Weihai Li; Zikai Xu; Zhiling Zhang; Yiling Chen Workshop Paper
(AI-Driven TSP)
1571070022 A Large Language Model for Adversarial Suffix Jailbreak Based on Adjustable-Position Attack Xuehai Tang; Xikang Yang; Zhongjiang Yao; Jie Wen; Xi Zhou; Jizhong Han; Songlin Hu Workshop Paper
(AI-Driven TSP)
1571070027 Transfer Learning-Based Robust Insider Threat Detection Yujun Kim; Deok-Han Kim; Young-Gab Kim Workshop Paper
(AI-Driven TSP)
1571070039 Privacy-Preserving Real-Time Gesture Recognition using Cloud-Trained Neural Networks Kewin Ignasiak; Wojciech Kowalczyk; Łukasz Krzywiecki; Mateusz Nasewicz; Hannes Salin; Marcin Zawada Workshop Paper
(AI-Driven TSP)
1571070058 An Efficient and Secure Anonymous Query Protocol H; Yin Li Workshop Paper
(AI-Driven TSP)
1571070066 Exploring Permission Control Flaws in Mini-apps Jun Li; Yuting Zhang; Wu Zhou; Shenzhi Zhang Workshop Paper
(AI-Driven TSP)
1571070073 Tighter Bounds for Guessing Entropy in Side-channel Template Attacks Jinyuan Zhang; Changhai Ou; Jiawei Zhang; Jiangshan Long; Renjun Zhang Workshop Paper
(AI-Driven TSP)
1571070093 Maldet: An Automated Malicious npm Package Detector Based on Behavior Characteristics and Attack Vectors Yu Zhang; Haipeng Qu; Lingyun Ying Workshop Paper
(AI-Driven TSP)
1571070108 An Adaptive Reputation Update Mechanism for Primary Nodes in PBFT Limin Yu; Yongdong Wu; Tong LI; Jiao Lu Workshop Paper
(AI-Driven TSP)
1571070118 Transistor-Level A2 Trojan Detection Based on Anomaly Detection Methods Jialong Song; Jianming Zhang; Xing Hu; Yang Zhang; Xiaowen Chen; Zhenghao Li; Jinhui Tan Workshop Paper
(AI-Driven TSP)
1571070132 DTGAN: Diverse-Task Generative Adversarial Networks for Intrusion Detection Systems Against Adversarial Examples Yiyang Wang; Wuxia Bai; Kai Chen Workshop Paper
(AI-Driven TSP)
1571070150 High Concealment Attack and Network Intrusion: An Overview Shituo Ma; Wei Xia; Zhen Li; Zhenzhen Li; Gang Xiong; Gaopeng Gou Workshop Paper
(AI-Driven TSP)
1571070158 Privacy-aware data aggregation using Functional Encryption Sehrish Shafeeq; Mathias Fischer Workshop Paper
(AI-Driven TSP)
1571070162 Multi-Leader Multi-Follower Stackelberg Game Based Defense Strategies Optimization for Interdependent Systems Ao Wang; Jiaqi Li; Yang Zhao; Bin Sun; Lidong Zhai Workshop Paper
(AI-Driven TSP)
1571070203 Evaluating Web-Based Privacy Controls: A User Study on Expectations and Preferences Yuemeng Yin; Rahat Masood; Suranga Seneviratne; Aruna Seneviratne Workshop Paper
(AI-Driven TSP)
1571070212 FMCAformer: Frequency domain multi-channel fusion representation for gunshot recognition XingKun Shao Workshop Paper
(AI-Driven TSP)
1571070282 ContraEHGT: An Evolving Heterogeneous Graph Transformer for Insider Threat Detection based on Contrastive Learning Yinhao Qi; Zehui Wang; Xinghu Han; Yuan Yao; Chen Zhang; Bo Jiang; Zhigang Lu Workshop Paper
(AI-Driven TSP)
1571070291 High-Capacity and High-Security Data Hiding in Encrypted Image Using Image Filtering and Image Blocking Peng Yan Xiang; Tao Zhang; Hao Ja Liu; Bo Xin Zhang; Yu Zhang Workshop Paper
(AI-Driven TSP)
1571070295 Rabbit: Secure Encrypted Property Graph Search Scheme Supporting Data and Key Updates Yingying Wu; Jiabei Wang; Dandan Xu; Yongbin Zhou; Yang Wang Workshop Paper
(AI-Driven TSP)
1571070297 Malware Traffic Classification Based on Multidimensional Features Learning Yijie Huang; Wei Ding; Mian Huang Workshop Paper
(AI-Driven TSP)
1571070847 Cross-platform Network User Alignment Interference Methods Based on Obfuscation Strategy Luyao Wang; Yan Liu; Xiaoyu Guo; Ziqi Long Workshop Paper
(AI-Driven TSP)
1571071874 Model-based Data Markets: A Multi-Broker Game Theoretic Approach Yizhou Ma; Xikun Jiang; Wenbo Wu; Luis-Daniel Ibáñez; Jian Shi Workshop Paper
(AI-Driven TSP)
1571072409 Human Behavior Recognition in Retail Environments with Graph-Driven RFID Signal Embedding Bojun Zhang Workshop Paper
(AI-Driven TSP)
1571075461 ADIoT: An Anomaly Detection Model for IoT Devices Based on Behavioral Feature Analysis Liang Wang; Zhipeng Wang; Lina Zuo Workshop Paper
(AI-Driven TSP)
1571077193 Enhancing Model Robustness and Accuracy under Composite Adversarial Perturbations via LBGAT Chunlong Fan; Wanyan Guo; Li Xu; Wenhao Wang Workshop Paper
(AI-Driven TSP)
1571077444 Research on Toxic Speech Detection Based on Large Language Models Weihao W Li; Gao Yongbing; Zhang Yu; Yang Lidong; Gao Ruiping Workshop Paper
(AI-Driven TSP)
1571077506 Detection of Sensitive Information Based on Transient Data in Store Buffer and Cache Yan Chang; Yaqin Wu; Jianwu Rui; Ming Cao; Yawei Yue; Yu Feng; Tingting He; Haihui Gao; Zhen Lv Workshop Paper
(AI-Driven TSP)
1571077724 ZKFDT: A Fair Exchange Scheme for Data Trading Based on Efficient Zero-Knowledge Proofs Jian Wei Liu; Wei Wan; Chun Long; Jing Li; Fan Yang; Yuhao Fu Workshop Paper
(AI-Driven TSP)
1571078045 MTD-Net: Boosting Robustness of Edge Intelligent Networks with Moving Target Defense Zeshan Pang; Shasha Guo; Yuyuan Sun; Xuehu Yan; Yuliang Lu Workshop Paper
(AI-Driven TSP)
1571078074 A Subtly Designed Method with Rényi Divergence for Sequence and Label Protection in Large Language Models, Balancing Privacy and Utility Siyi Zhang; Xiaoyan Liang; Ruizhong Du; Jian Geng Workshop Paper
(AI-Driven TSP)
1571078135 Dynamic Differential Privacy in Hierarchical Federated Learning: A Layerwise Adaptive Framework Zhongyuan Qin; Wang Dinglian; Minghua Wang Workshop Paper
(AI-Driven TSP)
1571078170 Smart Contract-Based Auditing of Edge Data for Vehicular Networks Yu Zhao; Yangguang Tian; Chunbo Wang; Xiaoqiang Di; Hui Qi Workshop Paper
(AI-Driven TSP)
1571078182 TIEBN: Trust Improvement Eigenvalue Blockchain Network for Anomaly Detection Qi Xia; Grace Mupoyi; Jianbin Gao; Ansu Badjie; Edson Eliezer da Silva Tavares; Patrick Mukala Workshop Paper
(AI-Driven TSP)
1571078196 Detecting V2Ray Traffic with Multimodal Deep Learning Can Chen; Dongbin Wang; Dongchao Zhou; Yongfeng Tan; Dongzhe Wu Workshop Paper
(AI-Driven TSP)
1571078322 OHSS: Optimizing Homomorphic Secret Sharing to Support Fast Matrix Multiplication Shuguang Zhang; Jianli Bai Workshop Paper
(AI-Driven TSP)
1571078327 Two-Stage Federated Learning Strategy for Fairness and Security in Vehicular Networks Xin Zhang; Chao Guo; Buxin Guo Workshop Paper
(AI-Driven TSP)
1571078384 DcChain: A Novel Blockchain Sharding Method Based on Dual-constraint Label Propagating Pengcheng Xia; Hao Zhou; Yiyang Ni; Jun Li Workshop Paper
(AI-Driven TSP)
1571078557 Intelligent charging service selection scheme under the cross-area consensus of the blockchain for the Internet of vehicles Shuming Xiong; Zhu Jun Feng; QiQi Xu Workshop Paper
(AI-Driven TSP)
1571078673 Unsupervised Evaluation Method of Relative Coordination Degree from Group Perspective ChengHan Zhang Workshop Paper
(AI-Driven TSP)
1571078730 A Method for Quantitative Object De-Identification Analysis of Anonymized Video Deok-Han Kim; Yujun Kim; Young-Gab Kim Workshop Paper
(AI-Driven TSP)
1571078753 Fair Post-Pruning Causal Decision Trees Wenkai Chen; Hui Zhang; Chunming Yang; Bo Li; Xujian Zhao; Yin Long Workshop Paper
(AI-Driven TSP)
1571078756 DTAME: A Interpretable and Efficient Approach for ABAC Policy Mining and Evaluation Using Decision Trees Zejun Lan; Jianfeng Guan; Xianming Gao; Tao Feng; Kexian Liu; Jianbang Chen Workshop Paper
(AI-Driven TSP)
1571078817 Active protection scheme of DNN intellectual property rights based on feature layer selection and hyperchaotic mapping Xintao Duan; Yinhang Wu; Zhao Wang; Mengru Bao; Chuan Qin Workshop Paper
(AI-Driven TSP)
1571078874 A Lightweight Privacy-Preserving and Verifiable Federated Learning-Based Protocol Jiaqi Lei; Ke Gu; Long Cai Workshop Paper
(AI-Driven TSP)
1571079043 BIG: A Practical Framework for Balancing the Conflict Between Group and Individual Fairness in Graph Neural Networks Kuan Yan; Dmytro Matsypura; Junbin Gao Workshop Paper
(AI-Driven TSP)
1571079055 ASK-LTL Checker: A Tailored Model Checker for Linear Temporal Logic of CPN State Space Jing Li; T. Sun; Wenjie Zhong Workshop Paper
(AI-Driven TSP)
1571079078 A Vulnerability Detection Method for Intermediate Code Based on a Relational Dependency Graph Chongjun Tang; Bing Xia; Shihao Chu; Yu Dong; Wenbo Liu Workshop Paper
(AI-Driven TSP)
1571079144 Dynamic Behavior-Based Detection Techniques For Encrypted Variant Webshells Zelin Cui; Ning Li; Pu Dong; Shang Mengchuan; Bo Jiang; Zhigang Lu; Huamin Feng Workshop Paper
(AI-Driven TSP)
1571079167 TrustMF: Integrating Blockchain with Matrix Factorization for Transparent and Secure Recommender Systems Haiqian Niu; Xing Zhang; Wei Shi Workshop Paper
(AI-Driven TSP)
1571079173 FD-WF: A Multi-tab Website Fingerprinting Attack Based on Fixed Dimensions for Tor Network Shangnan Yin; Ruizhe Zhang; Jinfu Chen Workshop Paper
(AI-Driven TSP)
1571079185 A Reliable Edge Server Deployment Algorithm Based on Spectral Clustering and a Deep Q-network Strategy using Multi-objective Optimization Zhou Zhou; Taotao Yu; Mohammad Shojafar; Xia Ou; Hongbing Cheng Workshop Paper
(AI-Driven TSP)
1571079206 A Personalized Fuzzy Method Based on Local Differential Privacy for Location Data Publication Dan Lu; Zexiu Qin; Jing Li; Yan Wang; Degang Sun Workshop Paper
(AI-Driven TSP)
1571079222 SSC-IDS: A Robust In-vehicle Intrusion Detection System Based on Self-Supervised Contrastive Learning Zhuoqun Xia; Yongbin Yu; Jingjing Tan; Kejun Long Workshop Paper
(AI-Driven TSP)
1571079225 Splitting Strategy based Secure Deduplication Scheme to resist Random Chunks Generation Attack in Cloud Storage Xin Tang; Haixin Chen; Yiteng Zhou; Luchao Jin Workshop Paper
(AI-Driven TSP)
1571079246 EasyDector: Using Linear Probe to Detect the Provenance of Large Language Models Jie Zhang; Jiayuan Li; Haiqiang Fei; Lun Li; Hongsong Zhu Workshop Paper
(AI-Driven TSP)
1571079253 NLP and Neural Networks for Insider Threat Detection Neda Baghalizadeh Moghadam; Christopher Neal; Frédéric Cuppens; Nora Cuppens-Boulahia Workshop Paper
(AI-Driven TSP)
1571079296 FMTD: Federated Learning-Based Multi-Angle Feature Fusion Framework for Abnormal Transaction Detection in Digital Currency Yaru Lv; Lijun Sun; Xiao Chen Workshop Paper
(AI-Driven TSP)
1571079344 Augmented Adversarial Evasion Attacks with Constraint Satisfaction Guarantees Nour Alhussien; Neea Rusch; Ahmed AlEroud; Gagan Agrawal Workshop Paper
(AI-Driven TSP)
1571079498 A Data Encryption Device in Fiber Channel Networks Hongke Zhang; Zheng Yan Workshop Paper
(AI-Driven TSP)
1571079505 SwordEcho: A LLM Jailbreaking Optimization Strategy Driven by Reinforcement Learning Xuehai Tang; Wenjie Xiao; Zhongjiang Yao; Songlin Hu; Jizhong Han Workshop Paper
(AI-Driven TSP)
1571079540 Witness Encryption based on the SAT Problem Xingbo Wang; Yuzhu Wang; Mingwu Zhang Workshop Paper
(AI-Driven TSP)
1571079592 5G-PPDE: A Novel Adaptive Scaling Framework for Enhancing the Resilience of the 5G Cloud Core Network Xinyu Huang; Xingxing Liao, Sr; Jie Yang; Wei You; Xinsheng Ji; Wenhao Wu; Shiru Min Workshop Paper
(AI-Driven TSP)
1571079654 Optimization Method for GPU Secure Memory Integrity Trees Based on Gradient Thresholds Shaofeng Lin; Mingshu Li; Yeping He; Qiming Zhou; Hengtai Ma; Xiaohui Wu Workshop Paper
(AI-Driven TSP)
1571079692 Modelling GDPR-compliance based on Defeasible Logic Reasoning: Insights from Time Complexity Perspective Naila Azam; Alex Chak; Lito Michala; Shuja Ansari; Nguyen B. Truong Workshop Paper
(AI-Driven TSP)
1571079693 A Blockchain-based PHR Sharing Scheme with Attribute Privacy Protection Chaohe Lu; Zhongyuan Zhongyuan Yu; Guijuan Wang; Anming Dong; Xiang Tian Workshop Paper
(AI-Driven TSP)
1571079708 Privacy Preservation in Cloud-Based Distributed Learning through Data Encoding and Partitioning Łukasz Krzywiecki; Krzysztof Szymaniak; Marcin Zawada Workshop Paper
(AI-Driven TSP)
1571079731 Combining Evolutionary Learning and Window Method for Finding Short Addition Chains for Large Integers Xiaopeng Zhao; Zhusen Liu; Jiawei Qian Workshop Paper
(AI-Driven TSP)
1571079733 SEABA: Sample-Edge-Adaptive Backdoor Attack with Robustness and Invisibility Benben Li; Fan Xing; Xuefeng Fan; Jixin Ma; Xiaoyi Zhou Workshop Paper
(AI-Driven TSP)
1571079738 Honeybee-RS: Enhancing Trust through Lightweight Result Validation in Mobile Crowd Computing Sanjay Segu Nagesh; Niroshinie Fernando; Seng W Loke; Azadeh Ghari Neiat; Pubudu Pathirana Workshop Paper
(AI-Driven TSP)
1571079749 Backdoor Attacks Optimized through Genetic Algorithm-Driven Data Augmentation Combinations in Deep Neural Networks Yilun Lyu; Peng Wang Workshop Paper
(AI-Driven TSP)
1571079822 A Defensive Framework Against Adversarial Attacks on Machine Learning-Based Network Intrusion Detection Systems Benyamin Tafreshian; Shenzhi Zhang Workshop Paper
(AI-Driven TSP)
1571079856 ECRV: An Efficient Committee-based Consensus Protocol Leveraging the Reputation Voting Right Yaze Li; Yaze Li Workshop Paper
(AI-Driven TSP)
1571080005 FlexiContracts: A Novel and Efficient Scheme for Upgrading Smart Contracts in Ethereum Blockchain Tahrim Hossain; Sakib Hassan; Faisal Haque Bappy; Muhammad Nur Yanhaona; Sarker Tanveer Ahmed Rumee; Moinul Zaber; Tariqul Islam Workshop Paper
(AI-Driven TSP)
1571080094 An image generation approach based on differential privacy Zhihui Wang; Zijian Li Workshop Paper
(AI-Driven TSP)
1571080135 WAPITI - A Weighted Bayesian Method for Private Information Inference on Social Ego Networks Hervais Simo; Michael Kreutzer Workshop Paper
(AI-Driven TSP)
1571080155 BERT-Powered Malware Detection with Potential Regional and Contextual Features Rama Krishna Koppanati; Mansi Yadav; Sateesh Kumar Peddoju Workshop Paper
(AI-Driven TSP)