Login / Signup
UbiSec
2021
2024
2021
2024
Keyphrases
Publications
volume 2034, 2024
Ubiquitous Security - Third International Conference, UbiSec 2023, Exeter, UK, November 1-3, 2023, Revised Selected Papers
UbiSec
2034 (2024)
2023
Yuheng Zhang
,
Pin Liu
,
Guojun Wang
,
Peiqiang Li
,
Wanyi Gu
,
Houji Chen
,
Xuelei Liu
,
Jinyao Zhu
FRAD: Front-Running Attacks Detection on Ethereum Using Ternary Classification Model.
UbiSec
(2023)
Yuwei Xu
,
Tiantian Zhang
,
Junyu Zeng
,
Rongrong Wang
,
Kehui Song
,
Jingdong Xu
SmartBuoy: A Machine Learning-Based Detection Method for Interest Flooding Attacks in VNDN.
UbiSec
(2023)
Michael Mireku Kwakye
,
Ken Barker
Blockchain-Based Privacy-Preservation Platform for Data Storage and Query Processing.
UbiSec
(2023)
Lars Hupel
,
Makan Rafiee
How Does Post-quantum Cryptography Affect Central Bank Digital Currency?
UbiSec
(2023)
Petr Muzikant
,
Jan Willemson
Deploying Post-quantum Algorithms in Existing Applications and Embedded Devices.
UbiSec
(2023)
Tieming Geng
,
Chin-Tser Huang
,
Csilla Farkas
SCORD: Shuffling Column-Oriented Relational Database to Enhance Security.
UbiSec
(2023)
Chin-Tser Huang
,
Laurent Njilla
,
Matthew Sharp
,
Tieming Geng
SMARPchain: A Smart Marker Based Reputational Probabilistic Blockchain for Multi-agent Systems.
UbiSec
(2023)
Andri Rai
,
Eul Gyu Im
Multi-NetDroid: Multi-layer Perceptron Neural Network for Android Malware Detection.
UbiSec
(2023)
Zhonghao Lu
,
Lina Xu
,
Ying Hu
,
Liping Sun
,
Yonglong Luo
Channel Spatio-Temporal Convolutional Network for Trajectory Prediction.
UbiSec
(2023)
Harry Halpin
Simulation of Mixmining Reward Parameters for the Nym Mixnet.
UbiSec
(2023)
Faseeh Iftikhar
,
Muhammad Faizan Khan
,
Guojun Wang
,
Fazli Wahid
Privacy Preserving Elder Fall Detection Using Deep Learning.
UbiSec
(2023)
Antonin Verdier
,
Romain Laborde
,
Mohamed Ali Kandi
,
Abdelmalek Benzekri
A SLAHP in the Face of DLL Search Order Hijacking.
UbiSec
(2023)
Daniel Chong
,
Junjie Zhang
,
Nathaniel Boland
,
Lingwei Chen
Automatically Inferring Image Base Addresses of ARM32 Binaries Using Architecture Features.
UbiSec
(2023)
Avishka Shamendra
,
Binoy Peries
,
Gayangi Seneviratne
,
Sunimal Rathnayake
TruFaaS - Trust Verification Framework for FaaS.
UbiSec
(2023)
Cong Zha
,
Zhenan Xu
,
Ju Xing
,
Hao Yin
Loft: An Architecture for Lifetime Management of Privacy Data in Service Cooperation.
UbiSec
(2023)
Amirah Almutairi
,
BooJoong Kang
,
Nawfal Al Hashimy
BiBERT-AV: Enhancing Authorship Verification Through Siamese Networks with Pre-trained BERT and Bi-LSTM.
UbiSec
(2023)
Li Ma
,
Qidi Lao
,
Wenyin Yang
,
Zexian Yang
,
Dong Yuan
,
Zhaoxiong Bu
Research on Authorization Model of Attribute Access Control Based on Knowledge Graph.
UbiSec
(2023)
Vinay Sachidananda
,
Berwyn Chai
,
Florian Gondesen
,
Kwok-Yan Lam
,
Yang Liu
Honey-Gauge: Enabling User-Centric Honeypot Classification.
UbiSec
(2023)
Zheqi Feng
,
Tao Peng
,
Guojun Wang
,
Kejian Guan
Bilateral Personalized Information Fusion in Mobile Crowdsensing.
UbiSec
(2023)
Aysan Esmradi
,
Daniel Wankit Yip
,
Chun-Fai Chan
A Comprehensive Survey of Attack Techniques, Implementation, and Mitigation Strategies in Large Language Models.
UbiSec
(2023)
Georgios P. Spathoulas
,
Marios Anagnostopoulos
,
Konstantinos Papageorgiou
,
Georgios Kavallieratos
,
Georgios Theodoridis
Improving DNS Data Exfiltration Detection Through Temporal Analysis.
UbiSec
(2023)
Qingru Li
,
Yahong Wang
,
Fangwei Wang
,
Zhiyuan Tan
,
Changguang Wang
A Probability Mapping-Based Privacy Preservation Method for Social Networks.
UbiSec
(2023)
Masayoshi Tsutsui
,
Tatsuya Kaneko
,
Shinya Takamaeda-Yamazaki
Poison Egg: Scrambling Federated Learning with Delayed Backdoor Attack.
UbiSec
(2023)
Mohammad Rafsun Islam
,
Ahmed Saleh Bataineh
,
Mohammad Zulkernine
Detection of Cyberbullying in Social Media Texts Using Explainable Artificial Intelligence.
UbiSec
(2023)
Andrei Vasile Mihalca
,
Ciprian Pavel Oprisa
Impact of Library Code in Binary Similarity Systems.
UbiSec
(2023)
Tsz Ho Pun
,
Yi Jun He
,
Siu Ming Yiu
Privacy-Preserving Blockchain-Based Traceability System with Decentralized Ciphertext-Policy Attribute-Based Encryption.
UbiSec
(2023)
Andre Büttner
,
Andreas Thue Pedersen
,
Stephan Wiefling
,
Nils Gruschka
,
Luigi Lo Iacono
Is It Really You Who Forgot the Password? When Account Recovery Meets Risk-Based Authentication.
UbiSec
(2023)
Ali Alshumrani
,
Nathan L. Clarke
,
Bogdan Ghita
A Unified Knowledge Graph to Permit Interoperability of Heterogenous Digital Evidence.
UbiSec
(2023)
Chun-Fai Chan
,
Kam-Pui Chow
Process Mining with Programmable Logic Controller Memory States.
UbiSec
(2023)
volume 1768, 2023
Ubiquitous Security - Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28-31, 2022, Revised Selected Papers
UbiSec
1768 (2023)
2022
Saad Khan
,
Tariq A. A. Alsboui
,
Richard Hill
,
Hussain Al-Aqrabi
Multi-Mobile Agent Security by Design Itinerary Planning Approach in Wireless Sensor Network.
UbiSec
(2022)
Li Duan
,
Yong Li
High-Speed Anonymous Device Authentication Without Asymmetric Cryptography in the Internet-of-Things.
UbiSec
(2022)
Haiyang Huang
,
Falong Xiao
,
Xiaofang Zhang
,
Wanting Yan
,
Fumin Liu
,
Yuezhong Wu
Garbage Recognition Algorithm Based on Self-attention Mechanism and Deep Sorting.
UbiSec
(2022)
Mohammed Kharma
,
Adel Taweel
Threat Modeling in Cloud Computing - A Literature Review.
UbiSec
(2022)
Yun Duan
,
Laifu Wang
,
Dongxin Liu
,
Boren Deng
,
Yunfan Tian
Malware Traffic Classification Based on GAN and BP Neural Networks.
UbiSec
(2022)
Michael Tsai
,
Vimal Kumar
Listen to the Music: Evaluating the Use of Music in Audio Based Authentication.
UbiSec
(2022)
Akram Louati
,
Tiago Gasiba
Source Code Vulnerability Detection Using Deep Learning Algorithms for Industrial Applications.
UbiSec
(2022)
Yanbin Weng
,
Zuochuang Li
,
Xiaobin Huang
,
Xiahu Chen
Improved DeepLabV3+ based Railway Track Extraction to Enhance Railway Transportation Safety.
UbiSec
(2022)
Sabrina Friedl
,
Ludwig Englbrecht
,
Fabian Böhm
,
Günther Pernul
Support Tool Selection in Digital Forensics Training.
UbiSec
(2022)
Zhiqiang Wang
,
Sulong Meng
,
Ying Chen
Vulnerability Detection with Representation Learning.
UbiSec
(2022)
Songlv Feng
,
Cuina Cheng
,
Liping Mo
An Improved Cuckoo Search Algorithm and Its Application in Function Optimization.
UbiSec
(2022)
Mst. Shapna Akter
,
Hossain Shahriar
,
Zakirul Alam Bhuiya
Automated Vulnerability Detection in Source Code Using Quantum Natural Language Processing.
UbiSec
(2022)
Wanyi Gu
,
Guojun Wang
,
Peiqiang Li
,
Xubin Li
,
Guangxin Zhai
,
Xiangbin Li
,
Mingfei Chen
Detecting Unknown Vulnerabilities in Smart Contracts with Multi-Label Classification Model Using CNN-BiLSTM.
UbiSec
(2022)
Wenti Yang
,
Zhaoyang He
,
Yalei Li
,
Haiyan Zhang
,
Zhitao Guan
A Hybrid Secure Two-Party Protocol for Vertical Federated Learning.
UbiSec
(2022)
Khalid Hamid
,
Muhammad Waseem Iqbal
,
Muhammad Aqeel
,
Xiangyong Liu
,
Muhammad Arif
Analysis of Techniques for Detection and Removal of Zero-Day Attacks (ZDA).
UbiSec
(2022)
John Carter
,
Spiros Mancoridis
,
Malvin Nkomo
,
Steven Weber
,
Kapil R. Dandekar
System Call Processing Using Lightweight NLP for IoT Behavioral Malware Detection.
UbiSec
(2022)
Irfan Ali
,
Muhammad Naeem Shehzad
,
Qaisar Bashir
,
Haroon Elahi
,
Muhammad Naeem Awais
,
Oana Geman
,
Pin Liu
A Thermal-Aware Scheduling Algorithm for Reducing Thermal Risks in DAG-Based Applications in Cyber-Physical Systems.
UbiSec
(2022)
Tiange Zhao
,
Ulrike Lechner
,
Maria Pinto-Albuquerque
,
Ece Ata
,
Tiago Gasiba
CATS: A Serious Game in Industry Towards Stronger Cloud Security.
UbiSec
(2022)
volume 1557, 2022
Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers
UbiSec
1557 (2022)