the proceedings contain 51 papers. the special focus in this conference is on Security and Privacy in Communication Networks. the topics include: CyberEA: An Efficient Entity Alignment Framework for Cybersecurity...
ISBN:
(纸本)9783031649530
the proceedings contain 51 papers. the special focus in this conference is on Security and Privacy in Communication Networks. the topics include: CyberEA: An Efficient Entity Alignment Framework for Cybersecurity Knowledge Graph;DNN Architecture Attacks via Network and Power Side Channels;invisibility Spell: Adversarial Patch Attack Against Object Detectors;Meta Perturbation Generation Network for Text-Based CAPTCHA;model Inversion Attacks on Homogeneous and Heterogeneous Graph Neural Networks;unsupervised Multi-criteria Adversarial Detection in Deep Image Retrieval;VRC-GraphNet: A Graph Neural Network-Based Reasoning Framework for Attacking Visual Reasoning Captchas;an Adaptive Authentication Protocol for Internet of Vehicles Based on Vehicle Density;Discovering and Understanding the Security Flaws of Authentication and Authorization in IoT Cloud APIs for Smart Home;optimizing Lightweight Intermittent Message Authentication for Programmable logic Controller;byzantine Protocols with Asymptotically Optimal Communication Complexity;demystifying Blockchain Scalability: Sibling Chains with Minimal Interleaving;VDABSys: A Novel Security-Testing Framework for Blockchain Systems Based on Vulnerability detection;anonymous Key Issuing Protocol with Certified Identities in Identity-Based Encryption;Batch Lattice-Based Designated-Verifier ZK-SNARKs for R1CS;certificateless Aggregate Signature Without Trapdoor for Cloud Storage;efficient Zero Knowledge for Regular Language;enabling Fast Settlement in Atomic Cross-Chain Swaps;HeSUN: Homomorphic Encryption for Secure Unbounded Neural Network Inference;Optimization of Functional Bootstraps with Large LUT and Packing Key Switching;an Authentication Algorithm for Sets of Spatial Data Objects;An Efficient Private Information Retrieval Protocol Based on TFHE;mShield: Protecting In-process Sensitive Data Against Vulnerable third-Party Libraries;password Cracking by Exploiting User Group Information.
the proceedings contain 15 papers. the topics discussed include: encoding choice logics in ASP;determining action reversibility in STRIPS using answer set programming;solving assembly line workload smoothing problem v...
the proceedings contain 15 papers. the topics discussed include: encoding choice logics in ASP;determining action reversibility in STRIPS using answer set programming;solving assembly line workload smoothing problem via answer set programming;a multi-shot ASP encoding for the aircraft routing and maintenance planning problem;action languages and COVID-19: lessons learned;causal analysis of events occurring in trajectories of dynamic domains;operationalizing declarative and procedural knowledge: a benchmark on logicprogramming Petri Nets (LPPNs);actual causality in contextual abduction;and dynamic epistemic logic with ASP updates: application to conditional planning.
the proceedings contain 51 papers. the special focus in this conference is on Security and Privacy in Communication Networks. the topics include: CyberEA: An Efficient Entity Alignment Framework for Cybersecurity...
ISBN:
(纸本)9783031649479
the proceedings contain 51 papers. the special focus in this conference is on Security and Privacy in Communication Networks. the topics include: CyberEA: An Efficient Entity Alignment Framework for Cybersecurity Knowledge Graph;DNN Architecture Attacks via Network and Power Side Channels;invisibility Spell: Adversarial Patch Attack Against Object Detectors;Meta Perturbation Generation Network for Text-Based CAPTCHA;model Inversion Attacks on Homogeneous and Heterogeneous Graph Neural Networks;unsupervised Multi-criteria Adversarial Detection in Deep Image Retrieval;VRC-GraphNet: A Graph Neural Network-Based Reasoning Framework for Attacking Visual Reasoning Captchas;an Adaptive Authentication Protocol for Internet of Vehicles Based on Vehicle Density;Discovering and Understanding the Security Flaws of Authentication and Authorization in IoT Cloud APIs for Smart Home;optimizing Lightweight Intermittent Message Authentication for Programmable logic Controller;byzantine Protocols with Asymptotically Optimal Communication Complexity;demystifying Blockchain Scalability: Sibling Chains with Minimal Interleaving;VDABSys: A Novel Security-Testing Framework for Blockchain Systems Based on Vulnerability detection;anonymous Key Issuing Protocol with Certified Identities in Identity-Based Encryption;Batch Lattice-Based Designated-Verifier ZK-SNARKs for R1CS;certificateless Aggregate Signature Without Trapdoor for Cloud Storage;efficient Zero Knowledge for Regular Language;enabling Fast Settlement in Atomic Cross-Chain Swaps;HeSUN: Homomorphic Encryption for Secure Unbounded Neural Network Inference;Optimization of Functional Bootstraps with Large LUT and Packing Key Switching;an Authentication Algorithm for Sets of Spatial Data Objects;An Efficient Private Information Retrieval Protocol Based on TFHE;mShield: Protecting In-process Sensitive Data Against Vulnerable third-Party Libraries;password Cracking by Exploiting User Group Information.
Quaternions are four-dimensional hyper-complex numbers discovered by Sir William Hamilton in the 19th century. Compared to Euler angles, quaternions allow combining rotations in three-dimensional space and help overco...
详细信息
In this paper, a controller based on a soft computing technique, specifically fuzzy logic, is presented and applied to a wind turbine. In the case of floating offshore wind turbines (FOWT), environmental disturbances,...
详细信息
the proceedings contain 19 pages. the topics discussed include: declaratively querying and visualizing knowledge bases in XML;incremental learning of transfer rules for customized machine translation;an evaluation of ...
详细信息
ISBN:
(纸本)3540255605
the proceedings contain 19 pages. the topics discussed include: declaratively querying and visualizing knowledge bases in XML;incremental learning of transfer rules for customized machine translation;an evaluation of a rule based language for classification queries;mining semantic structures in movies;solving alternating boolean equation systems in answer set programming;effective modeling with constraints;a local search system for solving constraint problems of declarative graph based global constraints;realizing the alternative resources constraint;distributed constraint-based railway simulation;concurrent engineering to wisdom engineering;and a pragmatic approach to pre-testing Prolog programs.
Programmable logic Controllers (PLCs) are essential for Cyber-Physical Systems (CPS) but lack a software solution for lightweight message authentication to ensure the authenticity and integrity of data. A state-of-the...
详细信息
ISBN:
(纸本)9783031649479;9783031649486
Programmable logic Controllers (PLCs) are essential for Cyber-Physical Systems (CPS) but lack a software solution for lightweight message authentication to ensure the authenticity and integrity of data. A state-of-the-art lightweight signature, called LiS, is recently proposed for continuous message authentication in CPS, based on a chameleon hash function and a universal hash function (UHF) chain. Meanwhile, the signer and verifier should synchronize the randomness in the UHF chain for message authentication. To deal withthe intermittent message authentication, Yang et al. proposed a lightweight authentication scheme LARP to replace the UHF chain with a UHF tree, in which each layer is divided by a series of time slots. the signer can quickly skip some randomness rather than linearly update the randomness as in LiS. However, the computational overhead required for synchronization might be expensive in LARP when the signer is suspended for a long time. Additionally, the overhead fluctuates greatly withthe growth of interruption time. In this paper, we first propose an optimized UHF tree to reduce the overhead and mitigate its growth fluctuation. In particular, we implement our optimized scheme on an Allen Bradley ControlLogix 5571, leveraging fast modular reduction of pseudo-Mersenne prime to achieve efficient modulo operation. Our results demonstrate, for the first time, the feasibility and efficiency of running a lightweight signature scheme on the PLC.
the proceedings contain 19 papers. the special focus in this conference is on Inductive logicprogramming. the topics include: A Simulated Annealing Meta-heuristic for Concept Learning in Description logics;generative...
ISBN:
(纸本)9783030974534
the proceedings contain 19 papers. the special focus in this conference is on Inductive logicprogramming. the topics include: A Simulated Annealing Meta-heuristic for Concept Learning in Description logics;generative Clausal Networks: Relational Decision Trees as Probabilistic Circuits;human-Like Rule Learning from Images Using One-Shot Hypothesis Derivation;learning and Revising Dynamic Temporal theories in the Full Discrete Event Calculus;learning logic Programs Using Neural Networks by Exploiting Symbolic Invariance;feature Learning by Least Generalization;a First Step Towards Even More Sparse Encodings of Probability Distributions;mapping Across Relational Domains for Transfer Learning with Word Embeddings-Based Similarity;programmatic Policy Extraction by Iterative Local Search;online Learning of logic Based Neural Network Structures;embedding Models for Knowledge Graphs Induced by Clusters of Relations and Background Knowledge;using Domain-Knowledge to Assist Lead Discovery in Early-Stage Drug Design;preface;non-parametric Learning of Embeddings for Relational Data Using Gaifman Locality theorem;transfer Learning for Boosted Relational Dependency Networks through Genetic Algorithm;Ontology Graph Embeddings and ILP for Financial Forecasting;synthetic Datasets and Evaluation Tools for Inductive Neural Reasoning.
Reverse engineering binary programs without debug information, such as malwares and embedded firmwares, is often a challenging and time-consuming process that relies heavily on manual analysis. Automating the process ...
详细信息
ISBN:
(纸本)9783031649530;9783031649547
Reverse engineering binary programs without debug information, such as malwares and embedded firmwares, is often a challenging and time-consuming process that relies heavily on manual analysis. Automating the process of identifying frequently used library functions can significantly improve the efficiency. While machine learning techniques have shown satisfactory results in computing binary function similarity in specific experimental contexts, their performance in open-set retrieval task remains largely unexplored. Notably, identifying known functions in stripped binaries falls under this category. To contribute to this area of research, we introduce a brand-new dataset derived from popular Rust projects. this dataset not only aims to stimulate further research on Rust program analysis but also serves as a robust platform for evaluating the performance of state-of-the-art methods in open-set function retrieval tasks. through our analysis, we discover that similarity-only methods have limited effectiveness in rejecting negative samples. In response to this identified shortcoming, we present a novel approach that integrates features derived from function call graphs, enabling us to determine a function's identity by considering both its similarity and call relationships with other functions. Experimental results demonstrate that our method enhances overall performance compared to similarity-only solutions, especially under more challenging conditions.
the proceedings contain 22 papers. the topics discussed include: a preliminary report on integrating of answer set and constraint solving;extending conceptual logic programs with arbitrary rules;combining answer sets ...
the proceedings contain 22 papers. the topics discussed include: a preliminary report on integrating of answer set and constraint solving;extending conceptual logic programs with arbitrary rules;combining answer sets of nonmonotonic logic programs;an algebraic account of modularity in ID-logic;Nelson's strong negation, safe beliefs and the answer set semantics;disjunctive answer set programming via satisfiability;reducing propositional theories in equilibrium logic to logic programs;towards implementations for advanced equivalence checking in answer-set programming;SELP - a system for studying strong equivalence between logic programs;debugging logic programs under the answer set semantics;an experimental study of search strategies and heuristics in answer set programming;an interactive approach to answer set programming;a backjumping technique for disjunctive logicprogramming;and a language for modular answer set programming: application to ACC tournament scheduling.
暂无评论