​
Login / Signup
ICICS (2)
2021
2021
2021
Keyphrases
Publications
2021
Sicong Han
,
Chenhao Lin
,
Chao Shen
,
Qian Wang
Rethinking Adversarial Examples Exploiting Frequency-Based Analysis.
ICICS (2)
(2021)
Shiwei Chen
,
Ting Cui
,
Chenhui Jin
Security Analysis of Even-Mansour Structure Hash Functions.
ICICS (2)
(2021)
Dali Zhu
,
Long Yang
,
Hualin Zeng
Remote Recovery of Sound from Speckle Pattern Video Based on Convolutional LSTM.
ICICS (2)
(2021)
Wei Zong
,
Yang-Wai Chow
,
Willy Susilo
Black-Box Audio Adversarial Example Generation Using Variational Autoencoder.
ICICS (2)
(2021)
Guofeng Tang
On Tightly-Secure (Linkable) Ring Signatures.
ICICS (2)
(2021)
Zhiyuan An
,
Zhuoran Zhang
,
Yamin Wen
,
Fangguo Zhang
Lattice-Based Secret Handshakes with Reusable Credentials.
ICICS (2)
(2021)
Yang Xiao
,
Jie Li
,
Wengui Su
A Lightweight Metric Defence Strategy for Graph Neural Networks Against Poisoning Attacks.
ICICS (2)
(2021)
Zan Chen
,
Chaocheng Ma
,
Yuanjing Feng
,
Xingsong Hou
Compressive Sensing Image Steganography via Directional Lifting Wavelet Transform.
ICICS (2)
(2021)
Baodong Qin
,
Xue Bai
,
Dong Zheng
,
Hui Cui
,
Yiyuan Luo
Forward-Secure Revocable Identity-Based Encryption.
ICICS (2)
(2021)
Yiming Zhu
,
Zhen Liu
,
Yanbin Pan
When NTT Meets Karatsuba: Preprocess-then-NTT Technique Revisited.
ICICS (2)
(2021)
Yunfeng Ji
,
Yang Tao
,
Rui Zhang
More Efficient Construction of Anonymous Signatures.
ICICS (2)
(2021)
Kai Zhang
,
Zhe Jiang
,
Junqing Gong
,
Haifeng Qian
Updatable All-But-One Dual Projective Hashing and Its Applications.
ICICS (2)
(2021)
Wenxin Li
,
Qi Wang
,
Run Wang
,
Lei Zhao
,
Lina Wang
Exposing DeepFakes via Localizing the Manipulated Artifacts.
ICICS (2)
(2021)
Zongyang Zhang
,
Zibo Zhou
,
Weihan Li
,
Hongyu Tao
An Optimized Inner Product Argument with More Application Scenarios.
ICICS (2)
(2021)
Xiaohan Zhang
,
Chi Cheng
,
Ruoyu Ding
Small Leaks Sink a Great Ship: An Evaluation of Key Reuse Resilience of PQC Third Round Finalist NTRU-HRSS.
ICICS (2)
(2021)
Nour Elhouda Souid
,
Kais Klai
A Novel Approach for Supervisor Synthesis to Enforce Opacity of Discrete Event Systems.
ICICS (2)
(2021)
Yuxuan Zhang
,
Zhaoyang Wang
,
Boyang Zhang
,
Yu Wen
,
Dan Meng
Black-Box Buster: A Robust Zero-Shot Transfer-Based Adversarial Attack Method.
ICICS (2)
(2021)
Di Xiao
,
Shuwen Lan
Secure Image Coding Based on Compressive Sensing with Optimized Rate-Distortion.
ICICS (2)
(2021)
Shuaigang Li
,
Xianhui Lu
,
Jiang Zhang
,
Bao Li
,
Lei Bi
Predicting the Concrete Security of LWE Against the Dual Attack Using Binary Search.
ICICS (2)
(2021)
Yaqi Xu
,
Baofeng Wu
,
Dongdai Lin
Rotational-Linear Attack: A New Framework of Cryptanalysis on ARX Ciphers with Applications to Chaskey.
ICICS (2)
(2021)
Gao Wang
,
Gaoli Wang
Improved Differential-ML Distinguisher: Machine Learning Based Generic Extension for Differential Analysis.
ICICS (2)
(2021)
Mohammed Shujaa Aldeen
,
Chuan Zhao
Rare Variants Analysis in Genetic Association Studies with Privacy Protection via Hybrid System.
ICICS (2)
(2021)
Zhenghao Wu
,
Jian Weng
,
Anjia Yang
,
Lisha Yao
,
Xiaojian Liang
,
Zike Jiang
,
Jinghang Wen
Efficient and Fully Secure Lattice-Based IBE with Equality Test.
ICICS (2)
(2021)
volume 12919, 2021
Information and Communications Security - 23rd International Conference, ICICS 2021, Chongqing, China, November 19-21, 2021, Proceedings, Part II
ICICS (2)
12919 (2021)