ICICS 2019 论文录用列表
2019-11-24 11:53:07 Author: mp.weixin.qq.com(查看原文) 阅读量:90 收藏

国际信息与通信安全会议(International Conference on Information and Communications Security, ICICS)作为CCF C类、网络信息安全领域优秀国际会议。ICICS 2019年共收到199(2018:202)篇论文,录取48(2018:39)篇论文,录用率为24.1%(2018:19.3%)。录用论文作者中大部分均来自于国内高校,包含清华、中科院、上交、武大、人大、北航、北邮等多所高校,小编将录用论文标题列举如下:

Differentially Private Reinforcement Learning

Pingchuan Ma, Beijing Electronic Science and Technology Institute, China Zhiqiang Wang, Beijing Electronic Science and Technology Institute, China Le Zhang, Beijing Electronic Science and Technology Institute, China Ruming Wang, Hainan University, China

• Differentially Private Frequent Itemset Mining against Incremental Updates

Liang Wenjuan, Renmin University of China

Towards Blockchain-enabled Searchable Encryption

Qiang Tang, Luxembourg Institute of Science and Technology, Luxembourg

Parallel Steepest Ascent Hill-Climbing for High Nonlinear Boolean and Vectorial Boolean Functions (S-Boxes)

Athmane Seghier, Beihang University, China Jianxin Li, Beihang University, China

• VulHunter: An Automated Vulnerability Detection System based on Deep Learning and Bytecode

Ning Guo, Key Laboratory of Trustworthy Distributed Computing and Service (BUPT), Ministry of Education, China Xiaoyong Li, Key Laboratory of Trustworthy Distributed Computing and Service (BUPT), Ministry of Education, China Hui Yin, College of Computer Science and Engineering, Shandong University of Science and Technology, China Yali Gao, Key Laboratory of Trustworthy Distributed Computing and Service (BUPT), Ministry of Education, China

SecFlush: A Hardware/Software Collaborative Design for Real-Time Detection and Defense against Flush-Based Cache Attacksagainst Flush-Based Cache Attacks

Churan Tang, State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China Zongbin Liu, State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China Jingquan Ge, State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China Cunqing Ma, State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China

Ciphertext Policy Attribute-Based Encryption for Circuits from LWE Assumption

Geng Wang, Shanghai Jiao Tong University, China Zhen Liu, Shanghai Jiao Tong University, China Dawu Gu, Shanghai Jiao Tong University, China

Automatic Demirci-Selçuk Meet-in-the-Middle Attack on SKINNY with Key-bridging

Qiu Chen, State Key Laboratory of Information Security,Institute of Information Engineering, CAS, China Danping Shi, State Key Laboratory of Information Security,Institute of Information Engineering, CAS, China Siwei Sun, State Key Laboratory of Information Security,Institute of Information Engineering, CAS, China Lei Hu, State Key Laboratory of Information Security,Institute of Information Engineering, CAS, China

An Adversarial Attack Based on Multi-Objective Optimization in the Black-box Scenario:MOEA-APGA II

Chunkai Zhang, Harbin Institute of Technology, China Yepeng Deng, Harbin Institute of Technology, Shenzhen, China Xin Guo, Harbin Institute of Technology, Shenzhen, China, China Xuan Wang, Harbin Institute of Technology Graduate School, China

• DTGuard: A Lightweight Defence Mechanism against a New DoS Attack on SDN

Jianwei Hou, Renmin University of China, China Ziqi Zhang, Renmin University of China, China Wenchang Shi, Renmin University of China, China Bo Qin, Renmin University of China, China Bin Liang, Renmin University of China, China

Practical Evaluation Methodology of Higher-order Maskings at Different Operating Frequencies

Yuguang Li, China Academy of Information and Communications Technology, Beijing Ming Tang, School of Cyber Science and Engineering, Wuhan University, China Pengbo Wang, School of Cyber Science and Engineering, Wuhan University, China Yanbin Li, College of Information Science and Technology, Nanjing Agricultural University, China Shan Fu, Beijing University of Posts and Telecommunications, China

Hierarchical Representation Network for Steganalysis of QIM Steganography in Low-Bit-Rate Speech Signals

Hao Yang, Tsinghua University, China Zhong-Liang Yang, Tsinghua University, China Yong-Jian Bao, Tsinghua University, China Yong-Feng Huang, Tsinghua University, China

• Deep Learning-Based Vulnerable Function Detection: A Benchmark

Guanjun Lin, Swinburne University of Technology, Australia Wei Xiao, Changchun University of Technology, China Jun Zhang, Swinburne University of Technology, Australia Yang Xiang, Swinburne University of Technology, Australia

Privacy-Preserving eID Derivation for Self-Sovereign Identity Systems

Andreas Abraham, Institute of Applied Information Processing and Communications, Austria Felix Hörandner, Institute of Applied Information Processing and Communications, Austria Olamide Omolola, IAIK, TU Graz, Austria Sebastian Ramacher, AIT Austrian Institute of Technology, Austria

Provably Secure Group Authentication in the Asynchronous Communication Model

Zhe Xia, Wuhan University of Technology, China Lein Harn, University of Missouri-Kansas City, United States Bo Yang, Shaanxi Normal University, China Mingwu Zhang, Hubei University of Technology, China Yi Mu, Fujian Normal University, China Willy Susilo, University of Wollongong, Australia Weizhi Meng, Technical University of Denmark, Denmark

Using Equivalent Class to Solve Interval Discrete Logarithm Problem

Bin Qi, State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China Jie Ma, State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China Kewei Lv, State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China

DLchain: a Covert Channel over Blockchain based on Dynamic Labels

Jing Tian, Institute of Information Engineering, Chinese Academy of Sciences. University of Chinese Academy of Sciences, China Gaopeng Gou, Institute of Information Engineering, Chinese Academy of Sciences. University of Chinese Academy of Sciences, China Chang Liu, Institute of Information Engineering, Chinese Academy of Sciences. University of Chinese Academy of Sciences, China Yige Chen, Institute of Information Engineering, Chinese Academy of Sciences. University of Chinese Academy of Sciences, China Gang Xiong, Institute of Information Engineering, Chinese Academy of Sciences. University of Chinese Academy of Sciences, China Zhen Li, Institute of Information Engineering, Chinese Academy of Sciences. University of Chinese Academy of Sciences, China

Neuron Selecting: Defending against Adversarial Examples in Deep Neural Networks

Ming Zhang, National Key Laboratory of Science and Technology on Information System Security, China Hu Li, National Key Laboratory of Science and Technology on Information System Security, China Xiaohui Kuang, National Key Laboratory of Science and Technology on Information System Security, China Ling Pang, National Key Laboratory of Science and Technology on Information System Security, China Zhendong Wu, National Key Laboratory of Science and Technology on Information System Security, China

Convolutional Neural Network based Side-Channel Attacks with Customized Filters

Man Wei, State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China Danping Shi, State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China Siwei Sun, State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China Peng Wang, State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China Lei Hu, State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China

• AGE: Authentication Graph Embedding for Detecting Anomalous Login Activities

Renzheng Wei, Institute of Information Engineering, Chinese Academy of Sciences, China Lijun Cai, Institute of Information Engineering, Chinese Academy of Sciences, China Aimin Yu, Institute of Information Engineering, Chinese Academy of Sciences, China Dan Meng, Institute of Information Engineering, Chinese Academy of Sciences, China

Privacy-preserving Decentralised Singular Value Decomposition

Qiang Tang, Luxembourg Institute of Science and Technology, Luxembourg Bowen Liu, Luxembourg Institute of Science and Technology, Luxembourg

• Towards Homograph-confusable Domain Name Detection using Dual-channel CNN

Guangxi Yu, Institute of Information Engineering,Chinese Academy of Sciences& University of Chinese Academy of Sciences, China Xinghua Yang, Institute of Information Engineering, Chinese Academy of Sciences, China Yan Zhang, Institute of Information Engineering, Chinese Academy of Sciences & University of Chinese Academy of Sciences, China Huajun Cui, Institute of Information Engineering, Chinese Academy of Sciences & University of Chinese Academy of Sciences, China Huiran Yang, Institute of Information Engineering, Chinese Academy of Sciences, China Yang Li, Institute of Information Engineering, Chinese Academy of Sciences & University of Chinese Academy of Sciences, China

A Multi-group Signature Scheme from Lattices

Tian Qiu, State Key Laboratory of Information Security,Institute of Information Engineering, Chinese Academy of Sciences, China Lin Hou, State Key Laboratory of Information Security,Institute of Information Engineering, Chinese Academy of Sciences, China Dongdai Lin, State Key Laboratory of Information Security,Institute of Information Engineering, Chinese Academy of Sciences, China

• Fraud Detection on Digital Payment Platforms with Fewer Labels

Ruoyu Deng, Shanghai Jiao Tong University, China Ruan Na, Shanghai Jiao Tong University, China

• WSLD: Detecting Unknown Webshell Using Fuzzy Matching and Deep Learning

Zihao Zhao, Institute of Information Engineering, Chinese Academy of Sciences, China Qixu Liu, Institute of Information Engineering, Chinese Academy of Sciences, China Tiantian Song, Tsinghua-Berkeley Shenzhen Institute, Tsinghua University, China Zhi Wang, Institute of Information Engineering, Chinese Academy of Sciences, China Xianda Wu, Institute of Information Engineering, Chinese Academy of Sciences, China

• Cloning Vulnerability Detection in Driver Layer of IoT Devices

Weipeng Jiang, SKLOIS, Institute of Information Engineering, CAS; School of Cyber Security, University of Chinese Academy of Sciences, China Bin Wu, State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China Zhou Jiang, School of Computer and Software, Nanjing University of Information Science and Technology Nanjing China, China Shaobo Yang, School of Software, North University of China, Taiyuan, China

• AADS: A Noise-Robust Anomaly Detection Framework for Industrial Control Systems

Maged Abdelaty, Fondazione Bruno Kessler and University of Trento, Italy Roberto Doriguzzi-Corin, Fondazione Bruno Kessler, Italy Domenico Siracusa, Fondazione Bruno Kessler, Italy

Improved Differential Attacks on GIFT-64

Huaifeng Chen, The 6-th Research Institute of China Electronics Corporation, China Rui Zong, Institute for Advanced Study, Tsinghua University, China Xiaoyang Dong, Institute for Advanced Study, Tsinghua University, China

CloudCoT: A Blockchain-based Cloud Service Dependency Attestation Framework

Zhenyu Zhao, Peking University, China Wu Luo, Peking University, China Qingni Shen, Peking University, China Anbang Ruan, Octa Innovations Ltd, China

• Evading API Call Sequence Based Malware Classifiers

Fenil Fadadu, C3I Center, Department of CSE, Indian Institute of Technology, Kanpur, India Anand Handa, C3I Center, Department of CSE, Indian Institute of Technology, Kanpur, India Nitesh Kumar, C3I Center, Department of CSE, Indian Institute of Technology, Kanpur, India Sandeep K. Shukla, C3I Center, Department of CSE, Indian Institute of Technology, Kanpur, India

• A Character-Level BiGRU-Attention For Phishing Classification

Lijuan Yuan, Yunnan University of Finance and Economics, China Zhiyong Zeng, Yunnan University of Finance and Economics, China Yikang Lu, Yunnan University of Finance and Economics, China Tao Feng, Yunnan University of Finance and Economics, China

Adaptively Secure Puncturable Pseudorandom Functions via Punturable Identity-Based KEMs

Xin Wang, Chinese Academy of Sciences, China Shimin Li, Chinese Academy of Sciences, China Rui Xue, The Institute of Information Engineering, CAS , China

Tear Off Your Disguise: Phishing WebsiteDetection using Visual and Network Identities

Zhaoyu Zhou, Institute of Information Engineering; School of Cyber Security, University of Chinese Academy of Sciences, China Lingjing Yu, Institute of Information Engineering; School of Cyber Security, University of Chinese Academy of Sciences, China Qingyun Liu, Institute of Information Engineering, Chinese Academy of Sciences, China Yang Liu, Institute of Information Engineering, Chinese Academy of Sciences, China Bo Luo, The University of Kansas, United States

HeteroUI:A Novel Framework Based on Heterogeneous Information Network Embedding for User Identification in Enterprise Networks

Meng Li, Institute of Information Engineering, Chinese Academy of Sciences, China Lijun Cai, Institute of Information Engineering, Chinese Academy of Sciences, China Aimin Yu, Institute of Information Engineering, Chinese Academy of Sciences, China Haibo Yu, Institute of Information Engineering, Chinese Academy of Sciences, China Dan Meng, Institute of Information Engineering, Chinese Academy of Sciences, China

• Capturing the Persistence of Facial Expression Features for Deep fake Video Detection

Yiru Zhao, School of Cyber Science and Engineering, Wuhan University, China Wanfeng Ge, School of Cyber Science and Engineering, Wuhan University, China Wenxin Li, School of Cyber Science and Engineering, Wuhan University, China Run Wang, School of Cyber Science and Engineering, Wuhan University, China Lei Zhao, School of Cyber Science and Engineering, Wuhan University, China Jiang Ming, University of Texas at Arlington, United States

• Automated Cyber Threat Intelligence Reports Classication for Early Warning of Cyber Attacks in Next Generation SOC

Wenzhuo Yang, Nanyang Technological University, Singapore Kwok Yan Lam, Nanyang Technological University, Singapore

Towards Comprehensive Security Analysis of Hidden Services Using Binding Guard Relays

Chen Muqian, Institute of Information Engineering, Chinese Academy of Sciences, China Xuebin Wang, Institute of Information Engineering, Chinese Academy of Sciences, China Jinqiao Shi, Beijing University of Posts and Telecommunications, China Yue Gao, Institute of Information Engineering, Chinese Academy of Sciences, China Can Zhao, Institute of Information Engineering, Chinese Academy of Sciences, China Wei Sun, Beijing Jiaotong University, School of Computer and Information Technology, China

Impact of Multiple Reflections on Secrecy Capacity of Indoor VLC System

Jian Chen, Auburn University, United States Tao Shu, Auburn University, United States

UBER: Combating Sandbox Evasion via User Behavior Emulators

Pengbin Feng, George Mason University, United States Jianhua Sun, College of William and Mary, United States Songsong Liu, George Mason University, United States Kun Sun, George Mason University, United States

Privacy-Preservinig Machine Learning based on Secret Sharing

Ye Dong, School of Cyber Security,University of Chinese Academy of Sciences, China Xiaojun Chen, Institute of Information Engineering,Chinese Academy of Sciences , China Liyan Shen, School of Cyber Security,University of Chinese Academy of Sciences, China

• Characterizing Internet-scale ICS Automated Attacks through Long-term Honeypot Data

Jianzhou You, School of Cyber Security, University of Chinese Academy of Sciences, China Shichao Lv, School of Cyber Security, University of Chinese Academy of Sciences, China Yichen Hao, School of Software Engineering, Chongqing University, China Xuan Feng, School of Cyber Security, University of Chinese Academy of Sciences, China Ming Zhou, School of Cyber Security, University of Chinese Academy of Sciences, China Limin Sun, School of Cyber Security, University of Chinese Academy of Sciences, China

Context-aware IPv6 Address Hopping

Matthias Marx, University of Hamburg, Germany Monina Schwarz, University of Hamburg, Germany Maximilian Blochberger, University of Hamburg, Germany Frederik Wille, University of Hamburg, Germany Hannes Federrath, University of Hamburg, Germany

• CTLMD: Continuous-Temporal Lateral Movement Detection Using Graph Embedding

Suya Zhao, Institute of Information Engineering, Chinese Academy of Sciences, China Renzheng Wei, Institute of Information Engineering, Chinese Academy of Sciences, China Lijun Cai, Institute of Information Engineering, Chinese Academy of Sciences, China Aimin Yu, Institute of Information Engineering, Chinese Academy of Sciences, China Dan Meng, Institute of Information Engineering, Chinese Academy of Sciences , China

Road Context-aware Intrusion Detection System for Autonomous Cars

Jingxuan Jiang, Shandong University, China Chundong Wang, Singapore University of Technology and Design, Singapore Sudipta Chattopadhyay, Singapore University of Technology and Design, Singapore Wei Zhang, Shandong University, China

Accelerating SM2 Digital Signature Algorithm using Modern Processor Features

Long Mai, Shanghai Jiao Tong University, China Yuan Yan, Shanghai Jiao Tong University, China Songlin Jia, Shanghai Jiao Tong University, China Shuran Wang, Shanghai Jiao Tong University, China Jianqiang Wang, Shanghai Jiao Tong University, China Juanru Li, Shanghai Jiao Tong University, China Siqi Ma, CSIRO , Australia Dawu Gu, Shanghai Jiao Tong University, China

• Prototype-based malware traffic classification with novelty detection

Lixin Zhao, Institute of Information Engineering,Chinese Academy of Sciences, China Lijun Cai, Institute of Information Engineering,Chinese Academy of Sciences, China Aimin Yu, Institute of Information Engineering,Chinese Academy of Sciences, China Zhen Xu, Institute of Information Engineering,Chinese Academy of Sciences, China Dan Meng, Institute of Information Engineering,Chinese Academy of Sciences, China

CDAE: Towards Empowering Denoising in Side-Channel Analysis

Guang Yang, State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China Huizhong Li, Institute of Information Engineering,CAS, China Jingdian Ming, State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China Yongbin Zhou, Institute of Information Engineering, Chinese Academy of Sciences, China

会议主页:
http://www.icics.cn/Accepted-papers.html
安全学术圈招募队友-ing,有兴趣加入学术圈的请联系secdr#qq.com


文章来源: http://mp.weixin.qq.com/s?__biz=MzU5MTM5MTQ2MA==&mid=2247484676&idx=1&sn=c45d315f7635f27601e30eba788a843f&chksm=fe2efa8fc9597399b3446752483cb609fb68d6c5968ea40390e1048d81c2b83e2e4473d919b4#rd
如有侵权请联系:admin#unsafe.sh