default search action
5th CNS 2017: Las Vegas, NV, USA
- 2017 IEEE Conference on Communications and Network Security, CNS 2017, Las Vegas, NV, USA, October 9-11, 2017. IEEE 2017, ISBN 978-1-5386-0683-4
- Xu Yuan, Xingliang Yuan, Baochun Li, Cong Wang:
Secure multi-client data access with boolean queries in distributed key-value stores. 1-9 - Qiben Yan, Hao Yang, Mehmet C. Vuran, Suat Irmak:
SPRIDE: Scalable and private continual geo-distance evaluation for precision agriculture. 1-9 - Youssef Khazbak, Guohong Cao:
Deanonymizing mobility traces with co-location information. 1-9 - Huacheng Zeng, Chen Cao, Hongxiang Li, Qiben Yan:
Enabling jamming-resistant communications in wireless MIMO networks. 1-9 - Liyao Xiang, Baochun Li, Bo Li:
Privacy-preserving inference in crowdsourcing systems. 1-9 - Kun Jin, Si Fang, Chunyi Peng, Zhiyang Teng, XuFei Mao, Lan Zhang, Xiangyang Li:
ViViSnoop: Someone is snooping your typing without seeing it! 1-9 - Song Fang, Ian D. Markwood, Yao Liu:
Manipulatable wireless key establishment. 1-9 - Hongbo Liu, Bo Liu, Cong Shi, Yingying Chen:
Secret key distribution leveraging color shift over visible light channel. 1-9 - Yifan Tian, Yantian Hou, Jiawei Yuan:
CAPIA: Cloud assisted privacy-preserving image annotation. 1-9 - Heather Lawrence, Andrew Hughes, Robert Tonic, Cliff C. Zou:
D-miner: A framework for mining, searching, visualizing, and alerting on darknet events. 1-9 - Yuwei Zheng, Lin Huang, Haoqi Shan, Jun Li, Qing Yang, Wenyuan Xu:
Ghost telephonist impersonates you: Vulnerability in 4G LTE CS fallback. 1-9 - Sarah M. Lehman, Chiu C. Tan:
PrivacyManager: An access control framework for mobile augmented reality applications. 1-9 - Liyang Zhang, Francesco Restuccia, Tommaso Melodia, Scott M. Pudlewski:
Learning to detect and mitigate cross-layer attacks in wireless networks: Framework and applications. 1-9 - Andrey Garnaev, Wade Trappe:
An OFDM-based dual radar/communication system facing uncertain jamming power. 1-9 - Wei Du, Qinghua Li:
Secure and efficient outsourcing of large-scale nonlinear programming. 1-9 - Xu Zhang, Edward W. Knightly:
Massive MIMO pilot distortion attack and zero-startup-cost detection: Analysis and experiments. 1-9 - Shameek Bhattacharjee, Nirnay Ghosh, Vijay K. Shah, Sajal K. Das:
QnQ: A reputation model to secure mobile crowdsourcing applications from incentive losses. 1-9 - Yuanyi Wu, Dongyu Meng, Hao Chen:
Evaluating private modes in desktop and mobile browsers and their resistance to fingerprinting. 1-9 - Jiapeng Zhang, Yingfei Dong:
Cyber attacks on remote relays in smart grid. 1-9 - Hailun Tan, Gene Tsudik, Sanjay Jha:
MTRA: Multiple-tier remote attestation in IoT networks. 1-9 - Xiaonan Zhang, Qi Jia, Linke Guo:
Secure and optimized unauthorized secondary user detection in dynamic spectrum access. 1-9 - Huangxin Wang, Zhonghua Xi, Fei Li, Songqing Chen:
WebTrap: A dynamic defense scheme against economic denial of sustainability attacks. 1-9 - Zhiyuan Zheng, Shan Jin, Riccardo Bettati, A. L. Narasimha Reddy:
Securing cyber-physical systems with adaptive commensurate response. 1-6 - Jianhua Sun, Kun Sun, Qi Li:
CyberMoat: Camouflaging critical server infrastructures with large scale decoy farms. 1-9 - Julie M. Haney, Simson L. Garfinkel, Mary Frances Theofanos:
Organizational practices in cryptographic development and testing. 1-9 - Gradeigh D. Clark, Janne Lindqvist, Antti Oulasvirta:
Composition policies for gesture passwords: User choice, security, usability and memorability. 1-9 - John D. Roth, Jeremy Martin, Travis Mayberry:
A graph-theoretic approach to virtual access point correlation. 1-9 - Mohamed Grissa, Attila A. Yavuz, Bechir Hamdaoui:
When the hammer meets the nail: Multi-server PIR for database-driven CRN with location privacy assurance. 1-9 - Blake Anderson, David A. McGrew:
OS fingerprinting: New techniques and a study of information gain and obfuscation. 1-9 - Chang-Wu Chen, Sang-Yoon Chang, Yih-Chun Hu, Yen-Wen Chen:
Protecting vehicular networks privacy in the presence of a single adversarial authority. 1-9 - Erik-Oliver Blass, Guevara Noubir:
Secure logging with crash tolerance. 1-10 - Qingji Zheng, Qi Li, Aytac Azgin, Jian Weng:
Data verification in information-centric networking with efficient revocable certificateless signature. 1-9 - Jiajun Xin, Ming Li, Linke Guo, Pan Li:
Practical privacy-preserving spectrum query schemes for database-driven CRNs with multiple service providers. 1-9 - Zonghao Huang, Yanmin Gong:
Differential location privacy for crowdsourced spectrum sensing. 1-9 - Sukwha Kyung, Wonkyu Han, Naveen Tiwari, Vaibhav Hemant Dixit, Lakshmi Srinivas, Ziming Zhao, Adam Doupé, Gail-Joon Ahn:
HoneyProxy: Design and implementation of next-generation honeynet via SDN. 1-9 - Mingshun Sun, Ming Li, Ryan M. Gerdes:
A data trust framework for VANETs enabling false data detection and secure vehicle tracking. 1-9 - Berk Akgun, Marwan Krunz, Onur Ozan Koyluoglu:
Pilot contamination attacks in massive MIMO systems. 1-9 - Yujie Ji, Xinyang Zhang, Ting Wang:
Backdoor attacks against learning systems. 1-9 - Amr Abdelaziz, C. Emre Koksal:
Fundamental limits of covert communication over MIMO AWGN channel. 1-9 - Seth Andrews, Ryan M. Gerdes, Ming Li:
Towards physical layer identification of cognitive radio devices. 1-9 - Dennis Kergl, Robert Roedler, Gabi Dreo Rodosek:
VulMap: Global information security vulnerabilities IEEE CNS 17 poster. 362-363 - Fei Pan, Hong Wen, Runfa Liao, Yixin Jiang, Aidong Xu, Kai Ouyang, Xiping Zhu:
Physical layer authentication based on channel information and machine learning. 364-365 - Runfa Liao, Hong Wen, Fei Pan, Huanhuan Song, Yixin Jiang, FeiYi Xie, Aidong Xu:
A physical layer secure transmission method based on channel prediction and QoS. 366-367 - Huanhuan Song, Luping Zhang, Hong Wen, Aidong Xu, Yixin Jiang, Runfa Liao, Songlin Chen, Yi Chen:
Performance analysis of cooperative secure transmission system. 368-369 - Qing Yang, Yixin Jiang, Aidong Xu, Hong Wen, Feng Wang, LiuFei Chen, Kai Ouyang, Xiping Zhu:
A model divides the mobile security level based on SVM. 370-371 - Wei Cheng, Aidong Xu, Yixin Jiang, Hong Wen, Huanhuan Song, Kai Ouyang, Xiping Zhu:
A method of reconciling the key discrepancy by exploiting unconditional secure transmission. 372-373 - Wei Cheng, Aidong Xu, Yixin Jiang, Hong Wen, Huanhuan Song, Kai Ouyang, Xiping Zhu:
The realization of key extraction based on USRP and OFDM channel response. 374-375 - J. P. Houle, S. Ahmadi, B. C. A. Robart, Ashraf Matrawy:
Leveraging inter-controller communication to MitigateDDoS attacks in SDN networks. 376-377 - Martín Barrère, Emil C. Lupu:
Naggen: A network attack graph generation tool - IEEE CNS 17 poster. 378-379 - Elena Uchiteleva, Abdallah Shami, Ahmed Refaey:
Time-varying keys for encryption in WSNs: IEEE CNS 17 poster. 380-381 - Ahmed Refaey, Khaled Loukhaoukha, Adel Omar Dahmane:
Cryptanalysis of stream cipher using density evolution. 382-383 - Mohamed Haj Taieb, Jean-Yves Chouinard:
Physical layer security using BCH and LDPC codes with adaptive granular HARQ. 564-569 - Ning Zhang, Ruide Zhang, Qiben Yan, Wenjing Lou, Y. Thomas Hou, Danfeng Yao:
Black penguin: On the feasibility of detecting intrusion with homogeneous memory. 586-594 - Robert C. Mitchell:
Epidemic-resistant configurations for intrusion detection systems. 487-494 - Avradip Mandal, John C. Mitchell, Hart William Montgomery, Arnab Roy:
Privacy for targeted advertising. 438-443 - Utku Ozgur, Harikrishnan T. Nair, Aditya Sundararajan, Kemal Akkaya, Arif I. Sarwat:
An efficient MQTT framework for control and protection of networked cyber-physical systems. 421-426 - Robert Mitchell, Marci McBride, John Jarocki:
Linkography abstraction refinement and cyber security. 595-601 - Konstantin Boyarinov, Aaron Hunter:
Security and trust for surveillance cameras. 384-385 - Ken Wong, Aaron Hunter:
Bluetooth for decoy systems: A practical study. 86-387 - Sebastian Baur, Holger Boche:
Storage of general data sources on a public database with security and privacy constraints. 555-559 - Mani Khavari, Sebastian Baur, Holger Boche:
Optimal capacity region for PUF-based authentication with a constraint on the number of challenge-response pairs. 575-579 - Steffen Passmann, Anne Lauber-Roensberg, Thorsten Strufe:
Privacy-preserving audience measurement in practice - Opportunities and challenges. 444-449 - Mehrdad Tahmasbi, Matthieu R. Bloch:
Covert secret key generation. 540-544 - Farshad Rahimi Asl, Fei Chiang, Wenbo He, Reza Samavi:
Privacy aware web services in the cloud. 458-466 - Matthias Frey, Igor Bjelakovic, Slawomir Stanczak:
MAC resolvability: First and second order results. 560-564 - Franck Cornevaux-Juignet, Matthieu Arzel, Pierre-Henri Horrein, Tristan Groleat, Christian Person:
Combining FPGAs and processors for high-throughput forensics IEEE CNS 17 poster. 388-389 - Franck Cornevaux-Juignet, Matthieu Arzel, Pierre-Henri Horrein, Tristan Groleat, Christian Person:
Open-source flexible packet parser for high data rate agile network probe. 610-618 - Prashanth Busireddygari, Subhash C. Kak:
Binary primes sequence for cryptography and secure communication. 570-574 - Rick Fritschek, Gerhard Wunder:
On full-duplex secure key generation with deterministic models. 550-554 - Shaofeng Zou, Yingbin Liang, Shlomo Shamai:
Gaussian fading channel with secrecy outside a bounded range. 545-549 - Jagadeesh Harshan, Sang-Yoon Chang, Seungmin Kang, Yih-Chun Hu:
Securing balise-based train control systems using cryptographic random fountains. 405-410 - Marmara El Masri, Natalija Vlajic:
Current state of client-side extensions aimed at protecting against CSRF-like attacks. 390-391 - Sandra Domenique Ringmann, Hanno Langweg:
Determining security requirements for cloud-supported routing of physical goods. 514-521 - R. Padmavathi Iyer, Pradeep K. Atrey, Gaurav Varshney, Manoj Misra:
Email spoofing detection using volatile memory forensics. 619-625 - Bilal Habib, Bertrand Cambou, Duane Booher, Christopher Robert Philabaum:
Public key exchange scheme that is addressable (PKA). 392-393 - Jeffrey Pawlick, Quanyan Zhu:
Quantitative models of imperfect deception in network security using signaling games with evidence [IEEE CNS 17 Poster]. 394-395 - Enrico Bacis, Alan Barnett, Andrew Byrne, Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Marco Rosa, Pierangela Samarati:
Distributed shuffle index: Analysis and implementation in an industrial testbed. 396-397 - Jong-Hoon Lee, Young Soo Kim, Jong-Hyun Kim, Ik-Kyun Kim:
Toward the SIEM architecture for cloud-based security services. 398-399 - Kenneth C. K. Wong, Aaron Hunter:
Managing cybersecurity break-ins using bluetooth low energy devices to verify attackers: A practical study. 432-437 - Mohamed Aslan, Ashraf Matrawy:
Could network view inconsistency affect virtualized network security functions? 510-512 - Vikram Patil, Shivam Parikh, Priyanka Singh, Pradeep K. Atrey:
GeoSecure: Towards secure outsourcing of GPS data over cloud. 495-501 - Bojan Suzic, Andreas Reiter, Alexander Marsalek:
Structuring the Scope: Enabling adaptive and multilateral authorization management. 522-530 - Erkuden Rios, Eider Iturbe, Wissam Mallouli, Massimiliano Rak:
Dynamic security assurance in multi-cloud DevOps. 467-475 - Giovanni Di Crescenzo, Matluba Khodjaeva, Delaram Kahrobaei, Vladimir Shpilrain:
Computing multiple exponentiations in discrete log and RSA groups: From batch verification to batch delegation. 531-539 - Zhiheng Xu, Quanyan Zhu:
Secure and practical output feedback control for cloud-enabled cyber-physical systems. 416-420 - Ruochi Zhang, Parv Venkitasubramaniam:
A game theoretic approach to analyze false data injection and detection in LQG system. 427-431 - Fengli Zhang, Qinghua Li:
Deep learning-based data forgery detection in automatic generation control. 400-404 - Changwei Liu, Anoop Singhal, Duminda Wijesekera:
A layered graphical model for mission attack impact analysis. 602-609 - R. James Ranjith Kumar, Biplab Sikdar:
Efficient detection of false data injection attacks on AC state estimation in smart grids. 411-415 - Robert Seeliger, Daniel Silhavy, Stefan Arbanowski:
Dynamic ad-insertion and content orchestration workflows through manifest manipulation in HLS and MPEG-DASH. 450-455 - Nabil Abubaker, Leonard Dervishi, Erman Ayday:
Privacy-preserving fog computing paradigm. 502-509 - Anselme Tueno, Florian Kerschbaum, Daniel Bernau, Sara Foresti:
Selective access for supply chain management in the cloud. 476-482 - Enrico Bacis, Marco Rosa, Ali Sajjad:
EncSwift and key management: An integrated approach in an industrial setting. 483-486 - Daniela Becker, Jorge Guajardo, Karl-Heinz Zimmermann:
Towards a new privacy-preserving social media advertising architecture (invited position paper). 45-457 - Ken Yau, Kam-Pui Chow, Siu-Ming Yiu, Chun-Fai Chan:
Detecting anomalous behavior of PLC using semi-supervised machine learning. 580-585
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.