{"id":463,"date":"2025-07-28T14:46:29","date_gmt":"2025-07-28T14:46:29","guid":{"rendered":"https:\/\/srds-conference.org\/?page_id=463"},"modified":"2025-09-30T13:17:11","modified_gmt":"2025-09-30T13:17:11","slug":"accepted-papers","status":"publish","type":"page","link":"https:\/\/srds-conference.org\/index.php\/accepted-papers\/","title":{"rendered":"Accepted Papers"},"content":{"rendered":"\n<ul class=\"wp-block-list\">\n<li><strong>Multi-source Anomaly Detection For Microservice Systems<\/strong><br>Ni Wang, Zhengxin Li, Jingchen Yang, Junfeng Zhao (Inner Mongolia University)<\/li>\n\n\n\n<li><strong>CCE: A Cloud-based SIEM Correlation Engine Built on Serverless Functions<\/strong> <br>Adriano Serckumecka, Ib\u00e9ria Medeiros, Alysson Bessani (FCUL-LASIGE)<\/li>\n\n\n\n<li><strong>Randomized vs. Deterministic? Practical Randomized Synchronous BFT in Expected Constant Time<\/strong><br>Xufeng Zhang, Baohan Huang (Beijing Institute of Technology); Sisi Duan (Tsinghua University); Haibin Zhang (Yangtze Delta Region Institute of Tsinghua University, Zhejiang)<\/li>\n\n\n\n<li><strong>Uncovering Evaluation Bias in Node Attachment Strategies for the Lightning Network<\/strong><br>Asma Almosa, Leonardo Aniello, Boojoong Kang (University of Southampton)<\/li>\n\n\n\n<li><strong>Partition-Tolerant Distributed Cryptographic Key Management<\/strong><br>Mathias Bj\u00f6rkqvist, Frank Bosman, Thomas Quillinan, Ruth Dommerholt-Scholten, Valeriu-Daniel Stanciu (Thales Netherlands)<\/li>\n\n\n\n<li><strong>EVA-S2PLoR: Decentralized Secure 2-party Logistic Regression with A Subtly Hadamard Product Protocol<\/strong><br>Tianle Tao, Shizhao Peng, Tianyu Mei, Shoumo Li, Haogang Zhu (Beihang University)<\/li>\n\n\n\n<li><strong>Securing Consensus from Long-Range Attacks through Collaboration<\/strong><br>Junchao Chen (University of California, Davis); Suyash Gupta (University of Oregon); Alberto Sonnino (MystenLabs &amp; University College London); Lefteris Kokoris-Kogias (MystenLabs); Mohammad Sadoghi (University of California, Davis)<\/li>\n\n\n\n<li><strong>WINK:A Semi-honest Secure Multi-party Computation Framework with Efficient Comparison Protocol<\/strong> <br>Yuanqing feng, Tao Bai, Zhi Lu, Junjun Wu, Xueming Tang, Songfeng Lu (Huazhong University of Science and Technology)<\/li>\n\n\n\n<li><strong>CloudHeal: A Lightweight Online Learning Based Self-Healing Framework for Cloud-Native Systems<\/strong> <br>JunQuan Yi, Zilong He, Wanqi Yang, Pengfei Chen (School of Computer Science and Engineering, Sun Yat-sen University)<\/li>\n\n\n\n<li><strong>Nip it in the Bud: Unsupervised KPI Incipient Fault Detection via Dynamic Latent Feature Ensembling<\/strong> <br>Yanwen Wang, Wenda Tang, Jie Wu (China Telecom Cloud Computing Research Institute)<\/li>\n\n\n\n<li><strong>RCS: A High-Success-Rate and Privacy-Preserving Payment Channel Network Routing Protocol <\/strong>Wenjing Li, Chen Tian, Yuan Zhang, Sheng Zhong (State Key Laboratory for Novel Software Technology, Nanjing University)<\/li>\n\n\n\n<li><strong>B+AVL trees: towards data structures for robust and efficient blockchain state synchronization <\/strong>Michele Cattaneo, Eli\u00e3 Batista, Fernando Pedone (Universita della Svizzera italiana (USI))<\/li>\n\n\n\n<li><strong>FedMI: Reliable and Privacy-Aware Vertical Federated Learning for Anomaly Detection in Distributed Edge Systems<\/strong><br>Yuzhe Zhang, Zirui Zhuang, Qi Qi, Haifeng Sun, Shaoxiong Zhu, Xiaoyuan Fu, Jingyu Wang (Beijing University of Posts and Telecommunications)<\/li>\n\n\n\n<li><strong>Backdoor Defense in Federated Learning via Multi-Perspective Resilient Aggregation<\/strong><br>Jiahao Wang, Hongyun Cai, Lijing Gao, Fengyu Li (School of Cyber Security and Computer, Hebei University)<\/li>\n\n\n\n<li><strong>Towards Stress Testing the Internet Inter-Domain Routing System `in Silico&#8217; with Domino Elham <\/strong>Ehsani Moghadam (ETH Zurich); Fabian E. Bustamante (Northwestern University); Adrian Perrig (ETH Zurich); Walter Willinger (NIKSUN, Inc.)<\/li>\n\n\n\n<li><strong>Privacy-Preserving Blockchain-enabled Vertical Federated Learning with Data Auditing<\/strong><br>Benyu Li (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences); Zhen Xu (Institute of Information Engineering, Chinese Academy of Sciences); Yan Zhang (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences); He Wang (Institute of Information Engineering, Chinese Academy of Sciences)<\/li>\n\n\n\n<li><strong>ENSI: Efficient Non-Interactive Secure Inference for Large Language Models<\/strong><br>Zhiyu He, Maojing Wang, Xinwen Gao, Yuchuan Luo, Lin Liu, Shaojing Fu (National University of Defense Technology)<\/li>\n\n\n\n<li><strong>Cheetah: Pipelined BFT Consensus Protocol with High Throughput and Low Latency<\/strong><br>Tianyang Li, Jin Wu, Jian Dong (Harbin Institute of Technology)<\/li>\n\n\n\n<li><strong>LEA: Label Enumeration Attack in Vertical Federated Learning<\/strong><br>Wenhao Jiang, Shaojing Fu, Yuchuan Luo, Lin Liu (National University of Defense Technology)<\/li>\n\n\n\n<li><strong>Efficient Fair Ordering Protocol with 2-hop Receiver Fairness<\/strong><br>Jingfan Yu, Sisi Duan, Zhixuan Fang (Tsinghua University)<\/li>\n\n\n\n<li><strong>Hard Shell, Reliable Core: Improving Resilience in Replicated Systems with Selective Hybridization<\/strong><br>Laura Lawniczak, Tobias Distler (Friedrich-Alexander-Universit\u00e4t Erlangen-N\u00fcrnberg (FAU))<\/li>\n\n\n\n<li><strong>RootScan: Unveiling Microservice Anomalies through Fine-Grained, Interpretable Root Cause<\/strong> <strong>Analysis<\/strong><br>Chaoyi li (The School of Information and Communication Engineering, Hainan University); Chunyang Ye, Hui Zhou (The School of Computer Science and Technology, Hainan University)<\/li>\n\n\n\n<li><strong>MVMonT: Securing Confidential Deployments with Attestable Multi-Variant Monitoring<\/strong><br>Kailun Qin, Dawu Gu (Shanghai Jiao Tong University)<\/li>\n\n\n\n<li><strong>Fusing Multimodal Binary Code Representations for Enhanced Similarity Detection<\/strong><br>Taiyan Wang, Ruipeng Wang, Yu Chen, Lu Yu, Zulie Pan, Min Zhang (National University of Defense Technology)<\/li>\n\n\n\n<li><strong>Game-Theoretic Optimization for Coalition-Based Intrusion Detection with Multi-Source Adaptive<\/strong> <strong>Dispatching<\/strong><br>Yingchun Yang, Zhongkai Ding (Nan Jing university of Science and Technology); Songjie Wei (Nanjing University Of Science And Technology)<\/li>\n\n\n\n<li><strong>zkMarket: Ensuring Fairness and Privacy in Decentralized Data Exchange<\/strong><br>Seongho Park (Hanyang University); Seungwoo Kim (Kookmin University); Semin Han, Kyeongtae Lee (Hanyang University); Jihye Kim (Kookmin University); Hyunok Oh (Hanyang University)<\/li>\n\n\n\n<li><strong>Performance Evaluation of Brokerless Messaging Libraries<\/strong><br>Lorenzo La Corte, Syed Aftab Rashid, Andrei-Marian Dan (Hitachi Energy Research)<\/li>\n\n\n\n<li><strong>Goose: Optimistic Search in the IPFS Network<\/strong><br>Rafael Sequeira, Pedro Campon\u00eas, Pedro Costa, Jo\u00e3o Leit\u00e3o (Nova University Lisbon)<\/li>\n\n\n\n<li><strong>Unveiling Evolving Threats: A Data Analysis for Next-Generation Honeypot Development<\/strong><br>Ziyang Wang, Shichao Lv (Institute of Information Engineering, CAS, Beijing, China\uff1b School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China\uff1b); Haining Wang (Virginia Tech); Jianzhou You (Sangfor Technologies Inc.); Shuoyang Liu, Tianwei Yuan, Xiao Lu, Limin Sun (Institute of Information Engineering, CAS, Beijing, China\uff1b School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China)<\/li>\n\n\n\n<li><strong>Diverse Database Replication Based on Snapshot Isolation \u2013 Performance Implications of Improved Dependability<\/strong><br>Vladimir Stankovic, Peter Popov (City St George&#8217;s, University of London)<\/li>\n\n\n\n<li><strong>SecretScout: Effective Hard-coded Secrets Detection in CI Configuration Files<\/strong><br>Chu Qiao (University of Delaware); Yacong Gu (Tsinghua University); Xiaofan Li, Xing Gao (University of Delaware)<\/li>\n\n\n\n<li><strong>On Designing High-Performance Distributed Shared Memory Systems with RDMA<\/strong><br>Amanda Baran, Roberto Palmieri (Lehigh University)<\/li>\n\n\n\n<li><strong>Robust Fingerprinting of Graphs with FinG <\/strong><br>Odysseas Drosis (EPFL); Jade Garcia Bourr\u00e9e (Univ Rennes, Inria, CNRS, IRISA); Anne-Marie Kermarrec, Othmane Safsafi (EPFL); Erwan Le Merrer (Univ Rennes, Inria, CNRS, IRISA)<\/li>\n\n\n\n<li><strong>ASLM-Shard: Efficient Account Shuffling Based on Lightweight Migration in Sharded Blockchain<\/strong><br>Shaojie Liu, Huazhong Liu, Jihong Ding, Xiaoxue Yin (Hainan University); Yonggu Wang (Zhejiang University of Technology); Lixin Gan (Jiangxi Science and Technology Normal University)<\/li>\n\n\n\n<li><strong>Harmonia: Enhancing Liveness in Two-Phase HotStuff without Sacrificing Core Properties<\/strong> Tianyang Li, Jin Wu, Songyan Ji, Jian Dong (Harbin Institute of Technology)<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_themeisle_gutenberg_block_has_review":false,"footnotes":""},"class_list":["post-463","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/srds-conference.org\/index.php\/wp-json\/wp\/v2\/pages\/463","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/srds-conference.org\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/srds-conference.org\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/srds-conference.org\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/srds-conference.org\/index.php\/wp-json\/wp\/v2\/comments?post=463"}],"version-history":[{"count":4,"href":"https:\/\/srds-conference.org\/index.php\/wp-json\/wp\/v2\/pages\/463\/revisions"}],"predecessor-version":[{"id":612,"href":"https:\/\/srds-conference.org\/index.php\/wp-json\/wp\/v2\/pages\/463\/revisions\/612"}],"wp:attachment":[{"href":"https:\/\/srds-conference.org\/index.php\/wp-json\/wp\/v2\/media?parent=463"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}