Accepted Papers

Titles:
Measuring Contextual Factors that Influence Real-World Walking Speed

Authors:
Ireson, Neil (The University of Sheffield); Lanfranchi, Vita (The University of Sheffield)

Authors:
Theodosiou, Alexandros (3AE Health LTD)

Authors:
Ivezić, Dijana (University of Freiburg); Keppel, Jonas (University of Duisburg-Essen); Becker, Christine (Bodymed AG); Walle, Hardy (Bodymed AG); Schneegass, Stefan (University of Duisburg-Essen); Amft, Oliver (University of Freiburg)

Authors:
Mohanraj, Sangeetha (University of Alabama at Birmingham); Thirumalai, Mohanraj (University of Alabama at Birmingham); Mendonca, Christen John (University of Alabama at Birmingham)

Authors:
Mahapasuthanon, Pattiya (George Mason University); Genaro Motti, Vivian (George Mason University)

Authors:
Thirumalai, Mohanraj (The University of Alabama at Birmingham); John, Tejossy (The University of Alabama at Birmingham); Mehta, Tapan (The University of Alabama at Birmingham)

Authors:
Toulkeridou, Evropi (CYENS Centre of Excellence); Kosmidou, Panagiota (German Oncology Center, Limassol, Cyprus); Vevis, Kristis (German Oncology Center, Limassol, Cyprus); Antoniou, Zinonas (3aHealth); Kallinos, Loizos (3aHealth); Valiandi, Ioanna (CYENS CoE); Panayides, Andreas (CYENS CoE)

Authors:
Rettinger, Lena (University of Applied Sciences, FH Campus Wien); Hauser, Carina (University of Applied Sciences, FH Campus Wien); Gstöttner, Lisa-Sophie (University of Applied Sciences, FH Campus Wien); Goldschmid, René (University of Applied Sciences, FH Campus Wien); Schönthaler, Erna (University of Applied Sciences, FH Campus Wien); Putz, Peter (University of Applied Sciences, FH Campus Wien)

Authors:
Giggins, Oonagh (Dundalk Institute of Technology); Cullen-Smith, Suzanne (Dundalk Institute of Technology); Broeckx, Leen (Thomas More University of Applied Sciences); Sels, Romy (Thomas More University of Applied Sciences); Helsen, Kim (Thomas More University of Applied Sciences); Cuppens, Kris (Thomas More University of Applied Sciences)

Authors:
Lecaj, Rron (SMK, College of Applied Sciences)

Main track

CLATM: A Contrastive Learning-Based FDIA Detection Method with Attention Timestamp Masking for REIoT

 Xia, ZhuoQun (Changsha University of Science & Technology); Haidong, Tang Haidong (Tang); Lin, Xi (Changsha University of Science & Technology)

 

BFT-MS: Asynchronous BFT Protocol Using Bounded Memory 

Cheng, Hao (Institute of Software Chinese Academy of Sciences, China); Kong, Fanyu (School of Software, Shandong University, China); Lu, Yuan (Institute of Software, Chinese Academy of Sciences, China); Zhang, Zhenfeng (Institute of Software, Chinese Academy of Sciences, China)

 

Unbalanced Secret Labeled Private Set Intersection via Scalable Dual-Load Bloom Filter

Yang, Kaijie (Beihang University); Guo, Hua (Beihang University); Guan, Yewei (Beihang University); Li, Weiwei (North China University of Water Resources and Electric Power)

 

From Dark Network to Honeypot: Analysis and Traceability of Multi-prefix IPv6 Network Attacks

Huang, Youjun (Tsinghua University); Li, Xiang (Nankai University); Miao, Fasheng (Tsinghua University); Duan, Haixin (Tsinghua University); Zhang, Jia (Tsinghua University)

 

On Analyzing SSO Permissions Across Web and Android Platforms

Rezaei, Fahimeh (Concordia); Lupinacci, Matteo (University of Calabria); Mannan, Mohammad (Concordia University); Youssef, Amr (Concordia University)

 

Hardware-assisted Secure Decentralized Cloud Storage via Self-audit and Self-repair 

Dafoe, Josh (Michigan Technological University); Chen, Niusen (University of Wisconsin-La Crosse); Chen, Bo (Michigan Technological University)

 

FlipStress: Noise Injection Defenses Against CPU-cache-based Web Attacks

Basak, Tapan (New Jersey Institute of Technology); Curtmola, Reza (New Jersey Institute of Technology); Oren, Yossi (Ben Gurion University); Phan, Hai (New Jersey Institute of Technology)

 

PEARL: A Reinforcement Learning-Based Attack Analysis Approach for Security and Robustness Assessment of Smart Home Systems

Haque, Nur Imtiazul (University of Cincinnati); Rahman, Mohammad Ashiqur (Florida International University); Uluagac, A. Selcuk (Florida International University); Njilla, Laurent (Air Force Research Laboratory)

 

DASPN: A Multi-level Security Protection Model for Northbound Interface Based on Dynamic Access Control

Huang, Yining (Beijing University of Posts and Telecommunications); Guan, Jianfeng (Beijing University of Posts and Telecommunications); Gu, Yilan (Beijing University of Posts and Telecommunications); Liu, Kexian (Beijing University of Posts and Telecommunications)

 

BFDet: A Method for Detecting Malicious Traffic with Ultra-Low False Positive Rate Based on TLS Behavior Flow

Guo, Zhongyu (Key Laboratory of Cyberspace Security, Ministry of Education); Lu, Bin (Key Laboratory of Cyberspace Security, Ministry of Education); Sun, Rongbo (Key Laboratory of Cyberspace Security, Ministry of Education, Zhengzhou 450001, China); Wu, Wei (Key Laboratory of Cyberspace Security, Ministry of Education); Li, Ding (Key Laboratory of Cyberspace Security, Ministry of Education); Lin, Xiangnan (Key Laboratory of Cyberspace Security, Ministry of Education); Wang, Chengyu (Key Laboratory of Cyberspace Security, Ministry of Education)

 

When VR is Not Just for Gaming: Unmasking GPU Resource Misuse on VR Headset

Yang, Dianshi (University of Delaware); Gao, Xing (University of Delaware)

 

A Few-Shot-Based Model-Agnostic Meta-Learning for Intrusion Detection in Secure of In-vehicle Network

Xu, Yingjie (Shanghai University); Li, Yufeng (Shanghai University); Zhang, Guiqi (Shanghai University); Shen, Jun (Shanghai University)

 

ESKNN:Efficient Secure KNN Query Based On 3-Party Secure Computation

Zhao, Peijun (National University of Defense Technology); Zhao, Xianan (National University of Defense Technology); Liu, Lin (National University of Defense Technology); Fu, Shaojing (National University of Defense Technology); Luo, Yuchuan (National University of Defense Technology)

 

An Enhanced Credit-Based Shaper for Audio-Video Bridging Streams in TSN

Huang, WeiHong (Hunan University of Science and Technology); Xu, Zhen (Hunan University of Science and Technology); Shi, Min (Hunan University); Huang, Jing (Hunan University of Science and Technology)

 

A Self-adaptive Moving Target Defense Decision-making Method Based on Bounded-rationality Supermodular Games

Sun, Rongbo (Key Laboratory of Cyberspace Security, Ministry of Education, Zhengzhou 450001, China); Fei, Jinlong (Key Laboratory of Cyberspace Security, Ministry of Education, Zhengzhou 450001, China); Zhu, Yuefei (Key Laboratory of Cyberspace Security, Ministry of Education, Zhengzhou 450001, China)

 

MDC-Net: Multi-Dimensional Cross-Domain Collaborative Network for Image Manipulation Localization

Chen, Jiaxin (Changsha University of Science and Technology); Wei, Yawen (Changsha University of Science and Technology); Cai, Shengxin (Changsha University of Science and Technology); Zhang, Dengyong (Changsha University of Science and Technology)

 

Two Birds with One Stone: Multi-Task Detection and Attribution of LLM-Generated Text

Liu, Zeyan (University of Louisville); Rao, Zixin (University of Louisville); Mohamed, Youssef (University of Louisville); Liu, Shang (University of Chinese Academy of Sciences)

 

Now Let’s Make It Physical! Enabling Trusted Certificate Issuance in PKI via Physical Bindings for CAs

Zhang, Xiaolin (Shanghai Jiao Tong University); Chen, Chenghao (Shanghai Jiao Tong University); Qin, Kailun (Shanghai Jiao Tong University); Wang, Yuxuan (Shanghai Jiao Tong University); QU, Shipei (Shanghai Jiao Tong University); Wang, Tengfei (Shanghai Jiao Tong University); Zhang, Chi (Shanghai Jiao Tong University); Gu, Dawu (Shanghai Jiao Tong University)

 

DCAPSCR: A Decentralized Conditional Anonymous Payment System With Collaborative Regulation

Zhang, Jing (Nanjing University of Aeronautics and Astronautics); Tao, Yu (Nanjing University of Aeronautics and Astronautics); Zhou, Lu (Nanjing University of Aeronautics and Astronautics)

 

One Trace is Possible: A Method for Small-Sample Profiling Side-Channel Analysis in Communication Environments

Wang, Chen (Zhejiang Sci-Tech University); Sun, Tianlong (Zhejiang Sci-Tech University); Shen, Jian (Zhejiang Sci-Tech University)
DARD: Dice Adversarial Robustness Distillation Against Adversarial Attacks Zou, Jing (AUGUSTA university); Zhang, Shungeng (Augusta University); Qiu, Meikang (Augusta University)

 

Leveraging Semantic Features and Graph Structures for Intelligent Vulnerability Detection in Smart Contracts

ruxin, Chen (hunan normal university)

 

Multi-Dimensional Cost-Driven LDSP Instruction Scheduling Optimization

Peng, Ting (Hunan University Of Science And Technology); Shi, Min (Hunan University); Zhou, lian Xin (Hunan University of Science and Technology)

 

Meta-Distillation: A Novel Adversarial Distillation Network for Adversarial Robustness

Okumali, Richard (Donghua University)

 

RdBFT: Faster Asynchronous BFT Protocol through Random Binary Agreement 

Zhuang, Chaofeng (East China Normal University); Qian, Haifeng (East China Normal University)

 

MFRWF: Enhance Website Fingerprinting Robustness Against website content updates and background noise traffic 

Chen, Siyang (University of Science and Technology of China); Jin, Dong (Institute of Artificial Intelligence); Ma, Yuanyi (University of Science and Technology of China); Chen, Shuangwu (University of Science and Technology of China); Hou, Yunpeng (Institute of Artificial Intelligence); Yang, Jian (University of Science and Technology)

 

Att-SFI: Attestable software sandboxing with control flow integrity

Li, Wei (University of Chinese Academy of Sciences; Institute of Software, Chinese Academy of Sciences); Feng, Wei (Institute of Software, Chinese Academy of Sciences); Qin, Yu (Institute of Software, Chinese Academy of Sciences); Gu, Zeyu (Xiaomi Corperation)

 

Privacy-preserving Preselection for Face Identification Based on Packing

Xin, Rundong (shenzhen university); Wang, Taotao (Shenzhen University); Wang, Jin (Sanya Institute of Hunan University of Science and Technology); Zhao, Chonghe (Guangzhou University); Wang, Jing (Changsha University of Science and Technology)

 

FL(DP)2 : Federated Learning with Dynamic Personalized Differential Privacy 

Shi, Cuiyun (Inner Mongolia University of Science and Technology); Wang, Jingyu (Inner Mongolia University of Science and Technology); Liu, Lixin (Renmin University of China); Chang, Xin (Inner Mongolia University of Science and Technology); Pu, Yini (Inner Mongolia University of Science and Technology)

 

Hamk-CFI: A Hardware-assisted Kernel Control Flow Protection Framework For Cloud Environments 

Sun, Rui (Nanjing University); Su, Chao (Changshu Institute of Technology); Zeng, Qingkai (Nanjing University)

 

A Verifiable Federated Learning Aggregation Scheme Based on Homomorphic Hashing

Huang, Jialun (Changsha University of Science and Technology); Xu, Zisang (Changsha University of Science and Technology); Gu, Ke (Changsha University of Science and Technology); Zhu, Zhi (Changsha University of Science and Technology)

 

MOT-Fuzz: A Novel Directed Greybox Fuzzing with Multiple Ordered Target Basic Blocks for Multistep Vulnerabilities

Li, Kangrui (Beijing University of Posts and Telecommunications); Zhou, Zan (Beijing University of Posts and Telecommunications); Yang, Shujie (Beijing University of Posts and Telecommunications); Xu, Changqiao (Beijing University of Posts and Telecommunications)

 

A Lightweight Image Steganography Scheme Based on Invertible Neural Network Architecture with Progressive Channel Attention 

Li, Qingru (Hebei Normal University); Yang, Ruoyao (Hebei Normal University); Wang, Fangwei (Hebei Normal University); Wang, Changguang (Hebei Normal University); Zhang, Xi (Hebei Normal University); Babaagba, Kehinde O. (Edinburgh Napier University); Tan, Zhiyuan (Edinburgh Napier University)

 

Consortium Blockchain-Based Anti-Plagiarism Scheme for Multi-NFT Marketplaces

Gao, Jie (Zhejiang University of Technology); Liu, Gang (Shenzhen Institute for Advanced Study, University of Electronic Science and Technology of China); Zhou, Kun (Zhejiang University of Technology); Cheng, HongBing (Zhejiang University of Technology)

 

Flow Dissector: A Flow Slicing Representation with a Pre-trained Model for Varied Malicious Traffic Classification 

Jiang, Jun (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China); Dong, Fangming (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China); Guo, Lingjia (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China); Jiang, Zhengwei (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China); Liu, Baoxu (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China); Zhang, Kai (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China)

 

OptiGame: Game-Theoretic Enhancements for Optimistic Rollups through Bayesian Strategies

Khalil, Alvi Ataur (Florida International University); Hasan, Md Golam Moula Mehedi (Iona University); Rahman, Mohammad Ashiqur (Florida International University)

 

A_Double_Layer_Blockchain_Assisted_Anonymous_Cross_Domain_Authentication_and_Transaction_Scheme_for_Metaverse 

Chen, Yubo (Changsha University of Science and Technology); Xu, Zisang (Changsha University of Science and Technology); Meng, Xiangwei (Hunan University of Science and Technology); Huan, Zhenhao (Changsha University of Science and Technology)

 

PIRchain: Blockchain-Enhanced Privacy-Preserving Inter-domain Routing

Lei, Xiaohan (Beijing University of Posts and Telecommunications); Tian, Ye (Beijing University of Posts and Telecommunications); Yang, Yuan (Tsinghua University); Zhang, Runhao (Beijing University of Posts and Telecommunications); Que, Xirong (Beijing University of Posts and Telecommunications); Gong, Xiangyang (Beijing University of Posts and Telecommunications)

 

LLM-Augmented Fuzzing for Unveiling PLC Web Application Vulnerabilities Impacting Physical Control

Cheng, Jiaxing (Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS); Fang, Dongliang (Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS); Gu, Zhongwei (Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS); Lv, Shichao (Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS); Si, Shuaizong (Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS); Sun, Limin (Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS)

 

Decentralized Role Rotation Privacy Protection in Federated Learning 

wan, changxu (Hunan University of Science and Technology); Shi, Min (Hunan Univeristy); Wang, Ying (Hunan University of Science and Technology); Gong, Bo (Hunan University of Science and Technology); Xu, Jianbo (Hunan University of Science and Technology)

 

XRwatcher: A Detection Scheme for XR Privacy Speculation Attacks Base on Traffic Analysis 

Zhang, Hao (Xidian University); Li, Guohao (Xidian University); Yang, Li (Xidian University); Wang, Jiangyu (Xidian University); Yang, Ruiyuan (Xidian University); Yang, Huipeng (Xidian University)

 

Fair Exchange of Trained Machine Learning Models Based on Permissioned Blockchain and Zero-Knowledge Contingent Payment

Xu, Shiwei (Huazhong Agricultural University); Wu, Hang (Huazhong Agricultural University); Yin, Jiangjin (Huazhong Agricultural University); Peng, Zhe (Hong Kong Polytechnic University); Tong, Yan (Huazhong Agricultural University); Ren, Zhengwei (Wuhan University of Science and Technology); Du, Le (Wuhan East Lake Big Data Technology Co. Ltd)

Late track

SaFeBridge: Consensus-Agnostic Asset Transfer with Slow-Approval Fast-Exit Principles

Deng, Fuyang (Beihang Univeristy); Wu, Qianhong (Beihang University, China); Dai, Xiaopeng (Beihang University, China); Geng, Yifu (Beihang University, China); Qin, Bo (Renmin University of China)

Insights into Ransomware Detection based on Semantic Understanding

Zhao, Lingbo (Institute of Information Engineering, Chinese Academy of Sciences); Wang, Shuquan (School of Control Science and Engineering, Shandong University); Wang, Zhilu (Institute of Information Engineering, Chinese Academy of Sciences); Zhang, Yuhui (Institute of Information Engineering, Chinese Academy of Sciences); Hou, Rui (Institute of Information Engineering, Chinese Academy of Sciences,)

Adaptive On-Chain and Off-Chain Communication Management Based on SDN and Blockchain

 Huang, Daming (Nanjing University); Xiang, JinCheng (Nanjing University); Jin, Yu (Nanjing University); Tian, Chen (Nanjing University)

Joint Beamforming and Reflection Design for Physical Layer Security in RIS-Assisted Integrated Sensing and Communication Systems

Guo, Sitong (Inner Mongolia University,); Hao, Zheng (Inner Mongolia University); Zhang, Yinghui (Inner Mongolia University); Yan, Junkun (Xidian University)

Real-World Image Dehazing via Degradation Modeling, Spectral-Spatial Fusion, and Prior Guidance

 Rong, Jiali (School of Computer Science and Engineering, Hunan University of Science and Technology); Liao, miao (School of Computer Science and Engineering, Hunan University of Science and Technology); Di, Shuanhu (College of Intelligence Science and Technology, National University of Defense Technology)

Dependency Tree-based Multi-Task Learning for Extracting Process Models in Safety Management

 Su, Xiaoyang (School of Computer Science and Engineering, Hunan University of Science and Technology, China); Wen, Yiping (School of Computer Science and Engineering, Hunan University of Science and Technology, China)

 

The Framework Of Variational Mode Decomposition Based For DDoS Detection

yizhun, tian (civil aviation flight university of china); Lu, Jing (Civil Aviation Flight University of China); jia, ruchun (sichuan university)

Antitoxin: A Framework for Controlling Persistent Backdoors in Federated Learning

 Karamchandani, Neeraj (The Pennsylvania State University); Wu, Chen (The Pennsylvania State University); Nagasubramaniam, Piyush (The Pennsylvania State University); Wu, Dinghao (Pennsylvania State University); Zhu, Sencun (Pennsylvania State University)

A Loop Elimination Method Based on Vector DSP Processor with Immediate Addressing Incorporation

 Zhihao, Li (Hunan University of Science and Technology)
Complementary Ensemble Empirical Mode Decomposition and Permutation Entropy-Empowered Network Traffic Anomaly Detection for Secure QUIC Communications liang, shan (Jiangxi Normal University); Ming, Jiang (Jiangxi Normal University); Cao, Yuanlong (Jiangxi Normal University)

FLARE: Feature-based Lightweight Aggregation for Robust Evaluation of IoT Intrusion Detection

 Boswell, Bradley (Augusta University); Barrett, Seth (Augusta University); Rajaganapathy, Swarnamugi (Digital Forensics & Artificial Intelligence Research Lab); Dorai, Gokila (Augusta University); Qiu, Meikang (Augusta University)

The RPKI and Its Hidden Guardians: An Empirical Analysis of Their Relationship and Security Implications

 zou, hui (Computer Network Information Center); He, Yizhuo (Computer Network Information Center, Chinese Academy of Sciences); Jin, Yuxiang (Computer Network Information Center, Chinese Academy of Sciences)

SCFA: Stacked Classifier with Feature Augmentation for Imbalanced Node Classification in Intelligent Internet-of-Things 

Luo, Cuiting (Changsha Medical University); Duan, Yuanjie (Changsha Medical University); Liu, Cuicui (Changsha Medical University); Li, Hongyan (Changsha Medical University); Long, Jing (Hunan Normal University)

Clark: a Transferable APT Detection Framework via Self-Supervised Contrastive Learning 

Zhang, Shuyi (Institute of Information Engineering, Chinese Academy of Sciences); Wen, Yu (Institute of Information Engineering, Chinese Academy of Sciences); Feng, Jingjing (Institute of Information Engineering, Chinese Academy of Sciences); Cui, Wenzhuo (Institute of Information Engineering, Chinese Academy of Sciences)

Investigating How Trading Patterns and Twitter Impact the CryptoPunks NFT Market 

Tang, Mingdong (Hunan University of Science and Technology); Liu, Yuxiang (Macau University of Science and Technology)

A Novel Multi-Graph Spatial-Temporal Graph Neural Network Model for Traffic Prediction 

Diao, Chunyan (Information Engineering University); Zhang, Yanrong (Harbin University of Commerce\Computer and Information Engineering); Ma, jinquan (Information Engineering University); Ouyang, Xi (Information Engineering University); Guo, Lixiang (Information Engineering University); Huo, Sheng (Zhuzhou CRRC Times Electric Co., Ltd); Shen, Tong (Huawei); Li, Kuanching (Hunan University of Sciences and Technology/Computer Science and Engineering)

IncreTTP: An Incremental TTPs Classification Model 

Liu, Yixiang (Sichuan university); Wang, Junfeng (Sichuan university); Ge, Wenhan (Sichuan University)

A Maximizing Duty-Cycle network Lifetime Cooperative Routing algorithm in a Smart Community Scenario

 Ji, Zhang (Changsha Social Work College); He, Shiming (Changsha University of Science and Technology); Yan, Zhi (Changsha Social Work College); Chen, Dan (Changsha Social Work College)

A Robustness Optimization Mechanism for Intrusion Detection Models Based on Dynamic Ensemble Learning

 Ji, Jianshou (College of Computer and Data Science, Fuzhou University); Lin, Weiwei (College of Computer and Data Science, Fuzhou University); Liu, Hongyan (College of Computer Science and Technology, Zhejiang University); Zhang, Dong (Fuzhou University); Lin, Shengrui (College of Computer and Data Science, Fuzhou University); Zhu, Longlong (College of Computer and Data Science, Fuzhou University); Wu, Chunming (Zhejiang University); Xu, Shaowei (College of Computer and Data Science, Fuzhou University)

Knowledge Distillation for Federated Learning with Many Noisy Clients

 Peng, Liang (Hunan University of Science and Technology); Jiang, Zoufeng (Hunan University of Science and Technology); Chen, Yuxiang (Hunan University of Science and Technology)

Security Detection Method for Wireless Sensor Networks Based on Self-Supervised Learning and Deep Learning 

yu, jintao (Harbin University of Commerce); wang, xiaowen (Harbin University of Commerce); liu, he (Harbin University of Commerce); meng, ke (Harbin University of Commerce)

 

RADBench: A Comprehensive Benchmark for Internet Routing Anomaly Detection 

Wang, Xiaolan (Computer Network Information Center, Chinese Academy of Sciences); Nie, Xiaohui (Computer Network Information Center, Chinese Academy of Sciences); Wang, Yuye (Hangzhou Institute for Advanced Study, University of Chinese Academy of Sciences); Chen, Luyao (Computer Network Information Center, Chinese Academy of Sciences); Wu, Zheng (Nanjing University of Posts and Telecommunications); Fu, Yu (China Unicom Research Institute); Shang, Jiang (Computer Network Information Center, Chinese Academy of Sciences); Du, Congshu (Computer Network Information Center, Chinese Academy of Sciences); Pei, Dan (Tsinghua University)

Security-Aware and Energy-Efficient Federated Learning in LEO Satellite Edge Micro-clouds: A Noise-Adaptive Allocation Framework 

Teng, ShuYang (Hunan University); Qiao, Ying (Hunan University); Luo, Juan (Hunan University); Zeng, GuoGen (Hunan University)

HIDE: Anonymous Hop-by-Hop Identity Authentication Based on Dynamic Address Label Embedding

 Hu, Xiaolong (Beijing University of Posts and Telecommunications); Guan, JianFeng (Beijing University of Posts and Telecommunications); Liu, Kexian (Beijing University of Posts and Telecommunications); Liu, Jianli (Beijing University of Posts and Telecommunications); Qin, Ye (Beijing University of Posts and Telecommunications); Yao, Su (Tsinghua University)

Login, Logout, Reset: Measuring Security and Privacy Issues in Real-World Web Logins 

Lamisa, Kazi Farhat (Concordia University); Mannan, Mohammad (Concordia University); Youssef, Amr (Concordia University)

A Geographical Entity Relation Extraction Method Based on Improved OneRel Model

 Jing, Luo (Hunan University of Science and Technology); Jiang, Zhao Yi (Hunan University of Science and Technology); Wu, Li Qiu (Hunan University of Science and Technology)

BMI: A Bidirectional Spatio-Temporal Selective State Space Model for Data Imputation 

Wen, Jigang (Hunan University of Science and Technology); Nie, Wenqian (Hunan University); Li, Xiaocan (Hunan University); xie, kun (hunan university); Xie, Yong (Nanjing University of Posts and Telecommunications); Chen, Yuxiang (Hunan University of Science and Technology); Fu, Zigeng (Hunan University); Feng, Quan (Hunan Vanguard Group Corporation Limited)

SG-SCA: An Interpretable Side-Channel Analysis Model Based on Shapelet and Graph Attention Network 

Guo, Yaxing (Institute of Information Engineering, Chinese Academy of Sciences, China; School of Cyber Security, University of Chinese Academy of Sciences, China); You, Shilong (Institute of Information Engineering, Chinese Academy of Sciences, China; School of Cyber Security, University of Chinese Academy of Sciences, China); Peng, Tingting (Institute of Information Engineering, Chinese Academy of Sciences, China; School of Cyber Security, University of Chinese Academy of Sciences, China); Du, Jianfeng (Institute of Information Engineering, Chinese Academy of Sciences, China; School of Cyber Security, University of Chinese Academy of Sciences, China); Wang, Zhu (Institute of Information Engineering, Chinese Academy of Sciences, China; School of Cyber Security, University of Chinese Academy of Sciences, China); Yu, Aimin (Institute of Information Engineering, Chinese Academy of Sciences, China; School of Cyber Security, University of Chinese Academy of Sciences, China)

Log Anomaly Detection based on Time-Delta Sequential Feature

 Wen, Jigang (Hunan University of Science and Technology); Ma, Chenying (Hunan University); He, Shiming (Changsha University of Science and Technology); xie, kun (hunan university); Xie, Yong (Nanjing University of Posts and Telecommunications); Chen, Yuxiang (Hunan University of Science and Technology)

The Decision of Monotonic Automata 

Long, Qingxia (Hunan University of Science and Technology); He, Yong (Hunan University of Science and Technology); Cui, Zhenhe (Hunan University of Science and Technology)

CCGCRN: Cluster and Completion Graph Convolution Recurrent Network for Incomplete Traffic Flow Forecasting

 Xie, Ruotian (Hunan university); Wen, Jigang (Hunan University of Science and Technology); liu, Caiping (Hunan University); jin, Yani (Hunan University); xie, kun (hunan university); He, Shiming (Changsha University of Science and Technology); Li, Kuanching (Hunan University of Science and Technology)

Document Image Tampering Detection based on Multi-domain Feature Consistency 

Chen, Jiaxin (Changsha University of Science and Technology); Sun, Long (Changsha University of Science and Technology); Zhang, Dengyong (Changsha University of Science and Technology)

Securing Snapshot Pruning in IOTA Tangle 2.0: A Cooperative Deep Reinforcement Learning Approach for Edge-Cloud Smart Meter Networks 

Palaniswamy, Basker (University College Cork)

 

A Re-authentication Scheme based on Blockchain and Reinforcement Learning

 Chen, Zixuan (Hunan University of Science and Technology); Li, Chuncao (Hunan University of Science and Technology); Zeng, Pengjie (Central South University); Zhou, Lian (Hunan University of Science and Technology); Ai, Yuanyuan (Hunan University of Science and Technology); Wang, Xiaoliang (Hunan University of Science and Technology)

More Bang for Your Buck: Gaining Collateral Benefit from Partial ROV Deployment 

Chen, Yuxuan (Computer Network Information Center, Chinese Academy of Sciences); zou, hui (Computer Network Information Center, Chinese Academy of Sciences); Li, Yanbiao (Computer Network Information Center, Chinese Academy of Sciences); Wang, Xin (Stony Brook University); XIE, Gaogang (Computer Network Information Center, Chinese Academy of Sciences)

FedCLF: Contrastive Learning-driven Framework for Mitigating Data Heterogeneity in Federated Learning 

Bai, Chunming (Xiangtan university); Zhang, Heng (Economic Development Zone Branch of Zhuzhou Public Security Bureau); Xie, Yong (Xiangtan University); Su, Xin (Hunan Police Academy); Zhu, Xiangyuan (Hunan Police Academy); Kang, Wenjie (Hunan Police Academy); Liu, Xuchong (Hunan Police Academy)

Heterogeneity-aware semi-asynchronous federated learning

 He, Junying (Hunan University of Science and Technology); Chen, Yuxiang (Hunan University of Science and Technology); Xie, Kun (Hunan University); Wen, Jigang (Hunan University of Science and Technology); Cong, Yincuan (Hunan University); Chen, Xiaoyan (Xiamen University of Technology); Liu, Tianxiong (Hunan Aerospace Hospital)

SAFE: A Fast Privacy-Preserving Scheme for Multi-Client Face Verification

 Xu, Guotao (Xidian University); Zhao, Bowen (Xidian University); Zhong, Yantao (China Resources Intelligent Computing Technology Co., Ltd.); Ma, Zhaoting (Chinese Academy of Surveying and Mapping); Qiao, Cheng (Guangzhou University); Pei, Qingqi (Xidian Univeristy)

FedSND:Federated Learning with Symmetric Noise Decentralized Orthogonal Encryption 

Yang, Chaoyi (Hunan University of Science and Technology); Tan, Wentao (Hunan University of Science and Technology); Chen, Yuxiang (Hunan University of Science and Technology); Wen, Jigang (Hunan University of Science and Technology); Cong, Yinchuan (Hunan University); Xie, Kun (Hunan University); Chen, Xiaoyan (Xiamen University of Technology); Liu, Tianxiong (Hunan Aerospace Hospital)

Task-Driven GAN for Class-Imbalanced Intrusion Detection 

Ma, Yangle (KTH); Hao, Rijie (Aalto university); Huo, Sheng (ZHUZHOU CRRC TIMES ELECTRIC CO., LTD); Jiang, Ping (ZHUZHOU CRRC TIMES ELECTRIC CO., LTD)

Protecting Medical Image Privacy by Using Chaos Encryption and Blockchain 

Liu, Yu (Hunan University); Wan, Wanglong (Hunan University); Yan, Zhenxiong (Hunan University); Song, Fuyuan (Nanjing University of Information Science and Technology); Jin, Wenqiang (Hunan University); Qin, Zheng (Hunan University); Deng, Minggao (Hunan Xiangneng Intelligent Electric Appliance Co., Ltd)

 

Location Privacy Protection for VANETs based on Dynamically Adjustable Security Coefficient

 Yin, Luxiu (Hunan University of Science and Technology); Chen, QiHong (Hunan University of Science and Technology); Liu, Jianyu (Hunan University); Wang, Chun (Hunan Normal University); Luo, Juan (Hunan University); Li, Kuanching (Hunan University of Science and Technology)

An Intrusion Detection-Based Location Privacy Protection Algorithm for VANETs

 Yin, Luxiu (Hunan University of Science and Technology); Zhu, Kaifeng (Hunan University of Science and Technology); Luo, Juan (Hunan University); Liu, Jianyu (Hunan University); Huang, Jing (Hunan University of Science and Technology); Li, Kuanching (Hunan University of Science and Technology)

BDSV: A Blockchain-based Reliable and Efficient Batch Digital Signature Verification Scheme for IoV

 Cai, Jiahong (Hunan University of Science and Technology); Meng, Xiangwei (Hunan University of Science and Technology); Huo, Yingzi (Hunan University of Science and Technology); Wu, Yanbing (Hunan University of Science and Technology); Liang, Jiale (Harbin University of Commerce)

pFedDDS: Personalized Federated Learning via Dual defense Strategies 

Xie, Rui (Hunan University of Science and Technology); Song, Qiang (Hunan University of Science and Technology); Chen, Linshu (Hunan University of Science and Technology); Hu, Na (Hunan University of Science and Technology); Wen, Jigang (Hunan University of Science and Technology)

Revocable and Verifiable Key Aggregate Searchable Encryption for Flexible Data Sharing

 Zhang, Shiwen (Hunan University of Science and Technology); Huang, Jiahao (Hunan University of Science and Technology); Zhou, Xinlian (Hunan University of Science and Technology); Liang, Wei (School of Computer Science and Engineering, Hunan University of Science and Technology); Li, Kuanching (Hunan University of Science and Technology)

An Energy-Aware Scheduling Algorithm for Multi-period Parallel Applications on Heterogeneous Systems

 Huang, Jing (Hunan university of science and technology); Chen, Yuhong (Hunan University of Science and Technology)
Optimized Entanglement Routing for Enhanced Quantum Key Distribution Performance in Quantum Networks Zhang, Hongding (Hunan University of Science and Technology); Huo, Sheng (ZHUZHOU CRRC TIMES ELECTRIC CO., LTD); Jiang, Ping (ZHUZHOU CRRC TIMES ELECTRIC CO., LTD)

SVD-Based Efficient Communication Scheme for Heterogeneous Federated Learning 

Tang, Zhenyu (Hunan University of Science and Technology); Xiao, JiaHong (Hunan University of Science and Technology); Chen, Yuxiang (Hunan University of Science and Technology); Tang, Yuanqiang (Xinyu University); Liu, Tianxiong (Hunan Aerospace Hospital)

Causal-Driven Multi-Objective Grey Wolf Optimization Framework for Multidimensional Redundant IoT Traffic Intrusion Detection

 Zeng, ZengRi (Hunan University of Humanities, Science and Technology); Zhao, Baokang (National University of Defense Technology); Huang, Keke (Central South University); Zhang, Shiwen (Hunan University of Science and Technology); Kang, Aimei (Hunan University of Humanities, Science and Technology)

Spatiotemporal Cross-Domain Integrated Insights: Mitigating Fraudulent Activities on Ethereum

 Shi, Yuduo (Zhejiang University); Li, Zhao (Hangzhou Yugu Technology); Xu, Haitao (Zhejiang University); Wang, Yanbin (Shenzhen MSU-BIT University); Ma, Wenrui (Zhejiang Gongshang University); Zhang, Ji (University of Southern Queensland)

Low Energy Consumption Hierarchical Federated Learning

 Zhang, Shenaocheng (Hunan university of science and technology); Chen, Yuxiang (Hunan University of Science and Technology); Zhou, Xiaofan (Hunan University of Science and Technology); Wen, Jigang (Hunan University of Science and Technology); Xie, Kun (Hunan University); Cong, Yinchuan (Hunan University); Chen, Xiaoyan (Xiamen University of Technology); Liu, Tianxiong (Hunan Aerospace Hospital Fenglin road)

Cryptocurrency Transaction Anomaly Detection Based on Semi-Supervised Learning and Graph Neural Network 

Chen, Renguang (Fujian Normal University); Zeng, Lei (Fujian Normal University); Wang, Huiqing (Fujian Normal University); Chen, Zhide (Fujian Normal University); Yang, Xu (Minjiang University); Ruan, Zhiqiang (Minjiang University); Feng, Chen (Fuzhou Polytechnic); Zhu, Kexin (National Sun Yat-sen University); Yang, Xuechao (RMIT University)

Group-Based Parallel Split Federated Learning

 Zhou, Xiaofan (Hunan University of Science and Technology); Xiao, Xiangqi (Hunan University of Science and Technology); Chen, Yuxiang (Hunan University of Science and Technology); Wen, Jigang (Hunan University of Science and Technology); Zhang, Shenaocheng (Hunan University of Science and Technology); Xie, Kun (Hunan University); Cong, Yinchuan (Hunan University); Chen, Xiaoyan (Xiamen University of Technology); Liu, Tianxiong (Hunan Aerospace Hospital)

DRLPO: A Deep Reinforcement Learning Distributed Partial Offloading Scheme for Fog Computing Networks 

Xiao, JiaHong (Hunan university of science and technology); Chen, Yuxiang (Hunan University of Science and Technology); Yang, Chaoyi (Hunan University of Science and Technology); Wen, Jigang (Hunan University of Science and Technology); Tang, Yuanqiang (Xinyu University); Liu, Tianxiong (Hunan Aerospace Hospital Fenglin road)

A Fault-Tolerant Block Allocation Scheme for Collaborative-Storage Blockchain Systems 

Dou, Yuanhang (Changsha University of Science and Technology); Yin, Bo (Changsha University of Science and Technology); He, Fajin (Changsha University of Science and Technology)

A Blockchain-based Four-factor Authentication and Key Agreement Protocol for Wireless Medical Sensor Networks

 Gong, Bo (Hunan University of Science and Technology); Wu, Zhongqing (Hunan University of Science and Technology); Wang, Ying (Hunan University of Science and Technology); Xu, Jianbo (Hunan University of Science and Technology)

Research on Mixed-precision Optimization Compilation Methods for Loop Programs

 Luo, Fan (School of Computer Science and Engineering, Hunan University of Science and Technology); Hu, Yonghua (School of Computer Science and Engineering, Hunan University of Science and Technology); Zhang, Huifu (School of Computer Science and Engineering, Hunan University of Science and Technology); Gao, Yvxiang (School of Computer Science and Engineering, Hunan University of Science and Technology); Xie, Anxing (School of Computer Science and Engineering, Hunan University of Science and Technology)

AquaCrossNet: An Underwater Cross-Granularity Complementary Segmentation Network 

Chen, Linshu (Hunan University of Science and Technology)

A lightweight authentication protocol for resource-constrained WBAN

 Yang, Huaiyao (Hunan University of Science and Technology); Huang, Xueting (Hunan University of Science and Technology); Chen, Xiaoyan (Xiamen University of Technology); He, Dacheng (Hunan University of Science and Technology); Xiao, Yufeng (Hunan Universityof Science and Technology)

Efficient Privacy-Preserving and Verifiable Arbitrary Polygon Range Query in Cloud Computing 

Song, Fuyuan (Nanjing University of Information Science and Technology); Zhang, Fan (Nanjing University of Information Science and Technology); Fu, Zhangjie (Nanjing University of Information Science and Technology); Liu, Yu (Hunan University); Yin, Hui (Changsha University); Qin, Zheng (Hunan University)

ReForGe: A Fusion Model with Recursive Feature Engineering for PdM of Aircraft Engines

 Huo, Yingzi (Hunan University of Science and Technology); Xiao, Yufeng (Hunan University of Science and Technology); Cai, Jiahong (Hunan University of Science and Technology); Wu, Yanbing (Hunan University of Science and Technology); Yang, Chengjun (Hechi University)

ECC-Based Certificate-less Aggregate Signatures Scheme for VANETs 

Zeng, Peng (Hunan University of Science and Technology); Liu, Yue (Hunan University of Science and Technology); Liu, Guikai (Hunan University of Science and Technology); Liu, Yuzhen (Hunan University of Science and Technology); Wang, Xiaoliang (School of Computer Science and Engineering, Hunan University of Science and Technology)

EvasionEval: A Benchmark for LLMs in Evaluating Advanced Defense Evasion Techniques 

Wang, Baojin (University of Electronic Science and Technology of China); Huang, Yichen (University of Electronic Science and Technology of China); Li, Xiong (University of Electronic Science and Technology of China); Yu, Jiguo (University of Electronic Science and Technology of China); Zhang, Xiaosong (University of Electronic Science and Technology of China)

FedCC: Robust Federated Learning against Model Poisoning Attacks 

Jeong, Hyejun (UMass Amherst); Son, Hamin (UC Davis); Lee, Seohu (Johns Hopkins University); Hyun, Jayun (Hiippo T&C Inc.); Chung, Tai-Myoung (Hippo T&C Inc.)

TACA: Blockchain-Based Traceable and Anonymous Cross-Domain Authentication Scheme for IIoT 

Liang, Yufeng (Nanjing University of Aeronautics and Astronautics); Meng, Xiangwei (Hunan University of Science and Technology); Deng , Hai (Florida International University)

A Hybrid Adaptive Large Neighborhood Search for Secure and Efficient Single School Routing Problem

 Cui, Zhangwei (Hunan University of Science and Technology); Chen, Yitao (Hunan University of Science and Technology); Zhang, Qiongbing (Hunan University of Science and Technology); Pang, Rui (Hunan University of Science and Technology)

Privacy-Preserving Probability Fingerprinting Scheme with Collusion Resistance for Relational Databases

 Pan, Jie (Nanjing University of Aeronautics and Astronautics); Ye, Xinxin (Nanjing University of Aeronautics and Astronautics); Liu, Bingbing (Nanjing University of Aeronautics and Astronautics); Deng, Hai (Florida International University)

Prompting Large Language Models for Data-Flow Analysis: Addressing Common Errors for Better Reasoning 

Yu, Qingchen (Zhejiang University); Zhang, Jianshan (Minjiang University); Wu, Chunming (Zhejiang University)

BPGT: A Novel Privacy-Preserving K-Means Clustering Framework to Guarantee Local $d_{\chi}$-privacy 

Chen, Fan (Hunan University of Science and Technology); Lei, Bizhi (Hunan University of Science and Technology); Zhu, Jielu (Hunan University of Science and Technology); Zhu, Xiaoyu (Changsha University); Zhang, Shaobo (Hunan University of Science and Technology)

Privacy-Enhanced Multi-Modal Feature Fusion for E Commerce: A Novel Approach to Image and Text Retrieval 

Zhang, Yanrong (School of Computer and Information Engineering, Harbin University of Commerce); Chen, Bin (School of Computer and Information Engineering, Harbin University of Commerce); Xu, Chi (School of Computer and Information Engineering, Harbin University of Commerce); Liang, Jiale (Harbin University of Commerce)

LPFL-RL: A Lightweight Privacy-Preserving Federated Learning Scheme with Robustness Against Low-Quality Users in Cloud-Edge Collaborative Environments 

Ren, Feixiang (School of Computer Science and Engineering, Hunan University of Science and Technology); Zhang, Shiwen (Hunan University of Science and Technology); Liang, Wei (School of Computer Science and Engineering, Hunan University of Science and Technology); Chen, Shuang (School of Computer Science and Engineering, Hunan University of Science and Technology); Li, Kuanching (Hunan University of Science and Technology)

Defending Against Malicious Clients in Robust Heterogeneous Federated Learning 

Wang, Zijun (Beijing Institute of Technology); Gai, Keke (Beijing Institute of Technology); Yu, Jing (Minzu University of China); Zhu, Liehuang (Beijing Institute of Technology, China)

A Safety-Optimized Two-Stage Algorithm for Rural School Bus Route Planning with Heterogeneous Fleets and Mixed Loads

 zhang, cezhe (Hunan University of Science and Technology); zhang, qiongbing (Hunan University of Science and Technology)

Log Semantic Parsing with Prompt-based Few-shot Learning 

He, Shiming (Changsha University of Science and Technology); Long, Siru (Changsha University of Science and Technology); Wu, Gan (Changsha University of Science and Technology); Liang, Diqing (Changsha University of Science and Technology); Xie, Kun (Hunan University)

PPCM-Fed: Privacy-Preserving Cross-Modal Federated Learning in IoT 

Wang, Dongjue (Beijing Institute of Technology); Gai, Keke (Beijing Institute of Technology); Yu, Jing (Minzu University of China); Wang, An (Beijing Institute of Technology); Cao, Zhijing (Beijing Institute of Technology); Zhu, Liehuang (Beijing Institute of Technology)

Comprehensive Commits Security Testing with Enhanced Multi-Target Directed Fuzzing 

Wang, Xiaolei (National University of Defense Technology); Feng, Chao (National University of Defense Technology)

Dynamic Dual-Anonymous Lightweight Authentication Protocol Based on Hierarchical Certificateless Key for Cross-Domain V2G 

Xia, Zhuoqun (Changsha University of Science & Technology); wang, xin (Changsha University of Science & Technology)

A Social-Relationship and Geospatial-Aware Incentive Mechanism for Privacy-Preserving Mobile Crowdsensing 

Zhang, Minghe (Guilin University of Electronic Technalogy)

Replication-Based Fault-Tolerant Scheduling Algorithm for Heterogeneous Real-Time Systems

Yanghao, Yu (School of Computer Science and Technology, Wuhan University of Science and Technology, Wuhan, Hubei, China); Jiayin, Zhou (School of Computer Science and Technology, Wuhan University of Science and Technology, Wuhan, Hubei, China & Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System, Wuhan, China); Jing Wu (School of Computer Science and Technology, Wuhan University of Science and Technology, Wuhan, Hubei, China & Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System, Wuhan, China)

DF TransNet: Dual-channel Fusion Transformer for Image Deraining

Zhuo, He (School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan, China); Miao Liao (School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan, China); Shuanhu, Di (College of Intelligence Science and Technology, National University of Defense Technology, Changsha, China)

Routing Technology in Secure Quantum Networks

Jie, Xia (Hunan Software Vocational and Technical University, China)