​
Login / Signup
ICICS
1997
2007
2012
2023
1997
2023
Keyphrases
Publications
2023
Cong Zhang
,
Weiran Liu
,
Bolin Ding
,
Dongdai Lin
Efficient Private Multiset ID Protocols.
ICICS
(2023)
Chang Xu
,
Shiyao Zhang
,
Liehuang Zhu
,
Xiaodong Shen
,
Xiaoming Zhang
Illegal Accounts Detection on Ethereum Using Heterogeneous Graph Transformer Networks.
ICICS
(2023)
Yifu Geng
,
Bo Qin
,
Qin Wang
,
Wenchang Shi
,
Qianhong Wu
Subsidy Bridge: Rewarding Cross-Blockchain Relayers with Subsidy.
ICICS
(2023)
Renyang Liu
,
Jinhong Zhang
,
Haoran Li
,
Jin Zhang
,
Yuanyu Wang
,
Wei Zhou
AFLOW: Developing Adversarial Examples Under Extremely Noise-Limited Settings.
ICICS
(2023)
Futai Zou
,
Yuelin Hu
,
Wenliang Xu
,
Yue Wu
Link Prediction-Based Multi-Identity Recognition of Darknet Vendors.
ICICS
(2023)
Yeqi Fu
,
Yongzhi Liu
,
Qian Zhang
,
Zhou Yang
,
Xiarun Chen
,
Chenglin Xie
,
Weiping Wen
Finding Missing Security Operation Bugs via Program Slicing and Differential Check.
ICICS
(2023)
Loganathan Parthipan
,
Liqun Chen
,
Christopher J. P. Newton
,
Yunpeng Li
,
Fei Liu
,
Donghui Wang
DRoT: A Decentralised Root of Trust for Trusted Networks.
ICICS
(2023)
Hongyuan Qu
,
Guangwu Xu
Improvements of Homomorphic Secure Evaluation of Inverse Square Root.
ICICS
(2023)
Shuaishuai Li
,
Cong Zhang
,
Dongdai Lin
Oblivious Transfer from Rerandomizable PKE.
ICICS
(2023)
Wenyue Zheng
,
Ximeng Liu
,
Yuyang Wang
,
Xuanwei Lin
Graph Unlearning Using Knowledge Distillation.
ICICS
(2023)
Xuanyu Liang
,
Yincen Chen
,
Ling Song
,
Qianqian Yang
,
Zhuohui Feng
,
Tianrong Huang
Improved Related-Key Rectangle Attack Against the Full AES-192.
ICICS
(2023)
Ningjing Fan
,
Dongdong Zhao
,
Hucheng Liao
Security Analysis of Alignment-Robust Cancelable Biometric Scheme for Iris Verification.
ICICS
(2023)
Hongyu Yang
,
Jinjiao Zhang
,
Ze Hu
,
Liang Zhang
,
Xiang Cheng
A Fake News Detection Method Based on a Multimodal Cooperative Attention Network.
ICICS
(2023)
Weipeng Jiang
,
Chao Shen
,
Chenhao Lin
,
Jingyi Wang
,
Jun Sun
,
Xuanqi Gao
Black-Box Fairness Testing with Shadow Models.
ICICS
(2023)
Jianli Bai
,
Xiaowu Zhang
,
Xiangfu Song
,
Hang Shao
,
Qifan Wang
,
Shujie Cui
,
Giovanni Russello
CryptoMask: Privacy-Preserving Face Recognition.
ICICS
(2023)
Yaxin Cui
,
Hong Xu
,
Lin Tan
,
Wenfeng Qi
SAT-Aided Differential Cryptanalysis of Lightweight Block Ciphers Midori, MANTIS and QARMA.
ICICS
(2023)
Jiqiang Lu
,
Can Wang
Cryptanalysis of Two White-Box Implementations of the CLEFIA Block Cipher.
ICICS
(2023)
Yuhan Song
,
Yuefei Zhu
,
Fushan Wei
Towards Efficient and Privacy-Preserving Anomaly Detection of Blockchain-Based Cryptocurrency Transactions.
ICICS
(2023)
Shan Jin
,
Yong Li
,
Xi Chen
,
Ruxian Li
Blockchain Based Publicly Auditable Multi-party Computation with Cheater Detection.
ICICS
(2023)
Shengqian Wang
,
Amirali Salehi-Abari
,
Julie Thorpe
PiXi: Password Inspiration by Exploring Information.
ICICS
(2023)
Hong Zhao
,
Enting Guo
,
Chunhua Su
,
Xinyi Huang
Efficient and Appropriate Key Generation Scheme in Different IoT Scenarios.
ICICS
(2023)
Yuwei Xu
,
Lei Wang
,
Jiangfeng Li
,
Kehui Song
,
Yali Yuan
Zoomer: A Website Fingerprinting Attack Against Tor Hidden Services.
ICICS
(2023)
Xiaogang Cao
,
Fenghua Li
,
Kui Geng
,
Yingke Xie
,
Wenlong Kou
On-Demand Allocation of Cryptographic Computing Resource with Load Prediction.
ICICS
(2023)
Yuting Zuo
,
Li Xu
,
Yuexin Zhang
,
Zhaozhe Kang
,
Chenbin Zhao
BLAC: A Blockchain-Based Lightweight Access Control Scheme in Vehicular Social Networks.
ICICS
(2023)
Erya Jiang
,
Bo Qin
,
Qin Wang
,
Qianhong Wu
,
Sanxi Li
,
Wenchang Shi
,
Yingxin Bi
,
Wenyi Tang
BDTS: Blockchain-Based Data Trading System.
ICICS
(2023)
Arghya Bhattacharjee
,
Ritam Bhaumik
,
Avijit Dutta
,
Eik List
PAE: Towards More Efficient and BBB-Secure AE from a Single Public Permutation.
ICICS
(2023)
Takeshi Nakai
,
Kazumasa Shinagawa
Secure Multi-party Computation with Legally-Enforceable Fairness.
ICICS
(2023)
Kassem Bagher
,
Shujie Cui
,
Xingliang Yuan
,
Carsten Rudolph
,
Xun Yi
TimeClave: Oblivious In-Enclave Time Series Processing System.
ICICS
(2023)
Soohyeon Choi
,
Manar Mohaisen
,
Daehun Nyang
,
David Mohaisen
Revisiting the Deep Learning-Based Eavesdropping Attacks via Facial Dynamics from VR Motion Sensors.
ICICS
(2023)
Yuwei Xu
,
Haoyu Wang
,
Junyu Zeng
SCOPE: A Cross-Chain Supervision Scheme for Consortium Blockchains.
ICICS
(2023)
Jiacheng Luo
,
Xuhao Li
,
Hao Wang
,
Dongwan Lan
,
Xiaofei Wu
,
Lu Zhou
,
Liming Fang
An Enhanced Privacy-Preserving Hierarchical Federated Learning Framework for IoV.
ICICS
(2023)
Amirreza Hamidi
,
Hossein Ghodosi
Outsourcing Verifiable Distributed Oblivious Polynomial Evaluation from Threshold Cryptography.
ICICS
(2023)
Johan Hagelskjar Sjursen
,
Weizhi Meng
,
Wei-Yang Chiu
Towards Quantifying Cross-Domain Maximal Extractable Value for Blockchain Decentralisation.
ICICS
(2023)
Minqiu Tian
,
Fenghua Li
,
Kui Geng
,
Wenlong Kou
,
Chao Guo
A Certificateless Conditional Anonymous Authentication Scheme for Satellite Internet of Things.
ICICS
(2023)
Iraklis Leontiadis
,
Serge Vaudenay
Private Message Franking with After Opening Privacy.
ICICS
(2023)
Huangxinyue Wu
,
Haoran Li
,
Jinhong Zhang
,
Wei Zhou
,
Lei Guo
,
Yunyun Dong
Multi-scale Features Destructive Universal Adversarial Perturbations.
ICICS
(2023)
Huan Zou
,
Yuting Xiao
,
Rui Zhang
Semi-Honest 2-Party Faithful Truncation from Two-Bit Extraction.
ICICS
(2023)
Lichao Su
,
Bin Wu
,
Chenwei Dai
,
Huan Luo
,
Jian Chen
Learning to Detect Deepfakes via Adaptive Attention and Constrained Difference.
ICICS
(2023)
Sijia Liu
,
Min Luo
,
Cong Peng
,
Debiao He
Block Ciphers Classification Based on Randomness Test Statistic Value via LightGBM.
ICICS
(2023)
Hewei Yu
,
Pengfei Shi
A Novel Deep Ensemble Framework for Online Signature Verification Using Temporal and Spatial Representation.
ICICS
(2023)
Xubo Yang
,
Linsen Li
,
Yenan Chen
Neural Network Backdoor Attacks Fully Controlled by Composite Natural Utterance Fragments.
ICICS
(2023)
Xiaoling Yu
,
Yuntao Wang
Forward Secure Lattice-Based Ring Signature Scheme in the Standard Model.
ICICS
(2023)
Guoqing Zhou
,
Maozhi Xu
A Polynomial-Time Attack on G2SIDH.
ICICS
(2023)
Hong Huang
,
Xingyang Li
,
Wenjian He
Pixel-Wise Reconstruction of Private Data in Split Federated Learning.
ICICS
(2023)
volume 14252, 2023
Information and Communications Security - 25th International Conference, ICICS 2023, Tianjin, China, November 18-20, 2023, Proceedings
ICICS
14252 (2023)
2022
Mingchang Liu
,
Vinay Sachidananda
,
Hongyi Peng
,
Rajendra Patil
,
Sivaanandh Muneeswaran
,
Mohan Gurusamy
Peekaboo: Hide and Seek with Malware Through Lightweight Multi-feature Based Lenient Hybrid Approach.
ICICS
(2022)
Yang Han
,
Dawei Xu
,
Jiaqi Gao
,
Liehuang Zhu
Using Blockchains for Censorship-Resistant Bootstrapping in Anonymity Networks.
ICICS
(2022)
Jing Gao
,
Jun Xu
,
Tianyu Wang
,
Lei Hu
New Results of Breaking the CLS Scheme from ACM-CCS 2014.
ICICS
(2022)
Boyue Fang
,
Weize Wang
,
Yunlei Zhao
Tight Analysis of Decryption Failure Probability of Kyber in Reality.
ICICS
(2022)
volume 13407, 2022
Information and Communications Security - 24th International Conference, ICICS 2022, Canterbury, UK, September 5-8, 2022, Proceedings
ICICS
13407 (2022)