14th International Conference on Network and System Security
Melbourne, Australia
| 25-27 November 2020
A Weighted Voting Framework for Android App’s Vetting based on Multiple Machine Learning Models Honglei Hui, Yongbo Zhi, Ning Xi and Yuanqing Liu |
Evaluation of Anomaly-based Intrusion Detection with Combined Imbalance Correction and Feature Selection Andreas Heidelbach Engly, Anton Ruby Larsen and Weizhi Meng |
A Framework of Blockchain-based Collaborative Intrusion Detection in Software Defined Networking Wenjuan Li, Jiao Tan and Yu Wang |
Defending Against Package Typosquatting Matthew Taylor, Ruturaj Vaidya, Drew Davidson, Lorenzo De Carli and Vaibhav Rastogi |
Data Analytics of Crowdsourced Resources for Cybersecurity Intelligence Nan Sun, Jun Zhang, Shang Gao, Leo Yu Zhang, Seyit Camtepe and Yang Xiang |
Security Evaluation of Smart Contract-based On-chain Ethereum Wallets Purathani Praitheeshan, Lei Pan and Robin Doss |
EnCoD: Distinguishing Compressed and Encrypted File Fragments Fabio De Gaspari, Dorjan Hitaj, Giulio Pagnotta, Lorenzo De Carli and Luigi V. Mancini |
Sequential Anomaly Detection using Feedback and Prioritized Experience Replay Anish Reddy Ellore, Sanket Mishra and Chittaranjan Hota |
HyperWall: A Hypervisor for Detection and Prevention of Malicious Communication Michael Kiperberg, Raz Ben Yehuda and Nezer Jacob Zaidenberg |
AC0 constructions of secret sharing schemes – Accommodating new parties Shion Samadder Chaudhury, Sabyasachi Dutta and Kouichi Sakurai |
Graph Deep Learning Based Anomaly Detection in Ethereum Blockchain Network Vatsal Patel, Lei Pan and Sutharshan Rajasegarar |
Safety analysis of high-dimensional anonymized data from multiple perspectives Yamazoe Takaya and Omote Kazumasa |
Compactly Committing Authenticated Encryption Using Tweakable Block Cipher Shoichi Hirose |
Game Theoretic Analysis of Reputation Approach on Block Withholding Attack Lianyang Yu, Jiangshan Yu and Yevhen Zolotavkin |
Model Poisoning Defense on Federated Learning: A Validation Based Approach Yuao Wang, Tianqing Zhu, Wenhan Chang, Sheng Shen and Wei Ren |
Fixing Vulnerabilities Automatically with Linters Willard Rafnsson, Rosario Giustolisi, Mark Kragerup and Mathias Høyrup |
Identity-based Outsider Anonymous Broadcast Encryption with Simultaneous Individual Messaging Mriganka Mandal and Koji Nuida |
Privacy and Utility trade-off for textual Analysis via Calibrated Multivariate Perturbations Jingye Tang, Tianqing Zhu, Yu Wang, Ping Xiong and Wei Ren |
On the Vulnerability of Hyperdimensional Computing-Based Classifiers to Adversarial Attacks Fangfang Yang and Shaolei Ren |
The Impact of Differential Privacy on Model Fairness in Federated learning Xiuting Gu, Tianqing Zhu and Jie Li |
ESCAPADE: Encryption-type-ransomware: System Call based Pattern Detection Christopher Chew, Vimal Kumar, Panos Patros and Robi Malik |
A Model Specification Implementation for Trust Negotiations Martin Kolar, Carmen Fernández-Gago and Javier Lopez |
Evading stepping-stone detection by using enough chaff perturbations Henry Clausen, David Aspinall and Michael Gibson |
PowerKey: Generating Secret Keys from Power Line Electromagnetic Interferences Fangfang Yang, Mohammad Atiqul Islam and Shaolei Ren |
A Privacy Preserving Aggregation Scheme for Fog-Based Recommender System Xiaodong Wang, Bruce Gu, Youyang Qu, Yongli Ren, Yong Xiang and Longxiang Gao |
Multiply, Divide, and Conquer – Making Fully Decentralised Access Control a Reality Bernd Prünster, Dominik Ziegler and Gerald Palfinger |