Login / Signup
SecureComm
2005
2011
2017
2023
2005
2023
Keyphrases
Publications
volume 462, 2023
Security and Privacy in Communication Networks - 18th EAI International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings
SecureComm
462 (2023)
2022
Wen Xie
,
Niusen Chen
,
Bo Chen
Enabling Accurate Data Recovery for Mobile Devices Against Malware Attacks.
SecureComm
(2022)
Tianning Zhang
,
Miao Cai
,
Diming Zhang
,
Hao Huang
eSROP Attack: Leveraging Signal Handler to Implement Turing-Complete Attack Under CFI Defense.
SecureComm
(2022)
Shohei Kakei
,
Yoshiaki Shiraishi
,
Shoichi Saito
Granting Access Privileges Using OpenID Connect in Permissioned Distributed Ledgers.
SecureComm
(2022)
Muhammad Shadi Hajar
,
Harsha K. Kalutarage
,
M. Omar Al-Kadri
DQR: A Double Q Learning Multi Agent Routing Protocol for Wireless Medical Sensor Network.
SecureComm
(2022)
Zhengxiang Zhou
,
Cong Wang
,
Qingchuan Zhao
No-Fuzz: Efficient Anti-fuzzing Techniques.
SecureComm
(2022)
Mengyao Shi
,
Zhu Wang
,
Tingting Peng
,
Fenghua Li
Message Recovery Attack of Kyber Based on Information Leakage in Decoding Operation.
SecureComm
(2022)
Omar Adel Ibrahim
,
Savio Sciancalepore
,
Roberto Di Pietro
MAG-PUF: Magnetic Physical Unclonable Functions for Device Authentication in the IoT.
SecureComm
(2022)
Farzaneh Abazari
,
Enrico Branca
,
Evgeniya Novikova
,
Natalia Stakhanova
Language and Platform Independent Attribution of Heterogeneous Code.
SecureComm
(2022)
Tongwei Ren
,
Ryan Williams
,
Sirshendu Ganguly
,
Lorenzo De Carli
,
Long Lu
Breaking Embedded Software Homogeneity with Protocol Mutations.
SecureComm
(2022)
Douglas J. Leith
What Data Do the Google Dialer and Messages Apps on Android Send to Google?
SecureComm
(2022)
Pranay Kapoor
,
Rohan Pagey
,
Mohammad Mannan
,
Amr M. Youssef
Silver Surfers on the Tech Wave: Privacy Analysis of Android Apps for the Elderly.
SecureComm
(2022)
Maryam Davari
,
Mohammad Zulkernine
Classification-Based Anomaly Prediction in XACML Policies.
SecureComm
(2022)
Jingzhe Wang
,
Balaji Palanisamy
CTDRB: Controllable Timed Data Release Using Blockchains.
SecureComm
(2022)
Qian Qiang
,
Yige Chen
,
Yang Hu
,
Tianning Zang
,
Mian Cheng
,
Quanbo Pan
,
Yu Ding
,
Zisen Qi
Cost-Effective Malware Classification Based on Deep Active Learning.
SecureComm
(2022)
Haitao Xiao
,
Chen Zhang
,
Song Liu
,
Bo Jiang
,
Zhigang Lu
,
Fei Wang
,
Yuling Liu
CapsITD: Malicious Insider Threat Detection Based on Capsule Neural Network.
SecureComm
(2022)
Cavidan Yakupoglu
,
Kurt Rohloff
PREFHE, PREFHE-AES and PREFHE-SGX: Secure Multiparty Computation Protocols from Fully Homomorphic Encryption and Proxy ReEncryption with AES and Intel SGX.
SecureComm
(2022)
Qiying Dong
,
Ding Wang
,
Yaosheng Shen
,
Chunfu Jia
PII-PSM: A New Targeted Password Strength Meter Using Personally Identifiable Information.
SecureComm
(2022)
Niusen Chen
,
Bo Chen
,
Weisong Shi
A Cross-layer Plausibly Deniable Encryption System for Mobile Devices.
SecureComm
(2022)
Jingfei Bian
,
Nan Yu
,
Hong Li
,
Hongsong Zhu
,
Qiang Wang
,
Limin Sun
An Evolutionary Learning Approach Towards the Open Challenge of IoT Device Identification.
SecureComm
(2022)
Yuedong Pan
,
Lijun Cai
,
Tao Leng
,
Lixin Zhao
,
Jiangang Ma
,
Aimin Yu
,
Dan Meng
AttackMiner: A Graph Neural Network Based Approach for Attack Detection from Audit Logs.
SecureComm
(2022)
Peyman Momeni
,
Sergey Gorbunov
,
Bohan Zhang
FairBlock: Preventing Blockchain Front-Running with Minimal Overheads.
SecureComm
(2022)
Xiantong Hao
,
Dandan Ma
,
Hongliang Liang
Detection and Privacy Leakage Analysis of Third-Party Libraries in Android Apps.
SecureComm
(2022)
Sanjeev Shukla
,
Manoj Misra
,
Gaurav Varshney
Forensic Analysis and Detection of Spoofing Based Email Attack Using Memory Forensics and Machine Learning.
SecureComm
(2022)
Juanjuan Guo
,
Mengjie Shuai
,
Qiongxiao Wang
,
Wenyuan Li
,
Jingqiang Lin
Replicated Additive Secret Sharing with the Optimized Number of Shares.
SecureComm
(2022)
Qiang Liu
,
Hequ Xian
,
Jiancheng Zhang
,
Kunpeng Liu
A Random Reversible Watermarking Scheme for Relational Data.
SecureComm
(2022)
Sivaanandh Muneeswaran
,
Vinay Sachidananda
,
Rajendra Patil
,
Hongyi Peng
,
Mingchang Liu
,
Mohan Gurusamy
Hiatus: Unsupervised Generative Approach for Detection of DoS and DDoS Attacks.
SecureComm
(2022)
Sangat Vaidya
,
Santiago Torres-Arias
,
Justin Cappos
,
Reza Curtmola
Bootstrapping Trust in Community Repository Projects.
SecureComm
(2022)
Haochen Zhai
,
Futai Zou
,
Junhua Tang
,
Yue Wu
Towards High Transferability on Neural Network for Black-Box Adversarial Attacks.
SecureComm
(2022)
Zhengyu Liu
,
Haochen Su
,
Nannan Wang
,
Cheng Huang
Coreference Resolution for Cybersecurity Entity: Towards Explicit, Comprehensive Cybersecurity Knowledge Graph with Low Redundancy.
SecureComm
(2022)
Xiaoyi Duan
,
Ye Huang
,
Yonghua Su
,
Yujin Li
,
Xiaohong Fan
Research on the Grouping Method of Side-Channel Leakage Detection.
SecureComm
(2022)
Xiaoting Li
,
Lingwei Chen
,
Dinghao Wu
Adversary for Social Good: Leveraging Attribute-Obfuscating Attack to Protect User Privacy on Social Networks.
SecureComm
(2022)
Hanyu Jia
,
Xiangxue Li
,
Qiang Li
,
Yue Bao
,
Xintian Hou
Generic 2-Party PFE with Constant Rounds and Linear Active Security, and Efficient Instantiation.
SecureComm
(2022)
Alexandros Bakas
,
Eugene Frimpong
,
Antonis Michalas
Symmetrical Disguise: Realizing Homomorphic Encryption Services from Symmetric Primitives.
SecureComm
(2022)
Ziqiang Ma
,
Shuaigang Li
,
Jingqiang Lin
,
Quanwei Cai
,
Shuqin Fan
,
Fan Zhang
,
Bo Luo
Another Lattice Attack Against ECDSA with the wNAF to Recover More Bits per Signature.
SecureComm
(2022)
Kemin Zhang
,
Li Yang
,
Lu Zhou
,
Jianfeng Ma
Decentralized and Efficient Blockchain Rewriting with Bi-level Validity Verification.
SecureComm
(2022)
Spandan Mahadevegowda
,
Ryan M. Gerdes
,
Thidapat Chantem
,
Rose Qingyang Hu
Secure CV2X Using COTS Smartphones over LTE Infrastructure.
SecureComm
(2022)
Jonathan Takeshita
,
Zachariah Carmichael
,
Ryan Karl
,
Taeho Jung
TERSE: Tiny Encryptions and Really Speedy Execution for Post-Quantum Private Stream Aggregation.
SecureComm
(2022)
Nanda Rani
,
Ayushi Mishra
,
Rahul Kumar
,
Sarbajit Ghosh
,
Sandeep K. Shukla
,
Priyanka Bagade
A Generalized Unknown Malware Classification.
SecureComm
(2022)
Ehsan Aghaei
,
Xi Niu
,
Waseem G. Shadid
,
Ehab Al-Shaer
SecureBERT: A Domain-Specific Language Model for Cybersecurity.
SecureComm
(2022)
Qige Song
,
Yongzheng Zhang
,
Shuhao Li
Multi-relational Instruction Association Graph for Cross-Architecture Binary Similarity Comparison.
SecureComm
(2022)
Ruizhong Du
,
Tianhe Zhang
Blockchain-Based Ciphertext Policy-Hiding Access Control Scheme.
SecureComm
(2022)
Robert Cantaragiu
,
Antonis Michalas
,
Eugene Frimpong
,
Alexandros Bakas
MetaPriv: Acting in Favor of Privacy on Social Media Platforms.
SecureComm
(2022)
Md Ali Reza Al Amin
,
Sachin Shetty
,
Valerio Formicola
,
Martin Otto
Assessing the Quality of Differentially Private Synthetic Data for Intrusion Detection.
SecureComm
(2022)
volume 238, 2018
Security and Privacy in Communication Networks - 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22-25, 2017, Proceedings
SecureComm
238 (2018)
2017
Kailong Wang
,
Guangdong Bai
,
Naipeng Dong
,
Jin Song Dong
A Framework for Formal Analysis of Privacy on SSO Protocols.
SecureComm
(2017)
Zheng Wang
,
Shui Yu
,
Scott Rose
An On-Demand Defense Scheme Against DNS Cache Poisoning Attacks.
SecureComm
(2017)
Yao Liu
,
Qingkai Zeng
,
Pinghai Yuan
Optimizing TLB for Access Pattern Privacy Protection in Data Outsourcing.
SecureComm
(2017)
Subramaniyam Kannan
,
Paul Wood
,
Larry Deatrick
,
Patricia Beane
,
Somali Chaterji
,
Saurabh Bagchi
TopHat : Topology-Based Host-Level Attribution for Multi-stage Attacks in Enterprise Systems Using Software Defined Networks.
SecureComm
(2017)
volume 198, 2017
Security and Privacy in Communication Networks - 12th International Conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016, Proceedings
SecureComm
198 (2017)