Program/Accepted Papers
List of accepted papers:
Stretch-BFT: Workload-Adaptive and Stretchable Consensus Protocol for Permissioned Blockchain | X. Tong, Z. Zhang, C. Jin, W. Fan, Y. Yang, A. Zhou |
An Effective and Robust Transaction Packaging Approach for Multi-leader BFT Blockchain Systems | W. Wang, X. Liu, H. Xu, W. Qu |
Defending against Poisoning Attacks in Federated Learning from a Spatial-temporal Perspective | Z. Gu, J. Shi, L. He, Y. Yang |
BlindFilter: Privacy-Preserving Spam Email Detection Using Homomorphic Encryption | D. Lee, M. Ahn, H. Kwak, J. Hong, H. Kim |
CRIBA: A Tool for Comprehensive Analysis of Cryptographic Ransomware's I/O Behavior | T. Esteves, B. Pereira, R. Oliveira, J. Marco, J. Paulo |
Range-Based Set Reconciliation | A. Meyer |
CASPR: Connectivity-Aware Scheduling for Partition Resilience | S. Qunaibi, S. Udayashankar, S. Al-Kiswany |
TransCAB: Transferable Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World | H. Ma, Y. Li, Y. Gao, Z. Zhang, A. Abuadbba, A. Fu, S. Al-Sarawi, S. Nepal, D. Abbott |
PriSpark: Differential Privacy Enforcement for Big Data Computing in Apache Spark | S. Li, Y. Wen, T. Xue, Z. Wang, Y. Wu, D. Meng |
GradedDAG: An Asynchronous DAG-based BFT Consensus with Lower Latency | X. Dai, Z. Zhang, J. Xiao, J. Yue, X. Xie, H. Jin |
Sensor node fault detection in wireless sensor networks utilizing node-level diagnostics | D. Widhalm, K. Goeschka, W. Kastner |
Transparent Fault Tolerance for Stateful Applications in Kubernetes with Checkpoint/Restore | R. Eidenbenz, Z. Rejiba, H. Schmidt, K. Foerster |
Subdomain Protection is Needed: An SPF and DMARC-based Empirical Measurement Study and Proactive Solution of Email Security | H. Zhang, D. Mi, L. Chen, M. Liu, Y. Shi, Z. Xue |
ScalOTA: Scalable Secure Over-the-Air Software Updates for Vehicles | A. Shoker, F. Alves, P. Esteves-Verissimo |
ALBUS: a Probabilistic Monitoring Algorithm to Counter Burst-Flood Attacks | S. Scherrer, J. Vliegen, A. Sateesan, H. Hsiao, N. Mentens, A. Perrig |
SilenTower: A Robust, Scalable and Secure Watchtower with Silent Executors | M. Xu, Y. Zhang, S. Zhong |
Extending the boundaries and exploring the limits of blockchain compression | A. Jain, E. Anceaume, S. Gujar |
Low-overhead Routing for Off-chain Networks with High Resource Utilization | X. Zhang, S. Shi, C. Qian |
FreSh: A Lock-Free Data Series Index | P. Fatourou, E. Kosmas, T. Palpanas, G. Paterakis |
Resource Optimization of Stream Processing in Layered Internet of Things | A. Momtaz, R. Medhat, B. Bonakdarpour |
Inducing Lattices in Non-Lattice Linear Problems | A. Gupta, S. Kulkarni |
Detective-Dee: a Non-intrusive In Situ Anomaly Detection and Fault Localization Framework | Y. Man, S. Li, W. Xia, Y. Li, B. Yu, Y. Long, Y. Pan |
Making Intrusion Tolerance Accessible: A Cloud-Based Hybrid Management Approach to Deploying Resilient Systems | M. Khan, A. Babay |