Accepted papers

Blockchain-based Outsourcing Shared Car Risk Prediction Scheme Design

Zhai, (Qinghai university)

Fairness Protection Method of Vickery Auction Based on Smart Contract          

Yu, yuan   (xidian university); Qin, wenjing   (Xidian University); Zhou, Yasheng   (Xidian University); Yang, Li   (Xidian University)

An Improved Needham-Schroeder Session Key Distribution Protocol For In-Vehicle CAN Network

Yin, Long   (Software College, Northeastern University, China); Xu, Jian   (Software College, Northeastern University, China); Wang, Chen   (Software College, Northeastern University, China); Wang, Zihao   (Software College, Northeastern University, China)

Research on Two-Party Cooperative Aigis-sig Digital Signature Protocol             

(Information Engineering University); (Information Engineering University)

An Automated Attack Signature Generation System for Polymorphic Worm Detection

Li, Qingru   (Hebei Normal University); Ma, Zerou   (Hebei Normal University); Wang, Fangwei   (Hebei Normal University); Wang, Changguang   (Hebei Normal University)

An Efficient Unsupervised Domain Adaptation Deep Learning Model for Unknown Malware Detection             

Wang, Fangwei   (Hebei Normal University); Chai, Guofang   (Hebei Normal University); Li, Qingru   (Hebei Normal University); Wang, Changguang   (Hebei Normal University)

A Lightweight PSIS Scheme Based on Multi-Node Collaboration in the IoT         

Zhang, Lina   (Shaanxi Normal University); Yang, Bo   (Shaanxi Normal University); Wang, Tao   (Shaanxi Normal University); Wang, Tong   (Xi’an University of Science and Technology)

SAD: Website Fingerprint Defense based on Adversarial Examples       

Tang, Renzhi   (Guizhou University); Shen, Guowei   (Guizhou University); Guo, Chun   (Guizhou University); Cui, Yunhe   (Guizhou University)

A Secure Medical Diagnosis Scheme with Privacy-Preserving Linear Regression based on Gradient Descent     

Zhang, Mingwu   (Hubei University of Technology); Ku, Hanchao   (HBUT); Xia, Zhe   (Wuhan University Of Technology, China)

A privacy-aware and time-limited data access control scheme with large universe and public traceability for Cloud-based IoD          

Zhang, Jiawei   (Xidian University); Yang, Yanbo   (Inner Mongolia University of Science \& Technology); Lu, Ning   (Northeastern University); Liu, Zhiwei   (The 27th Research Institute of China Electronics Technology Group Corporation)

Multi-Party High-Dimensional Related Data Publishing via Probabilistic Principal Component Analysis and Differential Privacy       

Gu, Zhen   (Harbin Engineering University); Zhang, Guoyin   (Harbin Engineering University); Yang, Chen   (Harbin Engineering University)

Source code vulnerability detection method with multidimensional representation    

YANG, Hongyu   (Civil Aviation University of China, School of Computer Science and Technology); YING, Leyi   (Civil Aviation University of China, School of Computer Science and Technology); ZHANG, Liang   (University of Arizona,College of Information)

A Security Enhanced Verification Framework Based on Device Fingerprint in Internet of Things

Guangyan, zhang   (Northeasten University)

 RLPassGAN: Password Guessing Model Based on GAN with Policy Gradient    

Huang, Deng   (Sichuan University); Wang, Yufei   (Sichuan University); Chen, Wen   (Sichuan University)

Linear Policy Recommender Scheme for Large-Scale Attribute-based Access Control   

Wang, Jing   (Guilin University of Eletronic Technology); Huang, Weijia   (Guilin University of Eletronic Technology); Liu, Wenfen   (Guilin University of Eletronic Technology); Wang, Lingfu   (Guilin University of Eletronic Technology); Zhang, Mingwu   (Guilin University of Eletronic Technology)

CAFM: Precise Classication for Android Family Malware             

Li, Dan   (School of Computer Science and Engineering, Northeastern University, Shenyang, China.); Pan, Runbang   (School of Computer Science and Engineering, Northeastern University, Shenyang, China.); Lu, Ning   (School of Computer Science and Engineering, Northeastern University, Shenyang, China.); Shi, Wenbo   (School of Computer Science and Engineering, Northeastern University, Shenyang, China.)

System anomaly detection based on call sequences using relaxed-SVM            

Liao, Xiaoyao   (School of Cyber Science and Engineering,Sichuan University,Chengdu); Wang, Changzhi   (Zhihuiyuntian Technology Chengdu); Chen, Wen   (School of Cyber Science and Engineering,Sichuan University,Chengdu)

BA-Audit: blockchain-based public auditing for aggregated data sharing in edge-assisted IoT  

Liu, Mingxi   (Northeastern University); Lu, Ning   (Northeastern University); Yin, Jingli   (Northeastern University); Shi, Wenbo   (Northeastern University)

Predicting Congestion Attack of Variable Spoofing Frequency for Reliable Traffic Signal System

Xiang, Yingxiao (Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University); Chen, Tong (Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University); Li, Yike (Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University); Tian, Yunzhe (Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University); Niu, Wenjia (Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University); Tong, Endong (Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University); Liu, Jiqiang (Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University); Jia, Bowei (Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University); Wu, Yalun (Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University); Huang, Xinyu (Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University)

Key Node Recognition Method in Complex Networks with Comprehensive Degree      

XIE, Lixia   (Civil Aviation University of China, School of Computer Science and Technology); SUN, Honghong   (Civil Aviation University of China,School of Computer Science and Technology); YANG, Hongyu   (Civil Aviation University of China, School of Computer Science and Technology); ZHANG, Liang   (University of Arizona, School of Information)

A Method of Security Risk Assessment for Network Host Nodes            

YANG, Hongyu   (Civil Aviation University of China,School of Safety Science and Engineering,School of Computer Science and Technology); YUAN, Haihang   (Civil Aviation University of China,School of Computer Science and Technology); ZHANG, Liang   (University of Arizona,School of Information)

Threat Detection-Oriented Network Security Situation Assessment Method   

YANG, Hongyu   (Civil Aviation University of China, School of Safety Science and Engineering,School of Computer Science and Technology); ZHANG, Zixin   (Civil Aviation University of China, School of Computer Science and Technology); ZHANG, Liang   (University of Arizona,School of Information)

System Business Affecting Impact Analysis Method with Crossover Probability Theory              

XIE, Lixia   (Civil Aviation University of China, School of Computer Science and Technology); ZHANG, Yijia   (Civil Aviation University of China, School of Computer Science and Technology); YANG, Hongyu   (Civil Aviation University of China, School of Computer Science and Technology); ZHANG, Liang   (University of Arizona, School of Information)

RAP: A Lightweight Application Layer Defense against Website Fingerprinting

Zhang, Yan   (Xidian University); Yang, Li   (Xidian University); Ying, Shirui   (Xidian University); Jia, Junbo   (Xidian University); Zhou, Yasheng   (Xidian University)

Privacy-preserving Naive Bayes Classifier Using Leveled Homomorphic Encryption                       

Chen Jingwei  (Chongqing Institute of Green and Intelligent Technology, Chinese Academy of Sciences); Feng Yong  (Chongqing Institute of Green and Intelligent Technology, Chinese Academy of Sciences); Liu Yang  (Chongqing Jiaotong University); Wu Wenyuan  (Chongqing Institute of Green and Intelligent Technology, Chinese Academy of Sciences); Yang Guanci  (Guizhou University)

FL-iotDP: Differential Private Federated Neural Network                           

Lin, Wang  (University of Jinan); Muhammad, Irfan Maaz (School of Information Science and Engineering, University of Jinan); Ali Sheraz  (School of Information Science and Engineering, University of Jinan); Jing Shan  (School of Information Science and Engineering, University of Jinan); Zhao Chuan  (School of Information Science and Engineering, University of Jinan)

Analysis of Vulnerability of IPsec Protocol Implementa-tion Based on Differential Fuzzing       

Kai Tian  (Information University); Wei Fushan  (State Key Laboratory of Mathematical Engineering and Advanced Computing,); Gu Chunxiang  (Information Engineering University); Shi Yanan  (Information Engineering University)

A Honeywords Generation Method Based on Deep Learning and Rule-based Password Attack

Yang Kunyu  (State Key Laboratory of Mathematical Engineering and Advanced Computing); Hu Xuexian  (State Key Laboratory of Mathematical Engineering and Advanced Computing); Zhang Qihui  (State Key Laboratory of Mathematical Engineering and Advanced Computing); Wei Jianghong   (State Key Laboratory of Mathematical Engineering and Advanced Computing); Liu Wenfen   (Guilin University Of Electronic Technology)

Vulnerability Testing on the Key Scheduling Algorithm of PRESENT Using Deep Learning          

Duan Ming  (Information Engineering University); Zhou Rui  (Information Engineering University); Fu Chaohui  (Information Engineering University); Guo Sheng  (Information Engineering University); Wu Qianqiong  (Information Engineering University)

GLV/GLS Scalar Multiplication on Twisted Edwards Curves                       

Wei fushan (State Key Laboratory of Mathematical Engineering and Advanced Computing,); Zhang Ruijie  (Information Engineering University); Ma Chuangui  (Department of Basic, Army Aviation Institution); Niu Lei  (Department of Basic, Army Aviation Institution)

Federated Learning-based IDS Against Poisoning Attacks                           

Xu Mengfan  (Shaanxi Normal University); Li Xinghua  (Xidian University)

Online Privacy of Personal Information – Perceptions v Reality               

Gan Diane  (University of Greenwich)

ARTPHIL: Reversible de-identification of free-text using an integrated model                 

Alabdullah Bayan  (University of Sussex); Beloff Natalia  (University of Sussex); White Martin  (University of Sussex)