


default search action
26th ICICS 2024: Mytilene, Greece - Part I
- Sokratis K. Katsikas
, Christos Xenakis
, Christos Kalloniatis
, Costas Lambrinoudakis
:
Information and Communications Security - 26th International Conference, ICICS 2024, Mytilene, Greece, August 26-28, 2024, Proceedings, Part I. Lecture Notes in Computer Science 15056, Springer 2025, ISBN 978-981-97-8797-5
Attacks
- Chensheng Zhang, Tingwei Fan, Jingwei Jiang
:
How to Design Honey Vault Schemes. 3-24 - Zijian Song, Jun Xu, Binwu Xiang, Weijie Li, Dingfeng Ye:
New Result for Breaking NTRU Encryption with Multiple Keys in Polynomial Time. 25-39 - Tianrong Huang, Yingying Li, Qinggan Fu, Yincen Chen, Ling Song:
Improving Differential-Neural Cryptanalysis for Large-State SPECK. 40-57 - Kou Sugiura, Mamoru Mimura
:
Evasion Attempt for the Malicious PowerShell Detector Considering Feature Weights. 58-77 - Jingtao Li, Bo Gao, Jianxiong Wan
, Leixiao Li
, Jiaxiang Zhang:
A Fast Framework for Efficiently Constructing Valuable Cubes. 78-98 - Alireza Taheritajar, Zahra Mahmoudpour Harris, Reza Rahaeimehr:
A Survey on Acoustic Side Channel Attacks on Keyboards. 99-121
Trust
- Davide Ferraris, Konstantinos Kotis, Christos Kalloniatis:
Enhancing TrUStAPIS Methodology in the Web of Things with LLM-Generated IoT Trust Semantics. 125-144 - Peixi Li, Xiang Li, Liming Fang:
DMA: Mutual Attestation Framework for Distributed Enclaves. 145-164 - Benshan Mei, Saisai Xia, Wenhao Wang, Dongdai Lin:
Cabin: Confining Untrusted Programs Within Confidential VMs. 165-184
Anomaly Detection
- Yunyang Xie, Kai Chen, Shenghui Li, Bingqian Li, Ning Zhang:
UARC:Unsupervised Anomalous Traffic Detection with Improved U-Shaped Autoencoder and RetNet Based Multi-clustering. 187-207 - Hamed Fard, Tobias Schalau
, Gerhard Wunder:
An Investigation Into the Performance of Non-contrastive Self-supervised Learning Methods for Network Intrusion Detection. 208-227 - Ming-Chang Lee
, Jia-Chun Lin
, Sokratis K. Katsikas
:
Impact of Recurrent Neural Networks and Deep Learning Frameworks on Real-Time Lightweight Time Series Anomaly Detection. 228-247
Privacy
- Amina El Garne, Yunan Wei, Yucheng Lin, Shengnan Zhao, Chuan Zhao, Zhenxiang Chen:
Secure and Robust Privacy-Preserving Federated Learning For Heterogeneous Resource. 251-270 - Weijie Miao, Wenyuan Wu:
Privacy-Preserving Logistic Regression Model Training Scheme by Homomorphic Encryption. 271-291 - Georgios P. Spathoulas
, Angeliki Katsika
, Georgios Kavallieratos
:
Privacy Preserving and Verifiable Outsourcing of AI Processing for Cyber-Physical Systems. 292-311 - Benjamin Ulsmåg, Jia-Chun Lin
, Ming-Chang Lee
:
Investigating the Privacy Risk of Using Robot Vacuum Cleaners in Smart Environments. 312-330

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.