14th International Conference on Network and System Security
Melbourne, Australia
| 25-27 November 2020
| A Weighted Voting Framework for Android App’s Vetting based on Multiple Machine Learning Models Honglei Hui, Yongbo Zhi, Ning Xi and Yuanqing Liu |
| Evaluation of Anomaly-based Intrusion Detection with Combined Imbalance Correction and Feature Selection Andreas Heidelbach Engly, Anton Ruby Larsen and Weizhi Meng |
| A Framework of Blockchain-based Collaborative Intrusion Detection in Software Defined Networking Wenjuan Li, Jiao Tan and Yu Wang |
| Defending Against Package Typosquatting Matthew Taylor, Ruturaj Vaidya, Drew Davidson, Lorenzo De Carli and Vaibhav Rastogi |
| Data Analytics of Crowdsourced Resources for Cybersecurity Intelligence Nan Sun, Jun Zhang, Shang Gao, Leo Yu Zhang, Seyit Camtepe and Yang Xiang |
| Security Evaluation of Smart Contract-based On-chain Ethereum Wallets Purathani Praitheeshan, Lei Pan and Robin Doss |
| EnCoD: Distinguishing Compressed and Encrypted File Fragments Fabio De Gaspari, Dorjan Hitaj, Giulio Pagnotta, Lorenzo De Carli and Luigi V. Mancini |
| Sequential Anomaly Detection using Feedback and Prioritized Experience Replay Anish Reddy Ellore, Sanket Mishra and Chittaranjan Hota |
| HyperWall: A Hypervisor for Detection and Prevention of Malicious Communication Michael Kiperberg, Raz Ben Yehuda and Nezer Jacob Zaidenberg |
| AC0 constructions of secret sharing schemes – Accommodating new parties Shion Samadder Chaudhury, Sabyasachi Dutta and Kouichi Sakurai |
| Graph Deep Learning Based Anomaly Detection in Ethereum Blockchain Network Vatsal Patel, Lei Pan and Sutharshan Rajasegarar |
| Safety analysis of high-dimensional anonymized data from multiple perspectives Yamazoe Takaya and Omote Kazumasa |
| Compactly Committing Authenticated Encryption Using Tweakable Block Cipher Shoichi Hirose |
| Game Theoretic Analysis of Reputation Approach on Block Withholding Attack Lianyang Yu, Jiangshan Yu and Yevhen Zolotavkin |
| Model Poisoning Defense on Federated Learning: A Validation Based Approach Yuao Wang, Tianqing Zhu, Wenhan Chang, Sheng Shen and Wei Ren |
| Fixing Vulnerabilities Automatically with Linters Willard Rafnsson, Rosario Giustolisi, Mark Kragerup and Mathias Høyrup |
| Identity-based Outsider Anonymous Broadcast Encryption with Simultaneous Individual Messaging Mriganka Mandal and Koji Nuida |
| Privacy and Utility trade-off for textual Analysis via Calibrated Multivariate Perturbations Jingye Tang, Tianqing Zhu, Yu Wang, Ping Xiong and Wei Ren |
| On the Vulnerability of Hyperdimensional Computing-Based Classifiers to Adversarial Attacks Fangfang Yang and Shaolei Ren |
| The Impact of Differential Privacy on Model Fairness in Federated learning Xiuting Gu, Tianqing Zhu and Jie Li |
| ESCAPADE: Encryption-type-ransomware: System Call based Pattern Detection Christopher Chew, Vimal Kumar, Panos Patros and Robi Malik |
| A Model Specification Implementation for Trust Negotiations Martin Kolar, Carmen Fernández-Gago and Javier Lopez |
| Evading stepping-stone detection by using enough chaff perturbations Henry Clausen, David Aspinall and Michael Gibson |
| PowerKey: Generating Secret Keys from Power Line Electromagnetic Interferences Fangfang Yang, Mohammad Atiqul Islam and Shaolei Ren |
| A Privacy Preserving Aggregation Scheme for Fog-Based Recommender System Xiaodong Wang, Bruce Gu, Youyang Qu, Yongli Ren, Yong Xiang and Longxiang Gao |
| Multiply, Divide, and Conquer – Making Fully Decentralised Access Control a Reality Bernd Prünster, Dominik Ziegler and Gerald Palfinger |