国际信息与通信安全会议(International Conference on Information and Communications Security, ICICS)作为CCF C类、网络信息安全领域优秀国际会议。ICICS 2019年共收到199(2018:202)篇论文,录取48(2018:39)篇论文,录用率为24.1%(2018:19.3%)。录用论文作者中大部分均来自于国内高校,包含清华、中科院、上交、武大、人大、北航、北邮等多所高校,小编将录用论文标题列举如下:
•Differentially Private Reinforcement Learning
Pingchuan Ma, Beijing Electronic Science and Technology Institute, China Zhiqiang Wang, Beijing Electronic Science and Technology Institute, China Le Zhang, Beijing Electronic Science and Technology Institute, China Ruming Wang, Hainan University, China
• Differentially Private Frequent Itemset Mining against Incremental Updates
Liang Wenjuan, Renmin University of China
•Towards Blockchain-enabled Searchable Encryption
Qiang Tang, Luxembourg Institute of Science and Technology, Luxembourg
•Parallel Steepest Ascent Hill-Climbing for High Nonlinear Boolean and Vectorial Boolean Functions (S-Boxes)
Athmane Seghier, Beihang University, China Jianxin Li, Beihang University, China
• VulHunter: An Automated Vulnerability Detection System based on Deep Learning and Bytecode
Ning Guo, Key Laboratory of Trustworthy Distributed Computing and Service (BUPT), Ministry of Education, China Xiaoyong Li, Key Laboratory of Trustworthy Distributed Computing and Service (BUPT), Ministry of Education, China Hui Yin, College of Computer Science and Engineering, Shandong University of Science and Technology, China Yali Gao, Key Laboratory of Trustworthy Distributed Computing and Service (BUPT), Ministry of Education, China
•SecFlush: A Hardware/Software Collaborative Design for Real-Time Detection and Defense against Flush-Based Cache Attacksagainst Flush-Based Cache Attacks
Churan Tang, State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China Zongbin Liu, State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China Jingquan Ge, State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China Cunqing Ma, State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China
•Ciphertext Policy Attribute-Based Encryption for Circuits from LWE Assumption
Geng Wang, Shanghai Jiao Tong University, China Zhen Liu, Shanghai Jiao Tong University, China Dawu Gu, Shanghai Jiao Tong University, China
•Automatic Demirci-Selçuk Meet-in-the-Middle Attack on SKINNY with Key-bridging
Qiu Chen, State Key Laboratory of Information Security,Institute of Information Engineering, CAS, China Danping Shi, State Key Laboratory of Information Security,Institute of Information Engineering, CAS, China Siwei Sun, State Key Laboratory of Information Security,Institute of Information Engineering, CAS, China Lei Hu, State Key Laboratory of Information Security,Institute of Information Engineering, CAS, China
•An Adversarial Attack Based on Multi-Objective Optimization in the Black-box Scenario:MOEA-APGA II
Chunkai Zhang, Harbin Institute of Technology, China Yepeng Deng, Harbin Institute of Technology, Shenzhen, China Xin Guo, Harbin Institute of Technology, Shenzhen, China, China Xuan Wang, Harbin Institute of Technology Graduate School, China
• DTGuard: A Lightweight Defence Mechanism against a New DoS Attack on SDN
Jianwei Hou, Renmin University of China, China Ziqi Zhang, Renmin University of China, China Wenchang Shi, Renmin University of China, China Bo Qin, Renmin University of China, China Bin Liang, Renmin University of China, China
•Practical Evaluation Methodology of Higher-order Maskings at Different Operating Frequencies
Yuguang Li, China Academy of Information and Communications Technology, Beijing Ming Tang, School of Cyber Science and Engineering, Wuhan University, China Pengbo Wang, School of Cyber Science and Engineering, Wuhan University, China Yanbin Li, College of Information Science and Technology, Nanjing Agricultural University, China Shan Fu, Beijing University of Posts and Telecommunications, China
•Hierarchical Representation Network for Steganalysis of QIM Steganography in Low-Bit-Rate Speech Signals
Hao Yang, Tsinghua University, China Zhong-Liang Yang, Tsinghua University, China Yong-Jian Bao, Tsinghua University, China Yong-Feng Huang, Tsinghua University, China
• Deep Learning-Based Vulnerable Function Detection: A Benchmark
Guanjun Lin, Swinburne University of Technology, Australia Wei Xiao, Changchun University of Technology, China Jun Zhang, Swinburne University of Technology, Australia Yang Xiang, Swinburne University of Technology, Australia
•Privacy-Preserving eID Derivation for Self-Sovereign Identity Systems
Andreas Abraham, Institute of Applied Information Processing and Communications, Austria Felix Hörandner, Institute of Applied Information Processing and Communications, Austria Olamide Omolola, IAIK, TU Graz, Austria Sebastian Ramacher, AIT Austrian Institute of Technology, Austria
•Provably Secure Group Authentication in the Asynchronous Communication Model
Zhe Xia, Wuhan University of Technology, China Lein Harn, University of Missouri-Kansas City, United States Bo Yang, Shaanxi Normal University, China Mingwu Zhang, Hubei University of Technology, China Yi Mu, Fujian Normal University, China Willy Susilo, University of Wollongong, Australia Weizhi Meng, Technical University of Denmark, Denmark
•Using Equivalent Class to Solve Interval Discrete Logarithm Problem
Bin Qi, State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China Jie Ma, State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China Kewei Lv, State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China
•DLchain: a Covert Channel over Blockchain based on Dynamic Labels
Jing Tian, Institute of Information Engineering, Chinese Academy of Sciences. University of Chinese Academy of Sciences, China Gaopeng Gou, Institute of Information Engineering, Chinese Academy of Sciences. University of Chinese Academy of Sciences, China Chang Liu, Institute of Information Engineering, Chinese Academy of Sciences. University of Chinese Academy of Sciences, China Yige Chen, Institute of Information Engineering, Chinese Academy of Sciences. University of Chinese Academy of Sciences, China Gang Xiong, Institute of Information Engineering, Chinese Academy of Sciences. University of Chinese Academy of Sciences, China Zhen Li, Institute of Information Engineering, Chinese Academy of Sciences. University of Chinese Academy of Sciences, China
•Neuron Selecting: Defending against Adversarial Examples in Deep Neural Networks
Ming Zhang, National Key Laboratory of Science and Technology on Information System Security, China Hu Li, National Key Laboratory of Science and Technology on Information System Security, China Xiaohui Kuang, National Key Laboratory of Science and Technology on Information System Security, China Ling Pang, National Key Laboratory of Science and Technology on Information System Security, China Zhendong Wu, National Key Laboratory of Science and Technology on Information System Security, China
•Convolutional Neural Network based Side-Channel Attacks with Customized Filters
Man Wei, State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China Danping Shi, State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China Siwei Sun, State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China Peng Wang, State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China Lei Hu, State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China
• AGE: Authentication Graph Embedding for Detecting Anomalous Login Activities
Renzheng Wei, Institute of Information Engineering, Chinese Academy of Sciences, China Lijun Cai, Institute of Information Engineering, Chinese Academy of Sciences, China Aimin Yu, Institute of Information Engineering, Chinese Academy of Sciences, China Dan Meng, Institute of Information Engineering, Chinese Academy of Sciences, China
•Privacy-preserving Decentralised Singular Value Decomposition
Qiang Tang, Luxembourg Institute of Science and Technology, Luxembourg Bowen Liu, Luxembourg Institute of Science and Technology, Luxembourg
• Towards Homograph-confusable Domain Name Detection using Dual-channel CNN
Guangxi Yu, Institute of Information Engineering,Chinese Academy of Sciences& University of Chinese Academy of Sciences, China Xinghua Yang, Institute of Information Engineering, Chinese Academy of Sciences, China Yan Zhang, Institute of Information Engineering, Chinese Academy of Sciences & University of Chinese Academy of Sciences, China Huajun Cui, Institute of Information Engineering, Chinese Academy of Sciences & University of Chinese Academy of Sciences, China Huiran Yang, Institute of Information Engineering, Chinese Academy of Sciences, China Yang Li, Institute of Information Engineering, Chinese Academy of Sciences & University of Chinese Academy of Sciences, China
•A Multi-group Signature Scheme from Lattices
Tian Qiu, State Key Laboratory of Information Security,Institute of Information Engineering, Chinese Academy of Sciences, China Lin Hou, State Key Laboratory of Information Security,Institute of Information Engineering, Chinese Academy of Sciences, China Dongdai Lin, State Key Laboratory of Information Security,Institute of Information Engineering, Chinese Academy of Sciences, China
• Fraud Detection on Digital Payment Platforms with Fewer Labels
Ruoyu Deng, Shanghai Jiao Tong University, China Ruan Na, Shanghai Jiao Tong University, China
• WSLD: Detecting Unknown Webshell Using Fuzzy Matching and Deep Learning
Zihao Zhao, Institute of Information Engineering, Chinese Academy of Sciences, China Qixu Liu, Institute of Information Engineering, Chinese Academy of Sciences, China Tiantian Song, Tsinghua-Berkeley Shenzhen Institute, Tsinghua University, China Zhi Wang, Institute of Information Engineering, Chinese Academy of Sciences, China Xianda Wu, Institute of Information Engineering, Chinese Academy of Sciences, China
• Cloning Vulnerability Detection in Driver Layer of IoT Devices
Weipeng Jiang, SKLOIS, Institute of Information Engineering, CAS; School of Cyber Security, University of Chinese Academy of Sciences, China Bin Wu, State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China Zhou Jiang, School of Computer and Software, Nanjing University of Information Science and Technology Nanjing China, China Shaobo Yang, School of Software, North University of China, Taiyuan, China
• AADS: A Noise-Robust Anomaly Detection Framework for Industrial Control Systems
Maged Abdelaty, Fondazione Bruno Kessler and University of Trento, Italy Roberto Doriguzzi-Corin, Fondazione Bruno Kessler, Italy Domenico Siracusa, Fondazione Bruno Kessler, Italy
•Improved Differential Attacks on GIFT-64
Huaifeng Chen, The 6-th Research Institute of China Electronics Corporation, China Rui Zong, Institute for Advanced Study, Tsinghua University, China Xiaoyang Dong, Institute for Advanced Study, Tsinghua University, China
•CloudCoT: A Blockchain-based Cloud Service Dependency Attestation Framework
Zhenyu Zhao, Peking University, China Wu Luo, Peking University, China Qingni Shen, Peking University, China Anbang Ruan, Octa Innovations Ltd, China
• Evading API Call Sequence Based Malware Classifiers
Fenil Fadadu, C3I Center, Department of CSE, Indian Institute of Technology, Kanpur, India Anand Handa, C3I Center, Department of CSE, Indian Institute of Technology, Kanpur, India Nitesh Kumar, C3I Center, Department of CSE, Indian Institute of Technology, Kanpur, India Sandeep K. Shukla, C3I Center, Department of CSE, Indian Institute of Technology, Kanpur, India
• A Character-Level BiGRU-Attention For Phishing Classification
Lijuan Yuan, Yunnan University of Finance and Economics, China Zhiyong Zeng, Yunnan University of Finance and Economics, China Yikang Lu, Yunnan University of Finance and Economics, China Tao Feng, Yunnan University of Finance and Economics, China
•Adaptively Secure Puncturable Pseudorandom Functions via Punturable Identity-Based KEMs
Xin Wang, Chinese Academy of Sciences, China Shimin Li, Chinese Academy of Sciences, China Rui Xue, The Institute of Information Engineering, CAS , China
•Tear Off Your Disguise: Phishing WebsiteDetection using Visual and Network Identities
Zhaoyu Zhou, Institute of Information Engineering; School of Cyber Security, University of Chinese Academy of Sciences, China Lingjing Yu, Institute of Information Engineering; School of Cyber Security, University of Chinese Academy of Sciences, China Qingyun Liu, Institute of Information Engineering, Chinese Academy of Sciences, China Yang Liu, Institute of Information Engineering, Chinese Academy of Sciences, China Bo Luo, The University of Kansas, United States
•HeteroUI:A Novel Framework Based on Heterogeneous Information Network Embedding for User Identification in Enterprise Networks
Meng Li, Institute of Information Engineering, Chinese Academy of Sciences, China Lijun Cai, Institute of Information Engineering, Chinese Academy of Sciences, China Aimin Yu, Institute of Information Engineering, Chinese Academy of Sciences, China Haibo Yu, Institute of Information Engineering, Chinese Academy of Sciences, China Dan Meng, Institute of Information Engineering, Chinese Academy of Sciences, China
• Capturing the Persistence of Facial Expression Features for Deep fake Video Detection
Yiru Zhao, School of Cyber Science and Engineering, Wuhan University, China Wanfeng Ge, School of Cyber Science and Engineering, Wuhan University, China Wenxin Li, School of Cyber Science and Engineering, Wuhan University, China Run Wang, School of Cyber Science and Engineering, Wuhan University, China Lei Zhao, School of Cyber Science and Engineering, Wuhan University, China Jiang Ming, University of Texas at Arlington, United States
• Automated Cyber Threat Intelligence Reports Classication for Early Warning of Cyber Attacks in Next Generation SOC
Wenzhuo Yang, Nanyang Technological University, Singapore Kwok Yan Lam, Nanyang Technological University, Singapore
•Towards Comprehensive Security Analysis of Hidden Services Using Binding Guard Relays
Chen Muqian, Institute of Information Engineering, Chinese Academy of Sciences, China Xuebin Wang, Institute of Information Engineering, Chinese Academy of Sciences, China Jinqiao Shi, Beijing University of Posts and Telecommunications, China Yue Gao, Institute of Information Engineering, Chinese Academy of Sciences, China Can Zhao, Institute of Information Engineering, Chinese Academy of Sciences, China Wei Sun, Beijing Jiaotong University, School of Computer and Information Technology, China
•Impact of Multiple Reflections on Secrecy Capacity of Indoor VLC System
Jian Chen, Auburn University, United States Tao Shu, Auburn University, United States
•UBER: Combating Sandbox Evasion via User Behavior Emulators
Pengbin Feng, George Mason University, United States Jianhua Sun, College of William and Mary, United States Songsong Liu, George Mason University, United States Kun Sun, George Mason University, United States
•Privacy-Preservinig Machine Learning based on Secret Sharing
Ye Dong, School of Cyber Security,University of Chinese Academy of Sciences, China Xiaojun Chen, Institute of Information Engineering,Chinese Academy of Sciences , China Liyan Shen, School of Cyber Security,University of Chinese Academy of Sciences, China
• Characterizing Internet-scale ICS Automated Attacks through Long-term Honeypot Data
Jianzhou You, School of Cyber Security, University of Chinese Academy of Sciences, China Shichao Lv, School of Cyber Security, University of Chinese Academy of Sciences, China Yichen Hao, School of Software Engineering, Chongqing University, China Xuan Feng, School of Cyber Security, University of Chinese Academy of Sciences, China Ming Zhou, School of Cyber Security, University of Chinese Academy of Sciences, China Limin Sun, School of Cyber Security, University of Chinese Academy of Sciences, China
•Context-aware IPv6 Address Hopping
Matthias Marx, University of Hamburg, Germany Monina Schwarz, University of Hamburg, Germany Maximilian Blochberger, University of Hamburg, Germany Frederik Wille, University of Hamburg, Germany Hannes Federrath, University of Hamburg, Germany
• CTLMD: Continuous-Temporal Lateral Movement Detection Using Graph Embedding
Suya Zhao, Institute of Information Engineering, Chinese Academy of Sciences, China Renzheng Wei, Institute of Information Engineering, Chinese Academy of Sciences, China Lijun Cai, Institute of Information Engineering, Chinese Academy of Sciences, China Aimin Yu, Institute of Information Engineering, Chinese Academy of Sciences, China Dan Meng, Institute of Information Engineering, Chinese Academy of Sciences , China
•Road Context-aware Intrusion Detection System for Autonomous Cars
Jingxuan Jiang, Shandong University, China Chundong Wang, Singapore University of Technology and Design, Singapore Sudipta Chattopadhyay, Singapore University of Technology and Design, Singapore Wei Zhang, Shandong University, China
•Accelerating SM2 Digital Signature Algorithm using Modern Processor Features
Long Mai, Shanghai Jiao Tong University, China Yuan Yan, Shanghai Jiao Tong University, China Songlin Jia, Shanghai Jiao Tong University, China Shuran Wang, Shanghai Jiao Tong University, China Jianqiang Wang, Shanghai Jiao Tong University, China Juanru Li, Shanghai Jiao Tong University, China Siqi Ma, CSIRO , Australia Dawu Gu, Shanghai Jiao Tong University, China
• Prototype-based malware traffic classification with novelty detection
Lixin Zhao, Institute of Information Engineering,Chinese Academy of Sciences, China Lijun Cai, Institute of Information Engineering,Chinese Academy of Sciences, China Aimin Yu, Institute of Information Engineering,Chinese Academy of Sciences, China Zhen Xu, Institute of Information Engineering,Chinese Academy of Sciences, China Dan Meng, Institute of Information Engineering,Chinese Academy of Sciences, China
•CDAE: Towards Empowering Denoising in Side-Channel Analysis
Guang Yang, State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China Huizhong Li, Institute of Information Engineering,CAS, China Jingdian Ming, State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China Yongbin Zhou, Institute of Information Engineering, Chinese Academy of Sciences, China
安全学术圈招募队友-ing,有兴趣加入学术圈的请联系secdr#qq.com