Accepted papers

A Characterisation of Smart Grid DoS Attacks Acarali, Dilara (City, University of London); Rajarajan, Muttukrishnan (City University London); Chema, Doron (L7Defense); Ginzburg, Mark (L7Defense)
A multi-class detection system for Android malicious Apps based on color image features Zhang, Hua (State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, 100876, China); Qin, Jiawei (State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, 100876, China); Zhang, Boan (State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, 100876, China); Yan, Hanbing (The National Computer Network Emergency Response Technical Team/Coordination Center of China); Guo, Jing (The National Computer Network Emergency Response Technical Team/Coordination Center of China); Gao, Fei (Beijing University of Posts and Telecommunications, China)
A Multi-user Shared Searchable Encryption Scheme Supporting SQL Query Li, Mingyue (Nankai University); Jia, Chunfu (Nankai Univeristy); Du, Ruizhong (Hebei University)
A Public Auditing Framework against Malicious Auditors for Cloud Storage based on Blockchain Li, Song (College of Information Engineering, Nanjing University of Finance and Economics, Nanjing, China); Liu, Jian (College of Information Engineering, Nanjing University of Finance and Economics, Nanjing, China); Yang, Guannan (College of Information Engineering, Nanjing University of Finance and Economics, Nanjing, China)
A Secure and Verifiable Outsourcing Scheme for Machine Learning Data Li, Cheng (Xidian University); Yang, Li (Xidian University); Ma, Jianfeng (Xidian University)
A secure resource-centric access control system in webbased cloud management platform Zhang, Jiawei ; Ma, Jianfeng (Xidian University); Lu, Ning (Northeastern University); Wang, Ruixiao (Peking University); Shi, Wenbo (Northeastern University)
A Verifiable Combinatorial Auction Scheme with Bidder’s Privacy Protection Zhang, Mingwu (Hubei University of Technology)
Access Control for Wireless Body Area Networks Shen, Gang (Hubei University of Technology)
Alarm Elements based Adaptive Network Security Situation Prediction Model YANG, Hongyu (Civil Aviation University of China, School of Computer Science and Technology); Zhang, Le (School of Computer Science and Technology, Civil Aviation University of China, Tianjin 300300, China); Zhang, Xugao (School of Computer Science and Technology,Civil Aviation University of China); Xu, Guangquan (Tianjin University); Zhang, Jiyong (School of Computer and Communication Science, Swiss Federal Institute of Technology in Lausanne)
An Efficient and Privacy-Preserving Physiological Case Classification Scheme for E-healthcare System Shen, Gang (Hubei University of Technology); Gui, Yumin (Wuhan Puren Hospital); Zhang, Mingwu (Hubei University of Technology); Chen, Yu (Hubei University of Technology); Gao, Hanjun (China Nuclear Power Operation Technology Corporation, LTD); Su, Yixin (Wuhan University of Technology)
Distant Supervision for Relations Extraction via Deep Residual Learning and Multi-Instance Attention in Cybersecurity Shen, Guowei (Guizhou University); Qin, Ya (Guizhou University); Wang, Wanling (Guizhou University); Yu, Miao (Institute of Information Engineering, Chinese Academy of Sciences)
FIDO – that dog won’t hunt Scott, Michael (MIRACL Labs, Ireland)
Forward Secure Searchable Encryption with Conjunctive-Keyword Supporting Multi-User Liu, Zhongyi ; Xu, Chungen (Nanjing University of Science and Technology)
Generative image steganography based on digital Cardan Grille Wang, Yaojie ; Yang, Xiaoyuan (Engineering University of PAP)
Improved Conditional Differential Analysis on NLFSR Based Block Cipher KATAN32 with MILP Xing, Zhaohui (School of Information Science and Engineering, Shandong Normal University, Jinan 250014, China); Zhang, Wenying (School of Information Science and Engineering, Shandong Normal University, Jinan 250014, China); Han, Guoyong (School of Management Engineering, Shandong Jianzhu University, Jinan 250101, China)
IoTFC: A Secure and Privacy Preserving Architecture for Smart Buildings Qureshi, Amna (Universitat Oberta de Catalunya); Afaqui, Muhammad Shahwaiz Iqbal (Universitat Oberta de Catalunya); Salas, Julián (Universitat Oberta de Catalunya)
MIMEC Based Information System Security Situation Assessment Model Xie, Lixia (Civil Aviation University of China, School of Computer Science and Technology); Yan, Liping (Civil Aviation University of China, School of Computer Science and Technology); Zhang, Xugao (Civil Aviation University of China, School of Computer Science and Technology); Yang, Hongyu (Civil Aviation University of China, School of Computer Science and Technology); Xu, Guangquan (College of Intelligence and Computing, Tianjin University); Zhang, Jiyong (School of Computer and Communication Science, Swiss Federal Institute of Technology in Lausanne)
Mining DoS Vulnerabilities in PDF Processing Tools Jiang, WeiPeng ; WU, Bin (Institute of Information Engineering, Chinese Academy of Sciences)
Pixel Grouping Based Image Hashing for DIBR 3D Image Cui, Chen (Heilongjiang University); Wu, XuJun (Heilongjiang University); Yang, Jun (Jiaxing University); Li, Juyan (Heilongjiang University)
PUF-based Two-factor Group Authentication in Smart Home Ji, Sai (Network Information Center, Nanjing University of Information Science & Technology, Nanjing, China); Qi, Rongxin (Nanjing University of Information Science and Technology); Shen, Jian (Nanjing University of Information Science and Technology)
Research on a Hybrid EMD-SVR Model for Time Series Prediction Yang, QiangQiang (1. Shanghai University; 2. Shanghai University of Electric Power); Liu, Dandan (Shanghai University of Electric Power); Fang, Yong (Shanghai university); Yang, Dandan (Tianjin Navigation Instruments Research Institute); Zhou, Yi (MXSUN software company); Sheng, Ziheng (The University of New South Wales)
Research on IoT Security Technology and Standardization in the 5G Era Qiu, Qin (China Mobile Communications Group Co., Ltd., Beijing); Du, Xuetao (China Mobile Group Design Institute Co., Ltd., Beijing); YU, Shengquan (Beijing Normal University); Wang, Chenyu (Beijing University of Posts and Telecommunications); Liu, Shenglan (China Mobile Group Design Institute Co., Ltd., Beijing); Zhao, Bei (China Mobile Group Design Institute Co., Ltd., Beijing); Chang, Ling (China Mobile Group Design Institute Co., Ltd., Beijing)
Security Analysis and Improvement of a Dynamic-Hash-Table based Auditing Scheme for Cloud Storage Ma, Qiang (State Grid Shandong Electric Power Company); Guan, Ti (State Grid Shandong Electric Power Company); Geng, Yujie (State Grid Shandong Electric Power Company); Wang, Jing (Wuhan University); Luo, Min (Wuhan University)
Security and Privacy in 5G Applications: Challenges and Solutions Qiu, Qin (China Mobile Communications Group Co., Ltd., Beijing); Xu, Sijia (China Mobile Communications Group Co., Ltd, Beijing); YU, Shengquan (Beijing Normal University)
User Identity Linkage across Social Networks based on Neural Tensor Network Guo, Xiaoyu (PLA Strategic Support Force Information Engineering University); Liu, Yan (PLA Strategic Support Force Information Engineering University); Wang, Xuzhong (PLA Strategic Support Force Information Engineering University); Chen, Jing (PLA Strategic Support Force Information Engineering University); Zhao, Yuan (PLA Strategic Support Force Information Engineering University)
Watermark based Tor Cross-domain Tracking System For Tor Network Traceback ding, jianwei (cetc 30); chen, zhouguo (catch 30)