# | Title | Authors |
1570812587 | T2DM Data Sharing System Based on Blockchain and Attribute-Encryption | Weiqi Dai; Zhenhui Lu; Duoqiang Wang; Hai Jin; Xia Xie |
1570812607 | Shared Incentive System for Clinical Pathway | Weiqi Dai; Wenhao Zhao; Song Wu; Hai Jin; Xia Xie |
1570813190 | Leveraging Model Poisoning Attacks on License Plate Recognition Systems | Jian Chen; Yuan Gao; Yang Liu; Chen Wang; Kai Peng |
1570818682 | A Lightweight Honeynet Design Based on the Internet of Things | Xiaoyu Du; Guanying Zhou; Yujing Wang; Song Tao |
1570820604 | Dynamically Selected Mixup Machine Unlearning | Zhiwen Zhou; Ximeng Liu; Jiayin Li; Junxi Ruan; MingYuan Fan |
1570820706 | Graph Encryption for Shortest Path Queries With k Unsorted Nodes | Meng Li; Jianbo Gao; Zijian Zhang; Chaoping Fu; Chhagan Lal; Mauro Conti |
1570821381 | Differential Game Approach for Modelling and Defense of False Data Injection Attacks Targeting Energy Metering Systems | Jichao Bi; Shibo He; Fengji Luo; Jiming Chen; Da-wen Huang; Mingyang Sun |
1570821581 | TPIPD: A Robust Model for Online VPN Traffic Classification | Yongwei Meng; Haonian Wang; Tao Qin; Zhouguo Chen |
1570821895 | Smarkchain: An Amendable and Correctable Blockchain Based on Smart Markers | Chin-Tser Huang; Laurent Njilla; Tieming Geng |
1570822170 | Efficient and Highly Accurate Differentially Private Statistical Genomic Analysis Using Discrete Fourier Transform | Akito Yamamoto; Tetsuo Shibuya |
1570822197 | CNN-Based Autonomous Traffic Detection on Unknown Home Security Cameras | Shuhe Liu; Xiaolin Xu; Zhefeng Nan |
1570822381 | MATTER: A Multi-Level Attention-Enhanced Representation Learning Model for Network Intrusion Detection | Jinghong Lan; Yanan Li; Bo Li; Xudong Liu |
1570822390 | An Efficient Epsilon Selection Method for DP-ERM With Expected Accuracy Constraints | Yuzhe Li; Bo Li; Weiping Wang; Nan Liu |
1570822515 | Energy-Efficient Privacy-Preserving Time-Series Forecasting on User Health Data Streams | Muhammad Arsalan; Davide Di Matteo; Sana Imtiaz; Zainab Abbas; Vladimir Vlassov; Vadim Issakov |
1570822516 | Forgery Detection Scheme of Deep Video Frame-Rate Up-Conversion Based on Dual-Stream Multi-Scale Spatial-Temporal Representation | Qing Gu; Xiangling Ding; Dengyong Zhang; Ce Yang |
1570822521 | A longitudinal Measurement and Analysis Study of Mozi, an Evolving P2P IoT Botnet | Binglai Wang; Yafei Sang; Yongzheng Zhang; Shuhao Li; Xiaolin XU |
1570822612 | SecretHunter: A Large-Scale Secret Scanner for Public Git Repositories | Elliott Wen; Jia Wang; Jens Dietrich |
1570822665 | Implementation of One-Time Editable Blockchain Chameleon Hash Function Construction Scheme | Yixuan Qiao; Minghui Zheng; Jingyi Yang |
1570822686 | Marking Based Obfuscation Strategy to Resist Side Channel Attack in Cross-User Deduplication for Cloud Storage | Xin Tang; Xiong Chen; Ran Zhou; Linchi Sui; Tian'e Zhou |
1570822687 | SEEKER: A Root Cause Analysis Method Based on Deterministic Replay for Multi-Type Network Protocol Vulnerabilities | Runhao Liu; Bo Yu; Baosheng Wang; Jianbin Ye; Jianxin Huang; Xiangdong Kong |
1570822691 | Booting IoT Terminal Device Securely with eMMC | Ma Siyuan; Yuewu Wang; Lingguang Lei; Yingjiao Niu; Shi Haotian; Wang Jie |
1570822766 | Challenges and Approaches for Mitigating Byzantine Attacks in Federated Learning | Junyu Shi; Wei Wan; Jianrong Lu; Shengshan Hu; Leo Yu Zhang |
1570822777 | HAXSS: Hierarchical Reinforcement Learning for XSS Payload Generation | Myles Foley; Sergio Maffeis |
1570822783 | From Passive to Active: Near-Optimal DNS-Based Data Exfiltration Defense Method Based on Sticky Mechanism | Jiawen Diao; Binxing Fang; Xiang Cui; Zhongru Wang; Tian Wang; Shouyou Song |
1570822929 | Data Integrity Verification Scheme Based on Blockchain Smart Contract | Kai Zhang; He Xiao |
1570822960 | Privacy-Preserving and Verifiable Outsourcing Message Transmission and Authentication Protocol in IoT | Hongjun Li; Fanyu Kong; Jia Yu; Hanlin Zhang; Luhong Diao; Yunting Tao |
1570822969 | A Faster Blockchain Sharding Protocol for Decentralized Ledger | Liu Dongdong; Mingsheng Wang; Li Taotao; Han Ya |
1570822988 | An Enhanced MinHash Encryption Scheme for Encrypted Deduplication | Qiaowen Jia; Guanxiong Ha; Hanwei Wang; Haoyu Ma; Hang Chen |
1570822991 | IDROP: Intelligently Detecting Return-Oriented Programming Using Real-Time Execution Flow and LSTM | Li Jie; Weina Niu; Yan Ran; Duan Zhiqin; Beibei Li; Xiaosong Zhang |
1570823016 | Pyramid Copy-Move Forgery Detection Using Adversarial Optimized Self Deep Matching Network | Yaqi Liu; Chao Xia; Qiang Cai; Xin Jin |
1570823027 | Mal-Bert-GCN: Malware Detection by Combining Bert and GCN | Zhenquan Ding; Hui Xu; Yonghe Guo; Longchuan Yan; Lei Cui; Zhiyu Hao |
1570823091 | Towards Adversarial Robustness With Multidimensional Perturbations via Contrastive Learning | Chuanxi Chen; Dengpan Ye; Hao Wang; Long Tang; Yue Xu |
1570823220 | Squeezing Network Performance for Secure and Efficient PoW With Better Difficulty Adjustment | Yuhang Ding; Zihan Yang; Bo Qin; Qin Wang; Yanran Zhang; Qianhong Wu |
1570823269 | Practical Side-Channel Attack on Message Encoding in Masked Kyber | Jian Wang; Weiqiong Cao; Hua Chen; Haoyuan Li |
1570823306 | DRSN With Simple Parameter-Free Attention Module for Specific Emitter Identification | Xiuhua Wen; Chunjie Cao; Yifan Li; Yang Sun |
1570823495 | Secure Access Control for eHealth Data in Emergency Rescue Case Based on Traceable Attribute-Based Encryption | Yuan Shen; Wei Song; Changsheng Zhao; Zhiyong Peng |
1570823576 | DEEPRO: Provenance-Based APT Campaigns Detection via GNN | Na Yan; Yu Wen; Luyao Chen; Yanna Wu; Boyang Zhang; Zhaoyang Wang; Dan Meng |
1570823578 | Deceiving Learning-Based Sketches to Cause Inaccurate Frequency Estimation | Xuyang Jing; Xiaojun Cheng; Zheng Yan; Xian Li |
1570823600 | AVMiner: Expansible and Semantic-Preserving Anti-Virus Labels Mining Method | Ligeng Chen; Zhongling He; Hao Wu; Yuhang Gong; Bing Mao |
1570823640 | EnShare: Sharing Files Securely and Efficiently in the Cloud Using Enclave | Yun He; Xiaoqi Jia; Shenzhi Zhang; Lou Chitkushev |
1570823662 | Steganalysis for Small-Scale Training Image Pairs with Cover-Stego Feature Difference Model | Chao Xia; Yaqi Liu; Qingxiao Guan; Sai Ma; Yu Nan; Jiahui Fu |
1570823664 | Extending Expressive Access Policies with Privacy Features | Stefan More; Sebastian Ramacher; Lukas Alber; Marco Herzl |
1570823784 | Malicious Family Identify Combining Multi-Channel Mapping Feature Image and Fine-Tuned CNN | Chenghua Tang; Chen Zhou; Min Hu; Mengmeng Yang; Baohua Qiang |
1570823825 | Truthfully Negotiating Usage Policy for Data Sovereignty | Chunlei Yang; Yunchuan Guo; Mingjie Yu; Lingcui Zhang |
1570823849 | AutoSlicer: Automatic Program Partitioning for Securing Sensitive Data Based-On Data Dependency Analysis and Code Refactoring | Weizhong Qiang; Hao Luo |
1570823851 | Security Support on Memory Controller for Heap Memory Safety | Chaochao Zhang; Rui Hou |
1570823885 | CGDF-GNN: Cascaded GNN Fraud Detector With Dual Features Facing Imbalanced Graphs With Camouflaged Fraudsters | Qichang Wan; Peisen Wang; Xiaobing Pei |
1570824009 | Efficient SM2 Hardware Design for Digital Signature of Internet of Vehicles | Mei Yang; Chong Liu; Huiyun Li; Cuiping Shao |
1570824032 | A General Backdoor Attack to Graph Neural Networks Based on Explanation Method | Luyao Chen; Na Yan; Boyang Zhang; Zhaoyang Wang; Yu Wen; Yanfei Hu |
1570824066 | GTMS: A Gated Linear Unit Based Trust Management System for Internet of Vehicles Using Blockchain Technology | Yong Kuang; Hongyun Xu; Rui Jiang; Zhikang Liu |
1570824097 | APT Attribution for Malware Based on Time Series Shapelets | Qinqin Wang; Hanbing Yan; Rui Mei; Zhihui Han |
1570824154 | TECS: A Trust Model for VANETs Using Eigenvector Centrality and Social Metrics | Yu'ang Zhang; Yujie Song; Yu Wang; Yue Cao; Xuefeng Ren; Fei Yan |
1570824172 | Robust Secure Aggregation With Lightweight Verification for Federated Learning | Chao Huang; Yanqing Yao; Xiaojun Zhang; Da Teng; Yingdong Wang; Lei Zhou |
1570824192 | MCFM: Discover Sensitive Behavior from Encrypted Traffic in Industrial Control System | Zhishen Zhu; Junzheng Shi; Chonghua Wang; Gang Xiong; Zhiqiang Hao; Gaopeng Gou |
1570824197 | Resistance to JPEG and Imperceptibility is All Poisoning Attack Need | Tengjun Liu |
1570824198 | Efficiently Constructing Topology of Dynamic Networks | Fenghua Li; Cao Chen; Yunchuan Guo; Liang Fang; Chao Guo; Zifu Li |
1570824259 | You Cannot Fully Trust Your Device: An Empirical Study of Client-Side Certificate Validation in WPA2-Enterprise Networks | Li Song; Qiongxiao Wang; Shijie Jia; Jingqiang Lin; Linli Lu; Yanduo Fu |
1570824271 | CPGBERT: An Effective Model for Defect Detection by Learning Program Semantics via Code Property Graph | Jingqiang Liu; Xiaoxi Zhu; Chaoge Liu; Xiang Cui; Qixu Liu |
1570824302 | One-Time Rewritable Blockchain with Traitor Tracing and Bilateral Access Control | Lifeng Guo; Huide Lei; Wei Chuen Yau |
1570824366 | ProcGuard: Process Injection Behaviours Detection Using Fine-grained Analysis of API Call Chain with Deep Learning | Wang Juan; Chenjun Ma; Ziang Li; Huanyu Yuan; Jie Wang |
1570824376 | Privacy-Preserving Recommendation With Debiased Obfuscaiton | Chennan Lin; Xueyuan Zhang |
1570824385 | A Flow Attack Strategy Based on Critical Links for Cyber-Attack | Jiming Qi; Jiazheng Zhang; Qingxia Liu; Bang Wang |
1570824393 | Detecting Unknown Network Attacks With Attention Encoding and Deep Metric Learning | Chunlan Fu; Shirong Han; Gang Shen |
1570824406 | Hash Proof System With Auxiliary Inputs and Its Application | Cailing Cai; Tsz Hon Yuen; Siu Ming Yiu |
1570824455 | A Lightweight Graph-based Method to Detect Pornographic and Gambling Websites with Imperfect Datasets | Xiaoqing Ma; Chao Zheng; Zhao Li; Jiangyi Yin; Qingyun Liu; Xunxun Chen |
1570824463 | A Novel Asynchronous Evolution Opinion Dynamics Model | Xiao Xiao; Minghua Xu; Han Xu |
1570824499 | SpecRNet: Towards Faster and More Accessible Audio DeepFake Detection | Piotr Kawa; Marcin Plata; Piotr Syga |
1570824501 | A Terminal Security Authentication Protocol for Zero-Trust Satellite IoT | Minqiu Tian; Zifu Li; Fenghua Li; Jin Cao; Chao Guo |
1570824533 | DCC-Find: DNS Covert Channel Detection by Features Concatenation-Based LSTM | Dongxu Han; Ning Li; Pu Dong; Xiang Cui; Yuling Liu; Jiawen Diao |
1570824572 | To Fix or Not to Fix: A Critical Study of Crypto-Misuses in the Wild | Anna-Katharina Wickert; Lars Baumgärtner; Michael Schlichtig; Krishna Narasimhan; Mira Mezini |
1570824577 | Privacy-Preserving Robust Federated Learning With Distributed Differential Privacy | Fayao Wang; Peizhi Li; Xinyu Wei; Yunchuan Guo |
1570824580 | Bidirectional LSTM-Based Attention Mechanism for CNN Power Theft Detection | Zhuoqun Xia; Kaixin Zhou; Jingjing Tan; Hongmei Zhou |
1570824607 | An Efficient Certificateless Authentication Scheme for Satellite Internet | Tongwei Liu; Baokang Zhao; Wei Peng |
1570824642 | The Power Allocation for SWIPT-Based Cognitive Two-Way Relay Networks With Rate Fairness Consideration | Guozhong Wang; Chunling Peng; Yi Huang |
1570824699 | tTree+: A Threat Tree Model for Representing Complex Semantics | Zhitao Wu; Jingjing Hu; Xiaowei Zhang; Wei Ren |
1570824775 | Action-Manipulation Attack and Defense to \(\mathcal X\)-Armed Bandits | Zhi Luo; Youqi Li; Lixing Chen; Zichuan Xu; Pan Zhou |
1570824778 | Data Poisoning Attack to \(\mathcal{X}\)-Armed Bandits | Zhi Luo; Youqi Li; Lixing Chen; Zichuan Xu; Pan Zhou |
1570824782 | A Green Neural Network With Privacy Preservation and Interpretability | De Li; Jinyan Wang |
1570824785 | Reducing Gas Consumption of Tornado Cash and Other Smart Contracts in Ethereum | Jingyan Yang; Shang Gao; Guyue Li; Rui Song; Bin Xiao |
1570824870 | HyperMean: Effective Multidimensional Mean Estimation with Local Differential Privacy | Tao Zhang; Bowen Deng; Lele Zheng; Ze Tong; Qi Li |
1570824914 | CDGA: A GAN-based Controllable Domain Generation Algorithm | You Zhai; Jian Yang; Zixiang Wang; He Longtao; Liqun Yang; Zhoujun Li |
1570824951 | VoiceSketch: a Privacy-Preserving Voiceprint Authentication System | Baochen Yan; Rui Zhang; Zheng Yan |
1570824984 | LLDP: A Layer-wise Local Differential Privacy in Federated Learning | Qian Chen; Hongbo Wang; Zilong Wang; Jiawei Chen; Haonan Yan; Xiaodong Lin |
1570825171 | Towards Automated Detection and Prevention of Regrettable (Self-)Disclosures on Social Media | Hervais Simo; Michael Kreutzer |
1570825222 | A Quantum Inspired Differential Evolution Algorithm With Multiple Mutation Strategies | Jie Liu; Xingsheng Qin |
1570825377 | WBA: A Warping-Based Approach to Generating Imperceptible Adversarial Examples | Chengyao Hua; Shigeng Zhang; Weiping Wang; Zhankai Li; Jian Zhang |
1570825447 | Enabling Anonymous Authenticated Encryption with a Novel Anonymous Authenticated Credential Key Agreement (AACKA) | Raphael Schermann; Rainer Urian; Ronald Toegl; Holger Bock; Christian Steger |
1570826107 | Optimal Block Propagation and Incentive Mechanism for Blockchain Networks in 6G | Jinbo Wen; Xiaojun Liu; Zehui Xiong; Meng Shen; Siming Wang; Yutao Jiao; Jiawen Kang; He Li |
1570826692 | Eye-based keystroke prediction for natural texts -- a feasibility analysis | Jos¨¦ Reverte Cazorla; Jos¨¦ Mar¨ªa de Fuentes; Lorena Gonz¨¢lez-Manzano |
1570827170 | A Multidimensional Blockchain Framework For Mobile Internet of Things | Hussein Zangoti; Alex Pissinou Makki; Niki Pissinou; Abdur Rahman Bin Shahid; Omar Guerra; Joel Rodriguez |
1570827299 | "Comments Matter and The More The Better!": Improving Rumor Detection with User Comments | Yang Xu; Jie Guo; Weidong Qiu; Zheng Huang; Enes Altuncu; Shujun Li |
1570827632 | CDEdit: Redactable Blockchain with Cross-audit and Diversity Editing | Xiaofeng Chen; Ying Gao |
1570827752 | MFFAN: Multiple Features Fusion with Attention Networks for Malicious Traffic Detection | Weiqing Huang; Xinbo Han; Meng Zhang; Min Li; Haitian Yang |
1570827945 | VecSeeds: Generate fuzzing testcases from latent vectors based on VAE-GAN | Zhongyuan Qin; Wen Wang; Xin Sun; Xujian Liu; Yubo Song; Jiarong Fan; Zeru Li |
1570827964 | Adap DP-FL: Differentially Private Federated Learning with Adaptive Noise | Jie Fu; Zhili Chen; Xiao Han |
1570827973 | BieVote: A Biometric Identification Enabled Blockchain-Based Secure and Transparent Voting Framework | Md Jobair Hossain Faruk; Mazharul Islam; Fazlul Alam; Hossain Shahriar; Akond Rahman; Fan Wu; Md Zakirul Alam Bhuiyan |
1570827984 | CPDT: A copyright-preserving data trading scheme based on smart contracts and perceptual hashing | Baowei Wang; Bin Li; Yi Yuan; Changyu Dai; Wu Yufeng; Zheng Weiqian |
1570828147 | Privacy-Preserving Smart Lock System for IoT-enabled Rental House Markets | Bo Wang; Lingling Wang; Hongliang Guo; Xueqin Zhao |
1570828159 | Dynamic and Diverse Transformations for Defending Against Adversarial Examples | Yongkang Chen; Ming Zhang; Jin Li; Xiaohui Kuang; Xuhong Zhang; Han Zhang |
1570828194 | A Comparative Study on the Security of Cryptocurrency Wallets in Android System | Minfeng Qi; Zhiyu Xu; Tengyun Jiao; Sheng Wen; Yang Xiang; Gary Nan |
1570828215 | TFCFI: Transparent Forward Fine-grained Control-Flow Integrity Protection | Cairui She; Liwei Chen; Gang Shi |
1570828256 | A Hardware Security Isolation Architecture for Intelligent Accelerator | Rui Gong; Lei Wang; Wei Shi; Wei Liu; Jianfeng Zhang |
1570828261 | Kgastor: a Privacy By Design Knowledge Graph anonymized Store | Maxime Thouvenot; Olivier Cur¨¦ |
1570828275 | Improved Zero-Knowledge Proofs for Commitments from Learning Parity with Noise | Mengfan Wang; Guifang Huang; Hongmin Gao; Lei Hu |
1570828303 | An Optimized Isomorphic Design for the SM4 Block Cipher Over the Tower Field | Chuang Wang; Yan Ding; Chenlin Huang; Liantao Song |
1570828387 | Utility-Aware Privacy-Preserving Federated Learning through Information Bottleneck | Shaolong Guo; Zhou Su; Zhiyi Tian; Shui Yu |
1570828446 | FLightNER: A Federated Learning Approach to Lightweight Named-Entity Recognition | Macarious Abadeer; Wei Shi; Jean-Pierre Corriveau |
1570828458 | A cloud-edge collaboration authentication scheme based on V2G short randomizable signature | Zhuoqun Xia; Hongrui Li; Ke Gu |
1570828473 | Neural-FacTOR: Neural Representation Learning for Website Fingerprinting Attack over TOR Anonymity | Haili Sun; Yan Huang; Han Lansheng; Xiang Long; Hongle Liu |
1570828586 | DRICP: Defect Risk Identification Using Sample Category Perception | Lixia Xie; Siyu Liu; Hongyu Yang; Liang Zhang |
1570828728 | Software Side Channel Vulnerability Detection Based on Similarity Calculation and Deep Learning | Wei Sun; Zheng Yan; Xi Xu; Wenxiu Ding; Lijun Gao |
1570828766 | A Blockchain-based Privacy-Preserving Scheme for Cross-domain Authentication | Junfeng Jiang; Yujian Zhang; Junhao Li |
1570828781 | Federated Learning Scheme with Dual Security of Identity Authentication and Verification | Yuting Xu; Mang Su; JinPeng Hou; Chong Nie |
1570828782 | Zero Trust-NIDS: Extended
Multi-View Approach for Network Trace Anonymization and Auto-Encoder Convolutional Neural Network for Network Intrusion Detection |
Abeer Zaher Alalmaie; Priyadarsi Nanda; Xiangjian He |
1570828804 | Robust Document Image Forgery
Localization Against Image Blending |
Liang Weipeng; Li Dong; Rang-ding Wang; Diqun Yan; Yuanman Li |
1570828989 | Secure and efficient publicly
verifiable ridge regression outsourcing scheme |
Ou Ruan |
1570829006 | Data Analysis With Local Differential Privacy | Atsuko Miyaji; Tomoka Takahashi; Ping-Lun Wang; Tomoaki Mimoto; Tastuhiro Yamatsuki |
1570829018 | Self-Supervised Adversarial Example Detection by Disentangled Representation | Zhaoxi Zhang; Leo Yu Zhang; Xufei Zheng; Jinyu Tian; Jiantao Zhou |
1570829041 | A Dynamic Transaction Pattern Aggregation Neural Network for Money Laundering Detection | Xuejiao Luo; Xiaohui Han; Wenbo Zuo; Zhengyuan Xu; Zhiwen Wang; Xiaoming Wu |
1570829183 | HashDroid: Extraction of malicious features of Android applications based on function call graph pruning | Pengfei Liu; Weiping Wang; Hong Song; Shigeng Zhang; Yulu Hong |
1570829298 | Coverage Reliability of IoT Intrusion Detection System based on Attack-Defense Game Design | Siyu Sun; Xiaoxuan Fan; Yunzhi Xia; Chenlu Zhu; Shenghao Liu; Lingzhi Yi |
1570829314 | Source Code Vulnerability Detection Using Vulnerability Dependency Representation Graph | Hongyu Yang; Haiyun Yang; Liang Zhang; Xiang Cheng |
1570829317 | Multi-pipeline HotStuff: A High Performance Consensus for Permissioned Blockchain | Taining Cheng; Wei Zhou; Shao Wen Yao; Libo Feng; Jing He |
1570829332 | MLIA: modulated LED illumination-based adversarial attack on traffic sign recognition system for autonomous vehicle | Yixuan Shen; Yu Cheng; Yini Lin; Sicheng Long; Canjian Jiang; Danjie Li; Siyuan Dai; You Jiang; Junbin Fang; Zoe Jiang; S. m. Yiu |
1570829347 | Privacy-Preserving Top-k Spatio-Textual Similarity Join | Yiping Teng; Dongyue Jiang; Mengmeng Sun; Liang Zhao; Li Xu; Chunlong Fan |
1570829447 | Code-based encryption algorithms for generating and verifying digital signature | Aneta Poniszewska-Maranda; Kacper Pradzynski |
1570829521 | An efficient and secure scheme
of verifiable computation for Intel SGX |
Wenxiu Ding; Wei Sun; Zheng Yan; Robert Deng; Zhiguo Wan |
1570830127 | Privacy-preserving Decision Making Based on Q-Learning in Cloud Computing | Zhipeng Zhou; Dong Chenyu; Donger Mo; Peijia Zheng |
1570831171 | Intelligent Recognition method of Web application categories based on Multi-layer Simhash Algorithm | Fuji Han; Dongjun Zhu |
1570832026 | AIR-NFC: Near Field Air-Gap Covert Channel Attack | Mordechai Guri |