Online Conferencing
For authors choosing Type 2 presentations, your videos will be shown below around one or two days before the conference start date and we will remove them right after the conference.
The Fourth International Conference on Ubiquitous Security (UbiSec 2024)
Session UbiSec-4: 14:40-17:15, December 30 (Monday), Room 2
Chair: Prof. Shuhong Chen, Guangzhou University, China
Enhanced K-means Clustering Algorithm Integrating Outlier Detection and Density Peaks
Chongtao Zhu, Xiaoyan Liao, Qi Liu and Shaobo Zhang
Marriage Matching For Bipartite Graphs Under Condensed Local Differential Privacy
Li Binghan, Zhu Youwen and Guo Jing
Optimizing Task Allocation with Privacy-Preserving Using Fuzzy Inference
Wei You, Tao Peng, Zhidong Xie and Houji Chen
Privacy-preserving Cluster Similarity Model for Multi-user and Multi-data
Jiazhao Ma, Zhuowen Ma and Shaohong Zhang
Blockchain-Based Secure Spectrum Sensing and Sharing Mechanism
Kelu Ye, Youwen Zhu and Jing Guo
Session UbiSec-5: 8:30-12:00, December 31 (Tuesday), Room 2
Chair: Prof. Tao Peng, Guangzhou University, China
Enhancing Network Robustness through Feature Normalization and Improved Data Augmentation
Canbin Zhou, Jun Bao and Chongzhi Gao
TNSSL: TrojanNet Attack in Self-Supervised Learning
Wenyin Yang, Guihong Sun, Li Ma, Zikai Zhao, Xianxi Liang and Yali Ma
Single sign-on Security: An empirical study of Sign in with Apple
Michael Okyere and Wanpeng Li
A Data-free Backdoor Attack Approach in Self-Supervised Models
Li Ma, Zhenghao Yu, Wenyin Yang, Sipei Wu, Meifang Xie, Baoyao Yang and Chunrong Lai
Ghaos: Phishing Detection on Ethereum Using Opcode Sequences with GraphSAGE-Attention
Houji Chen, Tao Peng, Yuheng Zhang, Zhidong Xie and Wei You
FCFuzz: Format Constrained Fuzzing for Network Protocol Implementations
Chengnuo Cai, Bo Yu, Lei Zhou and Yeqi Mou
FSFuzzer: A High-Performance Greybox Fuzzer for Stateful Network Protocol
Qian Liu, Lei Zhou, Xu Zhou, Yuan Wei and Danjun Liu
A Multi-Subset Privacy-Preserving Data Aggregation Scheme with Enhanced Statistical Analysis Capabilities for IoT
Jingwen Tuo and Mingwu Zhang
FT-SPC: A Fine-tuning Approach for Backdoor Defense via Adversarial Sample Selection
Shichang Chen and Ya Li
Improving transferability of adversarial examples by SVD transformation
Xiaoyu Li, Junjie Mai and Chongzhi Gao
A Meta-Learning-Based Fault Waveform Detection Method for Distribution Lines Security
Mingyang Li, Haodong Ren, Yijie He and Jie Chen