ICICS 2021 论文录用列表
2021-11-22 04:57:29 Author: mp.weixin.qq.com(查看原文) 阅读量:51 收藏

国际信息与通信安全会议(International Conference on Information and Communications Security, ICICS)作为CCF C类、网络信息安全领域优秀国际会议。ICICS 2021年共收到202(2020:139, 2019:199, 2018:202)篇论文,录取49(2020:33, 2019:48, 2018:39)篇论文,录用率为24%(2020:23.7%, 2019:24.1%, 2018:19.3%)。小编将录用论文标题列举如下:

Malware Analysis and Detection
  • Certified Malware in South Korea: A Localized Study of Breaches of Trust in Code-Signing PKI Ecosystem

Bumjun Kwon, Sanghyun Hong, Yuseok Jeon, and Doowon Kim

  • GAN-based adversarial patch for malware C2 traffic to bypass DL detector

Junnan Wang, Qixu Liu, Chaoge Liu, and Jie Yin

  • Analyzing the Security of OTP 2FA in the Face of Malicious Terminals

Ahmed Tanvir Mahdad, Mohammed Jubur, and Nitesh Saxena

Blockchain and Federated Learning
  • The Golden Snitch: A Byzantine Fault Tolerant Protocol with Activity

Huimei Liao, Haixia Xu, and Peili Li

  • Rectifying Administrated ERC20 Tokens

Nikolay Ivanov, Hanqing Guo, and Qiben Yan

  • Moat: Model Agnostic Defense against Targeted Poisoning Attacks in Federated Learning

Arpan Manna, Harsh Kasyap, and Somanath Tripathy

IoT Security I
  • Disappeared Face: A Physical Adversarial Attack Method on Black-Box Face Detection Models

Chuan Zhou, Huiyun Jing, Xin He, Liming Wang, Kai Chen, and Duohe Ma

  • HIAWare: Speculate Handwriting on Mobile Devices with Built-in Sensors

Jing Chen, Peidong Jiang, Kun He, Cheng Zeng, and Ruiying Du

  • Studies of Keyboard Patterns in Passwords: Recognition, Characteristics and Strength Evolution

  • Kunyu Yang, Xuexian Hu, Qihui Zhang, Jianghong Wei, and Wenfen Liu

  • CNN-based Continuous Authentication on Smartphones with Auto Augmentation Search

Shaojiang Deng, Jiaxing Luo, and Yantao Li

Multimedia Security
  • Compressive Sensing Image Steganography via Directional Lifting Wavelet Transform

Zan Chen, Chaocheng Ma, Yuanjing Feng, and Xingsong Hou

  • Remote Recovery of Sound from Speckle Pattern Video based on Convolutional LSTM

Dali Zhu, Long Yang, and Hualin Zeng

  • Secure Image Coding Based on Compressive Sensing with Optimized Rate-distortion

Di Xiao and Shuwen Lan

  • Black-box Audio Adversarial Example Generation using Variational Autoencoder

Wei Zong, Yang-Wai Chow, and Willy Susilo

Software Security
  • ACGVD: Vulnerability Detection based on Comprehensive Graph via Graph Neural Network with Attention

Min Li, Chunfang Li, Shuailou Li, Yanna Wu, Boyang Zhang, and Yu Wen

  • TranFuzz: An Ensemble Black-Box Attack Framework Based on Domain Adaptation and Fuzzing

Hao Li, Shanqing Guo, Peng Tang, Chengyu Hu, and Zhenxiang Chen

  • Software Obfuscation with Non-Linear Mixed Boolean-Arithmetic Expressions

Binbin Liu, Weijie Feng, Qilong Zheng, Jing Li, and Dongpeng Xu

  • VIRSA: Vectorized In-Register RSA Computation with Memory Disclosure Resistance

Yu Fu, Wei Wang, Lingjia Meng, Qiongxiao Wang, Yuan Zhao, and Jingqiang Lin

  • Informer: Protecting Intel SGX from Cross-core Side Channel Threats

Fan Lang, Wei Wang, Lingjia Meng, Qiongxiao Wang, Jingqiang Lin, and Li Song

Applied Cryptography
  • Forward-Secure Revocable Identity-Based Encryption

Baodong Qin, Xue Bai, Dong Zheng, Hui Cui, and Yiyuan Luo

  • An Optimized Inner Product Argument with More Application Scenarios

Zongyang Zhang, Zibo Zhou, Weihan Li, and Hongyu Tao

  • Updatable All-But-One Dual Projective Hashing and Its Applications

Kai Zhang, Zhe Jiang, Junqing Gong, and Haifeng Qian

  • On Tightly-Secure (Linkable) Ring Signatures

Guofeng Tang

  • More Efficient Construction of Anonymous Signatures

Yunfeng Ji, Yang Tao, and Rui Zhang

Internet Security
  • Towards Open World Traffic Classification

Zhu Liu, Lijun Cai, Lixin Zhao, Aimin Yu, and Dan Meng

  • Comprehensive Degree Based Key Node Recognition Method in Complex Networks

Lixia Xie, Honghong Sun, Hongyu Yang, and Liang Zhang

  • Improving Convolutional Neural Network-based Webshell Detection through Reinforcement Learning

Yalun Wu, Minglu Song, Yike Li, Yunzhe Tian, Endong Tong, Wenjia Niu, Bowei Jia, Haixiang Huang, Qiong Li, and Jiqiang Liu

  • Exploring the Security Issues of Trusted CA Certificate Management

Yanduo Fu, Qiongxiao Wang, Jingqiang Lin, Aozhuo Sun, and Linli Lu

Data-Driven Cybersecurity
  • CySecAlert: An Alert Generation System for Cyber Security Events Using Open Source Intelligence Data

Thea Riebe, Tristan Wirth, Markus Bayer, Philipp Kühn, Marc-André Kaufhold, Volker Knauthe, Stefan Guthe, and Christian Reuter

  • CyberRel: Joint Entity and Relation Extraction for Cybersecurity Concepts

Yongyan Guo, Zhengyu Liu, Cheng Huang, Jiayong Liu, Wangyuan Jing, Ziwang Wang, and Yanghao Wang

  • Microblog User Location Inference Based on POI and Query Likelihood Model

Yimin Liu, Xiangyang Luo, and Han Li

  • Effective Anomaly Detection Model Training with Only Unlabeled Data by Weakly Supervised Learning Techniques

Wenzhuo Yang and Kwok-Yan Lam

Machine Learning Security
  • Exposing DeepFakes via Localizing the Manipulated Artifacts

Wenxin Li, Qi Wang, Run Wang, Lei Zhao, and Lina Wang

  • Improved Differential-ML Distinguisher: Machine Learning based Generic Extension For Differential Analysis

Gao Wang and Gaoli Wang

  • Black-Box Buster: A Robust Zero-Shot Transfer-Based Adversarial Attack Method

Yuxuan Zhang, Zhaoyang Wang, Boyang Zhang, Yu Wen, and Dan Meng

  • A Lightweight Metric Defence Strategy for Graph Neural Networks Against Poisoning Attacks

Yang Xiao, Jie Li , and Wengui Su

  • Rethinking Adversarial Examples Exploiting Frequency-Based Analysis

Sicong Han, Chenhao Lin, Chao Shen, and Qian Wang

Post-Quantum Cryptography
  • Lattice-Based Secret Handshakes with Reusable Credentials

Zhiyuan An, Zhuoran Zhang, Yamin Wen, and Fangguo Zhang

  • When NTT Meets Karatsuba: Preprocess-then-NTT Technique Revisited

Yiming Zhu, Zhen Liu, and Yanbin Pan

  • Predicting the Concrete Security of LWE Against the Dual Attack Using Binary Search

Shuaigang Li, Xianhui Lu, Jiang Zhang, Bao Li, and Lei Bi

  • Small Leaks Sink a Great Ship: An Evaluation of Key Reuse Resilience of PQC Third Round Finalist NTRU-HRSS

Xiaohan Zhang, Chi Cheng, and Ruoyu Ding

  • Efficient and Fully Secure Lattice-based IBE with Equality Test

Zhenghao Wu, Jian Weng, Anjia Yang, Lisha Yao, Xiaojian Liang, Zike Jiang, and Jinghang Wen

IOT Security II
  • Generating Adversarial Point Clouds on Multi-modal Fusion Based 3D Object Detection Model

Huiying Wang, Huixin Shen, Boyang Zhang, Yu Wen, and Dan Meng

  • Source Identification from In-Vehicle CAN-FD Signaling: What Can We Expect?

Yucheng Liu and Xiangxue Li

  • EmuIoTNet: An Emulated IoT Network for Dynamic Analysis

Qin Si, Lei Cui, Lun Li, Zhenquan Ding, Yongji Liu, and Zhiyu Hao

Security Analysis
  • Security Analysis of Even-Mansour Structure Hash Functions

Shiwei Chen, Ting Cui, and Chenhui Jin

  • Rare Variants Analysis in Genetic Association Studies with Privacy Protection via Hybrid System

Mohammed Shujaa Aldeen and Chuan Zhao

  • Rotational-Linear Attack: A New Framework of Cryptanalysis on ARX ciphers with Applications to Chaskey

Yaqi Xu, Baofeng Wu, and Dongdai Lin

  • A Novel Approach for Supervisor Synthesis To Enforce Opacity of Discrete Event Systems

Nour Elhouda Souid and Kais Klai

线上会议明天还在进行时,大家可以通过官网查看日程.
https://www.icics.cn/Program.html

历年会议

安全学术圈招募队友-ing, 有兴趣加入学术圈的请联系secdr#qq.com

文章来源: http://mp.weixin.qq.com/s?__biz=MzU5MTM5MTQ2MA==&mid=2247486820&idx=1&sn=6cb28223abf2c0450cdbeb89e9ccebbd&chksm=fe2ef2efc9597bf9bedae16fffe1974b8b2a75f461cde11b8e506e02a0e0e8c70737615de4d2#rd
如有侵权请联系:admin#unsafe.sh