


default search action
UbiSec 2023: Exeter, UK
- Guojun Wang
, Haozhe Wang
, Geyong Min
, Nektarios Georgalas
, Weizhi Meng
:
Ubiquitous Security - Third International Conference, UbiSec 2023, Exeter, UK, November 1-3, 2023, Revised Selected Papers. Communications in Computer and Information Science 2034, Springer 2024, ISBN 978-981-97-1273-1
Cyberspace Security
- Zheqi Feng, Tao Peng
, Guojun Wang
, Kejian Guan:
Bilateral Personalized Information Fusion in Mobile Crowdsensing. 3-16 - Amirah Almutairi
, BooJoong Kang
, Nawfal Al Hashimy
:
BiBERT-AV: Enhancing Authorship Verification Through Siamese Networks with Pre-trained BERT and Bi-LSTM. 17-30 - Andrei Vasile Mihalca, Ciprian Pavel Oprisa:
Impact of Library Code in Binary Similarity Systems. 31-44 - Lars Hupel
, Makan Rafiee:
How Does Post-quantum Cryptography Affect Central Bank Digital Currency? 45-62 - Yuheng Zhang
, Pin Liu
, Guojun Wang
, Peiqiang Li, Wanyi Gu, Houji Chen, Xuelei Liu, Jinyao Zhu:
FRAD: Front-Running Attacks Detection on Ethereum Using Ternary Classification Model. 63-75 - Aysan Esmradi, Daniel Wankit Yip, Chun-Fai Chan:
A Comprehensive Survey of Attack Techniques, Implementation, and Mitigation Strategies in Large Language Models. 76-95 - Chun-Fai Chan
, Kam-Pui Chow:
Process Mining with Programmable Logic Controller Memory States. 96-113 - Vinay Sachidananda, Berwyn Chai, Florian Gondesen
, Kwok-Yan Lam, Yang Liu
:
Honey-Gauge: Enabling User-Centric Honeypot Classification. 114-132 - Georgios P. Spathoulas
, Marios Anagnostopoulos
, Konstantinos Papageorgiou, Georgios Kavallieratos
, Georgios Theodoridis:
Improving DNS Data Exfiltration Detection Through Temporal Analysis. 133-146 - Petr Muzikant
, Jan Willemson
:
Deploying Post-quantum Algorithms in Existing Applications and Embedded Devices. 147-162 - Tieming Geng, Chin-Tser Huang, Csilla Farkas:
SCORD: Shuffling Column-Oriented Relational Database to Enhance Security. 163-176 - Antonin Verdier
, Romain Laborde
, Mohamed Ali Kandi, Abdelmalek Benzekri:
A SLAHP in the Face of DLL Search Order Hijacking. 177-190 - Masayoshi Tsutsui, Tatsuya Kaneko
, Shinya Takamaeda-Yamazaki:
Poison Egg: Scrambling Federated Learning with Delayed Backdoor Attack. 191-204 - Zhonghao Lu, Lina Xu, Ying Hu, Liping Sun, Yonglong Luo:
Channel Spatio-Temporal Convolutional Network for Trajectory Prediction. 205-218 - Andri Rai
, Eul Gyu Im
:
Multi-NetDroid: Multi-layer Perceptron Neural Network for Android Malware Detection. 219-235 - Yuwei Xu, Tiantian Zhang, Junyu Zeng, Rongrong Wang, Kehui Song, Jingdong Xu:
SmartBuoy: A Machine Learning-Based Detection Method for Interest Flooding Attacks in VNDN. 236-252
Cyberspace Privacy
- Cong Zha, Zhenan Xu, Ju Xing, Hao Yin:
Loft: An Architecture for Lifetime Management of Privacy Data in Service Cooperation. 255-273 - Tsz Ho Pun, Yi Jun He, Siu Ming Yiu:
Privacy-Preserving Blockchain-Based Traceability System with Decentralized Ciphertext-Policy Attribute-Based Encryption. 274-288 - Qingru Li
, Yahong Wang
, Fangwei Wang
, Zhiyuan Tan
, Changguang Wang
:
A Probability Mapping-Based Privacy Preservation Method for Social Networks. 289-303 - Avishka Shamendra, Binoy Peries, Gayangi Seneviratne, Sunimal Rathnayake:
TruFaaS - Trust Verification Framework for FaaS. 304-318 - Mohammad Rafsun Islam, Ahmed Saleh Bataineh, Mohammad Zulkernine:
Detection of Cyberbullying in Social Media Texts Using Explainable Artificial Intelligence. 319-334 - Faseeh Iftikhar, Muhammad Faizan Khan
, Guojun Wang
, Fazli Wahid:
Privacy Preserving Elder Fall Detection Using Deep Learning. 335-347 - Li Ma
, Qidi Lao
, Wenyin Yang
, Zexian Yang, Dong Yuan, Zhaoxiong Bu:
Research on Authorization Model of Attribute Access Control Based on Knowledge Graph. 348-359
Cyberspace Anonymity
- Harry Halpin
:
Simulation of Mixmining Reward Parameters for the Nym Mixnet. 363-379 - Michael Mireku Kwakye
, Ken Barker:
Blockchain-Based Privacy-Preservation Platform for Data Storage and Query Processing. 380-400 - Andre Büttner
, Andreas Thue Pedersen
, Stephan Wiefling
, Nils Gruschka
, Luigi Lo Iacono
:
Is It Really You Who Forgot the Password? When Account Recovery Meets Risk-Based Authentication. 401-419 - Ali Alshumrani
, Nathan L. Clarke
, Bogdan Ghita
:
A Unified Knowledge Graph to Permit Interoperability of Heterogenous Digital Evidence. 420-435 - Chin-Tser Huang
, Laurent Njilla
, Matthew Sharp
, Tieming Geng
:
SMARPchain: A Smart Marker Based Reputational Probabilistic Blockchain for Multi-agent Systems. 436-449 - Daniel Chong, Junjie Zhang, Nathaniel Boland, Lingwei Chen:
Automatically Inferring Image Base Addresses of ARM32 Binaries Using Architecture Features. 450-461

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.