


default search action
24th ICICS 2022: Canterbury, UK
- Cristina Alcaraz
, Liqun Chen
, Shujun Li
, Pierangela Samarati
:
Information and Communications Security - 24th International Conference, ICICS 2022, Canterbury, UK, September 5-8, 2022, Proceedings. Lecture Notes in Computer Science 13407, Springer 2022, ISBN 978-3-031-15776-9
Cryptography
- Jinzheng Cao
, Qingfeng Cheng
, Xinghua Li
, Yanbin Pan
:
BS: Blockwise Sieve Algorithm for Finding Short Vectors from Sublattices. 3-18 - Teik Guan Tan
, De Wen Soh
, Jianying Zhou
:
Calibrating Learning Parity with Noise Authentication for Low-Resource Devices. 19-36 - Jing Gao, Jun Xu, Tianyu Wang, Lei Hu:
New Results of Breaking the CLS Scheme from ACM-CCS 2014. 37-54 - Tingting Guo
, Peng Wang
:
A Note on the Security Framework of Two-key DbHtS MACs. 55-68 - Zhi Qiu
, Kang Yang
, Yu Yu
, Lijing Zhou
:
Maliciously Secure Multi-party PSI with Lower Bandwidth and Faster Computation. 69-88 - Siwei Chen, Zejun Xiang
, Xiangyong Zeng, Shasha Zhang:
Conditional Cube Attacks on Full Members of KNOT-AEAD Family. 89-108 - Shuo Sun, Yongbin Zhou, Rui Zhang, Yang Tao, Zehua Qiao, Jingdian Ming:
Fast Fourier Orthogonalization over NTRU Lattices. 109-127 - Kaini Chen, Peisong Shen
, Kewei Lv, Chi Chen:
Secure Sketch and Fuzzy Extractor with Imperfect Randomness: An Information-Theoretic Study. 128-147 - Boyue Fang, Weize Wang, Yunlei Zhao:
Tight Analysis of Decryption Failure Probability of Kyber in Reality. 148-160
Authentication
- Yuxuan Wu, Ding Wang, Yunkai Zou, Ziyi Huang:
Improving Deep Learning Based Password Guessing Models Using Pre-processing. 163-183 - Matthew M. Tolbert, Elie M. Hess, Mattheus C. Nascimento, Yunsen Lei, Craig A. Shue:
Exploring Phone-Based Authentication Vulnerabilities in Single Sign-On Systems. 184-200 - Savio Sciancalepore, Simone Raponi, Daniele Caldarola, Roberto Di Pietro:
FRACTAL: Single-Channel Multi-factor Transaction Authentication Through a Compromised Terminal. 201-217
Privacy and Anonymity
- Zhen Liu, Yining Liu
, Weizhi Meng
:
Lightweight and Practical Privacy-Preserving Image Masking in Smart Community. 221-239 - Yang Han, Dawei Xu, Jiaqi Gao, Liehuang Zhu:
Using Blockchains for Censorship-Resistant Bootstrapping in Anonymity Networks. 240-260 - Meng Li, Mingwei Zhang, Jianbo Gao, Chhagan Lal, Mauro Conti
, Mamoun Alazab:
Repetitive, Oblivious, and Unlinkable SkNN Over Encrypted-and-Updated Data on Cloud. 261-280 - Arwa Alromih
, John A. Clark
, Prosanta Gope
:
Privacy-Aware Split Learning Based Energy Theft Detection for Smart Grids. 281-300
Attacks and Vulnerability Analysis
- Makoto Yuito, Kenta Suzuki, Kazuki Yoneyama:
Query-Efficient Black-Box Adversarial Attack with Random Pattern Noises. 303-323 - Qi Lei, Zijia Yang, Qin Wang
, Yaoling Ding, Zhe Ma, An Wang:
Autoencoder Assist: An Efficient Profiling Attack on High-Dimensional Datasets. 324-341 - Liantao Song, Yan Ding, Pan Dong, Yong Guo, Chuang Wang:
TZ-IMA: Supporting Integrity Measurement for Applications with ARM TrustZone. 342-358 - Xiaoting Li, Xiao Liu, Lingwei Chen, Rupesh Prajapati, Dinghao Wu:
FuzzBoost: Reinforcement Compiler Fuzzing. 359-375 - Tzu-Hsien Chang, Yen-Ting Kuo
, Jiun-Peng Chen, Bo-Yin Yang:
Secure Boolean Masking of Gimli - Optimization and Evaluation on the Cortex-M4. 376-393 - Zhi Wang
, Chaoge Liu, Xiang Cui, Jie Yin, Jiaxi Liu
, Di Wu, Qixu Liu:
DeepC2: AI-Powered Covert Command and Control on OSNs. 394-414
Artificial Intelligence for Detection
- Hongyi Peng, Vinay Sachidananda, Teng Joon Lim, Rajendra Patil, Mingchang Liu, Sivaanandh Muneeswaran, Mohan Gurusamy:
ODDITY: An Ensemble Framework Leverages Contrastive Representation Learning for Superior Anomaly Detection. 417-437 - Tongjian An
, Xuefei Shui, Hongkui Gao:
Deep Learning Based Webshell Detection Coping with Long Text and Lexical Ambiguity. 438-457 - Fengliang Xia, Guixing Wu, Guochao Zhao, Xiangyu Li:
SimCGE: Simple Contrastive Learning of Graph Embeddings for Cross-Version Binary Code Similarity Detection. 458-471 - Mouna Rabhi
, Spiridon Bakiras
, Roberto Di Pietro
:
FN2: Fake News DetectioN Based on Textual and Contextual Features. 472-491 - Mohan Gao, Peng Wu
, Li Pan:
Malware Detection with Limited Supervised Information via Contrastive Learning on API Call Sequences. 492-507 - Bo Dong, Yuhang Wu, Micheal Yeh, Yusan Lin, Yuzhong Chen, Hao Yang, Fei Wang, Wanxin Bai, Krupa Brahmkstri, Yimin Zhang, Chinna Kummitha, Verma Abhisar:
Semi-supervised Context Discovery for Peer-Based Anomaly Detection in Multi-layer Networks. 508-524 - Mingchang Liu, Vinay Sachidananda, Hongyi Peng, Rajendra Patil, Sivaanandh Muneeswaran, Mohan Gurusamy:
Peekaboo: Hide and Seek with Malware Through Lightweight Multi-feature Based Lenient Hybrid Approach. 525-545 - Mohammad Mamun, Scott Buffett:
TapTree: Process-Tree Based Host Behavior Modeling and Threat Detection Framework via Sequential Pattern Mining. 546-565
Network Security and Forensics
- Steven Noel
, Vipin Swarup
:
Dependency-Based Link Prediction for Learning Microsegmentation Policy. 569-588 - Pegah Nikbakht Bideh
, Nicolae Paladi
:
Chuchotage: In-line Software Network Protocol Translation for (D)TLS. 589-607 - Georgiana Bogdanel, Nadia Belghazi-Mohamed
, Hilario Gómez-Moreno
, Sergio Lafuente-Arroyo
:
Study on the Effect of Face Masks on Forensic Speaker Recognition. 608-621 - Kejun Zhang
, Yuhao Wang
, Xinying Yu
:
Video Forensics for Object Removal Based on Darknet3D. 622-637

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.