default search action
6th CNS 2018: Beijing, China
- 2018 IEEE Conference on Communications and Network Security, CNS 2018, Beijing, China, May 30 - June 1, 2018. IEEE 2018, ISBN 978-1-5386-4586-4
- Mauro Conti, Ankit Gangwal, Sarada Prasad Gochhayat, Gabriele Tolomei:
Spot the Difference: Your Bucket is Leaking : A Novel Methodology to Expose A/B Testing Effortlessly. 1-7 - Liangxiao Xin, David Starobinski:
Mitigation of Cascading Denial of Service Attacks on Wi-Fi Networks. 1-9 - Elliott Wen, Jiannong Cao, Jiaxing Shen, Xuefeng Liu:
Fraus: Launching Cost-efficient and Scalable Mobile Click Fraud Has Never Been So Easy. 1-9 - Zhi Yang, Yusi Zhang, Yafei Dai:
Defending against Social Network Sybils with Interaction Graph Embedding. 1-9 - Qiuxiang Dong, Dijiang Huang, Jim Luo, Myong H. Kang:
Achieving Fine-Grained Access Control with Discretionary User Revocation over Cloud Data. 1-9 - Abdulhamid Adebayo, Danda B. Rawat, Moses Garuba, Laurent Njilla:
Aggregated-Query-as-a-Secure-Service for RF Spectrum Database-Driven Opportunistic Wireless Communications. 1-2 - Guangye Sui, Yunlei Zhao:
Revisiting OAKE in the eCK Security Model. 9 - Lizhou Yuan, Yidan Hu, Yunzhi Li, Rui Zhang, Yanchao Zhang, Terri Hedgpeth:
Secure RSS-Fingerprint-Based Indoor Positioning: Attacks and Countermeasures. 1-9 - Xu Chu, Na Ruan, Ming Li, Weijia Jia:
Pseudonym Inference in Cooperative Vehicular Traffic Scenarios. 1-9 - Muslum Ozgur Ozmen, Rouzbeh Behnia, Attila A. Yavuz:
Compact Energy and Delay-Aware Authentication. 1-9 - Wenqiang Jin, Ming Li, Linke Guo, Lei Yang:
DPDA: A Differentially Private Double Auction Scheme for Mobile Crowd Sensing. 1-9 - Tian Xie, Guan-Hua Tu, Chi-Yu Li, Chunyi Peng, Jiawei Li, Mi Zhang:
The Dark Side of Operational Wi-Fi Calling Services. 1 - Takashi Harada, Ken Tanaka, Kenji Mikawa:
Acceleration of Packet Classification via Inclusive Rules. 1-2 - Tao Qin, Chao He, Hezhi Jiang, Ruoya Chen:
Behavior Rhythm: An Effective Model for Massive Logs Characterizing and Security Monitoring in Cloud. 1-7 - Chia-Yi Yeh, Edward W. Knightly:
Feasibility of Passive Eavesdropping in Massive MIMO: An Experimental Approach. 1-9 - Carlos Aguilar Melchor, Jean-Christophe Deneuville, Philippe Gaborit, Tancrède Lepoint, Thomas Ricosset:
Delegating Elliptic-Curve Operations with Homomorphic Encryption. 1-9 - Ignacio Martín, José Alberto Hernández, Sergio de los Santos:
SignatureMiner: A Fast Anti-Virus Signature Intelligence Tool. 1-2 - Chen Wang, Jian Liu, Yingying Chen, Hongbo Liu, Yan Wang:
Towards In-baggage Suspicious Object Detection Using Commodity WiFi. 1-9 - Geremew Begna, Danda B. Rawat, Moses Garuba, Laurent Njilla:
SecureCASH: Securing Context-Aware Distributed Storage and Query Processing in Hybrid Cloud Framework. 1-2 - Mina Guirguis, Alireza Tahsini, Khan Siddique, Clara Novoa, Justin Moore, Christine Julien, Noah Dunstatter:
BLOC: A Game-Theoretic Approach to Orchestrate CPS against Cyber Attacks. 1-9 - Huan Yang, Liang Cheng, Mooi Choo Chuah:
Detecting Payload Attacks on Programmable Logic Controllers (PLCs). 1-9 - Peng Gao, Binghui Wang, Neil Zhenqiang Gong, Sanjeev R. Kulkarni, Kurt Thomas, Prateek Mittal:
SYBILFUSE: Combining Local Attributes with Global Structure to Perform Robust Sybil Detection. 1-9 - Guoquan Li, Zheng Yan, Yulong Fu:
A Study and Simulation Research of Blackhole Attack on Mobile AdHoc Network. 1-6 - Anni Zhou, Pan Zhou, Dapeng Oliver Wu, Yuchong Hu, Shouling Ji:
T-PriDO: A Tree-based Privacy-Preserving and Contextual Collaborative Online Big Data Processing System. 1-9 - Hao Xu, Yu Long, Zhiqiang Liu, Zhen Liu, Dawu Gu:
Dynamic Practical Byzantine Fault Tolerance. 1-8 - Mass Soldal Lund, Jorgen Emil Gulland, Odd Sveinung Hareide, Øyvind Jøsok, Karl Olav Carlsson Weum:
Integrity of Integrated Navigation Systems. 1-5 - Junli Kong, Baocang Wang, Caiyun Liu, Gaofei Wu:
An Approach for Predicting the Popularity of Online Security News Articles. 1-6 - Xingya Liu:
Blind Rendezvous: A Promising Candidate of Secure Spectrum Access for D2D communications in IoT. 1-5 - Ning Wang, Long Jiao, Kai Zeng:
Pilot Contamination Attack Detection for NOMA in Mm-Wave and Massive MIMO 5G Communication. 1-9 - LiuFei Chen, Yushan Li, Hong Wen, WenXin Lei, Wenjing Hou, Jie Chen:
Block Chain Based Secure Scheme For Mobile Communication. 1-2 - Yushan Li, LiuFei Chen, Jie Chen, FeiYi Xie, Songlin Chen, Hong Wen:
A Low Complexity Feature Extraction for the RF Fingerprinting Process. 1-2 - Lei Yang, Fengjun Li:
Cloud-Assisted Privacy-Preserving Classification for IoT Applications. 1-9 - Shiwei Yan, Yong Shang, Yanbo Huang:
Social-aware Jamming Allocation for Physical-layer Security in D2D Multicast Network. 1-7 - Kin Gwn Lore, Devu Manikantan Shila, Lingyu Ren:
Detecting Data Integrity Attacks on Correlated Solar Farms Using Multi-layer Data Driven Algorithm. 1-9 - Mengfei Peng, Wei Shi, Jean-Pierre Corriveau:
Repairing Faulty Nodes and Locating a Dynamically Spawned Black Hole Search Using Tokens. 1-9 - Jiankuo Dong, Fangyu Zheng, Juanjuan Cheng, Jingqiang Lin, Wuqiong Pan, Ziyang Wang:
Towards High-performance X25519/448 Key Agreement in General Purpose GPUs. 1-9 - Ali Ataeemh Allami, Mukesh K. Mohania, Wei Jiang:
Privacy-Preserving Watermarking Transformation Technique in a Distributed Environment. 1-9 - Yifei Xu, Ting Liu, Pengfei Liu, Hong Sun:
A Search-based Firmware Code Analysis Method for IoT Devices. 1-2 - Rui Hu, Yanmin Gong:
Secret Dispersion: Secure Data Delivery in Cyber Physical System. 1-2 - Xinyu Lei, Guan-Hua Tu, Alex X. Liu, Chi-Yu Li, Tian Xie:
The Insecurity of Home Digital Voice Assistants - Vulnerabilities, Attacks and Countermeasures. 1-9 - Abdelnasser Banihani, Abdulrahman Alzahrani, Raed Alharthi, Huirong Fu, George P. Corser:
T-PAAD: Trajectory Privacy Attack on Autonomous Driving. 1-2 - Li Yang, Teng Wei, Jianfeng Ma, Shui Yu, Chao Yang:
Inference Attack in Android Activity based on Program Fingerprint. 1-9 - Wenqian Yu, Ping Yu, Junyuan Wang, Changzheng Wei, Lu Gong, Weigang Li, Bo Cui, Hari K. Tadepalli, Brian Will:
Protecting Your Own Private Key in Cloud: Security, Scalability and Performance. 1-2 - Savio Sciancalepore, Gabriele Oligeri, Roberto Di Pietro:
Shooting to the Stars: Secure Location Verification via Meteor Burst Communications. 1-9 - Kamrul Hasan, Sachin Shetty, Amin Hassanzadeh, Malek Ben Salem, Jay Chen:
Modeling Cost of Countermeasures in Software Defined Networking-enabled Energy Delivery Systems. 1-9 - Wenhai Sun, Ning Zhang, Wenjing Lou, Y. Thomas Hou:
Tapping the Potential: Secure Chunk-based Deduplication of Encrypted Data for Cloud Backup. 1-9 - Boyang Hu, Baojian Zhou, Qiben Yan, Adil Alim, Feng Chen, Huacheng Zeng:
PSCluster: Differentially Private Spatial Cluster Detection for Mobile Crowdsourcing Applications. 1-9 - Long Jiao, Jie Tang, Kai Zeng:
Physical Layer Key Generation Using Virtual AoA and AoD of mmWave Massive MIMO Channel. 1-9 - Hanif Rahbari, Jinshan Liu, Jung-Min "Jerry" Park:
SecureMatch: Scalable Authentication and Key Relegation for IoT Using Physical-Layer Techniques. 1-9 - Rajkarn Singh, George Theodorakopoulos, Mahesh K. Marina, Myrto Arapinis:
On Choosing Between Privacy Preservation Mechanisms for Mobile Trajectory Data Sharing. 1-9 - Qin Liu, SiXia Wu, Shuyu Pei, Jie Wu, Tao Peng, Guojun Wang:
Secure and Efficient Multi-Attribute Range Queries based on Comparable Inner Product Encoding. 1-9 - Azadeh Tabiban, Suryadipta Majumdar, Lingyu Wang, Mourad Debbabi:
PERMON: An OpenStack Middleware for Runtime Security Policy Enforcement in Clouds. 1-7 - Yuanxiong Guo, Yanmin Gong:
Practical Collaborative Learning for Crowdsensing in the Internet of Things with Differential Privacy. 1-9 - Roberto Di Pietro, Gabriele Oligeri, Xavier Salleras, Matteo Signorini:
N-Guard: a Solution to Secure Access to NFC tags. 1-9 - Dongdi Wei, Xiaofeng Qiu:
Status-based Detection of malicious code in Internet of Things (IoT) devices. 1-7 - Alexandre Adomnicai, Jacques J. A. Fournier, Laurent Masson:
Hardware Security Threats Against Bluetooth Mesh Networks. 1-9 - Shi-Cho Cha, Kuo-Hui Yeh:
An ISO/IEC 15408-2 Compliant Security Auditing System with Blockchain Technology. 1-2 - Sana Belguith, Sarada Prasad Gochhayat, Mauro Conti, Giovanni Russello:
Emergency Access Control Management Via Attribute Based Encrypted QR Codes. 1-8 - Ning Zhang, Wenhai Sun, Wenjing Lou, Y. Thomas Hou, Wade Trappe:
ROSTER: Radio Context Attestation in Cognitive Radio Network. 1-9 - Fannv He, Yuqing Zhang, Huizheng Liu, Wei Zhou:
SCPN-based Game Model for Security Situational Awareness in the Intenet of Things. 1-5 - Yingjie Guo, Liwei Chen, Gang Shi:
Function-Oriented Programming: A New Class of Code Reuse Attack in C Applications. 1-9 - Yao Yao, Lipeng Zhu, He Wang:
Real-time Detection of Passive Backdoor Behaviors on Android System. 1-9 - Prosanta Gope, Biplab Sikdar:
An Efficient Privacy-Preserving Dynamic Pricing-based Billing Scheme for Smart Grids. 1-2 - Pengfei Liu, Ting Liu:
Physical Intrusion Detection for Industrial Control System. 1-2 - Shiran Pan, Fangyu Zheng, Wen Tao Zhu, Qiongxiao Wang:
Harnessing the Cloud for Secure and Efficient Outsourcing of Non-negative Matrix Factorization. 1-9 - Qi Duan, Ehab Al-Shaer, Mazharul Islam, Jafar Haadi Jafarian:
CONCEAL: A Strategy Composition for Resilient Cyber Deception-Framework, Metrics and Deployment. 1-9 - Mingshun Sun, Ming Li, Ryan M. Gerdes:
Truth-aware Optimal Decision-making Framework with Driver Preferences for V2V Communications. 1-9 - Stijn Pletinckx, Cyril Trap, Christian Doerr:
Malware Coordination using the Blockchain: An Analysis of the Cerber Ransomware. 1-9 - Bo Jiang, Ming Li, Ravi Tandon:
Context-aware Data Aggregation with Localized Information Privacy. 1-9 - Mouna Rekik, Christophe Gransart, Marion Berbineau:
Cyber-Physical Security Risk Assessment for Train Control and Monitoring Systems. 1-9 - Mingyue Wang, Wen-Tao Zhu, Shen Yan, Qiongxiao Wang:
SoundAuth: Secure Zero-Effort Two-Factor Authentication Based on Audio Signals. 1-9 - Mohannad Alhanahnah, Qicheng Lin, Qiben Yan, Ning Zhang, Zhenxiang Chen:
Efficient Signature Generation for Classifying Cross-Architecture IoT Malware. 1-9 - Dongfang Li, Zhaoguo Wang, Yibo Xue:
Fine-grained Android Malware Detection based on Deep Learning. 1-2 - Wenxin Chen, Yingfei Dong, Zhenhai Duan:
Manipulating Drone Dynamic State Estimation to Compromise Navigation. 1-9 - Ali Alshehri, Hani Alshahrani, Abdulrahman Alzahrani, Raed Alharthi, Huirong Fu, Anyi Liu, Ye Zhu:
DOPA: Detecting Open Ports in Android OS. 1-2 - Tao Qin, Ruoya Chen, Lei Wang, Chao He:
LMHADC: Lightweight Method for Host based Anomaly Detection in Cloud using Mobile Agents. 1-8 - Santiago Aragon, Marco Tiloca, Max Maass, Matthias Hollick, Shahid Raza:
ACE of Spades in the IoT Security Game: A Flexible IPsec Security Profile for Access Control. 1-9 - Wang Jiao, Victor O. K. Li:
Support Vector Machine Detection of Data Framing Attack in Smart Grid. 1-5 - Xiao-Si Wang, Ian Herwono, Francesco Di Cerbo, Paul Kearney, Mark Shackleton:
Enabling Cyber Security Data Sharing for Large-scale Enterprises Using Managed Security Services. 1-7 - Haotian Chi, Longfei Wu, Xiaojiang Du, Qiang Zeng, E. Paul Ratazzi:
e-SAFE: Secure, Efficient and Forensics-Enabled Access to Implantable Medical Devices. 1-9 - Jingyao Fan, Youssef Khazbak, Jue Tian, Ting Liu, Guohong Cao:
Mitigating Stealthy False Data Injection Attacks Against State Estimation in Smart Grid. 1-9 - Prakash Shrestha, Babins Shrestha, Nitesh Saxena:
Home Alone: The Insider Threat of Unattended Wearables and A Defense using Audio Proximity. 1-9 - Huan Gao, Chunlei Zhang, Muaz Ahmad, Yongqiang Wang:
Privacy-Preserving Average Consensus on Directed Graphs Using Push-Sum. 1-9 - Ruozhou Yu, Guoliang Xue, Vishnu Teja Kilari, Xiang Zhang:
Deploying Robust Security in Internet of Things. 1-9 - Youssef Khazbak, Jingyao Fan, Sencun Zhu, Guohong Cao:
Preserving Location Privacy in Ride-Hailing Service. 1-9
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.