default search action
21st ICICS 2019: Beijing, China
- Jianying Zhou, Xiapu Luo, Qingni Shen, Zhen Xu:
Information and Communications Security - 21st International Conference, ICICS 2019, Beijing, China, December 15-17, 2019, Revised Selected Papers. Lecture Notes in Computer Science 11999, Springer 2020, ISBN 978-3-030-41578-5
Malware Analysis and Detection
- Lixin Zhao, Lijun Cai, Aimin Yu, Zhen Xu, Dan Meng:
Prototype-Based Malware Traffic Classification with Novelty Detection. 3-17 - Fenil Fadadu, Anand Handa, Nitesh Kumar, Sandeep Kumar Shukla:
Evading API Call Sequence Based Malware Classifiers. 18-33 - Pengbin Feng, Jianhua Sun, Songsong Liu, Kun Sun:
UBER: Combating Sandbox Evasion via User Behavior Emulators. 34-50
IoT and CPS Security
- Maged AbdelAty, Roberto Doriguzzi Corin, Domenico Siracusa:
AADS: A Noise-Robust Anomaly Detection Framework for Industrial Control Systems. 53-70 - Jianzhou You, Shichao Lv, Yichen Hao, Xuan Feng, Ming Zhou, Limin Sun:
Characterizing Internet-Scale ICS Automated Attacks Through Long-Term Honeypot Data. 71-88 - WeiPeng Jiang, Bin Wu, Zhou Jiang, ShaoBo Yang:
Cloning Vulnerability Detection in Driver Layer of IoT Devices. 89-104 - Jian Chen, Tao Shu:
Impact of Multiple Reflections on Secrecy Capacity of Indoor VLC System. 105-123 - Jingxuan Jiang, Chundong Wang, Sudipta Chattopadhyay, Wei Zhang:
Road Context-Aware Intrusion Detection System for Autonomous Cars. 124-142
Enterprise Network Security
- Wenzhuo Yang, Kwok-Yan Lam:
Automated Cyber Threat Intelligence Reports Classification for Early Warning of Cyber Attacks in Next Generation SOC. 145-164 - Meng Li, Lijun Cai, Aimin Yu, Haibo Yu, Dan Meng:
HeteroUI: A Framework Based on Heterogeneous Information Network Embedding for User Identification in Enterprise Networks. 165-180 - Suya Zhao, Renzheng Wei, Lijun Cai, Aimin Yu, Dan Meng:
CTLMD: Continuous-Temporal Lateral Movement Detection Using Graph Embedding. 181-196
Software Security
- Ning Guo, Xiaoyong Li, Hui Yin, Yali Gao:
VulHunter: An Automated Vulnerability Detection System Based on Deep Learning and Bytecode. 199-218 - Guanjun Lin, Wei Xiao, Jun Zhang, Yang Xiang:
Deep Learning-Based Vulnerable Function Detection: A Benchmark. 219-232 - Qiu Chen, Danping Shi, Siwei Sun, Lei Hu:
Automatic Demirci-Selçuk Meet-in-the-Middle Attack on SKINNY with Key-Bridging. 233-247
System Security
- Churan Tang, Zongbin Liu, Cunqing Ma, Jingquan Ge, Chenyang Tu:
SecFlush: A Hardware/Software Collaborative Design for Real-Time Detection and Defense Against Flush-Based Cache Attacks. 251-268 - Guang Yang, Huizhong Li, Jingdian Ming, Yongbin Zhou:
CDAE: Towards Empowering Denoising in Side-Channel Analysis. 269-286 - Yuguang Li, Ming Tang, Pengbo Wang, Yanbin Li, Shan Fu:
Practical Evaluation Methodology of Higher-Order Maskings at Different Operating Frequencies. 287-304
Authentication
- Andreas Abraham, Felix Hörandner, Olamide Omolola, Sebastian Ramacher:
Privacy-Preserving eID Derivation for Self-Sovereign Identity Systems. 307-323 - Zhe Xia, Lein Harn, Bo Yang, Mingwu Zhang, Yi Mu, Willy Susilo, Weizhi Meng:
Provably Secure Group Authentication in the Asynchronous Communication Model. 324-340 - Renzheng Wei, Lijun Cai, Aimin Yu, Dan Meng:
AGE: Authentication Graph Embedding for Detecting Anomalous Login Activities. 341-356
Applied Cryptograph
- Tian Qiu, Lin Hou, Dongdai Lin:
A Multi-Group Signature Scheme from Lattices. 359-377 - Geng Wang, Zhen Liu, Dawu Gu:
Ciphertext Policy Attribute-Based Encryption for Circuits from LWE Assumption. 378-396 - Bin Qi, Jie Ma, Kewei Lv:
Using Equivalent Class to Solve Interval Discrete Logarithm Problem. 397-412 - Athmane Seghier, Jianxin Li:
Parallel Steepest Ascent Hill-Climbing for High Nonlinear Boolean and Vectorial Boolean Functions (S-Boxes). 413-429 - Long Mai, Yuan Yan, Songlin Jia, Shuran Wang, Jianqiang Wang, Juanru Li, Siqi Ma, Dawu Gu:
Accelerating SM2 Digital Signature Algorithm Using Modern Processor Features. 430-446 - Huaifeng Chen, Rui Zong, Xiaoyang Dong:
Improved Differential Attacks on GIFT-64. 447-462 - Xin Wang, Shimin Li, Rui Xue:
Adaptively Secure Puncturable Pseudorandom Functions via Puncturable Identity-Based KEMs. 463-481 - Qiang Tang:
Towards Blockchain-Enabled Searchable Encryption. 482-500
Internet Security
- Jianwei Hou, Ziqi Zhang, Wenchang Shi, Bo Qin, Bin Liang:
DTGuard: A Lightweight Defence Mechanism Against a New DoS Attack on SDN. 503-520 - Muqian Chen, Xuebin Wang, Jinqiao Shi, Yue Gao, Can Zhao, Wei Sun:
Towards Comprehensive Security Analysis of Hidden Services Using Binding Guard Relays. 521-538 - Matthias Marx, Monina Schwarz, Maximilian Blochberger, Frederik Wille, Hannes Federrath:
Context-Aware IPv6 Address Hopping. 539-554 - Guangxi Yu, Xinghua Yang, Yan Zhang, Huajun Cui, Huiran Yang, Yang Li:
Towards Homograph-Confusable Domain Name Detection Using Dual-Channel CNN. 555-568 - Ruoyu Deng, Na Ruan, Guangsheng Zhang, Xiaohu Zhang:
FraudJudger: Fraud Detection on Digital Payment Platforms with Fewer Labels. 569-583 - Zhenyu Zhao, Qingni Shen, Wu Luo, Anbang Ruan:
CloudCoT: A Blockchain-Based Cloud Service Dependency Attestation Framework. 584-599
Machine Learning Security
- Chunkai Zhang, Yepeng Deng, Xin Guo, Xuan Wang, Chuanyi Liu:
An Adversarial Attack Based on Multi-objective Optimization in the Black-Box Scenario: MOEA-APGA II. 603-612 - Ming Zhang, Hu Li, Xiaohui Kuang, Ling Pang, Zhendong Wu:
Neuron Selecting: Defending Against Adversarial Examples in Deep Neural Networks. 613-629 - Yiru Zhao, Wanfeng Ge, Wenxin Li, Run Wang, Lei Zhao, Jiang Ming:
Capturing the Persistence of Facial Expression Features for Deepfake Video Detection. 630-645
Machine Learning Privacy
- Wenjuan Liang, Hong Chen, Yuncheng Wu, Cuiping Li:
Differentially Private Frequent Itemset Mining Against Incremental Updates. 649-667 - Pingchuan Ma, Zhiqiang Wang, Le Zhang, Ruming Wang, Xiaoxiang Zou, Tao Yang:
Differentially Private Reinforcement Learning. 668-683 - Ye Dong, Xiaojun Chen, Liyan Shen, Dakui Wang:
Privacy-Preserving Distributed Machine Learning Based on Secret Sharing. 684-702 - Bowen Liu, Qiang Tang:
Privacy-Preserving Decentralised Singular Value Decomposition. 703-721
Web Security
- Zihao Zhao, Qixu Liu, Tiantian Song, Zhi Wang, Xianda Wu:
WSLD: Detecting Unknown Webshell Using Fuzzy Matching and Deep Learning. 725-745 - Lijuan Yuan, Zhiyong Zeng, Yikang Lu, Xiaofeng Ou, Tao Feng:
A Character-Level BiGRU-Attention for Phishing Classification. 746-762 - Zhaoyu Zhou, Lingjing Yu, Qingyun Liu, Yang Liu, Bo Luo:
Tear Off Your Disguise: Phishing Website Detection Using Visual and Network Identities. 763-780
Steganography and Steganalysis
- Hao Yang, Zhongliang Yang, Yongjian Bao, Yongfeng Huang:
Hierarchical Representation Network for Steganalysis of QIM Steganography in Low-Bit-Rate Speech Signals. 783-798 - Man Wei, Danping Shi, Siwei Sun, Peng Wang, Lei Hu:
Convolutional Neural Network Based Side-Channel Attacks with Customized Filters. 799-813 - Jing Tian, Gaopeng Gou, Chang Liu, Yige Chen, Gang Xiong, Zhen Li:
DLchain: A Covert Channel over Blockchain Based on Dynamic Labels. 814-830
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.