default search action
7th CNS 2019: Washington, DC, USA
- 7th IEEE Conference on Communications and Network Security, CNS 2019, Washington, DC, USA, June 10-12, 2019. IEEE 2019, ISBN 978-1-5386-7117-7
- Samy Kambou, Ahmed Bouabdallah:
Using Structural Diversity to Enforce Strong Authentication of Mobiles to the Cloud. 1-9 - Giovanni Di Crescenzo, Matluba Khodjaeva, Delaram Kahrobaei, Vladimir Shpilrain:
Secure Delegation to a Single Malicious Server: Exponentiation in RSA-type Groups. 1-9 - Yifan Tian, Jiawei Yuan, Houbing Song:
Secure and Reliable Decentralized Truth Discovery Using Blockchain. 1-8 - Tiep Minh Hoang, Trung Q. Duong, Sangarapillai Lambotharan:
Secure Wireless Communication Using Support Vector Machines. 1-5 - Peyman Siyari, Marwan Krunz:
Linear Precoding with Friendly Jamming in Overloaded MU-MIMO Wiretap Networks. 1-5 - Wenwen Tu, Lifeng Lai:
Secret Key and Private Key Capacities Over an Unauthenticated Public Channel. 1-5 - Qinlong Huang, Nan Li, Zhicheng Zhang, Yixian Yang:
Secure and Privacy-Preserving Warning Message Dissemination in Cloud-Assisted Internet of Vehicles. 1-8 - Abderrahmane Mayouche, Danilo Spano, Christos G. Tsinos, Symeon Chatzinotas, Björn E. Ottersten:
SER -Constrained Symbol-Level Precoding for Physical-Layer Security. 1-5 - Batu K. Chalise, Brian M. Sadler:
Joint Data and Tag Precoder Optimization for MIMO Physical Layer Authentication with Embedded Fingerprinting. 1-5 - Asem Ghaleb, Issa Traoré, Karim Ganame:
A Framework Architecture for Agentless Cloud Endpoint Security Monitoring. 1-9 - Ning Wang, Jie Tang, Kai Zeng:
Spoofing Attack Detection in Mm-Wave and Massive MIMO 5G Communication. 1-5 - Anudeep Sai Muttavarapu, Ram Dantu, Mark A. Thompson:
Distributed Ledger for Spammers' Resume. 1-9 - Yaoqing Liu, Guchuan Sun, Stephanie Schuckers:
Enabling Secure and Privacy Preserving Identity Management via Smart Contract. 1-8 - Amir Alipour-Fanid, Monireh Dabaghchian, Ning Wang, Pu Wang, Liang Zhao, Kai Zeng:
Machine Learning-Based Delay-Aware UAV Detection Over Encrypted Wi-Fi Traffic. 1-7 - Jake Bailey Perazzone, Paul L. Yu, Brian M. Sadler, Rick S. Blum:
Fingerprint Embedding Authentication with Artificial Noise: MISO Regime. 1-5 - Xuheng Lin, Ronghua Xu, Yu Chen, J. Koji Lum:
A Blockchain-Enabled Decentralized Time Banking for a New Social Value System. 1-5 - Anil Gaihre, Santosh Pandey, Hang Liu:
Deanonymizing Cryptocurrency With Graph Learning: The Promises and Challenges. 1-3 - Roberto Di Pietro, Gabriele Oligeri, Pietro Tedeschi:
JAM-ME: Exploiting Jamming to Accomplish Drone Mission. 1-9 - SeokHwan Choi, Jin-Myeong Shin, Peng Liu, Yoon-Ho Choi:
Robustness Analysis of CNN-based Malware Family Classification Methods Against Various Adversarial Attacks. 1-6 - Allison Beemer, Oliver Kosut, Jörg Kliewer, Eric Graves, Paul L. Yu:
Authentication Against a Myopic Adversary. 1-5 - Kemal Akkaya, Vashish Baboolal, Nico Saputro, A. Selcuk Uluagac, Hamid Menouar:
Privacy-Preserving Control of Video Transmissions for Drone-based Intelligent Transportation Systems. 1-7 - Huan Yang, Liang Cheng, Mooi Choo Chuah:
Deep-Learning-Based Network Intrusion Detection for SCADA Systems. 1-7 - A. H. M. Jakaria, Mohammad Ashiqur Rahman, Md. Golam Moula Mehedi Hasan:
Safety Analysis of AMI Networks Through Smart Fraud Detection. 1-7 - Talal Halabi, Martine Bellaïche:
Security Risk-Aware Resource Provisioning Scheme for Cloud Computing Infrastructures. 1-9 - Ismail Butun, Patrik Österberg, Mikael Gidlund:
Preserving Location Privacy in Cyber-Physical Systems. 1-6 - Roberto Di Pietro, Leonardo Jero, Flavio Lombardi, Agusti Solanas:
GPU Algorithms for K-Anonymity in Microdata. 1-9 - Ashwag Albakri, Lein Harn, Mahesh Maddumala:
Polynomial-based Lightweight Key Management in a Permissioned Blockchain. 1-9 - Muhammad Saad, Ashar Ahmad, Aziz Mohaisen:
Fighting Fake News Propagation with Blockchains. 1-4 - Jiacheng Shang, Jie Wu:
A Usable Authentication System Using Wrist-Worn Photoplethysmography Sensors on Smartwatches. 1-9 - Wenxin Chen, Yingfei Dong, Zhenhai Duan:
Manipulating Drone Position Control. 10-18 - Mingyan Xiao, Ming Li, Linke Guo, Miao Pan, Zhu Han, Pan Li:
Securing Task Allocation in Mobile Crowd Sensing: An Incentive Design Approach. 19-27 - Lili Zhang, Dianqi Han, Ang Li, Tao Li, Yan Zhang, Yanchao Zhang:
WristUnlock: Secure and Usable Smartphone Unlocking with Wrist Wearables. 28-36 - Qiumao Ma, Wensheng Zhang:
Efficient and Accountable Oblivious Cloud Storage with Three Servers. 37-45 - Peiyi Han, Chuanyi Liu, Yingfei Dong, Hezhong Pan, QiYang Song, Binxing Fang:
FileCrypt: Transparent and Scalable Protection of Sensitive Data in Browser-based Cloud Storage. 46-54 - Muslum Ozgur Ozmen, Attila A. Yavuz, Rouzbeh Behnia:
Energy-Aware Digital Signatures for Embedded Medical Devices. 55-63 - Maria Mushtaq, Ayaz Akram, Muhammad Khurram Bhatti, Usman Ali, Vianney Lapotre, Guy Gogniat:
Sherlock Holmes of Cache Side-Channel Attacks in Intel's x86 Architecture. 64-72 - Ala Altaweel, Radu Stoleru, Guofei Gu, Arnab Kumar Maity:
CollusiveHijack: A New Route Hijacking Attack and Countermeasures in Opportunistic Networks. 73-81 - Danish Sattar, Ashraf Matrawy:
Towards Secure Slicing: Using Slice Isolation to Mitigate DDoS Attacks on 5G Core Network Slices. 82-90 - Quoc Phong Nguyen, Kar Wai Lim, Dinil Mon Divakaran, Kian Hsiang Low, Mun Choon Chan:
GEE: A Gradient-based Explainable Variational Autoencoder for Network Anomaly Detection. 91-99 - Savio Sciancalepore, Roberto Di Pietro:
DRAKE: Distributed Relay-Assisted Key Establishment. 100-108 - Hao Liu, Boyang Wang, Nan Niu, Shomir Wilson, Xuetao Wei:
Vaccine: : Obfuscating Access Pattern Against File-Injection Attacks. 109-117 - Alex Biryukov, Daniel Feher:
Privacy and Linkability of Mining in Zcash. 118-123 - Xiaolan Gu, Ming Li, Yang Cao, Li Xiong:
Supporting Both Range Queries and Frequency Estimation with Local Differential Privacy. 124-132 - Hanyu Quan, Hao Liu, Boyang Wang, Ming Li, Yuqing Zhang:
Randex: Mitigating Range Injection Attacks on Searchable Encryption. 133-141 - Zili Zha, An Wang, Yang Guo, Doug Montgomery, Songqing Chen:
BotSifter: An SDN-based Online Bot Detection Framework in Data Centers. 142-150 - Cagri Cetin, Dmitry B. Goldgof, Jay Ligatti:
SQL-Identifier Injection Attacks. 151-159 - Ashutosh Dutta, Ehab Al-Shaer:
"What", "Where", and "Why" Cybersecurity Controls to Enforce for Optimal Risk Mitigation. 160-168 - Yebo Feng, Jun Li, Lei Jiao, Xintao Wu:
BotFlowMon: Learning-based, Content-Agnostic Identification of Social Bot Traffic Flows. 169-177 - Tim Krause, Rafael Uetz, Tim Kretschmann:
Recognizing Email Spam from Meta Data Only. 178-186 - Xuhang Ying, Joanna Mazer, Giuseppe Bernieri, Mauro Conti, Linda Bushnell, Radha Poovendran:
Detecting ADS-B Spoofing Attacks Using Deep Neural Networks. 187-195 - Xinyu Zhou, Aiqun Hu, Guyue Li, Linning Peng, Yuexiu Xing, Jiabao Yu:
Design of a Robust RF Fingerprint Generation and Classification Scheme for Practical Device Identification. 196-204 - Ahmet Okutan, Shanchieh Jay Yang, Katie McConky, Gordon Werner:
CAPTURE: Cyberattack Forecasting Using Non-Stationary Features with Time Lags. 205-213 - Trishita Tiwari, Avraham Klausner, Mikhail Andreev, Ari Trachtenberg, Arkady Yerukhimovich:
Location Leakage from Network Access Patterns. 214-222 - Boyang Hu, Qicheng Lin, Yao Zheng, Qiben Yan, Matthew Troglia, Qingyang Wang:
Characterizing Location-based Mobile Tracking in Mobile Ad Networks. 223-231 - Sean Kennedy, Haipeng Li, Chenggang Wang, Hao Liu, Boyang Wang, Wenhai Sun:
I Can Hear Your Alexa: Voice Command Fingerprinting on Smart Home Speakers. 232-240 - Zhen Ling, Zupei Li, Chen Chen, Junzhou Luo, Wei Yu, Xinwen Fu:
I Know What You Enter on Gear VR. 241-249 - Ghada Almashaqbeh, Kevin Kelley, Allison Bishop, Justin Cappos:
CAPnet: A Defense Against Cache Accounting Attacks on Content Distribution Networks. 250-258 - Florian Quinkert, Tobias Lauinger, William K. Robertson, Engin Kirda, Thorsten Holz:
It's Not what It Looks Like: Measuring Attacks and Defensive Registrations of Homograph Domains. 259-267 - Jie Li, Lu Zhou, Huaxin Li, Lu Yan, Haojin Zhu:
Dynamic Traffic Feature Camouflaging via Generative Adversarial Networks. 268-276 - Nurit Devir, Orna Grumberg, Shaul Markovitch, Gabi Nakibly:
Topology-Agnostic Runtime Detection of OSPF Routing Attacks. 277-285 - Bruno Andriamanalimanana, Ali Tekeoglu, Korkut Bekiroglu, Saumendra Sengupta, Chen-Fu Chiang, Michael Reale, Jorge E. Novillo:
Symmetric kullback-leibler divergence of softmaxed distributions for anomaly scores. 1-6 - Mustafa Kaiiali, Sakir Sezer, Ayesha Khalid:
Cloud computing in the quantum era. 1-4
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.