


default search action
19th TrustCom 2020: Guangzhou, China
- Guojun Wang, Ryan K. L. Ko, Md. Zakirul Alam Bhuiyan, Yi Pan:
19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, Guangzhou, China, December 29, 2020 - January 1, 2021. IEEE 2020, ISBN 978-1-6654-0392-4
Trust Track
- Xuewei Feng, Dongxia Wang, Zhechao Lin, Xiaohui Kuang, Gang Zhao:
Enhancing Randomization Entropy of x86-64 Code while Preserving Semantic Consistency. 1-12 - Xin Tang, Linna Zhou, Dan Liu, Boyu Liu, Xinyi Lü:
Reversible data hiding based on improved rhombus predictor and prediction error expansion. 13-21 - Dapeng Qu, Jiankun Zhang, Zhenhuan Hou, Ming Wan, Bo Dong
:
A Trust Routing Scheme based on Identification of Non-complete Cooperative Nodes in Mobile Peer-to-Peer Networks. 22-29 - Jingbin Liu, Yu Qin, Dengguo Feng:
SeRoT: A Secure Runtime System on Trusted Execution Environments. 30-37 - Young Choon Lee, Jayden King
, Young Ki Kim, Seok-Hee Hong:
Robust Scheduling for Large-Scale Distributed Systems. 38-45 - Chengying Mao
, Linlin Wen, Tsong Yueh Chen
:
Adaptive Random Test Case Generation Based on Multi-Objective Evolutionary Search. 46-53 - Wei Yang, Anmin Fu
, Hailong Zhang, Chanying Huang:
Improving Efficiency of Key Enumeration Based on Side-Channel Analysis. 54-61 - Marcin Plata, Piotr Syga
:
Robust Spatial-spread Deep Neural Image Watermarking. 62-70 - Ha Xuan Son, Hai Trieu Le, Nadia Metoui
, Nghia Duong-Trung:
DeM-CoD: Novel Access-Control-Based Cash on Delivery Mechanism for Decentralized Marketplace. 71-78 - Ran Li
, Jiaqi Yin, Huibiao Zhu:
Modeling and Analysis of RabbitMQ Using UPPAAL. 79-86 - Xiaohu Zhou, Vitor Jesus
, Yonghao Wang
, Mark B. Josephs
:
User-Controlled, Auditable, Cross-Jurisdiction Sharing of Healthcare Data Mediated by a Public Blockchain. 87-96 - Ming Liu, Zhi Xue, Xiangjian He
:
A Unified Host-based Intrusion Detection Framework using Spark in Cloud. 97-103 - Yanshul Sharma, Zinea Das, Alok Das, Sanjay Moulik
:
TA-HRT: A temperature-aware scheduler for heterogeneous real-time multicore systems. 104-111 - Yin Liu
, Eli Tilevich:
Reducing the Price of Protection: Identifying and Migrating Non-Sensitive Code in TEE. 112-120 - Wentao Xie, Peng Wu:
Fairness Testing of Machine Learning Models Using Deep Reinforcement Learning. 121-128
Security Track
- Isaac Matthews
, John C. Mace, Sadegh Soudjani, Aad van Moorsel:
Cyclic Bayesian Attack Graphs: A Systematic Computational Approach. 129-136 - Qi Feng, Debiao He, Min Luo, Zengxiang Li, Kim-Kwang Raymond Choo:
Practical Secure Two-Party EdDSA Signature Generation with Key Protection and Applications in Cryptocurrency. 137-147 - Roberto Dillon, Shailey Chawla
, Dayana Hristova, Barbara Göbl, Suzana Jovicic:
Password Policies vs. Usability: When Do Users Go "Bananas"? 148-153 - Yu Ding, Shupeng Wang, Jian Xing, Xiaoyu Zhang, ZiSen Oi, Ge Fu, Qian Qiang, Haoliang Sun, Jianyu Zhang:
Malware Classification on Imbalanced Data through Self-Attention. 154-161 - Ning Zhang, Zhiqiang Lv, Yanlin Zhang, Haiyang Li, Yixin Zhang, Weiqing Huang:
Novel design of Hardware Trojan: A generic approach for defeating testability based detection. 162-173 - Munir Geden, Kasper Rasmussen:
TRUVIN: Lightweight Detection of Data-Oriented Attacks Through Trusted Value Integrity. 174-181 - Ioana Boureanu
, Daniel Migault, Stere Preda, Hyame Assem Alamedine, Sanjay Mishra, Frederic Fieau, Mohammad Mannan:
LURK: Server-Controlled TLS Delegation. 182-193 - Fang Li, Ziyuan Zhu, Chao Yan, Bowen Chen, Dan Meng:
Malware Detection Based on Term Frequency Analysis of GPRs Features. 194-201 - Radu Ciucanu, Pascal Lafourcade, Marius Lombard-Platet, Marta Soare:
Secure Outsourcing of Multi-Armed Bandits. 202-209 - Yannan Liu, Yabin Lai, Kaizhi Wei, Liang Gu, Zhengzheng Yan:
NLabel: An Accurate Familial Clustering Framework for Large-scale Weakly-labeled Malware. 210-216 - Xuyang Ding, Feng Xiao, Man Zhou
, Zhibo Wang:
Active Link Obfuscation to Thwart Link-flooding Attacks for Internet of Things. 217-224 - Oleg Schell, Marcel Kneib:
VALID: Voltage-Based Lightweight Intrusion Detection for the Controller Area Network. 225-232 - Peilun Wu
, Nour Moustafa
, Shiyi Yang
, Hui Guo:
Densely Connected Residual Network for Attack Recognition. 233-242 - Guoqiang Yang, Fanyu Kong, Qiuliang Xu:
Optimized FPGA Implementation of Elliptic Curve Cryptosystem over Prime Fields. 243-249 - Kemeng Wu, Yongzheng Zhang, Tao Yin:
FTPB: A Three-stage DNS Tunnel Detection Method Based on Character Feature Extraction. 250-258 - Tianning Zhang, Miao Cai, Diming Zhang, Hao Huang:
De-randomizing the Code Segment with Timing Function Attack. 259-267 - Rory Coulter, Jun Zhang, Lei Pan, Yang Xiang
:
Unmasking Windows Advanced Persistent Threat Execution. 268-276 - Changchun Yin
, Hao Wang, Lu Zhou, Liming Fang:
Ciphertext-Policy Attribute-Based Encryption with Multi-Keyword Search over Medical Cloud Data. 277-284 - Chan Fan, Xiaolei Dong, Zhenfu Cao, Jiachen Shen:
VCKSCF: Efficient Verifiable Conjunctive Keyword Search Based on Cuckoo Filter for Cloud Storage. 285-292 - Xiaonan Song, Aimin Yu, Haibo Yu, Shirun Liu, Xin Bai, Lijun Cai, Dan Meng:
Program Slice based Vulnerable Code Clone Detection. 293-300 - Liu Liu, Chao Chen, Jun Zhang, Olivier Y. de Vel, Yang Xiang
:
Doc2vec-based Insider Threat Detection through Behaviour Analysis of Multi-source Security Logs. 301-309 - Tiago Fernandes, Luís Dias, Miguel Correia:
C2BID: Cluster Change-Based Intrusion Detection. 310-319 - Tianlin Huo, Wenhao Wang, Pei Zhao, Yufeng Li
, Tingting Wang, Mingshu Li:
TEADS: A Defense-aware Framework for Synthesizing Transient Execution Attacks. 320-327 - Benjamin Semal, Konstantinos Markantonakis, Keith Mayes, Jan Kalbantner
:
One Covert Channel to Rule Them All: A Practical Approach to Data Exfiltration in the Cloud. 328-336 - Jiajin Cai, Tongxin Li, Can Huang, Xinhui Han:
ReDex: Unpacking Android Packed Apps by Executing Every Method. 337-344 - Tiago Espinha Gasiba, Ulrike Lechner, Maria Pinto-Albuquerque
, Daniel Méndez Fernández
:
Awareness of Secure Coding Guidelines in the Industry - A first data analysis. 345-352 - Junaid Haseeb
, Masood Mansoori
, Harith Al-Sahaf
, Ian Welch:
IoT Attacks: Features Identification and Clustering. 353-360 - Hoang Hai Nguyen, David M. Nicol:
Estimating Loss Due to Cyber-attack in the Presence of Uncertainty. 361-369 - Xueying Han, Rongchao Yin, Zhigang Lu, Bo Jiang, Yuling Liu, Song Liu, Chonghua Wang, Ning Li:
STIDM: A Spatial and Temporal Aware Intrusion Detection Model. 370-377 - Xiaohui Wu, Yeping He, Qiming Zhou, Hengtai Ma, Liang He, Wenhao Wang, Liheng Chen:
Partial-SMT: Core-scheduling Protection Against SMT Contention-based Attacks. 378-385 - Guga Suri, Jianming Fu, Rui Zheng, Xinying Liu:
Family Identification of AGE-Generated Android Malware Using Tree-Based Feature. 386-393 - Muhammad Rizwan Asghar
, Steven D. Galbraith, Andrea Lanzi, Giovanni Russello, Lukas Zobernig:
Towards a Theory of Special-Purpose Program Obfuscation. 394-401 - Meng Li, Qi Zhong
, Leo Yu Zhang
, Yajuan Du, Jun Zhang, Yong Xiang:
Protecting the Intellectual Property of Deep Neural Networks with Watermarking: The Frequency Domain Approach. 402-409 - Johannes Lauinger, Lars Baumgärtner
, Anna-Katharina Wickert, Mira Mezini:
Uncovering the Hidden Dangers: Finding Unsafe Go Code in the Wild. 410-417 - Yuzong Hu, Futai Zou, Linsen Li, Ping Yi:
Traffic Classification of User Behaviors in Tor, I2P, ZeroNet, Freenet. 418-424 - Dong Qin, Shen Fu, George T. Amariucai, Daji Qiao, Yong Guan:
MAUSPAD: Mouse-based Authentication Using Segmentation-based, Progress-Adjusted DTW. 425-433 - Yu Fu, Siming Tong, Xiangyu Guo, Liang Cheng, Yang Zhang, Dengguo Feng:
Improving the Effectiveness of Grey-box Fuzzing By Extracting Program Information. 434-441 - Joe Samuel
, Khalil Aalab, Jason Jaskolka
:
Evaluating the Soundness of Security Metrics from Vulnerability Scoring Frameworks. 442-449 - Yi Li, Xi Xiao, Xiaogang Zhu
, Xiao Chen
, Sheng Wen, Bin Zhang:
SpeedNeuzz: Speed Up Neural Program Approximation with Neighbor Edge Knowledge. 450-457 - Lars Baumgärtner
, Alexandra Dmitrienko, Bernd Freisleben
, Alexander Gruler, Jonas Höchst
, Joshua Kühlberg, Mira Mezini, Richard Mitev, Markus Miettinen, Anel Muhamedagic, Thien Duc Nguyen, Alvar Penning, Dermot Frederik Pustelnik, Filipp Roos, Ahmad-Reza Sadeghi, Michael Schwarz, Christian Uhl
:
Mind the GAP: Security & Privacy Risks of Contact Tracing Apps. 458-467 - Mingkai Tong, Guo Li, Runzi Zhang
, Jianxin Xue, Wenmao Liu, Jiahai Yang:
Far from classification algorithm: dive into the preprocessing stage in DGA detection. 468-474 - Minghui Li, Yang Li, Liming Fang:
ELPPS: An Enhanced Location Privacy Preserving Scheme in Mobile Crowd-Sensing Network Based on Edge Computing. 475-482 - Jordan Stobbs, Biju Issac
, Seibu Mary Jacob:
Phishing Web Page Detection Using Optimised Machine Learning. 483-490 - Nan Messe, Vanea Chiprianov, Nicolas Belloir
, Jamal El Hachem, Régis Fleurquin, Salah Sadou:
Asset-Oriented Threat Modeling. 491-501 - Yipeng Zhang, Zhonghao Sun, Liqun Yang, Zhoujun Li
, Qiang Zeng, Yueying He, Xiaoming Zhang:
A11 Your PLCs Belong to Me: ICS Ransomware Is Realistic. 502-509 - Haoqi Wu, Zhengxuan Yu, Dapeng Huang, Haodong Zhang, Weili Han:
Automated Enforcement of the Principle of Least Privilege over Data Source Access. 510-517 - Chengqian Guo, Quanwei Cai, Qiongxiao Wang, Jingqiang Lin:
Extending Registration and Authentication Processes of FIDO2 External Authenticator with QR Codes. 518-529 - Zhiyu Xu
, Lin Yang, Ziyuan Wang, Sheng Wen, Rob Hanson, Shiping Chen
, Yang Xiang
:
BHDA - A Blockchain-Based Hierarchical Data Access Model for Financial Services. 530-538 - Defu Cao
, Jing Huang, Xuanyu Zhang, Xianhua Liu:
FTCLNet: Convolutional LSTM with Fourier Transform for Vulnerability Detection. 539-546 - Luqi Zhu, Jin Wang, Lianmin Shi, Jingya Zhou, Kejie Lu, Jianping Wang:
Secure Coded Matrix Multiplication against Cooperative Attack in Edge Computing. 547-556 - Junaid Haseeb
, Masood Mansoori
, Ian Welch:
A Measurement Study of IoT-Based Attacks Using IoT Kill Chain. 557-567 - Tengfei Li
, Xiaohong Chen, Haiying Sun, Jing Liu, Jiajia Yang, Chenchen Yang, Junfeng Sun:
Modeling and Verification of Spatio-Temporal Intelligent Transportation Systems. 568-575 - Tianyi Zhang, Jian Wang:
Secure Outsourcing Algorithms of Modular Exponentiations in Edge Computing. 576-583 - Xuren Wang, Mengbo Xiong, Yali Luo, Ning Li, Zhengwei Jiang, Zihan Xiong:
Joint Learning for Document-Level Threat Intelligence Relation Extraction and Coreference Resolution Based on GCN. 584-591 - Francis Onodueze, Darsana Josyula
:
Anomaly Detection on MIL-STD-1553 Dataset using Machine Learning Algorithms. 592-598
Privacy Track
- Meng Li, Jianbo Gao, Yifei Chen, Jingcheng Zhao, Mamoun Alazab
:
Privacy-Preserving Ride-Hailing with Verifiable Order-Linking in Vehicular Networks. 599-606 - Eduardo Gomes, Igor Zavalyshyn, Nuno Santos
, João Silva
, Axel Legay:
Flowverine: Leveraging Dataflow Programming for Building Privacy-Sensitive Android Applications. 607-614 - Chen Tian, Yazhe Wang, Peng Liu, Yu Wang, Ruirui Dai, Anyuan Zhou, Zhen Xu:
Prihook: Differentiated context-aware hook placement for different owners' smartphones. 615-622 - Wen Huang, Shijie Zhou, Tianqing Zhu, Yongjian Liao, Chunjiang Wu, Shilin Qiu:
Improving Laplace Mechanism of Differential Privacy by Personalized Sampling. 623-630 - De Li
, Jinyan Wang, Zhou Tan, Xianxian Li, Yuhang Hu:
Differential Privacy Preservation in Interpretable Feedforward-Designed Convolutional Neural Networks. 631-638 - Zhihao Zheng, Zhenfu Cao, Jiachen Shen:
Practical and Secure Circular Range Search on Private Spatial Data. 639-645 - Hugo Sbaï, Jassim Happa, Michael Goldsmith, Samy Meftali:
Dataset Construction and Analysis of Screenshot Malware. 646-655 - Shiwei Xu, Xiaowen Cai, Yizhi Zhao, Zhengwei Ren, Lingjuan Wu, Huanguo Zhang, Le Du, Yan Tong
:
zkrpChain: Privacy-preserving Data Auditing for Consortium Blockchains Based on Zero-knowledge Range Proofs. 656-663 - Thomas Cory, Philip Raschke, Axel Küpper:
Heimdall: Illuminating the Hidden Depths of Third-party Tracking in Android Applications. 676-682 - Tianyuan Liu, Hongpeng Guo
, Claudiu Danilov, Klara Nahrstedt:
A Privacy-preserving Data Collection and Processing Framework for Third-party UAV Services. 683-690 - Mina Sheikhalishahi, Nicola Zannone
:
On the Comparison of Classifiers' Construction over Private Inputs. 691-698 - Muqian Chen, Xuebin Wang, Jinqiao Shi, Can Zhao, Meiqi Wang, Binxing Fang:
Napping Guard: Deanonymizing Tor Hidden Service in a Stealthy Way. 699-706 - Linpeng Lu
, Ning Ding:
Multi-Party Private Set Intersection in Vertical Federated Learning. 707-714
Forensics and Analytics Track
- Fucheng Liu, Yu Wen, Yanna Wu, Shuangshuang Liang, Xihe Jiang, Dan Meng:
MLTracer: Malicious Logins Detection System via Graph Neural Network. 715-726 - Nour Moustafa, Mohiuddin Ahmed
, Sherif Ahmed:
Data Analytics-enabled Intrusion Detection: Evaluations of ToN IoT Linux Datasets. 727-735 - Runzi Zhang
, Mingkai Tong, Lei Chen, Jianxin Xue, Wenmao Liu, Feng Xie:
CMIRGen: Automatic Signature Generation Algorithm for Malicious Network Traffic. 736-743 - Xiaojian Li, Bo Li, Hailan Wang, Jiajia Zhang, Haopeng Yang
, Jingang Liu:
A Novel Violation Tracing Model for Cloud Service Accountability. 744-750 - Lida Ketsbaia, Biju Issac
, Xiaomin Chen:
Detection of Hate Tweets using Machine Learning and Deep Learning. 751-758 - Jack Hance, Jeremy Straub:
Use of Bash History Novelty Detection for Identification of Similar Source Attack Generation. 759-766 - Adnan Anwar
, S. M. Abu Adnan Abir:
Measurement Unit Placement Against Injection Attacks for the Secured Operation of an IIoT-based Smart Grid. 767-774 - Yen-Ting Lee, Tao Ban, Tzu-Ling Wan, Shin-Ming Cheng, Ryoichi Isawa, Takeshi Takahashi, Daisuke Inoue:
Cross Platform IoT- Malware Family Classification based on Printable Strings. 775-784 - Yuqing Pan, Xi Xiao, Guangwu Hu, Bin Zhang, Qing Li, Haitao Zheng:
ALBFL: A Novel Neural Ranking Model for Software Fault Localization via Combining Static and Dynamic Features. 785-792 - Behzad Asadi, Vijay Varadharajan:
Towards a Robust Classifier: An MDL-Based Method for Generating Adversarial Examples. 793-801 - Matthew J. Ryan, Morshed U. Chowdhury, Frank Jiang, Robin Doss
:
Avoiding Geographic Regions in Tor. 802-809 - Paul Black
, Iqbal Gondal
, Peter Vamplew, Arun Lakhotia:
Identifying Cross-Version Function Similarity Using Contextual Features. 810-818 - Yunan Zhang, Aidong Xu, Yixin Jiang:
Scalable and Accurate Binary Search Method based on Simhash and Partial Trace. 818-826 - Taejun Choi, Guangdong Bai
, Ryan K. L. Ko
, Naipeng Dong, Wenlu Zhang
, Shunyao Wang
:
An Analytics Framework for Heuristic Inference Attacks against Industrial Control Systems. 827-835 - Shinelle Hutchinson, Neesha Shantaram, Umit Karabiyik:
Forensic Analysis of Dating Applications on Android and iOS Devices. 836-847 - Nour Moustafa
, Marwa Keshk, Essam Soliman Debie, Helge Janicke:
Federated TON_IoT Windows Datasets for Evaluating AI-based Security Applications. 848-855 - Sara Salim, Nour Moustafa, Benjamin P. Turnbull
:
Privacy-Encoding Models for Preserving Utility of Machine Learning Algorithms in Social Media. 856-863
Emerging Technologies Track
- Mengxiang Wan, Hanbing Yao, Xin Yan:
Generation of malicious webpage samples based on GAN. 864-869 - Dali Zhu, Yuchen Ma, Yinlong Liu:
A Flexible Attentive Temporal Graph Networks for Anomaly Detection in Dynamic Networks. 870-875 - Lei Xu, Lin Chen, Zhimin Gao, Han-Yee Kim, Taeweon Suh, Weidong Shi:
FPGA based Blockchain System for Industrial IoT. 876-883 - Handong Cui
, Tsz Hon Yuen
:
Address-based Signature. 884-891 - Shunsheng Zhang
, Yuling Luo, Lvchen Cao, Junxiu Liu:
Cryptanalysis of a Chaos-based Block Cryptosystem Using Multiple Samples Correlation Power Analysis. 892-898 - Giulio Zizzo, Chris Hankin
, Sergio Maffeis
, Kevin Jones:
Adversarial Attacks on Time-Series Intrusion Detection for Industrial Control Systems. 899-910 - Alban Siffer, Pierre-Alain Fouque
, Alexandre Termier, Christine Largouët:
Netspot: a simple Intrusion Detection System with statistical learning. 911-918 - Zhongkai Tong, Ziyuan Zhu, Zhanpeng Wang, Limin Wang
, Yusha Zhang, Yuxin Liu:
Cache side-channel attacks detection based on machine learning. 919-926 - Xiaohui Hu, Rui Sun, Kejia Xu, Yongzheng Zhang, Peng Chang:
Exploit Internal Structural Information for IoT Malware Detection Based on Hierarchical Transformer Model. 927-934 - Paul Walther, Thorsten Strufe:
Inference Attacks on Physical Layer Channel State Information. 935-942 - Enzo Tartaglione, Marco Grangetto:
A non-discriminatory approach to ethical deep learning. 943-950 - Amjad Qashlan, Priyadarsi Nanda, Xiangjian He:
Security and Privacy Implementation in Smart Home: Attributes Based Access Control and Smart Contracts. 951-958 - Rahma Mukta, James Martens, Hye-Young Paik
, Qinghua Lu
, Salil S. Kanhere
:
Blockchain-based Verifiable Credential Sharing with Selective Disclosure. 959-966 - Wenjun Fan, Younghee Park, Shubham Kumar, Priyatham Ganta, Xiaobo Zhou, Sang-Yoon Chang:
Blockchain-enabled Collaborative Intrusion Detection in Software Defined Networks. 967-974 - Mingfu Xue, Zhiyu Wu, Can He, Jian Wang, Weiqiang Liu:
Active DNN IP Protection: A Novel User Fingerprint Management and DNN Authorization Control Technique. 975-982 - Zhanpeng Wang, Ziyuan Zhu, Limin Wang
, Zhongkai Tong, Chao Yan:
SCPORAM: a hardware support scheme for protecting memory access patterns. 983-990 - Zhujun Zhang, Dali Zhu, Wei Fan:
QPBFT: Practical Byzantine Fault Tolerance Consensus Algorithm Based on Quantified-role. 991-997 - Kilian Becher, J. A. Gregor Lagodzinski
, Thorsten Strufe:
Privacy-Preserving Public Verification of Ethical Cobalt Sourcing. 998-1005 - Zhuo Li
, Xu Zhou, Yang Liu, Congshan Fan, Wei Wang:
A Computation Offloading Model over Collaborative Cloud-Edge Networks with Optimal Transport Theory. 1006-1011 - Yizhong Liu, Jianwei Liu
, Yiming Hei, Wei Tan
, Qianhong Wu:
A Secure Shard Reconfiguration Protocol for Sharding Blockchains Without a Randomness. 1012-1019 - Andreas Abraham, Stefan More
, Christof Rabensteiner, Felix Hörandner
:
Revocable and Offline-Verifiable Self-Sovereign Identities. 1020-1027 - Lei Xu, Zhimin Gao, Xinxin Fan, Lin Chen, Han-Yee Kim, Taeweon Suh, Weidong Shi:
Blockchain based End-to-end Tracking System for Distributed IoT Intelligence Application Security Enhancement. 1028-1035 - Subhra Mazumdar
, Prabal Banerjee
, Sushmita Ruj:
Time is Money: Countering Griefing Attack in Lightning Network. 1036-1043 - Przemyslaw Kubiak, Miroslaw Kutylowski:
Preventing a Fork in a Blockchain - David Fighting Goliath. 1044-1051 - Ting Su, Jiahe Shi, Yongkang Tang, Shaoqing Li:
Golden-Chip-Free Hardware Trojan Detection Through Thermal Radiation Comparison in Vulnerable Areas. 1052-1059 - Rohan Dahiya, Frank Jiang, Robin Doss
:
A Feedback-Driven Lightweight Reputation Scheme for IoV. 1060-1068 - Md. Atik Shahriar
, Faisal Haque Bappy
, A. K. M. Fakhrul Hossain, Dayamoy Datta Saikat, Md. Sadek Ferdous
, Mohammad Jabed Morshed Chowdhury, Md. Zakirul Alam Bhuiyan:
Modelling Attacks in Blockchain Systems using Petri Nets. 1069-1078 - Md. Saiful Islam Bhuiyan
, Abdur Razzak
, Md. Sadek Ferdous
, Mohammad Jabed Morshed Chowdhury, Mohammad Ashraful Hoque, Sasu Tarkoma:
BONIK: A Blockchain Empowered Chatbot for Financial Transactions. 1079-1088 - Harsh Dhillon, Anwar Haque
:
Towards Network Traffic Monitoring Using Deep Transfer Learning. 1089-1096
Work-in-Progress Track
- Stanislaw Saganowski
:
A three-stage machine learning network security solution for public entities. 1097-1104 - Alexandros Bakas, Antonis Michalas
:
Multi-Input Functional Encryption: Efficient Applications from Symmetric Primitives. 1105-1112 - Rawan Baalous, Ronald Poet:
Factors Affecting Users' Disclosure Decisions in Android Runtime Permissions Model. 1113-1118 - Syed W. Shah, Naeem Firdous Syed
, Arash Shaghaghi, Adnan Anwar
, Zubair A. Baig, Robin Doss
:
Towards a Lightweight Continuous Authentication Protocol for Device-to-Device Communication. 1119-1126 - Arun Kumar Jindal, Imtiyazuddin Shaik, Vasudha, Srinivasa Rao Chalamala, Rajan M. A, Sachin Lodha:
Secure and Privacy Preserving Method for Biometric Template Protection using Fully Homomorphic Encryption. 1127-1134 - Muhammad Jehanzaib Yousuf, Mingjun Wang, Zheng Yan, Fawad Khan
:
Trusted Network Slicing among Multiple Mobile Network Operators. 1135-1140 - Andreas Aigner, Abdelmajid Khelil
:
A Scoring System to efficiently measure Security in Cyber-Physical Systems. 1141-1145 - Manaz Kaleel
, Nhien-An Le-Khac
:
Towards a new deep learning based approach for the password prediction. 1146-1150 - Qicheng Ma, Nidhi Rastogi:
DANTE: Predicting Insider Threat using LSTM on system logs. 1151-1156 - Qi Lei, Chao Li, Kexin Qiao
, Zhe Ma, Bo Yang:
VGG-based side channel attack on RSA implementation. 1157-1161 - Tao Zhang, Zelei Cheng
, Yi Qin, Qiang Li, Lin Shi:
Deep Learning for Password Guessing and Password Strength Evaluation, A Survey. 1162-1166 - Michel Barbeau, Frédéric Cuppens, Nora Cuppens, Romain Dagnas
, Joaquín García-Alfaro
:
Metrics to Enhance the Resilience of Cyber-Physical Systems. 1167-1172 - Ang Li, Wenjun Jiang, Xueqi Li
, Xinrong Chen, Guojun Wang:
Independent Worker Selection In Crowdsourcing. 1173-1178 - Wenjuan Li
, Weizhi Meng
, Hui Zhu:
Towards Collaborative Intrusion Detection Enhancement against Insider Attacks with Multi-Level Trust. 1179-1186 - Min Li, Haroon Elahi, Tao Peng, Fang Qi, Guojun Wang:
A Function-Centric Risk Assessment Approach for Android Applications. 1187-1193 - Fangzhou Zhu
, Liang Liu, Weizhi Meng
, Ting Lv, Simin Hu, Renjun Ye:
SCAFFISD: A Scalable Framework for Fine-grained Identification and Security Detection of Wireless Routers. 1194-1199 - Kuniyasu Suzaki
, Kenta Nakajima, Tsukasa Oi, Akira Tsukamoto:
Library Implementation and Performance Analysis of GlobalPlatform TEE Internal API for Intel SGX and RISC-V Keystone. 1200-1208 - James Jin Kang
, Mahdi Dibaei
, Gang Luo, Wencheng Yang, James Xi Zheng
:
A Privacy-Preserving Data Inference Framework for Internet of Health Things Networks. 1209-1214 - Yizhen Sun, Yiman Xie, Weiping Wang, Shigeng Zhang, Yuxi Wu, Jingchuan Feng:
RPAD: An Unsupervised HTTP Request Parameter Anomaly Detection Method. 1215-1221 - Tong Liu
, Xiaochen Yuan:
Image Self-Recovery Based on Authentication Feature Extraction. 1222-1227 - Manasi Mittal, Muhammad Rizwan Asghar
, Arvind K. Tripathi:
Do My Emotions Influence What I Share? Analysing the Effects of Emotions on Privacy Leakage in Twitter. 1228-1235 - Jinfang Sheng, Yan Hu, Kerong Guan, Bin Wang, Xiaoxia Pan, Wenjun Kang:
Robustness analysis and defence strategy of an interdependent networks model based on closeness centrality. 1236-1241 - Fatma Mohammed, A. S. M. Kayes, Eric Pardede, Wenny Rahayu:
A Framework for Measuring IoT Data Quality Based on Freshness Metrics. 1242-1249 - Xiuli Fang, Muhammad Rizwan Asghar
:
RevBloc: A Blockchain-based Secure Customer Review System. 1250-1259 - Amr Megahed, Qi Han:
Face2Face Manipulation Detection Based on Histogram of Oriented Gradients. 1260-1267 - Saurabh Chamotra, Ferdous Ahmed Barbhuiya:
Analysis and modelling of multi-stage attacks. 1268-1275 - Hootan Alavizadeh, Hooman Alavizadeh, Julian Jang-Jaccard:
Cyber Situation Awareness Monitoring and Proactive Response for Enterprises on the Cloud. 1276-1284 - Sanjiv S. Jha
, Simon Mayer, Tanja Schneider
:
Explicitly Privacy-Aware Space Usage Analysis. 1285-1290 - Abdullah Al Omar, Abu Kaisar Jamil, Md. Shakhawath Hossain Nur, Md Mahamudul Hasan, Rabeya Bosri, Md. Zakirul Alam Bhuiyan, Mohammad Shahriar Rahman
:
Towards A Transparent and Privacy-preserving Healthcare Platform with Blockchain for Smart Cities. 1291-1296 - Ba-Lam Do
, Quang-Thang Nguyen, Thang Nguyen, Tien-Thao Nguyen, Thanh-Chung Dao, Binh Minh Nguyen:
BML: A Data Mapping Language for Blockchain Platforms. 1297-1303
The 11th International Workshop on Collaborative Computing with Cloud and Client (C4W 2020)
- Tao Lu, Hongyun Xu, Kai Tian, Cenxi Tian, Rui Jiang:
Semantic Location Privacy Protection Algorithm Based on Edge Cluster Graph. 1304-1309 - Dimuth Lasantha, Biplob Ray
:
Priority based Modeling and Comparative study of Google Cloud Resources between 2011 and 2019. 1310-1317 - Aakanksha Sharma
, Venki Balasubramanian
, Alireza Jolfaei
:
Security Challenges and Solutions for 5G HetNet. 1318-1323 - Immanuel Kunz, Angelika Schneider, Christian Banse:
Privacy Smells: Detecting Privacy Problems in Cloud Architectures. 1324-1331 - Weizheng Wang, Huakun Huang
, Lejun Zhang, Zhaoyang Han, Chen Qiu, Chunhua Su:
BlockSLAP: Blockchain-based Secure and Lightweight Authentication Protocol for Smart Grid. 1332-1338 - Shan Liang, Yuewu Wang, Lingguang Lei, Jiwu Jing, Quan Zhou:
SecureESFS: Sharing Android External Storage Files in A Securer Way. 1339-1347 - Yuxi Li, Fucai Zhou, Zifeng Xu:
PPFQ: Privacy-Preserving Friends Query over Online Social Networks. 1348-1353 - Dong Liang, Qinrang Liu, Yanbin Hu, Tao Hu, Binghao Yan, Haiming Zhao:
Dynamic flow redirecton scheme for enhancing control plane robustness in SDN. 1354-1359 - Fariha Tasmin Jaigirdar
, Carsten Rudolph, Chris Bain:
Prov-IoT: A Security-Aware IoT Provenance Model. 1360-1367 - Ahmed Alshehri, Malek Ben Salem, Lei Ding
:
Are Smart Home Devices Abandoning IPV Victims? 1368-1375 - Tomoaki Mimoto, Shinsaku Kiyomoto, Koji Kitamura, Atsuko Miyaji
:
A Practical Privacy-Preserving Algorithm for Document Data. 1376-1383 - Muhammad Umar Farooq
, Xingfu Wang, Ammar Hawbani, Asad Khan, Adeel Ahmed, Fisseha Teju Wedaj
:
TORP: Load Balanced Reliable Opportunistic Routing for Asynchronous Wireless Sensor Networks. 1384-1389 - Tao Sun, Jing Yang, Wenjie Zhong:
CPN Model Checking Method of Concurrent Software Based on State Space Pruning. 1390-1394 - Yan Yan, Xin Gao, Adnan Mahmood
, Yang Zhang
, Shuang Wang, Quan Z. Sheng
:
An Arithmetic Differential Privacy Budget Allocation Method for the Partitioning and Publishing of Location Information. 1395-1401 - Syed Ghazanfar Abbas, Muhammad Husnain, Ubaid Ullah Fayyaz, Farrukh Shahzad, Ghalib A. Shah, Kashif Zafar:
IoT-Sphere: A Framework To Secure IoT Devices From Becoming Attack Target And Attack Source. 1402-1409 - Md Shamimur Rahman Shuvo, Dima Alhadidi:
Membership Inference Attacks: Analysis and Mitigation. 1410-1419 - Taha Al-Jody, Violeta Holmes
, Alexandros Antoniades, Yazan Kazkouzeh:
Bearicade: secure access gateway to High Performance Computing systems. 1420-1427 - Anthony Phipps, Karim Ouazzane, Vassil T. Vassilev
:
Enhancing Cyber Security Using Audio Techniques: A Public Key Infrastructure for Sound. 1428-1436 - Klaus Herberth:
Group Communication Needs No Consistent Transcript Distribution. 1437-1443 - Zhicheng Song, Pushpendu Kar:
Name-Signature Lookup System: A Security Enhancement to Named Data Networking. 1444-1448 - Vasileios Kouliaridis
, Georgios Kambourakis, Tao Peng:
Feature importance in Android malware detection. 1449-1454 - Chi Zhang, Jinfu Chen, Saihua Cai
, Bo Liu, Yiming Wu, Ye Geng:
iTES: Integrated Testing and Evaluation System for Software Vulnerability Detection Methods. 1455-1460
The 10th International Workshop on Assistive Engineering and Information Technology (AEIT 2020)
- Wei Liu, Wenlong Feng, Mengxing Huang, Guilai Han, Jialun Lin:
Plant Taxonomy In Hainan Based On Deep Convolutional Neural Network And Transfer Learning. 1461-1466 - Jing Zhu, Hongyu Ge, Ao Cheng, Ruobing Zhang, Lirong Wang:
Research on Stitching and Alignment of Mouse Carcass EM Images. 1468-1471 - Jiangchang Cheng, Yinglong Dai, Yao Yuan, Hongli Zhu:
A Simple Analysis of Multimodal Data Fusion. 1472-1475 - Deyin Li, Miao Zhang, Wei Shi, Huimin Zhang, Duoduo Wang, Lirong Wang:
Pyramid Pooling Channel Attention Network for esophageal tissue segmentation on OCT images. 1476-1480 - Mixue Deng, Lishen Qiu, Hongqing Wang, Wei Shi, Lirong Wang:
Atrial Fibrillation Classification Using Convolutional Neural Networks and Time Domain Features of ECG Sequence. 1481-1485 - Dong Wang, Lishen Qiu, Wei Shi, Hongqing Wang, Xiangxiang Xu, Lirong Wang:
Design and implementation of a multifunctional ECG analysis software system. 1486-1491 - Hui Kang, Lingfeng Lu, Hang Su:
A Four-Feature Keyword Extraction Algorithm Based on Word Length Priority ratio. 1492-1498 - Hui Kang, Shengquan Chen, Lingfeng Lu, Chenkun Meng:
Research and Improvement of Community Discovery Algorithm Based on Spark for Large Scale Complicated Networks. 1499-1508 - Xiaoying Li, Huai-bin Wang, Yuqiong Liu, Yuefei Wang, Zhen Liu:
An Investigation of Assistive Products for the Elderly. 1509-1514 - Yuefei Wang, Zhen Liu, Liucun Zhu, Xiaoying Li, Huaibin Wang:
An impedance control method of lower limb exoskeleton rehabilitation robot based on predicted forward dynamics. 1515-1518 - Haibo Chen, Junzuo Chen, Jinfu Chen, Shang Yin, Yiming Wu, Jiaping Xu:
An Automatic Vulnerability Scanner for Web Applications. 1519-1524 - Haibo Chen, Dalin Zhang, Jinfu Chen, Wei Lin, Dengzhou Shi, Zian Zhao:
An Automatic Vulnerability Classification System for IoT Softwares. 1525-1529
The 5th International Workshop on Privacy, Data Assurance, Security Solutions in the Internet of Things (PASS4IoT 2020)
- Hongzhaoning Kang, Gang Liu, Quan Wang, Runnan Zhang, Zichao Zhong, Yumin Tian:
Policy Evaluation and Dynamic Management Based on Matching Tree for XACML. 1530-1535 - Zhaoli Liu, Qindong Sun, Zhihai Yang, Kun Jiang, Jinpei Yan:
Fined-grained Aspect Extraction from Online Reviews for Decision Support. 1536-1541 - Xinchun Cui, Xueqing Li
, Yiming Qin
, Yong Ding:
A Password Strength Evaluation Algorithm based on Sensitive Personal Information. 1542-1545 - Gaofei Wei, Qiang Cai, Meng Li, Rui Dong, Yang Liu:
Prediction of high precision ignition process in the condition of multi flow area coupling of micro solid rocket motor. 1546-1551
The 4th International Workshop on Cyberspace Security (IWCSS 2020)
- Xiaoying Qiu, Guangda Li, Xuan Sun, Zhiguo Du:
Exploiting User Selection Algorithm for Securing Wireless Communication Networks. 1552-1555 - Ruxian Zhang, Zhaoju Zhang, Hong Di:
Easy-to-implement Campus Electronic Anonymous Voting System. 1556-1559 - Chaofan Chen, Zelei Cheng
, Zuotian Li, Manyi Wang:
Hypergraph Attention Networks. 1560-1565 - Ronghai Yang, Jia Liu, Liang Gu, Yurong Chen:
Search & Catch: Detecting Promotion Infection in the Underground through Search Engines. 1566-1571 - Xiaomei Liu, Xin Tang:
Image Authentication using QR Code Watermarking Approach based on Image Segmentation. 1572-1577 - Fan Yan, Jia Liu, Liang Gu, Zelong Chen:
A Semi-Supervised Learning Scheme to Detect Unknown DGA Domain Names based on Graph Analysis. 1578-1583 - Han Zhang, Ming Liu, Zihan Yue, Zhi Xue, Yong Shi, Xiangjian He
:
A PHP and JSP Web Shell Detection System With Text Processing Based On Machine Learning. 1584-1591 - Wei Ren
:
A Symmetric Uniform Formula and Sole Index Method for Sieving (Twin) Primes. 1592-1597 - Xiaohan Hao, Wei Ren, Wenwen Zheng, Tianqing Zhu:
SCScan: A SVM-based Scanning System for Vulnerabilities in Blockchain Smart Contracts. 1598-1605 - Jiajia Yi, Lirong Chen, Haitao Zhang, Yun Li, Huanyu Zhao:
A Security Model and Implementation of Embedded Software Based on Code Obfuscation. 1606-1613 - Yan Lin, Guosheng Xu, Guoai Xu, Yudong Chen, Dawei Sun:
Sensitive Information Detection based on Convolution Neural Network and Bi-directional LSTM. 1614-1621 - Dongkun Hou
, Jie Zhang, Ka Lok Man:
Enhancing the Security of Numeric Comparison Secure Simple Pairing in Bluetooth 5.0. 1622-1629 - David Mödinger
, Franz J. Hauck:
3P3: Strong Flexible Privacy for Broadcasts. 1630-1637 - Dominik Ziegler, Alexander Marsalek:
Efficient Revocable Attribute-Based Encryption with Hidden Policies. 1638-1645 - Thomas Hupperich
, Katharina Dassel:
On the Usefulness of User Nudging and Strength Indication Concerning Unlock Pattern Security. 1646-1654 - Yunxiu Ye, Zhenfu Cao, Jiachen Shen:
Unbounded Key-Policy Attribute-based Encryption with Black-Box Traceability. 1655-1663 - Jingxiang Zeng, Xiaofan Nie, Liwei Chen, Jinfeng Li, Gewangzi Du, Gang Shi:
An Efficient Vulnerability Extrapolation Using Similarity of Graph Kernel of PDGs. 1664-1671 - Samaneh Rashidibajgan, Thomas Hupperich
, Robin Doss
, Lei Pan:
Opportunistic Tracking in Cyber-Physical Systems. 1672-1679 - Jinghui Xu, Yu Wen, Chun Yang, Dan Meng:
An Approach for Poisoning Attacks against RNN-Based Cyber Anomaly Detection. 1680-1687 - Ren Yang, Xuebin Ma, Xiangyu Bai, Xiangdong Su:
Differential Privacy Images Protection Based on Generative Adversarial Network. 1688-1695 - Shengyi Guan, Xuebin Ma, Wuyungerile Li, Xiangyu Bai:
DP-Eclat: A Vertical Frequent Itemset Mining Algorithm Based on Differential Privacy. 1696-1703 - Xianze Liu, Jihong Liu, Bifei Jiang, Haozhen Jiang, Zhi Yang:
More efficient SM9 algorithm based on bilinear pair optimization processing. 1704-1710 - Yongkang Wu, Yiwei Shan, Zhichao Wang, Pengcheng Zhang, Min He, Jihong Liu:
SeWG: Security-enhanced WireGuard for Android Based on TEE. 1711-1717 - Xuejian Qi, Xuebin Ma, Xiangyu Bai, Wuyungerile Li:
Differential privacy preserving data publishing based on Bayesian network. 1718-1726 - Yixuan Wang
, Yujun Li, Xiang Chen, Yeni Luo:
Implementing Network Attack Detection with a Novel NSSA Model Based on Knowledge Graphs. 1727-1732 - Luping Ma, Dali Zhu, Shunliang Zhang, Xiaohui Zhang, Shumin Peng, Ya Li:
UIDroid: User-driven Based Hierarchical Access Control for Sensitive Information. 1733-1740 - Yongkang Wu, Langyue He, Yiwei Shan, Pengcheng Zhang, Min He, Zhi Yang:
TrustyShare: A Sharing Scheme using ARM TrustZone. 1741-1747 - Lorena González-Manzano, Sergio Bernardez, José María de Fuentes
:
SmartLED: Smartphone-based covert channels leveraging the notification LED. 1748-1755 - Zhichao Wang, Yiwei Shan, Zhi Yang, Ruoyi Wang, Shuang Song:
Semantic redirection obfuscation: A control flow obfuscation based on Android Runtime. 1756-1763 - Junzhi Yan, Xiaoyong Hang, Bo Yang, Li Su, Shen He:
Blockchain based PKI and Certificates Management in Mobile Networks. 1764-1770 - Shin-Ying Huang, Tao Ban:
Monitoring Social Media for Vulnerability-Threat Prediction and Topic Analysis. 1771-1776 - Jack Pye, Biju Issac
, Nauman Aslam, Husnain Rafiq
:
Android Malware Classification Using Machine Learning and Bio-Inspired Optimisation Algorithms. 1777-1782 - Muhammad Shadi Hajar, M. Omar Al-Kadri
, Harsha K. Kalutarage
:
LTMS: A Lightweight Trust Management System for Wireless Medical Sensor Networks. 1783-1790 - Tanveer Khan, Antonis Michalas
:
Trust and Believe - Should We? Evaluating the Trustworthiness of Twitter Users. 1791-1800 - Theo Dimitrakos
, Tezcan Dilshener, Alexander Kravtsov, Antonio La Marra, Fabio Martinelli, Athanasios Rizos, Alessandro Rosetti, Andrea Saracino:
Trust Aware Continuous Authorization for Zero Trust in Consumer Internet of Things. 1801-1812 - Xiaoyang Liu, Ziyuan Zhu:
pcSVF: An Evaluation of Side-Channel Vulnerability of Port Contention. 1813-1819 - Syed Ghazanfar Abbas, Fabiha Hashmat, Ghalib A. Shah:
A Multi-Layer Industrial-IoT Attack Taxonomy: Layers, Dimensions, Techniques and Application. 1820-1825 - Andreas Aigner, Abdelmajid Khelil
:
A Semantic Model-based Security Engineering Framework for Cyber-Physical Systems. 1826-1833 - Ahmad Salehi S., Carsten Rudolph, Marthie Grobler
:
Attribute-Based Data Access Control for Multi-Authority System. 1834-1841 - Xuren Wang, Xinpei Liu, Shengqin Ao, Ning Li, Zhengwei Jiang, Zongyi Xu, Zihan Xiong, Mengbo Xiong, Xiaoqing Zhang:
DNRTI: A Large-scale Dataset for Named Entity Recognition in Threat Intelligence. 1842-1848 - Gerald Palfinger
, Bernd Prünster
, Dominik Julian Ziegler:
AndroTIME: Identifying Timing Side Channels in the Android API. 1849-1856 - Eric Klieme, Jonathan Wilke, Niklas van Dornick, Christoph Meinel:
FIDOnuous: A FIDO2/WebAuthn Extension to Support Continuous Web Authentication. 1857-1867 - Mohamed Ali Kandi
, Djamel Eddine Kouicem, Hicham Lakhlef, Abdelmadjid Bouabdallah, Yacine Challal
:
A Blockchain-based Key Management Protocol for Secure Device-to-Device Communication in the Internet of Things. 1868-1873 - Eyal Nussbaum, Michael Segal:
Finding Geometric Medians with Location Privacy. 1874-1881 - Wanrong Zhao, Hossain Shahriar
, Victor Clincy, Md. Zakirul Alam Bhuiyan:
Security and Privacy Analysis of mhealth Application: A Case Study. 1882-1887 - Eda Zhou, Joseph Turcotte, Lorenzo De Carli:
Enabling Security Analysis of IoT Device-to-Cloud Traffic. 1888-1894 - Rick Cents, Nhien-An Le-Khac
:
Towards A New Approach to Identify WhatsApp Messages. 1895-1902
The 3rd International Workshop on Blockchain Systems and Applications (BlockchainSys 2020)
- Hossein Rezaeighaleh, Cliff C. Zou:
Efficient Off-Chain Transaction to Avoid Inaccessible Coins in Cryptocurrencies. 1903-1909 - Monika Di Angelo
, Gernot Salzer
:
Assessing the Similarity of Smart Contracts by Clustering their Interfaces. 1910-1919 - Zahra Jadidi
, Ali Dorri, Raja Jurdak
, Colin J. Fidge:
Securing Manufacturing Using Blockchain. 1920-1925 - Markus Knecht, Burkhard Stiller:
SCUR: Smart Contracts with a Static Upper-bound on Resource Usage. 1926-1934 - Rafael Belchior, Benedikt Putz, Günther Pernul, Miguel Correia
, André Vasconcelos
, Sérgio Guerreiro
:
SSIBAC: Self-Sovereign Identity Based Access Control. 1935-1943 - Tao Peng, Jierong Liu, Jianer Chen, Guojun Wang:
A Privacy-Preserving Crowdsensing System with Muti-Blockchain. 1944-1949 - Dawei Wang, Xiao Chen, Haiqin Wu
, Ruozhou Yu
, Yishi Zhao:
A Blockchain-based Vehicle-trust Management Framework Under a Crowdsourcing Environment. 1950-1955 - Jinshan Shi, Ru Li:
Permission Token Segmentation Scheme based on Blockchain Access Control. 1956-1964 - Nicolas Six
, Claudia Negri-Ribalta
, Nicolas Herbaut, Camille Salinesi:
A blockchain-based pattern for confidential and pseudo-anonymous contract enforcement. 1965-1970
The 2020 International Workshop on Machine Learning for Trust, Security and Privacy in Computing and Communications (MLTrustCom 2020)
- Yu-Chih Wei, You-Xin Lai, Hai-Po Su, Yu-Wen Yen:
Detecting Online Game Malicious Chargeback by using k-NN. 1971-1976 - Li Jian, Fei Rong, Tang Yu:
A novel Q-Learning Algorithm Based on the Stochastic Environment Path Planning Problem. 1977-1982 - Tran Phuong Thao, Hoang-Quoc Nguyen-Son, Rie Shigetomi Yamaguchi, Toshiyuki Nakata
:
Boosting Homograph Attack Classification Using Ensemble Learning and N-gram Model. 1983-1988 - Yizhuo Zhang, Yiwei Liu, Chi-Hua Chen
:
Survey on Blockchain and Deep Learning. 1989-1994 - Rina Okada, Zen Ishikura, Toshiki Shibahara, Satoshi Hasegawa:
Special-purpose Model Extraction Attacks: Stealing Coarse Model with Fewer Queries. 1995-2000
The 2020 International Workshop on Smart Technologies for Intelligent Transportation and Communications (SmartITC 2020)
- Maozhu Liao, Shengdong Chen, Chuangjie Zheng, Feng Yuan:
A low-cost method for accurate localization of traffic participants. 2001-2006 - Muhammad Arif, Walter Balzano, Alessandro Fontanella, Silvia Stranieri, Guojun Wang, Xiaofei Xing:
Integration of 5G, VANETs and Blockchain Technology. 2007-2013 - Mihaela Hnatiuc, Oana Geman, Dragos Vicoveanu
, George Motru:
Aquatic Drone Control Using Inertial Sensors - Comparative Filtering Methods. 2014-2019 - Yingying Ma, Shuo Li
, Shaotian Qin, Yue Qi
:
Factors affecting trust in the autonomous vehicle: A survey of primary school students and parent perceptions. 2020-2027 - Hubert Kyeremateng-Boateng, Marvin A. Conn, Darsana Josyula
, Manohar Mareboyana:
Prediction of Radio Frequency Spectrum Occupancy. 2028-2034

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.