IMG-LOGO

ICICS 2021

International Conference on Information and Communications Security (ICICS) 2021 Nov. 19-21, 2021, Chongqing, China

List of Accepted Papers

  • ID
  • Authors
  • Title
  • 124
  • Sicong Han, Chenhao Lin, Chao Shen and Qian Wang
  • Rethinking Adversarial Examples Exploiting Frequency-Based Analysis
  • 85
  • Yongyan Guo, Zhengyu Liu, Cheng Huang, Jiayong Liu, Wangyuan Jing, Ziwang Wang and Yanghao Wang
  • CyberRel: Joint Entity and Relation Extraction for Cybersecurity Concepts
  • 91
  • Zongyang Zhang, Zibo Zhou, Weihan Li and Hongyu Tao
  • An Optimized Inner Product Argument with More Application Scenarios
  • 211
  • Binbin Liu, Weijie Feng, Dongpeng Xu, Qilong Zheng and Jing Li
  • Software Obfuscation with Non-Linear Mixed Boolean-Arithmetic Expressions
  • 92
  • Zan Chen, Chaocheng Ma, Yuanjing Feng and Xingsong Hou
  • Compressive Sensing Image Steganography via Directional Lifting Wavelet Transform
  • 200
  • Ahmed Tanvir Mahdad, Mohammed Jubur and Nitesh Saxena
  • Analyzing the Security of OTP 2FA in the Face of Malicious Terminals
  • 46
  • Jing Chen, Peidong Jiang, Kun He, Cheng Zeng and Ruiying Du
  • HIAWare: Speculate Handwriting on Mobile Devices with Built-in Sensors
  • 143
  • Xiaohan Zhang, Chi Cheng and Ruoyu Ding
  • Small Leaks Sink a Great Ship: An Evaluation of Key Reuse Resilience of PQC Third Round Finalist NTRU-HRSS
  • 97
  • Zhu Liu, Lijun Cai, Lixin Zhao, Aimin Yu and Dan Meng
  • Towards Open World Traffic Classification
  • 9
  • Bumjun Kwon, Sanghyun Hong, Yuseok Jeon and Doowon Kim
  • Certified Malware in South Korea: A Localized Study of Breaches of Trust in Code-Signing PKI Ecosystem
  • 30
  • Wenxin Li, Qi Wang, Run Wang, Lei Zhao and Lina Wang
  • Exposing DeepFakes via Localizing the Manipulated Artifacts
  • 65
  • Nikolay Ivanov, Hanqing Guo and Qiben Yan
  • Rectifying Administrated ERC20 Tokens
  • 89
  • Wei Zong, Yang-Wai Chow and Willy Susilo
  • Black-box Audio Adversarial Example Generation using Variational Autoencoder
  • 210
  • Yimin Liu, Xiangyang Luo and Han Li
  • Microblog User Location Inference Based on POI and Query Likelihood Model
  • 35
  • Huimei Liao, Haixia Xu and Peili Li
  • The Golden Snitch: A Byzantine Fault Tolerant Protocol with Activity
  • 47
  • Kunyu Yang, Xuexian Hu, Qihui Zhang, Jianghong Wei and Wenfen Liu
  • Studies of Keyboard Patterns in Passwords : Recognition, Characteristics and Strength Evolution
  • 93
  • Yiming Zhu, Zhen Liu and Yanbin Pan
  • When NTT Meets Karatsuba: Preprocess-then-NTT Technique Revisited
  • 138
  • Hao Li, Shanqing Guo, Peng Tang, Chengyu Hu and Zhenxiang Chen
  • TranFuzz: An Ensemble Black-Box AttackFramework Based on Domain Adaptation andFuzzing
  • 186
  • Wenzhuo Yang and Kwok Yan Lam
  • Effective Anomaly Detection Model Training with Only Unlabeled Data by Weakly Supervised Learning Techniques
  • 197
  • Shaojiang Deng, Jiaxing Luo and Yantao Li
  • CNN-based Continuous Authentication on Smartphones with Auto Augmentation Search
  • 214
  • Nour Elhouda Souid and Kais Klai
  • A Novel Approach for Supervisor Synthesis To Enforce Opacity of Discret Event Systems
  • 128
  • Shuaigang Li, Xianhui Lu, Jiang Zhang, Bao Li and Lei Bi
  • Predicting the Concrete Security of LWE Against the Dual Attack Using Binary Search
  • 185
  • Yanduo Fu, Qiongxiao Wang, Jingqiang Lin, Aozhuo Sun and Linli Lu
  • Exploring the Security Issues of Trusted CA Certificate Management
  • 201
  • Di Xiao and Shuwen Lan
  • Secure Image Coding Based on Compressive Sensing with Optimized Rate-distortion
  • 206
  • Yunfeng Ji, Yang Tao and Rui Zhang
  • More Efficient Construction of Anonymous Signatures
  • 39
  • Gao Wang and Gaoli Wang
  • Improved Differential-ML Distinguisher: Machine Learning based Generic Extension For Differential Analysis
  • 73
  • Thea Riebe, Tristan Wirth, Markus Bayer, Philipp Kühn, Marc-André Kaufhold, Volker Knauthe, Stefan Guthe and Christian Reuter
  • CySecAlert: An Alert Generation System for Cyber Security Events Using Open Source Intelligence Data
  • 103
  • Kai Zhang, Zhe Jiang, Junqing Gong and Haifeng Qian
  • Updatable All-But-One Dual Projective Hashing and Its Applications
  • 105
  • Guofeng Tang
  • On Tightly-Secure (Linkable) Ring Signatures
  • 131
  • Huiying Wang, Huixin Shen, Boyang Zhang, Yu Wen and Dan Meng
  • Generating Adversarial Point Clouds on Multi-modal Fusion Based 3D Object Detection Model
  • 107
  • Lixia Xie, Honghong Sun, Hongyu Yang and Liang Zhang
  • Comprehensive Degree Based Key Node Recognition Method in Complex Networks
  • 176
  • Yaqi Xu, Baofeng Wu and Dongdai Lin
  • Rotational-Linear Attack: A New Framework of Cryptanalysis on ARX ciphers with Applications to Chaskey
  • 155
  • Fan Lang, Wei Wang, Lingjia Meng, Qiongxiao Wang, Jingqiang Lin and Li Song
  • Informer: Protecting Intel SGX from Cross-core Side Channel Threats
  • 20
  • Shiwei Chen, Ting Cui and Chenhui Jin
  • Security analysis of Even-Mansour structure hash functions
  • 142
  • Junnan Wang, Qixu Liu, Chaoge Liu and Jie Yin
  • GAN-based adversarial patch for malware C2 traffic to bypass DL detector
  • 149
  • Yucheng Liu and Xiangxue Li
  • Source Identification from In-Vehicle CAN-FD Signaling: What Can We Expect?
  • 160
  • Yalun Wu, Minglu Song, Yike Li, Yunzhe Tian, Endong Tong, Wenjia Niu, Bowei Jia, Haixiang Huang, Qiong Li and Jiqiang Liu
  • Improving Convolutional Neural Network-based Webshell Detection through Reinforcement Learning
  • 16
  • Yu Fu, Wei Wang, Lingjia Meng, Qiongxiao Wang, Yuan Zhao and Jingqiang Lin
  • VIRSA: Vectorized In-Register RSA Computation with Memory Disclosure Resistance
  • 36
  • Dali Zhu, Long Yang and Hualin Zeng
  • Remote recovery of sound from speckle pattern video based on convolutional LSTM
  • 37
  • Chuan Zhou, Huiyun Jing, Xin He, Liming Wang, Kai Chen and Duohe Ma
  • Disappeared Face: A Physical Adversarial Attack Method on Black-Box Face Detection Models
  • 77
  • Arpan Manna, Harsh Kasyap and Somanath Tripathy
  • Moat: Model Agnostic Defense against Targeted Poisoning Attacks in Federated Learning
  • 81
  • Yang Xiao, Jie Li and Wengui Su
  • MD-GNN: A Lightweight Metric Defence Strategy for Graph Neural Networks Against Poisoning Attacks
  • 83
  • Min Li, Chunfang Li, Shuailou Li, Yanna Wu, Boyang Zhang and Yu Wen
  • ACGVD:Vulnerability Detection based on Comprehensive Graph via Graph Neural Network with Attention
  • 116
  • Mohammed Shujaa Aldeen and Chuan Zhao
  • Rare Variants Analysis in Genetic Association Studies with Privacy Protection via Hybrid System
  • 27
  • Baodong Qin, Xue Bai, Dong Zheng, Hui Cui and Yiyuan Luo
  • Forward-Secure Revocable Identity-Based Encryption
  • 68
  • Yuxuan Zhang, Zhaoyang Wang, Boyang Zhang, Yu Wen and Dan Meng
  • Black-Box Buster: A Robust Zero-Shot Transfer-Based Adversarial Attack Method
  • 151
  • Zhenghao Wu, Jian Weng, Anjia Yang, Lisha Yao, Xiaojian Liang, Zike Jiang and Jinghang Wen
  • Efficient and Fully Secure Lattice-based IBE with Equality Test
  • 153
  • Qin Si, Lei Cui, Lun Li, Zhenquan Ding, Yongji Liu and Zhiyu Hao
  • EmuIoTNet: An Emulated IoT Network for Dynamic Analysis
  • 17
  • Zhiyuan An, Zhuoran Zhang, Yamin Wen and Fangguo Zhang
  • Lattice-Based Secret Handshakes with Reusable Credentials