Accepted Papers
Titles:
Measuring Contextual Factors that Influence Real-World Walking Speed
Authors:
Ireson, Neil (The University of Sheffield); Lanfranchi, Vita (The University of Sheffield)
Diagnostic Hysteroscopy Electronic Health Record System
Authors:
Theodosiou, Alexandros (3AE Health LTD)
EghiFit: Smartphone based Behaviour Monitoring and Health Recommendation in a Weight Loss Intervention Study
Authors:
Ivezić, Dijana (University of Freiburg); Keppel, Jonas (University of Duisburg-Essen); Becker, Christine (Bodymed AG); Walle, Hardy (Bodymed AG); Schneegass, Stefan (University of Duisburg-Essen); Amft, Oliver (University of Freiburg)
Using Predictive Analysis and Wearables to Increase Physical Activity among Individuals with Disabilities- SMART Design
Authors:
Mohanraj, Sangeetha (University of Alabama at Birmingham); Thirumalai, Mohanraj (University of Alabama at Birmingham); Mendonca, Christen John (University of Alabama at Birmingham)
BeClean: Designing Personalized Eco-Feedback Application for Pro-Environmental Behavior
Authors:
Mahapasuthanon, Pattiya (George Mason University); Genaro Motti, Vivian (George Mason University)
Use of Gamified Monetary Rewards as a Means of Motivation towards Daily Self-Monitoring of Diabetes Management Behaviors
Authors:
Thirumalai, Mohanraj (The University of Alabama at Birmingham); John, Tejossy (The University of Alabama at Birmingham); Mehta, Tapan (The University of Alabama at Birmingham)
Improving Personalized Medicine via AI-based Precision Tracheostomy
Authors:
Toulkeridou, Evropi (CYENS Centre of Excellence); Kosmidou, Panagiota (German Oncology Center, Limassol, Cyprus); Vevis, Kristis (German Oncology Center, Limassol, Cyprus); Antoniou, Zinonas (3aHealth); Kallinos, Loizos (3aHealth); Valiandi, Ioanna (CYENS CoE); Panayides, Andreas (CYENS CoE)
Serious Games for Children with Motor Dysgraphia: Context and Requirements Analysis and Participatory Design Thinking Ideation
Authors:
Rettinger, Lena (University of Applied Sciences, FH Campus Wien); Hauser, Carina (University of Applied Sciences, FH Campus Wien); Gstöttner, Lisa-Sophie (University of Applied Sciences, FH Campus Wien); Goldschmid, René (University of Applied Sciences, FH Campus Wien); Schönthaler, Erna (University of Applied Sciences, FH Campus Wien); Putz, Peter (University of Applied Sciences, FH Campus Wien)
Physical Activity, Physical Function and Quality of Life in Midlife Women.
Authors:
Giggins, Oonagh (Dundalk Institute of Technology); Cullen-Smith, Suzanne (Dundalk Institute of Technology); Broeckx, Leen (Thomas More University of Applied Sciences); Sels, Romy (Thomas More University of Applied Sciences); Helsen, Kim (Thomas More University of Applied Sciences); Cuppens, Kris (Thomas More University of Applied Sciences)
Social Media and Its Impact on Orthorexia Nervosa. A Systematic Literature Review.
Authors:
Lecaj, Rron (SMK, College of Applied Sciences)
Main track
CLATM: A Contrastive Learning-Based FDIA Detection Method with Attention Timestamp Masking for REIoT
Xia, ZhuoQun (Changsha University of Science & Technology); Haidong, Tang Haidong (Tang); Lin, Xi (Changsha University of Science & Technology)
BFT-MS: Asynchronous BFT Protocol Using Bounded Memory
Cheng, Hao (Institute of Software Chinese Academy of Sciences, China); Kong, Fanyu (School of Software, Shandong University, China); Lu, Yuan (Institute of Software, Chinese Academy of Sciences, China); Zhang, Zhenfeng (Institute of Software, Chinese Academy of Sciences, China)
Unbalanced Secret Labeled Private Set Intersection via Scalable Dual-Load Bloom Filter
Yang, Kaijie (Beihang University); Guo, Hua (Beihang University); Guan, Yewei (Beihang University); Li, Weiwei (North China University of Water Resources and Electric Power)
From Dark Network to Honeypot: Analysis and Traceability of Multi-prefix IPv6 Network Attacks
Huang, Youjun (Tsinghua University); Li, Xiang (Nankai University); Miao, Fasheng (Tsinghua University); Duan, Haixin (Tsinghua University); Zhang, Jia (Tsinghua University)
On Analyzing SSO Permissions Across Web and Android Platforms
Rezaei, Fahimeh (Concordia); Lupinacci, Matteo (University of Calabria); Mannan, Mohammad (Concordia University); Youssef, Amr (Concordia University)
Hardware-assisted Secure Decentralized Cloud Storage via Self-audit and Self-repair
Dafoe, Josh (Michigan Technological University); Chen, Niusen (University of Wisconsin-La Crosse); Chen, Bo (Michigan Technological University)
FlipStress: Noise Injection Defenses Against CPU-cache-based Web Attacks
Basak, Tapan (New Jersey Institute of Technology); Curtmola, Reza (New Jersey Institute of Technology); Oren, Yossi (Ben Gurion University); Phan, Hai (New Jersey Institute of Technology)
PEARL: A Reinforcement Learning-Based Attack Analysis Approach for Security and Robustness Assessment of Smart Home Systems
Haque, Nur Imtiazul (University of Cincinnati); Rahman, Mohammad Ashiqur (Florida International University); Uluagac, A. Selcuk (Florida International University); Njilla, Laurent (Air Force Research Laboratory)
DASPN: A Multi-level Security Protection Model for Northbound Interface Based on Dynamic Access Control
Huang, Yining (Beijing University of Posts and Telecommunications); Guan, Jianfeng (Beijing University of Posts and Telecommunications); Gu, Yilan (Beijing University of Posts and Telecommunications); Liu, Kexian (Beijing University of Posts and Telecommunications)
BFDet: A Method for Detecting Malicious Traffic with Ultra-Low False Positive Rate Based on TLS Behavior Flow
Guo, Zhongyu (Key Laboratory of Cyberspace Security, Ministry of Education); Lu, Bin (Key Laboratory of Cyberspace Security, Ministry of Education); Sun, Rongbo (Key Laboratory of Cyberspace Security, Ministry of Education, Zhengzhou 450001, China); Wu, Wei (Key Laboratory of Cyberspace Security, Ministry of Education); Li, Ding (Key Laboratory of Cyberspace Security, Ministry of Education); Lin, Xiangnan (Key Laboratory of Cyberspace Security, Ministry of Education); Wang, Chengyu (Key Laboratory of Cyberspace Security, Ministry of Education)
When VR is Not Just for Gaming: Unmasking GPU Resource Misuse on VR Headset
Yang, Dianshi (University of Delaware); Gao, Xing (University of Delaware)
A Few-Shot-Based Model-Agnostic Meta-Learning for Intrusion Detection in Secure of In-vehicle Network
Xu, Yingjie (Shanghai University); Li, Yufeng (Shanghai University); Zhang, Guiqi (Shanghai University); Shen, Jun (Shanghai University)
ESKNN:Efficient Secure KNN Query Based On 3-Party Secure Computation
Zhao, Peijun (National University of Defense Technology); Zhao, Xianan (National University of Defense Technology); Liu, Lin (National University of Defense Technology); Fu, Shaojing (National University of Defense Technology); Luo, Yuchuan (National University of Defense Technology)
An Enhanced Credit-Based Shaper for Audio-Video Bridging Streams in TSN
Huang, WeiHong (Hunan University of Science and Technology); Xu, Zhen (Hunan University of Science and Technology); Shi, Min (Hunan University); Huang, Jing (Hunan University of Science and Technology)
A Self-adaptive Moving Target Defense Decision-making Method Based on Bounded-rationality Supermodular Games
Sun, Rongbo (Key Laboratory of Cyberspace Security, Ministry of Education, Zhengzhou 450001, China); Fei, Jinlong (Key Laboratory of Cyberspace Security, Ministry of Education, Zhengzhou 450001, China); Zhu, Yuefei (Key Laboratory of Cyberspace Security, Ministry of Education, Zhengzhou 450001, China)
MDC-Net: Multi-Dimensional Cross-Domain Collaborative Network for Image Manipulation Localization
Chen, Jiaxin (Changsha University of Science and Technology); Wei, Yawen (Changsha University of Science and Technology); Cai, Shengxin (Changsha University of Science and Technology); Zhang, Dengyong (Changsha University of Science and Technology)
Two Birds with One Stone: Multi-Task Detection and Attribution of LLM-Generated Text
Liu, Zeyan (University of Louisville); Rao, Zixin (University of Louisville); Mohamed, Youssef (University of Louisville); Liu, Shang (University of Chinese Academy of Sciences)
Now Let’s Make It Physical! Enabling Trusted Certificate Issuance in PKI via Physical Bindings for CAs
Zhang, Xiaolin (Shanghai Jiao Tong University); Chen, Chenghao (Shanghai Jiao Tong University); Qin, Kailun (Shanghai Jiao Tong University); Wang, Yuxuan (Shanghai Jiao Tong University); QU, Shipei (Shanghai Jiao Tong University); Wang, Tengfei (Shanghai Jiao Tong University); Zhang, Chi (Shanghai Jiao Tong University); Gu, Dawu (Shanghai Jiao Tong University)
DCAPSCR: A Decentralized Conditional Anonymous Payment System With Collaborative Regulation
Zhang, Jing (Nanjing University of Aeronautics and Astronautics); Tao, Yu (Nanjing University of Aeronautics and Astronautics); Zhou, Lu (Nanjing University of Aeronautics and Astronautics)
One Trace is Possible: A Method for Small-Sample Profiling Side-Channel Analysis in Communication Environments
Wang, Chen (Zhejiang Sci-Tech University); Sun, Tianlong (Zhejiang Sci-Tech University); Shen, Jian (Zhejiang Sci-Tech University)
DARD: Dice Adversarial Robustness Distillation Against Adversarial Attacks Zou, Jing (AUGUSTA university); Zhang, Shungeng (Augusta University); Qiu, Meikang (Augusta University)
Leveraging Semantic Features and Graph Structures for Intelligent Vulnerability Detection in Smart Contracts
ruxin, Chen (hunan normal university)
Multi-Dimensional Cost-Driven LDSP Instruction Scheduling Optimization
Peng, Ting (Hunan University Of Science And Technology); Shi, Min (Hunan University); Zhou, lian Xin (Hunan University of Science and Technology)
Meta-Distillation: A Novel Adversarial Distillation Network for Adversarial Robustness
Okumali, Richard (Donghua University)
RdBFT: Faster Asynchronous BFT Protocol through Random Binary Agreement
Zhuang, Chaofeng (East China Normal University); Qian, Haifeng (East China Normal University)
MFRWF: Enhance Website Fingerprinting Robustness Against website content updates and background noise traffic
Chen, Siyang (University of Science and Technology of China); Jin, Dong (Institute of Artificial Intelligence); Ma, Yuanyi (University of Science and Technology of China); Chen, Shuangwu (University of Science and Technology of China); Hou, Yunpeng (Institute of Artificial Intelligence); Yang, Jian (University of Science and Technology)
Att-SFI: Attestable software sandboxing with control flow integrity
Li, Wei (University of Chinese Academy of Sciences; Institute of Software, Chinese Academy of Sciences); Feng, Wei (Institute of Software, Chinese Academy of Sciences); Qin, Yu (Institute of Software, Chinese Academy of Sciences); Gu, Zeyu (Xiaomi Corperation)
Privacy-preserving Preselection for Face Identification Based on Packing
Xin, Rundong (shenzhen university); Wang, Taotao (Shenzhen University); Wang, Jin (Sanya Institute of Hunan University of Science and Technology); Zhao, Chonghe (Guangzhou University); Wang, Jing (Changsha University of Science and Technology)
FL(DP)2 : Federated Learning with Dynamic Personalized Differential Privacy
Shi, Cuiyun (Inner Mongolia University of Science and Technology); Wang, Jingyu (Inner Mongolia University of Science and Technology); Liu, Lixin (Renmin University of China); Chang, Xin (Inner Mongolia University of Science and Technology); Pu, Yini (Inner Mongolia University of Science and Technology)
Hamk-CFI: A Hardware-assisted Kernel Control Flow Protection Framework For Cloud Environments
Sun, Rui (Nanjing University); Su, Chao (Changshu Institute of Technology); Zeng, Qingkai (Nanjing University)
A Verifiable Federated Learning Aggregation Scheme Based on Homomorphic Hashing
Huang, Jialun (Changsha University of Science and Technology); Xu, Zisang (Changsha University of Science and Technology); Gu, Ke (Changsha University of Science and Technology); Zhu, Zhi (Changsha University of Science and Technology)
MOT-Fuzz: A Novel Directed Greybox Fuzzing with Multiple Ordered Target Basic Blocks for Multistep Vulnerabilities
Li, Kangrui (Beijing University of Posts and Telecommunications); Zhou, Zan (Beijing University of Posts and Telecommunications); Yang, Shujie (Beijing University of Posts and Telecommunications); Xu, Changqiao (Beijing University of Posts and Telecommunications)
A Lightweight Image Steganography Scheme Based on Invertible Neural Network Architecture with Progressive Channel Attention
Li, Qingru (Hebei Normal University); Yang, Ruoyao (Hebei Normal University); Wang, Fangwei (Hebei Normal University); Wang, Changguang (Hebei Normal University); Zhang, Xi (Hebei Normal University); Babaagba, Kehinde O. (Edinburgh Napier University); Tan, Zhiyuan (Edinburgh Napier University)
Consortium Blockchain-Based Anti-Plagiarism Scheme for Multi-NFT Marketplaces
Gao, Jie (Zhejiang University of Technology); Liu, Gang (Shenzhen Institute for Advanced Study, University of Electronic Science and Technology of China); Zhou, Kun (Zhejiang University of Technology); Cheng, HongBing (Zhejiang University of Technology)
Flow Dissector: A Flow Slicing Representation with a Pre-trained Model for Varied Malicious Traffic Classification
Jiang, Jun (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China); Dong, Fangming (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China); Guo, Lingjia (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China); Jiang, Zhengwei (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China); Liu, Baoxu (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China); Zhang, Kai (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China)
OptiGame: Game-Theoretic Enhancements for Optimistic Rollups through Bayesian Strategies
Khalil, Alvi Ataur (Florida International University); Hasan, Md Golam Moula Mehedi (Iona University); Rahman, Mohammad Ashiqur (Florida International University)
A_Double_Layer_Blockchain_Assisted_Anonymous_Cross_Domain_Authentication_and_Transaction_Scheme_for_Metaverse
Chen, Yubo (Changsha University of Science and Technology); Xu, Zisang (Changsha University of Science and Technology); Meng, Xiangwei (Hunan University of Science and Technology); Huan, Zhenhao (Changsha University of Science and Technology)
PIRchain: Blockchain-Enhanced Privacy-Preserving Inter-domain Routing
Lei, Xiaohan (Beijing University of Posts and Telecommunications); Tian, Ye (Beijing University of Posts and Telecommunications); Yang, Yuan (Tsinghua University); Zhang, Runhao (Beijing University of Posts and Telecommunications); Que, Xirong (Beijing University of Posts and Telecommunications); Gong, Xiangyang (Beijing University of Posts and Telecommunications)
LLM-Augmented Fuzzing for Unveiling PLC Web Application Vulnerabilities Impacting Physical Control
Cheng, Jiaxing (Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS); Fang, Dongliang (Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS); Gu, Zhongwei (Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS); Lv, Shichao (Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS); Si, Shuaizong (Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS); Sun, Limin (Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS)
Decentralized Role Rotation Privacy Protection in Federated Learning
wan, changxu (Hunan University of Science and Technology); Shi, Min (Hunan Univeristy); Wang, Ying (Hunan University of Science and Technology); Gong, Bo (Hunan University of Science and Technology); Xu, Jianbo (Hunan University of Science and Technology)
XRwatcher: A Detection Scheme for XR Privacy Speculation Attacks Base on Traffic Analysis
Zhang, Hao (Xidian University); Li, Guohao (Xidian University); Yang, Li (Xidian University); Wang, Jiangyu (Xidian University); Yang, Ruiyuan (Xidian University); Yang, Huipeng (Xidian University)
Fair Exchange of Trained Machine Learning Models Based on Permissioned Blockchain and Zero-Knowledge Contingent Payment
Xu, Shiwei (Huazhong Agricultural University); Wu, Hang (Huazhong Agricultural University); Yin, Jiangjin (Huazhong Agricultural University); Peng, Zhe (Hong Kong Polytechnic University); Tong, Yan (Huazhong Agricultural University); Ren, Zhengwei (Wuhan University of Science and Technology); Du, Le (Wuhan East Lake Big Data Technology Co. Ltd)
Late track
SaFeBridge: Consensus-Agnostic Asset Transfer with Slow-Approval Fast-Exit Principles
Deng, Fuyang (Beihang Univeristy); Wu, Qianhong (Beihang University, China); Dai, Xiaopeng (Beihang University, China); Geng, Yifu (Beihang University, China); Qin, Bo (Renmin University of China)
Insights into Ransomware Detection based on Semantic Understanding
Zhao, Lingbo (Institute of Information Engineering, Chinese Academy of Sciences); Wang, Shuquan (School of Control Science and Engineering, Shandong University); Wang, Zhilu (Institute of Information Engineering, Chinese Academy of Sciences); Zhang, Yuhui (Institute of Information Engineering, Chinese Academy of Sciences); Hou, Rui (Institute of Information Engineering, Chinese Academy of Sciences,)
Adaptive On-Chain and Off-Chain Communication Management Based on SDN and Blockchain
Huang, Daming (Nanjing University); Xiang, JinCheng (Nanjing University); Jin, Yu (Nanjing University); Tian, Chen (Nanjing University)
Joint Beamforming and Reflection Design for Physical Layer Security in RIS-Assisted Integrated Sensing and Communication Systems
Guo, Sitong (Inner Mongolia University,); Hao, Zheng (Inner Mongolia University); Zhang, Yinghui (Inner Mongolia University); Yan, Junkun (Xidian University)
Real-World Image Dehazing via Degradation Modeling, Spectral-Spatial Fusion, and Prior Guidance
Rong, Jiali (School of Computer Science and Engineering, Hunan University of Science and Technology); Liao, miao (School of Computer Science and Engineering, Hunan University of Science and Technology); Di, Shuanhu (College of Intelligence Science and Technology, National University of Defense Technology)
Dependency Tree-based Multi-Task Learning for Extracting Process Models in Safety Management
Su, Xiaoyang (School of Computer Science and Engineering, Hunan University of Science and Technology, China); Wen, Yiping (School of Computer Science and Engineering, Hunan University of Science and Technology, China)
The Framework Of Variational Mode Decomposition Based For DDoS Detection
yizhun, tian (civil aviation flight university of china); Lu, Jing (Civil Aviation Flight University of China); jia, ruchun (sichuan university)
Antitoxin: A Framework for Controlling Persistent Backdoors in Federated Learning
Karamchandani, Neeraj (The Pennsylvania State University); Wu, Chen (The Pennsylvania State University); Nagasubramaniam, Piyush (The Pennsylvania State University); Wu, Dinghao (Pennsylvania State University); Zhu, Sencun (Pennsylvania State University)
A Loop Elimination Method Based on Vector DSP Processor with Immediate Addressing Incorporation
Zhihao, Li (Hunan University of Science and Technology)
Complementary Ensemble Empirical Mode Decomposition and Permutation Entropy-Empowered Network Traffic Anomaly Detection for Secure QUIC Communications liang, shan (Jiangxi Normal University); Ming, Jiang (Jiangxi Normal University); Cao, Yuanlong (Jiangxi Normal University)
FLARE: Feature-based Lightweight Aggregation for Robust Evaluation of IoT Intrusion Detection
Boswell, Bradley (Augusta University); Barrett, Seth (Augusta University); Rajaganapathy, Swarnamugi (Digital Forensics & Artificial Intelligence Research Lab); Dorai, Gokila (Augusta University); Qiu, Meikang (Augusta University)
The RPKI and Its Hidden Guardians: An Empirical Analysis of Their Relationship and Security Implications
zou, hui (Computer Network Information Center); He, Yizhuo (Computer Network Information Center, Chinese Academy of Sciences); Jin, Yuxiang (Computer Network Information Center, Chinese Academy of Sciences)
SCFA: Stacked Classifier with Feature Augmentation for Imbalanced Node Classification in Intelligent Internet-of-Things
Luo, Cuiting (Changsha Medical University); Duan, Yuanjie (Changsha Medical University); Liu, Cuicui (Changsha Medical University); Li, Hongyan (Changsha Medical University); Long, Jing (Hunan Normal University)
Clark: a Transferable APT Detection Framework via Self-Supervised Contrastive Learning
Zhang, Shuyi (Institute of Information Engineering, Chinese Academy of Sciences); Wen, Yu (Institute of Information Engineering, Chinese Academy of Sciences); Feng, Jingjing (Institute of Information Engineering, Chinese Academy of Sciences); Cui, Wenzhuo (Institute of Information Engineering, Chinese Academy of Sciences)
Investigating How Trading Patterns and Twitter Impact the CryptoPunks NFT Market
Tang, Mingdong (Hunan University of Science and Technology); Liu, Yuxiang (Macau University of Science and Technology)
A Novel Multi-Graph Spatial-Temporal Graph Neural Network Model for Traffic Prediction
Diao, Chunyan (Information Engineering University); Zhang, Yanrong (Harbin University of Commerce\Computer and Information Engineering); Ma, jinquan (Information Engineering University); Ouyang, Xi (Information Engineering University); Guo, Lixiang (Information Engineering University); Huo, Sheng (Zhuzhou CRRC Times Electric Co., Ltd); Shen, Tong (Huawei); Li, Kuanching (Hunan University of Sciences and Technology/Computer Science and Engineering)
IncreTTP: An Incremental TTPs Classification Model
Liu, Yixiang (Sichuan university); Wang, Junfeng (Sichuan university); Ge, Wenhan (Sichuan University)
A Maximizing Duty-Cycle network Lifetime Cooperative Routing algorithm in a Smart Community Scenario
Ji, Zhang (Changsha Social Work College); He, Shiming (Changsha University of Science and Technology); Yan, Zhi (Changsha Social Work College); Chen, Dan (Changsha Social Work College)
A Robustness Optimization Mechanism for Intrusion Detection Models Based on Dynamic Ensemble Learning
Ji, Jianshou (College of Computer and Data Science, Fuzhou University); Lin, Weiwei (College of Computer and Data Science, Fuzhou University); Liu, Hongyan (College of Computer Science and Technology, Zhejiang University); Zhang, Dong (Fuzhou University); Lin, Shengrui (College of Computer and Data Science, Fuzhou University); Zhu, Longlong (College of Computer and Data Science, Fuzhou University); Wu, Chunming (Zhejiang University); Xu, Shaowei (College of Computer and Data Science, Fuzhou University)
Knowledge Distillation for Federated Learning with Many Noisy Clients
Peng, Liang (Hunan University of Science and Technology); Jiang, Zoufeng (Hunan University of Science and Technology); Chen, Yuxiang (Hunan University of Science and Technology)
Security Detection Method for Wireless Sensor Networks Based on Self-Supervised Learning and Deep Learning
yu, jintao (Harbin University of Commerce); wang, xiaowen (Harbin University of Commerce); liu, he (Harbin University of Commerce); meng, ke (Harbin University of Commerce)
RADBench: A Comprehensive Benchmark for Internet Routing Anomaly Detection
Wang, Xiaolan (Computer Network Information Center, Chinese Academy of Sciences); Nie, Xiaohui (Computer Network Information Center, Chinese Academy of Sciences); Wang, Yuye (Hangzhou Institute for Advanced Study, University of Chinese Academy of Sciences); Chen, Luyao (Computer Network Information Center, Chinese Academy of Sciences); Wu, Zheng (Nanjing University of Posts and Telecommunications); Fu, Yu (China Unicom Research Institute); Shang, Jiang (Computer Network Information Center, Chinese Academy of Sciences); Du, Congshu (Computer Network Information Center, Chinese Academy of Sciences); Pei, Dan (Tsinghua University)
Security-Aware and Energy-Efficient Federated Learning in LEO Satellite Edge Micro-clouds: A Noise-Adaptive Allocation Framework
Teng, ShuYang (Hunan University); Qiao, Ying (Hunan University); Luo, Juan (Hunan University); Zeng, GuoGen (Hunan University)
HIDE: Anonymous Hop-by-Hop Identity Authentication Based on Dynamic Address Label Embedding
Hu, Xiaolong (Beijing University of Posts and Telecommunications); Guan, JianFeng (Beijing University of Posts and Telecommunications); Liu, Kexian (Beijing University of Posts and Telecommunications); Liu, Jianli (Beijing University of Posts and Telecommunications); Qin, Ye (Beijing University of Posts and Telecommunications); Yao, Su (Tsinghua University)
Login, Logout, Reset: Measuring Security and Privacy Issues in Real-World Web Logins
Lamisa, Kazi Farhat (Concordia University); Mannan, Mohammad (Concordia University); Youssef, Amr (Concordia University)
A Geographical Entity Relation Extraction Method Based on Improved OneRel Model
Jing, Luo (Hunan University of Science and Technology); Jiang, Zhao Yi (Hunan University of Science and Technology); Wu, Li Qiu (Hunan University of Science and Technology)
BMI: A Bidirectional Spatio-Temporal Selective State Space Model for Data Imputation
Wen, Jigang (Hunan University of Science and Technology); Nie, Wenqian (Hunan University); Li, Xiaocan (Hunan University); xie, kun (hunan university); Xie, Yong (Nanjing University of Posts and Telecommunications); Chen, Yuxiang (Hunan University of Science and Technology); Fu, Zigeng (Hunan University); Feng, Quan (Hunan Vanguard Group Corporation Limited)
SG-SCA: An Interpretable Side-Channel Analysis Model Based on Shapelet and Graph Attention Network
Guo, Yaxing (Institute of Information Engineering, Chinese Academy of Sciences, China; School of Cyber Security, University of Chinese Academy of Sciences, China); You, Shilong (Institute of Information Engineering, Chinese Academy of Sciences, China; School of Cyber Security, University of Chinese Academy of Sciences, China); Peng, Tingting (Institute of Information Engineering, Chinese Academy of Sciences, China; School of Cyber Security, University of Chinese Academy of Sciences, China); Du, Jianfeng (Institute of Information Engineering, Chinese Academy of Sciences, China; School of Cyber Security, University of Chinese Academy of Sciences, China); Wang, Zhu (Institute of Information Engineering, Chinese Academy of Sciences, China; School of Cyber Security, University of Chinese Academy of Sciences, China); Yu, Aimin (Institute of Information Engineering, Chinese Academy of Sciences, China; School of Cyber Security, University of Chinese Academy of Sciences, China)
Log Anomaly Detection based on Time-Delta Sequential Feature
Wen, Jigang (Hunan University of Science and Technology); Ma, Chenying (Hunan University); He, Shiming (Changsha University of Science and Technology); xie, kun (hunan university); Xie, Yong (Nanjing University of Posts and Telecommunications); Chen, Yuxiang (Hunan University of Science and Technology)
The Decision of Monotonic Automata
Long, Qingxia (Hunan University of Science and Technology); He, Yong (Hunan University of Science and Technology); Cui, Zhenhe (Hunan University of Science and Technology)
CCGCRN: Cluster and Completion Graph Convolution Recurrent Network for Incomplete Traffic Flow Forecasting
Xie, Ruotian (Hunan university); Wen, Jigang (Hunan University of Science and Technology); liu, Caiping (Hunan University); jin, Yani (Hunan University); xie, kun (hunan university); He, Shiming (Changsha University of Science and Technology); Li, Kuanching (Hunan University of Science and Technology)
Document Image Tampering Detection based on Multi-domain Feature Consistency
Chen, Jiaxin (Changsha University of Science and Technology); Sun, Long (Changsha University of Science and Technology); Zhang, Dengyong (Changsha University of Science and Technology)
Securing Snapshot Pruning in IOTA Tangle 2.0: A Cooperative Deep Reinforcement Learning Approach for Edge-Cloud Smart Meter Networks
Palaniswamy, Basker (University College Cork)
A Re-authentication Scheme based on Blockchain and Reinforcement Learning
Chen, Zixuan (Hunan University of Science and Technology); Li, Chuncao (Hunan University of Science and Technology); Zeng, Pengjie (Central South University); Zhou, Lian (Hunan University of Science and Technology); Ai, Yuanyuan (Hunan University of Science and Technology); Wang, Xiaoliang (Hunan University of Science and Technology)
More Bang for Your Buck: Gaining Collateral Benefit from Partial ROV Deployment
Chen, Yuxuan (Computer Network Information Center, Chinese Academy of Sciences); zou, hui (Computer Network Information Center, Chinese Academy of Sciences); Li, Yanbiao (Computer Network Information Center, Chinese Academy of Sciences); Wang, Xin (Stony Brook University); XIE, Gaogang (Computer Network Information Center, Chinese Academy of Sciences)
FedCLF: Contrastive Learning-driven Framework for Mitigating Data Heterogeneity in Federated Learning
Bai, Chunming (Xiangtan university); Zhang, Heng (Economic Development Zone Branch of Zhuzhou Public Security Bureau); Xie, Yong (Xiangtan University); Su, Xin (Hunan Police Academy); Zhu, Xiangyuan (Hunan Police Academy); Kang, Wenjie (Hunan Police Academy); Liu, Xuchong (Hunan Police Academy)
Heterogeneity-aware semi-asynchronous federated learning
He, Junying (Hunan University of Science and Technology); Chen, Yuxiang (Hunan University of Science and Technology); Xie, Kun (Hunan University); Wen, Jigang (Hunan University of Science and Technology); Cong, Yincuan (Hunan University); Chen, Xiaoyan (Xiamen University of Technology); Liu, Tianxiong (Hunan Aerospace Hospital)
SAFE: A Fast Privacy-Preserving Scheme for Multi-Client Face Verification
Xu, Guotao (Xidian University); Zhao, Bowen (Xidian University); Zhong, Yantao (China Resources Intelligent Computing Technology Co., Ltd.); Ma, Zhaoting (Chinese Academy of Surveying and Mapping); Qiao, Cheng (Guangzhou University); Pei, Qingqi (Xidian Univeristy)
FedSND:Federated Learning with Symmetric Noise Decentralized Orthogonal Encryption
Yang, Chaoyi (Hunan University of Science and Technology); Tan, Wentao (Hunan University of Science and Technology); Chen, Yuxiang (Hunan University of Science and Technology); Wen, Jigang (Hunan University of Science and Technology); Cong, Yinchuan (Hunan University); Xie, Kun (Hunan University); Chen, Xiaoyan (Xiamen University of Technology); Liu, Tianxiong (Hunan Aerospace Hospital)
Task-Driven GAN for Class-Imbalanced Intrusion Detection
Ma, Yangle (KTH); Hao, Rijie (Aalto university); Huo, Sheng (ZHUZHOU CRRC TIMES ELECTRIC CO., LTD); Jiang, Ping (ZHUZHOU CRRC TIMES ELECTRIC CO., LTD)
Protecting Medical Image Privacy by Using Chaos Encryption and Blockchain
Liu, Yu (Hunan University); Wan, Wanglong (Hunan University); Yan, Zhenxiong (Hunan University); Song, Fuyuan (Nanjing University of Information Science and Technology); Jin, Wenqiang (Hunan University); Qin, Zheng (Hunan University); Deng, Minggao (Hunan Xiangneng Intelligent Electric Appliance Co., Ltd)
Location Privacy Protection for VANETs based on Dynamically Adjustable Security Coefficient
Yin, Luxiu (Hunan University of Science and Technology); Chen, QiHong (Hunan University of Science and Technology); Liu, Jianyu (Hunan University); Wang, Chun (Hunan Normal University); Luo, Juan (Hunan University); Li, Kuanching (Hunan University of Science and Technology)
An Intrusion Detection-Based Location Privacy Protection Algorithm for VANETs
Yin, Luxiu (Hunan University of Science and Technology); Zhu, Kaifeng (Hunan University of Science and Technology); Luo, Juan (Hunan University); Liu, Jianyu (Hunan University); Huang, Jing (Hunan University of Science and Technology); Li, Kuanching (Hunan University of Science and Technology)
BDSV: A Blockchain-based Reliable and Efficient Batch Digital Signature Verification Scheme for IoV
Cai, Jiahong (Hunan University of Science and Technology); Meng, Xiangwei (Hunan University of Science and Technology); Huo, Yingzi (Hunan University of Science and Technology); Wu, Yanbing (Hunan University of Science and Technology); Liang, Jiale (Harbin University of Commerce)
pFedDDS: Personalized Federated Learning via Dual defense Strategies
Xie, Rui (Hunan University of Science and Technology); Song, Qiang (Hunan University of Science and Technology); Chen, Linshu (Hunan University of Science and Technology); Hu, Na (Hunan University of Science and Technology); Wen, Jigang (Hunan University of Science and Technology)
Revocable and Verifiable Key Aggregate Searchable Encryption for Flexible Data Sharing
Zhang, Shiwen (Hunan University of Science and Technology); Huang, Jiahao (Hunan University of Science and Technology); Zhou, Xinlian (Hunan University of Science and Technology); Liang, Wei (School of Computer Science and Engineering, Hunan University of Science and Technology); Li, Kuanching (Hunan University of Science and Technology)
An Energy-Aware Scheduling Algorithm for Multi-period Parallel Applications on Heterogeneous Systems
Huang, Jing (Hunan university of science and technology); Chen, Yuhong (Hunan University of Science and Technology)
Optimized Entanglement Routing for Enhanced Quantum Key Distribution Performance in Quantum Networks Zhang, Hongding (Hunan University of Science and Technology); Huo, Sheng (ZHUZHOU CRRC TIMES ELECTRIC CO., LTD); Jiang, Ping (ZHUZHOU CRRC TIMES ELECTRIC CO., LTD)
SVD-Based Efficient Communication Scheme for Heterogeneous Federated Learning
Tang, Zhenyu (Hunan University of Science and Technology); Xiao, JiaHong (Hunan University of Science and Technology); Chen, Yuxiang (Hunan University of Science and Technology); Tang, Yuanqiang (Xinyu University); Liu, Tianxiong (Hunan Aerospace Hospital)
Causal-Driven Multi-Objective Grey Wolf Optimization Framework for Multidimensional Redundant IoT Traffic Intrusion Detection
Zeng, ZengRi (Hunan University of Humanities, Science and Technology); Zhao, Baokang (National University of Defense Technology); Huang, Keke (Central South University); Zhang, Shiwen (Hunan University of Science and Technology); Kang, Aimei (Hunan University of Humanities, Science and Technology)
Spatiotemporal Cross-Domain Integrated Insights: Mitigating Fraudulent Activities on Ethereum
Shi, Yuduo (Zhejiang University); Li, Zhao (Hangzhou Yugu Technology); Xu, Haitao (Zhejiang University); Wang, Yanbin (Shenzhen MSU-BIT University); Ma, Wenrui (Zhejiang Gongshang University); Zhang, Ji (University of Southern Queensland)
Low Energy Consumption Hierarchical Federated Learning
Zhang, Shenaocheng (Hunan university of science and technology); Chen, Yuxiang (Hunan University of Science and Technology); Zhou, Xiaofan (Hunan University of Science and Technology); Wen, Jigang (Hunan University of Science and Technology); Xie, Kun (Hunan University); Cong, Yinchuan (Hunan University); Chen, Xiaoyan (Xiamen University of Technology); Liu, Tianxiong (Hunan Aerospace Hospital Fenglin road)
Cryptocurrency Transaction Anomaly Detection Based on Semi-Supervised Learning and Graph Neural Network
Chen, Renguang (Fujian Normal University); Zeng, Lei (Fujian Normal University); Wang, Huiqing (Fujian Normal University); Chen, Zhide (Fujian Normal University); Yang, Xu (Minjiang University); Ruan, Zhiqiang (Minjiang University); Feng, Chen (Fuzhou Polytechnic); Zhu, Kexin (National Sun Yat-sen University); Yang, Xuechao (RMIT University)
Group-Based Parallel Split Federated Learning
Zhou, Xiaofan (Hunan University of Science and Technology); Xiao, Xiangqi (Hunan University of Science and Technology); Chen, Yuxiang (Hunan University of Science and Technology); Wen, Jigang (Hunan University of Science and Technology); Zhang, Shenaocheng (Hunan University of Science and Technology); Xie, Kun (Hunan University); Cong, Yinchuan (Hunan University); Chen, Xiaoyan (Xiamen University of Technology); Liu, Tianxiong (Hunan Aerospace Hospital)
DRLPO: A Deep Reinforcement Learning Distributed Partial Offloading Scheme for Fog Computing Networks
Xiao, JiaHong (Hunan university of science and technology); Chen, Yuxiang (Hunan University of Science and Technology); Yang, Chaoyi (Hunan University of Science and Technology); Wen, Jigang (Hunan University of Science and Technology); Tang, Yuanqiang (Xinyu University); Liu, Tianxiong (Hunan Aerospace Hospital Fenglin road)
A Fault-Tolerant Block Allocation Scheme for Collaborative-Storage Blockchain Systems
Dou, Yuanhang (Changsha University of Science and Technology); Yin, Bo (Changsha University of Science and Technology); He, Fajin (Changsha University of Science and Technology)
A Blockchain-based Four-factor Authentication and Key Agreement Protocol for Wireless Medical Sensor Networks
Gong, Bo (Hunan University of Science and Technology); Wu, Zhongqing (Hunan University of Science and Technology); Wang, Ying (Hunan University of Science and Technology); Xu, Jianbo (Hunan University of Science and Technology)
Research on Mixed-precision Optimization Compilation Methods for Loop Programs
Luo, Fan (School of Computer Science and Engineering, Hunan University of Science and Technology); Hu, Yonghua (School of Computer Science and Engineering, Hunan University of Science and Technology); Zhang, Huifu (School of Computer Science and Engineering, Hunan University of Science and Technology); Gao, Yvxiang (School of Computer Science and Engineering, Hunan University of Science and Technology); Xie, Anxing (School of Computer Science and Engineering, Hunan University of Science and Technology)
AquaCrossNet: An Underwater Cross-Granularity Complementary Segmentation Network
Chen, Linshu (Hunan University of Science and Technology)
A lightweight authentication protocol for resource-constrained WBAN
Yang, Huaiyao (Hunan University of Science and Technology); Huang, Xueting (Hunan University of Science and Technology); Chen, Xiaoyan (Xiamen University of Technology); He, Dacheng (Hunan University of Science and Technology); Xiao, Yufeng (Hunan Universityof Science and Technology)
Efficient Privacy-Preserving and Verifiable Arbitrary Polygon Range Query in Cloud Computing
Song, Fuyuan (Nanjing University of Information Science and Technology); Zhang, Fan (Nanjing University of Information Science and Technology); Fu, Zhangjie (Nanjing University of Information Science and Technology); Liu, Yu (Hunan University); Yin, Hui (Changsha University); Qin, Zheng (Hunan University)
ReForGe: A Fusion Model with Recursive Feature Engineering for PdM of Aircraft Engines
Huo, Yingzi (Hunan University of Science and Technology); Xiao, Yufeng (Hunan University of Science and Technology); Cai, Jiahong (Hunan University of Science and Technology); Wu, Yanbing (Hunan University of Science and Technology); Yang, Chengjun (Hechi University)
ECC-Based Certificate-less Aggregate Signatures Scheme for VANETs
Zeng, Peng (Hunan University of Science and Technology); Liu, Yue (Hunan University of Science and Technology); Liu, Guikai (Hunan University of Science and Technology); Liu, Yuzhen (Hunan University of Science and Technology); Wang, Xiaoliang (School of Computer Science and Engineering, Hunan University of Science and Technology)
EvasionEval: A Benchmark for LLMs in Evaluating Advanced Defense Evasion Techniques
Wang, Baojin (University of Electronic Science and Technology of China); Huang, Yichen (University of Electronic Science and Technology of China); Li, Xiong (University of Electronic Science and Technology of China); Yu, Jiguo (University of Electronic Science and Technology of China); Zhang, Xiaosong (University of Electronic Science and Technology of China)
FedCC: Robust Federated Learning against Model Poisoning Attacks
Jeong, Hyejun (UMass Amherst); Son, Hamin (UC Davis); Lee, Seohu (Johns Hopkins University); Hyun, Jayun (Hiippo T&C Inc.); Chung, Tai-Myoung (Hippo T&C Inc.)
TACA: Blockchain-Based Traceable and Anonymous Cross-Domain Authentication Scheme for IIoT
Liang, Yufeng (Nanjing University of Aeronautics and Astronautics); Meng, Xiangwei (Hunan University of Science and Technology); Deng , Hai (Florida International University)
A Hybrid Adaptive Large Neighborhood Search for Secure and Efficient Single School Routing Problem
Cui, Zhangwei (Hunan University of Science and Technology); Chen, Yitao (Hunan University of Science and Technology); Zhang, Qiongbing (Hunan University of Science and Technology); Pang, Rui (Hunan University of Science and Technology)
Privacy-Preserving Probability Fingerprinting Scheme with Collusion Resistance for Relational Databases
Pan, Jie (Nanjing University of Aeronautics and Astronautics); Ye, Xinxin (Nanjing University of Aeronautics and Astronautics); Liu, Bingbing (Nanjing University of Aeronautics and Astronautics); Deng, Hai (Florida International University)
Prompting Large Language Models for Data-Flow Analysis: Addressing Common Errors for Better Reasoning
Yu, Qingchen (Zhejiang University); Zhang, Jianshan (Minjiang University); Wu, Chunming (Zhejiang University)
BPGT: A Novel Privacy-Preserving K-Means Clustering Framework to Guarantee Local $d_{\chi}$-privacy
Chen, Fan (Hunan University of Science and Technology); Lei, Bizhi (Hunan University of Science and Technology); Zhu, Jielu (Hunan University of Science and Technology); Zhu, Xiaoyu (Changsha University); Zhang, Shaobo (Hunan University of Science and Technology)
Privacy-Enhanced Multi-Modal Feature Fusion for E Commerce: A Novel Approach to Image and Text Retrieval
Zhang, Yanrong (School of Computer and Information Engineering, Harbin University of Commerce); Chen, Bin (School of Computer and Information Engineering, Harbin University of Commerce); Xu, Chi (School of Computer and Information Engineering, Harbin University of Commerce); Liang, Jiale (Harbin University of Commerce)
LPFL-RL: A Lightweight Privacy-Preserving Federated Learning Scheme with Robustness Against Low-Quality Users in Cloud-Edge Collaborative Environments
Ren, Feixiang (School of Computer Science and Engineering, Hunan University of Science and Technology); Zhang, Shiwen (Hunan University of Science and Technology); Liang, Wei (School of Computer Science and Engineering, Hunan University of Science and Technology); Chen, Shuang (School of Computer Science and Engineering, Hunan University of Science and Technology); Li, Kuanching (Hunan University of Science and Technology)
Defending Against Malicious Clients in Robust Heterogeneous Federated Learning
Wang, Zijun (Beijing Institute of Technology); Gai, Keke (Beijing Institute of Technology); Yu, Jing (Minzu University of China); Zhu, Liehuang (Beijing Institute of Technology, China)
A Safety-Optimized Two-Stage Algorithm for Rural School Bus Route Planning with Heterogeneous Fleets and Mixed Loads
zhang, cezhe (Hunan University of Science and Technology); zhang, qiongbing (Hunan University of Science and Technology)
Log Semantic Parsing with Prompt-based Few-shot Learning
He, Shiming (Changsha University of Science and Technology); Long, Siru (Changsha University of Science and Technology); Wu, Gan (Changsha University of Science and Technology); Liang, Diqing (Changsha University of Science and Technology); Xie, Kun (Hunan University)
PPCM-Fed: Privacy-Preserving Cross-Modal Federated Learning in IoT
Wang, Dongjue (Beijing Institute of Technology); Gai, Keke (Beijing Institute of Technology); Yu, Jing (Minzu University of China); Wang, An (Beijing Institute of Technology); Cao, Zhijing (Beijing Institute of Technology); Zhu, Liehuang (Beijing Institute of Technology)
Comprehensive Commits Security Testing with Enhanced Multi-Target Directed Fuzzing
Wang, Xiaolei (National University of Defense Technology); Feng, Chao (National University of Defense Technology)
Dynamic Dual-Anonymous Lightweight Authentication Protocol Based on Hierarchical Certificateless Key for Cross-Domain V2G
Xia, Zhuoqun (Changsha University of Science & Technology); wang, xin (Changsha University of Science & Technology)
A Social-Relationship and Geospatial-Aware Incentive Mechanism for Privacy-Preserving Mobile Crowdsensing
Zhang, Minghe (Guilin University of Electronic Technalogy)
Replication-Based Fault-Tolerant Scheduling Algorithm for Heterogeneous Real-Time Systems
Yanghao, Yu (School of Computer Science and Technology, Wuhan University of Science and Technology, Wuhan, Hubei, China); Jiayin, Zhou (School of Computer Science and Technology, Wuhan University of Science and Technology, Wuhan, Hubei, China & Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System, Wuhan, China); Jing Wu (School of Computer Science and Technology, Wuhan University of Science and Technology, Wuhan, Hubei, China & Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System, Wuhan, China)
DF TransNet: Dual-channel Fusion Transformer for Image Deraining
Zhuo, He (School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan, China); Miao Liao (School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan, China); Shuanhu, Di (College of Intelligence Science and Technology, National University of Defense Technology, Changsha, China)
Routing Technology in Secure Quantum Networks
Jie, Xia (Hunan Software Vocational and Technical University, China)