Stop the war!
Остановите войну!
for scientists:
default search action
24th ICICS 2022: Canterbury, UK
- Cristina Alcaraz, Liqun Chen, Shujun Li, Pierangela Samarati:
Information and Communications Security - 24th International Conference, ICICS 2022, Canterbury, UK, September 5-8, 2022, Proceedings. Lecture Notes in Computer Science 13407, Springer 2022, ISBN 978-3-031-15776-9
Cryptography
- Jinzheng Cao, Qingfeng Cheng, Xinghua Li, Yanbin Pan:
BS: Blockwise Sieve Algorithm for Finding Short Vectors from Sublattices. 3-18 - Teik Guan Tan, De Wen Soh, Jianying Zhou:
Calibrating Learning Parity with Noise Authentication for Low-Resource Devices. 19-36 - Jing Gao, Jun Xu, Tianyu Wang, Lei Hu:
New Results of Breaking the CLS Scheme from ACM-CCS 2014. 37-54 - Tingting Guo, Peng Wang:
A Note on the Security Framework of Two-key DbHtS MACs. 55-68 - Zhi Qiu, Kang Yang, Yu Yu, Lijing Zhou:
Maliciously Secure Multi-party PSI with Lower Bandwidth and Faster Computation. 69-88 - Siwei Chen, Zejun Xiang, Xiangyong Zeng, Shasha Zhang:
Conditional Cube Attacks on Full Members of KNOT-AEAD Family. 89-108 - Shuo Sun, Yongbin Zhou, Rui Zhang, Yang Tao, Zehua Qiao, Jingdian Ming:
Fast Fourier Orthogonalization over NTRU Lattices. 109-127 - Kaini Chen, Peisong Shen, Kewei Lv, Chi Chen:
Secure Sketch and Fuzzy Extractor with Imperfect Randomness: An Information-Theoretic Study. 128-147 - Boyue Fang, Weize Wang, Yunlei Zhao:
Tight Analysis of Decryption Failure Probability of Kyber in Reality. 148-160
Authentication
- Yuxuan Wu, Ding Wang, Yunkai Zou, Ziyi Huang:
Improving Deep Learning Based Password Guessing Models Using Pre-processing. 163-183 - Matthew M. Tolbert, Elie M. Hess, Mattheus C. Nascimento, Yunsen Lei, Craig A. Shue:
Exploring Phone-Based Authentication Vulnerabilities in Single Sign-On Systems. 184-200 - Savio Sciancalepore, Simone Raponi, Daniele Caldarola, Roberto Di Pietro:
FRACTAL: Single-Channel Multi-factor Transaction Authentication Through a Compromised Terminal. 201-217
Privacy and Anonymity
- Zhen Liu, Yining Liu, Weizhi Meng:
Lightweight and Practical Privacy-Preserving Image Masking in Smart Community. 221-239 - Yang Han, Dawei Xu, Jiaqi Gao, Liehuang Zhu:
Using Blockchains for Censorship-Resistant Bootstrapping in Anonymity Networks. 240-260 - Meng Li, Mingwei Zhang, Jianbo Gao, Chhagan Lal, Mauro Conti, Mamoun Alazab:
Repetitive, Oblivious, and Unlinkable SkNN Over Encrypted-and-Updated Data on Cloud. 261-280 - Arwa Alromih, John A. Clark, Prosanta Gope:
Privacy-Aware Split Learning Based Energy Theft Detection for Smart Grids. 281-300
Attacks and Vulnerability Analysis
- Makoto Yuito, Kenta Suzuki, Kazuki Yoneyama:
Query-Efficient Black-Box Adversarial Attack with Random Pattern Noises. 303-323 - Qi Lei, Zijia Yang, Qin Wang, Yaoling Ding, Zhe Ma, An Wang:
Autoencoder Assist: An Efficient Profiling Attack on High-Dimensional Datasets. 324-341 - Liantao Song, Yan Ding, Pan Dong, Yong Guo, Chuang Wang:
TZ-IMA: Supporting Integrity Measurement for Applications with ARM TrustZone. 342-358 - Xiaoting Li, Xiao Liu, Lingwei Chen, Rupesh Prajapati, Dinghao Wu:
FuzzBoost: Reinforcement Compiler Fuzzing. 359-375 - Tzu-Hsien Chang, Yen-Ting Kuo, Jiun-Peng Chen, Bo-Yin Yang:
Secure Boolean Masking of Gimli - Optimization and Evaluation on the Cortex-M4. 376-393 - Zhi Wang, Chaoge Liu, Xiang Cui, Jie Yin, Jiaxi Liu, Di Wu, Qixu Liu:
DeepC2: AI-Powered Covert Command and Control on OSNs. 394-414
Artificial Intelligence for Detection
- Hongyi Peng, Vinay Sachidananda, Teng Joon Lim, Rajendra Patil, Mingchang Liu, Sivaanandh Muneeswaran, Mohan Gurusamy:
ODDITY: An Ensemble Framework Leverages Contrastive Representation Learning for Superior Anomaly Detection. 417-437 - Tongjian An, Xuefei Shui, Hongkui Gao:
Deep Learning Based Webshell Detection Coping with Long Text and Lexical Ambiguity. 438-457 - Fengliang Xia, Guixing Wu, Guochao Zhao, Xiangyu Li:
SimCGE: Simple Contrastive Learning of Graph Embeddings for Cross-Version Binary Code Similarity Detection. 458-471 - Mouna Rabhi, Spiridon Bakiras, Roberto Di Pietro:
FN2: Fake News DetectioN Based on Textual and Contextual Features. 472-491 - Mohan Gao, Peng Wu, Li Pan:
Malware Detection with Limited Supervised Information via Contrastive Learning on API Call Sequences. 492-507 - Bo Dong, Yuhang Wu, Micheal Yeh, Yusan Lin, Yuzhong Chen, Hao Yang, Fei Wang, Wanxin Bai, Krupa Brahmkstri, Yimin Zhang, Chinna Kummitha, Verma Abhisar:
Semi-supervised Context Discovery for Peer-Based Anomaly Detection in Multi-layer Networks. 508-524 - Mingchang Liu, Vinay Sachidananda, Hongyi Peng, Rajendra Patil, Sivaanandh Muneeswaran, Mohan Gurusamy:
Peekaboo: Hide and Seek with Malware Through Lightweight Multi-feature Based Lenient Hybrid Approach. 525-545 - Mohammad Mamun, Scott Buffett:
TapTree: Process-Tree Based Host Behavior Modeling and Threat Detection Framework via Sequential Pattern Mining. 546-565
Network Security and Forensics
- Steven Noel, Vipin Swarup:
Dependency-Based Link Prediction for Learning Microsegmentation Policy. 569-588 - Pegah Nikbakht Bideh, Nicolae Paladi:
Chuchotage: In-line Software Network Protocol Translation for (D)TLS. 589-607 - Georgiana Bogdanel, Nadia Belghazi-Mohamed, Hilario Gómez-Moreno, Sergio Lafuente-Arroyo:
Study on the Effect of Face Masks on Forensic Speaker Recognition. 608-621 - Kejun Zhang, Yuhao Wang, Xinying Yu:
Video Forensics for Object Removal Based on Darknet3D. 622-637
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.