Program/Accepted Papers
List of accepted papers:
| Stretch-BFT: Workload-Adaptive and Stretchable Consensus Protocol for Permissioned Blockchain | X. Tong, Z. Zhang, C. Jin, W. Fan, Y. Yang, A. Zhou |
| An Effective and Robust Transaction Packaging Approach for Multi-leader BFT Blockchain Systems | W. Wang, X. Liu, H. Xu, W. Qu |
| Defending against Poisoning Attacks in Federated Learning from a Spatial-temporal Perspective | Z. Gu, J. Shi, L. He, Y. Yang |
| BlindFilter: Privacy-Preserving Spam Email Detection Using Homomorphic Encryption | D. Lee, M. Ahn, H. Kwak, J. Hong, H. Kim |
| CRIBA: A Tool for Comprehensive Analysis of Cryptographic Ransomware's I/O Behavior | T. Esteves, B. Pereira, R. Oliveira, J. Marco, J. Paulo |
| Range-Based Set Reconciliation | A. Meyer |
| CASPR: Connectivity-Aware Scheduling for Partition Resilience | S. Qunaibi, S. Udayashankar, S. Al-Kiswany |
| TransCAB: Transferable Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World | H. Ma, Y. Li, Y. Gao, Z. Zhang, A. Abuadbba, A. Fu, S. Al-Sarawi, S. Nepal, D. Abbott |
| PriSpark: Differential Privacy Enforcement for Big Data Computing in Apache Spark | S. Li, Y. Wen, T. Xue, Z. Wang, Y. Wu, D. Meng |
| GradedDAG: An Asynchronous DAG-based BFT Consensus with Lower Latency | X. Dai, Z. Zhang, J. Xiao, J. Yue, X. Xie, H. Jin |
| Sensor node fault detection in wireless sensor networks utilizing node-level diagnostics | D. Widhalm, K. Goeschka, W. Kastner |
| Transparent Fault Tolerance for Stateful Applications in Kubernetes with Checkpoint/Restore | R. Eidenbenz, Z. Rejiba, H. Schmidt, K. Foerster |
| Subdomain Protection is Needed: An SPF and DMARC-based Empirical Measurement Study and Proactive Solution of Email Security | H. Zhang, D. Mi, L. Chen, M. Liu, Y. Shi, Z. Xue |
| ScalOTA: Scalable Secure Over-the-Air Software Updates for Vehicles | A. Shoker, F. Alves, P. Esteves-Verissimo |
| ALBUS: a Probabilistic Monitoring Algorithm to Counter Burst-Flood Attacks | S. Scherrer, J. Vliegen, A. Sateesan, H. Hsiao, N. Mentens, A. Perrig |
| SilenTower: A Robust, Scalable and Secure Watchtower with Silent Executors | M. Xu, Y. Zhang, S. Zhong |
| Extending the boundaries and exploring the limits of blockchain compression | A. Jain, E. Anceaume, S. Gujar |
| Low-overhead Routing for Off-chain Networks with High Resource Utilization | X. Zhang, S. Shi, C. Qian |
| FreSh: A Lock-Free Data Series Index | P. Fatourou, E. Kosmas, T. Palpanas, G. Paterakis |
| Resource Optimization of Stream Processing in Layered Internet of Things | A. Momtaz, R. Medhat, B. Bonakdarpour |
| Inducing Lattices in Non-Lattice Linear Problems | A. Gupta, S. Kulkarni |
| Detective-Dee: a Non-intrusive In Situ Anomaly Detection and Fault Localization Framework | Y. Man, S. Li, W. Xia, Y. Li, B. Yu, Y. Long, Y. Pan |
| Making Intrusion Tolerance Accessible: A Cloud-Based Hybrid Management Approach to Deploying Resilient Systems | M. Khan, A. Babay |