International Conference on Information, Communications and Signal Processing最新文献

筛选
英文 中文
AFLOW: Developing Adversarial Examples Under Extremely Noise-Limited Settings AFLOW:在噪声极度受限的环境下开发对抗性示例
International Conference on Information, Communications and Signal Processing Pub Date : 2023-10-15 DOI: 10.1007/978-981-99-7356-9_30
Renyang Liu, Jinhong Zhang, Haoran Li, Jin Zhang, Yuanyu Wang, Wei Zhou
{"title":"AFLOW: Developing Adversarial Examples Under Extremely Noise-Limited Settings","authors":"Renyang Liu, Jinhong Zhang, Haoran Li, Jin Zhang, Yuanyu Wang, Wei Zhou","doi":"10.1007/978-981-99-7356-9_30","DOIUrl":"https://doi.org/10.1007/978-981-99-7356-9_30","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"36 1","pages":"502-518"},"PeriodicalIF":0.0,"publicationDate":"2023-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139318925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TimeClave: Oblivious In-enclave Time series Processing System TimeClave:遗忘包内时间序列处理系统
International Conference on Information, Communications and Signal Processing Pub Date : 2023-06-29 DOI: 10.48550/arXiv.2306.16652
K. Bagher, S. Cui, X. Yuan, C. Rudolph, X. Yi
{"title":"TimeClave: Oblivious In-enclave Time series Processing System","authors":"K. Bagher, S. Cui, X. Yuan, C. Rudolph, X. Yi","doi":"10.48550/arXiv.2306.16652","DOIUrl":"https://doi.org/10.48550/arXiv.2306.16652","url":null,"abstract":"Cloud platforms are widely adopted by many systems, such as time series processing systems, to store and process massive amounts of sensitive time series data. Unfortunately, several incidents have shown that cloud platforms are vulnerable to internal and external attacks that lead to critical data breaches. Adopting cryptographic protocols such as homomorphic encryption and secure multi-party computation adds high computational and network overhead to query operations. We present TimeClave, a fully oblivious in-enclave time series processing system: TimeClave leverages Intel SGX to support aggregate statistics on time series with minimal memory consumption inside the enclave. To hide the access pattern inside the enclave, we introduce a non-blocking read-optimised ORAM named RoORAM. TimeClave integrates RoORAM to obliviously and securely handle client queries with high performance. With an aggregation time interval of $10s$, $2^{14}$ summarised data blocks and 8 aggregate functions, TimeClave run point query in $0.03ms$ and a range query of 50 intervals in $0.46ms$. Compared to the ORAM baseline, TimeClave achieves lower query latency by up to $2.5times$ and up to $2times$ throughput, with up to 22K queries per second.","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123362295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PiXi: Password Inspiration by Exploring Information PiXi:从探索信息中获得密码灵感
International Conference on Information, Communications and Signal Processing Pub Date : 2023-04-21 DOI: 10.48550/arXiv.2304.10728
Shengqian Wang, Amirali Salehi-Abari, Julie Thorpe
{"title":"PiXi: Password Inspiration by Exploring Information","authors":"Shengqian Wang, Amirali Salehi-Abari, Julie Thorpe","doi":"10.48550/arXiv.2304.10728","DOIUrl":"https://doi.org/10.48550/arXiv.2304.10728","url":null,"abstract":"Passwords, a first line of defense against unauthorized access, must be secure and memorable. However, people often struggle to create secure passwords they can recall. To address this problem, we design Password inspiration by eXploring information (PiXi), a novel approach to nudge users towards creating secure passwords. PiXi is the first of its kind that employs a password creation nudge to support users in the task of generating a unique secure password themselves. PiXi prompts users to explore unusual information right before creating a password, to shake them out of their typical habits and thought processes, and to inspire them to create unique (and therefore stronger) passwords. PiXi's design aims to create an engaging, interactive, and effective nudge to improve secure password creation. We conducted a user study ($N=238$) to compare the efficacy of PiXi to typical password creation. Our findings indicate that PiXi's nudges do influence users' password choices such that passwords are significantly longer and more secure (less predictable and guessable).","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114996671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
DeepC2: AI-Powered Covert Command and Control on OSNs DeepC2:基于人工智能的osn隐蔽指挥与控制
International Conference on Information, Communications and Signal Processing Pub Date : 2020-09-16 DOI: 10.1007/978-3-031-15777-6_22
Zhi Wang, Chaoge Liu, Xiang Cui, Jie Yin, Jiaxi Liu, Di Wu, Qixu Liu
{"title":"DeepC2: AI-Powered Covert Command and Control on OSNs","authors":"Zhi Wang, Chaoge Liu, Xiang Cui, Jie Yin, Jiaxi Liu, Di Wu, Qixu Liu","doi":"10.1007/978-3-031-15777-6_22","DOIUrl":"https://doi.org/10.1007/978-3-031-15777-6_22","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134345949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Detection of Metamorphic Malware Packers Using Multilayered LSTM Networks 基于多层LSTM网络的变形恶意软件封装检测
International Conference on Information, Communications and Signal Processing Pub Date : 2020-08-24 DOI: 10.1007/978-3-030-61078-4_3
Erik Bergenholtz, E. Casalicchio, D. Ilie, Andrew Moss
{"title":"Detection of Metamorphic Malware Packers Using Multilayered LSTM Networks","authors":"Erik Bergenholtz, E. Casalicchio, D. Ilie, Andrew Moss","doi":"10.1007/978-3-030-61078-4_3","DOIUrl":"https://doi.org/10.1007/978-3-030-61078-4_3","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126316713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Information-Theoretic Security of Cryptographic Channels 密码信道的信息论安全性
International Conference on Information, Communications and Signal Processing Pub Date : 2020-08-24 DOI: 10.1007/978-3-030-61078-4_17
M. Fischlin, Felix Günther, Philip A. Muth
{"title":"Information-Theoretic Security of Cryptographic Channels","authors":"M. Fischlin, Felix Günther, Philip A. Muth","doi":"10.1007/978-3-030-61078-4_17","DOIUrl":"https://doi.org/10.1007/978-3-030-61078-4_17","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134303625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Machine Learning Based Hardware Trojan Detection Using Electromagnetic Emanation 基于机器学习的电磁辐射硬件木马检测
International Conference on Information, Communications and Signal Processing Pub Date : 2020-08-24 DOI: 10.1007/978-3-030-61078-4_1
J. Takahashi, Keiichi Okabe, Hiroki Itoh, X. Ngo, S. Guilley, R. Shrivastwa, M. Ahmed, Patrick Lejoly
{"title":"Machine Learning Based Hardware Trojan Detection Using Electromagnetic Emanation","authors":"J. Takahashi, Keiichi Okabe, Hiroki Itoh, X. Ngo, S. Guilley, R. Shrivastwa, M. Ahmed, Patrick Lejoly","doi":"10.1007/978-3-030-61078-4_1","DOIUrl":"https://doi.org/10.1007/978-3-030-61078-4_1","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"24 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123077752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Blind Functional Encryption 盲功能加密
International Conference on Information, Communications and Signal Processing Pub Date : 2020-08-24 DOI: 10.1007/978-3-030-61078-4_11
Sébastien Canard, Adel Hamdi, Fabien Laguillaumie
{"title":"Blind Functional Encryption","authors":"Sébastien Canard, Adel Hamdi, Fabien Laguillaumie","doi":"10.1007/978-3-030-61078-4_11","DOIUrl":"https://doi.org/10.1007/978-3-030-61078-4_11","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124171077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Experimental Comparisons of Verifiable Delay Functions 可验证延迟函数的实验比较
International Conference on Information, Communications and Signal Processing Pub Date : 2020-08-24 DOI: 10.1007/978-3-030-61078-4_29
Zihan Yang, Bo Qin, Qianhong Wu, Wenchang Shi, Bin Liang
{"title":"Experimental Comparisons of Verifiable Delay Functions","authors":"Zihan Yang, Bo Qin, Qianhong Wu, Wenchang Shi, Bin Liang","doi":"10.1007/978-3-030-61078-4_29","DOIUrl":"https://doi.org/10.1007/978-3-030-61078-4_29","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129552177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Profile Matching Across Online Social Networks 跨在线社交网络的个人资料匹配
International Conference on Information, Communications and Signal Processing Pub Date : 2020-08-20 DOI: 10.1007/978-3-030-61078-4_4
Anisa Halimi, Erman Ayday
{"title":"Profile Matching Across Online Social Networks","authors":"Anisa Halimi, Erman Ayday","doi":"10.1007/978-3-030-61078-4_4","DOIUrl":"https://doi.org/10.1007/978-3-030-61078-4_4","url":null,"abstract":"","PeriodicalId":244480,"journal":{"name":"International Conference on Information, Communications and Signal Processing","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127749351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信