UbiSec 2024 Accepted Papers
返回上一页
Alkhansaa Abuhashim, Hassan Shafei and Chiu Tan.
Can We Use Smart Contracts to Improve Security of IoT Apps?
Zijian Guo, Xin Yin, Wenjun Jiang and Jingjing Wang.
Multidimensional features based knowledge tracing
Li Ma, Zhenghao Yu, Wenyin Yang, Sipei Wu, Meifang Xie, Chunrong Lai and Baoyao Yang.
A Data-free Backdoor Attack Approach in Self-Supervised Models
Yuqing Zeng, Muying Zhao, Wenjun Jiang and Jingjing Wang.
Enhancing Personalized Bundle Recommendation with Serendipity
Yuxing Li, Chongtao Zhu, Xiaoyan Liao, Qi Liu and Shaobo Zhang.
Enhanced K-means Clustering Algorithm Integrating Outlier Detection and Density Peaks
Zhi Yi, Qi Lv, Shuhong Chen, Ying Liang and Yinglong Dai.
Closed-loop Safe Correction for Reinforcement Learning Policy
Xuan Xie, Yuting Hu, Xinpu Chen, Yumin Lin, Zhiqing Tang, Jianxiong Guo and Tian Wang.
Fast and Efficient Layer-aware Container Vulnerability Patching in Edge Computing
Canbin Zhou, Jun Bao and Chongzhi Gao.
Enhancing Network Robustness through Feature Normalization and Improved Data Augmentation
Mingyang Li, Haodong Ren, Yijie He and Jie Chen.
A Meta-Learning-Based Fault Waveform Detection Method for Distribution Lines Security
Taejun Choi, Daniel Van Niekerk, Octav Opaschi, Costin Enache and Ryan K L Ko.
Auditing the Auditor: Heuristics for Testing Password Auditing System Security
Michael Okyere and Wanpeng Li.
Single sign-on Security: An empirical study of Sign in with Apple
Zhuoyi Wu, Guojun Wang, Xuelei Liu, Yuheng Zhang, Mingfei Chen, Jinrong Kong and Wanyi Gu.
SEQDroid: A Deep Learning Approach for Android Malware Detection Based on API Sequences
Houji Chen, Tao Peng, Yuheng Zhang, Zhidong Xie and Wei You.
Ghaos: Phishing Detection on Ethereum Using Opcode Sequences with GraphSAGE-Attention
Abdulaziz Alshammari.
Integrating K-Anonymity with Meta-Heuristic Algorithms for Enhanced Data Privacy and Security
Yuheng Zhang, Guojun Wang, Peiqiang Li, Houji Chen, Zhuoyi Wu and Jinrong Kong.
SADT: Sandwich Attack Detection for Transactions on Decentralized Exchanges
Li Binghan, Zhu Youwen and Guo Jing.
Marriage Matching For Bipartite Graphs Under Condensed Local Differential Privacy
Chengnuo Cai, Bo Yu, Lei Zhou and Yeqi Mou.
FCFuzz: Format Constrained Fuzzing for Network Protocol Implementations
Wei You, Tao Peng, Zhidong Xie and Houji Chen.
Optimizing Task Allocation with Privacy-Preserving Using Fuzzy Inference
Matthijs Marinus, Vasileios Tsouvalas and Nirvana Meratnia.
On the Effectiveness of Invisible Backdoor Attacks in Federated Learning
Qian Liu, Lei Zhou, Xu Zhou, Yuan Wei, Danjun Liu and Zhendong Wu.
FSFuzzer: A High-Performance Greybox Fuzzer for Stateful Network Protocol
Jinrong Kong, Guojun Wang, Mingfei Chen, Yuheng Zhang, Zhuoyi Wu and Wanyi Gu.
DQSroid: Dynamic Android Malware Detection Based on Quadruple Sequences and Data Augmentation
Junwei Zhou, Kai Song and Botian Lei.
Fast Encrypted Image Classification Based on Approximate Matrix Multiplication without Multiplying
Jingwen Tuo and Mingwu Zhang.
A Multi-Subset Privacy-Preserving Data Aggregation Scheme with Enhanced Statistical Analysis Capabilities for IoT
Jiazhao Ma, Zhuowen Ma and Shaohong Zhang.
Privacy-preserving Cluster Similarity Model for Multi-user and Multi-data
Kelu Ye, Youwen Zhu and Jing Guo.
Blockchain-Based Secure Spectrum Sensing and Sharing Mechanism
Wenbin Chen, Zhibo Li, Guolong Zeng and Yutao Qi.
Towards Tightly Secure Strongly Unforgeable Short Lattice Signatures
Xiaoyu Li, Junjie Mai and Chongzhi Gao.
Improving transferability of adversarial examples by SVD transformation
Mingfeng Su, Cui Wang, Wenjun Yang, Zhimin Liu, Cong Zhou and Xiaoyu Zhu.
Pedestrian Detection Approach with Multi-strategy Image Recognition Improvement Mechanism for Safe Truck Driving
Wenyin Yang, Guihong Sun, Li Ma, Zikai Zhao and Xianxi Liang.
TNSSL: TrojanNet Attack in Self-Supervised Learning
Haojie Yin, Shuhong Chen, Zhenkun Luo, Mengmeng Tang, Sipeng Zhang and Zhuyi Yao.
A Blockchain-based Selective Disclosure Authentication System: A Self-Sovereign Credential Scheme Combining
Decentralized Identity and Zero-Knowledge Proofs
Zakirul Alam Bhuiyan, Muhammad Ehsan, Yuanfang Chen, Jian Shen and Md Arafatur Rahman.
A New Generation Wireless Biometric System with Deep Feature Fusion in IoT
Weichuan Mo, Li Hu, Bing Mi and Kongyang Chen.
Enhancing Data Security and Efficiency in Digital Economy: A Blockchain-Based Data Trading System
Shichang Chen and Ya Li.
FT-SPC: A Fine-tuning Approach for Backdoor Defense via Adversarial Sample Selection