


default search action
17th SecureComm 2023: Hong Kong, SAR, China
- Haixin Duan
, Mourad Debbabi
, Xavier de Carné de Carnavalet
, Xiapu Luo, Xiaojiang Du
, Man Ho Allen Au:
Security and Privacy in Communication Networks - 19th EAI International Conference, SecureComm 2023, Hong Kong, China, October 19-21, 2023, Proceedings, Part II. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 568, Springer 2025, ISBN 978-3-031-64953-0
Intrusion and Anomaly Detection
- Mingwei Zhang, Jun Li, Jiabin Wu, Peter L. Reiher:
A Game Theoretical Analysis of Distributed Denial-of-Service Defense Incentive. 3-24 - Lumin Shi, Jun Li, Devkishen Sisodia, Mingwei Zhang, Alberto Dainotti, Peter L. Reiher:
DDoS Mitigation Dilemma Exposed: A Two-Wave Attack with Collateral Damage of Millions. 25-44 - Radhwan A. A. Saleh, Louai Al-Awami, Mustafa Ghaleb, Anas Ahmad Abudaqa:
Lightweight Intrusion Detection for IoT Systems Using Artificial Neural Networks. 45-59 - Zuwei Fan, Shunliang Zhang:
MVTBA: A Novel Hybrid Deep Learning Model for Encrypted Malicious Traffic Identification. 60-79 - Yatish Dubasi, Qinghua Li, Khoa Luu:
POP-HIT: Partially Order-Preserving Hash-Induced Transformation for Privacy Protection in Face Recognition Access Control. 80-98
IoT Security
- Han Hu, Daibin Wang, Tailiang Hong, Sheng Zhang:
Enhancing Cross-Device Security with Fine-Grained Permission Control. 101-121 - Shuo Yang, Hongru Li, Jian Guo:
The Security Analysis of ROS2 Communication. 122-139 - Ebuka Oguchi, Nirnimesh Ghose:
VET: Autonomous Vehicular Credential Verification Using Trajectory and Motion Vectors. 140-164
Network Security
- Songtao Liu, Hua Wu, Hao Luo, Guang Cheng, Xiaoyan Hu:
A Stable Fine-Grained Webpage Fingerprinting: Aiming at the Unstable Realistic Network. 167-188 - Ziqi Yang, Ruite Xu, Qixiao Lin, Shikun Wu, Jian Mao, Zhenkai Liang:
Securing Web Inputs Using Parallel Session Attachments. 189-208 - Guoqiang Zhang, Jiahao Cao, Mingwei Xu, Xinhao Deng:
Unsupervised and Adaptive Tor Website Fingerprinting. 209-229 - Kodai Mizutani, Daisuke Kotani, Yasuo Okabe:
Visibility of Scan Traffic Trends in Sparsely Populated Darknets. 230-248
Privacy
- Yumeki Goto, Nami Ashizawa
, Toshiki Shibahara
, Naoto Yanai
:
Do Backdoors Assist Membership Inference Attacks? 251-265 - Xinglei Li, Haifeng Qian:
Efficient and Scalable Multi-party Privacy-Preserving k-NN Classification. 266-286 - Ou Ruan, Chaohao Ai, Changwang Yan:
Efficient Unbalanced Private Set Intersection Protocol over Large-Scale Datasets Based on Bloom Filter. 287-301 - Tingxuan Han, Wei Tong, Jiacheng Niu, Sheng Zhong:
Practical Privacy-Preserving Community Detection in Decentralized Weighted Networks. 302-320 - Khoa Nguyen
, Tanveer Khan, Antonis Michalas
:
Split Without a Leak: Reducing Privacy Leakage in Split Learning. 321-344 - Christophe Hauser, Shirin Nilizadeh, Yan Shoshitaishvili, Ni Trieu, Srivatsan Ravi, Christopher Kruegel, Giovanni Vigna:
Street Rep: A Privacy-Preserving Reputation Aggregation System. 345-368
Program Analysis
- Li Wang, Yi Yang, Goutham Reddy Alavalapati:
Analyzing Implementation-Based SSL/TLS Vulnerabilities with Binary Semantics Analysis. 371-394 - Zhanpeng Liu, Xinhui Han:
Identifying Library Functions in Stripped Binary: Combining Function Similarity and Call Graph Features. 395-408 - Enzhou Song, Tao Hu, Peng Yi, Wenbo Wang:
PDFIET: PDF Malicious Indicators Extraction Technique Through Optimized Symbolic Execution. 409-425 - Can Tu, Liu Wang, Yang Xu, Yiping Zhao, Haitao Xu, Haoyu Wang:
Ransomware as a Service: Demystifying Android Ransomware Generators. 426-447
Software Security
- Yuxuan Wang, Yishen Li, Jihu Zheng, Jianwei Zhuge:
CV2XFuzzer: C-V2X Parsing Vulnerability Discovery System Based on Fuzzing. 451-466 - Sri Haritha Ambati, Natalia Stakhanova, Enrico Branca:
Learning AI Coding Style for Software Plagiarism Detection. 467-489 - Jerre Starink, Marieke Huisman, Andreas Peter, Andrea Continella:
Understanding and Measuring Inter-process Code Injection in Windows Malware. 490-514

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.