Search dblp for Publications

export results for "stream:conf/trustcom:"

more than 1000 matches, exporting first 1000 hits only!

 download as .bib file

@inproceedings{DBLP:conf/trustcom/0001HSWA23,
  author       = {Zhou Zhou and
                  Yonggui Han and
                  Mohammad Shojafar and
                  Zhongsheng Wang and
                  Jemal H. Abawajy},
  title        = {A reliable edge server placement strategy based on {DDPG} in the Internet
                  of Vehicles},
  booktitle    = {TrustCom},
  pages        = {2587--2594},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00361},
  doi          = {10.1109/TRUSTCOM60117.2023.00361},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/0001HSWA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/0001T23,
  author       = {Ayush Kumar and
                  Vrizlynn L. L. Thing},
  title        = {A Public Key Infrastructure for 5G Service-Based Architecture},
  booktitle    = {TrustCom},
  pages        = {1532--1539},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00209},
  doi          = {10.1109/TRUSTCOM60117.2023.00209},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/0001T23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/0002GZLG23,
  author       = {Chao Guo and
                  Buxin Guo and
                  Tingting Zhu and
                  Peihe Liu and
                  Cheng Gong},
  title        = {FLEvaluate: Robust Federated Learning Based on Trust Evaluate},
  booktitle    = {TrustCom},
  pages        = {2269--2274},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00320},
  doi          = {10.1109/TRUSTCOM60117.2023.00320},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/0002GZLG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/0002WZ023,
  author       = {Mingjian Tang and
                  Weiqi Wang and
                  Chenhan Zhang and
                  Shui Yu},
  title        = {{RUE:} Realising Unlearning from the Perspective of Economics},
  booktitle    = {TrustCom},
  pages        = {1165--1172},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00159},
  doi          = {10.1109/TRUSTCOM60117.2023.00159},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/0002WZ023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/0002Z23,
  author       = {Chundong Wang and
                  Yongxin Zhao},
  title        = {A Novel Approach for Trajectory Partition Privacy in Location-Based
                  Services},
  booktitle    = {TrustCom},
  pages        = {1464--1469},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00200},
  doi          = {10.1109/TRUSTCOM60117.2023.00200},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/0002Z23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/0005L0CL23,
  author       = {Ximing Li and
                  Linghui Li and
                  Xiaoyong Li and
                  Binsi Cai and
                  Bingyu Li},
  title        = {{TGCN-DA:} {A} Temporal Graph Convolutional Network with Data Augmentation
                  for High Accuracy Insider Threat Detection},
  booktitle    = {TrustCom},
  pages        = {1249--1257},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00170},
  doi          = {10.1109/TRUSTCOM60117.2023.00170},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/0005L0CL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AabyGB023,
  author       = {Peter Aaby and
                  Mario Valerio Giuffrida and
                  William J. Buchanan and
                  Zhiyuan Tan},
  title        = {TouchEnc: a Novel Behavioural Encoding Technique to Enable Computer
                  Vision for Continuous Smartphone User Authentication},
  booktitle    = {TrustCom},
  pages        = {788--795},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00115},
  doi          = {10.1109/TRUSTCOM60117.2023.00115},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/AabyGB023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AdhikariAJ23,
  author       = {Shashwat Adhikari and
                  Hafizul Asad and
                  Kevin D. Jones},
  title        = {Enhancing IoT Security: Novel Mechanisms for Malware Detection using
                  HPCs and Neural Networks},
  booktitle    = {TrustCom},
  pages        = {1455--1463},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00199},
  doi          = {10.1109/TRUSTCOM60117.2023.00199},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/AdhikariAJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AfzalAK0KHS23,
  author       = {Mozina Afzal and
                  Kamran Ali and
                  Mumraiz Khan Kasi and
                  Masood Ur Rehman and
                  Mohammad Ali Khoshkholghi and
                  Bushra Haq and
                  Syed Ahmed Shah},
  title        = {Analyzing Land Cover and Land Use Changes Using Remote Sensing Techniques:
                  {A} Temporal Analysis of Climate Change Detection with Google Earth
                  Engine},
  booktitle    = {TrustCom},
  pages        = {2018--2023},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00277},
  doi          = {10.1109/TRUSTCOM60117.2023.00277},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/AfzalAK0KHS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AhmadonYJ23,
  author       = {Mohd Anuaruddin Bin Ahmadon and
                  Shingo Yamaguchi and
                  Alireza Jolfaei},
  title        = {Game Theory-Based Trade-Off Analysis for Privacy and Openness in Decision
                  Making by Controlling Quantity of Information},
  booktitle    = {TrustCom},
  pages        = {1853--1858},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00251},
  doi          = {10.1109/TRUSTCOM60117.2023.00251},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/AhmadonYJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AiLMQL23,
  author       = {Bohuan Ai and
                  Yufei Li and
                  Wenda Ma and
                  Mengyuan Qiu and
                  Miao Liu},
  title        = {Assessing the Value of Data Assets: An Exploratory Study of Valuation
                  Methods},
  booktitle    = {TrustCom},
  pages        = {2147--2151},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00299},
  doi          = {10.1109/TRUSTCOM60117.2023.00299},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/AiLMQL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AknesilDLE23,
  author       = {Can Aknesil and
                  Elena Dubrova and
                  Niklas Lindskog and
                  H{\aa}kan Englund},
  title        = {A Near-Field {EM} Sensor Implemented in {FPGA} Configurable Fabric},
  booktitle    = {TrustCom},
  pages        = {1908--1913},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00259},
  doi          = {10.1109/TRUSTCOM60117.2023.00259},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/AknesilDLE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Al-HawawrehD23,
  author       = {Muna Al{-}Hawawreh and
                  Robin Doss},
  title        = {Enhancing Security in Industrial IoT: {A} Taxonomy-driven Approach
                  to Risk Assessment},
  booktitle    = {TrustCom},
  pages        = {434--443},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00074},
  doi          = {10.1109/TRUSTCOM60117.2023.00074},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Al-HawawrehD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AlhajriJ23,
  author       = {Abdullah Alhajri and
                  Arshad Jhumka},
  title        = {Addressing a Malicious Tampering Attack on the Default Isolation Level
                  in {DBMS}},
  booktitle    = {TrustCom},
  pages        = {2660--2667},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00371},
  doi          = {10.1109/TRUSTCOM60117.2023.00371},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/AlhajriJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AlharbiCJ23,
  author       = {Jawaher Alharbi and
                  Adam P. Chester and
                  Arshad Jhumka},
  title        = {Towards Understanding Checkpointing in Transiently Powered IoT Networks},
  booktitle    = {TrustCom},
  pages        = {559--568},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00088},
  doi          = {10.1109/TRUSTCOM60117.2023.00088},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/AlharbiCJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AlishahiLZ23,
  author       = {Mina Alishahi and
                  Wouter Leeuw and
                  Nicola Zannone},
  title        = {{BC-FL} k-means: {A} Blockchain-based Framework for Federated Clustering},
  booktitle    = {TrustCom},
  pages        = {1348--1354},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00184},
  doi          = {10.1109/TRUSTCOM60117.2023.00184},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/AlishahiLZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Alqulaity023,
  author       = {Malak Alqulaity and
                  Po Yang},
  title        = {Tabular Generative Adversarial Networks with an Enhanced Sampling
                  Approach for High-Quality Cardiovascular Disease Dataset Generation},
  booktitle    = {TrustCom},
  pages        = {2595--2600},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00362},
  doi          = {10.1109/TRUSTCOM60117.2023.00362},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Alqulaity023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AlqulaityY23,
  author       = {Malak Alqulaity and
                  Po Yang},
  title        = {Advanced Machine-Learning Technologies for Coronary Artery Disease
                  Prediction Using Heterogeneous Data},
  booktitle    = {TrustCom},
  pages        = {54--61},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00030},
  doi          = {10.1109/TRUSTCOM60117.2023.00030},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/AlqulaityY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AndradeRFM23,
  author       = {Vinicius Camargo Andrade and
                  Sheila S. Reinehr and
                  Cinthia O. A. Freitas and
                  Andreia Malucelli},
  title        = {Personal Data Privacy in Software Development Processes: {A} Practitioner's
                  Point of View},
  booktitle    = {TrustCom},
  pages        = {2727--2734},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00381},
  doi          = {10.1109/TRUSTCOM60117.2023.00381},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/AndradeRFM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ArakiSTKEB23,
  author       = {Ryosuke Araki and
                  Kshira Sagar Sahoo and
                  Yuzo Taenaka and
                  Youki Kadobayashi and
                  Erik Elmroth and
                  Monowar H. Bhuyan},
  title        = {Detecting DDoS Attacks on the Network Edge: An Information-Theoretic
                  Correlation Analysis},
  booktitle    = {TrustCom},
  pages        = {485--494},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00080},
  doi          = {10.1109/TRUSTCOM60117.2023.00080},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ArakiSTKEB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AsnaSP23,
  author       = {Madathodika Asna and
                  Hussain Shareef and
                  Achikkulath Prasanthi},
  title        = {Quantum Inspired Binary Atom Search Optimization Algorithm for Charging
                  Station Placement Problem},
  booktitle    = {TrustCom},
  pages        = {2315--2322},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00327},
  doi          = {10.1109/TRUSTCOM60117.2023.00327},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/AsnaSP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AtiiqYGSB23,
  author       = {Syafiq Al Atiiq and
                  Yachao Yuan and
                  Christian Gehrmann and
                  Jakob Sternby and
                  Luis Barriga},
  title        = {Attacks Against Mobility Prediction in 5G Networks},
  booktitle    = {TrustCom},
  pages        = {1502--1511},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00205},
  doi          = {10.1109/TRUSTCOM60117.2023.00205},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/AtiiqYGSB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AttiehT23,
  author       = {Joseph Attieh and
                  Joe Tekli},
  title        = {Fast Text Classification using Lean Gradient Descent Feed Forward
                  Neural Network for Category Feature Augmentation},
  booktitle    = {TrustCom},
  pages        = {2341--2348},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00330},
  doi          = {10.1109/TRUSTCOM60117.2023.00330},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/AttiehT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Au-YeungWLC23,
  author       = {Jin Au{-}Yeung and
                  Shanshan Wang and
                  Yuchen Liu and
                  Zhenxiang Chen},
  title        = {Safety or Not? {A} Comparative Study for Deep Learning Apps on Smartphones},
  booktitle    = {TrustCom},
  pages        = {109--116},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00036},
  doi          = {10.1109/TRUSTCOM60117.2023.00036},
  timestamp    = {Wed, 05 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Au-YeungWLC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AyubSFG23,
  author       = {Md. Ahsan Ayub and
                  Ambareen Siraj and
                  Bobby Filar and
                  Maanak Gupta},
  title        = {Static-RWArmor: {A} Static Analysis Approach for Prevention of Cryptographic
                  Windows Ransomware},
  booktitle    = {TrustCom},
  pages        = {1673--1680},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00228},
  doi          = {10.1109/TRUSTCOM60117.2023.00228},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/AyubSFG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AzharMIM23,
  author       = {M. A. Hannan Bin Azhar and
                  Zolt{\'{a}}n M{\'{e}}sz{\'{a}}ros and
                  Tasmina Islam and
                  Soumya K. Manna},
  title        = {An Interactive Web Portal for Customised Telerehabilitation in Neurological
                  Care},
  booktitle    = {TrustCom},
  pages        = {1814--1821},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00246},
  doi          = {10.1109/TRUSTCOM60117.2023.00246},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/AzharMIM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BajajE23,
  author       = {Piyush Bajaj and
                  Matthew Edwards},
  title        = {Automatic Scam-Baiting Using ChatGPT},
  booktitle    = {TrustCom},
  pages        = {1941--1946},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00264},
  doi          = {10.1109/TRUSTCOM60117.2023.00264},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/BajajE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BakSNK23,
  author       = {Karolina Bak and
                  Hannes Salin and
                  Karol Niczyj and
                  Lukasz Krzywiecki},
  title        = {Enhancing Tunnel Safety for Dangerous Goods Vehicles through Blockchain-Based
                  Time-Stamping},
  booktitle    = {TrustCom},
  pages        = {1312--1317},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00179},
  doi          = {10.1109/TRUSTCOM60117.2023.00179},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/BakSNK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BaksiNU23,
  author       = {Rudra Prasad Baksi and
                  Vishwas Nalka and
                  Shambhu J. Upadhyaya},
  title        = {Apt Detection of Ransomware - An Approach to Detect Advanced Persistent
                  Threats Using System Call Information},
  booktitle    = {TrustCom},
  pages        = {1621--1630},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00221},
  doi          = {10.1109/TRUSTCOM60117.2023.00221},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/BaksiNU23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Balasubramanian23,
  author       = {Prasasthy Balasubramanian and
                  Justin Seby and
                  Panos Kostakos},
  title        = {Semantic-Driven Focused Crawling Using {LASER} and {FAISS:} {A} Novel
                  Approach for Threat Detection and Improved Information Retrieval},
  booktitle    = {TrustCom},
  pages        = {1598--1605},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00218},
  doi          = {10.1109/TRUSTCOM60117.2023.00218},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Balasubramanian23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BamboatY23,
  author       = {Qaizar Bamboat and
                  Hong Qing Yu},
  title        = {Literature Study on Bias and Fairness in Machine Learning Systems},
  booktitle    = {TrustCom},
  pages        = {1960--1965},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00267},
  doi          = {10.1109/TRUSTCOM60117.2023.00267},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/BamboatY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BellajOMCB23,
  author       = {Badr Bellaj and
                  Aafaf Ouaddah and
                  Abdellatif Mezrioui and
                  No{\"{e}}l Crespi and
                  Emmanuel Bertin},
  title        = {GBTrust: Leveraging Edge Attention in Graph Neural Networks for Trust
                  Management in {P2P} Networks},
  booktitle    = {TrustCom},
  pages        = {1272--1278},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00173},
  doi          = {10.1109/TRUSTCOM60117.2023.00173},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/BellajOMCB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BhardwajNJE23,
  author       = {Raghav Bhardwaj and
                  Morteza Noferesti and
                  Madeline Janecek and
                  Naser Ezzati{-}Jivan},
  title        = {{EMD-SCS:} {A} Dynamic Behavioral Approach for Early Malware Detection
                  with Sonification of System Call Sequences},
  booktitle    = {TrustCom},
  pages        = {1728--1737},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00235},
  doi          = {10.1109/TRUSTCOM60117.2023.00235},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/BhardwajNJE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BinhulayyilL23,
  author       = {Sarah Binhulayyil and
                  Shancang Li},
  title        = {Ripple20 Vulnerabilities Detection using a Featureless Deep Learning
                  Model},
  booktitle    = {TrustCom},
  pages        = {1236--1240},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00168},
  doi          = {10.1109/TRUSTCOM60117.2023.00168},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/BinhulayyilL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BishopS23,
  author       = {Jonathan Bishop and
                  Ashu M. G. Solo},
  title        = {Increasing user seduction in e-commerce community interaction using
                  the participation continuum},
  booktitle    = {TrustCom},
  pages        = {2480--2487},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00348},
  doi          = {10.1109/TRUSTCOM60117.2023.00348},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/BishopS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BkakriaB23,
  author       = {Anis Bkakria and
                  Lydia Brika},
  title        = {A Framework for Privacy Policy Enforcement for Connected Automotive
                  Systems},
  booktitle    = {TrustCom},
  pages        = {1094--1102},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00151},
  doi          = {10.1109/TRUSTCOM60117.2023.00151},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/BkakriaB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BlackPRCBPERG0S23,
  author       = {Brendan Black and
                  Philip Perry and
                  Joseph Rafferty and
                  Claudia Cristina and
                  Tom Bowman and
                  Cathryn Peoples and
                  Andrew Ennis and
                  Andrew Reeves and
                  Nektarios Georgalas and
                  Adrian Moore and
                  Bryan W. Scotney},
  title        = {Matrix Platform: Empowering Smart Ports with Advanced Video Analytics
                  for Enhanced Security, Safety, and Efficiency},
  booktitle    = {TrustCom},
  pages        = {1822--1826},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00247},
  doi          = {10.1109/TRUSTCOM60117.2023.00247},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/BlackPRCBPERG0S23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BlackRSE23,
  author       = {Brendan Black and
                  Joseph Rafferty and
                  Jos{\'{e}} A. Santos and
                  Andrew Ennis},
  title        = {{UAV} Bluetooth Communication Link Assessment for Emergency Response
                  Applications},
  booktitle    = {TrustCom},
  pages        = {1871--1878},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00254},
  doi          = {10.1109/TRUSTCOM60117.2023.00254},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/BlackRSE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BorgesAS023,
  author       = {H{\'{e}}lio Borges and
                  Daniel Andrade and
                  Jo{\~{a}}o Nuno Silva and
                  Miguel Correia},
  title        = {TrustGlass: Human-Computer Trusted Paths with Augmented Reality Smart
                  Glasses},
  booktitle    = {TrustCom},
  pages        = {712--721},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00106},
  doi          = {10.1109/TRUSTCOM60117.2023.00106},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/BorgesAS023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BoseM23,
  author       = {Sunanda Bose and
                  Dusica Marijan},
  title        = {Secure Traversable Event logging for Responsible Identification of
                  Vertically Partitioned Health Data},
  booktitle    = {TrustCom},
  pages        = {1562--1571},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00213},
  doi          = {10.1109/TRUSTCOM60117.2023.00213},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/BoseM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BoukhedoumaMHBH23,
  author       = {Hocine Boukhedouma and
                  Abdelkrim Meziane and
                  Slimane Hammoudi and
                  Amel Benna and
                  Allel Hadjali},
  title        = {Towards a Context-based Mobility Prediction in Smart Cities: First
                  Experimentations},
  booktitle    = {TrustCom},
  pages        = {2579--2586},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00360},
  doi          = {10.1109/TRUSTCOM60117.2023.00360},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/BoukhedoumaMHBH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BowmanGREPB0023,
  author       = {Tom Bowman and
                  Nektarios Georgalas and
                  Andrew Reeves and
                  Andrew Ennis and
                  Cathryn Peoples and
                  Brendan Black and
                  Fadi El{-}Moussa and
                  Adrian Moore},
  title        = {Proactive Device Management for the Internet of Things},
  booktitle    = {TrustCom},
  pages        = {1887--1892},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00256},
  doi          = {10.1109/TRUSTCOM60117.2023.00256},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/BowmanGREPB0023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BradatschMTK23,
  author       = {Leonard Bradatsch and
                  Oleksandr Miroshkin and
                  Natasa Trkulja and
                  Frank Kargl},
  title        = {Zero Trust Score-based Network-level Access Control in Enterprise
                  Networks},
  booktitle    = {TrustCom},
  pages        = {1422--1429},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00194},
  doi          = {10.1109/TRUSTCOM60117.2023.00194},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/BradatschMTK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Brennaf0L23,
  author       = {Muhammad Senoyodha Brennaf and
                  Po Yang and
                  Vitaveska Lanfranchi},
  title        = {A Comparative Analysis of Federated Learning Techniques on On-Demand
                  Platforms in Supporting Modern Web Browser Applications},
  booktitle    = {TrustCom},
  pages        = {2601--2606},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00363},
  doi          = {10.1109/TRUSTCOM60117.2023.00363},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Brennaf0L23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Cai0W0W23,
  author       = {Yuqian Cai and
                  Cheng Wang and
                  Xiaoqian Wang and
                  Xiaoyan Zhao and
                  Weidong Wang},
  title        = {Coexistence Analysis Between the Large-scale {IMT} systems and {LEO}
                  Satellite communication systems},
  booktitle    = {TrustCom},
  pages        = {1993--1998},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00273},
  doi          = {10.1109/TRUSTCOM60117.2023.00273},
  timestamp    = {Thu, 06 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Cai0W0W23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Cen0WL23,
  author       = {Xuming Cen and
                  Nan Hu and
                  Haozhe Wang and
                  Shiyi Liu},
  title        = {Temporal-Aware Lightweight Visual Tracking Method for Dynamic Traffic
                  Scenes},
  booktitle    = {TrustCom},
  pages        = {612--619},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00094},
  doi          = {10.1109/TRUSTCOM60117.2023.00094},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Cen0WL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChaoXCGXLJC23,
  author       = {Kun Chao and
                  Zhen Xing and
                  Xinzhou Cheng and
                  Jian Guan and
                  Lexi Xu and
                  Xiqing Liu and
                  Yuwei Jia and
                  Lijuan Cao},
  title        = {Research on Operation Evolution of 5G Non-Public Network},
  booktitle    = {TrustCom},
  pages        = {2175--2180},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00304},
  doi          = {10.1109/TRUSTCOM60117.2023.00304},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChaoXCGXLJC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChatterjeeB023,
  author       = {Diptendu Chatterjee and
                  Prabal Banerjee and
                  Subhra Mazumdar},
  title        = {Chrisimos: {A} useful Proof-of-Work for finding Minimal Dominating
                  Set of a graph},
  booktitle    = {TrustCom},
  pages        = {1332--1339},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00182},
  doi          = {10.1109/TRUSTCOM60117.2023.00182},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChatterjeeB023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenC0W23,
  author       = {Kairen Chen and
                  Shuhong Chen and
                  Guojun Wang and
                  Chenchen Wang},
  title        = {CGPNet: Enhancing Medical Image Classification through Channel Grouping
                  and Partial Convolution Network},
  booktitle    = {TrustCom},
  pages        = {1827--1834},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00248},
  doi          = {10.1109/TRUSTCOM60117.2023.00248},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenC0W23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenCJ23,
  author       = {Man Chen and
                  Yuyue Chen and
                  Zoe L. Jiang},
  title        = {{SIMD} Bootstrapping in {FHEW} Scheme},
  booktitle    = {TrustCom},
  pages        = {1006--1013},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00141},
  doi          = {10.1109/TRUSTCOM60117.2023.00141},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenCJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenL23,
  author       = {Kundu Chen and
                  Jie Luo},
  title        = {Pooling Under the Sun: {A} Mining Pool Centralized Revisit and Solution},
  booktitle    = {TrustCom},
  pages        = {1294--1299},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00176},
  doi          = {10.1109/TRUSTCOM60117.2023.00176},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenLXW23,
  author       = {Shuyu Chen and
                  Dawei Lin and
                  Zhenping Xie and
                  Hongbo Wang},
  title        = {Temporal-Gated Graph Neural Network with Graph Sampling for Multi-step
                  Attack Detection},
  booktitle    = {TrustCom},
  pages        = {1266--1271},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00172},
  doi          = {10.1109/TRUSTCOM60117.2023.00172},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenLXW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenLYWY023,
  author       = {Gengxiang Chen and
                  Sheng Liu and
                  Xu Yang and
                  Tao Wang and
                  Linlin You and
                  Feng Xia},
  title        = {FedRSM: Representational-Similarity-Based Secured Model Uploading
                  for Federated Learning},
  booktitle    = {TrustCom},
  pages        = {189--196},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00046},
  doi          = {10.1109/TRUSTCOM60117.2023.00046},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenLYWY023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenWYLZW23,
  author       = {Jian Chen and
                  Jingyao Wu and
                  Hao Yin and
                  Qiang Li and
                  Wensheng Zhang and
                  Chen Wang},
  title        = {Class-Targeted Poisoning Attacks against DNNs},
  booktitle    = {TrustCom},
  pages        = {20--27},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00026},
  doi          = {10.1109/TRUSTCOM60117.2023.00026},
  timestamp    = {Fri, 21 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenWYLZW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenXWLZL23,
  author       = {Chen Chen and
                  Chunhe Xia and
                  Tianbo Wang and
                  Wanshuang Lin and
                  Yuan Zhao and
                  Yang Li},
  title        = {EFwork: An Efficient Framework for Constructing a Malware Knowledge
                  Graph},
  booktitle    = {TrustCom},
  pages        = {1258--1265},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00171},
  doi          = {10.1109/TRUSTCOM60117.2023.00171},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenXWLZL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenYW23,
  author       = {Peng{-}Yu Chen and
                  Jen{-}Chieh Yang and
                  Sheng{-}De Wang},
  title        = {Soft Hybrid Filter Pruning using a Dual Ranking Approach},
  booktitle    = {TrustCom},
  pages        = {2432--2439},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00342},
  doi          = {10.1109/TRUSTCOM60117.2023.00342},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenYW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChengCDXYLGZXW23,
  author       = {Chen Cheng and
                  Xinzhou Cheng and
                  Jinyou Dai and
                  Xu Xia and
                  Bin Yang and
                  Feibi Lyu and
                  Jie Gao and
                  Wei Zhang and
                  Tian Xiao and
                  Tianyi Wang},
  title        = {A Novel Algorithm and System of Customer Value Evaluation based on
                  Telecom Operator Big Data},
  booktitle    = {TrustCom},
  pages        = {2228--2233},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00313},
  doi          = {10.1109/TRUSTCOM60117.2023.00313},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChengCDXYLGZXW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChengQQWJW23,
  author       = {Jingxian Cheng and
                  Saiyu Qi and
                  Yong Qi and
                  Jianfeng Wang and
                  Qin Jiang and
                  Di Wu},
  title        = {EPPVChain: An Efficient Privacy-Preserving Verifiable Query Scheme
                  for Blockchain Databases},
  booktitle    = {TrustCom},
  pages        = {1306--1311},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00178},
  doi          = {10.1109/TRUSTCOM60117.2023.00178},
  timestamp    = {Wed, 05 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChengQQWJW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChengWZJPZLZLW23,
  author       = {Yang Cheng and
                  Kai Wei and
                  Yihui Zhang and
                  Chunyu Jiang and
                  Weiwei Pang and
                  Qi Zhang and
                  Bin Liu and
                  Lifeng Zhang and
                  Tingting Liu and
                  Yinqian Wu},
  title        = {TrustedBench: An Efficient and User-friendly Distributed Performance
                  Testing Tool for Blockchain System},
  booktitle    = {TrustCom},
  pages        = {2141--2146},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00298},
  doi          = {10.1109/TRUSTCOM60117.2023.00298},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChengWZJPZLZLW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChengYZ0L23,
  author       = {Yumeng Cheng and
                  Wangyang Yu and
                  Xiaojun Zhai and
                  Fei Hao and
                  Yuan Liu},
  title        = {Grading and Calculation of Synchronic Distance in Petri Nets for Trustworthy
                  Modeling and analyzing},
  booktitle    = {TrustCom},
  pages        = {605--611},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00093},
  doi          = {10.1109/TRUSTCOM60117.2023.00093},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChengYZ0L23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChoiKL23,
  author       = {Euihyeon Choi and
                  Jooyoung Kim and
                  Wonkyung Lee},
  title        = {Rethinking Evaluation Metric for Probability Estimation Models Using
                  Esports Data},
  booktitle    = {TrustCom},
  pages        = {2683--2689},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00374},
  doi          = {10.1109/TRUSTCOM60117.2023.00374},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChoiKL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChowdhuryIKKNKA23,
  author       = {Abdullahi Chowdhury and
                  Mohammad Manzurul Islam and
                  Shahriar Kaisar and
                  Mahbub E. Khoda and
                  Ranesh Naha and
                  Mohammad Ali Khoshkholghi and
                  Mahdi Aiash},
  title        = {Leveraging Oversampling Techniques in Machine Learning Models for
                  Multi-class Malware Detection in Smart Home Applications},
  booktitle    = {TrustCom},
  pages        = {2216--2221},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00311},
  doi          = {10.1109/TRUSTCOM60117.2023.00311},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChowdhuryIKKNKA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DagnasBY23,
  author       = {Romain Dagnas and
                  Anis Bkakria and
                  Reda Yaich},
  title        = {Robustness Assessment of Biometric Authenticators},
  booktitle    = {TrustCom},
  pages        = {1137--1146},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00156},
  doi          = {10.1109/TRUSTCOM60117.2023.00156},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/DagnasBY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DimitriouA23,
  author       = {Tassos Dimitriou and
                  Khazam Alhamdan},
  title        = {{CENSOR:} Privacy-preserving Obfuscation for Outsourcing {SAT} formulas},
  booktitle    = {TrustCom},
  pages        = {1060--1067},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00147},
  doi          = {10.1109/TRUSTCOM60117.2023.00147},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/DimitriouA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DingS23,
  author       = {Yepeng Ding and
                  Hiroyuki Sato},
  title        = {Model-Driven Security Analysis of Self-Sovereign Identity Systems},
  booktitle    = {TrustCom},
  pages        = {1687--1694},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00230},
  doi          = {10.1109/TRUSTCOM60117.2023.00230},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/DingS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DonchezW23,
  author       = {Stephen Donchez and
                  Xiaofang Wang},
  title        = {Dynamic Scheduling of {AES} Cores for Aperiodic Tasks on Multi-tenant
                  Cloud FPGAs},
  booktitle    = {TrustCom},
  pages        = {2562--2569},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00358},
  doi          = {10.1109/TRUSTCOM60117.2023.00358},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/DonchezW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DongCWSXHW23,
  author       = {Runsha Dong and
                  Xiaodong Cao and
                  Chao Wang and
                  Zhaoyang Sun and
                  Lexi Xu and
                  Xin He and
                  Yang Wu},
  title        = {Smart Campus Construction based on Telecom Operators Big Data},
  booktitle    = {TrustCom},
  pages        = {2280--2285},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00322},
  doi          = {10.1109/TRUSTCOM60117.2023.00322},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/DongCWSXHW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DongZ023,
  author       = {Chenyu Dong and
                  Peijia Zheng and
                  Weiqi Luo},
  title        = {Keyword Spotting in the Homomorphic Encrypted Domain Using Convolution
                  Decomposition},
  booktitle    = {TrustCom},
  pages        = {1592--1597},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00217},
  doi          = {10.1109/TRUSTCOM60117.2023.00217},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/DongZ023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DongZLZ23,
  author       = {Chenghe Dong and
                  Jianhong Zhang and
                  Zongyi Lv and
                  Ruxuan Zhang},
  title        = {Lightweight Hierarchical Deterministic Wallet Supporting Stealth Address
                  for IoT},
  booktitle    = {TrustCom},
  pages        = {387--393},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00069},
  doi          = {10.1109/TRUSTCOM60117.2023.00069},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/DongZLZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DuCLZ23,
  author       = {Ruizhong Du and
                  Jing Cui and
                  Mingyue Li and
                  Yuqing Zhang},
  title        = {{CEIVS:} {A} Scalable and Secure Encrypted Image Retrieval Scheme
                  with Vertical Subspace Clustering},
  booktitle    = {TrustCom},
  pages        = {823--832},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00119},
  doi          = {10.1109/TRUSTCOM60117.2023.00119},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/DuCLZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DuY23,
  author       = {Jinhua Du and
                  Hao Yin},
  title        = {KrNER: {A} Novel Named Entity Recognition Method Based on Knowledge
                  Enhancement and Remote Supervision},
  booktitle    = {TrustCom},
  pages        = {2323--2332},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00328},
  doi          = {10.1109/TRUSTCOM60117.2023.00328},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/DuY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DuY23a,
  author       = {Jinhua Du and
                  Hao Yin},
  title        = {{KLDP:} {A} Data Profiling Technique Based on Knowledge Graph and
                  Large Language Modeling},
  booktitle    = {TrustCom},
  pages        = {2333--2340},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00329},
  doi          = {10.1109/TRUSTCOM60117.2023.00329},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/DuY23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/EckelBKFDBHL23,
  author       = {Michael Eckel and
                  Anirban Basu and
                  Satoshi Kai and
                  Hervais Simo Fhom and
                  Sinisa Dukanovic and
                  Henk Birkholz and
                  Shingo Hane and
                  Matthias Lieske},
  title        = {{SCATMAN:} {A} Framework for Enhancing Trustworthiness in Digital
                  Supply Chains},
  booktitle    = {TrustCom},
  pages        = {750--761},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00110},
  doi          = {10.1109/TRUSTCOM60117.2023.00110},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/EckelBKFDBHL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FanZLMWW0M23,
  author       = {Haoling Fan and
                  Fangyu Zheng and
                  Jingqiang Lin and
                  Lingjia Meng and
                  Mingyu Wang and
                  Qiang Wang and
                  Shijie Jia and
                  Yuan Ma},
  title        = {Hydamc: {A} Hybrid Detection Approach for Misuse of Cryptographic
                  Algorithms in Closed-Source Software},
  booktitle    = {TrustCom},
  pages        = {796--803},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00116},
  doi          = {10.1109/TRUSTCOM60117.2023.00116},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/FanZLMWW0M23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FarasatRK0P23,
  author       = {Talaya Farasat and
                  Muhammad Ahmad Rathore and
                  Akmal Khan and
                  Jongwon Kim and
                  Joachim Posegga},
  title        = {Machine Learning-based {BGP} Traffic Prediction},
  booktitle    = {TrustCom},
  pages        = {1925--1934},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00262},
  doi          = {10.1109/TRUSTCOM60117.2023.00262},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/FarasatRK0P23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FareaMUOCH23,
  author       = {Adhban Farea and
                  Moaaz Munir and
                  Rahat Ullah and
                  Michal Otreba and
                  Sean Carroll and
                  Joe Harrington},
  title        = {Comparison of the Barriers to {BIM} Adoption and Digital Transformation
                  within the Construction Industry of Pakistan and Ireland},
  booktitle    = {TrustCom},
  pages        = {2394--2399},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00337},
  doi          = {10.1109/TRUSTCOM60117.2023.00337},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/FareaMUOCH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FeiLWFPL23,
  author       = {Ziyu Fei and
                  Ying Li and
                  Jiuqi Wei and
                  Yufan Fu and
                  Botao Peng and
                  Xiaodong Li},
  title        = {FlexAuth: {A} Decentralized Authorization System with Flexible Delegation},
  booktitle    = {TrustCom},
  pages        = {1780--1797},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00243},
  doi          = {10.1109/TRUSTCOM60117.2023.00243},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/FeiLWFPL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ForoughBE23,
  author       = {Javad Forough and
                  Monowar H. Bhuyan and
                  Erik Elmroth},
  title        = {Unified Identification of Anomalies on the Edge: {A} Hybrid Sequential
                  {PGM} Approach},
  booktitle    = {TrustCom},
  pages        = {595--604},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00092},
  doi          = {10.1109/TRUSTCOM60117.2023.00092},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ForoughBE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FotiouCKSP23,
  author       = {Nikos Fotiou and
                  Spiros Chadoulos and
                  Iordanis Koutsopoulos and
                  Vasilios A. Siris and
                  George C. Polyzos},
  title        = {Access control for interoperable energy management systems using Verifiable
                  Credentials},
  booktitle    = {TrustCom},
  pages        = {1540--1545},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00210},
  doi          = {10.1109/TRUSTCOM60117.2023.00210},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/FotiouCKSP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FrijiMSCO023,
  author       = {Hamdi Friji and
                  Ioannis Mavromatis and
                  Adri{\'{a}}n S{\'{a}}nchez{-}Momp{\'{o}} and
                  Pietro Carnelli and
                  Alexis Olivereau and
                  Aftab Khan},
  title        = {Multi-stage Attack Detection and Prediction Using Graph Neural Networks:
                  An IoT Feasibility Study},
  booktitle    = {TrustCom},
  pages        = {620--627},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00095},
  doi          = {10.1109/TRUSTCOM60117.2023.00095},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/FrijiMSCO023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FuWLPL23,
  author       = {Yufan Fu and
                  Jiuqi Wei and
                  Ying Li and
                  Botao Peng and
                  Xiaodong Li},
  title        = {{TI-DNS:} {A} Trusted and Incentive {DNS} Resolution Architecture
                  based on Blockchain},
  booktitle    = {TrustCom},
  pages        = {265--274},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00055},
  doi          = {10.1109/TRUSTCOM60117.2023.00055},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/FuWLPL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GailRFK23,
  author       = {Felix Clemens Gail and
                  Roland Rieke and
                  Florian Fenzl and
                  Christoph Krau{\ss}},
  title        = {Evaluation of Decision Tree-Based Rule Derivation for Intrusion Detection
                  in Automotive Ethernet},
  booktitle    = {TrustCom},
  pages        = {1392--1399},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00190},
  doi          = {10.1109/TRUSTCOM60117.2023.00190},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GailRFK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GananLT23,
  author       = {Carlos Hernandez Ga{\~{n}}{\'{a}}n and
                  Si{\^{o}}n Lloyd and
                  Samaneh Tajalizadehkhoob},
  title        = {Phish and Chips: Language-agnostic classification of unsolicited emails},
  booktitle    = {TrustCom},
  pages        = {1385--1391},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00189},
  doi          = {10.1109/TRUSTCOM60117.2023.00189},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GananLT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GaoFLLY23,
  author       = {Xinwen Gao and
                  Shaojing Fu and
                  Lin Liu and
                  Yuchuan Luo and
                  Luming Yang},
  title        = {EzBoost: Fast And Secure Vertical Federated Tree Boosting Framework
                  via EzPC},
  booktitle    = {TrustCom},
  pages        = {28--37},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00027},
  doi          = {10.1109/TRUSTCOM60117.2023.00027},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GaoFLLY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GaoFYY23,
  author       = {Xiang Gao and
                  Jiangyin Fu and
                  Xiujuan Yao and
                  Yi Yan},
  title        = {Optimization Method for {LEO} Constellation Frequency Compatibility
                  Simulation Parameters},
  booktitle    = {TrustCom},
  pages        = {1991--1992},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00272},
  doi          = {10.1109/TRUSTCOM60117.2023.00272},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GaoFYY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GaoL23,
  author       = {Tong Gao and
                  Xianhui Lu},
  title        = {Physical Layer Secure Communication based on {MIMO} Channel Constellation
                  Flipping},
  booktitle    = {TrustCom},
  pages        = {1408--1415},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00192},
  doi          = {10.1109/TRUSTCOM60117.2023.00192},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GaoL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GaoWHLZXWYC23,
  author       = {Jie Gao and
                  Tianyi Wang and
                  Yuhui Han and
                  Lixia Liu and
                  Xingwei Zhang and
                  Lexi Xu and
                  Yang Wu and
                  Zijing Yang and
                  Chen Cheng},
  title        = {An Analysis Strategy of Abnormal Subscriber Warning Based on Federated
                  Learning Technology},
  booktitle    = {TrustCom},
  pages        = {2104--2109},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00292},
  doi          = {10.1109/TRUSTCOM60117.2023.00292},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GaoWHLZXWYC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GelenbeN23,
  author       = {Erol Gelenbe and
                  Mohammed Nasereddin},
  title        = {Protecting IoT Servers Against Flood Attacks with the Quasi Deterministic
                  Transmission Policy},
  booktitle    = {TrustCom},
  pages        = {379--386},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00068},
  doi          = {10.1109/TRUSTCOM60117.2023.00068},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GelenbeN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GeorgalasEPRPCB23,
  author       = {Nektarios Georgalas and
                  Andrew Ennis and
                  Cathryn Peoples and
                  Joseph Rafferty and
                  Philip Perry and
                  Claudia Cristina and
                  Brendan Black and
                  Adrian Moore and
                  Tom Bowman and
                  Bryan W. Scotney and
                  Andrew Reeves},
  title        = {IoT Device Lifecycle Management},
  booktitle    = {TrustCom},
  pages        = {1865--1870},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00253},
  doi          = {10.1109/TRUSTCOM60117.2023.00253},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GeorgalasEPRPCB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GoyalKS23,
  author       = {Himanshu Goyal and
                  Krishna Kodali and
                  Sudipta Saha},
  title        = {LiPI: Lightweight Privacy-Preserving Data Aggregation in IoT},
  booktitle    = {TrustCom},
  pages        = {1661--1666},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00226},
  doi          = {10.1109/TRUSTCOM60117.2023.00226},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GoyalKS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GrahnCZ23,
  author       = {Daniel Grahn and
                  Lingwei Chen and
                  Junjie Zhang},
  title        = {Code Execution Capability as a Metric for Machine Learning-Assisted
                  Software Vulnerability Detection Models},
  booktitle    = {TrustCom},
  pages        = {1606--1613},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00219},
  doi          = {10.1109/TRUSTCOM60117.2023.00219},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GrahnCZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GuSYH23,
  author       = {Zhipin Gu and
                  Jiangyong Shi and
                  Yuexiang Yang and
                  Liangzhong He},
  title        = {Defending against Adversarial Attacks in Federated Learning on Metric
                  Learning Model},
  booktitle    = {TrustCom},
  pages        = {197--206},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00047},
  doi          = {10.1109/TRUSTCOM60117.2023.00047},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GuSYH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Guo0Y23,
  author       = {Kailu Guo and
                  Yang Xin and
                  Tianxiang Yu},
  title        = {Malware Detection Using Contrastive Learning Based on Multi-Feature
                  Fusion},
  booktitle    = {TrustCom},
  pages        = {1681--1686},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00229},
  doi          = {10.1109/TRUSTCOM60117.2023.00229},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Guo0Y23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GuoGZFML23,
  author       = {Bao Guo and
                  Jinge Guo and
                  Lufei Zhang and
                  Yuan Fang and
                  Yingtao Meng and
                  Jiayu Li},
  title        = {A Novel Uplink Coverage and Capacity Enhancement Scheme in {NR} {TDD}
                  Network},
  booktitle    = {TrustCom},
  pages        = {2275--2279},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00321},
  doi          = {10.1109/TRUSTCOM60117.2023.00321},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GuoGZFML23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GuoHHZLT23,
  author       = {Qi Guo and
                  Binjiang Hu and
                  Zeqi Hong and
                  Yanjun Zhao and
                  Shuyong Li and
                  Liang Tu},
  title        = {Designing and Implementing Communication-efficient Model of Distributed
                  System for Real-time Electromagnetic Transient Simulation},
  booktitle    = {TrustCom},
  pages        = {2789--2796},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00389},
  doi          = {10.1109/TRUSTCOM60117.2023.00389},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GuoHHZLT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GuoL23,
  author       = {Kewei Guo and
                  Xuefei Li},
  title        = {A Trustworthiness Evaluation Mechanism Based on Beta Distribution
                  Under Selected Conditions},
  booktitle    = {TrustCom},
  pages        = {1781--1789},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00242},
  doi          = {10.1109/TRUSTCOM60117.2023.00242},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GuoL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GuoXLLWZ23,
  author       = {Yongjian Guo and
                  Xi Xiao and
                  Yuanyi Lin and
                  Hao Li and
                  Xiangbo Wu and
                  Tao Zhou},
  title        = {Fuzz Testing for Rust Library Functions},
  booktitle    = {TrustCom},
  pages        = {990--997},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00139},
  doi          = {10.1109/TRUSTCOM60117.2023.00139},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GuoXLLWZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GuoZGSJL23,
  author       = {Bao Guo and
                  Lufei Zhang and
                  Jinge Guo and
                  Jinhu Shen and
                  Shumin Jiang and
                  Pengcheng Liu},
  title        = {Method for Dual-path Upgrade in a Leaked Signal Indoor Distribution
                  System in 5G Network},
  booktitle    = {TrustCom},
  pages        = {2048--2051},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00282},
  doi          = {10.1109/TRUSTCOM60117.2023.00282},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GuoZGSJL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GuoZXLY23,
  author       = {Zhen Guo and
                  Pengzhou Zhang and
                  Lexi Xu and
                  Peng Liang and
                  Shuwei Yao},
  title        = {Design and Implementation of Digital Consulting Capability Platform
                  based on Knowledge Sharing},
  booktitle    = {TrustCom},
  pages        = {2030--2035},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00279},
  doi          = {10.1109/TRUSTCOM60117.2023.00279},
  timestamp    = {Wed, 05 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GuoZXLY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HadiSACJ23,
  author       = {Hassan Jalil Hadi and
                  Khurram Shahzad and
                  Naveed Ahmed and
                  Yue Cao and
                  Yasir Javed},
  title        = {A Scalable Pattern Matching Implementation on Hardware using Data
                  Level Parallelism},
  booktitle    = {TrustCom},
  pages        = {2530--2537},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00354},
  doi          = {10.1109/TRUSTCOM60117.2023.00354},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HadiSACJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Halabi23,
  author       = {Talal Halabi},
  title        = {Stealthy Rootkits vs Low-Power IoT Devices: {A} Process-level Colonel
                  Blotto Game},
  booktitle    = {TrustCom},
  pages        = {1914--1918},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00260},
  doi          = {10.1109/TRUSTCOM60117.2023.00260},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Halabi23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HalaszSB23,
  author       = {David Halasz and
                  Suyash Shandilya and
                  Barbora Buhnova},
  title        = {Trustworthy Execution in Untrustworthy Autonomous Systems},
  booktitle    = {TrustCom},
  pages        = {1766--1773},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00240},
  doi          = {10.1109/TRUSTCOM60117.2023.00240},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HalaszSB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HamimTAHAG23,
  author       = {Md Abrar Hamim and
                  F. M. Tanmoy and
                  Umme Fatema Tuj Asha and
                  Md Nazmul Haq and
                  Maruf Alam and
                  Bijoy Ghosh},
  title        = {Lung Cancer Detection using Machine Learning Approach},
  booktitle    = {TrustCom},
  pages        = {2676--2682},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00373},
  doi          = {10.1109/TRUSTCOM60117.2023.00373},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HamimTAHAG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HarrisLHC23,
  author       = {Sheetal Harris and
                  Jinshuo Liu and
                  Hassan Jalil Hadi and
                  Yue Cao},
  title        = {Ax-to-Grind Urdu: Benchmark Dataset for Urdu Fake News Detection},
  booktitle    = {TrustCom},
  pages        = {2440--2447},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00343},
  doi          = {10.1109/TRUSTCOM60117.2023.00343},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HarrisLHC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HasegawaYHFHT23,
  author       = {Kento Hasegawa and
                  Kazuki Yamashita and
                  Seira Hidano and
                  Kazuhide Fukushima and
                  Kazuo Hashimoto and
                  Nozomu Togawa},
  title        = {Membership Inference Attacks against GNN-based Hardware Trojan Detection},
  booktitle    = {TrustCom},
  pages        = {1222--1229},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00166},
  doi          = {10.1109/TRUSTCOM60117.2023.00166},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HasegawaYHFHT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HeWLY23,
  author       = {Liangen He and
                  Haiqin Wu and
                  Liang Li and
                  Jucai Yang},
  title        = {{UNITE:} Privacy-Aware Verifiable Quality Assessment via Federated
                  Learning in Blockchain-Empowered Crowdsourcing},
  booktitle    = {TrustCom},
  pages        = {352--360},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00065},
  doi          = {10.1109/TRUSTCOM60117.2023.00065},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HeWLY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HegdeMSR23,
  author       = {Shashank Hegde and
                  Deepak Munagala and
                  Aditya Singhania and
                  Benjamin Reed},
  title        = {A Mobile-First Disconnected Data Distribution Network},
  booktitle    = {TrustCom},
  pages        = {2546--2553},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00356},
  doi          = {10.1109/TRUSTCOM60117.2023.00356},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HegdeMSR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HlaingA23,
  author       = {Htet Htet Hlaing and
                  Hitoshi Asaeda},
  title        = {PrivOff: Secure and Privacy-Preserving Data Management for Distributed
                  Off-Chain Networks},
  booktitle    = {TrustCom},
  pages        = {326--333},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00062},
  doi          = {10.1109/TRUSTCOM60117.2023.00062},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HlaingA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HouWH23,
  author       = {Yuwen Hou and
                  Song Wu and
                  Mingde Huo},
  title        = {Medical Image Recognition Technology Based On Fusion Of Faster-RCNN
                  And {SSD}},
  booktitle    = {TrustCom},
  pages        = {2110--2114},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00293},
  doi          = {10.1109/TRUSTCOM60117.2023.00293},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HouWH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HsiehYLKW23,
  author       = {Chang{-}Hsuan Hsieh and
                  Jen{-}Chieh Yang and
                  Hung{-}Yi Lin and
                  Lin{-}Jing Kuo and
                  Sheng{-}De Wang},
  title        = {A Hybrid Filter Pruning Method Based on Linear Region Analysis},
  booktitle    = {TrustCom},
  pages        = {2424--2431},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00341},
  doi          = {10.1109/TRUSTCOM60117.2023.00341},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HsiehYLKW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Hu023,
  author       = {Wentao Hu and
                  Hui Fang},
  title        = {Decentralized Matrix Factorization with Heterogeneous Differential
                  Privacy},
  booktitle    = {TrustCom},
  pages        = {1068--1075},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00148},
  doi          = {10.1109/TRUSTCOM60117.2023.00148},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Hu023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HuCL23,
  author       = {Yang Hu and
                  Jia Chen and
                  Xin Luo},
  title        = {{UFADF:} {A} Unified Feature Analysis and Detection Framework for
                  Malicious Office Documents},
  booktitle    = {TrustCom},
  pages        = {881--888},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00126},
  doi          = {10.1109/TRUSTCOM60117.2023.00126},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HuCL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HuXL23,
  author       = {Qinghua Hu and
                  Chunxiang Xu and
                  Wanpeng Li},
  title        = {A Broadband Subliminal Channel in Signatures Without Sharing the Signing
                  Key},
  booktitle    = {TrustCom},
  pages        = {814--822},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00118},
  doi          = {10.1109/TRUSTCOM60117.2023.00118},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HuXL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HuYTWCALL23,
  author       = {Qingyuan Hu and
                  Zheng Yin and
                  Tao Tao and
                  Jibin Wang and
                  Zhuo Chen and
                  Bohuan Ai and
                  Yu Liu and
                  Chongzhou Liu},
  title        = {Research on Technologies in Data Fabric},
  booktitle    = {TrustCom},
  pages        = {2204--2209},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00309},
  doi          = {10.1109/TRUSTCOM60117.2023.00309},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HuYTWCALL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HuZSLMW23,
  author       = {Tian Hu and
                  Shangyuan Zhuang and
                  Jiyan Sun and
                  Yinlong Liu and
                  Wei Ma and
                  Hongchao Wang},
  title        = {A Cost-effective Automation Method of Massive Vulnerabilities Analysis
                  and Remediation Based on Cloud Native},
  booktitle    = {TrustCom},
  pages        = {772--779},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00112},
  doi          = {10.1109/TRUSTCOM60117.2023.00112},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HuZSLMW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HuangAHMT23,
  author       = {Ruoyu Huang and
                  Abdullah Aljuffri and
                  Said Hamdioui and
                  Kezheng Ma and
                  Mottaqiallah Taouil},
  title        = {Securing an Efficient Lightweight {AES} Accelerator},
  booktitle    = {TrustCom},
  pages        = {841--848},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00121},
  doi          = {10.1109/TRUSTCOM60117.2023.00121},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HuangAHMT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HuangDZLWZ23,
  author       = {Hualong Huang and
                  Zhekai Duan and
                  Wenhan Zhan and
                  Yichen Liu and
                  Zhi Wang and
                  Zitian Zhao},
  title        = {Distributed Dependent Task Offloading in {CPU-GPU} Heterogenous {MEC:}
                  {A} Federated Reinforcement Learning Approach},
  booktitle    = {TrustCom},
  pages        = {1206--1213},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00164},
  doi          = {10.1109/TRUSTCOM60117.2023.00164},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HuangDZLWZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HuangLX0H023,
  author       = {Shiyong Huang and
                  Haocong Li and
                  Ruoting Xiong and
                  Wei Ren and
                  Jie He and
                  Yi Ren},
  title        = {A Commitment and Ring Signature based Scheme for Amount and Identity
                  Privacy Protection in Blockchain},
  booktitle    = {TrustCom},
  pages        = {292--299},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00058},
  doi          = {10.1109/TRUSTCOM60117.2023.00058},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HuangLX0H023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/IezziMG23,
  author       = {Michela Iezzi and
                  Carsten Maple and
                  Danilo A. Giannone},
  title        = {On the Adoption of Homomorphic Encryption by Financial Institutions\({}^{\mbox{*}}\)},
  booktitle    = {TrustCom},
  pages        = {1738--1743},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00236},
  doi          = {10.1109/TRUSTCOM60117.2023.00236},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/IezziMG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/InceLYLD23,
  author       = {Peter Ince and
                  Xiapu Luo and
                  Jiangshan Yu and
                  Joseph K. Liu and
                  Xiaoning Du},
  title        = {{MATH} - Finding and Fixing Exploits in Algorand},
  booktitle    = {TrustCom},
  pages        = {1572--1579},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00214},
  doi          = {10.1109/TRUSTCOM60117.2023.00214},
  timestamp    = {Thu, 06 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/InceLYLD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JhaMG23,
  author       = {Sanjiv S. Jha and
                  Simon Mayer and
                  Kimberly Garc{\'{\i}}a},
  title        = {Actionable Contextual Explanations for Cyber-Physical Systems},
  booktitle    = {TrustCom},
  pages        = {1879--1886},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00255},
  doi          = {10.1109/TRUSTCOM60117.2023.00255},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/JhaMG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JianJWL023,
  author       = {Muwei Jian and
                  Yue Jin and
                  Rui Wang and
                  Xiaoguang Li and
                  Hui Yu},
  title        = {Inter-slice Correlation Weighted Fusion for Universal Lesion Detection},
  booktitle    = {TrustCom},
  pages        = {636--643},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00097},
  doi          = {10.1109/TRUSTCOM60117.2023.00097},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/JianJWL023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JiangXCLWL23,
  author       = {Changnan Jiang and
                  Chunhe Xia and
                  Chen Chen and
                  Huacheng Li and
                  Tianbo Wang and
                  Xiaojian Li},
  title        = {FedDLM: {A} Fine-Grained Assessment Scheme for Risk of Sensitive Information
                  Leakage in Federated Learning-based Android Malware Classifier},
  booktitle    = {TrustCom},
  pages        = {231--240},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00051},
  doi          = {10.1109/TRUSTCOM60117.2023.00051},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/JiangXCLWL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JiaoZLL23,
  author       = {Liang Jiao and
                  Yujia Zhu and
                  Baiyang Li and
                  Qingyun Liu},
  title        = {Measuring DNS-over-Encryption Performance Over IPv6},
  booktitle    = {TrustCom},
  pages        = {444--451},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00075},
  doi          = {10.1109/TRUSTCOM60117.2023.00075},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/JiaoZLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JurkansF23,
  author       = {Kristaps Jurkans and
                  Charles Fox},
  title        = {Python Subset to Digital Logic Dataflow Compiler for Robots and IoT},
  booktitle    = {TrustCom},
  pages        = {1893--1899},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00257},
  doi          = {10.1109/TRUSTCOM60117.2023.00257},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/JurkansF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KasirajanAT23,
  author       = {Merlin Kasirajan and
                  M. A. Hannan Bin Azhar and
                  Scott Turner},
  title        = {Trustworthy Insights: {A} Novel Multi-Tier Explainable Framework for
                  Ambient Assisted Living},
  booktitle    = {TrustCom},
  pages        = {2554--2561},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00357},
  doi          = {10.1109/TRUSTCOM60117.2023.00357},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/KasirajanAT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KasyapTC23,
  author       = {Harsh Kasyap and
                  Somanath Tripathy and
                  Mauro Conti},
  title        = {{HDFL:} Private and Robust Federated Learning using Hyperdimensional
                  Computing},
  booktitle    = {TrustCom},
  pages        = {214--221},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00049},
  doi          = {10.1109/TRUSTCOM60117.2023.00049},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/KasyapTC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KhadkaUMMA23,
  author       = {Kalam Khadka and
                  Abu Barkat Ullah and
                  Wanli Ma and
                  Elisa Mart{\'{\i}}nez Marroqu{\'{\i}}n and
                  Yibeltal Alem},
  title        = {A Survey on the Principles of Persuasion as a Social Engineering Strategy
                  in Phishing},
  booktitle    = {TrustCom},
  pages        = {1631--1638},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00222},
  doi          = {10.1109/TRUSTCOM60117.2023.00222},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/KhadkaUMMA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KhanM23,
  author       = {Tanveer Khan and
                  Antonis Michalas},
  title        = {Learning in the Dark: Privacy-Preserving Machine Learning using Function
                  Approximation},
  booktitle    = {TrustCom},
  pages        = {62--71},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00031},
  doi          = {10.1109/TRUSTCOM60117.2023.00031},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/KhanM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KhanTJM23,
  author       = {Abdul{-}Qadir Khan and
                  Nouredine Tamani and
                  Saad El Jaouhari and
                  Lina Mroueh},
  title        = {A Contextual Derivation Algorithm for Cybersecurity in IoT Environments},
  booktitle    = {TrustCom},
  pages        = {1430--1435},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00195},
  doi          = {10.1109/TRUSTCOM60117.2023.00195},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/KhanTJM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KliemeERM23,
  author       = {Eric Klieme and
                  Ben{-}Noah Engelhaupt and
                  Vincent Xeno Rahn and
                  Christoph Meinel},
  title        = {Push It Real Good: Towards Behavioral Access Control using the Door
                  Handle Push-Down-Phase Only},
  booktitle    = {TrustCom},
  pages        = {522--530},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00084},
  doi          = {10.1109/TRUSTCOM60117.2023.00084},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/KliemeERM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KogaK23,
  author       = {Yoshimichi Koga and
                  Kenichi Kourai},
  title        = {SSdetector: Secure and Manageable Host-based {IDS} with {SGX} and
                  {SMM}},
  booktitle    = {TrustCom},
  pages        = {539--548},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00086},
  doi          = {10.1109/TRUSTCOM60117.2023.00086},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/KogaK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KongGWL23,
  author       = {Luyue Kong and
                  Ling Gong and
                  Guangchen Wang and
                  Song Liu},
  title        = {DP-ProtoNet: An interpretable dual path prototype network for medical
                  image diagnosis},
  booktitle    = {TrustCom},
  pages        = {2797--2804},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00390},
  doi          = {10.1109/TRUSTCOM60117.2023.00390},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/KongGWL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KongZLL23,
  author       = {Luyue Kong and
                  Shu Zhang and
                  Jinbao Li and
                  Song Liu},
  title        = {An Instruction Inference Graph Optimal Transport Network Model For
                  Biomedical Commonsense Question Answering},
  booktitle    = {TrustCom},
  pages        = {2749--2754},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00383},
  doi          = {10.1109/TRUSTCOM60117.2023.00383},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/KongZLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Konorski23,
  author       = {Jerzy Konorski},
  title        = {Trustworthiness and Subversion in Large Service-Oriented Multi-Agent
                  Systems under Virtual Anonymity and Blind Provider Selection},
  booktitle    = {TrustCom},
  pages        = {722--729},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00107},
  doi          = {10.1109/TRUSTCOM60117.2023.00107},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Konorski23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KrakowskiRS23,
  author       = {Filip Krakowski and
                  Fabian Ruhland and
                  Michael Sch{\"{o}}ttner},
  title        = {High-Performance Object Serialization based on Ahead-of-Time Schema
                  Generation},
  booktitle    = {TrustCom},
  pages        = {2378--2385},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00335},
  doi          = {10.1109/TRUSTCOM60117.2023.00335},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/KrakowskiRS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KromesRNCVL23,
  author       = {Roland Kromes and
                  Jo{\~{a}}o Rodrigues and
                  Duarte M. Nascimento and
                  Gon{\c{c}}alo Cadete and
                  Fran{\c{c}}ois Verdier and
                  Kaitai Liang},
  title        = {A New Design for Self-Encryption},
  booktitle    = {TrustCom},
  pages        = {1645--1652},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00224},
  doi          = {10.1109/TRUSTCOM60117.2023.00224},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/KromesRNCVL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KrzywieckiZZ23,
  author       = {Lukasz Krzywiecki and
                  Grzegorz Zaborowski and
                  Marcin Zawada},
  title        = {Too Noisy, or Not Too Noisy? {A} Private Training in Machine Learning},
  booktitle    = {TrustCom},
  pages        = {149--156},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00041},
  doi          = {10.1109/TRUSTCOM60117.2023.00041},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/KrzywieckiZZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KuhtreiberPR23,
  author       = {Patrick K{\"{u}}htreiber and
                  Viktoriya Pak and
                  Delphine Reinhardt},
  title        = {"A method like this would be overkill": Developers' Perceived Issues
                  with Privacy-preserving Computation Methods},
  booktitle    = {TrustCom},
  pages        = {1041--1048},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00145},
  doi          = {10.1109/TRUSTCOM60117.2023.00145},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/KuhtreiberPR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KunduN23,
  author       = {Arghya Kundu and
                  Uyen Trang Nguyen},
  title        = {A Large-scale Non-standard English Database and Transformer-based
                  Translation System},
  booktitle    = {TrustCom},
  pages        = {2472--2479},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00347},
  doi          = {10.1109/TRUSTCOM60117.2023.00347},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/KunduN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KwartengC23,
  author       = {Emmanuel Kwarteng and
                  Mumin Cebe},
  title        = {{MEDICALHARM} - {A} Threat Modeling designed for Modern Medical Devices},
  booktitle    = {TrustCom},
  pages        = {1147--1156},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00157},
  doi          = {10.1109/TRUSTCOM60117.2023.00157},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/KwartengC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LarsenKGKV023,
  author       = {Benjamin Larsen and
                  Nada El Kassem and
                  Thanassis Giannetsos and
                  Ioannis Krontiris and
                  Stefanos Vasileiadis and
                  Liqun Chen},
  title        = {Achieving Higher Level of Assurance in Privacy Preserving Identity
                  Wallets},
  booktitle    = {TrustCom},
  pages        = {1049--1059},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00146},
  doi          = {10.1109/TRUSTCOM60117.2023.00146},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LarsenKGKV023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LealCNGC023,
  author       = {Erika A. Leal and
                  Binlin Cheng and
                  TuQuynh Nguyen and
                  Alfredo Gutierrez Garcia and
                  Nathan Cabero and
                  Jiang Ming},
  title        = {Leveraging Hardware Performance Counters for Efficient Classification
                  of Binary Packers},
  booktitle    = {TrustCom},
  pages        = {1859--1864},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00252},
  doi          = {10.1109/TRUSTCOM60117.2023.00252},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LealCNGC023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LengPZYZCM23,
  author       = {Tao Leng and
                  Yuedong Pan and
                  Lixin Zhao and
                  Aimin Yu and
                  Ziyuan Zhu and
                  Lijun Cai and
                  Dang Meng},
  title        = {MemInspect: Memory Forensics for investigating Fileless Attacks},
  booktitle    = {TrustCom},
  pages        = {946--955},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00134},
  doi          = {10.1109/TRUSTCOM60117.2023.00134},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LengPZYZCM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Li0HHZZ23,
  author       = {Yuanyuan Li and
                  Wei Chen and
                  Xin Huang and
                  Peng Han and
                  Shenhai Zheng and
                  Zhiqin Zhu},
  title        = {Efficient Covert Communication Scheme Based on Ethereum},
  booktitle    = {TrustCom},
  pages        = {249--256},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00053},
  doi          = {10.1109/TRUSTCOM60117.2023.00053},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Li0HHZZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Li0LZL23,
  author       = {Longfei Li and
                  Xiaokang Yin and
                  Xiao Li and
                  Xiaoya Zhu and
                  Shengli Liu},
  title        = {ConFunc: Enhanced Binary Function-Level Representation through Contrastive
                  Learning},
  booktitle    = {TrustCom},
  pages        = {1241--1248},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00169},
  doi          = {10.1109/TRUSTCOM60117.2023.00169},
  timestamp    = {Mon, 17 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Li0LZL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Li0ZS023,
  author       = {Dandan Li and
                  Yufeng Li and
                  Guiqi Zhang and
                  Ke Sun and
                  Jiangtao Li},
  title        = {Fooling Object Detectors in the Physical World with Natural Adversarial
                  Camouflage},
  booktitle    = {TrustCom},
  pages        = {141--148},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00040},
  doi          = {10.1109/TRUSTCOM60117.2023.00040},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Li0ZS023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Li0ZWY023,
  author       = {Jiacheng Li and
                  Tong Li and
                  Runzi Zhang and
                  Di Wu and
                  Hao Yue and
                  Zhen Yang},
  title        = {{APM:} An Attack Path-based Method for {APT} Attack Detection on Few-Shot
                  Learning},
  booktitle    = {TrustCom},
  pages        = {10--19},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00025},
  doi          = {10.1109/TRUSTCOM60117.2023.00025},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Li0ZWY023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiC0S23,
  author       = {Xiaohui Li and
                  Yunpei Chen and
                  Hong Wang and
                  Shuran Sheng},
  title        = {{R-SACE:} RIS-Enabled Sensing-Aided Communication Enhancement in {ISAC}
                  Systems},
  booktitle    = {TrustCom},
  pages        = {2714--2719},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00378},
  doi          = {10.1109/TRUSTCOM60117.2023.00378},
  timestamp    = {Wed, 05 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiC0S23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiHWWQN23,
  author       = {Ao Li and
                  Sai Han and
                  Zelin Wang and
                  Guangquan Wang and
                  Zhi Qiao and
                  Songtao Ni},
  title        = {The Research and Implementation of Optical Cable Fault Location Method
                  Based on Navigation},
  booktitle    = {TrustCom},
  pages        = {2070--2075},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00286},
  doi          = {10.1109/TRUSTCOM60117.2023.00286},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiHWWQN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiLRWSGWL23,
  author       = {Dawei Li and
                  Di Liu and
                  Yangkun Ren and
                  Ziyi Wang and
                  Yu Sun and
                  Zhenyu Guan and
                  Qianhong Wu and
                  Jianwei Liu},
  title        = {FPHammer: {A} Device Identification Framework based on {DRAM} Fingerprinting},
  booktitle    = {TrustCom},
  pages        = {1031--1040},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00144},
  doi          = {10.1109/TRUSTCOM60117.2023.00144},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiLRWSGWL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiP0Y23,
  author       = {Shifeng Li and
                  Ruoling Peng and
                  Po Yang and
                  Yun Yang},
  title        = {A Deep Learning Model for Mobility Change Prediction Based on National
                  Prevention and Control Policy},
  booktitle    = {TrustCom},
  pages        = {2607--2614},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00364},
  doi          = {10.1109/TRUSTCOM60117.2023.00364},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiP0Y23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiSCL23,
  author       = {Qi Li and
                  Xinqi Shen and
                  Zhongkai Cheng and
                  Yu Liu},
  title        = {Design and Implementation of Intelligent Pet Feeding System},
  booktitle    = {TrustCom},
  pages        = {2629--2635},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00367},
  doi          = {10.1109/TRUSTCOM60117.2023.00367},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiSCL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiWC23,
  author       = {Shuai Li and
                  Yu Wen and
                  Xu Cheng},
  title        = {Towards Dynamic Backdoor Attacks against LiDAR Semantic Segmentation
                  in Autonomous Driving},
  booktitle    = {TrustCom},
  pages        = {89--98},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00034},
  doi          = {10.1109/TRUSTCOM60117.2023.00034},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiWC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiWWC23,
  author       = {Shuai Li and
                  Yu Wen and
                  Huiying Wang and
                  Xu Cheng},
  title        = {BadLiDet: {A} Simple Backdoor Attack against LiDAR Object Detection
                  in Autonomous Driving},
  booktitle    = {TrustCom},
  pages        = {99--108},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00035},
  doi          = {10.1109/TRUSTCOM60117.2023.00035},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiWWC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiXLLW23,
  author       = {De Li and
                  Tiange Xia and
                  Qiyu Li and
                  Xianxian Li and
                  Jinyan Wang},
  title        = {Robustness and Privacy for Green Learning under Noisy Labels},
  booktitle    = {TrustCom},
  pages        = {1111--1118},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00153},
  doi          = {10.1109/TRUSTCOM60117.2023.00153},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiXLLW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiZCJ23,
  author       = {Yuxi Li and
                  Fucai Zhou and
                  Jingjing Chen and
                  Dong Ji},
  title        = {Crowdsensed Data-oriented Distributed and Secure Spatial Query Scheme},
  booktitle    = {TrustCom},
  pages        = {912--919},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00130},
  doi          = {10.1109/TRUSTCOM60117.2023.00130},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiZCJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiZFW23,
  author       = {Zeyi Li and
                  Ze Zhang and
                  Mengyi Fu and
                  Pan Wang},
  title        = {A novel network flow feature scaling method based on cloud-edge collaboration},
  booktitle    = {TrustCom},
  pages        = {1947--1953},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00265},
  doi          = {10.1109/TRUSTCOM60117.2023.00265},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiZFW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiZLZ23,
  author       = {Yuanpei Li and
                  Qinglei Zhou and
                  Bin Li and
                  Yan Zhuang},
  title        = {GuiDiv: Mitigating Code-reuse Attack in an IoT Cluster Using Guided
                  Control Flow Diversification},
  booktitle    = {TrustCom},
  pages        = {422--433},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00073},
  doi          = {10.1109/TRUSTCOM60117.2023.00073},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiZLZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiZSZSM23,
  author       = {Danping Li and
                  Ziyuan Zhu and
                  Jiao Shen and
                  Yusha Zhang and
                  Gang Shi and
                  Dan Meng},
  title        = {Flush+Revisit: {A} Cross-CCX Side-Channel Attack on {AMD} Processors},
  booktitle    = {TrustCom},
  pages        = {920--928},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00131},
  doi          = {10.1109/TRUSTCOM60117.2023.00131},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiZSZSM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LinXW0ZZ23,
  author       = {Wanshuang Lin and
                  Chunhe Xia and
                  Tianbo Wang and
                  Chen Chen and
                  Yuan Zhao and
                  Weidong Zhou},
  title        = {{REDA:} Malicious Traffic Detection Based on Record Length and Frequency
                  Domain Analysis},
  booktitle    = {TrustCom},
  pages        = {668--675},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00101},
  doi          = {10.1109/TRUSTCOM60117.2023.00101},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LinXW0ZZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LinZWWX23,
  author       = {Lin Lin and
                  Bin Zhu and
                  Zelin Wang and
                  Guangquan Wang and
                  Kaichu Xing},
  title        = {Service-Driven Shared QoS Orchestration for Satellite-Ground Integrated
                  Networks},
  booktitle    = {TrustCom},
  pages        = {2005--2011},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00275},
  doi          = {10.1109/TRUSTCOM60117.2023.00275},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LinZWWX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Liu0WZW23,
  author       = {Zimian Liu and
                  Han Qiu and
                  Rui Wang and
                  Junhu Zhu and
                  Qingxian Wang},
  title        = {Detecting {BGP} Anomalies based on Spatio-Temporal Feature Representation
                  Model for Autonomous Systems},
  booktitle    = {TrustCom},
  pages        = {404--411},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00071},
  doi          = {10.1109/TRUSTCOM60117.2023.00071},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Liu0WZW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuLCZWMLY23,
  author       = {Guangqi Liu and
                  Jingqiang Lin and
                  Dawei Chu and
                  Xiaokun Zhang and
                  Qiongxiao Wang and
                  Cunqing Ma and
                  Fengjun Li and
                  Dingfeng Ye},
  title        = {Enhanced Ticket Transparency (eTT) Framework for Single Sign-On Services
                  with Pseudonyms},
  booktitle    = {TrustCom},
  pages        = {730--739},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00108},
  doi          = {10.1109/TRUSTCOM60117.2023.00108},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuLCZWMLY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuMT23,
  author       = {Yanmei Liu and
                  Pengwei Ma and
                  Jiafeng Tian},
  title        = {Research on Technology and Industry Situation of Lakehouse},
  booktitle    = {TrustCom},
  pages        = {2198--2203},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00308},
  doi          = {10.1109/TRUSTCOM60117.2023.00308},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuMT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuSYZW23,
  author       = {Wen Liu and
                  Degang Sun and
                  Haitian Yang and
                  He Zhu and
                  Yan Wang},
  title        = {IAD-Net: Multivariate KPIs Interpretable Anomaly Detection with Dual
                  Gated Residual Fusion Networks},
  booktitle    = {TrustCom},
  pages        = {686--693},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00103},
  doi          = {10.1109/TRUSTCOM60117.2023.00103},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuSYZW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuWMLFLY23,
  author       = {Guangqi Liu and
                  Qiongxiao Wang and
                  Cunqing Ma and
                  Jingqiang Lin and
                  Yanduo Fu and
                  Bingyu Li and
                  Dingfeng Ye},
  title        = {The Broken Verifying: Inspections at Verification Tools for Windows
                  Code-Signing Signatures},
  booktitle    = {TrustCom},
  pages        = {804--813},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00117},
  doi          = {10.1109/TRUSTCOM60117.2023.00117},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuWMLFLY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuYZQFZ23,
  author       = {Jingyu Liu and
                  Chunfang Yang and
                  Ma Zhu and
                  Baojun Qi and
                  Xueyuan Fu and
                  Mengyang Zhou},
  title        = {{MTD-RTPE:} {A} Malicious Traffic Detection Method Based on Relative
                  Time-Delay Positional Encoding},
  booktitle    = {TrustCom},
  pages        = {694--703},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00104},
  doi          = {10.1109/TRUSTCOM60117.2023.00104},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuYZQFZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuZWLL23,
  author       = {Jifeng Liu and
                  Yao Zhou and
                  Cheng Wang and
                  Yingnan Liu and
                  Fuchang Li},
  title        = {Simulation of Space-borne Digital Phased Array Anntenna},
  booktitle    = {TrustCom},
  pages        = {1986--1990},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00271},
  doi          = {10.1109/TRUSTCOM60117.2023.00271},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuZWLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LopezCCP23,
  author       = {Jorge L{\'{o}}pez and
                  Charalampos Chatzinakis and
                  Marc Cartigny and
                  Claude Poletti},
  title        = {Software defined networking flow admission and routing under minimal
                  security constraints},
  booktitle    = {TrustCom},
  pages        = {2636--2643},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00368},
  doi          = {10.1109/TRUSTCOM60117.2023.00368},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LopezCCP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LuoC0L23,
  author       = {Zhenkun Luo and
                  Shuhong Chen and
                  Guojun Wang and
                  Hanjun Li},
  title        = {Two-Stage Smart Contract Vulnerability Detection Combining Semantic
                  Features and Graph Features},
  booktitle    = {TrustCom},
  pages        = {257--264},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00054},
  doi          = {10.1109/TRUSTCOM60117.2023.00054},
  timestamp    = {Thu, 06 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LuoC0L23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LuoLOX23,
  author       = {Xiuyi Luo and
                  Chongrui Lu and
                  Siyi Ouyang and
                  Siyu Xia},
  title        = {Performance Evaluation of Flight Energy Consumption of UAVs in IRS-assisted
                  {UAV} Systems},
  booktitle    = {TrustCom},
  pages        = {2770--2775},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00386},
  doi          = {10.1109/TRUSTCOM60117.2023.00386},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LuoLOX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LuoLYH23,
  author       = {Shengyang Luo and
                  Yaqi Liu and
                  Xuehu Yan and
                  Chao Huang},
  title        = {Cropping Resilient Secret Image Sharing Scheme with Lossless Recovery},
  booktitle    = {TrustCom},
  pages        = {1103--1110},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00152},
  doi          = {10.1109/TRUSTCOM60117.2023.00152},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LuoLYH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LvLXXCY23,
  author       = {Kaiqi Lv and
                  Weiguo Lin and
                  Junfeng Xu and
                  Wanshan Xu and
                  Shuren Chen and
                  Shengwei Yi},
  title        = {Generating Optimized Universal Adversarial Watermark for Preventing
                  Face Deepfake},
  booktitle    = {TrustCom},
  pages        = {1586--1591},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00216},
  doi          = {10.1109/TRUSTCOM60117.2023.00216},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LvLXXCY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LyuMHQXCXWX23,
  author       = {Feibi Lyu and
                  Ning Meng and
                  Yuhui Han and
                  Jinjian Qiao and
                  Zhipu Xie and
                  Xinzhou Cheng and
                  Lexi Xu and
                  Zhaoning Wang and
                  Guoping Xu},
  title        = {Proactive Operation and Maintenance for 5G Networks Based on Complaint
                  Prediction},
  booktitle    = {TrustCom},
  pages        = {2128--2133},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00296},
  doi          = {10.1109/TRUSTCOM60117.2023.00296},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LyuMHQXCXWX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MaCXZLR23,
  author       = {Wenrui Ma and
                  Ying Cong and
                  Haitao Xu and
                  Fan Zhang and
                  Zhao Li and
                  Siqi Ren},
  title        = {Investigating Fraud and Misconduct in Legitimate Internet Economy
                  based on Customer Complaints},
  booktitle    = {TrustCom},
  pages        = {394--403},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00070},
  doi          = {10.1109/TRUSTCOM60117.2023.00070},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/MaCXZLR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MaGL23,
  author       = {Xuebin Ma and
                  Shengyi Guan and
                  Yanan Lang},
  title        = {Differential Privacy Frequent Closed Itemset Mining over Data Stream},
  booktitle    = {TrustCom},
  pages        = {865--872},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00124},
  doi          = {10.1109/TRUSTCOM60117.2023.00124},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/MaGL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MaJZJYWF23,
  author       = {Chunyan Ma and
                  Jun Jiang and
                  Kai Zhang and
                  Zhengwei Jiang and
                  Peian Yang and
                  Xuren Wang and
                  Huamin Feng},
  title        = {FineCTI: {A} Framework for Mining Fine-grained Cyber Threat Information
                  from Twitter Using {NER} Model},
  booktitle    = {TrustCom},
  pages        = {531--538},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00085},
  doi          = {10.1109/TRUSTCOM60117.2023.00085},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/MaJZJYWF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MaW23,
  author       = {Pengwei Ma and
                  Chaolun Wang},
  title        = {Research on the Construction of Information System Stability Guarantee
                  Capability},
  booktitle    = {TrustCom},
  pages        = {2087--2091},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00289},
  doi          = {10.1109/TRUSTCOM60117.2023.00289},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/MaW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MacakOB23,
  author       = {Martin Mac{\'{a}}k and
                  Radek Oslejsek and
                  Barbora Buhnova},
  title        = {Detecting Masquerading Traitors from Process Visualization of Computer
                  Usage},
  booktitle    = {TrustCom},
  pages        = {1935--1940},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00263},
  doi          = {10.1109/TRUSTCOM60117.2023.00263},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/MacakOB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MakhdoomALFP23,
  author       = {Imran Makhdoom and
                  Mehran Abolhasan and
                  Justin Lipman and
                  Daniel Robert Franklin and
                  Massimo Piccardi},
  title        = {I2Map: IoT Device Attestation Using Integrity Map},
  booktitle    = {TrustCom},
  pages        = {1900--1907},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00258},
  doi          = {10.1109/TRUSTCOM60117.2023.00258},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/MakhdoomALFP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MatosLVALKOB23,
  author       = {Everton de Matos and
                  Conor Lennon and
                  Eduardo K. Viegas and
                  Markku Ahvenj{\"{a}}rvi and
                  Hannu Lyytinen and
                  Ivan Kuznetsov and
                  Joonas Onatsu and
                  Anh Huy Bui},
  title        = {Integrating VirtIO and {QEMU} on seL4 for Enhanced Devices Virtualization
                  Support},
  booktitle    = {TrustCom},
  pages        = {1076--1085},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00149},
  doi          = {10.1109/TRUSTCOM60117.2023.00149},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/MatosLVALKOB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MengWL23,
  author       = {Fanqiang Meng and
                  Jian Wang and
                  Boxiong Li},
  title        = {A Cooperative Lane Change Method for Connected and Automated Vehicles
                  Based on Reinforcement Learning},
  booktitle    = {TrustCom},
  pages        = {2152--2157},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00300},
  doi          = {10.1109/TRUSTCOM60117.2023.00300},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/MengWL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MilnerMASMK23,
  author       = {Helen Milner and
                  Md. Redowan Mahmud and
                  Mahbuba Afrin and
                  Sashowta G. Siddhartha and
                  Sajib Mistry and
                  Aneesh Krishna},
  title        = {On-graph Machine Learning-based Fraud Detection in Ethereum Cryptocurrency
                  Transactions},
  booktitle    = {TrustCom},
  pages        = {1279--1285},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00174},
  doi          = {10.1109/TRUSTCOM60117.2023.00174},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/MilnerMASMK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MitraTM23,
  author       = {Shaswata Mitra and
                  Stephen A. Torri and
                  Sudip Mittal},
  title        = {Survey of Malware Analysis through Control Flow Graph using Machine
                  Learning},
  booktitle    = {TrustCom},
  pages        = {1554--1561},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00212},
  doi          = {10.1109/TRUSTCOM60117.2023.00212},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/MitraTM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MokhtariONL23,
  author       = {Nassim Mokhtari and
                  Mohamed Outlouhou and
                  Alexis N{\'{e}}d{\'{e}}lec and
                  Pierre De Loor},
  title        = {Deep learning for graph analysis: application to online human activity
                  recognition},
  booktitle    = {TrustCom},
  pages        = {2720--2726},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00379},
  doi          = {10.1109/TRUSTCOM60117.2023.00379},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/MokhtariONL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MouraC23,
  author       = {Rafael Cabral de Moura and
                  Lucia Catabriga},
  title        = {Stabilized Finite Element Approximation for The Transient Darcy-Brinkman-Forchheimer
                  Model},
  booktitle    = {TrustCom},
  pages        = {2357--2364},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00332},
  doi          = {10.1109/TRUSTCOM60117.2023.00332},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/MouraC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MurilloMOS23,
  author       = {Andr{\'{e}}s F. Murillo and
                  Ayoub Messous and
                  Andikan Otung and
                  Motoyoshi Sekiya},
  title        = {Towards Trust-Centric Networking: {A} General Model for Trust Evaluation},
  booktitle    = {TrustCom},
  pages        = {704--711},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00105},
  doi          = {10.1109/TRUSTCOM60117.2023.00105},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/MurilloMOS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/NaYZWWLLL23,
  author       = {Liu Na and
                  Rui Yang and
                  Zhicheng Zang and
                  Yu Wang and
                  Chao Wu and
                  Xiaofei Li and
                  Zhendong Li and
                  Meng Li},
  title        = {A Big Data Sharing Architecture Based on Federal Learning in State
                  Grid},
  booktitle    = {TrustCom},
  pages        = {2082--2086},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00288},
  doi          = {10.1109/TRUSTCOM60117.2023.00288},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/NaYZWWLLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/NabavirazaviTSI23,
  author       = {Seyedsina Nabavirazavi and
                  Rahim Taheri and
                  Mohammad Shojafar and
                  Sundararaja Sitharama Iyengar},
  title        = {Impact of Aggregation Function Randomization against Model Poisoning
                  in Federated Learning},
  booktitle    = {TrustCom},
  pages        = {165--172},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00043},
  doi          = {10.1109/TRUSTCOM60117.2023.00043},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/NabavirazaviTSI23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/NagamatsuH23,
  author       = {Naoki Nagamatsu and
                  Yuko Hara{-}Azumi},
  title        = {Dynamic Split Computing-Aware Mixed-Precision Quantization for Efficient
                  Deep Edge Intelligence},
  booktitle    = {TrustCom},
  pages        = {2538--2545},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00355},
  doi          = {10.1109/TRUSTCOM60117.2023.00355},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/NagamatsuH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/NakamuraSI23,
  author       = {Toru Nakamura and
                  Yukiko Sawaya and
                  Takamasa Isohara},
  title        = {Survey on Recognition of Privacy Risk from Responding on Twitter},
  booktitle    = {TrustCom},
  pages        = {1774--1780},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00241},
  doi          = {10.1109/TRUSTCOM60117.2023.00241},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/NakamuraSI23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/NanQZTZL23,
  author       = {Zhefeng Nan and
                  Qian Qiang and
                  Tianning Zang and
                  Changbo Tian and
                  Shuyuan Zhao and
                  Shuhe Liu},
  title        = {Topology construction method of anti-tracking network based on cross-domain
                  decentralized gravity model},
  booktitle    = {TrustCom},
  pages        = {512--521},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00083},
  doi          = {10.1109/TRUSTCOM60117.2023.00083},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/NanQZTZL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/NosykKD23,
  author       = {Yevheniya Nosyk and
                  Maciej Korczynski and
                  Andrzej Duda},
  title        = {Guardians of {DNS} Integrity: {A} Remote Method for Identifying {DNSSEC}
                  Validators Across the Internet},
  booktitle    = {TrustCom},
  pages        = {1470--1479},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00201},
  doi          = {10.1109/TRUSTCOM60117.2023.00201},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/NosykKD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/NosykKGKLD23,
  author       = {Yevheniya Nosyk and
                  Maciej Korczynski and
                  Carlos Hernandez Ga{\~{n}}{\'{a}}n and
                  Michal Kr{\'{o}}l and
                  Qasim Lone and
                  Andrzej Duda},
  title        = {Don't Get Hijacked: Prevalence, Mitigation, and Impact of Non-Secure
                  {DNS} Dynamic Updates},
  booktitle    = {TrustCom},
  pages        = {1480--1489},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00202},
  doi          = {10.1109/TRUSTCOM60117.2023.00202},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/NosykKGKLD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/OliveiraSHVM23,
  author       = {Paulo R. de Oliveira and
                  Altair O. Santin and
                  Pedro Horchulhack and
                  Eduardo K. Viegas and
                  Everton de Matos},
  title        = {A Dynamic Network-based Intrusion Detection Model for Industrial Control
                  Systems},
  booktitle    = {TrustCom},
  pages        = {1496--1501},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00204},
  doi          = {10.1109/TRUSTCOM60117.2023.00204},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/OliveiraSHVM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/OnozawaFA23,
  author       = {Takumi Onozawa and
                  Hiroshi Fujimoto and
                  Takuya Azumi},
  title        = {Model-based Development for {ROS} 2-based Autonomous-driving Software},
  booktitle    = {TrustCom},
  pages        = {2511--2519},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00352},
  doi          = {10.1109/TRUSTCOM60117.2023.00352},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/OnozawaFA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PanQZWL23,
  author       = {Hengyu Pan and
                  Cheng Qu and
                  Haowen Zhang and
                  Shuo Wang and
                  Jing Li},
  title        = {HyperChain: {A} Dynamic State Sharding Protocol Supporting Smart Contracts
                  to Achieve Low Cross-Shard and Scalability},
  booktitle    = {TrustCom},
  pages        = {241--248},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00052},
  doi          = {10.1109/TRUSTCOM60117.2023.00052},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/PanQZWL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PanYLHJ23,
  author       = {Huazheng Pan and
                  Kun Yu and
                  Junyi Le and
                  Wenxin Hu and
                  Taojun Jin},
  title        = {Unlocking the Potentials of Transcriptomics in Predicting Pan Cancer
                  Immune Therapy Response: {A} Deep Learning Approach Using PHZNet},
  booktitle    = {TrustCom},
  pages        = {2742--2748},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00380},
  doi          = {10.1109/TRUSTCOM60117.2023.00380},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/PanYLHJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PanYYWQ23,
  author       = {Quanbo Pan and
                  Yang Yu and
                  Hanbing Yan and
                  Maoli Wang and
                  Bingzhi Qi},
  title        = {FlowBERT: An Encrypted Traffic Classification Model Based on Transformers
                  Using Flow Sequence},
  booktitle    = {TrustCom},
  pages        = {133--140},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00039},
  doi          = {10.1109/TRUSTCOM60117.2023.00039},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/PanYYWQ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PangCTVHB23,
  author       = {Bozheng Pang and
                  Tim Claeys and
                  Kristof T'Jonck and
                  Jens Vankeirsbilck and
                  Hans Hallez and
                  Jeroen Boydens},
  title        = {Simulation for Trade-off between Interference and Performance in a
                  Bluetooth Low Energy Network},
  booktitle    = {TrustCom},
  pages        = {2488--2494},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00349},
  doi          = {10.1109/TRUSTCOM60117.2023.00349},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/PangCTVHB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PangHAHZL23,
  author       = {Fengling Pang and
                  Chingfang Hsu and
                  Man Ho Au and
                  Lein Harn and
                  Ze Zhang and
                  Li Long},
  title        = {Efficient and Secure Authentication Key Establishment Protocol Using
                  Chaotic Map and {PUF} in Smart Environments},
  booktitle    = {TrustCom},
  pages        = {849--856},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00122},
  doi          = {10.1109/TRUSTCOM60117.2023.00122},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/PangHAHZL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PangVHB23,
  author       = {Bozheng Pang and
                  Jens Vankeirsbilck and
                  Hans Hallez and
                  Jeroen Boydens},
  title        = {Experimental Validation of Common Assumptions in Bluetooth Low Energy
                  Interference Studies},
  booktitle    = {TrustCom},
  pages        = {2495--2502},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00350},
  doi          = {10.1109/TRUSTCOM60117.2023.00350},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/PangVHB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PangWZJCZLZLW23,
  author       = {Weiwei Pang and
                  Kai Wei and
                  Yihui Zhang and
                  Chunyu Jiang and
                  Yang Cheng and
                  Qi Zhang and
                  Bin Liu and
                  Lifeng Zhang and
                  Tingting Liu and
                  Yinqian Wu},
  title        = {Research on Assessment System for Blockchain},
  booktitle    = {TrustCom},
  pages        = {2187--2192},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00306},
  doi          = {10.1109/TRUSTCOM60117.2023.00306},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/PangWZJCZLZLW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PengPFXSJ23,
  author       = {Haichuan Peng and
                  Linning Peng and
                  Hua Fu and
                  Lingnan Xie and
                  Junxian Shi and
                  Wentao Jing},
  title        = {Channel-Robust Radio Frequency Fingerprint Identification for {LTE}
                  Devices with Hybrid Feature},
  booktitle    = {TrustCom},
  pages        = {1416--1421},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00193},
  doi          = {10.1109/TRUSTCOM60117.2023.00193},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/PengPFXSJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PengWW23,
  author       = {Muyao Peng and
                  Kun Wang and
                  Yueli Wen},
  title        = {Pollutant Concentration Prediction Based on the Optimization of Long-Short
                  Distance in Space},
  booktitle    = {TrustCom},
  pages        = {2615--2620},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00365},
  doi          = {10.1109/TRUSTCOM60117.2023.00365},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/PengWW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Perez-PiquerasB23,
  author       = {V{\'{\i}}ctor P{\'{e}}rez{-}Piqueras and
                  Pablo Bermejo and
                  Jos{\'{e}} A. G{\'{a}}mez},
  title        = {Hybrid Multi-Objective Relinked {GRASP} for the constrained Next Release
                  Problem},
  booktitle    = {TrustCom},
  pages        = {2349--2356},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00331},
  doi          = {10.1109/TRUSTCOM60117.2023.00331},
  timestamp    = {Wed, 05 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Perez-PiquerasB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PhamWLMPH23,
  author       = {Nhu Minh Ngoc Pham and
                  Yixi Wu and
                  Carson K. Leung and
                  Mohammadafaz V. Munshi and
                  Vrushil Kiritkumar Patel and
                  Connor C. J. Hryhoruk},
  title        = {A Big Data Science and Engineering Solution for Transit Performance
                  Analytics},
  booktitle    = {TrustCom},
  pages        = {2295--2302},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00324},
  doi          = {10.1109/TRUSTCOM60117.2023.00324},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/PhamWLMPH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PimentelMY23,
  author       = {Juliano Pimentel and
                  Alistair A. McEwan and
                  Hong Qing Yu},
  title        = {A Comprehensive Machine Learning Methodology for Embedded Systems
                  {PHM}},
  booktitle    = {TrustCom},
  pages        = {1954--1959},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00266},
  doi          = {10.1109/TRUSTCOM60117.2023.00266},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/PimentelMY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PlatzerY23,
  author       = {Florian Platzer and
                  York Yannikos},
  title        = {Trust Assessment of a Darknet Marketplace},
  booktitle    = {TrustCom},
  pages        = {1806--1813},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00245},
  doi          = {10.1109/TRUSTCOM60117.2023.00245},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/PlatzerY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PooranianSARLL23,
  author       = {Zahra Pooranian and
                  Mohammad Shojafar and
                  Pedram Asef and
                  Matthew Robinson and
                  Harry Lees and
                  Mark Longden},
  title        = {{RCA-IDS:} {A} Novel Real-time Cloud-based Adversarial {IDS} for Connected
                  Vehicles},
  booktitle    = {TrustCom},
  pages        = {495--503},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00081},
  doi          = {10.1109/TRUSTCOM60117.2023.00081},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/PooranianSARLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PustozerovaBM23,
  author       = {Anastasia Pustozerova and
                  Jan Baumbach and
                  Rudolf Mayer},
  title        = {Analysing Utility Loss in Federated Learning with Differential Privacy},
  booktitle    = {TrustCom},
  pages        = {1230--1235},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00167},
  doi          = {10.1109/TRUSTCOM60117.2023.00167},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/PustozerovaBM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/QiaoXMLCZXL23,
  author       = {Jinjian Qiao and
                  Guoping Xu and
                  Ning Meng and
                  Feibi Lyu and
                  Xinzhou Cheng and
                  Jiajia Zhu and
                  Lexi Xu and
                  Liang Liu},
  title        = {Research on Diagnosis System of 5G Data Service Latency Problem},
  booktitle    = {TrustCom},
  pages        = {2181--2186},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00305},
  doi          = {10.1109/TRUSTCOM60117.2023.00305},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/QiaoXMLCZXL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/QinFLLS23,
  author       = {Zhongyuan Qin and
                  Jiarong Fan and
                  Zeru Li and
                  Xujian Liu and
                  Xin Sun},
  title        = {{CWGAN-GP:} Fuzzing Testcase Generation Method based on Conditional
                  Generative Adversarial Network},
  booktitle    = {TrustCom},
  pages        = {1286--1293},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00175},
  doi          = {10.1109/TRUSTCOM60117.2023.00175},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/QinFLLS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/QuQA023,
  author       = {Jiantao Qu and
                  Chunyu Qi and
                  Gaoyun An and
                  He},
  title        = {Multi-step Prediction of {LTE-R} Communication Quality based on {CA-TCN}
                  and Differential Evolution},
  booktitle    = {TrustCom},
  pages        = {1919--1924},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00261},
  doi          = {10.1109/TRUSTCOM60117.2023.00261},
  timestamp    = {Thu, 06 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/QuQA023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/RafiSM23,
  author       = {Amir Rafi and
                  Carlton Shepherd and
                  Konstantinos Markantonakis},
  title        = {A First Look at Digital Rights Management Systems for Secure Mobile
                  Content Delivery},
  booktitle    = {TrustCom},
  pages        = {549--558},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00087},
  doi          = {10.1109/TRUSTCOM60117.2023.00087},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/RafiSM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/RaiTM23,
  author       = {Vikash Kumar Rai and
                  Somanath Tripathy and
                  Jimson Mathew},
  title        = {{LPA:} {A} Lightweight PUF-based Authentication Protocol for IoT System},
  booktitle    = {TrustCom},
  pages        = {1712--1717},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00233},
  doi          = {10.1109/TRUSTCOM60117.2023.00233},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/RaiTM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/RajeshDSS23,
  author       = {Lochana Telugu Rajesh and
                  Tapadhir Das and
                  Raj Mani Shukla and
                  Shamik Sengupta},
  title        = {Give and Take: Federated Transfer Learning for Industrial IoT Network
                  Intrusion Detection},
  booktitle    = {TrustCom},
  pages        = {2365--2371},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00333},
  doi          = {10.1109/TRUSTCOM60117.2023.00333},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/RajeshDSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/RamamoorthyS023,
  author       = {Jayanthi Ramamoorthy and
                  Narasimha K. Shashidhar and
                  Bing Zhou},
  title        = {Anomaly based malware threat detection on Linux Systems},
  booktitle    = {TrustCom},
  pages        = {1744--1750},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00237},
  doi          = {10.1109/TRUSTCOM60117.2023.00237},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/RamamoorthyS023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/RamezanianG23,
  author       = {Sara Ramezanian and
                  Christian Gehrmann},
  title        = {Practical Privacy-Preserving Ride Sharing Protocol with Symmetric
                  Key},
  booktitle    = {TrustCom},
  pages        = {1718--1727},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00234},
  doi          = {10.1109/TRUSTCOM60117.2023.00234},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/RamezanianG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/RattiSN23,
  author       = {Ritesh Ratti and
                  Sanasam Ranbir Singh and
                  Sukumar Nandi},
  title        = {Protocol Aware Unsupervised Network Intrusion Detection System},
  booktitle    = {TrustCom},
  pages        = {1524--1531},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00208},
  doi          = {10.1109/TRUSTCOM60117.2023.00208},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/RattiSN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/RattiSN23a,
  author       = {Ritesh Ratti and
                  Sanasam Ranbir Singh and
                  Sukumar Nandi},
  title        = {Network based Intrusion Detection using Time aware {LSTM} Autoencoder},
  booktitle    = {TrustCom},
  pages        = {2570--2578},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00359},
  doi          = {10.1109/TRUSTCOM60117.2023.00359},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/RattiSN23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/RaultI023,
  author       = {Pierre{-}Antoine Rault and
                  Claudia{-}Lavinia Ignat and
                  Olivier Perrin},
  title        = {Access Control based on CRDTs for Collaborative Distributed Applications},
  booktitle    = {TrustCom},
  pages        = {1369--1376},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00187},
  doi          = {10.1109/TRUSTCOM60117.2023.00187},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/RaultI023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/RegeciovaK23,
  author       = {Dominika Reg{\'{e}}ciov{\'{a}} and
                  Dusan Kol{\'{a}}r},
  title        = {GenRex: Leveraging Regular Expressions for Dynamic Malware Detection},
  booktitle    = {TrustCom},
  pages        = {857--864},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00123},
  doi          = {10.1109/TRUSTCOM60117.2023.00123},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/RegeciovaK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/RenLXW23,
  author       = {Jie Ren and
                  Lin Lin and
                  Miao Xue and
                  Zelin Wang},
  title        = {Application Scenarios of Confidential Computing in Satellite Internet},
  booktitle    = {TrustCom},
  pages        = {2024--2029},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00278},
  doi          = {10.1109/TRUSTCOM60117.2023.00278},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/RenLXW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/RenM0Y23,
  author       = {Zhiwen Ren and
                  Zehua Ma and
                  Weiming Zhang and
                  Nenghai Yu},
  title        = {{SPSW:} Database Watermarking Based on Fake Tuples and Sparse Priority
                  Strategy},
  booktitle    = {TrustCom},
  pages        = {896--903},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00128},
  doi          = {10.1109/TRUSTCOM60117.2023.00128},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/RenM0Y23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ReyesHWP23,
  author       = {David Pineda Reyes and
                  Josiah Hsu and
                  Claire Wagner and
                  Devin J. Pohly},
  title        = {Dynamic Security Parameters for Multichannel Secret Sharing Protocols},
  booktitle    = {TrustCom},
  pages        = {1667--1672},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00227},
  doi          = {10.1109/TRUSTCOM60117.2023.00227},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ReyesHWP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Rodriguez-Iglesias23,
  author       = {Alonso Rodr{\'{\i}}guez{-}Iglesias and
                  Mar{\'{\i}}a J. Mart{\'{\i}}n and
                  Juan Touri{\~{n}}o},
  title        = {Clupiter: a Raspberry Pi mini-supercomputer for educational purposes},
  booktitle    = {TrustCom},
  pages        = {2400--2405},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00338},
  doi          = {10.1109/TRUSTCOM60117.2023.00338},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Rodriguez-Iglesias23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/RongaliMN23,
  author       = {Bhaskar Rongali and
                  Satyajit Mohapatra and
                  Sanjeet Kumar Nayak},
  title        = {A Secure Contactless Payment System with Bidirectional Blockchain
                  and Blake Hash Function},
  booktitle    = {TrustCom},
  pages        = {318--325},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00061},
  doi          = {10.1109/TRUSTCOM60117.2023.00061},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/RongaliMN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/RuhlandKS23,
  author       = {Fabian Ruhland and
                  Filip Krakowski and
                  Michael Sch{\"{o}}ttner},
  title        = {Transparent network acceleration for big data computing in Java},
  booktitle    = {TrustCom},
  pages        = {2406--2413},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00339},
  doi          = {10.1109/TRUSTCOM60117.2023.00339},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/RuhlandKS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Saadat23,
  author       = {Shahriar Saadat},
  title        = {The Impact of {EMI} on Security Access Control in Datacenter Data
                  Halls},
  booktitle    = {TrustCom},
  pages        = {1400--1407},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00191},
  doi          = {10.1109/TRUSTCOM60117.2023.00191},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Saadat23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SachidanandaMYL23,
  author       = {Vinay Sachidananda and
                  Sivaanandh Muneeswaran and
                  Liu Yang and
                  Kwok{-}Yan Lam},
  title        = {Do NoT Open {(DOT):} {A} Unified Generic and Specialized Models for
                  Detecting Malicious Email Attachments},
  booktitle    = {TrustCom},
  pages        = {412--421},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00072},
  doi          = {10.1109/TRUSTCOM60117.2023.00072},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SachidanandaMYL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SahiLKSMAF23,
  author       = {Louis Fortune Sahi and
                  Romain Laborde and
                  Mohamed Ali Kandi and
                  Michelle Sibilla and
                  Giorgia Macilotti and
                  Benzekri Abdelmalek and
                  Afonso Ferreira},
  title        = {Towards Reliable Collaborative Data Processing Ecosystems: Survey
                  on Data Quality Criteria},
  booktitle    = {TrustCom},
  pages        = {2456--2464},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00345},
  doi          = {10.1109/TRUSTCOM60117.2023.00345},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SahiLKSMAF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Saint-JoreSC23,
  author       = {Amaury Saint{-}Jore and
                  Ye{-}Qiong Song and
                  Laurent Ciarletta},
  title        = {{HMAS:} enabling seamless collaboration between drones, quadruped
                  robots, and human operators with efficient spatial awareness},
  booktitle    = {TrustCom},
  pages        = {2503--2510},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00351},
  doi          = {10.1109/TRUSTCOM60117.2023.00351},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Saint-JoreSC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SakaAS23,
  author       = {Samed Saka and
                  Ali Al{-}Ataby and
                  Valerio Selis},
  title        = {Generating Synthetic Tabular Data for DDoS Detection Using Generative
                  Models},
  booktitle    = {TrustCom},
  pages        = {1436--1442},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00196},
  doi          = {10.1109/TRUSTCOM60117.2023.00196},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SakaAS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SandaPV23,
  author       = {Pranitha Sanda and
                  Digambar Pawar and
                  Radha Vedala},
  title        = {WiDeS: Wiping Detection using System-calls - An Anti-Forensic Resistant
                  Approach},
  booktitle    = {TrustCom},
  pages        = {1695--1703},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00231},
  doi          = {10.1109/TRUSTCOM60117.2023.00231},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SandaPV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SandeepaS0L23,
  author       = {Chamara Sandeepa and
                  Bartlomiej Siniarski and
                  Shen Wang and
                  Madhusanka Liyanage},
  title        = {{FL-TIA:} Novel Time Inference Attacks on Federated Learning},
  booktitle    = {TrustCom},
  pages        = {173--180},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00044},
  doi          = {10.1109/TRUSTCOM60117.2023.00044},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SandeepaS0L23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SarkerSB23,
  author       = {Orvila Sarker and
                  Hong Shen and
                  M. Ali Babar},
  title        = {Reinforcement Learning Based Neighbour Selection for {VANET} with
                  Adaptive Trust Management},
  booktitle    = {TrustCom},
  pages        = {585--594},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00091},
  doi          = {10.1109/TRUSTCOM60117.2023.00091},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SarkerSB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Shahzad0B23,
  author       = {Mohammad Shahzad and
                  Lu Liu and
                  Nacer Belkout},
  title        = {Control Overhead Reduction using Length-based Same Destination Aggregation
                  for Large Scale Software Defined Networks in Next Generation Internet
                  of Things},
  booktitle    = {TrustCom},
  pages        = {2303--2309},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00325},
  doi          = {10.1109/TRUSTCOM60117.2023.00325},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Shahzad0B23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ShangLHQLF23,
  author       = {Ketong Shang and
                  Fang Lu and
                  Ke Huang and
                  Yu Qin and
                  Wei Li and
                  Wei Feng},
  title        = {Cluster Nodes Integrity Attestation and Monitoring Scheme for Confidential
                  Computing Platform},
  booktitle    = {TrustCom},
  pages        = {740--749},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00109},
  doi          = {10.1109/TRUSTCOM60117.2023.00109},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ShangLHQLF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ShatiHD23,
  author       = {Asmaa Shati and
                  Ghulam Mubashar Hassan and
                  Amitava Datta},
  title        = {{COVID-19} Detection System: {A} Comparative Analysis of System Performance
                  Based on Acoustic Features of Cough Audio Signals},
  booktitle    = {TrustCom},
  pages        = {2706--2713},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00377},
  doi          = {10.1109/TRUSTCOM60117.2023.00377},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ShatiHD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/She0W23,
  author       = {Jinze She and
                  Wenhao Wang and
                  Zihao Wang},
  title        = {The Dynamic Paradox: How Layer-skipping DNNs Amplify Cache Side-Channel
                  Leakages},
  booktitle    = {TrustCom},
  pages        = {46--53},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00029},
  doi          = {10.1109/TRUSTCOM60117.2023.00029},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/She0W23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SheikhjaberiA23,
  author       = {Mehrdad Sheikhjaberi and
                  Dima Alhadidi},
  title        = {Reducing Model Memorization to Mitigate Membership Inference Attacks},
  booktitle    = {TrustCom},
  pages        = {79--88},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00033},
  doi          = {10.1109/TRUSTCOM60117.2023.00033},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SheikhjaberiA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ShenF23,
  author       = {Chenkai Shen and
                  Lei Fan},
  title        = {Pldb: Protecting LSM-based Key-Value Store using Trusted Execution
                  Environment},
  booktitle    = {TrustCom},
  pages        = {762--771},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00111},
  doi          = {10.1109/TRUSTCOM60117.2023.00111},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ShenF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ShenWYCSGLFLL23,
  author       = {Jinhu Shen and
                  Rui Wang and
                  Mingjie Yang and
                  Liang Cui and
                  Ao Shen and
                  Bao Guo and
                  Jiayu Li and
                  Yuan Fang and
                  Pengcheng Liu and
                  Jimin Ling},
  title        = {RedCap In-depth Research and Market Development Prospect},
  booktitle    = {TrustCom},
  pages        = {2036--2041},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00280},
  doi          = {10.1109/TRUSTCOM60117.2023.00280},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ShenWYCSGLFLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ShiD23,
  author       = {Quan Shi and
                  Kaiyuan Deng},
  title        = {Privacy-Preserving Detection Method for Transmission Line Based on
                  Edge Collaboration},
  booktitle    = {TrustCom},
  pages        = {1798--1805},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00244},
  doi          = {10.1109/TRUSTCOM60117.2023.00244},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ShiD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Sibahee0ZHA23,
  author       = {Mustafa A. Al Sibahee and
                  Chengwen Luo and
                  Jin Zhang and
                  Yijing Huang and
                  Zaid Ameen Abduljabbar},
  title        = {Dynamic Searchable Scheme with Forward Privacy for Encrypted Document
                  Similarity},
  booktitle    = {TrustCom},
  pages        = {1653--1660},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00225},
  doi          = {10.1109/TRUSTCOM60117.2023.00225},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Sibahee0ZHA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SongLLQWF23,
  author       = {Wanying Song and
                  Ying Lu and
                  Jin Liu and
                  Zilu Qin and
                  Xiaodan Wang and
                  Yanfang Fu},
  title        = {Research on {UAV} Obstacle Avoidance Method Based on Virtual-real
                  Combination Technology},
  booktitle    = {TrustCom},
  pages        = {2776--2780},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00387},
  doi          = {10.1109/TRUSTCOM60117.2023.00387},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SongLLQWF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SongYZYL23,
  author       = {Bo Song and
                  Yunpeng Yi and
                  Ting Zhou and
                  Junfeng Yang and
                  Lei Liu},
  title        = {Undermining License Plate Recognition: {A} Data Poisoning Attack},
  booktitle    = {TrustCom},
  pages        = {72--78},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00032},
  doi          = {10.1109/TRUSTCOM60117.2023.00032},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SongYZYL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Spalding0B23,
  author       = {Aidan Spalding and
                  Zhiyuan Tan and
                  Kehinde O. Babaagba},
  title        = {Challenges and Considerations in Data Recovery from Solid State Media:
                  {A} Comparative Analysis with Traditional Devices},
  booktitle    = {TrustCom},
  pages        = {1751--1756},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00238},
  doi          = {10.1109/TRUSTCOM60117.2023.00238},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Spalding0B23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Spanier0H23,
  author       = {Adam Spanier and
                  Rui Zhao and
                  Pei{-}Chi Huang},
  title        = {Securing Zero Trust Networks: the Decentralized Host-to-Host Authentication
                  Policy Enforcement},
  booktitle    = {TrustCom},
  pages        = {1518--1523},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00207},
  doi          = {10.1109/TRUSTCOM60117.2023.00207},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Spanier0H23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SrivastavaAC23,
  author       = {Sandeep Srivastava and
                  Deepshikha Agarwal and
                  Brijesh Chaurasia},
  title        = {Secure Decentralized Identity Management using Blockchain},
  booktitle    = {TrustCom},
  pages        = {1355--1360},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00185},
  doi          = {10.1109/TRUSTCOM60117.2023.00185},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SrivastavaAC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SuBZ23,
  author       = {Jingwen Su and
                  Xiangyu Bai and
                  Kexin Zhou},
  title        = {Analysis and Comparison of Delay Tolerant Network Security Issues
                  and Solutions},
  booktitle    = {TrustCom},
  pages        = {1512--1517},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00206},
  doi          = {10.1109/TRUSTCOM60117.2023.00206},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SuBZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SuLGL0H23,
  author       = {Liuxing Su and
                  Zhenzhen Li and
                  Gaopeng Gou and
                  Zhen Li and
                  Gang Xiong and
                  Chengshang Hou},
  title        = {{MENDER:} Multi-level Feature Fusion Discovery Framework for Exposed
                  {ICS} Remote Management Devices in the Wild},
  booktitle    = {TrustCom},
  pages        = {1173--1180},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00160},
  doi          = {10.1109/TRUSTCOM60117.2023.00160},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SuLGL0H23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SuW23,
  author       = {Lingvue Su and
                  Yongli Wang},
  title        = {High-knowledge shilling attack detection method based on genetic co-forest},
  booktitle    = {TrustCom},
  pages        = {660--667},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00100},
  doi          = {10.1109/TRUSTCOM60117.2023.00100},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SuW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SuWGL23,
  author       = {Linlin Su and
                  Jinyan Wang and
                  Zeming Gan and
                  Xianxian Li},
  title        = {{FINDER:} {A} Simple and Effective Defender against Unnoticeable Graph
                  Injection Attacks},
  booktitle    = {TrustCom},
  pages        = {125--132},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00038},
  doi          = {10.1109/TRUSTCOM60117.2023.00038},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SuWGL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SunPLST23,
  author       = {Bowen Sun and
                  Xin Peng and
                  Saisai Li and
                  Jiaxin Sun and
                  Haochuan Tian},
  title        = {Ergonomic Design of Precise Percutaneous Robot for Substantial Organs
                  Based on {JACK} Simulation},
  booktitle    = {TrustCom},
  pages        = {2755--2762},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00384},
  doi          = {10.1109/TRUSTCOM60117.2023.00384},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SunPLST23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SunWLF0023,
  author       = {Xiuwen Sun and
                  Zhihao Wu and
                  Jing Lin and
                  Pengfei Fu and
                  Jie Cui and
                  Hong Zhong},
  title        = {Extracting Length Field of Unknown Binary Network Protocol from Static
                  Trace},
  booktitle    = {TrustCom},
  pages        = {462--469},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00077},
  doi          = {10.1109/TRUSTCOM60117.2023.00077},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SunWLF0023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SunXWWLZL23,
  author       = {Degang Sun and
                  Guokun Xu and
                  Weijie Wang and
                  Yan Wang and
                  Qiujian Lv and
                  Xinxing Zhou and
                  Zhiqi Li},
  title        = {{LWVN:} {A} Lightweight Virtual Network View Method to Defend Lateral
                  Movement},
  booktitle    = {TrustCom},
  pages        = {1214--1221},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00165},
  doi          = {10.1109/TRUSTCOM60117.2023.00165},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SunXWWLZL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SunZWY0023,
  author       = {Xiuwen Sun and
                  Guangzheng Zhang and
                  Di Wu and
                  Qingying Yu and
                  Jie Cui and
                  Hong Zhong},
  title        = {Parallel Pattern Matching over Brotli Compressed Network Traffic},
  booktitle    = {TrustCom},
  pages        = {477--484},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00079},
  doi          = {10.1109/TRUSTCOM60117.2023.00079},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SunZWY0023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TajimaMA23,
  author       = {Yuta Tajima and
                  Tatsuya Miki and
                  Takuya Azumi},
  title        = {Performance Evaluation Framework for Arbitrary Nodes of Autonomous-driving
                  Systems},
  booktitle    = {TrustCom},
  pages        = {2520--2529},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00353},
  doi          = {10.1109/TRUSTCOM60117.2023.00353},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/TajimaMA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TamimeFSM023,
  author       = {Reham Al Tamime and
                  Ali Farooq and
                  Joni Salminen and
                  Vincent Marmion and
                  Wendy Hall},
  title        = {Understanding Privacy Concerns in Mobile Health Applications: {A}
                  Scenario-based Online Survey},
  booktitle    = {TrustCom},
  pages        = {1757--1765},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00239},
  doi          = {10.1109/TRUSTCOM60117.2023.00239},
  timestamp    = {Thu, 06 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/TamimeFSM023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TangZZFJ23,
  author       = {Xin Tang and
                  Yiteng Zhou and
                  Yudan Zhu and
                  Mingjun Fu and
                  Luchao Jin},
  title        = {Random Chunks Generation Attack Resistant Cross-User Deduplication
                  for Cloud Storage},
  booktitle    = {TrustCom},
  pages        = {1022--1030},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00143},
  doi          = {10.1109/TRUSTCOM60117.2023.00143},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/TangZZFJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TengLQPF23,
  author       = {Yiping Teng and
                  Lei Liu and
                  Jiawei Qi and
                  Haochun Pan and
                  Chunlong Fan},
  title        = {VMR-Tree: Efficient and Verifiable Location-based kNN Queries on Blockchain},
  booktitle    = {TrustCom},
  pages        = {342--351},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00064},
  doi          = {10.1109/TRUSTCOM60117.2023.00064},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/TengLQPF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TengQLWXF23,
  author       = {Yiping Teng and
                  Jiawei Qi and
                  Lei Liu and
                  Shiqing Wang and
                  Li Xu and
                  Chunlong Fan},
  title        = {Secure Synchronized Spatio-Temporal Trajectory Similarity Search},
  booktitle    = {TrustCom},
  pages        = {964--973},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00136},
  doi          = {10.1109/TRUSTCOM60117.2023.00136},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/TengQLWXF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TianGJLF023,
  author       = {Tian Tian and
                  Yiru Gong and
                  Bo Jiang and
                  Junrong Liu and
                  Huamin Feng and
                  Zhigang Lu},
  title        = {Insider Threat Detection Based On Heterogeneous Graph Neural Network},
  booktitle    = {TrustCom},
  pages        = {628--635},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00096},
  doi          = {10.1109/TRUSTCOM60117.2023.00096},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/TianGJLF023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TianLLWK23,
  author       = {Cheng Tian and
                  Song Liu and
                  Jinbao Li and
                  Guangchen Wang and
                  Luyue Kong},
  title        = {A residual attention-based privacy-preserving biometrics model of
                  transcriptome prediction from genome},
  booktitle    = {TrustCom},
  pages        = {2781--2788},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00388},
  doi          = {10.1109/TRUSTCOM60117.2023.00388},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/TianLLWK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TianMWW23,
  author       = {Jiafeng Tian and
                  Pengwei Ma and
                  Chaolun Wang and
                  Zhuo Wang},
  title        = {Research on Development of Data Disaster Recovery System},
  booktitle    = {TrustCom},
  pages        = {2210--2215},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00310},
  doi          = {10.1109/TRUSTCOM60117.2023.00310},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/TianMWW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TianRXFGH23,
  author       = {Geng Tian and
                  Amir Rehman and
                  Huanlai Xing and
                  Li Feng and
                  Nighat Gulzar and
                  Abid Hussain},
  title        = {Automatic Intelligent Chronic Kidney Disease Detection in Healthcare
                  5.0},
  booktitle    = {TrustCom},
  pages        = {2134--2140},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00297},
  doi          = {10.1109/TRUSTCOM60117.2023.00297},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/TianRXFGH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TidreaK23,
  author       = {Alexandra Tidrea and
                  Adrian Korodi},
  title        = {{ECC} Implementation and Performance Evaluation for Securing {OPC}
                  {UA} Communication},
  booktitle    = {TrustCom},
  pages        = {1704--1711},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00232},
  doi          = {10.1109/TRUSTCOM60117.2023.00232},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/TidreaK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TrivediB23,
  author       = {Alok Kumar Trivedi and
                  Priyanka Bagade},
  title        = {{PANGA:} Attention-based Principal Neighborhood Aggregation for Forecasting
                  Future Cyber Attacks},
  booktitle    = {TrustCom},
  pages        = {569--576},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00089},
  doi          = {10.1109/TRUSTCOM60117.2023.00089},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/TrivediB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Tusko0L23,
  author       = {Gergely Tusk{\'{o}} and
                  Weizhi Meng and
                  Brooke Lampe},
  title        = {Look Closer to Touch Behavior-enabled Android Pattern Locks: {A} Study
                  in the Wild},
  booktitle    = {TrustCom},
  pages        = {1196--1205},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00163},
  doi          = {10.1109/TRUSTCOM60117.2023.00163},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Tusko0L23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/VeltmanPM23,
  author       = {Melker Veltman and
                  Alexandra Parkegren and
                  Victor Morel},
  title        = {Putting a Padlock on Lambda - Integrating vTPMs into {AWS} Firecracker},
  booktitle    = {TrustCom},
  pages        = {1377--1384},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00188},
  doi          = {10.1109/TRUSTCOM60117.2023.00188},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/VeltmanPM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/VilalongaRD23,
  author       = {Jo{\~{a}}o Afonso Vilalonga and
                  Jo{\~{a}}o S. Resende and
                  Henrique Domingos},
  title        = {TorKameleon: Improving Tor's Censorship Resistance with K-anonymization
                  and Media-based Covert Channels},
  booktitle    = {TrustCom},
  pages        = {1490--1495},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00203},
  doi          = {10.1109/TRUSTCOM60117.2023.00203},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/VilalongaRD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/VyasPS23,
  author       = {Sankalp Vyas and
                  Amar Nath Patra and
                  Raj Mani Shukla},
  title        = {Histopathological Image Classification and Vulnerability Analysis
                  using Federated Learning},
  booktitle    = {TrustCom},
  pages        = {2372--2377},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00334},
  doi          = {10.1109/TRUSTCOM60117.2023.00334},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/VyasPS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Wang0C0W23,
  author       = {Xiaoqian Wang and
                  Cheng Wang and
                  Yuqian Cai and
                  Xiaoyan Zhao and
                  Weidong Wang},
  title        = {Coexistence Analysis of 10-10.5 GHz {IMT} and {EESS} (passive) Systems},
  booktitle    = {TrustCom},
  pages        = {1999--2004},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00274},
  doi          = {10.1109/TRUSTCOM60117.2023.00274},
  timestamp    = {Thu, 06 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Wang0C0W23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangCLWSF23,
  author       = {Meiqi Wang and
                  Muqian Chen and
                  Zeyu Li and
                  Xuebin Wang and
                  Jinqiao Shi and
                  Binxing Fang},
  title        = {Deanonymize Tor Hidden Services Using Remote Website Fingerprinting},
  booktitle    = {TrustCom},
  pages        = {998--1005},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00140},
  doi          = {10.1109/TRUSTCOM60117.2023.00140},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangCLWSF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangCOLCGLBWL23,
  author       = {Shoufeng Wang and
                  Hua{-}Min Chen and
                  Ye Ouyang and
                  Fan Li and
                  Xuan Chen and
                  Jianchao Guo and
                  Yun Li and
                  Sen Bian and
                  Xidong Wang and
                  You Lu},
  title        = {Elastic Digital Twin Network Modeling toward Restraining Resource
                  Occupation},
  booktitle    = {TrustCom},
  pages        = {2240--2245},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00315},
  doi          = {10.1109/TRUSTCOM60117.2023.00315},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangCOLCGLBWL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangCOLCGLBWR23,
  author       = {Shoufeng Wang and
                  Hua{-}Min Chen and
                  Ye Ouyang and
                  Fan Li and
                  Xuan Chen and
                  Jianchao Guo and
                  Yun Li and
                  Sen Bian and
                  Xidong Wang and
                  Zhidong Ren},
  title        = {Constellation Autonomy Modeling for Agile on-Orbit Communication and
                  Computing},
  booktitle    = {TrustCom},
  pages        = {2012--2017},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00276},
  doi          = {10.1109/TRUSTCOM60117.2023.00276},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangCOLCGLBWR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangCOLCMLBR23,
  author       = {Shoufeng Wang and
                  Hua{-}Min Chen and
                  Ye Ouyang and
                  Fan Li and
                  Xuan Chen and
                  Limeng Ma and
                  Zhanwu Li and
                  Sen Bian and
                  Zhidong Ren},
  title        = {Evaluation of Distributed Collaborative Learning Approach for 5G Network
                  Data Analytics Function},
  booktitle    = {TrustCom},
  pages        = {2058--2063},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00284},
  doi          = {10.1109/TRUSTCOM60117.2023.00284},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangCOLCMLBR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangFZLL23,
  author       = {Liming Wang and
                  Jiaxing Fan and
                  Fengzhe Zhong and
                  Yan Liu and
                  Jinyang Liu},
  title        = {Anomaly Detection in Dynamic Networks through Edge-Tight Structure
                  Embedding},
  booktitle    = {TrustCom},
  pages        = {644--651},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00098},
  doi          = {10.1109/TRUSTCOM60117.2023.00098},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangFZLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangGCWXWWML23,
  author       = {Yue Wang and
                  Wei Gao and
                  Xinzhou Cheng and
                  Xin Wang and
                  Lexi Xu and
                  Siwei Wang and
                  Yuanguang Wang and
                  Fanyu Meng and
                  Kunyan Li},
  title        = {User Relationship Discovery Based on Telecom Data},
  booktitle    = {TrustCom},
  pages        = {2076--2081},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00287},
  doi          = {10.1109/TRUSTCOM60117.2023.00287},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangGCWXWWML23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangGCWZXX23,
  author       = {Yue Wang and
                  Wei Gao and
                  Xinzhou Cheng and
                  Xin Wang and
                  Huiying Zhao and
                  Zhipu Xie and
                  Lexi Xu},
  title        = {Multi-Granularity Cross-Attention Network for Visual Question Answering},
  booktitle    = {TrustCom},
  pages        = {2098--2103},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00291},
  doi          = {10.1109/TRUSTCOM60117.2023.00291},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangGCWZXX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangHSWLW23,
  author       = {Lianhai Wang and
                  Qihao Huang and
                  Wei Shao and
                  Jinpeng Wang and
                  Xiaoqian Liu and
                  Fansheng Wang},
  title        = {Felix: {A} Model of Detecting Off-chain Abnormal States in Decentralized
                  Applications},
  booktitle    = {TrustCom},
  pages        = {275--283},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00056},
  doi          = {10.1109/TRUSTCOM60117.2023.00056},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangHSWLW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangHYZ23,
  author       = {Jinning Wang and
                  Xinyuan Huang and
                  Zichu Yang and
                  Weiran Zhao},
  title        = {Construction of Artificial Intelligence Generated Content in Digital
                  Film Production},
  booktitle    = {TrustCom},
  pages        = {2621--2628},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00366},
  doi          = {10.1109/TRUSTCOM60117.2023.00366},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangHYZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangHZCGZYCC23,
  author       = {Tianyi Wang and
                  Yuhui Han and
                  Wei Zhang and
                  Xinzhou Cheng and
                  Jie Gao and
                  Qingqing Zhang and
                  Qijiao Yang and
                  Fengqiang Chen and
                  Chen Cheng},
  title        = {Address Localization Method Based on Data Fusion of Core Network and
                  Radio Access Network},
  booktitle    = {TrustCom},
  pages        = {2263--2268},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00319},
  doi          = {10.1109/TRUSTCOM60117.2023.00319},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangHZCGZYCC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangLSHWSX23,
  author       = {Hao Wang and
                  Yun Liu and
                  Zhiqun Song and
                  Bing Hu and
                  Zikai Wang and
                  Ruiliang Song and
                  Pei Xiao},
  title        = {A Low Complexity And Efficient Algorithm for {LEO} Satellite Routing},
  booktitle    = {TrustCom},
  pages        = {1974--1979},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00269},
  doi          = {10.1109/TRUSTCOM60117.2023.00269},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangLSHWSX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangLV23,
  author       = {Chenzhuo Wang and
                  Yanrong Lu and
                  Athanasios V. Vasilakos},
  title        = {Scalable Federated Learning for Fingerprint Recognition Algorithm},
  booktitle    = {TrustCom},
  pages        = {181--188},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00045},
  doi          = {10.1109/TRUSTCOM60117.2023.00045},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangLV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangLZXWL23,
  author       = {Haonan Wang and
                  Lixiang Liu and
                  Xin Zhou and
                  Lexi Xu and
                  Guangyang Wu and
                  Shuaijun Liu},
  title        = {Deep Reinforcement Learning Based Interference Avoidance Beam-Hopping
                  Allocation Algorithm in Multi-beam Satellite Systems},
  booktitle    = {TrustCom},
  pages        = {1966--1973},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00268},
  doi          = {10.1109/TRUSTCOM60117.2023.00268},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangLZXWL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangS0LWY23,
  author       = {Fangwei Wang and
                  Ruixin Song and
                  Zhiyuan Tan and
                  Qingru Li and
                  Changguang Wang and
                  Yong Yang},
  title        = {Self-attention is What You Need to Fool a Speaker Recognition System},
  booktitle    = {TrustCom},
  pages        = {929--936},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00132},
  doi          = {10.1109/TRUSTCOM60117.2023.00132},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangS0LWY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangT0TYW023,
  author       = {Jinzhao Wang and
                  Wenlong Tian and
                  Ruixuan Li and
                  Junwei Tang and
                  Xuming Ye and
                  Yaping Wan and
                  Zhiyong Xu},
  title        = {Sym-Fed: Unleashing the Power of Symmetric Encryption in Cross-Silo
                  Federated Learning},
  booktitle    = {TrustCom},
  pages        = {833--840},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00120},
  doi          = {10.1109/TRUSTCOM60117.2023.00120},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangT0TYW023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangWL23,
  author       = {Hanyu Wang and
                  Liming Wang and
                  Hongjia Li},
  title        = {Byzantine-Robust Federated Learning through Dynamic Clustering},
  booktitle    = {TrustCom},
  pages        = {222--230},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00050},
  doi          = {10.1109/TRUSTCOM60117.2023.00050},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangWL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangWZ23,
  author       = {Xingyu Wang and
                  Wenkun and
                  Yingdan Zhang},
  title        = {Network Attack Identification and Analysis Based on Graph Convolutional
                  Neural Network},
  booktitle    = {TrustCom},
  pages        = {1443--1448},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00197},
  doi          = {10.1109/TRUSTCOM60117.2023.00197},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangWZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangXYW23,
  author       = {Zhixuan Wang and
                  Guangping Xu and
                  Hongzhang Yang and
                  Yulei Wu},
  title        = {Towards Survivable In-Memory Stores with Parity Coded {NVRAM}},
  booktitle    = {TrustCom},
  pages        = {956--963},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00135},
  doi          = {10.1109/TRUSTCOM60117.2023.00135},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangXYW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangYHMLM23,
  author       = {Chaolun Wang and
                  Jiaxing Yang and
                  Xiaolu Han and
                  Jianrui Ma and
                  Siyuan Liu and
                  Pengwei Ma},
  title        = {Research on Distributed Database Stability Testing Platform based
                  on Chaos Engineering},
  booktitle    = {TrustCom},
  pages        = {2092--2097},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00290},
  doi          = {10.1109/TRUSTCOM60117.2023.00290},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangYHMLM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangZ0CLXQZX23,
  author       = {Zhaoning Wang and
                  Jiajia Zhu and
                  Bo Cheng and
                  Xinzhou Cheng and
                  Feibi Lyu and
                  Guoping Xu and
                  Jinjian Qiao and
                  Lu Zhi and
                  Tian Xiao},
  title        = {An AI-driven Dockerized Lightweight Framework for Smart Home Service
                  Orchestration},
  booktitle    = {TrustCom},
  pages        = {2122--2127},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00295},
  doi          = {10.1109/TRUSTCOM60117.2023.00295},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangZ0CLXQZX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangZLY23,
  author       = {Jiuzheng Wang and
                  Ruilin Zhang and
                  Xinyi Li and
                  Hao Yin},
  title        = {FedJudge: Blockchain-based full-lifecycle trustworthy federated learning
                  incentive mechanism},
  booktitle    = {TrustCom},
  pages        = {361--368},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00066},
  doi          = {10.1109/TRUSTCOM60117.2023.00066},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangZLY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangZS0LB23,
  author       = {Haoxiang Wang and
                  Yu'Ang Zhang and
                  Yujie Song and
                  Yue Cao and
                  Chee Yen Leow and
                  Shihan Bao},
  title        = {{SRBR:} Anti-selfish Routing Based on Social Similarity and Reputation
                  Using Fuzzy Logic},
  booktitle    = {TrustCom},
  pages        = {577--584},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00090},
  doi          = {10.1109/TRUSTCOM60117.2023.00090},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangZS0LB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WaniZS23,
  author       = {Shusuke Wani and
                  Xiaokang Zhou and
                  Shohei Shimizu},
  title        = {BiLSTM and {VAE} Enhanced Multi-Task Neural Network for Trust-Aware
                  E-Commerce Product Analysis},
  booktitle    = {TrustCom},
  pages        = {780--787},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00114},
  doi          = {10.1109/TRUSTCOM60117.2023.00114},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WaniZS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WeiL23,
  author       = {Yinzhen Wei and
                  Shuo Lu},
  title        = {Android Malicious Application Detection Based on Improved Mayfly Algorithm},
  booktitle    = {TrustCom},
  pages        = {1845--1852},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00250},
  doi          = {10.1109/TRUSTCOM60117.2023.00250},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WeiL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WenLP23,
  author       = {Qi Wen and
                  Carson K. Leung and
                  Adam G. M. Pazdor},
  title        = {Personalized Privacy-Preserving Semi-Centralized Recommendation System
                  in a Trust-Based Agent Network},
  booktitle    = {TrustCom},
  pages        = {2644--2651},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00369},
  doi          = {10.1109/TRUSTCOM60117.2023.00369},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WenLP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WijethilakaYBL23,
  author       = {Shalitha Wijethilaka and
                  Awaneesh Kumar Yadav and
                  An Braeken and
                  Madhusanka Liyanage},
  title        = {A Novel Blockchain-based Decentralized Multi-party Certificate Management
                  Framework},
  booktitle    = {TrustCom},
  pages        = {1361--1368},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00186},
  doi          = {10.1109/TRUSTCOM60117.2023.00186},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WijethilakaYBL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Wu0GNJX23,
  author       = {Tingting Wu and
                  Wei Yu and
                  Manxue Guo and
                  Wenjing Nie and
                  Zimeng Jia and
                  Lun Xin},
  title        = {Communication Efficient Federated Learning Based on Combination of
                  Structural Sparsification and Hybrid Quantization Sensing},
  booktitle    = {TrustCom},
  pages        = {2690--2697},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00375},
  doi          = {10.1109/TRUSTCOM60117.2023.00375},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Wu0GNJX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WuC0WL23,
  author       = {Jianming Wu and
                  Shuhong Chen and
                  Guojun Wang and
                  Hao Wang and
                  Hanjun Li},
  title        = {Multi-Scale Feature Aggregation for Rumor Detection: Unveiling the
                  Truth within Text},
  booktitle    = {TrustCom},
  pages        = {1086--1093},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00150},
  doi          = {10.1109/TRUSTCOM60117.2023.00150},
  timestamp    = {Thu, 06 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WuC0WL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WuHYCGL23,
  author       = {Peng Wu and
                  Chengzhuo Han and
                  Tao Yan and
                  Lu Chen and
                  Tianhao Guo and
                  Zhi Li},
  title        = {{SSF-EDZL} Scheduling Algorithm on Heterogeneous Multiprocessors},
  booktitle    = {TrustCom},
  pages        = {2052--2057},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00283},
  doi          = {10.1109/TRUSTCOM60117.2023.00283},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WuHYCGL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XiaoYLXZAZSZ23,
  author       = {Anyan Xiao and
                  Zhuo Yan and
                  Zheng Li and
                  Huangxin Xu and
                  Huixuan Zheng and
                  Yujie Ai and
                  Xiaocong Zhang and
                  Qixuan Sun and
                  Changyu Zhao},
  title        = {An Improved Lightweight Linear K-value Transformer},
  booktitle    = {TrustCom},
  pages        = {2246--2250},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00316},
  doi          = {10.1109/TRUSTCOM60117.2023.00316},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/XiaoYLXZAZSZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XingMXWZLFX23,
  author       = {Huanlai Xing and
                  Huaming Ma and
                  Zhiwen Xiao and
                  Xinhan Wang and
                  Bowen Zhao and
                  Shouxi Luo and
                  Li Feng and
                  Lexi Xu},
  title        = {On {ECG} Signal Classification: An NAS-empowered Semantic Communication
                  System},
  booktitle    = {TrustCom},
  pages        = {470--476},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00078},
  doi          = {10.1109/TRUSTCOM60117.2023.00078},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/XingMXWZLFX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XingZY0LGYX23,
  author       = {Ying Xing and
                  Mengci Zhao and
                  Bin Yang and
                  Yuwei Zhang and
                  Wenjin Li and
                  Jiawei Gu and
                  Jun Yuan and
                  Lexi Xu},
  title        = {Vulnerability Name Prediction Based on Enhanced Multi-Source Domain
                  Adaptation},
  booktitle    = {TrustCom},
  pages        = {2115--2121},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00294},
  doi          = {10.1109/TRUSTCOM60117.2023.00294},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/XingZY0LGYX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Xu0023,
  author       = {Min Xu and
                  Xiaoding Wang and
                  Hui Lin},
  title        = {{IHFBF:} {A} High-Performance Blockchain Framework for Improving Hyperledger
                  Fabric Permissioned Chain},
  booktitle    = {TrustCom},
  pages        = {300--306},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00059},
  doi          = {10.1109/TRUSTCOM60117.2023.00059},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Xu0023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Xu0WDT23,
  author       = {Wenlin Xu and
                  Tong Li and
                  Jinsong Wang and
                  Haibo Duan and
                  Yahui Tang},
  title        = {Software Vulnerabilities Detection Based on a Pre-trained Language
                  Model},
  booktitle    = {TrustCom},
  pages        = {904--911},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00129},
  doi          = {10.1109/TRUSTCOM60117.2023.00129},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Xu0WDT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XuF0YS023,
  author       = {Yuwei Xu and
                  Xiaotian Fang and
                  Jie Cao and
                  Rou Yu and
                  Kehui Song and
                  Guang Cheng},
  title        = {Cerberus: Efficient {OSPS} Traffic Identification through Multi-Task
                  Learning},
  booktitle    = {TrustCom},
  pages        = {504--511},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00082},
  doi          = {10.1109/TRUSTCOM60117.2023.00082},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/XuF0YS023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XuLLBW23,
  author       = {Liwen Xu and
                  Xiang Lin and
                  Jianhua Li and
                  Min Bai and
                  Liejun Wang},
  title        = {HiSec: Towards Cyber Threat Correlation and Discovery Based on Hierarchical
                  Graph Neural Networks},
  booktitle    = {TrustCom},
  pages        = {369--378},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00067},
  doi          = {10.1109/TRUSTCOM60117.2023.00067},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/XuLLBW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XuWZLY23,
  author       = {Zhenan Xu and
                  Jiuzheng Wang and
                  Cong Zha and
                  Xinyi Li and
                  Hao Yin},
  title        = {SmartLLM: {A} New Oracle System for Smart Contracts Calling Large
                  Language Models},
  booktitle    = {TrustCom},
  pages        = {2668--2675},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00372},
  doi          = {10.1109/TRUSTCOM60117.2023.00372},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/XuWZLY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XuXCJW23,
  author       = {Mingdi Xu and
                  Bo Xie and
                  Feng Cui and
                  Chaoyang Jin and
                  Yu Wang},
  title        = {{SQL} injection attack sample generation based on {IE-GAN}},
  booktitle    = {TrustCom},
  pages        = {1014--1021},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00142},
  doi          = {10.1109/TRUSTCOM60117.2023.00142},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/XuXCJW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XuZBWS023,
  author       = {Yuwei Xu and
                  Zizhi Zhu and
                  Yunpeng Bai and
                  Lilanyi Wu and
                  Kehui Song and
                  Guang Cheng},
  title        = {SharpEye: Identify mKCP Camouflage Traffic through Feature Optimization},
  booktitle    = {TrustCom},
  pages        = {1157--1164},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00158},
  doi          = {10.1109/TRUSTCOM60117.2023.00158},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/XuZBWS023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XuZS023,
  author       = {Yuwei Xu and
                  Ying Zhang and
                  Haonan Shi and
                  Jie Cao},
  title        = {ChainPass: {A} Privacy-preserving Complete Cross-chain Authentication
                  for Consortium Blockchains},
  booktitle    = {TrustCom},
  pages        = {334--341},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00063},
  doi          = {10.1109/TRUSTCOM60117.2023.00063},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/XuZS023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XuZZHCCLGLG23,
  author       = {Lexi Xu and
                  Junsheng Zhao and
                  Hong Zhu and
                  Mingde Huo and
                  Xinzhou Cheng and
                  Kun Chao and
                  Jie Li and
                  Jian Guan and
                  Xiqing Liu and
                  Jie Gao},
  title        = {5G/5G-A Private Network: Construction, Operation and Applications},
  booktitle    = {TrustCom},
  pages        = {2234--2239},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00314},
  doi          = {10.1109/TRUSTCOM60117.2023.00314},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/XuZZHCCLGLG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YadavMBL23,
  author       = {Awaneesh Kumar Yadav and
                  Manoj Misra and
                  An Braeken and
                  Madhusanka Liyanage},
  title        = {A Secure Blockchain-based Authentication and Key Agreement Protocol
                  for 5G Roaming},
  booktitle    = {TrustCom},
  pages        = {1324--1331},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00181},
  doi          = {10.1109/TRUSTCOM60117.2023.00181},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YadavMBL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YanLL23,
  author       = {Wenli Yan and
                  Shuaijun Liu and
                  Lixiang Liu},
  title        = {Multiple Chord Distance Regression Algorithm to Judge Constellations
                  Without Prior Information},
  booktitle    = {TrustCom},
  pages        = {1980--1985},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00270},
  doi          = {10.1109/TRUSTCOM60117.2023.00270},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YanLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YanLS23,
  author       = {Qi Yan and
                  Mohan Li and
                  Yanbin Sun},
  title        = {Neighborhood Matching Entity Alignment Model for Vulnerability Knowledge
                  Graphs},
  booktitle    = {TrustCom},
  pages        = {38--45},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00028},
  doi          = {10.1109/TRUSTCOM60117.2023.00028},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YanLS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YanZLYW23,
  author       = {Shu Yan and
                  Sirui Zhang and
                  Ailin Lv and
                  Bo Yuan and
                  Kai Wei},
  title        = {Development Situation and Suggestions of Data Elements in China},
  booktitle    = {TrustCom},
  pages        = {2193--2197},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00307},
  doi          = {10.1109/TRUSTCOM60117.2023.00307},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YanZLYW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YangKDSZCM23,
  author       = {Huiran Yang and
                  Jiaqi Kang and
                  Yueyue Dai and
                  Jiyan Sun and
                  Yan Zhang and
                  Huajun Cui and
                  Can Ma},
  title        = {LActDet: An Automatic Network Attack Activity Detection Framework
                  for Multi-step Attacks},
  booktitle    = {TrustCom},
  pages        = {676--685},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00102},
  doi          = {10.1109/TRUSTCOM60117.2023.00102},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YangKDSZCM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YangLCXGWXC23,
  author       = {Bin Yang and
                  Jing Liang and
                  Yubin Chen and
                  Ying Xing and
                  Wei Gao and
                  Yue Wang and
                  Lexi Xu and
                  Xinzhou Cheng},
  title        = {Research on Interpretable Customer Churn Prediction Based on Attention
                  Mechanism},
  booktitle    = {TrustCom},
  pages        = {2042--2047},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00281},
  doi          = {10.1109/TRUSTCOM60117.2023.00281},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YangLCXGWXC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YangLFHL23,
  author       = {Yuting Yang and
                  Lin Liu and
                  Shaojing Fu and
                  Jun{-}Jie Huang and
                  Yuchuan Luo},
  title        = {SecGAN: Honest-Majority Maliciously 3PC Framework for Privacy-Preserving
                  Image Synthesis},
  booktitle    = {TrustCom},
  pages        = {1119--1126},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00154},
  doi          = {10.1109/TRUSTCOM60117.2023.00154},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YangLFHL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YangLKW23,
  author       = {Jen{-}Chieh Yang and
                  Hung{-}I Lin and
                  Lin{-}Jing Kuo and
                  Sheng{-}De Wang},
  title        = {{MOFP:} Multi-Objective Filter Pruning for Deep Learning Models},
  booktitle    = {TrustCom},
  pages        = {2414--2423},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00340},
  doi          = {10.1109/TRUSTCOM60117.2023.00340},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YangLKW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YangLWZ23,
  author       = {Halvin Yang and
                  Xiao Lin and
                  Kai{-}Kit Wong and
                  Yizhe Zhao},
  title        = {Fast Fluid Antenna Multiple Access With Path Loss Consideration and
                  Different Antenna Architecture},
  booktitle    = {TrustCom},
  pages        = {2386--2393},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00336},
  doi          = {10.1109/TRUSTCOM60117.2023.00336},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YangLWZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YangP23,
  author       = {Sheng Yang and
                  Guan{-}Ju Peng},
  title        = {Optimizing Quantum Reversible Circuits Using Reinforcement Learning},
  booktitle    = {TrustCom},
  pages        = {2310--2314},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00326},
  doi          = {10.1109/TRUSTCOM60117.2023.00326},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YangP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YangSWHMH23,
  author       = {Zheng Yang and
                  Degang Sun and
                  Yan Wang and
                  Xinbo Han and
                  Chen Meng and
                  Weiqing Huang},
  title        = {DTrap: {A} cyberattack-defense confrontation technique based on Moving
                  Target Defense},
  booktitle    = {TrustCom},
  pages        = {2652--2659},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00370},
  doi          = {10.1109/TRUSTCOM60117.2023.00370},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YangSWHMH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YangTX23,
  author       = {Qing Yang and
                  Youliang Tian and
                  Jinbo Xiong},
  title        = {DFedXGB: An {XGB} Vertical Federated Learning Framework with Data
                  Desensitization},
  booktitle    = {TrustCom},
  pages        = {157--164},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00042},
  doi          = {10.1109/TRUSTCOM60117.2023.00042},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YangTX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YangWGY23,
  author       = {Yunlu Yang and
                  Miaoqiong Wang and
                  Yuming Ge and
                  Rundong Yu},
  title        = {Research on Data Security for Vehicle-Infrastructure-Cloud Integration},
  booktitle    = {TrustCom},
  pages        = {2164--2169},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00302},
  doi          = {10.1109/TRUSTCOM60117.2023.00302},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YangWGY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YangWWQQ23,
  author       = {Xu Yang and
                  Ao Wang and
                  Qiuhao Wang and
                  Saiyu Qi and
                  Yong Qi},
  title        = {A Practical and Privacy-Preserving Vehicular Data Sharing Framework
                  by Using Blockchain},
  booktitle    = {TrustCom},
  pages        = {1300--1305},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00177},
  doi          = {10.1109/TRUSTCOM60117.2023.00177},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YangWWQQ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YangWZHCJ23,
  author       = {Hongyu Yang and
                  Youwei Wang and
                  Liang Zhang and
                  Ze Hu and
                  Xiang Cheng and
                  Laiwei Jiang},
  title        = {{EAMDM:} An Evolved Android Malware Detection Method Using {API} Clustering},
  booktitle    = {TrustCom},
  pages        = {889--895},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00127},
  doi          = {10.1109/TRUSTCOM60117.2023.00127},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YangWZHCJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YangXGLWC23,
  author       = {Zijing Yang and
                  Lexi Xu and
                  Jie Gao and
                  Jie Li and
                  Yang Wu and
                  Xinzhou Cheng},
  title        = {FedQuant: Stock Prediction with Muti-Party Technical Indicators using
                  Federated Learning Method in Quantitative Trading},
  booktitle    = {TrustCom},
  pages        = {2251--2256},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00317},
  doi          = {10.1109/TRUSTCOM60117.2023.00317},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YangXGLWC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YangZ023,
  author       = {Bo Yang and
                  Yanchao Zhang and
                  Dong Tong},
  title        = {{DOPS:} {A} Practical Dual Offline Payment Scheme of {CBDC} for Mobile
                  Devices},
  booktitle    = {TrustCom},
  pages        = {1835--1844},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00249},
  doi          = {10.1109/TRUSTCOM60117.2023.00249},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YangZ023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YangZHZC23,
  author       = {Hongyu Yang and
                  Tao Zhang and
                  Ze Hu and
                  Liang Zhang and
                  Xiang Cheng},
  title        = {A {DGA} Domain Name Detection Method Based on Two-Stage Feature Reinforcement},
  booktitle    = {TrustCom},
  pages        = {652--659},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00099},
  doi          = {10.1109/TRUSTCOM60117.2023.00099},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YangZHZC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YiLLYLC23,
  author       = {Yunpeng Yi and
                  Hongtao Lv and
                  Tie Luo and
                  Junfeng Yang and
                  Lei Liu and
                  Lizhen Cui},
  title        = {Crowdsourcing-based Model Testing in Federated Learning},
  booktitle    = {TrustCom},
  pages        = {207--213},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00048},
  doi          = {10.1109/TRUSTCOM60117.2023.00048},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YiLLYLC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YinZZTLL23,
  author       = {Zheng Yin and
                  Shengwen Zhou and
                  Jingjing Zhou and
                  Minghui Tian and
                  Musen Lin and
                  Sida Liu},
  title        = {Research on DataOps Capability - Practice and Development},
  booktitle    = {TrustCom},
  pages        = {2170--2174},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00303},
  doi          = {10.1109/TRUSTCOM60117.2023.00303},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YinZZTLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YuDGKS23,
  author       = {Junwei Yu and
                  Yepeng Ding and
                  Yuheng Guo and
                  Kentaro Kotani and
                  Hiroyuki Sato},
  title        = {Inj-Kyber: Enhancing CRYSTALS-Kyber with Information Injection within
                  a Bio-KEM Framework},
  booktitle    = {TrustCom},
  pages        = {1639--1644},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00223},
  doi          = {10.1109/TRUSTCOM60117.2023.00223},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YuDGKS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YuTC23,
  author       = {Xionghe Yu and
                  Xiaolan Tang and
                  Wenlong Chen},
  title        = {Blockchain-based and Privacy-Preserving Data Collection for Vehicular
                  Crowdsensing},
  booktitle    = {TrustCom},
  pages        = {1340--1347},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00183},
  doi          = {10.1109/TRUSTCOM60117.2023.00183},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YuTC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YuanMDBL023,
  author       = {Zhipeng Yuan and
                  Nasamu Musa and
                  Katarzyna Dybal and
                  Matthew Back and
                  Daniel Leybourne and
                  Po Yang},
  title        = {Quantifying Nematodes through Images: Datasets, Models, and Baselines
                  of Deep Learning},
  booktitle    = {TrustCom},
  pages        = {2448--2455},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00344},
  doi          = {10.1109/TRUSTCOM60117.2023.00344},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YuanMDBL023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YueZCTYL23,
  author       = {Yi Yue and
                  Zhiyan Zhang and
                  Chang Cao and
                  Xiongyan Tang and
                  Wencong Yang and
                  Feile Li},
  title        = {EasyOrchestrator: {A} Dynamic QoS-Aware Service Orchestration Platform
                  for 6G Network},
  booktitle    = {TrustCom},
  pages        = {2222--2227},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00312},
  doi          = {10.1109/TRUSTCOM60117.2023.00312},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YueZCTYL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhaWJZY23,
  author       = {Cong Zha and
                  Yulei Wu and
                  Zexun Jiang and
                  Wenqian Zhao and
                  Hao Yin},
  title        = {{BAA:} {A} Novel Decentralized Authorization System for Privacy-Sensitive
                  Medical Data},
  booktitle    = {TrustCom},
  pages        = {1127--1136},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00155},
  doi          = {10.1109/TRUSTCOM60117.2023.00155},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhaWJZY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Zhang0023,
  author       = {Jianlin Zhang and
                  Xiaoding Wang and
                  Hui Lin},
  title        = {Big Data Assisted Object Detection with Privacy Protection},
  booktitle    = {TrustCom},
  pages        = {117--124},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00037},
  doi          = {10.1109/TRUSTCOM60117.2023.00037},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Zhang0023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangGDS23,
  author       = {Lingfeng Zhang and
                  Yuheng Guo and
                  Yepeng Ding and
                  Hiroyuki Sato},
  title        = {1-D CNN-Based Online Signature Verification with Federated Learning},
  booktitle    = {TrustCom},
  pages        = {2698--2705},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00376},
  doi          = {10.1109/TRUSTCOM60117.2023.00376},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangGDS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangHWWWY23,
  author       = {Dongyue Zhang and
                  Sai Han and
                  Zelin Wang and
                  Jingwei Wang and
                  Guangquan Wang and
                  Jieyan Yang},
  title        = {Research on Cross-Layer Alarm Association in 5G Core Network},
  booktitle    = {TrustCom},
  pages        = {2064--2069},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00285},
  doi          = {10.1109/TRUSTCOM60117.2023.00285},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangHWWWY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangWDXLLZS23,
  author       = {Jie Zhang and
                  Hui Wen and
                  Liting Deng and
                  Mingfeng Xin and
                  Zhi Li and
                  Lun Li and
                  Hongsong Zhu and
                  Limin Sun},
  title        = {HackMentor: Fine-Tuning Large Language Models for Cybersecurity},
  booktitle    = {TrustCom},
  pages        = {452--461},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00076},
  doi          = {10.1109/TRUSTCOM60117.2023.00076},
  timestamp    = {Wed, 12 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangWDXLLZS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangWH23,
  author       = {Minjuan Zhang and
                  Chase Q. Wu and
                  Aiqin Hou},
  title        = {Ensemble Learning Models for Large-Scale Time Series Forecasting in
                  Supply Chain},
  booktitle    = {TrustCom},
  pages        = {2286--2294},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00323},
  doi          = {10.1109/TRUSTCOM60117.2023.00323},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangWH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangXYW23,
  author       = {Zeshi Zhang and
                  Guangping Xu and
                  Hongzhang Yang and
                  Yulei Wu},
  title        = {Sparsity Aware of {TF-IDF} Matrix to Accelerate Oblivious Document
                  Ranking and Retrieval},
  booktitle    = {TrustCom},
  pages        = {974--981},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00137},
  doi          = {10.1109/TRUSTCOM60117.2023.00137},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangXYW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangYLXCCCXY23,
  author       = {Heng Zhang and
                  Bing Yan and
                  Yunpeng Li and
                  Lexi Xu and
                  Xinzhou Cheng and
                  Lijuan Cao and
                  Kun Chao and
                  Wei Xia and
                  Qinqin Yu},
  title        = {Research on Enterprises Growth for Industries in Post-Epidemic Era},
  booktitle    = {TrustCom},
  pages        = {2158--2163},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00301},
  doi          = {10.1109/TRUSTCOM60117.2023.00301},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangYLXCCCXY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangZZ23,
  author       = {Gaowei Zhang and
                  Xu Zhou and
                  Xiaobo Zhang},
  title        = {Fine-Grained Task Scheduling Combining {DDPG} and Path Selection in
                  {LEO} Satellite Networks},
  booktitle    = {TrustCom},
  pages        = {1181--1186},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00161},
  doi          = {10.1109/TRUSTCOM60117.2023.00161},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangZZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Zhao23,
  author       = {Rui Zhao},
  title        = {CamPass: a Secure Camera-based Password Manager for Kiosk Browsing},
  booktitle    = {TrustCom},
  pages        = {1580--1585},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00215},
  doi          = {10.1109/TRUSTCOM60117.2023.00215},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Zhao23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhaoYXCLZLXL23,
  author       = {Changyu Zhao and
                  Zhuo Yan and
                  Huangxin Xu and
                  Xueliang Chen and
                  Zheng Li and
                  Xinyu Zhong and
                  Cuiwei Liu and
                  Anyan Xiao and
                  Xingyan Lv},
  title        = {Design and Implementation of Mask Detection System Based on Improved
                  YOLOv5s},
  booktitle    = {TrustCom},
  pages        = {2257--2262},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00318},
  doi          = {10.1109/TRUSTCOM60117.2023.00318},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhaoYXCLZLXL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhaoYYLZ23,
  author       = {Jun Zhao and
                  Jiangshan Yu and
                  Xingliang Yuan and
                  Joseph K. Liu and
                  Cong Zuo},
  title        = {Rethinking Practical Blockchain-Based Symmetric Searchable Encryption
                  Services},
  booktitle    = {TrustCom},
  pages        = {307--317},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00060},
  doi          = {10.1109/TRUSTCOM60117.2023.00060},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhaoYYLZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhaoZS023,
  author       = {Hui Zhao and
                  Xiaodong Zhang and
                  Jinshan Shi and
                  Ru Li},
  title        = {Referable NFT-based Revenue Allocation Mechanism in Data Marketplace},
  booktitle    = {TrustCom},
  pages        = {1318--1323},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00180},
  doi          = {10.1109/TRUSTCOM60117.2023.00180},
  timestamp    = {Wed, 05 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhaoZS023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Zhou0WB23,
  author       = {Huasong Zhou and
                  Xiaowei Xu and
                  Xiaodong Wang and
                  Leon Bevan Bullock},
  title        = {{SATBA:} An Invisible Backdoor Attack Based on Spatial Attention},
  booktitle    = {TrustCom},
  pages        = {937--945},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00133},
  doi          = {10.1109/TRUSTCOM60117.2023.00133},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Zhou0WB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhouCWM23,
  author       = {Fengxi Zhou and
                  Baoming Chang and
                  Yu Wen and
                  Dan Meng},
  title        = {Representation-enhanced {APT} Detection Using Contrastive Learning},
  booktitle    = {TrustCom},
  pages        = {1--9},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00024},
  doi          = {10.1109/TRUSTCOM60117.2023.00024},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhouCWM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhouKRNS23,
  author       = {Yuxiang Zhou and
                  Xin Kang and
                  Fuji Ren and
                  Satoshi Nakagawa and
                  Xiao Shan},
  title        = {DEU-Net: Dual Encoder U-Net for 3D Medical Image Segmentation},
  booktitle    = {TrustCom},
  pages        = {2735--2741},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00382},
  doi          = {10.1109/TRUSTCOM60117.2023.00382},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhouKRNS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhouWHLXL23,
  author       = {Weidong Zhou and
                  Tianbo Wang and
                  Guotao Huang and
                  Xiaopeng Liang and
                  Chunhe Xia and
                  Xiaojian Li},
  title        = {HF-Mid: {A} Hybrid Framework of Network Intrusion Detection for Multi-type
                  and Imbalanced Data},
  booktitle    = {TrustCom},
  pages        = {1546--1553},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00211},
  doi          = {10.1109/TRUSTCOM60117.2023.00211},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhouWHLXL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhouXHLWZ23,
  author       = {Lianpei Zhou and
                  Xi Xiao and
                  Guangwu Hu and
                  Hao Li and
                  Xiangbo Wu and
                  Tao Zhou},
  title        = {A lightweight and high-precision approach for bulky JavaScript engines
                  fuzzing},
  booktitle    = {TrustCom},
  pages        = {982--989},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00138},
  doi          = {10.1109/TRUSTCOM60117.2023.00138},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhouXHLWZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhuCFD23,
  author       = {Yihong Zhu and
                  Xiaoliang Chen and
                  Junsen Fu and
                  Yajun Du},
  title        = {A novel semantic dependency and aspect interaction graph convolutional
                  network for aspect-level sentiment analysis},
  booktitle    = {TrustCom},
  pages        = {2763--2769},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00385},
  doi          = {10.1109/TRUSTCOM60117.2023.00385},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhuCFD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhuSB23,
  author       = {Haohan Zhu and
                  Andrea Staino and
                  Biswajit Basu},
  title        = {Railway Traffic Signal Recognition System based on Spatio-Temporal
                  Features},
  booktitle    = {TrustCom},
  pages        = {2465--2471},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00346},
  doi          = {10.1109/TRUSTCOM60117.2023.00346},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhuSB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhuXWL23,
  author       = {Jinyao Zhu and
                  Xiaofei Xing and
                  Guojun Wang and
                  Peiqiang Li},
  title        = {Opcode Sequences-Based Smart Contract Vulnerabilities Detection Using
                  Deep Learning},
  booktitle    = {TrustCom},
  pages        = {284--291},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00057},
  doi          = {10.1109/TRUSTCOM60117.2023.00057},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhuXWL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZouLHZMGL23,
  author       = {Wenbing Zou and
                  Xiulei Liu and
                  Shoulu Hou and
                  Ye Zhang and
                  Lin Miao and
                  Yi Gong and
                  Ning Li},
  title        = {Affinity-Based Resource and Task Allocation in Edge Computing Systems},
  booktitle    = {TrustCom},
  pages        = {1187--1195},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00162},
  doi          = {10.1109/TRUSTCOM60117.2023.00162},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZouLHZMGL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZouZCZWJX23,
  author       = {Zexiao Zou and
                  Yan Zhang and
                  Jin Chen and
                  Jianyi Zhang and
                  Zhiqiang Wang and
                  Lei Ju and
                  Ri Xu},
  title        = {Be like a Chameleon: Protect Traffic Privacy with Mimicry},
  booktitle    = {TrustCom},
  pages        = {1449--1454},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00198},
  doi          = {10.1109/TRUSTCOM60117.2023.00198},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZouZCZWJX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZouZLDXH23,
  author       = {Xianxia Zou and
                  Cenyu Zheng and
                  Haodong Lin and
                  Like Du and
                  Weiwu Xu and
                  Chong He},
  title        = {A Fine-Grained Access Control Mechanism Based on Search Trees},
  booktitle    = {TrustCom},
  pages        = {1614--1620},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00220},
  doi          = {10.1109/TRUSTCOM60117.2023.00220},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZouZLDXH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZouZWZL23,
  author       = {Weihong Zou and
                  Shigeng Zhang and
                  Weiping Wang and
                  Jian Zhang and
                  Xuan Liu},
  title        = {{MPS:} {A} Multiple Poisoned Samples Selection Strategy in Backdoor
                  Attack},
  booktitle    = {TrustCom},
  pages        = {873--880},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00125},
  doi          = {10.1109/TRUSTCOM60117.2023.00125},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZouZWZL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trustcom/2023,
  editor       = {Jia Hu and
                  Geyong Min and
                  Guojun Wang and
                  Nektarios Georgalas},
  title        = {22nd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Exeter, UK, November
                  1-3, 2023},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023},
  doi          = {10.1109/TRUSTCOM60117.2023},
  isbn         = {979-8-3503-8199-3},
  timestamp    = {Tue, 04 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AbadeerSC22,
  author       = {Macarious Abadeer and
                  Wei Shi and
                  Jean{-}Pierre Corriveau},
  title        = {FLightNER: {A} Federated Learning Approach to Lightweight Named-Entity
                  Recognition},
  booktitle    = {TrustCom},
  pages        = {687--694},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00098},
  doi          = {10.1109/TRUSTCOM56396.2022.00098},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/AbadeerSC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AlalmaieNH22,
  author       = {Abeer Z. Alalmaie and
                  Priyadarsi Nanda and
                  Xiangjian He},
  title        = {Zero Trust-NIDS: Extended Multi-View Approach for Network Trace Anonymization
                  and Auto-Encoder {CNN} for Network Intrusion Detection},
  booktitle    = {TrustCom},
  pages        = {449--456},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00069},
  doi          = {10.1109/TRUSTCOM56396.2022.00069},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/AlalmaieNH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ArsalanMIAVI22,
  author       = {Muhammad Arsalan and
                  Davide Di Matteo and
                  Sana Imtiaz and
                  Zainab Abbas and
                  Vladimir Vlassov and
                  Vadim Issakov},
  title        = {Energy-Efficient Privacy-Preserving Time-Series Forecasting on User
                  Health Data Streams},
  booktitle    = {TrustCom},
  pages        = {541--546},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00080},
  doi          = {10.1109/TRUSTCOM56396.2022.00080},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ArsalanMIAVI22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BertoglioSZL22,
  author       = {Daniel Dalalana Bertoglio and
                  Luis G. B. Sch{\"{u}}ler and
                  Avelino F. Zorzo and
                  Roben Castagna Lunardi},
  title        = {Understanding the Penetration Test Workflow: a security test with
                  Tramonto in an e-Government application},
  booktitle    = {TrustCom},
  pages        = {1597--1604},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00229},
  doi          = {10.1109/TRUSTCOM56396.2022.00229},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/BertoglioSZL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BiHLCHS22,
  author       = {Jichao Bi and
                  Shibo He and
                  Fengji Luo and
                  Jiming Chen and
                  Da{-}Wen Huang and
                  Mingyang Sun},
  title        = {Differential Game Approach for Modelling and Defense of False Data
                  Injection Attacks Targeting Energy Metering Systems},
  booktitle    = {TrustCom},
  pages        = {97--104},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00024},
  doi          = {10.1109/TRUSTCOM56396.2022.00024},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/BiHLCHS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BorowskiSZM22,
  author       = {Michal Borowski and
                  Sangeet Saha and
                  Xiaojun Zhai and
                  Klaus D. McDonald{-}Maier},
  title        = {Benchmark Tool for Detecting Anomalous Program Behaviour on Embedded
                  Devices},
  booktitle    = {TrustCom},
  pages        = {1187--1192},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00164},
  doi          = {10.1109/TRUSTCOM56396.2022.00164},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/BorowskiSZM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BovenziPPPS22,
  author       = {Giampaolo Bovenzi and
                  Valerio Persico and
                  Antonio Pescap{\`{e}} and
                  Anna Piscitelli and
                  Vincenzo Spadari},
  title        = {Hierarchical Classification of Android Malware Traffic},
  booktitle    = {TrustCom},
  pages        = {1354--1359},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00191},
  doi          = {10.1109/TRUSTCOM56396.2022.00191},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/BovenziPPPS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/CaiYY22,
  author       = {Cailing Cai and
                  Tsz Hon Yuen and
                  Siu{-}Ming Yiu},
  title        = {Hash Proof System with Auxiliary Inputs and Its Application},
  booktitle    = {TrustCom},
  pages        = {52--59},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00018},
  doi          = {10.1109/TRUSTCOM56396.2022.00018},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/CaiYY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/CaoDWM22,
  author       = {Deqi Cao and
                  Zhaoyun Ding and
                  Fei Wang and
                  Haoyang Ma},
  title        = {Pre-training Fine-tuning data Enhancement method based on active learning},
  booktitle    = {TrustCom},
  pages        = {1447--1454},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00205},
  doi          = {10.1109/TRUSTCOM56396.2022.00205},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/CaoDWM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/CazorlaFG22,
  author       = {Jos{\'{e}} Reverte Cazorla and
                  Jos{\'{e}} Mar{\'{\i}}a de Fuentes and
                  Lorena Gonz{\'{a}}lez{-}Manzano},
  title        = {Eye-based keystroke prediction for natural texts - a feasibility analysis},
  booktitle    = {TrustCom},
  pages        = {375--382},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00059},
  doi          = {10.1109/TRUSTCOM56396.2022.00059},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/CazorlaFG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenFWY22,
  author       = {Ruizhu Chen and
                  Rong Fei and
                  Lili Wu and
                  Lu Yang},
  title        = {An Improved Actor-Critic Method for Auto-Combating In Infantry Vehicles},
  booktitle    = {TrustCom},
  pages        = {1162--1167},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00160},
  doi          = {10.1109/TRUSTCOM56396.2022.00160},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenFWY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenG22,
  author       = {Xiaofeng Chen and
                  Ying Gao},
  title        = {CDEdit: Redactable Blockchain with Cross-audit and Diversity Editing},
  booktitle    = {TrustCom},
  pages        = {945--952},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00130},
  doi          = {10.1109/TRUSTCOM56396.2022.00130},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenGLWP22,
  author       = {Jian Chen and
                  Yuan Gao and
                  Yang Liu and
                  Chen Wang and
                  Kai Peng},
  title        = {Leveraging Model Poisoning Attacks on License Plate Recognition Systems},
  booktitle    = {TrustCom},
  pages        = {827--834},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00115},
  doi          = {10.1109/TRUSTCOM56396.2022.00115},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenGLWP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenHWGM22,
  author       = {Ligeng Chen and
                  Zhongling He and
                  Hao Wu and
                  Yuhang Gong and
                  Bing Mao},
  title        = {AVMiner: Expansible and Semantic-Preserving Anti-Virus Labels Mining
                  Method},
  booktitle    = {TrustCom},
  pages        = {217--224},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00039},
  doi          = {10.1109/TRUSTCOM56396.2022.00039},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenHWGM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenWWCYL22,
  author       = {Qian Chen and
                  Hongbo Wang and
                  Zilong Wang and
                  Jiawei Chen and
                  Haonan Yan and
                  Xiaodong Lin},
  title        = {{LLDP:} {A} Layer-wise Local Differential Privacy in Federated Learning},
  booktitle    = {TrustCom},
  pages        = {631--637},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00091},
  doi          = {10.1109/TRUSTCOM56396.2022.00091},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenWWCYL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenXCGYZ22,
  author       = {Jinfu Chen and
                  Haodi Xie and
                  Saihua Cai and
                  Ye Geng and
                  Yemin Yin and
                  Zikang Zhang},
  title        = {A formalization-based vulnerability detection method for cross-subject
                  network components},
  booktitle    = {TrustCom},
  pages        = {1054--1059},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00144},
  doi          = {10.1109/TRUSTCOM56396.2022.00144},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenXCGYZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenYWTX22,
  author       = {Chuanxi Chen and
                  Dengpan Ye and
                  Hao Wang and
                  Long Tang and
                  Yue Xu},
  title        = {Towards Adversarial Robustness with Multidimensional Perturbations
                  via Contrastive Learning},
  booktitle    = {TrustCom},
  pages        = {184--191},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00035},
  doi          = {10.1109/TRUSTCOM56396.2022.00035},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenYWTX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenYZWWH22,
  author       = {Luyao Chen and
                  Na Yan and
                  Boyang Zhang and
                  Zhaoyang Wang and
                  Yu Wen and
                  Yanfei Hu},
  title        = {A General Backdoor Attack to Graph Neural Networks Based on Explanation
                  Method},
  booktitle    = {TrustCom},
  pages        = {759--768},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00107},
  doi          = {10.1109/TRUSTCOM56396.2022.00107},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenYZWWH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenZLKZZ22,
  author       = {Yongkang Chen and
                  Ming Zhang and
                  Jin Li and
                  Xiaohui Kuang and
                  Xuhong Zhang and
                  Han Zhang},
  title        = {Dynamic and Diverse Transformations for Defending Against Adversarial
                  Examples},
  booktitle    = {TrustCom},
  pages        = {976--983},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00134},
  doi          = {10.1109/TRUSTCOM56396.2022.00134},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenZLKZZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenZXZZW22,
  author       = {Yujie Chen and
                  Wenliang Zhu and
                  Jinke Xu and
                  Junwei Zhang and
                  Zhanpeng Zhu and
                  Lirong Wang},
  title        = {A Heart Sound Classification Method Based on Residual Block and Attention
                  Mechanism},
  booktitle    = {TrustCom},
  pages        = {1060--1065},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00145},
  doi          = {10.1109/TRUSTCOM56396.2022.00145},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenZXZZW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChengCJZHZCJXL22,
  author       = {Chen Cheng and
                  Xinzhou Cheng and
                  Shikun Jiang and
                  Xin Zhao and
                  Yuhui Han and
                  Tao Zhang and
                  Lijuan Cao and
                  Yuwei Jia and
                  Tian Xiao and
                  Bei Li},
  title        = {Telecom Big Data assisted Algorithm and System of Campus Safety Management},
  booktitle    = {TrustCom},
  pages        = {1557--1562},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00223},
  doi          = {10.1109/TRUSTCOM56396.2022.00223},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChengCJZHZCJXL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChengLLHCMD22,
  author       = {Lei Cheng and
                  Shuaijun Liu and
                  Lixaing Liu and
                  Hailong Hu and
                  Jingyi Chen and
                  Xiandong Meng and
                  Pengcheng Ding},
  title        = {Study on Gateway Station Deployment for Large Scale {LEO} Satellite
                  Constellation Networks},
  booktitle    = {TrustCom},
  pages        = {1540--1544},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00220},
  doi          = {10.1109/TRUSTCOM56396.2022.00220},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChengLLHCMD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChengZYFH22,
  author       = {Taining Cheng and
                  Wei Zhou and
                  Shaowen Yao and
                  Libo Feng and
                  Jing He},
  title        = {Multi-pipeline HotStuff: {A} High Performance Consensus for Permissioned
                  Blockchain},
  booktitle    = {TrustCom},
  pages        = {1008--1019},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00138},
  doi          = {10.1109/TRUSTCOM56396.2022.00138},
  timestamp    = {Tue, 16 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChengZYFH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/CioroaicaBSSKT22,
  author       = {Emilia Cioroaica and
                  Barbora Buhnova and
                  Daniel Schneider and
                  Ioannis Sorokos and
                  Thomas Kuhn and
                  Emrah Tomur},
  title        = {Towards the Concept of Trust Assurance Case},
  booktitle    = {TrustCom},
  pages        = {1581--1586},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00227},
  doi          = {10.1109/TRUSTCOM56396.2022.00227},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/CioroaicaBSSKT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DaiLXWJ22,
  author       = {Weiqi Dai and
                  Zhenhui Lu and
                  Xia Xie and
                  Duoqiang Wang and
                  Hai Jin},
  title        = {Diabetes Mellitus Type 2 Data Sharing System Based on Blockchain and
                  Attribute-Encryption},
  booktitle    = {TrustCom},
  pages        = {498--505},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00075},
  doi          = {10.1109/TRUSTCOM56396.2022.00075},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/DaiLXWJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DaiZXWJ22,
  author       = {Weiqi Dai and
                  Wenhao Zhao and
                  Xia Xie and
                  Song Wu and
                  Hai Jin},
  title        = {Shared Incentive System for Clinical Pathway Experience},
  booktitle    = {TrustCom},
  pages        = {506--513},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00076},
  doi          = {10.1109/TRUSTCOM56396.2022.00076},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/DaiZXWJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DiXLCLXZZX22,
  author       = {Zixiang Di and
                  Tian Xiao and
                  Yi Li and
                  Xinzhou Cheng and
                  Bei Li and
                  Lexi Xu and
                  Xiaomeng Zhu and
                  Lu Zhi and
                  Rui Xia},
  title        = {Research on Voice Quality Evaluation Method Based on Artificial Neural
                  Network},
  booktitle    = {TrustCom},
  pages        = {1510--1515},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00215},
  doi          = {10.1109/TRUSTCOM56396.2022.00215},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/DiXLCLXZZX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DiaoFCWWS22,
  author       = {Jiawen Diao and
                  Binxing Fang and
                  Xiang Cui and
                  Zhongru Wang and
                  Tian Wang and
                  Shouyou Song},
  title        = {From Passive to Active: Near-optimal DNS-based Data Exfiltration Defense
                  Method Based on Sticky Mechanism},
  booktitle    = {TrustCom},
  pages        = {159--166},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00032},
  doi          = {10.1109/TRUSTCOM56396.2022.00032},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/DiaoFCWWS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DingSYDW22,
  author       = {Wenxiu Ding and
                  Wei Sun and
                  Zheng Yan and
                  Robert H. Deng and
                  Zhiguo Wan},
  title        = {An Efficient and Secure Scheme of Verifiable Computation for Intel
                  {SGX}},
  booktitle    = {TrustCom},
  pages        = {473--482},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00072},
  doi          = {10.1109/TRUSTCOM56396.2022.00072},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/DingSYDW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DingXGYCH22,
  author       = {Zhenquan Ding and
                  Hui Xu and
                  Yonghe Guo and
                  Longchuan Yan and
                  Lei Cui and
                  Zhiyu Hao},
  title        = {Mal-Bert-GCN: Malware Detection by Combining Bert and {GCN}},
  booktitle    = {TrustCom},
  pages        = {175--183},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00034},
  doi          = {10.1109/TRUSTCOM56396.2022.00034},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/DingXGYCH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DingYQWZW22,
  author       = {Yuhang Ding and
                  Zihan Yang and
                  Bo Qin and
                  Qin Wang and
                  Yanran Zhang and
                  Qianhong Wu},
  title        = {Squeezing Network Performance for Secure and Efficient PoW with Better
                  Difficulty Adjustment},
  booktitle    = {TrustCom},
  pages        = {874--881},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00121},
  doi          = {10.1109/TRUSTCOM56396.2022.00121},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/DingYQWZW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DongCZW22,
  author       = {Yanfang Dong and
                  Wenqiang Cai and
                  Wenliang Zhu and
                  Lirong Wang},
  title        = {An End-to-End Multi-label classification model for Arrhythmia based
                  on varied-length {ECG} signals},
  booktitle    = {TrustCom},
  pages        = {1149--1154},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00158},
  doi          = {10.1109/TRUSTCOM56396.2022.00158},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/DongCZW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DuHWW22,
  author       = {Xinqing Du and
                  Xin Hu and
                  Yin Wang and
                  Weidong Wang},
  title        = {Dynamic Resource Allocation for Beam Hopping Satellites Communication
                  System: An Exploration},
  booktitle    = {TrustCom},
  pages        = {1296--1301},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00181},
  doi          = {10.1109/TRUSTCOM56396.2022.00181},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/DuHWW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DuZWT22,
  author       = {Xiaoyu Du and
                  Guanying Zhou and
                  Yujing Wang and
                  Song Tao},
  title        = {A Lightweight Honeynet Design In the Internet of Things},
  booktitle    = {TrustCom},
  pages        = {83--88},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00022},
  doi          = {10.1109/TRUSTCOM56396.2022.00022},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/DuZWT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DunnettPPJJ22,
  author       = {Kealan Dunnett and
                  Shantanu Pal and
                  Guntur Dharma Putra and
                  Zahra Jadidi and
                  Raja Jurdak},
  title        = {A Trusted, Verifiable and Differential Cyber Threat Intelligence Sharing
                  Framework using Blockchain},
  booktitle    = {TrustCom},
  pages        = {1107--1114},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00152},
  doi          = {10.1109/TRUSTCOM56396.2022.00152},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/DunnettPPJJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FarukSIASVRWB22,
  author       = {Md. Jobair Hossain Faruk and
                  Bilash Saha and
                  Mazharul Islam and
                  Fazlul Alam and
                  Hossain Shahriar and
                  Maria Valero and
                  Akond Rahman and
                  Fan Wu and
                  Md. Zakirul Alam Bhuiyan},
  title        = {Development of Blockchain-based e-Voting System: Requirements, Design
                  and Security Perspective},
  booktitle    = {TrustCom},
  pages        = {959--967},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00132},
  doi          = {10.1109/TRUSTCOM56396.2022.00132},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/FarukSIASVRWB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FoleyM22,
  author       = {Myles Foley and
                  Sergio Maffeis},
  title        = {Haxss: Hierarchical Reinforcement Learning for {XSS} Payload Generation},
  booktitle    = {TrustCom},
  pages        = {147--158},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00031},
  doi          = {10.1109/TRUSTCOM56396.2022.00031},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/FoleyM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FuCH22,
  author       = {Jie Fu and
                  Zhili Chen and
                  Xiao Han},
  title        = {Adap {DP-FL:} Differentially Private Federated Learning with Adaptive
                  Noise},
  booktitle    = {TrustCom},
  pages        = {656--663},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00094},
  doi          = {10.1109/TRUSTCOM56396.2022.00094},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/FuCH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FuHS22,
  author       = {Chunlan Fu and
                  Shirong Han and
                  Gang Shen},
  title        = {Detecting Unknown Network Attacks with Attention Encoding and Deep
                  Metric Learning},
  booktitle    = {TrustCom},
  pages        = {283--290},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00047},
  doi          = {10.1109/TRUSTCOM56396.2022.00047},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/FuHS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GaoCHLYD22,
  author       = {Kai Gao and
                  Xiangyu Cheng and
                  Hao Huang and
                  Xunhao Li and
                  Tingyu Yuan and
                  Ronghua Du},
  title        = {False Data Injection Attack Detection in a Platoon of {CACC} in {RSU}},
  booktitle    = {TrustCom},
  pages        = {1324--1329},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00186},
  doi          = {10.1109/TRUSTCOM56396.2022.00186},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GaoCHLYD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GaoLZJSXWLWH22,
  author       = {Jie Gao and
                  Lixia Liu and
                  Tao Zhang and
                  Shenghao Jia and
                  Chuntao Song and
                  Lexi Xu and
                  Yang Wu and
                  Bei Li and
                  Yunyun Wang and
                  Xinjie Hou},
  title        = {Research on User Complaint Problem Location and Complaint Early Warning
                  Stragegy Based on Big Data Analysis},
  booktitle    = {TrustCom},
  pages        = {1504--1509},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00214},
  doi          = {10.1109/TRUSTCOM56396.2022.00214},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/GaoLZJSXWLWH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GargCC22,
  author       = {Shivam Garg and
                  Nandish Chattopadhyay and
                  Anupam Chattopadhyay},
  title        = {Robust Perception for Autonomous Vehicles using Dimensionality Reduction},
  booktitle    = {TrustCom},
  pages        = {1516--1521},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00216},
  doi          = {10.1109/TRUSTCOM56396.2022.00216},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GargCC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GeWXD22,
  author       = {Bin Ge and
                  Ting Wang and
                  Chenxing Xia and
                  Gaole Dai},
  title        = {Image Encryption Algorithm based on Convolutional Neural Network and
                  Four Square Matrix Encoding},
  booktitle    = {TrustCom},
  pages        = {1368--1375},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00193},
  doi          = {10.1109/TRUSTCOM56396.2022.00193},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GeWXD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GearXFGJS22,
  author       = {Joseph Gear and
                  Yue Xu and
                  Ernest Foo and
                  Praveen Gauravaram and
                  Zahra Jadidi and
                  Leonie Simpson},
  title        = {{SCEVD:} Semantic-enhanced Code Embedding for Vulnerability Discovery},
  booktitle    = {TrustCom},
  pages        = {1522--1527},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00217},
  doi          = {10.1109/TRUSTCOM56396.2022.00217},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GearXFGJS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GongWSLZ22,
  author       = {Rui Gong and
                  Lei Wang and
                  Wei Shi and
                  Wei Liu and
                  Jianfeng Zhang},
  title        = {A Hardware Security Isolation Architecture for Intelligent Accelerator},
  booktitle    = {TrustCom},
  pages        = {984--991},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00135},
  doi          = {10.1109/TRUSTCOM56396.2022.00135},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GongWSLZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GuDZY22,
  author       = {Qing Gu and
                  Xiangling Ding and
                  Dengyong Zhang and
                  Ce Yang},
  title        = {Forgery Detection Scheme of Deep Video Frame-rate Up-conversion Based
                  on Dual-stream Multi-scale Spatial-temporal Representation},
  booktitle    = {TrustCom},
  pages        = {733--738},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00104},
  doi          = {10.1109/TRUSTCOM56396.2022.00104},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/GuDZY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GuanCCHJXWXL22,
  author       = {Jian Guan and
                  Xinzhou Cheng and
                  Kun Chao and
                  Xin He and
                  Yuwei Jia and
                  Lexi Xu and
                  Yunyun Wang and
                  Tian Xiao and
                  Bei Li},
  title        = {Research on Capability Building of Mobile Network Data Analysis and
                  Visualization},
  booktitle    = {TrustCom},
  pages        = {1479--1484},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00210},
  doi          = {10.1109/TRUSTCOM56396.2022.00210},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/GuanCCHJXWXL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GuoHWC22,
  author       = {Hui Guo and
                  Chunyan Hou and
                  Jinsong Wang and
                  Chen Chen},
  title        = {A K-Induction Method Extended with Value Analysis for {C} Program
                  Safety Verification},
  booktitle    = {TrustCom},
  pages        = {1072--1077},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00147},
  doi          = {10.1109/TRUSTCOM56396.2022.00147},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GuoHWC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GuoLY22,
  author       = {Lifeng Guo and
                  Huide Lei and
                  Wei{-}Chuen Yau},
  title        = {One-Time Rewritable Blockchain with Traitor Tracing and Bilateral
                  Access Control},
  booktitle    = {TrustCom},
  pages        = {905--912},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00125},
  doi          = {10.1109/TRUSTCOM56396.2022.00125},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GuoLY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GuoSTY22,
  author       = {Shaolong Guo and
                  Zhou Su and
                  Zhiyi Tian and
                  Shui Yu},
  title        = {Utility-Aware Privacy-Preserving Federated Learning through Information
                  Bottleneck},
  booktitle    = {TrustCom},
  pages        = {680--686},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00097},
  doi          = {10.1109/TRUSTCOM56396.2022.00097},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GuoSTY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GuoZXZC22,
  author       = {Zhen Guo and
                  Pengzhou Zhang and
                  Junjie Xia and
                  Zhe Zhou and
                  Juan Cao},
  title        = {Multi-channel Live Video Processing Method Based on Cloud-edge Collaboration},
  booktitle    = {TrustCom},
  pages        = {1404--1409},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00198},
  doi          = {10.1109/TRUSTCOM56396.2022.00198},
  timestamp    = {Tue, 28 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GuoZXZC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Guri22,
  author       = {Mordechai Guri},
  title        = {Near Field Air-Gap Covert Channel Attack},
  booktitle    = {TrustCom},
  pages        = {490--497},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00074},
  doi          = {10.1109/TRUSTCOM56396.2022.00074},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Guri22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HanDLCDWDL22,
  author       = {Dongxu Han and
                  Pu Dong and
                  Ning Li and
                  Xiang Cui and
                  Jiawen Diao and
                  Qing Wang and
                  Dan Du and
                  Yuling Liu},
  title        = {DCC-Find: {DNS} Covert Channel Detection by Features Concatenation-Based
                  {LSTM}},
  booktitle    = {TrustCom},
  pages        = {307--314},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00050},
  doi          = {10.1109/TRUSTCOM56396.2022.00050},
  timestamp    = {Wed, 05 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HanDLCDWDL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HanWWFMLXZ22,
  author       = {Sai Han and
                  Zelin Wang and
                  Guangquan Wang and
                  Qiukeng Fang and
                  Hongbing Ma and
                  Lin Lin and
                  Lexi Xu and
                  Heng Zhang},
  title        = {Automatic Association of Cross-Domain Network Topology},
  booktitle    = {TrustCom},
  pages        = {1173--1178},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00162},
  doi          = {10.1109/TRUSTCOM56396.2022.00162},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/HanWWFMLXZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HanZ22,
  author       = {Fuji Han and
                  Dongjun Zhu},
  title        = {Intelligent Recognition Method of Web Application Categories Based
                  on Multi-layer Simhash Algorithm},
  booktitle    = {TrustCom},
  pages        = {483--489},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00073},
  doi          = {10.1109/TRUSTCOM56396.2022.00073},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HanZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HeCJCWWWDZ22,
  author       = {Xin He and
                  Lijuan Cao and
                  Yuwei Jia and
                  Kun Chao and
                  Miaoqiong Wang and
                  Chao Wang and
                  Yunyun Wang and
                  Runsha Dong and
                  Zhenqiao Zhao},
  title        = {User Analysis and Traffic Prediction Method based on Behavior Slicing},
  booktitle    = {TrustCom},
  pages        = {1605--1610},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00230},
  doi          = {10.1109/TRUSTCOM56396.2022.00230},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HeCJCWWWDZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HeJZC22,
  author       = {Yun He and
                  Xiaoqi Jia and
                  Shengzhi Zhang and
                  Lou Chitkushev},
  title        = {EnShare: Sharing Files Securely and Efficiently in the Cloud using
                  Enclave},
  booktitle    = {TrustCom},
  pages        = {225--232},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00040},
  doi          = {10.1109/TRUSTCOM56396.2022.00040},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HeJZC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HeXW22,
  author       = {Siqi He and
                  Xiaofei Xing and
                  Guojun Wang},
  title        = {{DIV-SC:} {A} Data Integrity Verification Scheme for Centralized Database
                  Using Smart Contract},
  booktitle    = {TrustCom},
  pages        = {1290--1295},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00180},
  doi          = {10.1109/TRUSTCOM56396.2022.00180},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HeXW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HuaZWLZ22,
  author       = {Chengyao Hua and
                  Shigeng Zhang and
                  Weiping Wang and
                  Zhankai Li and
                  Jian Zhang},
  title        = {{WBA:} {A} Warping-based Approach to Generating Imperceptible Adversarial
                  Examples},
  booktitle    = {TrustCom},
  pages        = {361--368},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00057},
  doi          = {10.1109/TRUSTCOM56396.2022.00057},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/HuaZWLZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HuangHZLLYY22,
  author       = {Weiqing Huang and
                  Xinbo Han and
                  Meng Zhang and
                  Min Li and
                  Wen Liu and
                  Zheng Yang and
                  Haitian Yang},
  title        = {{MFFAN:} Multiple Features Fusion with Attention Networks for Malicious
                  Traffic Detection},
  booktitle    = {TrustCom},
  pages        = {391--398},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00061},
  doi          = {10.1109/TRUSTCOM56396.2022.00061},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HuangHZLLYY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HuangNG22,
  author       = {Chin{-}Tser Huang and
                  Laurent Njilla and
                  Tieming Geng},
  title        = {Smarkchain: An Amendable and Correctable Blockchain Based on Smart
                  Markers},
  booktitle    = {TrustCom},
  pages        = {835--842},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00116},
  doi          = {10.1109/TRUSTCOM56396.2022.00116},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HuangNG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HuangYZTWZ22,
  author       = {Chao Huang and
                  Yanqing Yao and
                  Xiaojun Zhang and
                  Da Teng and
                  Yingdong Wang and
                  Lei Zhou},
  title        = {Robust Secure Aggregation with Lightweight Verification for Federated
                  Learning},
  booktitle    = {TrustCom},
  pages        = {582--589},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00085},
  doi          = {10.1109/TRUSTCOM56396.2022.00085},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HuangYZTWZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JiaCCLCLJDC22,
  author       = {Yuwei Jia and
                  Kun Chao and
                  Xinzhou Cheng and
                  Lin Lin and
                  Lijuan Cao and
                  Yi Li and
                  Yuchao Jin and
                  Zixiang Di and
                  Chen Cheng},
  title        = {A Novel User Mobility Prediction Scheme based on the Weighted Markov
                  Chain Model},
  booktitle    = {TrustCom},
  pages        = {1078--1083},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00148},
  doi          = {10.1109/TRUSTCOM56396.2022.00148},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/JiaCCLCLJDC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JiaHWMC22,
  author       = {Qiaowen Jia and
                  Guanxiong Ha and
                  Hanwei Wang and
                  Haoyu Ma and
                  Hang Chen},
  title        = {An enhanced MinHash encryption scheme for encrypted deduplication},
  booktitle    = {TrustCom},
  pages        = {565--573},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00083},
  doi          = {10.1109/TRUSTCOM56396.2022.00083},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/JiaHWMC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JiangZL22,
  author       = {Junfeng Jiang and
                  Yujian Zhang and
                  Junhao Li},
  title        = {A Blockchain-based Privacy-Preserving Scheme for Cross-domain Authentication},
  booktitle    = {TrustCom},
  pages        = {992--999},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00136},
  doi          = {10.1109/TRUSTCOM56396.2022.00136},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/JiangZL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JingCYL22,
  author       = {Xuyang Jing and
                  Xiaojun Cheng and
                  Zheng Yan and
                  Xian Li},
  title        = {Deceiving Learning-based Sketches to Cause Inaccurate Frequency Estimation},
  booktitle    = {TrustCom},
  pages        = {209--216},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00038},
  doi          = {10.1109/TRUSTCOM56396.2022.00038},
  timestamp    = {Sun, 30 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/JingCYL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KalantariHD22,
  author       = {Shirin Kalantari and
                  Danny Hughes and
                  Bart De Decker},
  title        = {Listing the ingredients for {IFTTT} recipes},
  booktitle    = {TrustCom},
  pages        = {1376--1383},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00194},
  doi          = {10.1109/TRUSTCOM56396.2022.00194},
  timestamp    = {Wed, 05 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/KalantariHD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KawaPS22,
  author       = {Piotr Kawa and
                  Marcin Plata and
                  Piotr Syga},
  title        = {SpecRNet: Towards Faster and More Accessible Audio DeepFake Detection},
  booktitle    = {TrustCom},
  pages        = {792--799},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00111},
  doi          = {10.1109/TRUSTCOM56396.2022.00111},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/KawaPS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KrzywieckiS22,
  author       = {Lukasz Krzywiecki and
                  Hannes Salin},
  title        = {Short Signatures via Multiple Hardware Security Modules with Key Splitting
                  in Circuit Breaking Environments},
  booktitle    = {TrustCom},
  pages        = {1528--1533},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00218},
  doi          = {10.1109/TRUSTCOM56396.2022.00218},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/KrzywieckiS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KuangXJL22,
  author       = {Yong Kuang and
                  Hongyun Xu and
                  Rui Jiang and
                  Zhikang Liu},
  title        = {{GTMS:} {A} Gated Linear Unit Based Trust Management System for Internet
                  of Vehicles Using Blockchain Technology},
  booktitle    = {TrustCom},
  pages        = {28--35},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00015},
  doi          = {10.1109/TRUSTCOM56396.2022.00015},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/KuangXJL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LanLLL22,
  author       = {Jinghong Lan and
                  Yanan Li and
                  Bo Li and
                  Xudong Liu},
  title        = {{MATTER:} {A} Multi-Level Attention-Enhanced Representation Learning
                  Model for Network Intrusion Detection},
  booktitle    = {TrustCom},
  pages        = {111--116},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00026},
  doi          = {10.1109/TRUSTCOM56396.2022.00026},
  timestamp    = {Sun, 23 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LanLLL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiCGFGL22,
  author       = {Fenghua Li and
                  Cao Chen and
                  Yunchuan Guo and
                  Liang Fang and
                  Chao Guo and
                  Zifu Li},
  title        = {Efficiently Constructing Topology of Dynamic Networks},
  booktitle    = {TrustCom},
  pages        = {44--51},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00017},
  doi          = {10.1109/TRUSTCOM56396.2022.00017},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiCGFGL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiF22,
  author       = {Mingyue Li and
                  Rong Fei},
  title        = {Research and Implementation of Fault Diagnosis of Switch Machine Based
                  on Data Enhancement and {CNN}},
  booktitle    = {TrustCom},
  pages        = {1467--1472},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00208},
  doi          = {10.1109/TRUSTCOM56396.2022.00208},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiGZFLC22,
  author       = {Meng Li and
                  Jianbo Gao and
                  Zijian Zhang and
                  Chaoping Fu and
                  Chhagan Lal and
                  Mauro Conti},
  title        = {Graph Encryption for Shortest Path Queries with k Unsorted Nodes},
  booktitle    = {TrustCom},
  pages        = {89--96},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00023},
  doi          = {10.1109/TRUSTCOM56396.2022.00023},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiGZFLC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiKYZDT22,
  author       = {Hongjun Li and
                  Fanyu Kong and
                  Jia Yu and
                  Hanlin Zhang and
                  Luhong Diao and
                  Yunting Tao},
  title        = {Privacy-Preserving and Verifiable Outsourcing Message Transmission
                  and Authentication Protocol in IoT},
  booktitle    = {TrustCom},
  pages        = {556--564},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00082},
  doi          = {10.1109/TRUSTCOM56396.2022.00082},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiKYZDT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiLLPZPH22,
  author       = {Heng Li and
                  Zhijun Liu and
                  Yongting Liu and
                  Hui Peng and
                  Rui Zhang and
                  Jun Peng and
                  Zhiwu Huang},
  title        = {Battery Aging-Robust Driving Range Prediction of Electric Bus},
  booktitle    = {TrustCom},
  pages        = {1179--1186},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00163},
  doi          = {10.1109/TRUSTCOM56396.2022.00163},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiLLPZPH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiLWL22,
  author       = {Yuzhe Li and
                  Bo Li and
                  Weiping Wang and
                  Nan Liu},
  title        = {An Efficient Epsilon Selection Method for {DP-ERM} with Expected Accuracy
                  Constraints},
  booktitle    = {TrustCom},
  pages        = {533--540},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00079},
  doi          = {10.1109/TRUSTCOM56396.2022.00079},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiLWL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiLYWLL22,
  author       = {Jinzhou Li and
                  Shouye Lv and
                  Liu Yang and
                  Sheng Wu and
                  Yang Liu and
                  Qijun Luan},
  title        = {Performance Analysis for Bearings-only Geolocation Based on Constellation
                  of Satellites},
  booktitle    = {TrustCom},
  pages        = {1429--1434},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00202},
  doi          = {10.1109/TRUSTCOM56396.2022.00202},
  timestamp    = {Sat, 01 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiLYWLL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiNYDLZ22,
  author       = {Jie Li and
                  Weina Niu and
                  Ran Yan and
                  Zhiqin Duan and
                  Beibei Li and
                  Xiaosong Zhang},
  title        = {{IDROP:} Intelligently detecting Return-Oriented Programming using
                  real-time execution flow and {LSTM}},
  booktitle    = {TrustCom},
  pages        = {167--174},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00033},
  doi          = {10.1109/TRUSTCOM56396.2022.00033},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiNYDLZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiW22,
  author       = {Huapeng Li and
                  Baocheng Wang},
  title        = {A Secure Remote Password Protocol From The Learning With Errors Problem},
  booktitle    = {TrustCom},
  pages        = {1084--1090},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00149},
  doi          = {10.1109/TRUSTCOM56396.2022.00149},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiXLJ22,
  author       = {Meimei Li and
                  Yiyan Xu and
                  Nan Li and
                  Zhongfeng Jin},
  title        = {Adversarial Attacks on Deep Learning-Based Methods for Network Traffic
                  Classification},
  booktitle    = {TrustCom},
  pages        = {1123--1128},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00154},
  doi          = {10.1109/TRUSTCOM56396.2022.00154},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiXLJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiXZXLWGGD22,
  author       = {Bei Li and
                  Tian Xiao and
                  Kai Zhou and
                  Lexi Xu and
                  Guanghai Liu and
                  Bo Wang and
                  Jie Gao and
                  Jian Guan and
                  Zixiang Di},
  title        = {Research on {OTFS} Systems for 6G},
  booktitle    = {TrustCom},
  pages        = {1498--1503},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00213},
  doi          = {10.1109/TRUSTCOM56396.2022.00213},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiXZXLWGGD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiZCLZ22,
  author       = {Yong Li and
                  Zhenghao Zhang and
                  Xi Chen and
                  Ruxian Li and
                  Liang Zhang},
  title        = {Redactable Blockchain with K-Time Controllable Editing},
  booktitle    = {TrustCom},
  pages        = {1455--1461},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00206},
  doi          = {10.1109/TRUSTCOM56396.2022.00206},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiZCLZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiZGLW22,
  author       = {De Li and
                  Hongyan Zheng and
                  Zeming Gan and
                  Xianxian Li and
                  Jinyan Wang},
  title        = {A Green Neural Network with Privacy Preservation and Interpretability},
  booktitle    = {TrustCom},
  pages        = {606--614},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00088},
  doi          = {10.1109/TRUSTCOM56396.2022.00088},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiZGLW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiZHYCPH22,
  author       = {Heng Li and
                  Zeyu Zhu and
                  Peinan He and
                  Yingze Yang and
                  Bin Chen and
                  Jun Peng and
                  Zhiwu Huang},
  title        = {A Thermal-Aware Digital Twin Model of Permanent Magnet Synchronous
                  Motors {(PMSM)} Based on {BP} Neural Networks},
  booktitle    = {TrustCom},
  pages        = {1099--1106},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00151},
  doi          = {10.1109/TRUSTCOM56396.2022.00151},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiZHYCPH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiZWYWL22,
  author       = {Xiaoying Li and
                  Guangxiang Zhang and
                  Yuzhou Wu and
                  Yang Yang and
                  Yuelei Wang and
                  Zhen Liu},
  title        = {Create Persona of Elderly Users by Clustering Analysis of Needs},
  booktitle    = {TrustCom},
  pages        = {1261--1265},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00175},
  doi          = {10.1109/TRUSTCOM56396.2022.00175},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiZWYWL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiZXS22,
  author       = {Xinwei Li and
                  Qianyun Zhang and
                  Lexi Xu and
                  Tao Shang},
  title        = {A Compatible and Identity Privacy-preserving Security Protocol for
                  {ACARS}},
  booktitle    = {TrustCom},
  pages        = {1048--1053},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00143},
  doi          = {10.1109/TRUSTCOM56396.2022.00143},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiZXS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiangDWYL22,
  author       = {Weipeng Liang and
                  Li Dong and
                  Rangding Wang and
                  Diqun Yan and
                  Yuanman Li},
  title        = {Robust Document Image Forgery Localization Against Image Blending},
  booktitle    = {TrustCom},
  pages        = {810--817},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00113},
  doi          = {10.1109/TRUSTCOM56396.2022.00113},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiangDWYL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LinLZWHL22,
  author       = {Chennan Lin and
                  Baisong Liu and
                  Xueyuan Zhang and
                  Zhiye Wang and
                  Ce Hu and
                  Linze Luo},
  title        = {Privacy-Preserving Recommendation with Debiased Obfuscaiton},
  booktitle    = {TrustCom},
  pages        = {590--597},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00086},
  doi          = {10.1109/TRUSTCOM56396.2022.00086},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LinLZWHL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LinWG22,
  author       = {Dejia Lin and
                  Yongdong Wu and
                  Wensheng Gan},
  title        = {Sybil-resistant Truth Discovery in Crowdsourcing by Exploiting the
                  Long-tail Effect},
  booktitle    = {TrustCom},
  pages        = {1545--1550},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00221},
  doi          = {10.1109/TRUSTCOM56396.2022.00221},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LinWG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LinZWWWXHJ22,
  author       = {Lin Lin and
                  Bin Zhu and
                  Zelin Wang and
                  Guangquan Wang and
                  Jianzhi Wang and
                  Lexi Xu and
                  Sai Han and
                  Yuwei Jia},
  title        = {5G-A Capability Exposure Scheme based on Harmonized Communication
                  and Sensing},
  booktitle    = {TrustCom},
  pages        = {1036--1041},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00141},
  doi          = {10.1109/TRUSTCOM56396.2022.00141},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LinZWWWXHJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuL22,
  author       = {Lijian Liu and
                  Jinguo Li},
  title        = {A Blockchain-assisted Collaborative Ensemble Learning for Network
                  Intrusion Detection},
  booktitle    = {TrustCom},
  pages        = {1042--1047},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00142},
  doi          = {10.1109/TRUSTCOM56396.2022.00142},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuLWLB22,
  author       = {Haofeng Liu and
                  Yuefeng Liu and
                  Yue Wang and
                  Bo Liu and
                  Xiang Bao},
  title        = {{EEG} classification algorithm of motor imagery based on CNN-Transformer
                  fusion network},
  booktitle    = {TrustCom},
  pages        = {1302--1309},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00182},
  doi          = {10.1109/TRUSTCOM56396.2022.00182},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuLWLB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuLY22,
  author       = {Ruixuan Liu and
                  Muyang Lyu and
                  Jiangrong Yang},
  title        = {A hybrid {BCI} system combining motor imagery and conceptual imagery
                  in a smart home environment},
  booktitle    = {TrustCom},
  pages        = {1066--1071},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00146},
  doi          = {10.1109/TRUSTCOM56396.2022.00146},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuLY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuLZ22,
  author       = {Yuan Liu and
                  Yanmei Liu and
                  Minjing Zhong},
  title        = {Technical architecture of integrated big data platform},
  booktitle    = {TrustCom},
  pages        = {1551--1556},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00222},
  doi          = {10.1109/TRUSTCOM56396.2022.00222},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuLZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuQJ22,
  author       = {Jie Liu and
                  Xingsheng Qin and
                  Frank Jiang},
  title        = {A quantum inspired differential evolution algorithm with multiple
                  mutation strategies},
  booktitle    = {TrustCom},
  pages        = {927--934},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00128},
  doi          = {10.1109/TRUSTCOM56396.2022.00128},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuQJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuWLH22,
  author       = {Dongdong Liu and
                  Mingsheng Wang and
                  Taotao Li and
                  Ya Han},
  title        = {A Faster Blockchain Sharding Protocol for Decentralized Ledger},
  booktitle    = {TrustCom},
  pages        = {864--873},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00120},
  doi          = {10.1109/TRUSTCOM56396.2022.00120},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuWLH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuWSZH22,
  author       = {Pengfei Liu and
                  Weiping Wang and
                  Hong Song and
                  Shigeng Zhang and
                  Yulu Hong},
  title        = {HashDroid:Extraction of malicious features of Android applications
                  based on function call graph pruning},
  booktitle    = {TrustCom},
  pages        = {66--73},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00020},
  doi          = {10.1109/TRUSTCOM56396.2022.00020},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuWSZH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuXCJ22,
  author       = {Yaqi Liu and
                  Chao Xia and
                  Qiang Cai and
                  Xin Jin},
  title        = {Pyramid Copy-move Forgery Detection Using Adversarial Optimized Self
                  Deep Matching Network},
  booktitle    = {TrustCom},
  pages        = {739--746},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00105},
  doi          = {10.1109/TRUSTCOM56396.2022.00105},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuXCJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuXN22,
  author       = {Shuhe Liu and
                  Xiaolin Xu and
                  Zhefeng Nan},
  title        = {CNN-Based Autonomous Traffic Detection on Unknown Home Security Cameras},
  booktitle    = {TrustCom},
  pages        = {843--850},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00117},
  doi          = {10.1109/TRUSTCOM56396.2022.00117},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuXN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuYWYHK22,
  author       = {Runhao Liu and
                  Bo Yu and
                  Baosheng Wang and
                  Jianbin Ye and
                  Jianxin Huang and
                  Xiangdong Kong},
  title        = {{SEEKER:} {A} Root Cause Analysis Method Based on Deterministic Replay
                  for Multi-Type Network Protocol Vulnerabilities},
  booktitle    = {TrustCom},
  pages        = {131--138},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00029},
  doi          = {10.1109/TRUSTCOM56396.2022.00029},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuYWYHK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuZLCL22,
  author       = {Jingqiang Liu and
                  Xiaoxi Zhu and
                  Chaoge Liu and
                  Xiang Cui and
                  Qixu Liu},
  title        = {{CPGBERT:} An Effective Model for Defect Detection by Learning Program
                  Semantics via Code Property Graph},
  booktitle    = {TrustCom},
  pages        = {274--282},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00046},
  doi          = {10.1109/TRUSTCOM56396.2022.00046},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuZLCL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuZP22,
  author       = {Tongwei Liu and
                  Baokang Zhao and
                  Wei Peng},
  title        = {An Efficient Certificateless Authentication Scheme for Satellite Internet},
  booktitle    = {TrustCom},
  pages        = {331--338},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00053},
  doi          = {10.1109/TRUSTCOM56396.2022.00053},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuZP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LuoHZXWW22,
  author       = {Xuejiao Luo and
                  Xiaohui Han and
                  Wenbo Zuo and
                  Zhengyuan Xu and
                  Zhiwen Wang and
                  Xiaoming Wu},
  title        = {A Dynamic Transaction Pattern Aggregation Neural Network for Money
                  Laundering Detection},
  booktitle    = {TrustCom},
  pages        = {818--826},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00114},
  doi          = {10.1109/TRUSTCOM56396.2022.00114},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LuoHZXWW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LuoLCXZ22,
  author       = {Zhi Luo and
                  Youqi Li and
                  Lixing Chen and
                  Zichuan Xu and
                  Pan Zhou},
  title        = {Data Poisoning Attack to X-armed Bandits},
  booktitle    = {TrustCom},
  pages        = {345--351},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00055},
  doi          = {10.1109/TRUSTCOM56396.2022.00055},
  timestamp    = {Thu, 20 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LuoLCXZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LuoLCXZ22a,
  author       = {Zhi Luo and
                  Youqi Li and
                  Lixing Chen and
                  Zichuan Xu and
                  Pan Zhou},
  title        = {Action-Manipulation Attack and Defense to X-Armed Bandits},
  booktitle    = {TrustCom},
  pages        = {1115--1122},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00153},
  doi          = {10.1109/TRUSTCOM56396.2022.00153},
  timestamp    = {Thu, 20 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LuoLCXZ22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LyuCXLQZDXC22,
  author       = {Feibi Lyu and
                  Xinzhou Cheng and
                  Lexi Xu and
                  Liang Liu and
                  Jinjian Qiao and
                  Lu Zhi and
                  Zixiang Di and
                  Tian Xiao and
                  Chen Cheng},
  title        = {Coverage Estimation of Wireless Network Using Attention U-Net},
  booktitle    = {TrustCom},
  pages        = {1255--1260},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00174},
  doi          = {10.1109/TRUSTCOM56396.2022.00174},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LyuCXLQZDXC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MaWLNSW22,
  author       = {Siyuan Ma and
                  Yuewu Wang and
                  Lingguang Lei and
                  Yingjiao Niu and
                  Haotian Shi and
                  Jie Wang},
  title        = {Booting IoT Terminal Device Securely with eMMC},
  booktitle    = {TrustCom},
  pages        = {1--8},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00012},
  doi          = {10.1109/TRUSTCOM56396.2022.00012},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/MaWLNSW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MaZLYLC22,
  author       = {Xiaoqing Ma and
                  Chao Zheng and
                  Zhao Li and
                  Jiangyi Yin and
                  Qingyun Liu and
                  Xunxun Chen},
  title        = {A Lightweight Graph-based Method to Detect Pornographic and Gambling
                  Websites with Imperfect Datasets},
  booktitle    = {TrustCom},
  pages        = {291--298},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00048},
  doi          = {10.1109/TRUSTCOM56396.2022.00048},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/MaZLYLC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MengQWC22,
  author       = {Yongwei Meng and
                  Tao Qin and
                  Haonian Wang and
                  Zhouguo Chen},
  title        = {{TPIPD:} {A} Robust Model for Online {VPN} Traffic Classification},
  booktitle    = {TrustCom},
  pages        = {105--110},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00025},
  doi          = {10.1109/TRUSTCOM56396.2022.00025},
  timestamp    = {Mon, 29 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/MengQWC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MicaleCMFRP22,
  author       = {Davide Micale and
                  Gianpiero Costantino and
                  Ilaria Matteucci and
                  Florian Fenzl and
                  Roland Rieke and
                  Giuseppe Patan{\`{e}}},
  title        = {{CAHOOT:} a Context-Aware veHicular intrusiOn detectiOn sysTem},
  booktitle    = {TrustCom},
  pages        = {1211--1218},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00168},
  doi          = {10.1109/TRUSTCOM56396.2022.00168},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/MicaleCMFRP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MiyajiTWYM22,
  author       = {Atsuko Miyaji and
                  Tomoka Takahashi and
                  Ping{-}Lun Wang and
                  Tatsuhiro Yamatsuki and
                  Tomoaki Mimoto},
  title        = {Privacy-Preserving Data Analysis without Trusted Third Party},
  booktitle    = {TrustCom},
  pages        = {710--717},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00101},
  doi          = {10.1109/TRUSTCOM56396.2022.00101},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/MiyajiTWYM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MoreRAH22,
  author       = {Stefan More and
                  Sebastian Ramacher and
                  Lukas Alber and
                  Marco Herzl},
  title        = {Extending Expressive Access Policies with Privacy Features},
  booktitle    = {TrustCom},
  pages        = {574--581},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00084},
  doi          = {10.1109/TRUSTCOM56396.2022.00084},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/MoreRAH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PengZXB22,
  author       = {Xiting Peng and
                  Naixian Zhao and
                  Lexi Xu and
                  Shi Bai},
  title        = {Vehicle Classification System with Mobile Edge Computing Based on
                  Broad Learning},
  booktitle    = {TrustCom},
  pages        = {1611--1617},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00231},
  doi          = {10.1109/TRUSTCOM56396.2022.00231},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/PengZXB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PoddarCDM22,
  author       = {Saranda Poddar and
                  Deepraj Chowdhury and
                  Ashutosh Dhar Dwivedi and
                  Raghava Rao Mukkamala},
  title        = {Data Driven based Malicious {URL} Detection using Explainable {AI}},
  booktitle    = {TrustCom},
  pages        = {1266--1272},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00176},
  doi          = {10.1109/TRUSTCOM56396.2022.00176},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/PoddarCDM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PoniszewskaMarandaP22,
  author       = {Aneta Poniszewska{-}Maranda and
                  Kacper Pradzynski},
  title        = {Code-based encryption algorithms for generating and verifying digital
                  signature},
  booktitle    = {TrustCom},
  pages        = {465--472},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00071},
  doi          = {10.1109/TRUSTCOM56396.2022.00071},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/PoniszewskaMarandaP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PuYLJ22,
  author       = {Xinhe Pu and
                  Xiaofang Yuan and
                  Liangsen Li and
                  Weiming Ji},
  title        = {Design and Development of Operation Status Monitoring System for Large
                  Glass Substrate Handling Robot},
  booktitle    = {TrustCom},
  pages        = {1278--1285},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00178},
  doi          = {10.1109/TRUSTCOM56396.2022.00178},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/PuYLJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/QiJX22,
  author       = {Huamei Qi and
                  Li Jie and
                  Wangping Xiong},
  title        = {An Energy-Efficient scheme for industrial wireless sensor network
                  based on hierarchical network structure},
  booktitle    = {TrustCom},
  pages        = {1155--1161},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00159},
  doi          = {10.1109/TRUSTCOM56396.2022.00159},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/QiJX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/QiXJWXN22,
  author       = {Minfeng Qi and
                  Zhiyu Xu and
                  Tengyun Jiao and
                  Sheng Wen and
                  Yang Xiang and
                  Gary Nan},
  title        = {A Comparative Study on the Security of Cryptocurrency Wallets in Android
                  System},
  booktitle    = {TrustCom},
  pages        = {399--406},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00062},
  doi          = {10.1109/TRUSTCOM56396.2022.00062},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/QiXJWXN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/QiZLW22,
  author       = {Jiming Qi and
                  Jiazheng Zhang and
                  Qingxia Liu and
                  Bang Wang},
  title        = {A Flow Attack Strategy based on Critical Links for Cyber-attack},
  booktitle    = {TrustCom},
  pages        = {913--920},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00126},
  doi          = {10.1109/TRUSTCOM56396.2022.00126},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/QiZLW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/QiangL22,
  author       = {Weizhong Qiang and
                  Hao Luo},
  title        = {AutoSlicer: Automatic Program Partitioning for Securing Sensitive
                  Data Based-on Data Dependency Analysis and Code Refactoring},
  booktitle    = {TrustCom},
  pages        = {239--247},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00042},
  doi          = {10.1109/TRUSTCOM56396.2022.00042},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/QiangL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/QiaoZY22,
  author       = {Yixuan Qiao and
                  Minghui Zheng and
                  Jingyi Yang},
  title        = {Implementation of one-time editable blockchain chameleon hash function
                  construction scheme},
  booktitle    = {TrustCom},
  pages        = {851--856},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00118},
  doi          = {10.1109/TRUSTCOM56396.2022.00118},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/QiaoZY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/RastogiDGZA22,
  author       = {Nidhi Rastogi and
                  Sharmishtha Dutta and
                  Alex Gittens and
                  Mohammed J. Zaki and
                  Charu C. Aggarwal},
  title        = {{TINKER:} {A} framework for Open source Cyberthreat Intelligence},
  booktitle    = {TrustCom},
  pages        = {1569--1574},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00225},
  doi          = {10.1109/TRUSTCOM56396.2022.00225},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/RastogiDGZA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/RuanQ22,
  author       = {Ou Ruan and
                  Shanshan Qin},
  title        = {Secure and efficient publicly verifiable ridge regression outsourcing
                  scheme},
  booktitle    = {TrustCom},
  pages        = {703--709},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00100},
  doi          = {10.1109/TRUSTCOM56396.2022.00100},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/RuanQ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SchermannUTBS22,
  author       = {Raphael Schermann and
                  Rainer Urian and
                  Ronald Toegl and
                  Holger Bock and
                  Christian Steger},
  title        = {Enabling Anonymous Authenticated Encryption with a Novel Anonymous
                  Authenticated Credential Key Agreement {(AACKA)}},
  booktitle    = {TrustCom},
  pages        = {646--655},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00093},
  doi          = {10.1109/TRUSTCOM56396.2022.00093},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SchermannUTBS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SentanoeFRG22,
  author       = {Stewart Sentanoe and
                  Christofer Fellicious and
                  Hans P. Reiser and
                  Michael Granitzer},
  title        = {"The Need for Speed": Extracting Session Keys From the Main Memory
                  Using Brute-force and Machine Learning},
  booktitle    = {TrustCom},
  pages        = {1028--1035},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00140},
  doi          = {10.1109/TRUSTCOM56396.2022.00140},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SentanoeFRG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ShanYLZY22,
  author       = {Boshen Shan and
                  Yuanzhi Yao and
                  Weihai Li and
                  Xiaodong Zuo and
                  Nenghai Yu},
  title        = {Fuzzy Keyword Search over Encrypted Cloud Data with Dynamic Fine-grained
                  Access Control},
  booktitle    = {TrustCom},
  pages        = {1340--1347},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00189},
  doi          = {10.1109/TRUSTCOM56396.2022.00189},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ShanYLZY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SheCS22,
  author       = {Cairui She and
                  Liwei Chen and
                  Gang Shi},
  title        = {TFCFI:Transparent Forward Fine-grained Control-Flow Integrity Protection},
  booktitle    = {TrustCom},
  pages        = {407--414},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00063},
  doi          = {10.1109/TRUSTCOM56396.2022.00063},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SheCS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ShenCLLJLDJFJY22,
  author       = {Yixuan Shen and
                  Yu Cheng and
                  Yini Lin and
                  Sicheng Long and
                  Canjian Jiang and
                  Danjie Li and
                  Siyuan Dai and
                  You Jiang and
                  Junbin Fang and
                  Zoe Lin Jiang and
                  Siu{-}Ming Yiu},
  title        = {{MLIA:} modulated {LED} illumination-based adversarial attack on traffic
                  sign recognition system for autonomous vehicle},
  booktitle    = {TrustCom},
  pages        = {1020--1027},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00139},
  doi          = {10.1109/TRUSTCOM56396.2022.00139},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ShenCLLJLDJFJY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ShenSZP22,
  author       = {Yuan Shen and
                  Wei Song and
                  Changsheng Zhao and
                  Zhiyong Peng},
  title        = {Secure Access Control for eHealth Data in Emergency Rescue Case based
                  on Traceable Attribute-Based Encryption},
  booktitle    = {TrustCom},
  pages        = {201--208},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00037},
  doi          = {10.1109/TRUSTCOM56396.2022.00037},
  timestamp    = {Thu, 11 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ShenSZP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ShiWHLZ22,
  author       = {Junyu Shi and
                  Wei Wan and
                  Shengshan Hu and
                  Jianrong Lu and
                  Leo Yu Zhang},
  title        = {Challenges and Approaches for Mitigating Byzantine Attacks in Federated
                  Learning},
  booktitle    = {TrustCom},
  pages        = {139--146},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00030},
  doi          = {10.1109/TRUSTCOM56396.2022.00030},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ShiWHLZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ShiYMQL22,
  author       = {Lei Shi and
                  Peng Yin and
                  Yang Ming and
                  Shengguan Qu and
                  Zhen Liu},
  title        = {A Study on the Exoskeleton Motion Intent Recognition Algorithm for
                  Embedded Calculation},
  booktitle    = {TrustCom},
  pages        = {1091--1098},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00150},
  doi          = {10.1109/TRUSTCOM56396.2022.00150},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ShiYMQL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SimoK22,
  author       = {Hervais Simo and
                  Michael Kreutzer},
  title        = {Towards Automated Detection and Prevention of Regrettable (Self-)
                  Disclosures on Social Media},
  booktitle    = {TrustCom},
  pages        = {638--645},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00092},
  doi          = {10.1109/TRUSTCOM56396.2022.00092},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SimoK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SongGZZZLLWX22,
  author       = {Chuntao Song and
                  Jie Gao and
                  Fan Zhang and
                  Tao Zhang and
                  Yi Zhang and
                  Lixia Liu and
                  Bei Li and
                  Yong Wang and
                  Lexi Xu},
  title        = {Collaborative Improvement of User Experience and Network Quality Based
                  on Big Data},
  booktitle    = {TrustCom},
  pages        = {1243--1248},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00172},
  doi          = {10.1109/TRUSTCOM56396.2022.00172},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/SongGZZZLLWX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SongWJLLF22,
  author       = {Li Song and
                  Qiongxiao Wang and
                  Shijie Jia and
                  Jingqiang Lin and
                  Linli Lu and
                  Yanduo Fu},
  title        = {You Cannot Fully Trust Your Device: An Empirical Study of Client-Side
                  Certificate Validation in WPA2-Enterprise Networks},
  booktitle    = {TrustCom},
  pages        = {266--273},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00045},
  doi          = {10.1109/TRUSTCOM56396.2022.00045},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SongWJLLF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SunFXZLY22,
  author       = {Siyu Sun and
                  Xiaoxuan Fan and
                  Yunzhi Xia and
                  Chenlu Zhu and
                  Shenghao Liu and
                  Lingzhi Yi},
  title        = {Coverage Reliability of IoT Intrusion Detection System based on Attack-Defense
                  Game Design},
  booktitle    = {TrustCom},
  pages        = {74--82},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00021},
  doi          = {10.1109/TRUSTCOM56396.2022.00021},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SunFXZLY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SunHHLLZ22,
  author       = {Haili Sun and
                  Yan Huang and
                  Lansheng Han and
                  Xiang Long and
                  Hongle Liu and
                  Chunjie Zhou},
  title        = {Neural-FacTOR: Neural Representation Learning for Website Fingerprinting
                  Attack over {TOR} Anonymity},
  booktitle    = {TrustCom},
  pages        = {435--440},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00067},
  doi          = {10.1109/TRUSTCOM56396.2022.00067},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SunHHLLZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SunWLFLSQ22,
  author       = {Xin Sun and
                  Wen Wang and
                  Xujian Liu and
                  Jiarong Fan and
                  Zeru Li and
                  Yubo Song and
                  Zhongyuan Qin},
  title        = {VecSeeds: Generate fuzzing testcases from latent vectors based on
                  {VAE-GAN}},
  booktitle    = {TrustCom},
  pages        = {953--958},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00131},
  doi          = {10.1109/TRUSTCOM56396.2022.00131},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SunWLFLSQ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SunYXDG22,
  author       = {Wei Sun and
                  Zheng Yan and
                  Xi Xu and
                  Wenxiu Ding and
                  Lijun Gao},
  title        = {Software Side Channel Vulnerability Detection Based on Similarity
                  Calculation and Deep Learning},
  booktitle    = {TrustCom},
  pages        = {800--809},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00112},
  doi          = {10.1109/TRUSTCOM56396.2022.00112},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SunYXDG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TangCZSZ22,
  author       = {Xin Tang and
                  Xiong Chen and
                  Ran Zhou and
                  Linchi Sui and
                  Tian'e Zhou},
  title        = {Marking based Obfuscation Strategy to resist Side Channel Attack in
                  Cross-User Deduplication for Cloud Storage},
  booktitle    = {TrustCom},
  pages        = {547--555},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00081},
  doi          = {10.1109/TRUSTCOM56396.2022.00081},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/TangCZSZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TangHDHZXJZ22,
  author       = {Shangyu Tang and
                  Mingde Huo and
                  Yi Du and
                  Yuwen Huo and
                  Yan Zhang and
                  Lexi Xu and
                  Ying Ji and
                  Guoyu Zhou},
  title        = {Research and Application of 5G Edge {AI} in Medical Industry},
  booktitle    = {TrustCom},
  pages        = {1462--1466},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00207},
  doi          = {10.1109/TRUSTCOM56396.2022.00207},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/TangHDHZXJZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TangZHYQ22,
  author       = {Chenghua Tang and
                  Chen Zhou and
                  Min Hu and
                  Mengmeng Yang and
                  Baohua Qiang},
  title        = {Malicious Family Identify Combining Multi-channel Mapping Feature
                  Image and Fine-Tuned {CNN}},
  booktitle    = {TrustCom},
  pages        = {9--19},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00013},
  doi          = {10.1109/TRUSTCOM56396.2022.00013},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/TangZHYQ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TengJSZXF22,
  author       = {Yiping Teng and
                  Dongyue Jiang and
                  Mengmeng Sun and
                  Liang Zhao and
                  Li Xu and
                  Chunlong Fan},
  title        = {Privacy-Preserving Top-k Spatio-Textual Similarity Join},
  booktitle    = {TrustCom},
  pages        = {718--726},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00102},
  doi          = {10.1109/TRUSTCOM56396.2022.00102},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/TengJSZXF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ThouvenotCC22,
  author       = {Maxime Thouvenot and
                  Philippe Calvez and
                  Olivier Cur{\'{e}}},
  title        = {Kgastor: a Privacy By Design Knowledge Graph anonymized Store},
  booktitle    = {TrustCom},
  pages        = {670--679},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00096},
  doi          = {10.1109/TRUSTCOM56396.2022.00096},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ThouvenotCC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TianLLCG22,
  author       = {Minqiu Tian and
                  Zifu Li and
                  Fenghua Li and
                  Jin Cao and
                  Chao Guo},
  title        = {A Terminal Security Authentication Protocol for Zero-Trust Satellite
                  IoT},
  booktitle    = {TrustCom},
  pages        = {299--306},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00049},
  doi          = {10.1109/TRUSTCOM56396.2022.00049},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/TianLLCG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TurtiainenCHLS22,
  author       = {Hannu Turtiainen and
                  Andrei Costin and
                  Timo H{\"{a}}m{\"{a}}l{\"{a}}inen and
                  Tuomo Lahtinen and
                  Lauri Sintonen},
  title        = {{CCTVCV:} Computer Vision model/dataset supporting {CCTV} forensics
                  and privacy applications},
  booktitle    = {TrustCom},
  pages        = {1219--1226},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00169},
  doi          = {10.1109/TRUSTCOM56396.2022.00169},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/TurtiainenCHLS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TurtiainenCHLS22a,
  author       = {Hannu Turtiainen and
                  Andrei Costin and
                  Timo H{\"{a}}m{\"{a}}l{\"{a}}inen and
                  Tuomo Lahtinen and
                  Lauri Sintonen},
  title        = {CCTV-FullyAware: toward end-to-end feasible privacy-enhancing and
                  {CCTV} forensics applications},
  booktitle    = {TrustCom},
  pages        = {1227--1234},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00170},
  doi          = {10.1109/TRUSTCOM56396.2022.00170},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/TurtiainenCHLS22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/UshakovSQNMGE22,
  author       = {Vladimir Ushakov and
                  Sampo Sovio and
                  Qingchao Qi and
                  Vijayanand Nayani and
                  Valentin Manea and
                  Philip Ginzboorg and
                  Jan{-}Erik Ekberg},
  title        = {Trusted Hart for Mobile {RISC-V} Security},
  booktitle    = {TrustCom},
  pages        = {1587--1596},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00228},
  doi          = {10.1109/TRUSTCOM56396.2022.00228},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/UshakovSQNMGE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WanWP22,
  author       = {Qichang Wan and
                  Peisen Wang and
                  Xiaobing Pei},
  title        = {{CGDF-GNN:} Cascaded {GNN} fraud detector with dual features facing
                  imbalanced graphs with camouflaged fraudsters},
  booktitle    = {TrustCom},
  pages        = {258--265},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00044},
  doi          = {10.1109/TRUSTCOM56396.2022.00044},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WanWP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangCCL22,
  author       = {Jian Wang and
                  Weiqiong Cao and
                  Hua Chen and
                  Haoyuan Li},
  title        = {Practical Side-Channel Attack on Message Encoding in Masked Kyber},
  booktitle    = {TrustCom},
  pages        = {882--889},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00122},
  doi          = {10.1109/TRUSTCOM56396.2022.00122},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangCCL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangDHS22,
  author       = {Chuang Wang and
                  Yan Ding and
                  Chenlin Huang and
                  Liantao Song},
  title        = {An Optimized Isomorphic Design for the {SM4} Block Cipher Over the
                  Tower Field},
  booktitle    = {TrustCom},
  pages        = {422--428},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00065},
  doi          = {10.1109/TRUSTCOM56396.2022.00065},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangDHS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangH22,
  author       = {Ning Wang and
                  Jia Hu},
  title        = {Performance Analysis of {IEEE} 802.11p for the Internet of Vehicles
                  with Bursty Packet Errors},
  booktitle    = {TrustCom},
  pages        = {1435--1440},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00203},
  doi          = {10.1109/TRUSTCOM56396.2022.00203},
  timestamp    = {Thu, 03 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangHGH22,
  author       = {Mengfan Wang and
                  Guifang Huang and
                  Hongmin Gao and
                  Lei Hu},
  title        = {Improved Zero-Knowledge Proofs for Commitments from Learning Parity
                  with Noise},
  booktitle    = {TrustCom},
  pages        = {415--421},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00064},
  doi          = {10.1109/TRUSTCOM56396.2022.00064},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangHGH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangHGLW22,
  author       = {Fayao Wang and
                  Yuanyuan He and
                  Yunchuan Guo and
                  Peizhi Li and
                  Xinyu Wei},
  title        = {Privacy-Preserving Robust Federated Learning with Distributed Differential
                  Privacy},
  booktitle    = {TrustCom},
  pages        = {598--605},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00087},
  doi          = {10.1109/TRUSTCOM56396.2022.00087},
  timestamp    = {Fri, 01 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangHGLW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangL22,
  author       = {Zilong Wang and
                  Junhuai Li},
  title        = {Guide Tracking Method Based On Particle Filter Fusion},
  booktitle    = {TrustCom},
  pages        = {1348--1353},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00190},
  doi          = {10.1109/TRUSTCOM56396.2022.00190},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangLHZA22,
  author       = {Xingfu Wang and
                  Xiangyu Li and
                  Ammar Hawbani and
                  Liang Zhao and
                  Saeed Hamood Alsamhi},
  title        = {{MGF-GAN:} Multi Granularity Text Feature Fusion for Text-guided-Image
                  Synthesis},
  booktitle    = {TrustCom},
  pages        = {1398--1403},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00197},
  doi          = {10.1109/TRUSTCOM56396.2022.00197},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangLHZA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangLYDWZ22,
  author       = {Baowei Wang and
                  Bin Li and
                  Yi Yuan and
                  Changyu Dai and
                  Yufeng Wu and
                  Weiqian Zheng},
  title        = {{CPDT:} {A} copyright-preserving data trading scheme based on smart
                  contracts and perceptual hashing},
  booktitle    = {TrustCom},
  pages        = {968--975},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00133},
  doi          = {10.1109/TRUSTCOM56396.2022.00133},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangLYDWZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangMLYW22,
  author       = {Juan Wang and
                  Chenjun Ma and
                  Ziang Li and
                  Huanyu Yuan and
                  Jie Wang},
  title        = {ProcGuard: Process Injection Behaviours Detection Using Fine-grained
                  Analysis of {API} Call Chain with Deep Learning},
  booktitle    = {TrustCom},
  pages        = {778--785},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00109},
  doi          = {10.1109/TRUSTCOM56396.2022.00109},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangMLYW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangPH22,
  author       = {Guozhong Wang and
                  Chunling Peng and
                  Yi Huang},
  title        = {The Power Allocation for SWIPT-based Cognitive Two-Way Relay Networks
                  with Rate Fairness Consideration},
  booktitle    = {TrustCom},
  pages        = {60--65},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00019},
  doi          = {10.1109/TRUSTCOM56396.2022.00019},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangPH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangSZLX22,
  author       = {Binglai Wang and
                  Yafei Sang and
                  Yongzheng Zhang and
                  Shuhao Li and
                  Xiaolin Xu},
  title        = {A longitudinal Measurement and Analysis Study of Mozi, an Evolving
                  {P2P} IoT Botnet},
  booktitle    = {TrustCom},
  pages        = {117--122},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00027},
  doi          = {10.1109/TRUSTCOM56396.2022.00027},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangSZLX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangWGZ22,
  author       = {Bo Wang and
                  Lingling Wang and
                  Hongliang Guo and
                  Peng Zhou},
  title        = {Privacy-Preserving Smart Lock System for IoT-enabled Rental House
                  Markets},
  booktitle    = {TrustCom},
  pages        = {664--669},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00095},
  doi          = {10.1109/TRUSTCOM56396.2022.00095},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangWGZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangYZMHZ22,
  author       = {Qinqin Wang and
                  Hanbing Yan and
                  Chang Zhao and
                  Rui Mei and
                  Zhihui Han and
                  Yu Zhou},
  title        = {{APT} Attribution for Malware Based on Time Series Shapelets},
  booktitle    = {TrustCom},
  pages        = {769--777},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00108},
  doi          = {10.1109/TRUSTCOM56396.2022.00108},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangYZMHZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangYZMHZ22a,
  author       = {Qinqin Wang and
                  Hanbing Yan and
                  Chang Zhao and
                  Rui Mei and
                  Zhihui Han and
                  Yu Zhou},
  title        = {Measurement of Malware Family Classification on a Large-Scale Real-World
                  Dataset},
  booktitle    = {TrustCom},
  pages        = {1390--1397},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00196},
  doi          = {10.1109/TRUSTCOM56396.2022.00196},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangYZMHZ22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangZW22,
  author       = {Gangyang Wang and
                  Chunhua Zhu and
                  Jianhou Wang},
  title        = {Detection of impurity content in wheat based on cone-beam {CT}},
  booktitle    = {TrustCom},
  pages        = {1286--1289},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00179},
  doi          = {10.1109/TRUSTCOM56396.2022.00179},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangZW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WenCLS22,
  author       = {Xiuhua Wen and
                  Chunjie Cao and
                  Yifan Li and
                  Yang Sun},
  title        = {{DRSN} with Simple Parameter-Free Attention Module for Specific Emitter
                  Identification},
  booktitle    = {TrustCom},
  pages        = {192--200},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00036},
  doi          = {10.1109/TRUSTCOM56396.2022.00036},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WenCLS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WenLXSWJKL22,
  author       = {Jinbo Wen and
                  Xiaojun Liu and
                  Zehui Xiong and
                  Meng Shen and
                  Siming Wang and
                  Yutao Jiao and
                  Jiawen Kang and
                  He Li},
  title        = {Optimal Block Propagation and Incentive Mechanism for Blockchain Networks
                  in 6G},
  booktitle    = {TrustCom},
  pages        = {369--374},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00058},
  doi          = {10.1109/TRUSTCOM56396.2022.00058},
  timestamp    = {Fri, 28 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WenLXSWJKL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WenWD22,
  author       = {Elliott Wen and
                  Jia Wang and
                  Jens Dietrich},
  title        = {SecretHunter: {A} Large-scale Secret Scanner for Public Git Repositories},
  booktitle    = {TrustCom},
  pages        = {123--130},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00028},
  doi          = {10.1109/TRUSTCOM56396.2022.00028},
  timestamp    = {Tue, 11 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WenWD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WickertBSNM22,
  author       = {Anna{-}Katharina Wickert and
                  Lars Baumg{\"{a}}rtner and
                  Michael Schlichtig and
                  Krishna Narasimhan and
                  Mira Mezini},
  title        = {To Fix or Not to Fix: {A} Critical Study of Crypto-misuses in the
                  Wild},
  booktitle    = {TrustCom},
  pages        = {315--322},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00051},
  doi          = {10.1109/TRUSTCOM56396.2022.00051},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WickertBSNM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WuG22,
  author       = {Peilun Wu and
                  Hui Guo},
  title        = {Holmes: An Efficient and Lightweight Semantic Based Anomalous Email
                  Detector},
  booktitle    = {TrustCom},
  pages        = {1360--1367},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00192},
  doi          = {10.1109/TRUSTCOM56396.2022.00192},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WuG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WuHZR22,
  author       = {Zhitao Wu and
                  Jingjing Hu and
                  Xiaowei Zhang and
                  Wei Ren},
  title        = {tTree+: {A} Threat Tree Model for Representing Complex Semantics},
  booktitle    = {TrustCom},
  pages        = {339--344},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00054},
  doi          = {10.1109/TRUSTCOM56396.2022.00054},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WuHZR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XiaLG22,
  author       = {Zhuoqun Xia and
                  Hongrui Li and
                  Ke Gu},
  title        = {{CECAS:} {A} cloud-edge collaboration authentication scheme based
                  on {V2G} short randomizable signature},
  booktitle    = {TrustCom},
  pages        = {429--434},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00066},
  doi          = {10.1109/TRUSTCOM56396.2022.00066},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/XiaLG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XiaLGMNF22,
  author       = {Chao Xia and
                  Yaqi Liu and
                  Qingxiao Guan and
                  Sai Ma and
                  Yu Nan and
                  Jiahui Fu},
  title        = {Steganalysis for Small-Scale Training Image Pairs with Cover-Stego
                  Feature Difference Model},
  booktitle    = {TrustCom},
  pages        = {233--238},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00041},
  doi          = {10.1109/TRUSTCOM56396.2022.00041},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/XiaLGMNF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XiaZTZ22,
  author       = {Zhuoqun Xia and
                  Kaixin Zhou and
                  Jingjing Tan and
                  Hongmei Zhou},
  title        = {Bidirectional LSTM-based attention mechanism for {CNN} power theft
                  detection},
  booktitle    = {TrustCom},
  pages        = {323--330},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00052},
  doi          = {10.1109/TRUSTCOM56396.2022.00052},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/XiaZTZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XiaoLDLXGWCL22,
  author       = {Tian Xiao and
                  Bei Li and
                  Zixiang Di and
                  Guanghai Liu and
                  Lexi Xu and
                  Jian Guan and
                  Zhaoning Wang and
                  Chen Cheng and
                  Yi Li},
  title        = {Research on Intelligent 5G Remote Interference Avoidance and Clustering
                  Scheme},
  booktitle    = {TrustCom},
  pages        = {1491--1497},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00212},
  doi          = {10.1109/TRUSTCOM56396.2022.00212},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/XiaoLDLXGWCL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XiaoQFCLW22,
  author       = {Hao Xiao and
                  Yuan Qiu and
                  Rong Fei and
                  Xiongbo Chen and
                  Zuo Liu and
                  Zongling Wu},
  title        = {End-to-End Speech Recognition Technology Based on Multi-Stream {CNN}},
  booktitle    = {TrustCom},
  pages        = {1310--1315},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00183},
  doi          = {10.1109/TRUSTCOM56396.2022.00183},
  timestamp    = {Wed, 05 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/XiaoQFCLW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XiaoXLXCLLZZ22,
  author       = {Tian Xiao and
                  Guoping Xu and
                  Bei Li and
                  Lexi Xu and
                  Xinzhou Cheng and
                  Feibi Lyu and
                  Guanghai Liu and
                  Yi Zhang and
                  Qingqing Zhang},
  title        = {{AI} based Collaborative Optimization Scheme for Multi-Frequency Heterogeneous
                  4G/5G Networks},
  booktitle    = {TrustCom},
  pages        = {1129--1135},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00155},
  doi          = {10.1109/TRUSTCOM56396.2022.00155},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/XiaoXLXCLLZZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XiaoXX22,
  author       = {Xiao Xiao and
                  Minghua Xu and
                  Han Xu},
  title        = {A Novel Asynchronous Evolution Opinion Dynamics Model},
  booktitle    = {TrustCom},
  pages        = {786--791},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00110},
  doi          = {10.1109/TRUSTCOM56396.2022.00110},
  timestamp    = {Mon, 24 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/XiaoXX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XieLYZ22,
  author       = {Lixia Xie and
                  Siyu Liu and
                  Hongyu Yang and
                  Liang Zhang},
  title        = {{DRICP:} Defect Risk Identification Using Sample Category Perception},
  booktitle    = {TrustCom},
  pages        = {441--448},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00068},
  doi          = {10.1109/TRUSTCOM56396.2022.00068},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/XieLYZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XinSFXWL22,
  author       = {Wu Xin and
                  Qingni Shen and
                  Ke Feng and
                  Yutang Xia and
                  Zhonghai Wu and
                  Zhenghao Lin},
  title        = {Personalized User Profiles-based Insider Threat Detection for Distributed
                  File System},
  booktitle    = {TrustCom},
  pages        = {1441--1446},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00204},
  doi          = {10.1109/TRUSTCOM56396.2022.00204},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/XinSFXWL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XuGQHAL22,
  author       = {Yang Xu and
                  Jie Guo and
                  Weidong Qiu and
                  Zheng Huang and
                  Enes Altuncu and
                  Shujun Li},
  title        = {"Comments Matter and The More The Better!": Improving Rumor Detection
                  with User Comments},
  booktitle    = {TrustCom},
  pages        = {383--390},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00060},
  doi          = {10.1109/TRUSTCOM56396.2022.00060},
  timestamp    = {Thu, 07 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/XuGQHAL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XuSHN22,
  author       = {Yuting Xu and
                  Mang Su and
                  Jinpeng Hou and
                  Chong Nie},
  title        = {Federated Learning Scheme with Dual Security of Identity Authentication
                  and Verification},
  booktitle    = {TrustCom},
  pages        = {695--702},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00099},
  doi          = {10.1109/TRUSTCOM56396.2022.00099},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/XuSHN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XuZCMZW22,
  author       = {Jinke Xu and
                  Junwei Zhang and
                  Yujie Chen and
                  Gang Ma and
                  Zhanpeng Zhu and
                  Lirong Wang},
  title        = {Arteriovenous fistula stenosis classification method based on Auxiliary
                  Wave and Transformer},
  booktitle    = {TrustCom},
  pages        = {1168--1172},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00161},
  doi          = {10.1109/TRUSTCOM56396.2022.00161},
  timestamp    = {Tue, 02 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/XuZCMZW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YamamotoS22,
  author       = {Akito Yamamoto and
                  Tetsuo Shibuya},
  title        = {Efficient and Highly Accurate Differentially Private Statistical Genomic
                  Analysis using Discrete Fourier Transform},
  booktitle    = {TrustCom},
  pages        = {525--532},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00078},
  doi          = {10.1109/TRUSTCOM56396.2022.00078},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/YamamotoS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YanWCWZWM22,
  author       = {Na Yan and
                  Yu Wen and
                  Luyao Chen and
                  Yanna Wu and
                  Boyang Zhang and
                  Zhaoyang Wang and
                  Dan Meng},
  title        = {Deepro: Provenance-based {APT} Campaigns Detection via {GNN}},
  booktitle    = {TrustCom},
  pages        = {747--758},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00106},
  doi          = {10.1109/TRUSTCOM56396.2022.00106},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YanWCWZWM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YanZY22,
  author       = {Baochen Yan and
                  Rui Zhang and
                  Zheng Yan},
  title        = {VoiceSketch: a Privacy-Preserving Voiceprint Authentication System},
  booktitle    = {TrustCom},
  pages        = {623--630},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00090},
  doi          = {10.1109/TRUSTCOM56396.2022.00090},
  timestamp    = {Sun, 30 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YanZY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YangDWT22,
  author       = {Weilin Yang and
                  Zhonghui Du and
                  Yonghui Wu and
                  Yi Tang},
  title        = {Confusing Traffic against Intra-domain Webpage Fingerprinting Attacks},
  booktitle    = {TrustCom},
  pages        = {1249--1254},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00173},
  doi          = {10.1109/TRUSTCOM56396.2022.00173},
  timestamp    = {Fri, 14 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YangDWT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YangGLSX22,
  author       = {Jingyan Yang and
                  Shang Gao and
                  Guyue Li and
                  Rui Song and
                  Bin Xiao},
  title        = {Reducing Gas Consumption of Tornado Cash and Other Smart Contracts
                  in Ethereum},
  booktitle    = {TrustCom},
  pages        = {921--926},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00127},
  doi          = {10.1109/TRUSTCOM56396.2022.00127},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YangGLSX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YangGYZ22,
  author       = {Chunlei Yang and
                  Yunchuan Guo and
                  Mingjie Yu and
                  Lingcui Zhang},
  title        = {Truthfully Negotiating Usage Policy for Data Sovereignty},
  booktitle    = {TrustCom},
  pages        = {20--27},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00014},
  doi          = {10.1109/TRUSTCOM56396.2022.00014},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YangGYZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YangLLS22,
  author       = {Mei Yang and
                  Chong Liu and
                  Huiyun Li and
                  Cuiping Shao},
  title        = {Efficient {SM2} Hardware Design for Digital Signature of Internet
                  of Vehicles},
  booktitle    = {TrustCom},
  pages        = {890--896},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00123},
  doi          = {10.1109/TRUSTCOM56396.2022.00123},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YangLLS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YangYWLLH22,
  author       = {Mingyu Yang and
                  Tao Yang and
                  Haiyang Wang and
                  Hao Li and
                  Tianming Li and
                  Biao Hu},
  title        = {Ferrite microstrip limiter based on the equivalent nonlinear loss
                  simulation model for the narrow microwave pulse environment},
  booktitle    = {TrustCom},
  pages        = {1330--1332},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00187},
  doi          = {10.1109/TRUSTCOM56396.2022.00187},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YangYWLLH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YangYZC22,
  author       = {Hongyu Yang and
                  Haiyun Yang and
                  Liang Zhang and
                  Xiang Cheng},
  title        = {Source Code Vulnerability Detection Using Vulnerability Dependency
                  Representation Graph},
  booktitle    = {TrustCom},
  pages        = {457--464},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00070},
  doi          = {10.1109/TRUSTCOM56396.2022.00070},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YangYZC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YangZDYL22,
  author       = {Biao Yang and
                  Shanshan Zhao and
                  Hongfei Du and
                  Minju Yi and
                  Ziwei Liu},
  title        = {{PAPR} Suppression in Radar Communication Integration System Based
                  on Subcarrier Reservation},
  booktitle    = {TrustCom},
  pages        = {1424--1428},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00201},
  doi          = {10.1109/TRUSTCOM56396.2022.00201},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YangZDYL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YuLDLWLPG22,
  author       = {Haisheng Yu and
                  Yan Liu and
                  Lihong Duan and
                  Sanwei Liu and
                  Wenyong Wang and
                  Dong Liu and
                  Zirui Peng and
                  Daobiao Gong},
  title        = {Cache Top-level domain locally: make {DNS} respond quickly in mobile
                  network},
  booktitle    = {TrustCom},
  pages        = {1205--1210},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00167},
  doi          = {10.1109/TRUSTCOM56396.2022.00167},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YuLDLWLPG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YuanCYYY22,
  author       = {Shuguang Yuan and
                  Chi Chen and
                  Ke Yang and
                  Tengfei Yang and
                  Jing Yu},
  title        = {An Attribute-attack-proof Watermarking Technique for Relational Database},
  booktitle    = {TrustCom},
  pages        = {1136--1143},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00156},
  doi          = {10.1109/TRUSTCOM56396.2022.00156},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YuanCYYY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YueYLMHT22,
  author       = {Yi Yue and
                  Wencong Yang and
                  Xiao Liang and
                  Xihuizi Meng and
                  Rong Huang and
                  Xiongyang Tang},
  title        = {Energy-efficient and Traffic-aware {VNF} Placement for Vertical Services
                  in 5G Networks},
  booktitle    = {TrustCom},
  pages        = {1316--1322},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00184},
  doi          = {10.1109/TRUSTCOM56396.2022.00184},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/YueYLMHT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZangotiMPSGR22,
  author       = {Hussein Zangoti and
                  Alex Pissinou Makki and
                  Niki Pissinou and
                  Abdur R. Shahid and
                  Omar J. Guerra and
                  Joel Rodriguez},
  title        = {A Multidimensional Blockchain Framework For Mobile Internet of Things},
  booktitle    = {TrustCom},
  pages        = {935--944},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00129},
  doi          = {10.1109/TRUSTCOM56396.2022.00129},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZangotiMPSGR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZeroualHAJ22,
  author       = {Marwa Zeroual and
                  Brahim Hamid and
                  Morayo Adedjouma and
                  Jason Jaskolka},
  title        = {Towards logical specification of adversarial examples in machine learning},
  booktitle    = {TrustCom},
  pages        = {1575--1580},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00226},
  doi          = {10.1109/TRUSTCOM56396.2022.00226},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZeroualHAJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhaiYWHYL22,
  author       = {You Zhai and
                  Jian Yang and
                  Zixiang Wang and
                  Longtao He and
                  Liqun Yang and
                  Zhoujun Li},
  title        = {Cdga: {A} GAN-based Controllable Domain Generation Algorithm},
  booktitle    = {TrustCom},
  pages        = {352--360},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00056},
  doi          = {10.1109/TRUSTCOM56396.2022.00056},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhaiYWHYL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangBWXCC22,
  author       = {Junwei Zhang and
                  Rui Bao and
                  Lirong Wang and
                  Jinke Xu and
                  Yujie Chen and
                  Xueqin Chen},
  title        = {Denoising method of {ECG} signal based on Channel Attention Mechanism},
  booktitle    = {TrustCom},
  pages        = {1273--1277},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00177},
  doi          = {10.1109/TRUSTCOM56396.2022.00177},
  timestamp    = {Wed, 05 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangBWXCC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangDZTL22,
  author       = {Tao Zhang and
                  Bowen Deng and
                  Lele Zheng and
                  Ze Tong and
                  Qi Li},
  title        = {HyperMean: Effective Multidimensional Mean Estimation with Local Differential
                  Privacy},
  booktitle    = {TrustCom},
  pages        = {615--622},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00089},
  doi          = {10.1109/TRUSTCOM56396.2022.00089},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangDZTL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangGHLD22,
  author       = {Yanghui Zhang and
                  Kai Gao and
                  Shuo Huang and
                  Xunhao Li and
                  Ronghua Du},
  title        = {Forgery Trajectory Injection Attack Detection for Traffic Lights under
                  Connected Vehicle Environment},
  booktitle    = {TrustCom},
  pages        = {1333--1339},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00188},
  doi          = {10.1109/TRUSTCOM56396.2022.00188},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangGHLD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangGLD22,
  author       = {Zhiwei Zhang and
                  Xunzhang Gao and
                  Shuowei Liu and
                  Yujia Diao},
  title        = {An Empirical Study Towards {SAR} Adversarial Examples},
  booktitle    = {TrustCom},
  pages        = {1144--1148},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00157},
  doi          = {10.1109/TRUSTCOM56396.2022.00157},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangGLD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangH22,
  author       = {Chaochao Zhang and
                  Rui Hou},
  title        = {Security Support on Memory Controller for Heap Memory Safety},
  booktitle    = {TrustCom},
  pages        = {248--257},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00043},
  doi          = {10.1109/TRUSTCOM56396.2022.00043},
  timestamp    = {Tue, 30 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangLSXCCCXYH22,
  author       = {Heng Zhang and
                  Wenyu Li and
                  Lianbo Song and
                  Lexi Xu and
                  Xinzhou Cheng and
                  Lijuan Cao and
                  Kun Chao and
                  Wei Xia and
                  Qinqin Yu and
                  Sai Han},
  title        = {Research on Enterprises Loss in Regional Economic Risk Management},
  booktitle    = {TrustCom},
  pages        = {1485--1490},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00211},
  doi          = {10.1109/TRUSTCOM56396.2022.00211},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangLSXCCCXYH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangMCSCQ22,
  author       = {Lei Zhang and
                  Dong Mao and
                  Zuge Chen and
                  Yubo Song and
                  Liquan Chen and
                  Zhongyuan Qin},
  title        = {Smart Grid Data Aggregation Scheme Based on Local Differential Privacy},
  booktitle    = {TrustCom},
  pages        = {1534--1539},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00219},
  doi          = {10.1109/TRUSTCOM56396.2022.00219},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangMCSCQ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangSWCRY22,
  author       = {Yu'Ang Zhang and
                  Yujie Song and
                  Yu Wang and
                  Yue Cao and
                  Xuefeng Ren and
                  Fei Yan},
  title        = {{TECS:} {A} Trust Model for VANETs Using Eigenvector Centrality and
                  Social Metrics},
  booktitle    = {TrustCom},
  pages        = {36--43},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00016},
  doi          = {10.1109/TRUSTCOM56396.2022.00016},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangSWCRY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangWHZA22,
  author       = {Shuai Zhang and
                  Xingfu Wang and
                  Ammar Hawbani and
                  Liang Zhao and
                  Saeed Hamood Alsamhi},
  title        = {Multimodal Graph Reasoning and Fusion for Video Question Answering},
  booktitle    = {TrustCom},
  pages        = {1410--1415},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00199},
  doi          = {10.1109/TRUSTCOM56396.2022.00199},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangWHZA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangXL22,
  author       = {Kai Zhang and
                  He Xiao and
                  Qiuming Liu},
  title        = {Data Integrity Verification Scheme Based on Blockchain Smart Contract},
  booktitle    = {TrustCom},
  pages        = {857--863},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00119},
  doi          = {10.1109/TRUSTCOM56396.2022.00119},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangXL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangZJZHCWHX22,
  author       = {Qingqing Zhang and
                  Tao Zhang and
                  Shikun Jiang and
                  Qiang Zhang and
                  Yuhui Han and
                  Xinzhou Cheng and
                  Yunyun Wang and
                  Xin He and
                  Tian Xiao},
  title        = {Big Data based Potential Fixed-Mobile Convergence User Mining},
  booktitle    = {TrustCom},
  pages        = {1193--1198},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00165},
  doi          = {10.1109/TRUSTCOM56396.2022.00165},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangZJZHCWHX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangZSCCXXL22,
  author       = {Yi Zhang and
                  Fan Zhang and
                  Chuntao Song and
                  Xinzhou Cheng and
                  Chen Cheng and
                  Lexi Xu and
                  Tian Xiao and
                  Bei Li},
  title        = {Telecom Customer Chum Prediction based on Half Termination Dynamic
                  Label and XGBoost},
  booktitle    = {TrustCom},
  pages        = {1563--1568},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00224},
  doi          = {10.1109/TRUSTCOM56396.2022.00224},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangZSCCXXL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangZZTZ22,
  author       = {Zhaoxi Zhang and
                  Leo Yu Zhang and
                  Xufei Zheng and
                  Jinyu Tian and
                  Jiantao Zhou},
  title        = {Self-Supervised Adversarial Example Detection by Disentangled Representation},
  booktitle    = {TrustCom},
  pages        = {1000--1007},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00137},
  doi          = {10.1109/TRUSTCOM56396.2022.00137},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangZZTZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhaoZQHZ22,
  author       = {Hongce Zhao and
                  Shunliang Zhang and
                  Zhuang Qiao and
                  Xianjin Huang and
                  Xiaohui Zhang},
  title        = {On the Performance of Deep Learning Methods for Identifying Abnormal
                  Encrypted Proxy Traffic},
  booktitle    = {TrustCom},
  pages        = {1416--1423},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00200},
  doi          = {10.1109/TRUSTCOM56396.2022.00200},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhaoZQHZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhengLJZXXLC22,
  author       = {Yuting Zheng and
                  Yi Li and
                  Yuchao Jin and
                  Xiaomeng Zhu and
                  Lexi Xu and
                  Tian Xiao and
                  Bei Li and
                  Xinzhou Cheng},
  title        = {Mahalanobis Distance and Pauta Criterion based Log Anomaly Detection
                  Algorithm for 5G Mobile Network},
  booktitle    = {TrustCom},
  pages        = {1384--1389},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00195},
  doi          = {10.1109/TRUSTCOM56396.2022.00195},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhengLJZXXLC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhengO22,
  author       = {Wanjia Zheng and
                  Kazumasa Omote},
  title        = {Clean-label Backdoor Attack on Machine Learning-based Malware Detection
                  Models and Countermeasures},
  booktitle    = {TrustCom},
  pages        = {1235--1242},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00171},
  doi          = {10.1109/TRUSTCOM56396.2022.00171},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhengO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhouCSJTMW22,
  author       = {Zhe Zhou and
                  Xiaoyu Cheng and
                  Yang Sun and
                  Fang Jiang and
                  Fei Tong and
                  Yuxing Mao and
                  Ruilin Wang},
  title        = {Cache Design Effect on Microarchitecture Security: {A} Contrast between
                  Xuantie-910 and {BOOM}},
  booktitle    = {TrustCom},
  pages        = {1199--1204},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00166},
  doi          = {10.1109/TRUSTCOM56396.2022.00166},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhouCSJTMW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhouDMZ22,
  author       = {Zhipeng Zhou and
                  Chenyu Dong and
                  Donger Mo and
                  Peijia Zheng},
  title        = {Privacy-preserving Decision Making Based on Q-Learning in Cloud Computing},
  booktitle    = {TrustCom},
  pages        = {727--732},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00103},
  doi          = {10.1109/TRUSTCOM56396.2022.00103},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhouDMZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhouLLRF22,
  author       = {Zhiwen Zhou and
                  Ximeng Liu and
                  Jiayin Li and
                  Junxi Ruan and
                  Mingyuan Fan},
  title        = {Dynamically Selected Mixup Machine Unlearning},
  booktitle    = {TrustCom},
  pages        = {514--524},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00077},
  doi          = {10.1109/TRUSTCOM56396.2022.00077},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhouLLRF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhuLZXXLDZC22,
  author       = {Xiaomeng Zhu and
                  Yi Li and
                  Yuting Zheng and
                  Rui Xia and
                  Lexi Xu and
                  Bei Li and
                  Zixiang Di and
                  Lu Zhi and
                  Xinzhou Cheng},
  title        = {Research on 5G Network Capacity and Expansion},
  booktitle    = {TrustCom},
  pages        = {1473--1478},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00209},
  doi          = {10.1109/TRUSTCOM56396.2022.00209},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhuLZXXLDZC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhuSWXHG22,
  author       = {Zhishen Zhu and
                  Junzheng Shi and
                  Chonghua Wang and
                  Gang Xiong and
                  Zhiqiang Hao and
                  Gaopeng Gou},
  title        = {{MCFM:} Discover Sensitive Behavior from Encrypted Traffic in Industrial
                  Control System},
  booktitle    = {TrustCom},
  pages        = {897--904},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00124},
  doi          = {10.1109/TRUSTCOM56396.2022.00124},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhuSWXHG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trustcom/2022,
  title        = {{IEEE} International Conference on Trust, Security and Privacy in
                  Computing and Communications, TrustCom 2022, Wuhan, China, December
                  9-11, 2022},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022},
  doi          = {10.1109/TRUSTCOM56396.2022},
  isbn         = {978-1-6654-9425-0},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/0001FLB21,
  author       = {Xiaomin Zhu and
                  Bowen Fei and
                  Daqian Liu and
                  Weidong Bao},
  title        = {Adaptive Clustering Ensemble Method Based on Uncertain Entropy Decision-Making},
  booktitle    = {TrustCom},
  pages        = {61--67},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00026},
  doi          = {10.1109/TRUSTCOM53373.2021.00026},
  timestamp    = {Wed, 22 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/0001FLB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/0001MP21,
  author       = {Dominik Ziegler and
                  Alexander Marsalek and
                  Gerald Palfinger},
  title        = {White-Box Traceable Attribute-Based Encryption with Hidden Policies
                  and Outsourced Decryption},
  booktitle    = {TrustCom},
  pages        = {331--338},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00059},
  doi          = {10.1109/TRUSTCOM53373.2021.00059},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/0001MP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/0011ZGZZ021,
  author       = {Tao Peng and
                  Wentao Zhong and
                  Kejian Guan and
                  Yipeng Zou and
                  Jiawei Zhu and
                  Guojun Wang},
  title        = {A Fine-grained Privacy-Preserving Profile Matching Scheme in Mobile
                  Social Networks},
  booktitle    = {TrustCom},
  pages        = {413--419},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00069},
  doi          = {10.1109/TRUSTCOM53373.2021.00069},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/0011ZGZZ021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AbrahamKMRS21,
  author       = {Andreas Abraham and
                  Karl Koch and
                  Stefan More and
                  Sebastian Ramacher and
                  Miha Stopar},
  title        = {Privacy-Preserving eID Derivation to Self-Sovereign Identity Systems
                  with Offline Revocation},
  booktitle    = {TrustCom},
  pages        = {506--513},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00080},
  doi          = {10.1109/TRUSTCOM53373.2021.00080},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/AbrahamKMRS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AlhajailiJ21,
  author       = {Sara Alhajaili and
                  Arshad Jhumka},
  title        = {Reliable Logging in Wireless IoT Networks in the Presence of Byzantine
                  Faults},
  booktitle    = {TrustCom},
  pages        = {17--25},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00021},
  doi          = {10.1109/TRUSTCOM53373.2021.00021},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/AlhajailiJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AlrabaeeCQK21,
  author       = {Saed Alrabaee and
                  Kim{-}Kwang Raymond Choo and
                  Mohammad Qbea'h and
                  Mahmoud Khasawneh},
  title        = {BinDeep: Binary to Source Code Matching Using Deep Learning},
  booktitle    = {TrustCom},
  pages        = {1100--1107},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00150},
  doi          = {10.1109/TRUSTCOM53373.2021.00150},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/AlrabaeeCQK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AotaB0M21,
  author       = {Masaki Aota and
                  Tao Ban and
                  Takeshi Takahashi and
                  Noboru Murata},
  title        = {Multi-label Positive and Unlabeled Learning and its Application to
                  Common Vulnerabilities and Exposure Categorization},
  booktitle    = {TrustCom},
  pages        = {988--996},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00137},
  doi          = {10.1109/TRUSTCOM53373.2021.00137},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/AotaB0M21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Balasubramanian21,
  author       = {Venki Balasubramanian and
                  Rehena Sulthana and
                  Andrew Stranieri and
                  G. Manoharan and
                  Teena Arora and
                  Ram Srinivasan and
                  K. Mahalakshmi and
                  Varun G. Menon},
  title        = {A Secured Real-Time IoMT Application for Monitoring Isolated {COVID-19}
                  Patients using Edge Computing},
  booktitle    = {TrustCom},
  pages        = {1227--1234},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00167},
  doi          = {10.1109/TRUSTCOM53373.2021.00167},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Balasubramanian21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BaoL21,
  author       = {Tingting Bao and
                  Yang Liu},
  title        = {A privacy-preserving framework for smart contracts based on stochastic
                  model checking},
  booktitle    = {TrustCom},
  pages        = {460--467},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00075},
  doi          = {10.1109/TRUSTCOM53373.2021.00075},
  timestamp    = {Thu, 19 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/BaoL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BrinzaCP21,
  author       = {Mihail Brinza and
                  Miguel Correia and
                  Jo{\~{a}}o Pereira},
  title        = {Virtual Static Security Analyzer for Web Applications},
  booktitle    = {TrustCom},
  pages        = {840--848},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00119},
  doi          = {10.1109/TRUSTCOM53373.2021.00119},
  timestamp    = {Tue, 15 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/BrinzaCP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/CaiSD21,
  author       = {Mengjian Cai and
                  Zhanli Sun and
                  Xin Deng},
  title        = {Multidimensional Observation of Blockchain Security},
  booktitle    = {TrustCom},
  pages        = {1463--1466},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00208},
  doi          = {10.1109/TRUSTCOM53373.2021.00208},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/CaiSD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/CaiZZCLL21,
  author       = {Zhiwei Cai and
                  Huicong Zeng and
                  Peijia Zheng and
                  Ziyan Cheng and
                  Weiqi Luo and
                  Hongmei Liu},
  title        = {Secure Homomorphic Evaluation of Discrete Cosine Transform with High
                  Precision},
  booktitle    = {TrustCom},
  pages        = {266--272},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00051},
  doi          = {10.1109/TRUSTCOM53373.2021.00051},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/CaiZZCLL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/CaoCXCLJSZ21,
  author       = {Lijuan Cao and
                  Xinzhou Cheng and
                  Lexi Xu and
                  Chen Cheng and
                  Yi Li and
                  Yuwei Jia and
                  Chuntao Song and
                  Heng Zhang},
  title        = {Preference Recommendation Scheme based on Social Networks of Mobile
                  Users},
  booktitle    = {TrustCom},
  pages        = {1525--1530},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00220},
  doi          = {10.1109/TRUSTCOM53373.2021.00220},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/CaoCXCLJSZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/CastellonRK0B21,
  author       = {Cesar Castellon and
                  Swapnoneel Roy and
                  O. Patrick Kreidl and
                  Ayan Dutta and
                  Ladislau B{\"{o}}l{\"{o}}ni},
  title        = {Energy Efficient Merkle Trees for Blockchains},
  booktitle    = {TrustCom},
  pages        = {1093--1099},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00149},
  doi          = {10.1109/TRUSTCOM53373.2021.00149},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/CastellonRK0B21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChangWGLLW21,
  author       = {Jiqing Chang and
                  Jin Wang and
                  Fei Gu and
                  Kejie Lu and
                  Lingzhi Li and
                  Jianping Wang},
  title        = {{PCHEC:} {A} Private Coded Computation Scheme For Heterogeneous Edge
                  Computing},
  booktitle    = {TrustCom},
  pages        = {339--346},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00060},
  doi          = {10.1109/TRUSTCOM53373.2021.00060},
  timestamp    = {Tue, 17 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChangWGLLW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenGHMM21,
  author       = {Ligeng Chen and
                  Jian Guo and
                  Zhongling He and
                  Dongliang Mu and
                  Bing Mao},
  title        = {RoBin: Facilitating the Reproduction of Configuration-Related Vulnerability},
  booktitle    = {TrustCom},
  pages        = {91--98},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00030},
  doi          = {10.1109/TRUSTCOM53373.2021.00030},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenGHMM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenLYLSXW21,
  author       = {Xiarun Chen and
                  Qien Li and
                  Zhou Yang and
                  Yongzhi Liu and
                  Shaosen Shi and
                  Chenglin Xie and
                  Weiping Wen},
  title        = {VulChecker: Achieving More Effective Taint Analysis by Identifying
                  Sanitizers Automatically},
  booktitle    = {TrustCom},
  pages        = {774--782},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00112},
  doi          = {10.1109/TRUSTCOM53373.2021.00112},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenLYLSXW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenXZMCW21,
  author       = {Yuhang Chen and
                  Wenchang Xu and
                  Wenliang Zhu and
                  Gang Ma and
                  Xiaohe Chen and
                  Lirong Wang},
  title        = {Beat-to-beat Heart Rate Detection Based on Seismocardiogram Using
                  BiLSTM Network},
  booktitle    = {TrustCom},
  pages        = {1503--1507},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00216},
  doi          = {10.1109/TRUSTCOM53373.2021.00216},
  timestamp    = {Tue, 02 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenXZMCW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenYXL21,
  author       = {Biwen Chen and
                  Lei Yang and
                  Tao Xiang and
                  Xiaoguo Li},
  title        = {Secure Data Transmission with Access Control for Smart Home Devices},
  booktitle    = {TrustCom},
  pages        = {258--265},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00050},
  doi          = {10.1109/TRUSTCOM53373.2021.00050},
  timestamp    = {Wed, 10 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenYXL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenZCLLL21,
  author       = {Delin Chen and
                  Peijia Zheng and
                  Ziyang Chen and
                  Ruopan Lai and
                  Weiqi Luo and
                  Hongmei Liu},
  title        = {Privacy-Preserving Hough Transform and Line Detection on Encrypted
                  Cloud Images},
  booktitle    = {TrustCom},
  pages        = {486--493},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00078},
  doi          = {10.1109/TRUSTCOM53373.2021.00078},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenZCLLL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Cheng0T21,
  author       = {Jie Cheng and
                  Kun Zhang and
                  Bibo Tu},
  title        = {Remote Attestation of Large-scale Virtual Machines in the Cloud Data
                  Center},
  booktitle    = {TrustCom},
  pages        = {180--187},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00041},
  doi          = {10.1109/TRUSTCOM53373.2021.00041},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Cheng0T21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Cheng0WG21,
  author       = {Cong Cheng and
                  Lingzhi Li and
                  Jin Wang and
                  Fei Gu},
  title        = {The Design and Implementation of Secure Distributed Image Classification
                  Reasoning System for Heterogeneous Edge Computing},
  booktitle    = {TrustCom},
  pages        = {250--257},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00049},
  doi          = {10.1109/TRUSTCOM53373.2021.00049},
  timestamp    = {Tue, 17 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Cheng0WG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChengCZCHJZZZX21,
  author       = {Chen Cheng and
                  Xinzhou Cheng and
                  Yuting Zheng and
                  Lijuan Cao and
                  Yuhui Han and
                  Yuwei Jia and
                  Qingqing Zhang and
                  Yi Zhang and
                  Ya{-}nan Zhang and
                  Lexi Xu},
  title        = {A Novel Architecture and Algorithm for Prediction of Students Psychological
                  Health based on Big Data},
  booktitle    = {TrustCom},
  pages        = {1391--1396},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00195},
  doi          = {10.1109/TRUSTCOM53373.2021.00195},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChengCZCHJZZZX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChengF21,
  author       = {Binqi Cheng and
                  Weijie Feng},
  title        = {Analysis of the Application of Big Data in Banking Sector},
  booktitle    = {TrustCom},
  pages        = {1397--1401},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00196},
  doi          = {10.1109/TRUSTCOM53373.2021.00196},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChengF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChengZHZHY21,
  author       = {Yukun Cheng and
                  Mengce Zheng and
                  Fan Huang and
                  Jiajia Zhang and
                  Honggang Hu and
                  Nenghai Yu},
  title        = {A Fast-Detection and Fault-Correction Algorithm against Persistent
                  Fault Attack},
  booktitle    = {TrustCom},
  pages        = {557--568},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00086},
  doi          = {10.1109/TRUSTCOM53373.2021.00086},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChengZHZHY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/CuiKSYD21,
  author       = {Jiaxing Cui and
                  Zhengmin Kong and
                  Jing Song and
                  Weijun Yin and
                  Xianjun Deng},
  title        = {Robust AN-aided Secure Beamforming for Full-Duplex Relay System with
                  Multiple Eavesdroppers},
  booktitle    = {TrustCom},
  pages        = {317--322},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00057},
  doi          = {10.1109/TRUSTCOM53373.2021.00057},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/CuiKSYD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/CuiQCY21,
  author       = {Handong Cui and
                  Xianrui Qin and
                  Cailing Cai and
                  Tsz Hon Yuen},
  title        = {Security on {SM2} and {GOST} Signatures against Related Key Attacks},
  booktitle    = {TrustCom},
  pages        = {155--163},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00038},
  doi          = {10.1109/TRUSTCOM53373.2021.00038},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/CuiQCY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/CuiWZL021,
  author       = {Mingyue Cui and
                  Jin Wang and
                  Jingya Zhou and
                  Kejie Lu and
                  Jianping Wang},
  title        = {The Design of Secure Coded Edge Computing for User-Edge Collaborative
                  Computing},
  booktitle    = {TrustCom},
  pages        = {224--231},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00046},
  doi          = {10.1109/TRUSTCOM53373.2021.00046},
  timestamp    = {Wed, 15 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/CuiWZL021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DengZXLCW21,
  author       = {Xianwen Deng and
                  Ruijie Zhao and
                  Zhi Xue and
                  Ming Liu and
                  Libo Chen and
                  Yijun Wang},
  title        = {A Semi-supervised Deep Learning-Based Solver for Breaking Text-Based
                  CAPTCHAs},
  booktitle    = {TrustCom},
  pages        = {614--619},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00092},
  doi          = {10.1109/TRUSTCOM53373.2021.00092},
  timestamp    = {Mon, 30 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/DengZXLCW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DingLYHZL21,
  author       = {Zhaoyun Ding and
                  Lina Liu and
                  Donghua Yu and
                  Songping Huang and
                  Hang Zhang and
                  Kai Liu},
  title        = {Detection of Anomaly User Behaviors Based on Deep Neural Networks},
  booktitle    = {TrustCom},
  pages        = {1240--1245},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00169},
  doi          = {10.1109/TRUSTCOM53373.2021.00169},
  timestamp    = {Tue, 03 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/DingLYHZL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DrzazgaKS21,
  author       = {Bartosz Drzazga and
                  Lukasz Krzywiecki and
                  Hannes Salin},
  title        = {Cryptanalysis of Deterministic and Probabilistic Multi-Copy {PDP}
                  Schemes For Cloud Storage - Attacks and Countermeasures},
  booktitle    = {TrustCom},
  pages        = {172--179},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00040},
  doi          = {10.1109/TRUSTCOM53373.2021.00040},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/DrzazgaKS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DuezguenMBBAMVS21,
  author       = {Reyhan Duezguen and
                  Peter Mayer and
                  Benjamin Berens and
                  Christopher Beckmann and
                  Lukas Aldag and
                  Mattia Mossano and
                  Melanie Volkamer and
                  Thorsten Strufe},
  title        = {How to Increase Smart Home Security and Privacy Risk Perception},
  booktitle    = {TrustCom},
  pages        = {997--1004},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00138},
  doi          = {10.1109/TRUSTCOM53373.2021.00138},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/DuezguenMBBAMVS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FajgeGSH21,
  author       = {Akshay M. Fajge and
                  Subhasish Goswami and
                  Arpit Srivastava and
                  Raju Halder},
  title        = {Wait or Reset Gas Price?: {A} Machine Learning-based Prediction Model
                  for Ethereum Transactions' Waiting Time},
  booktitle    = {TrustCom},
  pages        = {1153--1160},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00156},
  doi          = {10.1109/TRUSTCOM53373.2021.00156},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/FajgeGSH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FanZLZTQ21,
  author       = {Chunlong Fan and
                  Jici Zhang and
                  Cailong Li and
                  Zhenxin Zhang and
                  Yiping Teng and
                  Jianzhong Qiao},
  title        = {Gray Adversarial Attack Algorithm based on Multi-Scale Grid Search},
  booktitle    = {TrustCom},
  pages        = {863--870},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00122},
  doi          = {10.1109/TRUSTCOM53373.2021.00122},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/FanZLZTQ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FangCSW21,
  author       = {Zerui Fang and
                  Shiyao Cui and
                  Qing Su and
                  Suzhen Wang},
  title        = {An Implementation and Optimization Method of {RTLS} Based on {UWB}
                  for Underground Mine},
  booktitle    = {TrustCom},
  pages        = {1254--1258},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00171},
  doi          = {10.1109/TRUSTCOM53373.2021.00171},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/FangCSW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FangD0QRD21,
  author       = {Luyue Fang and
                  Xiaoqiang Di and
                  Xu Liu and
                  Yiping Qin and
                  Weiwu Ren and
                  Qiang Ding},
  title        = {QuickLogS: {A} Quick Log Parsing Algorithm based on Template Similarity},
  booktitle    = {TrustCom},
  pages        = {1085--1092},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00148},
  doi          = {10.1109/TRUSTCOM53373.2021.00148},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/FangD0QRD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FarinellaAW21,
  author       = {Carlo Farinella and
                  Ali Ahmed and
                  Craig A. Watterson},
  title        = {Git Leaks: Boosting Detection Effectiveness Through Endpoint Visibility},
  booktitle    = {TrustCom},
  pages        = {701--709},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00103},
  doi          = {10.1109/TRUSTCOM53373.2021.00103},
  timestamp    = {Mon, 30 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/FarinellaAW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FengTXQWL21,
  author       = {Cong Feng and
                  Liang Tan and
                  Huan Xiao and
                  Xin Qi and
                  Zheng Wen and
                  Yang Liu},
  title        = {{EDKSAP} : Efficient Double-Key Stealth Address Protocol in Blockchain},
  booktitle    = {TrustCom},
  pages        = {1196--1201},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00162},
  doi          = {10.1109/TRUSTCOM53373.2021.00162},
  timestamp    = {Wed, 16 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/FengTXQWL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FengZLLWM21,
  author       = {Yusi Feng and
                  Ziyuan Zhu and
                  Shuan Li and
                  Ben Liu and
                  Huozhu Wang and
                  Dan Meng},
  title        = {Constant-Time Loading: Modifying {CPU} Pipeline to Defeat Cache Side-Channel
                  Attacks},
  booktitle    = {TrustCom},
  pages        = {1132--1140},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00154},
  doi          = {10.1109/TRUSTCOM53373.2021.00154},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/FengZLLWM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FletcherRH21,
  author       = {Sam Fletcher and
                  Adam Roegiest and
                  Alexander K. Hudek},
  title        = {Towards Protecting Sensitive Text with Differential Privacy},
  booktitle    = {TrustCom},
  pages        = {468--475},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00076},
  doi          = {10.1109/TRUSTCOM53373.2021.00076},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/FletcherRH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FuFZLWW21,
  author       = {Zhihan Fu and
                  Qilin Fan and
                  Xu Zhang and
                  Xiuhua Li and
                  Sen Wang and
                  Yueyang Wang},
  title        = {Policy Network Assisted Monte Carlo Tree Search for Intelligent Service
                  Function Chain Deployment},
  booktitle    = {TrustCom},
  pages        = {1161--1168},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00157},
  doi          = {10.1109/TRUSTCOM53373.2021.00157},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/FuFZLWW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FuYGWGLXL21,
  author       = {Peipei Fu and
                  Qingya Yang and
                  Yangyang Guan and
                  Bingxu Wang and
                  Gaopeng Gou and
                  Zhen Li and
                  Gang Xiong and
                  Zhenzhen Li},
  title        = {Towards Multi-source Extension: {A} Multi-classification Method Based
                  on Sampled NetFlow Records},
  booktitle    = {TrustCom},
  pages        = {1069--1076},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00146},
  doi          = {10.1109/TRUSTCOM53373.2021.00146},
  timestamp    = {Wed, 08 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/FuYGWGLXL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GallettaTFCV21,
  author       = {Antonino Galletta and
                  Javid Taheri and
                  Maria Fazio and
                  Antonio Celesti and
                  Massimo Villari},
  title        = {Overcoming security limitations of Secret Share techniques: the Nested
                  Secret Share},
  booktitle    = {TrustCom},
  pages        = {289--296},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00054},
  doi          = {10.1109/TRUSTCOM53373.2021.00054},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/GallettaTFCV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GaoQZYML21,
  author       = {Zhipeng Gao and
                  Chenhao Qiu and
                  Chen Zhao and
                  Yang Yang and
                  Zijia Mo and
                  Yijing Lin},
  title        = {FedIM: An Anti-attack Federated Learning Based on Agent Importance
                  Aggregation},
  booktitle    = {TrustCom},
  pages        = {1445--1451},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00205},
  doi          = {10.1109/TRUSTCOM53373.2021.00205},
  timestamp    = {Tue, 24 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GaoQZYML21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GaoYRCWZ21,
  author       = {Ming Gao and
                  Xiaokun Yu and
                  Lei Ren and
                  Hongxiang Cai and
                  Zhiyong Wang and
                  Yuyang Zhou},
  title        = {A Renewable Energy Certificate Trading System Based on Blockchain},
  booktitle    = {TrustCom},
  pages        = {1514--1518},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00218},
  doi          = {10.1109/TRUSTCOM53373.2021.00218},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/GaoYRCWZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GaoZLR0ZM21,
  author       = {Zhipeng Gao and
                  Zijian Zhuang and
                  Yijing Lin and
                  Lanlan Rui and
                  Yang Yang and
                  Chen Zhao and
                  Zijia Mo},
  title        = {Select-Storage: {A} New Oracle Design Pattern on Blockchain},
  booktitle    = {TrustCom},
  pages        = {1177--1184},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00159},
  doi          = {10.1109/TRUSTCOM53373.2021.00159},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/GaoZLR0ZM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GayathriSXM21,
  author       = {R. G. Gayathri and
                  Atul Sajjanhar and
                  Yong Xiang and
                  Xingjun Ma},
  title        = {Anomaly Detection for Scenario-based Insider Activities using {CGAN}
                  Augmented Data},
  booktitle    = {TrustCom},
  pages        = {718--725},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00105},
  doi          = {10.1109/TRUSTCOM53373.2021.00105},
  timestamp    = {Tue, 23 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GayathriSXM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GongDGQ21,
  author       = {Changqing Gong and
                  Zhaoyang Dong and
                  Abdullah Gani and
                  Han Qi},
  title        = {Quantum Ciphertext Dimension Reduction Scheme for Homomorphic Encrypted
                  Data},
  booktitle    = {TrustCom},
  pages        = {903--910},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00127},
  doi          = {10.1109/TRUSTCOM53373.2021.00127},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/GongDGQ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GongZQLZX21,
  author       = {Qianyun Gong and
                  Chengjin Zhou and
                  Le Qi and
                  Jianbin Li and
                  Jianzhong Zhang and
                  Jingdong Xu},
  title        = {{VEIN:} High Scalability Routing Algorithm for Blockchain-based Payment
                  Channel Networks},
  booktitle    = {TrustCom},
  pages        = {43--50},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00024},
  doi          = {10.1109/TRUSTCOM53373.2021.00024},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/GongZQLZX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GrisposTCMG21,
  author       = {George Grispos and
                  Frank Tursi and
                  Kim{-}Kwang Raymond Choo and
                  William Mahoney and
                  William Bradley Glisson},
  title        = {A Digital Forensics Investigation of a Smart Scale IoT Ecosystem},
  booktitle    = {TrustCom},
  pages        = {710--717},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00104},
  doi          = {10.1109/TRUSTCOM53373.2021.00104},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/GrisposTCMG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GrunerMM21,
  author       = {Andreas Gr{\"{u}}ner and
                  Alexander M{\"{u}}hle and
                  Christoph Meinel},
  title        = {Analyzing Interoperability and Portability Concepts for Self-Sovereign
                  Identity},
  booktitle    = {TrustCom},
  pages        = {587--597},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00089},
  doi          = {10.1109/TRUSTCOM53373.2021.00089},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/GrunerMM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GuGHXL21,
  author       = {Zheyuan Gu and
                  Gaopeng Gou and
                  Chengshang Hou and
                  Gang Xiong and
                  Zhen Li},
  title        = {{LFETT2021:} {A} Large-scale Fine-grained Encrypted Tunnel Traffic
                  Dataset},
  booktitle    = {TrustCom},
  pages        = {240--249},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00048},
  doi          = {10.1109/TRUSTCOM53373.2021.00048},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GuGHXL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GuanZWZJ21,
  author       = {Jiwei Guan and
                  Xi Zheng and
                  Chen Wang and
                  Yipeng Zhou and
                  Alireza Jolfaei},
  title        = {Robust Sensor Fusion Algorithms Against Voice Command Attacks in Autonomous
                  Vehicles},
  booktitle    = {TrustCom},
  pages        = {895--902},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00126},
  doi          = {10.1109/TRUSTCOM53373.2021.00126},
  timestamp    = {Sun, 23 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GuanZWZJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GuoZFWGS21,
  author       = {Jinge Guo and
                  Yang Zhang and
                  Zhongsheng Fan and
                  Wei Wei and
                  Bao Guo and
                  Huangtao Song},
  title        = {Investigation on Multi-Antenna Technologies Evolution from {FDD} {LTE}
                  to {NR} {FDD}},
  booktitle    = {TrustCom},
  pages        = {1537--1541},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00222},
  doi          = {10.1109/TRUSTCOM53373.2021.00222},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/GuoZFWGS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HaCJLJ21,
  author       = {Guanxiong Ha and
                  Hang Chen and
                  Chunfu Jia and
                  Ruiqi Li and
                  Qiaowen Jia},
  title        = {A secure deduplication scheme based on data popularity with fully
                  random tags},
  booktitle    = {TrustCom},
  pages        = {207--214},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00044},
  doi          = {10.1109/TRUSTCOM53373.2021.00044},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/HaCJLJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HajarKA21,
  author       = {Muhammad Shadi Hajar and
                  Harsha K. Kalutarage and
                  M. Omar Al{-}Kadri},
  title        = {TrustMod: {A} Trust Management Module For {NS-3} Simulator},
  booktitle    = {TrustCom},
  pages        = {51--60},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00025},
  doi          = {10.1109/TRUSTCOM53373.2021.00025},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HajarKA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HamadTSZ21,
  author       = {Salma Abdalla Hamad and
                  Dai Hoang Tran and
                  Quan Z. Sheng and
                  Wei Emma Zhang},
  title        = {BERTDeep-Ware: {A} Cross-architecture Malware Detection Solution for
                  IoT Systems},
  booktitle    = {TrustCom},
  pages        = {927--934},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00130},
  doi          = {10.1109/TRUSTCOM53373.2021.00130},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HamadTSZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HanCCXJJG21,
  author       = {Yuhui Han and
                  Chen Cheng and
                  Xinzhou Cheng and
                  Lexi Xu and
                  Yuchao Jin and
                  Yuwei Jia and
                  Jie Gao},
  title        = {A new algorithm for demographic expansion based on multi-scene differentiated
                  communication data},
  booktitle    = {TrustCom},
  pages        = {1508--1513},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00217},
  doi          = {10.1109/TRUSTCOM53373.2021.00217},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/HanCCXJJG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HanTTI21,
  author       = {Chansu Han and
                  Jun'ichi Takeuchi and
                  Takeshi Takahashi and
                  Daisuke Inoue},
  title        = {Automated Detection of Malware Activities Using Nonnegative Matrix
                  Factorization},
  booktitle    = {TrustCom},
  pages        = {548--556},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00085},
  doi          = {10.1109/TRUSTCOM53373.2021.00085},
  timestamp    = {Mon, 30 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HanTTI21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HouSCLY21,
  author       = {Chengshang Hou and
                  Junzheng Shi and
                  Mingxin Cui and
                  Mengyan Liu and
                  Jing Yu},
  title        = {Universal Website Fingerprinting Defense Based on Adversarial Examples},
  booktitle    = {TrustCom},
  pages        = {99--106},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00031},
  doi          = {10.1109/TRUSTCOM53373.2021.00031},
  timestamp    = {Fri, 14 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HouSCLY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HouSCY21,
  author       = {Chengshang Hou and
                  Junzheng Shi and
                  Mingxin Cui and
                  Qingya Yang},
  title        = {Attack versus Attack: Toward Adversarial Example Defend Website Fingerprinting
                  Attack},
  booktitle    = {TrustCom},
  pages        = {766--773},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00111},
  doi          = {10.1109/TRUSTCOM53373.2021.00111},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/HouSCY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HsuM21,
  author       = {Po{-}Chu Hsu and
                  Atsuko Miyaji},
  title        = {Bidder Scalable M+1st-Price Auction with Public Verifiability},
  booktitle    = {TrustCom},
  pages        = {34--42},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00023},
  doi          = {10.1109/TRUSTCOM53373.2021.00023},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HsuM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HuLTLW21,
  author       = {Yuhang Hu and
                  De Li and
                  Zhou Tan and
                  Xianxian Li and
                  Jinyan Wang},
  title        = {Adaptive Clipping Bound of Deep Learning with Differential Privacy},
  booktitle    = {TrustCom},
  pages        = {428--435},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00071},
  doi          = {10.1109/TRUSTCOM53373.2021.00071},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/HuLTLW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HuangHPS21,
  author       = {Wenqing Huang and
                  Fei Hao and
                  Guangyao Pang and
                  Yifei Sun},
  title        = {Complementary Context-Enhanced Concept Lattice Aware Personalized
                  Recommendation},
  booktitle    = {TrustCom},
  pages        = {919--926},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00129},
  doi          = {10.1109/TRUSTCOM53373.2021.00129},
  timestamp    = {Fri, 03 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/HuangHPS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JiaCCGCLCJX21,
  author       = {Yuwei Jia and
                  Kun Chao and
                  Xinzhou Cheng and
                  Jian Guan and
                  Lijuan Cao and
                  Yi Li and
                  Chen Cheng and
                  Yuchao Jin and
                  Lexi Xu},
  title        = {A Hybrid User Recommendation Scheme Based on Collaborative Filtering
                  and Association Rules},
  booktitle    = {TrustCom},
  pages        = {1519--1524},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00219},
  doi          = {10.1109/TRUSTCOM53373.2021.00219},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/JiaCCGCLCJX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JiangLZZ21,
  author       = {Yupeng Jiang and
                  Yong Li and
                  Yipeng Zhou and
                  Xi Zheng},
  title        = {Sybil Attacks and Defense on Differential Privacy based Federated
                  Learning},
  booktitle    = {TrustCom},
  pages        = {355--362},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00062},
  doi          = {10.1109/TRUSTCOM53373.2021.00062},
  timestamp    = {Fri, 10 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/JiangLZZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JiangTM21,
  author       = {Chunyu Jiang and
                  Jiafeng Tian and
                  Pengwei Ma},
  title        = {Databench-T: {A} Transactional Database Benchmark for Financial Scenarios},
  booktitle    = {TrustCom},
  pages        = {1418--1421},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00200},
  doi          = {10.1109/TRUSTCOM53373.2021.00200},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/JiangTM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JinLLCXH21,
  author       = {Yuchao Jin and
                  Yi Li and
                  Deyi Li and
                  Xinzhou Cheng and
                  Lexi Xu and
                  Yuhui Han},
  title        = {Cell Boundary Prediction and Base Station Location Verification based
                  on Machine Learning},
  booktitle    = {TrustCom},
  pages        = {1531--1536},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00221},
  doi          = {10.1109/TRUSTCOM53373.2021.00221},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/JinLLCXH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KoroniotisMTSGJ21,
  author       = {Nickolaos Koroniotis and
                  Nour Moustafa and
                  Benjamin P. Turnbull and
                  Francesco Schiliro and
                  Praveen Gauravaram and
                  Helge Janicke},
  title        = {A Deep Learning-based Penetration Testing Framework for Vulnerability
                  Identification in Internet of Things Environments},
  booktitle    = {TrustCom},
  pages        = {887--894},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00125},
  doi          = {10.1109/TRUSTCOM53373.2021.00125},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/KoroniotisMTSGJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Li0H021,
  author       = {Chi Li and
                  Min Zhou and
                  Xinrong Han and
                  Ming Gu},
  title        = {Sensing Error Handling Bugs in {SSL} Library Usages},
  booktitle    = {TrustCom},
  pages        = {686--692},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00101},
  doi          = {10.1109/TRUSTCOM53373.2021.00101},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Li0H021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Li0Y21,
  author       = {Wenjuan Li and
                  Weizhi Meng and
                  Laurence T. Yang},
  title        = {Enhancing Trust-based Medical Smartphone Networks via Blockchain-based
                  Traffic Sampling},
  booktitle    = {TrustCom},
  pages        = {122--129},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00034},
  doi          = {10.1109/TRUSTCOM53373.2021.00034},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Li0Y21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiFLLY21,
  author       = {Yuanpeng Li and
                  Yile Fan and
                  Shuaijun Liu and
                  LiXiang Liu and
                  Wenge Yang},
  title        = {Overview of Beam Hopping Algorithms in Large Scale {LEO} Satellite
                  Constellation},
  booktitle    = {TrustCom},
  pages        = {1345--1351},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00187},
  doi          = {10.1109/TRUSTCOM53373.2021.00187},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiFLLY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiHCXLY21,
  author       = {Mingxin Li and
                  Mingde Huo and
                  Xinzhou Cheng and
                  Lexi Xu and
                  Xiaojing Liu and
                  Rui Yang},
  title        = {Joint Offloading Decision and Resource Allocation of 5G Edge Intelligent
                  Computing for Complex Industrial Application},
  booktitle    = {TrustCom},
  pages        = {1542--1547},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00223},
  doi          = {10.1109/TRUSTCOM53373.2021.00223},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiHCXLY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiHXCZ21,
  author       = {Mingxin Li and
                  Mingde Huo and
                  Lexi Xu and
                  Xinzhou Cheng and
                  Xin Zhao},
  title        = {Research and Application of Intelligent Antenna Feeder Optimization
                  System based on Big Data},
  booktitle    = {TrustCom},
  pages        = {1363--1368},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00190},
  doi          = {10.1109/TRUSTCOM53373.2021.00190},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiHXCZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiLJY21,
  author       = {Jianhua Li and
                  Ximeng Liu and
                  Jiong Jin and
                  Shui Yu},
  title        = {Too Expensive to Attack: Enlarge the Attack Expense through Joint
                  Defense at the Edge},
  booktitle    = {TrustCom},
  pages        = {524--531},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00082},
  doi          = {10.1109/TRUSTCOM53373.2021.00082},
  timestamp    = {Fri, 30 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiLJY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiLL0L21,
  author       = {Yuzhe Li and
                  Yong Liu and
                  Bo Li and
                  Weiping Wang and
                  Nan Liu},
  title        = {Just Keep Your Concerns Private: Guaranteeing Heterogeneous Privacy
                  and Achieving High Availability for {ERM} Algorithms},
  booktitle    = {TrustCom},
  pages        = {371--378},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00064},
  doi          = {10.1109/TRUSTCOM53373.2021.00064},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiLL0L21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiM21,
  author       = {Xiaocong Li and
                  Changshe Ma},
  title        = {Redactable Blockchain based on Unforgeable Signatures for Supporting
                  Fast Verification},
  booktitle    = {TrustCom},
  pages        = {1202--1207},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00163},
  doi          = {10.1109/TRUSTCOM53373.2021.00163},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiWWS21,
  author       = {Zeyi Li and
                  Yun Wang and
                  Pan Wang and
                  Haorui Su},
  title        = {{PGAN:} {A} Generative Adversarial Network based Anomaly Detection
                  Method for Network Intrusion Detection System},
  booktitle    = {TrustCom},
  pages        = {734--741},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00107},
  doi          = {10.1109/TRUSTCOM53373.2021.00107},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiWWS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiZCWJ21,
  author       = {Jinli Li and
                  Ran Zhang and
                  Mingcan Cen and
                  Xunao Wang and
                  M. Jiang},
  title        = {Depression Detection Using Asynchronous Federated Optimization},
  booktitle    = {TrustCom},
  pages        = {758--765},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00110},
  doi          = {10.1109/TRUSTCOM53373.2021.00110},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiZCWJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiZLGL21,
  author       = {Jingyi Li and
                  Zikai Zhang and
                  Yidong Li and
                  Xinyue Guo and
                  Huifang Li},
  title        = {{FIDS:} Detecting DDoS Through Federated Learning Based Method},
  booktitle    = {TrustCom},
  pages        = {856--862},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00121},
  doi          = {10.1109/TRUSTCOM53373.2021.00121},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiZLGL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiZNAZZ21,
  author       = {Jiajia Li and
                  Lingyun Zhang and
                  Cancan Ni and
                  Yunzhe An and
                  Chuanyu Zong and
                  Anzhen Zhang},
  title        = {Efficient k Nearest Neighbor Query Processing on Public Transportation
                  Network},
  booktitle    = {TrustCom},
  pages        = {1108--1115},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00151},
  doi          = {10.1109/TRUSTCOM53373.2021.00151},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiZNAZZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiangZWDH21,
  author       = {Genpei Liang and
                  Xiangyu Zhou and
                  Qingyu Wang and
                  Yutong Du and
                  Cheng Huang},
  title        = {Malicious Packages Lurking in User-Friendly Python Package Index},
  booktitle    = {TrustCom},
  pages        = {606--613},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00091},
  doi          = {10.1109/TRUSTCOM53373.2021.00091},
  timestamp    = {Thu, 27 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiangZWDH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LimNXG0NM21,
  author       = {Wei Yang Bryan Lim and
                  Jer Shyuan Ng and
                  Zehui Xiong and
                  Sahil Garg and
                  Yang Zhang and
                  Dusit Niyato and
                  Chunyan Miao},
  title        = {Dynamic Edge Association in Hierarchical Federated Learning Networks},
  booktitle    = {TrustCom},
  pages        = {1124--1131},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00153},
  doi          = {10.1109/TRUSTCOM53373.2021.00153},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LimNXG0NM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LingZCWJ21,
  author       = {Yuhua Ling and
                  Ran Zhang and
                  Mingcan Cen and
                  Xunao Wang and
                  M. Jiang},
  title        = {Cost-sensitive Heterogeneous Integration for Credit Card Fraud Detection},
  booktitle    = {TrustCom},
  pages        = {750--757},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00109},
  doi          = {10.1109/TRUSTCOM53373.2021.00109},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LingZCWJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuBFZXM21,
  author       = {Daqian Liu and
                  Weidong Bao and
                  Bowen Fei and
                  Xiaomin Zhu and
                  Zhenliang Xiao and
                  Tong Men},
  title        = {Multi-UAV Cooperative Obstacle Avoidance and Surveillance in Intelligent
                  Transportation},
  booktitle    = {TrustCom},
  pages        = {1013--1020},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00140},
  doi          = {10.1109/TRUSTCOM53373.2021.00140},
  timestamp    = {Wed, 22 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuBFZXM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuCLLW21,
  author       = {Xiaohong Liu and
                  Hanbo Cai and
                  De Li and
                  Xianxian Li and
                  Jinyan Wang},
  title        = {Differential Privacy Preservation in Adaptive K-Nets Clustering},
  booktitle    = {TrustCom},
  pages        = {405--412},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00068},
  doi          = {10.1109/TRUSTCOM53373.2021.00068},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuCLLW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuFX21,
  author       = {Xu Liu and
                  Dongxu Fang and
                  Peng Xu},
  title        = {Automated Performance Benchmarking Platform of IaaS Cloud},
  booktitle    = {TrustCom},
  pages        = {1402--1405},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00197},
  doi          = {10.1109/TRUSTCOM53373.2021.00197},
  timestamp    = {Wed, 08 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuFX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuGL21,
  author       = {Hao Liu and
                  Zhenyu Guan and
                  Peng Lei},
  title        = {A Filter Rank Based Pruning Method for Convolutional Neural Networks},
  booktitle    = {TrustCom},
  pages        = {1318--1322},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00182},
  doi          = {10.1109/TRUSTCOM53373.2021.00182},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuGL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuGZBHZGDL21,
  author       = {Yuefeng Liu and
                  Wei Guo and
                  Hanyu Zhang and
                  Haodong Bian and
                  Yingjie He and
                  Xiaoyan Zhang and
                  Yanzhang Gong and
                  Jianmin Dong and
                  Zhen Liu},
  title        = {Construction of Knowledge Graph Based on Discipline Inspection and
                  Supervision},
  booktitle    = {TrustCom},
  pages        = {1467--1472},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00209},
  doi          = {10.1109/TRUSTCOM53373.2021.00209},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuGZBHZGDL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuJWP21,
  author       = {Huanlong Liu and
                  Bin Jiang and
                  Zhengjie Wang and
                  Hongyu Peng},
  title        = {An Measurement Method of Oblique Wedge Rubbing Surface Abrasion Based
                  on Point Cloud},
  booktitle    = {TrustCom},
  pages        = {1220--1226},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00166},
  doi          = {10.1109/TRUSTCOM53373.2021.00166},
  timestamp    = {Fri, 15 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuJWP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuJZZCX21,
  author       = {Xiqing Liu and
                  Hongshui Jing and
                  Shiyu Zhou and
                  Zhenqiao Zhao and
                  Xinzhou Cheng and
                  Lexi Xu},
  title        = {Key technologies for 5G co-construction and shared base station data
                  automatic configuration},
  booktitle    = {TrustCom},
  pages        = {1559--1563},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00226},
  doi          = {10.1109/TRUSTCOM53373.2021.00226},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuJZZCX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuLY21,
  author       = {Xu Liu and
                  Ruoyu Li and
                  Penghao Yue},
  title        = {Design and Implementation of Intelligent Operation and Maintenance
                  System for Big Data Platform},
  booktitle    = {TrustCom},
  pages        = {1374--1379},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00192},
  doi          = {10.1109/TRUSTCOM53373.2021.00192},
  timestamp    = {Fri, 10 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuLY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuTYZZZ21,
  author       = {Boru Liu and
                  Dan Tang and
                  Yudong Yan and
                  Zhiqing Zheng and
                  Shihan Zhang and
                  Jiangmeng Zhou},
  title        = {{TS-SVM:} Detect LDoS Attack in {SDN} Based on Two-step Self-adjusting
                  {SVM}},
  booktitle    = {TrustCom},
  pages        = {678--685},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00100},
  doi          = {10.1109/TRUSTCOM53373.2021.00100},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuTYZZZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuWCP21,
  author       = {Huanlong Liu and
                  Zhengjie Wang and
                  Yao Chen and
                  Hongyu Peng},
  title        = {An axis extract method for rotational parts based on point cloud normal
                  lines},
  booktitle    = {TrustCom},
  pages        = {1265--1269},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00173},
  doi          = {10.1109/TRUSTCOM53373.2021.00173},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuWCP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuWJP21,
  author       = {Huanlong Liu and
                  Zhengjie Wang and
                  Bin Jiang and
                  Hongyu Peng},
  title        = {An inertia wheel pendulum control method based on actor-critic learning
                  algorithm},
  booktitle    = {TrustCom},
  pages        = {1281--1285},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00176},
  doi          = {10.1109/TRUSTCOM53373.2021.00176},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuWJP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuWL21,
  author       = {Yucheng Liu and
                  Hao Wu and
                  Xiangxue Li},
  title        = {Another Look at the Connection between {CAN} Signal Ringing {\&}
                  In-Vehicle {ECU} Identification},
  booktitle    = {TrustCom},
  pages        = {1021--1030},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00141},
  doi          = {10.1109/TRUSTCOM53373.2021.00141},
  timestamp    = {Sun, 23 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuWL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuWWWW21,
  author       = {Gaoyang Liu and
                  Shijie Wang and
                  Borui Wan and
                  Zekun Wang and
                  Chen Wang},
  title        = {ML-Stealer: Stealing Prediction Functionality of Machine Learning
                  Models with Mere Black-Box Access},
  booktitle    = {TrustCom},
  pages        = {532--539},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00083},
  doi          = {10.1109/TRUSTCOM53373.2021.00083},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuWWWW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuWXWLS21,
  author       = {Yang Liu and
                  Ershen Wang and
                  Song Xu and
                  Zhi Wang and
                  Meizhi Liu and
                  Wansen Shu},
  title        = {Simple Online Unmanned Aerial Vehicle Tracking with Transformer},
  booktitle    = {TrustCom},
  pages        = {1235--1239},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00168},
  doi          = {10.1109/TRUSTCOM53373.2021.00168},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuWXWLS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuZG21,
  author       = {Junkai Liu and
                  Shihui Zheng and
                  Lize Gu},
  title        = {Effective Deep Learning-based Side-Channel Analyses Against {ASCAD}},
  booktitle    = {TrustCom},
  pages        = {514--523},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00081},
  doi          = {10.1109/TRUSTCOM53373.2021.00081},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuZG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuZGBHL21,
  author       = {Yuefeng Liu and
                  Xiaoyan Zhang and
                  Wei Guo and
                  Haodong Bian and
                  Yingjie He and
                  Zhen Liu},
  title        = {Prediction of remaining useful life of turbofan engine based on optimized
                  model},
  booktitle    = {TrustCom},
  pages        = {1473--1477},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00210},
  doi          = {10.1109/TRUSTCOM53373.2021.00210},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuZGBHL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuZNWZL21,
  author       = {Jifeng Liu and
                  Yao Zhou and
                  Yiying Niu and
                  Tingting Wang and
                  Tao Zhang and
                  Fuchang Li},
  title        = {Sharing and Compatibility Studies of EESS(active) and {IMT} System
                  in 10-10.5 GHz},
  booktitle    = {TrustCom},
  pages        = {1439--1444},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00204},
  doi          = {10.1109/TRUSTCOM53373.2021.00204},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuZNWZL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuZZWS21,
  author       = {Yuhan Liu and
                  Yutao Zhang and
                  Heng Zhang and
                  Yongfeng Wang and
                  Lianbo Song},
  title        = {Design of Digital Maincenter Platform for Smart Home Based on Big
                  Data},
  booktitle    = {TrustCom},
  pages        = {1340--1344},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00186},
  doi          = {10.1109/TRUSTCOM53373.2021.00186},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuZZWS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LuoZWJZH21,
  author       = {Zhimin Luo and
                  Mengce Zheng and
                  Ping Wang and
                  Minhui Jin and
                  Jiajia Zhang and
                  Honggang Hu},
  title        = {Towards Strengthening Deep Learning-based Side Channel Attacks with
                  Mixup},
  booktitle    = {TrustCom},
  pages        = {791--801},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00114},
  doi          = {10.1109/TRUSTCOM53373.2021.00114},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LuoZWJZH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LvLCWT21,
  author       = {Ke Lv and
                  Yuan Liu and
                  Jienan Chen and
                  Dongxia Wang and
                  Zhihong Tian},
  title        = {An Interactive System for Unfair Rating Detection Models in a Customized
                  Perspective},
  booktitle    = {TrustCom},
  pages        = {871--878},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00123},
  doi          = {10.1109/TRUSTCOM53373.2021.00123},
  timestamp    = {Mon, 25 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LvLCWT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MaLG21,
  author       = {Xuebin Ma and
                  Haijiang Liu and
                  Shengyi Guan},
  title        = {Improving the Effect of Frequent Itemset Mining with Hadamard Response
                  under Local Differential Privacy},
  booktitle    = {TrustCom},
  pages        = {436--443},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00072},
  doi          = {10.1109/TRUSTCOM53373.2021.00072},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/MaLG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MaLQ21,
  author       = {Jianfeng Ma and
                  Xiangxue Li and
                  Haifeng Qian},
  title        = {{LVRT:} Low Variances of Solo Mining Reward {\&} Inter-block Time
                  in Collaborative PoW},
  booktitle    = {TrustCom},
  pages        = {1039--1048},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00143},
  doi          = {10.1109/TRUSTCOM53373.2021.00143},
  timestamp    = {Tue, 22 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/MaLQ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MaQL21,
  author       = {Jie Ma and
                  Bin Qi and
                  Kewei Lv},
  title        = {{BSA:} Enabling Biometric-Based Storage and Authorization on Blockchain},
  booktitle    = {TrustCom},
  pages        = {1077--1084},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00147},
  doi          = {10.1109/TRUSTCOM53373.2021.00147},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/MaQL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MaWJLTLZ21,
  author       = {Pengwei Ma and
                  Kai Wei and
                  Chunyu Jiang and
                  Junyi Li and
                  Jiafeng Tian and
                  Siyuan Liu and
                  Minjing Zhong},
  title        = {Research on Evaluation System of Relational Cloud Database},
  booktitle    = {TrustCom},
  pages        = {1369--1373},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00191},
  doi          = {10.1109/TRUSTCOM53373.2021.00191},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/MaWJLTLZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MachadoSW21,
  author       = {Caciano Machado and
                  Renan R. S. dos Santos and
                  Carla Merkle Westphall},
  title        = {Hop-by-hop Accounting and Rewards for Packet dIspAtching},
  booktitle    = {TrustCom},
  pages        = {1116--1123},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00152},
  doi          = {10.1109/TRUSTCOM53373.2021.00152},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/MachadoSW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MalikGDKJ21,
  author       = {Sidra Malik and
                  Naman Gupta and
                  Volkan Dedeoglu and
                  Salil S. Kanhere and
                  Raja Jurdak},
  title        = {TradeChain: Decoupling Traceability and Identity in Blockchain enabled
                  Supply Chains},
  booktitle    = {TrustCom},
  pages        = {1141--1152},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00155},
  doi          = {10.1109/TRUSTCOM53373.2021.00155},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/MalikGDKJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MallojulaALL21,
  author       = {Prashanthi Mallojula and
                  Javaria Ahmad and
                  Fengjun Li and
                  Bo Luo},
  title        = {You Are (not) Who Your Peers Are: Identification of Potentially Excessive
                  Permission Requests in Android Apps},
  booktitle    = {TrustCom},
  pages        = {114--121},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00033},
  doi          = {10.1109/TRUSTCOM53373.2021.00033},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/MallojulaALL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MamunS21,
  author       = {Mohammad Mamun and
                  Kevin Shi},
  title        = {DeepTaskAPT: Insider {APT} detection using Task-tree based Deep Learning},
  booktitle    = {TrustCom},
  pages        = {693--700},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00102},
  doi          = {10.1109/TRUSTCOM53373.2021.00102},
  timestamp    = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/MamunS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MarsalekZ21,
  author       = {Alexander Marsalek and
                  Thomas Zefferer},
  title        = {Compressing the Bitcoin Blockchain using Incremental Snapshots},
  booktitle    = {TrustCom},
  pages        = {1169--1176},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00158},
  doi          = {10.1109/TRUSTCOM53373.2021.00158},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/MarsalekZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MoXP21,
  author       = {Zhiyi Mo and
                  Yutong Xing and
                  Zizhen Peng},
  title        = {Application of Bayesian Network Reasoning Algorithm in Emotion Classification},
  booktitle    = {TrustCom},
  pages        = {1214--1219},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00165},
  doi          = {10.1109/TRUSTCOM53373.2021.00165},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/MoXP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/NiuZZL21,
  author       = {Yiying Niu and
                  Yao Zhou and
                  Tao Zhang and
                  Fuchang Li},
  title        = {Study on {TDD} Unsynchronized Interference from Outdoor to Indoor
                  Scenario in 3.3-3.6 GHz},
  booktitle    = {TrustCom},
  pages        = {1548--1553},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00224},
  doi          = {10.1109/TRUSTCOM53373.2021.00224},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/NiuZZL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Ouyang021,
  author       = {Linshu Ouyang and
                  Yongzheng Zhang},
  title        = {Phishing Web Page Detection with HTML-Level Graph Neural Network},
  booktitle    = {TrustCom},
  pages        = {952--958},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00133},
  doi          = {10.1109/TRUSTCOM53373.2021.00133},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Ouyang021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PanickerSR21,
  author       = {Jithu Geevargheese Panicker and
                  Ahmad Salehi S. and
                  Carsten Rudolph},
  title        = {Authentication and Access Control in 5G Device-to-Device Communication},
  booktitle    = {TrustCom},
  pages        = {1575--1582},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00229},
  doi          = {10.1109/TRUSTCOM53373.2021.00229},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/PanickerSR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PasikhaniCG21,
  author       = {Aryan Mohammadi Pasikhani and
                  John A. Clark and
                  Prosanta Gope},
  title        = {Reinforcement-Learning-based {IDS} for 6LoWPAN},
  booktitle    = {TrustCom},
  pages        = {1049--1060},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00144},
  doi          = {10.1109/TRUSTCOM53373.2021.00144},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/PasikhaniCG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Patgiri21,
  author       = {Ripon Patgiri},
  title        = {Rando: {A} General-purpose True Random Number Generator for Conventional
                  Computers},
  booktitle    = {TrustCom},
  pages        = {107--113},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00032},
  doi          = {10.1109/TRUSTCOM53373.2021.00032},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Patgiri21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Peng00WL21,
  author       = {Mengyao Peng and
                  Jia Hu and
                  Hui Lin and
                  Xiaoding Wang and
                  Wenzhong Lin},
  title        = {A Privacy-Enhanced Mobile Crowdsensing Strategy for Blockchain Empowered
                  Internet of Medical Things},
  booktitle    = {TrustCom},
  pages        = {387--396},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00066},
  doi          = {10.1109/TRUSTCOM53373.2021.00066},
  timestamp    = {Fri, 24 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Peng00WL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Peng0TW00021,
  author       = {Yu Peng and
                  Qin Liu and
                  Yue Tian and
                  Jie Wu and
                  Tian Wang and
                  Tao Peng and
                  Guojun Wang},
  title        = {Dynamic Searchable Symmetric Encryption with Forward and Backward
                  Privacy},
  booktitle    = {TrustCom},
  pages        = {420--427},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00070},
  doi          = {10.1109/TRUSTCOM53373.2021.00070},
  timestamp    = {Fri, 29 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Peng0TW00021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PengSWHXX21,
  author       = {Hongyu Peng and
                  Fujian Sun and
                  Kan Wang and
                  Tianlu Hao and
                  Dequan Xiao and
                  Lexi Xu},
  title        = {A Non-Cooperative Data Center Energy Consumption Optimization Strategy
                  Based on {SDN} Structure},
  booktitle    = {TrustCom},
  pages        = {1386--1390},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00194},
  doi          = {10.1109/TRUSTCOM53373.2021.00194},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/PengSWHXX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Poniszewska-Maranda21,
  author       = {Aneta Poniszewska{-}Maranda and
                  Lukasz Rogozinski and
                  Witold Maranda},
  title        = {Security Library for Safe Data Storage on Android Platform},
  booktitle    = {TrustCom},
  pages        = {309--316},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00056},
  doi          = {10.1109/TRUSTCOM53373.2021.00056},
  timestamp    = {Tue, 15 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Poniszewska-Maranda21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Poniszewska-Maranda21a,
  author       = {Aneta Poniszewska{-}Maranda and
                  Lukasz Chomatek and
                  Joanna Ochelska{-}Mierzejewska},
  title        = {Secure Development Strategy Model Framework for Security of Mobile
                  Applications},
  booktitle    = {TrustCom},
  pages        = {1294--1299},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00178},
  doi          = {10.1109/TRUSTCOM53373.2021.00178},
  timestamp    = {Tue, 15 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Poniszewska-Maranda21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PradelM21,
  author       = {Ga{\"{e}}tan Pradel and
                  Chris J. Mitchell},
  title        = {Privacy-Preserving Biometric Matching Using Homomorphic Encryption},
  booktitle    = {TrustCom},
  pages        = {494--505},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00079},
  doi          = {10.1109/TRUSTCOM53373.2021.00079},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/PradelM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/QiangCZDQ21,
  author       = {Qian Qiang and
                  Mian Cheng and
                  Yuan Zhou and
                  Yu Ding and
                  Zisen Qi},
  title        = {{MALUP:} {A} Malware Classification Framework using Convolutional
                  Neural Network with Deep Unsupervised Pre-training},
  booktitle    = {TrustCom},
  pages        = {627--634},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00094},
  doi          = {10.1109/TRUSTCOM53373.2021.00094},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/QiangCZDQ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/RabieinejadYP21,
  author       = {Elnaz Rabieinejad and
                  Abbas Yazdinejad and
                  Reza M. Parizi},
  title        = {A Deep Learning Model for Threat Hunting in Ethereum Blockchain},
  booktitle    = {TrustCom},
  pages        = {1185--1190},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00160},
  doi          = {10.1109/TRUSTCOM53373.2021.00160},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/RabieinejadYP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/RahmanSR21,
  author       = {M. Ridwanur Rahman and
                  Ahmad Salehi S. and
                  Carsten Rudolph},
  title        = {Decentralized Policy Information Points for Multi-Domain Environments},
  booktitle    = {TrustCom},
  pages        = {1286--1293},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00177},
  doi          = {10.1109/TRUSTCOM53373.2021.00177},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/RahmanSR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/RoyMM21,
  author       = {Swapnoneel Roy and
                  Sam Matloob and
                  Debajyoti Mukhopadhyay},
  title        = {On Application of Blockchain to Enhance Single Sign-On {(SSO)} Systems},
  booktitle    = {TrustCom},
  pages        = {1191--1195},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00161},
  doi          = {10.1109/TRUSTCOM53373.2021.00161},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/RoyMM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ShiDWYLW21,
  author       = {Wei Shi and
                  Mixue Deng and
                  Dong Wang and
                  Yuyun Yang and
                  Deyin Li and
                  Lirong Wang},
  title        = {Design and Implementation of Scanning Electron Microscope Image Acquisition
                  Software System},
  booktitle    = {TrustCom},
  pages        = {1478--1482},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00211},
  doi          = {10.1109/TRUSTCOM53373.2021.00211},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ShiDWYLW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SiddiquiMSS021,
  author       = {Sarah Ali Siddiqui and
                  Adnan Mahmood and
                  Quan Z. Sheng and
                  Hajime Suzuki and
                  Wei Ni},
  title        = {A Time-aware Trust Management Heuristic for the Internet of Vehicles},
  booktitle    = {TrustCom},
  pages        = {1--8},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00019},
  doi          = {10.1109/TRUSTCOM53373.2021.00019},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SiddiquiMSS021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SlavnenkoZJKD21,
  author       = {Maksym Slavnenko and
                  Yevhen Zolotavkin and
                  Jongkil Jay Jeong and
                  Veronika Kuchta and
                  Robin Doss},
  title        = {Enhancing Privacy Through {DMMA:} Decision-Making Method for Authentication},
  booktitle    = {TrustCom},
  pages        = {297--308},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00055},
  doi          = {10.1109/TRUSTCOM53373.2021.00055},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SlavnenkoZJKD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Song0Y21,
  author       = {Qige Song and
                  Yongzheng Zhang and
                  Junliang Yao},
  title        = {DroidRadar: Android Malware Detection Based on Global Sensitive Graph
                  Embedding},
  booktitle    = {TrustCom},
  pages        = {802--809},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00115},
  doi          = {10.1109/TRUSTCOM53373.2021.00115},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Song0Y21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SunWCM21,
  author       = {Weifeng Sun and
                  Yiming Wang and
                  Kangkang Chang and
                  Kelong Meng},
  title        = {IdiffGrad: {A} Gradient Descent Algorithm for Intrusion Detection
                  Based on diffGrad},
  booktitle    = {TrustCom},
  pages        = {1583--1590},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00231},
  doi          = {10.1109/TRUSTCOM53373.2021.00231},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/SunWCM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TanTZYZD21,
  author       = {Shuaishuai Tan and
                  Zhiyi Tian and
                  Xiaoxiong Zhong and
                  Shui Yu and
                  Weizhe Zhang and
                  Guozhong Dong},
  title        = {A Novel Android Malware Detection Method Based on Visible User Interface},
  booktitle    = {TrustCom},
  pages        = {659--666},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00098},
  doi          = {10.1109/TRUSTCOM53373.2021.00098},
  timestamp    = {Fri, 30 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/TanTZYZD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TengSZDXF21,
  author       = {Yiping Teng and
                  Zhan Shi and
                  Fanyou Zhao and
                  Guohui Ding and
                  Li Xu and
                  Chunlong Fan},
  title        = {Signature-Based Secure Trajectory Similarity Search},
  booktitle    = {TrustCom},
  pages        = {196--206},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00043},
  doi          = {10.1109/TRUSTCOM53373.2021.00043},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/TengSZDXF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TengZZXFW21,
  author       = {Yiping Teng and
                  Weiyu Zhao and
                  Chuanyu Zong and
                  Li Xu and
                  Chunlong Fan and
                  Huan Wang},
  title        = {Answering Why-not Questions on Top k Queries with Privacy Protection},
  booktitle    = {TrustCom},
  pages        = {476--485},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00077},
  doi          = {10.1109/TRUSTCOM53373.2021.00077},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/TengZZXFW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TianZY21,
  author       = {Changbo Tian and
                  Yongzheng Zhang and
                  Tao Yin},
  title        = {A Feature-Flux Traffic Camouflage Method based on Twin Gaussian Process},
  booktitle    = {TrustCom},
  pages        = {959--966},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00134},
  doi          = {10.1109/TRUSTCOM53373.2021.00134},
  timestamp    = {Wed, 08 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/TianZY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TupakulaVK21,
  author       = {Uday Kiran Tupakula and
                  Vijay Varadharajan and
                  Kallol Krishna Karmakar},
  title        = {Techniques for Securing Control Systems from Attacks},
  booktitle    = {TrustCom},
  pages        = {281--288},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00053},
  doi          = {10.1109/TRUSTCOM53373.2021.00053},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/TupakulaVK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/VaradharajanTK21,
  author       = {Vijay Varadharajan and
                  Uday Kiran Tupakula and
                  Kallol Krishna Karmakar},
  title        = {Techniques for Securing 5G Network Services from attacks},
  booktitle    = {TrustCom},
  pages        = {273--280},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00052},
  doi          = {10.1109/TRUSTCOM53373.2021.00052},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/VaradharajanTK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Wang0C21,
  author       = {Zhaoning Wang and
                  Bo Cheng and
                  Junliang Chen},
  title        = {Online Automatic Service Composition for Mobile and Pervasive Computing},
  booktitle    = {TrustCom},
  pages        = {1428--1433},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00202},
  doi          = {10.1109/TRUSTCOM53373.2021.00202},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Wang0C21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangCLCYZ21,
  author       = {Dong Wang and
                  Yue Che and
                  Chao Li and
                  Yahui Chen and
                  Hui Yin and
                  Chunlian Zhang},
  title        = {Base Station Prediction Analysis Scheme Based on Lasso Regression
                  Machine Learning Algorithm},
  booktitle    = {TrustCom},
  pages        = {1406--1411},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00198},
  doi          = {10.1109/TRUSTCOM53373.2021.00198},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangCLCYZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangGYL21,
  author       = {Xiaoyu Wang and
                  Xiaorui Gong and
                  Lei Yu and
                  Jian Liu},
  title        = {{MAAC:} Novel Alert Correlation Method To Detect Multi-step Attack},
  booktitle    = {TrustCom},
  pages        = {726--733},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00106},
  doi          = {10.1109/TRUSTCOM53373.2021.00106},
  timestamp    = {Sun, 05 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangGYL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangKYWSCGW021,
  author       = {Runhao Wang and
                  Jiexiang Kang and
                  Wei Yin and
                  Hui Wang and
                  Haiying Sun and
                  Xiaohong Chen and
                  Zhongjie Gao and
                  Shuning Wang and
                  Jing Liu},
  title        = {DeepTrace: {A} Secure Fingerprinting Framework for Intellectual Property
                  Protection of Deep Neural Networks},
  booktitle    = {TrustCom},
  pages        = {188--195},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00042},
  doi          = {10.1109/TRUSTCOM53373.2021.00042},
  timestamp    = {Mon, 23 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangKYWSCGW021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangLMTLZJ21,
  author       = {Chaolun Wang and
                  Yuan Liu and
                  Pengwei Ma and
                  Jiafeng Tian and
                  Siyuan Liu and
                  Minjing Zhong and
                  Chunyu Jiang},
  title        = {Research and implementation of an analytical database testing platform
                  in telecommunication industry},
  booktitle    = {TrustCom},
  pages        = {1328--1333},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00184},
  doi          = {10.1109/TRUSTCOM53373.2021.00184},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangLMTLZJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangMPL21,
  author       = {Yajie Wang and
                  Jinli Ma and
                  Zhao Pei and
                  Jun Li},
  title        = {Human Trajectory Prediction Using Stacked Temporal Convolutional Network},
  booktitle    = {TrustCom},
  pages        = {1270--1274},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00174},
  doi          = {10.1109/TRUSTCOM53373.2021.00174},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangMPL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangPF021,
  author       = {Shuran Wang and
                  Dahan Pan and
                  Runhan Feng and
                  Yuanyuan Zhang},
  title        = {MagikCube: Securing Cross-Domain Publish/Subscribe Systems with Enclave},
  booktitle    = {TrustCom},
  pages        = {147--154},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00037},
  doi          = {10.1109/TRUSTCOM53373.2021.00037},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangPF021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangQLZW21,
  author       = {Duoduo Wang and
                  Lishen Qiu and
                  Wanyue Li and
                  Wenliang Zhu and
                  Lirong Wang},
  title        = {An Automatic Algorithm for P/T-Wave Detection based on Auxiliary Waveform},
  booktitle    = {TrustCom},
  pages        = {1493--1497},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00214},
  doi          = {10.1109/TRUSTCOM53373.2021.00214},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangQLZW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangSSSLW21,
  author       = {Chuanyun Wang and
                  Zhongrui Shi and
                  Keyi Si and
                  Yang Su and
                  Zhaokui Li and
                  Ershen Wang},
  title        = {Anti-occlusion and Scale Adaptive Target Tracking Algorithm Based
                  on Kernel Correlation Filter},
  booktitle    = {TrustCom},
  pages        = {130--138},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00035},
  doi          = {10.1109/TRUSTCOM53373.2021.00035},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangSSSLW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangT21,
  author       = {Yinghe Wang and
                  Yu Tang},
  title        = {{BRLR:} {A} Routing Strategy for {MANET} Based on Reinforcement Learning},
  booktitle    = {TrustCom},
  pages        = {1412--1417},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00199},
  doi          = {10.1109/TRUSTCOM53373.2021.00199},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangWCLZ21,
  author       = {Jianfang Wang and
                  Zhiqiang Wu and
                  Guang Chen and
                  Detao Liu and
                  Qiuling Zhang},
  title        = {An Adaptive Multi-pairwise Ranking with Implicit Feedback for Recommendation},
  booktitle    = {TrustCom},
  pages        = {1005--1012},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00139},
  doi          = {10.1109/TRUSTCOM53373.2021.00139},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangWCLZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangWH21,
  author       = {Gao Wang and
                  Gaoli Wang and
                  Yu He},
  title        = {Improved Machine Learning Assisted (Related-key) Differential Distinguishers
                  For Lightweight Ciphers},
  booktitle    = {TrustCom},
  pages        = {164--171},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00039},
  doi          = {10.1109/TRUSTCOM53373.2021.00039},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangWH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangWJTZLL21,
  author       = {Zhuo Wang and
                  Kai Wei and
                  Chunyu Jiang and
                  Jiafeng Tian and
                  Minjing Zhong and
                  Yuan Liu and
                  Yanmei Liu},
  title        = {Research on Productization and Development Trend of Data Desensitization
                  Technology},
  booktitle    = {TrustCom},
  pages        = {1564--1569},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00227},
  doi          = {10.1109/TRUSTCOM53373.2021.00227},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangWJTZLL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangWPLC21,
  author       = {Yajie Wang and
                  Zhiyang Wan and
                  Zhao Pei and
                  Chengcai Leng and
                  Yuli Chen},
  title        = {GEA-net: Global embedded attention neural network for image classification},
  booktitle    = {TrustCom},
  pages        = {1300--1305},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00179},
  doi          = {10.1109/TRUSTCOM53373.2021.00179},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangWPLC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangWZC21,
  author       = {Xiaoqing Wang and
                  Chunping Wang and
                  Kun Zhou and
                  Hongbing Cheng},
  title        = {{ESS:} An Efficient Storage Scheme for Improving the Scalability of
                  Bitcoin System},
  booktitle    = {TrustCom},
  pages        = {911--918},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00128},
  doi          = {10.1109/TRUSTCOM53373.2021.00128},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangWZC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangYSZWW21,
  author       = {Chuanyun Wang and
                  Guowei Yang and
                  Dongdong Sun and
                  Jiankai Zuo and
                  Ershen Wang and
                  Linlin Wang},
  title        = {Frequency Domain Fusion Algorithm of Infrared and Visible Image Based
                  on Compressed Sensing for Video Surveillance Forensics},
  booktitle    = {TrustCom},
  pages        = {832--839},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00118},
  doi          = {10.1109/TRUSTCOM53373.2021.00118},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangYSZWW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangZLLLZ21,
  author       = {Ling Wang and
                  Cheng Zhang and
                  Zejian Luo and
                  Chenguang Liu and
                  Jie Liu and
                  Xi Zheng},
  title        = {{PDAAA:} Progressive Defense Against Adversarial Attacks for Deep
                  Learning-as-a-Service in Internet of Things},
  booktitle    = {TrustCom},
  pages        = {879--886},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00124},
  doi          = {10.1109/TRUSTCOM53373.2021.00124},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangZLLLZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangZLT21,
  author       = {Lin Wang and
                  Kun Zhang and
                  Chen Li and
                  Bibo Tu},
  title        = {Log-based Anomaly Detection from Multi-view by Associating Anomaly
                  Scores with User Trust},
  booktitle    = {TrustCom},
  pages        = {643--650},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00096},
  doi          = {10.1109/TRUSTCOM53373.2021.00096},
  timestamp    = {Mon, 14 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangZLT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangZPL21,
  author       = {Tingting Wang and
                  Yao Zhou and
                  Yushan Pei and
                  Fuchang Li},
  title        = {Research of Sharing and Compatibility for {HIBS} and Terrestrial Network
                  in 900MHz},
  booktitle    = {TrustCom},
  pages        = {1380--1385},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00193},
  doi          = {10.1109/TRUSTCOM53373.2021.00193},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangZPL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WeiZFGGS21,
  author       = {Wei Wei and
                  Yang Zhang and
                  Zhongsheng Fan and
                  Jinge Guo and
                  Bao Guo and
                  Huangtao Song},
  title        = {{NR} Shared Spectrum efficiency and utilization analysis based on
                  big data},
  booktitle    = {TrustCom},
  pages        = {1358--1362},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00189},
  doi          = {10.1109/TRUSTCOM53373.2021.00189},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WeiZFGGS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WenZPW21,
  author       = {Ruxue Wen and
                  Rui Zhang and
                  Kai Peng and
                  Chen Wang},
  title        = {Protecting Locations with Differential Privacy against Location-Dependent
                  Attacks in Continuous {LBS} Queries},
  booktitle    = {TrustCom},
  pages        = {379--386},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00065},
  doi          = {10.1109/TRUSTCOM53373.2021.00065},
  timestamp    = {Tue, 21 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WenZPW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WuCSDZ021,
  author       = {Susheng Wu and
                  Bin Chen and
                  Mingxu Sun and
                  Renyu Duan and
                  Qixiang Zhang and
                  Cheng Huang},
  title        = {DeepVuler: {A} Vulnerability Intelligence Mining System for Open-Source
                  Communities},
  booktitle    = {TrustCom},
  pages        = {598--605},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00090},
  doi          = {10.1109/TRUSTCOM53373.2021.00090},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WuCSDZ021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WuLPK21,
  author       = {Huanyu Wu and
                  Lunjie Li and
                  Hye{-}Young Paik and
                  Salil S. Kanhere},
  title        = {MEChain: {A} Multi-layer Blockchain Structure with Hierarchical Consensus
                  for Secure {EHR} System},
  booktitle    = {TrustCom},
  pages        = {976--987},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00136},
  doi          = {10.1109/TRUSTCOM53373.2021.00136},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WuLPK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WuW021,
  author       = {Huizi Wu and
                  Shiyi Wang and
                  Hui Fang},
  title        = {{LP-UIT:} {A} Multimodal Framework for Link Prediction in Social Networks},
  booktitle    = {TrustCom},
  pages        = {742--749},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00108},
  doi          = {10.1109/TRUSTCOM53373.2021.00108},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WuW021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WuXZ21,
  author       = {Bolun Wu and
                  Yuanhang Xu and
                  Futai Zou},
  title        = {Malware Classification by Learning Semantic and Structural Features
                  of Control Flow Graphs},
  booktitle    = {TrustCom},
  pages        = {540--547},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00084},
  doi          = {10.1109/TRUSTCOM53373.2021.00084},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WuXZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WuZLLF21,
  author       = {Jiating Wu and
                  Yujia Zhu and
                  Baiyang Li and
                  Qingyun Liu and
                  Binxing Fang},
  title        = {Peek Inside the Encrypted World: Autoencoder-Based Detection of DoH
                  Resolvers},
  booktitle    = {TrustCom},
  pages        = {783--790},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00113},
  doi          = {10.1109/TRUSTCOM53373.2021.00113},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WuZLLF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XiaDZL21,
  author       = {Qing Xia and
                  Wensheng Dou and
                  Fengjun Zhang and
                  Geng Liang},
  title        = {The Performance of Selfish Mining in {GHOST}},
  booktitle    = {TrustCom},
  pages        = {26--33},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00022},
  doi          = {10.1109/TRUSTCOM53373.2021.00022},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/XiaDZL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XiaWHXGLL21,
  author       = {Wei Xia and
                  Wei Wang and
                  Xin He and
                  Gang Xiong and
                  Gaopeng Gou and
                  Zhenzhen Li and
                  Zhen Li},
  title        = {Old Habits Die Hard: {A} Sober Look at {TLS} Client Certificates in
                  the Real World},
  booktitle    = {TrustCom},
  pages        = {83--90},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00029},
  doi          = {10.1109/TRUSTCOM53373.2021.00029},
  timestamp    = {Wed, 27 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/XiaWHXGLL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XieGSSCLW21,
  author       = {Chenglin Xie and
                  Yujie Guo and
                  Shaosen Shi and
                  Yu Sheng and
                  Xiarun Chen and
                  Chengyang Li and
                  Weiping Wen},
  title        = {EnvFaker: {A} Method to Reinforce Linux Sandbox Based on Tracer, Filter
                  and Emulator against Environmental-Sensitive Malware},
  booktitle    = {TrustCom},
  pages        = {667--677},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00099},
  doi          = {10.1109/TRUSTCOM53373.2021.00099},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/XieGSSCLW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XingM21,
  author       = {Jiangna Xing and
                  Xuebin Ma},
  title        = {DP-gSpan: {A} Pattern Growth-based Differentially Private Frequent
                  Subgraph Mining Algorithm},
  booktitle    = {TrustCom},
  pages        = {397--404},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00067},
  doi          = {10.1109/TRUSTCOM53373.2021.00067},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/XingM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XuHWWW21,
  author       = {Sujie Xu and
                  Xin Hu and
                  Libing Wang and
                  Yin Wang and
                  Weidong Wang},
  title        = {Joint Power and Bandwidth Allocation for Internet of Vehicles Based
                  on Proximal Policy Optimization Algorithm},
  booktitle    = {TrustCom},
  pages        = {1352--1357},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00188},
  doi          = {10.1109/TRUSTCOM53373.2021.00188},
  timestamp    = {Thu, 02 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/XuHWWW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XuWGY0Z21,
  author       = {Ke Xu and
                  Miaoqiong Wang and
                  Yuming Ge and
                  Rundong Yu and
                  Jian Wang and
                  Jiachen Zhang},
  title        = {{C-V2X} Large-scale Test Network Transmission Performance Data Analysis
                  Method},
  booktitle    = {TrustCom},
  pages        = {1334--1339},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00185},
  doi          = {10.1109/TRUSTCOM53373.2021.00185},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/XuWGY0Z21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XuZZ0S21,
  author       = {Chang Xu and
                  Lvhan Zhang and
                  Liehuang Zhu and
                  Chuan Zhang and
                  Kashif Sharif},
  title        = {Achieving Efficient and Privacy-preserving Biometric Identification
                  in Cloud Computing},
  booktitle    = {TrustCom},
  pages        = {363--370},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00063},
  doi          = {10.1109/TRUSTCOM53373.2021.00063},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/XuZZ0S21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XueHSWL21,
  author       = {Mingfu Xue and
                  Can He and
                  Shichang Sun and
                  Jian Wang and
                  Weiqiang Liu},
  title        = {Robust Backdoor Attacks against Deep Neural Networks in Real Physical
                  World},
  booktitle    = {TrustCom},
  pages        = {620--626},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00093},
  doi          = {10.1109/TRUSTCOM53373.2021.00093},
  timestamp    = {Wed, 22 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/XueHSWL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XueWZHZ21,
  author       = {Xingsi Xue and
                  Haolin Wang and
                  Yunmeng Zhao and
                  Yikun Huang and
                  Hai Zhu},
  title        = {Matching Sensor Ontologies with Neural Network},
  booktitle    = {TrustCom},
  pages        = {1452--1457},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00206},
  doi          = {10.1109/TRUSTCOM53373.2021.00206},
  timestamp    = {Fri, 25 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/XueWZHZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YanLCYWFCWS21,
  author       = {Zhuo Yan and
                  Bin Lan and
                  Shaohao Chen and
                  Senyu Yu and
                  Xingwei Wang and
                  Zhuoqun Fang and
                  Wei Chen and
                  Chuanyun Wang and
                  Xiangbin Shi},
  title        = {Design of Lightweight Intelligent Vehicle System Based on Hybrid Depth
                  Model},
  booktitle    = {TrustCom},
  pages        = {1306--1311},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00180},
  doi          = {10.1109/TRUSTCOM53373.2021.00180},
  timestamp    = {Tue, 15 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/YanLCYWFCWS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YanWLYCFWCS21,
  author       = {Zhuo Yan and
                  Xingwei Wang and
                  Bin Lan and
                  Senyu Yu and
                  Shaohao Chen and
                  Zhuoqun Fang and
                  Chuanyun Wang and
                  Wei Chen and
                  Xiangbin Shi},
  title        = {Improved {NS} Cellular Automaton Model for Simulating Traffic Flows
                  of Two-Lane},
  booktitle    = {TrustCom},
  pages        = {1312--1317},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00181},
  doi          = {10.1109/TRUSTCOM53373.2021.00181},
  timestamp    = {Tue, 15 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/YanWLYCFWCS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YangSZLFQ21,
  author       = {Xiaojuan Yang and
                  Jiaxing Shang and
                  Linjiang Zheng and
                  Dajiang Liu and
                  Shu Fu and
                  Baohua Qiang},
  title        = {Accepted Influence Maximization under Linear Threshold Model on Large-Scale
                  Social Networks},
  booktitle    = {TrustCom},
  pages        = {1061--1068},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00145},
  doi          = {10.1109/TRUSTCOM53373.2021.00145},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/YangSZLFQ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YangYK21,
  author       = {Xuechao Yang and
                  Xun Yi and
                  Andrei Kelarev},
  title        = {Secure Ranked Choice Online Voting System via Intel {SGX} and Blockchain},
  booktitle    = {TrustCom},
  pages        = {139--146},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00036},
  doi          = {10.1109/TRUSTCOM53373.2021.00036},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YangYK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Yao0LD0X0021,
  author       = {Aiting Yao and
                  Frank Jiang and
                  Xuejun Li and
                  Chengzu Dong and
                  Jia Xu and
                  Yi Xu and
                  Gang Li and
                  Xiao Liu},
  title        = {A Novel Security Framework for Edge Computing based {UAV} Delivery
                  System},
  booktitle    = {TrustCom},
  pages        = {1031--1038},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00142},
  doi          = {10.1109/TRUSTCOM53373.2021.00142},
  timestamp    = {Tue, 13 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Yao0LD0X0021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YinZF21,
  author       = {Jiaqi Yin and
                  Huibiao Zhu and
                  Yuan Fei},
  title        = {Formal Verification of HPS-based Master-Slave Scheme in {MEC} with
                  Timed Automata},
  booktitle    = {TrustCom},
  pages        = {68--75},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00027},
  doi          = {10.1109/TRUSTCOM53373.2021.00027},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/YinZF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YuanSDZCL021,
  author       = {Bin Yuan and
                  Shengyao Sun and
                  Xianjun Deng and
                  Deqing Zou and
                  Haoyu Chen and
                  Shenghui Li and
                  Hai Jin},
  title        = {Automatically derived stateful network functions including non-field
                  attributes},
  booktitle    = {TrustCom},
  pages        = {944--951},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00132},
  doi          = {10.1109/TRUSTCOM53373.2021.00132},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/YuanSDZCL021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YueYWZXBH21,
  author       = {Xiaohan Yue and
                  Lixin Yang and
                  Xibo Wang and
                  Shuaishuai Zeng and
                  Jian Xu and
                  Shi Bai and
                  Yuan He},
  title        = {An Aggregate Anonymous Credential Scheme in {C-ITS} for Multi-Service
                  with Revocation},
  booktitle    = {TrustCom},
  pages        = {452--459},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00074},
  doi          = {10.1109/TRUSTCOM53373.2021.00074},
  timestamp    = {Fri, 10 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YueYWZXBH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YueZWYXB021,
  author       = {Xiaohan Yue and
                  Shuaishuai Zeng and
                  Xibo Wang and
                  Lixin Yang and
                  Jian Xu and
                  Shi Bai and
                  Yuan He},
  title        = {A Revocable Zone Encryption Scheme with Anonymous Authentication for
                  {C-ITS}},
  booktitle    = {TrustCom},
  pages        = {232--239},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00047},
  doi          = {10.1109/TRUSTCOM53373.2021.00047},
  timestamp    = {Fri, 10 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/YueZWYXB021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Zeng0DSJ21,
  author       = {Pengjie Zeng and
                  Xiaoliang Wang and
                  Liangzuo Dong and
                  Xinhui She and
                  Frank Jiang},
  title        = {A Blockchain Scheme Based on {DAG} Structure Security Solution for
                  IIoT},
  booktitle    = {TrustCom},
  pages        = {935--943},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00131},
  doi          = {10.1109/TRUSTCOM53373.2021.00131},
  timestamp    = {Mon, 14 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Zeng0DSJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Zeng0T21,
  author       = {Dongrui Zeng and
                  Ben Niu and
                  Gang Tan},
  title        = {MazeRunner: Evaluating the Attack Surface of Control-Flow Integrity
                  Policies},
  booktitle    = {TrustCom},
  pages        = {810--821},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00116},
  doi          = {10.1109/TRUSTCOM53373.2021.00116},
  timestamp    = {Wed, 07 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Zeng0T21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Zhang0SWZ21,
  author       = {Dayin Zhang and
                  Xiaojun Chen and
                  Jinqiao Shi and
                  Dakui Wang and
                  Shuai Zeng},
  title        = {A Differential Privacy Collaborative Deep Learning Algorithm in Pervasive
                  Edge Computing Environment},
  booktitle    = {TrustCom},
  pages        = {347--354},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00061},
  doi          = {10.1109/TRUSTCOM53373.2021.00061},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Zhang0SWZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Zhang0ZLZ21,
  author       = {Xulong Zhang and
                  Frank Jiang and
                  Ran Zhang and
                  Shupeng Li and
                  Yang Zhou},
  title        = {Social Spammer Detection Based on Semi-Supervised Learning},
  booktitle    = {TrustCom},
  pages        = {849--855},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00120},
  doi          = {10.1109/TRUSTCOM53373.2021.00120},
  timestamp    = {Thu, 10 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Zhang0ZLZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangCJYL21,
  author       = {Wei Zhang and
                  Wenxue Cui and
                  Feng Jiang and
                  Chifu Yang and
                  Ran Li},
  title        = {Protecting the Ownership of Deep Learning Models with An End-to-End
                  Watermarking Framework},
  booktitle    = {TrustCom},
  pages        = {76--82},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00028},
  doi          = {10.1109/TRUSTCOM53373.2021.00028},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangCJYL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangFN21,
  author       = {Yaling Zhang and
                  Pengfei Feng and
                  Yao Ning},
  title        = {Random Forest Algorithm Based on Differential Privacy Protection},
  booktitle    = {TrustCom},
  pages        = {1259--1264},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00172},
  doi          = {10.1109/TRUSTCOM53373.2021.00172},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangFN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangJT21,
  author       = {LingHan Zhang and
                  F. Jiang and
                  Xiaohu Tang},
  title        = {Verifiable Conjunctive Keyword Search with Certificateless Searchable},
  booktitle    = {TrustCom},
  pages        = {9--16},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00020},
  doi          = {10.1109/TRUSTCOM53373.2021.00020},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangJT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangLCPZZ21,
  author       = {Gang Zhang and
                  Hao Li and
                  Zhenxiang Chen and
                  Lizhi Peng and
                  Yuhui Zhu and
                  Chuan Zhao},
  title        = {AndroCreme: Unseen Android Malware Detection Based on Inductive Conformal
                  Learning},
  booktitle    = {TrustCom},
  pages        = {651--658},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00097},
  doi          = {10.1109/TRUSTCOM53373.2021.00097},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangLCPZZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangLSG21,
  author       = {Qianyun Zhang and
                  Shijie Li and
                  Jiting Shi and
                  Zhenyu Guan},
  title        = {A TDOA-Assisted Direct Position Determination for Efficient Geolocalization
                  Using {LEO} Satellites},
  booktitle    = {TrustCom},
  pages        = {1323--1327},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00183},
  doi          = {10.1109/TRUSTCOM53373.2021.00183},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangLSG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangLXCCXY21,
  author       = {Heng Zhang and
                  Yuhan Liu and
                  Lexi Xu and
                  Xinzhou Cheng and
                  Lijuan Cao and
                  Wei Xia and
                  Ciguang Yang},
  title        = {Evaluation and Application of News Transmission Speed in New Media
                  Environment},
  booktitle    = {TrustCom},
  pages        = {1422--1427},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00201},
  doi          = {10.1109/TRUSTCOM53373.2021.00201},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangLXCCXY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangLY21,
  author       = {Lichao Zhang and
                  Wangbin Li and
                  Hailiang Ye},
  title        = {A blind watermarking system based on deep learning model},
  booktitle    = {TrustCom},
  pages        = {1208--1213},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00164},
  doi          = {10.1109/TRUSTCOM53373.2021.00164},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangLY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangQL21,
  author       = {Tao Zhang and
                  Yi Qin and
                  Qiang Li},
  title        = {Trusted Artificial Intelligence: Technique Requirements and Best Practices},
  booktitle    = {TrustCom},
  pages        = {1458--1462},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00207},
  doi          = {10.1109/TRUSTCOM53373.2021.00207},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangQL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangQZCW21,
  author       = {Huimin Zhang and
                  Lishen Qiu and
                  Wenliang Zhu and
                  Wenqiang Cai and
                  Lirong Wang},
  title        = {Automated Classification of Atrial Fibrillation and Atrial Flutter
                  in {ECG} Signals based on Deep Learning},
  booktitle    = {TrustCom},
  pages        = {1498--1502},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00215},
  doi          = {10.1109/TRUSTCOM53373.2021.00215},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangQZCW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangWYF21,
  author       = {Yuntao Zhang and
                  Zhongru Wang and
                  Weiqiang Yu and
                  Binxing Fang},
  title        = {Multi-level Directed Fuzzing for Detecting Use-after-Free Vulnerabilities},
  booktitle    = {TrustCom},
  pages        = {569--576},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00087},
  doi          = {10.1109/TRUSTCOM53373.2021.00087},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangWYF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangX021,
  author       = {Ruipeng Zhang and
                  Mengjun Xie and
                  Jiang Bian},
  title        = {ReLF: Scalable Remote Live Forensics for Android},
  booktitle    = {TrustCom},
  pages        = {822--831},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00117},
  doi          = {10.1109/TRUSTCOM53373.2021.00117},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangX021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangYQLZZ21,
  author       = {Jiachao Zhang and
                  Peiran Yu and
                  Le Qi and
                  Song Liu and
                  Haiyu Zhang and
                  Jianzhong Zhang},
  title        = {FLDDoS: DDoS Attack Detection Model based on Federated Learning},
  booktitle    = {TrustCom},
  pages        = {635--642},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00095},
  doi          = {10.1109/TRUSTCOM53373.2021.00095},
  timestamp    = {Tue, 02 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangYQLZZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangYWXZL21,
  author       = {Jie Zhang and
                  Jiaqi Yan and
                  Jinxian Wang and
                  Jie Xu and
                  Yilong Zhao and
                  Gangyin Luo},
  title        = {Research on Droplet Digital {PCR} Amplification System},
  booktitle    = {TrustCom},
  pages        = {1483--1487},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00212},
  doi          = {10.1109/TRUSTCOM53373.2021.00212},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangYWXZL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangYZZCZ21,
  author       = {Chunhui Zhang and
                  Xiaoming Yuan and
                  Qianyun Zhang and
                  Guangxu Zhu and
                  Lei Cheng and
                  Ning Zhang},
  title        = {Privacy-Preserving Neural Architecture Search Across Federated IoT
                  Devices},
  booktitle    = {TrustCom},
  pages        = {1434--1438},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00203},
  doi          = {10.1109/TRUSTCOM53373.2021.00203},
  timestamp    = {Sat, 17 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangYZZCZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhaoWD21,
  author       = {Yongxin Zhao and
                  Wanqing Wu and
                  Chaofan Di},
  title        = {Release of Trajectory Data based on Space Segmentation using Differential
                  Privacy},
  booktitle    = {TrustCom},
  pages        = {1246--1253},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00170},
  doi          = {10.1109/TRUSTCOM53373.2021.00170},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhaoWD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhaoZ21,
  author       = {Tianyu Zhao and
                  Tao Zhang},
  title        = {Revisiting Anonymity and Privacy of Bitcoin},
  booktitle    = {TrustCom},
  pages        = {1275--1280},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00175},
  doi          = {10.1109/TRUSTCOM53373.2021.00175},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhaoZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhengZQMZW21,
  author       = {Lesong Zheng and
                  Miao Zhang and
                  Lishen Qiu and
                  Gang Ma and
                  Wenliang Zhu and
                  Lirong Wang},
  title        = {A multi-scale convolutional neural network for heartbeat classification},
  booktitle    = {TrustCom},
  pages        = {1488--1492},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00213},
  doi          = {10.1109/TRUSTCOM53373.2021.00213},
  timestamp    = {Tue, 02 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhengZQMZW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhongZ21,
  author       = {Bingnan Zhong and
                  Qingkai Zeng},
  title        = {SecPT: Providing Efficient Page Table Protection based on {SMAP} Feature
                  in an Untrusted Commodity Kernel},
  booktitle    = {TrustCom},
  pages        = {215--223},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00045},
  doi          = {10.1109/TRUSTCOM53373.2021.00045},
  timestamp    = {Mon, 19 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhongZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhouJLZ21,
  author       = {Aijun Zhou and
                  Xinghao Jiang and
                  Zhaohong Li and
                  Zhenzhen Zhang},
  title        = {A {HEVC} Video Steganography Algorithm Based on {DCT/DST} Coefficients
                  with Improved {VRCNN}},
  booktitle    = {TrustCom},
  pages        = {967--975},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00135},
  doi          = {10.1109/TRUSTCOM53373.2021.00135},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhouJLZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhouMLCZZ21,
  author       = {Shiyu Zhou and
                  Jie Miao and
                  Xiqing Liu and
                  Xinzhou Cheng and
                  Zhenqiao Zhao and
                  Xin Zhao},
  title        = {Fault Diagnosis of 5G Voice Service Based on Multi-sources data},
  booktitle    = {TrustCom},
  pages        = {1554--1558},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00225},
  doi          = {10.1109/TRUSTCOM53373.2021.00225},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhouMLCZZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhouPMJ21,
  author       = {Changli Zhou and
                  Jing Peng and
                  Ying Ma and
                  Qingfeng Jiang},
  title        = {A Privacy-preserving Location Recommendation Scheme without Trustworthy
                  Entity},
  booktitle    = {TrustCom},
  pages        = {444--451},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00073},
  doi          = {10.1109/TRUSTCOM53373.2021.00073},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhouPMJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Zhu0CY21,
  author       = {Licai Zhu and
                  Hao Yang and
                  Shi Chen and
                  Zhipeng Yu},
  title        = {Effective {RFID} Localization Based on Fuzzy Logic For Security},
  booktitle    = {TrustCom},
  pages        = {323--330},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00058},
  doi          = {10.1109/TRUSTCOM53373.2021.00058},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Zhu0CY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhuMCQZW21,
  author       = {Wenliang Zhu and
                  Gang Ma and
                  Yuhang Chen and
                  Lishen Qiu and
                  Lesong Zheng and
                  Lirong Wang},
  title        = {A Novel Method for Detecting Noise Segments in {ECG} Signals},
  booktitle    = {TrustCom},
  pages        = {1570--1574},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00228},
  doi          = {10.1109/TRUSTCOM53373.2021.00228},
  timestamp    = {Tue, 02 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhuMCQZW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZouMGL21,
  author       = {Futai Zou and
                  Dechao Meng and
                  Wentao Gao and
                  Linsen Li},
  title        = {DePL: Detecting Privacy Leakage in DNS-over-HTTPS Traffic},
  booktitle    = {TrustCom},
  pages        = {577--586},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00088},
  doi          = {10.1109/TRUSTCOM53373.2021.00088},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZouMGL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trustcom/2021,
  title        = {20th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2021, Shenyang, China, October
                  20-22, 2021},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021},
  doi          = {10.1109/TRUSTCOM53373.2021},
  isbn         = {978-1-6654-1658-0},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/0001BR20,
  author       = {Subhra Mazumdar and
                  Prabal Banerjee and
                  Sushmita Ruj},
  title        = {Time is Money: Countering Griefing Attack in Lightning Network},
  booktitle    = {TrustCom},
  pages        = {1036--1043},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00138},
  doi          = {10.1109/TRUSTCOM50675.2020.00138},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/0001BR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/0001MZ20,
  author       = {Wenjuan Li and
                  Weizhi Meng and
                  Hui Zhu},
  title        = {Towards Collaborative Intrusion Detection Enhancement against Insider
                  Attacks with Multi-Level Trust},
  booktitle    = {TrustCom},
  pages        = {1179--1186},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00158},
  doi          = {10.1109/TRUSTCOM50675.2020.00158},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/0001MZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/000220,
  author       = {Wei Ren},
  title        = {A Symmetric Uniform Formula and Sole Index Method for Sieving (Twin)
                  Primes},
  booktitle    = {TrustCom},
  pages        = {1592--1597},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00220},
  doi          = {10.1109/TRUSTCOM50675.2020.00220},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/000220.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/0004WLWDZX20,
  author       = {Chen Tian and
                  Yazhe Wang and
                  Peng Liu and
                  Yu Wang and
                  Ruirui Dai and
                  Anyuan Zhou and
                  Zhen Xu},
  title        = {Prihook: Differentiated context-aware hook placement for different
                  owners' smartphones},
  booktitle    = {TrustCom},
  pages        = {615--622},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00087},
  doi          = {10.1109/TRUSTCOM50675.2020.00087},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/0004WLWDZX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/0006GCZA20,
  author       = {Meng Li and
                  Jianbo Gao and
                  Yifei Chen and
                  Jingcheng Zhao and
                  Mamoun Alazab},
  title        = {Privacy-Preserving Ride-Hailing with Verifiable Order-Linking in Vehicular
                  Networks},
  booktitle    = {TrustCom},
  pages        = {599--606},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00085},
  doi          = {10.1109/TRUSTCOM50675.2020.00085},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/0006GCZA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/0021XH20,
  author       = {Ming Liu and
                  Zhi Xue and
                  Xiangjian He},
  title        = {A Unified Host-based Intrusion Detection Framework using Spark in
                  Cloud},
  booktitle    = {TrustCom},
  pages        = {97--103},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00026},
  doi          = {10.1109/TRUSTCOM50675.2020.00026},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/0021XH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AbbasHFSSZ20,
  author       = {Syed Ghazanfar Abbas and
                  Muhammad Husnain and
                  Ubaid Ullah Fayyaz and
                  Farrukh Shahzad and
                  Ghalib A. Shah and
                  Kashif Zafar},
  title        = {IoT-Sphere: {A} Framework To Secure IoT Devices From Becoming Attack
                  Target And Attack Source},
  booktitle    = {TrustCom},
  pages        = {1402--1409},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00189},
  doi          = {10.1109/TRUSTCOM50675.2020.00189},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/AbbasHFSSZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AbbasHS20,
  author       = {Syed Ghazanfar Abbas and
                  Fabiha Hashmat and
                  Ghalib A. Shah},
  title        = {A Multi-Layer Industrial-IoT Attack Taxonomy: Layers, Dimensions,
                  Techniques and Application},
  booktitle    = {TrustCom},
  pages        = {1820--1825},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00249},
  doi          = {10.1109/TRUSTCOM50675.2020.00249},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/AbbasHS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AbrahamMRH20,
  author       = {Andreas Abraham and
                  Stefan More and
                  Christof Rabensteiner and
                  Felix H{\"{o}}randner},
  title        = {Revocable and Offline-Verifiable Self-Sovereign Identities},
  booktitle    = {TrustCom},
  pages        = {1020--1027},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00136},
  doi          = {10.1109/TRUSTCOM50675.2020.00136},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/AbrahamMRH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AignerK20,
  author       = {Andreas Aigner and
                  Abdelmajid Khelil},
  title        = {A Scoring System to efficiently measure Security in Cyber-Physical
                  Systems},
  booktitle    = {TrustCom},
  pages        = {1141--1145},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00151},
  doi          = {10.1109/TRUSTCOM50675.2020.00151},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/AignerK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AignerK20a,
  author       = {Andreas Aigner and
                  Abdelmajid Khelil},
  title        = {A Semantic Model-based Security Engineering Framework for Cyber-Physical
                  Systems},
  booktitle    = {TrustCom},
  pages        = {1826--1833},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00250},
  doi          = {10.1109/TRUSTCOM50675.2020.00250},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/AignerK20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Al-JodyHAK20,
  author       = {Taha Al{-}Jody and
                  Violeta Holmes and
                  Alexandros Antoniades and
                  Yazan Kazkouzeh},
  title        = {Bearicade: secure access gateway to High Performance Computing systems},
  booktitle    = {TrustCom},
  pages        = {1420--1427},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00191},
  doi          = {10.1109/TRUSTCOM50675.2020.00191},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Al-JodyHAK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AlavizadehAJ20,
  author       = {Hootan Alavizadeh and
                  Hooman Alavizadeh and
                  Julian Jang{-}Jaccard},
  title        = {Cyber Situation Awareness Monitoring and Proactive Response for Enterprises
                  on the Cloud},
  booktitle    = {TrustCom},
  pages        = {1276--1284},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00171},
  doi          = {10.1109/TRUSTCOM50675.2020.00171},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/AlavizadehAJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AlshehriS020,
  author       = {Ahmed Alshehri and
                  Malek Ben Salem and
                  Lei Ding},
  title        = {Are Smart Home Devices Abandoning {IPV} Victims?},
  booktitle    = {TrustCom},
  pages        = {1368--1375},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00184},
  doi          = {10.1109/TRUSTCOM50675.2020.00184},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/AlshehriS020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AngeloS20,
  author       = {Monika Di Angelo and
                  Gernot Salzer},
  title        = {Assessing the Similarity of Smart Contracts by Clustering their Interfaces},
  booktitle    = {TrustCom},
  pages        = {1910--1919},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00261},
  doi          = {10.1109/TRUSTCOM50675.2020.00261},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/AngeloS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AnwarA20,
  author       = {Adnan Anwar and
                  S. M. Abu Adnan Abir},
  title        = {Measurement Unit Placement Against Injection Attacks for the Secured
                  Operation of an IIoT-based Smart Grid},
  booktitle    = {TrustCom},
  pages        = {767--774},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00105},
  doi          = {10.1109/TRUSTCOM50675.2020.00105},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/AnwarA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ArifBFSWX20,
  author       = {Muhammad Arif and
                  Walter Balzano and
                  Alessandro Fontanella and
                  Silvia Stranieri and
                  Guojun Wang and
                  Xiaofei Xing},
  title        = {Integration of 5G, VANETs and Blockchain Technology},
  booktitle    = {TrustCom},
  pages        = {2007--2013},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00275},
  doi          = {10.1109/TRUSTCOM50675.2020.00275},
  timestamp    = {Fri, 10 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ArifBFSWX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AsadiV20,
  author       = {Behzad Asadi and
                  Vijay Varadharajan},
  title        = {Towards a Robust Classifier: An MDL-Based Method for Generating Adversarial
                  Examples},
  booktitle    = {TrustCom},
  pages        = {793--801},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00108},
  doi          = {10.1109/TRUSTCOM50675.2020.00108},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/AsadiV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AsgharGLRZ20,
  author       = {Muhammad Rizwan Asghar and
                  Steven D. Galbraith and
                  Andrea Lanzi and
                  Giovanni Russello and
                  Lukas Zobernig},
  title        = {Towards a Theory of Special-Purpose Program Obfuscation},
  booktitle    = {TrustCom},
  pages        = {394--401},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00061},
  doi          = {10.1109/TRUSTCOM50675.2020.00061},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/AsgharGLRZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BaalousP20,
  author       = {Rawan Baalous and
                  Ronald Poet},
  title        = {Factors Affecting Users' Disclosure Decisions in Android Runtime Permissions
                  Model},
  booktitle    = {TrustCom},
  pages        = {1113--1118},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00147},
  doi          = {10.1109/TRUSTCOM50675.2020.00147},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/BaalousP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BakasM20,
  author       = {Alexandros Bakas and
                  Antonis Michalas},
  title        = {Multi-Input Functional Encryption: Efficient Applications from Symmetric
                  Primitives},
  booktitle    = {TrustCom},
  pages        = {1105--1112},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00146},
  doi          = {10.1109/TRUSTCOM50675.2020.00146},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/BakasM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BarbeauCCDG20,
  author       = {Michel Barbeau and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens and
                  Romain Dagnas and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Metrics to Enhance the Resilience of Cyber-Physical Systems},
  booktitle    = {TrustCom},
  pages        = {1167--1172},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00156},
  doi          = {10.1109/TRUSTCOM50675.2020.00156},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/BarbeauCCDG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BaumgartnerDFGH20,
  author       = {Lars Baumg{\"{a}}rtner and
                  Alexandra Dmitrienko and
                  Bernd Freisleben and
                  Alexander Gruler and
                  Jonas H{\"{o}}chst and
                  Joshua K{\"{u}}hlberg and
                  Mira Mezini and
                  Richard Mitev and
                  Markus Miettinen and
                  Anel Muhamedagic and
                  Thien Duc Nguyen and
                  Alvar Penning and
                  Dermot Frederik Pustelnik and
                  Filipp Roos and
                  Ahmad{-}Reza Sadeghi and
                  Michael Schwarz and
                  Christian Uhl},
  title        = {Mind the {GAP:} Security {\&} Privacy Risks of Contact Tracing
                  Apps},
  booktitle    = {TrustCom},
  pages        = {458--467},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00069},
  doi          = {10.1109/TRUSTCOM50675.2020.00069},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/BaumgartnerDFGH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BecherLS20,
  author       = {Kilian Becher and
                  J. A. Gregor Lagodzinski and
                  Thorsten Strufe},
  title        = {Privacy-Preserving Public Verification of Ethical Cobalt Sourcing},
  booktitle    = {TrustCom},
  pages        = {998--1005},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00133},
  doi          = {10.1109/TRUSTCOM50675.2020.00133},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/BecherLS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BelchiorPP0VG20,
  author       = {Rafael Belchior and
                  Benedikt Putz and
                  G{\"{u}}nther Pernul and
                  Miguel Correia and
                  Andr{\'{e}} Vasconcelos and
                  S{\'{e}}rgio Guerreiro},
  title        = {{SSIBAC:} Self-Sovereign Identity Based Access Control},
  booktitle    = {TrustCom},
  pages        = {1935--1943},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00264},
  doi          = {10.1109/TRUSTCOM50675.2020.00264},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/BelchiorPP0VG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BhuiyanRFCHT20,
  author       = {Md. Saiful Islam Bhuiyan and
                  Abdur Razzak and
                  Md. Sadek Ferdous and
                  Mohammad Jabed Morshed Chowdhury and
                  Mohammad Ashraful Hoque and
                  Sasu Tarkoma},
  title        = {{BONIK:} {A} Blockchain Empowered Chatbot for Financial Transactions},
  booktitle    = {TrustCom},
  pages        = {1079--1088},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00143},
  doi          = {10.1109/TRUSTCOM50675.2020.00143},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/BhuiyanRFCHT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BlackG0L20,
  author       = {Paul Black and
                  Iqbal Gondal and
                  Peter Vamplew and
                  Arun Lakhotia},
  title        = {Identifying Cross-Version Function Similarity Using Contextual Features},
  booktitle    = {TrustCom},
  pages        = {810--818},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00110},
  doi          = {10.1109/TRUSTCOM50675.2020.00110},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/BlackG0L20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BoureanuMPAMFM20,
  author       = {Ioana Boureanu and
                  Daniel Migault and
                  Stere Preda and
                  Hyame Assem Alamedine and
                  Sanjay Mishra and
                  Frederic Fieau and
                  Mohammad Mannan},
  title        = {{LURK:} Server-Controlled {TLS} Delegation},
  booktitle    = {TrustCom},
  pages        = {182--193},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00036},
  doi          = {10.1109/TRUSTCOM50675.2020.00036},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/BoureanuMPAMFM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/CaiLHH20,
  author       = {Jiajin Cai and
                  Tongxin Li and
                  Can Huang and
                  Xinhui Han},
  title        = {ReDex: Unpacking Android Packed Apps by Executing Every Method},
  booktitle    = {TrustCom},
  pages        = {337--344},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00054},
  doi          = {10.1109/TRUSTCOM50675.2020.00054},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/CaiLHH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/CaoHZL20,
  author       = {Defu Cao and
                  Jing Huang and
                  Xuanyu Zhang and
                  Xianhua Liu},
  title        = {FTCLNet: Convolutional {LSTM} with Fourier Transform for Vulnerability
                  Detection},
  booktitle    = {TrustCom},
  pages        = {539--546},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00078},
  doi          = {10.1109/TRUSTCOM50675.2020.00078},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/CaoHZL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/CentsL20,
  author       = {Rick Cents and
                  Nhien{-}An Le{-}Khac},
  title        = {Towards {A} New Approach to Identify WhatsApp Messages},
  booktitle    = {TrustCom},
  pages        = {1895--1902},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00259},
  doi          = {10.1109/TRUSTCOM50675.2020.00259},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/CentsL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChamotraB20,
  author       = {Saurabh Chamotra and
                  Ferdous Ahmed Barbhuiya},
  title        = {Analysis and modelling of multi-stage attacks},
  booktitle    = {TrustCom},
  pages        = {1268--1275},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00170},
  doi          = {10.1109/TRUSTCOM50675.2020.00170},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChamotraB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenCCYWX20,
  author       = {Haibo Chen and
                  Junzuo Chen and
                  Jinfu Chen and
                  Shang Yin and
                  Yiming Wu and
                  Jiaping Xu},
  title        = {An Automatic Vulnerability Scanner for Web Applications},
  booktitle    = {TrustCom},
  pages        = {1519--1524},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00207},
  doi          = {10.1109/TRUSTCOM50675.2020.00207},
  timestamp    = {Fri, 24 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenCCYWX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenCLW20,
  author       = {Chaofan Chen and
                  Zelei Cheng and
                  Zuotian Li and
                  Manyi Wang},
  title        = {Hypergraph Attention Networks},
  booktitle    = {TrustCom},
  pages        = {1560--1565},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00215},
  doi          = {10.1109/TRUSTCOM50675.2020.00215},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenCLW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenWSZWF20,
  author       = {Muqian Chen and
                  Xuebin Wang and
                  Jinqiao Shi and
                  Can Zhao and
                  Meiqi Wang and
                  Binxing Fang},
  title        = {Napping Guard: Deanonymizing Tor Hidden Service in a Stealthy Way},
  booktitle    = {TrustCom},
  pages        = {699--706},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00097},
  doi          = {10.1109/TRUSTCOM50675.2020.00097},
  timestamp    = {Wed, 27 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenWSZWF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenZCLSZ20,
  author       = {Haibo Chen and
                  Dalin Zhang and
                  Jinfu Chen and
                  Wei Lin and
                  Dengzhou Shi and
                  Zian Zhao},
  title        = {An Automatic Vulnerability Classification System for IoT Softwares},
  booktitle    = {TrustCom},
  pages        = {1525--1529},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00208},
  doi          = {10.1109/TRUSTCOM50675.2020.00208},
  timestamp    = {Fri, 26 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenZCLSZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChengDYZ20,
  author       = {Jiangchang Cheng and
                  Yinglong Dai and
                  Yao Yuan and
                  Hongli Zhu},
  title        = {A Simple Analysis of Multimodal Data Fusion},
  booktitle    = {TrustCom},
  pages        = {1472--1475},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00199},
  doi          = {10.1109/TRUSTCOM50675.2020.00199},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChengDYZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChoiBKDZW20,
  author       = {Taejun Choi and
                  Guangdong Bai and
                  Ryan K. L. Ko and
                  Naipeng Dong and
                  Wenlu Zhang and
                  Shunyao Wang},
  title        = {An Analytics Framework for Heuristic Inference Attacks against Industrial
                  Control Systems},
  booktitle    = {TrustCom},
  pages        = {827--835},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00112},
  doi          = {10.1109/TRUSTCOM50675.2020.00112},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChoiBKDZW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Ciucanu0LS20,
  author       = {Radu Ciucanu and
                  Pascal Lafourcade and
                  Marius Lombard{-}Platet and
                  Marta Soare},
  title        = {Secure Outsourcing of Multi-Armed Bandits},
  booktitle    = {TrustCom},
  pages        = {202--209},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00038},
  doi          = {10.1109/TRUSTCOM50675.2020.00038},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Ciucanu0LS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/CoryRK20,
  author       = {Thomas Cory and
                  Philip Raschke and
                  Axel K{\"{u}}pper},
  title        = {Heimdall: Illuminating the Hidden Depths of Third-party Tracking in
                  Android Applications},
  booktitle    = {TrustCom},
  pages        = {676--682},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00094},
  doi          = {10.1109/TRUSTCOM50675.2020.00094},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/CoryRK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/CoulterZ0020,
  author       = {Rory Coulter and
                  Jun Zhang and
                  Lei Pan and
                  Yang Xiang},
  title        = {Unmasking Windows Advanced Persistent Threat Execution},
  booktitle    = {TrustCom},
  pages        = {268--276},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00046},
  doi          = {10.1109/TRUSTCOM50675.2020.00046},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/CoulterZ0020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/CuiLQY20,
  author       = {Xinchun Cui and
                  Xueqing Li and
                  Yiming Qin and
                  Yong Ding},
  title        = {A Password Strength Evaluation Algorithm based on Sensitive Personal
                  Information},
  booktitle    = {TrustCom},
  pages        = {1542--1545},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00211},
  doi          = {10.1109/TRUSTCOM50675.2020.00211},
  timestamp    = {Sat, 01 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/CuiLQY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/CuiY20,
  author       = {Handong Cui and
                  Tsz Hon Yuen},
  title        = {Address-based Signature},
  booktitle    = {TrustCom},
  pages        = {884--891},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00119},
  doi          = {10.1109/TRUSTCOM50675.2020.00119},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/CuiY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Dahiya0D20,
  author       = {Rohan Dahiya and
                  Frank Jiang and
                  Robin Doss},
  title        = {A Feedback-Driven Lightweight Reputation Scheme for IoV},
  booktitle    = {TrustCom},
  pages        = {1060--1068},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00141},
  doi          = {10.1109/TRUSTCOM50675.2020.00141},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Dahiya0D20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DengQWSW20,
  author       = {Mixue Deng and
                  Lishen Qiu and
                  Hongqing Wang and
                  Wei Shi and
                  Lirong Wang},
  title        = {Atrial Fibrillation Classification Using Convolutional Neural Networks
                  and Time Domain Features of {ECG} Sequence},
  booktitle    = {TrustCom},
  pages        = {1481--1485},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00201},
  doi          = {10.1109/TRUSTCOM50675.2020.00201},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/DengQWSW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DhillonH20,
  author       = {Harsh Dhillon and
                  Anwar Haque},
  title        = {Towards Network Traffic Monitoring Using Deep Transfer Learning},
  booktitle    = {TrustCom},
  pages        = {1089--1096},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00144},
  doi          = {10.1109/TRUSTCOM50675.2020.00144},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/DhillonH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DillonCHGJ20,
  author       = {Roberto Dillon and
                  Shailey Chawla and
                  Dayana Hristova and
                  Barbara G{\"{o}}bl and
                  Suzana Jovicic},
  title        = {Password Policies vs. Usability: When Do Users Go "Bananas"?},
  booktitle    = {TrustCom},
  pages        = {148--153},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00032},
  doi          = {10.1109/TRUSTCOM50675.2020.00032},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/DillonCHGJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DimitrakosDKMMR20,
  author       = {Theo Dimitrakos and
                  Tezcan Dilshener and
                  Alexander Kravtsov and
                  Antonio La Marra and
                  Fabio Martinelli and
                  Athanasios Rizos and
                  Alessandro Rosetti and
                  Andrea Saracino},
  title        = {Trust Aware Continuous Authorization for Zero Trust in Consumer Internet
                  of Things},
  booktitle    = {TrustCom},
  pages        = {1801--1812},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00247},
  doi          = {10.1109/TRUSTCOM50675.2020.00247},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/DimitrakosDKMMR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DingWXZOFQSZ20,
  author       = {Yu Ding and
                  Shupeng Wang and
                  Jian Xing and
                  Xiaoyu Zhang and
                  ZiSen Oi and
                  Ge Fu and
                  Qian Qiang and
                  Haoliang Sun and
                  Jianyu Zhang},
  title        = {Malware Classification on Imbalanced Data through Self-Attention},
  booktitle    = {TrustCom},
  pages        = {154--161},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00033},
  doi          = {10.1109/TRUSTCOM50675.2020.00033},
  timestamp    = {Mon, 27 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/DingWXZOFQSZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DingXZW20,
  author       = {Xuyang Ding and
                  Feng Xiao and
                  Man Zhou and
                  Zhibo Wang},
  title        = {Active Link Obfuscation to Thwart Link-flooding Attacks for Internet
                  of Things},
  booktitle    = {TrustCom},
  pages        = {217--224},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00040},
  doi          = {10.1109/TRUSTCOM50675.2020.00040},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/DingXZW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DoNNNDN20,
  author       = {Ba{-}Lam Do and
                  Quang{-}Thang Nguyen and
                  Thang Nguyen and
                  Tien{-}Thao Nguyen and
                  Thanh{-}Chung Dao and
                  Binh Minh Nguyen},
  title        = {{BML:} {A} Data Mapping Language for Blockchain Platforms},
  booktitle    = {TrustCom},
  pages        = {1297--1303},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00174},
  doi          = {10.1109/TRUSTCOM50675.2020.00174},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/DoNNNDN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FanDCS20,
  author       = {Chan Fan and
                  Xiaolei Dong and
                  Zhenfu Cao and
                  Jiachen Shen},
  title        = {{VCKSCF:} Efficient Verifiable Conjunctive Keyword Search Based on
                  Cuckoo Filter for Cloud Storage},
  booktitle    = {TrustCom},
  pages        = {285--292},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00048},
  doi          = {10.1109/TRUSTCOM50675.2020.00048},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/FanDCS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FanPKG0C20,
  author       = {Wenjun Fan and
                  Younghee Park and
                  Shubham Kumar and
                  Priyatham Ganta and
                  Xiaobo Zhou and
                  Sang{-}Yoon Chang},
  title        = {Blockchain-enabled Collaborative Intrusion Detection in Software Defined
                  Networks},
  booktitle    = {TrustCom},
  pages        = {967--974},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00129},
  doi          = {10.1109/TRUSTCOM50675.2020.00129},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/FanPKG0C20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FangA20,
  author       = {Xiuli Fang and
                  Muhammad Rizwan Asghar},
  title        = {RevBloc: {A} Blockchain-based Secure Customer Review System},
  booktitle    = {TrustCom},
  pages        = {1250--1259},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00168},
  doi          = {10.1109/TRUSTCOM50675.2020.00168},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/FangA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FarooqWHKAW20,
  author       = {Muhammad Umar Farooq and
                  Xingfu Wang and
                  Ammar Hawbani and
                  Asad Khan and
                  Adeel Ahmed and
                  Fisseha Teju Wedaj},
  title        = {{TORP:} Load Balanced Reliable Opportunistic Routing for Asynchronous
                  Wireless Sensor Networks},
  booktitle    = {TrustCom},
  pages        = {1384--1389},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00186},
  doi          = {10.1109/TRUSTCOM50675.2020.00186},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/FarooqWHKAW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FengHLLC20,
  author       = {Qi Feng and
                  Debiao He and
                  Min Luo and
                  Zengxiang Li and
                  Kim{-}Kwang Raymond Choo},
  title        = {Practical Secure Two-Party EdDSA Signature Generation with Key Protection
                  and Applications in Cryptocurrency},
  booktitle    = {TrustCom},
  pages        = {137--147},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00031},
  doi          = {10.1109/TRUSTCOM50675.2020.00031},
  timestamp    = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/FengHLLC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FernandesDC20,
  author       = {Tiago Fernandes and
                  Luis Dias and
                  Miguel Correia},
  title        = {{C2BID:} Cluster Change-Based Intrusion Detection},
  booktitle    = {TrustCom},
  pages        = {310--319},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00051},
  doi          = {10.1109/TRUSTCOM50675.2020.00051},
  timestamp    = {Mon, 22 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/FernandesDC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FuTGCZF20,
  author       = {Yu Fu and
                  Siming Tong and
                  Xiangyu Guo and
                  Liang Cheng and
                  Yang Zhang and
                  Dengguo Feng},
  title        = {Improving the Effectiveness of Grey-box Fuzzing By Extracting Program
                  Information},
  booktitle    = {TrustCom},
  pages        = {434--441},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00066},
  doi          = {10.1109/TRUSTCOM50675.2020.00066},
  timestamp    = {Mon, 20 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/FuTGCZF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GasibaLPF20,
  author       = {Tiago Espinha Gasiba and
                  Ulrike Lechner and
                  Maria Pinto{-}Albuquerque and
                  Daniel M{\'{e}}ndez Fern{\'{a}}ndez},
  title        = {Awareness of Secure Coding Guidelines in the Industry - {A} first
                  data analysis},
  booktitle    = {TrustCom},
  pages        = {345--352},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00055},
  doi          = {10.1109/TRUSTCOM50675.2020.00055},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GasibaLPF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GedenR20,
  author       = {Munir Geden and
                  Kasper Rasmussen},
  title        = {{TRUVIN:} Lightweight Detection of Data-Oriented Attacks Through Trusted
                  Value Integrity},
  booktitle    = {TrustCom},
  pages        = {174--181},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00035},
  doi          = {10.1109/TRUSTCOM50675.2020.00035},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/GedenR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GomesZ0SL20,
  author       = {Eduardo Gomes and
                  Igor Zavalyshyn and
                  Nuno Santos and
                  Jo{\~{a}}o Silva and
                  Axel Legay},
  title        = {Flowverine: Leveraging Dataflow Programming for Building Privacy-Sensitive
                  Android Applications},
  booktitle    = {TrustCom},
  pages        = {607--614},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00086},
  doi          = {10.1109/TRUSTCOM50675.2020.00086},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/GomesZ0SL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Gonzalez-Manzano20,
  author       = {Lorena Gonz{\'{a}}lez{-}Manzano and
                  Sergio Bernardez and
                  Jos{\'{e}} Mar{\'{\i}}a de Fuentes},
  title        = {SmartLED: Smartphone-based covert channels leveraging the notification
                  {LED}},
  booktitle    = {TrustCom},
  pages        = {1748--1755},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00240},
  doi          = {10.1109/TRUSTCOM50675.2020.00240},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Gonzalez-Manzano20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GuanMLB20,
  author       = {Shengyi Guan and
                  Xuebin Ma and
                  Wuyungerile Li and
                  Xiangyu Bai},
  title        = {DP-Eclat: {A} Vertical Frequent Itemset Mining Algorithm Based on
                  Differential Privacy},
  booktitle    = {TrustCom},
  pages        = {1696--1703},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00233},
  doi          = {10.1109/TRUSTCOM50675.2020.00233},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/GuanMLB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Guo0WL20,
  author       = {Chengqian Guo and
                  Quanwei Cai and
                  Qiongxiao Wang and
                  Jingqiang Lin},
  title        = {Extending Registration and Authentication Processes of {FIDO2} External
                  Authenticator with {QR} Codes},
  booktitle    = {TrustCom},
  pages        = {518--529},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00076},
  doi          = {10.1109/TRUSTCOM50675.2020.00076},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Guo0WL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HajarAK20,
  author       = {Muhammad Shadi Hajar and
                  M. Omar Al{-}Kadri and
                  Harsha K. Kalutarage},
  title        = {{LTMS:} {A} Lightweight Trust Management System for Wireless Medical
                  Sensor Networks},
  booktitle    = {TrustCom},
  pages        = {1783--1790},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00245},
  doi          = {10.1109/TRUSTCOM50675.2020.00245},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HajarAK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HanYLJLLWL20,
  author       = {Xueying Han and
                  Rongchao Yin and
                  Zhigang Lu and
                  Bo Jiang and
                  Yuling Liu and
                  Song Liu and
                  Chonghua Wang and
                  Ning Li},
  title        = {{STIDM:} {A} Spatial and Temporal Aware Intrusion Detection Model},
  booktitle    = {TrustCom},
  pages        = {370--377},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00058},
  doi          = {10.1109/TRUSTCOM50675.2020.00058},
  timestamp    = {Tue, 27 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/HanYLJLLWL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HanceS20,
  author       = {Jack Hance and
                  Jeremy Straub},
  title        = {Use of Bash History Novelty Detection for Identification of Similar
                  Source Attack Generation},
  booktitle    = {TrustCom},
  pages        = {759--766},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00104},
  doi          = {10.1109/TRUSTCOM50675.2020.00104},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/HanceS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Hao0ZZ20,
  author       = {Xiaohan Hao and
                  Wei Ren and
                  Wenwen Zheng and
                  Tianqing Zhu},
  title        = {SCScan: {A} SVM-based Scanning System for Vulnerabilities in Blockchain
                  Smart Contracts},
  booktitle    = {TrustCom},
  pages        = {1598--1605},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00221},
  doi          = {10.1109/TRUSTCOM50675.2020.00221},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Hao0ZZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HaseebMAW20,
  author       = {Junaid Haseeb and
                  Masood Mansoori and
                  Harith Al{-}Sahaf and
                  Ian Welch},
  title        = {IoT Attacks: Features Identification and Clustering},
  booktitle    = {TrustCom},
  pages        = {353--360},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00056},
  doi          = {10.1109/TRUSTCOM50675.2020.00056},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HaseebMAW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HaseebMW20,
  author       = {Junaid Haseeb and
                  Masood Mansoori and
                  Ian Welch},
  title        = {A Measurement Study of IoT-Based Attacks Using IoT Kill Chain},
  booktitle    = {TrustCom},
  pages        = {557--567},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00080},
  doi          = {10.1109/TRUSTCOM50675.2020.00080},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HaseebMW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Herberth20,
  author       = {Klaus Herberth},
  title        = {Group Communication Needs No Consistent Transcript Distribution},
  booktitle    = {TrustCom},
  pages        = {1437--1443},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00193},
  doi          = {10.1109/TRUSTCOM50675.2020.00193},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Herberth20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HnatiucGVM20,
  author       = {Mihaela Hnatiuc and
                  Oana Geman and
                  Dragos Vicoveanu and
                  George Motru},
  title        = {Aquatic Drone Control Using Inertial Sensors - Comparative Filtering
                  Methods},
  booktitle    = {TrustCom},
  pages        = {2014--2019},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00276},
  doi          = {10.1109/TRUSTCOM50675.2020.00276},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HnatiucGVM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HouZM20,
  author       = {Dongkun Hou and
                  Jie Zhang and
                  Ka Lok Man},
  title        = {Enhancing the Security of Numeric Comparison Secure Simple Pairing
                  in Bluetooth 5.0},
  booktitle    = {TrustCom},
  pages        = {1622--1629},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00224},
  doi          = {10.1109/TRUSTCOM50675.2020.00224},
  timestamp    = {Thu, 11 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HouZM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HuSXZC20,
  author       = {Xiaohui Hu and
                  Rui Sun and
                  Kejia Xu and
                  Yongzheng Zhang and
                  Peng Chang},
  title        = {Exploit Internal Structural Information for IoT Malware Detection
                  Based on Hierarchical Transformer Model},
  booktitle    = {TrustCom},
  pages        = {927--934},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00124},
  doi          = {10.1109/TRUSTCOM50675.2020.00124},
  timestamp    = {Thu, 01 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HuSXZC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HuZLY20,
  author       = {Yuzong Hu and
                  Futai Zou and
                  Linsen Li and
                  Ping Yi},
  title        = {Traffic Classification of User Behaviors in Tor, I2P, ZeroNet, Freenet},
  booktitle    = {TrustCom},
  pages        = {418--424},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00064},
  doi          = {10.1109/TRUSTCOM50675.2020.00064},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/HuZLY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HuangB20,
  author       = {Shin{-}Ying Huang and
                  Tao Ban},
  title        = {Monitoring Social Media for Vulnerability-Threat Prediction and Topic
                  Analysis},
  booktitle    = {TrustCom},
  pages        = {1771--1776},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00243},
  doi          = {10.1109/TRUSTCOM50675.2020.00243},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/HuangB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HuangZZLWQ20,
  author       = {Wen Huang and
                  Shijie Zhou and
                  Tianqing Zhu and
                  Yongjian Liao and
                  Chunjiang Wu and
                  Shilin Qiu},
  title        = {Improving Laplace Mechanism of Differential Privacy by Personalized
                  Sampling},
  booktitle    = {TrustCom},
  pages        = {623--630},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00088},
  doi          = {10.1109/TRUSTCOM50675.2020.00088},
  timestamp    = {Tue, 06 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HuangZZLWQ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Huo0ZLWL20,
  author       = {Tianlin Huo and
                  Wenhao Wang and
                  Pei Zhao and
                  Yufeng Li and
                  Tingting Wang and
                  Mingshu Li},
  title        = {{TEADS:} {A} Defense-aware Framework for Synthesizing Transient Execution
                  Attacks},
  booktitle    = {TrustCom},
  pages        = {320--327},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00052},
  doi          = {10.1109/TRUSTCOM50675.2020.00052},
  timestamp    = {Wed, 12 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Huo0ZLWL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HupperichD20,
  author       = {Thomas Hupperich and
                  Katharina Dassel},
  title        = {On the Usefulness of User Nudging and Strength Indication Concerning
                  Unlock Pattern Security},
  booktitle    = {TrustCom},
  pages        = {1646--1654},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00227},
  doi          = {10.1109/TRUSTCOM50675.2020.00227},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HupperichD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HutchinsonSK20,
  author       = {Shinelle Hutchinson and
                  Neesha Shantaram and
                  Umit Karabiyik},
  title        = {Forensic Analysis of Dating Applications on Android and iOS Devices},
  booktitle    = {TrustCom},
  pages        = {836--847},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00113},
  doi          = {10.1109/TRUSTCOM50675.2020.00113},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/HutchinsonSK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JadidiDJF20,
  author       = {Zahra Jadidi and
                  Ali Dorri and
                  Raja Jurdak and
                  Colin J. Fidge},
  title        = {Securing Manufacturing Using Blockchain},
  booktitle    = {TrustCom},
  pages        = {1920--1925},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00262},
  doi          = {10.1109/TRUSTCOM50675.2020.00262},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/JadidiDJF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JaigirdarRB20,
  author       = {Fariha Tasmin Jaigirdar and
                  Carsten Rudolph and
                  Chris Bain},
  title        = {Prov-IoT: {A} Security-Aware IoT Provenance Model},
  booktitle    = {TrustCom},
  pages        = {1360--1367},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00183},
  doi          = {10.1109/TRUSTCOM50675.2020.00183},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/JaigirdarRB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JhaMS20,
  author       = {Sanjiv S. Jha and
                  Simon Mayer and
                  Tanja Schneider},
  title        = {Explicitly Privacy-Aware Space Usage Analysis},
  booktitle    = {TrustCom},
  pages        = {1285--1290},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00172},
  doi          = {10.1109/TRUSTCOM50675.2020.00172},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/JhaMS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JianRY20,
  author       = {Li Jian and
                  Fei Rong and
                  Tang Yu},
  title        = {A novel Q-Learning Algorithm Based on the Stochastic Environment Path
                  Planning Problem},
  booktitle    = {TrustCom},
  pages        = {1977--1982},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00270},
  doi          = {10.1109/TRUSTCOM50675.2020.00270},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/JianRY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JindalSVCAL20,
  author       = {Arun Kumar Jindal and
                  Imtiyazuddin Shaik and
                  Vasudha and
                  Srinivasa Rao Chalamala and
                  Rajan M. A and
                  Sachin Lodha},
  title        = {Secure and Privacy Preserving Method for Biometric Template Protection
                  using Fully Homomorphic Encryption},
  booktitle    = {TrustCom},
  pages        = {1127--1134},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00149},
  doi          = {10.1109/TRUSTCOM50675.2020.00149},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/JindalSVCAL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KaleelL20,
  author       = {Manaz Kaleel and
                  Nhien{-}An Le{-}Khac},
  title        = {Towards a new deep learning based approach for the password prediction},
  booktitle    = {TrustCom},
  pages        = {1146--1150},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00152},
  doi          = {10.1109/TRUSTCOM50675.2020.00152},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/KaleelL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KandiKLBC20,
  author       = {Mohamed Ali Kandi and
                  Djamel Eddine Kouicem and
                  Hicham Lakhlef and
                  Abdelmadjid Bouabdallah and
                  Yacine Challal},
  title        = {A Blockchain-based Key Management Protocol for Secure Device-to-Device
                  Communication in the Internet of Things},
  booktitle    = {TrustCom},
  pages        = {1868--1873},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00255},
  doi          = {10.1109/TRUSTCOM50675.2020.00255},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/KandiKLBC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Kang00ZZT20,
  author       = {Hongzhaoning Kang and
                  Gang Liu and
                  Quan Wang and
                  Runnan Zhang and
                  Zichao Zhong and
                  Yumin Tian},
  title        = {Policy Evaluation and Dynamic Management Based on Matching Tree for
                  {XACML}},
  booktitle    = {TrustCom},
  pages        = {1530--1535},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00209},
  doi          = {10.1109/TRUSTCOM50675.2020.00209},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Kang00ZZT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KangCLM20,
  author       = {Hui Kang and
                  Shengquan Chen and
                  Lingfeng Lu and
                  Chenkun Meng},
  title        = {Research and Improvement of Community Discovery Algorithm Based on
                  Spark for Large Scale Complicated Networks},
  booktitle    = {TrustCom},
  pages        = {1499--1508},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00204},
  doi          = {10.1109/TRUSTCOM50675.2020.00204},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/KangCLM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KangDLYZ20,
  author       = {James Jin Kang and
                  Mahdi Dibaei and
                  Gang Luo and
                  Wencheng Yang and
                  James Xi Zheng},
  title        = {A Privacy-Preserving Data Inference Framework for Internet of Health
                  Things Networks},
  booktitle    = {TrustCom},
  pages        = {1209--1214},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00162},
  doi          = {10.1109/TRUSTCOM50675.2020.00162},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/KangDLYZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KangLS20,
  author       = {Hui Kang and
                  Lingfeng Lu and
                  Hang Su},
  title        = {A Four-Feature Keyword Extraction Algorithm Based on Word Length Priority
                  ratio},
  booktitle    = {TrustCom},
  pages        = {1492--1498},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00203},
  doi          = {10.1109/TRUSTCOM50675.2020.00203},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/KangLS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Ketsbaia0C20,
  author       = {Lida Ketsbaia and
                  Biju Issac and
                  Xiaomin Chen},
  title        = {Detection of Hate Tweets using Machine Learning and Deep Learning},
  booktitle    = {TrustCom},
  pages        = {751--758},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00103},
  doi          = {10.1109/TRUSTCOM50675.2020.00103},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Ketsbaia0C20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KhanM20,
  author       = {Tanveer Khan and
                  Antonis Michalas},
  title        = {Trust and Believe - Should We? Evaluating the Trustworthiness of Twitter
                  Users},
  booktitle    = {TrustCom},
  pages        = {1791--1800},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00246},
  doi          = {10.1109/TRUSTCOM50675.2020.00246},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/KhanM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KliemeWDM20,
  author       = {Eric Klieme and
                  Jonathan Wilke and
                  Niklas van Dornick and
                  Christoph Meinel},
  title        = {FIDOnuous: {A} FIDO2/WebAuthn Extension to Support Continuous Web
                  Authentication},
  booktitle    = {TrustCom},
  pages        = {1857--1867},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00254},
  doi          = {10.1109/TRUSTCOM50675.2020.00254},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/KliemeWDM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KnechtS20,
  author       = {Markus Knecht and
                  Burkhard Stiller},
  title        = {{SCUR:} Smart Contracts with a Static Upper-bound on Resource Usage},
  booktitle    = {TrustCom},
  pages        = {1926--1934},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00263},
  doi          = {10.1109/TRUSTCOM50675.2020.00263},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/KnechtS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KouliaridisK020,
  author       = {Vasileios Kouliaridis and
                  Georgios Kambourakis and
                  Tao Peng},
  title        = {Feature importance in Android malware detection},
  booktitle    = {TrustCom},
  pages        = {1449--1454},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00195},
  doi          = {10.1109/TRUSTCOM50675.2020.00195},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/KouliaridisK020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KubiakK20,
  author       = {Przemyslaw Kubiak and
                  Miroslaw Kutylowski},
  title        = {Preventing a Fork in a Blockchain - David Fighting Goliath},
  booktitle    = {TrustCom},
  pages        = {1044--1051},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00139},
  doi          = {10.1109/TRUSTCOM50675.2020.00139},
  timestamp    = {Mon, 23 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/KubiakK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KunzSB20,
  author       = {Immanuel Kunz and
                  Angelika Schneider and
                  Christian Banse},
  title        = {Privacy Smells: Detecting Privacy Problems in Cloud Architectures},
  booktitle    = {TrustCom},
  pages        = {1324--1331},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00178},
  doi          = {10.1109/TRUSTCOM50675.2020.00178},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/KunzSB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Kyeremateng-Boateng20,
  author       = {Hubert Kyeremateng{-}Boateng and
                  Marvin A. Conn and
                  Darsana Josyula and
                  Manohar Mareboyana},
  title        = {Prediction of Radio Frequency Spectrum Occupancy},
  booktitle    = {TrustCom},
  pages        = {2028--2034},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00278},
  doi          = {10.1109/TRUSTCOM50675.2020.00278},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Kyeremateng-Boateng20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LasanthaR20,
  author       = {Dimuth Lasantha and
                  Biplob Ray},
  title        = {Priority based Modeling and Comparative study of Google Cloud Resources
                  between 2011 and 2019},
  booktitle    = {TrustCom},
  pages        = {1310--1317},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00176},
  doi          = {10.1109/TRUSTCOM50675.2020.00176},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LasanthaR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LauingerBWM20,
  author       = {Johannes Lauinger and
                  Lars Baumg{\"{a}}rtner and
                  Anna{-}Katharina Wickert and
                  Mira Mezini},
  title        = {Uncovering the Hidden Dangers: Finding Unsafe Go Code in the Wild},
  booktitle    = {TrustCom},
  pages        = {410--417},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00063},
  doi          = {10.1109/TRUSTCOM50675.2020.00063},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LauingerBWM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LeeBWCI0I20,
  author       = {Yen{-}Ting Lee and
                  Tao Ban and
                  Tzu{-}Ling Wan and
                  Shin{-}Ming Cheng and
                  Ryoichi Isawa and
                  Takeshi Takahashi and
                  Daisuke Inoue},
  title        = {Cross Platform IoT- Malware Family Classification based on Printable
                  Strings},
  booktitle    = {TrustCom},
  pages        = {775--784},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00106},
  doi          = {10.1109/TRUSTCOM50675.2020.00106},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LeeBWCI0I20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LeeKKH20,
  author       = {Young Choon Lee and
                  Jayden King and
                  Young Ki Kim and
                  Seok{-}Hee Hong},
  title        = {Robust Scheduling for Large-Scale Distributed Systems},
  booktitle    = {TrustCom},
  pages        = {38--45},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00019},
  doi          = {10.1109/TRUSTCOM50675.2020.00019},
  timestamp    = {Thu, 27 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LeeKKH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LeiLQMY20,
  author       = {Qi Lei and
                  Chao Li and
                  Kexin Qiao and
                  Zhe Ma and
                  Bo Yang},
  title        = {VGG-based side channel attack on {RSA} implementation},
  booktitle    = {TrustCom},
  pages        = {1157--1161},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00154},
  doi          = {10.1109/TRUSTCOM50675.2020.00154},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LeiLQMY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiCSLYYS20,
  author       = {Tengfei Li and
                  Xiaohong Chen and
                  Haiying Sun and
                  Jing Liu and
                  Jiajia Yang and
                  Chenchen Yang and
                  Junfeng Sun},
  title        = {Modeling and Verification of Spatio-Temporal Intelligent Transportation
                  Systems},
  booktitle    = {TrustCom},
  pages        = {568--575},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00081},
  doi          = {10.1109/TRUSTCOM50675.2020.00081},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiCSLYYS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiEPQW20,
  author       = {Min Li and
                  Haroon Elahi and
                  Tao Peng and
                  Fang Qi and
                  Guojun Wang},
  title        = {A Function-Centric Risk Assessment Approach for Android Applications},
  booktitle    = {TrustCom},
  pages        = {1187--1193},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00159},
  doi          = {10.1109/TRUSTCOM50675.2020.00159},
  timestamp    = {Wed, 19 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiEPQW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiJLC020,
  author       = {Ang Li and
                  Wenjun Jiang and
                  Xueqi Li and
                  Xinrong Chen and
                  Guojun Wang},
  title        = {Independent Worker Selection In Crowdsourcing},
  booktitle    = {TrustCom},
  pages        = {1173--1178},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00157},
  doi          = {10.1109/TRUSTCOM50675.2020.00157},
  timestamp    = {Fri, 15 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiJLC020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiLF20,
  author       = {Minghui Li and
                  Yang Li and
                  Liming Fang},
  title        = {{ELPPS:} An Enhanced Location Privacy Preserving Scheme in Mobile
                  Crowd-Sensing Network Based on Edge Computing},
  booktitle    = {TrustCom},
  pages        = {475--482},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00071},
  doi          = {10.1109/TRUSTCOM50675.2020.00071},
  timestamp    = {Tue, 23 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiLF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiLWZYL20,
  author       = {Xiaojian Li and
                  Bo Li and
                  Hailan Wang and
                  Jiajia Zhang and
                  Haopeng Yang and
                  Jingang Liu},
  title        = {A Novel Violation Tracing Model for Cloud Service Accountability},
  booktitle    = {TrustCom},
  pages        = {744--750},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00102},
  doi          = {10.1109/TRUSTCOM50675.2020.00102},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiLWZYL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiWLWL20,
  author       = {Xiaoying Li and
                  Huai{-}bin Wang and
                  Yuqiong Liu and
                  Yuefei Wang and
                  Zhen Liu},
  title        = {An Investigation of Assistive Products for the Elderly},
  booktitle    = {TrustCom},
  pages        = {1509--1514},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00205},
  doi          = {10.1109/TRUSTCOM50675.2020.00205},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiWLWL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiWTLH20,
  author       = {De Li and
                  Jinyan Wang and
                  Zhou Tan and
                  Xianxian Li and
                  Yuhang Hu},
  title        = {Differential Privacy Preservation in Interpretable Feedforward-Designed
                  Convolutional Neural Networks},
  booktitle    = {TrustCom},
  pages        = {631--638},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00089},
  doi          = {10.1109/TRUSTCOM50675.2020.00089},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiWTLH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiXZCWZ20,
  author       = {Yi Li and
                  Xi Xiao and
                  Xiaogang Zhu and
                  Xiao Chen and
                  Sheng Wen and
                  Bin Zhang},
  title        = {SpeedNeuzz: Speed Up Neural Program Approximation with Neighbor Edge
                  Knowledge},
  booktitle    = {TrustCom},
  pages        = {450--457},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00068},
  doi          = {10.1109/TRUSTCOM50675.2020.00068},
  timestamp    = {Sat, 09 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiXZCWZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiYZ20,
  author       = {Ran Li and
                  Jiaqi Yin and
                  Huibiao Zhu},
  title        = {Modeling and Analysis of RabbitMQ Using {UPPAAL}},
  booktitle    = {TrustCom},
  pages        = {79--86},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00024},
  doi          = {10.1109/TRUSTCOM50675.2020.00024},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiYZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiZLFW20,
  author       = {Zhuo Li and
                  Xu Zhou and
                  Yang Liu and
                  Congshan Fan and
                  Wei Wang},
  title        = {A Computation Offloading Model over Collaborative Cloud-Edge Networks
                  with Optimal Transport Theory},
  booktitle    = {TrustCom},
  pages        = {1006--1011},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00134},
  doi          = {10.1109/TRUSTCOM50675.2020.00134},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiZLFW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiZSZWW20,
  author       = {Deyin Li and
                  Miao Zhang and
                  Wei Shi and
                  Huimin Zhang and
                  Duoduo Wang and
                  Lirong Wang},
  title        = {Pyramid Pooling Channel Attention Network for esophageal tissue segmentation
                  on {OCT} images},
  booktitle    = {TrustCom},
  pages        = {1476--1480},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00200},
  doi          = {10.1109/TRUSTCOM50675.2020.00200},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiZSZWW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiZX20,
  author       = {Yuxi Li and
                  Fucai Zhou and
                  Zifeng Xu},
  title        = {{PPFQ:} Privacy-Preserving Friends Query over Online Social Networks},
  booktitle    = {TrustCom},
  pages        = {1348--1353},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00181},
  doi          = {10.1109/TRUSTCOM50675.2020.00181},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiZX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiZYCM20,
  author       = {Fang Li and
                  Ziyuan Zhu and
                  Chao Yan and
                  Bowen Chen and
                  Dan Meng},
  title        = {Malware Detection Based on Term Frequency Analysis of GPRs Features},
  booktitle    = {TrustCom},
  pages        = {194--201},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00037},
  doi          = {10.1109/TRUSTCOM50675.2020.00037},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiZYCM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiZZDZX20,
  author       = {Meng Li and
                  Qi Zhong and
                  Leo Yu Zhang and
                  Yajuan Du and
                  Jun Zhang and
                  Yong Xiang},
  title        = {Protecting the Intellectual Property of Deep Neural Networks with
                  Watermarking: The Frequency Domain Approach},
  booktitle    = {TrustCom},
  pages        = {402--409},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00062},
  doi          = {10.1109/TRUSTCOM50675.2020.00062},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiZZDZX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiangLH0YZ20,
  author       = {Dong Liang and
                  Qinrang Liu and
                  Yanbin Hu and
                  Tao Hu and
                  Binghao Yan and
                  Haiming Zhao},
  title        = {Dynamic flow redirecton scheme for enhancing control plane robustness
                  in {SDN}},
  booktitle    = {TrustCom},
  pages        = {1354--1359},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00182},
  doi          = {10.1109/TRUSTCOM50675.2020.00182},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiangLH0YZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiangWLJZ20,
  author       = {Shan Liang and
                  Yuewu Wang and
                  Lingguang Lei and
                  Jiwu Jing and
                  Quan Zhou},
  title        = {SecureESFS: Sharing Android External Storage Files in {A} Securer
                  Way},
  booktitle    = {TrustCom},
  pages        = {1339--1347},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00180},
  doi          = {10.1109/TRUSTCOM50675.2020.00180},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiangWLJZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiaoCZY20,
  author       = {Maozhu Liao and
                  Shengdong Chen and
                  Chuangjie Zheng and
                  Feng Yuan},
  title        = {A low-cost method for accurate localization of traffic participants},
  booktitle    = {TrustCom},
  pages        = {2001--2006},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00274},
  doi          = {10.1109/TRUSTCOM50675.2020.00274},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiaoCZY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LinXXCS20,
  author       = {Yan Lin and
                  Guosheng Xu and
                  Guoai Xu and
                  Yudong Chen and
                  Dawei Sun},
  title        = {Sensitive Information Detection based on Convolution Neural Network
                  and Bi-directional {LSTM}},
  booktitle    = {TrustCom},
  pages        = {1614--1621},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00223},
  doi          = {10.1109/TRUSTCOM50675.2020.00223},
  timestamp    = {Mon, 19 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LinXXCS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuCZVX20,
  author       = {Liu Liu and
                  Chao Chen and
                  Jun Zhang and
                  Olivier Y. de Vel and
                  Yang Xiang},
  title        = {Doc2vec-based Insider Threat Detection through Behaviour Analysis
                  of Multi-source Security Logs},
  booktitle    = {TrustCom},
  pages        = {301--309},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00050},
  doi          = {10.1109/TRUSTCOM50675.2020.00050},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuCZVX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuFHHL20,
  author       = {Wei Liu and
                  Wenlong Feng and
                  Mengxing Huang and
                  Guilai Han and
                  Jialun Lin},
  title        = {Plant Taxonomy In Hainan Based On Deep Convolutional Neural Network
                  And Transfer Learning},
  booktitle    = {TrustCom},
  pages        = {1461--1466},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00197},
  doi          = {10.1109/TRUSTCOM50675.2020.00197},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuFHHL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuGDN20,
  author       = {Tianyuan Liu and
                  Hongpeng Guo and
                  Claudiu Danilov and
                  Klara Nahrstedt},
  title        = {A Privacy-preserving Data Collection and Processing Framework for
                  Third-party {UAV} Services},
  booktitle    = {TrustCom},
  pages        = {683--690},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00095},
  doi          = {10.1109/TRUSTCOM50675.2020.00095},
  timestamp    = {Thu, 07 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuGDN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuLHTW20,
  author       = {Yizhong Liu and
                  Jianwei Liu and
                  Yiming Hei and
                  Wei Tan and
                  Qianhong Wu},
  title        = {A Secure Shard Reconfiguration Protocol for Sharding Blockchains Without
                  a Randomness},
  booktitle    = {TrustCom},
  pages        = {1012--1019},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00135},
  doi          = {10.1109/TRUSTCOM50675.2020.00135},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuLHTW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuLJJY20,
  author       = {Xianze Liu and
                  Jihong Liu and
                  Bifei Jiang and
                  Haozhen Jiang and
                  Zhi Yang},
  title        = {More efficient {SM9} algorithm based on bilinear pair optimization
                  processing},
  booktitle    = {TrustCom},
  pages        = {1704--1710},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00234},
  doi          = {10.1109/TRUSTCOM50675.2020.00234},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuLJJY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuLWGY20,
  author       = {Yannan Liu and
                  Yabin Lai and
                  Kaizhi Wei and
                  Liang Gu and
                  Zhengzheng Yan},
  title        = {NLabel: An Accurate Familial Clustering Framework for Large-scale
                  Weakly-labeled Malware},
  booktitle    = {TrustCom},
  pages        = {210--216},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00039},
  doi          = {10.1109/TRUSTCOM50675.2020.00039},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuLWGY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuQF20,
  author       = {Jingbin Liu and
                  Yu Qin and
                  Dengguo Feng},
  title        = {SeRoT: {A} Secure Runtime System on Trusted Execution Environments},
  booktitle    = {TrustCom},
  pages        = {30--37},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00018},
  doi          = {10.1109/TRUSTCOM50675.2020.00018},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuQF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuSYJY20,
  author       = {Zhaoli Liu and
                  Qindong Sun and
                  Zhihai Yang and
                  Kun Jiang and
                  Jinpei Yan},
  title        = {Fined-grained Aspect Extraction from Online Reviews for Decision Support},
  booktitle    = {TrustCom},
  pages        = {1536--1541},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00210},
  doi          = {10.1109/TRUSTCOM50675.2020.00210},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuSYJY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuT20,
  author       = {Yin Liu and
                  Eli Tilevich},
  title        = {Reducing the Price of Protection: Identifying and Migrating Non-Sensitive
                  Code in {TEE}},
  booktitle    = {TrustCom},
  pages        = {112--120},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00028},
  doi          = {10.1109/TRUSTCOM50675.2020.00028},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuT20a,
  author       = {Xiaomei Liu and
                  Xin Tang},
  title        = {Image Authentication using {QR} Code Watermarking Approach based on
                  Image Segmentation},
  booktitle    = {TrustCom},
  pages        = {1572--1577},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00217},
  doi          = {10.1109/TRUSTCOM50675.2020.00217},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuT20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuWWLJM20,
  author       = {Fucheng Liu and
                  Yu Wen and
                  Yanna Wu and
                  Shuangshuang Liang and
                  Xihe Jiang and
                  Dan Meng},
  title        = {MLTracer: Malicious Logins Detection System via Graph Neural Network},
  booktitle    = {TrustCom},
  pages        = {715--726},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00099},
  doi          = {10.1109/TRUSTCOM50675.2020.00099},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuWWLJM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuY20,
  author       = {Tong Liu and
                  Xiaochen Yuan},
  title        = {Image Self-Recovery Based on Authentication Feature Extraction},
  booktitle    = {TrustCom},
  pages        = {1222--1227},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00164},
  doi          = {10.1109/TRUSTCOM50675.2020.00164},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuZ20,
  author       = {Xiaoyang Liu and
                  Ziyuan Zhu},
  title        = {pcSVF: An Evaluation of Side-Channel Vulnerability of Port Contention},
  booktitle    = {TrustCom},
  pages        = {1813--1819},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00248},
  doi          = {10.1109/TRUSTCOM50675.2020.00248},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LuD20,
  author       = {Linpeng Lu and
                  Ning Ding},
  title        = {Multi-Party Private Set Intersection in Vertical Federated Learning},
  booktitle    = {TrustCom},
  pages        = {707--714},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00098},
  doi          = {10.1109/TRUSTCOM50675.2020.00098},
  timestamp    = {Tue, 24 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LuD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LuXTT020,
  author       = {Tao Lu and
                  Hongyun Xu and
                  Kai Tian and
                  Cenxi Tian and
                  Rui Jiang},
  title        = {Semantic Location Privacy Protection Algorithm Based on Edge Cluster
                  Graph},
  booktitle    = {TrustCom},
  pages        = {1304--1309},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00175},
  doi          = {10.1109/TRUSTCOM50675.2020.00175},
  timestamp    = {Fri, 30 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LuXTT020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Ma0QQ20,
  author       = {Yingying Ma and
                  Shuo Li and
                  Shaotian Qin and
                  Yue Qi},
  title        = {Factors affecting trust in the autonomous vehicle: {A} survey of primary
                  school students and parent perceptions},
  booktitle    = {TrustCom},
  pages        = {2020--2027},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00277},
  doi          = {10.1109/TRUSTCOM50675.2020.00277},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Ma0QQ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MaR20,
  author       = {Qicheng Ma and
                  Nidhi Rastogi},
  title        = {{DANTE:} Predicting Insider Threat using {LSTM} on system logs},
  booktitle    = {TrustCom},
  pages        = {1151--1156},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00153},
  doi          = {10.1109/TRUSTCOM50675.2020.00153},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/MaR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MaZZZPL20,
  author       = {Luping Ma and
                  Dali Zhu and
                  Shunliang Zhang and
                  Xiaohui Zhang and
                  Shumin Peng and
                  Ya Li},
  title        = {UIDroid: User-driven Based Hierarchical Access Control for Sensitive
                  Information},
  booktitle    = {TrustCom},
  pages        = {1733--1740},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00238},
  doi          = {10.1109/TRUSTCOM50675.2020.00238},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/MaZZZPL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MaoWC20,
  author       = {Chengying Mao and
                  Linlin Wen and
                  Tsong Yueh Chen},
  title        = {Adaptive Random Test Case Generation Based on Multi-Objective Evolutionary
                  Search},
  booktitle    = {TrustCom},
  pages        = {46--53},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00020},
  doi          = {10.1109/TRUSTCOM50675.2020.00020},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/MaoWC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MatthewsMSM20,
  author       = {Isaac Matthews and
                  John C. Mace and
                  Sadegh Soudjani and
                  Aad van Moorsel},
  title        = {Cyclic Bayesian Attack Graphs: {A} Systematic Computational Approach},
  booktitle    = {TrustCom},
  pages        = {129--136},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00030},
  doi          = {10.1109/TRUSTCOM50675.2020.00030},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/MatthewsMSM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Megahed020,
  author       = {Amr Megahed and
                  Qi Han},
  title        = {Face2Face Manipulation Detection Based on Histogram of Oriented Gradients},
  booktitle    = {TrustCom},
  pages        = {1260--1267},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00169},
  doi          = {10.1109/TRUSTCOM50675.2020.00169},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Megahed020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MesseCBHFS20,
  author       = {Nan Messe and
                  Vanea Chiprianov and
                  Nicolas Belloir and
                  Jamal El Hachem and
                  R{\'{e}}gis Fleurquin and
                  Salah Sadou},
  title        = {Asset-Oriented Threat Modeling},
  booktitle    = {TrustCom},
  pages        = {491--501},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00073},
  doi          = {10.1109/TRUSTCOM50675.2020.00073},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/MesseCBHFS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MimotoKKM20,
  author       = {Tomoaki Mimoto and
                  Shinsaku Kiyomoto and
                  Koji Kitamura and
                  Atsuko Miyaji},
  title        = {A Practical Privacy-Preserving Algorithm for Document Data},
  booktitle    = {TrustCom},
  pages        = {1376--1383},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00185},
  doi          = {10.1109/TRUSTCOM50675.2020.00185},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/MimotoKKM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MittalAT20,
  author       = {Manasi Mittal and
                  Muhammad Rizwan Asghar and
                  Arvind K. Tripathi},
  title        = {Do My Emotions Influence What {I} Share? Analysing the Effects of
                  Emotions on Privacy Leakage in Twitter},
  booktitle    = {TrustCom},
  pages        = {1228--1235},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00165},
  doi          = {10.1109/TRUSTCOM50675.2020.00165},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/MittalAT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ModingerH20,
  author       = {David M{\"{o}}dinger and
                  Franz J. Hauck},
  title        = {3P3: Strong Flexible Privacy for Broadcasts},
  booktitle    = {TrustCom},
  pages        = {1630--1637},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00225},
  doi          = {10.1109/TRUSTCOM50675.2020.00225},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ModingerH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MohammedKPR20,
  author       = {Fatma Mohammed and
                  A. S. M. Kayes and
                  Eric Pardede and
                  Wenny Rahayu},
  title        = {A Framework for Measuring IoT Data Quality Based on Freshness Metrics},
  booktitle    = {TrustCom},
  pages        = {1242--1249},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00167},
  doi          = {10.1109/TRUSTCOM50675.2020.00167},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/MohammedKPR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MoustafaAA20,
  author       = {Nour Moustafa and
                  Mohiuddin Ahmed and
                  Sherif Ahmed},
  title        = {Data Analytics-enabled Intrusion Detection: Evaluations of ToN IoT
                  Linux Datasets},
  booktitle    = {TrustCom},
  pages        = {727--735},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00100},
  doi          = {10.1109/TRUSTCOM50675.2020.00100},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/MoustafaAA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MoustafaKDJ20,
  author       = {Nour Moustafa and
                  Marwa Keshk and
                  Essam Soliman Debie and
                  Helge Janicke},
  title        = {Federated TON{\_}IoT Windows Datasets for Evaluating AI-based Security
                  Applications},
  booktitle    = {TrustCom},
  pages        = {848--855},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00114},
  doi          = {10.1109/TRUSTCOM50675.2020.00114},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/MoustafaKDJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MuktaMP0K20,
  author       = {Rahma Mukta and
                  James Martens and
                  Hye{-}Young Paik and
                  Qinghua Lu and
                  Salil S. Kanhere},
  title        = {Blockchain-based Verifiable Credential Sharing with Selective Disclosure},
  booktitle    = {TrustCom},
  pages        = {959--966},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00128},
  doi          = {10.1109/TRUSTCOM50675.2020.00128},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/MuktaMP0K20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/NguyenN20,
  author       = {Hoang Hai Nguyen and
                  David M. Nicol},
  title        = {Estimating Loss Due to Cyber-attack in the Presence of Uncertainty},
  booktitle    = {TrustCom},
  pages        = {361--369},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00057},
  doi          = {10.1109/TRUSTCOM50675.2020.00057},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/NguyenN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Nussbaum020,
  author       = {Eyal Nussbaum and
                  Michael Segal},
  title        = {Finding Geometric Medians with Location Privacy},
  booktitle    = {TrustCom},
  pages        = {1874--1881},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00256},
  doi          = {10.1109/TRUSTCOM50675.2020.00256},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Nussbaum020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/OkadaISH20,
  author       = {Rina Okada and
                  Zen Ishikura and
                  Toshiki Shibahara and
                  Satoshi Hasegawa},
  title        = {Special-purpose Model Extraction Attacks: Stealing Coarse Model with
                  Fewer Queries},
  booktitle    = {TrustCom},
  pages        = {1995--2000},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00273},
  doi          = {10.1109/TRUSTCOM50675.2020.00273},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/OkadaISH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/OmarJNHBBR20,
  author       = {Abdullah Al Omar and
                  Abu Kaisar Jamil and
                  Md. Shakhawath Hossain Nur and
                  Md Mahamudul Hasan and
                  Rabeya Bosri and
                  Md. Zakirul Alam Bhuiyan and
                  Mohammad Shahriar Rahman},
  title        = {Towards {A} Transparent and Privacy-preserving Healthcare Platform
                  with Blockchain for Smart Cities},
  booktitle    = {TrustCom},
  pages        = {1291--1296},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00173},
  doi          = {10.1109/TRUSTCOM50675.2020.00173},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/OmarJNHBBR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/OnoduezeJ20,
  author       = {Francis Onodueze and
                  Darsana Josyula},
  title        = {Anomaly Detection on {MIL-STD-1553} Dataset using Machine Learning
                  Algorithms},
  booktitle    = {TrustCom},
  pages        = {592--598},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00084},
  doi          = {10.1109/TRUSTCOM50675.2020.00084},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/OnoduezeJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PalfingerPZ20,
  author       = {Gerald Palfinger and
                  Bernd Pr{\"{u}}nster and
                  Dominik Julian Ziegler},
  title        = {AndroTIME: Identifying Timing Side Channels in the Android {API}},
  booktitle    = {TrustCom},
  pages        = {1849--1856},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00253},
  doi          = {10.1109/TRUSTCOM50675.2020.00253},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/PalfingerPZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PanXHZL020,
  author       = {Yuqing Pan and
                  Xi Xiao and
                  Guangwu Hu and
                  Bin Zhang and
                  Qing Li and
                  Haitao Zheng},
  title        = {{ALBFL:} {A} Novel Neural Ranking Model for Software Fault Localization
                  via Combining Static and Dynamic Features},
  booktitle    = {TrustCom},
  pages        = {785--792},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00107},
  doi          = {10.1109/TRUSTCOM50675.2020.00107},
  timestamp    = {Tue, 04 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/PanXHZL020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PengLCW20,
  author       = {Tao Peng and
                  Jierong Liu and
                  Jianer Chen and
                  Guojun Wang},
  title        = {A Privacy-Preserving Crowdsensing System with Muti-Blockchain},
  booktitle    = {TrustCom},
  pages        = {1944--1949},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00265},
  doi          = {10.1109/TRUSTCOM50675.2020.00265},
  timestamp    = {Thu, 18 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/PengLCW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PhippsOV20,
  author       = {Anthony Phipps and
                  Karim Ouazzane and
                  Vassil T. Vassilev},
  title        = {Enhancing Cyber Security Using Audio Techniques: {A} Public Key Infrastructure
                  for Sound},
  booktitle    = {TrustCom},
  pages        = {1428--1436},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00192},
  doi          = {10.1109/TRUSTCOM50675.2020.00192},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/PhippsOV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PlataS20,
  author       = {Marcin Plata and
                  Piotr Syga},
  title        = {Robust Spatial-spread Deep Neural Image Watermarking},
  booktitle    = {TrustCom},
  pages        = {62--70},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00022},
  doi          = {10.1109/TRUSTCOM50675.2020.00022},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/PlataS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Pye0AR20,
  author       = {Jack Pye and
                  Biju Issac and
                  Nauman Aslam and
                  Husnain Rafiq},
  title        = {Android Malware Classification Using Machine Learning and Bio-Inspired
                  Optimisation Algorithms},
  booktitle    = {TrustCom},
  pages        = {1777--1782},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00244},
  doi          = {10.1109/TRUSTCOM50675.2020.00244},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Pye0AR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/QashlanNH20,
  author       = {Amjad Qashlan and
                  Priyadarsi Nanda and
                  Xiangjian He},
  title        = {Security and Privacy Implementation in Smart Home: Attributes Based
                  Access Control and Smart Contracts},
  booktitle    = {TrustCom},
  pages        = {951--958},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00127},
  doi          = {10.1109/TRUSTCOM50675.2020.00127},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/QashlanNH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/QiMBL20,
  author       = {Xuejian Qi and
                  Xuebin Ma and
                  Xiangyu Bai and
                  Wuyungerile Li},
  title        = {Differential privacy preserving data publishing based on Bayesian
                  network},
  booktitle    = {TrustCom},
  pages        = {1718--1726},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00236},
  doi          = {10.1109/TRUSTCOM50675.2020.00236},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/QiMBL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/QinFAQG20,
  author       = {Dong Qin and
                  Shen Fu and
                  George T. Amariucai and
                  Daji Qiao and
                  Yong Guan},
  title        = {{MAUSPAD:} Mouse-based Authentication Using Segmentation-based, Progress-Adjusted
                  {DTW}},
  booktitle    = {TrustCom},
  pages        = {425--433},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00065},
  doi          = {10.1109/TRUSTCOM50675.2020.00065},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/QinFAQG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/QiuLSD20,
  author       = {Xiaoying Qiu and
                  Guangda Li and
                  Xuan Sun and
                  Zhiguo Du},
  title        = {Exploiting User Selection Algorithm for Securing Wireless Communication
                  Networks},
  booktitle    = {TrustCom},
  pages        = {1552--1555},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00213},
  doi          = {10.1109/TRUSTCOM50675.2020.00213},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/QiuLSD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/QuZHWD20,
  author       = {Dapeng Qu and
                  Jiankun Zhang and
                  Zhenhuan Hou and
                  Ming Wan and
                  Bo Dong},
  title        = {A Trust Routing Scheme based on Identification of Non-complete Cooperative
                  Nodes in Mobile Peer-to-Peer Networks},
  booktitle    = {TrustCom},
  pages        = {22--29},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00017},
  doi          = {10.1109/TRUSTCOM50675.2020.00017},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/QuZHWD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/RashidibajganHD20,
  author       = {Samaneh Rashidibajgan and
                  Thomas Hupperich and
                  Robin Doss and
                  Lei Pan},
  title        = {Opportunistic Tracking in Cyber-Physical Systems},
  booktitle    = {TrustCom},
  pages        = {1672--1679},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00230},
  doi          = {10.1109/TRUSTCOM50675.2020.00230},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/RashidibajganHD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/RezaeighalehZ20,
  author       = {Hossein Rezaeighaleh and
                  Cliff C. Zou},
  title        = {Efficient Off-Chain Transaction to Avoid Inaccessible Coins in Cryptocurrencies},
  booktitle    = {TrustCom},
  pages        = {1903--1909},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00260},
  doi          = {10.1109/TRUSTCOM50675.2020.00260},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/RezaeighalehZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/RyanC0D20,
  author       = {Matthew J. Ryan and
                  Morshed U. Chowdhury and
                  Frank Jiang and
                  Robin Doss},
  title        = {Avoiding Geographic Regions in Tor},
  booktitle    = {TrustCom},
  pages        = {802--809},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00109},
  doi          = {10.1109/TRUSTCOM50675.2020.00109},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/RyanC0D20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SRG20,
  author       = {Ahmad Salehi S. and
                  Carsten Rudolph and
                  Marthie Grobler},
  title        = {Attribute-Based Data Access Control for Multi-Authority System},
  booktitle    = {TrustCom},
  pages        = {1834--1841},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00251},
  doi          = {10.1109/TRUSTCOM50675.2020.00251},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SRG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Saganowski20,
  author       = {Stanislaw Saganowski},
  title        = {A three-stage machine learning network security solution for public
                  entities},
  booktitle    = {TrustCom},
  pages        = {1097--1104},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00145},
  doi          = {10.1109/TRUSTCOM50675.2020.00145},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Saganowski20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SalimMT20,
  author       = {Sara Salim and
                  Nour Moustafa and
                  Benjamin P. Turnbull},
  title        = {Privacy-Encoding Models for Preserving Utility of Machine Learning
                  Algorithms in Social Media},
  booktitle    = {TrustCom},
  pages        = {856--863},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00115},
  doi          = {10.1109/TRUSTCOM50675.2020.00115},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/SalimMT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SamuelAJ20,
  author       = {Joe Samuel and
                  Khalil Aalab and
                  Jason Jaskolka},
  title        = {Evaluating the Soundness of Security Metrics from Vulnerability Scoring
                  Frameworks},
  booktitle    = {TrustCom},
  pages        = {442--449},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00067},
  doi          = {10.1109/TRUSTCOM50675.2020.00067},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SamuelAJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SbaiHGM20,
  author       = {Hugo Sba{\"{\i}} and
                  Jassim Happa and
                  Michael Goldsmith and
                  Samy Meftali},
  title        = {Dataset Construction and Analysis of Screenshot Malware},
  booktitle    = {TrustCom},
  pages        = {646--655},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00091},
  doi          = {10.1109/TRUSTCOM50675.2020.00091},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/SbaiHGM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SchellK20,
  author       = {Oleg Schell and
                  Marcel Kneib},
  title        = {{VALID:} Voltage-Based Lightweight Intrusion Detection for the Controller
                  Area Network},
  booktitle    = {TrustCom},
  pages        = {225--232},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00041},
  doi          = {10.1109/TRUSTCOM50675.2020.00041},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/SchellK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SemalMMK20,
  author       = {Benjamin Semal and
                  Konstantinos Markantonakis and
                  Keith Mayes and
                  Jan Kalbantner},
  title        = {One Covert Channel to Rule Them All: {A} Practical Approach to Data
                  Exfiltration in the Cloud},
  booktitle    = {TrustCom},
  pages        = {328--336},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00053},
  doi          = {10.1109/TRUSTCOM50675.2020.00053},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SemalMMK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SenavirathneT20,
  author       = {Navoda Senavirathne and
                  Vicen{\c{c}} Torra},
  title        = {On the Role of Data Anonymization in Machine Learning Privacy},
  booktitle    = {TrustCom},
  pages        = {664--675},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00093},
  doi          = {10.1109/TRUSTCOM50675.2020.00093},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SenavirathneT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ShahSSABD20,
  author       = {Syed W. Shah and
                  Naeem Firdous Syed and
                  Arash Shaghaghi and
                  Adnan Anwar and
                  Zubair A. Baig and
                  Robin Doss},
  title        = {Towards a Lightweight Continuous Authentication Protocol for Device-to-Device
                  Communication},
  booktitle    = {TrustCom},
  pages        = {1119--1126},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00148},
  doi          = {10.1109/TRUSTCOM50675.2020.00148},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ShahSSABD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ShahriarBHSFCB20,
  author       = {Md. Atik Shahriar and
                  Faisal Haque Bappy and
                  A. K. M. Fakhrul Hossain and
                  Dayamoy Datta Saikat and
                  Md. Sadek Ferdous and
                  Mohammad Jabed Morshed Chowdhury and
                  Md. Zakirul Alam Bhuiyan},
  title        = {Modelling Attacks in Blockchain Systems using Petri Nets},
  booktitle    = {TrustCom},
  pages        = {1069--1078},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00142},
  doi          = {10.1109/TRUSTCOM50675.2020.00142},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ShahriarBHSFCB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SharmaBJ20,
  author       = {Aakanksha Sharma and
                  Venki Balasubramanian and
                  Alireza Jolfaei},
  title        = {Security Challenges and Solutions for 5G HetNet},
  booktitle    = {TrustCom},
  pages        = {1318--1323},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00177},
  doi          = {10.1109/TRUSTCOM50675.2020.00177},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SharmaBJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SharmaDDM20,
  author       = {Yanshul Sharma and
                  Zinea Das and
                  Alok Das and
                  Sanjay Moulik},
  title        = {{TA-HRT:} {A} temperature-aware scheduler for heterogeneous real-time
                  multicore systems},
  booktitle    = {TrustCom},
  pages        = {104--111},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00027},
  doi          = {10.1109/TRUSTCOM50675.2020.00027},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/SharmaDDM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SheikhalishahiZ20,
  author       = {Mina Sheikhalishahi and
                  Nicola Zannone},
  title        = {On the Comparison of Classifiers' Construction over Private Inputs},
  booktitle    = {TrustCom},
  pages        = {691--698},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00096},
  doi          = {10.1109/TRUSTCOM50675.2020.00096},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/SheikhalishahiZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ShengHGWPK20,
  author       = {Jinfang Sheng and
                  Yan Hu and
                  Kerong Guan and
                  Bin Wang and
                  Xiaoxia Pan and
                  Wenjun Kang},
  title        = {Robustness analysis and defence strategy of an interdependent networks
                  model based on closeness centrality},
  booktitle    = {TrustCom},
  pages        = {1236--1241},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00166},
  doi          = {10.1109/TRUSTCOM50675.2020.00166},
  timestamp    = {Thu, 28 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ShengHGWPK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ShiL20,
  author       = {Jinshan Shi and
                  Ru Li},
  title        = {Permission Token Segmentation Scheme based on Blockchain Access Control},
  booktitle    = {TrustCom},
  pages        = {1956--1964},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00267},
  doi          = {10.1109/TRUSTCOM50675.2020.00267},
  timestamp    = {Tue, 22 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ShiL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ShuvoA20,
  author       = {Md Shamimur Rahman Shuvo and
                  Dima Alhadidi},
  title        = {Membership Inference Attacks: Analysis and Mitigation},
  booktitle    = {TrustCom},
  pages        = {1410--1419},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00190},
  doi          = {10.1109/TRUSTCOM50675.2020.00190},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ShuvoA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SifferFTL20,
  author       = {Alban Siffer and
                  Pierre{-}Alain Fouque and
                  Alexandre Termier and
                  Christine Largou{\"{e}}t},
  title        = {Netspot: a simple Intrusion Detection System with statistical learning},
  booktitle    = {TrustCom},
  pages        = {911--918},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00122},
  doi          = {10.1109/TRUSTCOM50675.2020.00122},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SifferFTL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SixRHS20,
  author       = {Nicolas Six and
                  Claudia Negri Ribalta and
                  Nicolas Herbaut and
                  Camille Salinesi},
  title        = {A blockchain-based pattern for confidential and pseudo-anonymous contract
                  enforcement},
  booktitle    = {TrustCom},
  pages        = {1965--1970},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00268},
  doi          = {10.1109/TRUSTCOM50675.2020.00268},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SixRHS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SonLMD20,
  author       = {Ha Xuan Son and
                  Hai Trieu Le and
                  Nadia Metoui and
                  Nghia Duong{-}Trung},
  title        = {DeM-CoD: Novel Access-Control-Based Cash on Delivery Mechanism for
                  Decentralized Marketplace},
  booktitle    = {TrustCom},
  pages        = {71--78},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00023},
  doi          = {10.1109/TRUSTCOM50675.2020.00023},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SonLMD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SongK20,
  author       = {Zhicheng Song and
                  Pushpendu Kar},
  title        = {Name-Signature Lookup System: {A} Security Enhancement to Named Data
                  Networking},
  booktitle    = {TrustCom},
  pages        = {1444--1448},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00194},
  doi          = {10.1109/TRUSTCOM50675.2020.00194},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/SongK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SongYYLBCM20,
  author       = {Xiaonan Song and
                  Aimin Yu and
                  Haibo Yu and
                  Shirun Liu and
                  Xin Bai and
                  Lijun Cai and
                  Dan Meng},
  title        = {Program Slice based Vulnerable Code Clone Detection},
  booktitle    = {TrustCom},
  pages        = {293--300},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00049},
  doi          = {10.1109/TRUSTCOM50675.2020.00049},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/SongYYLBCM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Stobbs0J20,
  author       = {Jordan Stobbs and
                  Biju Issac and
                  Seibu Mary Jacob},
  title        = {Phishing Web Page Detection Using Optimised Machine Learning},
  booktitle    = {TrustCom},
  pages        = {483--490},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00072},
  doi          = {10.1109/TRUSTCOM50675.2020.00072},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Stobbs0J20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SuSTL20,
  author       = {Ting Su and
                  Jiahe Shi and
                  Yongkang Tang and
                  Shaoqing Li},
  title        = {Golden-Chip-Free Hardware Trojan Detection Through Thermal Radiation
                  Comparison in Vulnerable Areas},
  booktitle    = {TrustCom},
  pages        = {1052--1059},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00140},
  doi          = {10.1109/TRUSTCOM50675.2020.00140},
  timestamp    = {Mon, 10 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SuSTL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SunX0ZWF20,
  author       = {Yizhen Sun and
                  Yiman Xie and
                  Weiping Wang and
                  Shigeng Zhang and
                  Yuxi Wu and
                  Jingchuan Feng},
  title        = {{RPAD:} An Unsupervised {HTTP} Request Parameter Anomaly Detection
                  Method},
  booktitle    = {TrustCom},
  pages        = {1215--1221},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00163},
  doi          = {10.1109/TRUSTCOM50675.2020.00163},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/SunX0ZWF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SunYZ20,
  author       = {Tao Sun and
                  Jing Yang and
                  Wenjie Zhong},
  title        = {{CPN} Model Checking Method of Concurrent Software Based on State
                  Space Pruning},
  booktitle    = {TrustCom},
  pages        = {1390--1394},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00187},
  doi          = {10.1109/TRUSTCOM50675.2020.00187},
  timestamp    = {Thu, 02 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SunYZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SuriFZL20,
  author       = {Guga Suri and
                  Jianming Fu and
                  Rui Zheng and
                  Xinying Liu},
  title        = {Family Identification of AGE-Generated Android Malware Using Tree-Based
                  Feature},
  booktitle    = {TrustCom},
  pages        = {386--393},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00060},
  doi          = {10.1109/TRUSTCOM50675.2020.00060},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/SuriFZL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SuzakiNOT20,
  author       = {Kuniyasu Suzaki and
                  Kenta Nakajima and
                  Tsukasa Oi and
                  Akira Tsukamoto},
  title        = {Library Implementation and Performance Analysis of GlobalPlatform
                  {TEE} Internal {API} for Intel {SGX} and {RISC-V} Keystone},
  booktitle    = {TrustCom},
  pages        = {1200--1208},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00161},
  doi          = {10.1109/TRUSTCOM50675.2020.00161},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SuzakiNOT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TangZLLL20,
  author       = {Xin Tang and
                  Linna Zhou and
                  Dan Liu and
                  Boyu Liu and
                  Xinyi L{\"{u}}},
  title        = {Reversible data hiding based on improved rhombus predictor and prediction
                  error expansion},
  booktitle    = {TrustCom},
  pages        = {13--21},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00016},
  doi          = {10.1109/TRUSTCOM50675.2020.00016},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/TangZLLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TartaglioneG20,
  author       = {Enzo Tartaglione and
                  Marco Grangetto},
  title        = {A non-discriminatory approach to ethical deep learning},
  booktitle    = {TrustCom},
  pages        = {943--950},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00126},
  doi          = {10.1109/TRUSTCOM50675.2020.00126},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/TartaglioneG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ThaoNY020,
  author       = {Tran Phuong Thao and
                  Hoang{-}Quoc Nguyen{-}Son and
                  Rie Shigetomi Yamaguchi and
                  Toshiyuki Nakata},
  title        = {Boosting Homograph Attack Classification Using Ensemble Learning and
                  N-gram Model},
  booktitle    = {TrustCom},
  pages        = {1983--1988},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00271},
  doi          = {10.1109/TRUSTCOM50675.2020.00271},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ThaoNY020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics