.- AI and System Security.
.- Boosting Transferability of Adversarial Attacks On Vision Transformer .
.- DMD: Boosting Adversarial Transferability via Dynamic Momentum
Decay.
.- Ghosts in DBMS: Revealing the Security Impacts of Silent Fixes.
.- PerTrajTree-DP: A Personalized Privacy-Preserving Trajectory
Publishing Framework for Trustworthy AI Systems.
.- A Code Vulnerability Detection Method Integrating Pre-trained Model
and Graph Neural Network.
.- Blockchain and Related Technologies.
.- Covert Channels in Bitcoin: Concealing Senders via Transaction
Behavior Mimicry.
.- Hash Time-Locked Contract Scheme Based on Enclave-Based Agent
and Stealth Addresses.
.- Smart Contract Ponzi Detection via Contract Transaction Graph.
.- Evading AI-Based Detectors: A Hybrid Covert Communication Method
Based on Ethereum Transaction Amount and Address.
.- Hierarchical Byzantine Consensus for Election Security.
.- Towards Blockchain-Enabled Cybersecurity Risk Assessment for
Cyber-ship Systems.
.- Spectrum Resources Privacy-preserving Allocation and Certificate
Management Technology based on blockchain.
.- A Blockchain-Based Framework for UAVs in an Asynchronous Network
Environment.
.- BCDAC: Efficient Blockchain-based Cross Domain Access Control Scheme.
.- Privacy Preserving/Enhancing Technologies.
.- An Efficient Private Signaling with Function Secret Sharing.
.- Secure and Efficient Multi-Dimensional Task Matching in Spatial
Crowdsourcing.
.- PB-TPR: A Smart Grid Privacy Protection Framework for Secure Data
Sharing and Efficient Aggregation.
.- Efficient Ranking, Order Statistics, and Sorting under (2, 2)-Threshold
Paillier.
.- Personalized Secure Anonymous Traceability Mechanism with
Pseudo-Random Hopping of Dynamic ID.
.- A Fully Homomorphic Encryption-Based KNN Classification Scheme
for Electric Vehicles Data.
.- A High-Precision and Scalable Location Privacy Query System Based
on FHE.
.- Cryptographic Primitives.
.- Secure Non-Interactive Decision Tree Evaluation via Fully
Homomorphic Encryption.
.- Strong Designated-Verifier zk-SNARKs.
.- Short Lattice-Based Linearly Homomorphic Signatures in the Standard
Model.
.- Kleptographic Fountain- Leakage via a Binary Erasure Channel .
.- Efficient Implementation of NTRU-based Key Encapsulation
Mechanism on Embedded Platform.
.- An Efficient Designated-Server Public-Key Encryption Scheme with
Keyword Search based on Lattices.
.- Privacy-Aware Federated Learning.
.- Personalized Federated Learning with Adaptive Weight Clustering.
.- FedVoD: A Robust Federated Learning Defense Strategy in Hybrid
Byzantine Attacks.
.- A Lightweight Data Leakage Defense Mechanism for Federated
Learning based on Stochastic Gradient Masking.
.- PHV-FL:A Personalized Hierarchical Verifiable Federated Learning
Scheme for Maritime Target Detection.
.- AI-based Security Applications and Technologies.
.- Chaos: Robust Spatio-Temporal Fusion for Generalizable APT
Provenance Tracing.