default search action
23rd ICICS 2021: Chongqing, China - Part II
- Debin Gao, Qi Li, Xiaohong Guan, Xiaofeng Liao:
Information and Communications Security - 23rd International Conference, ICICS 2021, Chongqing, China, November 19-21, 2021, Proceedings, Part II. Lecture Notes in Computer Science 12919, Springer 2021, ISBN 978-3-030-88051-4
Machine Learning Security
- Wenxin Li, Qi Wang, Run Wang, Lei Zhao, Lina Wang:
Exposing DeepFakes via Localizing the Manipulated Artifacts. 3-20 - Gao Wang, Gaoli Wang:
Improved Differential-ML Distinguisher: Machine Learning Based Generic Extension for Differential Analysis. 21-38 - Yuxuan Zhang, Zhaoyang Wang, Boyang Zhang, Yu Wen, Dan Meng:
Black-Box Buster: A Robust Zero-Shot Transfer-Based Adversarial Attack Method. 39-54 - Yang Xiao, Jie Li, Wengui Su:
A Lightweight Metric Defence Strategy for Graph Neural Networks Against Poisoning Attacks. 55-72 - Sicong Han, Chenhao Lin, Chao Shen, Qian Wang:
Rethinking Adversarial Examples Exploiting Frequency-Based Analysis. 73-89
Multimedia Security
- Zan Chen, Chaocheng Ma, Yuanjing Feng, Xingsong Hou:
Compressive Sensing Image Steganography via Directional Lifting Wavelet Transform. 93-109 - Dali Zhu, Long Yang, Hualin Zeng:
Remote Recovery of Sound from Speckle Pattern Video Based on Convolutional LSTM. 110-124 - Di Xiao, Shuwen Lan:
Secure Image Coding Based on Compressive Sensing with Optimized Rate-Distortion. 125-141 - Wei Zong, Yang-Wai Chow, Willy Susilo:
Black-Box Audio Adversarial Example Generation Using Variational Autoencoder. 142-160
Security Analysis
- Shiwei Chen, Ting Cui, Chenhui Jin:
Security Analysis of Even-Mansour Structure Hash Functions. 163-173 - Mohammed Shujaa Aldeen, Chuan Zhao:
Rare Variants Analysis in Genetic Association Studies with Privacy Protection via Hybrid System. 174-191 - Yaqi Xu, Baofeng Wu, Dongdai Lin:
Rotational-Linear Attack: A New Framework of Cryptanalysis on ARX Ciphers with Applications to Chaskey. 192-209 - Nour Elhouda Souid, Kais Klai:
A Novel Approach for Supervisor Synthesis to Enforce Opacity of Discrete Event Systems. 210-227
Post-quantum Cryptography
- Zhiyuan An, Zhuoran Zhang, Yamin Wen, Fangguo Zhang:
Lattice-Based Secret Handshakes with Reusable Credentials. 231-248 - Yiming Zhu, Zhen Liu, Yanbin Pan:
When NTT Meets Karatsuba: Preprocess-then-NTT Technique Revisited. 249-264 - Shuaigang Li, Xianhui Lu, Jiang Zhang, Bao Li, Lei Bi:
Predicting the Concrete Security of LWE Against the Dual Attack Using Binary Search. 265-282 - Xiaohan Zhang, Chi Cheng, Ruoyu Ding:
Small Leaks Sink a Great Ship: An Evaluation of Key Reuse Resilience of PQC Third Round Finalist NTRU-HRSS. 283-300 - Zhenghao Wu, Jian Weng, Anjia Yang, Lisha Yao, Xiaojian Liang, Zike Jiang, Jinghang Wen:
Efficient and Fully Secure Lattice-Based IBE with Equality Test. 301-318
Applied Cryptography
- Baodong Qin, Xue Bai, Dong Zheng, Hui Cui, Yiyuan Luo:
Forward-Secure Revocable Identity-Based Encryption. 321-340 - Zongyang Zhang, Zibo Zhou, Weihan Li, Hongyu Tao:
An Optimized Inner Product Argument with More Application Scenarios. 341-357 - Kai Zhang, Zhe Jiang, Junqing Gong, Haifeng Qian:
Updatable All-But-One Dual Projective Hashing and Its Applications. 358-374 - Guofeng Tang:
On Tightly-Secure (Linkable) Ring Signatures. 375-393 - Yunfeng Ji, Yang Tao, Rui Zhang:
More Efficient Construction of Anonymous Signatures. 394-411
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.