ICICS 2019 Dec. 15, 2019 to Dec. 17, 2019, Beijing, China

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote I: Prof. Robert Deng Towards Authentication N/A
Prototype-based Malware Traffic Classification with Novelty Detection Lixin Zhao , Lijun Cai , Aimin Yu , Zhen Xu , Dan Meng N/A
Evading API Call Sequence based Malware Classifiers Fenil Fadadu , Anand Handa , Nitesh Kumar , Sandeep K. Shukla N/A
UBER: Combating Sandbox Evasion via User Behavior Emulators Kun Sun , Pengbin Feng , Jianhua Sun , Songsong Liu N/A
AADS: A Noise-Robust Anomaly Detection Framework for Industrial Control Systems Maged Abdelaty , Roberto Doriguzzi-corin , Domenico Siracusa N/A
Characterizing Internet-scale ICS Automated Attacks through Long-term Honeypot Data Limin Sun , Xuan Feng , Jianzhou You , Shichao Lv , Yichen Hao , Ming Zhou N/A
Cloning Vulnerability Detection in Driver Layer of IoT Devices Jian Chen , Weipeng Jiang , Bin Wu , Zhou Jiang , Shaobo Yang , Tao Shu N/A
Road Context-aware Intrusion Detection System for Autonomous Cars Chundong Wang , Wei Zhang , Jingxuan Jiang , Sudipta Chattopadhyay N/A
Automated Cyber Threat Intelligence Reports Classification for Early Warning of Cyber Attacks in Next Generation SOC Wenzhuo Yang , Kwok Yan Lam N/A
HeteroUI: A Novel Framework based on Heterogeneous Information Network Embedding for User Identification in Enterprise Networks Meng Li , Lijun Cai , Aimin Yu , Dan Meng , Haibo Yu N/A
CTLMD: Continuous-Temporal Lateral Movement Detection Using Graph Embedding Lijun Cai , Aimin Yu , Dan Meng , Suya Zhao , Renzheng Wei N/A
Keynote II: Can't You Hear Me Knocking: Novel Security and Privacy Threats to Mobile Users Prof. Mauro Conti N/A
VulHunter: An Automated Vulnerability Detection System based on Deep Learning and Bytecode Ning Guo , Xiaoyong Li , Hui Yin , Yali Gao N/A
Deep Learning-based Vulnerable Function Detection: A Benchmark Yang Xiang , Jun Zhang , Wei Xiao , Guanjun Lin N/A
Automatic Demirci-Selçuk Meet-in-the-Middle Attack on SKINNY with Key-Bridging Lei Hu , Danping Shi , Siwei Sun , Qiu Chen N/A
Privacy-Preserving eID Derivation for Self-Sovereign Identity Systems Felix Hörandner , Sebastian Ramacher , Olamide Omolola , Andreas Abraham N/A
Provably Secure Group Authentication in the Asynchronous Communication Model Willy Susilo , Bo Yang , Mingwu Zhang , Weizhi Meng , Yi Mu , Zhe Xia , Lein Harn N/A
AGE: Authentication Graph Embedding for Detecting Anomalous Login Activities Lijun Cai , Aimin Yu , Dan Meng , Renzheng Wei N/A
SecFlush: A Hardware/Software Collaborative Design for Real-Time Detection and Defense against Flush-based Cache Attacks Zongbin Liu , Churan Tang , Jingquan Ge , Cunqing Ma N/A
CDAE: Towards Empowering Denoising in Side-Channel Analysis Guang Yang , Huizhong Li , Jingdian Ming , Yongbin Zhou N/A
Practical Evaluation Methodology of Higher-order Maskings at Different Operating Frequencies Yuguang Li , Ming Tang , Pengbo Wang , Yanbin Li , Shan Fu N/A
A Multi-group Signature Scheme from Lattices Dongdai Lin , Tian Qiu , Lin Hou N/A
Ciphertext Policy Attribute-Based Encryption for Circuits from LWE Assumption Dawu Gu , Zhen Hua Liu , Geng Wang N/A
Using Equivalent Class to Solve Interval Discrete Logarithm Problem Bin Qi , Jie Ma , Kewei Lv N/A
DTGuard: A Lightweight Defence Mechanism against a New DoS Attack on SDN Bo Qin , Wenchang Shi , Bin Liang , Jianwei Hou , Ziqi Zhang N/A
Towards Comprehensive Security Analysis of Hidden Services Using Binding Guard Relays Wei Sun , Muqian Chen , Xuebin Wang , Jinqiao Shi , Yue Gao , Can Zhao N/A
Context-aware IPv6 Address Hopping Hannes Federrath , Matthias Marx , Monina Schwarz , Maximilian Blochberger , Frederik Wille N/A
Parallel Steepest Ascent Hill-Climbing for High Nonlinear Boolean and Vectorial Boolean Functions (S-Boxes) Jianxin Li , Athmane Seghier N/A
Accelerating SM2 Digital Signature Algorithm using Modern Processor Features Dawu Gu , Juanru Li , Jianqiang Wang , Siqi Ma , Long Mai , Yuan Yan , Songlin Jia , Shuran Wang N/A
Improved Differential Attacks on GIFT-64 Xiaoyang Dong , Huaifeng Chen , Rui Zong N/A
Towards Homograph-Confusable Domain Name Detection Using Dual-Channel CNN Yang Li , Yan Zhang , Guangxi Yu , Xinghua Yang , Huajun Cui , Huiran Yang N/A
FraudJudger: Fraud Detection on Digital Payment Platforms with Fewer Labels Ruoyu Deng , Ruan Na N/A
CloudCoT: A Blockchain-based Cloud Service Dependency Attestation Framework Qingni Shen , Wu Luo , Zhenyu Zhao , Anbang Ruan N/A
Adaptively Secure Puncturable Pseudorandom Functions via Punturable Identity-Based KEMs Rui Xue , Xin Wang , Shimin Li N/A
Towards Blockchain-enabled Searchable Encryption Qiang Tang N/A
An Adversarial Attack based on Multi-Objective Optimization in the Black-box Scenario: MOEA-APGA II Chunkai Zhang , Yepeng Deng , Xin Guo , Xuan Wang N/A
Neuron Selecting: Defending against Adversarial Examples in Deep Neural Networks Ming Zhang , Hu Li , Xiaohui Kuang , Ling Pang , Zhendong Wu N/A
Capturing the Persistence of Facial Expression Features for Deep Fake Video Detection Jiang Ming , Yiru Zhao , Wanfeng Ge , Wenxin Li , Run Wang , Lei Zhao N/A
Differentially Private Frequent Itemset Mining against Incremental Updates Wenjuan Liang N/A
Differentially Private Reinforcement Learning Pingchuan Ma , Zhiqiang Wang , Le Zhang , Ruming Wang N/A
Privacy-Preserving Machine Learning based on Secret Sharing Ye Dong , Xiaojun Chen , Liyan Shen N/A
Privacy-Preserving Decentralised Singular Value Decomposition Qiang Tang , Bowen Liu N/A
WSLD: Detecting Unknown Webshell Using Fuzzy Matching and Deep Learning Zhi Wang , Qixu Liu , Zihao Zhao , Tiantian Song , Xianda Wu N/A
A Character-Level BiGRU-Attention for Phishing Classification Lijuan Yuan , Zhiyong Zeng , Yikang Lu , Tao Feng N/A
Tear Off Your Disguise: Phishing Website Detection using Visual and Network Identities Yang Liu , Zhaoyu Zhou , Lingjing Yu , Qingyun Liu N/A
Hierarchical Representation Network for Steganalysis of QIM Steganography in Low-Bit-Rate Speech Signals Hao Yang , Zhongliang Yang , Yongjian Bao , Yongfeng Huang N/A
Convolutional Neural Network based Side-Channel Attacks with Customized Filters Peng Wang , Lei Hu , Danping Shi , Siwei Sun , Man Wei N/A
DLchain: A Covert Channel over Blockchain based on Dynamic Labels Chang Liu , Gang Xiong , Zhen Li , Jing Tian , Gaopeng Gou , Yige Chen N/A