Abstract is missing.
- ACDroid: Detecting Collusion Applications on Smart DevicesNing Xi, Yihuan He, Yuchen Zhang, Zhi Wang, Pengbin Feng. 3-22 [doi]
- DomainIsolation: Lightweight Intra-enclave Isolation for Confidential Virtual MachinesWenwen Ruan, Wenhao Wang 0001, Shuang Liu, Ran Duan, Shoumeng Yan. 23-41 [doi]
- Keeping Your Enemies Closer: Shedding Light on the Attacker's Optimal StrategyWeixia Cai, Huashan Chen, Feng Liu 0001. 42-59 [doi]
- Cyber Attacks Against Enterprise Networks: Characterization, Modeling and ForecastingZheyuan Sun, Maochao Xu, Kristin M. Schweitzer, Raymond M. Bateman, Alexander Kott, Shouhuai Xu. 60-81 [doi]
- MCVDSSE: Secure Multi-client Verifiable Dynamic Symmetric Searchable EncryptionJinyang Li, Zhenfu Cao, Jiachen Shen, Xiaolei Dong. 85-96 [doi]
- A Graphical Password Scheme Based on Rounded Image SelectionXinyuan Qin, Wenjuan Li. 97-114 [doi]
- Implementation of the Elliptic Curve MethodXiuxiu Li, Wei Yu 0008, Kunpeng Wang. 115-126 [doi]
- Almost Injective and Invertible Encodings for Jacobi Quartic CurvesXiuxiu Li, Wei Yu 0008, Kunpeng Wang, Luying Li. 127-138 [doi]
- SeeStar: An Efficient Starlink Asset Detection FrameworkLinkang Zhang, Yunyang Qin, Yujia Zhu, Yifei Cheng, Zhen Jie, Qingyun Liu. 139-156 [doi]
- Privacy-Enhanced Anonymous and Deniable Post-quantum X3DHKaiming Chen, Atsuko Miyaji, Yuntao Wang 0002. 157-177 [doi]
- Enhancing the Anti-steganalysis Ability of Image Steganography via Multiple Adversarial NetworksBin Ma 0003, Kun Li, Jian Xu, Chunpeng Wang, Jian Li 0034, Liwei Zhang. 181-192 [doi]
- An Empirical Study of AI Model's Performance for Electricity Load Forecasting with Extreme Weather ConditionsFusen Guo, Jian-Zhang Wu, Lei Pan. 193-204 [doi]
- AST2Vec: A Robust Neural Code Representation for Malicious PowerShell DetectionHan Miao, Huaifeng Bao, Zixian Tang, Wenhao Li, Wen Wang 0008, Huashan Chen, Feng Liu 0001, Yanhui Sun. 207-224 [doi]
- Real-Time Aggregation for Massive Alerts Based on Dynamic Attack Granularity GraphHaiping Wang, Binbin Li, Tianning Zang, Yifei Yang, Zisen Qi, Siyu Jia, Yu Ding. 225-243 [doi]
- Decompilation Based Deep Binary-Source Function MatchingXiaowei Wang, Zimu Yuan, Yang Xiao, Liyan Wang, Yican Yao, Haiming Chen, Wei Huo. 244-260 [doi]
- Event-Based Threat Intelligence Ontology ModelPeng Wang, Guangxiang Dai, Lidong Zhai. 261-282 [doi]
- Optimally Blending Honeypots into Production Networks: Hardness and AlgorithmsMd Mahabub Uz Zaman, Liangde Tao, Mark Maldonado, Chang Liu, Ahmed Sunny, Shouhuai Xu, Lin Chen 0009. 285-304 [doi]
- WebMea: A Google Chrome Extension for Web Security and Privacy Measurement StudiesMengxia Ren, Joshua Josey, Chuan Yue. 305-318 [doi]
- Quantifying Psychological Sophistication of Malicious EmailsRosana Montañez Rodriguez, Theodore Longtchi, Kora Gwartney, Ekzhin Ear, David P. Azari, Christopher P. Kelley, Shouhuai Xu. 319-331 [doi]
- SVFL: Secure Vertical Federated Learning on Linear ModelsKaifeng Luo, Zhenfu Cao, Jiachen Shen, Xiaolei Dong. 332-344 [doi]
- Multiprime Strategies for Serial Evaluation of eSIDH-Like IsogeniesJason T. LeGrow, Brian Koziel, Reza Azarderakhsh. 347-366 [doi]
- Adaptively Secure Constrained Verifiable Random FunctionYao Zan, Hongda Li 0001, Haixia Xu 0002. 367-385 [doi]
- A Robust Reversible Data Hiding Algorithm Based on Polar Harmonic Fourier MomentsBin Ma 0003, Zhongquan Tao, Jian Xu, Chunpeng Wang, Jian Li, Liwei Zhang. 386-397 [doi]
- VaultBox: Enhancing the Security and Effectiveness of Security AnalyticsDevharsh Trivedi, Nikos Triandopoulos. 401-422 [doi]
- Two-Stage Anomaly Detection in LEO Satellite NetworkYipeng Wang, Peixian Chen, Shan Ai, Weipeng Liang, Binjie Liao, Weichuan Mo, Heng Wang. 423-438 [doi]
- Hydra: An Efficient Asynchronous DAG-Based BFT ProtocolZhuo An, Mingsheng Wang, Dongdong Liu, Taotao Li, Qiang Lai. 439-459 [doi]
- Redactable Blockchain in the Permissioned SettingChunying Peng, Haixia Xu, Huimei Liao, Jinling Tang, Tao Tang. 460-477 [doi]
- A Multi-level Sorting Prediction Enhancement-Based Two-Dimensional Reversible Data Hiding Algorithm for JPEG ImagesBin Ma 0003, Songkun Wang, Jian Xu, Chunpeng Wang, Jian Li, Xiaolong Li. 481-495 [doi]
- Research on Encrypted Malicious 5G Access Network Traffic Identification Based on Deep LearningZongning Gao, Shunliang Zhang. 496-512 [doi]
- A Design of Network Attack Detection Using Causal and Non-causal Temporal Convolutional NetworkPengju He, Haibo Zhang 0008, Yaokai Feng, Kouichi Sakurai. 513-523 [doi]