![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp for Publications
export results for "stream:conf/trustcom:"
more than 1000 matches, exporting first 1000 hits only!
@inproceedings{DBLP:conf/trustcom/0001HSWA23, author = {Zhou Zhou and Yonggui Han and Mohammad Shojafar and Zhongsheng Wang and Jemal H. Abawajy}, title = {A reliable edge server placement strategy based on {DDPG} in the Internet of Vehicles}, booktitle = {TrustCom}, pages = {2587--2594}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00361}, doi = {10.1109/TRUSTCOM60117.2023.00361}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/0001HSWA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/0001T23, author = {Ayush Kumar and Vrizlynn L. L. Thing}, title = {A Public Key Infrastructure for 5G Service-Based Architecture}, booktitle = {TrustCom}, pages = {1532--1539}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00209}, doi = {10.1109/TRUSTCOM60117.2023.00209}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/0001T23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/0002GZLG23, author = {Chao Guo and Buxin Guo and Tingting Zhu and Peihe Liu and Cheng Gong}, title = {FLEvaluate: Robust Federated Learning Based on Trust Evaluate}, booktitle = {TrustCom}, pages = {2269--2274}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00320}, doi = {10.1109/TRUSTCOM60117.2023.00320}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/0002GZLG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/0002WZ023, author = {Mingjian Tang and Weiqi Wang and Chenhan Zhang and Shui Yu}, title = {{RUE:} Realising Unlearning from the Perspective of Economics}, booktitle = {TrustCom}, pages = {1165--1172}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00159}, doi = {10.1109/TRUSTCOM60117.2023.00159}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/0002WZ023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/0002Z23, author = {Chundong Wang and Yongxin Zhao}, title = {A Novel Approach for Trajectory Partition Privacy in Location-Based Services}, booktitle = {TrustCom}, pages = {1464--1469}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00200}, doi = {10.1109/TRUSTCOM60117.2023.00200}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/0002Z23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/0005L0CL23, author = {Ximing Li and Linghui Li and Xiaoyong Li and Binsi Cai and Bingyu Li}, title = {{TGCN-DA:} {A} Temporal Graph Convolutional Network with Data Augmentation for High Accuracy Insider Threat Detection}, booktitle = {TrustCom}, pages = {1249--1257}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00170}, doi = {10.1109/TRUSTCOM60117.2023.00170}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/0005L0CL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AabyGB023, author = {Peter Aaby and Mario Valerio Giuffrida and William J. Buchanan and Zhiyuan Tan}, title = {TouchEnc: a Novel Behavioural Encoding Technique to Enable Computer Vision for Continuous Smartphone User Authentication}, booktitle = {TrustCom}, pages = {788--795}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00115}, doi = {10.1109/TRUSTCOM60117.2023.00115}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/AabyGB023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AdhikariAJ23, author = {Shashwat Adhikari and Hafizul Asad and Kevin D. Jones}, title = {Enhancing IoT Security: Novel Mechanisms for Malware Detection using HPCs and Neural Networks}, booktitle = {TrustCom}, pages = {1455--1463}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00199}, doi = {10.1109/TRUSTCOM60117.2023.00199}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/AdhikariAJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AfzalAK0KHS23, author = {Mozina Afzal and Kamran Ali and Mumraiz Khan Kasi and Masood Ur Rehman and Mohammad Ali Khoshkholghi and Bushra Haq and Syed Ahmed Shah}, title = {Analyzing Land Cover and Land Use Changes Using Remote Sensing Techniques: {A} Temporal Analysis of Climate Change Detection with Google Earth Engine}, booktitle = {TrustCom}, pages = {2018--2023}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00277}, doi = {10.1109/TRUSTCOM60117.2023.00277}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/AfzalAK0KHS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AhmadonYJ23, author = {Mohd Anuaruddin Bin Ahmadon and Shingo Yamaguchi and Alireza Jolfaei}, title = {Game Theory-Based Trade-Off Analysis for Privacy and Openness in Decision Making by Controlling Quantity of Information}, booktitle = {TrustCom}, pages = {1853--1858}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00251}, doi = {10.1109/TRUSTCOM60117.2023.00251}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/AhmadonYJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AiLMQL23, author = {Bohuan Ai and Yufei Li and Wenda Ma and Mengyuan Qiu and Miao Liu}, title = {Assessing the Value of Data Assets: An Exploratory Study of Valuation Methods}, booktitle = {TrustCom}, pages = {2147--2151}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00299}, doi = {10.1109/TRUSTCOM60117.2023.00299}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/AiLMQL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AknesilDLE23, author = {Can Aknesil and Elena Dubrova and Niklas Lindskog and H{\aa}kan Englund}, title = {A Near-Field {EM} Sensor Implemented in {FPGA} Configurable Fabric}, booktitle = {TrustCom}, pages = {1908--1913}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00259}, doi = {10.1109/TRUSTCOM60117.2023.00259}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/AknesilDLE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Al-HawawrehD23, author = {Muna Al{-}Hawawreh and Robin Doss}, title = {Enhancing Security in Industrial IoT: {A} Taxonomy-driven Approach to Risk Assessment}, booktitle = {TrustCom}, pages = {434--443}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00074}, doi = {10.1109/TRUSTCOM60117.2023.00074}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Al-HawawrehD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AlhajriJ23, author = {Abdullah Alhajri and Arshad Jhumka}, title = {Addressing a Malicious Tampering Attack on the Default Isolation Level in {DBMS}}, booktitle = {TrustCom}, pages = {2660--2667}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00371}, doi = {10.1109/TRUSTCOM60117.2023.00371}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/AlhajriJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AlharbiCJ23, author = {Jawaher Alharbi and Adam P. Chester and Arshad Jhumka}, title = {Towards Understanding Checkpointing in Transiently Powered IoT Networks}, booktitle = {TrustCom}, pages = {559--568}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00088}, doi = {10.1109/TRUSTCOM60117.2023.00088}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/AlharbiCJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AlishahiLZ23, author = {Mina Alishahi and Wouter Leeuw and Nicola Zannone}, title = {{BC-FL} k-means: {A} Blockchain-based Framework for Federated Clustering}, booktitle = {TrustCom}, pages = {1348--1354}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00184}, doi = {10.1109/TRUSTCOM60117.2023.00184}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/AlishahiLZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Alqulaity023, author = {Malak Alqulaity and Po Yang}, title = {Tabular Generative Adversarial Networks with an Enhanced Sampling Approach for High-Quality Cardiovascular Disease Dataset Generation}, booktitle = {TrustCom}, pages = {2595--2600}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00362}, doi = {10.1109/TRUSTCOM60117.2023.00362}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Alqulaity023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AlqulaityY23, author = {Malak Alqulaity and Po Yang}, title = {Advanced Machine-Learning Technologies for Coronary Artery Disease Prediction Using Heterogeneous Data}, booktitle = {TrustCom}, pages = {54--61}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00030}, doi = {10.1109/TRUSTCOM60117.2023.00030}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/AlqulaityY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AndradeRFM23, author = {Vinicius Camargo Andrade and Sheila S. Reinehr and Cinthia O. A. Freitas and Andreia Malucelli}, title = {Personal Data Privacy in Software Development Processes: {A} Practitioner's Point of View}, booktitle = {TrustCom}, pages = {2727--2734}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00381}, doi = {10.1109/TRUSTCOM60117.2023.00381}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/AndradeRFM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ArakiSTKEB23, author = {Ryosuke Araki and Kshira Sagar Sahoo and Yuzo Taenaka and Youki Kadobayashi and Erik Elmroth and Monowar H. Bhuyan}, title = {Detecting DDoS Attacks on the Network Edge: An Information-Theoretic Correlation Analysis}, booktitle = {TrustCom}, pages = {485--494}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00080}, doi = {10.1109/TRUSTCOM60117.2023.00080}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ArakiSTKEB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AsnaSP23, author = {Madathodika Asna and Hussain Shareef and Achikkulath Prasanthi}, title = {Quantum Inspired Binary Atom Search Optimization Algorithm for Charging Station Placement Problem}, booktitle = {TrustCom}, pages = {2315--2322}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00327}, doi = {10.1109/TRUSTCOM60117.2023.00327}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/AsnaSP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AtiiqYGSB23, author = {Syafiq Al Atiiq and Yachao Yuan and Christian Gehrmann and Jakob Sternby and Luis Barriga}, title = {Attacks Against Mobility Prediction in 5G Networks}, booktitle = {TrustCom}, pages = {1502--1511}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00205}, doi = {10.1109/TRUSTCOM60117.2023.00205}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/AtiiqYGSB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AttiehT23, author = {Joseph Attieh and Joe Tekli}, title = {Fast Text Classification using Lean Gradient Descent Feed Forward Neural Network for Category Feature Augmentation}, booktitle = {TrustCom}, pages = {2341--2348}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00330}, doi = {10.1109/TRUSTCOM60117.2023.00330}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/AttiehT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Au-YeungWLC23, author = {Jin Au{-}Yeung and Shanshan Wang and Yuchen Liu and Zhenxiang Chen}, title = {Safety or Not? {A} Comparative Study for Deep Learning Apps on Smartphones}, booktitle = {TrustCom}, pages = {109--116}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00036}, doi = {10.1109/TRUSTCOM60117.2023.00036}, timestamp = {Wed, 05 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Au-YeungWLC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AyubSFG23, author = {Md. Ahsan Ayub and Ambareen Siraj and Bobby Filar and Maanak Gupta}, title = {Static-RWArmor: {A} Static Analysis Approach for Prevention of Cryptographic Windows Ransomware}, booktitle = {TrustCom}, pages = {1673--1680}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00228}, doi = {10.1109/TRUSTCOM60117.2023.00228}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/AyubSFG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AzharMIM23, author = {M. A. Hannan Bin Azhar and Zolt{\'{a}}n M{\'{e}}sz{\'{a}}ros and Tasmina Islam and Soumya K. Manna}, title = {An Interactive Web Portal for Customised Telerehabilitation in Neurological Care}, booktitle = {TrustCom}, pages = {1814--1821}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00246}, doi = {10.1109/TRUSTCOM60117.2023.00246}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/AzharMIM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BajajE23, author = {Piyush Bajaj and Matthew Edwards}, title = {Automatic Scam-Baiting Using ChatGPT}, booktitle = {TrustCom}, pages = {1941--1946}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00264}, doi = {10.1109/TRUSTCOM60117.2023.00264}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/BajajE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BakSNK23, author = {Karolina Bak and Hannes Salin and Karol Niczyj and Lukasz Krzywiecki}, title = {Enhancing Tunnel Safety for Dangerous Goods Vehicles through Blockchain-Based Time-Stamping}, booktitle = {TrustCom}, pages = {1312--1317}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00179}, doi = {10.1109/TRUSTCOM60117.2023.00179}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/BakSNK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BaksiNU23, author = {Rudra Prasad Baksi and Vishwas Nalka and Shambhu J. Upadhyaya}, title = {Apt Detection of Ransomware - An Approach to Detect Advanced Persistent Threats Using System Call Information}, booktitle = {TrustCom}, pages = {1621--1630}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00221}, doi = {10.1109/TRUSTCOM60117.2023.00221}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/BaksiNU23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Balasubramanian23, author = {Prasasthy Balasubramanian and Justin Seby and Panos Kostakos}, title = {Semantic-Driven Focused Crawling Using {LASER} and {FAISS:} {A} Novel Approach for Threat Detection and Improved Information Retrieval}, booktitle = {TrustCom}, pages = {1598--1605}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00218}, doi = {10.1109/TRUSTCOM60117.2023.00218}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Balasubramanian23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BamboatY23, author = {Qaizar Bamboat and Hong Qing Yu}, title = {Literature Study on Bias and Fairness in Machine Learning Systems}, booktitle = {TrustCom}, pages = {1960--1965}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00267}, doi = {10.1109/TRUSTCOM60117.2023.00267}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/BamboatY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BellajOMCB23, author = {Badr Bellaj and Aafaf Ouaddah and Abdellatif Mezrioui and No{\"{e}}l Crespi and Emmanuel Bertin}, title = {GBTrust: Leveraging Edge Attention in Graph Neural Networks for Trust Management in {P2P} Networks}, booktitle = {TrustCom}, pages = {1272--1278}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00173}, doi = {10.1109/TRUSTCOM60117.2023.00173}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/BellajOMCB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BhardwajNJE23, author = {Raghav Bhardwaj and Morteza Noferesti and Madeline Janecek and Naser Ezzati{-}Jivan}, title = {{EMD-SCS:} {A} Dynamic Behavioral Approach for Early Malware Detection with Sonification of System Call Sequences}, booktitle = {TrustCom}, pages = {1728--1737}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00235}, doi = {10.1109/TRUSTCOM60117.2023.00235}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/BhardwajNJE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BinhulayyilL23, author = {Sarah Binhulayyil and Shancang Li}, title = {Ripple20 Vulnerabilities Detection using a Featureless Deep Learning Model}, booktitle = {TrustCom}, pages = {1236--1240}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00168}, doi = {10.1109/TRUSTCOM60117.2023.00168}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/BinhulayyilL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BishopS23, author = {Jonathan Bishop and Ashu M. G. Solo}, title = {Increasing user seduction in e-commerce community interaction using the participation continuum}, booktitle = {TrustCom}, pages = {2480--2487}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00348}, doi = {10.1109/TRUSTCOM60117.2023.00348}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/BishopS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BkakriaB23, author = {Anis Bkakria and Lydia Brika}, title = {A Framework for Privacy Policy Enforcement for Connected Automotive Systems}, booktitle = {TrustCom}, pages = {1094--1102}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00151}, doi = {10.1109/TRUSTCOM60117.2023.00151}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/BkakriaB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BlackPRCBPERG0S23, author = {Brendan Black and Philip Perry and Joseph Rafferty and Claudia Cristina and Tom Bowman and Cathryn Peoples and Andrew Ennis and Andrew Reeves and Nektarios Georgalas and Adrian Moore and Bryan W. Scotney}, title = {Matrix Platform: Empowering Smart Ports with Advanced Video Analytics for Enhanced Security, Safety, and Efficiency}, booktitle = {TrustCom}, pages = {1822--1826}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00247}, doi = {10.1109/TRUSTCOM60117.2023.00247}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/BlackPRCBPERG0S23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BlackRSE23, author = {Brendan Black and Joseph Rafferty and Jos{\'{e}} A. Santos and Andrew Ennis}, title = {{UAV} Bluetooth Communication Link Assessment for Emergency Response Applications}, booktitle = {TrustCom}, pages = {1871--1878}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00254}, doi = {10.1109/TRUSTCOM60117.2023.00254}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/BlackRSE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BorgesAS023, author = {H{\'{e}}lio Borges and Daniel Andrade and Jo{\~{a}}o Nuno Silva and Miguel Correia}, title = {TrustGlass: Human-Computer Trusted Paths with Augmented Reality Smart Glasses}, booktitle = {TrustCom}, pages = {712--721}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00106}, doi = {10.1109/TRUSTCOM60117.2023.00106}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/BorgesAS023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BoseM23, author = {Sunanda Bose and Dusica Marijan}, title = {Secure Traversable Event logging for Responsible Identification of Vertically Partitioned Health Data}, booktitle = {TrustCom}, pages = {1562--1571}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00213}, doi = {10.1109/TRUSTCOM60117.2023.00213}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/BoseM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BoukhedoumaMHBH23, author = {Hocine Boukhedouma and Abdelkrim Meziane and Slimane Hammoudi and Amel Benna and Allel Hadjali}, title = {Towards a Context-based Mobility Prediction in Smart Cities: First Experimentations}, booktitle = {TrustCom}, pages = {2579--2586}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00360}, doi = {10.1109/TRUSTCOM60117.2023.00360}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/BoukhedoumaMHBH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BowmanGREPB0023, author = {Tom Bowman and Nektarios Georgalas and Andrew Reeves and Andrew Ennis and Cathryn Peoples and Brendan Black and Fadi El{-}Moussa and Adrian Moore}, title = {Proactive Device Management for the Internet of Things}, booktitle = {TrustCom}, pages = {1887--1892}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00256}, doi = {10.1109/TRUSTCOM60117.2023.00256}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/BowmanGREPB0023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BradatschMTK23, author = {Leonard Bradatsch and Oleksandr Miroshkin and Natasa Trkulja and Frank Kargl}, title = {Zero Trust Score-based Network-level Access Control in Enterprise Networks}, booktitle = {TrustCom}, pages = {1422--1429}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00194}, doi = {10.1109/TRUSTCOM60117.2023.00194}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/BradatschMTK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Brennaf0L23, author = {Muhammad Senoyodha Brennaf and Po Yang and Vitaveska Lanfranchi}, title = {A Comparative Analysis of Federated Learning Techniques on On-Demand Platforms in Supporting Modern Web Browser Applications}, booktitle = {TrustCom}, pages = {2601--2606}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00363}, doi = {10.1109/TRUSTCOM60117.2023.00363}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Brennaf0L23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Cai0W0W23, author = {Yuqian Cai and Cheng Wang and Xiaoqian Wang and Xiaoyan Zhao and Weidong Wang}, title = {Coexistence Analysis Between the Large-scale {IMT} systems and {LEO} Satellite communication systems}, booktitle = {TrustCom}, pages = {1993--1998}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00273}, doi = {10.1109/TRUSTCOM60117.2023.00273}, timestamp = {Thu, 06 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Cai0W0W23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Cen0WL23, author = {Xuming Cen and Nan Hu and Haozhe Wang and Shiyi Liu}, title = {Temporal-Aware Lightweight Visual Tracking Method for Dynamic Traffic Scenes}, booktitle = {TrustCom}, pages = {612--619}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00094}, doi = {10.1109/TRUSTCOM60117.2023.00094}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Cen0WL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChaoXCGXLJC23, author = {Kun Chao and Zhen Xing and Xinzhou Cheng and Jian Guan and Lexi Xu and Xiqing Liu and Yuwei Jia and Lijuan Cao}, title = {Research on Operation Evolution of 5G Non-Public Network}, booktitle = {TrustCom}, pages = {2175--2180}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00304}, doi = {10.1109/TRUSTCOM60117.2023.00304}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChaoXCGXLJC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChatterjeeB023, author = {Diptendu Chatterjee and Prabal Banerjee and Subhra Mazumdar}, title = {Chrisimos: {A} useful Proof-of-Work for finding Minimal Dominating Set of a graph}, booktitle = {TrustCom}, pages = {1332--1339}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00182}, doi = {10.1109/TRUSTCOM60117.2023.00182}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChatterjeeB023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenC0W23, author = {Kairen Chen and Shuhong Chen and Guojun Wang and Chenchen Wang}, title = {CGPNet: Enhancing Medical Image Classification through Channel Grouping and Partial Convolution Network}, booktitle = {TrustCom}, pages = {1827--1834}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00248}, doi = {10.1109/TRUSTCOM60117.2023.00248}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChenC0W23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenCJ23, author = {Man Chen and Yuyue Chen and Zoe L. Jiang}, title = {{SIMD} Bootstrapping in {FHEW} Scheme}, booktitle = {TrustCom}, pages = {1006--1013}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00141}, doi = {10.1109/TRUSTCOM60117.2023.00141}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChenCJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenL23, author = {Kundu Chen and Jie Luo}, title = {Pooling Under the Sun: {A} Mining Pool Centralized Revisit and Solution}, booktitle = {TrustCom}, pages = {1294--1299}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00176}, doi = {10.1109/TRUSTCOM60117.2023.00176}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChenL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenLXW23, author = {Shuyu Chen and Dawei Lin and Zhenping Xie and Hongbo Wang}, title = {Temporal-Gated Graph Neural Network with Graph Sampling for Multi-step Attack Detection}, booktitle = {TrustCom}, pages = {1266--1271}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00172}, doi = {10.1109/TRUSTCOM60117.2023.00172}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChenLXW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenLYWY023, author = {Gengxiang Chen and Sheng Liu and Xu Yang and Tao Wang and Linlin You and Feng Xia}, title = {FedRSM: Representational-Similarity-Based Secured Model Uploading for Federated Learning}, booktitle = {TrustCom}, pages = {189--196}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00046}, doi = {10.1109/TRUSTCOM60117.2023.00046}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChenLYWY023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenWYLZW23, author = {Jian Chen and Jingyao Wu and Hao Yin and Qiang Li and Wensheng Zhang and Chen Wang}, title = {Class-Targeted Poisoning Attacks against DNNs}, booktitle = {TrustCom}, pages = {20--27}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00026}, doi = {10.1109/TRUSTCOM60117.2023.00026}, timestamp = {Fri, 21 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChenWYLZW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenXWLZL23, author = {Chen Chen and Chunhe Xia and Tianbo Wang and Wanshuang Lin and Yuan Zhao and Yang Li}, title = {EFwork: An Efficient Framework for Constructing a Malware Knowledge Graph}, booktitle = {TrustCom}, pages = {1258--1265}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00171}, doi = {10.1109/TRUSTCOM60117.2023.00171}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChenXWLZL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenYW23, author = {Peng{-}Yu Chen and Jen{-}Chieh Yang and Sheng{-}De Wang}, title = {Soft Hybrid Filter Pruning using a Dual Ranking Approach}, booktitle = {TrustCom}, pages = {2432--2439}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00342}, doi = {10.1109/TRUSTCOM60117.2023.00342}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChenYW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChengCDXYLGZXW23, author = {Chen Cheng and Xinzhou Cheng and Jinyou Dai and Xu Xia and Bin Yang and Feibi Lyu and Jie Gao and Wei Zhang and Tian Xiao and Tianyi Wang}, title = {A Novel Algorithm and System of Customer Value Evaluation based on Telecom Operator Big Data}, booktitle = {TrustCom}, pages = {2228--2233}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00313}, doi = {10.1109/TRUSTCOM60117.2023.00313}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChengCDXYLGZXW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChengQQWJW23, author = {Jingxian Cheng and Saiyu Qi and Yong Qi and Jianfeng Wang and Qin Jiang and Di Wu}, title = {EPPVChain: An Efficient Privacy-Preserving Verifiable Query Scheme for Blockchain Databases}, booktitle = {TrustCom}, pages = {1306--1311}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00178}, doi = {10.1109/TRUSTCOM60117.2023.00178}, timestamp = {Wed, 05 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChengQQWJW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChengWZJPZLZLW23, author = {Yang Cheng and Kai Wei and Yihui Zhang and Chunyu Jiang and Weiwei Pang and Qi Zhang and Bin Liu and Lifeng Zhang and Tingting Liu and Yinqian Wu}, title = {TrustedBench: An Efficient and User-friendly Distributed Performance Testing Tool for Blockchain System}, booktitle = {TrustCom}, pages = {2141--2146}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00298}, doi = {10.1109/TRUSTCOM60117.2023.00298}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChengWZJPZLZLW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChengYZ0L23, author = {Yumeng Cheng and Wangyang Yu and Xiaojun Zhai and Fei Hao and Yuan Liu}, title = {Grading and Calculation of Synchronic Distance in Petri Nets for Trustworthy Modeling and analyzing}, booktitle = {TrustCom}, pages = {605--611}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00093}, doi = {10.1109/TRUSTCOM60117.2023.00093}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChengYZ0L23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChoiKL23, author = {Euihyeon Choi and Jooyoung Kim and Wonkyung Lee}, title = {Rethinking Evaluation Metric for Probability Estimation Models Using Esports Data}, booktitle = {TrustCom}, pages = {2683--2689}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00374}, doi = {10.1109/TRUSTCOM60117.2023.00374}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChoiKL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChowdhuryIKKNKA23, author = {Abdullahi Chowdhury and Mohammad Manzurul Islam and Shahriar Kaisar and Mahbub E. Khoda and Ranesh Naha and Mohammad Ali Khoshkholghi and Mahdi Aiash}, title = {Leveraging Oversampling Techniques in Machine Learning Models for Multi-class Malware Detection in Smart Home Applications}, booktitle = {TrustCom}, pages = {2216--2221}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00311}, doi = {10.1109/TRUSTCOM60117.2023.00311}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChowdhuryIKKNKA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DagnasBY23, author = {Romain Dagnas and Anis Bkakria and Reda Yaich}, title = {Robustness Assessment of Biometric Authenticators}, booktitle = {TrustCom}, pages = {1137--1146}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00156}, doi = {10.1109/TRUSTCOM60117.2023.00156}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/DagnasBY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DimitriouA23, author = {Tassos Dimitriou and Khazam Alhamdan}, title = {{CENSOR:} Privacy-preserving Obfuscation for Outsourcing {SAT} formulas}, booktitle = {TrustCom}, pages = {1060--1067}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00147}, doi = {10.1109/TRUSTCOM60117.2023.00147}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/DimitriouA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DingS23, author = {Yepeng Ding and Hiroyuki Sato}, title = {Model-Driven Security Analysis of Self-Sovereign Identity Systems}, booktitle = {TrustCom}, pages = {1687--1694}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00230}, doi = {10.1109/TRUSTCOM60117.2023.00230}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/DingS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DonchezW23, author = {Stephen Donchez and Xiaofang Wang}, title = {Dynamic Scheduling of {AES} Cores for Aperiodic Tasks on Multi-tenant Cloud FPGAs}, booktitle = {TrustCom}, pages = {2562--2569}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00358}, doi = {10.1109/TRUSTCOM60117.2023.00358}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/DonchezW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DongCWSXHW23, author = {Runsha Dong and Xiaodong Cao and Chao Wang and Zhaoyang Sun and Lexi Xu and Xin He and Yang Wu}, title = {Smart Campus Construction based on Telecom Operators Big Data}, booktitle = {TrustCom}, pages = {2280--2285}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00322}, doi = {10.1109/TRUSTCOM60117.2023.00322}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/DongCWSXHW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DongZ023, author = {Chenyu Dong and Peijia Zheng and Weiqi Luo}, title = {Keyword Spotting in the Homomorphic Encrypted Domain Using Convolution Decomposition}, booktitle = {TrustCom}, pages = {1592--1597}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00217}, doi = {10.1109/TRUSTCOM60117.2023.00217}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/DongZ023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DongZLZ23, author = {Chenghe Dong and Jianhong Zhang and Zongyi Lv and Ruxuan Zhang}, title = {Lightweight Hierarchical Deterministic Wallet Supporting Stealth Address for IoT}, booktitle = {TrustCom}, pages = {387--393}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00069}, doi = {10.1109/TRUSTCOM60117.2023.00069}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/DongZLZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DuCLZ23, author = {Ruizhong Du and Jing Cui and Mingyue Li and Yuqing Zhang}, title = {{CEIVS:} {A} Scalable and Secure Encrypted Image Retrieval Scheme with Vertical Subspace Clustering}, booktitle = {TrustCom}, pages = {823--832}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00119}, doi = {10.1109/TRUSTCOM60117.2023.00119}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/DuCLZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DuY23, author = {Jinhua Du and Hao Yin}, title = {KrNER: {A} Novel Named Entity Recognition Method Based on Knowledge Enhancement and Remote Supervision}, booktitle = {TrustCom}, pages = {2323--2332}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00328}, doi = {10.1109/TRUSTCOM60117.2023.00328}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/DuY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DuY23a, author = {Jinhua Du and Hao Yin}, title = {{KLDP:} {A} Data Profiling Technique Based on Knowledge Graph and Large Language Modeling}, booktitle = {TrustCom}, pages = {2333--2340}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00329}, doi = {10.1109/TRUSTCOM60117.2023.00329}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/DuY23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/EckelBKFDBHL23, author = {Michael Eckel and Anirban Basu and Satoshi Kai and Hervais Simo Fhom and Sinisa Dukanovic and Henk Birkholz and Shingo Hane and Matthias Lieske}, title = {{SCATMAN:} {A} Framework for Enhancing Trustworthiness in Digital Supply Chains}, booktitle = {TrustCom}, pages = {750--761}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00110}, doi = {10.1109/TRUSTCOM60117.2023.00110}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/EckelBKFDBHL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FanZLMWW0M23, author = {Haoling Fan and Fangyu Zheng and Jingqiang Lin and Lingjia Meng and Mingyu Wang and Qiang Wang and Shijie Jia and Yuan Ma}, title = {Hydamc: {A} Hybrid Detection Approach for Misuse of Cryptographic Algorithms in Closed-Source Software}, booktitle = {TrustCom}, pages = {796--803}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00116}, doi = {10.1109/TRUSTCOM60117.2023.00116}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/FanZLMWW0M23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FarasatRK0P23, author = {Talaya Farasat and Muhammad Ahmad Rathore and Akmal Khan and Jongwon Kim and Joachim Posegga}, title = {Machine Learning-based {BGP} Traffic Prediction}, booktitle = {TrustCom}, pages = {1925--1934}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00262}, doi = {10.1109/TRUSTCOM60117.2023.00262}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/FarasatRK0P23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FareaMUOCH23, author = {Adhban Farea and Moaaz Munir and Rahat Ullah and Michal Otreba and Sean Carroll and Joe Harrington}, title = {Comparison of the Barriers to {BIM} Adoption and Digital Transformation within the Construction Industry of Pakistan and Ireland}, booktitle = {TrustCom}, pages = {2394--2399}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00337}, doi = {10.1109/TRUSTCOM60117.2023.00337}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/FareaMUOCH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FeiLWFPL23, author = {Ziyu Fei and Ying Li and Jiuqi Wei and Yufan Fu and Botao Peng and Xiaodong Li}, title = {FlexAuth: {A} Decentralized Authorization System with Flexible Delegation}, booktitle = {TrustCom}, pages = {1780--1797}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00243}, doi = {10.1109/TRUSTCOM60117.2023.00243}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/FeiLWFPL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ForoughBE23, author = {Javad Forough and Monowar H. Bhuyan and Erik Elmroth}, title = {Unified Identification of Anomalies on the Edge: {A} Hybrid Sequential {PGM} Approach}, booktitle = {TrustCom}, pages = {595--604}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00092}, doi = {10.1109/TRUSTCOM60117.2023.00092}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ForoughBE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FotiouCKSP23, author = {Nikos Fotiou and Spiros Chadoulos and Iordanis Koutsopoulos and Vasilios A. Siris and George C. Polyzos}, title = {Access control for interoperable energy management systems using Verifiable Credentials}, booktitle = {TrustCom}, pages = {1540--1545}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00210}, doi = {10.1109/TRUSTCOM60117.2023.00210}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/FotiouCKSP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FrijiMSCO023, author = {Hamdi Friji and Ioannis Mavromatis and Adri{\'{a}}n S{\'{a}}nchez{-}Momp{\'{o}} and Pietro Carnelli and Alexis Olivereau and Aftab Khan}, title = {Multi-stage Attack Detection and Prediction Using Graph Neural Networks: An IoT Feasibility Study}, booktitle = {TrustCom}, pages = {620--627}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00095}, doi = {10.1109/TRUSTCOM60117.2023.00095}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/FrijiMSCO023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FuWLPL23, author = {Yufan Fu and Jiuqi Wei and Ying Li and Botao Peng and Xiaodong Li}, title = {{TI-DNS:} {A} Trusted and Incentive {DNS} Resolution Architecture based on Blockchain}, booktitle = {TrustCom}, pages = {265--274}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00055}, doi = {10.1109/TRUSTCOM60117.2023.00055}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/FuWLPL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GailRFK23, author = {Felix Clemens Gail and Roland Rieke and Florian Fenzl and Christoph Krau{\ss}}, title = {Evaluation of Decision Tree-Based Rule Derivation for Intrusion Detection in Automotive Ethernet}, booktitle = {TrustCom}, pages = {1392--1399}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00190}, doi = {10.1109/TRUSTCOM60117.2023.00190}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GailRFK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GananLT23, author = {Carlos Hernandez Ga{\~{n}}{\'{a}}n and Si{\^{o}}n Lloyd and Samaneh Tajalizadehkhoob}, title = {Phish and Chips: Language-agnostic classification of unsolicited emails}, booktitle = {TrustCom}, pages = {1385--1391}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00189}, doi = {10.1109/TRUSTCOM60117.2023.00189}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GananLT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GaoFLLY23, author = {Xinwen Gao and Shaojing Fu and Lin Liu and Yuchuan Luo and Luming Yang}, title = {EzBoost: Fast And Secure Vertical Federated Tree Boosting Framework via EzPC}, booktitle = {TrustCom}, pages = {28--37}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00027}, doi = {10.1109/TRUSTCOM60117.2023.00027}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GaoFLLY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GaoFYY23, author = {Xiang Gao and Jiangyin Fu and Xiujuan Yao and Yi Yan}, title = {Optimization Method for {LEO} Constellation Frequency Compatibility Simulation Parameters}, booktitle = {TrustCom}, pages = {1991--1992}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00272}, doi = {10.1109/TRUSTCOM60117.2023.00272}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GaoFYY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GaoL23, author = {Tong Gao and Xianhui Lu}, title = {Physical Layer Secure Communication based on {MIMO} Channel Constellation Flipping}, booktitle = {TrustCom}, pages = {1408--1415}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00192}, doi = {10.1109/TRUSTCOM60117.2023.00192}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GaoL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GaoWHLZXWYC23, author = {Jie Gao and Tianyi Wang and Yuhui Han and Lixia Liu and Xingwei Zhang and Lexi Xu and Yang Wu and Zijing Yang and Chen Cheng}, title = {An Analysis Strategy of Abnormal Subscriber Warning Based on Federated Learning Technology}, booktitle = {TrustCom}, pages = {2104--2109}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00292}, doi = {10.1109/TRUSTCOM60117.2023.00292}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GaoWHLZXWYC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GelenbeN23, author = {Erol Gelenbe and Mohammed Nasereddin}, title = {Protecting IoT Servers Against Flood Attacks with the Quasi Deterministic Transmission Policy}, booktitle = {TrustCom}, pages = {379--386}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00068}, doi = {10.1109/TRUSTCOM60117.2023.00068}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GelenbeN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GeorgalasEPRPCB23, author = {Nektarios Georgalas and Andrew Ennis and Cathryn Peoples and Joseph Rafferty and Philip Perry and Claudia Cristina and Brendan Black and Adrian Moore and Tom Bowman and Bryan W. Scotney and Andrew Reeves}, title = {IoT Device Lifecycle Management}, booktitle = {TrustCom}, pages = {1865--1870}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00253}, doi = {10.1109/TRUSTCOM60117.2023.00253}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GeorgalasEPRPCB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GoyalKS23, author = {Himanshu Goyal and Krishna Kodali and Sudipta Saha}, title = {LiPI: Lightweight Privacy-Preserving Data Aggregation in IoT}, booktitle = {TrustCom}, pages = {1661--1666}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00226}, doi = {10.1109/TRUSTCOM60117.2023.00226}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GoyalKS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GrahnCZ23, author = {Daniel Grahn and Lingwei Chen and Junjie Zhang}, title = {Code Execution Capability as a Metric for Machine Learning-Assisted Software Vulnerability Detection Models}, booktitle = {TrustCom}, pages = {1606--1613}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00219}, doi = {10.1109/TRUSTCOM60117.2023.00219}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GrahnCZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GuSYH23, author = {Zhipin Gu and Jiangyong Shi and Yuexiang Yang and Liangzhong He}, title = {Defending against Adversarial Attacks in Federated Learning on Metric Learning Model}, booktitle = {TrustCom}, pages = {197--206}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00047}, doi = {10.1109/TRUSTCOM60117.2023.00047}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GuSYH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Guo0Y23, author = {Kailu Guo and Yang Xin and Tianxiang Yu}, title = {Malware Detection Using Contrastive Learning Based on Multi-Feature Fusion}, booktitle = {TrustCom}, pages = {1681--1686}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00229}, doi = {10.1109/TRUSTCOM60117.2023.00229}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Guo0Y23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GuoGZFML23, author = {Bao Guo and Jinge Guo and Lufei Zhang and Yuan Fang and Yingtao Meng and Jiayu Li}, title = {A Novel Uplink Coverage and Capacity Enhancement Scheme in {NR} {TDD} Network}, booktitle = {TrustCom}, pages = {2275--2279}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00321}, doi = {10.1109/TRUSTCOM60117.2023.00321}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GuoGZFML23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GuoHHZLT23, author = {Qi Guo and Binjiang Hu and Zeqi Hong and Yanjun Zhao and Shuyong Li and Liang Tu}, title = {Designing and Implementing Communication-efficient Model of Distributed System for Real-time Electromagnetic Transient Simulation}, booktitle = {TrustCom}, pages = {2789--2796}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00389}, doi = {10.1109/TRUSTCOM60117.2023.00389}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GuoHHZLT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GuoL23, author = {Kewei Guo and Xuefei Li}, title = {A Trustworthiness Evaluation Mechanism Based on Beta Distribution Under Selected Conditions}, booktitle = {TrustCom}, pages = {1781--1789}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00242}, doi = {10.1109/TRUSTCOM60117.2023.00242}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GuoL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GuoXLLWZ23, author = {Yongjian Guo and Xi Xiao and Yuanyi Lin and Hao Li and Xiangbo Wu and Tao Zhou}, title = {Fuzz Testing for Rust Library Functions}, booktitle = {TrustCom}, pages = {990--997}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00139}, doi = {10.1109/TRUSTCOM60117.2023.00139}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GuoXLLWZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GuoZGSJL23, author = {Bao Guo and Lufei Zhang and Jinge Guo and Jinhu Shen and Shumin Jiang and Pengcheng Liu}, title = {Method for Dual-path Upgrade in a Leaked Signal Indoor Distribution System in 5G Network}, booktitle = {TrustCom}, pages = {2048--2051}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00282}, doi = {10.1109/TRUSTCOM60117.2023.00282}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GuoZGSJL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GuoZXLY23, author = {Zhen Guo and Pengzhou Zhang and Lexi Xu and Peng Liang and Shuwei Yao}, title = {Design and Implementation of Digital Consulting Capability Platform based on Knowledge Sharing}, booktitle = {TrustCom}, pages = {2030--2035}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00279}, doi = {10.1109/TRUSTCOM60117.2023.00279}, timestamp = {Wed, 05 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GuoZXLY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HadiSACJ23, author = {Hassan Jalil Hadi and Khurram Shahzad and Naveed Ahmed and Yue Cao and Yasir Javed}, title = {A Scalable Pattern Matching Implementation on Hardware using Data Level Parallelism}, booktitle = {TrustCom}, pages = {2530--2537}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00354}, doi = {10.1109/TRUSTCOM60117.2023.00354}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HadiSACJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Halabi23, author = {Talal Halabi}, title = {Stealthy Rootkits vs Low-Power IoT Devices: {A} Process-level Colonel Blotto Game}, booktitle = {TrustCom}, pages = {1914--1918}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00260}, doi = {10.1109/TRUSTCOM60117.2023.00260}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Halabi23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HalaszSB23, author = {David Halasz and Suyash Shandilya and Barbora Buhnova}, title = {Trustworthy Execution in Untrustworthy Autonomous Systems}, booktitle = {TrustCom}, pages = {1766--1773}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00240}, doi = {10.1109/TRUSTCOM60117.2023.00240}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HalaszSB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HamimTAHAG23, author = {Md Abrar Hamim and F. M. Tanmoy and Umme Fatema Tuj Asha and Md Nazmul Haq and Maruf Alam and Bijoy Ghosh}, title = {Lung Cancer Detection using Machine Learning Approach}, booktitle = {TrustCom}, pages = {2676--2682}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00373}, doi = {10.1109/TRUSTCOM60117.2023.00373}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HamimTAHAG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HarrisLHC23, author = {Sheetal Harris and Jinshuo Liu and Hassan Jalil Hadi and Yue Cao}, title = {Ax-to-Grind Urdu: Benchmark Dataset for Urdu Fake News Detection}, booktitle = {TrustCom}, pages = {2440--2447}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00343}, doi = {10.1109/TRUSTCOM60117.2023.00343}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HarrisLHC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HasegawaYHFHT23, author = {Kento Hasegawa and Kazuki Yamashita and Seira Hidano and Kazuhide Fukushima and Kazuo Hashimoto and Nozomu Togawa}, title = {Membership Inference Attacks against GNN-based Hardware Trojan Detection}, booktitle = {TrustCom}, pages = {1222--1229}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00166}, doi = {10.1109/TRUSTCOM60117.2023.00166}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HasegawaYHFHT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HeWLY23, author = {Liangen He and Haiqin Wu and Liang Li and Jucai Yang}, title = {{UNITE:} Privacy-Aware Verifiable Quality Assessment via Federated Learning in Blockchain-Empowered Crowdsourcing}, booktitle = {TrustCom}, pages = {352--360}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00065}, doi = {10.1109/TRUSTCOM60117.2023.00065}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HeWLY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HegdeMSR23, author = {Shashank Hegde and Deepak Munagala and Aditya Singhania and Benjamin Reed}, title = {A Mobile-First Disconnected Data Distribution Network}, booktitle = {TrustCom}, pages = {2546--2553}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00356}, doi = {10.1109/TRUSTCOM60117.2023.00356}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HegdeMSR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HlaingA23, author = {Htet Htet Hlaing and Hitoshi Asaeda}, title = {PrivOff: Secure and Privacy-Preserving Data Management for Distributed Off-Chain Networks}, booktitle = {TrustCom}, pages = {326--333}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00062}, doi = {10.1109/TRUSTCOM60117.2023.00062}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HlaingA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HouWH23, author = {Yuwen Hou and Song Wu and Mingde Huo}, title = {Medical Image Recognition Technology Based On Fusion Of Faster-RCNN And {SSD}}, booktitle = {TrustCom}, pages = {2110--2114}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00293}, doi = {10.1109/TRUSTCOM60117.2023.00293}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HouWH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HsiehYLKW23, author = {Chang{-}Hsuan Hsieh and Jen{-}Chieh Yang and Hung{-}Yi Lin and Lin{-}Jing Kuo and Sheng{-}De Wang}, title = {A Hybrid Filter Pruning Method Based on Linear Region Analysis}, booktitle = {TrustCom}, pages = {2424--2431}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00341}, doi = {10.1109/TRUSTCOM60117.2023.00341}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HsiehYLKW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Hu023, author = {Wentao Hu and Hui Fang}, title = {Decentralized Matrix Factorization with Heterogeneous Differential Privacy}, booktitle = {TrustCom}, pages = {1068--1075}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00148}, doi = {10.1109/TRUSTCOM60117.2023.00148}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Hu023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HuCL23, author = {Yang Hu and Jia Chen and Xin Luo}, title = {{UFADF:} {A} Unified Feature Analysis and Detection Framework for Malicious Office Documents}, booktitle = {TrustCom}, pages = {881--888}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00126}, doi = {10.1109/TRUSTCOM60117.2023.00126}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HuCL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HuXL23, author = {Qinghua Hu and Chunxiang Xu and Wanpeng Li}, title = {A Broadband Subliminal Channel in Signatures Without Sharing the Signing Key}, booktitle = {TrustCom}, pages = {814--822}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00118}, doi = {10.1109/TRUSTCOM60117.2023.00118}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HuXL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HuYTWCALL23, author = {Qingyuan Hu and Zheng Yin and Tao Tao and Jibin Wang and Zhuo Chen and Bohuan Ai and Yu Liu and Chongzhou Liu}, title = {Research on Technologies in Data Fabric}, booktitle = {TrustCom}, pages = {2204--2209}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00309}, doi = {10.1109/TRUSTCOM60117.2023.00309}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HuYTWCALL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HuZSLMW23, author = {Tian Hu and Shangyuan Zhuang and Jiyan Sun and Yinlong Liu and Wei Ma and Hongchao Wang}, title = {A Cost-effective Automation Method of Massive Vulnerabilities Analysis and Remediation Based on Cloud Native}, booktitle = {TrustCom}, pages = {772--779}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00112}, doi = {10.1109/TRUSTCOM60117.2023.00112}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HuZSLMW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HuangAHMT23, author = {Ruoyu Huang and Abdullah Aljuffri and Said Hamdioui and Kezheng Ma and Mottaqiallah Taouil}, title = {Securing an Efficient Lightweight {AES} Accelerator}, booktitle = {TrustCom}, pages = {841--848}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00121}, doi = {10.1109/TRUSTCOM60117.2023.00121}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HuangAHMT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HuangDZLWZ23, author = {Hualong Huang and Zhekai Duan and Wenhan Zhan and Yichen Liu and Zhi Wang and Zitian Zhao}, title = {Distributed Dependent Task Offloading in {CPU-GPU} Heterogenous {MEC:} {A} Federated Reinforcement Learning Approach}, booktitle = {TrustCom}, pages = {1206--1213}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00164}, doi = {10.1109/TRUSTCOM60117.2023.00164}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HuangDZLWZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HuangLX0H023, author = {Shiyong Huang and Haocong Li and Ruoting Xiong and Wei Ren and Jie He and Yi Ren}, title = {A Commitment and Ring Signature based Scheme for Amount and Identity Privacy Protection in Blockchain}, booktitle = {TrustCom}, pages = {292--299}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00058}, doi = {10.1109/TRUSTCOM60117.2023.00058}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HuangLX0H023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/IezziMG23, author = {Michela Iezzi and Carsten Maple and Danilo A. Giannone}, title = {On the Adoption of Homomorphic Encryption by Financial Institutions\({}^{\mbox{*}}\)}, booktitle = {TrustCom}, pages = {1738--1743}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00236}, doi = {10.1109/TRUSTCOM60117.2023.00236}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/IezziMG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/InceLYLD23, author = {Peter Ince and Xiapu Luo and Jiangshan Yu and Joseph K. Liu and Xiaoning Du}, title = {{MATH} - Finding and Fixing Exploits in Algorand}, booktitle = {TrustCom}, pages = {1572--1579}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00214}, doi = {10.1109/TRUSTCOM60117.2023.00214}, timestamp = {Thu, 06 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/InceLYLD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JhaMG23, author = {Sanjiv S. Jha and Simon Mayer and Kimberly Garc{\'{\i}}a}, title = {Actionable Contextual Explanations for Cyber-Physical Systems}, booktitle = {TrustCom}, pages = {1879--1886}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00255}, doi = {10.1109/TRUSTCOM60117.2023.00255}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/JhaMG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JianJWL023, author = {Muwei Jian and Yue Jin and Rui Wang and Xiaoguang Li and Hui Yu}, title = {Inter-slice Correlation Weighted Fusion for Universal Lesion Detection}, booktitle = {TrustCom}, pages = {636--643}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00097}, doi = {10.1109/TRUSTCOM60117.2023.00097}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/JianJWL023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JiangXCLWL23, author = {Changnan Jiang and Chunhe Xia and Chen Chen and Huacheng Li and Tianbo Wang and Xiaojian Li}, title = {FedDLM: {A} Fine-Grained Assessment Scheme for Risk of Sensitive Information Leakage in Federated Learning-based Android Malware Classifier}, booktitle = {TrustCom}, pages = {231--240}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00051}, doi = {10.1109/TRUSTCOM60117.2023.00051}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/JiangXCLWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JiaoZLL23, author = {Liang Jiao and Yujia Zhu and Baiyang Li and Qingyun Liu}, title = {Measuring DNS-over-Encryption Performance Over IPv6}, booktitle = {TrustCom}, pages = {444--451}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00075}, doi = {10.1109/TRUSTCOM60117.2023.00075}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/JiaoZLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JurkansF23, author = {Kristaps Jurkans and Charles Fox}, title = {Python Subset to Digital Logic Dataflow Compiler for Robots and IoT}, booktitle = {TrustCom}, pages = {1893--1899}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00257}, doi = {10.1109/TRUSTCOM60117.2023.00257}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/JurkansF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KasirajanAT23, author = {Merlin Kasirajan and M. A. Hannan Bin Azhar and Scott Turner}, title = {Trustworthy Insights: {A} Novel Multi-Tier Explainable Framework for Ambient Assisted Living}, booktitle = {TrustCom}, pages = {2554--2561}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00357}, doi = {10.1109/TRUSTCOM60117.2023.00357}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/KasirajanAT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KasyapTC23, author = {Harsh Kasyap and Somanath Tripathy and Mauro Conti}, title = {{HDFL:} Private and Robust Federated Learning using Hyperdimensional Computing}, booktitle = {TrustCom}, pages = {214--221}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00049}, doi = {10.1109/TRUSTCOM60117.2023.00049}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/KasyapTC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KhadkaUMMA23, author = {Kalam Khadka and Abu Barkat Ullah and Wanli Ma and Elisa Mart{\'{\i}}nez Marroqu{\'{\i}}n and Yibeltal Alem}, title = {A Survey on the Principles of Persuasion as a Social Engineering Strategy in Phishing}, booktitle = {TrustCom}, pages = {1631--1638}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00222}, doi = {10.1109/TRUSTCOM60117.2023.00222}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/KhadkaUMMA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KhanM23, author = {Tanveer Khan and Antonis Michalas}, title = {Learning in the Dark: Privacy-Preserving Machine Learning using Function Approximation}, booktitle = {TrustCom}, pages = {62--71}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00031}, doi = {10.1109/TRUSTCOM60117.2023.00031}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/KhanM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KhanTJM23, author = {Abdul{-}Qadir Khan and Nouredine Tamani and Saad El Jaouhari and Lina Mroueh}, title = {A Contextual Derivation Algorithm for Cybersecurity in IoT Environments}, booktitle = {TrustCom}, pages = {1430--1435}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00195}, doi = {10.1109/TRUSTCOM60117.2023.00195}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/KhanTJM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KliemeERM23, author = {Eric Klieme and Ben{-}Noah Engelhaupt and Vincent Xeno Rahn and Christoph Meinel}, title = {Push It Real Good: Towards Behavioral Access Control using the Door Handle Push-Down-Phase Only}, booktitle = {TrustCom}, pages = {522--530}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00084}, doi = {10.1109/TRUSTCOM60117.2023.00084}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/KliemeERM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KogaK23, author = {Yoshimichi Koga and Kenichi Kourai}, title = {SSdetector: Secure and Manageable Host-based {IDS} with {SGX} and {SMM}}, booktitle = {TrustCom}, pages = {539--548}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00086}, doi = {10.1109/TRUSTCOM60117.2023.00086}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/KogaK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KongGWL23, author = {Luyue Kong and Ling Gong and Guangchen Wang and Song Liu}, title = {DP-ProtoNet: An interpretable dual path prototype network for medical image diagnosis}, booktitle = {TrustCom}, pages = {2797--2804}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00390}, doi = {10.1109/TRUSTCOM60117.2023.00390}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/KongGWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KongZLL23, author = {Luyue Kong and Shu Zhang and Jinbao Li and Song Liu}, title = {An Instruction Inference Graph Optimal Transport Network Model For Biomedical Commonsense Question Answering}, booktitle = {TrustCom}, pages = {2749--2754}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00383}, doi = {10.1109/TRUSTCOM60117.2023.00383}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/KongZLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Konorski23, author = {Jerzy Konorski}, title = {Trustworthiness and Subversion in Large Service-Oriented Multi-Agent Systems under Virtual Anonymity and Blind Provider Selection}, booktitle = {TrustCom}, pages = {722--729}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00107}, doi = {10.1109/TRUSTCOM60117.2023.00107}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Konorski23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KrakowskiRS23, author = {Filip Krakowski and Fabian Ruhland and Michael Sch{\"{o}}ttner}, title = {High-Performance Object Serialization based on Ahead-of-Time Schema Generation}, booktitle = {TrustCom}, pages = {2378--2385}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00335}, doi = {10.1109/TRUSTCOM60117.2023.00335}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/KrakowskiRS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KromesRNCVL23, author = {Roland Kromes and Jo{\~{a}}o Rodrigues and Duarte M. Nascimento and Gon{\c{c}}alo Cadete and Fran{\c{c}}ois Verdier and Kaitai Liang}, title = {A New Design for Self-Encryption}, booktitle = {TrustCom}, pages = {1645--1652}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00224}, doi = {10.1109/TRUSTCOM60117.2023.00224}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/KromesRNCVL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KrzywieckiZZ23, author = {Lukasz Krzywiecki and Grzegorz Zaborowski and Marcin Zawada}, title = {Too Noisy, or Not Too Noisy? {A} Private Training in Machine Learning}, booktitle = {TrustCom}, pages = {149--156}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00041}, doi = {10.1109/TRUSTCOM60117.2023.00041}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/KrzywieckiZZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KuhtreiberPR23, author = {Patrick K{\"{u}}htreiber and Viktoriya Pak and Delphine Reinhardt}, title = {"A method like this would be overkill": Developers' Perceived Issues with Privacy-preserving Computation Methods}, booktitle = {TrustCom}, pages = {1041--1048}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00145}, doi = {10.1109/TRUSTCOM60117.2023.00145}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/KuhtreiberPR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KunduN23, author = {Arghya Kundu and Uyen Trang Nguyen}, title = {A Large-scale Non-standard English Database and Transformer-based Translation System}, booktitle = {TrustCom}, pages = {2472--2479}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00347}, doi = {10.1109/TRUSTCOM60117.2023.00347}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/KunduN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KwartengC23, author = {Emmanuel Kwarteng and Mumin Cebe}, title = {{MEDICALHARM} - {A} Threat Modeling designed for Modern Medical Devices}, booktitle = {TrustCom}, pages = {1147--1156}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00157}, doi = {10.1109/TRUSTCOM60117.2023.00157}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/KwartengC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LarsenKGKV023, author = {Benjamin Larsen and Nada El Kassem and Thanassis Giannetsos and Ioannis Krontiris and Stefanos Vasileiadis and Liqun Chen}, title = {Achieving Higher Level of Assurance in Privacy Preserving Identity Wallets}, booktitle = {TrustCom}, pages = {1049--1059}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00146}, doi = {10.1109/TRUSTCOM60117.2023.00146}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LarsenKGKV023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LealCNGC023, author = {Erika A. Leal and Binlin Cheng and TuQuynh Nguyen and Alfredo Gutierrez Garcia and Nathan Cabero and Jiang Ming}, title = {Leveraging Hardware Performance Counters for Efficient Classification of Binary Packers}, booktitle = {TrustCom}, pages = {1859--1864}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00252}, doi = {10.1109/TRUSTCOM60117.2023.00252}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LealCNGC023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LengPZYZCM23, author = {Tao Leng and Yuedong Pan and Lixin Zhao and Aimin Yu and Ziyuan Zhu and Lijun Cai and Dang Meng}, title = {MemInspect: Memory Forensics for investigating Fileless Attacks}, booktitle = {TrustCom}, pages = {946--955}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00134}, doi = {10.1109/TRUSTCOM60117.2023.00134}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LengPZYZCM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Li0HHZZ23, author = {Yuanyuan Li and Wei Chen and Xin Huang and Peng Han and Shenhai Zheng and Zhiqin Zhu}, title = {Efficient Covert Communication Scheme Based on Ethereum}, booktitle = {TrustCom}, pages = {249--256}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00053}, doi = {10.1109/TRUSTCOM60117.2023.00053}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Li0HHZZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Li0LZL23, author = {Longfei Li and Xiaokang Yin and Xiao Li and Xiaoya Zhu and Shengli Liu}, title = {ConFunc: Enhanced Binary Function-Level Representation through Contrastive Learning}, booktitle = {TrustCom}, pages = {1241--1248}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00169}, doi = {10.1109/TRUSTCOM60117.2023.00169}, timestamp = {Mon, 17 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Li0LZL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Li0ZS023, author = {Dandan Li and Yufeng Li and Guiqi Zhang and Ke Sun and Jiangtao Li}, title = {Fooling Object Detectors in the Physical World with Natural Adversarial Camouflage}, booktitle = {TrustCom}, pages = {141--148}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00040}, doi = {10.1109/TRUSTCOM60117.2023.00040}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Li0ZS023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Li0ZWY023, author = {Jiacheng Li and Tong Li and Runzi Zhang and Di Wu and Hao Yue and Zhen Yang}, title = {{APM:} An Attack Path-based Method for {APT} Attack Detection on Few-Shot Learning}, booktitle = {TrustCom}, pages = {10--19}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00025}, doi = {10.1109/TRUSTCOM60117.2023.00025}, timestamp = {Tue, 18 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Li0ZWY023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiC0S23, author = {Xiaohui Li and Yunpei Chen and Hong Wang and Shuran Sheng}, title = {{R-SACE:} RIS-Enabled Sensing-Aided Communication Enhancement in {ISAC} Systems}, booktitle = {TrustCom}, pages = {2714--2719}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00378}, doi = {10.1109/TRUSTCOM60117.2023.00378}, timestamp = {Wed, 05 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiC0S23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiHWWQN23, author = {Ao Li and Sai Han and Zelin Wang and Guangquan Wang and Zhi Qiao and Songtao Ni}, title = {The Research and Implementation of Optical Cable Fault Location Method Based on Navigation}, booktitle = {TrustCom}, pages = {2070--2075}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00286}, doi = {10.1109/TRUSTCOM60117.2023.00286}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiHWWQN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiLRWSGWL23, author = {Dawei Li and Di Liu and Yangkun Ren and Ziyi Wang and Yu Sun and Zhenyu Guan and Qianhong Wu and Jianwei Liu}, title = {FPHammer: {A} Device Identification Framework based on {DRAM} Fingerprinting}, booktitle = {TrustCom}, pages = {1031--1040}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00144}, doi = {10.1109/TRUSTCOM60117.2023.00144}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiLRWSGWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiP0Y23, author = {Shifeng Li and Ruoling Peng and Po Yang and Yun Yang}, title = {A Deep Learning Model for Mobility Change Prediction Based on National Prevention and Control Policy}, booktitle = {TrustCom}, pages = {2607--2614}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00364}, doi = {10.1109/TRUSTCOM60117.2023.00364}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiP0Y23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiSCL23, author = {Qi Li and Xinqi Shen and Zhongkai Cheng and Yu Liu}, title = {Design and Implementation of Intelligent Pet Feeding System}, booktitle = {TrustCom}, pages = {2629--2635}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00367}, doi = {10.1109/TRUSTCOM60117.2023.00367}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiSCL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiWC23, author = {Shuai Li and Yu Wen and Xu Cheng}, title = {Towards Dynamic Backdoor Attacks against LiDAR Semantic Segmentation in Autonomous Driving}, booktitle = {TrustCom}, pages = {89--98}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00034}, doi = {10.1109/TRUSTCOM60117.2023.00034}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiWC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiWWC23, author = {Shuai Li and Yu Wen and Huiying Wang and Xu Cheng}, title = {BadLiDet: {A} Simple Backdoor Attack against LiDAR Object Detection in Autonomous Driving}, booktitle = {TrustCom}, pages = {99--108}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00035}, doi = {10.1109/TRUSTCOM60117.2023.00035}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiWWC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiXLLW23, author = {De Li and Tiange Xia and Qiyu Li and Xianxian Li and Jinyan Wang}, title = {Robustness and Privacy for Green Learning under Noisy Labels}, booktitle = {TrustCom}, pages = {1111--1118}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00153}, doi = {10.1109/TRUSTCOM60117.2023.00153}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiXLLW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiZCJ23, author = {Yuxi Li and Fucai Zhou and Jingjing Chen and Dong Ji}, title = {Crowdsensed Data-oriented Distributed and Secure Spatial Query Scheme}, booktitle = {TrustCom}, pages = {912--919}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00130}, doi = {10.1109/TRUSTCOM60117.2023.00130}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiZCJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiZFW23, author = {Zeyi Li and Ze Zhang and Mengyi Fu and Pan Wang}, title = {A novel network flow feature scaling method based on cloud-edge collaboration}, booktitle = {TrustCom}, pages = {1947--1953}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00265}, doi = {10.1109/TRUSTCOM60117.2023.00265}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiZFW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiZLZ23, author = {Yuanpei Li and Qinglei Zhou and Bin Li and Yan Zhuang}, title = {GuiDiv: Mitigating Code-reuse Attack in an IoT Cluster Using Guided Control Flow Diversification}, booktitle = {TrustCom}, pages = {422--433}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00073}, doi = {10.1109/TRUSTCOM60117.2023.00073}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiZLZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiZSZSM23, author = {Danping Li and Ziyuan Zhu and Jiao Shen and Yusha Zhang and Gang Shi and Dan Meng}, title = {Flush+Revisit: {A} Cross-CCX Side-Channel Attack on {AMD} Processors}, booktitle = {TrustCom}, pages = {920--928}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00131}, doi = {10.1109/TRUSTCOM60117.2023.00131}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiZSZSM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LinXW0ZZ23, author = {Wanshuang Lin and Chunhe Xia and Tianbo Wang and Chen Chen and Yuan Zhao and Weidong Zhou}, title = {{REDA:} Malicious Traffic Detection Based on Record Length and Frequency Domain Analysis}, booktitle = {TrustCom}, pages = {668--675}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00101}, doi = {10.1109/TRUSTCOM60117.2023.00101}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LinXW0ZZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LinZWWX23, author = {Lin Lin and Bin Zhu and Zelin Wang and Guangquan Wang and Kaichu Xing}, title = {Service-Driven Shared QoS Orchestration for Satellite-Ground Integrated Networks}, booktitle = {TrustCom}, pages = {2005--2011}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00275}, doi = {10.1109/TRUSTCOM60117.2023.00275}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LinZWWX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Liu0WZW23, author = {Zimian Liu and Han Qiu and Rui Wang and Junhu Zhu and Qingxian Wang}, title = {Detecting {BGP} Anomalies based on Spatio-Temporal Feature Representation Model for Autonomous Systems}, booktitle = {TrustCom}, pages = {404--411}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00071}, doi = {10.1109/TRUSTCOM60117.2023.00071}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Liu0WZW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuLCZWMLY23, author = {Guangqi Liu and Jingqiang Lin and Dawei Chu and Xiaokun Zhang and Qiongxiao Wang and Cunqing Ma and Fengjun Li and Dingfeng Ye}, title = {Enhanced Ticket Transparency (eTT) Framework for Single Sign-On Services with Pseudonyms}, booktitle = {TrustCom}, pages = {730--739}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00108}, doi = {10.1109/TRUSTCOM60117.2023.00108}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiuLCZWMLY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuMT23, author = {Yanmei Liu and Pengwei Ma and Jiafeng Tian}, title = {Research on Technology and Industry Situation of Lakehouse}, booktitle = {TrustCom}, pages = {2198--2203}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00308}, doi = {10.1109/TRUSTCOM60117.2023.00308}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiuMT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuSYZW23, author = {Wen Liu and Degang Sun and Haitian Yang and He Zhu and Yan Wang}, title = {IAD-Net: Multivariate KPIs Interpretable Anomaly Detection with Dual Gated Residual Fusion Networks}, booktitle = {TrustCom}, pages = {686--693}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00103}, doi = {10.1109/TRUSTCOM60117.2023.00103}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiuSYZW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuWMLFLY23, author = {Guangqi Liu and Qiongxiao Wang and Cunqing Ma and Jingqiang Lin and Yanduo Fu and Bingyu Li and Dingfeng Ye}, title = {The Broken Verifying: Inspections at Verification Tools for Windows Code-Signing Signatures}, booktitle = {TrustCom}, pages = {804--813}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00117}, doi = {10.1109/TRUSTCOM60117.2023.00117}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiuWMLFLY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuYZQFZ23, author = {Jingyu Liu and Chunfang Yang and Ma Zhu and Baojun Qi and Xueyuan Fu and Mengyang Zhou}, title = {{MTD-RTPE:} {A} Malicious Traffic Detection Method Based on Relative Time-Delay Positional Encoding}, booktitle = {TrustCom}, pages = {694--703}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00104}, doi = {10.1109/TRUSTCOM60117.2023.00104}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiuYZQFZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuZWLL23, author = {Jifeng Liu and Yao Zhou and Cheng Wang and Yingnan Liu and Fuchang Li}, title = {Simulation of Space-borne Digital Phased Array Anntenna}, booktitle = {TrustCom}, pages = {1986--1990}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00271}, doi = {10.1109/TRUSTCOM60117.2023.00271}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiuZWLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LopezCCP23, author = {Jorge L{\'{o}}pez and Charalampos Chatzinakis and Marc Cartigny and Claude Poletti}, title = {Software defined networking flow admission and routing under minimal security constraints}, booktitle = {TrustCom}, pages = {2636--2643}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00368}, doi = {10.1109/TRUSTCOM60117.2023.00368}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LopezCCP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LuoC0L23, author = {Zhenkun Luo and Shuhong Chen and Guojun Wang and Hanjun Li}, title = {Two-Stage Smart Contract Vulnerability Detection Combining Semantic Features and Graph Features}, booktitle = {TrustCom}, pages = {257--264}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00054}, doi = {10.1109/TRUSTCOM60117.2023.00054}, timestamp = {Thu, 06 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LuoC0L23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LuoLOX23, author = {Xiuyi Luo and Chongrui Lu and Siyi Ouyang and Siyu Xia}, title = {Performance Evaluation of Flight Energy Consumption of UAVs in IRS-assisted {UAV} Systems}, booktitle = {TrustCom}, pages = {2770--2775}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00386}, doi = {10.1109/TRUSTCOM60117.2023.00386}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LuoLOX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LuoLYH23, author = {Shengyang Luo and Yaqi Liu and Xuehu Yan and Chao Huang}, title = {Cropping Resilient Secret Image Sharing Scheme with Lossless Recovery}, booktitle = {TrustCom}, pages = {1103--1110}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00152}, doi = {10.1109/TRUSTCOM60117.2023.00152}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LuoLYH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LvLXXCY23, author = {Kaiqi Lv and Weiguo Lin and Junfeng Xu and Wanshan Xu and Shuren Chen and Shengwei Yi}, title = {Generating Optimized Universal Adversarial Watermark for Preventing Face Deepfake}, booktitle = {TrustCom}, pages = {1586--1591}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00216}, doi = {10.1109/TRUSTCOM60117.2023.00216}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LvLXXCY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LyuMHQXCXWX23, author = {Feibi Lyu and Ning Meng and Yuhui Han and Jinjian Qiao and Zhipu Xie and Xinzhou Cheng and Lexi Xu and Zhaoning Wang and Guoping Xu}, title = {Proactive Operation and Maintenance for 5G Networks Based on Complaint Prediction}, booktitle = {TrustCom}, pages = {2128--2133}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00296}, doi = {10.1109/TRUSTCOM60117.2023.00296}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LyuMHQXCXWX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MaCXZLR23, author = {Wenrui Ma and Ying Cong and Haitao Xu and Fan Zhang and Zhao Li and Siqi Ren}, title = {Investigating Fraud and Misconduct in Legitimate Internet Economy based on Customer Complaints}, booktitle = {TrustCom}, pages = {394--403}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00070}, doi = {10.1109/TRUSTCOM60117.2023.00070}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/MaCXZLR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MaGL23, author = {Xuebin Ma and Shengyi Guan and Yanan Lang}, title = {Differential Privacy Frequent Closed Itemset Mining over Data Stream}, booktitle = {TrustCom}, pages = {865--872}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00124}, doi = {10.1109/TRUSTCOM60117.2023.00124}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/MaGL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MaJZJYWF23, author = {Chunyan Ma and Jun Jiang and Kai Zhang and Zhengwei Jiang and Peian Yang and Xuren Wang and Huamin Feng}, title = {FineCTI: {A} Framework for Mining Fine-grained Cyber Threat Information from Twitter Using {NER} Model}, booktitle = {TrustCom}, pages = {531--538}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00085}, doi = {10.1109/TRUSTCOM60117.2023.00085}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/MaJZJYWF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MaW23, author = {Pengwei Ma and Chaolun Wang}, title = {Research on the Construction of Information System Stability Guarantee Capability}, booktitle = {TrustCom}, pages = {2087--2091}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00289}, doi = {10.1109/TRUSTCOM60117.2023.00289}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/MaW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MacakOB23, author = {Martin Mac{\'{a}}k and Radek Oslejsek and Barbora Buhnova}, title = {Detecting Masquerading Traitors from Process Visualization of Computer Usage}, booktitle = {TrustCom}, pages = {1935--1940}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00263}, doi = {10.1109/TRUSTCOM60117.2023.00263}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/MacakOB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MakhdoomALFP23, author = {Imran Makhdoom and Mehran Abolhasan and Justin Lipman and Daniel Robert Franklin and Massimo Piccardi}, title = {I2Map: IoT Device Attestation Using Integrity Map}, booktitle = {TrustCom}, pages = {1900--1907}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00258}, doi = {10.1109/TRUSTCOM60117.2023.00258}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/MakhdoomALFP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MatosLVALKOB23, author = {Everton de Matos and Conor Lennon and Eduardo K. Viegas and Markku Ahvenj{\"{a}}rvi and Hannu Lyytinen and Ivan Kuznetsov and Joonas Onatsu and Anh Huy Bui}, title = {Integrating VirtIO and {QEMU} on seL4 for Enhanced Devices Virtualization Support}, booktitle = {TrustCom}, pages = {1076--1085}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00149}, doi = {10.1109/TRUSTCOM60117.2023.00149}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/MatosLVALKOB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MengWL23, author = {Fanqiang Meng and Jian Wang and Boxiong Li}, title = {A Cooperative Lane Change Method for Connected and Automated Vehicles Based on Reinforcement Learning}, booktitle = {TrustCom}, pages = {2152--2157}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00300}, doi = {10.1109/TRUSTCOM60117.2023.00300}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/MengWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MilnerMASMK23, author = {Helen Milner and Md. Redowan Mahmud and Mahbuba Afrin and Sashowta G. Siddhartha and Sajib Mistry and Aneesh Krishna}, title = {On-graph Machine Learning-based Fraud Detection in Ethereum Cryptocurrency Transactions}, booktitle = {TrustCom}, pages = {1279--1285}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00174}, doi = {10.1109/TRUSTCOM60117.2023.00174}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/MilnerMASMK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MitraTM23, author = {Shaswata Mitra and Stephen A. Torri and Sudip Mittal}, title = {Survey of Malware Analysis through Control Flow Graph using Machine Learning}, booktitle = {TrustCom}, pages = {1554--1561}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00212}, doi = {10.1109/TRUSTCOM60117.2023.00212}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/MitraTM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MokhtariONL23, author = {Nassim Mokhtari and Mohamed Outlouhou and Alexis N{\'{e}}d{\'{e}}lec and Pierre De Loor}, title = {Deep learning for graph analysis: application to online human activity recognition}, booktitle = {TrustCom}, pages = {2720--2726}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00379}, doi = {10.1109/TRUSTCOM60117.2023.00379}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/MokhtariONL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MouraC23, author = {Rafael Cabral de Moura and Lucia Catabriga}, title = {Stabilized Finite Element Approximation for The Transient Darcy-Brinkman-Forchheimer Model}, booktitle = {TrustCom}, pages = {2357--2364}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00332}, doi = {10.1109/TRUSTCOM60117.2023.00332}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/MouraC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MurilloMOS23, author = {Andr{\'{e}}s F. Murillo and Ayoub Messous and Andikan Otung and Motoyoshi Sekiya}, title = {Towards Trust-Centric Networking: {A} General Model for Trust Evaluation}, booktitle = {TrustCom}, pages = {704--711}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00105}, doi = {10.1109/TRUSTCOM60117.2023.00105}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/MurilloMOS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/NaYZWWLLL23, author = {Liu Na and Rui Yang and Zhicheng Zang and Yu Wang and Chao Wu and Xiaofei Li and Zhendong Li and Meng Li}, title = {A Big Data Sharing Architecture Based on Federal Learning in State Grid}, booktitle = {TrustCom}, pages = {2082--2086}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00288}, doi = {10.1109/TRUSTCOM60117.2023.00288}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/NaYZWWLLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/NabavirazaviTSI23, author = {Seyedsina Nabavirazavi and Rahim Taheri and Mohammad Shojafar and Sundararaja Sitharama Iyengar}, title = {Impact of Aggregation Function Randomization against Model Poisoning in Federated Learning}, booktitle = {TrustCom}, pages = {165--172}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00043}, doi = {10.1109/TRUSTCOM60117.2023.00043}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/NabavirazaviTSI23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/NagamatsuH23, author = {Naoki Nagamatsu and Yuko Hara{-}Azumi}, title = {Dynamic Split Computing-Aware Mixed-Precision Quantization for Efficient Deep Edge Intelligence}, booktitle = {TrustCom}, pages = {2538--2545}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00355}, doi = {10.1109/TRUSTCOM60117.2023.00355}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/NagamatsuH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/NakamuraSI23, author = {Toru Nakamura and Yukiko Sawaya and Takamasa Isohara}, title = {Survey on Recognition of Privacy Risk from Responding on Twitter}, booktitle = {TrustCom}, pages = {1774--1780}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00241}, doi = {10.1109/TRUSTCOM60117.2023.00241}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/NakamuraSI23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/NanQZTZL23, author = {Zhefeng Nan and Qian Qiang and Tianning Zang and Changbo Tian and Shuyuan Zhao and Shuhe Liu}, title = {Topology construction method of anti-tracking network based on cross-domain decentralized gravity model}, booktitle = {TrustCom}, pages = {512--521}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00083}, doi = {10.1109/TRUSTCOM60117.2023.00083}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/NanQZTZL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/NosykKD23, author = {Yevheniya Nosyk and Maciej Korczynski and Andrzej Duda}, title = {Guardians of {DNS} Integrity: {A} Remote Method for Identifying {DNSSEC} Validators Across the Internet}, booktitle = {TrustCom}, pages = {1470--1479}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00201}, doi = {10.1109/TRUSTCOM60117.2023.00201}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/NosykKD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/NosykKGKLD23, author = {Yevheniya Nosyk and Maciej Korczynski and Carlos Hernandez Ga{\~{n}}{\'{a}}n and Michal Kr{\'{o}}l and Qasim Lone and Andrzej Duda}, title = {Don't Get Hijacked: Prevalence, Mitigation, and Impact of Non-Secure {DNS} Dynamic Updates}, booktitle = {TrustCom}, pages = {1480--1489}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00202}, doi = {10.1109/TRUSTCOM60117.2023.00202}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/NosykKGKLD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/OliveiraSHVM23, author = {Paulo R. de Oliveira and Altair O. Santin and Pedro Horchulhack and Eduardo K. Viegas and Everton de Matos}, title = {A Dynamic Network-based Intrusion Detection Model for Industrial Control Systems}, booktitle = {TrustCom}, pages = {1496--1501}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00204}, doi = {10.1109/TRUSTCOM60117.2023.00204}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/OliveiraSHVM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/OnozawaFA23, author = {Takumi Onozawa and Hiroshi Fujimoto and Takuya Azumi}, title = {Model-based Development for {ROS} 2-based Autonomous-driving Software}, booktitle = {TrustCom}, pages = {2511--2519}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00352}, doi = {10.1109/TRUSTCOM60117.2023.00352}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/OnozawaFA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/PanQZWL23, author = {Hengyu Pan and Cheng Qu and Haowen Zhang and Shuo Wang and Jing Li}, title = {HyperChain: {A} Dynamic State Sharding Protocol Supporting Smart Contracts to Achieve Low Cross-Shard and Scalability}, booktitle = {TrustCom}, pages = {241--248}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00052}, doi = {10.1109/TRUSTCOM60117.2023.00052}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/PanQZWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/PanYLHJ23, author = {Huazheng Pan and Kun Yu and Junyi Le and Wenxin Hu and Taojun Jin}, title = {Unlocking the Potentials of Transcriptomics in Predicting Pan Cancer Immune Therapy Response: {A} Deep Learning Approach Using PHZNet}, booktitle = {TrustCom}, pages = {2742--2748}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00380}, doi = {10.1109/TRUSTCOM60117.2023.00380}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/PanYLHJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/PanYYWQ23, author = {Quanbo Pan and Yang Yu and Hanbing Yan and Maoli Wang and Bingzhi Qi}, title = {FlowBERT: An Encrypted Traffic Classification Model Based on Transformers Using Flow Sequence}, booktitle = {TrustCom}, pages = {133--140}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00039}, doi = {10.1109/TRUSTCOM60117.2023.00039}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/PanYYWQ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/PangCTVHB23, author = {Bozheng Pang and Tim Claeys and Kristof T'Jonck and Jens Vankeirsbilck and Hans Hallez and Jeroen Boydens}, title = {Simulation for Trade-off between Interference and Performance in a Bluetooth Low Energy Network}, booktitle = {TrustCom}, pages = {2488--2494}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00349}, doi = {10.1109/TRUSTCOM60117.2023.00349}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/PangCTVHB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/PangHAHZL23, author = {Fengling Pang and Chingfang Hsu and Man Ho Au and Lein Harn and Ze Zhang and Li Long}, title = {Efficient and Secure Authentication Key Establishment Protocol Using Chaotic Map and {PUF} in Smart Environments}, booktitle = {TrustCom}, pages = {849--856}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00122}, doi = {10.1109/TRUSTCOM60117.2023.00122}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/PangHAHZL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/PangVHB23, author = {Bozheng Pang and Jens Vankeirsbilck and Hans Hallez and Jeroen Boydens}, title = {Experimental Validation of Common Assumptions in Bluetooth Low Energy Interference Studies}, booktitle = {TrustCom}, pages = {2495--2502}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00350}, doi = {10.1109/TRUSTCOM60117.2023.00350}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/PangVHB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/PangWZJCZLZLW23, author = {Weiwei Pang and Kai Wei and Yihui Zhang and Chunyu Jiang and Yang Cheng and Qi Zhang and Bin Liu and Lifeng Zhang and Tingting Liu and Yinqian Wu}, title = {Research on Assessment System for Blockchain}, booktitle = {TrustCom}, pages = {2187--2192}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00306}, doi = {10.1109/TRUSTCOM60117.2023.00306}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/PangWZJCZLZLW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/PengPFXSJ23, author = {Haichuan Peng and Linning Peng and Hua Fu and Lingnan Xie and Junxian Shi and Wentao Jing}, title = {Channel-Robust Radio Frequency Fingerprint Identification for {LTE} Devices with Hybrid Feature}, booktitle = {TrustCom}, pages = {1416--1421}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00193}, doi = {10.1109/TRUSTCOM60117.2023.00193}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/PengPFXSJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/PengWW23, author = {Muyao Peng and Kun Wang and Yueli Wen}, title = {Pollutant Concentration Prediction Based on the Optimization of Long-Short Distance in Space}, booktitle = {TrustCom}, pages = {2615--2620}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00365}, doi = {10.1109/TRUSTCOM60117.2023.00365}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/PengWW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Perez-PiquerasB23, author = {V{\'{\i}}ctor P{\'{e}}rez{-}Piqueras and Pablo Bermejo and Jos{\'{e}} A. G{\'{a}}mez}, title = {Hybrid Multi-Objective Relinked {GRASP} for the constrained Next Release Problem}, booktitle = {TrustCom}, pages = {2349--2356}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00331}, doi = {10.1109/TRUSTCOM60117.2023.00331}, timestamp = {Wed, 05 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Perez-PiquerasB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/PhamWLMPH23, author = {Nhu Minh Ngoc Pham and Yixi Wu and Carson K. Leung and Mohammadafaz V. Munshi and Vrushil Kiritkumar Patel and Connor C. J. Hryhoruk}, title = {A Big Data Science and Engineering Solution for Transit Performance Analytics}, booktitle = {TrustCom}, pages = {2295--2302}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00324}, doi = {10.1109/TRUSTCOM60117.2023.00324}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/PhamWLMPH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/PimentelMY23, author = {Juliano Pimentel and Alistair A. McEwan and Hong Qing Yu}, title = {A Comprehensive Machine Learning Methodology for Embedded Systems {PHM}}, booktitle = {TrustCom}, pages = {1954--1959}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00266}, doi = {10.1109/TRUSTCOM60117.2023.00266}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/PimentelMY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/PlatzerY23, author = {Florian Platzer and York Yannikos}, title = {Trust Assessment of a Darknet Marketplace}, booktitle = {TrustCom}, pages = {1806--1813}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00245}, doi = {10.1109/TRUSTCOM60117.2023.00245}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/PlatzerY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/PooranianSARLL23, author = {Zahra Pooranian and Mohammad Shojafar and Pedram Asef and Matthew Robinson and Harry Lees and Mark Longden}, title = {{RCA-IDS:} {A} Novel Real-time Cloud-based Adversarial {IDS} for Connected Vehicles}, booktitle = {TrustCom}, pages = {495--503}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00081}, doi = {10.1109/TRUSTCOM60117.2023.00081}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/PooranianSARLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/PustozerovaBM23, author = {Anastasia Pustozerova and Jan Baumbach and Rudolf Mayer}, title = {Analysing Utility Loss in Federated Learning with Differential Privacy}, booktitle = {TrustCom}, pages = {1230--1235}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00167}, doi = {10.1109/TRUSTCOM60117.2023.00167}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/PustozerovaBM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/QiaoXMLCZXL23, author = {Jinjian Qiao and Guoping Xu and Ning Meng and Feibi Lyu and Xinzhou Cheng and Jiajia Zhu and Lexi Xu and Liang Liu}, title = {Research on Diagnosis System of 5G Data Service Latency Problem}, booktitle = {TrustCom}, pages = {2181--2186}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00305}, doi = {10.1109/TRUSTCOM60117.2023.00305}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/QiaoXMLCZXL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/QinFLLS23, author = {Zhongyuan Qin and Jiarong Fan and Zeru Li and Xujian Liu and Xin Sun}, title = {{CWGAN-GP:} Fuzzing Testcase Generation Method based on Conditional Generative Adversarial Network}, booktitle = {TrustCom}, pages = {1286--1293}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00175}, doi = {10.1109/TRUSTCOM60117.2023.00175}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/QinFLLS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/QuQA023, author = {Jiantao Qu and Chunyu Qi and Gaoyun An and He}, title = {Multi-step Prediction of {LTE-R} Communication Quality based on {CA-TCN} and Differential Evolution}, booktitle = {TrustCom}, pages = {1919--1924}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00261}, doi = {10.1109/TRUSTCOM60117.2023.00261}, timestamp = {Thu, 06 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/QuQA023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/RafiSM23, author = {Amir Rafi and Carlton Shepherd and Konstantinos Markantonakis}, title = {A First Look at Digital Rights Management Systems for Secure Mobile Content Delivery}, booktitle = {TrustCom}, pages = {549--558}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00087}, doi = {10.1109/TRUSTCOM60117.2023.00087}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/RafiSM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/RaiTM23, author = {Vikash Kumar Rai and Somanath Tripathy and Jimson Mathew}, title = {{LPA:} {A} Lightweight PUF-based Authentication Protocol for IoT System}, booktitle = {TrustCom}, pages = {1712--1717}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00233}, doi = {10.1109/TRUSTCOM60117.2023.00233}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/RaiTM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/RajeshDSS23, author = {Lochana Telugu Rajesh and Tapadhir Das and Raj Mani Shukla and Shamik Sengupta}, title = {Give and Take: Federated Transfer Learning for Industrial IoT Network Intrusion Detection}, booktitle = {TrustCom}, pages = {2365--2371}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00333}, doi = {10.1109/TRUSTCOM60117.2023.00333}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/RajeshDSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/RamamoorthyS023, author = {Jayanthi Ramamoorthy and Narasimha K. Shashidhar and Bing Zhou}, title = {Anomaly based malware threat detection on Linux Systems}, booktitle = {TrustCom}, pages = {1744--1750}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00237}, doi = {10.1109/TRUSTCOM60117.2023.00237}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/RamamoorthyS023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/RamezanianG23, author = {Sara Ramezanian and Christian Gehrmann}, title = {Practical Privacy-Preserving Ride Sharing Protocol with Symmetric Key}, booktitle = {TrustCom}, pages = {1718--1727}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00234}, doi = {10.1109/TRUSTCOM60117.2023.00234}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/RamezanianG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/RattiSN23, author = {Ritesh Ratti and Sanasam Ranbir Singh and Sukumar Nandi}, title = {Protocol Aware Unsupervised Network Intrusion Detection System}, booktitle = {TrustCom}, pages = {1524--1531}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00208}, doi = {10.1109/TRUSTCOM60117.2023.00208}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/RattiSN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/RattiSN23a, author = {Ritesh Ratti and Sanasam Ranbir Singh and Sukumar Nandi}, title = {Network based Intrusion Detection using Time aware {LSTM} Autoencoder}, booktitle = {TrustCom}, pages = {2570--2578}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00359}, doi = {10.1109/TRUSTCOM60117.2023.00359}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/RattiSN23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/RaultI023, author = {Pierre{-}Antoine Rault and Claudia{-}Lavinia Ignat and Olivier Perrin}, title = {Access Control based on CRDTs for Collaborative Distributed Applications}, booktitle = {TrustCom}, pages = {1369--1376}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00187}, doi = {10.1109/TRUSTCOM60117.2023.00187}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/RaultI023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/RegeciovaK23, author = {Dominika Reg{\'{e}}ciov{\'{a}} and Dusan Kol{\'{a}}r}, title = {GenRex: Leveraging Regular Expressions for Dynamic Malware Detection}, booktitle = {TrustCom}, pages = {857--864}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00123}, doi = {10.1109/TRUSTCOM60117.2023.00123}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/RegeciovaK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/RenLXW23, author = {Jie Ren and Lin Lin and Miao Xue and Zelin Wang}, title = {Application Scenarios of Confidential Computing in Satellite Internet}, booktitle = {TrustCom}, pages = {2024--2029}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00278}, doi = {10.1109/TRUSTCOM60117.2023.00278}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/RenLXW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/RenM0Y23, author = {Zhiwen Ren and Zehua Ma and Weiming Zhang and Nenghai Yu}, title = {{SPSW:} Database Watermarking Based on Fake Tuples and Sparse Priority Strategy}, booktitle = {TrustCom}, pages = {896--903}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00128}, doi = {10.1109/TRUSTCOM60117.2023.00128}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/RenM0Y23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ReyesHWP23, author = {David Pineda Reyes and Josiah Hsu and Claire Wagner and Devin J. Pohly}, title = {Dynamic Security Parameters for Multichannel Secret Sharing Protocols}, booktitle = {TrustCom}, pages = {1667--1672}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00227}, doi = {10.1109/TRUSTCOM60117.2023.00227}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ReyesHWP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Rodriguez-Iglesias23, author = {Alonso Rodr{\'{\i}}guez{-}Iglesias and Mar{\'{\i}}a J. Mart{\'{\i}}n and Juan Touri{\~{n}}o}, title = {Clupiter: a Raspberry Pi mini-supercomputer for educational purposes}, booktitle = {TrustCom}, pages = {2400--2405}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00338}, doi = {10.1109/TRUSTCOM60117.2023.00338}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Rodriguez-Iglesias23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/RongaliMN23, author = {Bhaskar Rongali and Satyajit Mohapatra and Sanjeet Kumar Nayak}, title = {A Secure Contactless Payment System with Bidirectional Blockchain and Blake Hash Function}, booktitle = {TrustCom}, pages = {318--325}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00061}, doi = {10.1109/TRUSTCOM60117.2023.00061}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/RongaliMN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/RuhlandKS23, author = {Fabian Ruhland and Filip Krakowski and Michael Sch{\"{o}}ttner}, title = {Transparent network acceleration for big data computing in Java}, booktitle = {TrustCom}, pages = {2406--2413}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00339}, doi = {10.1109/TRUSTCOM60117.2023.00339}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/RuhlandKS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Saadat23, author = {Shahriar Saadat}, title = {The Impact of {EMI} on Security Access Control in Datacenter Data Halls}, booktitle = {TrustCom}, pages = {1400--1407}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00191}, doi = {10.1109/TRUSTCOM60117.2023.00191}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Saadat23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SachidanandaMYL23, author = {Vinay Sachidananda and Sivaanandh Muneeswaran and Liu Yang and Kwok{-}Yan Lam}, title = {Do NoT Open {(DOT):} {A} Unified Generic and Specialized Models for Detecting Malicious Email Attachments}, booktitle = {TrustCom}, pages = {412--421}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00072}, doi = {10.1109/TRUSTCOM60117.2023.00072}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SachidanandaMYL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SahiLKSMAF23, author = {Louis Fortune Sahi and Romain Laborde and Mohamed Ali Kandi and Michelle Sibilla and Giorgia Macilotti and Benzekri Abdelmalek and Afonso Ferreira}, title = {Towards Reliable Collaborative Data Processing Ecosystems: Survey on Data Quality Criteria}, booktitle = {TrustCom}, pages = {2456--2464}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00345}, doi = {10.1109/TRUSTCOM60117.2023.00345}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SahiLKSMAF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Saint-JoreSC23, author = {Amaury Saint{-}Jore and Ye{-}Qiong Song and Laurent Ciarletta}, title = {{HMAS:} enabling seamless collaboration between drones, quadruped robots, and human operators with efficient spatial awareness}, booktitle = {TrustCom}, pages = {2503--2510}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00351}, doi = {10.1109/TRUSTCOM60117.2023.00351}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Saint-JoreSC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SakaAS23, author = {Samed Saka and Ali Al{-}Ataby and Valerio Selis}, title = {Generating Synthetic Tabular Data for DDoS Detection Using Generative Models}, booktitle = {TrustCom}, pages = {1436--1442}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00196}, doi = {10.1109/TRUSTCOM60117.2023.00196}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SakaAS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SandaPV23, author = {Pranitha Sanda and Digambar Pawar and Radha Vedala}, title = {WiDeS: Wiping Detection using System-calls - An Anti-Forensic Resistant Approach}, booktitle = {TrustCom}, pages = {1695--1703}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00231}, doi = {10.1109/TRUSTCOM60117.2023.00231}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SandaPV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SandeepaS0L23, author = {Chamara Sandeepa and Bartlomiej Siniarski and Shen Wang and Madhusanka Liyanage}, title = {{FL-TIA:} Novel Time Inference Attacks on Federated Learning}, booktitle = {TrustCom}, pages = {173--180}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00044}, doi = {10.1109/TRUSTCOM60117.2023.00044}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SandeepaS0L23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SarkerSB23, author = {Orvila Sarker and Hong Shen and M. Ali Babar}, title = {Reinforcement Learning Based Neighbour Selection for {VANET} with Adaptive Trust Management}, booktitle = {TrustCom}, pages = {585--594}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00091}, doi = {10.1109/TRUSTCOM60117.2023.00091}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SarkerSB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Shahzad0B23, author = {Mohammad Shahzad and Lu Liu and Nacer Belkout}, title = {Control Overhead Reduction using Length-based Same Destination Aggregation for Large Scale Software Defined Networks in Next Generation Internet of Things}, booktitle = {TrustCom}, pages = {2303--2309}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00325}, doi = {10.1109/TRUSTCOM60117.2023.00325}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Shahzad0B23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ShangLHQLF23, author = {Ketong Shang and Fang Lu and Ke Huang and Yu Qin and Wei Li and Wei Feng}, title = {Cluster Nodes Integrity Attestation and Monitoring Scheme for Confidential Computing Platform}, booktitle = {TrustCom}, pages = {740--749}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00109}, doi = {10.1109/TRUSTCOM60117.2023.00109}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ShangLHQLF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ShatiHD23, author = {Asmaa Shati and Ghulam Mubashar Hassan and Amitava Datta}, title = {{COVID-19} Detection System: {A} Comparative Analysis of System Performance Based on Acoustic Features of Cough Audio Signals}, booktitle = {TrustCom}, pages = {2706--2713}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00377}, doi = {10.1109/TRUSTCOM60117.2023.00377}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ShatiHD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/She0W23, author = {Jinze She and Wenhao Wang and Zihao Wang}, title = {The Dynamic Paradox: How Layer-skipping DNNs Amplify Cache Side-Channel Leakages}, booktitle = {TrustCom}, pages = {46--53}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00029}, doi = {10.1109/TRUSTCOM60117.2023.00029}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/She0W23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SheikhjaberiA23, author = {Mehrdad Sheikhjaberi and Dima Alhadidi}, title = {Reducing Model Memorization to Mitigate Membership Inference Attacks}, booktitle = {TrustCom}, pages = {79--88}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00033}, doi = {10.1109/TRUSTCOM60117.2023.00033}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SheikhjaberiA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ShenF23, author = {Chenkai Shen and Lei Fan}, title = {Pldb: Protecting LSM-based Key-Value Store using Trusted Execution Environment}, booktitle = {TrustCom}, pages = {762--771}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00111}, doi = {10.1109/TRUSTCOM60117.2023.00111}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ShenF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ShenWYCSGLFLL23, author = {Jinhu Shen and Rui Wang and Mingjie Yang and Liang Cui and Ao Shen and Bao Guo and Jiayu Li and Yuan Fang and Pengcheng Liu and Jimin Ling}, title = {RedCap In-depth Research and Market Development Prospect}, booktitle = {TrustCom}, pages = {2036--2041}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00280}, doi = {10.1109/TRUSTCOM60117.2023.00280}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ShenWYCSGLFLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ShiD23, author = {Quan Shi and Kaiyuan Deng}, title = {Privacy-Preserving Detection Method for Transmission Line Based on Edge Collaboration}, booktitle = {TrustCom}, pages = {1798--1805}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00244}, doi = {10.1109/TRUSTCOM60117.2023.00244}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ShiD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Sibahee0ZHA23, author = {Mustafa A. Al Sibahee and Chengwen Luo and Jin Zhang and Yijing Huang and Zaid Ameen Abduljabbar}, title = {Dynamic Searchable Scheme with Forward Privacy for Encrypted Document Similarity}, booktitle = {TrustCom}, pages = {1653--1660}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00225}, doi = {10.1109/TRUSTCOM60117.2023.00225}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Sibahee0ZHA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SongLLQWF23, author = {Wanying Song and Ying Lu and Jin Liu and Zilu Qin and Xiaodan Wang and Yanfang Fu}, title = {Research on {UAV} Obstacle Avoidance Method Based on Virtual-real Combination Technology}, booktitle = {TrustCom}, pages = {2776--2780}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00387}, doi = {10.1109/TRUSTCOM60117.2023.00387}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SongLLQWF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SongYZYL23, author = {Bo Song and Yunpeng Yi and Ting Zhou and Junfeng Yang and Lei Liu}, title = {Undermining License Plate Recognition: {A} Data Poisoning Attack}, booktitle = {TrustCom}, pages = {72--78}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00032}, doi = {10.1109/TRUSTCOM60117.2023.00032}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SongYZYL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Spalding0B23, author = {Aidan Spalding and Zhiyuan Tan and Kehinde O. Babaagba}, title = {Challenges and Considerations in Data Recovery from Solid State Media: {A} Comparative Analysis with Traditional Devices}, booktitle = {TrustCom}, pages = {1751--1756}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00238}, doi = {10.1109/TRUSTCOM60117.2023.00238}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Spalding0B23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Spanier0H23, author = {Adam Spanier and Rui Zhao and Pei{-}Chi Huang}, title = {Securing Zero Trust Networks: the Decentralized Host-to-Host Authentication Policy Enforcement}, booktitle = {TrustCom}, pages = {1518--1523}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00207}, doi = {10.1109/TRUSTCOM60117.2023.00207}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Spanier0H23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SrivastavaAC23, author = {Sandeep Srivastava and Deepshikha Agarwal and Brijesh Chaurasia}, title = {Secure Decentralized Identity Management using Blockchain}, booktitle = {TrustCom}, pages = {1355--1360}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00185}, doi = {10.1109/TRUSTCOM60117.2023.00185}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SrivastavaAC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SuBZ23, author = {Jingwen Su and Xiangyu Bai and Kexin Zhou}, title = {Analysis and Comparison of Delay Tolerant Network Security Issues and Solutions}, booktitle = {TrustCom}, pages = {1512--1517}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00206}, doi = {10.1109/TRUSTCOM60117.2023.00206}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SuBZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SuLGL0H23, author = {Liuxing Su and Zhenzhen Li and Gaopeng Gou and Zhen Li and Gang Xiong and Chengshang Hou}, title = {{MENDER:} Multi-level Feature Fusion Discovery Framework for Exposed {ICS} Remote Management Devices in the Wild}, booktitle = {TrustCom}, pages = {1173--1180}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00160}, doi = {10.1109/TRUSTCOM60117.2023.00160}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SuLGL0H23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SuW23, author = {Lingvue Su and Yongli Wang}, title = {High-knowledge shilling attack detection method based on genetic co-forest}, booktitle = {TrustCom}, pages = {660--667}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00100}, doi = {10.1109/TRUSTCOM60117.2023.00100}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SuW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SuWGL23, author = {Linlin Su and Jinyan Wang and Zeming Gan and Xianxian Li}, title = {{FINDER:} {A} Simple and Effective Defender against Unnoticeable Graph Injection Attacks}, booktitle = {TrustCom}, pages = {125--132}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00038}, doi = {10.1109/TRUSTCOM60117.2023.00038}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SuWGL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SunPLST23, author = {Bowen Sun and Xin Peng and Saisai Li and Jiaxin Sun and Haochuan Tian}, title = {Ergonomic Design of Precise Percutaneous Robot for Substantial Organs Based on {JACK} Simulation}, booktitle = {TrustCom}, pages = {2755--2762}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00384}, doi = {10.1109/TRUSTCOM60117.2023.00384}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SunPLST23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SunWLF0023, author = {Xiuwen Sun and Zhihao Wu and Jing Lin and Pengfei Fu and Jie Cui and Hong Zhong}, title = {Extracting Length Field of Unknown Binary Network Protocol from Static Trace}, booktitle = {TrustCom}, pages = {462--469}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00077}, doi = {10.1109/TRUSTCOM60117.2023.00077}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SunWLF0023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SunXWWLZL23, author = {Degang Sun and Guokun Xu and Weijie Wang and Yan Wang and Qiujian Lv and Xinxing Zhou and Zhiqi Li}, title = {{LWVN:} {A} Lightweight Virtual Network View Method to Defend Lateral Movement}, booktitle = {TrustCom}, pages = {1214--1221}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00165}, doi = {10.1109/TRUSTCOM60117.2023.00165}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SunXWWLZL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SunZWY0023, author = {Xiuwen Sun and Guangzheng Zhang and Di Wu and Qingying Yu and Jie Cui and Hong Zhong}, title = {Parallel Pattern Matching over Brotli Compressed Network Traffic}, booktitle = {TrustCom}, pages = {477--484}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00079}, doi = {10.1109/TRUSTCOM60117.2023.00079}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SunZWY0023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TajimaMA23, author = {Yuta Tajima and Tatsuya Miki and Takuya Azumi}, title = {Performance Evaluation Framework for Arbitrary Nodes of Autonomous-driving Systems}, booktitle = {TrustCom}, pages = {2520--2529}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00353}, doi = {10.1109/TRUSTCOM60117.2023.00353}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/TajimaMA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TamimeFSM023, author = {Reham Al Tamime and Ali Farooq and Joni Salminen and Vincent Marmion and Wendy Hall}, title = {Understanding Privacy Concerns in Mobile Health Applications: {A} Scenario-based Online Survey}, booktitle = {TrustCom}, pages = {1757--1765}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00239}, doi = {10.1109/TRUSTCOM60117.2023.00239}, timestamp = {Thu, 06 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/TamimeFSM023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TangZZFJ23, author = {Xin Tang and Yiteng Zhou and Yudan Zhu and Mingjun Fu and Luchao Jin}, title = {Random Chunks Generation Attack Resistant Cross-User Deduplication for Cloud Storage}, booktitle = {TrustCom}, pages = {1022--1030}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00143}, doi = {10.1109/TRUSTCOM60117.2023.00143}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/TangZZFJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TengLQPF23, author = {Yiping Teng and Lei Liu and Jiawei Qi and Haochun Pan and Chunlong Fan}, title = {VMR-Tree: Efficient and Verifiable Location-based kNN Queries on Blockchain}, booktitle = {TrustCom}, pages = {342--351}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00064}, doi = {10.1109/TRUSTCOM60117.2023.00064}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/TengLQPF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TengQLWXF23, author = {Yiping Teng and Jiawei Qi and Lei Liu and Shiqing Wang and Li Xu and Chunlong Fan}, title = {Secure Synchronized Spatio-Temporal Trajectory Similarity Search}, booktitle = {TrustCom}, pages = {964--973}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00136}, doi = {10.1109/TRUSTCOM60117.2023.00136}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/TengQLWXF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TianGJLF023, author = {Tian Tian and Yiru Gong and Bo Jiang and Junrong Liu and Huamin Feng and Zhigang Lu}, title = {Insider Threat Detection Based On Heterogeneous Graph Neural Network}, booktitle = {TrustCom}, pages = {628--635}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00096}, doi = {10.1109/TRUSTCOM60117.2023.00096}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/TianGJLF023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TianLLWK23, author = {Cheng Tian and Song Liu and Jinbao Li and Guangchen Wang and Luyue Kong}, title = {A residual attention-based privacy-preserving biometrics model of transcriptome prediction from genome}, booktitle = {TrustCom}, pages = {2781--2788}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00388}, doi = {10.1109/TRUSTCOM60117.2023.00388}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/TianLLWK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TianMWW23, author = {Jiafeng Tian and Pengwei Ma and Chaolun Wang and Zhuo Wang}, title = {Research on Development of Data Disaster Recovery System}, booktitle = {TrustCom}, pages = {2210--2215}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00310}, doi = {10.1109/TRUSTCOM60117.2023.00310}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/TianMWW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TianRXFGH23, author = {Geng Tian and Amir Rehman and Huanlai Xing and Li Feng and Nighat Gulzar and Abid Hussain}, title = {Automatic Intelligent Chronic Kidney Disease Detection in Healthcare 5.0}, booktitle = {TrustCom}, pages = {2134--2140}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00297}, doi = {10.1109/TRUSTCOM60117.2023.00297}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/TianRXFGH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TidreaK23, author = {Alexandra Tidrea and Adrian Korodi}, title = {{ECC} Implementation and Performance Evaluation for Securing {OPC} {UA} Communication}, booktitle = {TrustCom}, pages = {1704--1711}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00232}, doi = {10.1109/TRUSTCOM60117.2023.00232}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/TidreaK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TrivediB23, author = {Alok Kumar Trivedi and Priyanka Bagade}, title = {{PANGA:} Attention-based Principal Neighborhood Aggregation for Forecasting Future Cyber Attacks}, booktitle = {TrustCom}, pages = {569--576}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00089}, doi = {10.1109/TRUSTCOM60117.2023.00089}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/TrivediB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Tusko0L23, author = {Gergely Tusk{\'{o}} and Weizhi Meng and Brooke Lampe}, title = {Look Closer to Touch Behavior-enabled Android Pattern Locks: {A} Study in the Wild}, booktitle = {TrustCom}, pages = {1196--1205}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00163}, doi = {10.1109/TRUSTCOM60117.2023.00163}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Tusko0L23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/VeltmanPM23, author = {Melker Veltman and Alexandra Parkegren and Victor Morel}, title = {Putting a Padlock on Lambda - Integrating vTPMs into {AWS} Firecracker}, booktitle = {TrustCom}, pages = {1377--1384}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00188}, doi = {10.1109/TRUSTCOM60117.2023.00188}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/VeltmanPM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/VilalongaRD23, author = {Jo{\~{a}}o Afonso Vilalonga and Jo{\~{a}}o S. Resende and Henrique Domingos}, title = {TorKameleon: Improving Tor's Censorship Resistance with K-anonymization and Media-based Covert Channels}, booktitle = {TrustCom}, pages = {1490--1495}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00203}, doi = {10.1109/TRUSTCOM60117.2023.00203}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/VilalongaRD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/VyasPS23, author = {Sankalp Vyas and Amar Nath Patra and Raj Mani Shukla}, title = {Histopathological Image Classification and Vulnerability Analysis using Federated Learning}, booktitle = {TrustCom}, pages = {2372--2377}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00334}, doi = {10.1109/TRUSTCOM60117.2023.00334}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/VyasPS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Wang0C0W23, author = {Xiaoqian Wang and Cheng Wang and Yuqian Cai and Xiaoyan Zhao and Weidong Wang}, title = {Coexistence Analysis of 10-10.5 GHz {IMT} and {EESS} (passive) Systems}, booktitle = {TrustCom}, pages = {1999--2004}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00274}, doi = {10.1109/TRUSTCOM60117.2023.00274}, timestamp = {Thu, 06 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Wang0C0W23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangCLWSF23, author = {Meiqi Wang and Muqian Chen and Zeyu Li and Xuebin Wang and Jinqiao Shi and Binxing Fang}, title = {Deanonymize Tor Hidden Services Using Remote Website Fingerprinting}, booktitle = {TrustCom}, pages = {998--1005}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00140}, doi = {10.1109/TRUSTCOM60117.2023.00140}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangCLWSF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangCOLCGLBWL23, author = {Shoufeng Wang and Hua{-}Min Chen and Ye Ouyang and Fan Li and Xuan Chen and Jianchao Guo and Yun Li and Sen Bian and Xidong Wang and You Lu}, title = {Elastic Digital Twin Network Modeling toward Restraining Resource Occupation}, booktitle = {TrustCom}, pages = {2240--2245}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00315}, doi = {10.1109/TRUSTCOM60117.2023.00315}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangCOLCGLBWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangCOLCGLBWR23, author = {Shoufeng Wang and Hua{-}Min Chen and Ye Ouyang and Fan Li and Xuan Chen and Jianchao Guo and Yun Li and Sen Bian and Xidong Wang and Zhidong Ren}, title = {Constellation Autonomy Modeling for Agile on-Orbit Communication and Computing}, booktitle = {TrustCom}, pages = {2012--2017}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00276}, doi = {10.1109/TRUSTCOM60117.2023.00276}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangCOLCGLBWR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangCOLCMLBR23, author = {Shoufeng Wang and Hua{-}Min Chen and Ye Ouyang and Fan Li and Xuan Chen and Limeng Ma and Zhanwu Li and Sen Bian and Zhidong Ren}, title = {Evaluation of Distributed Collaborative Learning Approach for 5G Network Data Analytics Function}, booktitle = {TrustCom}, pages = {2058--2063}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00284}, doi = {10.1109/TRUSTCOM60117.2023.00284}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangCOLCMLBR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangFZLL23, author = {Liming Wang and Jiaxing Fan and Fengzhe Zhong and Yan Liu and Jinyang Liu}, title = {Anomaly Detection in Dynamic Networks through Edge-Tight Structure Embedding}, booktitle = {TrustCom}, pages = {644--651}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00098}, doi = {10.1109/TRUSTCOM60117.2023.00098}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangFZLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangGCWXWWML23, author = {Yue Wang and Wei Gao and Xinzhou Cheng and Xin Wang and Lexi Xu and Siwei Wang and Yuanguang Wang and Fanyu Meng and Kunyan Li}, title = {User Relationship Discovery Based on Telecom Data}, booktitle = {TrustCom}, pages = {2076--2081}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00287}, doi = {10.1109/TRUSTCOM60117.2023.00287}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangGCWXWWML23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangGCWZXX23, author = {Yue Wang and Wei Gao and Xinzhou Cheng and Xin Wang and Huiying Zhao and Zhipu Xie and Lexi Xu}, title = {Multi-Granularity Cross-Attention Network for Visual Question Answering}, booktitle = {TrustCom}, pages = {2098--2103}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00291}, doi = {10.1109/TRUSTCOM60117.2023.00291}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangGCWZXX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangHSWLW23, author = {Lianhai Wang and Qihao Huang and Wei Shao and Jinpeng Wang and Xiaoqian Liu and Fansheng Wang}, title = {Felix: {A} Model of Detecting Off-chain Abnormal States in Decentralized Applications}, booktitle = {TrustCom}, pages = {275--283}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00056}, doi = {10.1109/TRUSTCOM60117.2023.00056}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangHSWLW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangHYZ23, author = {Jinning Wang and Xinyuan Huang and Zichu Yang and Weiran Zhao}, title = {Construction of Artificial Intelligence Generated Content in Digital Film Production}, booktitle = {TrustCom}, pages = {2621--2628}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00366}, doi = {10.1109/TRUSTCOM60117.2023.00366}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangHYZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangHZCGZYCC23, author = {Tianyi Wang and Yuhui Han and Wei Zhang and Xinzhou Cheng and Jie Gao and Qingqing Zhang and Qijiao Yang and Fengqiang Chen and Chen Cheng}, title = {Address Localization Method Based on Data Fusion of Core Network and Radio Access Network}, booktitle = {TrustCom}, pages = {2263--2268}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00319}, doi = {10.1109/TRUSTCOM60117.2023.00319}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangHZCGZYCC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangLSHWSX23, author = {Hao Wang and Yun Liu and Zhiqun Song and Bing Hu and Zikai Wang and Ruiliang Song and Pei Xiao}, title = {A Low Complexity And Efficient Algorithm for {LEO} Satellite Routing}, booktitle = {TrustCom}, pages = {1974--1979}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00269}, doi = {10.1109/TRUSTCOM60117.2023.00269}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangLSHWSX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangLV23, author = {Chenzhuo Wang and Yanrong Lu and Athanasios V. Vasilakos}, title = {Scalable Federated Learning for Fingerprint Recognition Algorithm}, booktitle = {TrustCom}, pages = {181--188}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00045}, doi = {10.1109/TRUSTCOM60117.2023.00045}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangLV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangLZXWL23, author = {Haonan Wang and Lixiang Liu and Xin Zhou and Lexi Xu and Guangyang Wu and Shuaijun Liu}, title = {Deep Reinforcement Learning Based Interference Avoidance Beam-Hopping Allocation Algorithm in Multi-beam Satellite Systems}, booktitle = {TrustCom}, pages = {1966--1973}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00268}, doi = {10.1109/TRUSTCOM60117.2023.00268}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangLZXWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangS0LWY23, author = {Fangwei Wang and Ruixin Song and Zhiyuan Tan and Qingru Li and Changguang Wang and Yong Yang}, title = {Self-attention is What You Need to Fool a Speaker Recognition System}, booktitle = {TrustCom}, pages = {929--936}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00132}, doi = {10.1109/TRUSTCOM60117.2023.00132}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangS0LWY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangT0TYW023, author = {Jinzhao Wang and Wenlong Tian and Ruixuan Li and Junwei Tang and Xuming Ye and Yaping Wan and Zhiyong Xu}, title = {Sym-Fed: Unleashing the Power of Symmetric Encryption in Cross-Silo Federated Learning}, booktitle = {TrustCom}, pages = {833--840}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00120}, doi = {10.1109/TRUSTCOM60117.2023.00120}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangT0TYW023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangWL23, author = {Hanyu Wang and Liming Wang and Hongjia Li}, title = {Byzantine-Robust Federated Learning through Dynamic Clustering}, booktitle = {TrustCom}, pages = {222--230}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00050}, doi = {10.1109/TRUSTCOM60117.2023.00050}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangWZ23, author = {Xingyu Wang and Wenkun and Yingdan Zhang}, title = {Network Attack Identification and Analysis Based on Graph Convolutional Neural Network}, booktitle = {TrustCom}, pages = {1443--1448}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00197}, doi = {10.1109/TRUSTCOM60117.2023.00197}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangWZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangXYW23, author = {Zhixuan Wang and Guangping Xu and Hongzhang Yang and Yulei Wu}, title = {Towards Survivable In-Memory Stores with Parity Coded {NVRAM}}, booktitle = {TrustCom}, pages = {956--963}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00135}, doi = {10.1109/TRUSTCOM60117.2023.00135}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangXYW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangYHMLM23, author = {Chaolun Wang and Jiaxing Yang and Xiaolu Han and Jianrui Ma and Siyuan Liu and Pengwei Ma}, title = {Research on Distributed Database Stability Testing Platform based on Chaos Engineering}, booktitle = {TrustCom}, pages = {2092--2097}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00290}, doi = {10.1109/TRUSTCOM60117.2023.00290}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangYHMLM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangZ0CLXQZX23, author = {Zhaoning Wang and Jiajia Zhu and Bo Cheng and Xinzhou Cheng and Feibi Lyu and Guoping Xu and Jinjian Qiao and Lu Zhi and Tian Xiao}, title = {An AI-driven Dockerized Lightweight Framework for Smart Home Service Orchestration}, booktitle = {TrustCom}, pages = {2122--2127}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00295}, doi = {10.1109/TRUSTCOM60117.2023.00295}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangZ0CLXQZX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangZLY23, author = {Jiuzheng Wang and Ruilin Zhang and Xinyi Li and Hao Yin}, title = {FedJudge: Blockchain-based full-lifecycle trustworthy federated learning incentive mechanism}, booktitle = {TrustCom}, pages = {361--368}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00066}, doi = {10.1109/TRUSTCOM60117.2023.00066}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangZLY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangZS0LB23, author = {Haoxiang Wang and Yu'Ang Zhang and Yujie Song and Yue Cao and Chee Yen Leow and Shihan Bao}, title = {{SRBR:} Anti-selfish Routing Based on Social Similarity and Reputation Using Fuzzy Logic}, booktitle = {TrustCom}, pages = {577--584}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00090}, doi = {10.1109/TRUSTCOM60117.2023.00090}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangZS0LB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WaniZS23, author = {Shusuke Wani and Xiaokang Zhou and Shohei Shimizu}, title = {BiLSTM and {VAE} Enhanced Multi-Task Neural Network for Trust-Aware E-Commerce Product Analysis}, booktitle = {TrustCom}, pages = {780--787}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00114}, doi = {10.1109/TRUSTCOM60117.2023.00114}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WaniZS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WeiL23, author = {Yinzhen Wei and Shuo Lu}, title = {Android Malicious Application Detection Based on Improved Mayfly Algorithm}, booktitle = {TrustCom}, pages = {1845--1852}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00250}, doi = {10.1109/TRUSTCOM60117.2023.00250}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WeiL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WenLP23, author = {Qi Wen and Carson K. Leung and Adam G. M. Pazdor}, title = {Personalized Privacy-Preserving Semi-Centralized Recommendation System in a Trust-Based Agent Network}, booktitle = {TrustCom}, pages = {2644--2651}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00369}, doi = {10.1109/TRUSTCOM60117.2023.00369}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WenLP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WijethilakaYBL23, author = {Shalitha Wijethilaka and Awaneesh Kumar Yadav and An Braeken and Madhusanka Liyanage}, title = {A Novel Blockchain-based Decentralized Multi-party Certificate Management Framework}, booktitle = {TrustCom}, pages = {1361--1368}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00186}, doi = {10.1109/TRUSTCOM60117.2023.00186}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WijethilakaYBL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Wu0GNJX23, author = {Tingting Wu and Wei Yu and Manxue Guo and Wenjing Nie and Zimeng Jia and Lun Xin}, title = {Communication Efficient Federated Learning Based on Combination of Structural Sparsification and Hybrid Quantization Sensing}, booktitle = {TrustCom}, pages = {2690--2697}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00375}, doi = {10.1109/TRUSTCOM60117.2023.00375}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Wu0GNJX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WuC0WL23, author = {Jianming Wu and Shuhong Chen and Guojun Wang and Hao Wang and Hanjun Li}, title = {Multi-Scale Feature Aggregation for Rumor Detection: Unveiling the Truth within Text}, booktitle = {TrustCom}, pages = {1086--1093}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00150}, doi = {10.1109/TRUSTCOM60117.2023.00150}, timestamp = {Thu, 06 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WuC0WL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WuHYCGL23, author = {Peng Wu and Chengzhuo Han and Tao Yan and Lu Chen and Tianhao Guo and Zhi Li}, title = {{SSF-EDZL} Scheduling Algorithm on Heterogeneous Multiprocessors}, booktitle = {TrustCom}, pages = {2052--2057}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00283}, doi = {10.1109/TRUSTCOM60117.2023.00283}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WuHYCGL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XiaoYLXZAZSZ23, author = {Anyan Xiao and Zhuo Yan and Zheng Li and Huangxin Xu and Huixuan Zheng and Yujie Ai and Xiaocong Zhang and Qixuan Sun and Changyu Zhao}, title = {An Improved Lightweight Linear K-value Transformer}, booktitle = {TrustCom}, pages = {2246--2250}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00316}, doi = {10.1109/TRUSTCOM60117.2023.00316}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/XiaoYLXZAZSZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XingMXWZLFX23, author = {Huanlai Xing and Huaming Ma and Zhiwen Xiao and Xinhan Wang and Bowen Zhao and Shouxi Luo and Li Feng and Lexi Xu}, title = {On {ECG} Signal Classification: An NAS-empowered Semantic Communication System}, booktitle = {TrustCom}, pages = {470--476}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00078}, doi = {10.1109/TRUSTCOM60117.2023.00078}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/XingMXWZLFX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XingZY0LGYX23, author = {Ying Xing and Mengci Zhao and Bin Yang and Yuwei Zhang and Wenjin Li and Jiawei Gu and Jun Yuan and Lexi Xu}, title = {Vulnerability Name Prediction Based on Enhanced Multi-Source Domain Adaptation}, booktitle = {TrustCom}, pages = {2115--2121}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00294}, doi = {10.1109/TRUSTCOM60117.2023.00294}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/XingZY0LGYX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Xu0023, author = {Min Xu and Xiaoding Wang and Hui Lin}, title = {{IHFBF:} {A} High-Performance Blockchain Framework for Improving Hyperledger Fabric Permissioned Chain}, booktitle = {TrustCom}, pages = {300--306}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00059}, doi = {10.1109/TRUSTCOM60117.2023.00059}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Xu0023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Xu0WDT23, author = {Wenlin Xu and Tong Li and Jinsong Wang and Haibo Duan and Yahui Tang}, title = {Software Vulnerabilities Detection Based on a Pre-trained Language Model}, booktitle = {TrustCom}, pages = {904--911}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00129}, doi = {10.1109/TRUSTCOM60117.2023.00129}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Xu0WDT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XuF0YS023, author = {Yuwei Xu and Xiaotian Fang and Jie Cao and Rou Yu and Kehui Song and Guang Cheng}, title = {Cerberus: Efficient {OSPS} Traffic Identification through Multi-Task Learning}, booktitle = {TrustCom}, pages = {504--511}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00082}, doi = {10.1109/TRUSTCOM60117.2023.00082}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/XuF0YS023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XuLLBW23, author = {Liwen Xu and Xiang Lin and Jianhua Li and Min Bai and Liejun Wang}, title = {HiSec: Towards Cyber Threat Correlation and Discovery Based on Hierarchical Graph Neural Networks}, booktitle = {TrustCom}, pages = {369--378}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00067}, doi = {10.1109/TRUSTCOM60117.2023.00067}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/XuLLBW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XuWZLY23, author = {Zhenan Xu and Jiuzheng Wang and Cong Zha and Xinyi Li and Hao Yin}, title = {SmartLLM: {A} New Oracle System for Smart Contracts Calling Large Language Models}, booktitle = {TrustCom}, pages = {2668--2675}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00372}, doi = {10.1109/TRUSTCOM60117.2023.00372}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/XuWZLY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XuXCJW23, author = {Mingdi Xu and Bo Xie and Feng Cui and Chaoyang Jin and Yu Wang}, title = {{SQL} injection attack sample generation based on {IE-GAN}}, booktitle = {TrustCom}, pages = {1014--1021}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00142}, doi = {10.1109/TRUSTCOM60117.2023.00142}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/XuXCJW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XuZBWS023, author = {Yuwei Xu and Zizhi Zhu and Yunpeng Bai and Lilanyi Wu and Kehui Song and Guang Cheng}, title = {SharpEye: Identify mKCP Camouflage Traffic through Feature Optimization}, booktitle = {TrustCom}, pages = {1157--1164}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00158}, doi = {10.1109/TRUSTCOM60117.2023.00158}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/XuZBWS023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XuZS023, author = {Yuwei Xu and Ying Zhang and Haonan Shi and Jie Cao}, title = {ChainPass: {A} Privacy-preserving Complete Cross-chain Authentication for Consortium Blockchains}, booktitle = {TrustCom}, pages = {334--341}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00063}, doi = {10.1109/TRUSTCOM60117.2023.00063}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/XuZS023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XuZZHCCLGLG23, author = {Lexi Xu and Junsheng Zhao and Hong Zhu and Mingde Huo and Xinzhou Cheng and Kun Chao and Jie Li and Jian Guan and Xiqing Liu and Jie Gao}, title = {5G/5G-A Private Network: Construction, Operation and Applications}, booktitle = {TrustCom}, pages = {2234--2239}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00314}, doi = {10.1109/TRUSTCOM60117.2023.00314}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/XuZZHCCLGLG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YadavMBL23, author = {Awaneesh Kumar Yadav and Manoj Misra and An Braeken and Madhusanka Liyanage}, title = {A Secure Blockchain-based Authentication and Key Agreement Protocol for 5G Roaming}, booktitle = {TrustCom}, pages = {1324--1331}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00181}, doi = {10.1109/TRUSTCOM60117.2023.00181}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YadavMBL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YanLL23, author = {Wenli Yan and Shuaijun Liu and Lixiang Liu}, title = {Multiple Chord Distance Regression Algorithm to Judge Constellations Without Prior Information}, booktitle = {TrustCom}, pages = {1980--1985}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00270}, doi = {10.1109/TRUSTCOM60117.2023.00270}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YanLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YanLS23, author = {Qi Yan and Mohan Li and Yanbin Sun}, title = {Neighborhood Matching Entity Alignment Model for Vulnerability Knowledge Graphs}, booktitle = {TrustCom}, pages = {38--45}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00028}, doi = {10.1109/TRUSTCOM60117.2023.00028}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YanLS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YanZLYW23, author = {Shu Yan and Sirui Zhang and Ailin Lv and Bo Yuan and Kai Wei}, title = {Development Situation and Suggestions of Data Elements in China}, booktitle = {TrustCom}, pages = {2193--2197}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00307}, doi = {10.1109/TRUSTCOM60117.2023.00307}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YanZLYW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YangKDSZCM23, author = {Huiran Yang and Jiaqi Kang and Yueyue Dai and Jiyan Sun and Yan Zhang and Huajun Cui and Can Ma}, title = {LActDet: An Automatic Network Attack Activity Detection Framework for Multi-step Attacks}, booktitle = {TrustCom}, pages = {676--685}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00102}, doi = {10.1109/TRUSTCOM60117.2023.00102}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YangKDSZCM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YangLCXGWXC23, author = {Bin Yang and Jing Liang and Yubin Chen and Ying Xing and Wei Gao and Yue Wang and Lexi Xu and Xinzhou Cheng}, title = {Research on Interpretable Customer Churn Prediction Based on Attention Mechanism}, booktitle = {TrustCom}, pages = {2042--2047}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00281}, doi = {10.1109/TRUSTCOM60117.2023.00281}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YangLCXGWXC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YangLFHL23, author = {Yuting Yang and Lin Liu and Shaojing Fu and Jun{-}Jie Huang and Yuchuan Luo}, title = {SecGAN: Honest-Majority Maliciously 3PC Framework for Privacy-Preserving Image Synthesis}, booktitle = {TrustCom}, pages = {1119--1126}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00154}, doi = {10.1109/TRUSTCOM60117.2023.00154}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YangLFHL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YangLKW23, author = {Jen{-}Chieh Yang and Hung{-}I Lin and Lin{-}Jing Kuo and Sheng{-}De Wang}, title = {{MOFP:} Multi-Objective Filter Pruning for Deep Learning Models}, booktitle = {TrustCom}, pages = {2414--2423}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00340}, doi = {10.1109/TRUSTCOM60117.2023.00340}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YangLKW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YangLWZ23, author = {Halvin Yang and Xiao Lin and Kai{-}Kit Wong and Yizhe Zhao}, title = {Fast Fluid Antenna Multiple Access With Path Loss Consideration and Different Antenna Architecture}, booktitle = {TrustCom}, pages = {2386--2393}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00336}, doi = {10.1109/TRUSTCOM60117.2023.00336}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YangLWZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YangP23, author = {Sheng Yang and Guan{-}Ju Peng}, title = {Optimizing Quantum Reversible Circuits Using Reinforcement Learning}, booktitle = {TrustCom}, pages = {2310--2314}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00326}, doi = {10.1109/TRUSTCOM60117.2023.00326}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YangP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YangSWHMH23, author = {Zheng Yang and Degang Sun and Yan Wang and Xinbo Han and Chen Meng and Weiqing Huang}, title = {DTrap: {A} cyberattack-defense confrontation technique based on Moving Target Defense}, booktitle = {TrustCom}, pages = {2652--2659}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00370}, doi = {10.1109/TRUSTCOM60117.2023.00370}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YangSWHMH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YangTX23, author = {Qing Yang and Youliang Tian and Jinbo Xiong}, title = {DFedXGB: An {XGB} Vertical Federated Learning Framework with Data Desensitization}, booktitle = {TrustCom}, pages = {157--164}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00042}, doi = {10.1109/TRUSTCOM60117.2023.00042}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YangTX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YangWGY23, author = {Yunlu Yang and Miaoqiong Wang and Yuming Ge and Rundong Yu}, title = {Research on Data Security for Vehicle-Infrastructure-Cloud Integration}, booktitle = {TrustCom}, pages = {2164--2169}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00302}, doi = {10.1109/TRUSTCOM60117.2023.00302}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YangWGY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YangWWQQ23, author = {Xu Yang and Ao Wang and Qiuhao Wang and Saiyu Qi and Yong Qi}, title = {A Practical and Privacy-Preserving Vehicular Data Sharing Framework by Using Blockchain}, booktitle = {TrustCom}, pages = {1300--1305}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00177}, doi = {10.1109/TRUSTCOM60117.2023.00177}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YangWWQQ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YangWZHCJ23, author = {Hongyu Yang and Youwei Wang and Liang Zhang and Ze Hu and Xiang Cheng and Laiwei Jiang}, title = {{EAMDM:} An Evolved Android Malware Detection Method Using {API} Clustering}, booktitle = {TrustCom}, pages = {889--895}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00127}, doi = {10.1109/TRUSTCOM60117.2023.00127}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YangWZHCJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YangXGLWC23, author = {Zijing Yang and Lexi Xu and Jie Gao and Jie Li and Yang Wu and Xinzhou Cheng}, title = {FedQuant: Stock Prediction with Muti-Party Technical Indicators using Federated Learning Method in Quantitative Trading}, booktitle = {TrustCom}, pages = {2251--2256}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00317}, doi = {10.1109/TRUSTCOM60117.2023.00317}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YangXGLWC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YangZ023, author = {Bo Yang and Yanchao Zhang and Dong Tong}, title = {{DOPS:} {A} Practical Dual Offline Payment Scheme of {CBDC} for Mobile Devices}, booktitle = {TrustCom}, pages = {1835--1844}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00249}, doi = {10.1109/TRUSTCOM60117.2023.00249}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YangZ023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YangZHZC23, author = {Hongyu Yang and Tao Zhang and Ze Hu and Liang Zhang and Xiang Cheng}, title = {A {DGA} Domain Name Detection Method Based on Two-Stage Feature Reinforcement}, booktitle = {TrustCom}, pages = {652--659}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00099}, doi = {10.1109/TRUSTCOM60117.2023.00099}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YangZHZC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YiLLYLC23, author = {Yunpeng Yi and Hongtao Lv and Tie Luo and Junfeng Yang and Lei Liu and Lizhen Cui}, title = {Crowdsourcing-based Model Testing in Federated Learning}, booktitle = {TrustCom}, pages = {207--213}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00048}, doi = {10.1109/TRUSTCOM60117.2023.00048}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YiLLYLC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YinZZTLL23, author = {Zheng Yin and Shengwen Zhou and Jingjing Zhou and Minghui Tian and Musen Lin and Sida Liu}, title = {Research on DataOps Capability - Practice and Development}, booktitle = {TrustCom}, pages = {2170--2174}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00303}, doi = {10.1109/TRUSTCOM60117.2023.00303}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YinZZTLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YuDGKS23, author = {Junwei Yu and Yepeng Ding and Yuheng Guo and Kentaro Kotani and Hiroyuki Sato}, title = {Inj-Kyber: Enhancing CRYSTALS-Kyber with Information Injection within a Bio-KEM Framework}, booktitle = {TrustCom}, pages = {1639--1644}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00223}, doi = {10.1109/TRUSTCOM60117.2023.00223}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YuDGKS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YuTC23, author = {Xionghe Yu and Xiaolan Tang and Wenlong Chen}, title = {Blockchain-based and Privacy-Preserving Data Collection for Vehicular Crowdsensing}, booktitle = {TrustCom}, pages = {1340--1347}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00183}, doi = {10.1109/TRUSTCOM60117.2023.00183}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YuTC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YuanMDBL023, author = {Zhipeng Yuan and Nasamu Musa and Katarzyna Dybal and Matthew Back and Daniel Leybourne and Po Yang}, title = {Quantifying Nematodes through Images: Datasets, Models, and Baselines of Deep Learning}, booktitle = {TrustCom}, pages = {2448--2455}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00344}, doi = {10.1109/TRUSTCOM60117.2023.00344}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YuanMDBL023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YueZCTYL23, author = {Yi Yue and Zhiyan Zhang and Chang Cao and Xiongyan Tang and Wencong Yang and Feile Li}, title = {EasyOrchestrator: {A} Dynamic QoS-Aware Service Orchestration Platform for 6G Network}, booktitle = {TrustCom}, pages = {2222--2227}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00312}, doi = {10.1109/TRUSTCOM60117.2023.00312}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YueZCTYL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhaWJZY23, author = {Cong Zha and Yulei Wu and Zexun Jiang and Wenqian Zhao and Hao Yin}, title = {{BAA:} {A} Novel Decentralized Authorization System for Privacy-Sensitive Medical Data}, booktitle = {TrustCom}, pages = {1127--1136}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00155}, doi = {10.1109/TRUSTCOM60117.2023.00155}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhaWJZY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Zhang0023, author = {Jianlin Zhang and Xiaoding Wang and Hui Lin}, title = {Big Data Assisted Object Detection with Privacy Protection}, booktitle = {TrustCom}, pages = {117--124}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00037}, doi = {10.1109/TRUSTCOM60117.2023.00037}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Zhang0023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangGDS23, author = {Lingfeng Zhang and Yuheng Guo and Yepeng Ding and Hiroyuki Sato}, title = {1-D CNN-Based Online Signature Verification with Federated Learning}, booktitle = {TrustCom}, pages = {2698--2705}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00376}, doi = {10.1109/TRUSTCOM60117.2023.00376}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangGDS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangHWWWY23, author = {Dongyue Zhang and Sai Han and Zelin Wang and Jingwei Wang and Guangquan Wang and Jieyan Yang}, title = {Research on Cross-Layer Alarm Association in 5G Core Network}, booktitle = {TrustCom}, pages = {2064--2069}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00285}, doi = {10.1109/TRUSTCOM60117.2023.00285}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangHWWWY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangWDXLLZS23, author = {Jie Zhang and Hui Wen and Liting Deng and Mingfeng Xin and Zhi Li and Lun Li and Hongsong Zhu and Limin Sun}, title = {HackMentor: Fine-Tuning Large Language Models for Cybersecurity}, booktitle = {TrustCom}, pages = {452--461}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00076}, doi = {10.1109/TRUSTCOM60117.2023.00076}, timestamp = {Wed, 12 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangWDXLLZS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangWH23, author = {Minjuan Zhang and Chase Q. Wu and Aiqin Hou}, title = {Ensemble Learning Models for Large-Scale Time Series Forecasting in Supply Chain}, booktitle = {TrustCom}, pages = {2286--2294}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00323}, doi = {10.1109/TRUSTCOM60117.2023.00323}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangWH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangXYW23, author = {Zeshi Zhang and Guangping Xu and Hongzhang Yang and Yulei Wu}, title = {Sparsity Aware of {TF-IDF} Matrix to Accelerate Oblivious Document Ranking and Retrieval}, booktitle = {TrustCom}, pages = {974--981}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00137}, doi = {10.1109/TRUSTCOM60117.2023.00137}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangXYW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangYLXCCCXY23, author = {Heng Zhang and Bing Yan and Yunpeng Li and Lexi Xu and Xinzhou Cheng and Lijuan Cao and Kun Chao and Wei Xia and Qinqin Yu}, title = {Research on Enterprises Growth for Industries in Post-Epidemic Era}, booktitle = {TrustCom}, pages = {2158--2163}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00301}, doi = {10.1109/TRUSTCOM60117.2023.00301}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangYLXCCCXY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangZZ23, author = {Gaowei Zhang and Xu Zhou and Xiaobo Zhang}, title = {Fine-Grained Task Scheduling Combining {DDPG} and Path Selection in {LEO} Satellite Networks}, booktitle = {TrustCom}, pages = {1181--1186}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00161}, doi = {10.1109/TRUSTCOM60117.2023.00161}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangZZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Zhao23, author = {Rui Zhao}, title = {CamPass: a Secure Camera-based Password Manager for Kiosk Browsing}, booktitle = {TrustCom}, pages = {1580--1585}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00215}, doi = {10.1109/TRUSTCOM60117.2023.00215}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Zhao23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhaoYXCLZLXL23, author = {Changyu Zhao and Zhuo Yan and Huangxin Xu and Xueliang Chen and Zheng Li and Xinyu Zhong and Cuiwei Liu and Anyan Xiao and Xingyan Lv}, title = {Design and Implementation of Mask Detection System Based on Improved YOLOv5s}, booktitle = {TrustCom}, pages = {2257--2262}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00318}, doi = {10.1109/TRUSTCOM60117.2023.00318}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhaoYXCLZLXL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhaoYYLZ23, author = {Jun Zhao and Jiangshan Yu and Xingliang Yuan and Joseph K. Liu and Cong Zuo}, title = {Rethinking Practical Blockchain-Based Symmetric Searchable Encryption Services}, booktitle = {TrustCom}, pages = {307--317}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00060}, doi = {10.1109/TRUSTCOM60117.2023.00060}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhaoYYLZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhaoZS023, author = {Hui Zhao and Xiaodong Zhang and Jinshan Shi and Ru Li}, title = {Referable NFT-based Revenue Allocation Mechanism in Data Marketplace}, booktitle = {TrustCom}, pages = {1318--1323}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00180}, doi = {10.1109/TRUSTCOM60117.2023.00180}, timestamp = {Wed, 05 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhaoZS023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Zhou0WB23, author = {Huasong Zhou and Xiaowei Xu and Xiaodong Wang and Leon Bevan Bullock}, title = {{SATBA:} An Invisible Backdoor Attack Based on Spatial Attention}, booktitle = {TrustCom}, pages = {937--945}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00133}, doi = {10.1109/TRUSTCOM60117.2023.00133}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Zhou0WB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhouCWM23, author = {Fengxi Zhou and Baoming Chang and Yu Wen and Dan Meng}, title = {Representation-enhanced {APT} Detection Using Contrastive Learning}, booktitle = {TrustCom}, pages = {1--9}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00024}, doi = {10.1109/TRUSTCOM60117.2023.00024}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhouCWM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhouKRNS23, author = {Yuxiang Zhou and Xin Kang and Fuji Ren and Satoshi Nakagawa and Xiao Shan}, title = {DEU-Net: Dual Encoder U-Net for 3D Medical Image Segmentation}, booktitle = {TrustCom}, pages = {2735--2741}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00382}, doi = {10.1109/TRUSTCOM60117.2023.00382}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhouKRNS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhouWHLXL23, author = {Weidong Zhou and Tianbo Wang and Guotao Huang and Xiaopeng Liang and Chunhe Xia and Xiaojian Li}, title = {HF-Mid: {A} Hybrid Framework of Network Intrusion Detection for Multi-type and Imbalanced Data}, booktitle = {TrustCom}, pages = {1546--1553}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00211}, doi = {10.1109/TRUSTCOM60117.2023.00211}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhouWHLXL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhouXHLWZ23, author = {Lianpei Zhou and Xi Xiao and Guangwu Hu and Hao Li and Xiangbo Wu and Tao Zhou}, title = {A lightweight and high-precision approach for bulky JavaScript engines fuzzing}, booktitle = {TrustCom}, pages = {982--989}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00138}, doi = {10.1109/TRUSTCOM60117.2023.00138}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhouXHLWZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhuCFD23, author = {Yihong Zhu and Xiaoliang Chen and Junsen Fu and Yajun Du}, title = {A novel semantic dependency and aspect interaction graph convolutional network for aspect-level sentiment analysis}, booktitle = {TrustCom}, pages = {2763--2769}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00385}, doi = {10.1109/TRUSTCOM60117.2023.00385}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhuCFD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhuSB23, author = {Haohan Zhu and Andrea Staino and Biswajit Basu}, title = {Railway Traffic Signal Recognition System based on Spatio-Temporal Features}, booktitle = {TrustCom}, pages = {2465--2471}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00346}, doi = {10.1109/TRUSTCOM60117.2023.00346}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhuSB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhuXWL23, author = {Jinyao Zhu and Xiaofei Xing and Guojun Wang and Peiqiang Li}, title = {Opcode Sequences-Based Smart Contract Vulnerabilities Detection Using Deep Learning}, booktitle = {TrustCom}, pages = {284--291}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00057}, doi = {10.1109/TRUSTCOM60117.2023.00057}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhuXWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZouLHZMGL23, author = {Wenbing Zou and Xiulei Liu and Shoulu Hou and Ye Zhang and Lin Miao and Yi Gong and Ning Li}, title = {Affinity-Based Resource and Task Allocation in Edge Computing Systems}, booktitle = {TrustCom}, pages = {1187--1195}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00162}, doi = {10.1109/TRUSTCOM60117.2023.00162}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZouLHZMGL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZouZCZWJX23, author = {Zexiao Zou and Yan Zhang and Jin Chen and Jianyi Zhang and Zhiqiang Wang and Lei Ju and Ri Xu}, title = {Be like a Chameleon: Protect Traffic Privacy with Mimicry}, booktitle = {TrustCom}, pages = {1449--1454}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00198}, doi = {10.1109/TRUSTCOM60117.2023.00198}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZouZCZWJX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZouZLDXH23, author = {Xianxia Zou and Cenyu Zheng and Haodong Lin and Like Du and Weiwu Xu and Chong He}, title = {A Fine-Grained Access Control Mechanism Based on Search Trees}, booktitle = {TrustCom}, pages = {1614--1620}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00220}, doi = {10.1109/TRUSTCOM60117.2023.00220}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZouZLDXH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZouZWZL23, author = {Weihong Zou and Shigeng Zhang and Weiping Wang and Jian Zhang and Xuan Liu}, title = {{MPS:} {A} Multiple Poisoned Samples Selection Strategy in Backdoor Attack}, booktitle = {TrustCom}, pages = {873--880}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00125}, doi = {10.1109/TRUSTCOM60117.2023.00125}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZouZWZL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/trustcom/2023, editor = {Jia Hu and Geyong Min and Guojun Wang and Nektarios Georgalas}, title = {22nd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Exeter, UK, November 1-3, 2023}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023}, doi = {10.1109/TRUSTCOM60117.2023}, isbn = {979-8-3503-8199-3}, timestamp = {Tue, 04 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AbadeerSC22, author = {Macarious Abadeer and Wei Shi and Jean{-}Pierre Corriveau}, title = {FLightNER: {A} Federated Learning Approach to Lightweight Named-Entity Recognition}, booktitle = {TrustCom}, pages = {687--694}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00098}, doi = {10.1109/TRUSTCOM56396.2022.00098}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/AbadeerSC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AlalmaieNH22, author = {Abeer Z. Alalmaie and Priyadarsi Nanda and Xiangjian He}, title = {Zero Trust-NIDS: Extended Multi-View Approach for Network Trace Anonymization and Auto-Encoder {CNN} for Network Intrusion Detection}, booktitle = {TrustCom}, pages = {449--456}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00069}, doi = {10.1109/TRUSTCOM56396.2022.00069}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/AlalmaieNH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ArsalanMIAVI22, author = {Muhammad Arsalan and Davide Di Matteo and Sana Imtiaz and Zainab Abbas and Vladimir Vlassov and Vadim Issakov}, title = {Energy-Efficient Privacy-Preserving Time-Series Forecasting on User Health Data Streams}, booktitle = {TrustCom}, pages = {541--546}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00080}, doi = {10.1109/TRUSTCOM56396.2022.00080}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ArsalanMIAVI22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BertoglioSZL22, author = {Daniel Dalalana Bertoglio and Luis G. B. Sch{\"{u}}ler and Avelino F. Zorzo and Roben Castagna Lunardi}, title = {Understanding the Penetration Test Workflow: a security test with Tramonto in an e-Government application}, booktitle = {TrustCom}, pages = {1597--1604}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00229}, doi = {10.1109/TRUSTCOM56396.2022.00229}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/BertoglioSZL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BiHLCHS22, author = {Jichao Bi and Shibo He and Fengji Luo and Jiming Chen and Da{-}Wen Huang and Mingyang Sun}, title = {Differential Game Approach for Modelling and Defense of False Data Injection Attacks Targeting Energy Metering Systems}, booktitle = {TrustCom}, pages = {97--104}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00024}, doi = {10.1109/TRUSTCOM56396.2022.00024}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/BiHLCHS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BorowskiSZM22, author = {Michal Borowski and Sangeet Saha and Xiaojun Zhai and Klaus D. McDonald{-}Maier}, title = {Benchmark Tool for Detecting Anomalous Program Behaviour on Embedded Devices}, booktitle = {TrustCom}, pages = {1187--1192}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00164}, doi = {10.1109/TRUSTCOM56396.2022.00164}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/BorowskiSZM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BovenziPPPS22, author = {Giampaolo Bovenzi and Valerio Persico and Antonio Pescap{\`{e}} and Anna Piscitelli and Vincenzo Spadari}, title = {Hierarchical Classification of Android Malware Traffic}, booktitle = {TrustCom}, pages = {1354--1359}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00191}, doi = {10.1109/TRUSTCOM56396.2022.00191}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/BovenziPPPS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/CaiYY22, author = {Cailing Cai and Tsz Hon Yuen and Siu{-}Ming Yiu}, title = {Hash Proof System with Auxiliary Inputs and Its Application}, booktitle = {TrustCom}, pages = {52--59}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00018}, doi = {10.1109/TRUSTCOM56396.2022.00018}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/CaiYY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/CaoDWM22, author = {Deqi Cao and Zhaoyun Ding and Fei Wang and Haoyang Ma}, title = {Pre-training Fine-tuning data Enhancement method based on active learning}, booktitle = {TrustCom}, pages = {1447--1454}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00205}, doi = {10.1109/TRUSTCOM56396.2022.00205}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/CaoDWM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/CazorlaFG22, author = {Jos{\'{e}} Reverte Cazorla and Jos{\'{e}} Mar{\'{\i}}a de Fuentes and Lorena Gonz{\'{a}}lez{-}Manzano}, title = {Eye-based keystroke prediction for natural texts - a feasibility analysis}, booktitle = {TrustCom}, pages = {375--382}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00059}, doi = {10.1109/TRUSTCOM56396.2022.00059}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/CazorlaFG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenFWY22, author = {Ruizhu Chen and Rong Fei and Lili Wu and Lu Yang}, title = {An Improved Actor-Critic Method for Auto-Combating In Infantry Vehicles}, booktitle = {TrustCom}, pages = {1162--1167}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00160}, doi = {10.1109/TRUSTCOM56396.2022.00160}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChenFWY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenG22, author = {Xiaofeng Chen and Ying Gao}, title = {CDEdit: Redactable Blockchain with Cross-audit and Diversity Editing}, booktitle = {TrustCom}, pages = {945--952}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00130}, doi = {10.1109/TRUSTCOM56396.2022.00130}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChenG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenGLWP22, author = {Jian Chen and Yuan Gao and Yang Liu and Chen Wang and Kai Peng}, title = {Leveraging Model Poisoning Attacks on License Plate Recognition Systems}, booktitle = {TrustCom}, pages = {827--834}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00115}, doi = {10.1109/TRUSTCOM56396.2022.00115}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChenGLWP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenHWGM22, author = {Ligeng Chen and Zhongling He and Hao Wu and Yuhang Gong and Bing Mao}, title = {AVMiner: Expansible and Semantic-Preserving Anti-Virus Labels Mining Method}, booktitle = {TrustCom}, pages = {217--224}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00039}, doi = {10.1109/TRUSTCOM56396.2022.00039}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChenHWGM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenWWCYL22, author = {Qian Chen and Hongbo Wang and Zilong Wang and Jiawei Chen and Haonan Yan and Xiaodong Lin}, title = {{LLDP:} {A} Layer-wise Local Differential Privacy in Federated Learning}, booktitle = {TrustCom}, pages = {631--637}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00091}, doi = {10.1109/TRUSTCOM56396.2022.00091}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChenWWCYL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenXCGYZ22, author = {Jinfu Chen and Haodi Xie and Saihua Cai and Ye Geng and Yemin Yin and Zikang Zhang}, title = {A formalization-based vulnerability detection method for cross-subject network components}, booktitle = {TrustCom}, pages = {1054--1059}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00144}, doi = {10.1109/TRUSTCOM56396.2022.00144}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChenXCGYZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenYWTX22, author = {Chuanxi Chen and Dengpan Ye and Hao Wang and Long Tang and Yue Xu}, title = {Towards Adversarial Robustness with Multidimensional Perturbations via Contrastive Learning}, booktitle = {TrustCom}, pages = {184--191}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00035}, doi = {10.1109/TRUSTCOM56396.2022.00035}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChenYWTX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenYZWWH22, author = {Luyao Chen and Na Yan and Boyang Zhang and Zhaoyang Wang and Yu Wen and Yanfei Hu}, title = {A General Backdoor Attack to Graph Neural Networks Based on Explanation Method}, booktitle = {TrustCom}, pages = {759--768}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00107}, doi = {10.1109/TRUSTCOM56396.2022.00107}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChenYZWWH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenZLKZZ22, author = {Yongkang Chen and Ming Zhang and Jin Li and Xiaohui Kuang and Xuhong Zhang and Han Zhang}, title = {Dynamic and Diverse Transformations for Defending Against Adversarial Examples}, booktitle = {TrustCom}, pages = {976--983}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00134}, doi = {10.1109/TRUSTCOM56396.2022.00134}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ChenZLKZZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenZXZZW22, author = {Yujie Chen and Wenliang Zhu and Jinke Xu and Junwei Zhang and Zhanpeng Zhu and Lirong Wang}, title = {A Heart Sound Classification Method Based on Residual Block and Attention Mechanism}, booktitle = {TrustCom}, pages = {1060--1065}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00145}, doi = {10.1109/TRUSTCOM56396.2022.00145}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChenZXZZW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChengCJZHZCJXL22, author = {Chen Cheng and Xinzhou Cheng and Shikun Jiang and Xin Zhao and Yuhui Han and Tao Zhang and Lijuan Cao and Yuwei Jia and Tian Xiao and Bei Li}, title = {Telecom Big Data assisted Algorithm and System of Campus Safety Management}, booktitle = {TrustCom}, pages = {1557--1562}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00223}, doi = {10.1109/TRUSTCOM56396.2022.00223}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChengCJZHZCJXL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChengLLHCMD22, author = {Lei Cheng and Shuaijun Liu and Lixaing Liu and Hailong Hu and Jingyi Chen and Xiandong Meng and Pengcheng Ding}, title = {Study on Gateway Station Deployment for Large Scale {LEO} Satellite Constellation Networks}, booktitle = {TrustCom}, pages = {1540--1544}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00220}, doi = {10.1109/TRUSTCOM56396.2022.00220}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChengLLHCMD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChengZYFH22, author = {Taining Cheng and Wei Zhou and Shaowen Yao and Libo Feng and Jing He}, title = {Multi-pipeline HotStuff: {A} High Performance Consensus for Permissioned Blockchain}, booktitle = {TrustCom}, pages = {1008--1019}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00138}, doi = {10.1109/TRUSTCOM56396.2022.00138}, timestamp = {Tue, 16 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChengZYFH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/CioroaicaBSSKT22, author = {Emilia Cioroaica and Barbora Buhnova and Daniel Schneider and Ioannis Sorokos and Thomas Kuhn and Emrah Tomur}, title = {Towards the Concept of Trust Assurance Case}, booktitle = {TrustCom}, pages = {1581--1586}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00227}, doi = {10.1109/TRUSTCOM56396.2022.00227}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/CioroaicaBSSKT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DaiLXWJ22, author = {Weiqi Dai and Zhenhui Lu and Xia Xie and Duoqiang Wang and Hai Jin}, title = {Diabetes Mellitus Type 2 Data Sharing System Based on Blockchain and Attribute-Encryption}, booktitle = {TrustCom}, pages = {498--505}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00075}, doi = {10.1109/TRUSTCOM56396.2022.00075}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/DaiLXWJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DaiZXWJ22, author = {Weiqi Dai and Wenhao Zhao and Xia Xie and Song Wu and Hai Jin}, title = {Shared Incentive System for Clinical Pathway Experience}, booktitle = {TrustCom}, pages = {506--513}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00076}, doi = {10.1109/TRUSTCOM56396.2022.00076}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/DaiZXWJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DiXLCLXZZX22, author = {Zixiang Di and Tian Xiao and Yi Li and Xinzhou Cheng and Bei Li and Lexi Xu and Xiaomeng Zhu and Lu Zhi and Rui Xia}, title = {Research on Voice Quality Evaluation Method Based on Artificial Neural Network}, booktitle = {TrustCom}, pages = {1510--1515}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00215}, doi = {10.1109/TRUSTCOM56396.2022.00215}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/DiXLCLXZZX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DiaoFCWWS22, author = {Jiawen Diao and Binxing Fang and Xiang Cui and Zhongru Wang and Tian Wang and Shouyou Song}, title = {From Passive to Active: Near-optimal DNS-based Data Exfiltration Defense Method Based on Sticky Mechanism}, booktitle = {TrustCom}, pages = {159--166}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00032}, doi = {10.1109/TRUSTCOM56396.2022.00032}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/DiaoFCWWS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DingSYDW22, author = {Wenxiu Ding and Wei Sun and Zheng Yan and Robert H. Deng and Zhiguo Wan}, title = {An Efficient and Secure Scheme of Verifiable Computation for Intel {SGX}}, booktitle = {TrustCom}, pages = {473--482}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00072}, doi = {10.1109/TRUSTCOM56396.2022.00072}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/DingSYDW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DingXGYCH22, author = {Zhenquan Ding and Hui Xu and Yonghe Guo and Longchuan Yan and Lei Cui and Zhiyu Hao}, title = {Mal-Bert-GCN: Malware Detection by Combining Bert and {GCN}}, booktitle = {TrustCom}, pages = {175--183}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00034}, doi = {10.1109/TRUSTCOM56396.2022.00034}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/DingXGYCH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DingYQWZW22, author = {Yuhang Ding and Zihan Yang and Bo Qin and Qin Wang and Yanran Zhang and Qianhong Wu}, title = {Squeezing Network Performance for Secure and Efficient PoW with Better Difficulty Adjustment}, booktitle = {TrustCom}, pages = {874--881}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00121}, doi = {10.1109/TRUSTCOM56396.2022.00121}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/DingYQWZW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DongCZW22, author = {Yanfang Dong and Wenqiang Cai and Wenliang Zhu and Lirong Wang}, title = {An End-to-End Multi-label classification model for Arrhythmia based on varied-length {ECG} signals}, booktitle = {TrustCom}, pages = {1149--1154}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00158}, doi = {10.1109/TRUSTCOM56396.2022.00158}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/DongCZW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DuHWW22, author = {Xinqing Du and Xin Hu and Yin Wang and Weidong Wang}, title = {Dynamic Resource Allocation for Beam Hopping Satellites Communication System: An Exploration}, booktitle = {TrustCom}, pages = {1296--1301}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00181}, doi = {10.1109/TRUSTCOM56396.2022.00181}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/DuHWW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DuZWT22, author = {Xiaoyu Du and Guanying Zhou and Yujing Wang and Song Tao}, title = {A Lightweight Honeynet Design In the Internet of Things}, booktitle = {TrustCom}, pages = {83--88}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00022}, doi = {10.1109/TRUSTCOM56396.2022.00022}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/DuZWT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DunnettPPJJ22, author = {Kealan Dunnett and Shantanu Pal and Guntur Dharma Putra and Zahra Jadidi and Raja Jurdak}, title = {A Trusted, Verifiable and Differential Cyber Threat Intelligence Sharing Framework using Blockchain}, booktitle = {TrustCom}, pages = {1107--1114}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00152}, doi = {10.1109/TRUSTCOM56396.2022.00152}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/DunnettPPJJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FarukSIASVRWB22, author = {Md. Jobair Hossain Faruk and Bilash Saha and Mazharul Islam and Fazlul Alam and Hossain Shahriar and Maria Valero and Akond Rahman and Fan Wu and Md. Zakirul Alam Bhuiyan}, title = {Development of Blockchain-based e-Voting System: Requirements, Design and Security Perspective}, booktitle = {TrustCom}, pages = {959--967}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00132}, doi = {10.1109/TRUSTCOM56396.2022.00132}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/FarukSIASVRWB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FoleyM22, author = {Myles Foley and Sergio Maffeis}, title = {Haxss: Hierarchical Reinforcement Learning for {XSS} Payload Generation}, booktitle = {TrustCom}, pages = {147--158}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00031}, doi = {10.1109/TRUSTCOM56396.2022.00031}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/FoleyM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FuCH22, author = {Jie Fu and Zhili Chen and Xiao Han}, title = {Adap {DP-FL:} Differentially Private Federated Learning with Adaptive Noise}, booktitle = {TrustCom}, pages = {656--663}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00094}, doi = {10.1109/TRUSTCOM56396.2022.00094}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/FuCH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FuHS22, author = {Chunlan Fu and Shirong Han and Gang Shen}, title = {Detecting Unknown Network Attacks with Attention Encoding and Deep Metric Learning}, booktitle = {TrustCom}, pages = {283--290}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00047}, doi = {10.1109/TRUSTCOM56396.2022.00047}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/FuHS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GaoCHLYD22, author = {Kai Gao and Xiangyu Cheng and Hao Huang and Xunhao Li and Tingyu Yuan and Ronghua Du}, title = {False Data Injection Attack Detection in a Platoon of {CACC} in {RSU}}, booktitle = {TrustCom}, pages = {1324--1329}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00186}, doi = {10.1109/TRUSTCOM56396.2022.00186}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GaoCHLYD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GaoLZJSXWLWH22, author = {Jie Gao and Lixia Liu and Tao Zhang and Shenghao Jia and Chuntao Song and Lexi Xu and Yang Wu and Bei Li and Yunyun Wang and Xinjie Hou}, title = {Research on User Complaint Problem Location and Complaint Early Warning Stragegy Based on Big Data Analysis}, booktitle = {TrustCom}, pages = {1504--1509}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00214}, doi = {10.1109/TRUSTCOM56396.2022.00214}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/GaoLZJSXWLWH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GargCC22, author = {Shivam Garg and Nandish Chattopadhyay and Anupam Chattopadhyay}, title = {Robust Perception for Autonomous Vehicles using Dimensionality Reduction}, booktitle = {TrustCom}, pages = {1516--1521}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00216}, doi = {10.1109/TRUSTCOM56396.2022.00216}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GargCC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GeWXD22, author = {Bin Ge and Ting Wang and Chenxing Xia and Gaole Dai}, title = {Image Encryption Algorithm based on Convolutional Neural Network and Four Square Matrix Encoding}, booktitle = {TrustCom}, pages = {1368--1375}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00193}, doi = {10.1109/TRUSTCOM56396.2022.00193}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GeWXD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GearXFGJS22, author = {Joseph Gear and Yue Xu and Ernest Foo and Praveen Gauravaram and Zahra Jadidi and Leonie Simpson}, title = {{SCEVD:} Semantic-enhanced Code Embedding for Vulnerability Discovery}, booktitle = {TrustCom}, pages = {1522--1527}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00217}, doi = {10.1109/TRUSTCOM56396.2022.00217}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GearXFGJS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GongWSLZ22, author = {Rui Gong and Lei Wang and Wei Shi and Wei Liu and Jianfeng Zhang}, title = {A Hardware Security Isolation Architecture for Intelligent Accelerator}, booktitle = {TrustCom}, pages = {984--991}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00135}, doi = {10.1109/TRUSTCOM56396.2022.00135}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GongWSLZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GuDZY22, author = {Qing Gu and Xiangling Ding and Dengyong Zhang and Ce Yang}, title = {Forgery Detection Scheme of Deep Video Frame-rate Up-conversion Based on Dual-stream Multi-scale Spatial-temporal Representation}, booktitle = {TrustCom}, pages = {733--738}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00104}, doi = {10.1109/TRUSTCOM56396.2022.00104}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/GuDZY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GuanCCHJXWXL22, author = {Jian Guan and Xinzhou Cheng and Kun Chao and Xin He and Yuwei Jia and Lexi Xu and Yunyun Wang and Tian Xiao and Bei Li}, title = {Research on Capability Building of Mobile Network Data Analysis and Visualization}, booktitle = {TrustCom}, pages = {1479--1484}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00210}, doi = {10.1109/TRUSTCOM56396.2022.00210}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/GuanCCHJXWXL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GuoHWC22, author = {Hui Guo and Chunyan Hou and Jinsong Wang and Chen Chen}, title = {A K-Induction Method Extended with Value Analysis for {C} Program Safety Verification}, booktitle = {TrustCom}, pages = {1072--1077}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00147}, doi = {10.1109/TRUSTCOM56396.2022.00147}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GuoHWC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GuoLY22, author = {Lifeng Guo and Huide Lei and Wei{-}Chuen Yau}, title = {One-Time Rewritable Blockchain with Traitor Tracing and Bilateral Access Control}, booktitle = {TrustCom}, pages = {905--912}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00125}, doi = {10.1109/TRUSTCOM56396.2022.00125}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GuoLY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GuoSTY22, author = {Shaolong Guo and Zhou Su and Zhiyi Tian and Shui Yu}, title = {Utility-Aware Privacy-Preserving Federated Learning through Information Bottleneck}, booktitle = {TrustCom}, pages = {680--686}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00097}, doi = {10.1109/TRUSTCOM56396.2022.00097}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GuoSTY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GuoZXZC22, author = {Zhen Guo and Pengzhou Zhang and Junjie Xia and Zhe Zhou and Juan Cao}, title = {Multi-channel Live Video Processing Method Based on Cloud-edge Collaboration}, booktitle = {TrustCom}, pages = {1404--1409}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00198}, doi = {10.1109/TRUSTCOM56396.2022.00198}, timestamp = {Tue, 28 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GuoZXZC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Guri22, author = {Mordechai Guri}, title = {Near Field Air-Gap Covert Channel Attack}, booktitle = {TrustCom}, pages = {490--497}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00074}, doi = {10.1109/TRUSTCOM56396.2022.00074}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Guri22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HanDLCDWDL22, author = {Dongxu Han and Pu Dong and Ning Li and Xiang Cui and Jiawen Diao and Qing Wang and Dan Du and Yuling Liu}, title = {DCC-Find: {DNS} Covert Channel Detection by Features Concatenation-Based {LSTM}}, booktitle = {TrustCom}, pages = {307--314}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00050}, doi = {10.1109/TRUSTCOM56396.2022.00050}, timestamp = {Wed, 05 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HanDLCDWDL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HanWWFMLXZ22, author = {Sai Han and Zelin Wang and Guangquan Wang and Qiukeng Fang and Hongbing Ma and Lin Lin and Lexi Xu and Heng Zhang}, title = {Automatic Association of Cross-Domain Network Topology}, booktitle = {TrustCom}, pages = {1173--1178}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00162}, doi = {10.1109/TRUSTCOM56396.2022.00162}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/HanWWFMLXZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HanZ22, author = {Fuji Han and Dongjun Zhu}, title = {Intelligent Recognition Method of Web Application Categories Based on Multi-layer Simhash Algorithm}, booktitle = {TrustCom}, pages = {483--489}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00073}, doi = {10.1109/TRUSTCOM56396.2022.00073}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HanZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HeCJCWWWDZ22, author = {Xin He and Lijuan Cao and Yuwei Jia and Kun Chao and Miaoqiong Wang and Chao Wang and Yunyun Wang and Runsha Dong and Zhenqiao Zhao}, title = {User Analysis and Traffic Prediction Method based on Behavior Slicing}, booktitle = {TrustCom}, pages = {1605--1610}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00230}, doi = {10.1109/TRUSTCOM56396.2022.00230}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HeCJCWWWDZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HeJZC22, author = {Yun He and Xiaoqi Jia and Shengzhi Zhang and Lou Chitkushev}, title = {EnShare: Sharing Files Securely and Efficiently in the Cloud using Enclave}, booktitle = {TrustCom}, pages = {225--232}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00040}, doi = {10.1109/TRUSTCOM56396.2022.00040}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HeJZC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HeXW22, author = {Siqi He and Xiaofei Xing and Guojun Wang}, title = {{DIV-SC:} {A} Data Integrity Verification Scheme for Centralized Database Using Smart Contract}, booktitle = {TrustCom}, pages = {1290--1295}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00180}, doi = {10.1109/TRUSTCOM56396.2022.00180}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HeXW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HuaZWLZ22, author = {Chengyao Hua and Shigeng Zhang and Weiping Wang and Zhankai Li and Jian Zhang}, title = {{WBA:} {A} Warping-based Approach to Generating Imperceptible Adversarial Examples}, booktitle = {TrustCom}, pages = {361--368}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00057}, doi = {10.1109/TRUSTCOM56396.2022.00057}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/HuaZWLZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HuangHZLLYY22, author = {Weiqing Huang and Xinbo Han and Meng Zhang and Min Li and Wen Liu and Zheng Yang and Haitian Yang}, title = {{MFFAN:} Multiple Features Fusion with Attention Networks for Malicious Traffic Detection}, booktitle = {TrustCom}, pages = {391--398}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00061}, doi = {10.1109/TRUSTCOM56396.2022.00061}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HuangHZLLYY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HuangNG22, author = {Chin{-}Tser Huang and Laurent Njilla and Tieming Geng}, title = {Smarkchain: An Amendable and Correctable Blockchain Based on Smart Markers}, booktitle = {TrustCom}, pages = {835--842}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00116}, doi = {10.1109/TRUSTCOM56396.2022.00116}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HuangNG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HuangYZTWZ22, author = {Chao Huang and Yanqing Yao and Xiaojun Zhang and Da Teng and Yingdong Wang and Lei Zhou}, title = {Robust Secure Aggregation with Lightweight Verification for Federated Learning}, booktitle = {TrustCom}, pages = {582--589}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00085}, doi = {10.1109/TRUSTCOM56396.2022.00085}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HuangYZTWZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JiaCCLCLJDC22, author = {Yuwei Jia and Kun Chao and Xinzhou Cheng and Lin Lin and Lijuan Cao and Yi Li and Yuchao Jin and Zixiang Di and Chen Cheng}, title = {A Novel User Mobility Prediction Scheme based on the Weighted Markov Chain Model}, booktitle = {TrustCom}, pages = {1078--1083}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00148}, doi = {10.1109/TRUSTCOM56396.2022.00148}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/JiaCCLCLJDC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JiaHWMC22, author = {Qiaowen Jia and Guanxiong Ha and Hanwei Wang and Haoyu Ma and Hang Chen}, title = {An enhanced MinHash encryption scheme for encrypted deduplication}, booktitle = {TrustCom}, pages = {565--573}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00083}, doi = {10.1109/TRUSTCOM56396.2022.00083}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/JiaHWMC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JiangZL22, author = {Junfeng Jiang and Yujian Zhang and Junhao Li}, title = {A Blockchain-based Privacy-Preserving Scheme for Cross-domain Authentication}, booktitle = {TrustCom}, pages = {992--999}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00136}, doi = {10.1109/TRUSTCOM56396.2022.00136}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/JiangZL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JingCYL22, author = {Xuyang Jing and Xiaojun Cheng and Zheng Yan and Xian Li}, title = {Deceiving Learning-based Sketches to Cause Inaccurate Frequency Estimation}, booktitle = {TrustCom}, pages = {209--216}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00038}, doi = {10.1109/TRUSTCOM56396.2022.00038}, timestamp = {Sun, 30 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/JingCYL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KalantariHD22, author = {Shirin Kalantari and Danny Hughes and Bart De Decker}, title = {Listing the ingredients for {IFTTT} recipes}, booktitle = {TrustCom}, pages = {1376--1383}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00194}, doi = {10.1109/TRUSTCOM56396.2022.00194}, timestamp = {Wed, 05 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/KalantariHD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KawaPS22, author = {Piotr Kawa and Marcin Plata and Piotr Syga}, title = {SpecRNet: Towards Faster and More Accessible Audio DeepFake Detection}, booktitle = {TrustCom}, pages = {792--799}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00111}, doi = {10.1109/TRUSTCOM56396.2022.00111}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/KawaPS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KrzywieckiS22, author = {Lukasz Krzywiecki and Hannes Salin}, title = {Short Signatures via Multiple Hardware Security Modules with Key Splitting in Circuit Breaking Environments}, booktitle = {TrustCom}, pages = {1528--1533}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00218}, doi = {10.1109/TRUSTCOM56396.2022.00218}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/KrzywieckiS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KuangXJL22, author = {Yong Kuang and Hongyun Xu and Rui Jiang and Zhikang Liu}, title = {{GTMS:} {A} Gated Linear Unit Based Trust Management System for Internet of Vehicles Using Blockchain Technology}, booktitle = {TrustCom}, pages = {28--35}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00015}, doi = {10.1109/TRUSTCOM56396.2022.00015}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/KuangXJL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LanLLL22, author = {Jinghong Lan and Yanan Li and Bo Li and Xudong Liu}, title = {{MATTER:} {A} Multi-Level Attention-Enhanced Representation Learning Model for Network Intrusion Detection}, booktitle = {TrustCom}, pages = {111--116}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00026}, doi = {10.1109/TRUSTCOM56396.2022.00026}, timestamp = {Sun, 23 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LanLLL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiCGFGL22, author = {Fenghua Li and Cao Chen and Yunchuan Guo and Liang Fang and Chao Guo and Zifu Li}, title = {Efficiently Constructing Topology of Dynamic Networks}, booktitle = {TrustCom}, pages = {44--51}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00017}, doi = {10.1109/TRUSTCOM56396.2022.00017}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiCGFGL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiF22, author = {Mingyue Li and Rong Fei}, title = {Research and Implementation of Fault Diagnosis of Switch Machine Based on Data Enhancement and {CNN}}, booktitle = {TrustCom}, pages = {1467--1472}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00208}, doi = {10.1109/TRUSTCOM56396.2022.00208}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiGZFLC22, author = {Meng Li and Jianbo Gao and Zijian Zhang and Chaoping Fu and Chhagan Lal and Mauro Conti}, title = {Graph Encryption for Shortest Path Queries with k Unsorted Nodes}, booktitle = {TrustCom}, pages = {89--96}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00023}, doi = {10.1109/TRUSTCOM56396.2022.00023}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiGZFLC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiKYZDT22, author = {Hongjun Li and Fanyu Kong and Jia Yu and Hanlin Zhang and Luhong Diao and Yunting Tao}, title = {Privacy-Preserving and Verifiable Outsourcing Message Transmission and Authentication Protocol in IoT}, booktitle = {TrustCom}, pages = {556--564}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00082}, doi = {10.1109/TRUSTCOM56396.2022.00082}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiKYZDT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiLLPZPH22, author = {Heng Li and Zhijun Liu and Yongting Liu and Hui Peng and Rui Zhang and Jun Peng and Zhiwu Huang}, title = {Battery Aging-Robust Driving Range Prediction of Electric Bus}, booktitle = {TrustCom}, pages = {1179--1186}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00163}, doi = {10.1109/TRUSTCOM56396.2022.00163}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiLLPZPH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiLWL22, author = {Yuzhe Li and Bo Li and Weiping Wang and Nan Liu}, title = {An Efficient Epsilon Selection Method for {DP-ERM} with Expected Accuracy Constraints}, booktitle = {TrustCom}, pages = {533--540}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00079}, doi = {10.1109/TRUSTCOM56396.2022.00079}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiLWL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiLYWLL22, author = {Jinzhou Li and Shouye Lv and Liu Yang and Sheng Wu and Yang Liu and Qijun Luan}, title = {Performance Analysis for Bearings-only Geolocation Based on Constellation of Satellites}, booktitle = {TrustCom}, pages = {1429--1434}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00202}, doi = {10.1109/TRUSTCOM56396.2022.00202}, timestamp = {Sat, 01 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiLYWLL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiNYDLZ22, author = {Jie Li and Weina Niu and Ran Yan and Zhiqin Duan and Beibei Li and Xiaosong Zhang}, title = {{IDROP:} Intelligently detecting Return-Oriented Programming using real-time execution flow and {LSTM}}, booktitle = {TrustCom}, pages = {167--174}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00033}, doi = {10.1109/TRUSTCOM56396.2022.00033}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiNYDLZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiW22, author = {Huapeng Li and Baocheng Wang}, title = {A Secure Remote Password Protocol From The Learning With Errors Problem}, booktitle = {TrustCom}, pages = {1084--1090}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00149}, doi = {10.1109/TRUSTCOM56396.2022.00149}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiXLJ22, author = {Meimei Li and Yiyan Xu and Nan Li and Zhongfeng Jin}, title = {Adversarial Attacks on Deep Learning-Based Methods for Network Traffic Classification}, booktitle = {TrustCom}, pages = {1123--1128}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00154}, doi = {10.1109/TRUSTCOM56396.2022.00154}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiXLJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiXZXLWGGD22, author = {Bei Li and Tian Xiao and Kai Zhou and Lexi Xu and Guanghai Liu and Bo Wang and Jie Gao and Jian Guan and Zixiang Di}, title = {Research on {OTFS} Systems for 6G}, booktitle = {TrustCom}, pages = {1498--1503}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00213}, doi = {10.1109/TRUSTCOM56396.2022.00213}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiXZXLWGGD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiZCLZ22, author = {Yong Li and Zhenghao Zhang and Xi Chen and Ruxian Li and Liang Zhang}, title = {Redactable Blockchain with K-Time Controllable Editing}, booktitle = {TrustCom}, pages = {1455--1461}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00206}, doi = {10.1109/TRUSTCOM56396.2022.00206}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiZCLZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiZGLW22, author = {De Li and Hongyan Zheng and Zeming Gan and Xianxian Li and Jinyan Wang}, title = {A Green Neural Network with Privacy Preservation and Interpretability}, booktitle = {TrustCom}, pages = {606--614}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00088}, doi = {10.1109/TRUSTCOM56396.2022.00088}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiZGLW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiZHYCPH22, author = {Heng Li and Zeyu Zhu and Peinan He and Yingze Yang and Bin Chen and Jun Peng and Zhiwu Huang}, title = {A Thermal-Aware Digital Twin Model of Permanent Magnet Synchronous Motors {(PMSM)} Based on {BP} Neural Networks}, booktitle = {TrustCom}, pages = {1099--1106}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00151}, doi = {10.1109/TRUSTCOM56396.2022.00151}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiZHYCPH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiZWYWL22, author = {Xiaoying Li and Guangxiang Zhang and Yuzhou Wu and Yang Yang and Yuelei Wang and Zhen Liu}, title = {Create Persona of Elderly Users by Clustering Analysis of Needs}, booktitle = {TrustCom}, pages = {1261--1265}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00175}, doi = {10.1109/TRUSTCOM56396.2022.00175}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiZWYWL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiZXS22, author = {Xinwei Li and Qianyun Zhang and Lexi Xu and Tao Shang}, title = {A Compatible and Identity Privacy-preserving Security Protocol for {ACARS}}, booktitle = {TrustCom}, pages = {1048--1053}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00143}, doi = {10.1109/TRUSTCOM56396.2022.00143}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiZXS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiangDWYL22, author = {Weipeng Liang and Li Dong and Rangding Wang and Diqun Yan and Yuanman Li}, title = {Robust Document Image Forgery Localization Against Image Blending}, booktitle = {TrustCom}, pages = {810--817}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00113}, doi = {10.1109/TRUSTCOM56396.2022.00113}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiangDWYL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LinLZWHL22, author = {Chennan Lin and Baisong Liu and Xueyuan Zhang and Zhiye Wang and Ce Hu and Linze Luo}, title = {Privacy-Preserving Recommendation with Debiased Obfuscaiton}, booktitle = {TrustCom}, pages = {590--597}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00086}, doi = {10.1109/TRUSTCOM56396.2022.00086}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LinLZWHL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LinWG22, author = {Dejia Lin and Yongdong Wu and Wensheng Gan}, title = {Sybil-resistant Truth Discovery in Crowdsourcing by Exploiting the Long-tail Effect}, booktitle = {TrustCom}, pages = {1545--1550}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00221}, doi = {10.1109/TRUSTCOM56396.2022.00221}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LinWG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LinZWWWXHJ22, author = {Lin Lin and Bin Zhu and Zelin Wang and Guangquan Wang and Jianzhi Wang and Lexi Xu and Sai Han and Yuwei Jia}, title = {5G-A Capability Exposure Scheme based on Harmonized Communication and Sensing}, booktitle = {TrustCom}, pages = {1036--1041}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00141}, doi = {10.1109/TRUSTCOM56396.2022.00141}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LinZWWWXHJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuL22, author = {Lijian Liu and Jinguo Li}, title = {A Blockchain-assisted Collaborative Ensemble Learning for Network Intrusion Detection}, booktitle = {TrustCom}, pages = {1042--1047}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00142}, doi = {10.1109/TRUSTCOM56396.2022.00142}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiuL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuLWLB22, author = {Haofeng Liu and Yuefeng Liu and Yue Wang and Bo Liu and Xiang Bao}, title = {{EEG} classification algorithm of motor imagery based on CNN-Transformer fusion network}, booktitle = {TrustCom}, pages = {1302--1309}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00182}, doi = {10.1109/TRUSTCOM56396.2022.00182}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiuLWLB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuLY22, author = {Ruixuan Liu and Muyang Lyu and Jiangrong Yang}, title = {A hybrid {BCI} system combining motor imagery and conceptual imagery in a smart home environment}, booktitle = {TrustCom}, pages = {1066--1071}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00146}, doi = {10.1109/TRUSTCOM56396.2022.00146}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiuLY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuLZ22, author = {Yuan Liu and Yanmei Liu and Minjing Zhong}, title = {Technical architecture of integrated big data platform}, booktitle = {TrustCom}, pages = {1551--1556}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00222}, doi = {10.1109/TRUSTCOM56396.2022.00222}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiuLZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuQJ22, author = {Jie Liu and Xingsheng Qin and Frank Jiang}, title = {A quantum inspired differential evolution algorithm with multiple mutation strategies}, booktitle = {TrustCom}, pages = {927--934}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00128}, doi = {10.1109/TRUSTCOM56396.2022.00128}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiuQJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuWLH22, author = {Dongdong Liu and Mingsheng Wang and Taotao Li and Ya Han}, title = {A Faster Blockchain Sharding Protocol for Decentralized Ledger}, booktitle = {TrustCom}, pages = {864--873}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00120}, doi = {10.1109/TRUSTCOM56396.2022.00120}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiuWLH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuWSZH22, author = {Pengfei Liu and Weiping Wang and Hong Song and Shigeng Zhang and Yulu Hong}, title = {HashDroid:Extraction of malicious features of Android applications based on function call graph pruning}, booktitle = {TrustCom}, pages = {66--73}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00020}, doi = {10.1109/TRUSTCOM56396.2022.00020}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiuWSZH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuXCJ22, author = {Yaqi Liu and Chao Xia and Qiang Cai and Xin Jin}, title = {Pyramid Copy-move Forgery Detection Using Adversarial Optimized Self Deep Matching Network}, booktitle = {TrustCom}, pages = {739--746}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00105}, doi = {10.1109/TRUSTCOM56396.2022.00105}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiuXCJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuXN22, author = {Shuhe Liu and Xiaolin Xu and Zhefeng Nan}, title = {CNN-Based Autonomous Traffic Detection on Unknown Home Security Cameras}, booktitle = {TrustCom}, pages = {843--850}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00117}, doi = {10.1109/TRUSTCOM56396.2022.00117}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiuXN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuYWYHK22, author = {Runhao Liu and Bo Yu and Baosheng Wang and Jianbin Ye and Jianxin Huang and Xiangdong Kong}, title = {{SEEKER:} {A} Root Cause Analysis Method Based on Deterministic Replay for Multi-Type Network Protocol Vulnerabilities}, booktitle = {TrustCom}, pages = {131--138}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00029}, doi = {10.1109/TRUSTCOM56396.2022.00029}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiuYWYHK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuZLCL22, author = {Jingqiang Liu and Xiaoxi Zhu and Chaoge Liu and Xiang Cui and Qixu Liu}, title = {{CPGBERT:} An Effective Model for Defect Detection by Learning Program Semantics via Code Property Graph}, booktitle = {TrustCom}, pages = {274--282}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00046}, doi = {10.1109/TRUSTCOM56396.2022.00046}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiuZLCL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuZP22, author = {Tongwei Liu and Baokang Zhao and Wei Peng}, title = {An Efficient Certificateless Authentication Scheme for Satellite Internet}, booktitle = {TrustCom}, pages = {331--338}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00053}, doi = {10.1109/TRUSTCOM56396.2022.00053}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiuZP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LuoHZXWW22, author = {Xuejiao Luo and Xiaohui Han and Wenbo Zuo and Zhengyuan Xu and Zhiwen Wang and Xiaoming Wu}, title = {A Dynamic Transaction Pattern Aggregation Neural Network for Money Laundering Detection}, booktitle = {TrustCom}, pages = {818--826}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00114}, doi = {10.1109/TRUSTCOM56396.2022.00114}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LuoHZXWW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LuoLCXZ22, author = {Zhi Luo and Youqi Li and Lixing Chen and Zichuan Xu and Pan Zhou}, title = {Data Poisoning Attack to X-armed Bandits}, booktitle = {TrustCom}, pages = {345--351}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00055}, doi = {10.1109/TRUSTCOM56396.2022.00055}, timestamp = {Thu, 20 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LuoLCXZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LuoLCXZ22a, author = {Zhi Luo and Youqi Li and Lixing Chen and Zichuan Xu and Pan Zhou}, title = {Action-Manipulation Attack and Defense to X-Armed Bandits}, booktitle = {TrustCom}, pages = {1115--1122}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00153}, doi = {10.1109/TRUSTCOM56396.2022.00153}, timestamp = {Thu, 20 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LuoLCXZ22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LyuCXLQZDXC22, author = {Feibi Lyu and Xinzhou Cheng and Lexi Xu and Liang Liu and Jinjian Qiao and Lu Zhi and Zixiang Di and Tian Xiao and Chen Cheng}, title = {Coverage Estimation of Wireless Network Using Attention U-Net}, booktitle = {TrustCom}, pages = {1255--1260}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00174}, doi = {10.1109/TRUSTCOM56396.2022.00174}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LyuCXLQZDXC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MaWLNSW22, author = {Siyuan Ma and Yuewu Wang and Lingguang Lei and Yingjiao Niu and Haotian Shi and Jie Wang}, title = {Booting IoT Terminal Device Securely with eMMC}, booktitle = {TrustCom}, pages = {1--8}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00012}, doi = {10.1109/TRUSTCOM56396.2022.00012}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/MaWLNSW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MaZLYLC22, author = {Xiaoqing Ma and Chao Zheng and Zhao Li and Jiangyi Yin and Qingyun Liu and Xunxun Chen}, title = {A Lightweight Graph-based Method to Detect Pornographic and Gambling Websites with Imperfect Datasets}, booktitle = {TrustCom}, pages = {291--298}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00048}, doi = {10.1109/TRUSTCOM56396.2022.00048}, timestamp = {Tue, 18 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/MaZLYLC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MengQWC22, author = {Yongwei Meng and Tao Qin and Haonian Wang and Zhouguo Chen}, title = {{TPIPD:} {A} Robust Model for Online {VPN} Traffic Classification}, booktitle = {TrustCom}, pages = {105--110}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00025}, doi = {10.1109/TRUSTCOM56396.2022.00025}, timestamp = {Mon, 29 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/MengQWC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MicaleCMFRP22, author = {Davide Micale and Gianpiero Costantino and Ilaria Matteucci and Florian Fenzl and Roland Rieke and Giuseppe Patan{\`{e}}}, title = {{CAHOOT:} a Context-Aware veHicular intrusiOn detectiOn sysTem}, booktitle = {TrustCom}, pages = {1211--1218}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00168}, doi = {10.1109/TRUSTCOM56396.2022.00168}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/MicaleCMFRP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MiyajiTWYM22, author = {Atsuko Miyaji and Tomoka Takahashi and Ping{-}Lun Wang and Tatsuhiro Yamatsuki and Tomoaki Mimoto}, title = {Privacy-Preserving Data Analysis without Trusted Third Party}, booktitle = {TrustCom}, pages = {710--717}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00101}, doi = {10.1109/TRUSTCOM56396.2022.00101}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/MiyajiTWYM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MoreRAH22, author = {Stefan More and Sebastian Ramacher and Lukas Alber and Marco Herzl}, title = {Extending Expressive Access Policies with Privacy Features}, booktitle = {TrustCom}, pages = {574--581}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00084}, doi = {10.1109/TRUSTCOM56396.2022.00084}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/MoreRAH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/PengZXB22, author = {Xiting Peng and Naixian Zhao and Lexi Xu and Shi Bai}, title = {Vehicle Classification System with Mobile Edge Computing Based on Broad Learning}, booktitle = {TrustCom}, pages = {1611--1617}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00231}, doi = {10.1109/TRUSTCOM56396.2022.00231}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/PengZXB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/PoddarCDM22, author = {Saranda Poddar and Deepraj Chowdhury and Ashutosh Dhar Dwivedi and Raghava Rao Mukkamala}, title = {Data Driven based Malicious {URL} Detection using Explainable {AI}}, booktitle = {TrustCom}, pages = {1266--1272}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00176}, doi = {10.1109/TRUSTCOM56396.2022.00176}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/PoddarCDM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/PoniszewskaMarandaP22, author = {Aneta Poniszewska{-}Maranda and Kacper Pradzynski}, title = {Code-based encryption algorithms for generating and verifying digital signature}, booktitle = {TrustCom}, pages = {465--472}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00071}, doi = {10.1109/TRUSTCOM56396.2022.00071}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/PoniszewskaMarandaP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/PuYLJ22, author = {Xinhe Pu and Xiaofang Yuan and Liangsen Li and Weiming Ji}, title = {Design and Development of Operation Status Monitoring System for Large Glass Substrate Handling Robot}, booktitle = {TrustCom}, pages = {1278--1285}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00178}, doi = {10.1109/TRUSTCOM56396.2022.00178}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/PuYLJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/QiJX22, author = {Huamei Qi and Li Jie and Wangping Xiong}, title = {An Energy-Efficient scheme for industrial wireless sensor network based on hierarchical network structure}, booktitle = {TrustCom}, pages = {1155--1161}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00159}, doi = {10.1109/TRUSTCOM56396.2022.00159}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/QiJX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/QiXJWXN22, author = {Minfeng Qi and Zhiyu Xu and Tengyun Jiao and Sheng Wen and Yang Xiang and Gary Nan}, title = {A Comparative Study on the Security of Cryptocurrency Wallets in Android System}, booktitle = {TrustCom}, pages = {399--406}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00062}, doi = {10.1109/TRUSTCOM56396.2022.00062}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/QiXJWXN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/QiZLW22, author = {Jiming Qi and Jiazheng Zhang and Qingxia Liu and Bang Wang}, title = {A Flow Attack Strategy based on Critical Links for Cyber-attack}, booktitle = {TrustCom}, pages = {913--920}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00126}, doi = {10.1109/TRUSTCOM56396.2022.00126}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/QiZLW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/QiangL22, author = {Weizhong Qiang and Hao Luo}, title = {AutoSlicer: Automatic Program Partitioning for Securing Sensitive Data Based-on Data Dependency Analysis and Code Refactoring}, booktitle = {TrustCom}, pages = {239--247}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00042}, doi = {10.1109/TRUSTCOM56396.2022.00042}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/QiangL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/QiaoZY22, author = {Yixuan Qiao and Minghui Zheng and Jingyi Yang}, title = {Implementation of one-time editable blockchain chameleon hash function construction scheme}, booktitle = {TrustCom}, pages = {851--856}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00118}, doi = {10.1109/TRUSTCOM56396.2022.00118}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/QiaoZY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/RastogiDGZA22, author = {Nidhi Rastogi and Sharmishtha Dutta and Alex Gittens and Mohammed J. Zaki and Charu C. Aggarwal}, title = {{TINKER:} {A} framework for Open source Cyberthreat Intelligence}, booktitle = {TrustCom}, pages = {1569--1574}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00225}, doi = {10.1109/TRUSTCOM56396.2022.00225}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/RastogiDGZA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/RuanQ22, author = {Ou Ruan and Shanshan Qin}, title = {Secure and efficient publicly verifiable ridge regression outsourcing scheme}, booktitle = {TrustCom}, pages = {703--709}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00100}, doi = {10.1109/TRUSTCOM56396.2022.00100}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/RuanQ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SchermannUTBS22, author = {Raphael Schermann and Rainer Urian and Ronald Toegl and Holger Bock and Christian Steger}, title = {Enabling Anonymous Authenticated Encryption with a Novel Anonymous Authenticated Credential Key Agreement {(AACKA)}}, booktitle = {TrustCom}, pages = {646--655}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00093}, doi = {10.1109/TRUSTCOM56396.2022.00093}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SchermannUTBS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SentanoeFRG22, author = {Stewart Sentanoe and Christofer Fellicious and Hans P. Reiser and Michael Granitzer}, title = {"The Need for Speed": Extracting Session Keys From the Main Memory Using Brute-force and Machine Learning}, booktitle = {TrustCom}, pages = {1028--1035}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00140}, doi = {10.1109/TRUSTCOM56396.2022.00140}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SentanoeFRG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ShanYLZY22, author = {Boshen Shan and Yuanzhi Yao and Weihai Li and Xiaodong Zuo and Nenghai Yu}, title = {Fuzzy Keyword Search over Encrypted Cloud Data with Dynamic Fine-grained Access Control}, booktitle = {TrustCom}, pages = {1340--1347}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00189}, doi = {10.1109/TRUSTCOM56396.2022.00189}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ShanYLZY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SheCS22, author = {Cairui She and Liwei Chen and Gang Shi}, title = {TFCFI:Transparent Forward Fine-grained Control-Flow Integrity Protection}, booktitle = {TrustCom}, pages = {407--414}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00063}, doi = {10.1109/TRUSTCOM56396.2022.00063}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SheCS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ShenCLLJLDJFJY22, author = {Yixuan Shen and Yu Cheng and Yini Lin and Sicheng Long and Canjian Jiang and Danjie Li and Siyuan Dai and You Jiang and Junbin Fang and Zoe Lin Jiang and Siu{-}Ming Yiu}, title = {{MLIA:} modulated {LED} illumination-based adversarial attack on traffic sign recognition system for autonomous vehicle}, booktitle = {TrustCom}, pages = {1020--1027}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00139}, doi = {10.1109/TRUSTCOM56396.2022.00139}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ShenCLLJLDJFJY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ShenSZP22, author = {Yuan Shen and Wei Song and Changsheng Zhao and Zhiyong Peng}, title = {Secure Access Control for eHealth Data in Emergency Rescue Case based on Traceable Attribute-Based Encryption}, booktitle = {TrustCom}, pages = {201--208}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00037}, doi = {10.1109/TRUSTCOM56396.2022.00037}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ShenSZP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ShiWHLZ22, author = {Junyu Shi and Wei Wan and Shengshan Hu and Jianrong Lu and Leo Yu Zhang}, title = {Challenges and Approaches for Mitigating Byzantine Attacks in Federated Learning}, booktitle = {TrustCom}, pages = {139--146}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00030}, doi = {10.1109/TRUSTCOM56396.2022.00030}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ShiWHLZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ShiYMQL22, author = {Lei Shi and Peng Yin and Yang Ming and Shengguan Qu and Zhen Liu}, title = {A Study on the Exoskeleton Motion Intent Recognition Algorithm for Embedded Calculation}, booktitle = {TrustCom}, pages = {1091--1098}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00150}, doi = {10.1109/TRUSTCOM56396.2022.00150}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ShiYMQL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SimoK22, author = {Hervais Simo and Michael Kreutzer}, title = {Towards Automated Detection and Prevention of Regrettable (Self-) Disclosures on Social Media}, booktitle = {TrustCom}, pages = {638--645}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00092}, doi = {10.1109/TRUSTCOM56396.2022.00092}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SimoK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SongGZZZLLWX22, author = {Chuntao Song and Jie Gao and Fan Zhang and Tao Zhang and Yi Zhang and Lixia Liu and Bei Li and Yong Wang and Lexi Xu}, title = {Collaborative Improvement of User Experience and Network Quality Based on Big Data}, booktitle = {TrustCom}, pages = {1243--1248}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00172}, doi = {10.1109/TRUSTCOM56396.2022.00172}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/SongGZZZLLWX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SongWJLLF22, author = {Li Song and Qiongxiao Wang and Shijie Jia and Jingqiang Lin and Linli Lu and Yanduo Fu}, title = {You Cannot Fully Trust Your Device: An Empirical Study of Client-Side Certificate Validation in WPA2-Enterprise Networks}, booktitle = {TrustCom}, pages = {266--273}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00045}, doi = {10.1109/TRUSTCOM56396.2022.00045}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SongWJLLF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SunFXZLY22, author = {Siyu Sun and Xiaoxuan Fan and Yunzhi Xia and Chenlu Zhu and Shenghao Liu and Lingzhi Yi}, title = {Coverage Reliability of IoT Intrusion Detection System based on Attack-Defense Game Design}, booktitle = {TrustCom}, pages = {74--82}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00021}, doi = {10.1109/TRUSTCOM56396.2022.00021}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SunFXZLY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SunHHLLZ22, author = {Haili Sun and Yan Huang and Lansheng Han and Xiang Long and Hongle Liu and Chunjie Zhou}, title = {Neural-FacTOR: Neural Representation Learning for Website Fingerprinting Attack over {TOR} Anonymity}, booktitle = {TrustCom}, pages = {435--440}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00067}, doi = {10.1109/TRUSTCOM56396.2022.00067}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SunHHLLZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SunWLFLSQ22, author = {Xin Sun and Wen Wang and Xujian Liu and Jiarong Fan and Zeru Li and Yubo Song and Zhongyuan Qin}, title = {VecSeeds: Generate fuzzing testcases from latent vectors based on {VAE-GAN}}, booktitle = {TrustCom}, pages = {953--958}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00131}, doi = {10.1109/TRUSTCOM56396.2022.00131}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SunWLFLSQ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SunYXDG22, author = {Wei Sun and Zheng Yan and Xi Xu and Wenxiu Ding and Lijun Gao}, title = {Software Side Channel Vulnerability Detection Based on Similarity Calculation and Deep Learning}, booktitle = {TrustCom}, pages = {800--809}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00112}, doi = {10.1109/TRUSTCOM56396.2022.00112}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SunYXDG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TangCZSZ22, author = {Xin Tang and Xiong Chen and Ran Zhou and Linchi Sui and Tian'e Zhou}, title = {Marking based Obfuscation Strategy to resist Side Channel Attack in Cross-User Deduplication for Cloud Storage}, booktitle = {TrustCom}, pages = {547--555}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00081}, doi = {10.1109/TRUSTCOM56396.2022.00081}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/TangCZSZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TangHDHZXJZ22, author = {Shangyu Tang and Mingde Huo and Yi Du and Yuwen Huo and Yan Zhang and Lexi Xu and Ying Ji and Guoyu Zhou}, title = {Research and Application of 5G Edge {AI} in Medical Industry}, booktitle = {TrustCom}, pages = {1462--1466}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00207}, doi = {10.1109/TRUSTCOM56396.2022.00207}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/TangHDHZXJZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TangZHYQ22, author = {Chenghua Tang and Chen Zhou and Min Hu and Mengmeng Yang and Baohua Qiang}, title = {Malicious Family Identify Combining Multi-channel Mapping Feature Image and Fine-Tuned {CNN}}, booktitle = {TrustCom}, pages = {9--19}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00013}, doi = {10.1109/TRUSTCOM56396.2022.00013}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/TangZHYQ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TengJSZXF22, author = {Yiping Teng and Dongyue Jiang and Mengmeng Sun and Liang Zhao and Li Xu and Chunlong Fan}, title = {Privacy-Preserving Top-k Spatio-Textual Similarity Join}, booktitle = {TrustCom}, pages = {718--726}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00102}, doi = {10.1109/TRUSTCOM56396.2022.00102}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/TengJSZXF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ThouvenotCC22, author = {Maxime Thouvenot and Philippe Calvez and Olivier Cur{\'{e}}}, title = {Kgastor: a Privacy By Design Knowledge Graph anonymized Store}, booktitle = {TrustCom}, pages = {670--679}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00096}, doi = {10.1109/TRUSTCOM56396.2022.00096}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ThouvenotCC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TianLLCG22, author = {Minqiu Tian and Zifu Li and Fenghua Li and Jin Cao and Chao Guo}, title = {A Terminal Security Authentication Protocol for Zero-Trust Satellite IoT}, booktitle = {TrustCom}, pages = {299--306}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00049}, doi = {10.1109/TRUSTCOM56396.2022.00049}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/TianLLCG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TurtiainenCHLS22, author = {Hannu Turtiainen and Andrei Costin and Timo H{\"{a}}m{\"{a}}l{\"{a}}inen and Tuomo Lahtinen and Lauri Sintonen}, title = {{CCTVCV:} Computer Vision model/dataset supporting {CCTV} forensics and privacy applications}, booktitle = {TrustCom}, pages = {1219--1226}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00169}, doi = {10.1109/TRUSTCOM56396.2022.00169}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/TurtiainenCHLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TurtiainenCHLS22a, author = {Hannu Turtiainen and Andrei Costin and Timo H{\"{a}}m{\"{a}}l{\"{a}}inen and Tuomo Lahtinen and Lauri Sintonen}, title = {CCTV-FullyAware: toward end-to-end feasible privacy-enhancing and {CCTV} forensics applications}, booktitle = {TrustCom}, pages = {1227--1234}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00170}, doi = {10.1109/TRUSTCOM56396.2022.00170}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/TurtiainenCHLS22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/UshakovSQNMGE22, author = {Vladimir Ushakov and Sampo Sovio and Qingchao Qi and Vijayanand Nayani and Valentin Manea and Philip Ginzboorg and Jan{-}Erik Ekberg}, title = {Trusted Hart for Mobile {RISC-V} Security}, booktitle = {TrustCom}, pages = {1587--1596}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00228}, doi = {10.1109/TRUSTCOM56396.2022.00228}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/UshakovSQNMGE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WanWP22, author = {Qichang Wan and Peisen Wang and Xiaobing Pei}, title = {{CGDF-GNN:} Cascaded {GNN} fraud detector with dual features facing imbalanced graphs with camouflaged fraudsters}, booktitle = {TrustCom}, pages = {258--265}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00044}, doi = {10.1109/TRUSTCOM56396.2022.00044}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WanWP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangCCL22, author = {Jian Wang and Weiqiong Cao and Hua Chen and Haoyuan Li}, title = {Practical Side-Channel Attack on Message Encoding in Masked Kyber}, booktitle = {TrustCom}, pages = {882--889}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00122}, doi = {10.1109/TRUSTCOM56396.2022.00122}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangCCL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangDHS22, author = {Chuang Wang and Yan Ding and Chenlin Huang and Liantao Song}, title = {An Optimized Isomorphic Design for the {SM4} Block Cipher Over the Tower Field}, booktitle = {TrustCom}, pages = {422--428}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00065}, doi = {10.1109/TRUSTCOM56396.2022.00065}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangDHS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangH22, author = {Ning Wang and Jia Hu}, title = {Performance Analysis of {IEEE} 802.11p for the Internet of Vehicles with Bursty Packet Errors}, booktitle = {TrustCom}, pages = {1435--1440}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00203}, doi = {10.1109/TRUSTCOM56396.2022.00203}, timestamp = {Thu, 03 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangHGH22, author = {Mengfan Wang and Guifang Huang and Hongmin Gao and Lei Hu}, title = {Improved Zero-Knowledge Proofs for Commitments from Learning Parity with Noise}, booktitle = {TrustCom}, pages = {415--421}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00064}, doi = {10.1109/TRUSTCOM56396.2022.00064}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangHGH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangHGLW22, author = {Fayao Wang and Yuanyuan He and Yunchuan Guo and Peizhi Li and Xinyu Wei}, title = {Privacy-Preserving Robust Federated Learning with Distributed Differential Privacy}, booktitle = {TrustCom}, pages = {598--605}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00087}, doi = {10.1109/TRUSTCOM56396.2022.00087}, timestamp = {Fri, 01 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WangHGLW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangL22, author = {Zilong Wang and Junhuai Li}, title = {Guide Tracking Method Based On Particle Filter Fusion}, booktitle = {TrustCom}, pages = {1348--1353}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00190}, doi = {10.1109/TRUSTCOM56396.2022.00190}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangLHZA22, author = {Xingfu Wang and Xiangyu Li and Ammar Hawbani and Liang Zhao and Saeed Hamood Alsamhi}, title = {{MGF-GAN:} Multi Granularity Text Feature Fusion for Text-guided-Image Synthesis}, booktitle = {TrustCom}, pages = {1398--1403}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00197}, doi = {10.1109/TRUSTCOM56396.2022.00197}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangLHZA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangLYDWZ22, author = {Baowei Wang and Bin Li and Yi Yuan and Changyu Dai and Yufeng Wu and Weiqian Zheng}, title = {{CPDT:} {A} copyright-preserving data trading scheme based on smart contracts and perceptual hashing}, booktitle = {TrustCom}, pages = {968--975}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00133}, doi = {10.1109/TRUSTCOM56396.2022.00133}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangLYDWZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangMLYW22, author = {Juan Wang and Chenjun Ma and Ziang Li and Huanyu Yuan and Jie Wang}, title = {ProcGuard: Process Injection Behaviours Detection Using Fine-grained Analysis of {API} Call Chain with Deep Learning}, booktitle = {TrustCom}, pages = {778--785}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00109}, doi = {10.1109/TRUSTCOM56396.2022.00109}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangMLYW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangPH22, author = {Guozhong Wang and Chunling Peng and Yi Huang}, title = {The Power Allocation for SWIPT-based Cognitive Two-Way Relay Networks with Rate Fairness Consideration}, booktitle = {TrustCom}, pages = {60--65}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00019}, doi = {10.1109/TRUSTCOM56396.2022.00019}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangPH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangSZLX22, author = {Binglai Wang and Yafei Sang and Yongzheng Zhang and Shuhao Li and Xiaolin Xu}, title = {A longitudinal Measurement and Analysis Study of Mozi, an Evolving {P2P} IoT Botnet}, booktitle = {TrustCom}, pages = {117--122}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00027}, doi = {10.1109/TRUSTCOM56396.2022.00027}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangSZLX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangWGZ22, author = {Bo Wang and Lingling Wang and Hongliang Guo and Peng Zhou}, title = {Privacy-Preserving Smart Lock System for IoT-enabled Rental House Markets}, booktitle = {TrustCom}, pages = {664--669}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00095}, doi = {10.1109/TRUSTCOM56396.2022.00095}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangWGZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangYZMHZ22, author = {Qinqin Wang and Hanbing Yan and Chang Zhao and Rui Mei and Zhihui Han and Yu Zhou}, title = {{APT} Attribution for Malware Based on Time Series Shapelets}, booktitle = {TrustCom}, pages = {769--777}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00108}, doi = {10.1109/TRUSTCOM56396.2022.00108}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangYZMHZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangYZMHZ22a, author = {Qinqin Wang and Hanbing Yan and Chang Zhao and Rui Mei and Zhihui Han and Yu Zhou}, title = {Measurement of Malware Family Classification on a Large-Scale Real-World Dataset}, booktitle = {TrustCom}, pages = {1390--1397}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00196}, doi = {10.1109/TRUSTCOM56396.2022.00196}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangYZMHZ22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangZW22, author = {Gangyang Wang and Chunhua Zhu and Jianhou Wang}, title = {Detection of impurity content in wheat based on cone-beam {CT}}, booktitle = {TrustCom}, pages = {1286--1289}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00179}, doi = {10.1109/TRUSTCOM56396.2022.00179}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangZW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WenCLS22, author = {Xiuhua Wen and Chunjie Cao and Yifan Li and Yang Sun}, title = {{DRSN} with Simple Parameter-Free Attention Module for Specific Emitter Identification}, booktitle = {TrustCom}, pages = {192--200}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00036}, doi = {10.1109/TRUSTCOM56396.2022.00036}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WenCLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WenLXSWJKL22, author = {Jinbo Wen and Xiaojun Liu and Zehui Xiong and Meng Shen and Siming Wang and Yutao Jiao and Jiawen Kang and He Li}, title = {Optimal Block Propagation and Incentive Mechanism for Blockchain Networks in 6G}, booktitle = {TrustCom}, pages = {369--374}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00058}, doi = {10.1109/TRUSTCOM56396.2022.00058}, timestamp = {Fri, 28 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WenLXSWJKL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WenWD22, author = {Elliott Wen and Jia Wang and Jens Dietrich}, title = {SecretHunter: {A} Large-scale Secret Scanner for Public Git Repositories}, booktitle = {TrustCom}, pages = {123--130}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00028}, doi = {10.1109/TRUSTCOM56396.2022.00028}, timestamp = {Tue, 11 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WenWD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WickertBSNM22, author = {Anna{-}Katharina Wickert and Lars Baumg{\"{a}}rtner and Michael Schlichtig and Krishna Narasimhan and Mira Mezini}, title = {To Fix or Not to Fix: {A} Critical Study of Crypto-misuses in the Wild}, booktitle = {TrustCom}, pages = {315--322}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00051}, doi = {10.1109/TRUSTCOM56396.2022.00051}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WickertBSNM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WuG22, author = {Peilun Wu and Hui Guo}, title = {Holmes: An Efficient and Lightweight Semantic Based Anomalous Email Detector}, booktitle = {TrustCom}, pages = {1360--1367}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00192}, doi = {10.1109/TRUSTCOM56396.2022.00192}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WuG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WuHZR22, author = {Zhitao Wu and Jingjing Hu and Xiaowei Zhang and Wei Ren}, title = {tTree+: {A} Threat Tree Model for Representing Complex Semantics}, booktitle = {TrustCom}, pages = {339--344}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00054}, doi = {10.1109/TRUSTCOM56396.2022.00054}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WuHZR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XiaLG22, author = {Zhuoqun Xia and Hongrui Li and Ke Gu}, title = {{CECAS:} {A} cloud-edge collaboration authentication scheme based on {V2G} short randomizable signature}, booktitle = {TrustCom}, pages = {429--434}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00066}, doi = {10.1109/TRUSTCOM56396.2022.00066}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/XiaLG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XiaLGMNF22, author = {Chao Xia and Yaqi Liu and Qingxiao Guan and Sai Ma and Yu Nan and Jiahui Fu}, title = {Steganalysis for Small-Scale Training Image Pairs with Cover-Stego Feature Difference Model}, booktitle = {TrustCom}, pages = {233--238}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00041}, doi = {10.1109/TRUSTCOM56396.2022.00041}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/XiaLGMNF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XiaZTZ22, author = {Zhuoqun Xia and Kaixin Zhou and Jingjing Tan and Hongmei Zhou}, title = {Bidirectional LSTM-based attention mechanism for {CNN} power theft detection}, booktitle = {TrustCom}, pages = {323--330}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00052}, doi = {10.1109/TRUSTCOM56396.2022.00052}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/XiaZTZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XiaoLDLXGWCL22, author = {Tian Xiao and Bei Li and Zixiang Di and Guanghai Liu and Lexi Xu and Jian Guan and Zhaoning Wang and Chen Cheng and Yi Li}, title = {Research on Intelligent 5G Remote Interference Avoidance and Clustering Scheme}, booktitle = {TrustCom}, pages = {1491--1497}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00212}, doi = {10.1109/TRUSTCOM56396.2022.00212}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/XiaoLDLXGWCL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XiaoQFCLW22, author = {Hao Xiao and Yuan Qiu and Rong Fei and Xiongbo Chen and Zuo Liu and Zongling Wu}, title = {End-to-End Speech Recognition Technology Based on Multi-Stream {CNN}}, booktitle = {TrustCom}, pages = {1310--1315}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00183}, doi = {10.1109/TRUSTCOM56396.2022.00183}, timestamp = {Wed, 05 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/XiaoQFCLW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XiaoXLXCLLZZ22, author = {Tian Xiao and Guoping Xu and Bei Li and Lexi Xu and Xinzhou Cheng and Feibi Lyu and Guanghai Liu and Yi Zhang and Qingqing Zhang}, title = {{AI} based Collaborative Optimization Scheme for Multi-Frequency Heterogeneous 4G/5G Networks}, booktitle = {TrustCom}, pages = {1129--1135}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00155}, doi = {10.1109/TRUSTCOM56396.2022.00155}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/XiaoXLXCLLZZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XiaoXX22, author = {Xiao Xiao and Minghua Xu and Han Xu}, title = {A Novel Asynchronous Evolution Opinion Dynamics Model}, booktitle = {TrustCom}, pages = {786--791}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00110}, doi = {10.1109/TRUSTCOM56396.2022.00110}, timestamp = {Mon, 24 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/XiaoXX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XieLYZ22, author = {Lixia Xie and Siyu Liu and Hongyu Yang and Liang Zhang}, title = {{DRICP:} Defect Risk Identification Using Sample Category Perception}, booktitle = {TrustCom}, pages = {441--448}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00068}, doi = {10.1109/TRUSTCOM56396.2022.00068}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/XieLYZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XinSFXWL22, author = {Wu Xin and Qingni Shen and Ke Feng and Yutang Xia and Zhonghai Wu and Zhenghao Lin}, title = {Personalized User Profiles-based Insider Threat Detection for Distributed File System}, booktitle = {TrustCom}, pages = {1441--1446}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00204}, doi = {10.1109/TRUSTCOM56396.2022.00204}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/XinSFXWL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XuGQHAL22, author = {Yang Xu and Jie Guo and Weidong Qiu and Zheng Huang and Enes Altuncu and Shujun Li}, title = {"Comments Matter and The More The Better!": Improving Rumor Detection with User Comments}, booktitle = {TrustCom}, pages = {383--390}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00060}, doi = {10.1109/TRUSTCOM56396.2022.00060}, timestamp = {Thu, 07 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/XuGQHAL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XuSHN22, author = {Yuting Xu and Mang Su and Jinpeng Hou and Chong Nie}, title = {Federated Learning Scheme with Dual Security of Identity Authentication and Verification}, booktitle = {TrustCom}, pages = {695--702}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00099}, doi = {10.1109/TRUSTCOM56396.2022.00099}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/XuSHN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XuZCMZW22, author = {Jinke Xu and Junwei Zhang and Yujie Chen and Gang Ma and Zhanpeng Zhu and Lirong Wang}, title = {Arteriovenous fistula stenosis classification method based on Auxiliary Wave and Transformer}, booktitle = {TrustCom}, pages = {1168--1172}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00161}, doi = {10.1109/TRUSTCOM56396.2022.00161}, timestamp = {Tue, 02 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/XuZCMZW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YamamotoS22, author = {Akito Yamamoto and Tetsuo Shibuya}, title = {Efficient and Highly Accurate Differentially Private Statistical Genomic Analysis using Discrete Fourier Transform}, booktitle = {TrustCom}, pages = {525--532}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00078}, doi = {10.1109/TRUSTCOM56396.2022.00078}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/YamamotoS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YanWCWZWM22, author = {Na Yan and Yu Wen and Luyao Chen and Yanna Wu and Boyang Zhang and Zhaoyang Wang and Dan Meng}, title = {Deepro: Provenance-based {APT} Campaigns Detection via {GNN}}, booktitle = {TrustCom}, pages = {747--758}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00106}, doi = {10.1109/TRUSTCOM56396.2022.00106}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YanWCWZWM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YanZY22, author = {Baochen Yan and Rui Zhang and Zheng Yan}, title = {VoiceSketch: a Privacy-Preserving Voiceprint Authentication System}, booktitle = {TrustCom}, pages = {623--630}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00090}, doi = {10.1109/TRUSTCOM56396.2022.00090}, timestamp = {Sun, 30 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YanZY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YangDWT22, author = {Weilin Yang and Zhonghui Du and Yonghui Wu and Yi Tang}, title = {Confusing Traffic against Intra-domain Webpage Fingerprinting Attacks}, booktitle = {TrustCom}, pages = {1249--1254}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00173}, doi = {10.1109/TRUSTCOM56396.2022.00173}, timestamp = {Fri, 14 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YangDWT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YangGLSX22, author = {Jingyan Yang and Shang Gao and Guyue Li and Rui Song and Bin Xiao}, title = {Reducing Gas Consumption of Tornado Cash and Other Smart Contracts in Ethereum}, booktitle = {TrustCom}, pages = {921--926}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00127}, doi = {10.1109/TRUSTCOM56396.2022.00127}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YangGLSX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YangGYZ22, author = {Chunlei Yang and Yunchuan Guo and Mingjie Yu and Lingcui Zhang}, title = {Truthfully Negotiating Usage Policy for Data Sovereignty}, booktitle = {TrustCom}, pages = {20--27}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00014}, doi = {10.1109/TRUSTCOM56396.2022.00014}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YangGYZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YangLLS22, author = {Mei Yang and Chong Liu and Huiyun Li and Cuiping Shao}, title = {Efficient {SM2} Hardware Design for Digital Signature of Internet of Vehicles}, booktitle = {TrustCom}, pages = {890--896}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00123}, doi = {10.1109/TRUSTCOM56396.2022.00123}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YangLLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YangYWLLH22, author = {Mingyu Yang and Tao Yang and Haiyang Wang and Hao Li and Tianming Li and Biao Hu}, title = {Ferrite microstrip limiter based on the equivalent nonlinear loss simulation model for the narrow microwave pulse environment}, booktitle = {TrustCom}, pages = {1330--1332}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00187}, doi = {10.1109/TRUSTCOM56396.2022.00187}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YangYWLLH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YangYZC22, author = {Hongyu Yang and Haiyun Yang and Liang Zhang and Xiang Cheng}, title = {Source Code Vulnerability Detection Using Vulnerability Dependency Representation Graph}, booktitle = {TrustCom}, pages = {457--464}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00070}, doi = {10.1109/TRUSTCOM56396.2022.00070}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YangYZC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YangZDYL22, author = {Biao Yang and Shanshan Zhao and Hongfei Du and Minju Yi and Ziwei Liu}, title = {{PAPR} Suppression in Radar Communication Integration System Based on Subcarrier Reservation}, booktitle = {TrustCom}, pages = {1424--1428}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00201}, doi = {10.1109/TRUSTCOM56396.2022.00201}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YangZDYL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YuLDLWLPG22, author = {Haisheng Yu and Yan Liu and Lihong Duan and Sanwei Liu and Wenyong Wang and Dong Liu and Zirui Peng and Daobiao Gong}, title = {Cache Top-level domain locally: make {DNS} respond quickly in mobile network}, booktitle = {TrustCom}, pages = {1205--1210}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00167}, doi = {10.1109/TRUSTCOM56396.2022.00167}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YuLDLWLPG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YuanCYYY22, author = {Shuguang Yuan and Chi Chen and Ke Yang and Tengfei Yang and Jing Yu}, title = {An Attribute-attack-proof Watermarking Technique for Relational Database}, booktitle = {TrustCom}, pages = {1136--1143}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00156}, doi = {10.1109/TRUSTCOM56396.2022.00156}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YuanCYYY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YueYLMHT22, author = {Yi Yue and Wencong Yang and Xiao Liang and Xihuizi Meng and Rong Huang and Xiongyang Tang}, title = {Energy-efficient and Traffic-aware {VNF} Placement for Vertical Services in 5G Networks}, booktitle = {TrustCom}, pages = {1316--1322}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00184}, doi = {10.1109/TRUSTCOM56396.2022.00184}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/YueYLMHT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZangotiMPSGR22, author = {Hussein Zangoti and Alex Pissinou Makki and Niki Pissinou and Abdur R. Shahid and Omar J. Guerra and Joel Rodriguez}, title = {A Multidimensional Blockchain Framework For Mobile Internet of Things}, booktitle = {TrustCom}, pages = {935--944}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00129}, doi = {10.1109/TRUSTCOM56396.2022.00129}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZangotiMPSGR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZeroualHAJ22, author = {Marwa Zeroual and Brahim Hamid and Morayo Adedjouma and Jason Jaskolka}, title = {Towards logical specification of adversarial examples in machine learning}, booktitle = {TrustCom}, pages = {1575--1580}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00226}, doi = {10.1109/TRUSTCOM56396.2022.00226}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZeroualHAJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhaiYWHYL22, author = {You Zhai and Jian Yang and Zixiang Wang and Longtao He and Liqun Yang and Zhoujun Li}, title = {Cdga: {A} GAN-based Controllable Domain Generation Algorithm}, booktitle = {TrustCom}, pages = {352--360}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00056}, doi = {10.1109/TRUSTCOM56396.2022.00056}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhaiYWHYL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangBWXCC22, author = {Junwei Zhang and Rui Bao and Lirong Wang and Jinke Xu and Yujie Chen and Xueqin Chen}, title = {Denoising method of {ECG} signal based on Channel Attention Mechanism}, booktitle = {TrustCom}, pages = {1273--1277}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00177}, doi = {10.1109/TRUSTCOM56396.2022.00177}, timestamp = {Wed, 05 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangBWXCC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangDZTL22, author = {Tao Zhang and Bowen Deng and Lele Zheng and Ze Tong and Qi Li}, title = {HyperMean: Effective Multidimensional Mean Estimation with Local Differential Privacy}, booktitle = {TrustCom}, pages = {615--622}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00089}, doi = {10.1109/TRUSTCOM56396.2022.00089}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangDZTL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangGHLD22, author = {Yanghui Zhang and Kai Gao and Shuo Huang and Xunhao Li and Ronghua Du}, title = {Forgery Trajectory Injection Attack Detection for Traffic Lights under Connected Vehicle Environment}, booktitle = {TrustCom}, pages = {1333--1339}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00188}, doi = {10.1109/TRUSTCOM56396.2022.00188}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangGHLD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangGLD22, author = {Zhiwei Zhang and Xunzhang Gao and Shuowei Liu and Yujia Diao}, title = {An Empirical Study Towards {SAR} Adversarial Examples}, booktitle = {TrustCom}, pages = {1144--1148}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00157}, doi = {10.1109/TRUSTCOM56396.2022.00157}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangGLD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangH22, author = {Chaochao Zhang and Rui Hou}, title = {Security Support on Memory Controller for Heap Memory Safety}, booktitle = {TrustCom}, pages = {248--257}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00043}, doi = {10.1109/TRUSTCOM56396.2022.00043}, timestamp = {Tue, 30 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangLSXCCCXYH22, author = {Heng Zhang and Wenyu Li and Lianbo Song and Lexi Xu and Xinzhou Cheng and Lijuan Cao and Kun Chao and Wei Xia and Qinqin Yu and Sai Han}, title = {Research on Enterprises Loss in Regional Economic Risk Management}, booktitle = {TrustCom}, pages = {1485--1490}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00211}, doi = {10.1109/TRUSTCOM56396.2022.00211}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangLSXCCCXYH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangMCSCQ22, author = {Lei Zhang and Dong Mao and Zuge Chen and Yubo Song and Liquan Chen and Zhongyuan Qin}, title = {Smart Grid Data Aggregation Scheme Based on Local Differential Privacy}, booktitle = {TrustCom}, pages = {1534--1539}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00219}, doi = {10.1109/TRUSTCOM56396.2022.00219}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangMCSCQ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangSWCRY22, author = {Yu'Ang Zhang and Yujie Song and Yu Wang and Yue Cao and Xuefeng Ren and Fei Yan}, title = {{TECS:} {A} Trust Model for VANETs Using Eigenvector Centrality and Social Metrics}, booktitle = {TrustCom}, pages = {36--43}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00016}, doi = {10.1109/TRUSTCOM56396.2022.00016}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangSWCRY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangWHZA22, author = {Shuai Zhang and Xingfu Wang and Ammar Hawbani and Liang Zhao and Saeed Hamood Alsamhi}, title = {Multimodal Graph Reasoning and Fusion for Video Question Answering}, booktitle = {TrustCom}, pages = {1410--1415}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00199}, doi = {10.1109/TRUSTCOM56396.2022.00199}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangWHZA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangXL22, author = {Kai Zhang and He Xiao and Qiuming Liu}, title = {Data Integrity Verification Scheme Based on Blockchain Smart Contract}, booktitle = {TrustCom}, pages = {857--863}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00119}, doi = {10.1109/TRUSTCOM56396.2022.00119}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangXL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangZJZHCWHX22, author = {Qingqing Zhang and Tao Zhang and Shikun Jiang and Qiang Zhang and Yuhui Han and Xinzhou Cheng and Yunyun Wang and Xin He and Tian Xiao}, title = {Big Data based Potential Fixed-Mobile Convergence User Mining}, booktitle = {TrustCom}, pages = {1193--1198}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00165}, doi = {10.1109/TRUSTCOM56396.2022.00165}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangZJZHCWHX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangZSCCXXL22, author = {Yi Zhang and Fan Zhang and Chuntao Song and Xinzhou Cheng and Chen Cheng and Lexi Xu and Tian Xiao and Bei Li}, title = {Telecom Customer Chum Prediction based on Half Termination Dynamic Label and XGBoost}, booktitle = {TrustCom}, pages = {1563--1568}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00224}, doi = {10.1109/TRUSTCOM56396.2022.00224}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangZSCCXXL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangZZTZ22, author = {Zhaoxi Zhang and Leo Yu Zhang and Xufei Zheng and Jinyu Tian and Jiantao Zhou}, title = {Self-Supervised Adversarial Example Detection by Disentangled Representation}, booktitle = {TrustCom}, pages = {1000--1007}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00137}, doi = {10.1109/TRUSTCOM56396.2022.00137}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangZZTZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhaoZQHZ22, author = {Hongce Zhao and Shunliang Zhang and Zhuang Qiao and Xianjin Huang and Xiaohui Zhang}, title = {On the Performance of Deep Learning Methods for Identifying Abnormal Encrypted Proxy Traffic}, booktitle = {TrustCom}, pages = {1416--1423}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00200}, doi = {10.1109/TRUSTCOM56396.2022.00200}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhaoZQHZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhengLJZXXLC22, author = {Yuting Zheng and Yi Li and Yuchao Jin and Xiaomeng Zhu and Lexi Xu and Tian Xiao and Bei Li and Xinzhou Cheng}, title = {Mahalanobis Distance and Pauta Criterion based Log Anomaly Detection Algorithm for 5G Mobile Network}, booktitle = {TrustCom}, pages = {1384--1389}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00195}, doi = {10.1109/TRUSTCOM56396.2022.00195}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhengLJZXXLC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhengO22, author = {Wanjia Zheng and Kazumasa Omote}, title = {Clean-label Backdoor Attack on Machine Learning-based Malware Detection Models and Countermeasures}, booktitle = {TrustCom}, pages = {1235--1242}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00171}, doi = {10.1109/TRUSTCOM56396.2022.00171}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhengO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhouCSJTMW22, author = {Zhe Zhou and Xiaoyu Cheng and Yang Sun and Fang Jiang and Fei Tong and Yuxing Mao and Ruilin Wang}, title = {Cache Design Effect on Microarchitecture Security: {A} Contrast between Xuantie-910 and {BOOM}}, booktitle = {TrustCom}, pages = {1199--1204}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00166}, doi = {10.1109/TRUSTCOM56396.2022.00166}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhouCSJTMW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhouDMZ22, author = {Zhipeng Zhou and Chenyu Dong and Donger Mo and Peijia Zheng}, title = {Privacy-preserving Decision Making Based on Q-Learning in Cloud Computing}, booktitle = {TrustCom}, pages = {727--732}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00103}, doi = {10.1109/TRUSTCOM56396.2022.00103}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhouDMZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhouLLRF22, author = {Zhiwen Zhou and Ximeng Liu and Jiayin Li and Junxi Ruan and Mingyuan Fan}, title = {Dynamically Selected Mixup Machine Unlearning}, booktitle = {TrustCom}, pages = {514--524}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00077}, doi = {10.1109/TRUSTCOM56396.2022.00077}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhouLLRF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhuLZXXLDZC22, author = {Xiaomeng Zhu and Yi Li and Yuting Zheng and Rui Xia and Lexi Xu and Bei Li and Zixiang Di and Lu Zhi and Xinzhou Cheng}, title = {Research on 5G Network Capacity and Expansion}, booktitle = {TrustCom}, pages = {1473--1478}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00209}, doi = {10.1109/TRUSTCOM56396.2022.00209}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhuLZXXLDZC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhuSWXHG22, author = {Zhishen Zhu and Junzheng Shi and Chonghua Wang and Gang Xiong and Zhiqiang Hao and Gaopeng Gou}, title = {{MCFM:} Discover Sensitive Behavior from Encrypted Traffic in Industrial Control System}, booktitle = {TrustCom}, pages = {897--904}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00124}, doi = {10.1109/TRUSTCOM56396.2022.00124}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhuSWXHG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/trustcom/2022, title = {{IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022}, doi = {10.1109/TRUSTCOM56396.2022}, isbn = {978-1-6654-9425-0}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/0001FLB21, author = {Xiaomin Zhu and Bowen Fei and Daqian Liu and Weidong Bao}, title = {Adaptive Clustering Ensemble Method Based on Uncertain Entropy Decision-Making}, booktitle = {TrustCom}, pages = {61--67}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00026}, doi = {10.1109/TRUSTCOM53373.2021.00026}, timestamp = {Wed, 22 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/0001FLB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/0001MP21, author = {Dominik Ziegler and Alexander Marsalek and Gerald Palfinger}, title = {White-Box Traceable Attribute-Based Encryption with Hidden Policies and Outsourced Decryption}, booktitle = {TrustCom}, pages = {331--338}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00059}, doi = {10.1109/TRUSTCOM53373.2021.00059}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/0001MP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/0011ZGZZ021, author = {Tao Peng and Wentao Zhong and Kejian Guan and Yipeng Zou and Jiawei Zhu and Guojun Wang}, title = {A Fine-grained Privacy-Preserving Profile Matching Scheme in Mobile Social Networks}, booktitle = {TrustCom}, pages = {413--419}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00069}, doi = {10.1109/TRUSTCOM53373.2021.00069}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/0011ZGZZ021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AbrahamKMRS21, author = {Andreas Abraham and Karl Koch and Stefan More and Sebastian Ramacher and Miha Stopar}, title = {Privacy-Preserving eID Derivation to Self-Sovereign Identity Systems with Offline Revocation}, booktitle = {TrustCom}, pages = {506--513}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00080}, doi = {10.1109/TRUSTCOM53373.2021.00080}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/AbrahamKMRS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AlhajailiJ21, author = {Sara Alhajaili and Arshad Jhumka}, title = {Reliable Logging in Wireless IoT Networks in the Presence of Byzantine Faults}, booktitle = {TrustCom}, pages = {17--25}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00021}, doi = {10.1109/TRUSTCOM53373.2021.00021}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/AlhajailiJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AlrabaeeCQK21, author = {Saed Alrabaee and Kim{-}Kwang Raymond Choo and Mohammad Qbea'h and Mahmoud Khasawneh}, title = {BinDeep: Binary to Source Code Matching Using Deep Learning}, booktitle = {TrustCom}, pages = {1100--1107}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00150}, doi = {10.1109/TRUSTCOM53373.2021.00150}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/AlrabaeeCQK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AotaB0M21, author = {Masaki Aota and Tao Ban and Takeshi Takahashi and Noboru Murata}, title = {Multi-label Positive and Unlabeled Learning and its Application to Common Vulnerabilities and Exposure Categorization}, booktitle = {TrustCom}, pages = {988--996}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00137}, doi = {10.1109/TRUSTCOM53373.2021.00137}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/AotaB0M21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Balasubramanian21, author = {Venki Balasubramanian and Rehena Sulthana and Andrew Stranieri and G. Manoharan and Teena Arora and Ram Srinivasan and K. Mahalakshmi and Varun G. Menon}, title = {A Secured Real-Time IoMT Application for Monitoring Isolated {COVID-19} Patients using Edge Computing}, booktitle = {TrustCom}, pages = {1227--1234}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00167}, doi = {10.1109/TRUSTCOM53373.2021.00167}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Balasubramanian21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BaoL21, author = {Tingting Bao and Yang Liu}, title = {A privacy-preserving framework for smart contracts based on stochastic model checking}, booktitle = {TrustCom}, pages = {460--467}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00075}, doi = {10.1109/TRUSTCOM53373.2021.00075}, timestamp = {Thu, 19 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/BaoL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BrinzaCP21, author = {Mihail Brinza and Miguel Correia and Jo{\~{a}}o Pereira}, title = {Virtual Static Security Analyzer for Web Applications}, booktitle = {TrustCom}, pages = {840--848}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00119}, doi = {10.1109/TRUSTCOM53373.2021.00119}, timestamp = {Tue, 15 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/BrinzaCP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/CaiSD21, author = {Mengjian Cai and Zhanli Sun and Xin Deng}, title = {Multidimensional Observation of Blockchain Security}, booktitle = {TrustCom}, pages = {1463--1466}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00208}, doi = {10.1109/TRUSTCOM53373.2021.00208}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/CaiSD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/CaiZZCLL21, author = {Zhiwei Cai and Huicong Zeng and Peijia Zheng and Ziyan Cheng and Weiqi Luo and Hongmei Liu}, title = {Secure Homomorphic Evaluation of Discrete Cosine Transform with High Precision}, booktitle = {TrustCom}, pages = {266--272}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00051}, doi = {10.1109/TRUSTCOM53373.2021.00051}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/CaiZZCLL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/CaoCXCLJSZ21, author = {Lijuan Cao and Xinzhou Cheng and Lexi Xu and Chen Cheng and Yi Li and Yuwei Jia and Chuntao Song and Heng Zhang}, title = {Preference Recommendation Scheme based on Social Networks of Mobile Users}, booktitle = {TrustCom}, pages = {1525--1530}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00220}, doi = {10.1109/TRUSTCOM53373.2021.00220}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/CaoCXCLJSZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/CastellonRK0B21, author = {Cesar Castellon and Swapnoneel Roy and O. Patrick Kreidl and Ayan Dutta and Ladislau B{\"{o}}l{\"{o}}ni}, title = {Energy Efficient Merkle Trees for Blockchains}, booktitle = {TrustCom}, pages = {1093--1099}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00149}, doi = {10.1109/TRUSTCOM53373.2021.00149}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/CastellonRK0B21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChangWGLLW21, author = {Jiqing Chang and Jin Wang and Fei Gu and Kejie Lu and Lingzhi Li and Jianping Wang}, title = {{PCHEC:} {A} Private Coded Computation Scheme For Heterogeneous Edge Computing}, booktitle = {TrustCom}, pages = {339--346}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00060}, doi = {10.1109/TRUSTCOM53373.2021.00060}, timestamp = {Tue, 17 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ChangWGLLW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenGHMM21, author = {Ligeng Chen and Jian Guo and Zhongling He and Dongliang Mu and Bing Mao}, title = {RoBin: Facilitating the Reproduction of Configuration-Related Vulnerability}, booktitle = {TrustCom}, pages = {91--98}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00030}, doi = {10.1109/TRUSTCOM53373.2021.00030}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ChenGHMM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenLYLSXW21, author = {Xiarun Chen and Qien Li and Zhou Yang and Yongzhi Liu and Shaosen Shi and Chenglin Xie and Weiping Wen}, title = {VulChecker: Achieving More Effective Taint Analysis by Identifying Sanitizers Automatically}, booktitle = {TrustCom}, pages = {774--782}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00112}, doi = {10.1109/TRUSTCOM53373.2021.00112}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ChenLYLSXW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenXZMCW21, author = {Yuhang Chen and Wenchang Xu and Wenliang Zhu and Gang Ma and Xiaohe Chen and Lirong Wang}, title = {Beat-to-beat Heart Rate Detection Based on Seismocardiogram Using BiLSTM Network}, booktitle = {TrustCom}, pages = {1503--1507}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00216}, doi = {10.1109/TRUSTCOM53373.2021.00216}, timestamp = {Tue, 02 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ChenXZMCW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenYXL21, author = {Biwen Chen and Lei Yang and Tao Xiang and Xiaoguo Li}, title = {Secure Data Transmission with Access Control for Smart Home Devices}, booktitle = {TrustCom}, pages = {258--265}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00050}, doi = {10.1109/TRUSTCOM53373.2021.00050}, timestamp = {Wed, 10 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ChenYXL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenZCLLL21, author = {Delin Chen and Peijia Zheng and Ziyang Chen and Ruopan Lai and Weiqi Luo and Hongmei Liu}, title = {Privacy-Preserving Hough Transform and Line Detection on Encrypted Cloud Images}, booktitle = {TrustCom}, pages = {486--493}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00078}, doi = {10.1109/TRUSTCOM53373.2021.00078}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChenZCLLL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Cheng0T21, author = {Jie Cheng and Kun Zhang and Bibo Tu}, title = {Remote Attestation of Large-scale Virtual Machines in the Cloud Data Center}, booktitle = {TrustCom}, pages = {180--187}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00041}, doi = {10.1109/TRUSTCOM53373.2021.00041}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Cheng0T21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Cheng0WG21, author = {Cong Cheng and Lingzhi Li and Jin Wang and Fei Gu}, title = {The Design and Implementation of Secure Distributed Image Classification Reasoning System for Heterogeneous Edge Computing}, booktitle = {TrustCom}, pages = {250--257}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00049}, doi = {10.1109/TRUSTCOM53373.2021.00049}, timestamp = {Tue, 17 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Cheng0WG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChengCZCHJZZZX21, author = {Chen Cheng and Xinzhou Cheng and Yuting Zheng and Lijuan Cao and Yuhui Han and Yuwei Jia and Qingqing Zhang and Yi Zhang and Ya{-}nan Zhang and Lexi Xu}, title = {A Novel Architecture and Algorithm for Prediction of Students Psychological Health based on Big Data}, booktitle = {TrustCom}, pages = {1391--1396}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00195}, doi = {10.1109/TRUSTCOM53373.2021.00195}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ChengCZCHJZZZX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChengF21, author = {Binqi Cheng and Weijie Feng}, title = {Analysis of the Application of Big Data in Banking Sector}, booktitle = {TrustCom}, pages = {1397--1401}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00196}, doi = {10.1109/TRUSTCOM53373.2021.00196}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ChengF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChengZHZHY21, author = {Yukun Cheng and Mengce Zheng and Fan Huang and Jiajia Zhang and Honggang Hu and Nenghai Yu}, title = {A Fast-Detection and Fault-Correction Algorithm against Persistent Fault Attack}, booktitle = {TrustCom}, pages = {557--568}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00086}, doi = {10.1109/TRUSTCOM53373.2021.00086}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ChengZHZHY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/CuiKSYD21, author = {Jiaxing Cui and Zhengmin Kong and Jing Song and Weijun Yin and Xianjun Deng}, title = {Robust AN-aided Secure Beamforming for Full-Duplex Relay System with Multiple Eavesdroppers}, booktitle = {TrustCom}, pages = {317--322}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00057}, doi = {10.1109/TRUSTCOM53373.2021.00057}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/CuiKSYD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/CuiQCY21, author = {Handong Cui and Xianrui Qin and Cailing Cai and Tsz Hon Yuen}, title = {Security on {SM2} and {GOST} Signatures against Related Key Attacks}, booktitle = {TrustCom}, pages = {155--163}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00038}, doi = {10.1109/TRUSTCOM53373.2021.00038}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/CuiQCY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/CuiWZL021, author = {Mingyue Cui and Jin Wang and Jingya Zhou and Kejie Lu and Jianping Wang}, title = {The Design of Secure Coded Edge Computing for User-Edge Collaborative Computing}, booktitle = {TrustCom}, pages = {224--231}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00046}, doi = {10.1109/TRUSTCOM53373.2021.00046}, timestamp = {Wed, 15 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/CuiWZL021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DengZXLCW21, author = {Xianwen Deng and Ruijie Zhao and Zhi Xue and Ming Liu and Libo Chen and Yijun Wang}, title = {A Semi-supervised Deep Learning-Based Solver for Breaking Text-Based CAPTCHAs}, booktitle = {TrustCom}, pages = {614--619}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00092}, doi = {10.1109/TRUSTCOM53373.2021.00092}, timestamp = {Mon, 30 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/DengZXLCW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DingLYHZL21, author = {Zhaoyun Ding and Lina Liu and Donghua Yu and Songping Huang and Hang Zhang and Kai Liu}, title = {Detection of Anomaly User Behaviors Based on Deep Neural Networks}, booktitle = {TrustCom}, pages = {1240--1245}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00169}, doi = {10.1109/TRUSTCOM53373.2021.00169}, timestamp = {Tue, 03 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/DingLYHZL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DrzazgaKS21, author = {Bartosz Drzazga and Lukasz Krzywiecki and Hannes Salin}, title = {Cryptanalysis of Deterministic and Probabilistic Multi-Copy {PDP} Schemes For Cloud Storage - Attacks and Countermeasures}, booktitle = {TrustCom}, pages = {172--179}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00040}, doi = {10.1109/TRUSTCOM53373.2021.00040}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/DrzazgaKS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DuezguenMBBAMVS21, author = {Reyhan Duezguen and Peter Mayer and Benjamin Berens and Christopher Beckmann and Lukas Aldag and Mattia Mossano and Melanie Volkamer and Thorsten Strufe}, title = {How to Increase Smart Home Security and Privacy Risk Perception}, booktitle = {TrustCom}, pages = {997--1004}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00138}, doi = {10.1109/TRUSTCOM53373.2021.00138}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/DuezguenMBBAMVS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FajgeGSH21, author = {Akshay M. Fajge and Subhasish Goswami and Arpit Srivastava and Raju Halder}, title = {Wait or Reset Gas Price?: {A} Machine Learning-based Prediction Model for Ethereum Transactions' Waiting Time}, booktitle = {TrustCom}, pages = {1153--1160}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00156}, doi = {10.1109/TRUSTCOM53373.2021.00156}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/FajgeGSH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FanZLZTQ21, author = {Chunlong Fan and Jici Zhang and Cailong Li and Zhenxin Zhang and Yiping Teng and Jianzhong Qiao}, title = {Gray Adversarial Attack Algorithm based on Multi-Scale Grid Search}, booktitle = {TrustCom}, pages = {863--870}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00122}, doi = {10.1109/TRUSTCOM53373.2021.00122}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/FanZLZTQ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FangCSW21, author = {Zerui Fang and Shiyao Cui and Qing Su and Suzhen Wang}, title = {An Implementation and Optimization Method of {RTLS} Based on {UWB} for Underground Mine}, booktitle = {TrustCom}, pages = {1254--1258}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00171}, doi = {10.1109/TRUSTCOM53373.2021.00171}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/FangCSW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FangD0QRD21, author = {Luyue Fang and Xiaoqiang Di and Xu Liu and Yiping Qin and Weiwu Ren and Qiang Ding}, title = {QuickLogS: {A} Quick Log Parsing Algorithm based on Template Similarity}, booktitle = {TrustCom}, pages = {1085--1092}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00148}, doi = {10.1109/TRUSTCOM53373.2021.00148}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/FangD0QRD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FarinellaAW21, author = {Carlo Farinella and Ali Ahmed and Craig A. Watterson}, title = {Git Leaks: Boosting Detection Effectiveness Through Endpoint Visibility}, booktitle = {TrustCom}, pages = {701--709}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00103}, doi = {10.1109/TRUSTCOM53373.2021.00103}, timestamp = {Mon, 30 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/FarinellaAW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FengTXQWL21, author = {Cong Feng and Liang Tan and Huan Xiao and Xin Qi and Zheng Wen and Yang Liu}, title = {{EDKSAP} : Efficient Double-Key Stealth Address Protocol in Blockchain}, booktitle = {TrustCom}, pages = {1196--1201}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00162}, doi = {10.1109/TRUSTCOM53373.2021.00162}, timestamp = {Wed, 16 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/FengTXQWL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FengZLLWM21, author = {Yusi Feng and Ziyuan Zhu and Shuan Li and Ben Liu and Huozhu Wang and Dan Meng}, title = {Constant-Time Loading: Modifying {CPU} Pipeline to Defeat Cache Side-Channel Attacks}, booktitle = {TrustCom}, pages = {1132--1140}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00154}, doi = {10.1109/TRUSTCOM53373.2021.00154}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/FengZLLWM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FletcherRH21, author = {Sam Fletcher and Adam Roegiest and Alexander K. Hudek}, title = {Towards Protecting Sensitive Text with Differential Privacy}, booktitle = {TrustCom}, pages = {468--475}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00076}, doi = {10.1109/TRUSTCOM53373.2021.00076}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/FletcherRH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FuFZLWW21, author = {Zhihan Fu and Qilin Fan and Xu Zhang and Xiuhua Li and Sen Wang and Yueyang Wang}, title = {Policy Network Assisted Monte Carlo Tree Search for Intelligent Service Function Chain Deployment}, booktitle = {TrustCom}, pages = {1161--1168}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00157}, doi = {10.1109/TRUSTCOM53373.2021.00157}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/FuFZLWW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FuYGWGLXL21, author = {Peipei Fu and Qingya Yang and Yangyang Guan and Bingxu Wang and Gaopeng Gou and Zhen Li and Gang Xiong and Zhenzhen Li}, title = {Towards Multi-source Extension: {A} Multi-classification Method Based on Sampled NetFlow Records}, booktitle = {TrustCom}, pages = {1069--1076}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00146}, doi = {10.1109/TRUSTCOM53373.2021.00146}, timestamp = {Wed, 08 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/FuYGWGLXL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GallettaTFCV21, author = {Antonino Galletta and Javid Taheri and Maria Fazio and Antonio Celesti and Massimo Villari}, title = {Overcoming security limitations of Secret Share techniques: the Nested Secret Share}, booktitle = {TrustCom}, pages = {289--296}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00054}, doi = {10.1109/TRUSTCOM53373.2021.00054}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/GallettaTFCV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GaoQZYML21, author = {Zhipeng Gao and Chenhao Qiu and Chen Zhao and Yang Yang and Zijia Mo and Yijing Lin}, title = {FedIM: An Anti-attack Federated Learning Based on Agent Importance Aggregation}, booktitle = {TrustCom}, pages = {1445--1451}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00205}, doi = {10.1109/TRUSTCOM53373.2021.00205}, timestamp = {Tue, 24 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GaoQZYML21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GaoYRCWZ21, author = {Ming Gao and Xiaokun Yu and Lei Ren and Hongxiang Cai and Zhiyong Wang and Yuyang Zhou}, title = {A Renewable Energy Certificate Trading System Based on Blockchain}, booktitle = {TrustCom}, pages = {1514--1518}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00218}, doi = {10.1109/TRUSTCOM53373.2021.00218}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/GaoYRCWZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GaoZLR0ZM21, author = {Zhipeng Gao and Zijian Zhuang and Yijing Lin and Lanlan Rui and Yang Yang and Chen Zhao and Zijia Mo}, title = {Select-Storage: {A} New Oracle Design Pattern on Blockchain}, booktitle = {TrustCom}, pages = {1177--1184}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00159}, doi = {10.1109/TRUSTCOM53373.2021.00159}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/GaoZLR0ZM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GayathriSXM21, author = {R. G. Gayathri and Atul Sajjanhar and Yong Xiang and Xingjun Ma}, title = {Anomaly Detection for Scenario-based Insider Activities using {CGAN} Augmented Data}, booktitle = {TrustCom}, pages = {718--725}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00105}, doi = {10.1109/TRUSTCOM53373.2021.00105}, timestamp = {Tue, 23 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GayathriSXM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GongDGQ21, author = {Changqing Gong and Zhaoyang Dong and Abdullah Gani and Han Qi}, title = {Quantum Ciphertext Dimension Reduction Scheme for Homomorphic Encrypted Data}, booktitle = {TrustCom}, pages = {903--910}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00127}, doi = {10.1109/TRUSTCOM53373.2021.00127}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/GongDGQ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GongZQLZX21, author = {Qianyun Gong and Chengjin Zhou and Le Qi and Jianbin Li and Jianzhong Zhang and Jingdong Xu}, title = {{VEIN:} High Scalability Routing Algorithm for Blockchain-based Payment Channel Networks}, booktitle = {TrustCom}, pages = {43--50}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00024}, doi = {10.1109/TRUSTCOM53373.2021.00024}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/GongZQLZX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GrisposTCMG21, author = {George Grispos and Frank Tursi and Kim{-}Kwang Raymond Choo and William Mahoney and William Bradley Glisson}, title = {A Digital Forensics Investigation of a Smart Scale IoT Ecosystem}, booktitle = {TrustCom}, pages = {710--717}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00104}, doi = {10.1109/TRUSTCOM53373.2021.00104}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/GrisposTCMG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GrunerMM21, author = {Andreas Gr{\"{u}}ner and Alexander M{\"{u}}hle and Christoph Meinel}, title = {Analyzing Interoperability and Portability Concepts for Self-Sovereign Identity}, booktitle = {TrustCom}, pages = {587--597}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00089}, doi = {10.1109/TRUSTCOM53373.2021.00089}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/GrunerMM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GuGHXL21, author = {Zheyuan Gu and Gaopeng Gou and Chengshang Hou and Gang Xiong and Zhen Li}, title = {{LFETT2021:} {A} Large-scale Fine-grained Encrypted Tunnel Traffic Dataset}, booktitle = {TrustCom}, pages = {240--249}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00048}, doi = {10.1109/TRUSTCOM53373.2021.00048}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GuGHXL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GuanZWZJ21, author = {Jiwei Guan and Xi Zheng and Chen Wang and Yipeng Zhou and Alireza Jolfaei}, title = {Robust Sensor Fusion Algorithms Against Voice Command Attacks in Autonomous Vehicles}, booktitle = {TrustCom}, pages = {895--902}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00126}, doi = {10.1109/TRUSTCOM53373.2021.00126}, timestamp = {Sun, 23 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GuanZWZJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GuoZFWGS21, author = {Jinge Guo and Yang Zhang and Zhongsheng Fan and Wei Wei and Bao Guo and Huangtao Song}, title = {Investigation on Multi-Antenna Technologies Evolution from {FDD} {LTE} to {NR} {FDD}}, booktitle = {TrustCom}, pages = {1537--1541}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00222}, doi = {10.1109/TRUSTCOM53373.2021.00222}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/GuoZFWGS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HaCJLJ21, author = {Guanxiong Ha and Hang Chen and Chunfu Jia and Ruiqi Li and Qiaowen Jia}, title = {A secure deduplication scheme based on data popularity with fully random tags}, booktitle = {TrustCom}, pages = {207--214}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00044}, doi = {10.1109/TRUSTCOM53373.2021.00044}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/HaCJLJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HajarKA21, author = {Muhammad Shadi Hajar and Harsha K. Kalutarage and M. Omar Al{-}Kadri}, title = {TrustMod: {A} Trust Management Module For {NS-3} Simulator}, booktitle = {TrustCom}, pages = {51--60}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00025}, doi = {10.1109/TRUSTCOM53373.2021.00025}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HajarKA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HamadTSZ21, author = {Salma Abdalla Hamad and Dai Hoang Tran and Quan Z. Sheng and Wei Emma Zhang}, title = {BERTDeep-Ware: {A} Cross-architecture Malware Detection Solution for IoT Systems}, booktitle = {TrustCom}, pages = {927--934}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00130}, doi = {10.1109/TRUSTCOM53373.2021.00130}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HamadTSZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HanCCXJJG21, author = {Yuhui Han and Chen Cheng and Xinzhou Cheng and Lexi Xu and Yuchao Jin and Yuwei Jia and Jie Gao}, title = {A new algorithm for demographic expansion based on multi-scene differentiated communication data}, booktitle = {TrustCom}, pages = {1508--1513}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00217}, doi = {10.1109/TRUSTCOM53373.2021.00217}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/HanCCXJJG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HanTTI21, author = {Chansu Han and Jun'ichi Takeuchi and Takeshi Takahashi and Daisuke Inoue}, title = {Automated Detection of Malware Activities Using Nonnegative Matrix Factorization}, booktitle = {TrustCom}, pages = {548--556}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00085}, doi = {10.1109/TRUSTCOM53373.2021.00085}, timestamp = {Mon, 30 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HanTTI21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HouSCLY21, author = {Chengshang Hou and Junzheng Shi and Mingxin Cui and Mengyan Liu and Jing Yu}, title = {Universal Website Fingerprinting Defense Based on Adversarial Examples}, booktitle = {TrustCom}, pages = {99--106}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00031}, doi = {10.1109/TRUSTCOM53373.2021.00031}, timestamp = {Fri, 14 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HouSCLY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HouSCY21, author = {Chengshang Hou and Junzheng Shi and Mingxin Cui and Qingya Yang}, title = {Attack versus Attack: Toward Adversarial Example Defend Website Fingerprinting Attack}, booktitle = {TrustCom}, pages = {766--773}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00111}, doi = {10.1109/TRUSTCOM53373.2021.00111}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/HouSCY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HsuM21, author = {Po{-}Chu Hsu and Atsuko Miyaji}, title = {Bidder Scalable M+1st-Price Auction with Public Verifiability}, booktitle = {TrustCom}, pages = {34--42}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00023}, doi = {10.1109/TRUSTCOM53373.2021.00023}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HsuM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HuLTLW21, author = {Yuhang Hu and De Li and Zhou Tan and Xianxian Li and Jinyan Wang}, title = {Adaptive Clipping Bound of Deep Learning with Differential Privacy}, booktitle = {TrustCom}, pages = {428--435}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00071}, doi = {10.1109/TRUSTCOM53373.2021.00071}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/HuLTLW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HuangHPS21, author = {Wenqing Huang and Fei Hao and Guangyao Pang and Yifei Sun}, title = {Complementary Context-Enhanced Concept Lattice Aware Personalized Recommendation}, booktitle = {TrustCom}, pages = {919--926}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00129}, doi = {10.1109/TRUSTCOM53373.2021.00129}, timestamp = {Fri, 03 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/HuangHPS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JiaCCGCLCJX21, author = {Yuwei Jia and Kun Chao and Xinzhou Cheng and Jian Guan and Lijuan Cao and Yi Li and Chen Cheng and Yuchao Jin and Lexi Xu}, title = {A Hybrid User Recommendation Scheme Based on Collaborative Filtering and Association Rules}, booktitle = {TrustCom}, pages = {1519--1524}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00219}, doi = {10.1109/TRUSTCOM53373.2021.00219}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/JiaCCGCLCJX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JiangLZZ21, author = {Yupeng Jiang and Yong Li and Yipeng Zhou and Xi Zheng}, title = {Sybil Attacks and Defense on Differential Privacy based Federated Learning}, booktitle = {TrustCom}, pages = {355--362}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00062}, doi = {10.1109/TRUSTCOM53373.2021.00062}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/JiangLZZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JiangTM21, author = {Chunyu Jiang and Jiafeng Tian and Pengwei Ma}, title = {Databench-T: {A} Transactional Database Benchmark for Financial Scenarios}, booktitle = {TrustCom}, pages = {1418--1421}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00200}, doi = {10.1109/TRUSTCOM53373.2021.00200}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/JiangTM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JinLLCXH21, author = {Yuchao Jin and Yi Li and Deyi Li and Xinzhou Cheng and Lexi Xu and Yuhui Han}, title = {Cell Boundary Prediction and Base Station Location Verification based on Machine Learning}, booktitle = {TrustCom}, pages = {1531--1536}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00221}, doi = {10.1109/TRUSTCOM53373.2021.00221}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/JinLLCXH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KoroniotisMTSGJ21, author = {Nickolaos Koroniotis and Nour Moustafa and Benjamin P. Turnbull and Francesco Schiliro and Praveen Gauravaram and Helge Janicke}, title = {A Deep Learning-based Penetration Testing Framework for Vulnerability Identification in Internet of Things Environments}, booktitle = {TrustCom}, pages = {887--894}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00125}, doi = {10.1109/TRUSTCOM53373.2021.00125}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/KoroniotisMTSGJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Li0H021, author = {Chi Li and Min Zhou and Xinrong Han and Ming Gu}, title = {Sensing Error Handling Bugs in {SSL} Library Usages}, booktitle = {TrustCom}, pages = {686--692}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00101}, doi = {10.1109/TRUSTCOM53373.2021.00101}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Li0H021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Li0Y21, author = {Wenjuan Li and Weizhi Meng and Laurence T. Yang}, title = {Enhancing Trust-based Medical Smartphone Networks via Blockchain-based Traffic Sampling}, booktitle = {TrustCom}, pages = {122--129}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00034}, doi = {10.1109/TRUSTCOM53373.2021.00034}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Li0Y21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiFLLY21, author = {Yuanpeng Li and Yile Fan and Shuaijun Liu and LiXiang Liu and Wenge Yang}, title = {Overview of Beam Hopping Algorithms in Large Scale {LEO} Satellite Constellation}, booktitle = {TrustCom}, pages = {1345--1351}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00187}, doi = {10.1109/TRUSTCOM53373.2021.00187}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiFLLY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiHCXLY21, author = {Mingxin Li and Mingde Huo and Xinzhou Cheng and Lexi Xu and Xiaojing Liu and Rui Yang}, title = {Joint Offloading Decision and Resource Allocation of 5G Edge Intelligent Computing for Complex Industrial Application}, booktitle = {TrustCom}, pages = {1542--1547}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00223}, doi = {10.1109/TRUSTCOM53373.2021.00223}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiHCXLY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiHXCZ21, author = {Mingxin Li and Mingde Huo and Lexi Xu and Xinzhou Cheng and Xin Zhao}, title = {Research and Application of Intelligent Antenna Feeder Optimization System based on Big Data}, booktitle = {TrustCom}, pages = {1363--1368}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00190}, doi = {10.1109/TRUSTCOM53373.2021.00190}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiHXCZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiLJY21, author = {Jianhua Li and Ximeng Liu and Jiong Jin and Shui Yu}, title = {Too Expensive to Attack: Enlarge the Attack Expense through Joint Defense at the Edge}, booktitle = {TrustCom}, pages = {524--531}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00082}, doi = {10.1109/TRUSTCOM53373.2021.00082}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiLJY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiLL0L21, author = {Yuzhe Li and Yong Liu and Bo Li and Weiping Wang and Nan Liu}, title = {Just Keep Your Concerns Private: Guaranteeing Heterogeneous Privacy and Achieving High Availability for {ERM} Algorithms}, booktitle = {TrustCom}, pages = {371--378}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00064}, doi = {10.1109/TRUSTCOM53373.2021.00064}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiLL0L21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiM21, author = {Xiaocong Li and Changshe Ma}, title = {Redactable Blockchain based on Unforgeable Signatures for Supporting Fast Verification}, booktitle = {TrustCom}, pages = {1202--1207}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00163}, doi = {10.1109/TRUSTCOM53373.2021.00163}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiWWS21, author = {Zeyi Li and Yun Wang and Pan Wang and Haorui Su}, title = {{PGAN:} {A} Generative Adversarial Network based Anomaly Detection Method for Network Intrusion Detection System}, booktitle = {TrustCom}, pages = {734--741}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00107}, doi = {10.1109/TRUSTCOM53373.2021.00107}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiWWS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiZCWJ21, author = {Jinli Li and Ran Zhang and Mingcan Cen and Xunao Wang and M. Jiang}, title = {Depression Detection Using Asynchronous Federated Optimization}, booktitle = {TrustCom}, pages = {758--765}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00110}, doi = {10.1109/TRUSTCOM53373.2021.00110}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiZCWJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiZLGL21, author = {Jingyi Li and Zikai Zhang and Yidong Li and Xinyue Guo and Huifang Li}, title = {{FIDS:} Detecting DDoS Through Federated Learning Based Method}, booktitle = {TrustCom}, pages = {856--862}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00121}, doi = {10.1109/TRUSTCOM53373.2021.00121}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiZLGL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiZNAZZ21, author = {Jiajia Li and Lingyun Zhang and Cancan Ni and Yunzhe An and Chuanyu Zong and Anzhen Zhang}, title = {Efficient k Nearest Neighbor Query Processing on Public Transportation Network}, booktitle = {TrustCom}, pages = {1108--1115}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00151}, doi = {10.1109/TRUSTCOM53373.2021.00151}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiZNAZZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiangZWDH21, author = {Genpei Liang and Xiangyu Zhou and Qingyu Wang and Yutong Du and Cheng Huang}, title = {Malicious Packages Lurking in User-Friendly Python Package Index}, booktitle = {TrustCom}, pages = {606--613}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00091}, doi = {10.1109/TRUSTCOM53373.2021.00091}, timestamp = {Thu, 27 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiangZWDH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LimNXG0NM21, author = {Wei Yang Bryan Lim and Jer Shyuan Ng and Zehui Xiong and Sahil Garg and Yang Zhang and Dusit Niyato and Chunyan Miao}, title = {Dynamic Edge Association in Hierarchical Federated Learning Networks}, booktitle = {TrustCom}, pages = {1124--1131}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00153}, doi = {10.1109/TRUSTCOM53373.2021.00153}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LimNXG0NM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LingZCWJ21, author = {Yuhua Ling and Ran Zhang and Mingcan Cen and Xunao Wang and M. Jiang}, title = {Cost-sensitive Heterogeneous Integration for Credit Card Fraud Detection}, booktitle = {TrustCom}, pages = {750--757}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00109}, doi = {10.1109/TRUSTCOM53373.2021.00109}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LingZCWJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuBFZXM21, author = {Daqian Liu and Weidong Bao and Bowen Fei and Xiaomin Zhu and Zhenliang Xiao and Tong Men}, title = {Multi-UAV Cooperative Obstacle Avoidance and Surveillance in Intelligent Transportation}, booktitle = {TrustCom}, pages = {1013--1020}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00140}, doi = {10.1109/TRUSTCOM53373.2021.00140}, timestamp = {Wed, 22 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiuBFZXM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuCLLW21, author = {Xiaohong Liu and Hanbo Cai and De Li and Xianxian Li and Jinyan Wang}, title = {Differential Privacy Preservation in Adaptive K-Nets Clustering}, booktitle = {TrustCom}, pages = {405--412}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00068}, doi = {10.1109/TRUSTCOM53373.2021.00068}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiuCLLW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuFX21, author = {Xu Liu and Dongxu Fang and Peng Xu}, title = {Automated Performance Benchmarking Platform of IaaS Cloud}, booktitle = {TrustCom}, pages = {1402--1405}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00197}, doi = {10.1109/TRUSTCOM53373.2021.00197}, timestamp = {Wed, 08 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiuFX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuGL21, author = {Hao Liu and Zhenyu Guan and Peng Lei}, title = {A Filter Rank Based Pruning Method for Convolutional Neural Networks}, booktitle = {TrustCom}, pages = {1318--1322}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00182}, doi = {10.1109/TRUSTCOM53373.2021.00182}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiuGL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuGZBHZGDL21, author = {Yuefeng Liu and Wei Guo and Hanyu Zhang and Haodong Bian and Yingjie He and Xiaoyan Zhang and Yanzhang Gong and Jianmin Dong and Zhen Liu}, title = {Construction of Knowledge Graph Based on Discipline Inspection and Supervision}, booktitle = {TrustCom}, pages = {1467--1472}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00209}, doi = {10.1109/TRUSTCOM53373.2021.00209}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiuGZBHZGDL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuJWP21, author = {Huanlong Liu and Bin Jiang and Zhengjie Wang and Hongyu Peng}, title = {An Measurement Method of Oblique Wedge Rubbing Surface Abrasion Based on Point Cloud}, booktitle = {TrustCom}, pages = {1220--1226}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00166}, doi = {10.1109/TRUSTCOM53373.2021.00166}, timestamp = {Fri, 15 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiuJWP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuJZZCX21, author = {Xiqing Liu and Hongshui Jing and Shiyu Zhou and Zhenqiao Zhao and Xinzhou Cheng and Lexi Xu}, title = {Key technologies for 5G co-construction and shared base station data automatic configuration}, booktitle = {TrustCom}, pages = {1559--1563}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00226}, doi = {10.1109/TRUSTCOM53373.2021.00226}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiuJZZCX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuLY21, author = {Xu Liu and Ruoyu Li and Penghao Yue}, title = {Design and Implementation of Intelligent Operation and Maintenance System for Big Data Platform}, booktitle = {TrustCom}, pages = {1374--1379}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00192}, doi = {10.1109/TRUSTCOM53373.2021.00192}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiuLY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuTYZZZ21, author = {Boru Liu and Dan Tang and Yudong Yan and Zhiqing Zheng and Shihan Zhang and Jiangmeng Zhou}, title = {{TS-SVM:} Detect LDoS Attack in {SDN} Based on Two-step Self-adjusting {SVM}}, booktitle = {TrustCom}, pages = {678--685}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00100}, doi = {10.1109/TRUSTCOM53373.2021.00100}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiuTYZZZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuWCP21, author = {Huanlong Liu and Zhengjie Wang and Yao Chen and Hongyu Peng}, title = {An axis extract method for rotational parts based on point cloud normal lines}, booktitle = {TrustCom}, pages = {1265--1269}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00173}, doi = {10.1109/TRUSTCOM53373.2021.00173}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiuWCP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuWJP21, author = {Huanlong Liu and Zhengjie Wang and Bin Jiang and Hongyu Peng}, title = {An inertia wheel pendulum control method based on actor-critic learning algorithm}, booktitle = {TrustCom}, pages = {1281--1285}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00176}, doi = {10.1109/TRUSTCOM53373.2021.00176}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiuWJP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuWL21, author = {Yucheng Liu and Hao Wu and Xiangxue Li}, title = {Another Look at the Connection between {CAN} Signal Ringing {\&} In-Vehicle {ECU} Identification}, booktitle = {TrustCom}, pages = {1021--1030}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00141}, doi = {10.1109/TRUSTCOM53373.2021.00141}, timestamp = {Sun, 23 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiuWL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuWWWW21, author = {Gaoyang Liu and Shijie Wang and Borui Wan and Zekun Wang and Chen Wang}, title = {ML-Stealer: Stealing Prediction Functionality of Machine Learning Models with Mere Black-Box Access}, booktitle = {TrustCom}, pages = {532--539}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00083}, doi = {10.1109/TRUSTCOM53373.2021.00083}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiuWWWW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuWXWLS21, author = {Yang Liu and Ershen Wang and Song Xu and Zhi Wang and Meizhi Liu and Wansen Shu}, title = {Simple Online Unmanned Aerial Vehicle Tracking with Transformer}, booktitle = {TrustCom}, pages = {1235--1239}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00168}, doi = {10.1109/TRUSTCOM53373.2021.00168}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiuWXWLS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuZG21, author = {Junkai Liu and Shihui Zheng and Lize Gu}, title = {Effective Deep Learning-based Side-Channel Analyses Against {ASCAD}}, booktitle = {TrustCom}, pages = {514--523}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00081}, doi = {10.1109/TRUSTCOM53373.2021.00081}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiuZG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuZGBHL21, author = {Yuefeng Liu and Xiaoyan Zhang and Wei Guo and Haodong Bian and Yingjie He and Zhen Liu}, title = {Prediction of remaining useful life of turbofan engine based on optimized model}, booktitle = {TrustCom}, pages = {1473--1477}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00210}, doi = {10.1109/TRUSTCOM53373.2021.00210}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiuZGBHL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuZNWZL21, author = {Jifeng Liu and Yao Zhou and Yiying Niu and Tingting Wang and Tao Zhang and Fuchang Li}, title = {Sharing and Compatibility Studies of EESS(active) and {IMT} System in 10-10.5 GHz}, booktitle = {TrustCom}, pages = {1439--1444}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00204}, doi = {10.1109/TRUSTCOM53373.2021.00204}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiuZNWZL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuZZWS21, author = {Yuhan Liu and Yutao Zhang and Heng Zhang and Yongfeng Wang and Lianbo Song}, title = {Design of Digital Maincenter Platform for Smart Home Based on Big Data}, booktitle = {TrustCom}, pages = {1340--1344}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00186}, doi = {10.1109/TRUSTCOM53373.2021.00186}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiuZZWS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LuoZWJZH21, author = {Zhimin Luo and Mengce Zheng and Ping Wang and Minhui Jin and Jiajia Zhang and Honggang Hu}, title = {Towards Strengthening Deep Learning-based Side Channel Attacks with Mixup}, booktitle = {TrustCom}, pages = {791--801}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00114}, doi = {10.1109/TRUSTCOM53373.2021.00114}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LuoZWJZH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LvLCWT21, author = {Ke Lv and Yuan Liu and Jienan Chen and Dongxia Wang and Zhihong Tian}, title = {An Interactive System for Unfair Rating Detection Models in a Customized Perspective}, booktitle = {TrustCom}, pages = {871--878}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00123}, doi = {10.1109/TRUSTCOM53373.2021.00123}, timestamp = {Mon, 25 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LvLCWT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MaLG21, author = {Xuebin Ma and Haijiang Liu and Shengyi Guan}, title = {Improving the Effect of Frequent Itemset Mining with Hadamard Response under Local Differential Privacy}, booktitle = {TrustCom}, pages = {436--443}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00072}, doi = {10.1109/TRUSTCOM53373.2021.00072}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/MaLG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MaLQ21, author = {Jianfeng Ma and Xiangxue Li and Haifeng Qian}, title = {{LVRT:} Low Variances of Solo Mining Reward {\&} Inter-block Time in Collaborative PoW}, booktitle = {TrustCom}, pages = {1039--1048}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00143}, doi = {10.1109/TRUSTCOM53373.2021.00143}, timestamp = {Tue, 22 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/MaLQ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MaQL21, author = {Jie Ma and Bin Qi and Kewei Lv}, title = {{BSA:} Enabling Biometric-Based Storage and Authorization on Blockchain}, booktitle = {TrustCom}, pages = {1077--1084}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00147}, doi = {10.1109/TRUSTCOM53373.2021.00147}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/MaQL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MaWJLTLZ21, author = {Pengwei Ma and Kai Wei and Chunyu Jiang and Junyi Li and Jiafeng Tian and Siyuan Liu and Minjing Zhong}, title = {Research on Evaluation System of Relational Cloud Database}, booktitle = {TrustCom}, pages = {1369--1373}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00191}, doi = {10.1109/TRUSTCOM53373.2021.00191}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/MaWJLTLZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MachadoSW21, author = {Caciano Machado and Renan R. S. dos Santos and Carla Merkle Westphall}, title = {Hop-by-hop Accounting and Rewards for Packet dIspAtching}, booktitle = {TrustCom}, pages = {1116--1123}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00152}, doi = {10.1109/TRUSTCOM53373.2021.00152}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/MachadoSW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MalikGDKJ21, author = {Sidra Malik and Naman Gupta and Volkan Dedeoglu and Salil S. Kanhere and Raja Jurdak}, title = {TradeChain: Decoupling Traceability and Identity in Blockchain enabled Supply Chains}, booktitle = {TrustCom}, pages = {1141--1152}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00155}, doi = {10.1109/TRUSTCOM53373.2021.00155}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/MalikGDKJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MallojulaALL21, author = {Prashanthi Mallojula and Javaria Ahmad and Fengjun Li and Bo Luo}, title = {You Are (not) Who Your Peers Are: Identification of Potentially Excessive Permission Requests in Android Apps}, booktitle = {TrustCom}, pages = {114--121}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00033}, doi = {10.1109/TRUSTCOM53373.2021.00033}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/MallojulaALL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MamunS21, author = {Mohammad Mamun and Kevin Shi}, title = {DeepTaskAPT: Insider {APT} detection using Task-tree based Deep Learning}, booktitle = {TrustCom}, pages = {693--700}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00102}, doi = {10.1109/TRUSTCOM53373.2021.00102}, timestamp = {Mon, 04 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/MamunS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MarsalekZ21, author = {Alexander Marsalek and Thomas Zefferer}, title = {Compressing the Bitcoin Blockchain using Incremental Snapshots}, booktitle = {TrustCom}, pages = {1169--1176}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00158}, doi = {10.1109/TRUSTCOM53373.2021.00158}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/MarsalekZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MoXP21, author = {Zhiyi Mo and Yutong Xing and Zizhen Peng}, title = {Application of Bayesian Network Reasoning Algorithm in Emotion Classification}, booktitle = {TrustCom}, pages = {1214--1219}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00165}, doi = {10.1109/TRUSTCOM53373.2021.00165}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/MoXP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/NiuZZL21, author = {Yiying Niu and Yao Zhou and Tao Zhang and Fuchang Li}, title = {Study on {TDD} Unsynchronized Interference from Outdoor to Indoor Scenario in 3.3-3.6 GHz}, booktitle = {TrustCom}, pages = {1548--1553}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00224}, doi = {10.1109/TRUSTCOM53373.2021.00224}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/NiuZZL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Ouyang021, author = {Linshu Ouyang and Yongzheng Zhang}, title = {Phishing Web Page Detection with HTML-Level Graph Neural Network}, booktitle = {TrustCom}, pages = {952--958}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00133}, doi = {10.1109/TRUSTCOM53373.2021.00133}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Ouyang021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/PanickerSR21, author = {Jithu Geevargheese Panicker and Ahmad Salehi S. and Carsten Rudolph}, title = {Authentication and Access Control in 5G Device-to-Device Communication}, booktitle = {TrustCom}, pages = {1575--1582}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00229}, doi = {10.1109/TRUSTCOM53373.2021.00229}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/PanickerSR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/PasikhaniCG21, author = {Aryan Mohammadi Pasikhani and John A. Clark and Prosanta Gope}, title = {Reinforcement-Learning-based {IDS} for 6LoWPAN}, booktitle = {TrustCom}, pages = {1049--1060}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00144}, doi = {10.1109/TRUSTCOM53373.2021.00144}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/PasikhaniCG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Patgiri21, author = {Ripon Patgiri}, title = {Rando: {A} General-purpose True Random Number Generator for Conventional Computers}, booktitle = {TrustCom}, pages = {107--113}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00032}, doi = {10.1109/TRUSTCOM53373.2021.00032}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Patgiri21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Peng00WL21, author = {Mengyao Peng and Jia Hu and Hui Lin and Xiaoding Wang and Wenzhong Lin}, title = {A Privacy-Enhanced Mobile Crowdsensing Strategy for Blockchain Empowered Internet of Medical Things}, booktitle = {TrustCom}, pages = {387--396}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00066}, doi = {10.1109/TRUSTCOM53373.2021.00066}, timestamp = {Fri, 24 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Peng00WL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Peng0TW00021, author = {Yu Peng and Qin Liu and Yue Tian and Jie Wu and Tian Wang and Tao Peng and Guojun Wang}, title = {Dynamic Searchable Symmetric Encryption with Forward and Backward Privacy}, booktitle = {TrustCom}, pages = {420--427}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00070}, doi = {10.1109/TRUSTCOM53373.2021.00070}, timestamp = {Fri, 29 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Peng0TW00021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/PengSWHXX21, author = {Hongyu Peng and Fujian Sun and Kan Wang and Tianlu Hao and Dequan Xiao and Lexi Xu}, title = {A Non-Cooperative Data Center Energy Consumption Optimization Strategy Based on {SDN} Structure}, booktitle = {TrustCom}, pages = {1386--1390}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00194}, doi = {10.1109/TRUSTCOM53373.2021.00194}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/PengSWHXX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Poniszewska-Maranda21, author = {Aneta Poniszewska{-}Maranda and Lukasz Rogozinski and Witold Maranda}, title = {Security Library for Safe Data Storage on Android Platform}, booktitle = {TrustCom}, pages = {309--316}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00056}, doi = {10.1109/TRUSTCOM53373.2021.00056}, timestamp = {Tue, 15 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Poniszewska-Maranda21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Poniszewska-Maranda21a, author = {Aneta Poniszewska{-}Maranda and Lukasz Chomatek and Joanna Ochelska{-}Mierzejewska}, title = {Secure Development Strategy Model Framework for Security of Mobile Applications}, booktitle = {TrustCom}, pages = {1294--1299}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00178}, doi = {10.1109/TRUSTCOM53373.2021.00178}, timestamp = {Tue, 15 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Poniszewska-Maranda21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/PradelM21, author = {Ga{\"{e}}tan Pradel and Chris J. Mitchell}, title = {Privacy-Preserving Biometric Matching Using Homomorphic Encryption}, booktitle = {TrustCom}, pages = {494--505}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00079}, doi = {10.1109/TRUSTCOM53373.2021.00079}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/PradelM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/QiangCZDQ21, author = {Qian Qiang and Mian Cheng and Yuan Zhou and Yu Ding and Zisen Qi}, title = {{MALUP:} {A} Malware Classification Framework using Convolutional Neural Network with Deep Unsupervised Pre-training}, booktitle = {TrustCom}, pages = {627--634}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00094}, doi = {10.1109/TRUSTCOM53373.2021.00094}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/QiangCZDQ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/RabieinejadYP21, author = {Elnaz Rabieinejad and Abbas Yazdinejad and Reza M. Parizi}, title = {A Deep Learning Model for Threat Hunting in Ethereum Blockchain}, booktitle = {TrustCom}, pages = {1185--1190}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00160}, doi = {10.1109/TRUSTCOM53373.2021.00160}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/RabieinejadYP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/RahmanSR21, author = {M. Ridwanur Rahman and Ahmad Salehi S. and Carsten Rudolph}, title = {Decentralized Policy Information Points for Multi-Domain Environments}, booktitle = {TrustCom}, pages = {1286--1293}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00177}, doi = {10.1109/TRUSTCOM53373.2021.00177}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/RahmanSR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/RoyMM21, author = {Swapnoneel Roy and Sam Matloob and Debajyoti Mukhopadhyay}, title = {On Application of Blockchain to Enhance Single Sign-On {(SSO)} Systems}, booktitle = {TrustCom}, pages = {1191--1195}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00161}, doi = {10.1109/TRUSTCOM53373.2021.00161}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/RoyMM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ShiDWYLW21, author = {Wei Shi and Mixue Deng and Dong Wang and Yuyun Yang and Deyin Li and Lirong Wang}, title = {Design and Implementation of Scanning Electron Microscope Image Acquisition Software System}, booktitle = {TrustCom}, pages = {1478--1482}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00211}, doi = {10.1109/TRUSTCOM53373.2021.00211}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ShiDWYLW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SiddiquiMSS021, author = {Sarah Ali Siddiqui and Adnan Mahmood and Quan Z. Sheng and Hajime Suzuki and Wei Ni}, title = {A Time-aware Trust Management Heuristic for the Internet of Vehicles}, booktitle = {TrustCom}, pages = {1--8}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00019}, doi = {10.1109/TRUSTCOM53373.2021.00019}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SiddiquiMSS021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SlavnenkoZJKD21, author = {Maksym Slavnenko and Yevhen Zolotavkin and Jongkil Jay Jeong and Veronika Kuchta and Robin Doss}, title = {Enhancing Privacy Through {DMMA:} Decision-Making Method for Authentication}, booktitle = {TrustCom}, pages = {297--308}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00055}, doi = {10.1109/TRUSTCOM53373.2021.00055}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SlavnenkoZJKD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Song0Y21, author = {Qige Song and Yongzheng Zhang and Junliang Yao}, title = {DroidRadar: Android Malware Detection Based on Global Sensitive Graph Embedding}, booktitle = {TrustCom}, pages = {802--809}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00115}, doi = {10.1109/TRUSTCOM53373.2021.00115}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Song0Y21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SunWCM21, author = {Weifeng Sun and Yiming Wang and Kangkang Chang and Kelong Meng}, title = {IdiffGrad: {A} Gradient Descent Algorithm for Intrusion Detection Based on diffGrad}, booktitle = {TrustCom}, pages = {1583--1590}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00231}, doi = {10.1109/TRUSTCOM53373.2021.00231}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/SunWCM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TanTZYZD21, author = {Shuaishuai Tan and Zhiyi Tian and Xiaoxiong Zhong and Shui Yu and Weizhe Zhang and Guozhong Dong}, title = {A Novel Android Malware Detection Method Based on Visible User Interface}, booktitle = {TrustCom}, pages = {659--666}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00098}, doi = {10.1109/TRUSTCOM53373.2021.00098}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/TanTZYZD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TengSZDXF21, author = {Yiping Teng and Zhan Shi and Fanyou Zhao and Guohui Ding and Li Xu and Chunlong Fan}, title = {Signature-Based Secure Trajectory Similarity Search}, booktitle = {TrustCom}, pages = {196--206}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00043}, doi = {10.1109/TRUSTCOM53373.2021.00043}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/TengSZDXF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TengZZXFW21, author = {Yiping Teng and Weiyu Zhao and Chuanyu Zong and Li Xu and Chunlong Fan and Huan Wang}, title = {Answering Why-not Questions on Top k Queries with Privacy Protection}, booktitle = {TrustCom}, pages = {476--485}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00077}, doi = {10.1109/TRUSTCOM53373.2021.00077}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/TengZZXFW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TianZY21, author = {Changbo Tian and Yongzheng Zhang and Tao Yin}, title = {A Feature-Flux Traffic Camouflage Method based on Twin Gaussian Process}, booktitle = {TrustCom}, pages = {959--966}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00134}, doi = {10.1109/TRUSTCOM53373.2021.00134}, timestamp = {Wed, 08 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/TianZY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TupakulaVK21, author = {Uday Kiran Tupakula and Vijay Varadharajan and Kallol Krishna Karmakar}, title = {Techniques for Securing Control Systems from Attacks}, booktitle = {TrustCom}, pages = {281--288}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00053}, doi = {10.1109/TRUSTCOM53373.2021.00053}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/TupakulaVK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/VaradharajanTK21, author = {Vijay Varadharajan and Uday Kiran Tupakula and Kallol Krishna Karmakar}, title = {Techniques for Securing 5G Network Services from attacks}, booktitle = {TrustCom}, pages = {273--280}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00052}, doi = {10.1109/TRUSTCOM53373.2021.00052}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/VaradharajanTK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Wang0C21, author = {Zhaoning Wang and Bo Cheng and Junliang Chen}, title = {Online Automatic Service Composition for Mobile and Pervasive Computing}, booktitle = {TrustCom}, pages = {1428--1433}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00202}, doi = {10.1109/TRUSTCOM53373.2021.00202}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Wang0C21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangCLCYZ21, author = {Dong Wang and Yue Che and Chao Li and Yahui Chen and Hui Yin and Chunlian Zhang}, title = {Base Station Prediction Analysis Scheme Based on Lasso Regression Machine Learning Algorithm}, booktitle = {TrustCom}, pages = {1406--1411}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00198}, doi = {10.1109/TRUSTCOM53373.2021.00198}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WangCLCYZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangGYL21, author = {Xiaoyu Wang and Xiaorui Gong and Lei Yu and Jian Liu}, title = {{MAAC:} Novel Alert Correlation Method To Detect Multi-step Attack}, booktitle = {TrustCom}, pages = {726--733}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00106}, doi = {10.1109/TRUSTCOM53373.2021.00106}, timestamp = {Sun, 05 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WangGYL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangKYWSCGW021, author = {Runhao Wang and Jiexiang Kang and Wei Yin and Hui Wang and Haiying Sun and Xiaohong Chen and Zhongjie Gao and Shuning Wang and Jing Liu}, title = {DeepTrace: {A} Secure Fingerprinting Framework for Intellectual Property Protection of Deep Neural Networks}, booktitle = {TrustCom}, pages = {188--195}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00042}, doi = {10.1109/TRUSTCOM53373.2021.00042}, timestamp = {Mon, 23 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WangKYWSCGW021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangLMTLZJ21, author = {Chaolun Wang and Yuan Liu and Pengwei Ma and Jiafeng Tian and Siyuan Liu and Minjing Zhong and Chunyu Jiang}, title = {Research and implementation of an analytical database testing platform in telecommunication industry}, booktitle = {TrustCom}, pages = {1328--1333}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00184}, doi = {10.1109/TRUSTCOM53373.2021.00184}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WangLMTLZJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangMPL21, author = {Yajie Wang and Jinli Ma and Zhao Pei and Jun Li}, title = {Human Trajectory Prediction Using Stacked Temporal Convolutional Network}, booktitle = {TrustCom}, pages = {1270--1274}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00174}, doi = {10.1109/TRUSTCOM53373.2021.00174}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WangMPL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangPF021, author = {Shuran Wang and Dahan Pan and Runhan Feng and Yuanyuan Zhang}, title = {MagikCube: Securing Cross-Domain Publish/Subscribe Systems with Enclave}, booktitle = {TrustCom}, pages = {147--154}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00037}, doi = {10.1109/TRUSTCOM53373.2021.00037}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WangPF021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangQLZW21, author = {Duoduo Wang and Lishen Qiu and Wanyue Li and Wenliang Zhu and Lirong Wang}, title = {An Automatic Algorithm for P/T-Wave Detection based on Auxiliary Waveform}, booktitle = {TrustCom}, pages = {1493--1497}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00214}, doi = {10.1109/TRUSTCOM53373.2021.00214}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WangQLZW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangSSSLW21, author = {Chuanyun Wang and Zhongrui Shi and Keyi Si and Yang Su and Zhaokui Li and Ershen Wang}, title = {Anti-occlusion and Scale Adaptive Target Tracking Algorithm Based on Kernel Correlation Filter}, booktitle = {TrustCom}, pages = {130--138}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00035}, doi = {10.1109/TRUSTCOM53373.2021.00035}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WangSSSLW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangT21, author = {Yinghe Wang and Yu Tang}, title = {{BRLR:} {A} Routing Strategy for {MANET} Based on Reinforcement Learning}, booktitle = {TrustCom}, pages = {1412--1417}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00199}, doi = {10.1109/TRUSTCOM53373.2021.00199}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WangT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangWCLZ21, author = {Jianfang Wang and Zhiqiang Wu and Guang Chen and Detao Liu and Qiuling Zhang}, title = {An Adaptive Multi-pairwise Ranking with Implicit Feedback for Recommendation}, booktitle = {TrustCom}, pages = {1005--1012}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00139}, doi = {10.1109/TRUSTCOM53373.2021.00139}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WangWCLZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangWH21, author = {Gao Wang and Gaoli Wang and Yu He}, title = {Improved Machine Learning Assisted (Related-key) Differential Distinguishers For Lightweight Ciphers}, booktitle = {TrustCom}, pages = {164--171}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00039}, doi = {10.1109/TRUSTCOM53373.2021.00039}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WangWH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangWJTZLL21, author = {Zhuo Wang and Kai Wei and Chunyu Jiang and Jiafeng Tian and Minjing Zhong and Yuan Liu and Yanmei Liu}, title = {Research on Productization and Development Trend of Data Desensitization Technology}, booktitle = {TrustCom}, pages = {1564--1569}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00227}, doi = {10.1109/TRUSTCOM53373.2021.00227}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WangWJTZLL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangWPLC21, author = {Yajie Wang and Zhiyang Wan and Zhao Pei and Chengcai Leng and Yuli Chen}, title = {GEA-net: Global embedded attention neural network for image classification}, booktitle = {TrustCom}, pages = {1300--1305}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00179}, doi = {10.1109/TRUSTCOM53373.2021.00179}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WangWPLC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangWZC21, author = {Xiaoqing Wang and Chunping Wang and Kun Zhou and Hongbing Cheng}, title = {{ESS:} An Efficient Storage Scheme for Improving the Scalability of Bitcoin System}, booktitle = {TrustCom}, pages = {911--918}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00128}, doi = {10.1109/TRUSTCOM53373.2021.00128}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WangWZC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangYSZWW21, author = {Chuanyun Wang and Guowei Yang and Dongdong Sun and Jiankai Zuo and Ershen Wang and Linlin Wang}, title = {Frequency Domain Fusion Algorithm of Infrared and Visible Image Based on Compressed Sensing for Video Surveillance Forensics}, booktitle = {TrustCom}, pages = {832--839}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00118}, doi = {10.1109/TRUSTCOM53373.2021.00118}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WangYSZWW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangZLLLZ21, author = {Ling Wang and Cheng Zhang and Zejian Luo and Chenguang Liu and Jie Liu and Xi Zheng}, title = {{PDAAA:} Progressive Defense Against Adversarial Attacks for Deep Learning-as-a-Service in Internet of Things}, booktitle = {TrustCom}, pages = {879--886}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00124}, doi = {10.1109/TRUSTCOM53373.2021.00124}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WangZLLLZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangZLT21, author = {Lin Wang and Kun Zhang and Chen Li and Bibo Tu}, title = {Log-based Anomaly Detection from Multi-view by Associating Anomaly Scores with User Trust}, booktitle = {TrustCom}, pages = {643--650}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00096}, doi = {10.1109/TRUSTCOM53373.2021.00096}, timestamp = {Mon, 14 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WangZLT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangZPL21, author = {Tingting Wang and Yao Zhou and Yushan Pei and Fuchang Li}, title = {Research of Sharing and Compatibility for {HIBS} and Terrestrial Network in 900MHz}, booktitle = {TrustCom}, pages = {1380--1385}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00193}, doi = {10.1109/TRUSTCOM53373.2021.00193}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WangZPL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WeiZFGGS21, author = {Wei Wei and Yang Zhang and Zhongsheng Fan and Jinge Guo and Bao Guo and Huangtao Song}, title = {{NR} Shared Spectrum efficiency and utilization analysis based on big data}, booktitle = {TrustCom}, pages = {1358--1362}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00189}, doi = {10.1109/TRUSTCOM53373.2021.00189}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WeiZFGGS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WenZPW21, author = {Ruxue Wen and Rui Zhang and Kai Peng and Chen Wang}, title = {Protecting Locations with Differential Privacy against Location-Dependent Attacks in Continuous {LBS} Queries}, booktitle = {TrustCom}, pages = {379--386}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00065}, doi = {10.1109/TRUSTCOM53373.2021.00065}, timestamp = {Tue, 21 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WenZPW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WuCSDZ021, author = {Susheng Wu and Bin Chen and Mingxu Sun and Renyu Duan and Qixiang Zhang and Cheng Huang}, title = {DeepVuler: {A} Vulnerability Intelligence Mining System for Open-Source Communities}, booktitle = {TrustCom}, pages = {598--605}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00090}, doi = {10.1109/TRUSTCOM53373.2021.00090}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WuCSDZ021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WuLPK21, author = {Huanyu Wu and Lunjie Li and Hye{-}Young Paik and Salil S. Kanhere}, title = {MEChain: {A} Multi-layer Blockchain Structure with Hierarchical Consensus for Secure {EHR} System}, booktitle = {TrustCom}, pages = {976--987}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00136}, doi = {10.1109/TRUSTCOM53373.2021.00136}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WuLPK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WuW021, author = {Huizi Wu and Shiyi Wang and Hui Fang}, title = {{LP-UIT:} {A} Multimodal Framework for Link Prediction in Social Networks}, booktitle = {TrustCom}, pages = {742--749}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00108}, doi = {10.1109/TRUSTCOM53373.2021.00108}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WuW021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WuXZ21, author = {Bolun Wu and Yuanhang Xu and Futai Zou}, title = {Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs}, booktitle = {TrustCom}, pages = {540--547}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00084}, doi = {10.1109/TRUSTCOM53373.2021.00084}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WuXZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WuZLLF21, author = {Jiating Wu and Yujia Zhu and Baiyang Li and Qingyun Liu and Binxing Fang}, title = {Peek Inside the Encrypted World: Autoencoder-Based Detection of DoH Resolvers}, booktitle = {TrustCom}, pages = {783--790}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00113}, doi = {10.1109/TRUSTCOM53373.2021.00113}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WuZLLF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XiaDZL21, author = {Qing Xia and Wensheng Dou and Fengjun Zhang and Geng Liang}, title = {The Performance of Selfish Mining in {GHOST}}, booktitle = {TrustCom}, pages = {26--33}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00022}, doi = {10.1109/TRUSTCOM53373.2021.00022}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/XiaDZL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XiaWHXGLL21, author = {Wei Xia and Wei Wang and Xin He and Gang Xiong and Gaopeng Gou and Zhenzhen Li and Zhen Li}, title = {Old Habits Die Hard: {A} Sober Look at {TLS} Client Certificates in the Real World}, booktitle = {TrustCom}, pages = {83--90}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00029}, doi = {10.1109/TRUSTCOM53373.2021.00029}, timestamp = {Wed, 27 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/XiaWHXGLL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XieGSSCLW21, author = {Chenglin Xie and Yujie Guo and Shaosen Shi and Yu Sheng and Xiarun Chen and Chengyang Li and Weiping Wen}, title = {EnvFaker: {A} Method to Reinforce Linux Sandbox Based on Tracer, Filter and Emulator against Environmental-Sensitive Malware}, booktitle = {TrustCom}, pages = {667--677}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00099}, doi = {10.1109/TRUSTCOM53373.2021.00099}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/XieGSSCLW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XingM21, author = {Jiangna Xing and Xuebin Ma}, title = {DP-gSpan: {A} Pattern Growth-based Differentially Private Frequent Subgraph Mining Algorithm}, booktitle = {TrustCom}, pages = {397--404}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00067}, doi = {10.1109/TRUSTCOM53373.2021.00067}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/XingM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XuHWWW21, author = {Sujie Xu and Xin Hu and Libing Wang and Yin Wang and Weidong Wang}, title = {Joint Power and Bandwidth Allocation for Internet of Vehicles Based on Proximal Policy Optimization Algorithm}, booktitle = {TrustCom}, pages = {1352--1357}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00188}, doi = {10.1109/TRUSTCOM53373.2021.00188}, timestamp = {Thu, 02 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/XuHWWW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XuWGY0Z21, author = {Ke Xu and Miaoqiong Wang and Yuming Ge and Rundong Yu and Jian Wang and Jiachen Zhang}, title = {{C-V2X} Large-scale Test Network Transmission Performance Data Analysis Method}, booktitle = {TrustCom}, pages = {1334--1339}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00185}, doi = {10.1109/TRUSTCOM53373.2021.00185}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/XuWGY0Z21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XuZZ0S21, author = {Chang Xu and Lvhan Zhang and Liehuang Zhu and Chuan Zhang and Kashif Sharif}, title = {Achieving Efficient and Privacy-preserving Biometric Identification in Cloud Computing}, booktitle = {TrustCom}, pages = {363--370}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00063}, doi = {10.1109/TRUSTCOM53373.2021.00063}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/XuZZ0S21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XueHSWL21, author = {Mingfu Xue and Can He and Shichang Sun and Jian Wang and Weiqiang Liu}, title = {Robust Backdoor Attacks against Deep Neural Networks in Real Physical World}, booktitle = {TrustCom}, pages = {620--626}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00093}, doi = {10.1109/TRUSTCOM53373.2021.00093}, timestamp = {Wed, 22 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/XueHSWL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XueWZHZ21, author = {Xingsi Xue and Haolin Wang and Yunmeng Zhao and Yikun Huang and Hai Zhu}, title = {Matching Sensor Ontologies with Neural Network}, booktitle = {TrustCom}, pages = {1452--1457}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00206}, doi = {10.1109/TRUSTCOM53373.2021.00206}, timestamp = {Fri, 25 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/XueWZHZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YanLCYWFCWS21, author = {Zhuo Yan and Bin Lan and Shaohao Chen and Senyu Yu and Xingwei Wang and Zhuoqun Fang and Wei Chen and Chuanyun Wang and Xiangbin Shi}, title = {Design of Lightweight Intelligent Vehicle System Based on Hybrid Depth Model}, booktitle = {TrustCom}, pages = {1306--1311}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00180}, doi = {10.1109/TRUSTCOM53373.2021.00180}, timestamp = {Tue, 15 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/YanLCYWFCWS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YanWLYCFWCS21, author = {Zhuo Yan and Xingwei Wang and Bin Lan and Senyu Yu and Shaohao Chen and Zhuoqun Fang and Chuanyun Wang and Wei Chen and Xiangbin Shi}, title = {Improved {NS} Cellular Automaton Model for Simulating Traffic Flows of Two-Lane}, booktitle = {TrustCom}, pages = {1312--1317}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00181}, doi = {10.1109/TRUSTCOM53373.2021.00181}, timestamp = {Tue, 15 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/YanWLYCFWCS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YangSZLFQ21, author = {Xiaojuan Yang and Jiaxing Shang and Linjiang Zheng and Dajiang Liu and Shu Fu and Baohua Qiang}, title = {Accepted Influence Maximization under Linear Threshold Model on Large-Scale Social Networks}, booktitle = {TrustCom}, pages = {1061--1068}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00145}, doi = {10.1109/TRUSTCOM53373.2021.00145}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/YangSZLFQ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YangYK21, author = {Xuechao Yang and Xun Yi and Andrei Kelarev}, title = {Secure Ranked Choice Online Voting System via Intel {SGX} and Blockchain}, booktitle = {TrustCom}, pages = {139--146}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00036}, doi = {10.1109/TRUSTCOM53373.2021.00036}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YangYK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Yao0LD0X0021, author = {Aiting Yao and Frank Jiang and Xuejun Li and Chengzu Dong and Jia Xu and Yi Xu and Gang Li and Xiao Liu}, title = {A Novel Security Framework for Edge Computing based {UAV} Delivery System}, booktitle = {TrustCom}, pages = {1031--1038}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00142}, doi = {10.1109/TRUSTCOM53373.2021.00142}, timestamp = {Tue, 13 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Yao0LD0X0021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YinZF21, author = {Jiaqi Yin and Huibiao Zhu and Yuan Fei}, title = {Formal Verification of HPS-based Master-Slave Scheme in {MEC} with Timed Automata}, booktitle = {TrustCom}, pages = {68--75}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00027}, doi = {10.1109/TRUSTCOM53373.2021.00027}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/YinZF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YuanSDZCL021, author = {Bin Yuan and Shengyao Sun and Xianjun Deng and Deqing Zou and Haoyu Chen and Shenghui Li and Hai Jin}, title = {Automatically derived stateful network functions including non-field attributes}, booktitle = {TrustCom}, pages = {944--951}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00132}, doi = {10.1109/TRUSTCOM53373.2021.00132}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/YuanSDZCL021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YueYWZXBH21, author = {Xiaohan Yue and Lixin Yang and Xibo Wang and Shuaishuai Zeng and Jian Xu and Shi Bai and Yuan He}, title = {An Aggregate Anonymous Credential Scheme in {C-ITS} for Multi-Service with Revocation}, booktitle = {TrustCom}, pages = {452--459}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00074}, doi = {10.1109/TRUSTCOM53373.2021.00074}, timestamp = {Fri, 10 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YueYWZXBH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/YueZWYXB021, author = {Xiaohan Yue and Shuaishuai Zeng and Xibo Wang and Lixin Yang and Jian Xu and Shi Bai and Yuan He}, title = {A Revocable Zone Encryption Scheme with Anonymous Authentication for {C-ITS}}, booktitle = {TrustCom}, pages = {232--239}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00047}, doi = {10.1109/TRUSTCOM53373.2021.00047}, timestamp = {Fri, 10 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/YueZWYXB021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Zeng0DSJ21, author = {Pengjie Zeng and Xiaoliang Wang and Liangzuo Dong and Xinhui She and Frank Jiang}, title = {A Blockchain Scheme Based on {DAG} Structure Security Solution for IIoT}, booktitle = {TrustCom}, pages = {935--943}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00131}, doi = {10.1109/TRUSTCOM53373.2021.00131}, timestamp = {Mon, 14 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Zeng0DSJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Zeng0T21, author = {Dongrui Zeng and Ben Niu and Gang Tan}, title = {MazeRunner: Evaluating the Attack Surface of Control-Flow Integrity Policies}, booktitle = {TrustCom}, pages = {810--821}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00116}, doi = {10.1109/TRUSTCOM53373.2021.00116}, timestamp = {Wed, 07 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Zeng0T21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Zhang0SWZ21, author = {Dayin Zhang and Xiaojun Chen and Jinqiao Shi and Dakui Wang and Shuai Zeng}, title = {A Differential Privacy Collaborative Deep Learning Algorithm in Pervasive Edge Computing Environment}, booktitle = {TrustCom}, pages = {347--354}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00061}, doi = {10.1109/TRUSTCOM53373.2021.00061}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Zhang0SWZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Zhang0ZLZ21, author = {Xulong Zhang and Frank Jiang and Ran Zhang and Shupeng Li and Yang Zhou}, title = {Social Spammer Detection Based on Semi-Supervised Learning}, booktitle = {TrustCom}, pages = {849--855}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00120}, doi = {10.1109/TRUSTCOM53373.2021.00120}, timestamp = {Thu, 10 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Zhang0ZLZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangCJYL21, author = {Wei Zhang and Wenxue Cui and Feng Jiang and Chifu Yang and Ran Li}, title = {Protecting the Ownership of Deep Learning Models with An End-to-End Watermarking Framework}, booktitle = {TrustCom}, pages = {76--82}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00028}, doi = {10.1109/TRUSTCOM53373.2021.00028}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangCJYL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangFN21, author = {Yaling Zhang and Pengfei Feng and Yao Ning}, title = {Random Forest Algorithm Based on Differential Privacy Protection}, booktitle = {TrustCom}, pages = {1259--1264}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00172}, doi = {10.1109/TRUSTCOM53373.2021.00172}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangFN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangJT21, author = {LingHan Zhang and F. Jiang and Xiaohu Tang}, title = {Verifiable Conjunctive Keyword Search with Certificateless Searchable}, booktitle = {TrustCom}, pages = {9--16}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00020}, doi = {10.1109/TRUSTCOM53373.2021.00020}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangJT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangLCPZZ21, author = {Gang Zhang and Hao Li and Zhenxiang Chen and Lizhi Peng and Yuhui Zhu and Chuan Zhao}, title = {AndroCreme: Unseen Android Malware Detection Based on Inductive Conformal Learning}, booktitle = {TrustCom}, pages = {651--658}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00097}, doi = {10.1109/TRUSTCOM53373.2021.00097}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangLCPZZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangLSG21, author = {Qianyun Zhang and Shijie Li and Jiting Shi and Zhenyu Guan}, title = {A TDOA-Assisted Direct Position Determination for Efficient Geolocalization Using {LEO} Satellites}, booktitle = {TrustCom}, pages = {1323--1327}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00183}, doi = {10.1109/TRUSTCOM53373.2021.00183}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangLSG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangLXCCXY21, author = {Heng Zhang and Yuhan Liu and Lexi Xu and Xinzhou Cheng and Lijuan Cao and Wei Xia and Ciguang Yang}, title = {Evaluation and Application of News Transmission Speed in New Media Environment}, booktitle = {TrustCom}, pages = {1422--1427}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00201}, doi = {10.1109/TRUSTCOM53373.2021.00201}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangLXCCXY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangLY21, author = {Lichao Zhang and Wangbin Li and Hailiang Ye}, title = {A blind watermarking system based on deep learning model}, booktitle = {TrustCom}, pages = {1208--1213}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00164}, doi = {10.1109/TRUSTCOM53373.2021.00164}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangLY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangQL21, author = {Tao Zhang and Yi Qin and Qiang Li}, title = {Trusted Artificial Intelligence: Technique Requirements and Best Practices}, booktitle = {TrustCom}, pages = {1458--1462}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00207}, doi = {10.1109/TRUSTCOM53373.2021.00207}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangQL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangQZCW21, author = {Huimin Zhang and Lishen Qiu and Wenliang Zhu and Wenqiang Cai and Lirong Wang}, title = {Automated Classification of Atrial Fibrillation and Atrial Flutter in {ECG} Signals based on Deep Learning}, booktitle = {TrustCom}, pages = {1498--1502}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00215}, doi = {10.1109/TRUSTCOM53373.2021.00215}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangQZCW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangWYF21, author = {Yuntao Zhang and Zhongru Wang and Weiqiang Yu and Binxing Fang}, title = {Multi-level Directed Fuzzing for Detecting Use-after-Free Vulnerabilities}, booktitle = {TrustCom}, pages = {569--576}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00087}, doi = {10.1109/TRUSTCOM53373.2021.00087}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangWYF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangX021, author = {Ruipeng Zhang and Mengjun Xie and Jiang Bian}, title = {ReLF: Scalable Remote Live Forensics for Android}, booktitle = {TrustCom}, pages = {822--831}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00117}, doi = {10.1109/TRUSTCOM53373.2021.00117}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangX021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangYQLZZ21, author = {Jiachao Zhang and Peiran Yu and Le Qi and Song Liu and Haiyu Zhang and Jianzhong Zhang}, title = {FLDDoS: DDoS Attack Detection Model based on Federated Learning}, booktitle = {TrustCom}, pages = {635--642}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00095}, doi = {10.1109/TRUSTCOM53373.2021.00095}, timestamp = {Tue, 02 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangYQLZZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangYWXZL21, author = {Jie Zhang and Jiaqi Yan and Jinxian Wang and Jie Xu and Yilong Zhao and Gangyin Luo}, title = {Research on Droplet Digital {PCR} Amplification System}, booktitle = {TrustCom}, pages = {1483--1487}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00212}, doi = {10.1109/TRUSTCOM53373.2021.00212}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangYWXZL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangYZZCZ21, author = {Chunhui Zhang and Xiaoming Yuan and Qianyun Zhang and Guangxu Zhu and Lei Cheng and Ning Zhang}, title = {Privacy-Preserving Neural Architecture Search Across Federated IoT Devices}, booktitle = {TrustCom}, pages = {1434--1438}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00203}, doi = {10.1109/TRUSTCOM53373.2021.00203}, timestamp = {Sat, 17 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangYZZCZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhaoWD21, author = {Yongxin Zhao and Wanqing Wu and Chaofan Di}, title = {Release of Trajectory Data based on Space Segmentation using Differential Privacy}, booktitle = {TrustCom}, pages = {1246--1253}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00170}, doi = {10.1109/TRUSTCOM53373.2021.00170}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhaoWD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhaoZ21, author = {Tianyu Zhao and Tao Zhang}, title = {Revisiting Anonymity and Privacy of Bitcoin}, booktitle = {TrustCom}, pages = {1275--1280}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00175}, doi = {10.1109/TRUSTCOM53373.2021.00175}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhaoZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhengZQMZW21, author = {Lesong Zheng and Miao Zhang and Lishen Qiu and Gang Ma and Wenliang Zhu and Lirong Wang}, title = {A multi-scale convolutional neural network for heartbeat classification}, booktitle = {TrustCom}, pages = {1488--1492}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00213}, doi = {10.1109/TRUSTCOM53373.2021.00213}, timestamp = {Tue, 02 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhengZQMZW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhongZ21, author = {Bingnan Zhong and Qingkai Zeng}, title = {SecPT: Providing Efficient Page Table Protection based on {SMAP} Feature in an Untrusted Commodity Kernel}, booktitle = {TrustCom}, pages = {215--223}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00045}, doi = {10.1109/TRUSTCOM53373.2021.00045}, timestamp = {Mon, 19 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhongZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhouJLZ21, author = {Aijun Zhou and Xinghao Jiang and Zhaohong Li and Zhenzhen Zhang}, title = {A {HEVC} Video Steganography Algorithm Based on {DCT/DST} Coefficients with Improved {VRCNN}}, booktitle = {TrustCom}, pages = {967--975}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00135}, doi = {10.1109/TRUSTCOM53373.2021.00135}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhouJLZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhouMLCZZ21, author = {Shiyu Zhou and Jie Miao and Xiqing Liu and Xinzhou Cheng and Zhenqiao Zhao and Xin Zhao}, title = {Fault Diagnosis of 5G Voice Service Based on Multi-sources data}, booktitle = {TrustCom}, pages = {1554--1558}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00225}, doi = {10.1109/TRUSTCOM53373.2021.00225}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhouMLCZZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhouPMJ21, author = {Changli Zhou and Jing Peng and Ying Ma and Qingfeng Jiang}, title = {A Privacy-preserving Location Recommendation Scheme without Trustworthy Entity}, booktitle = {TrustCom}, pages = {444--451}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00073}, doi = {10.1109/TRUSTCOM53373.2021.00073}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhouPMJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Zhu0CY21, author = {Licai Zhu and Hao Yang and Shi Chen and Zhipeng Yu}, title = {Effective {RFID} Localization Based on Fuzzy Logic For Security}, booktitle = {TrustCom}, pages = {323--330}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00058}, doi = {10.1109/TRUSTCOM53373.2021.00058}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Zhu0CY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhuMCQZW21, author = {Wenliang Zhu and Gang Ma and Yuhang Chen and Lishen Qiu and Lesong Zheng and Lirong Wang}, title = {A Novel Method for Detecting Noise Segments in {ECG} Signals}, booktitle = {TrustCom}, pages = {1570--1574}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00228}, doi = {10.1109/TRUSTCOM53373.2021.00228}, timestamp = {Tue, 02 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhuMCQZW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZouMGL21, author = {Futai Zou and Dechao Meng and Wentao Gao and Linsen Li}, title = {DePL: Detecting Privacy Leakage in DNS-over-HTTPS Traffic}, booktitle = {TrustCom}, pages = {577--586}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00088}, doi = {10.1109/TRUSTCOM53373.2021.00088}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZouMGL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/trustcom/2021, title = {20th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2021, Shenyang, China, October 20-22, 2021}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021}, doi = {10.1109/TRUSTCOM53373.2021}, isbn = {978-1-6654-1658-0}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/0001BR20, author = {Subhra Mazumdar and Prabal Banerjee and Sushmita Ruj}, title = {Time is Money: Countering Griefing Attack in Lightning Network}, booktitle = {TrustCom}, pages = {1036--1043}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00138}, doi = {10.1109/TRUSTCOM50675.2020.00138}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/0001BR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/0001MZ20, author = {Wenjuan Li and Weizhi Meng and Hui Zhu}, title = {Towards Collaborative Intrusion Detection Enhancement against Insider Attacks with Multi-Level Trust}, booktitle = {TrustCom}, pages = {1179--1186}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00158}, doi = {10.1109/TRUSTCOM50675.2020.00158}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/0001MZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/000220, author = {Wei Ren}, title = {A Symmetric Uniform Formula and Sole Index Method for Sieving (Twin) Primes}, booktitle = {TrustCom}, pages = {1592--1597}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00220}, doi = {10.1109/TRUSTCOM50675.2020.00220}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/000220.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/0004WLWDZX20, author = {Chen Tian and Yazhe Wang and Peng Liu and Yu Wang and Ruirui Dai and Anyuan Zhou and Zhen Xu}, title = {Prihook: Differentiated context-aware hook placement for different owners' smartphones}, booktitle = {TrustCom}, pages = {615--622}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00087}, doi = {10.1109/TRUSTCOM50675.2020.00087}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/0004WLWDZX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/0006GCZA20, author = {Meng Li and Jianbo Gao and Yifei Chen and Jingcheng Zhao and Mamoun Alazab}, title = {Privacy-Preserving Ride-Hailing with Verifiable Order-Linking in Vehicular Networks}, booktitle = {TrustCom}, pages = {599--606}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00085}, doi = {10.1109/TRUSTCOM50675.2020.00085}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/0006GCZA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/0021XH20, author = {Ming Liu and Zhi Xue and Xiangjian He}, title = {A Unified Host-based Intrusion Detection Framework using Spark in Cloud}, booktitle = {TrustCom}, pages = {97--103}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00026}, doi = {10.1109/TRUSTCOM50675.2020.00026}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/0021XH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AbbasHFSSZ20, author = {Syed Ghazanfar Abbas and Muhammad Husnain and Ubaid Ullah Fayyaz and Farrukh Shahzad and Ghalib A. Shah and Kashif Zafar}, title = {IoT-Sphere: {A} Framework To Secure IoT Devices From Becoming Attack Target And Attack Source}, booktitle = {TrustCom}, pages = {1402--1409}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00189}, doi = {10.1109/TRUSTCOM50675.2020.00189}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/AbbasHFSSZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AbbasHS20, author = {Syed Ghazanfar Abbas and Fabiha Hashmat and Ghalib A. Shah}, title = {A Multi-Layer Industrial-IoT Attack Taxonomy: Layers, Dimensions, Techniques and Application}, booktitle = {TrustCom}, pages = {1820--1825}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00249}, doi = {10.1109/TRUSTCOM50675.2020.00249}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/AbbasHS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AbrahamMRH20, author = {Andreas Abraham and Stefan More and Christof Rabensteiner and Felix H{\"{o}}randner}, title = {Revocable and Offline-Verifiable Self-Sovereign Identities}, booktitle = {TrustCom}, pages = {1020--1027}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00136}, doi = {10.1109/TRUSTCOM50675.2020.00136}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/AbrahamMRH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AignerK20, author = {Andreas Aigner and Abdelmajid Khelil}, title = {A Scoring System to efficiently measure Security in Cyber-Physical Systems}, booktitle = {TrustCom}, pages = {1141--1145}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00151}, doi = {10.1109/TRUSTCOM50675.2020.00151}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/AignerK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AignerK20a, author = {Andreas Aigner and Abdelmajid Khelil}, title = {A Semantic Model-based Security Engineering Framework for Cyber-Physical Systems}, booktitle = {TrustCom}, pages = {1826--1833}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00250}, doi = {10.1109/TRUSTCOM50675.2020.00250}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/AignerK20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Al-JodyHAK20, author = {Taha Al{-}Jody and Violeta Holmes and Alexandros Antoniades and Yazan Kazkouzeh}, title = {Bearicade: secure access gateway to High Performance Computing systems}, booktitle = {TrustCom}, pages = {1420--1427}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00191}, doi = {10.1109/TRUSTCOM50675.2020.00191}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Al-JodyHAK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AlavizadehAJ20, author = {Hootan Alavizadeh and Hooman Alavizadeh and Julian Jang{-}Jaccard}, title = {Cyber Situation Awareness Monitoring and Proactive Response for Enterprises on the Cloud}, booktitle = {TrustCom}, pages = {1276--1284}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00171}, doi = {10.1109/TRUSTCOM50675.2020.00171}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/AlavizadehAJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AlshehriS020, author = {Ahmed Alshehri and Malek Ben Salem and Lei Ding}, title = {Are Smart Home Devices Abandoning {IPV} Victims?}, booktitle = {TrustCom}, pages = {1368--1375}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00184}, doi = {10.1109/TRUSTCOM50675.2020.00184}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/AlshehriS020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AngeloS20, author = {Monika Di Angelo and Gernot Salzer}, title = {Assessing the Similarity of Smart Contracts by Clustering their Interfaces}, booktitle = {TrustCom}, pages = {1910--1919}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00261}, doi = {10.1109/TRUSTCOM50675.2020.00261}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/AngeloS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AnwarA20, author = {Adnan Anwar and S. M. Abu Adnan Abir}, title = {Measurement Unit Placement Against Injection Attacks for the Secured Operation of an IIoT-based Smart Grid}, booktitle = {TrustCom}, pages = {767--774}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00105}, doi = {10.1109/TRUSTCOM50675.2020.00105}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/AnwarA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ArifBFSWX20, author = {Muhammad Arif and Walter Balzano and Alessandro Fontanella and Silvia Stranieri and Guojun Wang and Xiaofei Xing}, title = {Integration of 5G, VANETs and Blockchain Technology}, booktitle = {TrustCom}, pages = {2007--2013}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00275}, doi = {10.1109/TRUSTCOM50675.2020.00275}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ArifBFSWX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AsadiV20, author = {Behzad Asadi and Vijay Varadharajan}, title = {Towards a Robust Classifier: An MDL-Based Method for Generating Adversarial Examples}, booktitle = {TrustCom}, pages = {793--801}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00108}, doi = {10.1109/TRUSTCOM50675.2020.00108}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/AsadiV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AsgharGLRZ20, author = {Muhammad Rizwan Asghar and Steven D. Galbraith and Andrea Lanzi and Giovanni Russello and Lukas Zobernig}, title = {Towards a Theory of Special-Purpose Program Obfuscation}, booktitle = {TrustCom}, pages = {394--401}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00061}, doi = {10.1109/TRUSTCOM50675.2020.00061}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/AsgharGLRZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BaalousP20, author = {Rawan Baalous and Ronald Poet}, title = {Factors Affecting Users' Disclosure Decisions in Android Runtime Permissions Model}, booktitle = {TrustCom}, pages = {1113--1118}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00147}, doi = {10.1109/TRUSTCOM50675.2020.00147}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/BaalousP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BakasM20, author = {Alexandros Bakas and Antonis Michalas}, title = {Multi-Input Functional Encryption: Efficient Applications from Symmetric Primitives}, booktitle = {TrustCom}, pages = {1105--1112}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00146}, doi = {10.1109/TRUSTCOM50675.2020.00146}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/BakasM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BarbeauCCDG20, author = {Michel Barbeau and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens and Romain Dagnas and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Metrics to Enhance the Resilience of Cyber-Physical Systems}, booktitle = {TrustCom}, pages = {1167--1172}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00156}, doi = {10.1109/TRUSTCOM50675.2020.00156}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/BarbeauCCDG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BaumgartnerDFGH20, author = {Lars Baumg{\"{a}}rtner and Alexandra Dmitrienko and Bernd Freisleben and Alexander Gruler and Jonas H{\"{o}}chst and Joshua K{\"{u}}hlberg and Mira Mezini and Richard Mitev and Markus Miettinen and Anel Muhamedagic and Thien Duc Nguyen and Alvar Penning and Dermot Frederik Pustelnik and Filipp Roos and Ahmad{-}Reza Sadeghi and Michael Schwarz and Christian Uhl}, title = {Mind the {GAP:} Security {\&} Privacy Risks of Contact Tracing Apps}, booktitle = {TrustCom}, pages = {458--467}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00069}, doi = {10.1109/TRUSTCOM50675.2020.00069}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/BaumgartnerDFGH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BecherLS20, author = {Kilian Becher and J. A. Gregor Lagodzinski and Thorsten Strufe}, title = {Privacy-Preserving Public Verification of Ethical Cobalt Sourcing}, booktitle = {TrustCom}, pages = {998--1005}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00133}, doi = {10.1109/TRUSTCOM50675.2020.00133}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/BecherLS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BelchiorPP0VG20, author = {Rafael Belchior and Benedikt Putz and G{\"{u}}nther Pernul and Miguel Correia and Andr{\'{e}} Vasconcelos and S{\'{e}}rgio Guerreiro}, title = {{SSIBAC:} Self-Sovereign Identity Based Access Control}, booktitle = {TrustCom}, pages = {1935--1943}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00264}, doi = {10.1109/TRUSTCOM50675.2020.00264}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/BelchiorPP0VG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BhuiyanRFCHT20, author = {Md. Saiful Islam Bhuiyan and Abdur Razzak and Md. Sadek Ferdous and Mohammad Jabed Morshed Chowdhury and Mohammad Ashraful Hoque and Sasu Tarkoma}, title = {{BONIK:} {A} Blockchain Empowered Chatbot for Financial Transactions}, booktitle = {TrustCom}, pages = {1079--1088}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00143}, doi = {10.1109/TRUSTCOM50675.2020.00143}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/BhuiyanRFCHT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BlackG0L20, author = {Paul Black and Iqbal Gondal and Peter Vamplew and Arun Lakhotia}, title = {Identifying Cross-Version Function Similarity Using Contextual Features}, booktitle = {TrustCom}, pages = {810--818}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00110}, doi = {10.1109/TRUSTCOM50675.2020.00110}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/BlackG0L20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BoureanuMPAMFM20, author = {Ioana Boureanu and Daniel Migault and Stere Preda and Hyame Assem Alamedine and Sanjay Mishra and Frederic Fieau and Mohammad Mannan}, title = {{LURK:} Server-Controlled {TLS} Delegation}, booktitle = {TrustCom}, pages = {182--193}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00036}, doi = {10.1109/TRUSTCOM50675.2020.00036}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/BoureanuMPAMFM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/CaiLHH20, author = {Jiajin Cai and Tongxin Li and Can Huang and Xinhui Han}, title = {ReDex: Unpacking Android Packed Apps by Executing Every Method}, booktitle = {TrustCom}, pages = {337--344}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00054}, doi = {10.1109/TRUSTCOM50675.2020.00054}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/CaiLHH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/CaoHZL20, author = {Defu Cao and Jing Huang and Xuanyu Zhang and Xianhua Liu}, title = {FTCLNet: Convolutional {LSTM} with Fourier Transform for Vulnerability Detection}, booktitle = {TrustCom}, pages = {539--546}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00078}, doi = {10.1109/TRUSTCOM50675.2020.00078}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/CaoHZL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/CentsL20, author = {Rick Cents and Nhien{-}An Le{-}Khac}, title = {Towards {A} New Approach to Identify WhatsApp Messages}, booktitle = {TrustCom}, pages = {1895--1902}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00259}, doi = {10.1109/TRUSTCOM50675.2020.00259}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/CentsL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChamotraB20, author = {Saurabh Chamotra and Ferdous Ahmed Barbhuiya}, title = {Analysis and modelling of multi-stage attacks}, booktitle = {TrustCom}, pages = {1268--1275}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00170}, doi = {10.1109/TRUSTCOM50675.2020.00170}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ChamotraB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenCCYWX20, author = {Haibo Chen and Junzuo Chen and Jinfu Chen and Shang Yin and Yiming Wu and Jiaping Xu}, title = {An Automatic Vulnerability Scanner for Web Applications}, booktitle = {TrustCom}, pages = {1519--1524}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00207}, doi = {10.1109/TRUSTCOM50675.2020.00207}, timestamp = {Fri, 24 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChenCCYWX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenCLW20, author = {Chaofan Chen and Zelei Cheng and Zuotian Li and Manyi Wang}, title = {Hypergraph Attention Networks}, booktitle = {TrustCom}, pages = {1560--1565}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00215}, doi = {10.1109/TRUSTCOM50675.2020.00215}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ChenCLW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenWSZWF20, author = {Muqian Chen and Xuebin Wang and Jinqiao Shi and Can Zhao and Meiqi Wang and Binxing Fang}, title = {Napping Guard: Deanonymizing Tor Hidden Service in a Stealthy Way}, booktitle = {TrustCom}, pages = {699--706}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00097}, doi = {10.1109/TRUSTCOM50675.2020.00097}, timestamp = {Wed, 27 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ChenWSZWF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenZCLSZ20, author = {Haibo Chen and Dalin Zhang and Jinfu Chen and Wei Lin and Dengzhou Shi and Zian Zhao}, title = {An Automatic Vulnerability Classification System for IoT Softwares}, booktitle = {TrustCom}, pages = {1525--1529}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00208}, doi = {10.1109/TRUSTCOM50675.2020.00208}, timestamp = {Fri, 26 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ChenZCLSZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChengDYZ20, author = {Jiangchang Cheng and Yinglong Dai and Yao Yuan and Hongli Zhu}, title = {A Simple Analysis of Multimodal Data Fusion}, booktitle = {TrustCom}, pages = {1472--1475}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00199}, doi = {10.1109/TRUSTCOM50675.2020.00199}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ChengDYZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChoiBKDZW20, author = {Taejun Choi and Guangdong Bai and Ryan K. L. Ko and Naipeng Dong and Wenlu Zhang and Shunyao Wang}, title = {An Analytics Framework for Heuristic Inference Attacks against Industrial Control Systems}, booktitle = {TrustCom}, pages = {827--835}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00112}, doi = {10.1109/TRUSTCOM50675.2020.00112}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ChoiBKDZW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Ciucanu0LS20, author = {Radu Ciucanu and Pascal Lafourcade and Marius Lombard{-}Platet and Marta Soare}, title = {Secure Outsourcing of Multi-Armed Bandits}, booktitle = {TrustCom}, pages = {202--209}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00038}, doi = {10.1109/TRUSTCOM50675.2020.00038}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Ciucanu0LS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/CoryRK20, author = {Thomas Cory and Philip Raschke and Axel K{\"{u}}pper}, title = {Heimdall: Illuminating the Hidden Depths of Third-party Tracking in Android Applications}, booktitle = {TrustCom}, pages = {676--682}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00094}, doi = {10.1109/TRUSTCOM50675.2020.00094}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/CoryRK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/CoulterZ0020, author = {Rory Coulter and Jun Zhang and Lei Pan and Yang Xiang}, title = {Unmasking Windows Advanced Persistent Threat Execution}, booktitle = {TrustCom}, pages = {268--276}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00046}, doi = {10.1109/TRUSTCOM50675.2020.00046}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/CoulterZ0020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/CuiLQY20, author = {Xinchun Cui and Xueqing Li and Yiming Qin and Yong Ding}, title = {A Password Strength Evaluation Algorithm based on Sensitive Personal Information}, booktitle = {TrustCom}, pages = {1542--1545}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00211}, doi = {10.1109/TRUSTCOM50675.2020.00211}, timestamp = {Sat, 01 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/CuiLQY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/CuiY20, author = {Handong Cui and Tsz Hon Yuen}, title = {Address-based Signature}, booktitle = {TrustCom}, pages = {884--891}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00119}, doi = {10.1109/TRUSTCOM50675.2020.00119}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/CuiY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Dahiya0D20, author = {Rohan Dahiya and Frank Jiang and Robin Doss}, title = {A Feedback-Driven Lightweight Reputation Scheme for IoV}, booktitle = {TrustCom}, pages = {1060--1068}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00141}, doi = {10.1109/TRUSTCOM50675.2020.00141}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Dahiya0D20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DengQWSW20, author = {Mixue Deng and Lishen Qiu and Hongqing Wang and Wei Shi and Lirong Wang}, title = {Atrial Fibrillation Classification Using Convolutional Neural Networks and Time Domain Features of {ECG} Sequence}, booktitle = {TrustCom}, pages = {1481--1485}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00201}, doi = {10.1109/TRUSTCOM50675.2020.00201}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/DengQWSW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DhillonH20, author = {Harsh Dhillon and Anwar Haque}, title = {Towards Network Traffic Monitoring Using Deep Transfer Learning}, booktitle = {TrustCom}, pages = {1089--1096}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00144}, doi = {10.1109/TRUSTCOM50675.2020.00144}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/DhillonH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DillonCHGJ20, author = {Roberto Dillon and Shailey Chawla and Dayana Hristova and Barbara G{\"{o}}bl and Suzana Jovicic}, title = {Password Policies vs. Usability: When Do Users Go "Bananas"?}, booktitle = {TrustCom}, pages = {148--153}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00032}, doi = {10.1109/TRUSTCOM50675.2020.00032}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/DillonCHGJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DimitrakosDKMMR20, author = {Theo Dimitrakos and Tezcan Dilshener and Alexander Kravtsov and Antonio La Marra and Fabio Martinelli and Athanasios Rizos and Alessandro Rosetti and Andrea Saracino}, title = {Trust Aware Continuous Authorization for Zero Trust in Consumer Internet of Things}, booktitle = {TrustCom}, pages = {1801--1812}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00247}, doi = {10.1109/TRUSTCOM50675.2020.00247}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/DimitrakosDKMMR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DingWXZOFQSZ20, author = {Yu Ding and Shupeng Wang and Jian Xing and Xiaoyu Zhang and ZiSen Oi and Ge Fu and Qian Qiang and Haoliang Sun and Jianyu Zhang}, title = {Malware Classification on Imbalanced Data through Self-Attention}, booktitle = {TrustCom}, pages = {154--161}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00033}, doi = {10.1109/TRUSTCOM50675.2020.00033}, timestamp = {Mon, 27 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/DingWXZOFQSZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DingXZW20, author = {Xuyang Ding and Feng Xiao and Man Zhou and Zhibo Wang}, title = {Active Link Obfuscation to Thwart Link-flooding Attacks for Internet of Things}, booktitle = {TrustCom}, pages = {217--224}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00040}, doi = {10.1109/TRUSTCOM50675.2020.00040}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/DingXZW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/DoNNNDN20, author = {Ba{-}Lam Do and Quang{-}Thang Nguyen and Thang Nguyen and Tien{-}Thao Nguyen and Thanh{-}Chung Dao and Binh Minh Nguyen}, title = {{BML:} {A} Data Mapping Language for Blockchain Platforms}, booktitle = {TrustCom}, pages = {1297--1303}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00174}, doi = {10.1109/TRUSTCOM50675.2020.00174}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/DoNNNDN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FanDCS20, author = {Chan Fan and Xiaolei Dong and Zhenfu Cao and Jiachen Shen}, title = {{VCKSCF:} Efficient Verifiable Conjunctive Keyword Search Based on Cuckoo Filter for Cloud Storage}, booktitle = {TrustCom}, pages = {285--292}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00048}, doi = {10.1109/TRUSTCOM50675.2020.00048}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/FanDCS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FanPKG0C20, author = {Wenjun Fan and Younghee Park and Shubham Kumar and Priyatham Ganta and Xiaobo Zhou and Sang{-}Yoon Chang}, title = {Blockchain-enabled Collaborative Intrusion Detection in Software Defined Networks}, booktitle = {TrustCom}, pages = {967--974}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00129}, doi = {10.1109/TRUSTCOM50675.2020.00129}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/FanPKG0C20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FangA20, author = {Xiuli Fang and Muhammad Rizwan Asghar}, title = {RevBloc: {A} Blockchain-based Secure Customer Review System}, booktitle = {TrustCom}, pages = {1250--1259}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00168}, doi = {10.1109/TRUSTCOM50675.2020.00168}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/FangA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FarooqWHKAW20, author = {Muhammad Umar Farooq and Xingfu Wang and Ammar Hawbani and Asad Khan and Adeel Ahmed and Fisseha Teju Wedaj}, title = {{TORP:} Load Balanced Reliable Opportunistic Routing for Asynchronous Wireless Sensor Networks}, booktitle = {TrustCom}, pages = {1384--1389}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00186}, doi = {10.1109/TRUSTCOM50675.2020.00186}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/FarooqWHKAW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FengHLLC20, author = {Qi Feng and Debiao He and Min Luo and Zengxiang Li and Kim{-}Kwang Raymond Choo}, title = {Practical Secure Two-Party EdDSA Signature Generation with Key Protection and Applications in Cryptocurrency}, booktitle = {TrustCom}, pages = {137--147}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00031}, doi = {10.1109/TRUSTCOM50675.2020.00031}, timestamp = {Mon, 20 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/FengHLLC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FernandesDC20, author = {Tiago Fernandes and Luis Dias and Miguel Correia}, title = {{C2BID:} Cluster Change-Based Intrusion Detection}, booktitle = {TrustCom}, pages = {310--319}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00051}, doi = {10.1109/TRUSTCOM50675.2020.00051}, timestamp = {Mon, 22 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/FernandesDC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FuTGCZF20, author = {Yu Fu and Siming Tong and Xiangyu Guo and Liang Cheng and Yang Zhang and Dengguo Feng}, title = {Improving the Effectiveness of Grey-box Fuzzing By Extracting Program Information}, booktitle = {TrustCom}, pages = {434--441}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00066}, doi = {10.1109/TRUSTCOM50675.2020.00066}, timestamp = {Mon, 20 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/FuTGCZF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GasibaLPF20, author = {Tiago Espinha Gasiba and Ulrike Lechner and Maria Pinto{-}Albuquerque and Daniel M{\'{e}}ndez Fern{\'{a}}ndez}, title = {Awareness of Secure Coding Guidelines in the Industry - {A} first data analysis}, booktitle = {TrustCom}, pages = {345--352}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00055}, doi = {10.1109/TRUSTCOM50675.2020.00055}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GasibaLPF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GedenR20, author = {Munir Geden and Kasper Rasmussen}, title = {{TRUVIN:} Lightweight Detection of Data-Oriented Attacks Through Trusted Value Integrity}, booktitle = {TrustCom}, pages = {174--181}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00035}, doi = {10.1109/TRUSTCOM50675.2020.00035}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/GedenR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GomesZ0SL20, author = {Eduardo Gomes and Igor Zavalyshyn and Nuno Santos and Jo{\~{a}}o Silva and Axel Legay}, title = {Flowverine: Leveraging Dataflow Programming for Building Privacy-Sensitive Android Applications}, booktitle = {TrustCom}, pages = {607--614}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00086}, doi = {10.1109/TRUSTCOM50675.2020.00086}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/GomesZ0SL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Gonzalez-Manzano20, author = {Lorena Gonz{\'{a}}lez{-}Manzano and Sergio Bernardez and Jos{\'{e}} Mar{\'{\i}}a de Fuentes}, title = {SmartLED: Smartphone-based covert channels leveraging the notification {LED}}, booktitle = {TrustCom}, pages = {1748--1755}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00240}, doi = {10.1109/TRUSTCOM50675.2020.00240}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Gonzalez-Manzano20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GuanMLB20, author = {Shengyi Guan and Xuebin Ma and Wuyungerile Li and Xiangyu Bai}, title = {DP-Eclat: {A} Vertical Frequent Itemset Mining Algorithm Based on Differential Privacy}, booktitle = {TrustCom}, pages = {1696--1703}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00233}, doi = {10.1109/TRUSTCOM50675.2020.00233}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/GuanMLB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Guo0WL20, author = {Chengqian Guo and Quanwei Cai and Qiongxiao Wang and Jingqiang Lin}, title = {Extending Registration and Authentication Processes of {FIDO2} External Authenticator with {QR} Codes}, booktitle = {TrustCom}, pages = {518--529}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00076}, doi = {10.1109/TRUSTCOM50675.2020.00076}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Guo0WL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HajarAK20, author = {Muhammad Shadi Hajar and M. Omar Al{-}Kadri and Harsha K. Kalutarage}, title = {{LTMS:} {A} Lightweight Trust Management System for Wireless Medical Sensor Networks}, booktitle = {TrustCom}, pages = {1783--1790}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00245}, doi = {10.1109/TRUSTCOM50675.2020.00245}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HajarAK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HanYLJLLWL20, author = {Xueying Han and Rongchao Yin and Zhigang Lu and Bo Jiang and Yuling Liu and Song Liu and Chonghua Wang and Ning Li}, title = {{STIDM:} {A} Spatial and Temporal Aware Intrusion Detection Model}, booktitle = {TrustCom}, pages = {370--377}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00058}, doi = {10.1109/TRUSTCOM50675.2020.00058}, timestamp = {Tue, 27 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/HanYLJLLWL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HanceS20, author = {Jack Hance and Jeremy Straub}, title = {Use of Bash History Novelty Detection for Identification of Similar Source Attack Generation}, booktitle = {TrustCom}, pages = {759--766}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00104}, doi = {10.1109/TRUSTCOM50675.2020.00104}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/HanceS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Hao0ZZ20, author = {Xiaohan Hao and Wei Ren and Wenwen Zheng and Tianqing Zhu}, title = {SCScan: {A} SVM-based Scanning System for Vulnerabilities in Blockchain Smart Contracts}, booktitle = {TrustCom}, pages = {1598--1605}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00221}, doi = {10.1109/TRUSTCOM50675.2020.00221}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Hao0ZZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HaseebMAW20, author = {Junaid Haseeb and Masood Mansoori and Harith Al{-}Sahaf and Ian Welch}, title = {IoT Attacks: Features Identification and Clustering}, booktitle = {TrustCom}, pages = {353--360}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00056}, doi = {10.1109/TRUSTCOM50675.2020.00056}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HaseebMAW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HaseebMW20, author = {Junaid Haseeb and Masood Mansoori and Ian Welch}, title = {A Measurement Study of IoT-Based Attacks Using IoT Kill Chain}, booktitle = {TrustCom}, pages = {557--567}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00080}, doi = {10.1109/TRUSTCOM50675.2020.00080}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HaseebMW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Herberth20, author = {Klaus Herberth}, title = {Group Communication Needs No Consistent Transcript Distribution}, booktitle = {TrustCom}, pages = {1437--1443}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00193}, doi = {10.1109/TRUSTCOM50675.2020.00193}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Herberth20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HnatiucGVM20, author = {Mihaela Hnatiuc and Oana Geman and Dragos Vicoveanu and George Motru}, title = {Aquatic Drone Control Using Inertial Sensors - Comparative Filtering Methods}, booktitle = {TrustCom}, pages = {2014--2019}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00276}, doi = {10.1109/TRUSTCOM50675.2020.00276}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HnatiucGVM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HouZM20, author = {Dongkun Hou and Jie Zhang and Ka Lok Man}, title = {Enhancing the Security of Numeric Comparison Secure Simple Pairing in Bluetooth 5.0}, booktitle = {TrustCom}, pages = {1622--1629}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00224}, doi = {10.1109/TRUSTCOM50675.2020.00224}, timestamp = {Thu, 11 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HouZM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HuSXZC20, author = {Xiaohui Hu and Rui Sun and Kejia Xu and Yongzheng Zhang and Peng Chang}, title = {Exploit Internal Structural Information for IoT Malware Detection Based on Hierarchical Transformer Model}, booktitle = {TrustCom}, pages = {927--934}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00124}, doi = {10.1109/TRUSTCOM50675.2020.00124}, timestamp = {Thu, 01 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HuSXZC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HuZLY20, author = {Yuzong Hu and Futai Zou and Linsen Li and Ping Yi}, title = {Traffic Classification of User Behaviors in Tor, I2P, ZeroNet, Freenet}, booktitle = {TrustCom}, pages = {418--424}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00064}, doi = {10.1109/TRUSTCOM50675.2020.00064}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/HuZLY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HuangB20, author = {Shin{-}Ying Huang and Tao Ban}, title = {Monitoring Social Media for Vulnerability-Threat Prediction and Topic Analysis}, booktitle = {TrustCom}, pages = {1771--1776}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00243}, doi = {10.1109/TRUSTCOM50675.2020.00243}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/HuangB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HuangZZLWQ20, author = {Wen Huang and Shijie Zhou and Tianqing Zhu and Yongjian Liao and Chunjiang Wu and Shilin Qiu}, title = {Improving Laplace Mechanism of Differential Privacy by Personalized Sampling}, booktitle = {TrustCom}, pages = {623--630}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00088}, doi = {10.1109/TRUSTCOM50675.2020.00088}, timestamp = {Tue, 06 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HuangZZLWQ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Huo0ZLWL20, author = {Tianlin Huo and Wenhao Wang and Pei Zhao and Yufeng Li and Tingting Wang and Mingshu Li}, title = {{TEADS:} {A} Defense-aware Framework for Synthesizing Transient Execution Attacks}, booktitle = {TrustCom}, pages = {320--327}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00052}, doi = {10.1109/TRUSTCOM50675.2020.00052}, timestamp = {Wed, 12 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Huo0ZLWL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HupperichD20, author = {Thomas Hupperich and Katharina Dassel}, title = {On the Usefulness of User Nudging and Strength Indication Concerning Unlock Pattern Security}, booktitle = {TrustCom}, pages = {1646--1654}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00227}, doi = {10.1109/TRUSTCOM50675.2020.00227}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HupperichD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HutchinsonSK20, author = {Shinelle Hutchinson and Neesha Shantaram and Umit Karabiyik}, title = {Forensic Analysis of Dating Applications on Android and iOS Devices}, booktitle = {TrustCom}, pages = {836--847}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00113}, doi = {10.1109/TRUSTCOM50675.2020.00113}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/HutchinsonSK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JadidiDJF20, author = {Zahra Jadidi and Ali Dorri and Raja Jurdak and Colin J. Fidge}, title = {Securing Manufacturing Using Blockchain}, booktitle = {TrustCom}, pages = {1920--1925}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00262}, doi = {10.1109/TRUSTCOM50675.2020.00262}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/JadidiDJF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JaigirdarRB20, author = {Fariha Tasmin Jaigirdar and Carsten Rudolph and Chris Bain}, title = {Prov-IoT: {A} Security-Aware IoT Provenance Model}, booktitle = {TrustCom}, pages = {1360--1367}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00183}, doi = {10.1109/TRUSTCOM50675.2020.00183}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/JaigirdarRB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JhaMS20, author = {Sanjiv S. Jha and Simon Mayer and Tanja Schneider}, title = {Explicitly Privacy-Aware Space Usage Analysis}, booktitle = {TrustCom}, pages = {1285--1290}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00172}, doi = {10.1109/TRUSTCOM50675.2020.00172}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/JhaMS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JianRY20, author = {Li Jian and Fei Rong and Tang Yu}, title = {A novel Q-Learning Algorithm Based on the Stochastic Environment Path Planning Problem}, booktitle = {TrustCom}, pages = {1977--1982}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00270}, doi = {10.1109/TRUSTCOM50675.2020.00270}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/JianRY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JindalSVCAL20, author = {Arun Kumar Jindal and Imtiyazuddin Shaik and Vasudha and Srinivasa Rao Chalamala and Rajan M. A and Sachin Lodha}, title = {Secure and Privacy Preserving Method for Biometric Template Protection using Fully Homomorphic Encryption}, booktitle = {TrustCom}, pages = {1127--1134}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00149}, doi = {10.1109/TRUSTCOM50675.2020.00149}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/JindalSVCAL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KaleelL20, author = {Manaz Kaleel and Nhien{-}An Le{-}Khac}, title = {Towards a new deep learning based approach for the password prediction}, booktitle = {TrustCom}, pages = {1146--1150}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00152}, doi = {10.1109/TRUSTCOM50675.2020.00152}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/KaleelL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KandiKLBC20, author = {Mohamed Ali Kandi and Djamel Eddine Kouicem and Hicham Lakhlef and Abdelmadjid Bouabdallah and Yacine Challal}, title = {A Blockchain-based Key Management Protocol for Secure Device-to-Device Communication in the Internet of Things}, booktitle = {TrustCom}, pages = {1868--1873}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00255}, doi = {10.1109/TRUSTCOM50675.2020.00255}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/KandiKLBC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Kang00ZZT20, author = {Hongzhaoning Kang and Gang Liu and Quan Wang and Runnan Zhang and Zichao Zhong and Yumin Tian}, title = {Policy Evaluation and Dynamic Management Based on Matching Tree for {XACML}}, booktitle = {TrustCom}, pages = {1530--1535}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00209}, doi = {10.1109/TRUSTCOM50675.2020.00209}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Kang00ZZT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KangCLM20, author = {Hui Kang and Shengquan Chen and Lingfeng Lu and Chenkun Meng}, title = {Research and Improvement of Community Discovery Algorithm Based on Spark for Large Scale Complicated Networks}, booktitle = {TrustCom}, pages = {1499--1508}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00204}, doi = {10.1109/TRUSTCOM50675.2020.00204}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/KangCLM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KangDLYZ20, author = {James Jin Kang and Mahdi Dibaei and Gang Luo and Wencheng Yang and James Xi Zheng}, title = {A Privacy-Preserving Data Inference Framework for Internet of Health Things Networks}, booktitle = {TrustCom}, pages = {1209--1214}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00162}, doi = {10.1109/TRUSTCOM50675.2020.00162}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/KangDLYZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KangLS20, author = {Hui Kang and Lingfeng Lu and Hang Su}, title = {A Four-Feature Keyword Extraction Algorithm Based on Word Length Priority ratio}, booktitle = {TrustCom}, pages = {1492--1498}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00203}, doi = {10.1109/TRUSTCOM50675.2020.00203}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/KangLS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Ketsbaia0C20, author = {Lida Ketsbaia and Biju Issac and Xiaomin Chen}, title = {Detection of Hate Tweets using Machine Learning and Deep Learning}, booktitle = {TrustCom}, pages = {751--758}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00103}, doi = {10.1109/TRUSTCOM50675.2020.00103}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Ketsbaia0C20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KhanM20, author = {Tanveer Khan and Antonis Michalas}, title = {Trust and Believe - Should We? Evaluating the Trustworthiness of Twitter Users}, booktitle = {TrustCom}, pages = {1791--1800}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00246}, doi = {10.1109/TRUSTCOM50675.2020.00246}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/KhanM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KliemeWDM20, author = {Eric Klieme and Jonathan Wilke and Niklas van Dornick and Christoph Meinel}, title = {FIDOnuous: {A} FIDO2/WebAuthn Extension to Support Continuous Web Authentication}, booktitle = {TrustCom}, pages = {1857--1867}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00254}, doi = {10.1109/TRUSTCOM50675.2020.00254}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/KliemeWDM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KnechtS20, author = {Markus Knecht and Burkhard Stiller}, title = {{SCUR:} Smart Contracts with a Static Upper-bound on Resource Usage}, booktitle = {TrustCom}, pages = {1926--1934}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00263}, doi = {10.1109/TRUSTCOM50675.2020.00263}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/KnechtS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KouliaridisK020, author = {Vasileios Kouliaridis and Georgios Kambourakis and Tao Peng}, title = {Feature importance in Android malware detection}, booktitle = {TrustCom}, pages = {1449--1454}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00195}, doi = {10.1109/TRUSTCOM50675.2020.00195}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/KouliaridisK020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KubiakK20, author = {Przemyslaw Kubiak and Miroslaw Kutylowski}, title = {Preventing a Fork in a Blockchain - David Fighting Goliath}, booktitle = {TrustCom}, pages = {1044--1051}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00139}, doi = {10.1109/TRUSTCOM50675.2020.00139}, timestamp = {Mon, 23 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/KubiakK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KunzSB20, author = {Immanuel Kunz and Angelika Schneider and Christian Banse}, title = {Privacy Smells: Detecting Privacy Problems in Cloud Architectures}, booktitle = {TrustCom}, pages = {1324--1331}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00178}, doi = {10.1109/TRUSTCOM50675.2020.00178}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/KunzSB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Kyeremateng-Boateng20, author = {Hubert Kyeremateng{-}Boateng and Marvin A. Conn and Darsana Josyula and Manohar Mareboyana}, title = {Prediction of Radio Frequency Spectrum Occupancy}, booktitle = {TrustCom}, pages = {2028--2034}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00278}, doi = {10.1109/TRUSTCOM50675.2020.00278}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Kyeremateng-Boateng20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LasanthaR20, author = {Dimuth Lasantha and Biplob Ray}, title = {Priority based Modeling and Comparative study of Google Cloud Resources between 2011 and 2019}, booktitle = {TrustCom}, pages = {1310--1317}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00176}, doi = {10.1109/TRUSTCOM50675.2020.00176}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LasanthaR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LauingerBWM20, author = {Johannes Lauinger and Lars Baumg{\"{a}}rtner and Anna{-}Katharina Wickert and Mira Mezini}, title = {Uncovering the Hidden Dangers: Finding Unsafe Go Code in the Wild}, booktitle = {TrustCom}, pages = {410--417}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00063}, doi = {10.1109/TRUSTCOM50675.2020.00063}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LauingerBWM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LeeBWCI0I20, author = {Yen{-}Ting Lee and Tao Ban and Tzu{-}Ling Wan and Shin{-}Ming Cheng and Ryoichi Isawa and Takeshi Takahashi and Daisuke Inoue}, title = {Cross Platform IoT- Malware Family Classification based on Printable Strings}, booktitle = {TrustCom}, pages = {775--784}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00106}, doi = {10.1109/TRUSTCOM50675.2020.00106}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LeeBWCI0I20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LeeKKH20, author = {Young Choon Lee and Jayden King and Young Ki Kim and Seok{-}Hee Hong}, title = {Robust Scheduling for Large-Scale Distributed Systems}, booktitle = {TrustCom}, pages = {38--45}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00019}, doi = {10.1109/TRUSTCOM50675.2020.00019}, timestamp = {Thu, 27 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LeeKKH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LeiLQMY20, author = {Qi Lei and Chao Li and Kexin Qiao and Zhe Ma and Bo Yang}, title = {VGG-based side channel attack on {RSA} implementation}, booktitle = {TrustCom}, pages = {1157--1161}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00154}, doi = {10.1109/TRUSTCOM50675.2020.00154}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LeiLQMY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiCSLYYS20, author = {Tengfei Li and Xiaohong Chen and Haiying Sun and Jing Liu and Jiajia Yang and Chenchen Yang and Junfeng Sun}, title = {Modeling and Verification of Spatio-Temporal Intelligent Transportation Systems}, booktitle = {TrustCom}, pages = {568--575}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00081}, doi = {10.1109/TRUSTCOM50675.2020.00081}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiCSLYYS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiEPQW20, author = {Min Li and Haroon Elahi and Tao Peng and Fang Qi and Guojun Wang}, title = {A Function-Centric Risk Assessment Approach for Android Applications}, booktitle = {TrustCom}, pages = {1187--1193}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00159}, doi = {10.1109/TRUSTCOM50675.2020.00159}, timestamp = {Wed, 19 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiEPQW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiJLC020, author = {Ang Li and Wenjun Jiang and Xueqi Li and Xinrong Chen and Guojun Wang}, title = {Independent Worker Selection In Crowdsourcing}, booktitle = {TrustCom}, pages = {1173--1178}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00157}, doi = {10.1109/TRUSTCOM50675.2020.00157}, timestamp = {Fri, 15 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiJLC020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiLF20, author = {Minghui Li and Yang Li and Liming Fang}, title = {{ELPPS:} An Enhanced Location Privacy Preserving Scheme in Mobile Crowd-Sensing Network Based on Edge Computing}, booktitle = {TrustCom}, pages = {475--482}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00071}, doi = {10.1109/TRUSTCOM50675.2020.00071}, timestamp = {Tue, 23 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiLF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiLWZYL20, author = {Xiaojian Li and Bo Li and Hailan Wang and Jiajia Zhang and Haopeng Yang and Jingang Liu}, title = {A Novel Violation Tracing Model for Cloud Service Accountability}, booktitle = {TrustCom}, pages = {744--750}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00102}, doi = {10.1109/TRUSTCOM50675.2020.00102}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiLWZYL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiWLWL20, author = {Xiaoying Li and Huai{-}bin Wang and Yuqiong Liu and Yuefei Wang and Zhen Liu}, title = {An Investigation of Assistive Products for the Elderly}, booktitle = {TrustCom}, pages = {1509--1514}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00205}, doi = {10.1109/TRUSTCOM50675.2020.00205}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiWLWL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiWTLH20, author = {De Li and Jinyan Wang and Zhou Tan and Xianxian Li and Yuhang Hu}, title = {Differential Privacy Preservation in Interpretable Feedforward-Designed Convolutional Neural Networks}, booktitle = {TrustCom}, pages = {631--638}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00089}, doi = {10.1109/TRUSTCOM50675.2020.00089}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiWTLH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiXZCWZ20, author = {Yi Li and Xi Xiao and Xiaogang Zhu and Xiao Chen and Sheng Wen and Bin Zhang}, title = {SpeedNeuzz: Speed Up Neural Program Approximation with Neighbor Edge Knowledge}, booktitle = {TrustCom}, pages = {450--457}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00068}, doi = {10.1109/TRUSTCOM50675.2020.00068}, timestamp = {Sat, 09 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiXZCWZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiYZ20, author = {Ran Li and Jiaqi Yin and Huibiao Zhu}, title = {Modeling and Analysis of RabbitMQ Using {UPPAAL}}, booktitle = {TrustCom}, pages = {79--86}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00024}, doi = {10.1109/TRUSTCOM50675.2020.00024}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiYZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiZLFW20, author = {Zhuo Li and Xu Zhou and Yang Liu and Congshan Fan and Wei Wang}, title = {A Computation Offloading Model over Collaborative Cloud-Edge Networks with Optimal Transport Theory}, booktitle = {TrustCom}, pages = {1006--1011}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00134}, doi = {10.1109/TRUSTCOM50675.2020.00134}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiZLFW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiZSZWW20, author = {Deyin Li and Miao Zhang and Wei Shi and Huimin Zhang and Duoduo Wang and Lirong Wang}, title = {Pyramid Pooling Channel Attention Network for esophageal tissue segmentation on {OCT} images}, booktitle = {TrustCom}, pages = {1476--1480}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00200}, doi = {10.1109/TRUSTCOM50675.2020.00200}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiZSZWW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiZX20, author = {Yuxi Li and Fucai Zhou and Zifeng Xu}, title = {{PPFQ:} Privacy-Preserving Friends Query over Online Social Networks}, booktitle = {TrustCom}, pages = {1348--1353}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00181}, doi = {10.1109/TRUSTCOM50675.2020.00181}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiZX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiZYCM20, author = {Fang Li and Ziyuan Zhu and Chao Yan and Bowen Chen and Dan Meng}, title = {Malware Detection Based on Term Frequency Analysis of GPRs Features}, booktitle = {TrustCom}, pages = {194--201}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00037}, doi = {10.1109/TRUSTCOM50675.2020.00037}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiZYCM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiZZDZX20, author = {Meng Li and Qi Zhong and Leo Yu Zhang and Yajuan Du and Jun Zhang and Yong Xiang}, title = {Protecting the Intellectual Property of Deep Neural Networks with Watermarking: The Frequency Domain Approach}, booktitle = {TrustCom}, pages = {402--409}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00062}, doi = {10.1109/TRUSTCOM50675.2020.00062}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiZZDZX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiangLH0YZ20, author = {Dong Liang and Qinrang Liu and Yanbin Hu and Tao Hu and Binghao Yan and Haiming Zhao}, title = {Dynamic flow redirecton scheme for enhancing control plane robustness in {SDN}}, booktitle = {TrustCom}, pages = {1354--1359}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00182}, doi = {10.1109/TRUSTCOM50675.2020.00182}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiangLH0YZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiangWLJZ20, author = {Shan Liang and Yuewu Wang and Lingguang Lei and Jiwu Jing and Quan Zhou}, title = {SecureESFS: Sharing Android External Storage Files in {A} Securer Way}, booktitle = {TrustCom}, pages = {1339--1347}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00180}, doi = {10.1109/TRUSTCOM50675.2020.00180}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiangWLJZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiaoCZY20, author = {Maozhu Liao and Shengdong Chen and Chuangjie Zheng and Feng Yuan}, title = {A low-cost method for accurate localization of traffic participants}, booktitle = {TrustCom}, pages = {2001--2006}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00274}, doi = {10.1109/TRUSTCOM50675.2020.00274}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiaoCZY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LinXXCS20, author = {Yan Lin and Guosheng Xu and Guoai Xu and Yudong Chen and Dawei Sun}, title = {Sensitive Information Detection based on Convolution Neural Network and Bi-directional {LSTM}}, booktitle = {TrustCom}, pages = {1614--1621}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00223}, doi = {10.1109/TRUSTCOM50675.2020.00223}, timestamp = {Mon, 19 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LinXXCS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuCZVX20, author = {Liu Liu and Chao Chen and Jun Zhang and Olivier Y. de Vel and Yang Xiang}, title = {Doc2vec-based Insider Threat Detection through Behaviour Analysis of Multi-source Security Logs}, booktitle = {TrustCom}, pages = {301--309}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00050}, doi = {10.1109/TRUSTCOM50675.2020.00050}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiuCZVX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuFHHL20, author = {Wei Liu and Wenlong Feng and Mengxing Huang and Guilai Han and Jialun Lin}, title = {Plant Taxonomy In Hainan Based On Deep Convolutional Neural Network And Transfer Learning}, booktitle = {TrustCom}, pages = {1461--1466}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00197}, doi = {10.1109/TRUSTCOM50675.2020.00197}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiuFHHL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuGDN20, author = {Tianyuan Liu and Hongpeng Guo and Claudiu Danilov and Klara Nahrstedt}, title = {A Privacy-preserving Data Collection and Processing Framework for Third-party {UAV} Services}, booktitle = {TrustCom}, pages = {683--690}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00095}, doi = {10.1109/TRUSTCOM50675.2020.00095}, timestamp = {Thu, 07 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiuGDN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuLHTW20, author = {Yizhong Liu and Jianwei Liu and Yiming Hei and Wei Tan and Qianhong Wu}, title = {A Secure Shard Reconfiguration Protocol for Sharding Blockchains Without a Randomness}, booktitle = {TrustCom}, pages = {1012--1019}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00135}, doi = {10.1109/TRUSTCOM50675.2020.00135}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiuLHTW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuLJJY20, author = {Xianze Liu and Jihong Liu and Bifei Jiang and Haozhen Jiang and Zhi Yang}, title = {More efficient {SM9} algorithm based on bilinear pair optimization processing}, booktitle = {TrustCom}, pages = {1704--1710}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00234}, doi = {10.1109/TRUSTCOM50675.2020.00234}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiuLJJY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuLWGY20, author = {Yannan Liu and Yabin Lai and Kaizhi Wei and Liang Gu and Zhengzheng Yan}, title = {NLabel: An Accurate Familial Clustering Framework for Large-scale Weakly-labeled Malware}, booktitle = {TrustCom}, pages = {210--216}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00039}, doi = {10.1109/TRUSTCOM50675.2020.00039}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiuLWGY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuQF20, author = {Jingbin Liu and Yu Qin and Dengguo Feng}, title = {SeRoT: {A} Secure Runtime System on Trusted Execution Environments}, booktitle = {TrustCom}, pages = {30--37}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00018}, doi = {10.1109/TRUSTCOM50675.2020.00018}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiuQF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuSYJY20, author = {Zhaoli Liu and Qindong Sun and Zhihai Yang and Kun Jiang and Jinpei Yan}, title = {Fined-grained Aspect Extraction from Online Reviews for Decision Support}, booktitle = {TrustCom}, pages = {1536--1541}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00210}, doi = {10.1109/TRUSTCOM50675.2020.00210}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiuSYJY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuT20, author = {Yin Liu and Eli Tilevich}, title = {Reducing the Price of Protection: Identifying and Migrating Non-Sensitive Code in {TEE}}, booktitle = {TrustCom}, pages = {112--120}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00028}, doi = {10.1109/TRUSTCOM50675.2020.00028}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiuT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuT20a, author = {Xiaomei Liu and Xin Tang}, title = {Image Authentication using {QR} Code Watermarking Approach based on Image Segmentation}, booktitle = {TrustCom}, pages = {1572--1577}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00217}, doi = {10.1109/TRUSTCOM50675.2020.00217}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiuT20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuWWLJM20, author = {Fucheng Liu and Yu Wen and Yanna Wu and Shuangshuang Liang and Xihe Jiang and Dan Meng}, title = {MLTracer: Malicious Logins Detection System via Graph Neural Network}, booktitle = {TrustCom}, pages = {715--726}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00099}, doi = {10.1109/TRUSTCOM50675.2020.00099}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiuWWLJM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuY20, author = {Tong Liu and Xiaochen Yuan}, title = {Image Self-Recovery Based on Authentication Feature Extraction}, booktitle = {TrustCom}, pages = {1222--1227}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00164}, doi = {10.1109/TRUSTCOM50675.2020.00164}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiuY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuZ20, author = {Xiaoyang Liu and Ziyuan Zhu}, title = {pcSVF: An Evaluation of Side-Channel Vulnerability of Port Contention}, booktitle = {TrustCom}, pages = {1813--1819}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00248}, doi = {10.1109/TRUSTCOM50675.2020.00248}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiuZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LuD20, author = {Linpeng Lu and Ning Ding}, title = {Multi-Party Private Set Intersection in Vertical Federated Learning}, booktitle = {TrustCom}, pages = {707--714}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00098}, doi = {10.1109/TRUSTCOM50675.2020.00098}, timestamp = {Tue, 24 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LuD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LuXTT020, author = {Tao Lu and Hongyun Xu and Kai Tian and Cenxi Tian and Rui Jiang}, title = {Semantic Location Privacy Protection Algorithm Based on Edge Cluster Graph}, booktitle = {TrustCom}, pages = {1304--1309}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00175}, doi = {10.1109/TRUSTCOM50675.2020.00175}, timestamp = {Fri, 30 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LuXTT020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Ma0QQ20, author = {Yingying Ma and Shuo Li and Shaotian Qin and Yue Qi}, title = {Factors affecting trust in the autonomous vehicle: {A} survey of primary school students and parent perceptions}, booktitle = {TrustCom}, pages = {2020--2027}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00277}, doi = {10.1109/TRUSTCOM50675.2020.00277}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Ma0QQ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MaR20, author = {Qicheng Ma and Nidhi Rastogi}, title = {{DANTE:} Predicting Insider Threat using {LSTM} on system logs}, booktitle = {TrustCom}, pages = {1151--1156}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00153}, doi = {10.1109/TRUSTCOM50675.2020.00153}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/MaR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MaZZZPL20, author = {Luping Ma and Dali Zhu and Shunliang Zhang and Xiaohui Zhang and Shumin Peng and Ya Li}, title = {UIDroid: User-driven Based Hierarchical Access Control for Sensitive Information}, booktitle = {TrustCom}, pages = {1733--1740}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00238}, doi = {10.1109/TRUSTCOM50675.2020.00238}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/MaZZZPL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MaoWC20, author = {Chengying Mao and Linlin Wen and Tsong Yueh Chen}, title = {Adaptive Random Test Case Generation Based on Multi-Objective Evolutionary Search}, booktitle = {TrustCom}, pages = {46--53}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00020}, doi = {10.1109/TRUSTCOM50675.2020.00020}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/MaoWC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MatthewsMSM20, author = {Isaac Matthews and John C. Mace and Sadegh Soudjani and Aad van Moorsel}, title = {Cyclic Bayesian Attack Graphs: {A} Systematic Computational Approach}, booktitle = {TrustCom}, pages = {129--136}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00030}, doi = {10.1109/TRUSTCOM50675.2020.00030}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/MatthewsMSM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Megahed020, author = {Amr Megahed and Qi Han}, title = {Face2Face Manipulation Detection Based on Histogram of Oriented Gradients}, booktitle = {TrustCom}, pages = {1260--1267}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00169}, doi = {10.1109/TRUSTCOM50675.2020.00169}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Megahed020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MesseCBHFS20, author = {Nan Messe and Vanea Chiprianov and Nicolas Belloir and Jamal El Hachem and R{\'{e}}gis Fleurquin and Salah Sadou}, title = {Asset-Oriented Threat Modeling}, booktitle = {TrustCom}, pages = {491--501}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00073}, doi = {10.1109/TRUSTCOM50675.2020.00073}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/MesseCBHFS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MimotoKKM20, author = {Tomoaki Mimoto and Shinsaku Kiyomoto and Koji Kitamura and Atsuko Miyaji}, title = {A Practical Privacy-Preserving Algorithm for Document Data}, booktitle = {TrustCom}, pages = {1376--1383}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00185}, doi = {10.1109/TRUSTCOM50675.2020.00185}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/MimotoKKM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MittalAT20, author = {Manasi Mittal and Muhammad Rizwan Asghar and Arvind K. Tripathi}, title = {Do My Emotions Influence What {I} Share? Analysing the Effects of Emotions on Privacy Leakage in Twitter}, booktitle = {TrustCom}, pages = {1228--1235}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00165}, doi = {10.1109/TRUSTCOM50675.2020.00165}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/MittalAT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ModingerH20, author = {David M{\"{o}}dinger and Franz J. Hauck}, title = {3P3: Strong Flexible Privacy for Broadcasts}, booktitle = {TrustCom}, pages = {1630--1637}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00225}, doi = {10.1109/TRUSTCOM50675.2020.00225}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ModingerH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MohammedKPR20, author = {Fatma Mohammed and A. S. M. Kayes and Eric Pardede and Wenny Rahayu}, title = {A Framework for Measuring IoT Data Quality Based on Freshness Metrics}, booktitle = {TrustCom}, pages = {1242--1249}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00167}, doi = {10.1109/TRUSTCOM50675.2020.00167}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/MohammedKPR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MoustafaAA20, author = {Nour Moustafa and Mohiuddin Ahmed and Sherif Ahmed}, title = {Data Analytics-enabled Intrusion Detection: Evaluations of ToN IoT Linux Datasets}, booktitle = {TrustCom}, pages = {727--735}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00100}, doi = {10.1109/TRUSTCOM50675.2020.00100}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/MoustafaAA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MoustafaKDJ20, author = {Nour Moustafa and Marwa Keshk and Essam Soliman Debie and Helge Janicke}, title = {Federated TON{\_}IoT Windows Datasets for Evaluating AI-based Security Applications}, booktitle = {TrustCom}, pages = {848--855}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00114}, doi = {10.1109/TRUSTCOM50675.2020.00114}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/MoustafaKDJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MuktaMP0K20, author = {Rahma Mukta and James Martens and Hye{-}Young Paik and Qinghua Lu and Salil S. Kanhere}, title = {Blockchain-based Verifiable Credential Sharing with Selective Disclosure}, booktitle = {TrustCom}, pages = {959--966}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00128}, doi = {10.1109/TRUSTCOM50675.2020.00128}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/MuktaMP0K20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/NguyenN20, author = {Hoang Hai Nguyen and David M. Nicol}, title = {Estimating Loss Due to Cyber-attack in the Presence of Uncertainty}, booktitle = {TrustCom}, pages = {361--369}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00057}, doi = {10.1109/TRUSTCOM50675.2020.00057}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/NguyenN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Nussbaum020, author = {Eyal Nussbaum and Michael Segal}, title = {Finding Geometric Medians with Location Privacy}, booktitle = {TrustCom}, pages = {1874--1881}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00256}, doi = {10.1109/TRUSTCOM50675.2020.00256}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Nussbaum020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/OkadaISH20, author = {Rina Okada and Zen Ishikura and Toshiki Shibahara and Satoshi Hasegawa}, title = {Special-purpose Model Extraction Attacks: Stealing Coarse Model with Fewer Queries}, booktitle = {TrustCom}, pages = {1995--2000}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00273}, doi = {10.1109/TRUSTCOM50675.2020.00273}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/OkadaISH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/OmarJNHBBR20, author = {Abdullah Al Omar and Abu Kaisar Jamil and Md. Shakhawath Hossain Nur and Md Mahamudul Hasan and Rabeya Bosri and Md. Zakirul Alam Bhuiyan and Mohammad Shahriar Rahman}, title = {Towards {A} Transparent and Privacy-preserving Healthcare Platform with Blockchain for Smart Cities}, booktitle = {TrustCom}, pages = {1291--1296}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00173}, doi = {10.1109/TRUSTCOM50675.2020.00173}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/OmarJNHBBR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/OnoduezeJ20, author = {Francis Onodueze and Darsana Josyula}, title = {Anomaly Detection on {MIL-STD-1553} Dataset using Machine Learning Algorithms}, booktitle = {TrustCom}, pages = {592--598}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00084}, doi = {10.1109/TRUSTCOM50675.2020.00084}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/OnoduezeJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/PalfingerPZ20, author = {Gerald Palfinger and Bernd Pr{\"{u}}nster and Dominik Julian Ziegler}, title = {AndroTIME: Identifying Timing Side Channels in the Android {API}}, booktitle = {TrustCom}, pages = {1849--1856}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00253}, doi = {10.1109/TRUSTCOM50675.2020.00253}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/PalfingerPZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/PanXHZL020, author = {Yuqing Pan and Xi Xiao and Guangwu Hu and Bin Zhang and Qing Li and Haitao Zheng}, title = {{ALBFL:} {A} Novel Neural Ranking Model for Software Fault Localization via Combining Static and Dynamic Features}, booktitle = {TrustCom}, pages = {785--792}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00107}, doi = {10.1109/TRUSTCOM50675.2020.00107}, timestamp = {Tue, 04 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/PanXHZL020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/PengLCW20, author = {Tao Peng and Jierong Liu and Jianer Chen and Guojun Wang}, title = {A Privacy-Preserving Crowdsensing System with Muti-Blockchain}, booktitle = {TrustCom}, pages = {1944--1949}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00265}, doi = {10.1109/TRUSTCOM50675.2020.00265}, timestamp = {Thu, 18 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/PengLCW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/PhippsOV20, author = {Anthony Phipps and Karim Ouazzane and Vassil T. Vassilev}, title = {Enhancing Cyber Security Using Audio Techniques: {A} Public Key Infrastructure for Sound}, booktitle = {TrustCom}, pages = {1428--1436}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00192}, doi = {10.1109/TRUSTCOM50675.2020.00192}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/PhippsOV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/PlataS20, author = {Marcin Plata and Piotr Syga}, title = {Robust Spatial-spread Deep Neural Image Watermarking}, booktitle = {TrustCom}, pages = {62--70}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00022}, doi = {10.1109/TRUSTCOM50675.2020.00022}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/PlataS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Pye0AR20, author = {Jack Pye and Biju Issac and Nauman Aslam and Husnain Rafiq}, title = {Android Malware Classification Using Machine Learning and Bio-Inspired Optimisation Algorithms}, booktitle = {TrustCom}, pages = {1777--1782}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00244}, doi = {10.1109/TRUSTCOM50675.2020.00244}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Pye0AR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/QashlanNH20, author = {Amjad Qashlan and Priyadarsi Nanda and Xiangjian He}, title = {Security and Privacy Implementation in Smart Home: Attributes Based Access Control and Smart Contracts}, booktitle = {TrustCom}, pages = {951--958}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00127}, doi = {10.1109/TRUSTCOM50675.2020.00127}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/QashlanNH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/QiMBL20, author = {Xuejian Qi and Xuebin Ma and Xiangyu Bai and Wuyungerile Li}, title = {Differential privacy preserving data publishing based on Bayesian network}, booktitle = {TrustCom}, pages = {1718--1726}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00236}, doi = {10.1109/TRUSTCOM50675.2020.00236}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/QiMBL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/QinFAQG20, author = {Dong Qin and Shen Fu and George T. Amariucai and Daji Qiao and Yong Guan}, title = {{MAUSPAD:} Mouse-based Authentication Using Segmentation-based, Progress-Adjusted {DTW}}, booktitle = {TrustCom}, pages = {425--433}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00065}, doi = {10.1109/TRUSTCOM50675.2020.00065}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/QinFAQG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/QiuLSD20, author = {Xiaoying Qiu and Guangda Li and Xuan Sun and Zhiguo Du}, title = {Exploiting User Selection Algorithm for Securing Wireless Communication Networks}, booktitle = {TrustCom}, pages = {1552--1555}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00213}, doi = {10.1109/TRUSTCOM50675.2020.00213}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/QiuLSD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/QuZHWD20, author = {Dapeng Qu and Jiankun Zhang and Zhenhuan Hou and Ming Wan and Bo Dong}, title = {A Trust Routing Scheme based on Identification of Non-complete Cooperative Nodes in Mobile Peer-to-Peer Networks}, booktitle = {TrustCom}, pages = {22--29}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00017}, doi = {10.1109/TRUSTCOM50675.2020.00017}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/QuZHWD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/RashidibajganHD20, author = {Samaneh Rashidibajgan and Thomas Hupperich and Robin Doss and Lei Pan}, title = {Opportunistic Tracking in Cyber-Physical Systems}, booktitle = {TrustCom}, pages = {1672--1679}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00230}, doi = {10.1109/TRUSTCOM50675.2020.00230}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/RashidibajganHD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/RezaeighalehZ20, author = {Hossein Rezaeighaleh and Cliff C. Zou}, title = {Efficient Off-Chain Transaction to Avoid Inaccessible Coins in Cryptocurrencies}, booktitle = {TrustCom}, pages = {1903--1909}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00260}, doi = {10.1109/TRUSTCOM50675.2020.00260}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/RezaeighalehZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/RyanC0D20, author = {Matthew J. Ryan and Morshed U. Chowdhury and Frank Jiang and Robin Doss}, title = {Avoiding Geographic Regions in Tor}, booktitle = {TrustCom}, pages = {802--809}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00109}, doi = {10.1109/TRUSTCOM50675.2020.00109}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/RyanC0D20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SRG20, author = {Ahmad Salehi S. and Carsten Rudolph and Marthie Grobler}, title = {Attribute-Based Data Access Control for Multi-Authority System}, booktitle = {TrustCom}, pages = {1834--1841}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00251}, doi = {10.1109/TRUSTCOM50675.2020.00251}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SRG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Saganowski20, author = {Stanislaw Saganowski}, title = {A three-stage machine learning network security solution for public entities}, booktitle = {TrustCom}, pages = {1097--1104}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00145}, doi = {10.1109/TRUSTCOM50675.2020.00145}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Saganowski20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SalimMT20, author = {Sara Salim and Nour Moustafa and Benjamin P. Turnbull}, title = {Privacy-Encoding Models for Preserving Utility of Machine Learning Algorithms in Social Media}, booktitle = {TrustCom}, pages = {856--863}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00115}, doi = {10.1109/TRUSTCOM50675.2020.00115}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/SalimMT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SamuelAJ20, author = {Joe Samuel and Khalil Aalab and Jason Jaskolka}, title = {Evaluating the Soundness of Security Metrics from Vulnerability Scoring Frameworks}, booktitle = {TrustCom}, pages = {442--449}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00067}, doi = {10.1109/TRUSTCOM50675.2020.00067}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SamuelAJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SbaiHGM20, author = {Hugo Sba{\"{\i}} and Jassim Happa and Michael Goldsmith and Samy Meftali}, title = {Dataset Construction and Analysis of Screenshot Malware}, booktitle = {TrustCom}, pages = {646--655}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00091}, doi = {10.1109/TRUSTCOM50675.2020.00091}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/SbaiHGM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SchellK20, author = {Oleg Schell and Marcel Kneib}, title = {{VALID:} Voltage-Based Lightweight Intrusion Detection for the Controller Area Network}, booktitle = {TrustCom}, pages = {225--232}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00041}, doi = {10.1109/TRUSTCOM50675.2020.00041}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/SchellK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SemalMMK20, author = {Benjamin Semal and Konstantinos Markantonakis and Keith Mayes and Jan Kalbantner}, title = {One Covert Channel to Rule Them All: {A} Practical Approach to Data Exfiltration in the Cloud}, booktitle = {TrustCom}, pages = {328--336}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00053}, doi = {10.1109/TRUSTCOM50675.2020.00053}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SemalMMK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SenavirathneT20, author = {Navoda Senavirathne and Vicen{\c{c}} Torra}, title = {On the Role of Data Anonymization in Machine Learning Privacy}, booktitle = {TrustCom}, pages = {664--675}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00093}, doi = {10.1109/TRUSTCOM50675.2020.00093}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SenavirathneT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ShahSSABD20, author = {Syed W. Shah and Naeem Firdous Syed and Arash Shaghaghi and Adnan Anwar and Zubair A. Baig and Robin Doss}, title = {Towards a Lightweight Continuous Authentication Protocol for Device-to-Device Communication}, booktitle = {TrustCom}, pages = {1119--1126}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00148}, doi = {10.1109/TRUSTCOM50675.2020.00148}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ShahSSABD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ShahriarBHSFCB20, author = {Md. Atik Shahriar and Faisal Haque Bappy and A. K. M. Fakhrul Hossain and Dayamoy Datta Saikat and Md. Sadek Ferdous and Mohammad Jabed Morshed Chowdhury and Md. Zakirul Alam Bhuiyan}, title = {Modelling Attacks in Blockchain Systems using Petri Nets}, booktitle = {TrustCom}, pages = {1069--1078}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00142}, doi = {10.1109/TRUSTCOM50675.2020.00142}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ShahriarBHSFCB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SharmaBJ20, author = {Aakanksha Sharma and Venki Balasubramanian and Alireza Jolfaei}, title = {Security Challenges and Solutions for 5G HetNet}, booktitle = {TrustCom}, pages = {1318--1323}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00177}, doi = {10.1109/TRUSTCOM50675.2020.00177}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SharmaBJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SharmaDDM20, author = {Yanshul Sharma and Zinea Das and Alok Das and Sanjay Moulik}, title = {{TA-HRT:} {A} temperature-aware scheduler for heterogeneous real-time multicore systems}, booktitle = {TrustCom}, pages = {104--111}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00027}, doi = {10.1109/TRUSTCOM50675.2020.00027}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/SharmaDDM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SheikhalishahiZ20, author = {Mina Sheikhalishahi and Nicola Zannone}, title = {On the Comparison of Classifiers' Construction over Private Inputs}, booktitle = {TrustCom}, pages = {691--698}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00096}, doi = {10.1109/TRUSTCOM50675.2020.00096}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/SheikhalishahiZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ShengHGWPK20, author = {Jinfang Sheng and Yan Hu and Kerong Guan and Bin Wang and Xiaoxia Pan and Wenjun Kang}, title = {Robustness analysis and defence strategy of an interdependent networks model based on closeness centrality}, booktitle = {TrustCom}, pages = {1236--1241}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00166}, doi = {10.1109/TRUSTCOM50675.2020.00166}, timestamp = {Thu, 28 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ShengHGWPK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ShiL20, author = {Jinshan Shi and Ru Li}, title = {Permission Token Segmentation Scheme based on Blockchain Access Control}, booktitle = {TrustCom}, pages = {1956--1964}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00267}, doi = {10.1109/TRUSTCOM50675.2020.00267}, timestamp = {Tue, 22 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ShiL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ShuvoA20, author = {Md Shamimur Rahman Shuvo and Dima Alhadidi}, title = {Membership Inference Attacks: Analysis and Mitigation}, booktitle = {TrustCom}, pages = {1410--1419}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00190}, doi = {10.1109/TRUSTCOM50675.2020.00190}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ShuvoA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SifferFTL20, author = {Alban Siffer and Pierre{-}Alain Fouque and Alexandre Termier and Christine Largou{\"{e}}t}, title = {Netspot: a simple Intrusion Detection System with statistical learning}, booktitle = {TrustCom}, pages = {911--918}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00122}, doi = {10.1109/TRUSTCOM50675.2020.00122}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SifferFTL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SixRHS20, author = {Nicolas Six and Claudia Negri Ribalta and Nicolas Herbaut and Camille Salinesi}, title = {A blockchain-based pattern for confidential and pseudo-anonymous contract enforcement}, booktitle = {TrustCom}, pages = {1965--1970}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00268}, doi = {10.1109/TRUSTCOM50675.2020.00268}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SixRHS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SonLMD20, author = {Ha Xuan Son and Hai Trieu Le and Nadia Metoui and Nghia Duong{-}Trung}, title = {DeM-CoD: Novel Access-Control-Based Cash on Delivery Mechanism for Decentralized Marketplace}, booktitle = {TrustCom}, pages = {71--78}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00023}, doi = {10.1109/TRUSTCOM50675.2020.00023}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SonLMD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SongK20, author = {Zhicheng Song and Pushpendu Kar}, title = {Name-Signature Lookup System: {A} Security Enhancement to Named Data Networking}, booktitle = {TrustCom}, pages = {1444--1448}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00194}, doi = {10.1109/TRUSTCOM50675.2020.00194}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/SongK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SongYYLBCM20, author = {Xiaonan Song and Aimin Yu and Haibo Yu and Shirun Liu and Xin Bai and Lijun Cai and Dan Meng}, title = {Program Slice based Vulnerable Code Clone Detection}, booktitle = {TrustCom}, pages = {293--300}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00049}, doi = {10.1109/TRUSTCOM50675.2020.00049}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/SongYYLBCM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Stobbs0J20, author = {Jordan Stobbs and Biju Issac and Seibu Mary Jacob}, title = {Phishing Web Page Detection Using Optimised Machine Learning}, booktitle = {TrustCom}, pages = {483--490}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00072}, doi = {10.1109/TRUSTCOM50675.2020.00072}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Stobbs0J20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SuSTL20, author = {Ting Su and Jiahe Shi and Yongkang Tang and Shaoqing Li}, title = {Golden-Chip-Free Hardware Trojan Detection Through Thermal Radiation Comparison in Vulnerable Areas}, booktitle = {TrustCom}, pages = {1052--1059}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00140}, doi = {10.1109/TRUSTCOM50675.2020.00140}, timestamp = {Mon, 10 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SuSTL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SunX0ZWF20, author = {Yizhen Sun and Yiman Xie and Weiping Wang and Shigeng Zhang and Yuxi Wu and Jingchuan Feng}, title = {{RPAD:} An Unsupervised {HTTP} Request Parameter Anomaly Detection Method}, booktitle = {TrustCom}, pages = {1215--1221}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00163}, doi = {10.1109/TRUSTCOM50675.2020.00163}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/SunX0ZWF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SunYZ20, author = {Tao Sun and Jing Yang and Wenjie Zhong}, title = {{CPN} Model Checking Method of Concurrent Software Based on State Space Pruning}, booktitle = {TrustCom}, pages = {1390--1394}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00187}, doi = {10.1109/TRUSTCOM50675.2020.00187}, timestamp = {Thu, 02 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SunYZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SuriFZL20, author = {Guga Suri and Jianming Fu and Rui Zheng and Xinying Liu}, title = {Family Identification of AGE-Generated Android Malware Using Tree-Based Feature}, booktitle = {TrustCom}, pages = {386--393}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00060}, doi = {10.1109/TRUSTCOM50675.2020.00060}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/SuriFZL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SuzakiNOT20, author = {Kuniyasu Suzaki and Kenta Nakajima and Tsukasa Oi and Akira Tsukamoto}, title = {Library Implementation and Performance Analysis of GlobalPlatform {TEE} Internal {API} for Intel {SGX} and {RISC-V} Keystone}, booktitle = {TrustCom}, pages = {1200--1208}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00161}, doi = {10.1109/TRUSTCOM50675.2020.00161}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SuzakiNOT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TangZLLL20, author = {Xin Tang and Linna Zhou and Dan Liu and Boyu Liu and Xinyi L{\"{u}}}, title = {Reversible data hiding based on improved rhombus predictor and prediction error expansion}, booktitle = {TrustCom}, pages = {13--21}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00016}, doi = {10.1109/TRUSTCOM50675.2020.00016}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/TangZLLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TartaglioneG20, author = {Enzo Tartaglione and Marco Grangetto}, title = {A non-discriminatory approach to ethical deep learning}, booktitle = {TrustCom}, pages = {943--950}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00126}, doi = {10.1109/TRUSTCOM50675.2020.00126}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/TartaglioneG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ThaoNY020, author = {Tran Phuong Thao and Hoang{-}Quoc Nguyen{-}Son and Rie Shigetomi Yamaguchi and Toshiyuki Nakata}, title = {Boosting Homograph Attack Classification Using Ensemble Learning and N-gram Model}, booktitle = {TrustCom}, pages = {1983--1988}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00271}, doi = {10.1109/TRUSTCOM50675.2020.00271}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ThaoNY020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.