​
Login / Signup
ICICS (1)
2021
2021
2021
Keyphrases
Publications
2021
Yucheng Liu
,
Xiangxue Li
Source Identification from In-Vehicle CAN-FD Signaling: What Can We Expect?
ICICS (1)
(2021)
Bum Jun Kwon
,
Sanghyun Hong
,
Yuseok Jeon
,
Doowon Kim
Certified Malware in South Korea: A Localized Study of Breaches of Trust in Code-Signing PKI Ecosystem.
ICICS (1)
(2021)
Chuan Zhou
,
Huiyun Jing
,
Xin He
,
Liming Wang
,
Kai Chen
,
Duohe Ma
Disappeared Face: A Physical Adversarial Attack Method on Black-Box Face Detection Models.
ICICS (1)
(2021)
Fan Lang
,
Wei Wang
,
Lingjia Meng
,
Qiongxiao Wang
,
Jingqiang Lin
,
Li Song
Informer: Protecting Intel SGX from Cross-Core Side Channel Threats.
ICICS (1)
(2021)
Yu Fu
,
Wei Wang
,
Lingjia Meng
,
Qiongxiao Wang
,
Yuan Zhao
,
Jingqiang Lin
VIRSA: Vectorized In-Register RSA Computation with Memory Disclosure Resistance.
ICICS (1)
(2021)
Hao Li
,
Shanqing Guo
,
Peng Tang
,
Chengyu Hu
,
Zhenxiang Chen
TranFuzz: An Ensemble Black-Box Attack Framework Based on Domain Adaptation and Fuzzing.
ICICS (1)
(2021)
Wenzhuo Yang
,
Kwok-Yan Lam
Effective Anomaly Detection Model Training with only Unlabeled Data by Weakly Supervised Learning Techniques.
ICICS (1)
(2021)
Kunyu Yang
,
Xuexian Hu
,
Qihui Zhang
,
Jianghong Wei
,
Wenfen Liu
Studies of Keyboard Patterns in Passwords: Recognition, Characteristics and Strength Evolution.
ICICS (1)
(2021)
Jing Chen
,
Peidong Jiang
,
Kun He
,
Cheng Zeng
,
Ruiying Du
HIAWare: Speculate Handwriting on Mobile Devices with Built-In Sensors.
ICICS (1)
(2021)
Binbin Liu
,
Weijie Feng
,
Qilong Zheng
,
Jing Li
,
Dongpeng Xu
Software Obfuscation with Non-Linear Mixed Boolean-Arithmetic Expressions.
ICICS (1)
(2021)
Yongyan Guo
,
Zhengyu Liu
,
Cheng Huang
,
Jiayong Liu
,
Wangyuan Jing
,
Ziwang Wang
,
Yanghao Wang
CyberRel: Joint Entity and Relation Extraction for Cybersecurity Concepts.
ICICS (1)
(2021)
Junnan Wang
,
Qixu Liu
,
Chaoge Liu
,
Jie Yin
GAN-Based Adversarial Patch for Malware C2 Traffic to Bypass DL Detector.
ICICS (1)
(2021)
Zhu Liu
,
Lijun Cai
,
Lixin Zhao
,
Aimin Yu
,
Dan Meng
Towards Open World Traffic Classification.
ICICS (1)
(2021)
Shaojiang Deng
,
Jiaxing Luo
,
Yantao Li
CNN-Based Continuous Authentication on Smartphones with Auto Augmentation Search.
ICICS (1)
(2021)
Qin Si
,
Lei Cui
,
Lun Li
,
Zhenquan Ding
,
Yongji Liu
,
Zhiyu Hao
EmuIoTNet: An Emulated IoT Network for Dynamic Analysis.
ICICS (1)
(2021)
Yimin Liu
,
Xiangyang Luo
,
Han Li
Microblog User Location Inference Based on POI and Query Likelihood Model.
ICICS (1)
(2021)
Nikolay Ivanov
,
Hanqing Guo
,
Qiben Yan
Rectifying Administrated ERC20 Tokens.
ICICS (1)
(2021)
Thea Riebe
,
Tristan Wirth
,
Markus Bayer
,
Philipp Kuehn
,
Marc-André Kaufhold
,
Volker Knauthe
,
Stefan Guthe
,
Christian Reuter
CySecAlert: An Alert Generation System for Cyber Security Events Using Open Source Intelligence Data.
ICICS (1)
(2021)
Huiying Wang
,
Huixin Shen
,
Boyang Zhang
,
Yu Wen
,
Dan Meng
Generating Adversarial Point Clouds on Multi-modal Fusion Based 3D Object Detection Model.
ICICS (1)
(2021)
Yalun Wu
,
Minglu Song
,
Yike Li
,
Yunzhe Tian
,
Endong Tong
,
Wenjia Niu
,
Bowei Jia
,
Haixiang Huang
,
Qiong Li
,
Jiqiang Liu
Improving Convolutional Neural Network-Based Webshell Detection Through Reinforcement Learning.
ICICS (1)
(2021)
Huimei Liao
,
Haixia Xu
,
Peili Li
The Golden Snitch: A Byzantine Fault Tolerant Protocol with Activity.
ICICS (1)
(2021)
Arpan Manna
,
Harsh Kasyap
,
Somanath Tripathy
Moat: Model Agnostic Defense against Targeted Poisoning Attacks in Federated Learning.
ICICS (1)
(2021)
Lixia Xie
,
Honghong Sun
,
Hongyu Yang
,
Liang Zhang
Comprehensive Degree Based Key Node Recognition Method in Complex Networks.
ICICS (1)
(2021)
Yanduo Fu
,
Qiongxiao Wang
,
Jingqiang Lin
,
Aozhuo Sun
,
Linli Lu
Exploring the Security Issues of Trusted CA Certificate Management.
ICICS (1)
(2021)
Ahmed Tanvir Mahdad
,
Mohammed Jubur
,
Nitesh Saxena
Analyzing the Security of OTP 2FA in the Face of Malicious Terminals.
ICICS (1)
(2021)
Min Li
,
Chunfang Li
,
Shuailou Li
,
Yanna Wu
,
Boyang Zhang
,
Yu Wen
ACGVD: Vulnerability Detection Based on Comprehensive Graph via Graph Neural Network with Attention.
ICICS (1)
(2021)
volume 12918, 2021
Information and Communications Security - 23rd International Conference, ICICS 2021, Chongqing, China, November 19-21, 2021, Proceedings, Part I
ICICS (1)
12918 (2021)