default search action
21st WISA 2020: Jeju Island, Korea
- Ilsun You:
Information Security Applications - 21st International Conference, WISA 2020, Jeju Island, South Korea, August 26-28, 2020, Revised Selected Papers. Lecture Notes in Computer Science 12583, Springer 2020, ISBN 978-3-030-65298-2
AI Security and Intrusion Detection
- Yongsu Kim, Hyoeun Kang, Afifatul Mukaroh, Naufal Suryanto, Harashta Tatimma Larasati, Howon Kim:
Spatially Localized Perturbation GAN (SLP-GAN) for Generating Invisible Adversarial Patches. 3-15 - Hyunji Kim, Jaehoon Park, Hyeokdong Kwon, Kyoungbae Jang, Seungju Choi, Hwajeong Seo:
Detecting Block Cipher Encryption for Defense Against Crypto Ransomware on Low-End Internet of Things. 16-30 - Dongbin Na, Namgyu Park, Sangwoo Ji, Jong Kim:
CAPTCHAs Are Still in Danger: An Efficient Scheme to Bypass Adversarial CAPTCHAs. 31-44 - Kyung Ho Park, Eunji Park, Huy Kang Kim:
Unsupervised Intrusion Detection System for Unmanned Aerial Vehicle with Less Labeling Effort. 45-58 - Hyunseok Shim, Souhwan Jung:
Entropy-Based Feature Grouping in Machine Learning for Android Malware Classification. 59-72 - JongHyeok Lee, Dong-Guk Han:
DLDDO: Deep Learning to Detect Dummy Operations. 73-85
Steganography and Malware
- Ishak Meraouche, Sabyasachi Dutta, Kouichi Sakurai:
3-Party Adversarial Steganography. 89-100 - Shuichi Ichioka, Estelle Pouget, Takao Mimura, Jun Nakajima, Toshihiro Yamauchi:
Accessibility Service Utilization Rates in Android Applications Shared on Twitter. 101-111 - Hung-Jr Shiu, Fang-Yie Leu, Chun-Ming Lai, Yu-Chun Huang:
Novel Reversible Acoustic Steganography Based on Carrier Orthogonality. 112-123
Application, System, and Hardware Security
- Hyeokdong Kwon, Hyunji Kim, Seungju Choi, Kyoungbae Jang, Jaehoon Park, Hyunjun Kim, Hwajeong Seo:
Compact Implementation of CHAM Block Cipher on Low-End Microcontrollers. 127-141 - Semi Park, Kyungho Lee:
The Gravy Value: A Set of Features for Pinpointing BOT Detection Method. 142-153 - Kyoungbae Jang, Seung Ju Choi, Hyeokdong Kwon, Zhi Hu, Hwajeong Seo:
Impact of Optimized Operations A· B, A· C for Binary Field Inversion on Quantum Computers. 154-166 - Jaehyeon Yoon, Ngoc-Tu Chau, Hoang Nguyen Huy, Souhwan Jung:
Virtualization Technologies in the Android Framework and Compatibility with SEAndroid. 167-178 - Sung-Kyung Kim, Eun-Tae Jang, Ki-Woong Park:
Toward a Fine-Grained Evaluation of the Pwnable CTF. 179-190 - Moohong Min, Jemin Justin Lee, Hyunbeom Park, Hyojoung Shin, Kyungho Lee:
A Statistical Approach Towards Fraud Detection in the Horse Racing. 191-202 - Naiwei Liu, Meng Yu, Wanyu Zang, Ravi S. Sandhu:
On the Cost-Effectiveness of TrustZone Defense on ARM Platform. 203-214 - Shing Ki Wong, Siu-Ming Yiu:
Detection on GPS Spoofing in Location Based Mobile Games. 215-226 - Yoo-Seung Won, Dirmanto Jap, Shivam Bhasin:
Push for More: On Comparison of Data Augmentation and SMOTE with Optimised Deep Learning Architecture for Side-Channel. 227-241
Cryptography
- Priyanka Dutta, Willy Susilo, Dung Hoang Duong, Joonsang Baek, Partha Sarathi Roy:
Identity-Based Unidirectional Proxy Re-encryption in Standard Model: A Lattice-Based Construction. 245-257 - Kenta Kodera, Chen-Mou Cheng, Atsuko Miyaji:
Efficient Algorithm for Computing Odd-Degree Isogenies on Montgomery Curves. 258-275 - YoungBeom Kim, Seog Chung Seo:
An Efficient Implementation of AES on 8-Bit AVR-Based Sensor Nodes. 276-290 - Yacheng Wang, Yasuhiko Ikematsu, Shuhei Nakamura, Tsuyoshi Takagi:
Revisiting the Minrank Problem on Multivariate Cryptography. 291-307 - Kun Peng:
Paid and Anonymous Usage of Cloud Software. 308-320 - Hojin Choi, Seog Chung Seo:
Optimization of PBKDF2-HMAC-SHA256 and PBKDF2-HMAC-LSH256 in CPU Environments. 321-333 - Yanhua Zhang, Ximeng Liu, Yupu Hu, Qikun Zhang, Huiwen Jia:
Cryptanalysis of Two Fully Anonymous Attribute-Based Group Signature Schemes with Verifier-Local Revocation from Lattices. 334-346
Advances in Network Security and Attack Defense
- Akihiro Hanzawa, Hiroaki Kikuchi:
Analysis on Malicious Residential Hosts Activities Exploited by Residential IP Proxy Services. 349-361 - Ahmed Abusnaina, Mohammed Abuhamad, DaeHun Nyang, Songqing Chen, An Wang, David Mohaisen:
Insights into Attacks' Progression: Prediction of Spatio-Temporal Behavior of DDoS Attacks. 362-374 - Chaeeun Lee, Eunnarae Ko, Kyungho Lee:
Methods to Select Features for Android Malware Detection Based on the Protection Level Analysis. 375-386
Cyber Security
- Youngbae Jeon, Ji Won Yoon:
Filtering-Based Correlation Power Analysis (CPA) with Signal Envelopes Against Shuffling Methods. 389-402 - Seongmin Park, HyungJin Cho, Youngkwon Park, Bomin Choi, Dowon Kim, Kangbin Yim:
Security Problems of 5G Voice Communication. 403-415
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.