15th International Conference on Network and System Security
Tianjin, China
| 23 October 2021
RLTree: Website Fingerprinting through Resource Loading Tree Changzhi Li, Lihai Nie and Laiping Zhao |
Re-check Your Certificates! Experiences and Lessons Learnt from Real-world HTTPS Certificate Deployments Wenya Wang, Yakang Li, Chao Wang, Yuan Yan, Juanru Li and Dawu Go |
ZERMIA - A Fault Injector framework for testing Byzantine Fault Tolerant protocols João Soares, Ricardo Fernandez, Miguel Silva, Tadeu Freitas and Rolando Martins |
Revocable Data Sharing Methodology Based on SGX and Blockchain Liang Zhang, Haibin Kan, Yang Xu and Jinhao Ran |
On the Analysis of the Outsourced Revocable Identity-Based Encryption from Lattices Yanhua Zhang, Ximeng Liu, Yupu Hu and Huiwen Jia |
Preventing Fake News Propagation in Social Networks using a context Trust-based security model Nadav Voloch, Ehud Gudes and Nurit Gal-Oz |
A Lightweight Android Malware Detection Framework based on Knowledge Distillation Yongbo Zhi, Ning Xi, Yuanqing Liu and Honglei Hui |
Federated learning-based intrusion detection in the context of IIoT networks: Poisoning Attack and defense Nguyen Chi Vy, Nguyen Huu Quyen, Phan The Duy and Van-Hau Pham |
A Simplified and Effective Solution for Hybrid SDN Network Deployment Haisheng Yu, Wenyong Wang, Yan Liu, Lihong Cheng and Sai Zou |
Group Key Exchange Compilers from Generic Key Exchanges Hector B. Hougaard and Atsuko Miyaji |
An architecture for processing a dynamic heterogeneous information network of security intelligence Marios Anagnostopoulos, Egon Kidmose, Amine Laghaout, Rasmus L. Olsen, Sajad Homayoun, Christian D. Jensen and Jens M. Pedersen |
The Complexity of Testing Cryptographic Devices on Input Faults Alisher Ikramov and Gayrat Juraev |
A Malware Family Classification Method Based on the Point Cloud Model DGCNN Yuxin Ding, Zihan Zhou and Wen Qian |
Collection of the main Anti-Virus detection and bypass techniques Jérémy Donadio, Guillaume Guerard , and Soufian Ben Amor |
Profiled Attacks against the Elliptic Curve Scalar Point Multiplication using Neural Networks Alessandro Barenghi, Diego Carrera, Silvia Mella, Andrea Pace, Gerardo Pelosi and Ruggero Susella |
Deep Cross-modal Supervised Hashing based on Joint Semantic Matrix Na Chen, Yuan Cao and Chao Liu |
Accurate Polar Harmonic Transform-based Watermarking Using Blind Statistical Detector Yu Sang, Yilin Bei, Zhiyang Yang and Chen Zhao |
Cloud Key Management Based on Verifiable Secret Sharing Mustapha Hedabou |
A Scheme for Sensor Data Reconstruction in Smart Home Yegang Du |
Privacy-preserving and Auditable Federated Deep Reinforcement Learning for Robotic Manipulation Xudong Zhu and Hui Li |
HALNet: A Hybrid Deep Learning Model for Encrypted C&C Malware Traffic Detection Ruiyuan Li, Zehui Song, Wei Xie, Chengwei Zhang, Guohui Zhong and Xiaobing Pei |
Tracing Software Exploitation Ayman Youssef, Mohamed Abdelrazek, Chandan Karmakar and Zubair Baig |
A Secure and Privacy Preserving Federated Learning Approach for IoT Intrusion Detection System Phan The Duy, Huynh Nhat Hao, Huynh Minh Chu and Van-Hau Pham |
Cryptanalysis of A Fully Anonymous Group Signature with Verifier-Local Revocation from ICICS 2018 Yanhua Zhang, Ximeng Liu, Yupu Hu and Huiwen Jia |