IEEE Conference on Communications and Network Security
30 May-1 June 2018 // Beijing // China

Accepted Paper List [Main Conference]

List of Accepted Papers in IEEE CNS 2018 Main Conference

Papers are listed as “Seq”,  “Title” and “Authors with affiliation and country”

  1. SoundAuth: Secure Zero-Effort Two-Factor Authentication Based on Audio Signals
    Mingyue Wang (Institute of Information Engineering, Chinese Academy of Sciences & School of Cyber Security, University of Chinese Academy of Sciences, P.R. China); Wen Tao Zhu (Institute of Information Engineering, Chinese Academy of Sciences, P.R. China); Shen Yan (University of Southern California, USA); Qiongxiao Wang (Institute of Information Engineering, Chinese Academy of Sciences, P.R. China)
  2. Towards In-baggage Suspicious Object Detection Using Commodity WiFi
    Chen Wang (Rutgers University, USA); Jian Liu (WINLAB, Rutgers University, USA); Yingying Chen (Rutgers University, USA); Hongbo Liu (Indiana University-Purdue University Indianapolis, USA); Yan Wang (SUNY at Binghamton, USA)
  3. Mitigation of Cascading Denial of Service Attacks on Wi-Fi Networks
    Liangxiao Xin and David Starobinski (Boston University, USA)
  4. ROSTER: Radio Context Attestation in Cognitive Radio Network
    Ning Zhang (Virginia Tech & Raytheon Company, USA); Wenhai Sun, Wenjing Lou and Thomas Hou (Virginia Tech, USA); Wade Trappe (WINLAB, Rutgers University, USA)
  5. Tapping the Potential: Secure Chunk-based Deduplication of Encrypted Data for Cloud Backup
    Wenhai Sun (Virginia Tech, USA); Ning Zhang (Virginia Tech & Raytheon Company, USA); Wenjing Lou and Thomas Hou (Virginia Tech, USA)
  6. Fraus: Launching Cost-efficient and Scalable Mobile Click Fraud Has Never Been So Easy
    Elliott Wen (The University of Auckland, New Zealand); Jiannong Cao (Hong Kong Polytechnic Univ, Hong Kong); Xuefeng Liu (Huazhong University of Science and Technology, P.R. China); Jiaxing Shen (The Hong Kong Polytechnic University, Hong Kong); Gerald Weber (The University of Auckland, New Zealand)
  7. Shooting to the Stars: Secure Location Verification via Meteor Burst Communications
    Savio Sciancalepore (Hamad Bin Khalifa University, Qatar); Gabriele Oligeri (KINDI Center for Computing Research - Qatar University, Qatar); Roberto Di Pietro (Hamad Bin Khalifa University, Qatar)
  8. Deploying Robust Security in Internet of Things
    Ruozhou Yu, Guoliang Xue, Vishnu Teja Kilari and Xiang Zhang (Arizona State University, USA)
  9. Manipulating Drone Dynamic State Estimation to Compromise Navigation
    Wenxin Chen and Yingfei Dong (University of Hawaii, USA); Zhenhai Duan (Florida State University, USA)
  10. PSCluster: Differentially Private Spatial Cluster Detection for Mobile Crowdsourcing Applications
    Boyang Hu (University of Nebraska-Lincoln, USA); Baojian Zhou (University of Albany, USA); Qiben Yan (University of Nebraska-Lincoln, USA); Adil Alim and Feng Chen (University of Albany, USA); Huacheng Zeng (University of Louisville, USA)
  11. Towards High-performance X25519/448 Key Agreement in General Purpose GPUs
    Jiankuo Dong (School of Cyber Security, University of Chinese Academy of Sciences, IIE, CAS, P.R. China); Fangyu Zheng (State Key Laboratory of Information Security, Institute of Information Engineering, P.R. China); Juanjuan Cheng (School of Cyber Security, University of Chinese Academy of Sciences, P.R. China); Jingqiang Lin (Institute of Information Engineering, Chinese Academy of Sciences, P.R. China); Wuqiong Pan (Institute of Information Engineering, CAS, P.R. China); Ziyang Wang (Institute of Information Engineering, Chinese Academy of Sciences, P.R. China)
  12. Detecting Data Integrity Attacks on Correlated SolarFarms Using Multi-layer Data Driven Algorithm
    Kin Gwn Lore, Devu Shila and Lingyu Ren (United Technologies Research Center, USA)
  13. Dynamic Practical Byzantine Fault Tolerance
    Hao Xu (Shanghai Jiaotong University, P.R. China); Yu Long, Zhiqiang Liu and Liu Zhen (Shanghai Jiao Tong University, P.R. China)
  14. Secure and Efficient Multi-Attribute Range Queries based on Comparable Inner Product Encoding
    Qin Liu (Hunan University & Temple University, P.R. China); Sixia Wu and Shuyu Pei (Hunan University, P.R. China); Jie Wu (Temple University, USA); Tao Peng and Guojun Wang (Guangzhou University, P.R. China)
  15. Modeling Cost of Countermeasures in Software Defined Networking-enabled Energy Delivery System
    Kamrul Hasan and Sachin Shetty (Old Dominion University, USA); Amin Hassanzadeh, Malek Ben Salem and Jay Chen (Accenture Technology Labs, USA)
  16. Secure RSS-Fingerprint-Based Indoor Positioning: Attacks and Countermeasures
    Lizhou Yuan, Yidan Hu, Yunzhi Li and Rui Zhang (University of Delaware, USA); Yanchao Zhang and Terri Hedgpeth (Arizona State University, USA)
  17. A Dynamic Opaque Predicates Detection Method Based on Control-Flow Graph
    Dawei Shi and Lianghua Xu (Jiangnan Institute of Computing Technology, P.R. China)
  18. Inference Attack in Android Activity based on Program Fingerprint
    Li Yang, Teng Wei and Jian-feng Ma (Xidian University, P.R. China); Shui Yu (Deakin University, Australia); Chao Yang (Xidian University & Michigan State University, P.R. China)
  19. Replicating Your Heart: Exploring Presentation Attacks on ECG Biometrics
    Yang Gao and Wei Wang (State University of New York at Buffalo, USA); Borui Li and Omkar Patil (State University of New York at Binghamton, USA); Zhanpeng Jin (State University of New York at Buffalo, USA)
  20. e-SAFE: Secure, Efficient and Forensics-Enabled Access to Implantable Medical Devices
    Haotian Chi (Temple University, USA); Longfei Wu (Fayetteville State University, USA); Xiaojiang Du and Qiang Zeng (Temple University, USA); Paul Ratazzi (Air Force Research Laboratory, USA)
  21. Compact Energy and Delay-aware Authentication
    Muslum Ozgur Ozmen, Rouzbeh Behnia and Attila Altay Yavuz (Oregon State University, USA)
  22. Context-Aware Data Aggregation with Localized Information Privacy
    Bo Jiang, Ming Li and Ravi Tandon (University of Arizona, USA)
  23. Defending against Social Network Sybils with Interaction Graph Embedding
    Zhi Yang, Yusi Zhang and Yafei Dai (Peking University, P.R. China)
  24. Malware Coordination using the Blockchain: An Analysis of the Cerber Ransomware
    Stijn Pletinckx and Cyril Trap (TU Delft, The Netherlands); Christian Doerr (Delft University of Technology, The Netherlands)
  25. On Choosing Between Privacy Preservation Mechanisms for Mobile Trajectory Data Sharing
    Rajkarn Singh (University of Edinburgh, United Kingdom (Great Britain)); George Theodorakopoulos (Cardiff University, United Kingdom (Great Britain)); Mahesh K Marina and Myrto Arapinis (The University of Edinburgh, United Kingdom (Great Britain))
  26. ACE of Spades in the IoT Security Game: A Flexible IPsec Security Profile for Access Control
    Santiago Aragón (SEEMOO TU Darmstadt, Germany); Marco Tiloca (SICS Swedish ICT AB, Sweden); Max Maass (Technische Universität Darmstadt, Germany); Matthias Hollick (Technische Universität Darmstadt & Secure Mobile Networking Lab, Germany); Shahid Raza (RISE SICS AB, Sweden)
  27. Practical Collaborative Learning for Crowdsensing in the Internet of Things with Differential Privacy
    Yuanxiong Guo and Yanmin Gong (Oklahoma State University, USA)
  28. N-Guard: a Solution to Secure Access to NFC tags
    Roberto Di Pietro (Hamad Bin Khalifa University, Qatar); Gabriele Oligeri (KINDI Center for Computing Research - Qatar University, Qatar); Xavier Salleras (Pompeu Fabra University, Spain); Matteo Signorini (Nokia Bell Labs Paris, France)
  29. SybilFuse: Combining Local Attributes with Global Structure to Perform Robust Sybil Detection
    Peng Gao (Princeton University, USA); Binghui Wang and Neil Gong (Iowa State University, USA); Sanjeev Kulkarni (Princeton University, USA); Kurt Thomas (Google, USA); Prateek Mittal (Princeton University, USA)
  30. Cloud-Assisted Privacy-Preserving Classification for IoT Applications
    Lei Yang (Amazon LLC, USA); Fengjun Li (University of Kansas, USA)
  31. Fast ECDH Key Exchange Using Twisted Edwards Curves with an Efficiently Computable Endomorphism
    Johann Groszschaedl (University of Luxembourg, Luxembourg); Zhe Liu (Nanjing University of Aeronautics and Astronautics, P.R. China & SnT, University of Luxembourg, Luxembourg); Hwajeong Seo (Hansung University, Korea); Chunhua Su (Japan Advanced Institute of Science and Technology, Japan); Lu Zhou (University of Aizu, Japan)
  32. Pseudonym Inference in Cooperative Vehicular Traffic Scenarios
    Xu Chu (Shanghai Jiaotong University, P.R. China); Na Ruan (Shanghai Jiao Tong University, P.R. China); Ming Li (University of Arizona, USA); Weijia Jia (Shanghai Jiaotong University, P.R. China)
  33. Home Alone: The Insider Threat of Unattended Wearables and A Defense using Audio Proximity
    Prakash Shrestha (University of Alabama at Birmingham, USA); Babins Shrestha (University of Alabama at Bimingham, USA); Nitesh Saxena (University of Alabama at Birmingham, USA)
  34. T-PriDO: A Tree-based Privacy-Preserving Distributed Online Big Data Processing System
    Anni Zhou and Pan Zhou (Huazhong University of Science and Technology, P.R. China); Dapeng Oliver Wu (University of Florida, USA); Yuchong Hu (Huazhong University of Science and Technology, P.R. China); Shouling Ji (Zhejiang University, P.R. China & Georgia Institute of Technology, USA)
  35. Repairing Faulty Nodes and Locating a DynamicallySpawned Black Hole Search Using Tokens
    Mengfei Peng (Aurora Technology Development, Toronto, Canada); Wei Shi and Jean-Pierre Corriveau (Carleton University, Canada)
  36. The Dark Side of Operational WiFi-calling Services
    Tian Xie (Michigan State University, USA); Guan-Hua Tu (Michigan State Unversity, USA); Chi-Yu Li (National Chiao Tung University, Taiwan); Chunyi Peng (Purdue University, USA); Jiawei Li and Mi Zhang (Michigan State University, USA)
  37. Privacy-Preserving Average Consensus on Directed Graphs Using Push-Sum
    Huan Gao and Yongqiang Wang (Clemson University, USA)
  38. Mitigating Stealthy False Data Injection Attacks Against State Estimation in Smart Grid
    Jingyao Fan (Pennsylvania State University, USA); Youssef Khazbak (The Pennsylvania State University, USA); Jue Tian (Xi'an Jiaotong University, P.R. China); Ting Liu (Xi'an Jiaotong University, PRC, P.R. China); Guohong Cao (The Pennsylvania State University, USA)
  39. Efficient Signature Generation for Classifying Cross-Architecture IoT Malware
    Mohannad Alhanahnah, Qicheng Lin and Qiben Yan (University of Nebraska-Lincoln, USA); Ning Zhang (Virginia Tech & Raytheon Company, USA); Zhenxiang Chen (University of Jinan, P.R. China)
  40. The Insecurity of Home Digital Voice Assistants - Vulnerabilities, Attacks and Countermeasures
    Xinyu Lei (Michigan State University, USA); Guan-Hua Tu (Michigan State Unversity, USA); Alex X. Liu (Michigan State University, USA); Chi-Yu Li (National Chiao Tung University, Taiwan); Tian Xie (Michigan State University, USA)
  41. Pilot Contamination Attack Detection for NOMA in Mm-Wave and Massive MIMO 5G Communication
    Ning Wang (GMU, USA); Long Jiao and Kai Zeng (George Mason University, USA)
  42. Truth-aware Optimal Decision-making Framework with Driver Preferences for V2V Communications
    Mingshun Sun and Ming Li (University of Arizona, USA); Ryan Gerdes (Virginia Tech, USA)
  43. BLOC: A Game-Theoretic Approach to Orchestrate CPS against Cyber Attacks
    Mina Guirguis, Alireza Tahsini, Khan Siddique, Clara Novoa and Justin Moore (Texas State University, USA); Christine Julien (University of Texas at Austin, USA); Noah Dunstatter (Texas State University, USA)
  44. CONCEAL: A Strategy Composition for Resilient Cyber Deception-- Framework, Metrics and Deployment
    Qi Duan (University of North Carolina at Charlotte, USA); Ehab Al-Shaer (University of North Carolina Charlotte, USA); Mazharul Islam (UNC Charlotte, USA); Jafar Haadi Jafarian (UNCC, USA)
  45. Preserving Location Privacy in Ride-Hailing Service
    Youssef Khazbak (The Pennsylvania State University, USA); Jingyao Fan (Pennsylvania State University, USA); Sencun Zhu and Guohong Cao (The Pennsylvania State University, USA)
  46. SecureMatch: Scalable Authentication and Key Relegation for IoT Using Physical-Layer Techniques
    Hanif Rahbari (Rochester Institute of Technology, USA); Jinshan Liu and Jung-Min (Jerry) Park (Virginia Tech, USA)
  47. Privacy-Preserving Watermarking Transformation Technique in a Distributed Environment
    Ali Allami (Missouri S&T, USA); Mukesh Mohania (IBM Research - Australia, Australia); Wei Jiang (MS&T, USA)
  48. Feasibility of Passive Eavesdropping in Massive MIMO: An Experimental Approach
    Chia-Yi Yeh and Edward W. Knightly (Rice University, USA)
  49. Harnessing the Cloud for Secure and Efficient Outsourcing of Non-negative Matrix Factorization
    Shiran Pan (Institute of Information Engineering, Chinese Academy of Sciences & School of Cyber Security, University of Chinese Academy of Sciences, P.R. China); Fangyu Zheng (State Key Laboratory of Information Security, Institute of Information Engineering, P.R. China); Wen Tao Zhu and Qiongxiao Wang (Institute of Information Engineering, Chinese Academy of Sciences, P.R. China)
  50. DPDA: A Differentially Private Double Auction Scheme for Mobile Crowd Sensing
    Wenqiang Jin and Ming Li (University of Nevada, Reno, USA); Linke Guo (Binghamton University, USA); Lei Yang (University of Nevada, Reno, USA)
  51. Detecting Payload Attacks on Programmable Logic Controllers (PLCs)
    Huan Yang, Liang Cheng and Mooi Choo Chuah (Lehigh University, USA)
  52. Physical Layer Key Generation Using Virtual AoA and AoD of mmWave Massive MIMO Channel
    Long Jiao (George Mason University, USA); Jie Tang (UESTC in China, P.R. China); Kai Zeng (George Mason University, USA)