Security, privacy, and anonymity in computation, communication, and storage : 13th International Conference, SpaCCS 2020, Nanjing, China, December 18-20, 2020, Proceedings / Guojun Wang, Bing Chen, Wei Li, Roberto Di Pietro, Xuefeng Yan, Hao Han (eds.).

This book constitutes the refereed proceedings of the 13th International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage, SpaCCS 2020, held in Nanjing, China, in December 2020. The 30 full papers were carefully reviewed and selected from 88 submissions. The...

Full description

Saved in:
Bibliographic Details
Corporate Author: SpaCCS (Conference) Nanjing Shi, China)
Other Authors: Wang, Guojun, Chen, Bing, Li, Wei, Di Pietro, Roberto, Yan, Xuefeng, Han, Hao
Format: eBook
Language:English
Published: Cham : Springer, 2021.
Series:Lecture notes in computer science ; 12382.
LNCS sublibrary. Information systems and applications, incl. Internet/Web, and HCI.
Subjects:
Online Access:Click for online access
Table of Contents:
  • Privacy-preserving and scalable data access control based on self-sovereign identity management in large-scale cloud storage / Min Xiao, Zhongyue Ma, Tao Li
  • Attention mechanism based adversarial attack against deep reinforcement learning / Jinyin Chen, Xueke Wang, Yan Zhang, Haibin Zheng, Shouling Ji
  • Attribute-based searchable encryption scheme with fuzzy keywords / Xinyu Song, Zhan Zhou, Weijie Duan, Zhongyi Liu, Chungen Xu
  • Improving deep neural network robustness with Siamese empowered adversarial training / Yu Zhu, Zongfei Li, Fengyuan Xu, Sheng Zhong
  • Predicting advanced persistent threats for IoT systems based on federated learning / Zitong Li, Xiang Cheng, Jiale Zhang, Bing Chen
  • DFspliter : data flow oriented program partitioning against data stitching attacks / Chenyu Zhao, Hao Han
  • Revisiting attacks and defenses in connected and autonomous vehicles / Ziyan Fang, Weijun Zhang, Zongfei Li, Huaao Tang, Hao Han, Fengyuan Xu
  • An improved cryptanalysis algorithm for Chebyshev map-based discrete logarithm problem / Wei Peng, Shang Song, Wenzheng Liu
  • Reinforcement-learning based network intrusion detection with human interaction in the loop / Ze Liu
  • Research on security of access control for cloud computing environment / Zhongdong Cui, Feng Yu
  • Research and development of privacy protection of WSN routing protocol / Panfei Liu, Feng Xu, Ying Zhu
  • Apply quantum search to the safety check for mono operational attribute based protection systems / Vincent C. Hu
  • A semi-supervised intrusion detection algorithm based on auto-encoder / Xiangtong Du, Yongzhong Li, Zunlei Feng
  • Resarch on arm TrustZone and understanding the security vulnerability in its cache architecture / Pengfei Guo, Yingjian Yan, Chunsheng Zhu, Junjie Wang
  • Scrutinizing trust and transparency in cash on delivery systems / Xuan Son Ha, Trieu Hai Le, Tan Tai Phan, Hung Huy Duc Nguyen, Hong Khanh Vo, Nghia Duong-Trung
  • Expansion adaption of attack-aware controller-link-switch cost minimization placement in software-defined networking / Cheng Chi Qin, Tan Saw Chin, Lee Ching Kwang, Zulfadzli Yusoff, Rizaluddin Kaspin
  • A weighted federated averaging framework to reduce the negative influence from the dishonest users / Fengpan Zhao, Yan Huang, Saide Zhu, Venkata Malladi, Yubao Wu
  • I can think like you! Towards reaction spoofing attack on brainwave-based authentication / Wei-Yang Chiu, Weizhi Meng, Wenjuan Li
  • Cubic permutation polynomials-based block RLNC algorithm in wireless networks / Hongwei Luo, Wanyi Feng, Baolin Sun, Ying Song
  • A lightweight blockchain-based trust model for smart vehicles in VANETs / Seyedvalyallah Ayobi, Yongli Wang, Mahdi Rabbani, Ali Dorri, Hamed Jelodar, Hucheng Huang et al.
  • Light intensity based IoT device positioning for indoor monitoring / Gaofei Sun, Xiaoshuang Xing, Zhenjiang Qian, Zhiguo Wang, Saide Zhu
  • A blockchain-based reconstruction framework for UAV network / Gongzhe Qiao, Yi Zhuang
  • A new certificateless aggregate signature scheme for wireless sensor networks / Yihong Wen, Yi Yang, Shicheng Wang, Li Li, Min Luo
  • Blockchain and IoT based textile manufacturing traceability system in Industry 4.0 / Muhammad Shakeel Faridi, Saqib Ali Guihua Duan, Guojun Wang
  • A network security situational awareness framework based on situation fusion / Sai Lu, Yi Zhuang
  • Intelligent medical security framework of body area network based on fog computing / Songpeng Zhang, Yi Zhuang, Zining Cao
  • Secure and traceable attribute-based sequential aggregate signature / Ruili Yang, Jiageng Chen, Shangle Li
  • Social spammer detection based on PSO-CatBoost / Shupeng Li, F. Jiang, Yunbai Qin, Kunkun Zheng
  • Software developer recommendation in terms of reducing bug tossing length / Muhammad Zubair Baloch, Shahid Hussain, Humaira Afzal, Muhammad Rafiq
  • A methodology to automate the security patterns selection / Khudema Zahra, Shahid Hussain, Humaira Afzal, Muhammad Rafiq Mufti, Dost Muhammad Khan, Muhammad Khalid Sohail.