AI for Security.- Classify Me Correctly if You Can Evaluating Adversarial Machine Learning Threats in NIDS.- CUFT Cuflow based Approach with Multi headed Attention Mechanism for Encrypted Traffic Classification.- CyberEA An Efficient Entity Alignment Framework for Cybersecurity Knowledge Graph.- DNN Architecture Attacks via Network and Power Side Channels.- Invisibility Spell Adversarial Patch Attack Against Object Detectors.- Meta Perturbation Generation Network for Text based CAPTCHA.- Model Inversion Attacks on Homogeneous and Heterogeneous Graph Neural Networks.
- Unsupervised Multi Criteria Adversarial Detection in Deep Image Retrieval.- VRC GraphNet A Graph Neural Network based Reasoning Framework for Attacking Visual Reasoning Captchas.- Authentication.- An Adaptive Authentication Protocol for Internet of Vehicles Based on Vehicle Density.- Discovering and Understanding the Security Flaws of Authentication and Authorization in IoT Cloud APIs for Smart Home.- Optimizing Lightweight Intermittent Message Authentication for Programmable Logic Controller.- Blockchain and Distributed System Security.- Byzantine Protocols with Asymptotically Optimal Communication Complexity.
- Demystifying Blockchain Scalability Sibling Chains with Minimal Interleaving.- VDABSys A novel security testing framework for blockchain systems based on vulnerability detection. Cryptography.- Anonymous Key Issuing Protocol with Certified Identities in Identity based Encryption.- Batch Lattice Based Designated Verifier ZK SNARKs for R1CS.- Certificateless Aggregate Signature Without Trapdoor for Cloud Storage.- Efficient Zero Knowledge for Regular Language.- Enabling Fast Settlement in Atomic Cross-Chain Swaps.
- HeSUN Homomorphic Encryption for Secure Unbounded Neural Network Inference.- Optimization of Functional Bootstraps with Large LUT and Packing Key Switching.- Data Security.- An Authentication Algorithm for Sets of Spatial Data Objects.- An Efficient Private Information Retrieval Protocol Based on TFHE.- mShield Protect In-process Sensitive Data Against Vulnerable Third Party Libraries.- Password Cracking by Exploiting User Group Information.