default search action
12th ICCNS 2022: Beijing, China
- Proceedings of the 12th International Conference on Communication and Network Security, ICCNS 2022, Beijing, China, December 1-3, 2022. ACM 2022, ISBN 978-1-4503-9752-0
Chapter 1 Network Intrusion Detection and Attack Model
- Yueqi Zhang, Ruiping Yin, Zhen Yang:
Data Poisoning Attacks to Session-Based Recommender Systems. 1-6 - Ashley Barkworth, Rehnuma Tabassum, Arash Habibi Lashkari:
Detecting IMAP Credential Stuffing Bots Using Behavioural Biometrics. 7-15 - Aiming Wu, Shanshan Tu, Junwei Liu, Yihe Zhang, Yongjie Yang, Xuetao Bai:
Detection Scheme of Impersonation Attack Based on Sarsa(Lambda) Algorithm in Fog Computing. 16-22 - Ruihai Ge, Yongzheng Zhang, Shuhao Li, Guoqiao Zhou, Guangze Zhao:
Leveraging Zero-Payload Packets to Detect Mobile Malware based on Network Traffic. 23-29 - Tiaokang Gao, Xiaoning Jin, Yingxu Lai:
Model Heterogeneous Federated Learning for Intrusion Detection based on knowledge distillation. 30-35 - Yongjie Yang, Shanshan Tu, Haishuang Yan, Yihe Zhang, Aiming Wu, Xuetao Bai:
Deep Reinforcement Learning-Based Computation Offloading for Anti-jamming in Fog Computing Networks. 36-42
Chapter 2 Information Certification and Security Protection
- Abhishek Chopra, Nikhill Vombatkere, Arash Habibi Lashkari:
AuthAttLyzer: A Robust defensive distillation-based Authorship Attribution framework. 43-50 - Xue Liao, Yihua Zhou, Jiawei Xu, Shuaikun Xing, Wei Zou, Jin Zhou, Qi Wang, Zhenhu Ning:
Identity-based Linkable Blind Ring Signature Scheme on Lattice. 51-57 - Xiaoyan Wu, Xiaofeng Wang, Qianqian Xing:
Identity-Based Authentication Protocol for Trustworthy IP Address. 58-63 - Jin Zhou, Zhenhu Ning, Qi Wang, Yuchen Wang:
Embedded Real-time System Trusted Protection Technology for Supply Chain Scenarios. 64-68 - Luthfi Azhari, Ari Moesriami Barmawi:
Activity Attribute-Based User Behavior Model for Continuous User Authentication. 69-76 - Yang Yang, Zengtao Wei, Minming Huang:
Accountable Policy-Based Sanitizable Signature for Medical Data Sharing. 77-84 - Aiguo Li, Wenhao Yan:
Research on vulnerability assessment of physical protection system based on combined weighting-two-dimensional cloud model. 85-89 - Yu Hong, Zhenhu Ning:
A trusted construction mechanism for sever based on trusted hard disk. 90-97
Chapter 3 Password Information and Smart Navigation System
- Yanshuang Gui, Miaomiao Yang, Haishuang Yan, Yayun Guo, Qixu Wang, Xingshu Chen:
MURAS: An Efficient Multi-Value-Proof-Based Remote Attestation Scheme for Cloud Platform. 98-104 - Heera G. Wali, Nalini C. Iyer, Shraddha B. Hiremath:
Hardware Implementation of SPONGENT Lightweight Hash Algorithm. 105-109 - Aiguo Li, Jie Yang:
Multi-objective optimization algorithm for indoor positioning sensor deployment based on wireless network. 110-116 - Shisong Yang, Yuwen Chen, Shanshan Tu, Zhen Yang:
A Post-quantum Secure Aggregation for Federated Learning. 117-124 - Yidong Yuan, Tianmeng Zhang, Chaoyi Wang, Lu Tian, Jinchun Gao:
Impact of Common Mode Current Induced by Transformer on Electromagnetic Radiation in Digital Isolation Chip. 125-130 - Siyuan Yang, Yuhao Sun:
Status and Key Technologies of UAV-boat Cross-domain Collaborative Development. 131-139 - Yunwen Chen, Zheng Li, Weiru Wang:
A mutual authentication and key establishment scheme for peer to peer network scenario. 140-145
Chapter 4 Data Transmission and Security Mechanisms in IoT System
- Wei Zheng, Naixin Kang, Tao Ye, Haining Tan:
Trusted authentication mechanism oriented to network computing offloading at the perception layer. 146-151 - Xiaoliang Wang, Feng Zhang, Yanbo Ma, Wenjuan Dai, Yingying Jin:
Trust evaluation model based on improved Bayesian theory for the Internet of Things. 152-158 - Mansoor Khan, Shanshan Tu, Ghulam Abbas, Ziaul Haq Abbas, Hisham Alasmary, Muhammad Waqas:
A Reliable and Stable V2V Routing Scheme for Warning Message Dissemination in VANETs using Bi-Directional Clustering. 159-167 - Ming Wan, Minglei Hao, Yang Li, Jianming Zhao, Ying Li:
Insights on Cooperative Defense for Multiple Industrial Security Technologies. 168-173 - Wei Zheng, Naixin Kang, Tao Ye, Qi Wang:
Trusted Authentication Mechanism for Perceptual layer-oriented Network Routing. 174-179 - Shaojie Luo, Minhao Jin, Rongjie Han, Kexin Sun:
Anti-jamming based on Reinforcement Learning in Power System Sensing Network. 180-184 - Chong Tan, Han Chen, Songlei Zhang, Di Zhai, Yang Lu, Hong Liu:
Traffic offloading based on content sharing in D2D for Smart Grid. 185-190 - Madumitha Venkatasubramanian, Arash Habibi Lashkari, Saqib Hakak:
Federated Learning Assisted IoT Malware Detection Using Static Analysis. 191-198 - Haoyu Yu, Shanshan Tu, Yihe Zhang:
Decentralized Consensus Blockchain-Based Authentication Algorithm Using in Secure Internet of Vehicles. 199-204
Chapter 5 Blockchain Theory and Data Security
- Xuetao Bai, Shanshan Tu, Haishuang Yan, Yongjie Yang, Aiming Wu, Yihe Zhang:
SPoW: A solution to the problem of centralization of computing power. 205-210 - Yihe Zhang, Shanshan Tu, Muhammad Waqas, Yongjie Yang, Aiming Wu, Xuetao Bai:
Resource Allocation for Blockchain-Enabled Fog Computing with Deep Reinforcement Learning. 211-218 - Su-Juan Qin, Zhao Liu, Feixiang Ren, Chong Tan:
Smart Contract Vulnerability Detection Based on Critical Combination Path and Deep Learning. 219-226 - Yihe Zhang, Shanshan Tu, Shengju Zhang, Yongjie Yang, Aiming Wu, Xuetao Bai:
Performance Optimization Blockchain-Enabled Fog Computing with Deep Reinforcement Learning. 227-233
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.