๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Emerging Information Security and Applications: 4th International Conference, EISA 2023, Hangzhou, China, December 6โ€“7, 2023, Proceedings (Communications in Computer and Information Science)

โœ Scribed by Jun Shao (editor), Sokratis K. Katsikas (editor), Weizhi Meng (editor)


Publisher
Springer
Year
2024
Tongue
English
Leaves
195
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


This volume constitutes the proceedings presented at the 4th International Conference on Emerging Information Security and Applications, EISA 2023, held in Hangzhou, China, in December 2023.
The 11 full papers presented in this volume were thoroughly reviewed and selected from the 35 submissions. The topics of the book are related but not limited to cyber intelligence techniques, multimedia security, blockchain and distributed ledger technology, malware and unwanted software, vulnerability analysis and reverse engineering, usable security and privacy, intrusion detection and prevention, authentication and access control, anonymity and privacy, cryptographic protection, digital forensics, cyber physical systems security, adversarial learning, security measurement, security management and policies, hardware and physical security.

โœฆ Table of Contents


Preface
Organization
Contents
PtbStolen: Pre-trained Encoder Stealing Through Perturbed Samples
1 Introduction
2 Preliminaries
2.1 Encoder Pre-training
2.2 Application in Downstream Tasks
3 Threat Model
3.1 Objectives
3.2 Capability
3.3 Background Knowledge
4 Details of PtbStolen
4.1 Overview
4.2 Problem Formulation
4.3 Algorithm of PtbStolen
5 Experiments
5.1 Attack Settings
5.2 Experimental Results
5.3 Cost Analysis
6 Related Works
6.1 Contrastive Learning
6.2 Model Stealing Attack
7 Conclusion
References
Towards Efficient Universal Adversarial Attack on Audio Classification Models: A Two-Step Method
1 Introduction
2 Related Works
2.1 Input-Dependent Adversarial Attacks
2.2 Universal Adversarial Attacks
3 The Proposed Method
3.1 Preliminaries
3.2 Craft Individual Perturbations
3.3 Fine-Turn Universal Perturbations
4 Experiments
4.1 Settings
4.2 Quantitative Evaluation on Untargeted Attack
4.3 Quantitative Evaluation on Targeted Attack
4.4 Attack with Different Normalization Methods
5 Conclusions
References
Privacy-Preserving Authenticated Federated Learning Scheme for Smart Healthcare System
1 Introduction
2 Related Work
3 Preliminaries
3.1 Federated Learning
3.2 Boneh-Goh-Nissim (BGN) Cryptosystem
3.3 Schnorr Signature
4 System Architecture and Security Model
4.1 System Architecture
4.2 Security Model
4.3 System Requirements
5 Proposed Specific Scheme
5.1 System Setup
5.2 Group Training
5.3 Server Aggregation
5.4 Local Model Update
6 Security Analysis
6.1 Correctness
6.2 Authentication of the Scheme
6.3 Data Privacy
7 Performance Evaluation
7.1 Evaluation Environment
7.2 Characteristic Analysis
7.3 Accuracy and System Runtime
7.4 Cryptosystem Runtime
7.5 Computational Cost of Clients Participating and Revoking Analysis
8 Conclusion
9 Discussion and Future Work
References
Aย Systematic Method forย Constructing ICT Supply Chain Security Requirements
1 Introduction
2 Related Work
3 ICT Supply Chain Security Environment
3.1 Supply Chain Relationship
3.2 Product Life Cycle Stages
3.3 Security Driving Factors
3.4 Security Properties
4 ICT Supply Chain Security Requirements
4.1 Establishment Process ofย Security Requirements
4.2 Validation Process ofย Security Requirements
4.3 Summary ofย theย ICT Supply Chain Security Requirements
5 Application ofย ICT Supply Chain Security Requirements
6 Conclusions andย Future Work
References
Pairing Compression on Some Elliptic Curves with Subgroups of Embedding Degree 6 and Its Applications to Pairing-Based Cryptography
1 Introduction
1.1 Related Work
1.2 Contributions
2 Preliminaries
3 Pairing Compression
4 Applications to Pairing-Based Cryptography
4.1 BLS Short Signatures
4.2 Identity-Based Encryption
5 Conclusion
References
Enhancing Chinese Named Entity Recognition with Disentangled Expert Knowledge
1 Introduction
2 Related Work
2.1 Named Entity Recognition
2.2 Chinese Named Entity Recognition
3 Methods
3.1 Contextual Representation Generation
3.2 Disentangled Expert Knowledge Learning
3.3 Knowledge Enhancement
3.4 NER Prediction
3.5 Model Training
4 Experiments
4.1 Dataset
4.2 Evaluation Metrics
4.3 Implementation Details
4.4 Model Comparison
4.5 Performance on Fine-Grained Category
5 Conclusion
References
Deep Neural Network Model over Encrypted Data
1 Introduction
2 Related Work
3 DNN Classification Model for Ciphertext Data
3.1 General Framework of the Model
3.2 Communication Protocols
3.3 Classification Process
3.4 Security Analysis
4 Experiments
4.1 Experimental Setup
4.2 Analysis of Experimental Results
5 Conclusion
References
Toward the Tradeoffs Between Privacy, Fairness and Utility in Federated Learning
1 Introduction
2 Related Work
2.1 Fairness of FL
2.2 Privacy of FL
2.3 Fairness and Privacy of FL
3 Preliminaries
3.1 Fairness in FL
3.2 Privacy in FL
3.3 Problem Formulation
4 Method
4.1 Fairness Predictor (Model) in Client
4.2 Privacy Protection Method in Fair FL
5 Experiments
5.1 Dataset and Experimental Settings
5.2 Experimental Hyperparameter Settings
5.3 Performance Comparison Results
5.4 Analysis of Privacy and Fairness
6 Conclusion
References
Chinese Named Entity Recognition Within the Electric Power Domain
1 Introduction
2 Related Work
3 Method
3.1 Architecture
3.2 BERT Model
3.3 BiLSTM Model
3.4 CRF Model
4 Experiments
4.1 Electric Power Domain Dataset
4.2 Performance of Electric Power Dataset
4.3 Performance Comparison of NER Models
5 Conclusions
References
Adversarial Example Attacks and Defenses in DNS Data Exfiltration
1 Introduction
2 Background and Related Work
2.1 A Deeper Look into the DNS Protocol
2.2 Data Exfiltration
3 Preliminaries
3.1 Payload Analysis
3.2 Traffic Analysis
3.3 Data Exfiltration Detection Methods
4 Problem Formulation
4.1 Data Exfiltration Detection Using Machine Learning
4.2 Optimization Approach to Adversarial Example Packet Generation of Data Exfiltration Packets
4.3 Our Findings
5 Defense Against Malicious Evasion of DNS Exfiltration Detection
5.1 Ensemble Voting Approach
5.2 Adversarial Example Training
6 Conclusion
References
CONNECTION: COvert chaNnel NEtwork attaCk Through bIt-rate mOdulatioN
1 Introduction
2 Background
2.1 Covert Channel Characteristics
2.2 Brief Overview of Enterprise Networks
3 Related Works
4 Attacker Model
5 Bit-Rate Modulation as Covert Channel
5.1 Covert Sender
5.2 Covert Receiver
6 Evaluation of the Covert Channel
6.1 Results of Adversary Emulation in the Cyber Range
7 Discussion
8 Conclusions
References
Author Index


๐Ÿ“œ SIMILAR VOLUMES


Health Information Processing: 9th China
โœ Hua Xu (editor), Qingcai Chen (editor), Hongfei Lin (editor), Fei Wu (editor), L ๐Ÿ“‚ Library ๐Ÿ“… 2024 ๐Ÿ› Springer ๐ŸŒ English

<span>This book constitutes the refereed proceedings of the 9th China Health Information Processing Conference, CHIP 2023, held in Hangzhou, China, during October 27โ€“29, 2023. <br>The 27 full papers included in this book were carefully reviewed and selected from 66 submissions. They were organized i

Health Information Processing. Evaluatio
โœ Hua Xu (editor), Qingcai Chen (editor), Hongfei Lin (editor), Fei Wu (editor), L ๐Ÿ“‚ Library ๐Ÿ“… 2024 ๐Ÿ› Springer ๐ŸŒ English

<span>This book constitutes the refereed proceedings of the evaluation track of the 9th China Health Information Processing Conference, CHIP 2023, held in Hangzhou, China, during October 27โ€“29, 2023. The 15 algorithms papers and 6 overview papers included in this book were carefully reviewed and sel

Big Data and Security: 4th International
โœ Yuan Tian (editor), Tinghuai Ma (editor), Qingshan Jiang (editor), Qi Liu (edito ๐Ÿ“‚ Library ๐Ÿ“… 2023 ๐Ÿ› Springer ๐ŸŒ English

<span>This book constitutes the refereed proceedings of the 4th International Conference on Big Data and Security, ICBDS 2022, held in Xiamen, China, during December 8โ€“12, 2022.<br>The 51 full papers and 3 short papers included in this book were carefully reviewed and selected from 211 submissions.

Emerging Information Security and Applic
โœ Jiageng Chen, Debiao He, Rongxing Lu ๐Ÿ“‚ Library ๐Ÿ“… 2023 ๐Ÿ› Springer ๐ŸŒ English

<span>This volume constitutes selected papers presented at theย Third International Symposium on Emerging Information Security and Applications, EISA 2022, held in Wuhan, China, in October 2022. Due to COVID-19, EISA 2022 was held fully online.</span><p></p><span>The 13 full papers presented in this

Emerging Information Security and Applic
โœ Jiageng Chen; Debiao He; Rongxing Lu ๐Ÿ“‚ Library ๐Ÿ“… 2023 ๐Ÿ› Springer Nature ๐ŸŒ English

This volume constitutes selected papers presented at the Third International Symposium on Emerging Information Security and Applications, EISA 2022, held in Wuhan, China, in October 2022. Due to COVID-19, EISA 2022 was held fully online. The 13 full papers presented in this volume were thoroughly re

Information and Communications Security:
โœ Ding Wang (editor), Moti Yung (editor), Zheli Liu (editor), Xiaofeng Chen (edito ๐Ÿ“‚ Library ๐Ÿ“… 2023 ๐Ÿ› Springer ๐ŸŒ English

<p><span>This volume LNCS 14252 constitutes the refereed proceedings of 25th International Conference on </span><span>Information and Communications Security</span><span>, ICICS 2023, held in Tianjin, China, during November 18โ€“20, 2023. </span></p><p><span>The 38 full papers presented together with