


default search action
15th NSS 2021: Tianjin, China
- Min Yang
, Chao Chen
, Yang Liu
:
Network and System Security - 15th International Conference, NSS 2021, Tianjin, China, October 23, 2021, Proceedings. Lecture Notes in Computer Science 13041, Springer 2021, ISBN 978-3-030-92707-3
Full Papers
- Changzhi Li
, Lihai Nie, Laiping Zhao:
RLTree: Website Fingerprinting Through Resource Loading Tree. 3-16 - Wenya Wang, Yakang Li, Chao Wang, Yuan Yan, Juanru Li, Dawu Gu:
Re-Check Your Certificates! Experiences and Lessons Learnt from Real-World HTTPS Certificate Deployments. 17-37 - João Soares
, Ricardo Fernandez, Miguel Silva, Tadeu Freitas
, Rolando Martins
:
ZERMIA - A Fault Injector Framework for Testing Byzantine Fault Tolerant Protocols. 38-60 - Liang Zhang
, Haibin Kan
, Yang Xu
, Jinhao Ran:
Revocable Data Sharing Methodology Based on SGX and Blockchain. 61-78 - Yanhua Zhang, Ximeng Liu, Yupu Hu, Huiwen Jia:
On the Analysis of the Outsourced Revocable Identity-Based Encryption from Lattices. 79-99 - Nadav Voloch
, Ehud Gudes, Nurit Gal-Oz
:
Preventing Fake News Propagation in Social Networks Using a Context Trust-Based Security Model. 100-115 - Yongbo Zhi, Ning Xi, Yuanqing Liu, Honglei Hui:
A Lightweight Android Malware Detection Framework Based on Knowledge Distillation. 116-130 - Nguyen Chi Vy, Nguyen Huu Quyen
, Phan The Duy
, Van-Hau Pham
:
Federated Learning-Based Intrusion Detection in the Context of IIoT Networks: Poisoning Attack and Defense. 131-147 - Haisheng Yu
, Wenyong Wang
, Yan Liu, Lihong Cheng, Sai Zou
:
A Simplified and Effective Solution for Hybrid SDN Network Deployment. 148-161 - Hector B. Hougaard, Atsuko Miyaji
:
Group Key Exchange Compilers from Generic Key Exchanges. 162-184 - Marios Anagnostopoulos
, Egon Kidmose
, Amine Laghaout
, Rasmus L. Olsen
, Sajad Homayoun
, Christian Damsgaard Jensen
, Jens Myrup Pedersen
:
An Architecture for Processing a Dynamic Heterogeneous Information Network of Security Intelligence. 185-201 - Alisher Ikramov
, Gayrat Juraev
:
The Complexity of Testing Cryptographic Devices on Input Faults. 202-209 - Yuxin Ding, Zihan Zhou, Wen Qian:
A Malware Family Classification Method Based on the Point Cloud Model DGCNN. 210-221 - Jérémy Donadio, Guillaume Guérard
, Soufian Ben Amor:
Collection of the Main Anti-Virus Detection and Bypass Techniques. 222-237 - Alessandro Barenghi
, Diego Carrera, Silvia Mella
, Andrea Pace, Gerardo Pelosi
, Ruggero Susella:
Profiled Attacks Against the Elliptic Curve Scalar Point Multiplication Using Neural Networks. 238-257 - Na Chen
, Yuan Cao
, Chao Liu
:
Deep Cross-Modal Supervised Hashing Based on Joint Semantic Matrix. 258-274
Short Papers
- Yu Sang, Yilin Bei, Zhiyang Yang, Chen Zhao:
Accurate Polar Harmonic Transform-Based Watermarking Using Blind Statistical Detector. 277-288 - Mustapha Hedabou:
Cloud Key Management Based on Verifiable Secret Sharing. 289-303 - Yegang Du
:
A Scheme for Sensor Data Reconstruction in Smart Home. 304-313 - Xudong Zhu
, Hui Li
:
Privacy-Preserving and Auditable Federated Deep Reinforcement Learning for Robotic Manipulation. 314-325 - Ruiyuan Li
, Zehui Song, Wei Xie, Chengwei Zhang
, Guohui Zhong, Xiaobing Pei:
HALNet: A Hybrid Deep Learning Model for Encrypted C&C Malware Traffic Detection. 326-339 - Ayman Youssef, Mohamed Abdelrazek, Chandan K. Karmakar
, Zubair A. Baig:
Tracing Software Exploitation. 340-352 - Phan The Duy
, Huynh Nhat Hao, Huynh Minh Chu, Van-Hau Pham
:
A Secure and Privacy Preserving Federated Learning Approach for IoT Intrusion Detection System. 353-368 - Yanhua Zhang, Ximeng Liu, Yupu Hu, Huiwen Jia:
Cryptanalysis of a Fully Anonymous Group Signature with Verifier-Local Revocation from ICICS 2018. 369-382

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.