# Title Authors
1570812587 T2DM Data Sharing System Based on Blockchain and Attribute-Encryption Weiqi Dai; Zhenhui Lu; Duoqiang Wang; Hai Jin; Xia Xie
1570812607 Shared Incentive System for Clinical Pathway Weiqi Dai; Wenhao Zhao; Song Wu; Hai Jin; Xia Xie
1570813190 Leveraging Model Poisoning Attacks on License Plate Recognition Systems Jian Chen; Yuan Gao; Yang Liu; Chen Wang; Kai Peng
1570818682 A Lightweight Honeynet Design Based on the Internet of Things Xiaoyu Du; Guanying Zhou; Yujing Wang; Song Tao
1570820604 Dynamically Selected Mixup Machine Unlearning Zhiwen Zhou; Ximeng Liu; Jiayin Li; Junxi Ruan; MingYuan Fan
1570820706 Graph Encryption for Shortest Path Queries With k Unsorted Nodes Meng Li; Jianbo Gao; Zijian Zhang; Chaoping Fu; Chhagan Lal; Mauro Conti
1570821381 Differential Game Approach for Modelling and Defense of False Data Injection Attacks Targeting Energy Metering Systems Jichao Bi; Shibo He; Fengji Luo; Jiming Chen; Da-wen Huang; Mingyang Sun
1570821581 TPIPD: A Robust Model for Online VPN Traffic Classification Yongwei Meng; Haonian Wang; Tao Qin; Zhouguo Chen
1570821895 Smarkchain: An Amendable and Correctable Blockchain Based on Smart Markers Chin-Tser Huang; Laurent Njilla; Tieming Geng
1570822170 Efficient and Highly Accurate Differentially Private Statistical Genomic Analysis Using Discrete Fourier Transform Akito Yamamoto; Tetsuo Shibuya
1570822197 CNN-Based Autonomous Traffic Detection on Unknown Home Security Cameras Shuhe Liu; Xiaolin Xu; Zhefeng Nan
1570822381 MATTER: A Multi-Level Attention-Enhanced Representation Learning Model for Network Intrusion Detection Jinghong Lan; Yanan Li; Bo Li; Xudong Liu
1570822390 An Efficient Epsilon Selection Method for DP-ERM With Expected Accuracy Constraints Yuzhe Li; Bo Li; Weiping Wang; Nan Liu
1570822515 Energy-Efficient Privacy-Preserving Time-Series Forecasting on User Health Data Streams Muhammad Arsalan; Davide Di Matteo; Sana Imtiaz; Zainab Abbas; Vladimir Vlassov; Vadim Issakov
1570822516 Forgery Detection Scheme of Deep Video Frame-Rate Up-Conversion Based on Dual-Stream Multi-Scale Spatial-Temporal Representation Qing Gu; Xiangling Ding; Dengyong Zhang; Ce Yang
1570822521 A longitudinal Measurement and Analysis Study of Mozi, an Evolving P2P IoT Botnet Binglai Wang; Yafei Sang; Yongzheng Zhang; Shuhao Li; Xiaolin XU
1570822612 SecretHunter: A Large-Scale Secret Scanner for Public Git Repositories Elliott Wen; Jia Wang; Jens Dietrich
1570822665 Implementation of One-Time Editable Blockchain Chameleon Hash Function Construction Scheme Yixuan Qiao; Minghui Zheng; Jingyi Yang
1570822686 Marking Based Obfuscation Strategy to Resist Side Channel Attack in Cross-User Deduplication for Cloud Storage Xin Tang; Xiong Chen; Ran Zhou; Linchi Sui; Tian'e Zhou
1570822687 SEEKER: A Root Cause Analysis Method Based on Deterministic Replay for Multi-Type Network Protocol Vulnerabilities Runhao Liu; Bo Yu; Baosheng Wang; Jianbin Ye; Jianxin Huang; Xiangdong Kong
1570822691 Booting IoT Terminal Device Securely with eMMC Ma Siyuan; Yuewu Wang; Lingguang Lei; Yingjiao Niu; Shi Haotian; Wang Jie
1570822766 Challenges and Approaches for Mitigating Byzantine Attacks in Federated Learning Junyu Shi; Wei Wan; Jianrong Lu; Shengshan Hu; Leo Yu Zhang
1570822777 HAXSS: Hierarchical Reinforcement Learning for XSS Payload Generation Myles Foley; Sergio Maffeis
1570822783 From Passive to Active: Near-Optimal DNS-Based Data Exfiltration Defense Method Based on Sticky Mechanism Jiawen Diao; Binxing Fang; Xiang Cui; Zhongru Wang; Tian Wang; Shouyou Song
1570822929 Data Integrity Verification Scheme Based on Blockchain Smart Contract Kai Zhang; He Xiao
1570822960 Privacy-Preserving and Verifiable Outsourcing Message Transmission and Authentication Protocol in IoT Hongjun Li; Fanyu Kong; Jia Yu; Hanlin Zhang; Luhong Diao; Yunting Tao
1570822969 A Faster Blockchain Sharding Protocol for Decentralized Ledger Liu Dongdong; Mingsheng Wang; Li Taotao; Han Ya
1570822988 An Enhanced MinHash Encryption Scheme for Encrypted Deduplication Qiaowen Jia; Guanxiong Ha; Hanwei Wang; Haoyu Ma; Hang Chen
1570822991 IDROP: Intelligently Detecting Return-Oriented Programming Using Real-Time Execution Flow and LSTM Li Jie; Weina Niu; Yan Ran; Duan Zhiqin; Beibei Li; Xiaosong Zhang
1570823016 Pyramid Copy-Move Forgery Detection Using Adversarial Optimized Self Deep Matching Network Yaqi Liu; Chao Xia; Qiang Cai; Xin Jin
1570823027 Mal-Bert-GCN: Malware Detection by Combining Bert and GCN Zhenquan Ding; Hui Xu; Yonghe Guo; Longchuan Yan; Lei Cui; Zhiyu Hao
1570823091 Towards Adversarial Robustness With Multidimensional Perturbations via Contrastive Learning Chuanxi Chen; Dengpan Ye; Hao Wang; Long Tang; Yue Xu
1570823220 Squeezing Network Performance for Secure and Efficient PoW With Better Difficulty Adjustment Yuhang Ding; Zihan Yang; Bo Qin; Qin Wang; Yanran Zhang; Qianhong Wu
1570823269 Practical Side-Channel Attack on Message Encoding in Masked Kyber Jian Wang; Weiqiong Cao; Hua Chen; Haoyuan Li
1570823306 DRSN With Simple Parameter-Free Attention Module for Specific Emitter Identification Xiuhua Wen; Chunjie Cao; Yifan Li; Yang Sun
1570823495 Secure Access Control for eHealth Data in Emergency Rescue Case Based on Traceable Attribute-Based Encryption Yuan Shen; Wei Song; Changsheng Zhao; Zhiyong Peng
1570823576 DEEPRO: Provenance-Based APT Campaigns Detection via GNN Na Yan; Yu Wen; Luyao Chen; Yanna Wu; Boyang Zhang; Zhaoyang Wang; Dan Meng
1570823578 Deceiving Learning-Based Sketches to Cause Inaccurate Frequency Estimation Xuyang Jing; Xiaojun Cheng; Zheng Yan; Xian Li
1570823600 AVMiner: Expansible and Semantic-Preserving Anti-Virus Labels Mining Method Ligeng Chen; Zhongling He; Hao Wu; Yuhang Gong; Bing Mao
1570823640 EnShare: Sharing Files Securely and Efficiently in the Cloud Using Enclave Yun He; Xiaoqi Jia; Shenzhi Zhang; Lou Chitkushev
1570823662 Steganalysis for Small-Scale Training Image Pairs with Cover-Stego Feature Difference Model Chao Xia; Yaqi Liu; Qingxiao Guan; Sai Ma; Yu Nan; Jiahui Fu
1570823664 Extending Expressive Access Policies with Privacy Features Stefan More; Sebastian Ramacher; Lukas Alber; Marco Herzl
1570823784 Malicious Family Identify Combining Multi-Channel Mapping Feature Image and Fine-Tuned CNN Chenghua Tang; Chen Zhou; Min Hu; Mengmeng Yang; Baohua Qiang
1570823825 Truthfully Negotiating Usage Policy for Data Sovereignty Chunlei Yang; Yunchuan Guo; Mingjie Yu; Lingcui Zhang
1570823849 AutoSlicer: Automatic Program Partitioning for Securing Sensitive Data Based-On Data Dependency Analysis and Code Refactoring Weizhong Qiang; Hao Luo
1570823851 Security Support on Memory Controller for Heap Memory Safety Chaochao Zhang; Rui Hou
1570823885 CGDF-GNN: Cascaded GNN Fraud Detector With Dual Features Facing Imbalanced Graphs With Camouflaged Fraudsters Qichang Wan; Peisen Wang; Xiaobing Pei
1570824009 Efficient SM2 Hardware Design for Digital Signature of Internet of Vehicles Mei Yang; Chong Liu; Huiyun Li; Cuiping Shao
1570824032 A General Backdoor Attack to Graph Neural Networks Based on Explanation Method Luyao Chen; Na Yan; Boyang Zhang; Zhaoyang Wang; Yu Wen; Yanfei Hu
1570824066 GTMS: A Gated Linear Unit Based Trust Management System for Internet of Vehicles Using Blockchain Technology Yong Kuang; Hongyun Xu; Rui Jiang; Zhikang Liu
1570824097 APT Attribution for Malware Based on Time Series Shapelets Qinqin Wang; Hanbing Yan; Rui Mei; Zhihui Han
1570824154 TECS: A Trust Model for VANETs Using Eigenvector Centrality and Social Metrics Yu'ang Zhang; Yujie Song; Yu Wang; Yue Cao; Xuefeng Ren; Fei Yan
1570824172 Robust Secure Aggregation With Lightweight Verification for Federated Learning Chao Huang; Yanqing Yao; Xiaojun Zhang; Da Teng; Yingdong Wang; Lei Zhou
1570824192 MCFM: Discover Sensitive Behavior from Encrypted Traffic in Industrial Control System Zhishen Zhu; Junzheng Shi; Chonghua Wang; Gang Xiong; Zhiqiang Hao; Gaopeng Gou
1570824197 Resistance to JPEG and Imperceptibility is All Poisoning Attack Need Tengjun Liu
1570824198 Efficiently Constructing Topology of Dynamic Networks Fenghua Li; Cao Chen; Yunchuan Guo; Liang Fang; Chao Guo; Zifu Li
1570824259 You Cannot Fully Trust Your Device: An Empirical Study of Client-Side Certificate Validation in WPA2-Enterprise Networks Li Song; Qiongxiao Wang; Shijie Jia; Jingqiang Lin; Linli Lu; Yanduo Fu
1570824271 CPGBERT: An Effective Model for Defect Detection by Learning Program Semantics via Code Property Graph Jingqiang Liu; Xiaoxi Zhu; Chaoge Liu; Xiang Cui; Qixu Liu
1570824302 One-Time Rewritable Blockchain with Traitor Tracing and Bilateral Access Control Lifeng Guo; Huide Lei; Wei Chuen Yau
1570824366 ProcGuard: Process Injection Behaviours Detection Using Fine-grained Analysis of API Call Chain with Deep Learning Wang Juan; Chenjun Ma; Ziang Li; Huanyu Yuan; Jie Wang
1570824376 Privacy-Preserving Recommendation With Debiased Obfuscaiton Chennan Lin; Xueyuan Zhang
1570824385 A Flow Attack Strategy Based on Critical Links for Cyber-Attack Jiming Qi; Jiazheng Zhang; Qingxia Liu; Bang Wang
1570824393 Detecting Unknown Network Attacks With Attention Encoding and Deep Metric Learning Chunlan Fu; Shirong Han; Gang Shen
1570824406 Hash Proof System With Auxiliary Inputs and Its Application Cailing Cai; Tsz Hon Yuen; Siu Ming Yiu
1570824455 A Lightweight Graph-based Method to Detect Pornographic and Gambling Websites with Imperfect Datasets Xiaoqing Ma; Chao Zheng; Zhao Li; Jiangyi Yin; Qingyun Liu; Xunxun Chen
1570824463 A Novel Asynchronous Evolution Opinion Dynamics Model Xiao Xiao; Minghua Xu; Han Xu
1570824499 SpecRNet: Towards Faster and More Accessible Audio DeepFake Detection Piotr Kawa; Marcin Plata; Piotr Syga
1570824501 A Terminal Security Authentication Protocol for Zero-Trust Satellite IoT Minqiu Tian; Zifu Li; Fenghua Li; Jin Cao; Chao Guo
1570824533 DCC-Find: DNS Covert Channel Detection by Features Concatenation-Based LSTM Dongxu Han; Ning Li; Pu Dong; Xiang Cui; Yuling Liu; Jiawen Diao
1570824572 To Fix or Not to Fix: A Critical Study of Crypto-Misuses in the Wild Anna-Katharina Wickert; Lars Baumgärtner; Michael Schlichtig; Krishna Narasimhan; Mira Mezini
1570824577 Privacy-Preserving Robust Federated Learning With Distributed Differential Privacy Fayao Wang; Peizhi Li; Xinyu Wei; Yunchuan Guo
1570824580 Bidirectional LSTM-Based Attention Mechanism for CNN Power Theft Detection Zhuoqun Xia; Kaixin Zhou; Jingjing Tan; Hongmei Zhou
1570824607 An Efficient Certificateless Authentication Scheme for Satellite Internet Tongwei Liu; Baokang Zhao; Wei Peng
1570824642 The Power Allocation for SWIPT-Based Cognitive Two-Way Relay Networks With Rate Fairness Consideration Guozhong Wang; Chunling Peng; Yi Huang
1570824699 tTree+: A Threat Tree Model for Representing Complex Semantics Zhitao Wu; Jingjing Hu; Xiaowei Zhang; Wei Ren
1570824775 Action-Manipulation Attack and Defense to \(\mathcal X\)-Armed Bandits Zhi Luo; Youqi Li; Lixing Chen; Zichuan Xu; Pan Zhou
1570824778 Data Poisoning Attack to \(\mathcal{X}\)-Armed Bandits Zhi Luo; Youqi Li; Lixing Chen; Zichuan Xu; Pan Zhou
1570824782 A Green Neural Network With Privacy Preservation and Interpretability De Li; Jinyan Wang
1570824785 Reducing Gas Consumption of Tornado Cash and Other Smart Contracts in Ethereum Jingyan Yang; Shang Gao; Guyue Li; Rui Song; Bin Xiao
1570824870 HyperMean: Effective Multidimensional Mean Estimation with Local Differential Privacy Tao Zhang; Bowen Deng; Lele Zheng; Ze Tong; Qi Li
1570824914 CDGA: A GAN-based Controllable Domain Generation Algorithm You Zhai; Jian Yang; Zixiang Wang; He Longtao; Liqun Yang; Zhoujun Li
1570824951 VoiceSketch: a Privacy-Preserving Voiceprint Authentication System Baochen Yan; Rui Zhang; Zheng Yan
1570824984 LLDP: A Layer-wise Local Differential Privacy in Federated Learning Qian Chen; Hongbo Wang; Zilong Wang; Jiawei Chen; Haonan Yan; Xiaodong Lin
1570825171 Towards Automated Detection and Prevention of Regrettable (Self-)Disclosures on Social Media Hervais Simo; Michael Kreutzer
1570825222 A Quantum Inspired Differential Evolution Algorithm With Multiple Mutation Strategies Jie Liu; Xingsheng Qin
1570825377 WBA: A Warping-Based Approach to Generating Imperceptible Adversarial Examples Chengyao Hua; Shigeng Zhang; Weiping Wang; Zhankai Li; Jian Zhang
1570825447 Enabling Anonymous Authenticated Encryption with a Novel Anonymous Authenticated Credential Key Agreement (AACKA) Raphael Schermann; Rainer Urian; Ronald Toegl; Holger Bock; Christian Steger
1570826107 Optimal Block Propagation and Incentive Mechanism for Blockchain Networks in 6G Jinbo Wen; Xiaojun Liu; Zehui Xiong; Meng Shen; Siming Wang; Yutao Jiao; Jiawen Kang; He Li
1570826692 Eye-based keystroke prediction for natural texts -- a feasibility analysis Jos¨¦ Reverte Cazorla; Jos¨¦ Mar¨ªa de Fuentes; Lorena Gonz¨¢lez-Manzano
1570827170 A Multidimensional Blockchain Framework For Mobile Internet of Things Hussein Zangoti; Alex Pissinou Makki; Niki Pissinou; Abdur Rahman Bin Shahid; Omar Guerra; Joel Rodriguez
1570827299 "Comments Matter and The More The Better!": Improving Rumor Detection with User Comments Yang Xu; Jie Guo; Weidong Qiu; Zheng Huang; Enes Altuncu; Shujun Li
1570827632 CDEdit: Redactable Blockchain with Cross-audit and Diversity Editing Xiaofeng Chen; Ying Gao
1570827752 MFFAN: Multiple Features Fusion with Attention Networks for Malicious Traffic Detection Weiqing Huang; Xinbo Han; Meng Zhang; Min Li; Haitian Yang
1570827945 VecSeeds: Generate fuzzing testcases from latent vectors based on VAE-GAN Zhongyuan Qin; Wen Wang; Xin Sun; Xujian Liu; Yubo Song; Jiarong Fan; Zeru Li
1570827964 Adap DP-FL: Differentially Private Federated Learning with Adaptive Noise Jie Fu; Zhili Chen; Xiao Han
1570827973 BieVote: A Biometric Identification Enabled Blockchain-Based Secure and Transparent Voting Framework Md Jobair Hossain Faruk; Mazharul Islam; Fazlul Alam; Hossain Shahriar; Akond Rahman; Fan Wu; Md Zakirul Alam Bhuiyan
1570827984 CPDT: A copyright-preserving data trading scheme based on smart contracts and perceptual hashing Baowei Wang; Bin Li; Yi Yuan; Changyu Dai; Wu Yufeng; Zheng Weiqian
1570828147 Privacy-Preserving Smart Lock System for IoT-enabled Rental House Markets Bo Wang; Lingling Wang; Hongliang Guo; Xueqin Zhao
1570828159 Dynamic and Diverse Transformations for Defending Against Adversarial Examples Yongkang Chen; Ming Zhang; Jin Li; Xiaohui Kuang; Xuhong Zhang; Han Zhang
1570828194 A Comparative Study on the Security of Cryptocurrency Wallets in Android System Minfeng Qi; Zhiyu Xu; Tengyun Jiao; Sheng Wen; Yang Xiang; Gary Nan
1570828215 TFCFI: Transparent Forward Fine-grained Control-Flow Integrity Protection Cairui She; Liwei Chen; Gang Shi
1570828256 A Hardware Security Isolation Architecture for Intelligent Accelerator Rui Gong; Lei Wang; Wei Shi; Wei Liu; Jianfeng Zhang
1570828261 Kgastor: a Privacy By Design Knowledge Graph anonymized Store Maxime Thouvenot; Olivier Cur¨¦
1570828275 Improved Zero-Knowledge Proofs for Commitments from Learning Parity with Noise Mengfan Wang; Guifang Huang; Hongmin Gao; Lei Hu
1570828303 An Optimized Isomorphic Design for the SM4 Block Cipher Over the Tower Field Chuang Wang; Yan Ding; Chenlin Huang; Liantao Song
1570828387 Utility-Aware Privacy-Preserving Federated Learning through Information Bottleneck Shaolong Guo; Zhou Su; Zhiyi Tian; Shui Yu
1570828446 FLightNER: A Federated Learning Approach to Lightweight Named-Entity Recognition Macarious Abadeer; Wei Shi; Jean-Pierre Corriveau
1570828458 A cloud-edge collaboration authentication scheme based on V2G short randomizable signature Zhuoqun Xia; Hongrui Li; Ke Gu
1570828473 Neural-FacTOR: Neural Representation Learning for Website Fingerprinting Attack over TOR Anonymity Haili Sun; Yan Huang; Han Lansheng; Xiang Long; Hongle Liu
1570828586 DRICP: Defect Risk Identification Using Sample Category Perception Lixia Xie; Siyu Liu; Hongyu Yang; Liang Zhang
1570828728 Software Side Channel Vulnerability Detection Based on Similarity Calculation and Deep Learning Wei Sun; Zheng Yan; Xi Xu; Wenxiu Ding; Lijun Gao
1570828766 A Blockchain-based Privacy-Preserving Scheme for Cross-domain Authentication Junfeng Jiang; Yujian Zhang; Junhao Li
1570828781 Federated Learning Scheme with Dual Security of Identity Authentication and Verification Yuting Xu; Mang Su; JinPeng Hou; Chong Nie
1570828782 Zero Trust-NIDS: Extended Multi-View Approach
for Network Trace Anonymization and
Auto-Encoder Convolutional Neural Network for
Network Intrusion Detection
Abeer Zaher Alalmaie; Priyadarsi Nanda; Xiangjian He
1570828804 Robust Document Image Forgery Localization Against
Image Blending
Liang Weipeng; Li Dong; Rang-ding Wang; Diqun Yan; Yuanman Li
1570828989 Secure and efficient publicly verifiable ridge
regression outsourcing scheme
Ou Ruan
1570829006 Data Analysis With Local Differential Privacy Atsuko Miyaji; Tomoka Takahashi; Ping-Lun Wang; Tomoaki Mimoto; Tastuhiro Yamatsuki
1570829018 Self-Supervised Adversarial Example Detection by Disentangled Representation Zhaoxi Zhang; Leo Yu Zhang; Xufei Zheng; Jinyu Tian; Jiantao Zhou
1570829041 A Dynamic Transaction Pattern Aggregation Neural Network for Money Laundering Detection Xuejiao Luo; Xiaohui Han; Wenbo Zuo; Zhengyuan Xu; Zhiwen Wang; Xiaoming Wu
1570829183 HashDroid: Extraction of malicious features of Android applications based on function call graph pruning Pengfei Liu; Weiping Wang; Hong Song; Shigeng Zhang; Yulu Hong
1570829298 Coverage Reliability of IoT Intrusion Detection System based on Attack-Defense Game Design Siyu Sun; Xiaoxuan Fan; Yunzhi Xia; Chenlu Zhu; Shenghao Liu; Lingzhi Yi
1570829314 Source Code Vulnerability Detection Using Vulnerability Dependency Representation Graph Hongyu Yang; Haiyun Yang; Liang Zhang; Xiang Cheng
1570829317 Multi-pipeline HotStuff: A High Performance Consensus for Permissioned Blockchain Taining Cheng; Wei Zhou; Shao Wen Yao; Libo Feng; Jing He
1570829332 MLIA: modulated LED illumination-based adversarial attack on traffic sign recognition system for autonomous vehicle Yixuan Shen; Yu Cheng; Yini Lin; Sicheng Long; Canjian Jiang; Danjie Li; Siyuan Dai; You Jiang; Junbin Fang; Zoe Jiang; S. m. Yiu
1570829347 Privacy-Preserving Top-k Spatio-Textual Similarity Join Yiping Teng; Dongyue Jiang; Mengmeng Sun; Liang Zhao; Li Xu; Chunlong Fan
1570829447 Code-based encryption algorithms for generating and verifying digital signature Aneta Poniszewska-Maranda; Kacper Pradzynski
1570829521 An efficient and secure scheme of verifiable
computation for Intel SGX
Wenxiu Ding; Wei Sun; Zheng Yan; Robert Deng; Zhiguo Wan
1570830127 Privacy-preserving Decision Making Based on Q-Learning in Cloud Computing Zhipeng Zhou; Dong Chenyu; Donger Mo; Peijia Zheng
1570831171 Intelligent Recognition method of Web application categories based on Multi-layer Simhash Algorithm Fuji Han; Dongjun Zhu
1570832026 AIR-NFC: Near Field Air-Gap Covert Channel Attack Mordechai Guri