16th International Conference on Network and System Security
Denarau Island, Fiji
| Dec 9 - Dec 12, 2022
Graph Intelligence Enhanced Bi-Channel Insider Threat Detection Wei Hong, Victoria University Jiao Yin, Victoria University Mingshan You, Victoria University Hua Wang, Victoria University Jinli Cao, La Trobe University |
CVallet: a Blockchain-oriented Application Development for Education and Recruitment Zoey Ziyi Li, Monash University Joseph K. Liu, Monash University Jiangshan Yu, Monash University Dragan Gasevic Monash University Wayne Yang, Monash University |
Rebound Attacks on SKINNY hashing with Automatic Toolss Jian Guo, Nanyang Technological University Guozhen Liu, Nanyang Technological University Shun Li, Nanyang Technological University Phuong Pham, Nanyang Technological University |
A First Look at Android Apps' Third-party Resources Loading Hina Qayyum, Macquarie University Muhammad Salman, Macquarie University I Wayan Budi Sentana, Macquarie University Duc Linh Giang Nguyen, Macquarie University Muhammad Ikram, Macquarie University Gareth Tyson, Hong Kong University of Science and Technology Mohamad Ali Kaafar, Macquarie University |
A Differential Privacy Mechanism for Deceiving Cyber Attacks in IoT Networks Guizhen Yang, Deakin University Mengmeng Ge, University of Canterbury Shang Gao, Deakin University Xuequan Lu, Deakin University Leo Yu Zhang, Deakin University Robin Doss, Deakin University |
Combination Reduction Algorithms and its application to Subversion Attack Wei Yang, Fujian Normal University Shaojun Yang, Fujian Normal University Wei Wu, Fujian Normal University Yong Zhao, Fujian Normal University |
Supporting cyber-attacks and system anomaly detection research with an Industry 4.0 dataset Lei Shi, Swinburne University of Technology Shanti Krishnan, Swinburne University of Technology Sheng Wen, Swinburne University of Technology Yang Xiang, Swinburne University of Technology |
Strengthening the Security of AES Against Differential Fault Attack Anit Kumar Ghosal, Indian Institute of Technology Dipanwita Roychowdhury, Indian Institute of Technology |
RAIDER: Reinforcement-aided Spear Phishing Detector Keelan Evans, Edith Cowan University Alsharif Abuadbba, CSIRO's Data61 Tingmin Wu, CSIRO's Data61 Kristen Moore, CSIRO's Data61 Mohiuddin Ahmed, Edith Cowan University Ganna Pogrebna, Charles Sturt University & The University of Sydney & The Alan Turing Institute Surya Nepal, CSIRO's Data61 & Cybersecurity CRC Mike Johnstone, Edith Cowan University |
Comprehensive Mobile Traffic Characterization Based on a Large-Scale Mobile Traffic Dataset Shuang Zhao, National University of Defense Technology Jincheng Zhong, National University of Defense Technology Shuhui Chen, National University of Defense Technology Jianbing Liang, National University of Defense Technology |
An efficient clustering-based privacy-preserving recommender system Junwei Luo, RMIT University Xun Yi, RMIT University Fengling Han, RMIT University Xuechao Yang, RMIT University Xu Yang, Fujian Normal University |
A Proof of Concept Implementation of Explainable Artificial Intelligence (XAI) in Digital Forensics Stuart W. Hall, Monash University Amin Sakzad, Monash University Sepehr Minagar, Monash University |
Blockchain Based Regulatory Technology Deployment for Real Estate Transaction Ru Ray Raymond Chao, Monash University Joseph K. Liu, Monash University Kai Su, Monash University |
Driver Locations Harvesting Attack on pRide Shyam Murthy, International Institute of Information Technology Srinivas Vivek, International Institute of Information Technology |
Geometric Range Searchable Encryption with Forward and Backward Security Mengwei Yang, Nanjing University of Science and Technology Chungen Xu, Nanjing University Of Science And Technology Pan Zhang, Nanjing University Of Science And Technology |
Detecting Contradictions from CoAP RFC based on Knowledge Graph Xinguo Feng,The University of Queensland Yanjun Zhang, Deakin University Mark Huasong Meng, Institute for Infocomm Research |
Leveraging Frame Aggregation in Wi-Fi IoT Networks for Low-Rate DDoS Attack Detection Bhagyashri Tushir, Santa Clara University Yuhong Liu, Santa Clara University Behnam Dezfouli, Santa Clara Universit |
Vulnerability Detection Using Deep Learning Based Function Classification Huihui Gong, The University of Sydney, Australia Siqi Ma, The University of New South Wales Seyit Camtepe, CSIRO Data61 Surya Nepal, CSIRO Chang Xu, The University of Sydney |
Differentiated Security Architecture for Secure and Efficient Infotainment Data Communication in IoV Networks Jiani Fan, Nanyang Technological University Lwin Khin Shar, Singapore Management University Jiale Guo, Nanyang Technological University Wenzhuo Yang, Nanyang Technological University Dusit Niyato, Nanyang Technological University Kwok-Yan Lam, Nanyang Technological University |
BSB: Bringing Safe Browsing to Blockchain Platform Zhuang Zhou, Wuhan University of Technology Cheng Tan, Wuhan University of Technology Shiyun Liu, Wuhan University of Technology Rongwei Yu, Wuhan University Siwei Wu, Zhejiang University Shengwu Xiong, Wuhan University of Technology |
A Learning Methodology for Line-Rate Ransomware Mitigation with P4 Switches Kurt Friday, The University of Texas at San Antonio Elias Bou-Harb, The University of Texas at San Antonio Jorge Crichigno, The University of South Carolina |
Enabling Secure Deduplication in Encrypted Decentralized Storage Bo Zhang, Northwestern Polytechnical University Helei Cui, Northwestern Polytechnical University Yaxing Chen, Northwestern Polytechnical University Xiaoning Liu, Royal Melbourne Institute of Technology Zhiwen Yu, Northwestern Polytechnical University Bin Guo, Northwestern Polytechnical University |
The Force of Compensation, A Multi-stage Incentive Mechanism Model for Federated Learning Han Xu, University of Technology Sydney Priyadarsi Nanda, University of Technology Sydney Jie Liang, University of Technology Sydney Xiangjian He, University of Nottingham Ningbo China |
A Privacy-Preserving Distributed Machine Learning Protocol based on Homomorphic Hash Authentication Yang Hong, Nanjing University of Aeronautics and Astronautics Lisong Wang, Nanjing University of Aeronautics and Astronautics Weizhi Meng, Technical University of Denmark Chunpeng Ge, Nanjing University of Aeronautics and Astronautics |
An efficient lattice-based encrypted search scheme with forward security Xiaoling Yu, Taiyuan University of Technology Lei Xu, Nanjing University of Science and Technology Xin Huang, Taiyuan University of Technology Chungen Xu, Nanjing University of Science & Technology |
Practical Anonymous Multi-Hop Locks for Lightning Network Compatible Payment Channel Networks Mengling Liu,The University of Hong Kong Man Ho Au, The University of Hong Kong |
Decentralized Access Control for Secure Microservices Cooperation with Blockchain Ning Xi, Xidian University Yajie Li, Xidian University Jin Liu, Xidian University |
Reducing Intrusion Alert Trees to Aid Visualization Eric Ficke, UTSA Raymond Bateman, U.S. Army Research Laboratory South - Cyber Shouhuai Xu, University of Colorado Colorado Springs |
Evaluating the Security of Merkle-Damgård Hash Functions and Combiners in Quantum Settings Zhenzhen Bao, Tsinghua University Jian Guo, Nanyang Technological University Shun Li, Nanyang Technological University Phuong Pham, Nanyang Technological University |
Efficient and Fine-Grained Sharing of Signed Healthcare Data in Smart Healthcare Jianghua Liu, Nanjing University of Science and Technology Lei Xu, Nanjing University of Science and Technology Bruce Gu, Victoria University Lei Cui, Shandong Computer Science Cente Fei Zhu, RMIT University |
Attacker Attribution Through Characteristics Inference Using Honeypot Data Pierre Crochelet, Polytechnique Montreal Christopher Neal, Polytechnique Montreal Nora Boulahia Cuppens , Polytechnique Montreal Frederic Cuppens, Polytechnique Montreal |
DOT-M: A Dual Offline Transaction Scheme of Central Bank Digital Currency for Trusted Mobile Devices Bo Yang, National Fintech Evaluation Center Yanchao Zhang, National Fintech Evaluation Center Dong Tong, National Fintech Evaluation Center |
Network Intrusion Detection Adversarial attacks for LEO Constellation Networks based on deep learning Li Yunhao, GuangZhou University Mo Weichuan, GuangZhou University Cong Li, Guangzhou University Wang Haiyang, Guangzhou University He Jianwei, CASIC Space Engineering Development Co. Hao Shanshan, CASIC Space Engineering Development Co. Yan Hongyang, Guangzhou University |
Blockchain-based Access Control for Smart Manufacturer Secure Management System AdityaKalapaaking, RMIT University Ibrahim Khalil, RMIT University Mohammad Rahman, RMIT University |
A Beyond-5G Authentication and Key Agreement protocol Mohamed Taoufiq Damir, University of Helsinki Tommi Meskanen, University of Helsinki Sara Ramezanian, University of Helsinki Valtteri Niemi , University of Helsinki |
Privacy-Preserving Online Ride-Hailing Matching System with an Untrusted Server Hongcheng Xie, City University of Hong Kong Zizhuo Chen, City University of Hong Kong Yu Guo, Beijing Normal University Qin Liu, Wuhan University Xiaohua Jia, City University of Hong Kong |
A Survey on IoT Vulnerability Discovery Xinbo Ban, Swinburne University of Technology Ming Ding, CSIRO Shigang Liu, Swinburne University of Technology Chao Chen, RMIT University Jun Zhang, Swinburne University of Technology |
An efficient authenticated group key agreement protocol with dynamic batch verification for secure distributed networks Tianqi Zhou, Kyushu University Yujie Gu, Kyushu University Wenying Zheng, Nanjing University of Aeronautics and Astronautics Haowen Tan, Kyushu University |
Towards Secure and Trustworthy Flash Loans: A Blockchain-based Trust Management Approach Yining Xie, Huawei Singapore Research Center Xin Kang, Huawei Singapore Research Center Tieyan Li , Huawei Singapore Research Center Cheng-Kang Chu, Huawei Singapore Research Center Haiguang Wang, Huawei Singapore Research Center |
Forward Traceability for Product Authenticity Using Ethereum Smart Contracts Fokke Heikamp, Deakin University Lei Pan, Deakin University Rolando Trujillo-Rasua, Deakin University Sushmita Ruj, University of New South Wales Robin Doss, Deakin University |
Exploiting redundancy in network flow information for efficient security attack detection Siqi Xia, Deakin University Sutharshan Rajasegarar, Deakin University Christopher Leckie, University of Melbourne Sarah Monazam Erfani, University of Melbourne Jeffrey Chan, RMIT University |