NSS 2022

16th International Conference on Network and System Security
Denarau Island, Fiji
Dec 9 - Dec 12, 2022

Accepted Papers

Regular Papers

Graph Intelligence Enhanced Bi-Channel Insider Threat Detection
Wei Hong, Victoria University
Jiao Yin, Victoria University
Mingshan You, Victoria University
Hua Wang, Victoria University
Jinli Cao, La Trobe University
CVallet: a Blockchain-oriented Application Development for Education and Recruitment
Zoey Ziyi Li, Monash University
Joseph K. Liu, Monash University
Jiangshan Yu, Monash University
Dragan Gasevic Monash University
Wayne Yang, Monash University
Rebound Attacks on SKINNY hashing with Automatic Toolss
Jian Guo, Nanyang Technological University
Guozhen Liu, Nanyang Technological University
Shun Li, Nanyang Technological University
Phuong Pham, Nanyang Technological University
A First Look at Android Apps' Third-party Resources Loading
Hina Qayyum, Macquarie University
Muhammad Salman, Macquarie University
I Wayan Budi Sentana, Macquarie University
Duc Linh Giang Nguyen, Macquarie University
Muhammad Ikram, Macquarie University
Gareth Tyson, Hong Kong University of Science and Technology
Mohamad Ali Kaafar, Macquarie University
A Differential Privacy Mechanism for Deceiving Cyber Attacks in IoT Networks
Guizhen Yang, Deakin University
Mengmeng Ge, University of Canterbury
Shang Gao, Deakin University
Xuequan Lu, Deakin University
Leo Yu Zhang, Deakin University
Robin Doss, Deakin University
Combination Reduction Algorithms and its application to Subversion Attack
Wei Yang, Fujian Normal University
Shaojun Yang, Fujian Normal University
Wei Wu, Fujian Normal University
Yong Zhao, Fujian Normal University
Supporting cyber-attacks and system anomaly detection research with an Industry 4.0 dataset
Lei Shi, Swinburne University of Technology
Shanti Krishnan, Swinburne University of Technology
Sheng Wen, Swinburne University of Technology
Yang Xiang, Swinburne University of Technology
Strengthening the Security of AES Against Differential Fault Attack
Anit Kumar Ghosal, Indian Institute of Technology
Dipanwita Roychowdhury, Indian Institute of Technology
RAIDER: Reinforcement-aided Spear Phishing Detector
Keelan Evans, Edith Cowan University
Alsharif Abuadbba, CSIRO's Data61
Tingmin Wu, CSIRO's Data61
Kristen Moore, CSIRO's Data61
Mohiuddin Ahmed, Edith Cowan University
Ganna Pogrebna, Charles Sturt University & The University of Sydney & The Alan Turing Institute
Surya Nepal, CSIRO's Data61 & Cybersecurity CRC
Mike Johnstone, Edith Cowan University
Comprehensive Mobile Traffic Characterization Based on a Large-Scale Mobile Traffic Dataset
Shuang Zhao, National University of Defense Technology
Jincheng Zhong, National University of Defense Technology
Shuhui Chen, National University of Defense Technology
Jianbing Liang, National University of Defense Technology
An efficient clustering-based privacy-preserving recommender system
Junwei Luo, RMIT University
Xun Yi, RMIT University
Fengling Han, RMIT University
Xuechao Yang, RMIT University
Xu Yang, Fujian Normal University
A Proof of Concept Implementation of Explainable Artificial Intelligence (XAI) in Digital Forensics
Stuart W. Hall, Monash University
Amin Sakzad, Monash University
Sepehr Minagar, Monash University
Blockchain Based Regulatory Technology Deployment for Real Estate Transaction
Ru Ray Raymond Chao, Monash University
Joseph K. Liu, Monash University
Kai Su, Monash University
Driver Locations Harvesting Attack on pRide
Shyam Murthy, International Institute of Information Technology
Srinivas Vivek, International Institute of Information Technology
Geometric Range Searchable Encryption with Forward and Backward Security
Mengwei Yang, Nanjing University of Science and Technology
Chungen Xu, Nanjing University Of Science And Technology
Pan Zhang, Nanjing University Of Science And Technology
Detecting Contradictions from CoAP RFC based on Knowledge Graph
Xinguo Feng,The University of Queensland
Yanjun Zhang, Deakin University
Mark Huasong Meng, Institute for Infocomm Research
Leveraging Frame Aggregation in Wi-Fi IoT Networks for Low-Rate DDoS Attack Detection
Bhagyashri Tushir, Santa Clara University
Yuhong Liu, Santa Clara University
Behnam Dezfouli, Santa Clara Universit
Vulnerability Detection Using Deep Learning Based Function Classification
Huihui Gong, The University of Sydney, Australia
Siqi Ma, The University of New South Wales
Seyit Camtepe, CSIRO Data61
Surya Nepal, CSIRO
Chang Xu, The University of Sydney
Differentiated Security Architecture for Secure and Efficient Infotainment Data Communication in IoV Networks
Jiani Fan, Nanyang Technological University
Lwin Khin Shar, Singapore Management University
Jiale Guo, Nanyang Technological University
Wenzhuo Yang, Nanyang Technological University
Dusit Niyato, Nanyang Technological University
Kwok-Yan Lam, Nanyang Technological University
BSB: Bringing Safe Browsing to Blockchain Platform
Zhuang Zhou, Wuhan University of Technology
Cheng Tan, Wuhan University of Technology
Shiyun Liu, Wuhan University of Technology
Rongwei Yu, Wuhan University
Siwei Wu, Zhejiang University
Shengwu Xiong, Wuhan University of Technology
A Learning Methodology for Line-Rate Ransomware Mitigation with P4 Switches
Kurt Friday, The University of Texas at San Antonio
Elias Bou-Harb, The University of Texas at San Antonio
Jorge Crichigno, The University of South Carolina
Enabling Secure Deduplication in Encrypted Decentralized Storage
Bo Zhang, Northwestern Polytechnical University
Helei Cui, Northwestern Polytechnical University
Yaxing Chen, Northwestern Polytechnical University
Xiaoning Liu, Royal Melbourne Institute of Technology
Zhiwen Yu, Northwestern Polytechnical University
Bin Guo, Northwestern Polytechnical University
The Force of Compensation, A Multi-stage Incentive Mechanism Model for Federated Learning
Han Xu, University of Technology Sydney
Priyadarsi Nanda, University of Technology Sydney
Jie Liang, University of Technology Sydney
Xiangjian He, University of Nottingham Ningbo China

Short Papers

A Privacy-Preserving Distributed Machine Learning Protocol based on Homomorphic Hash Authentication
Yang Hong, Nanjing University of Aeronautics and Astronautics
Lisong Wang, Nanjing University of Aeronautics and Astronautics
Weizhi Meng, Technical University of Denmark
Chunpeng Ge, Nanjing University of Aeronautics and Astronautics
An efficient lattice-based encrypted search scheme with forward security
Xiaoling Yu, Taiyuan University of Technology
Lei Xu, Nanjing University of Science and Technology
Xin Huang, Taiyuan University of Technology
Chungen Xu, Nanjing University of Science & Technology
Practical Anonymous Multi-Hop Locks for Lightning Network Compatible Payment Channel Networks
Mengling Liu,The University of Hong Kong
Man Ho Au, The University of Hong Kong
Decentralized Access Control for Secure Microservices Cooperation with Blockchain
Ning Xi, Xidian University
Yajie Li, Xidian University
Jin Liu, Xidian University
Reducing Intrusion Alert Trees to Aid Visualization
Eric Ficke, UTSA
Raymond Bateman, U.S. Army Research Laboratory South - Cyber
Shouhuai Xu, University of Colorado Colorado Springs
Evaluating the Security of Merkle-Damgård Hash Functions and Combiners in Quantum Settings
Zhenzhen Bao, Tsinghua University
Jian Guo, Nanyang Technological University
Shun Li, Nanyang Technological University
Phuong Pham, Nanyang Technological University
Efficient and Fine-Grained Sharing of Signed Healthcare Data in Smart Healthcare
Jianghua Liu, Nanjing University of Science and Technology
Lei Xu, Nanjing University of Science and Technology
Bruce Gu, Victoria University
Lei Cui, Shandong Computer Science Cente
Fei Zhu, RMIT University
Attacker Attribution Through Characteristics Inference Using Honeypot Data
Pierre Crochelet, Polytechnique Montreal
Christopher Neal, Polytechnique Montreal
Nora Boulahia Cuppens , Polytechnique Montreal
Frederic Cuppens, Polytechnique Montreal
DOT-M: A Dual Offline Transaction Scheme of Central Bank Digital Currency for Trusted Mobile Devices
Bo Yang, National Fintech Evaluation Center
Yanchao Zhang, National Fintech Evaluation Center
Dong Tong, National Fintech Evaluation Center
Network Intrusion Detection Adversarial attacks for LEO Constellation Networks based on deep learning
Li Yunhao, GuangZhou University
Mo Weichuan, GuangZhou University
Cong Li, Guangzhou University
Wang Haiyang, Guangzhou University
He Jianwei, CASIC Space Engineering Development Co.
Hao Shanshan, CASIC Space Engineering Development Co.
Yan Hongyang, Guangzhou University
Blockchain-based Access Control for Smart Manufacturer Secure Management System
AdityaKalapaaking, RMIT University
Ibrahim Khalil, RMIT University
Mohammad Rahman, RMIT University
A Beyond-5G Authentication and Key Agreement protocol
Mohamed Taoufiq Damir, University of Helsinki
Tommi Meskanen, University of Helsinki
Sara Ramezanian, University of Helsinki
Valtteri Niemi , University of Helsinki
Privacy-Preserving Online Ride-Hailing Matching System with an Untrusted Server
Hongcheng Xie, City University of Hong Kong
Zizhuo Chen, City University of Hong Kong
Yu Guo, Beijing Normal University
Qin Liu, Wuhan University
Xiaohua Jia, City University of Hong Kong
A Survey on IoT Vulnerability Discovery
Xinbo Ban, Swinburne University of Technology
Ming Ding, CSIRO
Shigang Liu, Swinburne University of Technology
Chao Chen, RMIT University
Jun Zhang, Swinburne University of Technology
An efficient authenticated group key agreement protocol with dynamic batch verification for secure distributed networks
Tianqi Zhou, Kyushu University
Yujie Gu, Kyushu University
Wenying Zheng, Nanjing University of Aeronautics and Astronautics
Haowen Tan, Kyushu University
Towards Secure and Trustworthy Flash Loans: A Blockchain-based Trust Management Approach
Yining Xie, Huawei Singapore Research Center
Xin Kang, Huawei Singapore Research Center
Tieyan Li , Huawei Singapore Research Center
Cheng-Kang Chu, Huawei Singapore Research Center
Haiguang Wang, Huawei Singapore Research Center
Forward Traceability for Product Authenticity Using Ethereum Smart Contracts
Fokke Heikamp, Deakin University
Lei Pan, Deakin University
Rolando Trujillo-Rasua, Deakin University
Sushmita Ruj, University of New South Wales
Robin Doss, Deakin University
Exploiting redundancy in network flow information for efficient security attack detection
Siqi Xia, Deakin University
Sutharshan Rajasegarar, Deakin University
Christopher Leckie, University of Melbourne
Sarah Monazam Erfani, University of Melbourne
Jeffrey Chan, RMIT University
Fiji National University
Monash University
University of QueensLand
NSCLab class
Springer
Malaga
Concordia