Integration of 5G, VANETs and Blockchain Technology (English)
- New search for: Arif, Muhammad
- New search for: Balzano, Walter
- New search for: Fontanella, Alessandro
- New search for: Stranieri, Silvia
- New search for: Wang, Guojun
- New search for: Xing, Xiaofei
- New search for: Arif, Muhammad
- New search for: Balzano, Walter
- New search for: Fontanella, Alessandro
- New search for: Stranieri, Silvia
- New search for: Wang, Guojun
- New search for: Xing, Xiaofei
In:
2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
;
2007-2013
;
2020
- Conference paper / Electronic Resource
-
Title:Integration of 5G, VANETs and Blockchain Technology
-
Contributors:Arif, Muhammad ( author ) / Balzano, Walter ( author ) / Fontanella, Alessandro ( author ) / Stranieri, Silvia ( author ) / Wang, Guojun ( author ) / Xing, Xiaofei ( author )
-
Published in:
-
Publisher:
- New search for: IEEE
-
Publication date:2020-12-01
-
Size:662757 byte
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Conference paper
-
Type of material:Electronic Resource
-
Language:English
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
[Title page i]| 2020
- 1
-
Enhancing Randomization Entropy of x86-64 Code while Preserving Semantic ConsistencyFeng, Xuewei / Wang, Dongxia / Lin, Zhechao / Kuang, Xiaohui / Zhao, Gang et al. | 2020
- 3
-
[Title page iii]| 2020
- 4
-
[Copyright notice]| 2020
- 5
-
Table of Contents| 2020
- 13
-
Reversible Data Hiding Based on Improved Rhombus Predictor and Prediction Error ExpansionTang, Xin / Zhou, Linna / Liu, Dan / Liu, Boyu / Lu, Xinyi et al. | 2020
- 22
-
A Trust Routing Scheme Based on Identification of Non-complete Cooperative Nodes in Mobile Peer-to-Peer NetworksQu, Dapeng / Zhang, Jiankun / Hou, Zhenhuan / Wang, Min / Dong, Bo et al. | 2020
- 30
-
SeRoT: A Secure Runtime System on Trusted Execution EnvironmentsLiu, Jingbin / Qin, Yu / Feng, Dengguo et al. | 2020
- 38
-
Robust Scheduling for Large-Scale Distributed SystemsLee, Young Choon / King, Jayden / Kim, Young Ki / Hong, Seok-Hee et al. | 2020
- 43
-
Welcome Messages from IEEE TrustCom 2020 General Chairs| 2020
- 44
-
Welcome Messages from IEEE TrustCom 2020 Program Chairs| 2020
- 45
-
IEEE TrustCom 2020 Organizing and Program Committees| 2020
- 46
-
Adaptive Random Test Case Generation Based on Multi-objective Evolutionary SearchMao, Chengying / Wen, Linlin / Chen, Tsong Yueh et al. | 2020
- 54
-
Improving Efficiency of Key Enumeration Based on Side-Channel AnalysisYang, Wei / Fu, Anmin / Zhang, Hailong / Huang, Chanying et al. | 2020
- 55
-
C4W 2020 Organizing and Program Committees| 2020
- 58
-
AEIT 2020 Organizing and Program Committees| 2020
- 60
-
PASS4IoT 2020 Organizing and Program Committees| 2020
- 61
-
IWCSS 2020 Organizing and Program Committees| 2020
- 62
-
Robust Spatial-Spread Deep Neural Image WatermarkingPlata, Marcin / Syga, Piotr et al. | 2020
- 64
-
BlockchainSys 2020 Organizing and Program Committees| 2020
- 66
-
MLTrustCom 2020 Organizing and Program Committees| 2020
- 67
-
SmartITC 2020 Organizing and Program Committees| 2020
- 71
-
DeM-CoD: Novel Access-Control-Based Cash on Delivery Mechanism for Decentralized MarketplaceHa, Xuan Son / Le, Hai Trieu / Metoui, Nadia / Duong-Trung, Nghia et al. | 2020
- 79
-
Modeling and Analysis of RabbitMQ Using UPPAALLi, Ran / Yin, Jiaqi / Zhu, Huibiao et al. | 2020
- 87
-
User-Controlled, Auditable, Cross-Jurisdiction Sharing of Healthcare Data Mediated by a Public BlockchainZhou, Xiaohu / Jesus, Vitor / Wang, Yonghao / Josephs, Mark et al. | 2020
- 97
-
A Unified Host-based Intrusion Detection Framework using Spark in CloudLiu, Ming / Xue, Zhi / He, Xiangjian et al. | 2020
- 104
-
TA-HRT: A Temperature-Aware Scheduler for Heterogeneous Real-Time Multicore SystemsSharma, Yanshul / Das, Zinea / Das, Alok / Moulik, Sanjay et al. | 2020
- 112
-
Reducing the Price of Protection: Identifying and Migrating Non-sensitive Code in TEELiu, Yin / Tilevich, Eli et al. | 2020
- 121
-
Fairness Testing of Machine Learning Models Using Deep Reinforcement LearningXie, Wentao / Wu, Peng et al. | 2020
- 129
-
Cyclic Bayesian Attack Graphs: A Systematic Computational ApproachMatthews, Isaac / Mace, John / Soudjani, Sadegh / van Moorsel, Aad et al. | 2020
- 137
-
Practical Secure Two-Party EdDSA Signature Generation with Key Protection and Applications in CryptocurrencyFeng, Qi / He, Debiao / Luo, Min / Li, Zengxiang / Choo, Kim-Kwang Raymond et al. | 2020
- 148
-
Password Policies vs. Usability: When Do Users Go "Bananas"?Dillon, Roberto / Chawla, Shailey / Hristova, Dayana / Gobl, Barbara / Jovicic, Suzana et al. | 2020
- 154
-
Malware Classification on Imbalanced Data through Self-AttentionDing, Yu / Wang, ShuPeng / Xing, Jian / Zhang, XiaoYu / Qi, ZiSen / Fu, Ge / Qiang, Qian / Sun, HaoLiang / Zhang, JianYu et al. | 2020
- 162
-
Novel Design of Hardware Trojan: A Generic Approach for Defeating Testability Based DetectionZhang, Ning / Lv, Zhiqiang / Zhang, Yanlin / Li, Haiyang / Zhang, Yixin / Huang, Weiqing et al. | 2020
- 174
-
TRUVIN: Lightweight Detection of Data Oriented Attacks Through Trusted Value IntegrityGeden, Munir / Rasmussen, Kasper et al. | 2020
- 182
-
LURK: Server-Controlled TLS DelegationBoureanu, Ioana / Migault, Daniel / Preda, Stere / Alamedine, Hyame Assem / Mishra, Sanjay / Fieau, Frederic / Mannan, Mohammad et al. | 2020
- 194
-
Malware Detection Based on Term Frequency Analysis of GPRs FeaturesLi, Fang / Zhu, Ziyuan / Yan, Chao / Chen, Bowen / Meng, Dan et al. | 2020
- 202
-
Secure Outsourcing of Multi-armed BanditsCiucanu, Radu / Lafourcade, Pascal / Lombard-Platet, Marius / Soare, Marta et al. | 2020
- 210
-
NLabel: An Accurate Familial Clustering Framework for Large-Scale Weakly-Labeled MalwareLiu, Yannan / Lai, Yabin / Wei, Kaizhi / Gu, Liang / Yan, Zhengzheng et al. | 2020
- 217
-
Active Link Obfuscation to Thwart Link-flooding Attacks for Internet of ThingsDing, Xuyang / Xiao, Feng / Zhou, Man / Wang, Zhibo et al. | 2020
- 225
-
VALID: Voltage-Based Lightweight Intrusion Detection for the Controller Area NetworkSchell, Oleg / Kneib, Marcel et al. | 2020
- 233
-
Densely Connected Residual Network for Attack RecognitionWu, Peilun / Moustafa, Nour / Yang, Shiyi / Guo, Hui et al. | 2020
- 243
-
Optimized FPGA Implementation of Elliptic Curve Cryptosystem over Prime FieldsYang, Guoqiang / Kong, Fanyu / Xu, Qiuliang et al. | 2020
- 250
-
FTPB: A Three-Stage DNS Tunnel Detection Method Based on Character Feature ExtractionWu, Kemeng / Zhang, Yongzheng / Yin, Tao et al. | 2020
- 259
-
De-Randomizing the Code Segment with Timing Function AttackZhang, Tianning / Cai, Miao / Zhang, Diming / Huang, Hao et al. | 2020
- 268
-
Unmasking Windows Advanced Persistent Threat ExecutionCoulter, Rory / Zhang, Jun / Pan, Lei / Xiang, Yang et al. | 2020
- 277
-
Ciphertext-Policy Attribute-Based Encryption with Multi-keyword Search over Medical Cloud DataYin, Changchun / Wang, Hao / Zhou, Lu / Fang, Liming et al. | 2020
- 285
-
VCKSCF: Efficient Verifiable Conjunctive Keyword Search Based on Cuckoo Filter for Cloud StorageFan, Chan / Dong, Xiaolei / Cao, Zhenfu / Shen, Jiachen et al. | 2020
- 293
-
Program Slice Based Vulnerable Code Clone DetectionSong, Xiaonan / Yu, Aimin / Yu, Haibo / Liu, Shirun / Bai, Xin / Cai, Lijun / Meng, Dan et al. | 2020
- 301
-
Doc2vec-Based Insider Threat Detection through Behaviour Analysis of Multi-source Security LogsLiu, Liu / Chen, Chao / Zhang, Jun / De Vel, Olivier / Xiang, Yang et al. | 2020
- 310
-
C2BID: Cluster Change-Based Intrusion DetectionFernandes, Tiago / Dias, Luis / Correia, Miguel et al. | 2020
- 320
-
TEADS: A Defense-Aware Framework for Synthesizing Transient Execution AttacksHuo, Tianlin / Wang, Wenhao / Zhao, Pei / Li, Yufeng / Wang, Tingting / Li, Mingshu et al. | 2020
- 328
-
One Covert Channel to Rule Them All: A Practical Approach to Data Exfiltration in the CloudSemal, Benjamin / Markantonakis, Konstantinos / Mayes, Keith / Kalbantner, Jan et al. | 2020
- 337
-
ReDex: Unpacking Android Packed Apps by Executing Every MethodCai, Jiajin / Li, Tongxin / Huang, Can / Han, Xinhui et al. | 2020
- 345
-
Awareness of Secure Coding Guidelines in the Industry - A First Data AnalysisEspinha Gasiba, Tiago / Lechner, Ulrike / Pinto-Albuquerque, Maria / Mendez Fernandez, Daniel et al. | 2020
- 353
-
IoT Attacks: Features Identification and ClusteringHaseeb, Junaid / Mansoori, Masood / Al-Sahaf, Harith / Welch, Ian et al. | 2020
- 361
-
Estimating Loss Due to Cyber-Attack in the Presence of UncertaintyNguyen, Hoang Hai / Nicol, David M. et al. | 2020
- 370
-
STIDM: A Spatial and Temporal Aware Intrusion Detection ModelHan, Xueying / Yin, Rongchao / Lu, Zhigang / Jiang, Bo / Liu, Yuling / Liu, Song / Wang, Chonghua / Li, Ning et al. | 2020
- 378
-
Partial-SMT: Core-Scheduling Protection Against SMT Contention-Based AttacksWu, Xiaohui / He, Yeping / Zhou, Qiming / Ma, Hengtai / He, Liang / Wang, Wenhao / Chen, Liheng et al. | 2020
- 386
-
Family Identification of AGE-Generated Android Malware Using Tree-Based FeatureSuri, Guga / Fu, Jianming / Zheng, Rui / Liu, Xinying et al. | 2020
- 394
-
Towards a Theory of Special-Purpose Program ObfuscationAsghar, Muhammad Rizwan / Galbraith, Steven / Lanzi, Andrea / Russello, Giovanni / Zobernig, Lukas et al. | 2020
- 402
-
Protecting the Intellectual Property of Deep Neural Networks with Watermarking: The Frequency Domain ApproachLi, Meng / Zhong, Qi / Zhang, Leo Yu / Du, Yajuan / Zhang, Jun / Xiang, Yong et al. | 2020
- 410
-
Uncovering the Hidden Dangers: Finding Unsafe Go Code in the WildLauinger, Johannes / Baumgartner, Lars / Wickert, Anna-Katharina / Mezini, Mira et al. | 2020
- 418
-
Traffic Classification of User Behaviors in Tor, I2P, ZeroNet, FreenetHu, Yuzong / Zou, Futai / Li, Linsen / Yi, Ping et al. | 2020
- 425
-
MAUSPAD: Mouse-Based Authentication Using Segmentation-Based, Progress-Adjusted DTWQin, Dong / Fu, Shen / Amariucai, George / Qiao, Daji / Guan, Yong et al. | 2020
- 434
-
Improving the Effectiveness of Grey-box Fuzzing By Extracting Program InformationFu, Yu / Tong, Siming / Guo, Xiangyu / Cheng, Liang / Zhang, Yang / Feng, Dengguo et al. | 2020
- 442
-
Evaluating the Soundness of Security Metrics from Vulnerability Scoring FrameworksSamuel, Joe / Aalab, Khalil / Jaskolka, Jason et al. | 2020
- 450
-
SpeedNeuzz: Speed Up Neural Program Approximation with Neighbor Edge KnowledgeLi, Yi / Xiao, Xi / Zhu, Xiaogang / Chen, Xiao / Wen, Sheng / Zhang, Bin et al. | 2020
- 458
-
Mind the GAP: Security & Privacy Risks of Contact Tracing AppsBaumgartner, Lars / Dmitrienko, Alexandra / Freisleben, Bernd / Gruler, Alexander / Hochst, Jonas / Kuhlberg, Joshua / Mezini, Mira / Mitev, Richard / Miettinen, Markus / Muhamedagic, Anel et al. | 2020
- 468
-
Far from Classification Algorithm: Dive into the Preprocessing Stage in DGA DetectionTong, Mingkai / Li, Guo / Zhang, Runzi / Xue, Jianxin / Liu, Wenmao / Yang, Jiahai et al. | 2020
- 475
-
ELPPS: An Enhanced Location Privacy Preserving Scheme in Mobile Crowd-Sensing Network Based on Edge ComputingLi, Minghui / Li, Yang / Fang, Liming et al. | 2020
- 483
-
Phishing Web Page Detection Using Optimised Machine LearningStobbs, Jordan / Issac, Biju / Jacob, Seibu Mary et al. | 2020
- 491
-
Asset-Oriented Threat ModelingMesse, Nan / Chiprianov, Vanea / Belloir, Nicolas / El-Hachem, Jamal / Fleurquin, Regis / Sadou, Salah et al. | 2020
- 502
-
All Your PLCs Belong to Me: ICS Ransomware Is RealisticZhang, Yipeng / Sun, Zhonghao / Yang, Liqun / Li, Zhoujun / Zeng, Qiang / He, Yueying / Zhang, Xiaoming et al. | 2020
- 510
-
Automated Enforcement of the Principle of Least Privilege over Data Source AccessWu, Haoqi / Yu, Zhengxuan / Huang, Dapeng / Zhang, Haodong / Han, Weili et al. | 2020
- 518
-
Extending Registration and Authentication Processes of FIDO2 External Authenticator with QR CodesGuo, Chengqian / Cai, Quanwei / Wang, Qiongxiao / Lin, Jingqiang et al. | 2020
- 530
-
BHDA - A Blockchain-Based Hierarchical Data Access Model for Financial ServicesXu, Zhiyu / Yang, Lin / Wang, Ziyuan / Wen, Sheng / Hanson, Rob / Chen, Shiping / Xiang, Yang et al. | 2020
- 539
-
FTCLNet: Convolutional LSTM with Fourier Transform for Vulnerability DetectionCao, Defu / Huang, Jing / Zhang, Xuanyu / Liu, Xianhua et al. | 2020
- 547
-
Secure Coded Matrix Multiplication Against Cooperative Attack in Edge ComputingZhu, Luqi / Wang, Jin / Shi, Lianmin / Zhou, Jingya / Lu, Kejie / Wang, Jianping et al. | 2020
- 557
-
A Measurement Study of IoT-Based Attacks Using IoT Kill ChainHaseeb, Junaid / Mansoori, Masood / Welch, Ian et al. | 2020
- 568
-
Modeling and Verification of Spatio-Temporal Intelligent Transportation SystemsLi, Tengfei / Chen, Xiaohong / Sun, Haiying / Liu, Jing / Yang, Jiajia / Yang, Chenchen / Sun, Junfeng et al. | 2020
- 576
-
Secure Outsourcing Algorithms of Modular Exponentiations in Edge ComputingZhang, Tianyi / Wang, Jian et al. | 2020
- 584
-
Joint Learning for Document-Level Threat Intelligence Relation Extraction and Coreference Resolution Based on GCNWang, Xuren / Xiong, Mengbo / Luo, Yali / Li, Ning / Jiang, Zhengwei / Xiong, Zihan et al. | 2020
- 592
-
Anomaly Detection on MIL-STD-1553 Dataset using Machine Learning AlgorithmsOnodueze, Francis / Josyula, Darsana et al. | 2020
- 599
-
Privacy-Preserving Ride-Hailing with Verifiable Order-Linking in Vehicular NetworksLi, Meng / Gao, Jianbo / Chen, Yifei / Zhao, Jingcheng / Alazab, Mamoun et al. | 2020
- 607
-
Flowverine: Leveraging Dataflow Programming for Building Privacy-Sensitive Android ApplicationsGomes, Eduardo / Zavalyshyn, Igor / Santos, Nuno / Silva, Joao / Legay, Axel et al. | 2020
- 615
-
Prihook: Differentiated Context-Aware Hook Placement for Different Owners' SmartphonesTian, Chen / Wang, Yazhe / Liu, Peng / Wang, Yu / Dai, Ruirui / Zhou, Anyuan / Xu, Zhen et al. | 2020
- 623
-
Improving Laplace Mechanism of Differential Privacy by Personalized SamplingHuang, Wen / Zhou, Shijie / Zhu, Tianqing / Liao, Yongjian / Wu, Chunjiang / Qiu, Shilin et al. | 2020
- 631
-
Differential Privacy Preservation in Interpretable Feedforward-Designed Convolutional Neural NetworksLi, De / Wang, Jinyan / Tan, Zhou / Li, Xianxian / Hu, Yuhang et al. | 2020
- 639
-
Practical and Secure Circular Range Search on Private Spatial DataZheng, Zhihao / Cao, Zhenfu / Shen, Jiachen et al. | 2020
- 646
-
Dataset Construction and Analysis of Screenshot MalwareSbai, Hugo / Happa, Jassim / Goldsmith, Michael / Meftali, Samy et al. | 2020
- 656
-
zkrpChain: Privacy-Preserving Data Auditing for Consortium Blockchains Based on Zero-Knowledge Range ProofsXu, Shiwei / Cai, Xiaowen / Zhao, Yizhi / Ren, Zhengwei / Wu, Lingjuan / Zhang, Huanguo / Du, Le / Tong, Yan et al. | 2020
- 664
-
On the Role of Data Anonymization in Machine Learning PrivacySenavirathne, Navoda / Torra, Vicenc et al. | 2020
- 676
-
Heimdall: Illuminating the Hidden Depths of Third-Party Tracking in Android ApplicationsCory, Thomas / Raschke, Philip / Kupper, Axel et al. | 2020
- 683
-
A Privacy-Preserving Data Collection and Processing Framework for Third-Party UAV ServicesLiu, Tianyuan / Guo, Hongpeng / Danilov, Claudiu / Nahrstedt, Klara et al. | 2020
- 691
-
On the Comparison of Classifiers' Construction over Private InputsSheikhalishahi, Mina / Zannone, Nicola et al. | 2020
- 699
-
Napping Guard: Deanonymizing Tor Hidden Service in a Stealthy WayChen, Muqian / Wang, Xuebin / Shi, Jinqiao / Zhao, Can / Wang, Meiqi / Fang, Binxing et al. | 2020
- 707
-
Multi-party Private Set Intersection in Vertical Federated LearningLu, Linpeng / Ding, Ning et al. | 2020
- 715
-
MLTracer: Malicious Logins Detection System via Graph Neural NetworkLiu, Fucheng / Wen, Yu / Wu, Yanna / Liang, Shuangshuang / Jiang, Xihe / Meng, Dan et al. | 2020
- 727
-
Data Analytics-Enabled Intrusion Detection: Evaluations of ToN_IoT Linux DatasetsMoustafa, Nour / Ahmed, Mohiuddin / Ahmed, Sherif et al. | 2020
- 736
-
CMIRGen: Automatic Signature Generation Algorithm for Malicious Network TrafficZhang, Runzi / Tong, Mingkai / Chen, Lei / Xue, Jianxin / Liu, Wenmao / Xie, Feng et al. | 2020
- 744
-
A Novel Violation Tracing Model for Cloud Service AccountabilityLi, Xiaojian / Li, Bo / Wang, Hailan / Zhang, Jiajia / Yang, Haopeng / Liu, Jingang et al. | 2020
- 751
-
Detection of Hate Tweets using Machine Learning and Deep LearningKetsbaia, Lida / Issac, Biju / Chen, Xiaomin et al. | 2020
- 759
-
Use of Bash History Novelty Detection for Identification of Similar Source Attack GenerationHance, Jack / Straub, Jeremy et al. | 2020
- 767
-
Measurement Unit Placement Against Injection Attacks for the Secured Operation of an IIoT-Based Smart GridAnwar, Adnan / Abir, S. M. Abu Adnan et al. | 2020
- 775
-
Cross Platform IoT-Malware Family Classification Based on Printable StringsLee, Yen-Ting / Ban, Tao / Wan, Tzu-Ling / Cheng, Shin-Ming / Isawa, Ryoichi / Takahashi, Takeshi / Inoue, Daisuke et al. | 2020
- 785
-
ALBFL: A Novel Neural Ranking Model for Software Fault Localization via Combining Static and Dynamic FeaturesPan, Yuqing / Xiao, Xi / Hu, Guangwu / Zhang, Bin / Li, Qing / Zheng, Haitao et al. | 2020
- 793
-
Towards a Robust Classifier: An MDL-Based Method for Generating Adversarial ExamplesAsadi, Behzad / Varadharajan, Vijay et al. | 2020
- 802
-
Avoiding Geographic Regions in TorRyan, Matthew J. / Chowdhury, Morshed / Jiang, Frank / Doss, Robin Ram et al. | 2020
- 810
-
Identifying Cross-Version Function Similarity Using Contextual FeaturesBlack, Paul / Gondal, Iqbal / Vamplew, Peter / Lakhotia, Arun et al. | 2020
- 818
-
Scalable and Accurate Binary Code Search Method Based on Simhash and Partial TraceZhang, Yunan / Xu, Aidong Xu / Jiang, Yixin et al. | 2020
- 827
-
An Analytics Framework for Heuristic Inference Attacks Against Industrial Control SystemsChoi, Taejun / Bai, Guangdong / Ko, Ryan K L / Dong, Naipeng / Zhang, Wenlu / Wang, Shunyao et al. | 2020
- 836
-
Forensic Analysis of Dating Applications on Android and iOS DevicesHutchinson, Shinelle / Shantaram, Neesha / Karabiyik, Umit et al. | 2020
- 848
-
Federated TON_IoT Windows Datasets for Evaluating AI-Based Security ApplicationsMoustafa, Nour / Keshky, Marwa / Debiez, Essam / Janicke, Helge et al. | 2020
- 856
-
Privacy-Encoding Models for Preserving Utility of Machine Learning Algorithms in Social MediaSalim, Sara / Moustafa, Nour / Turnbull, Benjamin et al. | 2020
- 864
-
Generation of malicious webpage samples based on GANWan, Mengxiang / Yao, Hanbing / Yan, Xin et al. | 2020
- 870
-
A Flexible Attentive Temporal Graph Networks for Anomaly Detection in Dynamic NetworksZhu, Dali / Ma, Yuchen / Liu, Yinlong et al. | 2020
- 876
-
FPGA Based Blockchain System for Industrial IoTXu, Lei / Chen, Lin / Gao, Zhimin / Kim, Hanyee / Suh, Taeweon / Shi, Weidong et al. | 2020
- 884
-
Address-Based SignatureCui, Handong / Yuen, Tsz Hon et al. | 2020
- 892
-
Cryptanalysis of a Chaos-Based Block Cryptosystem Using Multiple Samples Correlation Power AnalysisZhang, Shunsheng / Luo, Yuling / Cao, Lvchen / Liu, Junxiu et al. | 2020
- 899
-
Adversarial Attacks on Time-Series Intrusion Detection for Industrial Control SystemsZizzo, Giulio / Hankin, Chris / Maffeis, Sergio / Jones, Kevin et al. | 2020
- 911
-
Netspot: A Simple Intrusion Detection System with Statistical LearningSiffer, Alban / Fouque, Pierre-Alain / Termier, Alexandre / Largouet, Christine et al. | 2020
- 919
-
Cache side-channel attacks detection based on machine learningTong, Zhongkai / Zhu, Ziyuan / Wang, Zhanpeng / Wang, Limin / Zhang, Yusha / Liu, Yuxin et al. | 2020
- 927
-
Exploit Internal Structural Information for IoT Malware Detection Based on Hierarchical Transformer ModelHu, Xiaohui / Sun, Rui / Xu, Kejia / Zhang, Yongzheng / Chang, Peng et al. | 2020
- 935
-
Inference Attacks on Physical Layer Channel State InformationWalther, Paul / Strufe, Thorsten et al. | 2020
- 943
-
A non-Discriminatory Approach to Ethical Deep LearningTartaglione, Enzo / Grangetto, Marco et al. | 2020
- 951
-
Security and Privacy Implementation in Smart Home: Attributes Based Access Control and Smart ContractsQashlan, Amjad / Nanda, Priyadarsi / He, Xiangjian et al. | 2020
- 959
-
Blockchain-Based Verifiable Credential Sharing with Selective DisclosureMukta, Rahma / Martens, James / Paik, Hye-young / Lu, Qinghua / Kanhere, Salil S. et al. | 2020
- 967
-
Blockchain-Enabled Collaborative Intrusion Detection in Software Defined NetworksFan, Wenjun / Park, Younghee / Kumar, Shubham / Ganta, Priyatham / Zhou, Xiaobo / Chang, Sang-Yoon et al. | 2020
- 975
-
Active DNN IP Protection: A Novel User Fingerprint Management and DNN Authorization Control TechniqueXue, Mingfu / Wu, Zhiyu / He, Can / Wang, Jian / Liu, Weiqiang et al. | 2020
- 983
-
SCPORAM: A Hardware Support Scheme for Protecting Memory Access PatternsWang, Zhanpeng / Zhu, Ziyuan / Wang, Limin / Tong, Zhongkai / Yan, Chao et al. | 2020
- 991
-
QPBFT: Practical Byzantine Fault Tolerance Consensus Algorithm Based on Quantified-RoleZhang, Zhujun / Zhu, Dali / Fan, Wei et al. | 2020
- 998
-
Privacy-Preserving Public Verification of Ethical Cobalt SourcingBecher, Kilian / Lagodzinski, J. A. Gregor / Strufe, Thorsten et al. | 2020
- 1006
-
A Computation Offloading Model over Collaborative Cloud-Edge Networks with Optimal Transport TheoryLi, Zhuo / Zhou, Xu / Liu, Yang / Fan, Congshan / Wang, Wei et al. | 2020
- 1012
-
A Secure Shard Reconfiguration Protocol for Sharding Blockchains Without a RandomnessLiu, Yizhong / Liu, Jianwei / Hei, Yiming / Tan, Wei / Wu, Qianhong et al. | 2020
- 1020
-
Revocable and Offline-Verifiable Self-Sovereign IdentitiesAbraham, Andreas / More, Stefan / Rabensteiner, Christof / Horandner, Felix et al. | 2020
- 1028
-
Blockchain Based End-to-End Tracking System for Distributed IoT Intelligence Application Security EnhancementXu, Lei / Gao, Zhimin / Fan, Xinxin / Chen, Lin / Kim, Hanyee / Suh, Taeweon / Shi, Weidong et al. | 2020
- 1036
-
Time is Money: Countering Griefing Attack in Lightning NetworkMazumdar, Subhra / Banerjee, Prabal / Ruj, Sushmita et al. | 2020
- 1044
-
Preventing a Fork in a Blockchain - David Fighting GoliathKubiak, Przemyslaw / Kutylowski, Miroslaw et al. | 2020
- 1052
-
Golden-Chip-Free Hardware Trojan Detection Through Thermal Radiation Comparison in Vulnerable AreasSu, Ting / Shi, Jiahe / Tang, Yongkang / Li, Shaoqing et al. | 2020
- 1060
-
A Feedback-Driven Lightweight Reputation Scheme for IoVDahiya, Rohan / Jiang, Frank / Doss, Robin Ram et al. | 2020
- 1069
-
Modelling Attacks in Blockchain Systems using Petri NetsShahriar, Md. Atik / Bappy, Faisal Haque / Fakhrul Hossain, A. K. M. / Saikat, Dayamoy Datta / Ferdous, Md Sadek / Chowdhury, Mohammad Jabed M. / Bhuiyan, Md Zakirul Alam et al. | 2020
- 1079
-
BONIK: A Blockchain Empowered Chatbot for Financial TransactionsBhuiyan, Md. Saiful Islam / Razzak, Abdur / Ferdous, Md Sadek / Chowdhury, Mohammad Jabed M. / Hoque, Mohammad A. / Tarkoma, Sasu et al. | 2020
- 1089
-
Towards Network Traffic Monitoring Using Deep Transfer LearningDhillon, Harsh / Haque, Anwar et al. | 2020
- 1097
-
A Three-Stage Machine Learning Network Security Solution for Public EntitiesSaganowski, Stanislaw et al. | 2020
- 1105
-
Multi-input Functional Encryption: Efficient Applications from Symmetric PrimitivesBakas, Alexandros / Michalas, Antonis et al. | 2020
- 1113
-
Factors Affecting Users' Disclosure Decisions in Android Runtime Permissions ModelBaalous, Rawan / Poet, Ronald et al. | 2020
- 1119
-
Towards a Lightweight Continuous Authentication Protocol for Device-to-Device CommunicationShah, Syed Wajid Ali / Syed, Naeem Firdous / Shaghaghi, Arash / Anwar, Adnan / Baig, Zubair / Doss, Robin et al. | 2020
- 1127
-
Secure and Privacy Preserving Method for Biometric Template Protection using Fully Homomorphic EncryptionJindal, Arun Kumar / Shaik, Imtiyazuddin / Vasudha, Vasudha / Chalamala, Srinivasa Rao / Ma, Rajan / Lodha, Sachin et al. | 2020
- 1135
-
Trusted Network Slicing Among Multiple Mobile Network OperatorsMuhammad, Jehanzaib Yousuf / Wang, Mingjun / Yan, Zheng / Khan, Fawad et al. | 2020
- 1141
-
A Scoring System to Efficiently Measure Security in Cyber-Physical SystemsAigner, Andreas / Khelil, Abdelmajid et al. | 2020
- 1146
-
Towards a new Deep Learning Based Approach for the Password PredictionKaleel, Manaz / Le-Khac, Nhien-An et al. | 2020
- 1151
-
DANTE: Predicting Insider Threat using LSTM on system logsMa, Qicheng / Rastogi, Nidhi et al. | 2020
- 1157
-
VGG-Based Side Channel Attack on RSA ImplementationLei, Qi / Li, Chao / Qiao, Kexin / Ma, Zhe / Yang, Bo et al. | 2020
- 1162
-
Deep Learning for Password Guessing and Password Strength Evaluation, A SurveyZhang, Tao / Cheng, Zelei / Qin, Yi / Li, Qiang / Shi, Lin et al. | 2020
- 1167
-
Metrics to Enhance the Resilience of Cyber-Physical SystemsBarbeau, Michel / Cuppens, Frederic / Cuppens, Nora / Dagnas, Romain / Garcia-Alfaro, Joaquin et al. | 2020
- 1173
-
Independent Worker Selection In CrowdsourcingLi, Ang / Jiang, Wenjun / Li, Xueqi / Chen, Xinrong / Wang, Guojun et al. | 2020
- 1179
-
Towards Collaborative Intrusion Detection Enhancement Against Insider Attacks with Multi-level TrustLi, Wenjuan / Meng, Weizhi / Zhu, Hui et al. | 2020
- 1187
-
A Function-Centric Risk Assessment Approach for Android ApplicationsLi, Min / Elahi, Haroon / Peng, Tao / Qi, Fang / Wang, Guojun et al. | 2020
- 1194
-
SCAFFISD: A Scalable Framework for Fine-Grained Identification and Security Detection of Wireless RoutersZhu, Fangzhou / Liu, Liang / Meng, Weizhi / Lv, Ting / Hu, Simin / Ye, Renjun et al. | 2020
- 1200
-
Library Implementation and Performance Analysis of GlobalPlatform TEE Internal API for Intel SGX and RISC-V KeystoneSuzaki, Kuniyasu / Nakajima, Kenta / Oi, Tsukasa / Tsukamoto, Akira et al. | 2020
- 1209
-
A Privacy-Preserving Data Inference Framework for Internet of Health Things NetworksKang, James Jin / Dibaei, Mahdi / Luo, Gang / Yang, Wencheng / Zheng, Xi et al. | 2020
- 1215
-
RPAD: An Unsupervised HTTP Request Parameter Anomaly Detection MethodSun, Yizhen / Xie, Yiman / Wang, Weiping / Zhang, Shigeng / Wu, Yuxi / Feng, Jingchuan et al. | 2020
- 1222
-
Image Self-Recovery Based on Authentication Feature ExtractionLiu, Tong / Yuan, Xiaochen et al. | 2020
- 1228
-
Do My Emotions Influence What I Share? Analysing the Effects of Emotions on Privacy Leakage in TwitterMittal, Manasi / Asghar, Muhammad Rizwan / Tripathi, Arvind et al. | 2020
- 1236
-
Robustness Analysis and Defence Strategy of an Interdependent Networks Model Based on Closeness CentralitySheng, Jinfang / Hu, Yan / Guan, Kerong / Wang, Bin / Pan, Xiaoxia / Kang, Wenjun et al. | 2020
- 1242
-
A Framework for Measuring IoT Data Quality Based on Freshness MetricsMohammed, Fatma / Kayes, A. S. M. / Pardede, Eric / Rahayu, Wenny et al. | 2020
- 1250
-
RevBloc: A Blockchain-Based Secure Customer Review SystemFang, Xiuli / Asghar, Muhammad Rizwan et al. | 2020
- 1260
-
Face2Face Manipulation Detection Based on Histogram of Oriented GradientsMegahed, Amr / Han, Qi et al. | 2020
- 1268
-
Analysis and modelling of multi-stage attacksChamotra, Saurabh / Barbhuiya, Ferdous Ahmed et al. | 2020
- 1276
-
Cyber Situation Awareness Monitoring and Proactive Response for Enterprises on the CloudAlavizadeh, Hootan / Alavizadeh, Hooman / Jang-Jaccard, Julian et al. | 2020
- 1285
-
Explicitly Privacy-Aware Space Usage AnalysisJha, Sanjiv S. / Mayer, Simon / Schneider, Tanja et al. | 2020
- 1291
-
Towards A Transparent and Privacy-preserving Healthcare Platform with Blockchain for Smart CitiesAl Omar, Abdullah / Jamil, Abu Kaisar / Nur, Md. Shakhawath Hossain / Hasan, Md Mahamudul / Bosri, Rabeya / Bhuiyan, Md Zakirul Alam / Rahman, Mohammad Shahriar et al. | 2020
- 1297
-
BML: A Data Mapping Language for Blockchain PlatformsDo, Ba-Lam / Nguyen, Quang-Thang / Nguyen, Thang / Nguyen, Tien-Thao / Dao, Thanh-Chung / Nguyen, BinhMinh et al. | 2020
- 1304
-
Semantic Location Privacy Protection Algorithm Based on Edge Cluster GraphLu, Tao / Xu, Hongyun / Tian, Kai / Tian, Cenxi / Jiang, Rui et al. | 2020
- 1310
-
Priority Based Modeling and Comparative Study of Google Cloud Resources between 2011 and 2019Lasantha, Dimuth / Ray, Biplob et al. | 2020
- 1318
-
Security Challenges and Solutions for 5G HetNetSharma, Aakanksha / Balasubramanian, Venki / Jolfaei, Alireza et al. | 2020
- 1324
-
Privacy Smells: Detecting Privacy Problems in Cloud ArchitecturesKunz, Immanuel / Schneider, Angelika / Banse, Christian et al. | 2020
- 1332
-
BlockSLAP: Blockchain-Based Secure and Lightweight Authentication Protocol for Smart GridWang, Weizheng / Huang, Huakun / Zhang, Lejun / Han, Zhaoyang / Qiu, Chen / Su, Chunhua et al. | 2020
- 1339
-
SecureESFS: Sharing Android External Storage Files in a Securer WayLiang, Shan / Wang, Yuewu / Lei, Lingguang / Jing, Jiwu / Zhou, Quan et al. | 2020
- 1348
-
PPFQ: Privacy-Preserving Friends Query over Online Social NetworksLi, Yuxi / Zhou, Fucai / Xu, Zifeng et al. | 2020
- 1354
-
Dynamic flow Redirecton Scheme for Enhancing Control Plane Robustness in SDNLiang, Dong / Liu, Qinrang / Hu, Yanbin / Hu, Tao / Yan, Binghao / Zhao, Haiming et al. | 2020
- 1360
-
Prov-IoT: A Security-Aware IoT Provenance ModelJaigirdar, Fariha Tasmin / Rudolph, Carsten / Bain, Chris et al. | 2020
- 1368
-
Are Smart Home Devices Abandoning IPV Victims?Alshehri, Ahmed / Ben Salem, Malek / Ding, Lei et al. | 2020
- 1376
-
A Practical Privacy-Preserving Algorithm for Document DataMimoto, Tomoaki / Kiyomoto, Shinsaku / Kitamura, Koji / Miyaji, Atsuko et al. | 2020
- 1384
-
TORP: Load Balanced Reliable Opportunistic Routing for Asynchronous Wireless Sensor NetworksQaisar, Muhammad Umar Farooq / Wang, Xingfu / Hawbani, Ammar / Khan, Asad / Ahmed, Adeel / Wedaj, Fisseha Teju et al. | 2020
- 1390
-
CPN Model Checking Method of Concurrent Software Based on State Space PruningSun, Tao / Yang, Jing / Zhong, Wenjie et al. | 2020
- 1395
-
An Arithmetic Differential Privacy Budget Allocation Method for the Partitioning and Publishing of Location InformationYan, Yan / Gao, Xin / Mahmood, Adnan / Zhang, Yang / Wang, Shuang / Sheng, Quan Z. et al. | 2020
- 1402
-
IoT-Sphere: A Framework to Secure IoT Devices from Becoming Attack Target and Attack SourceAbbas, Syed Ghazanfar / Husnain, Muhammad / Fayyaz, Ubaid Ullah / Shahzad, Farrukh / Shah, Ghalib A. / Zafar, Kashif et al. | 2020
- 1410
-
Membership Inference Attacks: Analysis and MitigationShuvo, Md Shamimur Rahman / Alhadidi, Dima et al. | 2020
- 1420
-
Bearicade: secure access gateway to High Performance Computing systemsAl-Jody, Taha / Holmes, Violeta / Antoniades, Alexandros / Kazkouzeh, Yazan et al. | 2020
- 1428
-
Enhancing Cyber Security Using Audio Techniques: A Public Key Infrastructure for SoundPhipps, Anthony / Ouazzane, Karim / Vassilev, Vassil et al. | 2020
- 1437
-
Group Communication Needs No Consistent Transcript DistributionHerberth, Klaus et al. | 2020
- 1444
-
Name-Signature Lookup System: A Security Enhancement to Named Data NetworkingSong, Zhicheng / Kar, Pushpendu et al. | 2020
- 1449
-
Feature Importance in Android Malware DetectionKouliaridis, Vasileios / Kambourakis, Georgios / Peng, Tao et al. | 2020
- 1455
-
iTES: Integrated Testing and Evaluation System for Software Vulnerability Detection MethodsZhang, Chi / Chen, Jinfu / Cai, Saihua / Liu, Bo / Wu, Yiming / Geng, Ye et al. | 2020
- 1461
-
Plant Taxonomy in Hainan Based on Deep Convolutional Neural Network and Transfer LearningLiu, Wei / Feng, Wenlong / Huang, Mengxing / Han, Guilai / Lin, Jialun et al. | 2020
- 1468
-
Research on Stitching and Alignment of Mouse Carcass EM ImagesZhu, Jing / Ge, Hongyu / Cheng, Ao / Zhang, Ruobing / Wang, Lirong et al. | 2020
- 1472
-
A Simple Analysis of Multimodal Data FusionCheng, Jiangchang / Dai, Yinglong / Yuan, Yao / Zhu, Hongli et al. | 2020
- 1476
-
Pyramid Pooling Channel Attention Network for esophageal tissue segmentation on OCT imagesLi, Deyin / Zhang, Miao / Shi, Wei / Zhang, Huimin / Wang, Duoduo / Wang, Lirong et al. | 2020
- 1481
-
Atrial Fibrillation Classification Using Convolutional Neural Networks and Time Domain Features of ECG SequenceDeng, Mixue / Qiu, Lishen / Wang, Hongqing / Shi, Wei / Wang, Lirong et al. | 2020
- 1486
-
Design and implementation of a multifunctional ECG analysis software systemWang, Dong / Qiu, Lishen / Shi, Wei / Wang, Hongqing / Xu, Xiangxiang / Wang, Lirong et al. | 2020
- 1492
-
A Four-Feature Keyword Extraction Algorithm Based on Word Length Priority RatioKang, Hui / Lu, Lingfeng / Su, Hang et al. | 2020
- 1499
-
Research and Improvement of Community Discovery Algorithm Based on Spark for Large Scale Complicated NetworksKang, Hui / Chen, ShengQuan / Lu, Lingfeng / Meng, ChenKun et al. | 2020
- 1509
-
An Investigation of Assistive Products for the ElderlyLi, Xiaoying / Wang, Huaibin / Liu, Yuqiong / Wang, Yuefei / Liu, Zhen et al. | 2020
- 1515
-
An Impedance Control Method of Lower Limb Exoskeleton Rehabilitation Robot Based on Predicted Forward DynamicsWang, Yuefei / Liu, Zhen / Zhu, Liucun / Li, Xiaoying / Wang, Huaibin et al. | 2020
- 1519
-
An Automatic Vulnerability Scanner for Web ApplicationsChen, Haibo / Chen, Junzuo / Chen, Jinfu / Yin, Shang / Wu, Yiming / Xu, Jiaping et al. | 2020
- 1525
-
An Automatic Vulnerability Classification System for IoT SoftwaresChen, Haibo / Zhang, Dalin / Chen, Jinfu / Lin, Wei / Shi, Dengzhou / Zhao, Zian et al. | 2020
- 1530
-
Policy Evaluation and Dynamic Management Based on Matching Tree for XACMLKang, Hongzhaoning / Gang, Liu / Wang, Quan / Zhang, Runnan / Zhong, Zichao / Tian, Yumin et al. | 2020
- 1536
-
Fined-Grained Aspect Extraction from Online Reviews for Decision SupportLiu, Zhaoli / Sun, Qindong / Yang, Zhihai / Jiang, Kun / Yan, Jinpei et al. | 2020
- 1542
-
A Password Strength Evaluation Algorithm Based on Sensitive Personal InformationCui, Xinchun / Li, Comxueqing / Qin, Yiming / Ding, Yong et al. | 2020
- 1546
-
Prediction of high Precision Ignition Process in the Condition of Multi Flow Area Coupling of Micro Solid Rocket MotorWei, Gaofei / Cai, Qiang / Li, Meng / Dong, Rui / Liu, Yang et al. | 2020
- 1552
-
Exploiting User Selection Algorithm for Securing Wireless Communication NetworksQiu, Xiaoying / Li, Guangda / Sun, Xuan / Du, Zhiguo et al. | 2020
- 1556
-
Easy-to-Implement Campus Electronic Anonymous Voting SystemRuxian, Zhang / Zhaoju, Zhang / Hong, Di et al. | 2020
- 1560
-
Hypergraph Attention NetworksChen, Chaofan / Cheng, Zelei / Li, Zuotian / Wang, Manyi et al. | 2020
- 1566
-
Search & Catch: Detecting Promotion Infection in the Underground through Search EnginesYang, Ronghai / Liu, Jia / Gu, Liang / Chen, Yurong et al. | 2020
- 1572
-
Image Authentication Using QR Code Watermarking Approach Based on Image SegmentationLiu, Xiaomei / Tang, Xin et al. | 2020
- 1578
-
A Semi-Supervised Learning Scheme to Detect Unknown DGA Domain Names Based on Graph AnalysisYan, Fan / Liu, Jia / Gu, Liang / Chen, Zelong et al. | 2020
- 1584
-
A PHP and JSP Web Shell Detection System with Text Processing Based on Machine LearningZhang, Han / Liu, Ming / Yue, Zihan / Xue, Zhi / Shi, Yong / He, Xiangjian et al. | 2020
- 1592
-
A Symmetric Uniform Formula and Sole Index Method for Sieving (Twin) PrimesRen, Wei et al. | 2020
- 1598
-
SCScan: A SVM-Based Scanning System for Vulnerabilities in Blockchain Smart ContractsHao, Xiaohan / Ren, Wei / Zheng, Wenwen / Zhu, Tianqing et al. | 2020
- 1606
-
A Security Model and Implementation of Embedded Software Based on Code ObfuscationYi, Jiajia / Chen, Lirong / Zhang, Haitao / Li, Yun / Zhao, Huanyu et al. | 2020
- 1614
-
Sensitive Information Detection Based on Convolution Neural Network and Bi-Directional LSTMLin, Yan / Xu, Guosheng / Xu, Guoai / Chen, Yudong / Sun, Dawei et al. | 2020
- 1622
-
Enhancing the Security of Numeric Comparison Secure Simple Pairing in Bluetooth 5.0Hou, Dongkun / Zhang, Jie / Man, Ka Lok et al. | 2020
- 1630
-
3P3: Strong Flexible Privacy for BroadcastsModinger, David / Hauck, Franz J. et al. | 2020
- 1638
-
Efficient Revocable Attribute-Based Encryption with Hidden PoliciesZiegler, Dominik / Marsalek, Alexander et al. | 2020
- 1646
-
On the Usefulness of User Nudging and Strength Indication Concerning Unlock Pattern SecurityHupperich, Thomas / Dassel, Katharina et al. | 2020
- 1655
-
Unbounded Key-Policy Attribute-Based Encryption with Black-Box TraceabilityYe, Yunxiu / Cao, Zhenfu / Shen, Jiachen et al. | 2020
- 1664
-
An Efficient Vulnerability Extrapolation Using Similarity of Graph Kernel of PDGsZeng, Jingxiang / Nie, Xiaofan / Chen, Liwei / Li, Jinfeng / Du, Gewangzi / Shi, Gang et al. | 2020
- 1672
-
Opportunistic Tracking in Cyber-Physical SystemsRashidibajgan, Samaneh / Hupperich, Thomas / Doss, Robin / Pan, Lei et al. | 2020
- 1680
-
An Approach for Poisoning Attacks Against RNN-Based Cyber Anomaly DetectionXu, Jinghui / Wen, Yu / Yang, Chun / Meng, Dan et al. | 2020
- 1688
-
Differential Privacy Images Protection Based on Generative Adversarial NetworkYang, Ren / Ma, Xuebin / Bai, Xiangyu / Su, Xiangdong et al. | 2020
- 1696
-
DP-Eclat:A Vertical Frequent Itemset Mining Algorithm Based on Differential PrivacyGuan, Shengyi / Ma, Xuebin / Li, Wuyungerile / Bai, Xiangyu et al. | 2020
- 1704
-
More Efficient SM9 Algorithm Based on Bilinear Pair Optimization ProcessingLiu, Xianze / Liu, Jihong / Jiang, Bifei / Jiang, Haozhen / Yang, Zhi et al. | 2020
- 1711
-
SeWG: Security-Enhanced WireGuard for Android Based on TEEWu, Yongkang / Shan, Yiwei / Wang, Zhichao / Zhang, Pengcheng / He, Min / Liu, Jihong et al. | 2020
- 1718
-
Differential Privacy Preserving Data Publishing Based on Bayesian NetworkQi, Xuejian / Ma, Xuebin / Bai, Xiangyu / Li, Wuyungerile et al. | 2020
- 1727
-
Implementing Network Attack Detection with a Novel NSSA Model Based on Knowledge GraphsWang, Yixuan / Li, Yujun / Chen, Xiang / Luo, Yeni et al. | 2020
- 1733
-
UIDroid: User-Driven Based Hierarchical Access Control for Sensitive InformationMa, Luping / Zhu, Dali / Zhang, Shunliang / Zhang, Xiaohui / Peng, Shumin / Li, Ya et al. | 2020
- 1741
-
TrustyShare: A Sharing Scheme using ARM TrustZoneWu, Yongkang / He, Langyue / Shan, Yiwei / Zhang, Pengcheng / He, Min / Yang, Zhi et al. | 2020
- 1748
-
SmartLED: Smartphone-Based Covert Channels Leveraging the Notification LEDGonzalez-Manzano, Lorena / Bernardez, Sergio / de Fuentes, Jose M. et al. | 2020
- 1756
-
Semantic Redirection Obfuscation: A Control flow Obfuscation Based on Android RuntimeWang, Zhichao / Shan, Yiwei / Yang, Zhi / Wang, Ruoyi / Song, Shuang et al. | 2020
- 1764
-
Blockchain Based PKI and Certificates Management in Mobile NetworksYan, Junzhi / Hang, Xiaoyong / Yang, Bo / Su, Li / He, Shen et al. | 2020
- 1771
-
Monitoring Social Media for Vulnerability-Threat Prediction and Topic AnalysisHuang, Shin-Ying / Ban, Tao et al. | 2020
- 1777
-
Android Malware Classification Using Machine Learning and Bio-Inspired Optimisation AlgorithmsPye, Jack / Issac, Biju / Aslam, Nauman / Rafiq, Husnain et al. | 2020
- 1783
-
LTMS: A Lightweight Trust Management System for Wireless Medical Sensor NetworksHajar, Muhammad Shadi / Al-Kadri, M. Omar / Kalutarage, Harsha et al. | 2020
- 1791
-
Trust and Believe - Should We? Evaluating the Trustworthiness of Twitter UsersKhan, Tanveer / Michalas, Antonis et al. | 2020
- 1801
-
Trust Aware Continuous Authorization for Zero Trust in Consumer Internet of ThingsDimitrakos, Theo / Dilshener, Tezcan / Kravtsov, Alexander / La Marra, Antonio / Martinelli, Fabio / Rizos, Athanasios / Rosetti, Alessandro / Saracino, Andrea et al. | 2020
- 1813
-
pcSVF: An Evaluation of Side-Channel Vulnerability of Port ContentionLiu, Xiaoyang / Zhu, Ziyuan et al. | 2020
- 1820
-
A Multi-layer Industrial-IoT Attack Taxonomy: Layers, Dimensions, Techniques and ApplicationAbbas, Syed Ghazanfar / Hashmat, Fabiha / Shah, Ghalib A. et al. | 2020
- 1826
-
A Semantic Model-Based Security Engineering Framework for Cyber-Physical SystemsAigner, Andreas / Khelil, Abdelmajid et al. | 2020
- 1834
-
Attribute-Based Data Access Control for Multi-authority SystemSalehi Shahraki, Ahmad / Rudolph, Carsten / Grobler, Marthie et al. | 2020
- 1842
-
DNRTI: A Large-Scale Dataset for Named Entity Recognition in Threat IntelligenceWang, Xuren / Liu, Xinpei / Ao, Shengqin / Li, Ning / Jiang, Zhengwei / Xu, Zongyi / Xiong, Zihan / Xiong, Mengbo / Zhang, Xiaoqing et al. | 2020
- 1849
-
AndroTIME: Identifying Timing Side Channels in the Android APIPalfinger, Gerald / Prunster, Bernd / Ziegler, Dominik Julian et al. | 2020
- 1857
-
FIDOnuous: A FIDO2/WebAuthn Extension to Support Continuous Web AuthenticationKlieme, Eric / Wilke, Jonathan / van Dornick, Niklas / Meinel, Christoph et al. | 2020
- 1868
-
A Blockchain-Based Key Management Protocol for Secure Device-to-Device Communication in the Internet of ThingsKandi, Mohamed Ali / Kouicem, Djamel Eddine / Lakhlef, Hicham / Bouabdallah, Abdelmadjid / Challal, Yacine et al. | 2020
- 1874
-
Finding Geometric Medians with Location PrivacyNussbaum, Eyal / Segal, Michael et al. | 2020
- 1882
-
Security and Privacy Analysis of Mhealth Application: A Case StudyZhao, Wanrong / Shahriar, Hossain / Clincy, Victor / Bhuiyan, Zakirul Alam et al. | 2020
- 1888
-
Enabling Security Analysis of IoT Device-to-Cloud TrafficZhou, Eda / Turcotte, Joseph / De Carli, Lorenzo et al. | 2020
- 1895
-
Towards a New Approach to Identify WhatsApp MessagesCents, Rick / Le-Khac, Nhien-An et al. | 2020
- 1903
-
Efficient Off-Chain Transaction to Avoid Inaccessible Coins in CryptocurrenciesRezaeighaleh, Hossein / Zou, Cliff C. et al. | 2020
- 1910
-
Assessing the Similarity of Smart Contracts by Clustering their Interfacesdi Angelo, Monika / Salzer, Gernot et al. | 2020
- 1920
-
Securing Manufacturing Using BlockchainJadidi, Zahra / Dorri, Ali / Jurdak, Raja / Fidge, Colin et al. | 2020
- 1926
-
SCUR: Smart Contracts with a Static Upper-Bound on Resource UsageKnecht, Markus / Stiller, Burkhard et al. | 2020
- 1935
-
SSIBAC: Self-Sovereign Identity Based Access ControlBelchior, Rafael / Putz, Benedikt / Pernul, Guenther / Correia, Miguel / Vasconcelos, Andre / Guerreiro, Sergio et al. | 2020
- 1944
-
A Privacy-Preserving Crowdsensing System with Muti-blockchainPeng, Tao / Liu, Jierong / Chen, Jianer / Wang, Guojun et al. | 2020
- 1950
-
A Blockchain-Based Vehicle-Trust Management Framework Under a Crowdsourcing EnvironmentWang, Dawei / Chen, Xiao / Wu, Haiqin / Yu, Ruozhou / Zhao, Yishi et al. | 2020
- 1956
-
Permission Token Segmentation Scheme Based on Blockchain Access ControlShi, Jinshan / Li, Ru et al. | 2020
- 1965
-
A Blockchain-Based Pattern for Confidential and Pseudo-Anonymous Contract EnforcementSix, Nicolas / Negri Ribalta, Claudia / Herbaut, Nicolas / Salinesi, Camille et al. | 2020
- 1971
-
Detecting Online Game Malicious Chargeback by using k-NNWei, Yu-Chih / Lai, You-Xin / Su, Hai-Po / Yen, Yu-Wen et al. | 2020
- 1977
-
A Novel Q-Learning Algorithm Based on the Stochastic Environment Path Planning ProblemLi, Jian / Rong, Fei / Tang, Yu et al. | 2020
- 1983
-
Boosting Homograph Attack Classification Using Ensemble Learning and N-Gram ModelPhuong Thao, Tran / Nguyen-Son, Hoang-Quoc / Shigetomi Yamaguchi, Rie / Nakata, Toshiyuki et al. | 2020
- 1989
-
Survey on Blockchain and Deep LearningZhang, Yizhuo / Liu, Yiwei / Chen, Chi-Hua et al. | 2020
- 1995
-
Special-Purpose Model Extraction Attacks: Stealing Coarse Model with Fewer QueriesOkada, Rina / Ishikura, Zen / Shibahara, Toshiki / Hasegawa, Satoshi et al. | 2020
- 2001
-
A Low-Cost Method for Accurate Localization of Traffic ParticipantsLiao, Maozhu / Chen, Shengdong / Zheng, Chuangjie / Yuan, Feng et al. | 2020
- 2007
-
Integration of 5G, VANETs and Blockchain TechnologyArif, Muhammad / Balzano, Walter / Fontanella, Alessandro / Stranieri, Silvia / Wang, Guojun / Xing, Xiaofei et al. | 2020
- 2014
-
Aquatic Drone Control Using Inertial Sensors - Comparative Filtering MethodsHnatiuc, Mihaela / Geman, Oana / Vicoveanu, Dragos / Motru, George et al. | 2020
- 2020
-
Factors Affecting Trust in the Autonomous Vehicle: A Survey of Primary School Students and Parent PerceptionsMa, Yingying / Li, Shuo / Qin, Shaotian / Qi, Yue et al. | 2020
- 2028
-
Prediction of Radio Frequency Spectrum OccupancyKyeremateng-Boateng, Hubert / Conn, Marvin / Josyula, Darsana / Mareboyana, Manohar et al. | 2020
- 2035
-
Author Index| 2020