


default search action
UbiSec 2023: Exeter, UK
- Guojun Wang

, Haozhe Wang
, Geyong Min
, Nektarios Georgalas
, Weizhi Meng
:
Ubiquitous Security - Third International Conference, UbiSec 2023, Exeter, UK, November 1-3, 2023, Revised Selected Papers. Communications in Computer and Information Science 2034, Springer 2024, ISBN 978-981-97-1273-1
Cyberspace Security
- Zheqi Feng, Tao Peng

, Guojun Wang
, Kejian Guan:
Bilateral Personalized Information Fusion in Mobile Crowdsensing. 3-16 - Amirah Almutairi

, BooJoong Kang
, Nawfal Al Hashimy
:
BiBERT-AV: Enhancing Authorship Verification Through Siamese Networks with Pre-trained BERT and Bi-LSTM. 17-30 - Andrei Vasile Mihalca, Ciprian Pavel Oprisa:

Impact of Library Code in Binary Similarity Systems. 31-44 - Lars Hupel

, Makan Rafiee:
How Does Post-quantum Cryptography Affect Central Bank Digital Currency? 45-62 - Yuheng Zhang

, Pin Liu
, Guojun Wang
, Peiqiang Li, Wanyi Gu, Houji Chen, Xuelei Liu, Jinyao Zhu:
FRAD: Front-Running Attacks Detection on Ethereum Using Ternary Classification Model. 63-75 - Aysan Esmradi, Daniel Wankit Yip, Chun-Fai Chan:

A Comprehensive Survey of Attack Techniques, Implementation, and Mitigation Strategies in Large Language Models. 76-95 - Chun-Fai Chan

, Kam-Pui Chow:
Process Mining with Programmable Logic Controller Memory States. 96-113 - Vinay Sachidananda, Berwyn Chai, Florian Gondesen

, Kwok-Yan Lam, Yang Liu
:
Honey-Gauge: Enabling User-Centric Honeypot Classification. 114-132 - Georgios P. Spathoulas

, Marios Anagnostopoulos
, Konstantinos Papageorgiou, Georgios Kavallieratos
, Georgios Theodoridis:
Improving DNS Data Exfiltration Detection Through Temporal Analysis. 133-146 - Petr Muzikant

, Jan Willemson
:
Deploying Post-quantum Algorithms in Existing Applications and Embedded Devices. 147-162 - Tieming Geng, Chin-Tser Huang, Csilla Farkas:

SCORD: Shuffling Column-Oriented Relational Database to Enhance Security. 163-176 - Antonin Verdier

, Romain Laborde
, Mohamed Ali Kandi, Abdelmalek Benzekri:
A SLAHP in the Face of DLL Search Order Hijacking. 177-190 - Masayoshi Tsutsui, Tatsuya Kaneko

, Shinya Takamaeda-Yamazaki:
Poison Egg: Scrambling Federated Learning with Delayed Backdoor Attack. 191-204 - Zhonghao Lu, Lina Xu, Ying Hu, Liping Sun, Yonglong Luo:

Channel Spatio-Temporal Convolutional Network for Trajectory Prediction. 205-218 - Andri Rai

, Eul Gyu Im
:
Multi-NetDroid: Multi-layer Perceptron Neural Network for Android Malware Detection. 219-235 - Yuwei Xu, Tiantian Zhang, Junyu Zeng, Rongrong Wang, Kehui Song, Jingdong Xu:

SmartBuoy: A Machine Learning-Based Detection Method for Interest Flooding Attacks in VNDN. 236-252
Cyberspace Privacy
- Cong Zha, Zhenan Xu, Ju Xing, Hao Yin:

Loft: An Architecture for Lifetime Management of Privacy Data in Service Cooperation. 255-273 - Tsz Ho Pun, Yi Jun He, Siu Ming Yiu:

Privacy-Preserving Blockchain-Based Traceability System with Decentralized Ciphertext-Policy Attribute-Based Encryption. 274-288 - Qingru Li

, Yahong Wang
, Fangwei Wang
, Zhiyuan Tan
, Changguang Wang
:
A Probability Mapping-Based Privacy Preservation Method for Social Networks. 289-303 - Avishka Shamendra, Binoy Peries, Gayangi Seneviratne

, Sunimal Rathnayake:
TruFaaS - Trust Verification Framework for FaaS. 304-318 - Mohammad Rafsun Islam, Ahmed Saleh Bataineh, Mohammad Zulkernine:

Detection of Cyberbullying in Social Media Texts Using Explainable Artificial Intelligence. 319-334 - Faseeh Iftikhar, Muhammad Faizan Khan

, Guojun Wang
, Fazli Wahid:
Privacy Preserving Elder Fall Detection Using Deep Learning. 335-347 - Li Ma

, Qidi Lao
, Wenyin Yang
, Zexian Yang, Dong Yuan, Zhaoxiong Bu:
Research on Authorization Model of Attribute Access Control Based on Knowledge Graph. 348-359
Cyberspace Anonymity
- Harry Halpin

:
Simulation of Mixmining Reward Parameters for the Nym Mixnet. 363-379 - Michael Mireku Kwakye

, Ken Barker:
Blockchain-Based Privacy-Preservation Platform for Data Storage and Query Processing. 380-400 - Andre Büttner

, Andreas Thue Pedersen
, Stephan Wiefling
, Nils Gruschka
, Luigi Lo Iacono
:
Is It Really You Who Forgot the Password? When Account Recovery Meets Risk-Based Authentication. 401-419 - Ali Alshumrani

, Nathan L. Clarke
, Bogdan Ghita
:
A Unified Knowledge Graph to Permit Interoperability of Heterogenous Digital Evidence. 420-435 - Chin-Tser Huang

, Laurent Njilla
, Matthew Sharp
, Tieming Geng
:
SMARPchain: A Smart Marker Based Reputational Probabilistic Blockchain for Multi-agent Systems. 436-449 - Daniel Chong, Junjie Zhang, Nathaniel Boland, Lingwei Chen:

Automatically Inferring Image Base Addresses of ARM32 Binaries Using Architecture Features. 450-461

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














