default search action
15th SecureComm 2019: Orlando, FL, USA
- Songqing Chen, Kim-Kwang Raymond Choo, Xinwen Fu, Wenjing Lou, Aziz Mohaisen:
Security and Privacy in Communication Networks - 15th EAI International Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019, Proceedings, Part I. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 304, Springer 2019, ISBN 978-3-030-37227-9
Blockchains
- Truc D. T. Nguyen, My T. Thai:
Trustless Framework for Iterative Double Auction Based on Blockchain. 3-22 - Shuyang Tang, Jilai Zheng, Yao Deng, Ziyu Wang, Zhiqiang Liu, Dawu Gu, Zhen Liu, Yu Long:
Towards a Multi-chain Future of Proof-of-Space. 23-38 - Kai Li, Yuzhe Richard Tang, Beom Heyn Ben Kim, Jianliang Xu:
Secure Consistency Verification for Untrusted Cloud Storage by Public Blockchains. 39-62 - Yaping Liu, Shuo Zhang, Haojin Zhu, Peng-Jun Wan, Lixin Gao, Yaoxue Zhang:
An Enhanced Verifiable Inter-domain Routing Protocol Based on Blockchain. 63-82
Internet of Things
- Yifan Tian, Jiawei Yuan, Shucheng Yu, Yantian Hou, Houbing Song:
Edge-Assisted CNN Inference over Encrypted Data for Internet of Things. 85-104 - Chenglong Fu, Xiaojiang Du, Longfei Wu, Qiang Zeng, Amr Mohamed, Mohsen Guizani:
POKs Based Secure and Energy-Efficient Access Control for Implantable Medical Devices. 105-125 - Kyle Denney, Enes Erdin, Leonardo Babun, Michael Vai, A. Selcuk Uluagac:
USB-Watch: A Dynamic Hardware-Assisted USB Threat Detection Framework. 126-146 - Jianhua Sun, Kun Sun, Chris Shenefiel:
Automated IoT Device Fingerprinting Through Encrypted Stream Classification. 147-167
Catching Malware
- Shuang Zhao, Xiaobo Ma, Wei Zou, Bo Bai:
DeepCG: Classifying Metamorphic Malware Through Deep Learning of Call Graphs. 171-190 - Xunchao Hu, Brian Testa, Heng Yin:
ChaffyScript: Vulnerability-Agnostic Defense of JavaScript Exploits via Memory Perturbation. 191-213 - Zhiqiang Li, Jun Sun, Qiben Yan, Witawas Srisa-an, Yutaka Tsutano:
Obfusifier: Obfuscation-Resistant Android Malware Detection System. 214-234 - Steven Gianvecchio, Christopher Burkhalter, Hongying Lan, Andrew Sillers, Kenneth P. Smith:
Closing the Gap with APTs Through Semantic Clusters and Automated Cybergames. 235-254
Machine Learning
- Jiahao Ding, Sai Mounika Errapotu, Haijun Zhang, Yanmin Gong, Miao Pan, Zhu Han:
Stochastic ADMM Based Distributed Machine Learning with Differential Privacy. 257-277 - Yuping Li, Jiyong Jang, Xinming Ou:
Topology-Aware Hashing for Effective Control Flow Graph Similarity Analysis. 278-298 - Shaohua Ding, Yulong Tian, Fengyuan Xu, Qun Li, Sheng Zhong:
Trojan Attack on Deep Generative Models in Autonomous Driving. 299-318 - Mengxia Luo, Can Yang, Xiaorui Gong, Lei Yu:
FuncNet: A Euclidean Embedding Approach for Lightweight Cross-platform Binary Recognition. 319-337
Everything Traffic Security
- Eman Salem Alashwali, Pawel Szalachowski, Andrew Martin:
Towards Forward Secure Internet Traffic. 341-364 - Rui Zhao, Edward Chow, Chunchun Li:
Traffic-Based Automatic Detection of Browser Fingerprinting. 365-385 - Tao Chen, Weiqi Cui, Eric Chan-Tin:
Measuring Tor Relay Popularity. 386-405 - Kris Oosthoek, Christian Doerr:
SoK: ATT&CK Techniques and Trends in Windows Malware. 406-425
Communicating Covertly
- Jiahao Cao, Kun Sun, Qi Li, Mingwei Xu, Zijie Yang, Kyung Joon Kwak, Jason H. Li:
Covert Channels in SDN: Leaking Out Information from Controllers to End Hosts. 429-449 - Riccardo Bortolameotti, Thijs van Ede, Andrea Continella, Maarten H. Everts, Willem Jonker, Pieter H. Hartel, Andreas Peter:
Victim-Aware Adaptive Covert Channels. 450-471 - Ahmad Alagil, Yao Liu:
Random Allocation Seed-DSSS Broadcast Communication Against Jamming Attacks. 472-489 - Changbo Tian, Yongzheng Zhang, Tao Yin, Yupeng Tuo, Ruihai Ge:
A Loss-Tolerant Mechanism of Message Segmentation and Reconstruction in Multi-path Communication of Anti-tracking Network. 490-508
Let's Talk Privacy
- Dawei Chu, Jingqiang Lin, Fengjun Li, Xiaokun Zhang, Qiongxiao Wang, Guangqi Liu:
Ticket Transparency: Accountable Single Sign-On with Privacy-Preserving Public Logs. 511-531 - Lichuan Ma, Qingqi Pei, Youyang Qu, Kefeng Fan, Xin Lai:
Decentralized Privacy-Preserving Reputation Management for Mobile Crowdsensing. 532-548 - Savio Sciancalepore, Saeif Alhazbi, Roberto Di Pietro:
Location Privacy Issues in the OpenSky Network Crowdsourcing Platform. 549-568 - Tanya Khatri, Gaby G. Dagher, Yantian Hou:
Privacy-Preserving Genomic Data Publishing via Differentially-Private Suffix Tree. 569-584
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.