![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
12th ICCNS 2022: Beijing, China
- Proceedings of the 12th International Conference on Communication and Network Security, ICCNS 2022, Beijing, China, December 1-3, 2022. ACM 2022, ISBN 978-1-4503-9752-0
Chapter 1 Network Intrusion Detection and Attack Model
- Yueqi Zhang
, Ruiping Yin
, Zhen Yang
:
Data Poisoning Attacks to Session-Based Recommender Systems. 1-6 - Ashley Barkworth
, Rehnuma Tabassum
, Arash Habibi Lashkari
:
Detecting IMAP Credential Stuffing Bots Using Behavioural Biometrics. 7-15 - Aiming Wu
, Shanshan Tu
, Junwei Liu
, Yihe Zhang
, Yongjie Yang
, Xuetao Bai
:
Detection Scheme of Impersonation Attack Based on Sarsa(Lambda) Algorithm in Fog Computing. 16-22 - Ruihai Ge
, Yongzheng Zhang
, Shuhao Li
, Guoqiao Zhou
, Guangze Zhao
:
Leveraging Zero-Payload Packets to Detect Mobile Malware based on Network Traffic. 23-29 - Tiaokang Gao
, Xiaoning Jin
, Yingxu Lai
:
Model Heterogeneous Federated Learning for Intrusion Detection based on knowledge distillation. 30-35 - Yongjie Yang
, Shanshan Tu
, Haishuang Yan
, Yihe Zhang
, Aiming Wu
, Xuetao Bai
:
Deep Reinforcement Learning-Based Computation Offloading for Anti-jamming in Fog Computing Networks. 36-42
Chapter 2 Information Certification and Security Protection
- Abhishek Chopra
, Nikhill Vombatkere
, Arash Habibi Lashkari
:
AuthAttLyzer: A Robust defensive distillation-based Authorship Attribution framework. 43-50 - Xue Liao
, Yihua Zhou
, Jiawei Xu
, Shuaikun Xing
, Wei Zou
, Jin Zhou
, Qi Wang
, Zhenhu Ning
:
Identity-based Linkable Blind Ring Signature Scheme on Lattice. 51-57 - Xiaoyan Wu
, Xiaofeng Wang
, Qianqian Xing
:
Identity-Based Authentication Protocol for Trustworthy IP Address. 58-63 - Jin Zhou
, Zhenhu Ning
, Qi Wang
, Yuchen Wang
:
Embedded Real-time System Trusted Protection Technology for Supply Chain Scenarios. 64-68 - Luthfi Azhari
, Ari Moesriami Barmawi
:
Activity Attribute-Based User Behavior Model for Continuous User Authentication. 69-76 - Yang Yang
, Zengtao Wei
, Minming Huang
:
Accountable Policy-Based Sanitizable Signature for Medical Data Sharing. 77-84 - Aiguo Li
, Wenhao Yan
:
Research on vulnerability assessment of physical protection system based on combined weighting-two-dimensional cloud model. 85-89 - Yu Hong
, Zhenhu Ning
:
A trusted construction mechanism for sever based on trusted hard disk. 90-97
Chapter 3 Password Information and Smart Navigation System
- Yanshuang Gui
, Miaomiao Yang
, Haishuang Yan
, Yayun Guo
, Qixu Wang
, Xingshu Chen
:
MURAS: An Efficient Multi-Value-Proof-Based Remote Attestation Scheme for Cloud Platform. 98-104 - Heera G. Wali
, Nalini C. Iyer
, Shraddha B. Hiremath
:
Hardware Implementation of SPONGENT Lightweight Hash Algorithm. 105-109 - Aiguo Li
, Jie Yang
:
Multi-objective optimization algorithm for indoor positioning sensor deployment based on wireless network. 110-116 - Shisong Yang
, Yuwen Chen
, Shanshan Tu
, Zhen Yang
:
A Post-quantum Secure Aggregation for Federated Learning. 117-124 - Yidong Yuan
, Tianmeng Zhang
, Chaoyi Wang
, Lu Tian
, Jinchun Gao
:
Impact of Common Mode Current Induced by Transformer on Electromagnetic Radiation in Digital Isolation Chip. 125-130 - Siyuan Yang
, Yuhao Sun
:
Status and Key Technologies of UAV-boat Cross-domain Collaborative Development. 131-139 - Yunwen Chen
, Zheng Li
, Weiru Wang
:
A mutual authentication and key establishment scheme for peer to peer network scenario. 140-145
Chapter 4 Data Transmission and Security Mechanisms in IoT System
- Wei Zheng
, Naixin Kang
, Tao Ye
, Haining Tan
:
Trusted authentication mechanism oriented to network computing offloading at the perception layer. 146-151 - Xiaoliang Wang
, Feng Zhang
, Yanbo Ma
, Wenjuan Dai
, Yingying Jin
:
Trust evaluation model based on improved Bayesian theory for the Internet of Things. 152-158 - Mansoor Khan
, Shanshan Tu
, Ghulam Abbas
, Ziaul Haq Abbas
, Hisham Alasmary
, Muhammad Waqas
:
A Reliable and Stable V2V Routing Scheme for Warning Message Dissemination in VANETs using Bi-Directional Clustering. 159-167 - Ming Wan
, Minglei Hao, Yang Li, Jianming Zhao
, Ying Li:
Insights on Cooperative Defense for Multiple Industrial Security Technologies. 168-173 - Wei Zheng
, Naixin Kang
, Tao Ye
, Qi Wang
:
Trusted Authentication Mechanism for Perceptual layer-oriented Network Routing. 174-179 - Shaojie Luo
, Minhao Jin
, Rongjie Han
, Kexin Sun
:
Anti-jamming based on Reinforcement Learning in Power System Sensing Network. 180-184 - Chong Tan
, Han Chen
, Songlei Zhang
, Di Zhai
, Yang Lu
, Hong Liu
:
Traffic offloading based on content sharing in D2D for Smart Grid. 185-190 - Madumitha Venkatasubramanian
, Arash Habibi Lashkari
, Saqib Hakak
:
Federated Learning Assisted IoT Malware Detection Using Static Analysis. 191-198 - Haoyu Yu
, Shanshan Tu
, Yihe Zhang
:
Decentralized Consensus Blockchain-Based Authentication Algorithm Using in Secure Internet of Vehicles. 199-204
Chapter 5 Blockchain Theory and Data Security
- Xuetao Bai
, Shanshan Tu
, Haishuang Yan
, Yongjie Yang
, Aiming Wu
, Yihe Zhang
:
SPoW: A solution to the problem of centralization of computing power. 205-210 - Yihe Zhang
, Shanshan Tu
, Muhammad Waqas
, Yongjie Yang
, Aiming Wu
, Xuetao Bai
:
Resource Allocation for Blockchain-Enabled Fog Computing with Deep Reinforcement Learning. 211-218 - Su-Juan Qin
, Zhao Liu
, Feixiang Ren
, Chong Tan
:
Smart Contract Vulnerability Detection Based on Critical Combination Path and Deep Learning. 219-226 - Yihe Zhang
, Shanshan Tu
, Shengju Zhang
, Yongjie Yang
, Aiming Wu
, Xuetao Bai
:
Performance Optimization Blockchain-Enabled Fog Computing with Deep Reinforcement Learning. 227-233
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.