Search dblp for Publications

export results for "stream:streams/conf/iccns:"

 download as .bib file

@inproceedings{DBLP:conf/iccns/0003F23,
  author       = {Jan Pospisil and
                  Radek Fujdiak},
  title        = {Increasing data rate of LoRa technology using frequency division multiplex},
  booktitle    = {Proceedings of the 2023 13th International Conference on Communication
                  and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023},
  pages        = {330--334},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3638782.3638833},
  doi          = {10.1145/3638782.3638833},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/0003F23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/0004ZWZJH23,
  author       = {Rui Ma and
                  Xvhong Zhou and
                  Xiajing Wang and
                  Zheng Zhang and
                  Jinman Jiang and
                  Wei Huo},
  title        = {pAFL: Adaptive Energy Allocation with Upper Confidence Bound},
  booktitle    = {Proceedings of the 2023 13th International Conference on Communication
                  and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023},
  pages        = {62--68},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3638782.3638792},
  doi          = {10.1145/3638782.3638792},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/0004ZWZJH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/AiYLLTR23,
  author       = {Xin Ai and
                  Qingqing Yue and
                  Hongchen Li and
                  Wenlong Li and
                  Shanshan Tu and
                  Sadaqat ur Rehman},
  title        = {Physical Layer Authentication Based on Transformer},
  booktitle    = {Proceedings of the 2023 13th International Conference on Communication
                  and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023},
  pages        = {203--208},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3638782.3638813},
  doi          = {10.1145/3638782.3638813},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/AiYLLTR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/BaoLCYCZ23,
  author       = {Ruishen Bao and
                  Jiayin Li and
                  Yuzhong Chen and
                  Kaihui Yang and
                  Ziyang Chen and
                  Yuanyuan Zhang},
  title        = {PracticalHAR: {A} Practical Method of Human Activity Recognition Based
                  on Embedded Sensors of Mobile Phone},
  booktitle    = {Proceedings of the 2023 13th International Conference on Communication
                  and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023},
  pages        = {342--349},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3638782.3638835},
  doi          = {10.1145/3638782.3638835},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/BaoLCYCZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/BohacikHFR23,
  author       = {Antonin Bohacik and
                  Eva Holasova and
                  Radek Fujdiak and
                  Jan Racka},
  title        = {Convolutional Neural Network-Based Classification of Secured {IEC}
                  104 Traffic in Energy Systems},
  booktitle    = {Proceedings of the 2023 13th International Conference on Communication
                  and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023},
  pages        = {159--165},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3638782.3638806},
  doi          = {10.1145/3638782.3638806},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/BohacikHFR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/Chen23,
  author       = {Yanming Chen},
  title        = {Optoelectronic Task Processing based on Multilevel Collaborative Computing
                  Networks: An Optimization-based Approach},
  booktitle    = {Proceedings of the 2023 13th International Conference on Communication
                  and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023},
  pages        = {178--182},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3638782.3638809},
  doi          = {10.1145/3638782.3638809},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/Chen23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ChenX0ZSLMLZ23,
  author       = {Zhiyi Chen and
                  Peizhe Xin and
                  Peng Zhan and
                  Menhua Zheng and
                  Yuxiao Sun and
                  Can Li and
                  Ping Meng and
                  Yajie Li and
                  Yongli Zhao},
  title        = {Learned Digital Back-Propagation for an optical-domain waveform integrated
                  with communication and sensing},
  booktitle    = {Proceedings of the 2023 13th International Conference on Communication
                  and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023},
  pages        = {312--316},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3638782.3638830},
  doi          = {10.1145/3638782.3638830},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/ChenX0ZSLMLZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ChenYD23,
  author       = {Daowei Chen and
                  Hongsheng Yan and
                  Wei Dai},
  title        = {Selection of defense strategy for high-level network based on multistage
                  {APT} attack-defense game},
  booktitle    = {Proceedings of the 2023 13th International Conference on Communication
                  and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023},
  pages        = {166--172},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3638782.3638807},
  doi          = {10.1145/3638782.3638807},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/ChenYD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ChenZLM23,
  author       = {Da Chen and
                  Feng Biao Zan and
                  Xin Liu and
                  Xuan Meng},
  title        = {{DROO-C} Data Transfer in a Mobile Edge Computing Offloading Framework},
  booktitle    = {Proceedings of the 2023 13th International Conference on Communication
                  and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023},
  pages        = {282--293},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3638782.3638826},
  doi          = {10.1145/3638782.3638826},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/ChenZLM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/DuanYCLX23,
  author       = {Shihui Duan and
                  Renhe Yan and
                  Jie Chen and
                  Meihui Liu and
                  Qichen Xu},
  title        = {Comparison and Testing of Time Synchronization Accuracy between {IEEE}
                  1588v2 and {IEEE} 802.1AS},
  booktitle    = {Proceedings of the 2023 13th International Conference on Communication
                  and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023},
  pages        = {300--305},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3638782.3638828},
  doi          = {10.1145/3638782.3638828},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/DuanYCLX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/Gao0SWH23,
  author       = {Jiazi Gao and
                  Xin Sun and
                  Zhengyu Song and
                  Jun Wang and
                  Tianwei Hou},
  title        = {A Novel Single-Station Tracking Algorithm towards High-Dynamic Targets
                  in 3D Space},
  booktitle    = {Proceedings of the 2023 13th International Conference on Communication
                  and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023},
  pages        = {335--341},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3638782.3638834},
  doi          = {10.1145/3638782.3638834},
  timestamp    = {Fri, 10 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/Gao0SWH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/GuFLZL23,
  author       = {Wenzhe Gu and
                  Botao Feng and
                  Yiyuan Luo and
                  Jianchao Zheng and
                  Yun Lu},
  title        = {A Miniaturized Dual U-shaped Patch Antenna for WiFi-6E Applications},
  booktitle    = {Proceedings of the 2023 13th International Conference on Communication
                  and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023},
  pages        = {246--251},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3638782.3638820},
  doi          = {10.1145/3638782.3638820},
  timestamp    = {Fri, 10 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/GuFLZL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/GuoLCWBD23,
  author       = {Xiaodong Guo and
                  Chenxi Lyu and
                  Zhenyi Chen and
                  Xiaoding Wang and
                  Ruishen Bao and
                  Chen Dong},
  title        = {Actuation Sequence Tampering Attack Detection on Field-Level Micro-Electrode
                  Dot Arrays Based on 2-Layer Authentication},
  booktitle    = {Proceedings of the 2023 13th International Conference on Communication
                  and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023},
  pages        = {106--111},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3638782.3638799},
  doi          = {10.1145/3638782.3638799},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/GuoLCWBD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/HolasovaFBB23,
  author       = {Eva Holasova and
                  Radek Fujdiak and
                  Petr Blazek and
                  Antonin Bohacik},
  title        = {Automated Neural Network Structure Design for Efficient},
  booktitle    = {Proceedings of the 2023 13th International Conference on Communication
                  and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023},
  pages        = {215--221},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3638782.3638815},
  doi          = {10.1145/3638782.3638815},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/HolasovaFBB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/HuangSZWL23,
  author       = {Jianhui Huang and
                  Changxiang Shen and
                  Jianbiao Zhang and
                  Liang Wang and
                  Ruqian Li},
  title        = {A Trusted Execution Environment Architecture for Big Data Computing
                  Platform Based on {TPCM}},
  booktitle    = {Proceedings of the 2023 13th International Conference on Communication
                  and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023},
  pages        = {88--93},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3638782.3638796},
  doi          = {10.1145/3638782.3638796},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/HuangSZWL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/JiaoLL23,
  author       = {Jian Jiao and
                  Zhifei Liu and
                  Lan Li},
  title        = {Intranet security detection based on image and deep transfer learning},
  booktitle    = {Proceedings of the 2023 13th International Conference on Communication
                  and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023},
  pages        = {196--202},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3638782.3638812},
  doi          = {10.1145/3638782.3638812},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/JiaoLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/KucharBF23,
  author       = {Karel Kuchar and
                  Petr Blazek and
                  Radek Fujdiak},
  title        = {From Playground to Battleground: Cyber Range Training for Industrial
                  Cybersecurity Education},
  booktitle    = {Proceedings of the 2023 13th International Conference on Communication
                  and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023},
  pages        = {209--214},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3638782.3638814},
  doi          = {10.1145/3638782.3638814},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/KucharBF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/LaiYCLCS23,
  author       = {Changping Lai and
                  Yinan Yao and
                  Yuzhong Chen and
                  Xintian Liang and
                  Tianqi Cai and
                  Yiqing Shi},
  title        = {Detection of IoT Botnet Based on Convolutional Neural Network and
                  Linear Support Vector Machine},
  booktitle    = {Proceedings of the 2023 13th International Conference on Communication
                  and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023},
  pages        = {222--226},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3638782.3638816},
  doi          = {10.1145/3638782.3638816},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/LaiYCLCS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/LiQ23,
  author       = {Taoshen Li and
                  Zhijun Qi},
  title        = {{D2D} communication resource allocation algorithm based on multi-agent
                  reinforcement learning},
  booktitle    = {Proceedings of the 2023 13th International Conference on Communication
                  and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023},
  pages        = {276--281},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3638782.3638825},
  doi          = {10.1145/3638782.3638825},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/LiQ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/LiQ23a,
  author       = {Aiguo Li and
                  Zhuoping Qiang},
  title        = {Multi-sensor data fusion method based on adaptive Kalman filtering},
  booktitle    = {Proceedings of the 2023 13th International Conference on Communication
                  and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023},
  pages        = {306--311},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3638782.3638829},
  doi          = {10.1145/3638782.3638829},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/LiQ23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/LiS23,
  author       = {Zhihao Li and
                  Zhongwei Sun},
  title        = {A Cross-Domain Authentication Scheme for Electric Vehicle Intelligent
                  Charging for Multiple Power Service Providers},
  booktitle    = {Proceedings of the 2023 13th International Conference on Communication
                  and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023},
  pages        = {26--31},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3638782.3638787},
  doi          = {10.1145/3638782.3638787},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/LiS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/LiYXWZ23,
  author       = {Yufeng Li and
                  Xu Yan and
                  Mingxuan Xiao and
                  Weimin Wang and
                  Fei Zhang},
  title        = {Investigation of Creating Accessibility Linked Data Based on Publicly
                  Available Accessibility Datasets},
  booktitle    = {Proceedings of the 2023 13th International Conference on Communication
                  and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023},
  pages        = {77--81},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3638782.3638794},
  doi          = {10.1145/3638782.3638794},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/LiYXWZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/LinYZL023,
  author       = {Zhirun Lin and
                  Yang Yang and
                  Yonghua Zhan and
                  Jiayin Li and
                  Chen Dong},
  title        = {Blockchain-based Searchable Encryption Scheme for Spatial Text Data},
  booktitle    = {Proceedings of the 2023 13th International Conference on Communication
                  and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023},
  pages        = {100--105},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3638782.3638798},
  doi          = {10.1145/3638782.3638798},
  timestamp    = {Wed, 15 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/LinYZL023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/LinZL23,
  author       = {Han Lin and
                  Jian Zou and
                  Jiayin Li},
  title        = {The differential meet-in-the-middle attack on {FUTURE} and {CRAFT}},
  booktitle    = {Proceedings of the 2023 13th International Conference on Communication
                  and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023},
  pages        = {151--158},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3638782.3638805},
  doi          = {10.1145/3638782.3638805},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/LinZL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/LiuGYCYL23,
  author       = {Zeyi Liu and
                  Xiaodong Guo and
                  Yinan Yao and
                  Yuzhong Chen and
                  Xin Yang and
                  Jiayin Li},
  title        = {Nonstationary Network Traffic Prediction With RevIN-based {LSTM}},
  booktitle    = {Proceedings of the 2023 13th International Conference on Communication
                  and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023},
  pages        = {265--269},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3638782.3638823},
  doi          = {10.1145/3638782.3638823},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/LiuGYCYL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/LiuH23,
  author       = {Lei Liu and
                  Ziyou He},
  title        = {Webshell Detection Based On CodeBERT And Deep Learning},
  booktitle    = {Proceedings of the 2023 13th International Conference on Communication
                  and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023},
  pages        = {32--39},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3638782.3638788},
  doi          = {10.1145/3638782.3638788},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/LiuH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/LiuP23,
  author       = {Youwu Liu and
                  Rajamohan Parthasarathy},
  title        = {Optimizing Wireless Mesh Network Gateway Deployment Using an Enhanced
                  Sparrow Optimization Algorithm},
  booktitle    = {Proceedings of the 2023 13th International Conference on Communication
                  and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023},
  pages        = {270--275},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3638782.3638824},
  doi          = {10.1145/3638782.3638824},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/LiuP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/LyuYGHDZC23,
  author       = {Chenxi Lyu and
                  Yinan Yao and
                  Xiaodong Guo and
                  Zihong Huang and
                  Chen Dong and
                  Yuanyuan Zhang and
                  Zhenyi Chen},
  title        = {AntiMal: an Approach of Malware Detection Employing Swin Transformer},
  booktitle    = {Proceedings of the 2023 13th International Conference on Communication
                  and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023},
  pages        = {1--5},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3638782.3638783},
  doi          = {10.1145/3638782.3638783},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/LyuYGHDZC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/NiZZLG23,
  author       = {Liang Ni and
                  Hengsheng Zhou and
                  Yawei Zhang and
                  Xiaoyan Liu and
                  Bingke Gu},
  title        = {Provably Secure Symmetric-Key Privacy-Preserving authenticated key
                  agreement protocol},
  booktitle    = {Proceedings of the 2023 13th International Conference on Communication
                  and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023},
  pages        = {117--126},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3638782.3638801},
  doi          = {10.1145/3638782.3638801},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/NiZZLG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/PospisilF23,
  author       = {Ondrej Pospisil and
                  Radek Fujdiak},
  title        = {Identifying Industry Devices via Time Delay in Dataflow},
  booktitle    = {Proceedings of the 2023 13th International Conference on Communication
                  and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023},
  pages        = {173--177},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3638782.3638808},
  doi          = {10.1145/3638782.3638808},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/PospisilF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/SangiNSTMEA23,
  author       = {Abdur Rashid Sangi and
                  Jyothish Nagaram and
                  Akshara Sudulagunta and
                  Sai Sandeep Talari and
                  Vinay Malla and
                  Murali Krishna Enduri and
                  Satish Anamalamudi},
  title        = {Tackling Disinformation: Machine Learning Solutions for Fake News
                  Detection},
  booktitle    = {Proceedings of the 2023 13th International Conference on Communication
                  and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023},
  pages        = {46--51},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3638782.3638790},
  doi          = {10.1145/3638782.3638790},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/SangiNSTMEA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/TuLALYR23,
  author       = {Shanshan Tu and
                  Wenlong Li and
                  Xin Ai and
                  Hongchen Li and
                  Qingqing Yue and
                  Sadaqat ur Rehman},
  title        = {A Hybrid Deep Learning Model for Breast Cancer Detection and Classification},
  booktitle    = {Proceedings of the 2023 13th International Conference on Communication
                  and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023},
  pages        = {350--353},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3638782.3638836},
  doi          = {10.1145/3638782.3638836},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/TuLALYR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/WangCG23,
  author       = {Bingquan Wang and
                  Meili Cui and
                  Junchen Gao},
  title        = {Security authentication protocol for Industrial Internet of Things},
  booktitle    = {Proceedings of the 2023 13th International Conference on Communication
                  and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023},
  pages        = {234--240},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3638782.3638818},
  doi          = {10.1145/3638782.3638818},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/WangCG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/WangMZYX23,
  author       = {Chengling Wang and
                  Yunru Ma and
                  Yuexin Zhang and
                  Ayong Ye and
                  Li Xu},
  title        = {A Continuous Authentication Scheme for Digital Therapeutics Using
                  Denoising Autoencoder},
  booktitle    = {Proceedings of the 2023 13th International Conference on Communication
                  and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023},
  pages        = {12--18},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3638782.3638785},
  doi          = {10.1145/3638782.3638785},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/WangMZYX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/WangTYY23,
  author       = {Mao Wang and
                  Shanshan Tu and
                  Haoyu Yu and
                  Peihe Yan},
  title        = {Anonymous Authentication Scheme with Zero-Knowledge Proof Based on
                  Private Blockchain},
  booktitle    = {Proceedings of the 2023 13th International Conference on Communication
                  and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023},
  pages        = {52--61},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3638782.3638791},
  doi          = {10.1145/3638782.3638791},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/WangTYY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/WangYFFC23,
  author       = {Xiaozhou Wang and
                  Jianfei Ye and
                  Linjie Feng and
                  Chenji Feng and
                  Jun Chen},
  title        = {Trusted Delivery Mechanisms for Software Supply Chains Based on Trusted
                  Execution Environment},
  booktitle    = {Proceedings of the 2023 13th International Conference on Communication
                  and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023},
  pages        = {19--25},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3638782.3638786},
  doi          = {10.1145/3638782.3638786},
  timestamp    = {Mon, 13 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/WangYFFC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/WangYLWLL23,
  author       = {Xiaozhou Wang and
                  Jianfei Ye and
                  Tong Liu and
                  Yinjie Wang and
                  Xuefang Li and
                  Lin Lin},
  title        = {Dynamic Trust Assessment Method for Mobile Network Devices},
  booktitle    = {Proceedings of the 2023 13th International Conference on Communication
                  and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023},
  pages        = {241--245},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3638782.3638819},
  doi          = {10.1145/3638782.3638819},
  timestamp    = {Mon, 13 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/WangYLWLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/WuKLZW23,
  author       = {Qiaowen Wu and
                  Yaojie Ke and
                  Zhanghui Liu and
                  Yuanyuan Zhang and
                  Qiyan Wu},
  title        = {Marine litter detection based on YOLOv7 algorithm and data encryption
                  protection},
  booktitle    = {Proceedings of the 2023 13th International Conference on Communication
                  and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023},
  pages        = {82--87},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3638782.3638795},
  doi          = {10.1145/3638782.3638795},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/WuKLZW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/WuLLWJ23,
  author       = {Ning Wu and
                  Li Li and
                  Xingyu Liu and
                  Ziwen Wang and
                  Tongyao Jia},
  title        = {Enhancing {UAV} Swarm Routing with Multi-Agent Attention Reinforcement
                  Learning},
  booktitle    = {Proceedings of the 2023 13th International Conference on Communication
                  and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023},
  pages        = {258--264},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3638782.3638822},
  doi          = {10.1145/3638782.3638822},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/WuLLWJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/XiWZ23,
  author       = {Wentao Xi and
                  Xingjun Wu and
                  Kai Zhang},
  title        = {A low-cost configurable hash computing circuit for {PQC} algorithm},
  booktitle    = {Proceedings of the 2023 13th International Conference on Communication
                  and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023},
  pages        = {112--116},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3638782.3638800},
  doi          = {10.1145/3638782.3638800},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/XiWZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/XiaoWFSX23,
  author       = {Nianhao Xiao and
                  Long Wang and
                  Jing Fan and
                  Chunzhu Shi and
                  Yutong Xie},
  title        = {A Certificateless Trusted Connection Protocol for Smart Factories},
  booktitle    = {Proceedings of the 2023 13th International Conference on Communication
                  and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023},
  pages        = {144--150},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3638782.3638804},
  doi          = {10.1145/3638782.3638804},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/XiaoWFSX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/XingCZ23,
  author       = {Dandan Xing and
                  Suzhen Cao and
                  Yifan Zhang},
  title        = {Environment monitoring solution for Flying Ad-hoc Networks based on
                  certificateless aggregate signature},
  booktitle    = {Proceedings of the 2023 13th International Conference on Communication
                  and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023},
  pages        = {183--188},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3638782.3638810},
  doi          = {10.1145/3638782.3638810},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/XingCZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/XuLZYLKPA23,
  author       = {Zhichao Xu and
                  Faping Lu and
                  Zhilin Zhang and
                  Dongkai Yang and
                  Xiguo Liu and
                  Jiafang Kang and
                  Yaozong Pan and
                  Qi An},
  title        = {A Flexible Waveform Based on PSWFs Signal for Next-Generation Communication},
  booktitle    = {Proceedings of the 2023 13th International Conference on Communication
                  and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023},
  pages        = {317--322},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3638782.3638831},
  doi          = {10.1145/3638782.3638831},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/XuLZYLKPA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/XuZLL23,
  author       = {Jinxing Xu and
                  Jian Zou and
                  Qiufu Lan and
                  Jiayin Li},
  title        = {Improved Meet-in-the-Middle Cryptanalysis on Kupyna},
  booktitle    = {Proceedings of the 2023 13th International Conference on Communication
                  and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023},
  pages        = {136--143},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3638782.3638803},
  doi          = {10.1145/3638782.3638803},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/XuZLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/YanTW23,
  author       = {Peihe Yan and
                  Shanshan Tu and
                  Mao Wang},
  title        = {Multi-User Identity Authentication in Wireless Communication Based
                  on Deep Learning and Data Augmentation},
  booktitle    = {Proceedings of the 2023 13th International Conference on Communication
                  and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023},
  pages        = {189--195},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3638782.3638811},
  doi          = {10.1145/3638782.3638811},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/YanTW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/YangYGHLCL23,
  author       = {Zhongliao Yang and
                  Yinan Yao and
                  Xiaodong Guo and
                  Peixin Huang and
                  Jiayin Li and
                  Yuzhong Chen and
                  Xintian Liang},
  title        = {A Module Placement Method for Digital Microfluidic Biochips Based
                  on Security Design},
  booktitle    = {Proceedings of the 2023 13th International Conference on Communication
                  and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023},
  pages        = {40--45},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3638782.3638789},
  doi          = {10.1145/3638782.3638789},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/YangYGHLCL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/YaoDXLG0W23,
  author       = {Yinan Yao and
                  Chen Dong and
                  Zhengye Xie and
                  Yuqing Li and
                  Xiaodong Guo and
                  Yang Yang and
                  Xiaoding Wang},
  title        = {A Deep Learning Approach for Hardware Trojan Detection Based on Ensemble
                  Learning},
  booktitle    = {Proceedings of the 2023 13th International Conference on Communication
                  and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023},
  pages        = {69--76},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3638782.3638793},
  doi          = {10.1145/3638782.3638793},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/YaoDXLG0W23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ZhangZM023,
  author       = {Yanggege Zhang and
                  Bo Zhang and
                  Te Ma and
                  Jie Hu},
  title        = {Multi-UAVs Cooperative Target Search with Communication Constraint},
  booktitle    = {Proceedings of the 2023 13th International Conference on Communication
                  and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023},
  pages        = {252--257},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3638782.3638821},
  doi          = {10.1145/3638782.3638821},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/ZhangZM023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ZhangZS23,
  author       = {Qian Zhang and
                  Xing Zhang and
                  Wei Shi},
  title        = {Privacy-preserving Trajectory Data Release Hierarchical Model},
  booktitle    = {Proceedings of the 2023 13th International Conference on Communication
                  and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023},
  pages        = {94--99},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3638782.3638797},
  doi          = {10.1145/3638782.3638797},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/ZhangZS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ZhaoLLT23,
  author       = {Wei Zhao and
                  Zhiwei Li and
                  Ruilin Li and
                  Chaojing Tang},
  title        = {CapSan-UB: Bug Capabilities Detector Based on Undefined Behavior},
  booktitle    = {Proceedings of the 2023 13th International Conference on Communication
                  and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023},
  pages        = {6--11},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3638782.3638784},
  doi          = {10.1145/3638782.3638784},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/ZhaoLLT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ZhaoWHLW23,
  author       = {Hangyu Zhao and
                  Daobin Wang and
                  Quansheng Huang and
                  Guangfu Li and
                  Kun Wen},
  title        = {A Phase Noise Suppression Method Based on Real-imaginary Alternating
                  Pilots for Coherent Optical {OFDM-OQAM} Communication Systems},
  booktitle    = {Proceedings of the 2023 13th International Conference on Communication
                  and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023},
  pages        = {323--329},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3638782.3638832},
  doi          = {10.1145/3638782.3638832},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/ZhaoWHLW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ZhongCSLC23,
  author       = {Jiayuan Zhong and
                  Yuzhong Chen and
                  Yiqing Shi and
                  Yan Li and
                  Peiqing Chen},
  title        = {A Novel Network Traffic Prediction Method Based on Complete Ensemble
                  Empirical Mode Decomposition with Adaptive Noise},
  booktitle    = {Proceedings of the 2023 13th International Conference on Communication
                  and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023},
  pages        = {294--299},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3638782.3638827},
  doi          = {10.1145/3638782.3638827},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/ZhongCSLC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ZhuZZQ23,
  author       = {Chaoyang Zhu and
                  Xiao Zhu and
                  Zhenrong Zhang and
                  Tuanfa Qin},
  title        = {A Privacy Protecting Mechanism in {UAV-MEC} Network with Blockchain-Enabled
                  Federated Learning},
  booktitle    = {Proceedings of the 2023 13th International Conference on Communication
                  and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023},
  pages        = {227--233},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3638782.3638817},
  doi          = {10.1145/3638782.3638817},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/ZhuZZQ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ZouTNXXL23,
  author       = {Wei Zou and
                  Shanshan Tu and
                  Zhenhu Ning and
                  Jiawei Xu and
                  Shuaikun Xing and
                  Xue Liao},
  title        = {An improved particle swarm optimization algorithm for {P300} Neural
                  network recognizer},
  booktitle    = {Proceedings of the 2023 13th International Conference on Communication
                  and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023},
  pages        = {127--135},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3638782.3638802},
  doi          = {10.1145/3638782.3638802},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/ZouTNXXL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iccns/2023,
  title        = {Proceedings of the 2023 13th International Conference on Communication
                  and Network Security, {ICCNS} 2023, Fuzhou, China, December 6-8, 2023},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3638782},
  doi          = {10.1145/3638782},
  timestamp    = {Mon, 22 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/AzhariB22,
  author       = {Luthfi Azhari and
                  Ari Moesriami Barmawi},
  title        = {Activity Attribute-Based User Behavior Model for Continuous User Authentication},
  booktitle    = {Proceedings of the 12th International Conference on Communication
                  and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
                  2022},
  pages        = {69--76},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3586102.3586113},
  doi          = {10.1145/3586102.3586113},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/AzhariB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/BaiTY0WZ22,
  author       = {Xuetao Bai and
                  Shanshan Tu and
                  Haishuang Yan and
                  Yongjie Yang and
                  Aiming Wu and
                  Yihe Zhang},
  title        = {SPoW: {A} solution to the problem of centralization of computing power},
  booktitle    = {Proceedings of the 12th International Conference on Communication
                  and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
                  2022},
  pages        = {205--210},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3586102.3586133},
  doi          = {10.1145/3586102.3586133},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/BaiTY0WZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/BarkworthTL22,
  author       = {Ashley Barkworth and
                  Rehnuma Tabassum and
                  Arash Habibi Lashkari},
  title        = {Detecting {IMAP} Credential Stuffing Bots Using Behavioural Biometrics},
  booktitle    = {Proceedings of the 12th International Conference on Communication
                  and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
                  2022},
  pages        = {7--15},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3586102.3586104},
  doi          = {10.1145/3586102.3586104},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/BarkworthTL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ChenLW22,
  author       = {Yunwen Chen and
                  Zheng Li and
                  Weiru Wang},
  title        = {A mutual authentication and key establishment scheme for peer to peer
                  network scenario},
  booktitle    = {Proceedings of the 12th International Conference on Communication
                  and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
                  2022},
  pages        = {140--145},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3586102.3586123},
  doi          = {10.1145/3586102.3586123},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/ChenLW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ChopraVL22,
  author       = {Abhishek Chopra and
                  Nikhill Vombatkere and
                  Arash Habibi Lashkari},
  title        = {AuthAttLyzer: {A} Robust defensive distillation-based Authorship Attribution
                  framework},
  booktitle    = {Proceedings of the 12th International Conference on Communication
                  and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
                  2022},
  pages        = {43--50},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3586102.3586109},
  doi          = {10.1145/3586102.3586109},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/ChopraVL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/GaoJL22,
  author       = {Tiaokang Gao and
                  Xiaoning Jin and
                  Yingxu Lai},
  title        = {Model Heterogeneous Federated Learning for Intrusion Detection based
                  on knowledge distillation},
  booktitle    = {Proceedings of the 12th International Conference on Communication
                  and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
                  2022},
  pages        = {30--35},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3586102.3586107},
  doi          = {10.1145/3586102.3586107},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/GaoJL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/Ge0LZZ22,
  author       = {Ruihai Ge and
                  Yongzheng Zhang and
                  Shuhao Li and
                  Guoqiao Zhou and
                  Guangze Zhao},
  title        = {Leveraging Zero-Payload Packets to Detect Mobile Malware based on
                  Network Traffic},
  booktitle    = {Proceedings of the 12th International Conference on Communication
                  and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
                  2022},
  pages        = {23--29},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3586102.3586106},
  doi          = {10.1145/3586102.3586106},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/Ge0LZZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/GuiYYGWC22,
  author       = {Yanshuang Gui and
                  Miaomiao Yang and
                  Haishuang Yan and
                  Yayun Guo and
                  Qixu Wang and
                  Xingshu Chen},
  title        = {{MURAS:} An Efficient Multi-Value-Proof-Based Remote Attestation Scheme
                  for Cloud Platform},
  booktitle    = {Proceedings of the 12th International Conference on Communication
                  and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
                  2022},
  pages        = {98--104},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3586102.3586117},
  doi          = {10.1145/3586102.3586117},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/GuiYYGWC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/HongN22,
  author       = {Yu Hong and
                  Zhenhu Ning},
  title        = {A trusted construction mechanism for sever based on trusted hard disk},
  booktitle    = {Proceedings of the 12th International Conference on Communication
                  and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
                  2022},
  pages        = {90--97},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3586102.3586116},
  doi          = {10.1145/3586102.3586116},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/HongN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/KhanTAAAW22,
  author       = {Mansoor Khan and
                  Shanshan Tu and
                  Ghulam Abbas and
                  Ziaul Haq Abbas and
                  Hisham Alasmary and
                  Muhammad Waqas},
  title        = {A Reliable and Stable {V2V} Routing Scheme for Warning Message Dissemination
                  in VANETs using Bi-Directional Clustering},
  booktitle    = {Proceedings of the 12th International Conference on Communication
                  and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
                  2022},
  pages        = {159--167},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3586102.3586126},
  doi          = {10.1145/3586102.3586126},
  timestamp    = {Fri, 11 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/KhanTAAAW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/LiY22,
  author       = {Aiguo Li and
                  Wenhao Yan},
  title        = {Research on vulnerability assessment of physical protection system
                  based on combined weighting-two-dimensional cloud model},
  booktitle    = {Proceedings of the 12th International Conference on Communication
                  and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
                  2022},
  pages        = {85--89},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3586102.3586137},
  doi          = {10.1145/3586102.3586137},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/LiY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/LiY22a,
  author       = {Aiguo Li and
                  Jie Yang},
  title        = {Multi-objective optimization algorithm for indoor positioning sensor
                  deployment based on wireless network},
  booktitle    = {Proceedings of the 12th International Conference on Communication
                  and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
                  2022},
  pages        = {110--116},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3586102.3586138},
  doi          = {10.1145/3586102.3586138},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/LiY22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/LiaoZXXZZWN22,
  author       = {Xue Liao and
                  Yihua Zhou and
                  Jiawei Xu and
                  Shuaikun Xing and
                  Wei Zou and
                  Jin Zhou and
                  Qi Wang and
                  Zhenhu Ning},
  title        = {Identity-based Linkable Blind Ring Signature Scheme on Lattice},
  booktitle    = {Proceedings of the 12th International Conference on Communication
                  and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
                  2022},
  pages        = {51--57},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3586102.3586110},
  doi          = {10.1145/3586102.3586110},
  timestamp    = {Fri, 11 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/LiaoZXXZZWN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/LuoJHS22,
  author       = {Shaojie Luo and
                  Minhao Jin and
                  Rongjie Han and
                  Kexin Sun},
  title        = {Anti-jamming based on Reinforcement Learning in Power System Sensing
                  Network},
  booktitle    = {Proceedings of the 12th International Conference on Communication
                  and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
                  2022},
  pages        = {180--184},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3586102.3586129},
  doi          = {10.1145/3586102.3586129},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/LuoJHS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/QinLRT22,
  author       = {Su{-}Juan Qin and
                  Zhao Liu and
                  Feixiang Ren and
                  Chong Tan},
  title        = {Smart Contract Vulnerability Detection Based on Critical Combination
                  Path and Deep Learning},
  booktitle    = {Proceedings of the 12th International Conference on Communication
                  and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
                  2022},
  pages        = {219--226},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3586102.3586135},
  doi          = {10.1145/3586102.3586135},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/QinLRT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/TanCZZLL22,
  author       = {Chong Tan and
                  Han Chen and
                  Songlei Zhang and
                  Di Zhai and
                  Yang Lu and
                  Hong Liu},
  title        = {Traffic offloading based on content sharing in {D2D} for Smart Grid},
  booktitle    = {Proceedings of the 12th International Conference on Communication
                  and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
                  2022},
  pages        = {185--190},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3586102.3586130},
  doi          = {10.1145/3586102.3586130},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/TanCZZLL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/Venkatasubramanian22,
  author       = {Madumitha Venkatasubramanian and
                  Arash Habibi Lashkari and
                  Saqib Hakak},
  title        = {Federated Learning Assisted IoT Malware Detection Using Static Analysis},
  booktitle    = {Proceedings of the 12th International Conference on Communication
                  and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
                  2022},
  pages        = {191--198},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3586102.3586131},
  doi          = {10.1145/3586102.3586131},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/Venkatasubramanian22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/WaliIH22,
  author       = {Heera G. Wali and
                  Nalini C. Iyer and
                  Shraddha B. Hiremath},
  title        = {Hardware Implementation of {SPONGENT} Lightweight Hash Algorithm},
  booktitle    = {Proceedings of the 12th International Conference on Communication
                  and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
                  2022},
  pages        = {105--109},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3586102.3586118},
  doi          = {10.1145/3586102.3586118},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/WaliIH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/WanHLZL22,
  author       = {Ming Wan and
                  Minglei Hao and
                  Yang Li and
                  Jianming Zhao and
                  Ying Li},
  title        = {Insights on Cooperative Defense for Multiple Industrial Security Technologies},
  booktitle    = {Proceedings of the 12th International Conference on Communication
                  and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
                  2022},
  pages        = {168--173},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3586102.3586127},
  doi          = {10.1145/3586102.3586127},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/WanHLZL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/WangZMDJ22,
  author       = {Xiaoliang Wang and
                  Feng Zhang and
                  Yanbo Ma and
                  Wenjuan Dai and
                  Yingying Jin},
  title        = {Trust evaluation model based on improved Bayesian theory for the Internet
                  of Things},
  booktitle    = {Proceedings of the 12th International Conference on Communication
                  and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
                  2022},
  pages        = {152--158},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3586102.3586125},
  doi          = {10.1145/3586102.3586125},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/WangZMDJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/WuTLZ0B22,
  author       = {Aiming Wu and
                  Shanshan Tu and
                  Junwei Liu and
                  Yihe Zhang and
                  Yongjie Yang and
                  Xuetao Bai},
  title        = {Detection Scheme of Impersonation Attack Based on Sarsa(Lambda) Algorithm
                  in Fog Computing},
  booktitle    = {Proceedings of the 12th International Conference on Communication
                  and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
                  2022},
  pages        = {16--22},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3586102.3586105},
  doi          = {10.1145/3586102.3586105},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/WuTLZ0B22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/WuWX22,
  author       = {Xiaoyan Wu and
                  Xiaofeng Wang and
                  Qianqian Xing},
  title        = {Identity-Based Authentication Protocol for Trustworthy {IP} Address},
  booktitle    = {Proceedings of the 12th International Conference on Communication
                  and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
                  2022},
  pages        = {58--63},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3586102.3586111},
  doi          = {10.1145/3586102.3586111},
  timestamp    = {Fri, 11 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/WuWX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/YangCT022,
  author       = {Shisong Yang and
                  Yuwen Chen and
                  Shanshan Tu and
                  Zhen Yang},
  title        = {A Post-quantum Secure Aggregation for Federated Learning},
  booktitle    = {Proceedings of the 12th International Conference on Communication
                  and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
                  2022},
  pages        = {117--124},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3586102.3586120},
  doi          = {10.1145/3586102.3586120},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/YangCT022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/YangS22,
  author       = {Siyuan Yang and
                  Yuhao Sun},
  title        = {Status and Key Technologies of UAV-boat Cross-domain Collaborative
                  Development},
  booktitle    = {Proceedings of the 12th International Conference on Communication
                  and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
                  2022},
  pages        = {131--139},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3586102.3586122},
  doi          = {10.1145/3586102.3586122},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/YangS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/YangTYZWB22,
  author       = {Yongjie Yang and
                  Shanshan Tu and
                  Haishuang Yan and
                  Yihe Zhang and
                  Aiming Wu and
                  Xuetao Bai},
  title        = {Deep Reinforcement Learning-Based Computation Offloading for Anti-jamming
                  in Fog Computing Networks},
  booktitle    = {Proceedings of the 12th International Conference on Communication
                  and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
                  2022},
  pages        = {36--42},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3586102.3586108},
  doi          = {10.1145/3586102.3586108},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/YangTYZWB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/YangWH22,
  author       = {Yang Yang and
                  Zengtao Wei and
                  Minming Huang},
  title        = {Accountable Policy-Based Sanitizable Signature for Medical Data Sharing},
  booktitle    = {Proceedings of the 12th International Conference on Communication
                  and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
                  2022},
  pages        = {77--84},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3586102.3586114},
  doi          = {10.1145/3586102.3586114},
  timestamp    = {Fri, 11 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/YangWH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/YuTZ22,
  author       = {Haoyu Yu and
                  Shanshan Tu and
                  Yihe Zhang},
  title        = {Decentralized Consensus Blockchain-Based Authentication Algorithm
                  Using in Secure Internet of Vehicles},
  booktitle    = {Proceedings of the 12th International Conference on Communication
                  and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
                  2022},
  pages        = {199--204},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3586102.3586132},
  doi          = {10.1145/3586102.3586132},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/YuTZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/YuanZWTG22,
  author       = {Yidong Yuan and
                  Tianmeng Zhang and
                  Chaoyi Wang and
                  Lu Tian and
                  Jinchun Gao},
  title        = {Impact of Common Mode Current Induced by Transformer on Electromagnetic
                  Radiation in Digital Isolation Chip},
  booktitle    = {Proceedings of the 12th International Conference on Communication
                  and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
                  2022},
  pages        = {125--130},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3586102.3586121},
  doi          = {10.1145/3586102.3586121},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/YuanZWTG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ZhangT00WB22,
  author       = {Yihe Zhang and
                  Shanshan Tu and
                  Muhammad Waqas and
                  Yongjie Yang and
                  Aiming Wu and
                  Xuetao Bai},
  title        = {Resource Allocation for Blockchain-Enabled Fog Computing with Deep
                  Reinforcement Learning},
  booktitle    = {Proceedings of the 12th International Conference on Communication
                  and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
                  2022},
  pages        = {211--218},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3586102.3586134},
  doi          = {10.1145/3586102.3586134},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/ZhangT00WB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ZhangTZ0WB22,
  author       = {Yihe Zhang and
                  Shanshan Tu and
                  Shengju Zhang and
                  Yongjie Yang and
                  Aiming Wu and
                  Xuetao Bai},
  title        = {Performance Optimization Blockchain-Enabled Fog Computing with Deep
                  Reinforcement Learning},
  booktitle    = {Proceedings of the 12th International Conference on Communication
                  and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
                  2022},
  pages        = {227--233},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3586102.3586136},
  doi          = {10.1145/3586102.3586136},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/ZhangTZ0WB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ZhangY022,
  author       = {Yueqi Zhang and
                  Ruiping Yin and
                  Zhen Yang},
  title        = {Data Poisoning Attacks to Session-Based Recommender Systems},
  booktitle    = {Proceedings of the 12th International Conference on Communication
                  and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
                  2022},
  pages        = {1--6},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3586102.3586103},
  doi          = {10.1145/3586102.3586103},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/ZhangY022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ZhengKYT22,
  author       = {Wei Zheng and
                  Naixin Kang and
                  Tao Ye and
                  Haining Tan},
  title        = {Trusted authentication mechanism oriented to network computing offloading
                  at the perception layer},
  booktitle    = {Proceedings of the 12th International Conference on Communication
                  and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
                  2022},
  pages        = {146--151},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3586102.3586124},
  doi          = {10.1145/3586102.3586124},
  timestamp    = {Tue, 30 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccns/ZhengKYT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ZhengKYW22,
  author       = {Wei Zheng and
                  Naixin Kang and
                  Tao Ye and
                  Qi Wang},
  title        = {Trusted Authentication Mechanism for Perceptual layer-oriented Network
                  Routing},
  booktitle    = {Proceedings of the 12th International Conference on Communication
                  and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
                  2022},
  pages        = {174--179},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3586102.3586128},
  doi          = {10.1145/3586102.3586128},
  timestamp    = {Tue, 30 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccns/ZhengKYW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ZhouNWW22,
  author       = {Jin Zhou and
                  Zhenhu Ning and
                  Qi Wang and
                  Yuchen Wang},
  title        = {Embedded Real-time System Trusted Protection Technology for Supply
                  Chain Scenarios},
  booktitle    = {Proceedings of the 12th International Conference on Communication
                  and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
                  2022},
  pages        = {64--68},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3586102.3586112},
  doi          = {10.1145/3586102.3586112},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/ZhouNWW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iccns/2022,
  title        = {Proceedings of the 12th International Conference on Communication
                  and Network Security, {ICCNS} 2022, Beijing, China, December 1-3,
                  2022},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3586102},
  doi          = {10.1145/3586102},
  isbn         = {978-1-4503-9752-0},
  timestamp    = {Fri, 28 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/BarmawiN21,
  author       = {Ari Moesriami Barmawi and
                  Asep Rizal Nurjaman},
  title        = {Strengthening the Security of Deniable Authentication Scheme Using
                  Zero-Knowledge Proof},
  booktitle    = {{ICCNS} 2021: The 11th International Conference on Communication and
                  Network Security, Weihai, China, December 3 - 5, 2021},
  pages        = {27--34},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3507509.3507513},
  doi          = {10.1145/3507509.3507513},
  timestamp    = {Thu, 31 Aug 2023 14:03:39 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/BarmawiN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/DingHLHZQ21,
  author       = {Zhonglin Ding and
                  Yang Hu and
                  Wei Luo and
                  Zhongming Huang and
                  Lei Zhang and
                  Zhongyuan Qin},
  title        = {Security Analysis of Embedded {SIM} Remote Provisioning Protocol Using
                  {SPIN}},
  booktitle    = {{ICCNS} 2021: The 11th International Conference on Communication and
                  Network Security, Weihai, China, December 3 - 5, 2021},
  pages        = {43--48},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3507509.3507515},
  doi          = {10.1145/3507509.3507515},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/DingHLHZQ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/GuHZAHFZ21,
  author       = {Yilong Gu and
                  Yangchao Huang and
                  Yuetong Zhang and
                  Qi An and
                  Huizhu Han and
                  Youbin Fu and
                  Yanhui Zhang},
  title        = {Optimization of Spectrum Efficiency in {UAV} Cognitive Communication
                  Network Based on Trajectory Planning},
  booktitle    = {{ICCNS} 2021: The 11th International Conference on Communication and
                  Network Security, Weihai, China, December 3 - 5, 2021},
  pages        = {35--42},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3507509.3507514},
  doi          = {10.1145/3507509.3507514},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/GuHZAHFZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/KarakateEO21,
  author       = {Meatasit Karakate and
                  Hiroshi Esaki and
                  Hideya Ochiai},
  title        = {SDNHive: {A} Proof-of-Concept {SDN} and Honeypot System for Defending
                  Against Internal Threats},
  booktitle    = {{ICCNS} 2021: The 11th International Conference on Communication and
                  Network Security, Weihai, China, December 3 - 5, 2021},
  pages        = {9--20},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3507509.3507511},
  doi          = {10.1145/3507509.3507511},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/KarakateEO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/MaYCH21,
  author       = {Tao Ma and
                  Fang Yang and
                  Chao Chang and
                  Jun Huang},
  title        = {Mission-Oriented Networks Robustness Based on Cascade Model},
  booktitle    = {{ICCNS} 2021: The 11th International Conference on Communication and
                  Network Security, Weihai, China, December 3 - 5, 2021},
  pages        = {87--92},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3507509.3507521},
  doi          = {10.1145/3507509.3507521},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/MaYCH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/MahdavifarSVRGH21,
  author       = {Samaneh Mahdavifar and
                  Amgad Hanafy Salem and
                  Princy Victor and
                  Amir H. Razavi and
                  Miguel Garz{\'{o}}n and
                  Natasha Hellberg and
                  Arash Habibi Lashkari},
  title        = {Lightweight Hybrid Detection of Data Exfiltration using {DNS} based
                  on Machine Learning},
  booktitle    = {{ICCNS} 2021: The 11th International Conference on Communication and
                  Network Security, Weihai, China, December 3 - 5, 2021},
  pages        = {80--86},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3507509.3507520},
  doi          = {10.1145/3507509.3507520},
  timestamp    = {Sat, 02 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/MahdavifarSVRGH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/MeiryaniFWLDU21,
  author       = {Meiryani Meiryani and
                  Hanny Franciska and
                  Rindang Widuri and
                  Suryadiputra Liawatimena and
                  Zaidi Mat Daud and
                  Hana Ulinnuha},
  title        = {Analysis of Software Accounting Effectiveness on Data Sales in Bliss
                  Kitchen},
  booktitle    = {{ICCNS} 2021: The 11th International Conference on Communication and
                  Network Security, Weihai, China, December 3 - 5, 2021},
  pages        = {100--106},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3507509.3507523},
  doi          = {10.1145/3507509.3507523},
  timestamp    = {Sat, 02 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/MeiryaniFWLDU21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/MeiryaniPWDL21,
  author       = {Meiryani Meiryani and
                  Noviyanti Hanna Uli Pakpahan and
                  Dianka Wahyuningtias and
                  Zaidi Mat Daud and
                  Suryadiputra Liawatimena},
  title        = {The Role of Financial Technology for Development of Micro, Small and
                  Medium Enterprises (Msmes) in Indonesia},
  booktitle    = {{ICCNS} 2021: The 11th International Conference on Communication and
                  Network Security, Weihai, China, December 3 - 5, 2021},
  pages        = {60--65},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3507509.3507518},
  doi          = {10.1145/3507509.3507518},
  timestamp    = {Sat, 02 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/MeiryaniPWDL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/RuZF021,
  author       = {Kaiqi Ru and
                  Yaning Zheng and
                  Xuewei Feng and
                  Dongxia Wang},
  title        = {The Side-Channel Vulnerability in Network Protocol},
  booktitle    = {{ICCNS} 2021: The 11th International Conference on Communication and
                  Network Security, Weihai, China, December 3 - 5, 2021},
  pages        = {1--8},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3507509.3507510},
  doi          = {10.1145/3507509.3507510},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/RuZF021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ShiW21,
  author       = {Tuo Shi and
                  Yutong Wu},
  title        = {Research on the Deep Integration of 5G Technology and Social Security
                  Management of Police Department},
  booktitle    = {{ICCNS} 2021: The 11th International Conference on Communication and
                  Network Security, Weihai, China, December 3 - 5, 2021},
  pages        = {93--99},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3507509.3507522},
  doi          = {10.1145/3507509.3507522},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/ShiW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/SunZFGZ21,
  author       = {Lanjun Sun and
                  Shaojun Zhang and
                  Zhenshan Fu and
                  Yuehong Gong and
                  Yanchao Zhang},
  title        = {Bidirectional Underwater Blue-green Laser Communication Based on {OFDM}
                  Modulation},
  booktitle    = {{ICCNS} 2021: The 11th International Conference on Communication and
                  Network Security, Weihai, China, December 3 - 5, 2021},
  pages        = {49--54},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3507509.3507516},
  doi          = {10.1145/3507509.3507516},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/SunZFGZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ZhangLC21,
  author       = {Zhaoji Zhang and
                  Qianhui Liu and
                  Xiaorui Chai},
  title        = {Shallow Underground Space Exploration and IoT Security Monitoring},
  booktitle    = {{ICCNS} 2021: The 11th International Conference on Communication and
                  Network Security, Weihai, China, December 3 - 5, 2021},
  pages        = {55--59},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3507509.3507517},
  doi          = {10.1145/3507509.3507517},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/ZhangLC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ZhangLD21,
  author       = {Wenzhen Zhang and
                  Tianbo Lu and
                  Zeyu Du},
  title        = {{TNRAS:} Tor Nodes Reliability Analysis Scheme},
  booktitle    = {{ICCNS} 2021: The 11th International Conference on Communication and
                  Network Security, Weihai, China, December 3 - 5, 2021},
  pages        = {21--26},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3507509.3507512},
  doi          = {10.1145/3507509.3507512},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccns/ZhangLD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ZhangYL21,
  author       = {Yue Zhang and
                  Guozheng Yang and
                  Zhihao Luo},
  title        = {Research on Topology Evolution of Autonomous System Network},
  booktitle    = {{ICCNS} 2021: The 11th International Conference on Communication and
                  Network Security, Weihai, China, December 3 - 5, 2021},
  pages        = {66--79},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3507509.3507519},
  doi          = {10.1145/3507509.3507519},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/ZhangYL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iccns/2021,
  title        = {{ICCNS} 2021: The 11th International Conference on Communication and
                  Network Security, Weihai, China, December 3 - 5, 2021},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3507509},
  doi          = {10.1145/3507509},
  isbn         = {978-1-4503-8642-5},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/Adamsky0S020,
  author       = {Florian Adamsky and
                  Daniel Kaiser and
                  Michael Steglich and
                  Thomas Engel},
  title        = {Locust: Highly Concurrent {DHT} Experimentation Framework for Security
                  Evaluations},
  booktitle    = {{ICCNS} 2020: The 10th International Conference on Communication and
                  Network Security, Tokyo, Japan, November 27-29, 2020},
  pages        = {115--122},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3442520.3442531},
  doi          = {10.1145/3442520.3442531},
  timestamp    = {Thu, 12 Aug 2021 15:30:47 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/Adamsky0S020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/AlasmariW020,
  author       = {Sultan Alasmari and
                  Weichao Wang and
                  Yu Wang},
  title        = {Proof of Network Security Services: Enforcement of Security {SLA}
                  through Outsourced Network Testing},
  booktitle    = {{ICCNS} 2020: The 10th International Conference on Communication and
                  Network Security, Tokyo, Japan, November 27-29, 2020},
  pages        = {52--59},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3442520.3442533},
  doi          = {10.1145/3442520.3442533},
  timestamp    = {Thu, 12 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/AlasmariW020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/BarutZLZ20,
  author       = {Onur Barut and
                  Rebecca Zhu and
                  Yan Luo and
                  Tong Zhang},
  title        = {{TLS} Encrypted Application Classification Using Machine Learning
                  with Flow Feature Engineering},
  booktitle    = {{ICCNS} 2020: The 10th International Conference on Communication and
                  Network Security, Tokyo, Japan, November 27-29, 2020},
  pages        = {32--41},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3442520.3442529},
  doi          = {10.1145/3442520.3442529},
  timestamp    = {Thu, 12 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/BarutZLZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ChancusiDN20,
  author       = {Agust{\'{\i}}n Chancusi and
                  Pa{\'{u}}l Diestra and
                  Dami{\'{a}}n Nicolalde},
  title        = {Vulnerability Analysis of the Exposed Public IPs in a Higher Education
                  Institution},
  booktitle    = {{ICCNS} 2020: The 10th International Conference on Communication and
                  Network Security, Tokyo, Japan, November 27-29, 2020},
  pages        = {83--90},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3442520.3442523},
  doi          = {10.1145/3442520.3442523},
  timestamp    = {Thu, 12 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/ChancusiDN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/CuiU20,
  author       = {Pinchen Cui and
                  David A. Umphress},
  title        = {Towards Unsupervised Introspection of Containerized Application},
  booktitle    = {{ICCNS} 2020: The 10th International Conference on Communication and
                  Network Security, Tokyo, Japan, November 27-29, 2020},
  pages        = {42--51},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3442520.3442530},
  doi          = {10.1145/3442520.3442530},
  timestamp    = {Thu, 12 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/CuiU20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/LashkariKR20,
  author       = {Arash Habibi Lashkari and
                  Gurdip Kaur and
                  Abir Rahali},
  title        = {DIDarknet: {A} Contemporary Approach to Detect and Characterize the
                  Darknet Traffic using Deep Image Learning},
  booktitle    = {{ICCNS} 2020: The 10th International Conference on Communication and
                  Network Security, Tokyo, Japan, November 27-29, 2020},
  pages        = {1--13},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3442520.3442521},
  doi          = {10.1145/3442520.3442521},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/LashkariKR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/LvCM20,
  author       = {Na Lv and
                  Tianyu Chen and
                  Yuan Ma},
  title        = {Analysis on Entropy Sources based on Smartphone Sensors},
  booktitle    = {{ICCNS} 2020: The 10th International Conference on Communication and
                  Network Security, Tokyo, Japan, November 27-29, 2020},
  pages        = {21--31},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3442520.3442528},
  doi          = {10.1145/3442520.3442528},
  timestamp    = {Thu, 12 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/LvCM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/MartiriY20,
  author       = {Edlira Martiri and
                  Bian Yang},
  title        = {On the predictability of biometric honey templates, based on Bayesian
                  inference},
  booktitle    = {{ICCNS} 2020: The 10th International Conference on Communication and
                  Network Security, Tokyo, Japan, November 27-29, 2020},
  pages        = {123--134},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3442520.3442532},
  doi          = {10.1145/3442520.3442532},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccns/MartiriY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/RahaliLKTGM20,
  author       = {Abir Rahali and
                  Arash Habibi Lashkari and
                  Gurdip Kaur and
                  Laya Taheri and
                  Fran{\c{c}}ois Gagnon and
                  Fr{\'{e}}d{\'{e}}ric Massicotte},
  title        = {DIDroid: Android Malware Classification and Characterization Using
                  Deep Image Learning},
  booktitle    = {{ICCNS} 2020: The 10th International Conference on Communication and
                  Network Security, Tokyo, Japan, November 27-29, 2020},
  pages        = {70--82},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3442520.3442522},
  doi          = {10.1145/3442520.3442522},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/RahaliLKTGM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ShuklaMV20,
  author       = {Sanjeev Shukla and
                  Manoj Misra and
                  Gaurav Varshney},
  title        = {Identification of Spoofed Emails by applying Email Forensics and Memory
                  Forensics},
  booktitle    = {{ICCNS} 2020: The 10th International Conference on Communication and
                  Network Security, Tokyo, Japan, November 27-29, 2020},
  pages        = {109--114},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3442520.3442527},
  doi          = {10.1145/3442520.3442527},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/ShuklaMV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/Wang0TW20,
  author       = {Xuefei Wang and
                  Rui Ma and
                  Donghai Tian and
                  Xiajing Wang},
  title        = {{VCPEC:} Vulnerability Correlation Analysis Based on Privilege Escalation
                  and Coritivity Theory},
  booktitle    = {{ICCNS} 2020: The 10th International Conference on Communication and
                  Network Security, Tokyo, Japan, November 27-29, 2020},
  pages        = {99--108},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3442520.3442526},
  doi          = {10.1145/3442520.3442526},
  timestamp    = {Thu, 12 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/Wang0TW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/WangZZMW20,
  author       = {Yongfu Wang and
                  Ying Zhou and
                  Xiaohai Zou and
                  Quanqiang Miao and
                  Wei Wang},
  title        = {The analysis method of security vulnerability based on the knowledge
                  graph},
  booktitle    = {{ICCNS} 2020: The 10th International Conference on Communication and
                  Network Security, Tokyo, Japan, November 27-29, 2020},
  pages        = {135--145},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3442520.3442535},
  doi          = {10.1145/3442520.3442535},
  timestamp    = {Tue, 26 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/WangZZMW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/WongTMD20,
  author       = {Kok{-}Seng Wong and
                  Nguyen Anh Tu and
                  Anuar Maratkhan and
                  M. Fatih Demirci},
  title        = {A Privacy-Preserving Framework for Surveillance Systems},
  booktitle    = {{ICCNS} 2020: The 10th International Conference on Communication and
                  Network Security, Tokyo, Japan, November 27-29, 2020},
  pages        = {91--98},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3442520.3442524},
  doi          = {10.1145/3442520.3442524},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccns/WongTMD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/YamashitaMSN20,
  author       = {Tomoya Yamashita and
                  Daisuke Miyamoto and
                  Yuji Sekiya and
                  Hiroshi Nakamura},
  title        = {Slow Scan Attack Detection Based on Communication Behavior},
  booktitle    = {{ICCNS} 2020: The 10th International Conference on Communication and
                  Network Security, Tokyo, Japan, November 27-29, 2020},
  pages        = {14--20},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3442520.3442525},
  doi          = {10.1145/3442520.3442525},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccns/YamashitaMSN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/YangHWZL20,
  author       = {Ming Yang and
                  Xuexian Hu and
                  Jianghong Wei and
                  Qihui Zhang and
                  Wenfen Liu},
  title        = {Outsourced Secure {ID3} Decision Tree Algorithm over Horizontally
                  Partitioned Datasets with Consortium Blockchain},
  booktitle    = {{ICCNS} 2020: The 10th International Conference on Communication and
                  Network Security, Tokyo, Japan, November 27-29, 2020},
  pages        = {60--69},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3442520.3442534},
  doi          = {10.1145/3442520.3442534},
  timestamp    = {Thu, 12 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/YangHWZL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iccns/2020,
  title        = {{ICCNS} 2020: The 10th International Conference on Communication and
                  Network Security, Tokyo, Japan, November 27-29, 2020},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3442520},
  doi          = {10.1145/3442520},
  isbn         = {978-1-4503-8903-7},
  timestamp    = {Thu, 12 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/BaiQC19,
  author       = {Enjian Bai and
                  Fangyuan Qin and
                  Sijing Chen},
  title        = {Effective Scrambling Scheme for Physical Layer Security},
  booktitle    = {{ICCNS} 2019: The 9th International Conference on Communication and
                  Network Security, Chongqing, China, November 15-17, 2019},
  pages        = {92--96},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3371676.3371689},
  doi          = {10.1145/3371676.3371689},
  timestamp    = {Thu, 22 Apr 2021 19:04:09 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/BaiQC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ChangS19,
  author       = {Qingqing Chang and
                  Shenghui Su},
  title        = {Mobile Phone Number Privacy Scheme Based on Lightweight Hash Mapping},
  booktitle    = {{ICCNS} 2019: The 9th International Conference on Communication and
                  Network Security, Chongqing, China, November 15-17, 2019},
  pages        = {34--39},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3371676.3371682},
  doi          = {10.1145/3371676.3371682},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/ChangS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ChenH19,
  author       = {Yanyan Chen and
                  Wenxian Han},
  title        = {Research on Automatically Switched Optical Network Security Based
                  on Quantum Key Distribution},
  booktitle    = {{ICCNS} 2019: The 9th International Conference on Communication and
                  Network Security, Chongqing, China, November 15-17, 2019},
  pages        = {75--78},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3371676.3371701},
  doi          = {10.1145/3371676.3371701},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/ChenH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ChenLLG19,
  author       = {Biqiong Chen and
                  Yanhua Liu and
                  Shijin Li and
                  Xiaoling Gao},
  title        = {Attack Intent Analysis Method Based on Attack Path Graph},
  booktitle    = {{ICCNS} 2019: The 9th International Conference on Communication and
                  Network Security, Chongqing, China, November 15-17, 2019},
  pages        = {97--102},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3371676.3371680},
  doi          = {10.1145/3371676.3371680},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/ChenLLG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/DaiGLYLC19,
  author       = {Rui Dai and
                  Chuan Gao and
                  Bo Lang and
                  Lixia Yang and
                  Hongyu Liu and
                  Shaojie Chen},
  title        = {{SSL} Malicious Traffic Detection Based On Multi-view Features},
  booktitle    = {{ICCNS} 2019: The 9th International Conference on Communication and
                  Network Security, Chongqing, China, November 15-17, 2019},
  pages        = {40--46},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3371676.3371697},
  doi          = {10.1145/3371676.3371697},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/DaiGLYLC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/DuyAP19,
  author       = {Phan The Duy and
                  Le Duy An and
                  Van{-}Hau Pham},
  title        = {Mitigating Flow Table Overloading Attack with Controller-based Flow
                  Filtering Strategy in {SDN}},
  booktitle    = {{ICCNS} 2019: The 9th International Conference on Communication and
                  Network Security, Chongqing, China, November 15-17, 2019},
  pages        = {154--158},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3371676.3371706},
  doi          = {10.1145/3371676.3371706},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/DuyAP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/GaoLQL19,
  author       = {Xiaoling Gao and
                  Yanhua Liu and
                  Yanbin Qiu and
                  Huajun Liu},
  title        = {A Comprehensive Assessment Method of Asset Importance for Key Asset
                  Protection},
  booktitle    = {{ICCNS} 2019: The 9th International Conference on Communication and
                  Network Security, Chongqing, China, November 15-17, 2019},
  pages        = {79--83},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3371676.3371679},
  doi          = {10.1145/3371676.3371679},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/GaoLQL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/HeDSL19,
  author       = {Qipeng He and
                  Cong Dai and
                  Rong Si and
                  Jianwen Lin},
  title        = {Research on Improvement of Wireless Sensor Network Location Algorithm
                  Based on DV-Hop},
  booktitle    = {{ICCNS} 2019: The 9th International Conference on Communication and
                  Network Security, Chongqing, China, November 15-17, 2019},
  pages        = {149--153},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3371676.3371698},
  doi          = {10.1145/3371676.3371698},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/HeDSL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/JiangFZH19,
  author       = {Hua Jiang and
                  Jinpo Fan and
                  Gang Zhang and
                  Ronglei Hu},
  title        = {Design and Implementation of Integrated Access {VPN} Gateway},
  booktitle    = {{ICCNS} 2019: The 9th International Conference on Communication and
                  Network Security, Chongqing, China, November 15-17, 2019},
  pages        = {128--132},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3371676.3371681},
  doi          = {10.1145/3371676.3371681},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/JiangFZH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/KongLZY19,
  author       = {Bin Kong and
                  Zhangpu Liu and
                  Guangming Zhou and
                  Xiaoyan Yu},
  title        = {A Method of Detecting the Abnormal Encrypted Traffic Based on Machine
                  Learning and Behavior Characteristics},
  booktitle    = {{ICCNS} 2019: The 9th International Conference on Communication and
                  Network Security, Chongqing, China, November 15-17, 2019},
  pages        = {47--50},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3371676.3371705},
  doi          = {10.1145/3371676.3371705},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/KongLZY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/KongYLJHZ19,
  author       = {Fanyu Kong and
                  Guoqiang Yang and
                  Huiyi Liu and
                  Yali Jiang and
                  Chengyu Hu and
                  Dashui Zhou},
  title        = {Fault-injection Attack and Improvement of a {CRT-RSA} Exponentiation
                  Algorithm},
  booktitle    = {{ICCNS} 2019: The 9th International Conference on Communication and
                  Network Security, Chongqing, China, November 15-17, 2019},
  pages        = {123--127},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3371676.3371699},
  doi          = {10.1145/3371676.3371699},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/KongYLJHZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/Kun19,
  author       = {Yu Kun},
  title        = {Deep Security Analysis of {DCS} for Ship's Nuclear Power System based
                  on Improved {DEMATEL}},
  booktitle    = {{ICCNS} 2019: The 9th International Conference on Communication and
                  Network Security, Chongqing, China, November 15-17, 2019},
  pages        = {103--108},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3371676.3371677},
  doi          = {10.1145/3371676.3371677},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/Kun19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/LiGCL19,
  author       = {Han Li and
                  Chonglin Gu and
                  Yi Chen and
                  Wenye Li},
  title        = {An Efficient, Secure and Reliable Search Scheme for Dynamic Updates
                  with Blockchain},
  booktitle    = {{ICCNS} 2019: The 9th International Conference on Communication and
                  Network Security, Chongqing, China, November 15-17, 2019},
  pages        = {51--57},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3371676.3371684},
  doi          = {10.1145/3371676.3371684},
  timestamp    = {Mon, 06 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccns/LiGCL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/LinGHZL19,
  author       = {Zijie Lin and
                  Liangliang Gao and
                  Xuexian Hu and
                  Yuxuan Zhang and
                  Wenfen Liu},
  title        = {Differentially Private Graph Clustering Algorithm Based on Structure
                  Similarity},
  booktitle    = {{ICCNS} 2019: The 9th International Conference on Communication and
                  Network Security, Chongqing, China, November 15-17, 2019},
  pages        = {63--68},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3371676.3371693},
  doi          = {10.1145/3371676.3371693},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/LinGHZL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/LiuGCB19,
  author       = {Bo Liu and
                  Honghe Ge and
                  Jinfu Chen and
                  Qihao Bao},
  title        = {An Automatic Testing Platform for Object-oriented Software based on
                  Code Coverage},
  booktitle    = {{ICCNS} 2019: The 9th International Conference on Communication and
                  Network Security, Chongqing, China, November 15-17, 2019},
  pages        = {20--24},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3371676.3371702},
  doi          = {10.1145/3371676.3371702},
  timestamp    = {Fri, 17 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccns/LiuGCB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/LiuLLG19,
  author       = {Huajun Liu and
                  Zhanghui Liu and
                  Yanhua Liu and
                  Xiaoling Gao},
  title        = {Abnormal Network Traffic Detection based on Leaf Node Density Ratio},
  booktitle    = {{ICCNS} 2019: The 9th International Conference on Communication and
                  Network Security, Chongqing, China, November 15-17, 2019},
  pages        = {69--74},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3371676.3371678},
  doi          = {10.1145/3371676.3371678},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/LiuLLG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/LiuYC19,
  author       = {Jiaxin Liu and
                  Xuerong Yue and
                  Zhibin Chen},
  title        = {A Note on Polynomial-time Solvability for Edge Packing on Graphs},
  booktitle    = {{ICCNS} 2019: The 9th International Conference on Communication and
                  Network Security, Chongqing, China, November 15-17, 2019},
  pages        = {118--122},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3371676.3371691},
  doi          = {10.1145/3371676.3371691},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/LiuYC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/QiSH19,
  author       = {Yingying Qi and
                  Wenli Shang and
                  Xiaojun He},
  title        = {A Combined Prediction Method of Industrial Internet Security Situation
                  Based on Time Series},
  booktitle    = {{ICCNS} 2019: The 9th International Conference on Communication and
                  Network Security, Chongqing, China, November 15-17, 2019},
  pages        = {84--91},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3371676.3371704},
  doi          = {10.1145/3371676.3371704},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/QiSH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/SongHQ19,
  author       = {Xin Song and
                  Xue Huang and
                  Haijun Qian},
  title        = {Power Allocation Based on Geometric Programming for Non-orthogonal
                  Multiple Access Heterogeneous Networks},
  booktitle    = {{ICCNS} 2019: The 9th International Conference on Communication and
                  Network Security, Chongqing, China, November 15-17, 2019},
  pages        = {137--141},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3371676.3371687},
  doi          = {10.1145/3371676.3371687},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/SongHQ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/WangZWGYF19,
  author       = {Yucheng Wang and
                  Daohua Zhu and
                  Qing Wu and
                  Yajuan Guo and
                  Chonghai Yang and
                  Wenjiang Feng},
  title        = {Wireless Signal Identification in 230MHz Band Based on Interference
                  Cleaning and Convolutional Neural Network},
  booktitle    = {{ICCNS} 2019: The 9th International Conference on Communication and
                  Network Security, Chongqing, China, November 15-17, 2019},
  pages        = {133--136},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3371676.3371686},
  doi          = {10.1145/3371676.3371686},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/WangZWGYF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/XiongMC19,
  author       = {Xinli Xiong and
                  Linru Ma and
                  Chao Cui},
  title        = {Simulation Environment of Evaluation and Optimization for Moving Target
                  Defense: {A} SimPy Approach},
  booktitle    = {{ICCNS} 2019: The 9th International Conference on Communication and
                  Network Security, Chongqing, China, November 15-17, 2019},
  pages        = {114--117},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3371676.3371692},
  doi          = {10.1145/3371676.3371692},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/XiongMC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/YangS19,
  author       = {Kaige Yang and
                  Shenghui Su},
  title        = {Secure Email Login Based on Lightweight Asymmetric Identities},
  booktitle    = {{ICCNS} 2019: The 9th International Conference on Communication and
                  Network Security, Chongqing, China, November 15-17, 2019},
  pages        = {25--29},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3371676.3371683},
  doi          = {10.1145/3371676.3371683},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/YangS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/YangSXK19,
  author       = {Ping Yang and
                  Hui Shu and
                  Xiaobing Xiong and
                  Fei Kang},
  title        = {Semantic-based Malware Behavior Description: Past and Future},
  booktitle    = {{ICCNS} 2019: The 9th International Conference on Communication and
                  Network Security, Chongqing, China, November 15-17, 2019},
  pages        = {11--19},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3371676.3371700},
  doi          = {10.1145/3371676.3371700},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/YangSXK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/YangT19,
  author       = {Wu{-}Chuan Yang and
                  Lien{-}Yuan Ting},
  title        = {Embedded Authentication and Blockchain in Micro-course},
  booktitle    = {{ICCNS} 2019: The 9th International Conference on Communication and
                  Network Security, Chongqing, China, November 15-17, 2019},
  pages        = {58--62},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3371676.3371696},
  doi          = {10.1145/3371676.3371696},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/YangT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/YangY19,
  author       = {Chen Yang and
                  Wei Yan},
  title        = {Location Privacy Protection Scheme Based on Location Services},
  booktitle    = {{ICCNS} 2019: The 9th International Conference on Communication and
                  Network Security, Chongqing, China, November 15-17, 2019},
  pages        = {30--33},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3371676.3371695},
  doi          = {10.1145/3371676.3371695},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/YangY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/YangYLWD19,
  author       = {Wen Yang and
                  Meijuan Yin and
                  Xiaonan Liu and
                  Can Wang and
                  Shunran Duan},
  title        = {Multi-source Landmark Fusion based on Machine Learning},
  booktitle    = {{ICCNS} 2019: The 9th International Conference on Communication and
                  Network Security, Chongqing, China, November 15-17, 2019},
  pages        = {142--148},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3371676.3371694},
  doi          = {10.1145/3371676.3371694},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/YangYLWD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/YueGC19,
  author       = {Xuerong Yue and
                  Jiji Gao and
                  Zhibin Chen},
  title        = {A Polynomial Time Algorithm for Scheduling on Processing Time Constraints},
  booktitle    = {{ICCNS} 2019: The 9th International Conference on Communication and
                  Network Security, Chongqing, China, November 15-17, 2019},
  pages        = {109--113},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3371676.3371690},
  doi          = {10.1145/3371676.3371690},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/YueGC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ZhangDZQ19,
  author       = {Zufa Zhang and
                  Jianqiang Dai and
                  Lingling Zhao and
                  Songling Qin},
  title        = {A Web Services Testing Approach based on Difference Measurement and
                  Adaptive Random Testing},
  booktitle    = {{ICCNS} 2019: The 9th International Conference on Communication and
                  Network Security, Chongqing, China, November 15-17, 2019},
  pages        = {1--5},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3371676.3371703},
  doi          = {10.1145/3371676.3371703},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/ZhangDZQ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ZhangZC19,
  author       = {Jianing Zhang and
                  Xingtao Zhuang and
                  Yunfang Chen},
  title        = {Android Malware Detection Combined with Static and Dynamic Analysis},
  booktitle    = {{ICCNS} 2019: The 9th International Conference on Communication and
                  Network Security, Chongqing, China, November 15-17, 2019},
  pages        = {6--10},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3371676.3371685},
  doi          = {10.1145/3371676.3371685},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/ZhangZC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ZhouSWXT19,
  author       = {Kaihang Zhou and
                  Lei Shi and
                  Jiahua Wei and
                  Yang Xue and
                  Jie Tang},
  title        = {Deterministic Controlled Remote State Preparation of Arbitrary Real-parameter
                  Multi-qubit States via Three-qubit Entangled States},
  booktitle    = {{ICCNS} 2019: The 9th International Conference on Communication and
                  Network Security, Chongqing, China, November 15-17, 2019},
  pages        = {159--163},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3371676.3371688},
  doi          = {10.1145/3371676.3371688},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/ZhouSWXT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iccns/2019,
  title        = {{ICCNS} 2019: The 9th International Conference on Communication and
                  Network Security, Chongqing, China, November 15-17, 2019},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3371676},
  doi          = {10.1145/3371676},
  isbn         = {978-1-4503-7662-4},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/0002JMY18,
  author       = {Xiaoming Hu and
                  Wenrong Jiang and
                  Chuang Ma and
                  Chengcheng Yu},
  title        = {Security Analysis and Improvement of Partially Blind Proxy Re-signature
                  Scheme},
  booktitle    = {Proceedings of the 8th International Conference on Communication and
                  Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018},
  pages        = {12--16},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3290480.3290487},
  doi          = {10.1145/3290480.3290487},
  timestamp    = {Thu, 22 Apr 2021 18:47:33 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/0002JMY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/BaiZZHZH18,
  author       = {Xiaodong Bai and
                  Wendeng Zhu and
                  Gengxin Zhang and
                  Tao Hong and
                  Laiding Zhao and
                  Jing Hu},
  title        = {Identification Method of Power Spectral Signal Based on Fourier Series
                  Fitting and Density Clustering},
  booktitle    = {Proceedings of the 8th International Conference on Communication and
                  Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018},
  pages        = {107--111},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3290480.3290495},
  doi          = {10.1145/3290480.3290495},
  timestamp    = {Wed, 29 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccns/BaiZZHZH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ChenWZL18,
  author       = {Yunfang Chen and
                  Que Wu and
                  Wei Zhang and
                  Qiangchun Liu},
  title        = {{SD-WAN} Source Route Based on Protocol-oblivious Forwarding},
  booktitle    = {Proceedings of the 8th International Conference on Communication and
                  Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018},
  pages        = {95--99},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3290480.3290486},
  doi          = {10.1145/3290480.3290486},
  timestamp    = {Mon, 22 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccns/ChenWZL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ChenXDLL18,
  author       = {Xiong Chen and
                  Ruliang Xiao and
                  Xin Du and
                  Xinhong Lin and
                  Li Lin},
  title        = {Constructing {A} Novel Spark-based Distributed Maximum Frequent Sequence
                  Pattern Mining for IoT Log},
  booktitle    = {Proceedings of the 8th International Conference on Communication and
                  Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018},
  pages        = {112--116},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3290480.3290497},
  doi          = {10.1145/3290480.3290497},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/ChenXDLL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/GuHW18,
  author       = {Yonggen Gu and
                  Dingding Hou and
                  Xiaohong Wu},
  title        = {A Cloud Storage Resource Transaction Mechanism Based on Smart Contract},
  booktitle    = {Proceedings of the 8th International Conference on Communication and
                  Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018},
  pages        = {134--138},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3290480.3290499},
  doi          = {10.1145/3290480.3290499},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/GuHW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/Haghighat018,
  author       = {Mohammad Hashem Haghighat and
                  Jun Li},
  title        = {Edmund: Entropy based attack Detection and Mitigation engine Using
                  Netflow Data},
  booktitle    = {Proceedings of the 8th International Conference on Communication and
                  Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018},
  pages        = {1--6},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3290480.3290484},
  doi          = {10.1145/3290480.3290484},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/Haghighat018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/JiangXT18,
  author       = {Yikun Jiang and
                  Wei Xie and
                  Yong Tang},
  title        = {Detecting Authentication-Bypass Flaws in a Large Scale of IoT Embedded
                  Web Servers},
  booktitle    = {Proceedings of the 8th International Conference on Communication and
                  Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018},
  pages        = {56--63},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3290480.3290491},
  doi          = {10.1145/3290480.3290491},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/JiangXT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/KongHZY18,
  author       = {Lingjing Kong and
                  Guowei Huang and
                  Ying Zhou and
                  Jianfeng Ye},
  title        = {Fast Abnormal Identification for Large Scale Internet Traffic},
  booktitle    = {Proceedings of the 8th International Conference on Communication and
                  Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018},
  pages        = {117--120},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3290480.3290498},
  doi          = {10.1145/3290480.3290498},
  timestamp    = {Wed, 16 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/KongHZY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/LiZQ18,
  author       = {Shijin Li and
                  Minchen Zhu and
                  Yanbin Qiu},
  title        = {Attack Intent Analysis Method Based on Attack Path Graph},
  booktitle    = {Proceedings of the 8th International Conference on Communication and
                  Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018},
  pages        = {27--31},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3290480.3290502},
  doi          = {10.1145/3290480.3290502},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/LiZQ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/LiuDL18,
  author       = {Xiaojian Liu and
                  Xiaofeng Dong and
                  Qian Lei},
  title        = {Android Malware Detection Based on Multi-Features},
  booktitle    = {Proceedings of the 8th International Conference on Communication and
                  Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018},
  pages        = {69--73},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3290480.3290493},
  doi          = {10.1145/3290480.3290493},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/LiuDL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/Man0L18,
  author       = {Dapeng Man and
                  Wu Yang and
                  Zeya Lu},
  title        = {Research on Task Scheduling Model for Multi-core Processor},
  booktitle    = {Proceedings of the 8th International Conference on Communication and
                  Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018},
  pages        = {129--133},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3290480.3290483},
  doi          = {10.1145/3290480.3290483},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/Man0L18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/Man0T18,
  author       = {Dapeng Man and
                  Wu Yang and
                  Guoqing Tian},
  title        = {Multi-pattern Matching Algorithm based on Variable Step Size},
  booktitle    = {Proceedings of the 8th International Conference on Communication and
                  Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018},
  pages        = {125--128},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3290480.3290482},
  doi          = {10.1145/3290480.3290482},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/Man0T18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/QiuLL18,
  author       = {Yanbin Qiu and
                  Yanhua Liu and
                  Shijin Li},
  title        = {A method of cyber risk control node selection based on Game Theory},
  booktitle    = {Proceedings of the 8th International Conference on Communication and
                  Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018},
  pages        = {32--36},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3290480.3290504},
  doi          = {10.1145/3290480.3290504},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/QiuLL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/Seghier18,
  author       = {Athmane Seghier},
  title        = {Progressive Two-bits Tweak for Linear Redundancy reduction from Finite
                  Field S-Boxes},
  booktitle    = {Proceedings of the 8th International Conference on Communication and
                  Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018},
  pages        = {50--55},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3290480.3290490},
  doi          = {10.1145/3290480.3290490},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/Seghier18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ShenGW18,
  author       = {Shiyu Shen and
                  Jianlin Gao and
                  Aitian Wu},
  title        = {Weakness Identification and Flow Analysis Based on Tor Network},
  booktitle    = {Proceedings of the 8th International Conference on Communication and
                  Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018},
  pages        = {90--94},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3290480.3290481},
  doi          = {10.1145/3290480.3290481},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/ShenGW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/SuLS18,
  author       = {Peihuang Su and
                  Yanhua Liu and
                  Xiang Song},
  title        = {Research on Intrusion Detection Method Based on Improved Smote and
                  XGBoost},
  booktitle    = {Proceedings of the 8th International Conference on Communication and
                  Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018},
  pages        = {37--41},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3290480.3290505},
  doi          = {10.1145/3290480.3290505},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/SuLS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/SunH18,
  author       = {Haonan Sun and
                  Rongyu He},
  title        = {Certification and remote attestation methods of the eTPM trusted cloud},
  booktitle    = {Proceedings of the 8th International Conference on Communication and
                  Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018},
  pages        = {42--49},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3290480.3290488},
  doi          = {10.1145/3290480.3290488},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/SunH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/SunLH18,
  author       = {Gangcan Sun and
                  Mengge Liu and
                  Zhuo Han},
  title        = {Multiple Eavesdropper-Based Physical Layer Security in {TAS/MRC} System
                  With Antenna Correlation},
  booktitle    = {Proceedings of the 8th International Conference on Communication and
                  Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018},
  pages        = {100--106},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3290480.3290489},
  doi          = {10.1145/3290480.3290489},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/SunLH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/WangCH18,
  author       = {Yongchao Wang and
                  Yuyan Chao and
                  Lifeng He},
  title        = {A Study of Neighbor Users Selection in Email Networks for Spam Filtering},
  booktitle    = {Proceedings of the 8th International Conference on Communication and
                  Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018},
  pages        = {22--26},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3290480.3290500},
  doi          = {10.1145/3290480.3290500},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/WangCH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/WangZW18,
  author       = {Chuanchuan Wang and
                  Yonghu Zeng and
                  Liandong Wang},
  title        = {A Modified Source Number Estimation Method based on Wavelet Analysis
                  and Singular Value Decomposition},
  booktitle    = {Proceedings of the 8th International Conference on Communication and
                  Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018},
  pages        = {121--124},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3290480.3290509},
  doi          = {10.1145/3290480.3290509},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/WangZW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/WangZW18a,
  author       = {Chuanchuan Wang and
                  Yonghu Zeng and
                  Liandong Wang},
  title        = {Mixing Matrix Estimation Method for {UBSS} based on Observed Data
                  Segmentation},
  booktitle    = {Proceedings of the 8th International Conference on Communication and
                  Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018},
  pages        = {149--154},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3290480.3290510},
  doi          = {10.1145/3290480.3290510},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/WangZW18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/WuSYL18,
  author       = {Cangshuai Wu and
                  Jiangyong Shi and
                  Yuexiang Yang and
                  Wenhua Li},
  title        = {Enhancing Machine Learning Based Malware Detection Model by Reinforcement
                  Learning},
  booktitle    = {Proceedings of the 8th International Conference on Communication and
                  Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018},
  pages        = {74--78},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3290480.3290494},
  doi          = {10.1145/3290480.3290494},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccns/WuSYL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/XiongXZ18,
  author       = {Xinli Xiong and
                  Weiguang Xu and
                  Guangsheng Zhao},
  title        = {The Effectiveness Assessment for Network Based {MTD} Strategies},
  booktitle    = {Proceedings of the 8th International Conference on Communication and
                  Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018},
  pages        = {7--11},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3290480.3290485},
  doi          = {10.1145/3290480.3290485},
  timestamp    = {Wed, 19 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/XiongXZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ZhangMZ18,
  author       = {Wei{-}Guo Zhang and
                  Xi{-}Lin Ma and
                  Jin{-}Zhong Zhang},
  title        = {Research on Kubernetes' Resource Scheduling Scheme},
  booktitle    = {Proceedings of the 8th International Conference on Communication and
                  Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018},
  pages        = {144--148},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3290480.3290507},
  doi          = {10.1145/3290480.3290507},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/ZhangMZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ZhangWZHL18,
  author       = {Yuxuan Zhang and
                  Jianghong Wei and
                  Xiaojian Zhang and
                  Xuexian Hu and
                  Wenfen Liu},
  title        = {A Two-Phase Algorithm for Generating Synthetic Graph Under Local Differential
                  Privacy},
  booktitle    = {Proceedings of the 8th International Conference on Communication and
                  Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018},
  pages        = {84--89},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3290480.3290503},
  doi          = {10.1145/3290480.3290503},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/ZhangWZHL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ZhangZHL18,
  author       = {Mengli Zhang and
                  Qihui Zhang and
                  Xuexian Hu and
                  Wenfen Liu},
  title        = {A Password Cracking Method Based On Structure Partition and BiLSTM
                  Recurrent Neural Network},
  booktitle    = {Proceedings of the 8th International Conference on Communication and
                  Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018},
  pages        = {79--83},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3290480.3290501},
  doi          = {10.1145/3290480.3290501},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/ZhangZHL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ZhangZLHL18,
  author       = {Xu Zhang and
                  Shaowu Zhou and
                  Peng Lin and
                  Wei Huang and
                  Wendu Li},
  title        = {Stability Analysis of Tail Water Slope out of the Underground Power
                  Station in Hydropower Engineering},
  booktitle    = {Proceedings of the 8th International Conference on Communication and
                  Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018},
  pages        = {155--159},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3290480.3290508},
  doi          = {10.1145/3290480.3290508},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/ZhangZLHL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/Zhao18,
  author       = {Jianfeng Zhao},
  title        = {Case Study: Discovering Hardware Trojans Based on model checking},
  booktitle    = {Proceedings of the 8th International Conference on Communication and
                  Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018},
  pages        = {64--68},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3290480.3290492},
  doi          = {10.1145/3290480.3290492},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/Zhao18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ZhaoXW18,
  author       = {Guangsheng Zhao and
                  Xinli Xiong and
                  Huaying Wu},
  title        = {A Model for Analyzing the Effectiveness of Moving Target Defense},
  booktitle    = {Proceedings of the 8th International Conference on Communication and
                  Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018},
  pages        = {17--21},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3290480.3290496},
  doi          = {10.1145/3290480.3290496},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/ZhaoXW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ZhengYC18,
  author       = {Shengshi Zheng and
                  Xuerong Yue and
                  Zhibin Chen},
  title        = {Parallel Machine Scheduling with Rejection under Special Conditions},
  booktitle    = {Proceedings of the 8th International Conference on Communication and
                  Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018},
  pages        = {139--143},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3290480.3290506},
  doi          = {10.1145/3290480.3290506},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/ZhengYC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iccns/2018,
  title        = {Proceedings of the 8th International Conference on Communication and
                  Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3290480},
  doi          = {10.1145/3290480},
  isbn         = {978-1-4503-6567-3},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/BayouECC17,
  author       = {Lyes Bayou and
                  David Espes and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  title        = {wirelessOrBAC: Towards an access-control-based {IDS} for Wireless
                  Sensor Networks},
  booktitle    = {Proceedings of the 7th International Conference on Communication and
                  Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017},
  pages        = {96--103},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3163058.3163077},
  doi          = {10.1145/3163058.3163077},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccns/BayouECC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ChaiphetNAJGG17,
  author       = {Chiraphat Chaiphet and
                  Sudsanguan Ngamsuriyaroj and
                  Ahmed Awad and
                  Betran Jacob and
                  Ioannis Gakos and
                  Wiktor Grajkowski},
  title        = {Secure Enclave for {TLS} Web Server on Untrusted Environment},
  booktitle    = {Proceedings of the 7th International Conference on Communication and
                  Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017},
  pages        = {27--31},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3163058.3163063},
  doi          = {10.1145/3163058.3163063},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccns/ChaiphetNAJGG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ChenJHCC17,
  author       = {Sheng{-}Yu Chen and
                  Tzung{-}Han Jeng and
                  Chuan{-}Chiang Huang and
                  Chien{-}Chih Chen and
                  Kuo{-}Sen Chou},
  title        = {Doctrina: Annotated Bipartite Graph Mining for Malware-Control Domain
                  Detection},
  booktitle    = {Proceedings of the 7th International Conference on Communication and
                  Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017},
  pages        = {67--75},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3163058.3163061},
  doi          = {10.1145/3163058.3163061},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccns/ChenJHCC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/GuptaS17,
  author       = {Ishu Gupta and
                  Ashutosh Kumar Singh},
  title        = {A Probability based Model for Data Leakage Detection using Bigraph},
  booktitle    = {Proceedings of the 7th International Conference on Communication and
                  Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017},
  pages        = {1--5},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3163058.3163060},
  doi          = {10.1145/3163058.3163060},
  timestamp    = {Thu, 14 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/GuptaS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/IsmantoS17,
  author       = {Romi Nur Ismanto and
                  Muhammad Salman},
  title        = {Improving Security Level through Obfuscation Technique for Source
                  Code Protection using {AES} Algorithm},
  booktitle    = {Proceedings of the 7th International Conference on Communication and
                  Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017},
  pages        = {18--22},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3163058.3163071},
  doi          = {10.1145/3163058.3163071},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccns/IsmantoS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/JeonHN17,
  author       = {Boosun Jeon and
                  Young{-}Jun Heo and
                  Jung{-}Chan Na},
  title        = {A Retransmission Method for Improving Transmission Reliability in
                  One-way Transmission},
  booktitle    = {Proceedings of the 7th International Conference on Communication and
                  Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017},
  pages        = {109--113},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3163058.3163075},
  doi          = {10.1145/3163058.3163075},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/JeonHN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/KhanFO17,
  author       = {Muhammad Imran Khan and
                  Simon N. Foley and
                  Barry O'Sullivan},
  title        = {On database intrusion detection: {A} Query analytics-based model of
                  normative behavior to detect insider attacks},
  booktitle    = {Proceedings of the 7th International Conference on Communication and
                  Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017},
  pages        = {12--17},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3163058.3163068},
  doi          = {10.1145/3163058.3163068},
  timestamp    = {Tue, 19 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccns/KhanFO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/KimS17,
  author       = {JaeHyu Kim and
                  JooSeok Song},
  title        = {A Simple and Efficient Replay Attack Prevention Scheme for LoRaWAN},
  booktitle    = {Proceedings of the 7th International Conference on Communication and
                  Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017},
  pages        = {32--36},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3163058.3163064},
  doi          = {10.1145/3163058.3163064},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccns/KimS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/LashkariDKMG17,
  author       = {Arash Habibi Lashkari and
                  Gerard Draper{-}Gil and
                  Jonathan Edward Keenan and
                  Kenneth Fon Mbah and
                  Ali A. Ghorbani},
  title        = {A Survey Leading to a New Evaluation Framework for Network-based Botnet
                  Detection},
  booktitle    = {Proceedings of the 7th International Conference on Communication and
                  Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017},
  pages        = {59--66},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3163058.3163059},
  doi          = {10.1145/3163058.3163059},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/LashkariDKMG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/LiGW17,
  author       = {Huan Li and
                  Chen Guo and
                  Donglin Wang},
  title        = {Hybrid Sorting Method for Successive Cancellation List Decoding of
                  Polar Codes},
  booktitle    = {Proceedings of the 7th International Conference on Communication and
                  Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017},
  pages        = {23--26},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3163058.3163079},
  doi          = {10.1145/3163058.3163079},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccns/LiGW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/MandalMM17,
  author       = {Susmita Mandal and
                  Sujata Mohanty and
                  Banshidhar Majhi},
  title        = {An ID-based Non-Interactive Deniable Authentication Protocol based
                  on {ECC}},
  booktitle    = {Proceedings of the 7th International Conference on Communication and
                  Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017},
  pages        = {48--52},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3163058.3163070},
  doi          = {10.1145/3163058.3163070},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/MandalMM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/MoesriamiBarmawi17,
  author       = {Ari Moesriami Barmawi and
                  Dani Arumanegara},
  title        = {Strengthening Dynamic Identity Based Remote User Authentication Scheme
                  Using Smart Card against Offline Password Guessing Attack},
  booktitle    = {Proceedings of the 7th International Conference on Communication and
                  Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017},
  pages        = {53--58},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3163058.3163072},
  doi          = {10.1145/3163058.3163072},
  timestamp    = {Fri, 18 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccns/MoesriamiBarmawi17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/RanaCADY17,
  author       = {Khurram Gulzar Rana and
                  Yongquan Cai and
                  Muhammad Azeem and
                  Allah Ditta and
                  Haiyang Yu},
  title        = {Detection of Malicious Node in Wireless Ad Hoc Network by Using Acknowledgement
                  Based Approach},
  booktitle    = {Proceedings of the 7th International Conference on Communication and
                  Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017},
  pages        = {76--80},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3163058.3163062},
  doi          = {10.1145/3163058.3163062},
  timestamp    = {Thu, 26 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/RanaCADY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/SahooMM17,
  author       = {Shreeya Swagatika Sahoo and
                  Sujata Mohanty and
                  Banshidhar Majhi},
  title        = {A Light Weight Three Factor based Authentication Scheme for Multi-server
                  Environment using Smart Cards},
  booktitle    = {Proceedings of the 7th International Conference on Communication and
                  Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017},
  pages        = {43--47},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3163058.3163069},
  doi          = {10.1145/3163058.3163069},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/SahooMM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ShenCX17,
  author       = {Congqi Shen and
                  Huifang Chen and
                  Lei Xie},
  title        = {Distributed Target Tracking under Byzantine Data Attacks},
  booktitle    = {Proceedings of the 7th International Conference on Communication and
                  Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017},
  pages        = {114--119},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3163058.3163078},
  doi          = {10.1145/3163058.3163078},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccns/ShenCX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/YangLC17,
  author       = {Ching{-}Nung Yang and
                  Jian{-}Ming Li and
                  Yung{-}Shun Chou},
  title        = {On the Analysis of k-Secure t-Conference Key Distribution Scheme},
  booktitle    = {Proceedings of the 7th International Conference on Communication and
                  Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017},
  pages        = {91--95},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3163058.3163076},
  doi          = {10.1145/3163058.3163076},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccns/YangLC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/YangT17,
  author       = {Wanxia Yang and
                  Shanyu Tang},
  title        = {Steganalysis of {LSB} Speech with Low Embedding Rates based on Joint
                  Probability},
  booktitle    = {Proceedings of the 7th International Conference on Communication and
                  Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017},
  pages        = {6--11},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3163058.3163067},
  doi          = {10.1145/3163058.3163067},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccns/YangT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ZhangZG17,
  author       = {Xueqin Zhang and
                  Li Zhang and
                  Chunhua Gu},
  title        = {Security Risk Estimation of Social Network Privacy Issue},
  booktitle    = {Proceedings of the 7th International Conference on Communication and
                  Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017},
  pages        = {81--85},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3163058.3163073},
  doi          = {10.1145/3163058.3163073},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccns/ZhangZG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ZhangZG17a,
  author       = {Xueqin Zhang and
                  Qianru Zhou and
                  Chunhua Gu},
  title        = {Published Weighted Social Networks Privacy Preservation Based on Community
                  Division},
  booktitle    = {Proceedings of the 7th International Conference on Communication and
                  Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017},
  pages        = {86--90},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3163058.3163074},
  doi          = {10.1145/3163058.3163074},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccns/ZhangZG17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ZhengD17,
  author       = {Gengzhong Zheng and
                  Xiaoqing Dong},
  title        = {Node Importance Evaluation in Wireless Sensor Networks based on Topology
                  Contribution and Energy Efficiency},
  booktitle    = {Proceedings of the 7th International Conference on Communication and
                  Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017},
  pages        = {104--108},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3163058.3163065},
  doi          = {10.1145/3163058.3163065},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccns/ZhengD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ZhouT17,
  author       = {Binhe Zhou and
                  Bin Tian},
  title        = {Analysis and Research on Combinatorial Attack of Android Platform
                  Applications},
  booktitle    = {Proceedings of the 7th International Conference on Communication and
                  Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017},
  pages        = {37--42},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3163058.3163066},
  doi          = {10.1145/3163058.3163066},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccns/ZhouT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iccns/2017,
  title        = {Proceedings of the 7th International Conference on Communication and
                  Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {http://dl.acm.org/citation.cfm?id=3163058},
  isbn         = {978-1-4503-5349-6},
  timestamp    = {Sun, 21 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccns/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/0001BS16,
  author       = {Monika Singh and
                  Divya Bansal and
                  Sanjeev Sofat},
  title        = {A Novel Technique to Characterize Social Network Users: Comparative
                  Study},
  booktitle    = {Proceedings of the 6th International Conference on Communication and
                  Network Security, {ICCNS} '16, Singapore, November 26-29, 2016},
  pages        = {75--79},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3017971.3017977},
  doi          = {10.1145/3017971.3017977},
  timestamp    = {Sat, 02 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/0001BS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/AhmadWG16,
  author       = {Muhammad Aminu Ahmad and
                  Steve Woodhead and
                  Diane Gan},
  title        = {A Safeguard against Fast Self-propagating Malware},
  booktitle    = {Proceedings of the 6th International Conference on Communication and
                  Network Security, {ICCNS} '16, Singapore, November 26-29, 2016},
  pages        = {65--69},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3017971.3017974},
  doi          = {10.1145/3017971.3017974},
  timestamp    = {Sat, 02 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/AhmadWG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ChaimaaNH16,
  author       = {Belbergui Chaimaa and
                  Elkamoun Najib and
                  Rachid Hilal},
  title        = {A Dynamic Access Control Model for Cloud Computing Environments},
  booktitle    = {Proceedings of the 6th International Conference on Communication and
                  Network Security, {ICCNS} '16, Singapore, November 26-29, 2016},
  pages        = {21--29},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3017971.3017979},
  doi          = {10.1145/3017971.3017979},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/ChaimaaNH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ChangJYRL16,
  author       = {Rui Chang and
                  Liehui Jiang and
                  Qing Yin and
                  Lu Ren and
                  Qingfeng Liu},
  title        = {An Effective Usage and Access Control Scheme for Preventing Permission
                  Leak in a Trusted Execution Environment},
  booktitle    = {Proceedings of the 6th International Conference on Communication and
                  Network Security, {ICCNS} '16, Singapore, November 26-29, 2016},
  pages        = {6--10},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3017971.3017973},
  doi          = {10.1145/3017971.3017973},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/ChangJYRL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/HasanJLC16,
  author       = {A. S. M. Touhidul Hasan and
                  Qingshan Jiang and
                  Chengming Li and
                  Lifei Chen},
  title        = {An Effective Model for Anonymizing Personal Location Trajectory},
  booktitle    = {Proceedings of the 6th International Conference on Communication and
                  Network Security, {ICCNS} '16, Singapore, November 26-29, 2016},
  pages        = {35--39},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3017971.3017986},
  doi          = {10.1145/3017971.3017986},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/HasanJLC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/IkeS16,
  author       = {Moses Ike and
                  Kamil Sara{\c{c}}},
  title        = {{PPEP:} {A} Deployable Privacy Preserving E-Commerce Protocol for
                  Electronic Goods},
  booktitle    = {Proceedings of the 6th International Conference on Communication and
                  Network Security, {ICCNS} '16, Singapore, November 26-29, 2016},
  pages        = {104--112},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3017971.3017983},
  doi          = {10.1145/3017971.3017983},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/IkeS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/Jin0S16,
  author       = {Cancan Jin and
                  Xinyu Feng and
                  Qingni Shen},
  title        = {Fully Secure Hidden Ciphertext Policy Attribute-Based Encryption with
                  Short Ciphertext Size},
  booktitle    = {Proceedings of the 6th International Conference on Communication and
                  Network Security, {ICCNS} '16, Singapore, November 26-29, 2016},
  pages        = {91--98},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3017971.3017981},
  doi          = {10.1145/3017971.3017981},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/Jin0S16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/LiuD16,
  author       = {Qiming Liu and
                  Changsong Deng},
  title        = {An Computer Virus Spreading Model with Delayed Quarantine in Internet},
  booktitle    = {Proceedings of the 6th International Conference on Communication and
                  Network Security, {ICCNS} '16, Singapore, November 26-29, 2016},
  pages        = {1--5},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3017971.3017972},
  doi          = {10.1145/3017971.3017972},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/LiuD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/LonkarS16,
  author       = {Bhupesh B. Lonkar and
                  Manoj R. Sayankar},
  title        = {Design and Implementation of Automatic Vehicle Tracker System for
                  Accidental Emergency},
  booktitle    = {Proceedings of the 6th International Conference on Communication and
                  Network Security, {ICCNS} '16, Singapore, November 26-29, 2016},
  pages        = {46--50},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3017971.3017988},
  doi          = {10.1145/3017971.3017988},
  timestamp    = {Fri, 08 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/LonkarS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/MaHLL16,
  author       = {Xiangjun Ma and
                  Lei Huang and
                  Ye Lu and
                  Chuanqi Li},
  title        = {Channel Estimation Algorithm based on Distance Judgement and Remainder
                  Compensation in {OFDM} System},
  booktitle    = {Proceedings of the 6th International Conference on Communication and
                  Network Security, {ICCNS} '16, Singapore, November 26-29, 2016},
  pages        = {40--45},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3017971.3017987},
  doi          = {10.1145/3017971.3017987},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/MaHLL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/MadhusudhanS16,
  author       = {R. Madhusudhan and
                  Shashidhara},
  title        = {An Efficient and Secure Authentication Scheme With User Anonymity
                  for Roaming Service in Global Mobile Networks},
  booktitle    = {Proceedings of the 6th International Conference on Communication and
                  Network Security, {ICCNS} '16, Singapore, November 26-29, 2016},
  pages        = {119--126},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3017971.3024085},
  doi          = {10.1145/3017971.3024085},
  timestamp    = {Sat, 02 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/MadhusudhanS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/MohanYFO16,
  author       = {Ratish Mohan and
                  Anis Yazidi and
                  Boning Feng and
                  B. John Oommen},
  title        = {Dynamic Ordering of Firewall Rules Using a Novel Swapping Window-based
                  Paradigm},
  booktitle    = {Proceedings of the 6th International Conference on Communication and
                  Network Security, {ICCNS} '16, Singapore, November 26-29, 2016},
  pages        = {11--20},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3017971.3017975},
  doi          = {10.1145/3017971.3017975},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/MohanYFO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/RajeshS16,
  author       = {Harsha Mittemari Rajesh and
                  Insu Song},
  title        = {E-Commerce Websites/blogs - Hassles and Predicaments},
  booktitle    = {Proceedings of the 6th International Conference on Communication and
                  Network Security, {ICCNS} '16, Singapore, November 26-29, 2016},
  pages        = {56--61},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3017971.3017990},
  doi          = {10.1145/3017971.3017990},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/RajeshS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ShangCWA016,
  author       = {Wenli Shang and
                  Junrong Cui and
                  Ming Wan and
                  Panfeng An and
                  Peng Zeng},
  title        = {Modbus Communication Behavior Modeling and {SVM} Intrusion Detection
                  Method},
  booktitle    = {Proceedings of the 6th International Conference on Communication and
                  Network Security, {ICCNS} '16, Singapore, November 26-29, 2016},
  pages        = {80--85},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3017971.3017978},
  doi          = {10.1145/3017971.3017978},
  timestamp    = {Sat, 02 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/ShangCWA016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/SinghBS16,
  author       = {Amardeep Singh and
                  Divya Bansal and
                  Sanjeev Sofat},
  title        = {A Novel Approach to Evade Attacks in Online Social Networks},
  booktitle    = {Proceedings of the 6th International Conference on Communication and
                  Network Security, {ICCNS} '16, Singapore, November 26-29, 2016},
  pages        = {70--74},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3017971.3017976},
  doi          = {10.1145/3017971.3017976},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/SinghBS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/VanHT16,
  author       = {Nguyen Thanh Van and
                  Bao Ho and
                  Tran Ngoc Thinh},
  title        = {An Anomaly-based Intrusion Detection Architecture Integrated on OpenFlow
                  Switch},
  booktitle    = {Proceedings of the 6th International Conference on Communication and
                  Network Security, {ICCNS} '16, Singapore, November 26-29, 2016},
  pages        = {99--103},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3017971.3017982},
  doi          = {10.1145/3017971.3017982},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/VanHT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/VanithaU16,
  author       = {C. N. Vanitha and
                  M. Usha},
  title        = {Eliminating Route Modifiers by Pattern Synthesis Process in Wireless
                  Sensor Networks},
  booktitle    = {Proceedings of the 6th International Conference on Communication and
                  Network Security, {ICCNS} '16, Singapore, November 26-29, 2016},
  pages        = {51--55},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3017971.3017989},
  doi          = {10.1145/3017971.3017989},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/VanithaU16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/WangZYQ16,
  author       = {Zhilong Wang and
                  Tao Zhang and
                  Yu Yang and
                  Haipeng Qu},
  title        = {Comparison of Security Frameworks for Governmental Clouds between
                  United States and European Union},
  booktitle    = {Proceedings of the 6th International Conference on Communication and
                  Network Security, {ICCNS} '16, Singapore, November 26-29, 2016},
  pages        = {30--34},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3017971.3017985},
  doi          = {10.1145/3017971.3017985},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/WangZYQ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/WibowoB16,
  author       = {Andreyadi Wibowo and
                  Ari Moesriami Barmawi},
  title        = {Improving {NORMALS} Using Modified Baudot-Murray Code},
  booktitle    = {Proceedings of the 6th International Conference on Communication and
                  Network Security, {ICCNS} '16, Singapore, November 26-29, 2016},
  pages        = {113--118},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3017971.3017984},
  doi          = {10.1145/3017971.3017984},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/WibowoB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/XuS016,
  author       = {Jia{-}Chang Xu and
                  Kilho Shin and
                  Yu{-}Lu Liu},
  title        = {Detecting Fake Sites based on {HTML} Structure Analysis},
  booktitle    = {Proceedings of the 6th International Conference on Communication and
                  Network Security, {ICCNS} '16, Singapore, November 26-29, 2016},
  pages        = {86--90},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3017971.3017980},
  doi          = {10.1145/3017971.3017980},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/XuS016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iccns/2016,
  title        = {Proceedings of the 6th International Conference on Communication and
                  Network Security, {ICCNS} '16, Singapore, November 26-29, 2016},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3017971},
  doi          = {10.1145/3017971},
  isbn         = {978-1-4503-4783-9},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics