Default Cover Image

2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)

Nov. 1 2023 to Nov. 3 2023

Exeter, United Kingdom

ISBN: 979-8-3503-8199-3

Table of Contents

Title Page IFreely available from IEEE.pp. 1-1
Title Page IIIFreely available from IEEE.pp. 3-3
CopyrightFreely available from IEEE.pp. 4-4
Table of ContentsFreely available from IEEE.pp. 5-58
Message from the TrustCom 2023 General ChairsFreely available from IEEE.pp. 59-59
Message from the TrustCom 2023 Program ChairsFreely available from IEEE.pp. 60-60
Message from the BigDataSE 2023 General ChairsFreely available from IEEE.pp. 61-61
Message from the BigDataSE 2023 Program ChairsFreely available from IEEE.pp. 62-62
Message from the CSE 2023 General ChairsFreely available from IEEE.pp. 63-63
Message from the CSE 2023 Program ChairsFreely available from IEEE.pp. 64-64
Message from the EUC 2023 General ChairsFreely available from IEEE.pp. 65-65
Message from the EUC 2023 Program ChairsFreely available from IEEE.pp. 66-66
Message from the iSCI 2023 General ChairsFreely available from IEEE.pp. 67-67
Message from the iSCI 2023 Program ChairsFreely available from IEEE.pp. 68-68
Message from the IUCC 2023 Steering ChairsFreely available from IEEE.pp. 69-69
Message from the CIT 2023 Steering ChairsFreely available from IEEE.pp. 70-70
Message from the DSCI 2023 Steering ChairsFreely available from IEEE.pp. 71-71
Message from the SmartCNS 2023 Steering ChairsFreely available from IEEE.pp. 72-72
TrustCom 2023 Organizing and Program CommitteesFreely available from IEEE.pp. 73-78
BigDataSE 2023 Organizing and Program CommitteesFreely available from IEEE.pp. 79-80
CSE 2023 Organizing and Program CommitteesFreely available from IEEE.pp. 81-82
EUC 2023 Organizing and Program CommitteesFreely available from IEEE.pp. 83-84
iSCI 2023 Organizing and Program CommitteesFreely available from IEEE.pp. 85-86
Representation-enhanced APT Detection Using Contrastive LearningFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
APM: An Attack Path-based Method for APT Attack Detection on Few-Shot LearningFull-text access may be available. Sign in or learn about subscription options.pp. 10-19
Class-Targeted Poisoning Attacks against DNNsFull-text access may be available. Sign in or learn about subscription options.pp. 20-27
EzBoost: Fast And Secure Vertical Federated Tree Boosting Framework via EzPCFull-text access may be available. Sign in or learn about subscription options.pp. 28-37
Neighborhood Matching Entity Alignment Model for Vulnerability Knowledge GraphsFull-text access may be available. Sign in or learn about subscription options.pp. 38-45
The Dynamic Paradox: How Layer-skipping DNNs Amplify Cache Side-Channel LeakagesFull-text access may be available. Sign in or learn about subscription options.pp. 46-53
Advanced Machine-Learning Technologies for Coronary Artery Disease Prediction Using Heterogeneous DataFull-text access may be available. Sign in or learn about subscription options.pp. 54-61
Learning in the Dark: Privacy-Preserving Machine Learning using Function ApproximationFull-text access may be available. Sign in or learn about subscription options.pp. 62-71
Undermining License Plate Recognition: A Data Poisoning AttackFull-text access may be available. Sign in or learn about subscription options.pp. 72-78
Reducing Model Memorization to Mitigate Membership Inference AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 79-88
Towards Dynamic Backdoor Attacks against LiDAR Semantic Segmentation in Autonomous DrivingFull-text access may be available. Sign in or learn about subscription options.pp. 89-98
BadLiDet: A Simple Backdoor Attack against LiDAR Object Detection in Autonomous DrivingFull-text access may be available. Sign in or learn about subscription options.pp. 99-108
Safety or Not? A Comparative Study for Deep Learning Apps on SmartphonesFull-text access may be available. Sign in or learn about subscription options.pp. 109-116
Big Data Assisted Object Detection with Privacy ProtectionFull-text access may be available. Sign in or learn about subscription options.pp. 117-124
FINDER: A Simple and Effective Defender against Unnoticeable Graph Injection AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 125-132
FlowBERT: An Encrypted Traffic Classification Model Based on Transformers Using Flow SequenceFull-text access may be available. Sign in or learn about subscription options.pp. 133-140
Fooling Object Detectors in the Physical World with Natural Adversarial CamouflageFull-text access may be available. Sign in or learn about subscription options.pp. 141-148
Too Noisy, or Not Too Noisy? A Private Training in Machine LearningFull-text access may be available. Sign in or learn about subscription options.pp. 149-156
DFedXGB: An XGB Vertical Federated Learning Framework with Data DesensitizationFull-text access may be available. Sign in or learn about subscription options.pp. 157-164
FL-TIA: Novel Time Inference Attacks on Federated LearningFull-text access may be available. Sign in or learn about subscription options.pp. 173-180
Scalable Federated Learning for Fingerprint Recognition AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 181-188
FedRSM: Representational-Similarity-Based Secured Model Uploading for Federated LearningFull-text access may be available. Sign in or learn about subscription options.pp. 189-196
Defending against Adversarial Attacks in Federated Learning on Metric Learning ModelFull-text access may be available. Sign in or learn about subscription options.pp. 197-206
Crowdsourcing-based Model Testing in Federated LearningFull-text access may be available. Sign in or learn about subscription options.pp. 207-213
HDFL: Private and Robust Federated Learning using Hyperdimensional ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 214-221
Byzantine-Robust Federated Learning through Dynamic ClusteringFull-text access may be available. Sign in or learn about subscription options.pp. 222-230
Efficient Covert Communication Scheme Based on EthereumFull-text access may be available. Sign in or learn about subscription options.pp. 249-256
Two-Stage Smart Contract Vulnerability Detection Combining Semantic Features and Graph FeaturesFull-text access may be available. Sign in or learn about subscription options.pp. 257-264
TI-DNS: A Trusted and Incentive DNS Resolution Architecture based on BlockchainFull-text access may be available. Sign in or learn about subscription options.pp. 265-274
Felix: A Model of Detecting Off-chain Abnormal States in Decentralized ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 275-283
Opcode Sequences-Based Smart Contract Vulnerabilities Detection Using Deep LearningFull-text access may be available. Sign in or learn about subscription options.pp. 284-291
IHFBF: A High-Performance Blockchain Framework for Improving Hyperledger Fabric Permissioned ChainFull-text access may be available. Sign in or learn about subscription options.pp. 300-306
Rethinking Practical Blockchain-Based Symmetric Searchable Encryption ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 307-317
A Secure Contactless Payment System with Bidirectional Blockchain and Blake Hash FunctionFull-text access may be available. Sign in or learn about subscription options.pp. 318-325
PrivOff: Secure and Privacy-Preserving Data Management for Distributed Off-Chain NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 326-333
ChainPass: A Privacy-preserving Complete Cross-chain Authentication for Consortium BlockchainsFull-text access may be available. Sign in or learn about subscription options.pp. 334-341
VMR-Tree: Efficient and Verifiable Location-based kNN Queries on BlockchainFull-text access may be available. Sign in or learn about subscription options.pp. 342-351
UNITE: Privacy-Aware Verifiable Quality Assessment via Federated Learning in Blockchain-Empowered CrowdsourcingFull-text access may be available. Sign in or learn about subscription options.pp. 352-360
FedJudge: Blockchain-based full-lifecycle trustworthy federated learning incentive mechanismFull-text access may be available. Sign in or learn about subscription options.pp. 361-368
HiSec: Towards Cyber Threat Correlation and Discovery Based on Hierarchical Graph Neural NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 369-378
Protecting IoT Servers Against Flood Attacks with the Quasi Deterministic Transmission PolicyFull-text access may be available. Sign in or learn about subscription options.pp. 379-386
Lightweight Hierarchical Deterministic Wallet Supporting Stealth Address for IoTFull-text access may be available. Sign in or learn about subscription options.pp. 387-393
Investigating Fraud and Misconduct in Legitimate Internet Economy based on Customer ComplaintsFull-text access may be available. Sign in or learn about subscription options.pp. 394-403
Detecting BGP Anomalies based on Spatio-Temporal Feature Representation Model for Autonomous SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 404-411
GuiDiv: Mitigating Code-reuse Attack in an IoT Cluster Using Guided Control Flow DiversificationFull-text access may be available. Sign in or learn about subscription options.pp. 422-433
Enhancing Security in Industrial IoT: A Taxonomy-driven Approach to Risk AssessmentFull-text access may be available. Sign in or learn about subscription options.pp. 434-443
Measuring DNS-over-Encryption Performance Over IPv6Full-text access may be available. Sign in or learn about subscription options.pp. 444-451
HackMentor: Fine-Tuning Large Language Models for CybersecurityFull-text access may be available. Sign in or learn about subscription options.pp. 452-461
Extracting Length Field of Unknown Binary Network Protocol from Static TraceFull-text access may be available. Sign in or learn about subscription options.pp. 462-469
On ECG Signal Classification: An NAS-empowered Semantic Communication SystemFull-text access may be available. Sign in or learn about subscription options.pp. 470-476
Parallel Pattern Matching over Brotli Compressed Network TrafficFull-text access may be available. Sign in or learn about subscription options.pp. 477-484
Cerberus: Efficient OSPS Traffic Identification through Multi-Task LearningFull-text access may be available. Sign in or learn about subscription options.pp. 504-511
SSdetector: Secure and Manageable Host-based IDS with SGX and SMMFull-text access may be available. Sign in or learn about subscription options.pp. 539-548
A First Look at Digital Rights Management Systems for Secure Mobile Content DeliveryFull-text access may be available. Sign in or learn about subscription options.pp. 549-558
Towards Understanding Checkpointing in Transiently Powered IoT NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 559-568
PANGA: Attention-based Principal Neighborhood Aggregation for Forecasting Future Cyber AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 569-576
SRBR: Anti-selfish Routing Based on Social Similarity and Reputation Using Fuzzy LogicFull-text access may be available. Sign in or learn about subscription options.pp. 577-584
Reinforcement Learning Based Neighbour Selection for VANET with Adaptive Trust ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 585-594
Unified Identification of Anomalies on the Edge: A Hybrid Sequential PGM ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 595-604
Grading and Calculation of Synchronic Distance in Petri Nets for Trustworthy Modeling and analyzingFull-text access may be available. Sign in or learn about subscription options.pp. 605-611
Temporal-Aware Lightweight Visual Tracking Method for Dynamic Traffic ScenesFull-text access may be available. Sign in or learn about subscription options.pp. 612-619
Insider Threat Detection Based On Heterogeneous Graph Neural NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 628-635
Inter-slice Correlation Weighted Fusion for Universal Lesion DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 636-643
Anomaly Detection in Dynamic Networks through Edge-Tight Structure EmbeddingFull-text access may be available. Sign in or learn about subscription options.pp. 644-651
A DGA Domain Name Detection Method Based on Two-Stage Feature ReinforcementFull-text access may be available. Sign in or learn about subscription options.pp. 652-659
High-knowledge shilling attack detection method based on genetic co-forestFull-text access may be available. Sign in or learn about subscription options.pp. 660-667
Showing 100 out of 390