Online Conferencing

 

For authors choosing Type 2 presentations, your videos will be shown below around one or two days before the conference start date and we will remove them right after the conference.

The Fourth International Conference on Ubiquitous Security (UbiSec 2024)


Session UbiSec-4: 14:40-17:15, December 30 (Monday), Room 2
Chair: Prof. Shuhong Chen, Guangzhou University, China

Enhanced K-means Clustering Algorithm Integrating Outlier Detection and Density Peaks

Chongtao Zhu, Xiaoyan Liao, Qi Liu and Shaobo Zhang


Marriage Matching For Bipartite Graphs Under Condensed Local Differential Privacy

Li Binghan, Zhu Youwen and Guo Jing


Optimizing Task Allocation with Privacy-Preserving Using Fuzzy Inference

Wei You, Tao Peng, Zhidong Xie and Houji Chen


Privacy-preserving Cluster Similarity Model for Multi-user and Multi-data

Jiazhao Ma, Zhuowen Ma and Shaohong Zhang


Blockchain-Based Secure Spectrum Sensing and Sharing Mechanism

Kelu Ye, Youwen Zhu and Jing Guo



Session UbiSec-5: 8:30-12:00, December 31 (Tuesday), Room 2
Chair: Prof. Tao Peng, Guangzhou University, China

Enhancing Network Robustness through Feature Normalization and Improved Data Augmentation

Canbin Zhou, Jun Bao and Chongzhi Gao


TNSSL: TrojanNet Attack in Self-Supervised Learning

Wenyin Yang, Guihong Sun, Li Ma, Zikai Zhao, Xianxi Liang and Yali Ma


Single sign-on Security: An empirical study of Sign in with Apple

Michael Okyere and Wanpeng Li


A Data-free Backdoor Attack Approach in Self-Supervised Models

Li Ma, Zhenghao Yu, Wenyin Yang, Sipei Wu, Meifang Xie, Baoyao Yang and Chunrong Lai


Ghaos: Phishing Detection on Ethereum Using Opcode Sequences with GraphSAGE-Attention

Houji Chen, Tao Peng, Yuheng Zhang, Zhidong Xie and Wei You


FCFuzz: Format Constrained Fuzzing for Network Protocol Implementations

Chengnuo Cai, Bo Yu, Lei Zhou and Yeqi Mou


FSFuzzer: A High-Performance Greybox Fuzzer for Stateful Network Protocol

Qian Liu, Lei Zhou, Xu Zhou, Yuan Wei and Danjun Liu


A Multi-Subset Privacy-Preserving Data Aggregation Scheme with Enhanced Statistical Analysis Capabilities for IoT

Jingwen Tuo and Mingwu Zhang


FT-SPC: A Fine-tuning Approach for Backdoor Defense via Adversarial Sample Selection

Shichang Chen and Ya Li


Improving transferability of adversarial examples by SVD transformation

Xiaoyu Li, Junjie Mai and Chongzhi Gao


A Meta-Learning-Based Fault Waveform Detection Method for Distribution Lines Security

Mingyang Li, Haodong Ren, Yijie He and Jie Chen