default search action
5th SciSec 2023: Melbourne, VIC, Australia
- Moti Yung, Chao Chen, Weizhi Meng:
Science of Cyber Security - 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11-14, 2023, Proceedings. Lecture Notes in Computer Science 14299, Springer 2023, ISBN 978-3-031-45932-0
Network and System Security
- Ning Xi, Yihuan He, Yuchen Zhang, Zhi Wang, Pengbin Feng:
ACDroid: Detecting Collusion Applications on Smart Devices. 3-22 - Wenwen Ruan, Wenhao Wang, Shuang Liu, Ran Duan, Shoumeng Yan:
DomainIsolation: Lightweight Intra-enclave Isolation for Confidential Virtual Machines. 23-41 - Weixia Cai, Huashan Chen, Feng Liu:
Keeping Your Enemies Closer: Shedding Light on the Attacker's Optimal Strategy. 42-59 - Zheyuan Sun, Maochao Xu, Kristin M. Schweitzer, Raymond M. Bateman, Alexander Kott, Shouhuai Xu:
Cyber Attacks Against Enterprise Networks: Characterization, Modeling and Forecasting. 60-81
Cryptography and Authentication
- Jinyang Li, Zhenfu Cao, Jiachen Shen, Xiaolei Dong:
MCVDSSE: Secure Multi-client Verifiable Dynamic Symmetric Searchable Encryption. 85-96 - Xinyuan Qin, Wenjuan Li:
A Graphical Password Scheme Based on Rounded Image Selection. 97-114 - Xiuxiu Li, Wei Yu, Kunpeng Wang:
Implementation of the Elliptic Curve Method. 115-126 - Xiuxiu Li, Wei Yu, Kunpeng Wang, Luying Li:
Almost Injective and Invertible Encodings for Jacobi Quartic Curves. 127-138 - Linkang Zhang, Yunyang Qin, Yujia Zhu, Yifei Cheng, Zhen Jie, Qingyun Liu:
SeeStar: An Efficient Starlink Asset Detection Framework. 139-156 - Kaiming Chen, Atsuko Miyaji, Yuntao Wang:
Privacy-Enhanced Anonymous and Deniable Post-quantum X3DH. 157-177
AI for Security
- Bin Ma, Kun Li, Jian Xu, Chunpeng Wang, Jian Li, Liwei Zhang:
Enhancing the Anti-steganalysis Ability of Image Steganography via Multiple Adversarial Networks. 181-192 - Fusen Guo, Jianzhang Wu, Lei Pan:
An Empirical Study of AI Model's Performance for Electricity Load Forecasting with Extreme Weather Conditions. 193-204
Threat Detection and Analysis
- Han Miao, Huaifeng Bao, Zixian Tang, Wenhao Li, Wen Wang, Huashan Chen, Feng Liu, Yanhui Sun:
AST2Vec: A Robust Neural Code Representation for Malicious PowerShell Detection. 207-224 - Haiping Wang, Binbin Li, Tianning Zang, Yifei Yang, Zisen Qi, Siyu Jia, Yu Ding:
Real-Time Aggregation for Massive Alerts Based on Dynamic Attack Granularity Graph. 225-243 - Xiaowei Wang, Zimu Yuan, Yang Xiao, Liyan Wang, Yican Yao, Haiming Chen, Wei Huo:
Decompilation Based Deep Binary-Source Function Matching. 244-260 - Peng Wang, Guangxiang Dai, Lidong Zhai:
Event-Based Threat Intelligence Ontology Model. 261-282
Web and Privacy Security
- Md Mahabub Uz Zaman, Liangde Tao, Mark Maldonado, Chang Liu, Ahmed Sunny, Shouhuai Xu, Lin Chen:
Optimally Blending Honeypots into Production Networks: Hardness and Algorithms. 285-304 - Mengxia Ren, Joshua Josey, Chuan Yue:
WebMea: A Google Chrome Extension for Web Security and Privacy Measurement Studies. 305-318 - Rosana Montañez Rodriguez, Theodore Tangie Longtchi, Kora Gwartney, Ekzhin Ear, David P. Azari, Christopher P. Kelley, Shouhuai Xu:
Quantifying Psychological Sophistication of Malicious Emails. 319-331 - Kaifeng Luo, Zhenfu Cao, Jiachen Shen, Xiaolei Dong:
SVFL: Secure Vertical Federated Learning on Linear Models. 332-344
Cryptography and Authentication II
- Jason T. LeGrow, Brian Koziel, Reza Azarderakhsh:
Multiprime Strategies for Serial Evaluation of eSIDH-Like Isogenies. 347-366 - Yao Zan, Hongda Li, Haixia Xu:
Adaptively Secure Constrained Verifiable Random Function. 367-385 - Bin Ma, Zhongquan Tao, Jian Xu, Chunpeng Wang, Jian Li, Liwei Zhang:
A Robust Reversible Data Hiding Algorithm Based on Polar Harmonic Fourier Moments. 386-397
Advanced Threat Detection Techniques and Blockchain
- Devharsh Trivedi, Nikos Triandopoulos:
VaultBox: Enhancing the Security and Effectiveness of Security Analytics. 401-422 - Yipeng Wang, Peixian Chen, Shan Ai, Weipeng Liang, Binjie Liao, Weichuan Mo, Heng Wang:
Two-Stage Anomaly Detection in LEO Satellite Network. 423-438 - Zhuo An, Mingsheng Wang, Dongdong Liu, Taotao Li, Qiang Lai:
Hydra: An Efficient Asynchronous DAG-Based BFT Protocol. 439-459 - Chunying Peng, Haixia Xu, Huimei Liao, Jinling Tang, Tao Tang:
Redactable Blockchain in the Permissioned Setting. 460-477
Workshop Session
- Bin Ma, Songkun Wang, Jian Xu, Chunpeng Wang, Jian Li, Xiaolong Li:
A Multi-level Sorting Prediction Enhancement-Based Two-Dimensional Reversible Data Hiding Algorithm for JPEG Images. 481-495 - Zongning Gao, Shunliang Zhang:
Research on Encrypted Malicious 5G Access Network Traffic Identification Based on Deep Learning. 496-512 - Pengju He, Haibo Zhang, Yaokai Feng, Kouichi Sakurai:
A Design of Network Attack Detection Using Causal and Non-causal Temporal Convolutional Network. 513-523
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.