default search action
UbiSec 2023: Exeter, UK
- Guojun Wang, Haozhe Wang, Geyong Min, Nektarios Georgalas, Weizhi Meng:
Ubiquitous Security - Third International Conference, UbiSec 2023, Exeter, UK, November 1-3, 2023, Revised Selected Papers. Communications in Computer and Information Science 2034, Springer 2024, ISBN 978-981-97-1273-1
Cyberspace Security
- Zheqi Feng, Tao Peng, Guojun Wang, Kejian Guan:
Bilateral Personalized Information Fusion in Mobile Crowdsensing. 3-16 - Amirah Almutairi, BooJoong Kang, Nawfal Al Hashimy:
BiBERT-AV: Enhancing Authorship Verification Through Siamese Networks with Pre-trained BERT and Bi-LSTM. 17-30 - Andrei Vasile Mihalca, Ciprian Pavel Oprisa:
Impact of Library Code in Binary Similarity Systems. 31-44 - Lars Hupel, Makan Rafiee:
How Does Post-quantum Cryptography Affect Central Bank Digital Currency? 45-62 - Yuheng Zhang, Pin Liu, Guojun Wang, Peiqiang Li, Wanyi Gu, Houji Chen, Xuelei Liu, Jinyao Zhu:
FRAD: Front-Running Attacks Detection on Ethereum Using Ternary Classification Model. 63-75 - Aysan Esmradi, Daniel Wankit Yip, Chun-Fai Chan:
A Comprehensive Survey of Attack Techniques, Implementation, and Mitigation Strategies in Large Language Models. 76-95 - Chun-Fai Chan, Kam-Pui Chow:
Process Mining with Programmable Logic Controller Memory States. 96-113 - Vinay Sachidananda, Berwyn Chai, Florian Gondesen, Kwok-Yan Lam, Yang Liu:
Honey-Gauge: Enabling User-Centric Honeypot Classification. 114-132 - Georgios P. Spathoulas, Marios Anagnostopoulos, Konstantinos Papageorgiou, Georgios Kavallieratos, Georgios Theodoridis:
Improving DNS Data Exfiltration Detection Through Temporal Analysis. 133-146 - Petr Muzikant, Jan Willemson:
Deploying Post-quantum Algorithms in Existing Applications and Embedded Devices. 147-162 - Tieming Geng, Chin-Tser Huang, Csilla Farkas:
SCORD: Shuffling Column-Oriented Relational Database to Enhance Security. 163-176 - Antonin Verdier, Romain Laborde, Mohamed Ali Kandi, Abdelmalek Benzekri:
A SLAHP in the Face of DLL Search Order Hijacking. 177-190 - Masayoshi Tsutsui, Tatsuya Kaneko, Shinya Takamaeda-Yamazaki:
Poison Egg: Scrambling Federated Learning with Delayed Backdoor Attack. 191-204 - Zhonghao Lu, Lina Xu, Ying Hu, Liping Sun, Yonglong Luo:
Channel Spatio-Temporal Convolutional Network for Trajectory Prediction. 205-218 - Andri Rai, Eul Gyu Im:
Multi-NetDroid: Multi-layer Perceptron Neural Network for Android Malware Detection. 219-235 - Yuwei Xu, Tiantian Zhang, Junyu Zeng, Rongrong Wang, Kehui Song, Jingdong Xu:
SmartBuoy: A Machine Learning-Based Detection Method for Interest Flooding Attacks in VNDN. 236-252
Cyberspace Privacy
- Cong Zha, Zhenan Xu, Ju Xing, Hao Yin:
Loft: An Architecture for Lifetime Management of Privacy Data in Service Cooperation. 255-273 - Tsz Ho Pun, Yi Jun He, Siu Ming Yiu:
Privacy-Preserving Blockchain-Based Traceability System with Decentralized Ciphertext-Policy Attribute-Based Encryption. 274-288 - Qingru Li, Yahong Wang, Fangwei Wang, Zhiyuan Tan, Changguang Wang:
A Probability Mapping-Based Privacy Preservation Method for Social Networks. 289-303 - Avishka Shamendra, Binoy Peries, Gayangi Seneviratne, Sunimal Rathnayake:
TruFaaS - Trust Verification Framework for FaaS. 304-318 - Mohammad Rafsun Islam, Ahmed Saleh Bataineh, Mohammad Zulkernine:
Detection of Cyberbullying in Social Media Texts Using Explainable Artificial Intelligence. 319-334 - Faseeh Iftikhar, Muhammad Faizan Khan, Guojun Wang, Fazli Wahid:
Privacy Preserving Elder Fall Detection Using Deep Learning. 335-347 - Li Ma, Qidi Lao, Wenyin Yang, Zexian Yang, Dong Yuan, Zhaoxiong Bu:
Research on Authorization Model of Attribute Access Control Based on Knowledge Graph. 348-359
Cyberspace Anonymity
- Harry Halpin:
Simulation of Mixmining Reward Parameters for the Nym Mixnet. 363-379 - Michael Mireku Kwakye, Ken Barker:
Blockchain-Based Privacy-Preservation Platform for Data Storage and Query Processing. 380-400 - Andre Büttner, Andreas Thue Pedersen, Stephan Wiefling, Nils Gruschka, Luigi Lo Iacono:
Is It Really You Who Forgot the Password? When Account Recovery Meets Risk-Based Authentication. 401-419 - Ali Alshumrani, Nathan L. Clarke, Bogdan Ghita:
A Unified Knowledge Graph to Permit Interoperability of Heterogenous Digital Evidence. 420-435 - Chin-Tser Huang, Laurent Njilla, Matthew Sharp, Tieming Geng:
SMARPchain: A Smart Marker Based Reputational Probabilistic Blockchain for Multi-agent Systems. 436-449 - Daniel Chong, Junjie Zhang, Nathaniel Boland, Lingwei Chen:
Automatically Inferring Image Base Addresses of ARM32 Binaries Using Architecture Features. 450-461
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.