Login / Signup
NSS
2009
2013
2019
2023
2009
2023
Keyphrases
Publications
2023
Aristodemos Paphitis
,
Nicolas Kourtellis
,
Michael Sirivianos
Resilience of Blockchain Overlay Networks.
NSS
(2023)
Songwei Luo
,
Shaojing Fu
,
Yuchuan Luo
,
Lin Liu
,
Yanxiang Deng
,
Shixiong Wang
Privacy-Preserving Federated Learning with Hierarchical Clustering to Improve Training on Non-IID Data.
NSS
(2023)
Ali Burak Ünal
,
Nico Pfeifer
,
Mete Akgün
ppAURORA: Privacy Preserving Area Under Receiver Operating Characteristic and Precision-Recall Curves.
NSS
(2023)
Zhuotao Lian
,
Chen Zhang
,
Kaixi Nan
,
Chunhua Su
SPoiL: Sybil-Based Untargeted Data Poisoning Attacks in Federated Learning.
NSS
(2023)
Mayank Raikwar
,
Shuang Wu
,
Kristian Gjøsteen
Security Model for Privacy-Preserving Blockchain-Based Cryptocurrency Systems.
NSS
(2023)
Samuel Herodotou
,
Feng Hao
Spying on the Spy: Security Analysis of Hidden Cameras.
NSS
(2023)
Amirah Almutairi
,
BooJoong Kang
,
Nawfal F. Fadhel
The Effectiveness of Transformer-Based Models for BEC Attack Detection.
NSS
(2023)
Mahshid Mehr Nezhad
,
Elliot Laidlaw
,
Feng Hao
Security Analysis of Mobile Point-of-Sale Terminals.
NSS
(2023)
Jia Wang
,
Shiqing He
,
Qiuzhen Lin
RRML: Privacy Preserving Machine Learning Based on Random Response Technology.
NSS
(2023)
Andres Hernandez-Matamoros
,
Hiroaki Kikuchi
New LDP Approach Using VAE.
NSS
(2023)
Rui Li
,
Olga Gadyatskaya
Evaluating Rule-Based Global XAI Malware Detection Methods.
NSS
(2023)
Yunusa Simpa Abdulsalam
,
Jaouhara Bouamama
,
Yahya Benkaouz
,
Mustapha Hedabou
Decentralized SGX-Based Cloud Key Management.
NSS
(2023)
Maharage Nisansala Sevwandi Perera
,
Toru Nakamura
,
Takashi Matsunaka
,
Hiroyuki Yokoyama
,
Kouichi Sakurai
Group Oriented Attribute-Based Encryption Scheme from Lattices with the Employment of Shamir's Secret Sharing Scheme.
NSS
(2023)
Andreas Paul
,
Franka Schuster
,
Hartmut König
Whitelisting for Characterizing and Monitoring Process Control Communication.
NSS
(2023)
Hiroki Kuzuno
,
Toshihiro Yamauchi
KDRM: Kernel Data Relocation Mechanism to Mitigate Privilege Escalation Attack.
NSS
(2023)
Xiangyu Su
,
Mario Larangeira
,
Keisuke Tanaka
Provably Secure Blockchain Protocols from Distributed Proof-of-Deep-Learning.
NSS
(2023)
Gilang Mentari Hamidy
,
Pieter Philippaerts
,
Wouter Joosen
T3E: A Practical Solution to Trusted Time in Secure Enclaves.
NSS
(2023)
David Arroyo
,
Sara Degli-Esposti
,
Alberto Gómez-Espés
,
Santiago Palmero Muñoz
,
Luis Pérez-Miguel
On the Design of a Misinformation Widget (MsW) Against Cloaked Science.
NSS
(2023)
Satoki Kanno
,
Mamoru Mimura
Detection of Malware Using Self-Attention Mechanism and Strings.
NSS
(2023)
Aurélien Greuet
,
Simon Montoya
,
Clémence Vermeersch
Modular Polynomial Multiplication Using RSA/ECC Coprocessor.
NSS
(2023)
Anna Monreale
,
Francesca Naretto
,
Simone Rizzo
Agnostic Label-Only Membership Inference Attack.
NSS
(2023)
volume 13983, 2023
Network and System Security - 17th International Conference, NSS 2023, Canterbury, UK, August 14-16, 2023, Proceedings
NSS
13983 (2023)
2022
Ru Ray Raymond Chao
,
Joseph K. Liu
,
Kai Su
Blockchain Based Regulatory Technology Deployment for Real Estate Transaction.
NSS
(2022)
Wei Yang
,
Shao-Jun Yang
,
Wei Wu
,
Yong Zhao
A Combination Reduction Algorithm and Its Application.
NSS
(2022)
Siqi Xia
,
Sutharshan Rajasegarar
,
Christopher Leckie
,
Sarah M. Erfani
,
Jeffrey Chan
Exploiting Redundancy in Network Flow Information for Efficient Security Attack Detection.
NSS
(2022)
Yining Xie
,
Xin Kang
,
Tieyan Li
,
Cheng-Kang Chu
,
Haiguang Wang
Towards Secure and Trustworthy Flash Loans: A Blockchain-Based Trust Management Approach.
NSS
(2022)
Guizhen Yang
,
Mengmeng Ge
,
Shang Gao
,
Xuequan Lu
,
Leo Yu Zhang
,
Robin Doss
A Differential Privacy Mechanism for Deceiving Cyber Attacks in IoT Networks.
NSS
(2022)
Hina Qayyum
,
Muhammad Salman
,
I Wayan Budi Sentana
,
Duc Linh Giang Nguyen
,
Muhammad Ikram
,
Gareth Tyson
,
Mohamed Ali Kâafar
A First Look at Android Apps' Third-Party Resources Loading.
NSS
(2022)
Han Xu
,
Priyadarsi Nanda
,
Jie Liang
,
Xiangjian He
The Force of Compensation, a Multi-stage Incentive Mechanism Model for Federated Learning.
NSS
(2022)
Ning Xi
,
Yajie Li
,
Jin Liu
Decentralized Access Control for Secure Microservices Cooperation with Blockchain.
NSS
(2022)
Keelan Evans
,
Alsharif Abuadbba
,
Tingmin Wu
,
Kristen Moore
,
Mohiuddin Ahmed
,
Ganna Pogrebna
,
Surya Nepal
,
Mike Johnstone
RAIDER: Reinforcement-Aided Spear Phishing Detector.
NSS
(2022)
Xinguo Feng
,
Yanjun Zhang
,
Mark Huasong Meng
,
Sin G. Teo
Detecting Contradictions from CoAP RFC Based on Knowledge Graph.
NSS
(2022)
Huihui Gong
,
Siqi Ma
,
Seyit Camtepe
,
Surya Nepal
,
Chang Xu
Vulnerability Detection Using Deep Learning Based Function Classification.
NSS
(2022)
Pierre Crochelet
,
Christopher Neal
,
Nora Boulahia-Cuppens
,
Frédéric Cuppens
Attacker Attribution via Characteristics Inference Using Honeypot Data.
NSS
(2022)
Yunhao Li
,
Weichuan Mo
,
Cong Li
,
Haiyang Wang
,
Jianwei He
,
Shanshan Hao
,
Hongyang Yan
Network Intrusion Detection Adversarial Attacks for LEO Constellation Networks Based on Deep Learning.
NSS
(2022)
Mengling Liu
,
Man Ho Au
Practical Anonymous Multi-hop Locks for Lightning Network Compatible Payment Channel Networks.
NSS
(2022)
Shuang Zhao
,
Jincheng Zhong
,
Shuhui Chen
,
Jianbing Liang
Comprehensive Mobile Traffic Characterization Based on a Large-Scale Mobile Traffic Dataset.
NSS
(2022)
Yang Hong
,
Lisong Wang
,
Weizhi Meng
,
Jian Cao
,
Chunpeng Ge
,
Qin Zhang
,
Rui Zhang
A Privacy-Preserving Distributed Machine Learning Protocol Based on Homomorphic Hash Authentication.
NSS
(2022)
Xiaoling Yu
,
Lei Xu
,
Xin Huang
,
Chungen Xu
An Efficient Lattice-Based Encrypted Search Scheme with Forward Security.
NSS
(2022)
Shyam Murthy
,
Srinivas Vivek
Driver Locations Harvesting Attack on pRide.
NSS
(2022)
Jianghua Liu
,
Lei Xu
,
Bruce Gu
,
Lei Cui
,
Fei Zhu
Efficient and Fine-Grained Sharing of Signed Healthcare Data in Smart Healthcare.
NSS
(2022)
Bhagyashri Tushir
,
Yuhong Liu
,
Behnam Dezfouli
Leveraging Frame Aggregation in Wi-Fi IoT Networks for Low-Rate DDoS Attack Detection.
NSS
(2022)
Shun Li
,
Guozhen Liu
,
Phuong Pham
Rebound Attacks on sfSKINNY Hashing with Automatic Tools.
NSS
(2022)
Eric Ficke
,
Raymond M. Bateman
,
Shouhuai Xu
Reducing Intrusion Alert Trees to Aid Visualization.
NSS
(2022)
Mengwei Yang
,
Chungen Xu
,
Pan Zhang
Geometric Range Searchable Encryption with Forward and Backward Security.
NSS
(2022)
Jiani Fan
,
Lwin Khin Shar
,
Jiale Guo
,
Wenzhuo Yang
,
Dusit Niyato
,
Kwok-Yan Lam
Differentiated Security Architecture for Secure and Efficient Infotainment Data Communication in IoV Networks.
NSS
(2022)
Hongcheng Xie
,
Zizhuo Chen
,
Yu Guo
,
Qin Liu
,
Xiaohua Jia
Privacy-Preserving Online Ride-Hailing Matching System with an Untrusted Server.
NSS
(2022)
Tianqi Zhou
,
Wenying Zheng
,
Haowen Tan
An Efficient Authenticated Group Key Agreement Protocol with Dynamic Batch Verification for Secure Distributed Networks.
NSS
(2022)
Zhuang Zhou
,
Cheng Tan
,
Shiyun Liu
,
Rongwei Yu
,
Siwei Wu
,
Shengwu Xiong
BSB: Bringing Safe Browsing to Blockchain Platform.
NSS
(2022)
volume 13787, 2022
Network and System Security - 16th International Conference, NSS 2022, Denarau Island, Fiji, December 9-12, 2022, Proceedings
NSS
13787 (2022)